Searched refs:mod (Results 1 – 11 of 11) sorted by relevance
/optee_os/ldelf/ |
A D | ta_elf_rel.c | 207 TEE_Result res = ta_elf_resolve_sym(name, val, mod, NULL); in resolve_sym() 227 Elf32_Rel *rel, struct ta_elf **mod) in e32_tls_get_module() argument 242 resolve_sym(name, NULL, mod); in e32_tls_get_module() 325 struct ta_elf *mod = NULL; in e32_relocate() local 380 mod = elf; in e32_relocate() 382 str_tab_size, rel, &mod); in e32_relocate() 383 *where = mod->tls_mod_id; in e32_relocate() 436 struct ta_elf *mod = NULL; in e64_process_tls_tprel_rela() local 445 resolve_sym(name, &symval, &mod); in e64_process_tls_tprel_rela() 447 mod = elf; in e64_process_tls_tprel_rela() [all …]
|
/optee_os/core/drivers/crypto/caam/cipher/ |
A D | caam_cipher.c | 35 .def_key = { .min = 16, .max = 32, .mod = 8 }, 44 .def_key = { .min = 16, .max = 32, .mod = 8 }, 53 .def_key = { .min = 16, .max = 32, .mod = 8 }, 65 .def_key = { .min = 16, .max = 32, .mod = 8 }, 80 .def_key = { .min = 8, .max = 8, .mod = 8 }, 89 .def_key = { .min = 8, .max = 8, .mod = 8 }, 104 .def_key = { .min = 16, .max = 24, .mod = 8 }, 114 .def_key = { .min = 16, .max = 24, .mod = 8 }, 155 if (size >= def->min && size <= def->max && !(size % def->mod)) in do_check_keysize()
|
A D | caam_cipher_mac.c | 35 .mod = 8 49 .mod = 8 66 .mod = 8 83 .mod = 8
|
/optee_os/lib/libutee/arch/arm/ |
A D | user_ta_entry.c | 106 size_t mod = 0; in __utee_call_elf_init_fn() local 115 if (mod == num_mod - _num_mod_init) in __utee_call_elf_init_fn() 123 mod++; in __utee_call_elf_init_fn() 125 _num_mod_init += mod; in __utee_call_elf_init_fn()
|
/optee_os/core/lib/libtomcrypt/ |
A D | mpi_desc.c | 419 static int mod(void *a, void *b, void *c) in mod() function 438 return mod(d, c, d); in addmod() 448 return mod(d, c, d); in submod() 460 res = mod(a, c, &ta); in mulmod() 463 res = mod(b, c, &tb); in mulmod() 469 res = mod(d, c, d); in mulmod()
|
/optee_os/core/drivers/crypto/caam/include/ |
A D | caam_types.h | 39 uint8_t mod; /* Key modulus */ member
|
/optee_os/core/drivers/crypto/stm32/ |
A D | stm32_cryp.c | 173 #define IS_ALGOMODE(cr, mod) \ argument 174 (((cr) & _CRYP_CR_ALGOMODE_MSK) == (_CRYP_CR_ALGOMODE_##mod << \ 177 #define SET_ALGOMODE(mod, cr) \ argument 178 clrsetbits(&(cr), _CRYP_CR_ALGOMODE_MSK, (_CRYP_CR_ALGOMODE_##mod << \
|
/optee_os/out/arm/core/ |
A D | tee.symb_sizes | 1256 000000000e135524 000000000000003c t mod
|
A D | tee.dmp | 179 000000000e135524 l F .text 000000000000003c mod 81774 000000000e135524 <mod>: 81775 mod(): 81787 e135544: 540000a0 b.eq e135558 <mod+0x34> // b.none 81796 e13555c: 17fffffd b e135550 <mod+0x2c> 82247 e1359f8: 97fffecb bl e135524 <mod> 82255 e135a10: 97fffec5 bl e135524 <mod> 82271 e135a40: 97fffeb9 bl e135524 <mod> 82824 e135f84: 17fffd68 b e135524 <mod> 82883 e13600c: 17fffd46 b e135524 <mod>
|
A D | tee.map | 23674 .text.mod 0x000000000e135524 0x3c out/arm/core/lib/libtomcrypt/libtomcrypt.a(mpi_desc.o)
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 412 invertible (mod N), instead of returning MBEDTLS_ERR_RSA_RNG_FAILED. This 3335 * Fix ECDSA corner case: missing reduction mod N (found by DualTachyon)
|
Completed in 214 milliseconds