Home
last modified time | relevance | path

Searched refs:mod (Results 1 – 11 of 11) sorted by relevance

/optee_os/ldelf/
A Dta_elf_rel.c207 TEE_Result res = ta_elf_resolve_sym(name, val, mod, NULL); in resolve_sym()
227 Elf32_Rel *rel, struct ta_elf **mod) in e32_tls_get_module() argument
242 resolve_sym(name, NULL, mod); in e32_tls_get_module()
325 struct ta_elf *mod = NULL; in e32_relocate() local
380 mod = elf; in e32_relocate()
382 str_tab_size, rel, &mod); in e32_relocate()
383 *where = mod->tls_mod_id; in e32_relocate()
436 struct ta_elf *mod = NULL; in e64_process_tls_tprel_rela() local
445 resolve_sym(name, &symval, &mod); in e64_process_tls_tprel_rela()
447 mod = elf; in e64_process_tls_tprel_rela()
[all …]
/optee_os/core/drivers/crypto/caam/cipher/
A Dcaam_cipher.c35 .def_key = { .min = 16, .max = 32, .mod = 8 },
44 .def_key = { .min = 16, .max = 32, .mod = 8 },
53 .def_key = { .min = 16, .max = 32, .mod = 8 },
65 .def_key = { .min = 16, .max = 32, .mod = 8 },
80 .def_key = { .min = 8, .max = 8, .mod = 8 },
89 .def_key = { .min = 8, .max = 8, .mod = 8 },
104 .def_key = { .min = 16, .max = 24, .mod = 8 },
114 .def_key = { .min = 16, .max = 24, .mod = 8 },
155 if (size >= def->min && size <= def->max && !(size % def->mod)) in do_check_keysize()
A Dcaam_cipher_mac.c35 .mod = 8
49 .mod = 8
66 .mod = 8
83 .mod = 8
/optee_os/lib/libutee/arch/arm/
A Duser_ta_entry.c106 size_t mod = 0; in __utee_call_elf_init_fn() local
115 if (mod == num_mod - _num_mod_init) in __utee_call_elf_init_fn()
123 mod++; in __utee_call_elf_init_fn()
125 _num_mod_init += mod; in __utee_call_elf_init_fn()
/optee_os/core/lib/libtomcrypt/
A Dmpi_desc.c419 static int mod(void *a, void *b, void *c) in mod() function
438 return mod(d, c, d); in addmod()
448 return mod(d, c, d); in submod()
460 res = mod(a, c, &ta); in mulmod()
463 res = mod(b, c, &tb); in mulmod()
469 res = mod(d, c, d); in mulmod()
/optee_os/core/drivers/crypto/caam/include/
A Dcaam_types.h39 uint8_t mod; /* Key modulus */ member
/optee_os/core/drivers/crypto/stm32/
A Dstm32_cryp.c173 #define IS_ALGOMODE(cr, mod) \ argument
174 (((cr) & _CRYP_CR_ALGOMODE_MSK) == (_CRYP_CR_ALGOMODE_##mod << \
177 #define SET_ALGOMODE(mod, cr) \ argument
178 clrsetbits(&(cr), _CRYP_CR_ALGOMODE_MSK, (_CRYP_CR_ALGOMODE_##mod << \
/optee_os/out/arm/core/
A Dtee.symb_sizes1256 000000000e135524 000000000000003c t mod
A Dtee.dmp179 000000000e135524 l F .text 000000000000003c mod
81774 000000000e135524 <mod>:
81775 mod():
81787 e135544: 540000a0 b.eq e135558 <mod+0x34> // b.none
81796 e13555c: 17fffffd b e135550 <mod+0x2c>
82247 e1359f8: 97fffecb bl e135524 <mod>
82255 e135a10: 97fffec5 bl e135524 <mod>
82271 e135a40: 97fffeb9 bl e135524 <mod>
82824 e135f84: 17fffd68 b e135524 <mod>
82883 e13600c: 17fffd46 b e135524 <mod>
A Dtee.map23674 .text.mod 0x000000000e135524 0x3c out/arm/core/lib/libtomcrypt/libtomcrypt.a(mpi_desc.o)
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog412 invertible (mod N), instead of returning MBEDTLS_ERR_RSA_RNG_FAILED. This
3335 * Fix ECDSA corner case: missing reduction mod N (found by DualTachyon)

Completed in 214 milliseconds