| /optee_os/core/drivers/ |
| H A D | sp805_wdt.c | 27 uint32_t load = 0; in sp805_setload() local 33 * load is half of what should be required. in sp805_setload() 35 if (MUL_OVERFLOW(timeout, pd->clk_rate, &load)) in sp805_setload() 38 load = (load / 2) - 1; in sp805_setload() 39 if (load < WDT_LOAD_MIN) in sp805_setload() 40 load = WDT_LOAD_MIN; in sp805_setload() 42 pd->load_val = load; in sp805_setload()
|
| /optee_os/core/arch/arm/plat-stm32mp1/scripts/ |
| H A D | stm32image.py | 38 def stm32image_set_header(dest_fd, load, entry, bintype): argument 61 load, 76 def stm32image_create_header_file(source, dest, load, entry, bintype): argument 90 stm32image_set_header(dest_fd, load, entry, bintype) 109 parser.add_argument('--load', 111 help='Load address') 128 load_address = args.load
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_import_openssl.c | 17 /* ### try to load private key - no curve parameters just curve OID */ in s_ecc_import_private_with_oid() 27 /* try to load private key */ in s_ecc_import_private_with_oid() 30 /* load curve parameters for given curve OID */ in s_ecc_import_private_with_oid() 35 /* load private+public key */ in s_ecc_import_private_with_oid() 56 /* ### try to load private key - curve parameters included */ in s_ecc_import_private_with_curve() 81 /* try to load private key */ in s_ecc_import_private_with_curve() 92 /* load curve parameters */ in s_ecc_import_private_with_curve() 94 /* load private+public key */ in s_ecc_import_private_with_curve()
|
| H A D | ecc_import_x509.c | 21 /* load curve parameters for given curve OID */ in s_ecc_import_x509_with_oid() 26 /* load public key */ in s_ecc_import_x509_with_oid() 63 /* try to load public key */ in s_ecc_import_x509_with_curve() 76 /* load curve parameters */ in s_ecc_import_x509_with_curve() 78 /* load public key */ in s_ecc_import_x509_with_curve()
|
| H A D | ltc_ecc_import_point.c | 23 /* load x */ in ltc_ecc_import_point() 25 /* load y */ in ltc_ecc_import_point() 30 /* load x */ in ltc_ecc_import_point()
|
| H A D | ecc_set_key.c | 22 /* load private key */ in ecc_set_key() 34 /* load public key */ in ecc_set_key()
|
| /optee_os/lib/libutee/include/ |
| H A D | remoteproc_pta.h | 24 /* The platform supports load of segment with hash protection */ 71 * Load a segment with a SHA256 hash. 74 * save the whole firmware image. Upon segment load, a successful completion 78 * [in] params[1].memref: Section data to load 79 * [in] params[2].value.a: 32bit LSB load device segment address 80 * [in] params[2].value.b: 32bit MSB load device segment address 89 * to clear a memory on the remote firmware load.
|
| /optee_os/lib/libutils/ext/include/ |
| H A D | speculation_barrier.h | 85 not be the same as the pointer from which we will load. */ \ 87 /* The memory location from which we will load. */ \ 109 not be the same as the pointer from which we will load. */ \ 112 /* The memory location from which we will load. */ \ 204 not be the same as the pointer from which we will load. */ \ 206 /* The memory location from which we will load. */ \ 232 not be the same as the pointer from which we will load. */ \ 235 /* The memory location from which we will load. */ \ 278 not be the same as the pointer from which we will load. */ \ 280 /* The memory location from which we will load. */ \ [all …]
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_desc_helper.h | 134 * Load Immediate value of length len to register dst of class cla 141 * Load Immediate value of length len to register dst of class starting of 149 * Load Immediate value of length len to register dst w/o class 154 * Load value of length len to register dst of class cla 160 * Load value of length len to register dst of class cla starting 168 * FIFO Load to register dst class cla with action act 175 * FIFO Load to register dst class cla with action act. 183 * FIFO Load to register dst class cla with action act. 192 * FIFO Load to register dst class cla with action act. 200 * FIFO Load Immediate data length len to register dst class cla [all …]
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | arch_scall_a64.S | 82 * Load arguments into w4..w7, we're loading junk into unused 84 * many registers to load into. 122 .Lno_args_a32: /* Load the first 4 arguments to function */ 135 .Lcall_a64: /* Load the first 8 arguments to function */ 157 * stack in el0_svc() and later load them into registers again when el0_svc()
|
| H A D | thread_a64.S | 176 /* Load APIAKEY */ 189 /* Load the rest of the general purpose registers */ 803 /* load saved kernel sp */ 971 /* Load x30, elr_el1 */ 974 /* Load x0 to x29 */ 1020 /* load abt_stack_va_end */ 1069 /* Load x30, elr_el1 */ 1072 /* Load x0 to x29 */ 1140 /* Load original x0..x3 into x10..x13 */ 1160 /* load curr_thread_ctx->tsd.rpc_target_info into w19 */ [all …]
|
| H A D | arch_scall_a32.S | 51 /* Load arguments to function */ 67 * stack in thread_scall_handler() and later load them into registers again
|
| /optee_os/scripts/ |
| H A D | gen_ldelf_hex.py | 49 # Check that load segments ordered by VA have the expected layout: 58 print('Expected RO load segment(s) first') 68 print('RO load segment found after RW one(s) (m={})'.format(n)) 76 print('Warning: suspiciously large padding ({}) after load '
|
| H A D | tee_bin_parser.py | 45 print("Load addr high:\t0x{:04x}".format(laddr_h)) 49 print("Load addr low: \t0x{:04x}".format(laddr_l))
|
| /optee_os/core/arch/arm/crypto/ |
| H A D | sha256_armv8a_ce_a32.S | 47 /* load state */ 50 /* load input */ 59 /* load round constants */
|
| H A D | sha1_armv8a_ce_a32.S | 53 /* load round constants */ 58 /* load state */ 62 0: /* load input */
|
| H A D | sha1_armv8a_ce_a64.S | 61 /* load round constants */ 68 /* load state */ 72 /* load input */
|
| H A D | aes_modes_armv8a_ce_a32.S | 148 vld1.8 {q8-q9}, [\rk] @ load first 2 round keys 149 vld1.8 {q14}, [ip] @ load last round key 286 vld1.8 {q6}, [r5] @ load ctr 344 vmov ip, \sreg @ load next word of ctr 377 ldr r4, [sp, #16] @ load args 379 vld1.8 {q0}, [r5] @ load iv 383 ldr r6, [sp, #20] @ load AES key 2
|
| H A D | sha256_armv8a_ce_a64.S | 55 /* load round constants */ 62 /* load state */ 67 /* load input */
|
| /optee_os/ldelf/ |
| H A D | start_rv64.S | 31 lla a1, _ldelf_start /* Get the load offset */ 43 /* Update the pointer at r_offset + load offset */
|
| /optee_os/core/kernel/ |
| H A D | asan.c | 371 DEFINE_ASAN_FUNC(load, 1) 372 DEFINE_ASAN_FUNC(load, 2) 373 DEFINE_ASAN_FUNC(load, 4) 374 DEFINE_ASAN_FUNC(load, 8) 375 DEFINE_ASAN_FUNC(load, 16)
|
| /optee_os/lib/libunw/ |
| H A D | unwind_arm32.c | 212 /* Load the mask */ in unwind_exec_insn() 224 /* Load the registers */ in unwind_exec_insn() 248 /* Read how many registers to load */ in unwind_exec_insn() 285 /* Load the registers */ in unwind_exec_insn() 351 * The program counter was not updated, load it from the link register. in unwind_tab()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_ecp.h | 15 /** Load the contents of a key buffer into an internal ECP representation 26 * \param[in] data The buffer from which to load the representation. 39 /** Load the public part of an internal ECP, if required. 41 * \param ecp The ECP context to load the public part for.
|
| /optee_os/ta/pkcs11/src/ |
| H A D | pkcs11_helpers.h | 64 /* Load TEE operation attributes from a PKCS11 object, return false on error */ 69 /* Hash and load TEE operation attributes from a PKCS11 object */
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_math.c | 65 /* Load in N Modulus Size */ in do_xor_mod_n() 71 /* Load in A f irst value */ in do_xor_mod_n()
|