Home
last modified time | relevance | path

Searched refs:mod (Results 1 – 10 of 10) sorted by relevance

/optee_os/ldelf/
H A Dta_elf_rel.c280 static void resolve_sym(const char *name, vaddr_t *val, struct ta_elf **mod, in resolve_sym() argument
283 TEE_Result res = ta_elf_resolve_sym(name, val, mod, NULL); in resolve_sym()
309 Elf32_Rel *rel, struct ta_elf **mod) in e32_tls_get_module() argument
325 resolve_sym(name, NULL, mod, false); in e32_tls_get_module()
409 struct ta_elf *mod = NULL; in e32_relocate() local
464 mod = elf; in e32_relocate()
466 str_tab_size, rel, &mod); in e32_relocate()
467 *where = mod->tls_mod_id; in e32_relocate()
530 struct ta_elf *mod = NULL; in e64_process_tls_tprel_rela() local
540 resolve_sym(name, &symval, &mod, !weak_undef); in e64_process_tls_tprel_rela()
[all …]
/optee_os/core/drivers/crypto/caam/include/
H A Dcaam_types.h39 uint8_t mod; /* Key modulus */ member
/optee_os/core/drivers/crypto/caam/cipher/
H A Dcaam_cipher.c35 .def_key = { .min = 16, .max = 32, .mod = 8 },
44 .def_key = { .min = 16, .max = 32, .mod = 8 },
53 .def_key = { .min = 16, .max = 32, .mod = 8 },
65 .def_key = { .min = 16, .max = 32, .mod = 8 },
80 .def_key = { .min = 8, .max = 8, .mod = 8 },
89 .def_key = { .min = 8, .max = 8, .mod = 8 },
104 .def_key = { .min = 16, .max = 24, .mod = 8 },
114 .def_key = { .min = 16, .max = 24, .mod = 8 },
128 if (size >= def->min && size <= def->max && !(size % def->mod)) in do_check_keysize()
H A Dcaam_cipher_mac.c35 .mod = 8
49 .mod = 8
66 .mod = 8
83 .mod = 8
/optee_os/core/lib/libtomcrypt/
H A Dmpi_desc.c418 static int mod(void *a, void *b, void *c) in mod() function
437 return mod(d, c, d); in addmod()
447 return mod(d, c, d); in submod()
459 res = mod(a, c, &ta); in mulmod()
462 res = mod(b, c, &tb); in mulmod()
468 res = mod(d, c, d); in mulmod()
/optee_os/lib/libutee/
H A Duser_ta_entry.c109 size_t mod = 0; in __utee_call_elf_init_fn() local
118 if (mod == num_mod - _num_mod_init) in __utee_call_elf_init_fn()
126 mod++; in __utee_call_elf_init_fn()
128 _num_mod_init += mod; in __utee_call_elf_init_fn()
/optee_os/scripts/
H A Dgen_compile_commands.py151 mod = base + '.mod'
154 with open(mod) as m:
/optee_os/core/drivers/crypto/stm32/
H A Dstm32_cryp.c165 #define IS_ALGOMODE(cr, mod) \ argument
166 (((cr) & _CRYP_CR_ALGOMODE_MSK) == (_CRYP_CR_ALGOMODE_##mod << \
169 #define SET_ALGOMODE(mod, cr) \ argument
170 clrsetbits(&(cr), _CRYP_CR_ALGOMODE_MSK, (_CRYP_CR_ALGOMODE_##mod << \
/optee_os/core/drivers/crypto/caam/ae/
H A Dcaam_ae.c35 .def_key = { .min = 16, .max = 32, .mod = 8 },
46 .def_key = { .min = 16, .max = 32, .mod = 8 },
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog1012 (and callers) for Short Weierstrass curves with prime p where p = 3 mod 4
2516 invertible (mod N), instead of returning MBEDTLS_ERR_RSA_RNG_FAILED. This
5439 * Fix ECDSA corner case: missing reduction mod N (found by DualTachyon)