| /optee_os/ldelf/ |
| H A D | ta_elf_rel.c | 280 static void resolve_sym(const char *name, vaddr_t *val, struct ta_elf **mod, in resolve_sym() argument 283 TEE_Result res = ta_elf_resolve_sym(name, val, mod, NULL); in resolve_sym() 309 Elf32_Rel *rel, struct ta_elf **mod) in e32_tls_get_module() argument 325 resolve_sym(name, NULL, mod, false); in e32_tls_get_module() 409 struct ta_elf *mod = NULL; in e32_relocate() local 464 mod = elf; in e32_relocate() 466 str_tab_size, rel, &mod); in e32_relocate() 467 *where = mod->tls_mod_id; in e32_relocate() 530 struct ta_elf *mod = NULL; in e64_process_tls_tprel_rela() local 540 resolve_sym(name, &symval, &mod, !weak_undef); in e64_process_tls_tprel_rela() [all …]
|
| /optee_os/core/drivers/crypto/caam/include/ |
| H A D | caam_types.h | 39 uint8_t mod; /* Key modulus */ member
|
| /optee_os/core/drivers/crypto/caam/cipher/ |
| H A D | caam_cipher.c | 35 .def_key = { .min = 16, .max = 32, .mod = 8 }, 44 .def_key = { .min = 16, .max = 32, .mod = 8 }, 53 .def_key = { .min = 16, .max = 32, .mod = 8 }, 65 .def_key = { .min = 16, .max = 32, .mod = 8 }, 80 .def_key = { .min = 8, .max = 8, .mod = 8 }, 89 .def_key = { .min = 8, .max = 8, .mod = 8 }, 104 .def_key = { .min = 16, .max = 24, .mod = 8 }, 114 .def_key = { .min = 16, .max = 24, .mod = 8 }, 128 if (size >= def->min && size <= def->max && !(size % def->mod)) in do_check_keysize()
|
| H A D | caam_cipher_mac.c | 35 .mod = 8 49 .mod = 8 66 .mod = 8 83 .mod = 8
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | mpi_desc.c | 418 static int mod(void *a, void *b, void *c) in mod() function 437 return mod(d, c, d); in addmod() 447 return mod(d, c, d); in submod() 459 res = mod(a, c, &ta); in mulmod() 462 res = mod(b, c, &tb); in mulmod() 468 res = mod(d, c, d); in mulmod()
|
| /optee_os/lib/libutee/ |
| H A D | user_ta_entry.c | 109 size_t mod = 0; in __utee_call_elf_init_fn() local 118 if (mod == num_mod - _num_mod_init) in __utee_call_elf_init_fn() 126 mod++; in __utee_call_elf_init_fn() 128 _num_mod_init += mod; in __utee_call_elf_init_fn()
|
| /optee_os/scripts/ |
| H A D | gen_compile_commands.py | 151 mod = base + '.mod' 154 with open(mod) as m:
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | stm32_cryp.c | 165 #define IS_ALGOMODE(cr, mod) \ argument 166 (((cr) & _CRYP_CR_ALGOMODE_MSK) == (_CRYP_CR_ALGOMODE_##mod << \ 169 #define SET_ALGOMODE(mod, cr) \ argument 170 clrsetbits(&(cr), _CRYP_CR_ALGOMODE_MSK, (_CRYP_CR_ALGOMODE_##mod << \
|
| /optee_os/core/drivers/crypto/caam/ae/ |
| H A D | caam_ae.c | 35 .def_key = { .min = 16, .max = 32, .mod = 8 }, 46 .def_key = { .min = 16, .max = 32, .mod = 8 },
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 1012 (and callers) for Short Weierstrass curves with prime p where p = 3 mod 4 2516 invertible (mod N), instead of returning MBEDTLS_ERR_RSA_RNG_FAILED. This 5439 * Fix ECDSA corner case: missing reduction mod N (found by DualTachyon)
|