Home
last modified time | relevance | path

Searched refs:content (Results 1 – 13 of 13) sorted by relevance

/arm-trusted-firmware-2.8.0/docs/design/
A Dtrusted-board-boot.rst36 validity of a certificate's issuer but by the content of the certificate
44 with the hash extracted from the content certificate. Various hash algorithms
53 The private part of this key is used to sign the BL2 content certificate and
71 sign the content certificate for the BL3X image. The public part is stored
85 - **BL2 content certificate**
101 - **SCP_BL2 content certificate**
111 - **BL31 content certificate**
120 - **BL32 content certificate**
129 - **BL33 content certificate**
170 - BL2 loads and verifies the BL3x content certificate. The signature is
[all …]
A Dauth-framework.rst214 will have been extracted from the parent image i.e. BL31 content
490 content certificate is stored in an X509v3 custom extension field. An extension
/arm-trusted-firmware-2.8.0/services/std_svc/spm/el3_spmc/
A Dspmc_setup.c129 boot_descriptor->content = manifest_addr; in spmc_create_boot_info()
141 boot_descriptor->content, in spmc_create_boot_info()
/arm-trusted-firmware-2.8.0/include/services/
A Dffa_svc.h316 #define FFA_BOOT_INFO_FLAG_CONTENT(content) \ argument
317 (((content) & FFA_BOOT_INFO_FLAG_CONTENT_MASK) \
327 uint64_t content; member
/arm-trusted-firmware-2.8.0/tools/sptool/
A Dsp_mk_generator.py73 def write_to_sp_mk_gen(content, args :dict): argument
/arm-trusted-firmware-2.8.0/docs/plat/
A Dhikey960.rst136 # The content of config file
/arm-trusted-firmware-2.8.0/docs/components/
A Ddebugfs-design.rst59 - bind(): expose the content of a directory to another directory.
A Dsecure-partition-manager.rst504 The SP content certificate is inserted as a separate FIP item so that BL2 loads SPMC,
/arm-trusted-firmware-2.8.0/docs/design_documents/
A Dcmake_framework.rst69 setting groups shall be defined and filled with content in config files.
A Dmeasured_boot_poc.rst470 The fTPM service used has support only for 16 PCRs, therefore the content
475 we do not validate here if the content of PCR0 is correct or not. For this
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dporting-guide.rst188 Defines the maximum address in secure ROM that BL1's actual content (i.e.
220 Defines the maximum address in secure XIP memory that BL2's actual content
275 BL2 content certificate identifier, used by BL1 to load the BL2 content
290 BL31 content certificate identifier, used by BL2 to load the BL31 content
300 BL33 content certificate identifier, used by BL2 to load the BL33 content
306 FWU content certificate.
398 SCP_BL2 content certificate identifier, used by BL2 to load the SCP_BL2
399 content certificate (mandatory when Trusted Board Boot is enabled).
415 BL32 content certificate identifier, used by BL2 to load the BL32 content
3325 can be the content of either ``ESR_EL3`` or ``DISR_EL1``.
/arm-trusted-firmware-2.8.0/docs/process/
A Dcoding-style.rst349 <header content>
/arm-trusted-firmware-2.8.0/docs/
A Dchange-log.md3252 - Added support for warm reset to retain ddr content
4976 - Migrated some content from GitHub wiki to `docs/` directory

Completed in 30 milliseconds