Home
last modified time | relevance | path

Searched refs:e (Results 1 – 25 of 66) sorted by relevance

123

/arm-trusted-firmware-2.8.0/include/lib/libc/
A Dassert.h20 # define assert(e) ((e) ? (void)0 : __assert(__FILE__, __LINE__)) argument
22 # define assert(e) ((e) ? (void)0 : __assert()) argument
25 #define assert(e) ((void)0) argument
/arm-trusted-firmware-2.8.0/plat/nxp/common/soc_errata/
A Derrata.mk24 $(foreach e,$(ERRATA),$(eval $(call enable_errata,$(strip $(e)))))
/arm-trusted-firmware-2.8.0/tools/cert_create/src/
A Dkey.c54 BIGNUM *e; in key_create_rsa()
57 e = BN_new(); in key_create_rsa()
58 if (e == NULL) { in key_create_rsa()
63 if (!BN_set_word(e, RSA_F4)) { in key_create_rsa()
74 if (!RSA_generate_key_ex(rsa, key_bits, e, NULL)) { in key_create_rsa()
84 BN_free(e); in key_create_rsa()
90 BN_free(e); in key_create_rsa()
/arm-trusted-firmware-2.8.0/include/export/
A DREADME7 - All definitions should be sufficiently namespaced (e.g. with BL_ or TF_) to
14 in the ISO C standard (i.e. uint64_t is fine, but not u_register_t). They
20 pre-defined by all common compilers (e.g. __ASSEMBLER__ or __aarch64__).
25 (e.g. long, uintptr_t, pointer types) where possible. (Some existing export
/arm-trusted-firmware-2.8.0/docs/design_documents/
A Dmeasured_boot_poc.rst234 M/TA: : 6b 2e d2 8c c9 36 92 7d 46 c5 b9 c3 a4 6c 51 7c
243 M/TA: : e5 de e7 7e 99 17 52 12 7d f7 45 ca 4f 4a 39 c0
251 M/TA: Digest : 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a
252 M/TA: : ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
261 M/TA: : f8 19 ec 6e 1e ec 73 ba 5a be d0 96 e3 5f 6d 75
270 M/TA: : d9 6e 93 98 2d 40 87 96 1b 5a a7 ee f1 f4 40 63
279 M/TA: : 00 0f 38 dc 8e c8 02 cd 79 f2 48 d2 2c 25 ab e2
345 NOTICE: : 6b 2e d2 8c c9 36 92 7d 46 c5 b9 c3 a4 6c 51 7c
362 NOTICE: Digest : 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a
363 NOTICE: : ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
[all …]
A Dcmake_framework.rst31 * CMake has various advantages over Make, e.g.:
36 * Out-of-the-box support for integration with several tools (e.g. project
41 * Language is problematic (e.g. variable scope).
71 configuration management tool (e.g. Kconfig) shall be used to generate these
78 targets, i.e. what is the build output, what source files are used, what
81 the previous section. A group can be applied onto a target, i.e. a collection of
89 that CMake does not solve (e.g. preprocessing a file). For these tasks the
95 In the TF-A buildsystem some external tools are used, e.g. fiptool for image
108 In the provisioning phase, first we have to obtain the necessary resources, i.e.
/arm-trusted-firmware-2.8.0/include/drivers/nxp/crypto/caam/
A Drsa.h22 uint8_t *e; member
/arm-trusted-firmware-2.8.0/docs/components/
A Ddebugfs-design.rst27 - # is used as root for drivers (e.g. #t0 is the first uart)
28 - / is used as root for virtual "files" (e.g. /fip, or /dev/uart)
70 - Debug data can be partitioned into different virtual files e.g. expose PMF
74 (e.g. a hardware device that may not be accessible to non-privileged/
82 shared buffer is used to pass path string parameters, or e.g. to exchange
A Dmpmm.rst8 triggering of whole-rail (i.e. clock chopping) responses to overcurrent
A Dsdei.rst78 To define an event that's meant to be explicitly dispatched (i.e., not as a
183 - For those interrupts that are statically bound (i.e. events defined as having
253 - SDEI events must be unmasked on the PE. I.e. the client must have called
265 - A dispatch for the same event must not be outstanding. I.e. it hasn't already
284 I.e. the caller must make sure that the requested dispatch has sufficient
291 - The call will block until the SDEI client completes the event (i.e. when the
/arm-trusted-firmware-2.8.0/drivers/nxp/auth/csf_hdr_parser/
A Dinput_blx_ch329 # e.g FSL_UID_0=11111111
A Dinput_blx_ch225 # e.g FSL_UID=11111111
A Dinput_pbi_ch327 # e.g FSL_UID_0=11111111
A Dinput_pbi_ch3_227 # e.g FSL_UID_0=11111111
A Dinput_bl2_ch3_244 # e.g FSL_UID_0=11111111
A Dinput_bl2_ch344 # e.g FSL_UID_0=11111111
/arm-trusted-firmware-2.8.0/lib/libfdt/
A Dfdt_overlay.c684 const char *s, *e; in overlay_symbol_update() local
720 e = path + path_len; in overlay_symbol_update()
738 if ((e - s) > len && (memcmp(s, "/__overlay__/", len) == 0)) { in overlay_symbol_update()
741 rel_path_len = e - rel_path - 1; in overlay_symbol_update()
742 } else if ((e - s) == len in overlay_symbol_update()
/arm-trusted-firmware-2.8.0/docs/plat/
A Dqti-msm8916.rst25 therefore expects the non-secure world (e.g. Linux) to manage more hardware,
71 use e.g. `qtestsign`_::
81 of problems (e.g. using EDL).
114 …ference Manual: https://developer.qualcomm.com/download/sd410/snapdragon-410e-technical-reference-…
/arm-trusted-firmware-2.8.0/docs/components/fconf/
A Dfconf_properties.rst39 e.g. HW_CONFIG
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/
A Dporting.rst12 (e.g. 'plat/marvell/armada/a8k/a7040_cust').
13 - The platform name for build purposes is called ``<soc>_cust`` (e.g. ``a7040_cust``).
32 In cases where a special physical address map is needed (e.g. Special size for
49 saved in next position on flash (e.g. address 2M in SPI flash).
/arm-trusted-firmware-2.8.0/drivers/nxp/crypto/caam/src/auth/
A Drsa.c53 ctx.pkin.e = rsa_pub_key + klen; in rsa_public_verif_sec()
/arm-trusted-firmware-2.8.0/docs/process/
A Dcommit-style.rst120 case (``this-is-kebab-case``). Components with a product name (i.e. most
121 platforms and some drivers) should use that name (e.g. ``gic600ae``,
123 component (e.g. ``marvell-comphy-3700``, ``rcar3-drivers``, ``a3720-uart``).
/arm-trusted-firmware-2.8.0/docs/design/
A Dauth-framework.rst14 - The mechanism used to encode and transport information, e.g. DER encoded
18 - The mechanism used to verify the transported information i.e. the
30 | Code i.e. | (IO) | Port |
55 | Misc. Libs e.g. |
171 used for verifying the CoT, e.g. memory for public keys, hashes etc.
176 extract authentication parameters contained in an image, e.g. if the
204 multiple CoTs then it should be verified only once e.g. the Trusted World
214 will have been extracted from the parent image i.e. BL31 content
372 is treated as being in raw binary format e.g. boot loader images used by
379 e.g. the X.509 parsing library code in mbed TLS.
[all …]
/arm-trusted-firmware-2.8.0/docs/threat_model/
A Dthreat_model_el3_spm.rst99 - SPMC secrets (e.g. pointer authentication key when enabled)
100 - SP secrets (e.g. application keys).
169 | | spoof the origin and destination worlds (e.g. a NWd|
216 | | and another endpoint (e.g. which NWd endpoint ID |
285 | | the latter in not in a state to receive it (e.g. |
416 | | (e.g. partition message response outside of |
516 | | mitigations (e.g. speculation barriers) for the |
/arm-trusted-firmware-2.8.0/tools/nxp/create_pbl/
A DREADME30 -e <Address> - [Optional] Entry Point Address

Completed in 37 milliseconds

123