Home
last modified time | relevance | path

Searched refs:used (Results 1 – 25 of 115) sorted by relevance

12345

/arm-trusted-firmware-2.8.0/include/lib/
A Dobject_pool.h36 size_t used; member
45 .used = 0U, \
59 if ((pool->used + count) > pool->capacity) { in pool_alloc_n()
61 count, pool->capacity - pool->used); in pool_alloc_n()
65 void *obj = (char *)(pool->objects) + (pool->obj_size * pool->used); in pool_alloc_n()
66 pool->used += count; in pool_alloc_n()
/arm-trusted-firmware-2.8.0/lib/zlib/
A Dinftrees.c47 unsigned used; /* code entries in table used */ local
205 used = 1U << root; /* use root table entries */
206 mask = used - 1; /* mask for comparing low */
209 if ((type == LENS && used > ENOUGH_LENS) ||
210 (type == DISTS && used > ENOUGH_DISTS))
277 used += 1U << curr;
278 if ((type == LENS && used > ENOUGH_LENS) ||
279 (type == DISTS && used > ENOUGH_DISTS))
301 *table += used;
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1043a/
A Dsoc.def26 # TZC IP Details TZC used is TZC380 or TZC400
32 # Select the DDR PHY generation to be used
59 # Also used by create_pbl.mk.
62 # After BL2 bin, OCRAM is used by ROM Code:
65 # After ROM Code, OCRAM is used by CSF header.
72 # Covert to HEX to be used by create_pbl.mk
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1046a/
A Dsoc.def26 # TZC IP Details TZC used is TZC380 or TZC400
32 # Select the DDR PHY generation to be used
59 # Also used by create_pbl.mk.
62 # After BL2 bin, OCRAM is used by ROM Code:
65 # After ROM Code, OCRAM is used by CSF header.
72 # Covert to HEX to be used by create_pbl.mk
/arm-trusted-firmware-2.8.0/plat/rockchip/rk3399/drivers/m0/src/
A Dstartup.c18 __attribute__ ((used))
37 __attribute__ ((used, section(".isr_vector")))
/arm-trusted-firmware-2.8.0/plat/arm/board/common/swd_rotpk/
A DREADME1 This directory contains some development keys to be used as the secure world
2 root-of-trust key used in the CCA chain of trust.
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1088a/
A Dsoc.def23 # Select the DDR PHY generation to be used
31 # TZC IP Details TZC used is TZC380 or TZC400
46 # 0x18000000 - 0x18009fff -> Used by ROM code, (TBD - can it be used for xlat tables)
/arm-trusted-firmware-2.8.0/plat/nxp/soc-lx2160a/
A Dsoc.def27 # TZC IP Details TZC used is TZC380 or TZC400
33 # Select the DDR PHY generation to be used
93 # Covert to HEX to be used by create_pbl.mk
99 # Covert to HEX to be used by create_pbl.mk
/arm-trusted-firmware-2.8.0/docs/components/
A Dcot-binding.rst10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust.
35 Describes certificate properties which are used
70 This property is used to refer public key node present in
84 This property is used by all certificates which are
88 This property is used to refer one of the non-volatile
187 Describes image properties which will be used during
210 hash method. This property is used to refer hash
219 be used to validate the image.
A Dsecure-partition-manager-mm.rst26 used by Non-secure world applications to access these services. A Trusted OS
51 S-EL0 that can be used to implement simple management and security services.
68 Furthermore, multiple Secure Partitions can be used to isolate unrelated
91 - Implement a standard interface that is used for initialising a Secure
96 - Implement a standard interface that is used by a Secure Partition to fulfil
99 - Implement a standard interface that is used by the Non-secure world for
165 used by the Secure Partition: ``PLAT_SP_IMAGE_MMAP_REGIONS`` and
190 0060A*) is used to invoke a Secure Partition service as a Fast Call.
593 syndrome information can be used to return control through an ERET
692 used after ``MM_SP_EVENT_COMPLETE_AARCH64``.
[all …]
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1028a/
A Dsoc.def26 # TZC used is TZC380 or TZC400
32 # DDR PHY generation to be used
63 # Covert to HEX to be used by create_pbl.mk
/arm-trusted-firmware-2.8.0/lib/xlat_tables/
A Dxlat_tables_private.h16 #error xlat tables v2 must be used with HW_ASSISTED_COHERENCY
/arm-trusted-firmware-2.8.0/docs/plat/arm/
A Darm-build-options.rst16 should match the frame used by the Non-Secure image (normally the Linux
41 this flag is 0. Note that this option is not used on FVP platforms.
46 State-ID yet. Hence this flag is used to configure whether to use the
51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the
55 Firmware. This private key will be used by the certificate generation tool
72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the
100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the
131 compatible change to the MTL protocol, used for AP/SCP communication.
142 is set to 1, then SCMI/SDS drivers will be used. Default is 0.
151 core count, cluster count or other peripherals. This build option is used
[all …]
/arm-trusted-firmware-2.8.0/docs/design/
A Dauth-framework.rst9 terms of certificate hierarchy and the mechanisms used to verify a
18 - The mechanism used to verify the transported information i.e. the
142 #. Authenticate the image as per the cryptographic algorithms used.
145 be used to authenticate the next image in the CoT.
373 TF-A. This method should only be used by data images.
388 The following enum can be used to define these three methods.
421 The ``init()`` function will be used to initialize the IPL.
494 the ``cookie`` field means that it is not used.
559 field is used to specify the length of the data in the memory.
589 section. These are used to verify the current image.
[all …]
A Dtrusted-board-boot.rst11 Arm DEN0006D. It should be used in conjunction with the
23 be used and its hash embedded into the BL1 and BL2 images (only for
31 enables adding custom extensions to the certificates, which are used to store
41 certificates are used to verify public keys which have been used to sign content
42 certificates. Content certificates are used to store the hash of a boot loader
49 The keys used to establish the CoT are:
58 The private part is used to sign the key certificates corresponding to the
64 The private part is used to sign the key certificate corresponding to the
70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to
83 The following certificates are used to authenticate the images.
[all …]
/arm-trusted-firmware-2.8.0/docs/
A Dlicense.rst22 - Neither the name of Arm nor the names of its contributors may be used to
58 is used under the BSD-3-Clause license with the author's permission.
61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of
66 (NCSA OR MIT). It is used by this project under the terms of the NCSA
75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
/arm-trusted-firmware-2.8.0/include/lib/fconf/
A Dfconf.h23 __attribute__((used, section(".fconf_populator"))) \
/arm-trusted-firmware-2.8.0/docs/components/fconf/
A Dindex.rst11 retrieved without the requesting entity knowing what backing store is being used
14 It is used to bridge new and old ways of providing platform-specific data.
83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to
104 can be used to fill the C data structure with the data from the config |DTB|.
118 - Properties used inside common code.
119 - Properties used inside platform specific code.
/arm-trusted-firmware-2.8.0/docs/process/
A Dcoding-style.rst19 used for units) but code itself is still limited to ASCII characters.
22 character is used to break a line and reset to the first column.
29 spellings of a word, the American English spelling is used.
33 name should be used as-is.
38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO
43 missing extensions are rarely used, however, and should not pose a problem.
51 Static Analysis is used to regularly generate a report of current MISRA defects
80 Single spacing should be used around most operators, including:
164 used, braces must be placed around the statements that form the body of the
322 * This style can be used for additional emphasis.
[all …]
/arm-trusted-firmware-2.8.0/docs/getting_started/
A Dporting-guide.rst260 BL2 image identifier, used by BL1 to load BL2.
264 BL31 image identifier, used by BL2 to load BL31.
268 BL33 image identifier, used by BL2 to load BL33.
406 BL32 image identifier, used by BL2 to load BL32.
821 used if the platform saves a hash of the ROTPK.
1336 This function is used by the platform to resets the system. It can be used
1375 This function returns a random value that is used to initialize the canary used
1598 sequence used by plat_try_next_boot_source().
1601 layer used to load the next bootloader image.
2179 used in release builds.
[all …]
/arm-trusted-firmware-2.8.0/plat/arm/board/common/protpk/
A DREADME1 This directory contains some development keys to be used as the platform
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/
A Dporting.rst5 SoC being used is already supported in TF-A.
26 This file describes the SoC physical memory mapping to be used for the CCU,
48 feature is used for boot loader recovery by booting from a valid flash-image
125 defaults. Those default parameters are used only if there is no appropriate
140 …- if different comphy index is used for specific feature, move it to proper table entry and then a…
152 phy-porting-layer.h), the default values are used
/arm-trusted-firmware-2.8.0/docs/plat/arm/fvp/
A Dindex.rst15 The FVP models used are Version 11.19 Build 14, unless otherwise stated.
84 used.
108 - ``FVP_CLUSTER_COUNT`` : Configures the cluster count to be used to
110 cluster topology and this option can be used to override the default value.
194 used:
199 used for the FIP):
209 command may be used to load the EL3 payload ELF image over JTAG:
224 used when building TF-A.
309 Depending on the FVP configuration and Linux configuration used, different
468 The following ``FVP_Base_Cortex-A32x4`` model parameters should be used to
[all …]
/arm-trusted-firmware-2.8.0/docs/plat/
A Dqemu-sbsa.rst10 is not used
49 Those images cannot be used by itself (no semihosing support). Flash images are built by
A Dxilinx-zynqmp.rst50 register is free to be used by other software once TF-A has brought up
56 The following power domain tree represents the power domain model used by TF-A

Completed in 36 milliseconds

12345