/arm-trusted-firmware-2.8.0/include/lib/ |
A D | object_pool.h | 36 size_t used; member 45 .used = 0U, \ 59 if ((pool->used + count) > pool->capacity) { in pool_alloc_n() 61 count, pool->capacity - pool->used); in pool_alloc_n() 65 void *obj = (char *)(pool->objects) + (pool->obj_size * pool->used); in pool_alloc_n() 66 pool->used += count; in pool_alloc_n()
|
/arm-trusted-firmware-2.8.0/lib/zlib/ |
A D | inftrees.c | 47 unsigned used; /* code entries in table used */ local 205 used = 1U << root; /* use root table entries */ 206 mask = used - 1; /* mask for comparing low */ 209 if ((type == LENS && used > ENOUGH_LENS) || 210 (type == DISTS && used > ENOUGH_DISTS)) 277 used += 1U << curr; 278 if ((type == LENS && used > ENOUGH_LENS) || 279 (type == DISTS && used > ENOUGH_DISTS)) 301 *table += used;
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1043a/ |
A D | soc.def | 26 # TZC IP Details TZC used is TZC380 or TZC400 32 # Select the DDR PHY generation to be used 59 # Also used by create_pbl.mk. 62 # After BL2 bin, OCRAM is used by ROM Code: 65 # After ROM Code, OCRAM is used by CSF header. 72 # Covert to HEX to be used by create_pbl.mk
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1046a/ |
A D | soc.def | 26 # TZC IP Details TZC used is TZC380 or TZC400 32 # Select the DDR PHY generation to be used 59 # Also used by create_pbl.mk. 62 # After BL2 bin, OCRAM is used by ROM Code: 65 # After ROM Code, OCRAM is used by CSF header. 72 # Covert to HEX to be used by create_pbl.mk
|
/arm-trusted-firmware-2.8.0/plat/rockchip/rk3399/drivers/m0/src/ |
A D | startup.c | 18 __attribute__ ((used)) 37 __attribute__ ((used, section(".isr_vector")))
|
/arm-trusted-firmware-2.8.0/plat/arm/board/common/swd_rotpk/ |
A D | README | 1 This directory contains some development keys to be used as the secure world 2 root-of-trust key used in the CCA chain of trust.
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1088a/ |
A D | soc.def | 23 # Select the DDR PHY generation to be used 31 # TZC IP Details TZC used is TZC380 or TZC400 46 # 0x18000000 - 0x18009fff -> Used by ROM code, (TBD - can it be used for xlat tables)
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-lx2160a/ |
A D | soc.def | 27 # TZC IP Details TZC used is TZC380 or TZC400 33 # Select the DDR PHY generation to be used 93 # Covert to HEX to be used by create_pbl.mk 99 # Covert to HEX to be used by create_pbl.mk
|
/arm-trusted-firmware-2.8.0/docs/components/ |
A D | cot-binding.rst | 10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust. 35 Describes certificate properties which are used 70 This property is used to refer public key node present in 84 This property is used by all certificates which are 88 This property is used to refer one of the non-volatile 187 Describes image properties which will be used during 210 hash method. This property is used to refer hash 219 be used to validate the image.
|
A D | secure-partition-manager-mm.rst | 26 used by Non-secure world applications to access these services. A Trusted OS 51 S-EL0 that can be used to implement simple management and security services. 68 Furthermore, multiple Secure Partitions can be used to isolate unrelated 91 - Implement a standard interface that is used for initialising a Secure 96 - Implement a standard interface that is used by a Secure Partition to fulfil 99 - Implement a standard interface that is used by the Non-secure world for 165 used by the Secure Partition: ``PLAT_SP_IMAGE_MMAP_REGIONS`` and 190 0060A*) is used to invoke a Secure Partition service as a Fast Call. 593 syndrome information can be used to return control through an ERET 692 used after ``MM_SP_EVENT_COMPLETE_AARCH64``. [all …]
|
/arm-trusted-firmware-2.8.0/plat/nxp/soc-ls1028a/ |
A D | soc.def | 26 # TZC used is TZC380 or TZC400 32 # DDR PHY generation to be used 63 # Covert to HEX to be used by create_pbl.mk
|
/arm-trusted-firmware-2.8.0/lib/xlat_tables/ |
A D | xlat_tables_private.h | 16 #error xlat tables v2 must be used with HW_ASSISTED_COHERENCY
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/ |
A D | arm-build-options.rst | 16 should match the frame used by the Non-Secure image (normally the Linux 41 this flag is 0. Note that this option is not used on FVP platforms. 46 State-ID yet. Hence this flag is used to configure whether to use the 51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the 55 Firmware. This private key will be used by the certificate generation tool 72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the 100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the 131 compatible change to the MTL protocol, used for AP/SCP communication. 142 is set to 1, then SCMI/SDS drivers will be used. Default is 0. 151 core count, cluster count or other peripherals. This build option is used [all …]
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | auth-framework.rst | 9 terms of certificate hierarchy and the mechanisms used to verify a 18 - The mechanism used to verify the transported information i.e. the 142 #. Authenticate the image as per the cryptographic algorithms used. 145 be used to authenticate the next image in the CoT. 373 TF-A. This method should only be used by data images. 388 The following enum can be used to define these three methods. 421 The ``init()`` function will be used to initialize the IPL. 494 the ``cookie`` field means that it is not used. 559 field is used to specify the length of the data in the memory. 589 section. These are used to verify the current image. [all …]
|
A D | trusted-board-boot.rst | 11 Arm DEN0006D. It should be used in conjunction with the 23 be used and its hash embedded into the BL1 and BL2 images (only for 31 enables adding custom extensions to the certificates, which are used to store 41 certificates are used to verify public keys which have been used to sign content 42 certificates. Content certificates are used to store the hash of a boot loader 49 The keys used to establish the CoT are: 58 The private part is used to sign the key certificates corresponding to the 64 The private part is used to sign the key certificate corresponding to the 70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to 83 The following certificates are used to authenticate the images. [all …]
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | license.rst | 22 - Neither the name of Arm nor the names of its contributors may be used to 58 is used under the BSD-3-Clause license with the author's permission. 61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of 66 (NCSA OR MIT). It is used by this project under the terms of the NCSA 75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
|
/arm-trusted-firmware-2.8.0/include/lib/fconf/ |
A D | fconf.h | 23 __attribute__((used, section(".fconf_populator"))) \
|
/arm-trusted-firmware-2.8.0/docs/components/fconf/ |
A D | index.rst | 11 retrieved without the requesting entity knowing what backing store is being used 14 It is used to bridge new and old ways of providing platform-specific data. 83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to 104 can be used to fill the C data structure with the data from the config |DTB|. 118 - Properties used inside common code. 119 - Properties used inside platform specific code.
|
/arm-trusted-firmware-2.8.0/docs/process/ |
A D | coding-style.rst | 19 used for units) but code itself is still limited to ASCII characters. 22 character is used to break a line and reset to the first column. 29 spellings of a word, the American English spelling is used. 33 name should be used as-is. 38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO 43 missing extensions are rarely used, however, and should not pose a problem. 51 Static Analysis is used to regularly generate a report of current MISRA defects 80 Single spacing should be used around most operators, including: 164 used, braces must be placed around the statements that form the body of the 322 * This style can be used for additional emphasis. [all …]
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | porting-guide.rst | 260 BL2 image identifier, used by BL1 to load BL2. 264 BL31 image identifier, used by BL2 to load BL31. 268 BL33 image identifier, used by BL2 to load BL33. 406 BL32 image identifier, used by BL2 to load BL32. 821 used if the platform saves a hash of the ROTPK. 1336 This function is used by the platform to resets the system. It can be used 1375 This function returns a random value that is used to initialize the canary used 1598 sequence used by plat_try_next_boot_source(). 1601 layer used to load the next bootloader image. 2179 used in release builds. [all …]
|
/arm-trusted-firmware-2.8.0/plat/arm/board/common/protpk/ |
A D | README | 1 This directory contains some development keys to be used as the platform
|
/arm-trusted-firmware-2.8.0/docs/plat/marvell/armada/ |
A D | porting.rst | 5 SoC being used is already supported in TF-A. 26 This file describes the SoC physical memory mapping to be used for the CCU, 48 feature is used for boot loader recovery by booting from a valid flash-image 125 defaults. Those default parameters are used only if there is no appropriate 140 …- if different comphy index is used for specific feature, move it to proper table entry and then a… 152 phy-porting-layer.h), the default values are used
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/fvp/ |
A D | index.rst | 15 The FVP models used are Version 11.19 Build 14, unless otherwise stated. 84 used. 108 - ``FVP_CLUSTER_COUNT`` : Configures the cluster count to be used to 110 cluster topology and this option can be used to override the default value. 194 used: 199 used for the FIP): 209 command may be used to load the EL3 payload ELF image over JTAG: 224 used when building TF-A. 309 Depending on the FVP configuration and Linux configuration used, different 468 The following ``FVP_Base_Cortex-A32x4`` model parameters should be used to [all …]
|
/arm-trusted-firmware-2.8.0/docs/plat/ |
A D | qemu-sbsa.rst | 10 is not used 49 Those images cannot be used by itself (no semihosing support). Flash images are built by
|
A D | xilinx-zynqmp.rst | 50 register is free to be used by other software once TF-A has brought up 56 The following power domain tree represents the power domain model used by TF-A
|