/arm-trusted-firmware-2.8.0/drivers/nxp/ddr/phy-gen2/ |
A D | phy.c | 621 const struct input *input) in prog_acsm_ctr() argument 635 const struct input *input) in prog_cal_rate_run() argument 652 const struct input *input) in prog_seq0bdly0() argument 1003 const struct input *input) in prog_tx_pre_drv_mode() argument 1563 const struct input *input) in prog_dfi_mode() argument 1627 const struct input *input) in prog_cal_rate() argument 1643 const struct input *input, in prog_vref_in_global() argument 1730 const struct input *input) in prog_dfi_freq_ratio() argument 1828 const struct input *input, in prog_dmipin_present() argument 2182 struct input *input, in load_fw() argument [all …]
|
A D | input.h | 93 struct input { struct
|
/arm-trusted-firmware-2.8.0/lib/compiler-rt/builtins/ |
A D | lshrdi3.c | 21 udwords input; in __lshrdi3() local 23 input.all = a; in __lshrdi3() 26 result.s.low = input.s.high >> (b - bits_in_word); in __lshrdi3() 30 result.s.high = input.s.high >> b; in __lshrdi3() 31 result.s.low = (input.s.high << (bits_in_word - b)) | (input.s.low >> b); in __lshrdi3()
|
/arm-trusted-firmware-2.8.0/docs/plat/nxp/ |
A D | nxp-ls-tbbr.rst | 96 - Default input files for CSF header generation is added in this repo. 98 - Default input file requires user to generate RSA key pair named 103 - To change the input file , user can use the options BL33_INPUT_FILE, BL32_INPUT_FILE, BL31_INPUT_…
|
A D | nxp-ls-fuse-prov.rst | 212 Table of fuse provisioning input file for every supported platform:
|
/arm-trusted-firmware-2.8.0/docs/threat_model/ |
A D | threat_model_el3_spm.rst | 264 | | its contents. The SPMC implements hardened input | 355 | Mitigations | Strict input validation and state tracking. | 366 | | incorrect input arguments.** | 368 | | Lack of input parameter validation or side effects | 369 | | of maliciously forged input parameters might affect| 391 | Mitigations | SPMC must be prepared to receive incorrect input | 439 | | run time model, do input validation. |
|
A D | threat_model_spm.rst | 244 | | input validation on data transmitted through the TX| 411 | | incorrect input arguments.** | 412 | | Lack of input parameter validation or side effects | 413 | | of maliciously forged input parameters might affect| 760 | | sender's ID provided in the input to the call | 794 | | receiver's ID provided in the input to the call |
|
A D | threat_model.rst | 615 | | | For standard services, all input is validated. | 637 | | Improper use of asserts instead of proper input | 661 | Mitigations | | 1) Use proper input validation. |
|
/arm-trusted-firmware-2.8.0/plat/intel/soc/common/drivers/qspi/ |
A D | cadence_qspi.c | 179 uint32_t *input) in cad_qspi_stig_wr_cmd() argument 199 mmio_write_32(CAD_QSPI_OFFSET + CAD_QSPI_FLASHCMD_WRDATA0, input[0]); in cad_qspi_stig_wr_cmd() 203 input[1]); in cad_qspi_stig_wr_cmd()
|
/arm-trusted-firmware-2.8.0/tools/conventional-changelog-tf-a/ |
A D | index.js | 176 input: note.text
|
/arm-trusted-firmware-2.8.0/tools/marvell/doimage/ |
A D | doimage.c | 271 const unsigned char *input, in create_rsa_signature() argument 306 mbedtls_sha256_ret(input, ilen, hash, 0); in create_rsa_signature() 347 const unsigned char *input, in verify_rsa_signature() argument 390 mbedtls_sha256_ret(input, ilen, hash, 0); in verify_rsa_signature()
|
/arm-trusted-firmware-2.8.0/docs/design_documents/ |
A D | drtm_poc.rst | 26 and preparing input parameters needed by DRTM. Finally, it invokes the
|
A D | cmake_framework.rst | 62 The framework provides a solution to describe the input build parameters, flags,
|
/arm-trusted-firmware-2.8.0/docs/security_advisories/ |
A D | security-advisory-tfv-4.rst | 68 overflows in the input validation checks while handling the
|
A D | security-advisory-tfv-1.rst | 50 The vulnerabilities consist of potential integer overflows in the input
|
/arm-trusted-firmware-2.8.0/docs/design/ |
A D | trusted-board-boot.rst | 247 firmware image as input and generates the encrypted firmware image which can 248 then be passed as input to the ``fiptool`` utility for creating the FIP.
|
A D | reset-design.rst | 154 set ``RESET_TO_BL31_WITH_PARAMS`` to avoid the input registers from being
|
/arm-trusted-firmware-2.8.0/docs/getting_started/ |
A D | tools-build.rst | 171 Also, a user may choose to provide encryption key or nonce as an input file
|
A D | porting-guide.rst | 834 The default implementation copies the input key and length to the output without 995 of DRAM. This function takes a region start address and size an input 1006 This function writes a 64 bit error code received as input into 2414 calculates the size of the ``bakery_lock`` input section, aligns it to the
|
A D | build-options.rst | 746 this additional option guarantees that the input registers are not cleared
|
/arm-trusted-firmware-2.8.0/docs/process/ |
A D | contributing.rst | 14 provide some early input to help shaping the design of the feature.
|
A D | coding-guidelines.rst | 177 | ``strtok_r, strsep`` | Caution | inspect for terminated input buffer |
|
/arm-trusted-firmware-2.8.0/docs/plat/arm/fvp/ |
A D | index.rst | 258 # Path to the input DTB
|
/arm-trusted-firmware-2.8.0/docs/ |
A D | change-log.md | 561 …- fix asynchronous read response by copying data to input buffer ([dd7adcf](https://review.trusted… 846 …- reduce input validation for measured boot ([13a129e](https://review.trustedfirmware.org/plugins/…
|