Home
last modified time | relevance | path

Searched refs:version (Results 1 – 25 of 63) sorted by relevance

123

/docs/
A Dconf.py33 version = check_output("git describe --tags --always", variable
36 _v = vrex.match(version)
39 version = release + "+" + _v.group('GIT_SHA')[:7] variable
42 version = release = 'Unknown'
/docs/design_docs/booting/
A Dsecure_boot_rollback_protection.rst12 an older version of its software, which has been deprecated due to security
20 - Manifest data: Metadata of the software image: size, version, hash,
63 was fixed in the current version. Later when this image is installed on the
65 to handle this counter independently from image main version number:
73 However, as an alternative solution the image version number also could serve
74 as the security counter of the image. Even the version number itself could be
96 or version counters as a counter with the following properties:
98 - It must only be possible to increment a version counter through a Trusted
100 - It must only be possible to increment a version counter. It must not be
102 - When a version counter reaches its maximum value, it must not roll over,
[all …]
A Dtfm_secure_boot.rst142 layout. The third option is the direct execute-in-place version, which
306 - **Minimum version:** The minimum version of other image must be present on
314 minimum required version of the secure image.
316 minimum required version of the non-secure image.
318 Example of how to provide the secure image minimum version::
738 notice that image with higher version number (``version=1.2.3.5``) is executed:
743 [INF] Image 0: version=1.2.3.4, magic= good, image_ok=0x3
744 [INF] Image 1: version=1.2.3.5, magic= good, image_ok=0x3
800 (``version=0.0.0.2``) is executed:
805 [INF] Image 0: version=0.0.0.1, magic= good, image_ok=0x3
[all …]
/docs/getting_started/
A Dtfm_getting_started.rst58 1. version supported:
69 3. verify cmake version:
73 cmake --version
77 Please download CMake version 3.21 or later from https://cmake.org/download/.
87 1. version supported:
93 - Git client latest version (https://git-scm.com/download/win)
94 - CMake version 3.21 or later (`native Windows version <https://cmake.org/download/>`__)
96 - Python3 `(native Windows version) <https://www.python.org/downloads/>`__ and
175 - Arm Compiler minimum version v6.21
203 - GNU Arm compiler version minimum 10.3.2021.10
[all …]
/docs/platform/rpi/rp2350/
A Dreadme.rst34 SDK version used for testing: ``SDK 2.1.1 release``.
36 To use a different version of the SDK than the one your version of TF-M uses
40 ``platform/ext/target/rpi/rp2350/pico-sdk.patch`` file from a TF-M version
41 that uses the SDK version you want to use, and it can be applied with
44 For example, to use SDK version 2.1.1, you can take the ``pico-sdk.patch``
45 file from TF-M version 2.1.2 and apply it to the SDK version 2.1.1.
/docs/cmake/
A DFindSphinx.cmake28 # SPHINX_VERSION = The version reported by "sphinx-build --version"
81 #Get Sphinx version
82 execute_process(COMMAND "${SPHINX_EXECUTABLE}" "--version" OUTPUT_VARIABLE _SPHINX_VERSION OUTPUT_S…
/docs/design_docs/services/
A Dstateless_rot_service.rst31 The index, stateless indicator, and service version information are encoded into
47 - service version requested by client - for client version check
68 ``sid.h`` contains service ID and version. The tooling is extended to generate
72 with firmware framework version 1.1.
116 2. This API validates stateless handle, decodes index and service version
120 authorization check, service and client version check, and handle space
A Dtfm_fwu_service.rst64 This service follows the PSA Firmware Update API spec of version 1.0 [1]_. Please refer to
264 An additional TLV area "image version" is added into the shared memory between
265 BL2 and TF-M. So that the firmware update partition can get the image version.
266 Even though the image version information is also included in the ``BOOT RECORD``
267 TLV area which is encoded by CBOR, adding a dedicated ``image version`` TLV area
A Dtfm_psa_inter_process_communication.rst144 - These 2 functions are finally handled in SPM and return the framework version
145 or version to the caller.
149 psa_handle_t psa_connect(uint32_t sid, uint32_t version);
A Dtfm_its_service.rst26 version 1.0-beta2. There is not yet an implementation of PSA Internal Trusted
40 The TF-M ITS service will implement PSA ITS version 1.0. It will be provided by
140 update the implementation to be aligned with the latest version of the PSA
183 - Keep a simplified version of the SST object table that just maps from
/docs/releases/
A D1.3.0.rst15 - Update MCUboot version to v1.7.2.
149 * - | Regression tests fail with GNU Arm Embedded toolchain version
151 | The support for CMSE feature is broken in version 10-2020-q4-major. The
152 | fix will be available in future release version.
A Drelease_process.rst77 Trusted Firmware-M uses a semantic versioning scheme. A version number is
82 - <MAJOR>: Major release version for significant feature and API changes.
83 - <MINOR>: Minor release version for incremental features and API changes.
110 version can hold PSA certification obtained once without a need for
125 unchanged with valid PSA certificate for that version.
A Dindex.rst71 interpreting version numbers.
/docs/platform/arm/rse/rom_releases/2024-04/
A Dreadme.rst51 TF-M version
63 - arm-none-eabi-gcc --version | head -n 1
69 - python3 --version
/docs/integration_guide/
A Dtfm_fpu_support.rst15 2021.10`` and later version shall be used to mitigate VLLDM instruction
21 and later version shall be used to mitigate VLLDM instruction security
43 This issue has been fixed in the later version.
/docs/design_docs/dual-cpu/
A Dcommunication_prototype_between_nspe_and_spe_in_dual_core_systems.rst118 - Requested version of secure service
500 | ``version`` | The version of the PSA Framework implementation that is |
530 | ``> 0`` | The minor version of the implemented RoT Service. |
547 uint32_t version,
556 | ``version`` | The version of the RoT Service. |
570 | ``Does not return`` | The RoT Service ID and version are not supported, |
/docs/design_docs/software/
A Dcode_sharing.rst304 version of the shared code. Then new code cannot rely on the shared version.
306 be ignored and the updated version of the functions must be compiled in the
307 SPE binary. The Mbed TLS library is API compatible with its current version
342 - `shared_code.axf`: GNUARM specific. The stripped version of the firmware
349 able to link them to any future SPE version.
/docs/platform/stm/stm32l562e_dk/
A Dreadme.rst69 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
98 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
/docs/platform/stm/b_u585i_iot02a/
A Dreadme.rst64 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
93 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
/docs/platform/stm/stm32h573i_dk/
A Dreadme.rst72 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
101 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
/docs/platform/stm/nucleo_l552ze_q/
A Dreadme.rst68 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
97 …git checkout <recommended tf-m-tests commit> (..\trusted-firmware-m\lib\ext\tf-m-tests\version.txt)
/docs/building/
A Ddocumentation_generation.rst57 …# NOTE: If your system python install version is <3.10 you can use `uv <https://docs.astral.sh/uv/…
99 …# NOTE: If your system python install version is <3.10 you can use `uv <https://docs.astral.sh/uv/…
A Dtfm_build_instruction_iar.rst17 cmake needs to be version 3.21 or newer.
/docs/platform/arm/rse/
A Drse_fwu_metadata.rst9 Current code implements version 2 of the metadata as per the spec section A3.2.2.
/docs/security/security_advisories/
A Dfwu_tlv_payload_out_of_bounds_vulnerability.rst12 | Versions | All version from TF-M `v1.3.0`_ up to TF-M `v2.2.0`_ |

Completed in 69 milliseconds

123