| /optee_os/core/lib/libtomcrypt/src/mac/poly1305/ |
| H A D | poly1305.c | 14 static void s_poly1305_block(poly1305_state *st, const unsigned char *in, unsigned long inlen) in s_poly1305_block() argument 16 const unsigned long hibit = (st->final) ? 0 : (1UL << 24); /* 1 << 128 */ in s_poly1305_block() 24 r0 = st->r[0]; in s_poly1305_block() 25 r1 = st->r[1]; in s_poly1305_block() 26 r2 = st->r[2]; in s_poly1305_block() 27 r3 = st->r[3]; in s_poly1305_block() 28 r4 = st->r[4]; in s_poly1305_block() 35 h0 = st->h[0]; in s_poly1305_block() 36 h1 = st->h[1]; in s_poly1305_block() 37 h2 = st->h[2]; in s_poly1305_block() [all …]
|
| H A D | poly1305_test.c | 24 poly1305_state st; in poly1305_test() 28 if ((err = poly1305_init(&st, k, 32)) != CRYPT_OK) return err; in poly1305_test() 29 if ((err = poly1305_process(&st, (unsigned char*)m, 5)) != CRYPT_OK) return err; in poly1305_test() 30 if ((err = poly1305_process(&st, (unsigned char*)m + 5, 4)) != CRYPT_OK) return err; in poly1305_test() 31 if ((err = poly1305_process(&st, (unsigned char*)m + 9, 3)) != CRYPT_OK) return err; in poly1305_test() 32 if ((err = poly1305_process(&st, (unsigned char*)m + 12, 2)) != CRYPT_OK) return err; in poly1305_test() 33 if ((err = poly1305_process(&st, (unsigned char*)m + 14, 1)) != CRYPT_OK) return err; in poly1305_test() 34 if ((err = poly1305_process(&st, (unsigned char*)m + 15, mlen - 15)) != CRYPT_OK) return err; in poly1305_test() 35 if ((err = poly1305_done(&st, out, &len)) != CRYPT_OK) return err; in poly1305_test() 38 if ((err = poly1305_init(&st, k, 32)) != CRYPT_OK) return err; in poly1305_test() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/stream/sober128/ |
| H A D | sober128_stream.c | 62 #define NLFUNC(st,z) \ argument 64 t = st->R[OFF(z,0)] + st->R[OFF(z,16)]; \ 67 t = ((t + st->R[OFF(z,1)]) ^ st->konst) + st->R[OFF(z,6)]; \ 69 t = t + st->R[OFF(z,13)]; \ 72 static ulong32 nltap(const sober128_state *st) in nltap() argument 75 NLFUNC(st, 0); in nltap() 81 static void s128_savestate(sober128_state *st) in s128_savestate() argument 85 st->initR[i] = st->R[i]; in s128_savestate() 91 static void s128_reloadstate(sober128_state *st) in s128_reloadstate() argument 96 st->R[i] = st->initR[i]; in s128_reloadstate() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/stream/rabbit/ |
| H A D | rabbit.c | 66 static LTC_INLINE void ss_rabbit_gen_1_block(rabbit_state* st, unsigned char *out); 129 static LTC_INLINE void ss_rabbit_gen_1_block(rabbit_state* st, unsigned char *out) in ss_rabbit_gen_1_block() argument 134 ss_rabbit_next_state(&(st->work_ctx)); in ss_rabbit_gen_1_block() 137 ptr = (ulong32*)&(st->work_ctx.x); in ss_rabbit_gen_1_block() 147 int rabbit_setup(rabbit_state* st, const unsigned char *key, unsigned long keylen) in rabbit_setup() argument 152 LTC_ARGCHK(st != NULL); in rabbit_setup() 157 XMEMSET(st, 0, sizeof(rabbit_state)); in rabbit_setup() 174 st->master_ctx.x[0] = k0; in rabbit_setup() 175 st->master_ctx.x[2] = k1; in rabbit_setup() 176 st->master_ctx.x[4] = k2; in rabbit_setup() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/stream/salsa20/ |
| H A D | salsa20_setup.c | 25 int salsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, int rounds) in salsa20_setup() argument 29 LTC_ARGCHK(st != NULL); in salsa20_setup() 36 LOAD32L(st->input[1], key + 0); in salsa20_setup() 37 LOAD32L(st->input[2], key + 4); in salsa20_setup() 38 LOAD32L(st->input[3], key + 8); in salsa20_setup() 39 LOAD32L(st->input[4], key + 12); in salsa20_setup() 46 LOAD32L(st->input[11], key + 0); in salsa20_setup() 47 LOAD32L(st->input[12], key + 4); in salsa20_setup() 48 LOAD32L(st->input[13], key + 8); in salsa20_setup() 49 LOAD32L(st->input[14], key + 12); in salsa20_setup() [all …]
|
| H A D | xsalsa20_setup.c | 54 int xsalsa20_setup(salsa20_state *st, const unsigned char *key, unsigned long keylen, in xsalsa20_setup() argument 63 LTC_ARGCHK(st != NULL); in xsalsa20_setup() 98 LOAD32L(st->input[ 0], constants + 0); in xsalsa20_setup() 99 LOAD32L(st->input[ 5], constants + 4); in xsalsa20_setup() 100 LOAD32L(st->input[10], constants + 8); in xsalsa20_setup() 101 LOAD32L(st->input[15], constants + 12); in xsalsa20_setup() 102 LOAD32L(st->input[ 1], subkey + 0); in xsalsa20_setup() 103 LOAD32L(st->input[ 2], subkey + 4); in xsalsa20_setup() 104 LOAD32L(st->input[ 3], subkey + 8); in xsalsa20_setup() 105 LOAD32L(st->input[ 4], subkey + 12); in xsalsa20_setup() [all …]
|
| H A D | salsa20_crypt.c | 49 int salsa20_crypt(salsa20_state *st, const unsigned char *in, unsigned long inlen, unsigned char *o… in salsa20_crypt() argument 56 LTC_ARGCHK(st != NULL); in salsa20_crypt() 59 LTC_ARGCHK(st->ivlen == 8 || st->ivlen == 24); in salsa20_crypt() 61 if (st->ksleft > 0) { in salsa20_crypt() 62 j = MIN(st->ksleft, inlen); in salsa20_crypt() 63 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in salsa20_crypt() 70 s_salsa20_block(buf, st->input, st->rounds); in salsa20_crypt() 72 if (0 == ++st->input[8] && 0 == ++st->input[9]) return CRYPT_OVERFLOW; in salsa20_crypt() 75 st->ksleft = 64 - inlen; in salsa20_crypt() 76 for (i = inlen; i < 64; ++i) st->kstream[i] = buf[i]; in salsa20_crypt()
|
| H A D | salsa20_test.c | 19 salsa20_state st; in salsa20_test() 40 …if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return er… in salsa20_test() 41 …if ((err = salsa20_ivctr64(&st, n, sizeof(n), counter)) != CRYPT_OK) return er… in salsa20_test() 42 …if ((err = salsa20_crypt(&st, (unsigned char*)pt, 5, out)) != CRYPT_OK) return er… in salsa20_test() 43 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 5, 25, out + 5)) != CRYPT_OK) return er… in salsa20_test() 44 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 30, 10, out + 30)) != CRYPT_OK) return er… in salsa20_test() 45 …if ((err = salsa20_crypt(&st, (unsigned char*)pt + 40, len - 40, out + 40)) != CRYPT_OK) return er… in salsa20_test() 51 if ((err = salsa20_setup(&st, k, sizeof(k), rounds)) != CRYPT_OK) return err; in salsa20_test() 52 if ((err = salsa20_ivctr64(&st, n, sizeof(n), counter)) != CRYPT_OK) return err; in salsa20_test() 53 if ((err = salsa20_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in salsa20_test() [all …]
|
| H A D | salsa20_ivctr64.c | 22 int salsa20_ivctr64(salsa20_state *st, const unsigned char *iv, unsigned long ivlen, ulong64 counte… in salsa20_ivctr64() argument 24 LTC_ARGCHK(st != NULL); in salsa20_ivctr64() 29 LOAD32L(st->input[6], iv + 0); in salsa20_ivctr64() 30 LOAD32L(st->input[7], iv + 4); in salsa20_ivctr64() 31 st->input[8] = (ulong32)(counter & 0xFFFFFFFF); in salsa20_ivctr64() 32 st->input[9] = (ulong32)(counter >> 32); in salsa20_ivctr64() 33 st->ksleft = 0; in salsa20_ivctr64() 34 st->ivlen = ivlen; in salsa20_ivctr64()
|
| /optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
| H A D | chacha_setup.c | 24 int chacha_setup(chacha_state *st, const unsigned char *key, unsigned long keylen, int rounds) in chacha_setup() argument 28 LTC_ARGCHK(st != NULL); in chacha_setup() 34 LOAD32L(st->input[4], key + 0); in chacha_setup() 35 LOAD32L(st->input[5], key + 4); in chacha_setup() 36 LOAD32L(st->input[6], key + 8); in chacha_setup() 37 LOAD32L(st->input[7], key + 12); in chacha_setup() 44 LOAD32L(st->input[8], key + 0); in chacha_setup() 45 LOAD32L(st->input[9], key + 4); in chacha_setup() 46 LOAD32L(st->input[10], key + 8); in chacha_setup() 47 LOAD32L(st->input[11], key + 12); in chacha_setup() [all …]
|
| H A D | chacha_crypt.c | 48 int chacha_crypt(chacha_state *st, const unsigned char *in, unsigned long inlen, unsigned char *out) in chacha_crypt() argument 55 LTC_ARGCHK(st != NULL); in chacha_crypt() 58 LTC_ARGCHK(st->ivlen != 0); in chacha_crypt() 60 if (st->ksleft > 0) { in chacha_crypt() 61 j = MIN(st->ksleft, inlen); in chacha_crypt() 62 for (i = 0; i < j; ++i, st->ksleft--) out[i] = in[i] ^ st->kstream[64 - st->ksleft]; in chacha_crypt() 69 s_chacha_block(buf, st->input, st->rounds); in chacha_crypt() 70 if (st->ivlen == 8) { in chacha_crypt() 72 if (0 == ++st->input[12] && 0 == ++st->input[13]) return CRYPT_OVERFLOW; in chacha_crypt() 76 if (0 == ++st->input[12]) return CRYPT_OVERFLOW; in chacha_crypt() [all …]
|
| H A D | chacha_test.c | 33 chacha_state st; in chacha_test() 39 …if ((err = chacha_setup(&st, k, sizeof(k), 20)) != CRYPT_OK) return err; in chacha_test() 40 …if ((err = chacha_ivctr32(&st, n, sizeof(n), 1)) != CRYPT_OK) return err; in chacha_test() 41 …if ((err = chacha_crypt(&st, (unsigned char*)pt, 35, out )) != CRYPT_OK) return err; in chacha_test() 42 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 35, 35, out + 35)) != CRYPT_OK) return err; in chacha_test() 43 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 70, 5, out + 70)) != CRYPT_OK) return err; in chacha_test() 44 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 75, 5, out + 75)) != CRYPT_OK) return err; in chacha_test() 45 …if ((err = chacha_crypt(&st, (unsigned char*)pt + 80, len - 80, out + 80)) != CRYPT_OK) return err; in chacha_test() 49 …if ((err = chacha_setup(&st, k, sizeof(k), 20)) != CRYPT_OK) return err; in chacha_test() 50 …if ((err = chacha_ivctr32(&st, n, sizeof(n), 1)) != CRYPT_OK) return err; in chacha_test() [all …]
|
| H A D | chacha_ivctr32.c | 21 int chacha_ivctr32(chacha_state *st, const unsigned char *iv, unsigned long ivlen, ulong32 counter) in chacha_ivctr32() argument 23 LTC_ARGCHK(st != NULL); in chacha_ivctr32() 28 st->input[12] = counter; in chacha_ivctr32() 29 LOAD32L(st->input[13], iv + 0); in chacha_ivctr32() 30 LOAD32L(st->input[14], iv + 4); in chacha_ivctr32() 31 LOAD32L(st->input[15], iv + 8); in chacha_ivctr32() 32 st->ksleft = 0; in chacha_ivctr32() 33 st->ivlen = ivlen; in chacha_ivctr32()
|
| H A D | chacha_ivctr64.c | 21 int chacha_ivctr64(chacha_state *st, const unsigned char *iv, unsigned long ivlen, ulong64 counter) in chacha_ivctr64() argument 23 LTC_ARGCHK(st != NULL); in chacha_ivctr64() 28 st->input[12] = (ulong32)(counter & 0xFFFFFFFF); in chacha_ivctr64() 29 st->input[13] = (ulong32)(counter >> 32); in chacha_ivctr64() 30 LOAD32L(st->input[14], iv + 0); in chacha_ivctr64() 31 LOAD32L(st->input[15], iv + 4); in chacha_ivctr64() 32 st->ksleft = 0; in chacha_ivctr64() 33 st->ivlen = ivlen; in chacha_ivctr64()
|
| /optee_os/core/lib/libtomcrypt/src/stream/rc4/ |
| H A D | rc4_stream.c | 15 int rc4_stream_setup(rc4_state *st, const unsigned char *key, unsigned long keylen) in rc4_stream_setup() argument 21 LTC_ARGCHK(st != NULL); in rc4_stream_setup() 25 s = st->buf; in rc4_stream_setup() 37 st->x = 0; in rc4_stream_setup() 38 st->y = 0; in rc4_stream_setup() 51 int rc4_stream_crypt(rc4_state *st, const unsigned char *in, unsigned long inlen, unsigned char *ou… in rc4_stream_crypt() argument 55 LTC_ARGCHK(st != NULL); in rc4_stream_crypt() 59 x = st->x; in rc4_stream_crypt() 60 y = st->y; in rc4_stream_crypt() 61 s = st->buf; in rc4_stream_crypt() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/ |
| H A D | chacha20poly1305_decrypt.c | 16 int chacha20poly1305_decrypt(chacha20poly1305_state *st, const unsigned char *in, unsigned long inl… in chacha20poly1305_decrypt() argument 22 LTC_ARGCHK(st != NULL); in chacha20poly1305_decrypt() 24 if (st->aadflg) { in chacha20poly1305_decrypt() 25 padlen = 16 - (unsigned long)(st->aadlen % 16); in chacha20poly1305_decrypt() 27 if ((err = poly1305_process(&st->poly, padzero, padlen)) != CRYPT_OK) return err; in chacha20poly1305_decrypt() 29 st->aadflg = 0; /* no more AAD */ in chacha20poly1305_decrypt() 31 if (st->aadflg) st->aadflg = 0; /* no more AAD */ in chacha20poly1305_decrypt() 32 if ((err = poly1305_process(&st->poly, in, inlen)) != CRYPT_OK) return err; in chacha20poly1305_decrypt() 33 if ((err = chacha_crypt(&st->chacha, in, inlen, out)) != CRYPT_OK) return err; in chacha20poly1305_decrypt() 34 st->ctlen += (ulong64)inlen; in chacha20poly1305_decrypt()
|
| H A D | chacha20poly1305_encrypt.c | 16 int chacha20poly1305_encrypt(chacha20poly1305_state *st, const unsigned char *in, unsigned long inl… in chacha20poly1305_encrypt() argument 22 LTC_ARGCHK(st != NULL); in chacha20poly1305_encrypt() 24 if ((err = chacha_crypt(&st->chacha, in, inlen, out)) != CRYPT_OK) return err; in chacha20poly1305_encrypt() 25 if (st->aadflg) { in chacha20poly1305_encrypt() 26 padlen = 16 - (unsigned long)(st->aadlen % 16); in chacha20poly1305_encrypt() 28 if ((err = poly1305_process(&st->poly, padzero, padlen)) != CRYPT_OK) return err; in chacha20poly1305_encrypt() 30 st->aadflg = 0; /* no more AAD */ in chacha20poly1305_encrypt() 32 if ((err = poly1305_process(&st->poly, out, inlen)) != CRYPT_OK) return err; in chacha20poly1305_encrypt() 33 st->ctlen += (ulong64)inlen; in chacha20poly1305_encrypt()
|
| H A D | chacha20poly1305_done.c | 15 int chacha20poly1305_done(chacha20poly1305_state *st, unsigned char *tag, unsigned long *taglen) in chacha20poly1305_done() argument 22 LTC_ARGCHK(st != NULL); in chacha20poly1305_done() 24 padlen = 16 - (unsigned long)(st->ctlen % 16); in chacha20poly1305_done() 26 if ((err = poly1305_process(&st->poly, padzero, padlen)) != CRYPT_OK) return err; in chacha20poly1305_done() 28 STORE64L(st->aadlen, buf); in chacha20poly1305_done() 29 STORE64L(st->ctlen, buf + 8); in chacha20poly1305_done() 30 if ((err = poly1305_process(&st->poly, buf, 16)) != CRYPT_OK) return err; in chacha20poly1305_done() 31 if ((err = poly1305_done(&st->poly, tag, taglen)) != CRYPT_OK) return err; in chacha20poly1305_done() 32 if ((err = chacha_done(&st->chacha)) != CRYPT_OK) return err; in chacha20poly1305_done()
|
| /optee_os/core/lib/libtomcrypt/src/mac/blake2/ |
| H A D | blake2smac.c | 16 int blake2smac_init(blake2smac_state *st, unsigned long outlen, const unsigned char *key, unsigned … in blake2smac_init() argument 18 LTC_ARGCHK(st != NULL); in blake2smac_init() 20 return blake2s_init(st, outlen, key, keylen); in blake2smac_init() 30 int blake2smac_process(blake2smac_state *st, const unsigned char *in, unsigned long inlen) in blake2smac_process() argument 33 LTC_ARGCHK(st != NULL); in blake2smac_process() 35 return blake2s_process(st, in, inlen); in blake2smac_process() 45 int blake2smac_done(blake2smac_state *st, unsigned char *mac, unsigned long *maclen) in blake2smac_done() argument 47 LTC_ARGCHK(st != NULL); in blake2smac_done() 50 LTC_ARGCHK(*maclen >= st->blake2s.outlen); in blake2smac_done() 52 *maclen = st->blake2s.outlen; in blake2smac_done() [all …]
|
| H A D | blake2bmac.c | 16 int blake2bmac_init(blake2bmac_state *st, unsigned long outlen, const unsigned char *key, unsigned … in blake2bmac_init() argument 18 LTC_ARGCHK(st != NULL); in blake2bmac_init() 20 return blake2b_init(st, outlen, key, keylen); in blake2bmac_init() 30 int blake2bmac_process(blake2bmac_state *st, const unsigned char *in, unsigned long inlen) in blake2bmac_process() argument 33 LTC_ARGCHK(st != NULL); in blake2bmac_process() 35 return blake2b_process(st, in, inlen); in blake2bmac_process() 45 int blake2bmac_done(blake2bmac_state *st, unsigned char *mac, unsigned long *maclen) in blake2bmac_done() argument 47 LTC_ARGCHK(st != NULL); in blake2bmac_done() 50 LTC_ARGCHK(*maclen >= st->blake2b.outlen); in blake2bmac_done() 52 *maclen = st->blake2b.outlen; in blake2bmac_done() [all …]
|
| H A D | blake2smac_test.c | 275 blake2smac_state st; in blake2smac_test() 284 blake2smac_init(&st, olen, key, klen); in blake2smac_test() 285 blake2smac_process(&st, (unsigned char*)inp, 5); in blake2smac_test() 286 blake2smac_process(&st, (unsigned char*)inp + 5, 4); in blake2smac_test() 287 blake2smac_process(&st, (unsigned char*)inp + 9, 3); in blake2smac_test() 288 blake2smac_process(&st, (unsigned char*)inp + 12, 2); in blake2smac_test() 289 blake2smac_process(&st, (unsigned char*)inp + 14, 1); in blake2smac_test() 290 blake2smac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2smac_test() 291 blake2smac_done(&st, out, &olen); in blake2smac_test() 295 blake2smac_init(&st, olen, key, klen); in blake2smac_test() [all …]
|
| H A D | blake2bmac_test.c | 275 blake2bmac_state st; in blake2bmac_test() 284 blake2bmac_init(&st, olen, key, klen); in blake2bmac_test() 285 blake2bmac_process(&st, (unsigned char*)inp, 5); in blake2bmac_test() 286 blake2bmac_process(&st, (unsigned char*)inp + 5, 4); in blake2bmac_test() 287 blake2bmac_process(&st, (unsigned char*)inp + 9, 3); in blake2bmac_test() 288 blake2bmac_process(&st, (unsigned char*)inp + 12, 2); in blake2bmac_test() 289 blake2bmac_process(&st, (unsigned char*)inp + 14, 1); in blake2bmac_test() 290 blake2bmac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2bmac_test() 291 blake2bmac_done(&st, out, &olen); in blake2bmac_test() 295 blake2bmac_init(&st, olen, key, klen); in blake2bmac_test() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
| H A D | sosemanuk.c | 198 int sosemanuk_setup(sosemanuk_state *st, const unsigned char *key, unsigned long keylen) in sosemanuk_setup() argument 213 st->kc[i ++] = r ## d0; \ in sosemanuk_setup() 214 st->kc[i ++] = r ## d1; \ in sosemanuk_setup() 215 st->kc[i ++] = r ## d2; \ in sosemanuk_setup() 216 st->kc[i ++] = r ## d3; \ in sosemanuk_setup() 252 LTC_ARGCHK(st != NULL); in sosemanuk_setup() 331 int sosemanuk_setiv(sosemanuk_state *st, const unsigned char *iv, unsigned long ivlen) in sosemanuk_setiv() argument 338 x0 ^= st->kc[(zc)]; \ in sosemanuk_setiv() 339 x1 ^= st->kc[(zc) + 1]; \ in sosemanuk_setiv() 340 x2 ^= st->kc[(zc) + 2]; \ in sosemanuk_setiv() [all …]
|
| H A D | sosemanuk_test.c | 12 sosemanuk_state st; in sosemanuk_test() 27 …if ((err = sosemanuk_setup(&st, k, sizeof(k))) != CRYPT_OK) return … in sosemanuk_test() 28 …if ((err = sosemanuk_setiv(&st, n, sizeof(n))) != CRYPT_OK) return … in sosemanuk_test() 29 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt, 5, out)) != CRYPT_OK) return … in sosemanuk_test() 30 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 5, 25, out + 5)) != CRYPT_OK) return … in sosemanuk_test() 31 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 30, 10, out + 30)) != CRYPT_OK) return … in sosemanuk_test() 32 …if ((err = sosemanuk_crypt(&st, (unsigned char*)pt + 40, len - 40, out + 40)) != CRYPT_OK) return … in sosemanuk_test() 36 if ((err = sosemanuk_setup(&st, k, sizeof(k))) != CRYPT_OK) return err; in sosemanuk_test() 37 if ((err = sosemanuk_setiv(&st, n, sizeof(n))) != CRYPT_OK) return err; in sosemanuk_test() 38 if ((err = sosemanuk_crypt(&st, (unsigned char*)pt, len, out)) != CRYPT_OK) return err; in sosemanuk_test() [all …]
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp135f-dk.dts | 4 * Author: Alexandre Torgue <alexandre.torgue@foss.st.com> for STMicroelectronics. 13 #include <dt-bindings/regulator/st,stm32mp13-regulator.h> 14 #include <dt-bindings/tamper/st,stm32mp13-tamp.h> 21 compatible = "st,stm32mp135f-dk", "st,stm32mp135"; 45 st,protreg = <DT_TZC_REGION_S_RDWR 0>; 70 st,non-secure-otp; 79 st,decprot = 124 st,protreg = <TZPROT(6)>; 128 st,protreg = <TZPROT(9)>; 132 st,protreg = <TZPROT(7)>; [all …]
|