| /rk3399_ARM-atf/plat/imx/imx8m/include/ |
| H A D | ddrc.h | 10 #define DDRC_IPS_BASE_ADDR(X) (0x3d400000 + ((X) * 0x2000000)) argument 15 #define DDRC_MSTR(X) (DDRC_IPS_BASE_ADDR(X) + 0x00) argument 16 #define DDRC_STAT(X) (DDRC_IPS_BASE_ADDR(X) + 0x04) argument 17 #define DDRC_MSTR1(X) (DDRC_IPS_BASE_ADDR(X) + 0x08) argument 18 #define DDRC_MRCTRL0(X) (DDRC_IPS_BASE_ADDR(X) + 0x10) argument 19 #define DDRC_MRCTRL1(X) (DDRC_IPS_BASE_ADDR(X) + 0x14) argument 20 #define DDRC_MRSTAT(X) (DDRC_IPS_BASE_ADDR(X) + 0x18) argument 21 #define DDRC_MRCTRL2(X) (DDRC_IPS_BASE_ADDR(X) + 0x1c) argument 22 #define DDRC_DERATEEN(X) (DDRC_IPS_BASE_ADDR(X) + 0x20) argument 23 #define DDRC_DERATEINT(X) (DDRC_IPS_BASE_ADDR(X) + 0x24) argument [all …]
|
| /rk3399_ARM-atf/plat/nvidia/tegra/include/t194/ |
| H A D | tegra194_ras_private.h | 33 #define IFU_UNCORR_RAS_ERROR_LIST(X) argument 36 #define JSR_RET_UNCORR_RAS_ERROR_LIST(X) \ argument 38 X(JSR_RET, 35, 0x13, "Floating Point Register File Parity Error") \ 39 X(JSR_RET, 34, 0x12, "Integer Register File Parity Error") \ 40 X(JSR_RET, 33, 0x11, "Garbage Bundle") \ 41 X(JSR_RET, 32, 0x10, "Bundle Completion Timeout") 44 #define JSR_MTS_UNCORR_RAS_ERROR_LIST(X) \ argument 46 X(JSR_MTS, 40, 0x28, "CoreSight Access Error") \ 47 X(JSR_MTS, 39, 0x27, "Dual Execution Uncorrectable Error") \ 48 X(JSR_MTS, 37, 0x25, "CTU MMIO Region") \ [all …]
|
| /rk3399_ARM-atf/plat/imx/imx8ulp/xrdc/ |
| H A D | xrdc_config.h | 9 #define SP(X) ((X) << 9) argument 10 #define SU(X) ((X) << 6) argument 11 #define NP(X) ((X) << 3) argument 12 #define NU(X) ((X) << 0) argument 17 #define X 1 macro
|
| /rk3399_ARM-atf/include/drivers/nxp/trdc/ |
| H A D | imx_trdc.h | 44 #define SP(X) ((X) << 12) argument 45 #define SU(X) ((X) << 8) argument 46 #define NP(X) ((X) << 4) argument 47 #define NU(X) ((X) << 0) argument 53 #define X U(1) macro
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-10.rst | 5 | Title | Incorrect validation of X.509 certificate extensions can | 27 | | - `f5c51855d36e399e`_ "fix(auth): properly validate X.509 | 40 This security advisory describes a vulnerability in the X.509 parser used to 52 - `RFC 5280`_, *Internet X.509 Public Key Infrastructure Certificate and 55 - `ITU-T X.690`_, *ASN.1 encoding rules: Specification of Basic Encoding Rules 112 1. Retrieving a hash from an X.509 certificate to check the integrity of a 115 2. Retrieving the signature details from an X.509 certificate to check its 118 3. Retrieving the security counter value from an X.509 certificate to protect 159 .. _ITU-T X.690: https://www.itu.int/ITU-T/studygroups/com10/languages/X.690_1297.pdf
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | rcar-gen3.rst | 19 | R-Car H3 | - Salvator-X | - R-Car Starter Kit Premier | 22 | R-Car M3-W | - Salvator-X | | 25 | R-Car M3-N | - Salvator-X | | 37 The current TF-A port has been tested on the R-Car H3 Salvator-X 104 the H3 SiP Salvator-X development system used in this port. 208 NOTICE: BL2: Board is Salvator-X Rev.1.0 258 Model: Renesas Salvator-X board based on r8a7795 ES2.0+
|
| /rk3399_ARM-atf/plat/arm/board/common/rotpk/ |
| H A D | arm_rotprivk_rsa.pem | 13 YwJJSvsE+HLBLPk177Jahg7sOUqcP0F/X+T65yuvIQKBgQDxdjXdJT5K8j7rG2fv
|
| /rk3399_ARM-atf/docs/plat/arm/fvp/ |
| H A D | fvp-aemv8-base.rst | 102 - The ``-C cluster<X>.cpu<Y>.RVBAR=@<base-address-of-bl31>`` parameter, where 103 X and Y are the cluster and CPU numbers respectively, is used to set the
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | ffa-manifest-binding.rst | 15 - Must be the string "arm,ffa-manifest-X.Y" which specifies the major and 20 - X is an integer representing the major version number of this document. 25 - Must be two 16 bits values (X, Y), concatenated as 31:16 -> X, 28 - X is the major version of FF-A expected by the partition at the FFA
|
| H A D | cot-binding.rst | 372 which are currently specific to X.509 certificates for e.g. Object IDs.
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | code-review-guidelines.rst | 113 - Questions ("Why do you need to do this?", "What if X happens?") 115 - Design issues ("This won't scale well when we introduce feature X.") 169 - Provide constructive feedback. Just saying, "This is wrong, you should do X
|
| H A D | security.rst | 73 | |TFV-10| | Incorrect validation of X.509 certificate extensions can result |
|
| H A D | coding-guidelines.rst | 381 rules (10.X), where signed and unsigned types are considered different
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | initial-build.rst | 41 contains the string 'clang'. This is to allow both clang and clang-X.Y
|
| /rk3399_ARM-atf/docs/ |
| H A D | architecture_features.rst | 16 versions (8.X, 9.X) to which they apply can be found in `Feature_description`_
|
| H A D | porting-guide.rst | 2994 of the power state i.e. for two power states X & Y, if X < Y 2995 then X represents a shallower power state than Y. As a result, the
|
| H A D | change-log.md | 4906 …- add %X to printf/snprintf ([483edc2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/tru… 5940 …- only accept v3 X.509 certificates ([e9e4a2a](https://review.trustedfirmware.org/plugins/gitiles/… 5941 …- properly validate X.509 extensions ([f5c5185](https://review.trustedfirmware.org/plugins/gitiles… 12791 library is used to create the X.509 certificates. Support has been added to
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot.rst | 52 images. The certificates follow the `X.509 v3`_ standard. This standard 69 extension fields in the `X.509 v3`_ certificates. 301 library version to generate the X.509 certificates. The specific version of the
|
| H A D | auth-framework.rst | 15 X.509v3 certificates to ferry Subject Public Keys, hashes and non-volatile 433 authentication image that represents a certificate could be in the X.509v3 444 #. X509V3 method: This method uses industry standards like X.509 to represent 448 e.g. the X.509 parsing library code in mbed TLS. 496 X.509 certificate.
|
| H A D | firmware-design.rst | 2848 Cortex-A architecture through ``ARM_CORTEX_A<X> = yes`` in their
|
| /rk3399_ARM-atf/docs/plat/nxp/ |
| H A D | nxp-ls-tbbr.rst | 42 Option 1: CoT using X 509 certificates
|