Home
last modified time | relevance | path

Searched refs:contents (Results 1 – 25 of 30) sorted by relevance

12

/rk3399_ARM-atf/
H A D.versionrc.cjs23 const contents = fs.readFileSync("changelog.yaml", "utf8");
25 changelog = yaml.load(contents);
86 "readVersion": function (contents) {
87 const _ver = contents.match(/version\s=.*"(\d+?)\.(\d+?)\.(\d+?)/);
92 "writeVersion": function (contents, version) {
95 return contents.replace(/^(version\s=\s")((\d).?)*$/m, _ver)
106 "readVersion": function (contents) {
107 const _ver = contents.match(/version\s=.*"(\d+?)\.(\d+?)\.(\d+?)/);
112 "writeVersion": function (contents, version) {
116 contents = contents.replace(/^(version\s=\s")((\d).?)*$/m, _ver)
[all …]
H A D.commitlintrc.js24 const contents = fs.readFileSync("changelog.yaml", "utf8"); constant
26 changelog = yaml.load(contents);
/rk3399_ARM-atf/tools/cot_dt2c/cot_dt2c/
H A Ddt_validator.py67 contents = f.read()
69 pos = contents.find("/ {")
71 contents = contents[pos:]
74 tree = Devicetree.parseStr(contents)
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-13.rst6 | | prefetch engine to fetch the contents of a privileged location |
7 | | and consume those contents as an address that is |
35 to fetch the contents of a privileged location (for which it
36 does not have read permission) and consume those contents as an address
H A Dsecurity-advisory-tfv-1.rst56 system to change its behaviour based on the unexpected secure memory contents.
H A Dsecurity-advisory-tfv-10.rst68 Furthermore, ``cert_parse()`` does not check that the contents of the extension
/rk3399_ARM-atf/docs/plat/
H A Dindex.rst61 In addition to the platforms ports listed within the table of contents, there
H A Drpi3.rst282 contents of the FIP automatically signed by the build process. The ROT key
/rk3399_ARM-atf/tools/memory/src/memory/
H A Dsummary.py97 for module_path, contents in self._modules.items():
99 contents.setdefault(section, 0)
100 contents[section] += size
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dthreat_model_fw_update_and_recovery.rst13 Model` in a number of places, as some of the contents are applicable to this
H A Dthreat_model_el3_spm.rst236 | | RX/TX buffer contents while the SPMC is processing |
264 | | The SPMC copies the contents of the TX buffer |
266 | | its contents. The SPMC implements hardened input |
H A Dthreat_model_firmware_handoff.rst95 | | | Do not log the contents of Transfer Entries when |
H A Dthreat_model_arm_cca.rst12 Model` in a number of places, as some of the contents is commonly applicable to
H A Dthreat_model.rst706 | | the external flash memory and change its contents|
1030 | | contents** |
/rk3399_ARM-atf/docs/components/
H A Ddebugfs-design.rst5 .. contents::
H A Dsecure-partition-manager.rst4 .. contents::
H A Del3-spmc.rst4 .. contents::
182 BLOB contains Boot Info Header, followed by SP Manifest contents.
H A Dnuma-per-cpu.rst4 .. contents::
H A Dsdei.rst309 The SDEI specification requires that event handlers preserve the contents of all
H A Dxlat-tables-lib-v2-design.rst388 that all TLBs are disabled from reset and their contents have no effect on
/rk3399_ARM-atf/docs/getting_started/
H A Dtools-build.rst80 Example 2: view the contents of an existing Firmware package:
/rk3399_ARM-atf/docs/design_documents/
H A Dcmake_framework.rst9 .. contents:: Table of Contents
/rk3399_ARM-atf/docs/process/
H A Dcoding-guidelines.rst6 contents of the :ref:`Coding Style`.
419 - Use ``u_register_t`` when it's important to store the contents of a register
/rk3399_ARM-atf/docs/design/
H A Dfirmware-design.rst1236 register contents and report it via a dedicated UART (PL011 console). BL31
1426 can expose the data cache contents.
1650 - the static contents of the image. These are data actually stored in the
1654 - the run-time contents of the image. These are data that don't occupy any
1691 to the end address of the section's actual contents, rounded up to the right
1693 actual end address of the section's contents.
1704 corresponds to the size of the section's actual contents, rounded up to the
1706 to know the actual size of the section's contents.
1761 - ``__BL1_ROM_END__`` End address of BL1's ROM contents, covering its code
2114 The FIP layout consists of a table of contents (ToC) followed by payload data.
/rk3399_ARM-atf/licenses/
H A DLICENSE-APACHE-2.0.txt116 wherever such third-party notices normally appear. The contents

12