| /rk3399_ARM-atf/include/lib/libc/ |
| H A D | assert.h | 20 # define assert(e) ((e) ? (void)0 : __assert(__FILE__, __LINE__)) argument 22 # define assert(e) ((e) ? (void)0 : __assert()) argument 25 #define assert(e) ((void)0) argument
|
| /rk3399_ARM-atf/tools/cert_create/src/ |
| H A D | key.c | 60 BIGNUM *e; in key_create_rsa() 63 e = BN_new(); in key_create_rsa() 64 if (e == NULL) { in key_create_rsa() 69 if (!BN_set_word(e, RSA_F4)) { in key_create_rsa() 80 if (!RSA_generate_key_ex(rsa, key_bits, e, NULL)) { in key_create_rsa() 90 BN_free(e); in key_create_rsa() 96 BN_free(e); in key_create_rsa() 216 ENGINE *e; in key_load_pkcs11() local 226 e = ENGINE_by_id("pkcs11"); in key_load_pkcs11() 227 if (!e) { in key_load_pkcs11() [all …]
|
| /rk3399_ARM-atf/plat/intel/soc/common/lib/sha/ |
| H A D | sha.c | 138 uint64_t a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 145 e = state[4]; f = state[5]; g = state[6]; h = state[7]; in sha512_transform() 163 t1 = h + e1(e) + Ch(e, f, g) + sha512_K[i] + W[(i & 15)]; in sha512_transform() 165 t1 = g + e1(d) + Ch(d, e, f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform() 167 t1 = f + e1(c) + Ch(c, d, e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform() 169 t1 = e + e1(b) + Ch(b, c, d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform() 170 t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; in sha512_transform() 172 t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; in sha512_transform() 174 t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; in sha512_transform() 176 t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; in sha512_transform() [all …]
|
| /rk3399_ARM-atf/plat/nxp/common/soc_errata/ |
| H A D | errata.mk | 24 $(foreach e,$(ERRATA),$(eval $(call enable_errata,$(strip $(e)))))
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | rse.rst | 8 the system (e.g.: trusted boot, measured boot, platform attestation, 46 IMPDEF number of channels (e.g: 4-16) between a sender and a receiver module. 93 | | e.g: 4-16 | | | | e.g: 4-16 | | | V | 269 compute the measurement (e.g.: sha-256, etc.). 270 - ``Version info``: Optional. The firmware version info (e.g.: 2.7). 271 - ``SW type``: Optional. Short text description (e.g.: BL1, BL2, BL31, etc.) 402 INFO: : e9 92 32 e2 49 59 f6 5e 8b 4a 4a 46 d8 22 9a da 418 INFO: : e9 92 32 e2 49 59 f6 5e 8b 4a 4a 46 d8 22 9a da 425 INFO: : c9 9e 74 91 7d 28 02 56 3f 5c 40 94 37 58 50 68 491 INFO: 23 74 61 67 3a 61 72 6d 2e 63 6f 6d 2c 32 30 32 [all …]
|
| H A D | measured_boot_poc.rst | 26 platforms might have different needs and configurations (e.g. different 100 The binary should be untar'ed to the root of the repo tree, i.e., like 226 M/TA: Digest : 58 26 32 6e 64 45 64 da 45 de 35 db 96 fd ed 63 235 M/TA: Digest : cf f9 7d a3 5c 73 ac cb 7b a0 25 80 6a 6e 50 a5 236 M/TA: : 6b 2e d2 8c c9 36 92 7d 46 c5 b9 c3 a4 6c 51 7c 245 M/TA: : e5 de e7 7e 99 17 52 12 7d f7 45 ca 4f 4a 39 c0 253 M/TA: Digest : 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a 254 M/TA: : ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0 262 M/TA: Digest : 01 b0 80 47 a1 ce 86 cd df 89 d2 1f 2e fc 6c 22 263 M/TA: : f8 19 ec 6e 1e ec 73 ba 5a be d0 96 e3 5f 6d 75 [all …]
|
| H A D | cmake_framework.rst | 27 * CMake has various advantages over Make, e.g.: 32 * Out-of-the-box support for integration with several tools (e.g. project 37 * Language is problematic (e.g. variable scope). 67 configuration management tool (e.g. Kconfig) shall be used to generate these 74 targets, i.e. what is the build output, what source files are used, what 77 the previous section. A group can be applied onto a target, i.e. a collection of 85 that CMake does not solve (e.g. preprocessing a file). For these tasks the 91 In the TF-A buildsystem some external tools are used, e.g. fiptool for image 104 In the provisioning phase, first we have to obtain the necessary resources, i.e.
|
| H A D | measured_boot_dtpm_poc.rst | 24 (e.g., different hardware communication protocols) and different TPM interfaces 25 (e.g., |FIFO| vs |CRB|). 322 INFO: : b4 03 6d 96 4c a0 0a 98 45 cf 25 2f 1e a9 09 3e 371 INFO: : b4 03 6d 96 4c a0 0a 98 45 cf 25 2f 1e a9 09 3e 380 INFO: : 19 e4 3a 82 f2 3c ab 1e 0d 78 84 9c b5 fe e2 4f 389 INFO: : b6 19 2b 90 f2 d2 69 b8 de 8e 6d 05 4d c2 73 f9
|
| /rk3399_ARM-atf/include/export/ |
| H A D | README | 7 - All definitions should be sufficiently namespaced (e.g. with BL_ or TF_) to 14 in the ISO C standard (i.e. uint64_t is fine, but not u_register_t). They 20 pre-defined by all common compilers (e.g. __ASSEMBLER__ or __aarch64__). 25 (e.g. long, uintptr_t, pointer types) where possible. (Some existing export
|
| /rk3399_ARM-atf/tools/cot_dt2c/cot_dt2c/ |
| H A D | dt_validator.py | 77 except Exception as e: 79 … print(bcolors.FAIL + "{} parse tree failed:\t{}".format(input, str(e)) + bcolors.ENDC) 84 f.write("{} INVALID:\t{}\n".format(input, str(e)))
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_firmware_handoff.rst | 16 by A class firmware components. It is used to transfer state/metadata (e.g., 42 used (e.g., ``DF4``, and ``DF5`` in the generic model). 77 availability across trust boundaries (e.g., secure vs. non-secure world). 111 | | copy-related bugs (e.g., errors in ``memcpy`` or | 123 | | stages (e.g., between TF-A boot stages), sensitive | 129 | | (e.g., on-chip SRAM to non-secure DRAM) without |
|
| /rk3399_ARM-atf/include/drivers/nxp/crypto/caam/ |
| H A D | rsa.h | 22 uint8_t *e; member
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | debugfs-design.rst | 27 - # is used as root for drivers (e.g. #t0 is the first uart) 28 - / is used as root for virtual "files" (e.g. /fip, or /dev/uart) 70 - Debug data can be partitioned into different virtual files e.g. expose PMF 74 (e.g. a hardware device that may not be accessible to non-privileged/ 82 shared buffer is used to pass path string parameters, or e.g. to exchange
|
| H A D | mpmm.rst | 8 triggering of whole-rail (i.e. clock chopping) responses to overcurrent
|
| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | input_blx_ch3 | 29 # e.g FSL_UID_0=11111111
|
| H A D | input_blx_ch2 | 25 # e.g FSL_UID=11111111
|
| H A D | input_pbi_ch3_2 | 27 # e.g FSL_UID_0=11111111
|
| H A D | input_pbi_ch3 | 27 # e.g FSL_UID_0=11111111
|
| H A D | input_bl2_ch3_2 | 44 # e.g FSL_UID_0=11111111
|
| H A D | input_bl2_ch3 | 44 # e.g FSL_UID_0=11111111
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | npcm845x.rst | 9 This SoC includes secured components, i.e., bootblock stored in ROM,
|
| /rk3399_ARM-atf/docs/components/fconf/ |
| H A D | tb_fw_bindings.rst | 16 platform (i.e. ``"arm,io-fip-handle"``). 44 - HW_CONFIG (e.g. Kernel DT) UUID 117 platform (i.e. ``"arm,sp"``).
|
| /rk3399_ARM-atf/lib/libfdt/ |
| H A D | fdt_overlay.c | 915 const char *s, *e; in overlay_symbol_update() local 951 e = path + path_len; in overlay_symbol_update() 969 if ((e - s) > len && (memcmp(s, "/__overlay__/", len) == 0)) { in overlay_symbol_update() 972 rel_path_len = e - rel_path - 1; in overlay_symbol_update() 973 } else if ((e - s) == len in overlay_symbol_update()
|
| /rk3399_ARM-atf/docs/plat/qti/ |
| H A D | msm8916.rst | 35 therefore expects the non-secure world (e.g. Linux) to manage more hardware, 110 refers to the first bootloader (e.g. U-Boot). 130 use e.g. `qtestsign`_:: 144 of problems (e.g. using EDL). 208 …ference Manual: https://developer.qualcomm.com/download/sd410/snapdragon-410e-technical-reference-…
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | porting.rst | 12 (e.g. 'plat/marvell/armada/a8k/a7040_cust'). 13 - The platform name for build purposes is called ``<soc>_cust`` (e.g. ``a7040_cust``). 32 In cases where a special physical address map is needed (e.g. Special size for 49 saved in next position on flash (e.g. address 2M in SPI flash).
|