| /rk3399_ARM-atf/drivers/nxp/ddr/phy-gen2/ |
| H A D | phy.c | 609 const struct input *input, const void *msg) in prog_acsm_playback() argument 618 if (input->basic.dimm_type != RDIMM) { in prog_acsm_playback() 625 f0rc5x = (input->adv.phy_gen2_umctl_f0rc5x & U(0xff)) | U(0x500); in prog_acsm_playback() 642 const struct input *input) in prog_acsm_ctr() argument 644 if (input->basic.dimm_type != RDIMM) { in prog_acsm_ctr() 656 const struct input *input) in prog_cal_rate_run() argument 663 cal_interval = input->adv.cal_interval; in prog_cal_rate_run() 664 cal_once = input->adv.cal_once; in prog_cal_rate_run() 673 const struct input *input) in prog_seq0bdly0() argument 682 frq = input->basic.frequency >> 1; in prog_seq0bdly0() [all …]
|
| H A D | input.h | 93 struct input { struct
|
| /rk3399_ARM-atf/tools/cot_dt2c/cot_dt2c/ |
| H A D | dt_validator.py | 24 def __init__(self, input): argument 25 self.input = input 35 if path.isfile(self.input): 36 self.dtValidateFile(self.input, printInfo=True) 39 if path.isdir(self.input): 43 def dtValidateFile(self, input, printInfo=False): argument 44 valid, tree = self.dtParseFile(input, printInfo) 49 if input.rfind("/") != -1: 50 filename = self.test_dir + input[input.rfind("/"):] 52 filename = self.test_dir + "/" + input [all …]
|
| H A D | cot_dt2c.py | 10 def generateMain(input, output=None): argument 11 cot = COT(input, output) 14 def validateMain(input): argument 15 cot = COT(input) 19 def visualizeMain(input): argument 20 cot = COT(input)
|
| H A D | cot_parser.py | 23 self.input = inputfile
|
| /rk3399_ARM-atf/lib/compiler-rt/builtins/ |
| H A D | lshrdi3.c | 21 udwords input; in __lshrdi3() local 23 input.all = a; in __lshrdi3() 26 result.s.low = input.s.high >> (b - bits_in_word); in __lshrdi3() 30 result.s.high = input.s.high >> b; in __lshrdi3() 31 result.s.low = (input.s.high << (bits_in_word - b)) | (input.s.low >> b); in __lshrdi3()
|
| /rk3399_ARM-atf/lib/psa/ |
| H A D | dice_protection_environment.c | 96 const DiceInputValues *input) in encode_dice_inputs() argument 105 (UsefulBufC) { input->code_hash, in encode_dice_inputs() 106 sizeof(input->code_hash) }); in encode_dice_inputs() 109 (UsefulBufC) { input->code_descriptor, in encode_dice_inputs() 110 input->code_descriptor_size }); in encode_dice_inputs() 113 input->config_type); in encode_dice_inputs() 115 if (input->config_type == kDiceConfigTypeInline) { in encode_dice_inputs() 117 (UsefulBufC) { input->config_value, in encode_dice_inputs() 118 sizeof(input->config_value) }); in encode_dice_inputs() 121 (UsefulBufC) { input->config_descriptor, in encode_dice_inputs() [all …]
|
| /rk3399_ARM-atf/plat/intel/soc/common/lib/sha/ |
| H A D | sha.h | 50 static inline uint64_t ror64(uint64_t input, unsigned int shift) in ror64() argument 52 return (input >> (shift & 63)) | (input << ((-shift) & 63)); in ror64() 65 static inline void LOAD_OP(int I, uint64_t *W, const uint8_t *input) in LOAD_OP() argument 67 GET_UINT64_BE(W[I], input, I*8); in LOAD_OP() 150 void sha384_update(sha512_context *ctx, const uint8_t *input, uint32_t length); 152 void sha384_start(const unsigned char *input, unsigned int len, 156 void sha512_update(sha512_context *ctx, const uint8_t *input, uint32_t length); 158 void sha512_start(const unsigned char *input, unsigned int len, 160 void sha512_transform(uint64_t *state, const uint8_t *input);
|
| H A D | sha.c | 58 void sha384_update(sha512_context *ctx, const uint8_t *input, uint32_t length) in sha384_update() argument 60 sha512_base_do_update(ctx, input, length); in sha384_update() 72 void sha384_start(const unsigned char *input, unsigned int len, in sha384_start() argument 83 curr = (unsigned char *)input; in sha384_start() 84 end = input + len; in sha384_start() 112 void sha512_update(sha512_context *ctx, const uint8_t *input, uint32_t length) in sha512_update() argument 114 sha512_base_do_update(ctx, input, length); in sha512_update() 126 void sha512_start(const unsigned char *input, unsigned int len, unsigned char *output) in sha512_start() argument 132 sha512_update(&ctx, input, len); in sha512_start() 136 void sha512_transform(uint64_t *state, const uint8_t *input) in sha512_transform() argument [all …]
|
| /rk3399_ARM-atf/docs/resources/diagrams/plantuml/ |
| H A D | rse_attestation_flow.puml | 20 Rnote over DelegAttest: Compute input\n\ for key derivation\n\ (hash of measurements) 27 Public key is included\n\ in the realm token.\n\ Its hash is the input\n\ for get_platform_token
|
| /rk3399_ARM-atf/docs/plat/nxp/ |
| H A D | nxp-ls-tbbr.rst | 96 - Default input files for CSF header generation is added in this repo. 98 - Default input file requires user to generate RSA key pair named 103 - To change the input file , user can use the options BL33_INPUT_FILE, BL32_INPUT_FILE, BL31_INPUT_…
|
| H A D | nxp-ls-fuse-prov.rst | 212 Table of fuse provisioning input file for every supported platform:
|
| /rk3399_ARM-atf/docs/tools/ |
| H A D | cot-dt2c.rst | 24 tree source(DTS) as input to the tool. 103 dtsi/dts file inside /tmp folder that can be used as input to dt-schema
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_el3_spm.rst | 266 | | its contents. The SPMC implements hardened input | 357 | Mitigations | Strict input validation and state tracking. | 368 | | incorrect input arguments.** | 370 | | Lack of input parameter validation or side effects | 371 | | of maliciously forged input parameters might affect| 393 | Mitigations | SPMC must be prepared to receive incorrect input | 441 | | run time model, do input validation. |
|
| H A D | threat_model.rst | 428 | | Improper use of asserts instead of proper input | 452 | Mitigations | | 1) Use proper input validation. | 581 | Threat | | **Improper handling of input data received over | 586 | | the exact usage of input data received over UART. | 612 | Mitigations | | By default, the code to read input data from UART | 623 | | | Generic code does not read any input data from | 1019 | | | For standard services, all input is validated. |
|
| /rk3399_ARM-atf/plat/intel/soc/common/drivers/qspi/ |
| H A D | cadence_qspi.c | 181 uint32_t *input) in cad_qspi_stig_wr_cmd() argument 201 mmio_write_32(CAD_QSPI_OFFSET + CAD_QSPI_FLASHCMD_WRDATA0, input[0]); in cad_qspi_stig_wr_cmd() 205 input[1]); in cad_qspi_stig_wr_cmd()
|
| /rk3399_ARM-atf/tools/conventional-changelog-tf-a/ |
| H A D | index.js | 187 input: note.text property
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | drtm_poc.rst | 28 and preparing input parameters needed by DRTM. Finally, it invokes the
|
| H A D | cmake_framework.rst | 58 The framework provides a solution to describe the input build parameters, flags,
|
| /rk3399_ARM-atf/tools/marvell/doimage/ |
| H A D | doimage.c | 266 const unsigned char *input, in create_rsa_signature() argument 301 mbedtls_sha256_ret(input, ilen, hash, 0); in create_rsa_signature() 342 const unsigned char *input, in verify_rsa_signature() argument 385 mbedtls_sha256_ret(input, ilen, hash, 0); in verify_rsa_signature()
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot.rst | 293 establish the CoT. The input keys must either be a file in PEM format or a 321 firmware image as input and generates the encrypted firmware image which can 322 then be passed as input to the ``fiptool`` utility for creating the FIP.
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-4.rst | 68 overflows in the input validation checks while handling the
|
| H A D | security-advisory-tfv-1.rst | 50 The vulnerabilities consist of potential integer overflows in the input
|
| H A D | security-advisory-tfv-10.rst | 93 In upstream TF-A code, the only caller of ``auth_nvctr()`` takes its input from
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | tools-build.rst | 171 Also, a user may choose to provide encryption key or nonce as an input file
|