Home
last modified time | relevance | path

Searched refs:upload (Results 1 – 8 of 8) sorted by relevance

/rk3399_ARM-atf/plat/st/common/include/
H A Dusb_dfu.h57 int (*upload)(uint8_t alt, uintptr_t *buffer, uint32_t *len, member
/rk3399_ARM-atf/docs/process/
H A Dfaq.rst80 …et documentation: https://review.trustedfirmware.org/Documentation/intro-user.html#upload-patch-set
81 …anges documentation: https://review.trustedfirmware.org/Documentation/user-upload.html#push_replace
H A Dcontributing.rst339 … Uploading Changes documentation: https://review.trustedfirmware.org/Documentation/user-upload.html
/rk3399_ARM-atf/docs/plat/marvell/armada/
H A Duart-booting.rst18 Marvell Wtpdownloader works only with UART images stored in separate files and supports only upload
51 CZ.NIC mox-imager moreover supports higher upload speeds up to the 6000000 bauds (which seems to
/rk3399_ARM-atf/fdts/
H A Darm_fpga.dts29 /* Allow to upload a generous 100MB initrd payload. */
/rk3399_ARM-atf/plat/st/common/
H A Dstm32cubeprogrammer_usb.c162 .upload = dfu_callback_upload,
H A Dusb_dfu.c301 ret = hdfu->callback->upload(hdfu->alt_setting, &data_ptr, &length, pdev->user_data); in usb_dfu_upload()
/rk3399_ARM-atf/docs/threat_model/
H A Dsupply_chain_threat_model.rst432 | Description | An attacker can upload malicious versions of TF-A by |
450 | | | - An administrator can upload a malicious TF-A |
465 | Description | An attacker can upload malicious versions of TF-A after |
474 | impact | vulnerability on GitHub or tf.org to upload malicious |
478 | | potentially be used to upload malicious packages. In |