| /rk3399_ARM-atf/drivers/brcm/ |
| H A D | iproc_gpio.c | 78 static void mux_to_gpio(struct iproc_gpio *g, int gpio) in mux_to_gpio() argument 81 if (g->pinmux_base) in mux_to_gpio() 82 mmio_write_32(g->pinmux_base + PINMUX_OFFSET(gpio), in mux_to_gpio() 88 struct iproc_gpio *g = &iproc_gpio; in set_direction() local 91 assert(gpio < g->nr_gpios); in set_direction() 93 mux_to_gpio(g, gpio); in set_direction() 94 gpio_set_bit(g->base, IPROC_GPIO_OUT_EN_OFFSET, gpio, dir); in set_direction() 99 struct iproc_gpio *g = &iproc_gpio; in get_direction() local 102 assert(gpio < g->nr_gpios); in get_direction() 104 mux_to_gpio(g, gpio); in get_direction() [all …]
|
| /rk3399_ARM-atf/plat/intel/soc/common/lib/sha/ |
| H A D | sha.c | 138 uint64_t a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 145 e = state[4]; f = state[5]; g = state[6]; h = state[7]; in sha512_transform() 163 t1 = h + e1(e) + Ch(e, f, g) + sha512_K[i] + W[(i & 15)]; in sha512_transform() 165 t1 = g + e1(d) + Ch(d, e, f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform() 166 t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; in sha512_transform() 168 t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; in sha512_transform() 170 t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; in sha512_transform() 172 t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; in sha512_transform() 174 t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; in sha512_transform() 175 t1 = b + e1(g) + Ch(g, h, a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform() [all …]
|
| /rk3399_ARM-atf/lib/zlib/ |
| H A D | zlib.h | 1864 # define z_gzgetc(g) \ argument 1865 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g)) 1867 # define gzgetc(g) \ argument 1868 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g))
|
| /rk3399_ARM-atf/include/export/ |
| H A D | README | 7 - All definitions should be sufficiently namespaced (e.g. with BL_ or TF_) to 20 pre-defined by all common compilers (e.g. __ASSEMBLER__ or __aarch64__). 25 (e.g. long, uintptr_t, pointer types) where possible. (Some existing export
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_firmware_handoff.rst | 16 by A class firmware components. It is used to transfer state/metadata (e.g., 42 used (e.g., ``DF4``, and ``DF5`` in the generic model). 77 availability across trust boundaries (e.g., secure vs. non-secure world). 111 | | copy-related bugs (e.g., errors in ``memcpy`` or | 123 | | stages (e.g., between TF-A boot stages), sensitive | 129 | | (e.g., on-chip SRAM to non-secure DRAM) without |
|
| H A D | threat_model_el3_spm.rst | 100 - SPMC secrets (e.g. pointer authentication key when enabled) 101 - SP secrets (e.g. application keys). 171 | | spoof the origin and destination worlds (e.g. a NWd| 218 | | and another endpoint (e.g. which NWd endpoint ID | 287 | | the latter in not in a state to receive it (e.g. | 418 | | (e.g. partition message response outside of | 518 | | mitigations (e.g. speculation barriers) for the |
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | cmake_framework.rst | 27 * CMake has various advantages over Make, e.g.: 32 * Out-of-the-box support for integration with several tools (e.g. project 37 * Language is problematic (e.g. variable scope). 67 configuration management tool (e.g. Kconfig) shall be used to generate these 85 that CMake does not solve (e.g. preprocessing a file). For these tasks the 91 In the TF-A buildsystem some external tools are used, e.g. fiptool for image 130 the settings group, we can use it for conditionally adding source files. E.g.
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | debugfs-design.rst | 27 - # is used as root for drivers (e.g. #t0 is the first uart) 28 - / is used as root for virtual "files" (e.g. /fip, or /dev/uart) 70 - Debug data can be partitioned into different virtual files e.g. expose PMF 74 (e.g. a hardware device that may not be accessible to non-privileged/ 82 shared buffer is used to pass path string parameters, or e.g. to exchange
|
| /rk3399_ARM-atf/drivers/nxp/auth/csf_hdr_parser/ |
| H A D | input_blx_ch3 | 29 # e.g FSL_UID_0=11111111
|
| H A D | input_blx_ch2 | 25 # e.g FSL_UID=11111111
|
| H A D | input_pbi_ch3_2 | 27 # e.g FSL_UID_0=11111111
|
| H A D | input_pbi_ch3 | 27 # e.g FSL_UID_0=11111111
|
| H A D | input_bl2_ch3_2 | 44 # e.g FSL_UID_0=11111111
|
| H A D | input_bl2_ch3 | 44 # e.g FSL_UID_0=11111111
|
| H A D | input_bl2_ch2 | 54 # e.g FSL_UID=11111111
|
| /rk3399_ARM-atf/tools/marvell/doimage/secure/ |
| H A D | kak_priv_pem.key | 19 g/P/TLQ6HmTDaWiVBqPVxvjn3RjLuqJf+V5Hp2JRs7bDq39xFfMJExQyP34qWkbp
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | hikey.rst | 72 …e for aosp. The eMMC capacity is either 8GB or 4GB. Just change "aosp-8g" to "linux-8g" for debian. 80 make hikey PTABLE_LST=aosp-8g
|
| H A D | nvidia-tegra.rst | 109 TARGET_SOC=<target-soc e.g. t194|t186|t210> SPD=<dispatcher e.g. trusty|tlkd>
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | porting.rst | 12 (e.g. 'plat/marvell/armada/a8k/a7040_cust'). 13 - The platform name for build purposes is called ``<soc>_cust`` (e.g. ``a7040_cust``). 32 In cases where a special physical address map is needed (e.g. Special size for 49 saved in next position on flash (e.g. address 2M in SPI flash).
|
| /rk3399_ARM-atf/docs/plat/qti/ |
| H A D | msm8916.rst | 35 therefore expects the non-secure world (e.g. Linux) to manage more hardware, 110 refers to the first bootloader (e.g. U-Boot). 130 use e.g. `qtestsign`_:: 144 of problems (e.g. using EDL). 206 .. _Snapdragon X5 Modem: https://www.qualcomm.com/products/snapdragon-modems-4g-lte-x5
|
| /rk3399_ARM-atf/docs/plat/arm/automotive_rd/ |
| H A D | rd1ae.rst | 41 normal world environment (e.g. Linux) and the Trusted Execution Environment.
|
| /rk3399_ARM-atf/fdts/ |
| H A D | stm32mp131.dtsi | 143 g-rx-fifo-size = <512>; 144 g-np-tx-fifo-size = <32>; 145 g-tx-fifo-size = <256 16 16 16 16 16 16 16>;
|
| H A D | stm32mp151.dtsi | 186 g-rx-fifo-size = <512>; 187 g-np-tx-fifo-size = <32>; 188 g-tx-fifo-size = <256 16 16 16 16 16 16 16>;
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 14 - The mechanism used to encode and transport information, e.g. DER encoded 55 | Misc. Libs e.g. | 171 used for verifying the CoT, e.g. memory for public keys, hashes etc. 176 extract authentication parameters contained in an image, e.g. if the 184 cannot be interpreted by the CM, e.g. if an image has to be verified using a 204 multiple CoTs then it should be verified only once e.g. the Trusted World 210 #. Reusing memory meant for a data image to verify authentication images e.g. 304 information - e.g the hash of the ROTPK plus some related information. 441 is treated as being in raw binary format e.g. boot loader images used by 448 e.g. the X.509 parsing library code in mbed TLS. [all …]
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | commit-style.rst | 124 platforms and some drivers) should use that name (e.g. ``gic600ae``, 126 component (e.g. ``marvell-comphy-3700``, ``rcar3-drivers``, ``a3720-uart``).
|