/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/shared/include/crypto_api/ |
D | cc_rsa_schemes.h | 27 … APIs that support Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5 28 and Public-Key Cryptography Standards (PKCS) #1 RSA Cryptography Specifications Version 2.1 encrypt… 37 Version 2.1 and Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5. 52 … Cryptography Specifications Version 2.1 only. NULL by default. 53 … NULL for Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5. */ 55 … Specifications Version 2.1 only. Zero by default. Must be <=2048. Zero for Public-Key Cryptography 56 Standards (PKCS) #1: RSA Encryption Standard Version 1.5. */ 62 … Version 2.1, DataSize <= modulus size - 2*HashLen - 2.</li> 63 … <li>For Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5, 66 … /*!< [in] Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5 or [all …]
|
/trusted-firmware-m-3.4.0/interface/src/multi_core/ |
D | tfm_multi_core_psa_ns_api.c | 43 uint32_t version; in psa_framework_version() local 48 (int32_t *)&version); in psa_framework_version() 50 version = PSA_VERSION_NONE; in psa_framework_version() 53 return version; in psa_framework_version() 59 uint32_t version; in psa_version() local 66 (int32_t *)&version); in psa_version() 68 version = PSA_VERSION_NONE; in psa_version() 71 return version; in psa_version() 74 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 81 params.psa_connect_params.version = version; in psa_connect()
|
/trusted-firmware-m-3.4.0/platform/ext/target/nuvoton/common/bsp/StdDriver/src/ |
D | fvc.c | 3 * @version V3.00 26 * @brief Initial firmware version counter 61 * @brief Enable anti version rollback 62 * @details FVC can limit the version number to be increased only to avoid version rollback. 74 * @brief Set non-volatile version counter 75 * @param[in] u32NvcIdx Index number of non-volatile version counter. It could be 0, 1, 4, 5. 76 …* @param[in] u32Cnt Version Number. It could be 0~63 for u32NvcIdx=0, 1, and 0~255 for u32N… 79 * @details Set non-volatile version counter 112 * @brief Get non-volatile version counter 113 * @param[in] u32NvcIdx Index number of non-volatile version counter. It could be 0, 1, 4, 5. [all …]
|
/trusted-firmware-m-3.4.0/interface/include/psa/ |
D | client.h | 28 * The version of the PSA Framework API that is being used to build the calling 88 * \brief Retrieve the version of the PSA Framework API that is implemented. 90 * \return version The version of the PSA Framework implementation 92 * caller. The major and minor version are encoded 94 * \arg version[15:8] -- major version number. 95 * \arg version[7:0] -- minor version number. 100 * \brief Retrieve the version of an RoT Service or indicate that it is not 107 * \retval > 0 The version of the implemented RoT Service. 115 * \param[in] version Requested version of the RoT Service. 125 * \arg The RoT Service version is not supported. [all …]
|
D | update.h | 29 * @brief The major version of this implementation of the Firmware Update API. 34 * @brief The minor version of this implementation of the Firmware Update API. 74 * @brief Version information about a firmware image. 77 /* The major version of an image. */ 79 /* The minor version of an image. */ 81 /* The revision or patch version of an image. */ 160 /* Version of active image. */ 161 psa_fwu_image_version_t version; member
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | secure_boot_rollback_protection.rst | 12 an older version of its software, which has been deprecated due to security 20 - Manifest data: Metadata of the software image: size, version, hash, 60 The aim of a security counter is to have an independent (from the image version) 63 was fixed in the current version. Later when this image is installed on the 65 to handle this counter independently from image main version number: 73 However, as an alternative solution the image version number also could serve 74 as the security counter of the image. Even the version number itself could be 76 counter could be derived from the image main version. It is the responsibility 96 or version counters as a counter with the following properties: 98 - It must only be possible to increment a version counter through a Trusted [all …]
|
D | tfm_secure_boot.rst | 33 CMake. The version downloaded can be controlled by the ``MCUBOOT_VERSION`` 124 firmware switch part of the firmware update process. Downloading the new version 134 layout. The third option is the direct execute-in-place version, which 164 recover the previous working firmware version after a faulty update. The swap 188 At boot time MCUBoot inspects the version number in the image header and passes 189 execution to the newer firmware version. New image must be marked for upgrade 209 by reading the image version numbers in the image headers, but instead of 300 - **Minimum version:** The minimum version of other image must be present on 308 minimum required version of the secure image. 310 minimum required version of the non-secure image. [all …]
|
/trusted-firmware-m-3.4.0/bl1/bl1_2/scripts/ |
D | create_bl2_img.py | 32 version = [0, 0, 0, 0] 35 version[3] = int(split[1]) 38 version[i] = int(split[i]) 40 return struct_pack([version[0].to_bytes(1, "little"), 41 version[1].to_bytes(1, "little"), 42 version[2].to_bytes(2, "little"), 43 version[3].to_bytes(4, "little")]) 81 parser.add_argument("--img_version", help="version of the image", required=True) 96 version = parse_version(args.img_version) variable 113 version, [all …]
|
/trusted-firmware-m-3.4.0/platform/ext/driver/ |
D | Driver_Common.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.00 28 * Version 1.10 30 * Version 1.00 44 \brief Driver Version 47 uint16_t api; ///< API version 48 uint16_t drv; ///< Driver version
|
D | Driver_Flash.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.1 27 * Version 2.0 32 * Version 1.11 34 * Version 1.10 36 * Version 1.00 50 #define ARM_FLASH_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,1) /* API version */ 98 \brief Get driver version. 187 … ///< Pointer to \ref ARM_Flash_GetVersion : Get driver version.
|
/trusted-firmware-m-3.4.0/platform/ext/cmsis/ |
D | cmsis_version.h | 3 * @brief CMSIS Core(M) Version definitions 4 * @version V5.0.5 12 * Licensed under the Apache License, Version 2.0 (the License); you may 34 /* CMSIS Version definitions */ 35 …VERSION_MAIN ( 5U) /*!< [31:16] CMSIS Core(M) main version */ 36 …_VERSION_SUB ( 6U) /*!< [15:0] CMSIS Core(M) sub version */ 38 … __CM_CMSIS_VERSION_SUB ) /*!< CMSIS Core(M) version number */
|
/trusted-firmware-m-3.4.0/platform/ext/target/nxp/common/Native_Driver/drivers/ |
D | fsl_rng.h | 22 /*! @name Driver version */ 24 /*! @brief RNG driver version. Version 2.0.2. 26 * Current version: 2.0.2 29 * - Version 2.0.0 30 * - Initial version 32 * - Version 2.0.1 35 * - Version 2.0.2
|
D | fsl_casper.h | 24 /*! @name Driver version */ 26 /*! @brief CASPER driver version. Version 2.2.3. 28 * Current version: 2.2.3 31 * - Version 2.0.0 32 * - Initial version 33 * - Version 2.0.1 35 * - Version 2.0.2 38 * - Version 2.0.3 40 * - Version 2.0.4 43 * - Version 2.0.5 [all …]
|
D | fsl_hashcrypt.h | 27 /*! @name Driver version */ 29 /*! @brief HASHCRYPT driver version. Version 2.2.2. 31 * Current version: 2.2.2 34 * - Version 2.0.0 35 * - Initial version 36 * - Version 2.0.1 38 * - Version 2.0.2 40 * - Version 2.0.3 42 * - Version 2.0.4 44 * - Version 2.1.0 [all …]
|
D | fsl_iap.c | 64 *!@brief Structure of version property. 72 uint32_t bugfix : 8; /*!< bugfix version [7:0] */ 73 uint32_t minor : 8; /*!< minor version [15:8] */ 74 uint32_t major : 8; /*!< major version [23:16] */ 77 uint32_t version; /*!< combined version numbers. */ member 79 StandardVersion() : version(0) in StandardVersion() 82 StandardVersion(uint32_t version) : version(version) in StandardVersion() argument 91 standard_version_t version; /*!< flash driver API version number.*/ member 122 standard_version_t version; /*!< flash driver API version number.*/ member 191 standard_version_t bootloader_version; /*!< Bootloader version number. */ [all …]
|
/trusted-firmware-m-3.4.0/interface/include/ |
D | tfm_api.h | 65 * \brief Retrieve the version of the PSA Framework API that is implemented. 67 * \return The version of the PSA Framework. 72 * \brief Return version of secure function provided by secure binary. 76 * \return Version number of secure function. 84 * \param[in] version Version of SF requested by client. 88 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version);
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/secure_boot_debug/secure_boot_gen/ |
D | bootimagesverifier_error.h | 23 /*! Defines error code for invalid OTP version. */ 27 /*! Defines error code for illegal certificate version. */ 29 /*! Defines error code for illegal certificate SW version, that is smaller than the version stored … 39 /*! Defines error code for illegal SW version or ID of SW version. */ 57 /*! Defines error code for illegal certificate version value.*/
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/utils/src/common/ |
D | common_crypto_asym.h | 22 * 2. Call function according to PKCS version to create RSA signature 24 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 45 * 2. Call function according to PKCS version to create RSA signature 47 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 70 * 2. Call function according to PKCS version to create RSA signature 72 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 93 * 2. Call function according to PKCS version to create RSA signature 95 * @param[in] pkcsVersion - the version used (according to global definitions of available versions)
|
/trusted-firmware-m-3.4.0/platform/ext/target/stm/common/scripts/ |
D | bin2hex.py | 37 VERSION = '2.3.0' variable 57 -v, --version version info. 65 ["help", "version", "offset="]) 71 elif o in ("-v", "--version"): 72 print(VERSION)
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/corstone1000/fw_update_agent/ |
D | fwu_agent.c | 37 /* image version */ 38 uint32_t version; member 61 /* Metadata version */ 62 uint32_t version; member 311 _metadata.version = 1; in fwu_metadata_provision() 321 _metadata.img_entry[i].img_props[BANK_0].version = image_version; in fwu_metadata_provision() 324 _metadata.img_entry[i].img_props[BANK_1].version = INVALID_VERSION; in fwu_metadata_provision() 440 uint32_t version) in flash_full_capsule() argument 447 FWU_LOG_MSG("%s: enter: image = 0x%p, size = %u, version = %u\n\r" in flash_full_capsule() 448 , __func__, images, size, version); in flash_full_capsule() [all …]
|
D | uefi_capsule_parser.c | 40 uint32_t version; member 47 uint32_t version; member 127 images_info->version[i] = fmp_payload_header->fw_version; in uefi_capsule_retrieve_images() 128 FWU_LOG_MSG("%s: image %i version = %u\n\r", __func__, i, in uefi_capsule_retrieve_images() 129 images_info->version[i]); in uefi_capsule_retrieve_images()
|
/trusted-firmware-m-3.4.0/secure_fw/partitions/protected_storage/ |
D | ps_object_system.c | 51 /* Initialize object version */ in ps_init_empty_object() 52 obj->header.version = 0; in ps_init_empty_object() 110 /* As PS encryption support is not enabled, check file ID and version to in ps_read_object() 114 g_ps_object.header.version != g_obj_tbl_info.version) { in ps_read_object() 143 /* Add object identification and increase object version */ in ps_write_object() 145 g_ps_object.header.version++; in ps_write_object() 147 /* Save object version to be stored in the object table */ in ps_write_object() 148 g_obj_tbl_info.version = g_ps_object.header.version; in ps_write_object() 317 /* Update the table with the new internal ID and version for the object, and in ps_object_create() 432 /* Update the table with the new internal ID and version for the object, and in ps_object_write()
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/codesafe/src/secure_boot_debug/platform/nvm/cc3x_nvm_rt/ |
D | nvm_otp.h | 23 * The function retrieves the SW version from the SRAM/NVM. 30 * @param[out] swVersion - the minimum SW version 38 * @brief The run time secure boot should not support SW version update. 44 * @param[out] swVersion - the minimum SW version
|
/trusted-firmware-m-3.4.0/secure_fw/spm/include/load/ |
D | service_defs.h | 20 * bit 10: 1 - strict version policy, 0 - relaxed version policy 51 uint32_t version; /* Service version */ member
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/scripts/wrapper/ |
D | wrapper.py | 15 # Add the cwd to the path so that if there is a version of imgtool in there then 78 'keyword to automatically generate it from the image version.') 82 @click.option('-v', '--version', callback=imgtool.main.validate_version, 93 def wrap(key, align, version, header_size, pad_header, layout, pad, confirm, argument 119 img = imgtool.image.Image(version=imgtool.version.decode_version(version),
|