/trusted-firmware-m-3.7.0/interface/include/mbedtls/ |
D | version.h | 2 * \file version.h 4 * \brief Run-time version information 11 * This set of run-time variables can be used to determine the version number of 12 * the Mbed TLS library used. Compile-time version defines for the same can be 27 * Get the version number. 29 * \return The constructed version number in the format 35 * Get the version string ("x.y.z"). 43 * Get the full version string ("Mbed TLS x.y.z"). 45 * \param string The string that will receive the value. The Mbed TLS version 49 * version string). [all …]
|
D | build_info.h | 18 * This set of compile-time defines can be used to determine the version number 20 * version.h 24 * The version number x.y.z is split into three parts. 32 * The single version number has the following structure: 34 * Major version | Minor version | Patch version 114 #error "Invalid config version, defined value of MBEDTLS_CONFIG_VERSION is unsupported"
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/crypto_api/ |
D | cc_rsa_schemes.h | 27 … APIs that support Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5 28 and Public-Key Cryptography Standards (PKCS) #1 RSA Cryptography Specifications Version 2.1 encrypt… 37 Version 2.1 and Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5. 52 … Cryptography Specifications Version 2.1 only. NULL by default. 53 … NULL for Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5. */ 55 … Specifications Version 2.1 only. Zero by default. Must be <=2048. Zero for Public-Key Cryptography 56 Standards (PKCS) #1: RSA Encryption Standard Version 1.5. */ 62 … Version 2.1, DataSize <= modulus size - 2*HashLen - 2.</li> 63 … <li>For Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5, 66 … /*!< [in] Public-Key Cryptography Standards (PKCS) #1: RSA Encryption Standard Version 1.5 or [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/Core/Include/ |
D | cmsis_version.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 20 * CMSIS Core Version Definitions 32 /* CMSIS-Core(M) Version definitions */ 33 …ON_MAIN ( 6U) /*!< \brief [31:16] CMSIS-Core(M) main version */ 34 …ION_SUB ( 0U) /*!< \brief [15:0] CMSIS-Core(M) sub version */ 36 … __CM_CMSIS_VERSION_SUB ) /*!< \brief CMSIS Core(M) version number */ 38 /* CMSIS-Core(A) Version definitions */ 39 …ON_MAIN ( 6U) /*!< \brief [31:16] CMSIS-Core(A) main version */ 40 …ION_SUB ( 0U) /*!< \brief [15:0] CMSIS-Core(A) sub version */ 42 … __CA_CMSIS_VERSION_SUB ) /*!< \brief CMSIS-Core(A) version number */
|
/trusted-firmware-m-3.7.0/platform/ext/target/nuvoton/common/bsp/StdDriver/src/ |
D | fvc.c | 3 * @version V3.00 26 * @brief Initial firmware version counter 61 * @brief Enable anti version rollback 62 * @details FVC can limit the version number to be increased only to avoid version rollback. 74 * @brief Set non-volatile version counter 75 * @param[in] u32NvcIdx Index number of non-volatile version counter. It could be 0, 1, 4, 5. 76 …* @param[in] u32Cnt Version Number. It could be 0~63 for u32NvcIdx=0, 1, and 0~255 for u32N… 79 * @details Set non-volatile version counter 112 * @brief Get non-volatile version counter 113 * @param[in] u32NvcIdx Index number of non-volatile version counter. It could be 0, 1, 4, 5. [all …]
|
/trusted-firmware-m-3.7.0/interface/src/multi_core/ |
D | tfm_multi_core_psa_ns_api.c | 44 uint32_t version; in psa_framework_version() local 49 (int32_t *)&version); in psa_framework_version() 51 version = PSA_VERSION_NONE; in psa_framework_version() 54 return version; in psa_framework_version() 60 uint32_t version; in psa_version() local 67 (int32_t *)&version); in psa_version() 69 version = PSA_VERSION_NONE; in psa_version() 72 return version; in psa_version() 75 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 82 params.psa_connect_params.version = version; in psa_connect()
|
/trusted-firmware-m-3.7.0/interface/include/psa/ |
D | client.h | 27 * The version of the PSA Framework API that is being used to build the calling 96 * \brief Retrieve the version of the PSA Framework API that is implemented. 98 * \return version The version of the PSA Framework implementation 100 * caller. The major and minor version are encoded 102 * \arg version[15:8] -- major version number. 103 * \arg version[7:0] -- minor version number. 108 * \brief Retrieve the version of an RoT Service or indicate that it is not 115 * \retval > 0 The version of the implemented RoT Service. 123 * \param[in] version Requested version of the RoT Service. 133 * \arg The RoT Service version is not supported. [all …]
|
/trusted-firmware-m-3.7.0/lib/ext/tf-m-tests/ |
D | read_version.cmake | 8 if(NOT EXISTS ${CMAKE_CURRENT_LIST_DIR}/version.txt) 9 message(WARNING "tf-m-tests version.txt doesn't exist") 13 # Parse the version number after "version=" 14 file(STRINGS ${CMAKE_CURRENT_LIST_DIR}/version.txt VERSION_STRING REGEX "^version=[A-Za-z0-9]*") 16 string(REPLACE "version=" "" TFM_TESTS_VERSION ${VERSION_STRING})
|
D | version.txt | 7 # This file tracks the recommended tf-m-tests version to verify TF-M. 8 # Developers should keep the version value up to date to make sure it fits current TF-M version. 11 version=TF-Mv2.1.0
|
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/Driver/Include/ |
D | Driver_Common.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.0 28 * Version 1.10 30 * Version 1.00 44 \brief Driver Version 47 uint16_t api; ///< API version 48 uint16_t drv; ///< Driver version
|
D | Driver_Flash.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.3 27 * Version 2.2 29 * Version 2.1 31 * Version 2.0 36 * Version 1.11 38 * Version 1.10 40 * Version 1.00 54 #define ARM_FLASH_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,3) /* API version */ 103 \brief Get driver version. [all …]
|
D | Driver_ETH_PHY.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.2 27 * Version 2.1 29 * Version 2.0 33 * Version 1.10 35 * Version 1.00 49 #define ARM_ETH_PHY_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,2) /* API version */ 74 \brief Get driver version. 128 … (void); ///< Pointer to \ref ARM_ETH_PHY_GetVersion : Get driver version.
|
D | Driver_ETH.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.2 27 * Version 2.1 29 * Version 2.0 32 * Version 1.10 34 * Version 1.00
|
D | Driver_I2C.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.4 27 * Version 2.3 29 * Version 2.2 33 * Version 2.1 42 * Version 2.0 49 * Version 1.10 51 * Version 1.00 65 #define ARM_I2C_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,4) /* API version */ 121 \brief Get driver version. [all …]
|
D | Driver_SPI.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.3 28 * Version 2.2 30 * Version 2.1 32 * Version 2.0 42 * Version 1.10 44 * Version 1.01 46 * Version 1.00 60 #define ARM_SPI_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,3) /* API version */ 154 \brief Get driver version. [all …]
|
/trusted-firmware-m-3.7.0/docs/design_docs/booting/ |
D | secure_boot_rollback_protection.rst | 12 an older version of its software, which has been deprecated due to security 20 - Manifest data: Metadata of the software image: size, version, hash, 60 The aim of a security counter is to have an independent (from the image version) 63 was fixed in the current version. Later when this image is installed on the 65 to handle this counter independently from image main version number: 73 However, as an alternative solution the image version number also could serve 74 as the security counter of the image. Even the version number itself could be 76 counter could be derived from the image main version. It is the responsibility 96 or version counters as a counter with the following properties: 98 - It must only be possible to increment a version counter through a Trusted [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/driver/ |
D | Driver_Common.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.00 28 * Version 1.10 30 * Version 1.00 44 \brief Driver Version 47 uint16_t api; ///< API version 48 uint16_t drv; ///< Driver version
|
D | Driver_Flash.h | 6 * Licensed under the Apache License, Version 2.0 (the License); you may 25 * Version 2.1 27 * Version 2.0 32 * Version 1.11 34 * Version 1.10 36 * Version 1.00 50 #define ARM_FLASH_API_VERSION ARM_DRIVER_VERSION_MAJOR_MINOR(2,1) /* API version */ 98 \brief Get driver version. 187 … ///< Pointer to \ref ARM_Flash_GetVersion : Get driver version.
|
/trusted-firmware-m-3.7.0/interface/include/ |
D | tfm_veneers.h | 21 * \brief Retrieve the version of the PSA Framework API that is implemented. 23 * \return The version of the PSA Framework. 28 * \brief Return version of secure function provided by secure binary. 32 * \return Version number of secure function. 40 * \param[in] version Version of SF requested by client. 44 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version);
|
/trusted-firmware-m-3.7.0/bl1/bl1_2/scripts/ |
D | create_bl2_img.py | 35 version = [0, 0, 0, 0] 38 version[3] = int(split[1]) 41 version[i] = int(split[i]) 43 return struct_pack([version[0].to_bytes(1, "little"), 44 version[1].to_bytes(1, "little"), 45 version[2].to_bytes(2, "little"), 46 version[3].to_bytes(4, "little")]) 115 parser.add_argument("--img_version", help="version of the image", required=True) 131 version = parse_version(args.img_version) variable 151 version, [all …]
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/codesafe/src/secure_boot_debug/secure_boot_gen/ |
D | bootimagesverifier_error.h | 23 /*! Defines error code for invalid OTP version. */ 27 /*! Defines error code for illegal certificate version. */ 29 /*! Defines error code for illegal certificate SW version, that is smaller than the version stored … 39 /*! Defines error code for illegal SW version or ID of SW version. */ 57 /*! Defines error code for illegal certificate version value.*/
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/common/ |
D | common_crypto_asym.h | 22 * 2. Call function according to PKCS version to create RSA signature 24 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 45 * 2. Call function according to PKCS version to create RSA signature 47 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 70 * 2. Call function according to PKCS version to create RSA signature 72 * @param[in] pkcsVersion - the version used (according to global definitions of available versions) 93 * 2. Call function according to PKCS version to create RSA signature 95 * @param[in] pkcsVersion - the version used (according to global definitions of available versions)
|
/trusted-firmware-m-3.7.0/platform/ext/cmsis/ |
D | ARM.CMSIS.pdsc | 1 <?xml version="1.0" encoding="UTF-8"?> 11 <release version="6.0.0"> 34 <release version="5.9.0" date="2022-05-02"> 47 - Support for elementwise add and mul int16 scalar version 48 - Support for softmax int16 scalar version 62 <release version="5.8.0" date="2021-06-24"> 78 CMSIS-NN: 3.0.0 (see revision history for details including version 2.0.0) 94 <release version="5.7.0" date="2020-04-09"> 131 <release version="5.6.0" date="2019-07-10"> 156 <release version="5.5.1" date="2019-03-20"> [all …]
|
/trusted-firmware-m-3.7.0/secure_fw/spm/core/ |
D | tfm_rpc.h | 49 * \return version The version of the PSA Framework implementation 61 * \retval > 0 The version of the implemented RoT Service. 69 * \param[in] version The version of the RoT Service. 76 * \retval "Does not return" The RoT Service ID and version are not 81 uint32_t version,
|
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/scripts/ |
D | bin2hex.py | 37 VERSION = '2.3.0' variable 57 -v, --version version info. 65 ["help", "version", "offset="]) 71 elif o in ("-v", "--version"): 72 print(VERSION)
|