Home
last modified time | relevance | path

Searched refs:copy (Results 1 – 25 of 31) sorted by relevance

12

/trusted-firmware-a-latest/lib/zlib/
Dinflate.c368 local int updatewindow(z_streamp strm, const Bytef *end, unsigned copy) { in updatewindow() argument
390 if (copy >= state->wsize) { in updatewindow()
397 if (dist > copy) dist = copy; in updatewindow()
398 zmemcpy(state->window + state->wnext, end - copy, dist); in updatewindow()
399 copy -= dist; in updatewindow()
400 if (copy) { in updatewindow()
401 zmemcpy(state->window, end - copy, copy); in updatewindow()
402 state->wnext = copy; in updatewindow()
598 unsigned copy; /* number of stored or match bytes to copy */ in inflate() local
727 copy = state->length; in inflate()
[all …]
/trusted-firmware-a-latest/docs/security_advisories/
Dsecurity-advisory-tfv-1.rst5 | Title | Malformed Firmware Update SMC can result in copy of |
52 implementation is designed to copy an image into secure memory for subsequent
53 authentication, but the vulnerabilities may allow an attacker to copy
84 INFO("BL1-FWU: Continuing image copy in blocks\n");
92 This code fragment is executed when the image copy operation is performed in
98 result in an unexpectedly large copy of data into secure memory.
115 WARN("BL1-FWU: Memory not available to copy\n");
126 This code fragment is executed during the 1st invocation of the image copy
131 large copy of data into secure memory.
157 return success. Platforms that copy this insecure pattern will have the same
Dsecurity-advisory-tfv-4.rst5 | Title | Malformed Firmware Update SMC can result in copy or |
71 The ``FWU_SMC_IMAGE_COPY`` SMC handler is designed to copy an image into secure
88 these unsanitized values and allow the following memory copy operation, that
89 would wrap around. This may allow an attacker to copy unexpected data into
/trusted-firmware-a-latest/licenses/
DLICENSE.MIT5 Permission is hereby granted, free of charge, to any person obtaining a copy
8 to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
/trusted-firmware-a-latest/lib/compiler-rt/
DLICENSE.TXT29 Permission is hereby granted, free of charge, to any person obtaining a copy of
32 use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
60 Permission is hereby granted, free of charge, to any person obtaining a copy
63 to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
/trusted-firmware-a-latest/make_helpers/
Dwindows.mk30 copy "${tmp_from_file}" "${tmp_to_file}"
/trusted-firmware-a-latest/tools/nxp/create_pbl/
DREADME7 PBI commands to copy the,
33 on Boot Source for block copy.
/trusted-firmware-a-latest/docs/getting_started/
Ddocs-build.rst4 To create a rendered copy of this documentation locally you can use the
13 An online copy of the documentation is available at
15 copy without doing a local build.
20 For building a local copy of the |TF-A| documentation you will need:
Dprerequisites.rst41 work. This is predominantly because TF-A carries its own copy of compiler-rt,
/trusted-firmware-a-latest/include/drivers/
Dmmc.h150 unsigned int copy: 1; member
194 unsigned int copy: 1; member
/trusted-firmware-a-latest/docs/components/fconf/
Dfconf_properties.rst37 - A platform uses this physical address to copy the configuration to
/trusted-firmware-a-latest/docs/process/
Dsecurity.rst46 | |TFV-1| | Malformed Firmware Update SMC can result in copy of unexpectedly |
54 | |TFV-4| | Malformed Firmware Update SMC can result in copy or |
Dplatform-ports-policy.rst23 to upstream their platform code or copy the latest version of the code being
/trusted-firmware-a-latest/
Ddco.txt9 Everyone is permitted to copy and distribute verbatim copies of this
/trusted-firmware-a-latest/docs/plat/
Dqemu-sbsa.rst42 Need to copy them into top directory for EDK2 compilation.
Dpoplar.rst75 1. copy the atf generated files fip.bin and bl1.bin to l-loader/atf/
Dwarp7.rst61 It is also assumed copy of mbedtls is available on the path path ../mbedtls
/trusted-firmware-a-latest/docs/plat/st/
Dstm32mpus.rst71 - fsbl: to copy the tf-a-stm32mp157c-ev1.stm32 binary (BL2)
/trusted-firmware-a-latest/docs/components/
Dfirmware-update.rst323 The ``image_addr`` and ``block_size`` specify the source memory block to copy from.
326 If ``block_size`` is greater than the amount of remaining bytes to copy for this
327 image then the former is truncated to the latter. The copy operation is then
329 state. If there is still more to copy, the FWU state machine stays in or
/trusted-firmware-a-latest/docs/perf/
Dpsci-performance-instr.rst53 :param target_cpu: Contains copy of affinity fields in the MPIDR register
/trusted-firmware-a-latest/docs/plat/arm/arm_fpga/
Dindex.rst55 detect it and copy it into the DTB passed on to BL33.
/trusted-firmware-a-latest/docs/design_documents/
Dmeasured_boot_poc.rst54 allows the former to pass a copy of the Event Log to any TA requesting it.
64 aforementioned ``PTA_SYSTEM_GET_TPM_EVENT_LOG`` call to retrieve a copy
180 world. This TA then requests a copy of the Event Log generated during the
Dcontext_mgmt_rework.rst161 own copy of PAuth registers which needs to be restored on every
/trusted-firmware-a-latest/docs/plat/marvell/armada/
Dporting.rst135 The easiest way to prepare the PHY porting layer for custom board is to copy
/trusted-firmware-a-latest/docs/plat/nxp/
Dnxp-layerscape.rst335 Note: The size in the standard uboot commands for copy to nor, qspi, nand or sd

12