/trusted-firmware-a-latest/drivers/brcm/ |
D | iproc_gpio.c | 78 static void mux_to_gpio(struct iproc_gpio *g, int gpio) in mux_to_gpio() argument 81 if (g->pinmux_base) in mux_to_gpio() 82 mmio_write_32(g->pinmux_base + PINMUX_OFFSET(gpio), in mux_to_gpio() 88 struct iproc_gpio *g = &iproc_gpio; in set_direction() local 91 assert(gpio < g->nr_gpios); in set_direction() 93 mux_to_gpio(g, gpio); in set_direction() 94 gpio_set_bit(g->base, IPROC_GPIO_OUT_EN_OFFSET, gpio, dir); in set_direction() 99 struct iproc_gpio *g = &iproc_gpio; in get_direction() local 102 assert(gpio < g->nr_gpios); in get_direction() 104 mux_to_gpio(g, gpio); in get_direction() [all …]
|
/trusted-firmware-a-latest/lib/zlib/ |
D | zlib.h | 1845 # define z_gzgetc(g) \ argument 1846 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g)) 1848 # define gzgetc(g) \ argument 1849 ((g)->have ? ((g)->have--, (g)->pos++, *((g)->next)++) : (gzgetc)(g))
|
/trusted-firmware-a-latest/include/export/ |
D | README | 7 - All definitions should be sufficiently namespaced (e.g. with BL_ or TF_) to 20 pre-defined by all common compilers (e.g. __ASSEMBLER__ or __aarch64__). 25 (e.g. long, uintptr_t, pointer types) where possible. (Some existing export
|
/trusted-firmware-a-latest/docs/components/ |
D | debugfs-design.rst | 27 - # is used as root for drivers (e.g. #t0 is the first uart) 28 - / is used as root for virtual "files" (e.g. /fip, or /dev/uart) 70 - Debug data can be partitioned into different virtual files e.g. expose PMF 74 (e.g. a hardware device that may not be accessible to non-privileged/ 82 shared buffer is used to pass path string parameters, or e.g. to exchange
|
D | ffa-manifest-binding.rst | 45 - Name of the partition e.g. for debugging purposes. 184 - Name of the memory region e.g. for debugging purposes. 221 - Name of the device region e.g. for debugging purposes.
|
D | secure-partition-manager-mm.rst | 30 In other market segments that primarily deal with server-side devices (e.g. data 33 other interfaces (e.g. ACPI TCG TPM interface, UEFI runtime variable service). 55 - A range of synchronous exceptions (e.g. SMC function identifiers). 114 service always runs to completion (e.g. the requested services cannot be 120 Payload image executing at S-EL1 (e.g. a Trusted OS). Both are referred to as 208 e.g. ACPI table or device tree. It is possible for the Non-secure world to 293 partition (e.g. management of memory attributes in the translation tables for 616 could implement a loader for a standard executable file format (e.g. an PE-COFF 619 executable file and their permission attributes (e.g. read-write data, read-only
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | cmake_framework.rst | 31 * CMake has various advantages over Make, e.g.: 36 * Out-of-the-box support for integration with several tools (e.g. project 41 * Language is problematic (e.g. variable scope). 71 configuration management tool (e.g. Kconfig) shall be used to generate these 89 that CMake does not solve (e.g. preprocessing a file). For these tasks the 95 In the TF-A buildsystem some external tools are used, e.g. fiptool for image 134 the settings group, we can use it for conditionally adding source files. E.g.
|
D | rss.rst | 8 the system (e.g.: trusted boot, measured boot, platform attestation, 40 IMPDEF number of channels (e.g: 4-16) between a sender and a receiver module. 87 | | e.g: 4-16 | | | | e.g: 4-16 | | | V | 258 compute the measurement (e.g.: sha-256, etc.). 259 - ``Version info``: Optional. The firmware version info (e.g.: 2.7). 260 - ``SW type``: Optional. Short text description (e.g.: BL1, BL2, BL31, etc.)
|
/trusted-firmware-a-latest/drivers/nxp/auth/csf_hdr_parser/ |
D | input_blx_ch3 | 29 # e.g FSL_UID_0=11111111
|
D | input_blx_ch2 | 25 # e.g FSL_UID=11111111
|
D | input_pbi_ch3 | 27 # e.g FSL_UID_0=11111111
|
D | input_pbi_ch3_2 | 27 # e.g FSL_UID_0=11111111
|
D | input_bl2_ch3 | 44 # e.g FSL_UID_0=11111111
|
D | input_bl2_ch3_2 | 44 # e.g FSL_UID_0=11111111
|
D | input_bl2_ch2 | 54 # e.g FSL_UID=11111111
|
/trusted-firmware-a-latest/tools/marvell/doimage/secure/ |
D | kak_priv_pem.key | 19 g/P/TLQ6HmTDaWiVBqPVxvjn3RjLuqJf+V5Hp2JRs7bDq39xFfMJExQyP34qWkbp
|
/trusted-firmware-a-latest/docs/plat/ |
D | hikey.rst | 72 …e for aosp. The eMMC capacity is either 8GB or 4GB. Just change "aosp-8g" to "linux-8g" for debian. 80 make hikey PTABLE_LST=aosp-8g
|
D | qti-msm8916.rst | 35 therefore expects the non-secure world (e.g. Linux) to manage more hardware, 110 refers to the first bootloader (e.g. U-Boot). 130 use e.g. `qtestsign`_:: 144 of problems (e.g. using EDL). 206 .. _Snapdragon X5 Modem: https://www.qualcomm.com/products/snapdragon-modems-4g-lte-x5
|
D | nvidia-tegra.rst | 109 TARGET_SOC=<target-soc e.g. t194|t186|t210> SPD=<dispatcher e.g. trusty|tlkd>
|
/trusted-firmware-a-latest/docs/plat/marvell/armada/ |
D | porting.rst | 12 (e.g. 'plat/marvell/armada/a8k/a7040_cust'). 13 - The platform name for build purposes is called ``<soc>_cust`` (e.g. ``a7040_cust``). 32 In cases where a special physical address map is needed (e.g. Special size for 49 saved in next position on flash (e.g. address 2M in SPI flash).
|
/trusted-firmware-a-latest/docs/threat_model/ |
D | threat_model_el3_spm.rst | 100 - SPMC secrets (e.g. pointer authentication key when enabled) 101 - SP secrets (e.g. application keys). 171 | | spoof the origin and destination worlds (e.g. a NWd| 218 | | and another endpoint (e.g. which NWd endpoint ID | 287 | | the latter in not in a state to receive it (e.g. | 418 | | (e.g. partition message response outside of | 518 | | mitigations (e.g. speculation barriers) for the |
|
/trusted-firmware-a-latest/fdts/ |
D | stm32mp131.dtsi | 143 g-rx-fifo-size = <512>; 144 g-np-tx-fifo-size = <32>; 145 g-tx-fifo-size = <256 16 16 16 16 16 16 16>;
|
D | stm32mp151.dtsi | 186 g-rx-fifo-size = <512>; 187 g-np-tx-fifo-size = <32>; 188 g-tx-fifo-size = <256 16 16 16 16 16 16 16>;
|
/trusted-firmware-a-latest/docs/design/ |
D | auth-framework.rst | 14 - The mechanism used to encode and transport information, e.g. DER encoded 55 | Misc. Libs e.g. | 171 used for verifying the CoT, e.g. memory for public keys, hashes etc. 176 extract authentication parameters contained in an image, e.g. if the 184 cannot be interpreted by the CM, e.g. if an image has to be verified using a 204 multiple CoTs then it should be verified only once e.g. the Trusted World 210 #. Reusing memory meant for a data image to verify authentication images e.g. 273 information - e.g the hash of the ROTPK plus some related information. 410 is treated as being in raw binary format e.g. boot loader images used by 417 e.g. the X.509 parsing library code in mbed TLS. [all …]
|
/trusted-firmware-a-latest/docs/process/ |
D | commit-style.rst | 121 platforms and some drivers) should use that name (e.g. ``gic600ae``, 123 component (e.g. ``marvell-comphy-3700``, ``rcar3-drivers``, ``a3720-uart``).
|