Home
last modified time | relevance | path

Searched refs:img (Results 1 – 25 of 26) sorted by relevance

12

/trusted-firmware-a-latest/drivers/nxp/auth/csf_hdr_parser/
Dplat_img_parser.c80 static int check_integrity(void *img, unsigned int img_len) in check_integrity() argument
90 flush_dcache_range((uintptr_t) img, img_len); in check_integrity()
96 VERBOSE("Barker code is %x\n", *(unsigned int *)img); in check_integrity()
97 ret = validate_esbc_header(img, &img_key, &key_len, &img_sign, in check_integrity()
105 ret = calc_img_hash(img, (uint8_t *)img + CSF_HDR_SZ, in check_integrity()
125 void *img, unsigned int img_len, in get_auth_param() argument
/trusted-firmware-a-latest/drivers/auth/
Dauth_mod.c91 void *img, unsigned int img_len) in auth_hash() argument
109 img, img_len, &data_ptr, &data_len); in auth_hash()
157 void *img, unsigned int img_len) in auth_signature() argument
166 img, img_len, &data_ptr, &data_len); in auth_signature()
175 img, img_len, &sig_ptr, &sig_len); in auth_signature()
184 img, img_len, &sig_alg_ptr, &sig_alg_len); in auth_signature()
219 param->pk, img, img_len, in auth_signature()
322 void *img, unsigned int img_len, in auth_nvctr() argument
336 img, img_len, &data_ptr, &data_len); in auth_nvctr()
/trusted-firmware-a-latest/include/drivers/auth/
Dimg_parser_mod.h38 int (*check_integrity)(void *img, unsigned int img_len);
40 void *img, unsigned int img_len,
/trusted-firmware-a-latest/include/drivers/nxp/auth/csf_hdr_parser/
Dcsf_hdr.h48 } img; member
99 } img; member
144 } img; member
/trusted-firmware-a-latest/docs/plat/
Dhikey960.rst137 ./sec_usb_xloader.img 0x00020000
138 ./sec_uce_boot.img 0x6A908000
161 $sudo fastboot flash ptable prm_ptable.img
162 $sudo fastboot flash xloader sec_xloader.img
165 $sudo fastboot flash boot boot.img
166 $sudo fastboot flash cache cache.img
167 $sudo fastboot flash system system.img
168 $sudo fastboot flash userdata userdata.img
Dhikey.rst140 $sudo fastboot flash ptable prm_ptable.img
143 $sudo fastboot flash boot boot.img
144 $sudo fastboot flash cache cache.img
145 $sudo fastboot flash system system.img
146 $sudo fastboot flash userdata userdata.img
Dmeson-axg.rst24 instructions in the `U-Boot repository`_, replacing the mentioned **bl31.img**
Dmeson-g12a.rst24 mentioned **bl31.img** by the one built from this port.
Dmeson-gxl.rst24 mentioned **bl31.img** by the one built from this port.
Dti-k3.rst57 cp tiboot3.bin tispl.bin u-boot.img /sdcard/boot/
Drpi3.rst34 - If a file called ``kernel8.img`` is located on the ``boot`` partition of the
43 `Raspbian`_ distribution by renaming it to ``kernel8.img``, while TF-A and
46 sure that the name on the SD card is ``kernel8.img``.
68 The file ``kernel8.img`` contains a kernel image that is loaded to the address
212 because the file ``kernel8.img`` can be loaded anywhere by modifying the file
387 cp arch/arm64/boot/Image /path/to/boot/kernel8.img
400 the existing ``kernel7.img`` (we have already copied a AArch64 kernel).
411 2. Rename ``kernel7.img`` to ``kernel8.img``. This tricks the VideoCore
415 3. Copy ``armstub8.bin`` here. When ``kernel8.img`` is available, The VideoCore
/trusted-firmware-a-latest/plat/amlogic/axg/
Dplatform.mk84 all: ${BUILD_PLAT}/bl31.img
93 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL}
94 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
/trusted-firmware-a-latest/plat/amlogic/g12a/
Dplatform.mk80 all: ${BUILD_PLAT}/bl31.img
89 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL}
90 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
/trusted-firmware-a-latest/plat/amlogic/gxl/
Dplatform.mk80 all: ${BUILD_PLAT}/bl31.img
89 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL}
90 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
/trusted-firmware-a-latest/tools/sptool/
Dsptool.py46 manifest: {pm_path}; img: {img_path}")
114 with open(self.img_path, "rb") as img:
115 copyfileobj(img, output)
/trusted-firmware-a-latest/drivers/auth/mbedtls/
Dmbedtls_x509_parser.c190 static int cert_parse(void *img, unsigned int img_len) in cert_parse() argument
212 p = (unsigned char *)img; in cert_parse()
439 static int check_integrity(void *img, unsigned int img_len) in check_integrity() argument
441 int rc = cert_parse(img, img_len); in check_integrity()
460 void *img, unsigned int img_len, in get_auth_param() argument
/trusted-firmware-a-latest/docs/components/
Dcot-binding.rst182 Definition: must be "arm, img-descs"
227 compatible = "arm, img-descs";
239 next-img {
Drealm-management-extension.rst143 This will generate **rmm.img** in **build/Release** folder.
172 the `RMM`_ binary ``rmm.img`` using ``RMM`` build option.
190 RMM=<path/to/rmm.img> \
214 RMM=<path/to/rmm.img> \
393 RMM=<path/to/rmm.img> \
/trusted-firmware-a-latest/fdts/
Dstm32mp1-cot-descriptors.dtsi97 compatible = "arm, img-descs";
Dcot_descriptors.dtsi185 compatible = "arm, img-descs";
/trusted-firmware-a-latest/drivers/renesas/common/io/
Dio_rcar.c311 const int32_t img[] = { in load_bl33x() local
327 rc = file_to_offset(img[i], &offset, &cert, &noload, in load_bl33x()
366 rc = auth_mod_verify_img(img[i], (void *)dst, len); in load_bl33x()
/trusted-firmware-a-latest/docs/design_documents/
Ddrtm_poc.rst66 Download EDK2 *FVP_AARCH64_EFI.fd* and UEFI DRTM application *test-disk.img*
91 -C bp.virtioblockdevice.image_path=<path/to/test-disk.img> \
/trusted-firmware-a-latest/docs/design/
Dauth-framework.rst442 int check_integrity(void *img, unsigned int img_len);
444 void *img, unsigned int img_len,
955 int check_integrity(void *img, unsigned int img_len);
957 void *img, unsigned int img_len,
/trusted-firmware-a-latest/docs/plat/arm/fvp/
Dindex.rst264 INITRD=<path-to>/<ramdisk.img>
303 --data cluster0.cpu0="<path-to>/<ramdisk.img>"@0x84000000
/trusted-firmware-a-latest/drivers/nxp/ddr/phy-gen2/
Dphy.c2185 uint16_t *img, in send_fw() argument
2196 phy_io_write16(phy, dst + i, *(img + i)); in send_fw()

12