/trusted-firmware-a-latest/drivers/nxp/auth/csf_hdr_parser/ |
D | plat_img_parser.c | 80 static int check_integrity(void *img, unsigned int img_len) in check_integrity() argument 90 flush_dcache_range((uintptr_t) img, img_len); in check_integrity() 96 VERBOSE("Barker code is %x\n", *(unsigned int *)img); in check_integrity() 97 ret = validate_esbc_header(img, &img_key, &key_len, &img_sign, in check_integrity() 105 ret = calc_img_hash(img, (uint8_t *)img + CSF_HDR_SZ, in check_integrity() 125 void *img, unsigned int img_len, in get_auth_param() argument
|
/trusted-firmware-a-latest/drivers/auth/ |
D | auth_mod.c | 91 void *img, unsigned int img_len) in auth_hash() argument 109 img, img_len, &data_ptr, &data_len); in auth_hash() 157 void *img, unsigned int img_len) in auth_signature() argument 166 img, img_len, &data_ptr, &data_len); in auth_signature() 175 img, img_len, &sig_ptr, &sig_len); in auth_signature() 184 img, img_len, &sig_alg_ptr, &sig_alg_len); in auth_signature() 219 param->pk, img, img_len, in auth_signature() 322 void *img, unsigned int img_len, in auth_nvctr() argument 336 img, img_len, &data_ptr, &data_len); in auth_nvctr()
|
/trusted-firmware-a-latest/include/drivers/auth/ |
D | img_parser_mod.h | 38 int (*check_integrity)(void *img, unsigned int img_len); 40 void *img, unsigned int img_len,
|
/trusted-firmware-a-latest/include/drivers/nxp/auth/csf_hdr_parser/ |
D | csf_hdr.h | 48 } img; member 99 } img; member 144 } img; member
|
/trusted-firmware-a-latest/docs/plat/ |
D | hikey960.rst | 137 ./sec_usb_xloader.img 0x00020000 138 ./sec_uce_boot.img 0x6A908000 161 $sudo fastboot flash ptable prm_ptable.img 162 $sudo fastboot flash xloader sec_xloader.img 165 $sudo fastboot flash boot boot.img 166 $sudo fastboot flash cache cache.img 167 $sudo fastboot flash system system.img 168 $sudo fastboot flash userdata userdata.img
|
D | hikey.rst | 140 $sudo fastboot flash ptable prm_ptable.img 143 $sudo fastboot flash boot boot.img 144 $sudo fastboot flash cache cache.img 145 $sudo fastboot flash system system.img 146 $sudo fastboot flash userdata userdata.img
|
D | meson-axg.rst | 24 instructions in the `U-Boot repository`_, replacing the mentioned **bl31.img**
|
D | meson-g12a.rst | 24 mentioned **bl31.img** by the one built from this port.
|
D | meson-gxl.rst | 24 mentioned **bl31.img** by the one built from this port.
|
D | ti-k3.rst | 57 cp tiboot3.bin tispl.bin u-boot.img /sdcard/boot/
|
D | rpi3.rst | 34 - If a file called ``kernel8.img`` is located on the ``boot`` partition of the 43 `Raspbian`_ distribution by renaming it to ``kernel8.img``, while TF-A and 46 sure that the name on the SD card is ``kernel8.img``. 68 The file ``kernel8.img`` contains a kernel image that is loaded to the address 212 because the file ``kernel8.img`` can be loaded anywhere by modifying the file 387 cp arch/arm64/boot/Image /path/to/boot/kernel8.img 400 the existing ``kernel7.img`` (we have already copied a AArch64 kernel). 411 2. Rename ``kernel7.img`` to ``kernel8.img``. This tricks the VideoCore 415 3. Copy ``armstub8.bin`` here. When ``kernel8.img`` is available, The VideoCore
|
/trusted-firmware-a-latest/plat/amlogic/axg/ |
D | platform.mk | 84 all: ${BUILD_PLAT}/bl31.img 93 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL} 94 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
|
/trusted-firmware-a-latest/plat/amlogic/g12a/ |
D | platform.mk | 80 all: ${BUILD_PLAT}/bl31.img 89 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL} 90 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
|
/trusted-firmware-a-latest/plat/amlogic/gxl/ |
D | platform.mk | 80 all: ${BUILD_PLAT}/bl31.img 89 ${BUILD_PLAT}/bl31.img: ${BUILD_PLAT}/bl31.bin ${DOIMAGETOOL} 90 ${DOIMAGETOOL} ${BUILD_PLAT}/bl31.bin ${BUILD_PLAT}/bl31.img
|
/trusted-firmware-a-latest/tools/sptool/ |
D | sptool.py | 46 manifest: {pm_path}; img: {img_path}") 114 with open(self.img_path, "rb") as img: 115 copyfileobj(img, output)
|
/trusted-firmware-a-latest/drivers/auth/mbedtls/ |
D | mbedtls_x509_parser.c | 190 static int cert_parse(void *img, unsigned int img_len) in cert_parse() argument 212 p = (unsigned char *)img; in cert_parse() 439 static int check_integrity(void *img, unsigned int img_len) in check_integrity() argument 441 int rc = cert_parse(img, img_len); in check_integrity() 460 void *img, unsigned int img_len, in get_auth_param() argument
|
/trusted-firmware-a-latest/docs/components/ |
D | cot-binding.rst | 182 Definition: must be "arm, img-descs" 227 compatible = "arm, img-descs"; 239 next-img {
|
D | realm-management-extension.rst | 143 This will generate **rmm.img** in **build/Release** folder. 172 the `RMM`_ binary ``rmm.img`` using ``RMM`` build option. 190 RMM=<path/to/rmm.img> \ 214 RMM=<path/to/rmm.img> \ 393 RMM=<path/to/rmm.img> \
|
/trusted-firmware-a-latest/fdts/ |
D | stm32mp1-cot-descriptors.dtsi | 97 compatible = "arm, img-descs";
|
D | cot_descriptors.dtsi | 185 compatible = "arm, img-descs";
|
/trusted-firmware-a-latest/drivers/renesas/common/io/ |
D | io_rcar.c | 311 const int32_t img[] = { in load_bl33x() local 327 rc = file_to_offset(img[i], &offset, &cert, &noload, in load_bl33x() 366 rc = auth_mod_verify_img(img[i], (void *)dst, len); in load_bl33x()
|
/trusted-firmware-a-latest/docs/design_documents/ |
D | drtm_poc.rst | 66 Download EDK2 *FVP_AARCH64_EFI.fd* and UEFI DRTM application *test-disk.img* 91 -C bp.virtioblockdevice.image_path=<path/to/test-disk.img> \
|
/trusted-firmware-a-latest/docs/design/ |
D | auth-framework.rst | 442 int check_integrity(void *img, unsigned int img_len); 444 void *img, unsigned int img_len, 955 int check_integrity(void *img, unsigned int img_len); 957 void *img, unsigned int img_len,
|
/trusted-firmware-a-latest/docs/plat/arm/fvp/ |
D | index.rst | 264 INITRD=<path-to>/<ramdisk.img> 303 --data cluster0.cpu0="<path-to>/<ramdisk.img>"@0x84000000
|
/trusted-firmware-a-latest/drivers/nxp/ddr/phy-gen2/ |
D | phy.c | 2185 uint16_t *img, in send_fw() argument 2196 phy_io_write16(phy, dst + i, *(img + i)); in send_fw()
|