Home
last modified time | relevance | path

Searched refs:encoded (Results 1 – 14 of 14) sorted by relevance

/trusted-firmware-m-3.4.0/secure_fw/partitions/initial_attestation/
Dattest_token.h236 const struct q_useful_buf_c *encoded);
Dattest_token_encode.c374 const struct q_useful_buf_c *encoded) in attest_token_encode_add_cbor() argument
376 QCBOREncode_AddEncodedToMapN(&(me->cbor_enc_ctx), label, *encoded); in attest_token_encode_add_cbor()
/trusted-firmware-m-3.4.0/docs/integration_guide/services/
Dtfm_attestation_integration_guide.rst45 claim. Value is encoded as byte string.
57 claim will be represented by a custom claim Value is encoded as byte
66 a custom claim. Value is encoded as text string.
72 value encoded as text string.
77 and associated certification state. Custom claim with a value encoded as
82 encoded as a `signed` integer. Negative number represents non-secure
86 the instance. Custom claim with a value encoded as an integer.
91 website. Custom claim with a value is encoded as text string.
95 sessions. The size is 32 bytes. Custom claim with a value is encoded as
108 encoded as an unsigned integer set to 1.
[all …]
/trusted-firmware-m-3.4.0/docs/security/security_advisories/
Dprofile_small_key_id_encoding_vulnerability.rst33 encoded with the client ID of key owner in Profile Small in TF-M v1.4.0.
49 - Mbed TLS stores a special structure encoded by key owner client ID and the
58 not encoded with key owner client ID.
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/
DCMakeLists.txt15 # Add/process CBOR encoded measured boot data (MCUBOOT_MEASURED_BOOT) only if
16 # the store encoded measurements config is enabled. Otherwise, unencoded
/trusted-firmware-m-3.4.0/platform/ext/target/stm/common/hal/accelerator/
Drsa_alt.c2572 unsigned char *encoded = NULL, *encoded_expected = NULL; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local
2586 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2601 ret = mbedtls_rsa_public( ctx, sig, encoded ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2609 if( ( ret = mbedtls_safer_memcmp( encoded, encoded_expected, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2618 if( encoded != NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2620 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2621 mbedtls_free( encoded ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/
Dsymmetric_initial_attest.rst195 #. The header parameters are encoded into ``COSE_Mac0`` structure in
336 struct q_useful_buf_c protected_parameters; /* The encoded protected parameters */
348 Optional ``kid``, as a key identifer, will be encoded into ``COSE_Mac0`` Header
362 and outputs the encoded context to ``cbor_encode_ctx``.
Dsecure_boot_hw_key_integration.rst37 (TLV encoded metadata). During image verification the bootloader retrieves the
Dstateless_rot_service.rst32 The index, stateless indicator, and service version information are encoded into
Dhardware_abstraction_layer.rst329 quickly from this encoded value, or even write to hardware registers
347 The memory access attributes are encoded as bit fields, you can logic OR them to
Dtfm_fwu_service.rst267 TLV area which is encoded by CBOR, adding a dedicated ``image version`` TLV area
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/
Dconfig.cmake34 set(CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS OFF CACHE BOOL "Enable storing of encoded measur…
/trusted-firmware-m-3.4.0/config/
Dconfig_base.cmake47 set(CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS ON CACHE BOOL "Enable storing of encoded meas…
/trusted-firmware-m-3.4.0/docs/integration_guide/platform/
Dporting_TFM_to_a_new_hardware.rst360 …|TFM_ATTEST_BOOT_RECORDS_MAX_SIZE | Size of buffer that can store the encoded list of boot record…