Searched refs:encoded (Results 1 – 14 of 14) sorted by relevance
/trusted-firmware-m-3.4.0/secure_fw/partitions/initial_attestation/ |
D | attest_token.h | 236 const struct q_useful_buf_c *encoded);
|
D | attest_token_encode.c | 374 const struct q_useful_buf_c *encoded) in attest_token_encode_add_cbor() argument 376 QCBOREncode_AddEncodedToMapN(&(me->cbor_enc_ctx), label, *encoded); in attest_token_encode_add_cbor()
|
/trusted-firmware-m-3.4.0/docs/integration_guide/services/ |
D | tfm_attestation_integration_guide.rst | 45 claim. Value is encoded as byte string. 57 claim will be represented by a custom claim Value is encoded as byte 66 a custom claim. Value is encoded as text string. 72 value encoded as text string. 77 and associated certification state. Custom claim with a value encoded as 82 encoded as a `signed` integer. Negative number represents non-secure 86 the instance. Custom claim with a value encoded as an integer. 91 website. Custom claim with a value is encoded as text string. 95 sessions. The size is 32 bytes. Custom claim with a value is encoded as 108 encoded as an unsigned integer set to 1. [all …]
|
/trusted-firmware-m-3.4.0/docs/security/security_advisories/ |
D | profile_small_key_id_encoding_vulnerability.rst | 33 encoded with the client ID of key owner in Profile Small in TF-M v1.4.0. 49 - Mbed TLS stores a special structure encoded by key owner client ID and the 58 not encoded with key owner client ID.
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/ |
D | CMakeLists.txt | 15 # Add/process CBOR encoded measured boot data (MCUBOOT_MEASURED_BOOT) only if 16 # the store encoded measurements config is enabled. Otherwise, unencoded
|
/trusted-firmware-m-3.4.0/platform/ext/target/stm/common/hal/accelerator/ |
D | rsa_alt.c | 2572 unsigned char *encoded = NULL, *encoded_expected = NULL; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local 2586 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2601 ret = mbedtls_rsa_public( ctx, sig, encoded ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2609 if( ( ret = mbedtls_safer_memcmp( encoded, encoded_expected, in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2618 if( encoded != NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2620 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2621 mbedtls_free( encoded ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | symmetric_initial_attest.rst | 195 #. The header parameters are encoded into ``COSE_Mac0`` structure in 336 struct q_useful_buf_c protected_parameters; /* The encoded protected parameters */ 348 Optional ``kid``, as a key identifer, will be encoded into ``COSE_Mac0`` Header 362 and outputs the encoded context to ``cbor_encode_ctx``.
|
D | secure_boot_hw_key_integration.rst | 37 (TLV encoded metadata). During image verification the bootloader retrieves the
|
D | stateless_rot_service.rst | 32 The index, stateless indicator, and service version information are encoded into
|
D | hardware_abstraction_layer.rst | 329 quickly from this encoded value, or even write to hardware registers 347 The memory access attributes are encoded as bit fields, you can logic OR them to
|
D | tfm_fwu_service.rst | 267 TLV area which is encoded by CBOR, adding a dedicated ``image version`` TLV area
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/ |
D | config.cmake | 34 set(CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS OFF CACHE BOOL "Enable storing of encoded measur…
|
/trusted-firmware-m-3.4.0/config/ |
D | config_base.cmake | 47 set(CONFIG_TFM_BOOT_STORE_ENCODED_MEASUREMENTS ON CACHE BOOL "Enable storing of encoded meas…
|
/trusted-firmware-m-3.4.0/docs/integration_guide/platform/ |
D | porting_TFM_to_a_new_hardware.rst | 360 …|TFM_ATTEST_BOOT_RECORDS_MAX_SIZE | Size of buffer that can store the encoded list of boot record…
|