Home
last modified time | relevance | path

Searched refs:slot (Results 1 – 23 of 23) sorted by relevance

/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/native_drivers/
Dkmu_drv.c91 enum kmu_error_t kmu_key_get_export_config(struct kmu_dev_t *dev, uint32_t slot, in kmu_key_get_export_config() argument
96 if (slot >= KMU_GET_NKS(p_kmu)) { in kmu_key_get_export_config()
101 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPWD_MASK) >> KMU_KMUKSC_DPWD_OFF; in kmu_key_get_export_config()
104 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPAI_MASK) >> KMU_KMUKSC_DPAI_OFF; in kmu_key_get_export_config()
107 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPDW_MASK) >> KMU_KMUKSC_DPDW_OFF; in kmu_key_get_export_config()
110 (p_kmu->kmuksc[slot] & KMU_KMUKSC_NDPW_MASK) >> KMU_KMUKSC_NDPW_OFF; in kmu_key_get_export_config()
113 (p_kmu->kmuksc[slot] & KMU_KMUKSC_NMNKW_MASK) >> KMU_KMUKSC_NMNKW_OFF; in kmu_key_get_export_config()
116 (p_kmu->kmuksc[slot] & KMU_KMUKSC_WMD_MASK) >> KMU_KMUKSC_WMD_OFF; in kmu_key_get_export_config()
121 enum kmu_error_t kmu_key_set_export_config(struct kmu_dev_t *dev, uint32_t slot, in kmu_key_set_export_config() argument
126 if (slot >= KMU_GET_NKS(p_kmu)) { in kmu_key_set_export_config()
[all …]
Dkmu_drv.h250 enum kmu_error_t kmu_key_get_export_config(struct kmu_dev_t *dev, uint32_t slot,
252 enum kmu_error_t kmu_key_set_export_config(struct kmu_dev_t *dev, uint32_t slot,
255 enum kmu_error_t kmu_set_key_locked(struct kmu_dev_t *dev, uint32_t slot);
256 enum kmu_error_t kmu_get_key_locked(struct kmu_dev_t *dev, uint32_t slot);
259 uint32_t slot);
261 uint32_t slot);
263 enum kmu_error_t kmu_set_slot_invalid(struct kmu_dev_t *dev, uint32_t slot);
264 enum kmu_error_t kmu_get_slot_invalid(struct kmu_dev_t *dev, uint32_t slot);
266 enum kmu_error_t kmu_set_key(struct kmu_dev_t *dev, uint32_t slot, uint8_t *key,
268 enum kmu_error_t kmu_get_key(struct kmu_dev_t *dev, uint32_t slot, uint8_t *buf,
[all …]
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/common/
Dapplet_list.h41 #define IS_NEXT_SLOT_LEGAL(isSramInList, slot) ((IS_NON_PRIV_SLOT(slot) && (isSramInList))?0:1) argument
44 #define IS_LAST_PRIV_SLOT(slot, index, numSlots) ((index == numSlots-2)?IS_PRIV_SLOT(slot):1) argument
47 #define IS_NOT_LAST_SRAM_SLOT(slot, index, numSlots) ((index == numSlots-2)?(!(IS_SRAM_SLOT(slot)))… argument
/trusted-firmware-m-3.4.0/lib/ext/mbedcrypto/
D0004-Add-TF-M-builtin-key-driver.patch81 /* Key is stored in the slot in export representation, so
91 /* Key is stored in the slot in export representation, so
101 /* Key is stored in the slot in export representation, so
111 /* Key is stored in the slot in export representation, so
144 /* Key is stored in the slot in export representation, so
164 /* Key is stored in the slot in export representation, so
188 /* Key is stored in the slot in export representation, so
198 /* Key is stored in the slot in export representation, so
208 /* Key is stored in the slot in export representation, so
218 /* Key is stored in the slot in export representation, so
[all …]
D0003-Driver-wrapper-entry-points-for-CC3XX.patch268 /* Key is stored in the slot in export representation, so
894 /* Key is stored in the slot in export representation, so
915 /* Key is stored in the slot in export representation, so
/trusted-firmware-m-3.4.0/platform/ext/target/arm/corstone1000/bl1/
Dflash_map_extended.c40 int flash_area_id_from_multi_image_slot(int image_index, int slot) in flash_area_id_from_multi_image_slot() argument
42 switch (slot) { in flash_area_id_from_multi_image_slot()
51 int flash_area_id_from_image_slot(int slot) in flash_area_id_from_image_slot() argument
53 return flash_area_id_from_multi_image_slot(0, slot); in flash_area_id_from_image_slot()
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/
Dflash_map_extended.c40 int flash_area_id_from_multi_image_slot(int image_index, int slot) in flash_area_id_from_multi_image_slot() argument
42 switch (slot) { in flash_area_id_from_multi_image_slot()
51 int flash_area_id_from_image_slot(int slot) in flash_area_id_from_image_slot() argument
53 return flash_area_id_from_multi_image_slot(0, slot); in flash_area_id_from_image_slot()
Dmcuboot_default_config.cmake40 … OFF CACHE BOOL "Support initial state with empty primary slot and images installe…
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/bl1/
Dboot_hal_bl1.c127 uint32_t slot; in invalidate_hardware_keys() local
129 for (slot = 0; slot < KMU_USER_SLOT_MIN; slot++) { in invalidate_hardware_keys()
130 kmu_err = kmu_set_slot_invalid(&KMU_DEV_S, slot); in invalidate_hardware_keys()
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/
Dtfm_secure_boot.rst78 for AN521). It is mandatory to define the primary slot and the secondary slot
82 - 0x0008_0000 - 0x000F_FFFF: Primary slot : Single binary blob:
92 - 0x0018_0000 - 0x0027_FFFF: Secondary slot : Secure + Non-Secure image;
94 identically to the primary slot
101 - 0x0008_0000 - 0x000F_FFFF: Primary slot : Secure image
107 - 0x0010_0000 - 0x0017_FFFF: Primary slot : Non-secure image
113 - 0x0018_0000 - 0x001F_FFFF: Secondary slot : Secure image
114 - 0x0020_0000 - 0x0027_FFFF: Secondary slot : Non-secure image
129 slot and the secondary slot is a staging area for new images. Before executing
130 the new firmware image, the content of the primary slot must be overwritten with
[all …]
Dtfm_builtin_keys.rst76 ``TFM_BUILTIN_KEY_LOADER_KEY_LOCATION``. The function also returns a slot
78 3) This location and slot index then calls
Dbl1.rst139 primary slot is always booted first, and then if verification of this fails
141 protection counter) the secondary slot is then booted (subject to the same
146 images and placing them in the required slot.
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/include/flash_map_backend/
Dflash_map_backend.h42 int flash_area_id_from_image_slot(int slot);
43 int flash_area_id_from_multi_image_slot(int image_index, int slot);
/trusted-firmware-m-3.4.0/docs/building/
Drun_tfm_examples_on_arm_platforms.rst72 test it. Load output of example application to the primary slot (0x10080000) and
73 output of regression test to the secondary slot (0x10180000). Add the following
121 [INF] Boot source: primary slot
124 [INF] Jumping to the first image slot
135 [INF] Boot source: primary slot
138 [INF] Jumping to the first image slot
271 [INF] Boot source: primary slot
274 [INF] Jumping to the first image slot
301 [INF] Boot source: primary slot
304 [INF] Jumping to the first image slot
[all …]
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/dual-cpu/
Dmailbox_design_on_dual_core_system.rst117 Each slot in NSPE mailbox queue consists of a pair of a mailbox message
118 structure and a mailbox reply structure. Each slot might contain additional
120 request. Each slot serves a PSA Client call from non-secure task.
123 the slot. `Mailbox messages`_ describes the details of mailbox message.
136 queue slot for the PSA Client request. The parameters of that PSA Client request
137 are organized into the mailbox message belonging to the selected slot.
158 request is pending, SPE mailbox can assign an empty slot, copy the corresponding
159 PSA Client call parameters from non-secure memory to that slot and parse the
162 Each slot in SPE mailbox queue can contain the following fields
166 - Index of NSPE mailbox queue slot containing the mailbox message.
[all …]
/trusted-firmware-m-3.4.0/docs/integration_guide/platform/
Dplatform_ext_folder.rst244 | | | primary slot | | | primary slot |
247 | | | primary slot | | |
250 | | | secondary slot | | | secondary slot |
253 | | | secondary slot | | |
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/an552/
DREADME.rst61 [INF] Jumping to the first image slot
93 [INF] Jumping to the first image slot
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/an547/
DREADME.rst64 [INF] Jumping to the first image slot
100 [INF] Jumping to the first image slot
/trusted-firmware-m-3.4.0/docs/platform/cypress/psoc64/
Dcypress_psoc64_spec.rst273 for the primary image slot. Use "--image-type UPGRADE" if you want to create
274 an image for the secondary "upgrade" slot.
275 When booting, CyBootloader will validate image in the secondary slot and copy
276 it to the primary boot slot.
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/corstone310/
DREADME.rst85 [INF] Jumping to the first image slot
/trusted-firmware-m-3.4.0/docs/getting_started/
Dtfm_getting_started.rst373 [INF] Boot source: primary slot
376 [INF] Jumping to the first image slot
/trusted-firmware-m-3.4.0/docs/platform/lairdconnectivity/bl5340_dvk_cpuapp/
DREADME.rst126 Flashing the BL5340 DVK (Secondary slot in QSPI, with BL2)
/trusted-firmware-m-3.4.0/docs/integration_guide/
Dnon-secure_client_extension_integration_guide.rst102 has an available context slot. Otherwise, `TFM_NS_CLIENT_INVALID_TOKEN` is