/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/native_drivers/ |
D | kmu_drv.c | 91 enum kmu_error_t kmu_key_get_export_config(struct kmu_dev_t *dev, uint32_t slot, in kmu_key_get_export_config() argument 96 if (slot >= KMU_GET_NKS(p_kmu)) { in kmu_key_get_export_config() 101 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPWD_MASK) >> KMU_KMUKSC_DPWD_OFF; in kmu_key_get_export_config() 104 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPAI_MASK) >> KMU_KMUKSC_DPAI_OFF; in kmu_key_get_export_config() 107 (p_kmu->kmuksc[slot] & KMU_KMUKSC_DPDW_MASK) >> KMU_KMUKSC_DPDW_OFF; in kmu_key_get_export_config() 110 (p_kmu->kmuksc[slot] & KMU_KMUKSC_NDPW_MASK) >> KMU_KMUKSC_NDPW_OFF; in kmu_key_get_export_config() 113 (p_kmu->kmuksc[slot] & KMU_KMUKSC_NMNKW_MASK) >> KMU_KMUKSC_NMNKW_OFF; in kmu_key_get_export_config() 116 (p_kmu->kmuksc[slot] & KMU_KMUKSC_WMD_MASK) >> KMU_KMUKSC_WMD_OFF; in kmu_key_get_export_config() 121 enum kmu_error_t kmu_key_set_export_config(struct kmu_dev_t *dev, uint32_t slot, in kmu_key_set_export_config() argument 126 if (slot >= KMU_GET_NKS(p_kmu)) { in kmu_key_set_export_config() [all …]
|
D | kmu_drv.h | 250 enum kmu_error_t kmu_key_get_export_config(struct kmu_dev_t *dev, uint32_t slot, 252 enum kmu_error_t kmu_key_set_export_config(struct kmu_dev_t *dev, uint32_t slot, 255 enum kmu_error_t kmu_set_key_locked(struct kmu_dev_t *dev, uint32_t slot); 256 enum kmu_error_t kmu_get_key_locked(struct kmu_dev_t *dev, uint32_t slot); 259 uint32_t slot); 261 uint32_t slot); 263 enum kmu_error_t kmu_set_slot_invalid(struct kmu_dev_t *dev, uint32_t slot); 264 enum kmu_error_t kmu_get_slot_invalid(struct kmu_dev_t *dev, uint32_t slot); 266 enum kmu_error_t kmu_set_key(struct kmu_dev_t *dev, uint32_t slot, uint8_t *key, 268 enum kmu_error_t kmu_get_key(struct kmu_dev_t *dev, uint32_t slot, uint8_t *buf, [all …]
|
/trusted-firmware-m-3.4.0/lib/ext/cryptocell-312-runtime/host/src/tests/common/ |
D | applet_list.h | 41 #define IS_NEXT_SLOT_LEGAL(isSramInList, slot) ((IS_NON_PRIV_SLOT(slot) && (isSramInList))?0:1) argument 44 #define IS_LAST_PRIV_SLOT(slot, index, numSlots) ((index == numSlots-2)?IS_PRIV_SLOT(slot):1) argument 47 #define IS_NOT_LAST_SRAM_SLOT(slot, index, numSlots) ((index == numSlots-2)?(!(IS_SRAM_SLOT(slot)))… argument
|
/trusted-firmware-m-3.4.0/lib/ext/mbedcrypto/ |
D | 0004-Add-TF-M-builtin-key-driver.patch | 81 /* Key is stored in the slot in export representation, so 91 /* Key is stored in the slot in export representation, so 101 /* Key is stored in the slot in export representation, so 111 /* Key is stored in the slot in export representation, so 144 /* Key is stored in the slot in export representation, so 164 /* Key is stored in the slot in export representation, so 188 /* Key is stored in the slot in export representation, so 198 /* Key is stored in the slot in export representation, so 208 /* Key is stored in the slot in export representation, so 218 /* Key is stored in the slot in export representation, so [all …]
|
D | 0003-Driver-wrapper-entry-points-for-CC3XX.patch | 268 /* Key is stored in the slot in export representation, so 894 /* Key is stored in the slot in export representation, so 915 /* Key is stored in the slot in export representation, so
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/corstone1000/bl1/ |
D | flash_map_extended.c | 40 int flash_area_id_from_multi_image_slot(int image_index, int slot) in flash_area_id_from_multi_image_slot() argument 42 switch (slot) { in flash_area_id_from_multi_image_slot() 51 int flash_area_id_from_image_slot(int slot) in flash_area_id_from_image_slot() argument 53 return flash_area_id_from_multi_image_slot(0, slot); in flash_area_id_from_image_slot()
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/ |
D | flash_map_extended.c | 40 int flash_area_id_from_multi_image_slot(int image_index, int slot) in flash_area_id_from_multi_image_slot() argument 42 switch (slot) { in flash_area_id_from_multi_image_slot() 51 int flash_area_id_from_image_slot(int slot) in flash_area_id_from_image_slot() argument 53 return flash_area_id_from_multi_image_slot(0, slot); in flash_area_id_from_image_slot()
|
D | mcuboot_default_config.cmake | 40 … OFF CACHE BOOL "Support initial state with empty primary slot and images installe…
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/bl1/ |
D | boot_hal_bl1.c | 127 uint32_t slot; in invalidate_hardware_keys() local 129 for (slot = 0; slot < KMU_USER_SLOT_MIN; slot++) { in invalidate_hardware_keys() 130 kmu_err = kmu_set_slot_invalid(&KMU_DEV_S, slot); in invalidate_hardware_keys()
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | tfm_secure_boot.rst | 78 for AN521). It is mandatory to define the primary slot and the secondary slot 82 - 0x0008_0000 - 0x000F_FFFF: Primary slot : Single binary blob: 92 - 0x0018_0000 - 0x0027_FFFF: Secondary slot : Secure + Non-Secure image; 94 identically to the primary slot 101 - 0x0008_0000 - 0x000F_FFFF: Primary slot : Secure image 107 - 0x0010_0000 - 0x0017_FFFF: Primary slot : Non-secure image 113 - 0x0018_0000 - 0x001F_FFFF: Secondary slot : Secure image 114 - 0x0020_0000 - 0x0027_FFFF: Secondary slot : Non-secure image 129 slot and the secondary slot is a staging area for new images. Before executing 130 the new firmware image, the content of the primary slot must be overwritten with [all …]
|
D | tfm_builtin_keys.rst | 76 ``TFM_BUILTIN_KEY_LOADER_KEY_LOCATION``. The function also returns a slot 78 3) This location and slot index then calls
|
D | bl1.rst | 139 primary slot is always booted first, and then if verification of this fails 141 protection counter) the secondary slot is then booted (subject to the same 146 images and placing them in the required slot.
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/include/flash_map_backend/ |
D | flash_map_backend.h | 42 int flash_area_id_from_image_slot(int slot); 43 int flash_area_id_from_multi_image_slot(int image_index, int slot);
|
/trusted-firmware-m-3.4.0/docs/building/ |
D | run_tfm_examples_on_arm_platforms.rst | 72 test it. Load output of example application to the primary slot (0x10080000) and 73 output of regression test to the secondary slot (0x10180000). Add the following 121 [INF] Boot source: primary slot 124 [INF] Jumping to the first image slot 135 [INF] Boot source: primary slot 138 [INF] Jumping to the first image slot 271 [INF] Boot source: primary slot 274 [INF] Jumping to the first image slot 301 [INF] Boot source: primary slot 304 [INF] Jumping to the first image slot [all …]
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/dual-cpu/ |
D | mailbox_design_on_dual_core_system.rst | 117 Each slot in NSPE mailbox queue consists of a pair of a mailbox message 118 structure and a mailbox reply structure. Each slot might contain additional 120 request. Each slot serves a PSA Client call from non-secure task. 123 the slot. `Mailbox messages`_ describes the details of mailbox message. 136 queue slot for the PSA Client request. The parameters of that PSA Client request 137 are organized into the mailbox message belonging to the selected slot. 158 request is pending, SPE mailbox can assign an empty slot, copy the corresponding 159 PSA Client call parameters from non-secure memory to that slot and parse the 162 Each slot in SPE mailbox queue can contain the following fields 166 - Index of NSPE mailbox queue slot containing the mailbox message. [all …]
|
/trusted-firmware-m-3.4.0/docs/integration_guide/platform/ |
D | platform_ext_folder.rst | 244 | | | primary slot | | | primary slot | 247 | | | primary slot | | | 250 | | | secondary slot | | | secondary slot | 253 | | | secondary slot | | |
|
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/an552/ |
D | README.rst | 61 [INF] Jumping to the first image slot 93 [INF] Jumping to the first image slot
|
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/an547/ |
D | README.rst | 64 [INF] Jumping to the first image slot 100 [INF] Jumping to the first image slot
|
/trusted-firmware-m-3.4.0/docs/platform/cypress/psoc64/ |
D | cypress_psoc64_spec.rst | 273 for the primary image slot. Use "--image-type UPGRADE" if you want to create 274 an image for the secondary "upgrade" slot. 275 When booting, CyBootloader will validate image in the secondary slot and copy 276 it to the primary boot slot.
|
/trusted-firmware-m-3.4.0/docs/platform/arm/mps3/corstone310/ |
D | README.rst | 85 [INF] Jumping to the first image slot
|
/trusted-firmware-m-3.4.0/docs/getting_started/ |
D | tfm_getting_started.rst | 373 [INF] Boot source: primary slot 376 [INF] Jumping to the first image slot
|
/trusted-firmware-m-3.4.0/docs/platform/lairdconnectivity/bl5340_dvk_cpuapp/ |
D | README.rst | 126 Flashing the BL5340 DVK (Secondary slot in QSPI, with BL2)
|
/trusted-firmware-m-3.4.0/docs/integration_guide/ |
D | non-secure_client_extension_integration_guide.rst | 102 has an available context slot. Otherwise, `TFM_NS_CLIENT_INVALID_TOKEN` is
|