Home
last modified time | relevance | path

Searched refs:array (Results 1 – 12 of 12) sorted by relevance

/trusted-firmware-m-3.6.0/platform/ext/target/arm/corstone1000/ci_regression_tests/
Ds_io_storage_test.c17 #define ARRAY_LENGTH(array) (sizeof(array) / sizeof(*(array))) argument
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/common_utils/
Dcert_basic_utilities.py105 def ReverseBytesInBytesArray(array, size): argument
112 revArray[4*i + j] = array[4*i + 3 - j]
Dcnt_data_structures.py26 def tempReverseBytesInBytesArray(array, size): argument
33 revArray[4*i + j] = array[4*i + 3 - j]
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/
Dattest_core.c26 #define ARRAY_LENGTH(array) (sizeof(array) / sizeof(*(array))) argument
/trusted-firmware-m-3.6.0/docs/security/security_advisories/
Dprofile_small_key_id_encoding_vulnerability.rst44 - TF-M Crypto service maintains a key handle array. When a key is stored in
46 array. When a caller requests to access a key, TF-M Crypto service validates
157 This patch intended to optimize TF-M Crypto service key handle array and
/trusted-firmware-m-3.6.0/lib/ext/qcbor/
D0001-Disable-gcc-Wmaybe-uninitialized-because-of-false-po.patch97 #define SIZEOF_C_ARRAY(array,type) (sizeof(array)/sizeof(type))
/trusted-firmware-m-3.6.0/docs/platform/arm/rss/
Drss_comms.rst76 The ``io_size`` array contains the sizes of the up to ``PSA_MAX_IOVEC`` (4)
79 The ``payload`` array then contains the invec data packed contiguously in order.
/trusted-firmware-m-3.6.0/docs/design_docs/booting/
Dsecure_boot_hw_key_integration.rst29 MCUBoot code contains a compile-time built-in key array which can store any
/trusted-firmware-m-3.6.0/docs/design_docs/services/
Dtfm_psa_inter_process_communication.rst66 array of memory areas defined in the linker script. Two chains are available to
Dsecure_partition_manager.rst712 to put such variable size elements in an array. The solution here is putting
/trusted-firmware-m-3.6.0/interface/include/psa/
Dinitial_attestation.h.in123 * of the system. The value of the claim is an array of CBOR map
/trusted-firmware-m-3.6.0/docs/integration_guide/services/
Dtfm_attestation_integration_guide.rst100 of the claim is an array of CBOR map entries, with one entry per software