Home
last modified time | relevance | path

Searched refs:claim (Results 1 – 14 of 14) sorted by relevance

/trusted-firmware-m-3.6.0/interface/include/psa/
Dinitial_attestation.h.in56 * arrange this. Allowed length: 32, 48, 64 bytes. The claim is
58 * claim nonce. Until such a time as that standard exists,
59 * the claim will be represented by a custom claim. Value
64 * of the instance. The claim is modeled to be eventually
65 * represented by the EAT standard claim UEID of type GUID.
66 * Until such a time as that standard exists, the claim will be
67 * represented by a custom claim Value is encoded as byte
70 * - Verification service indicator: Optional, recommended claim. It is used by
74 * claim is modeled to be eventually represented by the EAT
75 * standard claim origination. Until such a time as that
[all …]
/trusted-firmware-m-3.6.0/secure_fw/spm/include/boot/
Dtfm_boot_status.h128 #define SET_IAS_MINOR(sw_module, claim) \ argument
130 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS))
140 #define SET_MBS_MINOR(slot_index, claim) \ argument
142 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS))
149 #define SET_FWU_MINOR(sw_module, claim) \ argument
151 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS))
/trusted-firmware-m-3.6.0/docs/integration_guide/services/
Dtfm_attestation_integration_guide.rst35 The initial attestation token is formed of claims. A claim is a data item,
42 this. Allowed length: 32, 48, 64 bytes. The claim is modeled to be
43 eventually represented by the EAT standard claim nonce. Until such a
44 time as that standard exists, the claim will be represented by a custom
45 claim. Value is encoded as byte string.
55 The claim is modeled to be eventually represented by the EAT standard
56 claim UEID of type GUID. Until such a time as that standard exists, the
57 claim will be represented by a custom claim Value is encoded as byte
60 - **Verification service indicator**: Optional, recommended claim. It
63 or a URL specifying the address of the service. The claim is modelled to
[all …]
/trusted-firmware-m-3.6.0/platform/ext/common/
Dboot_hal_bl1_1.c247 uint8_t claim; in boot_store_measurement() local
263 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement()
265 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
Dboot_hal_bl1_2.c278 uint8_t claim; in boot_store_measurement() local
294 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement()
296 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
Dboot_hal_bl2.c323 uint8_t claim; in boot_store_measurement() local
339 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement()
341 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
/trusted-firmware-m-3.6.0/bl2/src/
Dshared_data.c49 #define SET_FWU_MINOR(sw_module, claim) \ argument
51 (uint16_t)(claim & CLAIM_MASK))
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/
Dattest_boot_data.c164 uint8_t *claim, in attest_get_tlv_by_module() argument
196 *claim = GET_IAS_CLAIM(tlv_entry.tlv_type); in attest_get_tlv_by_module()
/trusted-firmware-m-3.6.0/bl2/ext/mcuboot/include/mcuboot_config/
Dmcuboot_config.h.in47 * Considering these aspects, the only claim which size can vary is the type
/trusted-firmware-m-3.6.0/docs/design_docs/dual-cpu/
Dmailbox_ns_agent_update.rst199 Hence it is safe to claim ``client_param_t`` instance as local variable.
384 easily by developers, for example, claim partitions as agents. Some
/trusted-firmware-m-3.6.0/platform/ext/target/cypress/psoc64/libs/core-lib/
DLICENSE79 cross-claim or counterclaim in a lawsuit) alleging that the Work or a
DEULA39 …r than for the Purpose. You hereby covenant that you will not assert any claim that the Software,…
/trusted-firmware-m-3.6.0/docs/design_docs/services/
Dsymmetric_initial_attest.rst204 Instance ID claim
/trusted-firmware-m-3.6.0/docs/configuration/profiles/
Dtfm_profile_small.rst447 same generations of token claims, except Instance ID claim.