/trusted-firmware-m-3.6.0/interface/include/psa/ |
D | initial_attestation.h.in | 56 * arrange this. Allowed length: 32, 48, 64 bytes. The claim is 58 * claim nonce. Until such a time as that standard exists, 59 * the claim will be represented by a custom claim. Value 64 * of the instance. The claim is modeled to be eventually 65 * represented by the EAT standard claim UEID of type GUID. 66 * Until such a time as that standard exists, the claim will be 67 * represented by a custom claim Value is encoded as byte 70 * - Verification service indicator: Optional, recommended claim. It is used by 74 * claim is modeled to be eventually represented by the EAT 75 * standard claim origination. Until such a time as that [all …]
|
/trusted-firmware-m-3.6.0/secure_fw/spm/include/boot/ |
D | tfm_boot_status.h | 128 #define SET_IAS_MINOR(sw_module, claim) \ argument 130 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS)) 140 #define SET_MBS_MINOR(slot_index, claim) \ argument 142 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS)) 149 #define SET_FWU_MINOR(sw_module, claim) \ argument 151 MASK_LEFT_SHIFT(claim, CLAIM_MASK, CLAIM_POS))
|
/trusted-firmware-m-3.6.0/docs/integration_guide/services/ |
D | tfm_attestation_integration_guide.rst | 35 The initial attestation token is formed of claims. A claim is a data item, 42 this. Allowed length: 32, 48, 64 bytes. The claim is modeled to be 43 eventually represented by the EAT standard claim nonce. Until such a 44 time as that standard exists, the claim will be represented by a custom 45 claim. Value is encoded as byte string. 55 The claim is modeled to be eventually represented by the EAT standard 56 claim UEID of type GUID. Until such a time as that standard exists, the 57 claim will be represented by a custom claim Value is encoded as byte 60 - **Verification service indicator**: Optional, recommended claim. It 63 or a URL specifying the address of the service. The claim is modelled to [all …]
|
/trusted-firmware-m-3.6.0/platform/ext/common/ |
D | boot_hal_bl1_1.c | 247 uint8_t claim; in boot_store_measurement() local 263 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement() 265 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
|
D | boot_hal_bl1_2.c | 278 uint8_t claim; in boot_store_measurement() local 294 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement() 296 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
|
D | boot_hal_bl2.c | 323 uint8_t claim; in boot_store_measurement() local 339 claim = lock_measurement ? SW_MEASURE_VALUE_NON_EXTENDABLE in boot_store_measurement() 341 minor_type = SET_MBS_MINOR(index, claim); in boot_store_measurement()
|
/trusted-firmware-m-3.6.0/bl2/src/ |
D | shared_data.c | 49 #define SET_FWU_MINOR(sw_module, claim) \ argument 51 (uint16_t)(claim & CLAIM_MASK))
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/ |
D | attest_boot_data.c | 164 uint8_t *claim, in attest_get_tlv_by_module() argument 196 *claim = GET_IAS_CLAIM(tlv_entry.tlv_type); in attest_get_tlv_by_module()
|
/trusted-firmware-m-3.6.0/bl2/ext/mcuboot/include/mcuboot_config/ |
D | mcuboot_config.h.in | 47 * Considering these aspects, the only claim which size can vary is the type
|
/trusted-firmware-m-3.6.0/docs/design_docs/dual-cpu/ |
D | mailbox_ns_agent_update.rst | 199 Hence it is safe to claim ``client_param_t`` instance as local variable. 384 easily by developers, for example, claim partitions as agents. Some
|
/trusted-firmware-m-3.6.0/platform/ext/target/cypress/psoc64/libs/core-lib/ |
D | LICENSE | 79 cross-claim or counterclaim in a lawsuit) alleging that the Work or a
|
D | EULA | 39 …r than for the Purpose. You hereby covenant that you will not assert any claim that the Software,…
|
/trusted-firmware-m-3.6.0/docs/design_docs/services/ |
D | symmetric_initial_attest.rst | 204 Instance ID claim
|
/trusted-firmware-m-3.6.0/docs/configuration/profiles/ |
D | tfm_profile_small.rst | 447 same generations of token claims, except Instance ID claim.
|