Home
last modified time | relevance | path

Searched refs:component (Results 1 – 25 of 41) sorted by relevance

12

/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/
Dtfm_fwu_req_mngr.c40 psa_fwu_component_t component; in tfm_fwu_start() local
52 if (msg->in_size[0] != sizeof(component)) { in tfm_fwu_start()
58 psa_read(msg->handle, 0, &component, sizeof(component)); in tfm_fwu_start()
60 if (component >= FWU_COMPONENT_NUMBER) { in tfm_fwu_start()
73 if (fwu_ctx[component].in_use) { in tfm_fwu_start()
74 if (fwu_ctx[component].component_state != PSA_FWU_READY) { in tfm_fwu_start()
79 status = fwu_bootloader_get_image_info(component, true, false, &info); in tfm_fwu_start()
88 status = fwu_bootloader_staging_area_init(component, in tfm_fwu_start()
94 fwu_ctx[component].in_use = true; in tfm_fwu_start()
95 fwu_ctx[component].component_state = PSA_FWU_WRITING; in tfm_fwu_start()
[all …]
DKconfig.comp8 menu "FWU component configs"
DKconfig37 Device support TRIAL component state.
/trusted-firmware-m-3.6.0/interface/src/
Dtfm_fwu_api.c12 psa_status_t psa_fwu_start(psa_fwu_component_t component, in psa_fwu_start() argument
17 { .base = &component, .len = sizeof(component) }, in psa_fwu_start()
25 psa_status_t psa_fwu_write(psa_fwu_component_t component, in psa_fwu_write() argument
31 { .base = &component, .len = sizeof(component) }, in psa_fwu_write()
40 psa_status_t psa_fwu_finish(psa_fwu_component_t component) in psa_fwu_finish() argument
43 { .base = &component, .len = sizeof(component) }, in psa_fwu_finish()
56 psa_status_t psa_fwu_cancel(psa_fwu_component_t component) in psa_fwu_cancel() argument
59 { .base = &component, .len = sizeof(component) }, in psa_fwu_cancel()
66 psa_status_t psa_fwu_clean(psa_fwu_component_t component) in psa_fwu_clean() argument
69 { .base = &component, .len = sizeof(component) }, in psa_fwu_clean()
[all …]
/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/bootloader/mcuboot/
Dtfm_mcuboot_fwu.c59 static psa_status_t get_active_image_version(psa_fwu_component_t component, in get_active_image_version() argument
80 (GET_FWU_MODULE(tlv_entry.tlv_type) == component)) { in get_active_image_version()
105 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component, in fwu_bootloader_staging_area_init() argument
112 if ((manifest_size != 0) || (component >= FWU_COMPONENT_NUMBER)) { in fwu_bootloader_staging_area_init()
116 if (flash_area_open(FLASH_AREA_IMAGE_SECONDARY(component), in fwu_bootloader_staging_area_init()
127 mcuboot_ctx[component].fap = fap; in fwu_bootloader_staging_area_init()
130 mcuboot_ctx[component].loaded_size = 0; in fwu_bootloader_staging_area_init()
135 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component, in fwu_bootloader_load_image() argument
142 if (block == NULL || component >= FWU_COMPONENT_NUMBER) { in fwu_bootloader_load_image()
147 if (mcuboot_ctx[component].fap != NULL) { in fwu_bootloader_load_image()
[all …]
/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/bootloader/
Dtfm_bootloader_fwu_abstraction.h51 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component,
77 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component,
142 psa_status_t fwu_bootloader_reject_staged_image(psa_fwu_component_t component);
156 psa_status_t fwu_bootloader_reject_trial_image(psa_fwu_component_t component);
165 psa_status_t fwu_bootloader_clean_component(psa_fwu_component_t component);
182 psa_status_t fwu_bootloader_get_image_info(psa_fwu_component_t component,
/trusted-firmware-m-3.6.0/interface/include/psa/
Dupdate.h181 psa_status_t psa_fwu_query(psa_fwu_component_t component,
194 psa_status_t psa_fwu_start(psa_fwu_component_t component,
214 psa_status_t psa_fwu_write(psa_fwu_component_t component,
226 psa_status_t psa_fwu_finish(psa_fwu_component_t component);
235 psa_status_t psa_fwu_cancel(psa_fwu_component_t component);
244 psa_status_t psa_fwu_clean(psa_fwu_component_t component);
Dinitial_attestation.h.in124 * entries, with one entry per software component within the
126 * evidence about the details of the software component.
129 * software component. Value is encoded as short(!) text
133 * component in memory at start-up time. The value must be a
144 * the measurement value of the software component is
Dfwu_config.h.in38 /* Whether TRIAL component state is supported or not. This is device specific
/trusted-firmware-m-3.6.0/docs/design_docs/services/
Dtfm_fwu_service.rst23 - Image preparation: prepare a new firmware image in the component's firmware store.
27 A typical flow through the component states is shown below [1]_.
32 :name: The component state model transitions.
111 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component,
117 The component is in READY state. Prepare the staging area of the component for image download.
122 - ``component``: The identifier of the target component in bootloader.
133 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component,
140 Load the image into the target component.
144 - ``component``: The identifier of the target component in bootloader.
181 Call this API to mark the TRIAL(running) image in component as confirmed to avoid
[all …]
/trusted-firmware-m-3.6.0/
DKconfig31 # These configs in this menu are local to a component or externally referenced
35 # Other configs above which are not in component menu are TF-M build options to
36 # select which file or component to include into compilation. These are options,
41 menu "TF-M component configs"
50 menu "Secure Partitions component configs"
/trusted-firmware-m-3.6.0/platform/ext/target/stm/common/secure_element/
DLICENSE.txt1 This software component is provided to you as part of a software package and
3 software component outside of a package or without applicable license terms,
/trusted-firmware-m-3.6.0/platform/ext/target/stm/common/stm32h5xx/hal/
DLICENSE.txt1 This software component is provided to you as part of a software package and
3 software component outside of a package or without applicable license terms,
/trusted-firmware-m-3.6.0/docs/configuration/
Dheader_file_system.rst7 The header file configurations system is used to fine-tune component options.
52 Each component can implement a ``config_<comp_name>_check.h`` to validate component specific config
Dindex.rst22 Specifies which file or component to include into compilation and build.
31 local to a component or externally referenced when components are coupled.
37 Originally, TF-M used CMake variables for both building and component tuning
39 component's configurations. To simplify and improve configurability and
41 :ref:`Header_configuration` and moved component options into a dedicated
Dkconfig_system.rst31 Contains component options in the header file system.
32 Component options are gathered together in a separate menu ``TF-M component configs`` in
/trusted-firmware-m-3.6.0/config/
Dtfm_fwu_config.cmake21 set(FWU_SUPPORT_TRIAL_STATE ON CACHE BOOL "Device support TRIAL component state.")
24 set(FWU_SUPPORT_TRIAL_STATE OFF CACHE BOOL "Device support TRIAL component state.")
/trusted-firmware-m-3.6.0/docs/
Dglossary.rst61 The TF-M component responsible for enumeration, management and isolation
66 The TF-M component responsible for Secure Partition runtime
75 A component within the TEE that is atomic from a security/trust point of
110 Hardware component providing isolation between Secure, Non-secure
121 Hardware component providing privilege control.
/trusted-firmware-m-3.6.0/bl2/ext/mcuboot/include/mcuboot_config/
Dmcuboot_config.h.in45 * - There are 5 allowed software component claims,
48 * of the software component with a maximum length of 12 bytes, which means
/trusted-firmware-m-3.6.0/secure_fw/partitions/platform/
DKconfig.comp8 menu "Platform partition component configs"
/trusted-firmware-m-3.6.0/secure_fw/partitions/crypto/
DKconfig20 Whether to enable the TF-M builtin key loader component. Without this, a
DKconfig.comp8 menu "Crypto component options"
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/
DKconfig.comp8 menu "Initial Attestation component options"
/trusted-firmware-m-3.6.0/secure_fw/spm/
DKconfig.comp10 menu "TF-M SPM component configs"
/trusted-firmware-m-3.6.0/docs/integration_guide/services/
Dtfm_crypto_integration_guide.rst27 dispatches them to the component that processes that particular API request
28 - A set of components that process cryptographic API requests, each component
159 disable modules at build time. Each define corresponds to a component as

12