Home
last modified time | relevance | path

Searched refs:delay (Results 1 – 5 of 5) sorted by relevance

/trusted-firmware-m-3.6.0/lib/fih/inc/
Dfih.h173 volatile uint32_t delay = FIH_NEGATIVE_VALUE; in fih_delay() local
176 delay = fih_delay_random(); in fih_delay()
178 if (delay == FIH_NEGATIVE_VALUE) { in fih_delay()
182 delay &= 0xFF; in fih_delay()
184 for (i = 0; i < delay; i++) { in fih_delay()
188 if (counter != delay) { in fih_delay()
/trusted-firmware-m-3.6.0/docs/design_docs/
Dtfm_physical_attack_mitigation.rst138 relevant condition twice (it is better to have a random delay between the
141 - Random delay
144 random delay to the code execution makes the timing of an attack much
157 delay can be inserted between duplicated executions.
462 | Random delay | | | Y | Implemented, but |
481 checks and variables, random delay, complex constant) according to the profile
527 - The most powerful mitigation technique is to add random delay to the code
/trusted-firmware-m-3.6.0/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/
Dnavtree.js301 n.addClass('glow').delay(duration).queue(function(next){
Djquery.js44 …}})},dequeue:function(e){return this.each(function(){b.dequeue(this,e)})},delay:function(bv,e){bv=…
81delay:0},_mouseInit:function(){var d=this;this.element.bind("mousedown."+this.widgetName,function(…
89delay=50;g[c]=$.extend(g[c],{setup:function(){if(d){return false}$(f.start)},teardown:function(){i…
96 …if(!S.data(e)){return}if(c.isTipOpen){if(!c.isClosing){K(c.activeHover)}O.delay(100).queue(functio…
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/host/src/tests/integration_cc3x/runtime_integration_test/
Dstackinfo1460 delay 14 0