/trusted-firmware-m-3.7.0/platform/ext/target/lairdconnectivity/common/core/cmsis_drivers/ |
D | Driver_QSPI.c | 159 uint32_t bytes = cnt * data_width_byte[DriverCapabilities.data_width]; in ARM_QSPI_Flash_ReadData() local 176 bytes -= needed; in ARM_QSPI_Flash_ReadData() 179 while (bytes > 0) in ARM_QSPI_Flash_ReadData() 184 if (bytes < read_size) in ARM_QSPI_Flash_ReadData() 186 read_size = bytes; in ARM_QSPI_Flash_ReadData() 187 save_size = bytes; in ARM_QSPI_Flash_ReadData() 204 bytes -= save_size; in ARM_QSPI_Flash_ReadData() 216 uint32_t bytes = cnt * data_width_byte[DriverCapabilities.data_width]; in ARM_QSPI_Flash_ProgramData() local 223 if (!is_range_valid(addr, bytes)) { in ARM_QSPI_Flash_ProgramData() 230 __ALIGN(4) uint8_t baRAMDataBuffer[bytes]; in ARM_QSPI_Flash_ProgramData() [all …]
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/ |
D | derive_cm_and_dm_keys.py | 18 bytes(32 + 4), 24 state = struct_pack([krtl_derivation_label.encode('ascii') + bytes(1), 25 bytes(1), context, 31 output_key = bytes(0); 37 krtl_derivation_label.encode('ascii') + bytes(1), 38 bytes(1), context,
|
D | provisioning_common_utils.py | 30 return (bytes(struct.pack(defstring, *objects)))
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/ |
D | create_provisioning_bundle.py | 25 return (bytes(struct.pack(defstring, *objects))) 60 rwdata = bytes(0) 65 rodata = bytes(0) 80 bl2_signed_hash = bytes(0) 86 bl1_2_padded_hash = bytes(0) 92 bl1_2 = bytes(0) 111 bytes(16), # Replace with GCM TAG
|
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/ |
D | create_provisioning_bundle.py | 25 return (bytes(struct.pack(defstring, *objects))) 71 rwdata = bytes(0) 76 rodata = bytes(0) 89 bl1_2_padded_hash = bytes(0) 95 bl1_2 = bytes(0) 113 bytes(16), # Replace with GCM TAG
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/ |
D | create_provisioning_bundle.py | 25 return (bytes(struct.pack(defstring, *objects))) 71 rwdata = bytes(0) 76 rodata = bytes(0) 89 bl1_2_padded_hash = bytes(0) 95 bl1_2 = bytes(0) 113 bytes(16), # Replace with GCM TAG
|
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/common/core/cmsis_drivers/ |
D | Driver_Flash.c | 104 uint32_t bytes = cnt * ARM_FLASH_CAPABILITIES_DATA_WIDTH_SIZE; in ARM_Flash_ReadData() local 106 if (!is_range_valid(addr, bytes)) { in ARM_Flash_ReadData() 110 memcpy(data, (const void *)addr, bytes); in ARM_Flash_ReadData() 119 uint32_t bytes = cnt * ARM_FLASH_CAPABILITIES_DATA_WIDTH_SIZE; in ARM_Flash_ProgramData() local 126 if (!is_range_valid(addr, bytes)) { in ARM_Flash_ProgramData()
|
/trusted-firmware-m-3.7.0/bl1/bl1_2/scripts/ |
D | create_bl2_img.py | 32 return (bytes(struct.pack(defstring, *objects))) 52 state = struct_pack(["BL2_DECRYPTION_KEY".encode('ascii') + bytes(1), 53 bytes(1), security_counter, 59 output_key = bytes(0); 65 "BL2_DECRYPTION_KEY".encode('ascii') + bytes(1), 66 bytes(1), security_counter, 81 "BL2_DECRYPTION_KEY".encode('ascii') + bytes(1), 85 output_key = bytes(0)
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/bundle_dm/ |
D | create_dm_provisioning_bundle.py | 63 send_table_bytes = bytes(0) 68 receive_table_bytes = bytes(0) 95 data = bytes(0); 106 rse_id = bytes(0) 123 send_table = bytes(4) 124 receive_table = bytes(4)
|
/trusted-firmware-m-3.7.0/secure_fw/spm/core/ |
D | psa_read_write_skip_api.c | 18 size_t bytes, remaining; in tfm_spm_partition_psa_read() local 74 bytes = num_bytes < remaining ? num_bytes : remaining; in tfm_spm_partition_psa_read() 77 handle->invec_accessed[invec_idx], bytes); in tfm_spm_partition_psa_read() 80 handle->invec_accessed[invec_idx] += bytes; in tfm_spm_partition_psa_read() 82 return bytes; in tfm_spm_partition_psa_read()
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/bundle_cm/ |
D | create_cm_provisioning_bundle.py | 39 data = bytes(0) 48 bl1_2_padded_hash = bytes(0) 54 bl1_2 = bytes(0) 63 otp_dma_ics = struct_pack([otp_ics_zero_count, bytes(4), otp_dma_ics])
|
/trusted-firmware-m-3.7.0/interface/include/psa/ |
D | fwu_config.h.in | 27 /* The maximum size of an image digest in bytes. This is dependent 32 /* The maximum permitted size for block in psa_fwu_write(), in bytes. */ 35 /* The maximum permitted size for manifest in psa_fwu_start(), in bytes. */
|
D | initial_attestation.h.in | 29 * The allowed size of input challenge in bytes: 32, 48, 64 56 * arrange this. Allowed length: 32, 48, 64 bytes. The claim is 119 * sessions. The size is 32 bytes. Custom claim with a value is 162 * \ref PSA_INITIAL_ATTEST_TOKEN_SIZE bytes 164 * \param[in] challenge_size Size of challenge object in bytes. 167 * \param[in] token_buf_size Size of allocated buffer for token, in bytes. 169 * bytes. 181 * \brief Get the exact size of initial attestation token in bytes. 186 * \param[in] challenge_size Size of challenge object in bytes. This must be 188 * \param[out] token_size Size of the token in bytes, which is created by
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/drivers/qspi/xilinx_pg153_axi/ |
D | xilinx_pg153_axi_qspi_controller_drv.c | 70 uint8_t *send_buffer, uint8_t *rcv_buffer, uint32_t bytes) in spi_transfer_and_receive() argument 85 if ((bytes == 0) || (bytes > PAGE_SIZE)) { in spi_transfer_and_receive() 100 for (uint32_t i = 0; i < bytes; i++) { in spi_transfer_and_receive()
|
D | xilinx_pg153_axi_qspi_controller_drv.h | 68 uint8_t *send_buffer, uint8_t *rcv_buffer, uint32_t bytes);
|
/trusted-firmware-m-3.7.0/docs/security/security_advisories/ |
D | fwu_write_vulnerability.rst | 41 * in bytes 54 the input data into the device. In this API, the ``block_size`` bytes 55 input data (in ``block`` argument) is read into a ``1024 bytes`` local 58 of the local buffer with ``block_size`` bytes would be overwritten by the input
|
D | cc3xx_partial_tag_compare_on_chacha20_poly1305.rst | 24 | | as authentic by comparing only the first 4 bytes of the | 25 | | authentication tag instead of the full length of 16 bytes | 82 mismatch during verification. For Chacha20-Poly1305, the tag size is 16 bytes. 102 buffer containing the tag is only partially verified (the first 4 bytes only 103 instead of the full 16 bytes). This allows for the possibility of unauthenticated 119 The verification of the authentication tag must happen on the full 16 bytes of 120 instead of just the first 4 bytes. This means that loop that currently performs
|
/trusted-firmware-m-3.7.0/config/ |
D | tfm_fwu_config.cmake | 16 … 1024 CACHE STRING "The maximum permitted size for block in psa_fwu_write, in bytes.") 17 … CACHE STRING "The maximum permitted size for manifest in psa_fwu_start(), in bytes.")
|
/trusted-firmware-m-3.7.0/bl1/bl1_1/scripts/ |
D | create_provisioning_bundle.py | 21 return (bytes(struct.pack(defstring, *objects))) 53 bl1_rotpk_0 = bytes(56)
|
D | create_bl1_2_img.py | 30 return (bytes(struct.pack(defstring, *objects)))
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_cm/ |
D | cm_create_provisioning_data.py | 31 sam_config = hex_to_c_array(bytes(23))
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/examples/ |
D | asset_icv_ce.cfg | 13 … If ICV doesn't define HBK0 in the device it is recommanded to use 16 bytes random data
|
D | asset_icv_cp.cfg | 13 … If ICV doesn't define HBK0 in the device it is recommanded to use 16 bytes random data
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/common/ |
D | dmpu_util_helper.py | 120 FileObj.write(bytes(binStr.encode('iso-8859-1')))
|
/trusted-firmware-m-3.7.0/docs/design_docs/services/ |
D | tfm_its_512_flash.rst | 61 order the bytes are written on the physical device, is hardware dependent. 64 incomplete program operations, as well as write bytes in a sequential order.
|