Home
last modified time | relevance | path

Searched refs:bytes (Results 1 – 25 of 102) sorted by relevance

12345

/trusted-firmware-m-3.7.0/platform/ext/target/lairdconnectivity/common/core/cmsis_drivers/
DDriver_QSPI.c159 uint32_t bytes = cnt * data_width_byte[DriverCapabilities.data_width]; in ARM_QSPI_Flash_ReadData() local
176 bytes -= needed; in ARM_QSPI_Flash_ReadData()
179 while (bytes > 0) in ARM_QSPI_Flash_ReadData()
184 if (bytes < read_size) in ARM_QSPI_Flash_ReadData()
186 read_size = bytes; in ARM_QSPI_Flash_ReadData()
187 save_size = bytes; in ARM_QSPI_Flash_ReadData()
204 bytes -= save_size; in ARM_QSPI_Flash_ReadData()
216 uint32_t bytes = cnt * data_width_byte[DriverCapabilities.data_width]; in ARM_QSPI_Flash_ProgramData() local
223 if (!is_range_valid(addr, bytes)) { in ARM_QSPI_Flash_ProgramData()
230 __ALIGN(4) uint8_t baRAMDataBuffer[bytes]; in ARM_QSPI_Flash_ProgramData()
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/
Dderive_cm_and_dm_keys.py18 bytes(32 + 4),
24 state = struct_pack([krtl_derivation_label.encode('ascii') + bytes(1),
25 bytes(1), context,
31 output_key = bytes(0);
37 krtl_derivation_label.encode('ascii') + bytes(1),
38 bytes(1), context,
Dprovisioning_common_utils.py30 return (bytes(struct.pack(defstring, *objects)))
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/
Dcreate_provisioning_bundle.py25 return (bytes(struct.pack(defstring, *objects)))
60 rwdata = bytes(0)
65 rodata = bytes(0)
80 bl2_signed_hash = bytes(0)
86 bl1_2_padded_hash = bytes(0)
92 bl1_2 = bytes(0)
111 bytes(16), # Replace with GCM TAG
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/
Dcreate_provisioning_bundle.py25 return (bytes(struct.pack(defstring, *objects)))
71 rwdata = bytes(0)
76 rodata = bytes(0)
89 bl1_2_padded_hash = bytes(0)
95 bl1_2 = bytes(0)
113 bytes(16), # Replace with GCM TAG
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/
Dcreate_provisioning_bundle.py25 return (bytes(struct.pack(defstring, *objects)))
71 rwdata = bytes(0)
76 rodata = bytes(0)
89 bl1_2_padded_hash = bytes(0)
95 bl1_2 = bytes(0)
113 bytes(16), # Replace with GCM TAG
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/common/core/cmsis_drivers/
DDriver_Flash.c104 uint32_t bytes = cnt * ARM_FLASH_CAPABILITIES_DATA_WIDTH_SIZE; in ARM_Flash_ReadData() local
106 if (!is_range_valid(addr, bytes)) { in ARM_Flash_ReadData()
110 memcpy(data, (const void *)addr, bytes); in ARM_Flash_ReadData()
119 uint32_t bytes = cnt * ARM_FLASH_CAPABILITIES_DATA_WIDTH_SIZE; in ARM_Flash_ProgramData() local
126 if (!is_range_valid(addr, bytes)) { in ARM_Flash_ProgramData()
/trusted-firmware-m-3.7.0/bl1/bl1_2/scripts/
Dcreate_bl2_img.py32 return (bytes(struct.pack(defstring, *objects)))
52 state = struct_pack(["BL2_DECRYPTION_KEY".encode('ascii') + bytes(1),
53 bytes(1), security_counter,
59 output_key = bytes(0);
65 "BL2_DECRYPTION_KEY".encode('ascii') + bytes(1),
66 bytes(1), security_counter,
81 "BL2_DECRYPTION_KEY".encode('ascii') + bytes(1),
85 output_key = bytes(0)
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/bundle_dm/
Dcreate_dm_provisioning_bundle.py63 send_table_bytes = bytes(0)
68 receive_table_bytes = bytes(0)
95 data = bytes(0);
106 rse_id = bytes(0)
123 send_table = bytes(4)
124 receive_table = bytes(4)
/trusted-firmware-m-3.7.0/secure_fw/spm/core/
Dpsa_read_write_skip_api.c18 size_t bytes, remaining; in tfm_spm_partition_psa_read() local
74 bytes = num_bytes < remaining ? num_bytes : remaining; in tfm_spm_partition_psa_read()
77 handle->invec_accessed[invec_idx], bytes); in tfm_spm_partition_psa_read()
80 handle->invec_accessed[invec_idx] += bytes; in tfm_spm_partition_psa_read()
82 return bytes; in tfm_spm_partition_psa_read()
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/bundle_cm/
Dcreate_cm_provisioning_bundle.py39 data = bytes(0)
48 bl1_2_padded_hash = bytes(0)
54 bl1_2 = bytes(0)
63 otp_dma_ics = struct_pack([otp_ics_zero_count, bytes(4), otp_dma_ics])
/trusted-firmware-m-3.7.0/interface/include/psa/
Dfwu_config.h.in27 /* The maximum size of an image digest in bytes. This is dependent
32 /* The maximum permitted size for block in psa_fwu_write(), in bytes. */
35 /* The maximum permitted size for manifest in psa_fwu_start(), in bytes. */
Dinitial_attestation.h.in29 * The allowed size of input challenge in bytes: 32, 48, 64
56 * arrange this. Allowed length: 32, 48, 64 bytes. The claim is
119 * sessions. The size is 32 bytes. Custom claim with a value is
162 * \ref PSA_INITIAL_ATTEST_TOKEN_SIZE bytes
164 * \param[in] challenge_size Size of challenge object in bytes.
167 * \param[in] token_buf_size Size of allocated buffer for token, in bytes.
169 * bytes.
181 * \brief Get the exact size of initial attestation token in bytes.
186 * \param[in] challenge_size Size of challenge object in bytes. This must be
188 * \param[out] token_size Size of the token in bytes, which is created by
/trusted-firmware-m-3.7.0/platform/ext/target/arm/drivers/qspi/xilinx_pg153_axi/
Dxilinx_pg153_axi_qspi_controller_drv.c70 uint8_t *send_buffer, uint8_t *rcv_buffer, uint32_t bytes) in spi_transfer_and_receive() argument
85 if ((bytes == 0) || (bytes > PAGE_SIZE)) { in spi_transfer_and_receive()
100 for (uint32_t i = 0; i < bytes; i++) { in spi_transfer_and_receive()
Dxilinx_pg153_axi_qspi_controller_drv.h68 uint8_t *send_buffer, uint8_t *rcv_buffer, uint32_t bytes);
/trusted-firmware-m-3.7.0/docs/security/security_advisories/
Dfwu_write_vulnerability.rst41 * in bytes
54 the input data into the device. In this API, the ``block_size`` bytes
55 input data (in ``block`` argument) is read into a ``1024 bytes`` local
58 of the local buffer with ``block_size`` bytes would be overwritten by the input
Dcc3xx_partial_tag_compare_on_chacha20_poly1305.rst24 | | as authentic by comparing only the first 4 bytes of the |
25 | | authentication tag instead of the full length of 16 bytes |
82 mismatch during verification. For Chacha20-Poly1305, the tag size is 16 bytes.
102 buffer containing the tag is only partially verified (the first 4 bytes only
103 instead of the full 16 bytes). This allows for the possibility of unauthenticated
119 The verification of the authentication tag must happen on the full 16 bytes of
120 instead of just the first 4 bytes. This means that loop that currently performs
/trusted-firmware-m-3.7.0/config/
Dtfm_fwu_config.cmake16 … 1024 CACHE STRING "The maximum permitted size for block in psa_fwu_write, in bytes.")
17 … CACHE STRING "The maximum permitted size for manifest in psa_fwu_start(), in bytes.")
/trusted-firmware-m-3.7.0/bl1/bl1_1/scripts/
Dcreate_provisioning_bundle.py21 return (bytes(struct.pack(defstring, *objects)))
53 bl1_rotpk_0 = bytes(56)
Dcreate_bl1_2_img.py30 return (bytes(struct.pack(defstring, *objects)))
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_cm/
Dcm_create_provisioning_data.py31 sam_config = hex_to_c_array(bytes(23))
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/examples/
Dasset_icv_ce.cfg13 … If ICV doesn't define HBK0 in the device it is recommanded to use 16 bytes random data
Dasset_icv_cp.cfg13 … If ICV doesn't define HBK0 in the device it is recommanded to use 16 bytes random data
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/common/
Ddmpu_util_helper.py120 FileObj.write(bytes(binStr.encode('iso-8859-1')))
/trusted-firmware-m-3.7.0/docs/design_docs/services/
Dtfm_its_512_flash.rst61 order the bytes are written on the physical device, is hardware dependent.
64 incomplete program operations, as well as write bytes in a sequential order.

12345