Home
last modified time | relevance | path

Searched refs:code (Results 1 – 25 of 270) sorted by relevance

1234567891011

/trusted-firmware-m-3.7.0/docs/design_docs/software/
Dcode_sharing.rst19 environment. In the current TF-M code base, both firmware components use the
23 firmware component. As a result of this workflow, the same code is placed in the
24 flash twice. For example, the code for the SHA-256 algorithm is included in
25 MCUboot, but the exact same code is duplicated in the SPE cryptography
27 and the SPE, because both are part of the PRoT code and run in the secure
28 domain. So, in theory, the code of the common cryptographic algorithms could be
30 code footprint, because the cryptographic algorithms are usually flash hungry.
41 space is how to share code between independently linked XIP applications that
43 function and global data memory addresses. In this case, the code is not
45 that can perform code relocation. Also, the lack of an MMU makes the address
[all …]
Dhardware_abstraction_layer.rst127 This is a status code to be used as the return type of :term:`HAL` APIs.
129 .. code-block:: c
146 Here is the general list. The detailed usages for each error code are described
151 Status code to indicate general success.
155 Status code to indicate an error that does not correspond to any defined failure
160 Status code to indicate that the module is not initialed.
164 Status code to indicate that the input is invalid.
168 Status code to indicate that the requested operation or a parameter is not
173 Status code to indicate that the requested action cannot be performed in the
178 Status code to indicate that the current number has got the max value.
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32l5xx/bl2/
Dboot_hal_bl2.c66 #pragma arm section code = ".BL2_NoHdp_Code"
98 #pragma arm section code
105 #pragma arm section code = ".BL2_NoHdp_Code"
145 #pragma arm section code
152 #pragma arm section code = ".BL2_NoHdp_Code"
177 #pragma arm section code
328 #pragma arm section code = ".BL2_Error_Code"
365 #pragma arm section code
/trusted-firmware-m-3.7.0/platform/ext/accelerator/cc312/cc312-rom/
Dcc3xx_lcs.c16 uint32_t code = 0; in cc3xx_lowlevel_lcs_get() local
25 code = P_CC3XX->nvm.lcs_reg & 0b111U; in cc3xx_lowlevel_lcs_get()
27 switch (code) { in cc3xx_lowlevel_lcs_get()
/trusted-firmware-m-3.7.0/docs/getting_started/
Dtfm_getting_started.rst21 Trusted Firmware M source code is available on
63 .. code-block:: bash
70 .. code-block:: bash
80 .. code-block:: bash
100 .. code-block:: bash
108 Clone the TF-M source code, and then install the TF-M's additional Python
115 1. get the TF-M source code:
117 .. code-block:: bash
124 .. code-block:: bash
132 1. get the TF-M source code:
[all …]
/trusted-firmware-m-3.7.0/docs/platform/arm/rse/rom_releases/2024-04/
Dreadme.rst18 - Support for hardware lifecycle management and provisioning using code and
31 address for the DMA ICS concatenation with the ROM code. The build
39 .. code-block:: bash
47 .. code-block:: bash
56 .. code-block:: bash
65 .. code-block:: bash
71 .. code-block:: bash
77 .. code-block:: bash
110 .. code-block:: bash
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/provisioning/
Dprovisioning_common_utils.py32 def encrypt_bundle(code, code_pad, values, values_pad, data, argument
34 code = struct_pack([code], pad_to=code_pad)
45 code,
/trusted-firmware-m-3.7.0/docs/contributing/
Ddoc_guidelines.rst51 (code, underline, strike-through etc)
81 .. code-block:: restructuredtext
103 The recommendation for code content, is to use the explicit code-block directive,
108 .. code-block:: restructuredtext
110 .. code-block:: bash
115 .. code-block:: doscon
119 .. code-block:: c
123 .. code-block:: python3
128 Restructured Text supports implicit code-blocks by indenting a section of text,
132 .. code-block:: restructuredtext
[all …]
Dcoding_guide.rst13 TF-M also reuses code from other SW projects, e.g. ``CMSIS_5``, which
14 means some areas of code may have different styles. We use common sense approach
15 and new code may inherit coding style from external projects but it needs to
32 The code needs to be consistent with itself, so if existing code in the file
49 - No trailing spaces in code.
59 - Do not use typedef for other constructs as it obfuscates code.
62 - Use enumeration for error codes to keep the code readable.
75 - Do not code while eating.
Dtfm_design_proposal_guideline.rst7 contributors can focus more on actual code implementation and iteration.
11 The design details can be discussed via code reviews of actual implementations.
37 …state "Upstream changes" as upload : Contributors upstream code patch\nand integration guide to ge…
56 or TF-M tech forum, before or while the code implementation is under review.
63 will help reviewers understand the design much better and expedite the code
70 deliberate over design and implementation details via code review.
73 TF-M gerrit [3]_ for code review.
85 - If it requires additional reviewers besides code owners and maintainers,
89 - Authors shall put essential comments and notes in code for the code changes.
/trusted-firmware-m-3.7.0/docs/design_docs/dual-cpu/
Dbooting_a_dual_core_system.rst43 - The secure code will make a platform-specific call immediately after setting
47 code to start running, so starting it here ensures system integrity while
48 also giving the non-secure code the maximum amount of time to perform its
56 - Both the secure and non-secure code will make platform-specific calls to
60 secure code jumps to the non-secure code, and at the very start of the
61 non-secure code.
64 single core system, it would jump to the non-secure code), the main thread on
76 initialization code, at different speeds, the design must be resilient if
98 .. code-block:: c
105 - Performs the necessary actions to start the non-secure core running the code
[all …]
Dmailbox_design_on_dual_core_system.rst266 The pseudo code below shows a reference implementation of
269 .. code-block:: c
512 .. code-block:: c
522 .. code-block:: c
532 .. code-block:: c
542 .. code-block:: c
552 .. code-block:: c
562 .. code-block:: c
572 .. code-block:: c
582 .. code-block:: c
[all …]
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CA7/RTE/Device/ARMCA7/
DARMCA7.sct8 ; This scatter-file places application code, data, stack and heap at suitable addresses in the memo…
18 * (RESET, +FIRST) ; Vector table and other startup code
19 * (InRoot$$Sections) ; All (library) code that must be in a root region
20 * (+RO-CODE) ; Application RO code (.text)
DARMCA7_ac6.sct6 * (RESET, +FIRST) ; Vector table and other startup code
7 * (InRoot$$Sections) ; All (library) code that must be in a root region
8 * (+RO-CODE) ; Application RO code (.text)
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CA9/RTE/Device/ARMCA9/
DARMCA9.sct8 ; This scatter-file places application code, data, stack and heap at suitable addresses in the memo…
18 * (RESET, +FIRST) ; Vector table and other startup code
19 * (InRoot$$Sections) ; All (library) code that must be in a root region
20 * (+RO-CODE) ; Application RO code (.text)
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/Core/Template/Device_A/Config/
DDevice_ac6.sct8 ; This scatter-file places application code, data, stack and heap at suitable addresses in the memo…
16 * (RESET, +FIRST) ; Vector table and other startup code
17 * (InRoot$$Sections) ; All (library) code that must be in a root region
18 * (+RO-CODE) ; Application RO code (.text)
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/
Dcreate_provisioning_bundle.py63 code = code_section.data() variable
102 code = struct_pack([code], variable
111 code,
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/
Dcreate_provisioning_bundle.py63 code = code_section.data() variable
102 code = struct_pack([code], variable
111 code,
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32u5xx/Device/Source/armclang/
Dtfm_common_s.sct23 /**** This initial section contains common code for secure binary */
45 * of PSA RoT code.
58 * of PSA RoT code.
62 /**** Unprivileged Secure code start here */
69 * of TFM unprivileged code.
77 * of APP RoT code.
90 * of APP RoT code.
212 * No code will be placed here, just address of this region is used in the
213 * secure code to configure certain HW components. This generates an empty
223 * No code will be placed here, just address of this region is used in the
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/stm32h5xx/Device/Source/armclang/
Dtfm_common_s.sct23 /**** This initial section contains common code for secure binary */
45 * of PSA RoT code.
58 * of PSA RoT code.
62 /**** Unprivileged Secure code start here */
70 * of TFM unprivileged code.
78 * of APP RoT code.
91 * of APP RoT code.
213 * No code will be placed here, just address of this region is used in the
214 * secure code to configure certain HW components. This generates an empty
224 * No code will be placed here, just address of this region is used in the
[all …]
/trusted-firmware-m-3.7.0/platform/ext/common/armclang/
Dtfm_common_s.sct28 /* Position tag: code + RO-data */
31 /**** This initial section contains common code for secure binary */
60 /**** Unprivileged Secure code start here */
67 * of TFM unprivileged code.
87 * of PSA RoT code.
100 * of PSA RoT code.
108 * of APP RoT code.
121 * of APP RoT code.
127 /* Flash drivers code that gets copied from Flash */
168 /* The code sharing between bootloader and runtime requires to share the
[all …]
/trusted-firmware-m-3.7.0/docs/integration_guide/source_structure/
Dplatform_folder.rst18 to is allocated by the platform code. The pointer gets stored in the partitions
46 Before calling ``main()``, platform startup code should initialise all system
49 architecture code will check and initialise them:
63 - `DAUTH_NS_ONLY`: Invasive and non invasive debugging of non-secure code is
66 code is enabled.
87 The code in this folder is created as a part of the TF-M project therefore it
92 This folder contains code that has been imported from other projects so it may
/trusted-firmware-m-3.7.0/docs/platform/cypress/psoc64/
Dcypress_psoc64_spec.rst18 Please also make sure that all the source code are fetched by following
24 .. code-block:: bash
72 .. code-block:: bash
90 .. code-block:: bash
109 .. code-block:: bash
128 .. code-block:: bash
147 .. code-block:: bash
167 .. code-block:: bash
221 .. code-block:: bash
228 .. code-block:: bash
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/
Dcreate_provisioning_bundle.py52 code = code_section.data() variable
100 code = struct_pack([code], variable
109 code,
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/CoreValidation/Layer/Target/CA5/RTE/Device/ARMCA5/
DARMCA5_ac6.sct6 * (RESET, +FIRST) ; Vector table and other startup code
7 * (InRoot$$Sections) ; All (library) code that must be in a root region
8 * (+RO-CODE) ; Application RO code (.text)

1234567891011