| /trusted-firmware-m-latest/ |
| D | .gitattributes | 4 *.pdf binary 5 *.png binary
|
| D | license.rst | 3 Redistribution and use in source and binary forms, with or without modification, 8 - Redistributions in binary form must reproduce the above copyright notice, this
|
| /trusted-firmware-m-latest/platform/ext/target/nxp/common/Native_Driver/utilities/debug_console/ |
| D | fsl_debug_console.c | 166 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary,stack) ((binary) = xSemaphoreCreateBinaryStati… argument 168 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary) ((binary) = xSemaphoreCreateBinary()) argument 170 #define DEBUG_CONSOLE_DESTROY_BINARY_SEMAPHORE(binary) \ argument 173 if(NULL != (binary)) \ 175 vSemaphoreDelete((binary)); \ 176 (binary) = NULL; \ 179 #define DEBUG_CONSOLE_TAKE_BINARY_SEMAPHORE_BLOCKING(binary) ((void)xSemaphoreTake((binary), portMA… argument 180 #define DEBUG_CONSOLE_GIVE_BINARY_SEMAPHORE_FROM_ISR(binary) ((void)xSemaphoreGiveFromISR((binary),… argument 190 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary) (void)(binary) argument 191 #define DEBUG_CONSOLE_DESTROY_BINARY_SEMAPHORE(binary) (void)(binary) argument [all …]
|
| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/provisioning/ |
| D | provisioning_common_utils.py | 15 def patch_binary(binary, patch_bundle, offset): argument 16 return binary[:offset] + patch_bundle + binary[offset + len(patch_bundle):]
|
| /trusted-firmware-m-latest/bl1/config/ |
| D | bl1_config_default.cmake | 8 …SOURCE_DIR}/bl1/bl1_2/bl2_dummy_encryption_key.bin CACHE STRING "Path to binary key to use for enc… 9 … ${CMAKE_SOURCE_DIR}/bl1/bl1_1/dummy_guk.bin CACHE STRING "Path to binary GUK key file to pr… 12 … ${CMAKE_SOURCE_DIR}/bl1/bl1_2/bl1_dummy_rotpk CACHE FILEPATH "Path to binary BL2 signing privat…
|
| /trusted-firmware-m-latest/bl1/ |
| D | Kconfig | 18 Path to binary key to use for encrypting BL2 24 Path to binary GUK key file to provision 34 Path to binary BL2 signing private key
|
| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/examples/ |
| D | asset_icv_ce.cfg | 11 #unique-data = File holding the user unique data, in binary format. 14 #key-filename = File holding the encrypted Krtl, in binary format.
|
| D | asset_icv_cp.cfg | 11 #unique-data = File holding the user unique data, in binary format. 14 #key-filename = File holding the encrypted Krtl, in binary format.
|
| /trusted-firmware-m-latest/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_dm/ |
| D | dm_provisioning_config.cmake | 8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE) 9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE) 10 …l2_dummy_encryption_key.bin" CACHE FILEPATH "Path to key with which the BL2 binary enrypted" FORCE)
|
| /trusted-firmware-m-latest/bl1/bl1_2/ |
| D | signing_layout.c.in | 9 * for correct binary generation when nested macros are used
|
| /trusted-firmware-m-latest/lib/ext/t_cose/ |
| D | LICENSE | 6 Redistribution and use in source and binary forms, with or without 12 2. Redistributions in binary form must reproduce the above copyright notice,
|
| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/ |
| D | BSD-3-Clause.txt | 5 * Redistribution and use in source and binary forms, with or without modification, * 10 * 2. Redistributions in binary form must reproduce the above copyright notice, this *
|
| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/bl2/ |
| D | signing_layout_sic_tables.c.in | 9 * for correct binary generation when nested macros are used
|
| /trusted-firmware-m-latest/platform/ext/target/arm/corstone1000/bl1/ |
| D | signing_layout.c.in | 9 * for correct binary generation when nested macros are used
|
| /trusted-firmware-m-latest/docs/platform/arm/rse/rom_releases/2024-04/ |
| D | readme.rst | 36 If a ROM binary does not boot, it can be checked for this error using the 43 If there is no output, or the output is all zero-words, then the ROM binary is 44 affected by the issue. It is possible to fix a ROM binary affected by the
|
| /trusted-firmware-m-latest/bl2/ext/mcuboot/ |
| D | signing_layout.c.in | 9 * for correct binary generation when nested macros are used
|
| /trusted-firmware-m-latest/docs/platform/lairdconnectivity/bl5340_dvk_cpuapp/ |
| D | README.rst | 91 be merged together into a single binary. 100 Generate Intel hex files from the output binary (bin) files as follows: 104 …srec_cat install/outputs/LAIRDCONNECTIVITY/BL5340_DVK_CPUAPP/tfm_s_ns_signed.bin -binary --offset=… 133 Generate Intel hex files from the output binary (bin) files as follows: 137 …srec_cat install/outputs/LAIRDCONNECTIVITY/BL5340_DVK_CPUAPP/tfm_s_ns_signed.bin -binary --offset=…
|
| /trusted-firmware-m-latest/platform/ext/target/armchina/mps3/common/provisioning/ |
| D | provisioning_config.cmake | 8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE) 9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE)
|
| /trusted-firmware-m-latest/platform/ext/common/provisioning_bundle/ |
| D | provisioning_config.cmake | 8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE) 9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE)
|
| /trusted-firmware-m-latest/platform/ext/target/rpi/rp2350/ |
| D | linker_bl2.ld | 99 no reference to it *inside* the binary, as it is not called by the 101 leaves it to the binary to do anything more sophisticated.) However 125 /* Machine inspectable binary information */ 282 …ader_end - __logical_binary_start <= 1024, "Binary info must be in first 1024 bytes of the binary")
|
| /trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/utils/src/cc3x_asset_prov_rt/examples/ |
| D | asset_prov_se_512.cfg | 10 #key-filename = File holding the encrypted Kpicv, in binary format.
|
| /trusted-firmware-m-latest/docs/platform/arm/rse/ |
| D | readme.rst | 57 <binary infile> \ 58 <signed binary outfile> 80 binary and the ROM DMA Initial Command Sequence (ICS).:: 169 The RSE ROM binary should be placed in RSE ROM at ``0x11000000`` and the host 170 flash binary should be placed at the base of the host flash. For the TC
|
| /trusted-firmware-m-latest/docs/platform/nordic_nrf/nrf9160dk_nrf9160/ |
| D | README.rst | 80 together into a single binary. 89 Generate Intel hex files from the output binary (bin) files as follows: 93 srec_cat build_app/tfm_s_ns_signed.bin -binary --offset 0x10000 \
|
| /trusted-firmware-m-latest/docs/platform/nordic_nrf/nrf9161dk_nrf9161/ |
| D | README.rst | 80 together into a single binary. 89 Generate Intel hex files from the output binary (bin) files as follows: 93 srec_cat build_app/tfm_s_ns_signed.bin -binary --offset 0x10000 \
|
| /trusted-firmware-m-latest/cmake/ |
| D | spe-CMakeLists.cmake | 141 #Sign non-secure binary image with provided secret key 162 # Create concatenated binary image from the two independently signed 163 # binary file. This only uses the local assemble.py script (not from
|