Home
last modified time | relevance | path

Searched refs:binary (Results 1 – 25 of 92) sorted by relevance

1234

/trusted-firmware-m-latest/
D.gitattributes4 *.pdf binary
5 *.png binary
Dlicense.rst3 Redistribution and use in source and binary forms, with or without modification,
8 - Redistributions in binary form must reproduce the above copyright notice, this
/trusted-firmware-m-latest/platform/ext/target/nxp/common/Native_Driver/utilities/debug_console/
Dfsl_debug_console.c166 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary,stack) ((binary) = xSemaphoreCreateBinaryStati… argument
168 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary) ((binary) = xSemaphoreCreateBinary()) argument
170 #define DEBUG_CONSOLE_DESTROY_BINARY_SEMAPHORE(binary) \ argument
173 if(NULL != (binary)) \
175 vSemaphoreDelete((binary)); \
176 (binary) = NULL; \
179 #define DEBUG_CONSOLE_TAKE_BINARY_SEMAPHORE_BLOCKING(binary) ((void)xSemaphoreTake((binary), portMA… argument
180 #define DEBUG_CONSOLE_GIVE_BINARY_SEMAPHORE_FROM_ISR(binary) ((void)xSemaphoreGiveFromISR((binary),… argument
190 #define DEBUG_CONSOLE_CREATE_BINARY_SEMAPHORE(binary) (void)(binary) argument
191 #define DEBUG_CONSOLE_DESTROY_BINARY_SEMAPHORE(binary) (void)(binary) argument
[all …]
/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/provisioning/
Dprovisioning_common_utils.py15 def patch_binary(binary, patch_bundle, offset): argument
16 return binary[:offset] + patch_bundle + binary[offset + len(patch_bundle):]
/trusted-firmware-m-latest/bl1/config/
Dbl1_config_default.cmake8 …SOURCE_DIR}/bl1/bl1_2/bl2_dummy_encryption_key.bin CACHE STRING "Path to binary key to use for enc…
9 … ${CMAKE_SOURCE_DIR}/bl1/bl1_1/dummy_guk.bin CACHE STRING "Path to binary GUK key file to pr…
12 … ${CMAKE_SOURCE_DIR}/bl1/bl1_2/bl1_dummy_rotpk CACHE FILEPATH "Path to binary BL2 signing privat…
/trusted-firmware-m-latest/bl1/
DKconfig18 Path to binary key to use for encrypting BL2
24 Path to binary GUK key file to provision
34 Path to binary BL2 signing private key
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/examples/
Dasset_icv_ce.cfg11 #unique-data = File holding the user unique data, in binary format.
14 #key-filename = File holding the encrypted Krtl, in binary format.
Dasset_icv_cp.cfg11 #unique-data = File holding the user unique data, in binary format.
14 #key-filename = File holding the encrypted Krtl, in binary format.
/trusted-firmware-m-latest/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_dm/
Ddm_provisioning_config.cmake8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE)
9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE)
10 …l2_dummy_encryption_key.bin" CACHE FILEPATH "Path to key with which the BL2 binary enrypted" FORCE)
/trusted-firmware-m-latest/bl1/bl1_2/
Dsigning_layout.c.in9 * for correct binary generation when nested macros are used
/trusted-firmware-m-latest/lib/ext/t_cose/
DLICENSE6 Redistribution and use in source and binary forms, with or without
12 2. Redistributions in binary form must reproduce the above copyright notice,
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/
DBSD-3-Clause.txt5 * Redistribution and use in source and binary forms, with or without modification, *
10 * 2. Redistributions in binary form must reproduce the above copyright notice, this *
/trusted-firmware-m-latest/platform/ext/target/arm/rse/common/bl2/
Dsigning_layout_sic_tables.c.in9 * for correct binary generation when nested macros are used
/trusted-firmware-m-latest/platform/ext/target/arm/corstone1000/bl1/
Dsigning_layout.c.in9 * for correct binary generation when nested macros are used
/trusted-firmware-m-latest/docs/platform/arm/rse/rom_releases/2024-04/
Dreadme.rst36 If a ROM binary does not boot, it can be checked for this error using the
43 If there is no output, or the output is all zero-words, then the ROM binary is
44 affected by the issue. It is possible to fix a ROM binary affected by the
/trusted-firmware-m-latest/bl2/ext/mcuboot/
Dsigning_layout.c.in9 * for correct binary generation when nested macros are used
/trusted-firmware-m-latest/docs/platform/lairdconnectivity/bl5340_dvk_cpuapp/
DREADME.rst91 be merged together into a single binary.
100 Generate Intel hex files from the output binary (bin) files as follows:
104 …srec_cat install/outputs/LAIRDCONNECTIVITY/BL5340_DVK_CPUAPP/tfm_s_ns_signed.bin -binary --offset=…
133 Generate Intel hex files from the output binary (bin) files as follows:
137 …srec_cat install/outputs/LAIRDCONNECTIVITY/BL5340_DVK_CPUAPP/tfm_s_ns_signed.bin -binary --offset=…
/trusted-firmware-m-latest/platform/ext/target/armchina/mps3/common/provisioning/
Dprovisioning_config.cmake8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE)
9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE)
/trusted-firmware-m-latest/platform/ext/common/provisioning_bundle/
Dprovisioning_config.cmake8 …${MCUBOOT_SIGNATURE_TYPE}.pem" CACHE FILEPATH "Path to key with which to sign secure binary" FORCE)
9 …OOT_SIGNATURE_TYPE}_1.pem" CACHE FILEPATH "Path to key with which to sign non-secure binary" FORCE)
/trusted-firmware-m-latest/platform/ext/target/rpi/rp2350/
Dlinker_bl2.ld99 no reference to it *inside* the binary, as it is not called by the
101 leaves it to the binary to do anything more sophisticated.) However
125 /* Machine inspectable binary information */
282 …ader_end - __logical_binary_start <= 1024, "Binary info must be in first 1024 bytes of the binary")
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/utils/src/cc3x_asset_prov_rt/examples/
Dasset_prov_se_512.cfg10 #key-filename = File holding the encrypted Kpicv, in binary format.
/trusted-firmware-m-latest/docs/platform/arm/rse/
Dreadme.rst57 <binary infile> \
58 <signed binary outfile>
80 binary and the ROM DMA Initial Command Sequence (ICS).::
169 The RSE ROM binary should be placed in RSE ROM at ``0x11000000`` and the host
170 flash binary should be placed at the base of the host flash. For the TC
/trusted-firmware-m-latest/docs/platform/nordic_nrf/nrf9160dk_nrf9160/
DREADME.rst80 together into a single binary.
89 Generate Intel hex files from the output binary (bin) files as follows:
93 srec_cat build_app/tfm_s_ns_signed.bin -binary --offset 0x10000 \
/trusted-firmware-m-latest/docs/platform/nordic_nrf/nrf9161dk_nrf9161/
DREADME.rst80 together into a single binary.
89 Generate Intel hex files from the output binary (bin) files as follows:
93 srec_cat build_app/tfm_s_ns_signed.bin -binary --offset 0x10000 \
/trusted-firmware-m-latest/cmake/
Dspe-CMakeLists.cmake141 #Sign non-secure binary image with provided secret key
162 # Create concatenated binary image from the two independently signed
163 # binary file. This only uses the local assemble.py script (not from

1234