Home
last modified time | relevance | path

Searched refs:module (Results 1 – 25 of 31) sorted by relevance

12

/trusted-firmware-m-latest/secure_fw/partitions/crypto/
DKconfig.comp32 for EC signing by attest module.
49 bool "PSA Crypto random number generator module"
53 bool "PSA Crypto Key module"
57 bool "PSA Crypto AEAD module"
61 bool "PSA Crypto MAC module"
65 bool "PSA Crypto Hash module"
69 bool "PSA Crypto Cipher module"
73 bool "PSA Crypto asymmetric key signature module"
77 bool "Enable PSA Crypto asymmetric key encryption module"
81 bool "PSA Crypto key derivation module"
/trusted-firmware-m-latest/secure_fw/partitions/initial_attestation/
Dattest_boot_data.c163 static int32_t attest_get_tlv_by_module(uint8_t module, in attest_get_tlv_by_module() argument
195 if (GET_IAS_MODULE(tlv_entry.tlv_type) == module) { in attest_get_tlv_by_module()
293 uint8_t module = 0; in attest_encode_sw_components_array()
305 for (module = 0; module < SW_MAX; ++module) { in attest_encode_sw_components_array()
312 found = attest_get_tlv_by_module(module, &tlv_id, in attest_encode_sw_components_array()
/trusted-firmware-m-latest/platform/ext/target/cypress/psoc64/libs/core-lib/include/
Dcy_result.h126 #define CY_RSLT_CREATE(type, module, code) \ argument
127 ((((module) & CY_RSLT_MODULE_MASK) << CY_RSLT_MODULE_POSITION) | \
/trusted-firmware-m-latest/docs/platform/lairdconnectivity/bl5340_dvk_cpuapp/
DREADME.rst5 for the evaluation and development on the Laird Connectivity BL5340 module
8 The BL5340 is a module with a dual-core nRF5340 SoC based on the Arm®
65 * SWD debug for the BL5340 module
80 The nRF Command-line Tools allow you to control your BL5340 module from the
107 * Erase the flash memory in the BL5340 module:
140 * Erase the flash memory in the BL5340 module:
/trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/Core/Include/
Dtz_context.h51 TZ_MemoryId_t TZ_AllocModuleContext_S (TZ_ModuleId_t module);
/trusted-firmware-m-latest/docs/cmake/
DFindSphinx.cmake13 #This module checks availability of the Sphinx document generator
17 #method this module expects sphix-build to be either available on the PATH,
90 #Set "standard" find module return values
/trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/Core/Template/ARMv8-M/
Dtz_context.c86 TZ_MemoryId_t TZ_AllocModuleContext_S (TZ_ModuleId_t module) { in TZ_AllocModuleContext_S() argument
89 (void)module; // Ignore (fixed Stack size) in TZ_AllocModuleContext_S()
/trusted-firmware-m-latest/docs/integration_guide/services/
Dtfm_crypto_integration_guide.rst26 - An init module ``secure_fw/partitions/crypto/crypto_init.c`` that implements
33 - An alloc module ``secure_fw/partitions/crypto/crypto_alloc.c`` that manages
37 - A library abstraction module ``secure_fw/partitions/crypto/crypto_library.c``
83 - ``crypto_init.c`` : Init module for the service. The modules stores also the
97 the contexts is much simpler (i.e. just an handle), and the Alloc module
99 - ``tfm_crypto_api.c`` : This module is contained in ``interface/src`` and
101 This module allows a configuration option ``CONFIG_TFM_CRYPTO_API_RENAME``
107 - ``tfm_mbedcrypto_alt.c`` : This module is specific to the Mbed TLS [3]_
/trusted-firmware-m-latest/docs/contributing/
Dcode_review_guide.rst124 - R5.1 Put the ``interface header`` of one module in the ``include`` folder
125 under the root of this module. Deeper sub-folders can not have ``include``
126 folders, which means only one ``include`` is allowed for one module.
141 - R5.6 The module's ``include`` folder needs to be added into referencing
142 module's header searching path.
144 - R5.7 The module's ``include`` folder and the root folder needs to be added
149 ``include`` folder and the module folder.
/trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Source/
DCV_Report.c325 test_report.assertions.info.passed[TAS->passed].module = fn;
331 test_report.assertions.info.failed[TAS->failed].module = fn;
337 test_report.assertions.info.warnings[TAS->warnings].module = fn;
/trusted-firmware-m-latest/secure_fw/partitions/platform/
DKconfig.comp28 bool "Disable Non-volatile counter module"
/trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Include/
DCV_Report.h32 const char *module; /* Module name */ member
/trusted-firmware-m-latest/docs/design_docs/services/
Dtfm_crypto_design.rst43 …| Client API interface | This module exports the PSA Crypto API to be callable from the| ``…
53 …| Init module | This module handles the initialisation of the service objects | ``…
61 …| | This module is in charge of providing an ID of the caller of | …
65 …| Alloc module | This module handles the allocation of contexts for multipart | ``…
85 …| Backend library abstraction | This module contains several APIs to abstract the interface | ``…
100 …| | which expose each module's interface. The header available in | …
263 …| | | | module) and initializes the `b…
337 … | CMake build | When enabled, the correspoding shim layer module and relative | De…
Dtfm_fwu_service.rst41 …| Client API interface | This module exports the client API of PSA Firmware Update to | ``…
46 …| NSPE client API interface | This module exports the client API of PSA Firmware Update to | ``…
49 …| IPC request handlers | This module handles all the secure requests in IPC model. | ``…
53 …| Shim layer between FWU and | This module provides the APIs with the functionality of | ``…
57 …| Shim layer example based on | This module is the implementation of the shim layer between | ``…
/trusted-firmware-m-latest/platform/ext/cmsis/CMSIS/CoreValidation/Project/
Dvalidation.xsl28 <xsl:variable name="file" select="module"/>
/trusted-firmware-m-latest/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/
Dpsa_driver_api_design.rst51 contain the types associated to the driver. Any module that does not need to
53 treat each object as an opaque pointer, while any module that needs access to
98 DRBG. This module has an explicit dependency on the mbedTLS DRBG software
133 the driver module integration into the PSA Crypto driver core. The following
173 * ``mbedtls_drbg``: The module currently relies on a software implementation of
/trusted-firmware-m-latest/docs/platform/cypress/psoc64/libs/core-lib/
DRELEASE.md50 * Added new module identifiers to cy_result.h
56 * Added new module IDs in cy_result.h
/trusted-firmware-m-latest/docs/releases/
D1.0.rst115 by SST module should not be updatable but after reboot, the update seems
132 the SST module when Flash data is inconsistent.
D1.5.0.rst25 - ITS enhancement for harden ITS module against invalid data in Flash.
/trusted-firmware-m-latest/docs/integration_guide/
Dnon-secure_client_extension_integration_guide.rst205 This is the software module diagram of a typical RTOS/NSCE integration example.
227 - NSID Manager: If NSPE RTOS manages the NSID, then this module is used by the
/trusted-firmware-m-latest/docs/configuration/profiles/
Dtfm_profile_medium.rst201 The details of configurations will be covered in each module in
351 module.
Dtfm_profile_small.rst300 The details of configurations will be covered in each module in
410 module.
/trusted-firmware-m-latest/cmake/
Dremote_library.cmake222 # [in] GIT_REPOSITORY, GIT_TAG, ... - see https://cmake.org/cmake/help/latest/module/ExternalPr…
/trusted-firmware-m-latest/docs/design_docs/
Dtfm_physical_attack_mitigation.rst551 - SAU: The main module in the CPU to determine the security settings of
553 - :term:`MPC`: External module from the CPU point of view. It protects the
557 - :term:`PPC`: External module from the CPU
/trusted-firmware-m-latest/docs/design_docs/software/
Dhardware_abstraction_layer.rst108 tfm_hal_[module].[h/c]
160 Status code to indicate that the module is not initialed.

12