| /trusted-firmware-m-latest/bl1/bl1_1/scripts/ |
| D | create_bl1_2_img.py | 21 def struct_pack(objects, pad_to=0): argument 23 for obj in objects: 30 return (bytes(struct.pack(defstring, *objects)))
|
| D | create_provisioning_bundle.py | 12 def struct_pack(objects, pad_to=0): argument 14 for obj in objects: 21 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/provisioning/ |
| D | provisioning_common_utils.py | 18 def struct_pack(objects, pad_to=0): argument 20 for obj in objects: 30 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/platform/ext/target/arm/rse/common/bl2/ |
| D | create_xip_tables.py | 19 def struct_pack(objects, pad_to=0): argument 21 for obj in objects: 28 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/platform/ext/target/armchina/mps3/common/provisioning/ |
| D | create_provisioning_bundle.py | 13 def struct_pack(objects, pad_to=0): argument 15 for obj in objects: 25 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/platform/ext/common/provisioning_bundle/ |
| D | create_provisioning_bundle.py | 13 def struct_pack(objects, pad_to=0): argument 15 for obj in objects: 25 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/platform/ext/target/arm/mps4/corstone315/provisioning/ |
| D | create_provisioning_bundle.py | 13 def struct_pack(objects, pad_to=0): argument 15 for obj in objects: 25 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/bl1/bl1_2/scripts/ |
| D | create_bl2_img.py | 23 def struct_pack(objects, pad_to=0): argument 25 for obj in objects: 32 return (bytes(struct.pack(defstring, *objects)))
|
| /trusted-firmware-m-latest/docs/security/security_advisories/ |
| D | crypto_multi_part_ops_abort_fail.rst | 51 PSA multi-part crypto operation objects 60 default) to implement those objects. The structures of those objects are crypto 70 TF-M multi-part crypto operation objects
|
| /trusted-firmware-m-latest/docs/design_docs/dual-cpu/ |
| D | mailbox_design_on_dual_core_system.rst | 72 NSPE mailbox objects are managed by NSPE mailbox in non-secure memory to hold 82 SPE mailbox objects are managed by SPE mailbox in secure memory. 97 Mailbox objects 100 This section lists the mailbox objects required in NSPE and SPE. 102 NSPE mailbox objects are managed by NSPE mailbox in non-secure memory. But NSPE 103 mailbox objects can be accessed by both NSPE mailbox and SPE mailbox. 105 SPE mailbox objects are managed by SPE mailbox in secure memory. SPE mailbox 106 objects should be protected from NSPE accesses by system specific isolation. 153 SPE mailbox maintains a mailbox queue to store SPE mailbox objects. 220 structure in non-secure memory. The related SPE mailbox objects should be [all …]
|
| D | communication_prototype_between_nspe_and_spe_in_dual_core_systems.rst | 127 objects and variables shall be implemented. 129 When a core accesses shared mailbox objects or variables, proper mechanisms 137 multiple mailbox objects received from NSPE. 139 objects to store the NS PSA Client request identification.
|
| /trusted-firmware-m-latest/docs/integration_guide/services/ |
| D | tfm_ps_integration_guide.rst | 20 objects. 133 all objects in PS area. 141 encrypted objects in the PS object system. 159 encrypted, authenticated objects by making service calls to the ITS service. 164 encrypted, authenticated objects by making standard function calls to the file
|
| D | tfm_secure_partition_addition.rst | 295 This attribute is a list of MMIO region objects which the Secure Partition
|
| /trusted-firmware-m-latest/docs/design_docs/services/ |
| D | tfm_psa_inter_process_communication.rst | 27 - Synchronization objects 125 - List iterator for synchronization objects management
|
| D | secure_partition_manager.rst | 245 * Allocate runtime objects for this partition. 246 * Link the runtime objects with load information. 704 SPM needs to set up runtime objects to manage partitions by parsing the load 707 link runtime objects to the load information without a copy operation. This
|
| D | tfm_crypto_design.rst | 53 …| Init module | This module handles the initialisation of the service objects | ``…
|
| /trusted-firmware-m-latest/docs/integration_guide/platform/ |
| D | porting_tfm_to_a_new_hardware.rst | 38 #. Adding all the mandatory files and expected objects/functions declarations
|