Searched full:mechanisms (Results 1 – 25 of 42) sorted by relevance
12
41 bool "Use Intel ADSP power gating mechanisms"46 Include Intel ADSP power domain control mechanisms
22 Stack protection mechanisms require hardware support that can restrict access57 MPUs may have a region priority mechanisms that use the highest priority region62 than the requested size. Region priority mechanisms may result in
133 through the following mechanisms:
57 widely accepted principles for protection mechanisms are defined to61 protection mechanisms cannot be kept secret on any system in72 process needs to be authenticated first. Mechanisms to store access92 - **Least common mechanism** specifies that mechanisms common to more108 underlying platform. In case such mechanisms are not provided by the156 - open design (security mechanisms should not depend on attacker169 - least common mechanism (the design should minimize the mechanisms
144 protection mechanisms are provided to protect against stack overruns.206 - **Stack protection:** Stack guards would provide mechanisms for278 accepted principles for protection mechanisms are defined to prevent282 protection mechanisms cannot be kept secret on any system in293 process needs to be authenticated first. Mechanisms to store314 - **Least common mechanism** specifies that mechanisms common to more330 underlying platform. In case such mechanisms are not provided by505 - Mechanisms to allow for **in-the-field** **updates** of devices using
9 as BL32 image. OP-TEE is a Trust Zone OS which implements mechanisms
17 This sample tests various services and communication mechanisms across the
109 * mechanisms. in write_dword()143 * both mechanisms. in write_dword()246 * mechanisms. in erase_page()280 * both mechanisms. in erase_page()
20 a variety of mechanisms, like UART and CMUX DLCI channels, in a
14 * wait loop and the system timer are based on different mechanisms and may not
12 mechanisms.
60 the zephyr,concat-buf-size one, as both these buffering mechanisms
165 - Analogy with existing mechanisms: Git submodules with zephyr as the180 - Analogy with existing mechanisms: Git submodules with the application as268 - Analogy with existing mechanisms: Google repo-based source distribution
74 IPC mechanisms universally use local IRQ locking as the base layer for all
214 - Authentication mechanisms used to authenticate users against a234 authentication mechanisms via network interfaces288 - Automatic mechanisms should be used for software updates.313 - The device shall use best practice cryptography to facilitate secure update mechanisms.558 - The consumer IoT device should verify its software using secure boot mechanisms.
15 * synchronization mechanisms beyond reliable ordering of memory
7 referred to as just BC1.2. BC1.2 defines limits and detection mechanisms for USB
75 or introduce different signing mechanisms. By default with MCUboot enabled, signing is setup by
172 This option signifies the Cortex-M0 has some mechanisms that can map357 with no hardware vector table relocation mechanisms (e.g. VTOR).
25 protection mechanisms is strongly discouraged (applications can
73 requires specific hardware mechanisms to support this.
2 mechanisms (ARM Only)
45 There are two mechanisms provided for enumerating all elements in an
137 * @brief Enumeration for types of delay mechanisms for PTP Clock.
37 * The SCHEDOP interface provides mechanisms for a guest to interact