Home
last modified time | relevance | path

Searched refs:option (Results 1 – 25 of 71) sorted by relevance

123

/trusted-firmware-m-3.7.0/bl2/ext/mcuboot/scripts/wrapper/
Dwrapper.py39 @click.option('-R', '--erased-val', type=click.Choice(['0', '0xff']),
42 @click.option('-x', '--hex-addr', type=imgtool.main.BasedIntParamType(),
44 @click.option('--measured-boot-record', default=False, is_flag=True, help='Add '
46 @click.option('--save-enctlv', default=False, is_flag=True,
50 @click.option('-E', '--encrypt', metavar='filename',
52 @click.option('-e', '--endian', type=click.Choice(['little', 'big']),
54 @click.option('--overwrite-only', default=False, is_flag=True,
56 @click.option('-M', '--max-sectors', type=int,
59 @click.option('--confirm', default=False, is_flag=True,
61 @click.option('--pad', default=False, is_flag=True,
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/
Dcreate_provisioning_data.py42 @click.option('--bl2_rot_priv_key_0', metavar='filename', required=True)
43 @click.option('--bl2_rot_priv_key_1', metavar='filename', required=False)
44 @click.option('--bl2_rot_priv_key_2', metavar='filename', required=False)
45 @click.option('--bl2_rot_priv_key_3', metavar='filename', required=False)
46 @click.option('--template_path', metavar='filename', required=True)
47 @click.option('--secure_debug_pk', metavar='key', required=False)
48 @click.option('--huk', metavar='key', required=False)
49 @click.option('--iak', metavar='key', required=False)
50 @click.option('--boot_seed', metavar='seed', required=False)
51 @click.option('--implementation_id', metavar='id', required=False)
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/
Dcreate_provisioning_data.py42 @click.option('--bl2_rot_priv_key_0', metavar='filename', required=True)
43 @click.option('--bl2_rot_priv_key_1', metavar='filename', required=False)
44 @click.option('--bl2_rot_priv_key_2', metavar='filename', required=False)
45 @click.option('--bl2_rot_priv_key_3', metavar='filename', required=False)
46 @click.option('--template_path', metavar='filename', required=True)
47 @click.option('--secure_debug_pk', metavar='key', required=False)
48 @click.option('--huk', metavar='key', required=False)
49 @click.option('--iak', metavar='key', required=False)
50 @click.option('--boot_seed', metavar='seed', required=False)
51 @click.option('--implementation_id', metavar='id', required=False)
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_dm/
Ddm_create_provisioning_data.py42 @click.option('--template_path', metavar='filename', required=True)
43 @click.option('--bl1_rotpk_0', metavar='key', required=True)
44 @click.option('--bl2_encryption_key_path', metavar='filename', required=True)
45 @click.option('--bl2_rot_priv_key_0', metavar='filename', required=True)
46 @click.option('--bl2_rot_priv_key_1', metavar='filename', required=False)
47 @click.option('--bl2_rot_priv_key_2', metavar='filename', required=False)
48 @click.option('--bl2_rot_priv_key_3', metavar='filename', required=False)
49 @click.option('--implementation_id', metavar='id', required=False)
50 @click.option('--verification_service_url', metavar='url', required=False,
52 @click.option('--attestation_profile_definition', metavar='definition',
[all …]
/trusted-firmware-m-3.7.0/cmake/
Dutils.cmake44 foreach (option ${options})
45 string(STRIP ${option} option)
47 if((DEFINED ${option}) AND NOT ${option} STREQUAL "")
48 format_string(option_name ${option} 40 " ")
49 message(STATUS "${option_name} ${${option}}")
Dremote_library.cmake140 # [in] KEY - option name
143 # [out] VALUE_VAR - name of variable that is set to option value for ${KEY}.
155 # # Extract key/value for option "GIT_SUBMODULES"
166 # # Extract key/value for option "GIT_SUBMODULES"
176 # Validate that there is an option value in the list of arguments
179 message(FATAL_ERROR "Missing option value for ${KEY}")
Dversion.cmake16 # In a repository cloned with --no-tags option TFM_VERSION_FULL will be a hash
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps4/corstone315/provisioning/bundle_cm/
Dcm_create_provisioning_data.py16 @click.option('--template_path', metavar='filename', required=True)
17 @click.option('--guk', metavar='key', required=False)
18 @click.option('--sam_config', metavar='config', required=False)
/trusted-firmware-m-3.7.0/docs/configuration/
Dheader_file_system.rst14 Source files shall include ``config_tfm.h`` when necessary to fetch Component option settings.
16 for each option.
28 - One of the header files of Profiles <tf-m_profiles>, set via the ``TFM_PROFILE`` build option.
37 Platform specific option settings in ``TARGET_CONFIG_HEADER_FILE`` overrides those configured in
/trusted-firmware-m-3.7.0/platform/ext/target/stm/common/scripts/
DTFM_BIN2HEX.sh68 cat $disk-option/failed.txt
85 cat $disk-option/failed.txt
/trusted-firmware-m-3.7.0/docs/security/security_advisories/
Ddebug_log_vulnerability.rst28 TF-M log subsystem if enabled by ``TFM_SP_LOG_RAW_ENABLED`` config option,
54 option enabled an ARoT partition can expose to the stdout device any memory
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/Driver/DriverTemplates/
DDriver_WiFi.c69 static int32_t ARM_WiFi_SetOption (uint32_t interface, uint32_t option, const void *data, uint32_t … in ARM_WiFi_SetOption() argument
73 static int32_t ARM_WiFi_GetOption (uint32_t interface, uint32_t option, void *data, uint32_t *len) { in ARM_WiFi_GetOption() argument
/trusted-firmware-m-3.7.0/secure_fw/partitions/protected_storage/
DKconfig19 Enable encryption option to encrypt the protected storage data.
/trusted-firmware-m-3.7.0/secure_fw/partitions/initial_attestation/
DKconfig.comp22 Key-id is calculated and added to the COSE header based on the value of this option.
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/codesafe/src/psa_driver_api/
Dpsa_driver_api_design.rst132 is not strictly a configuration option of the driver interface but it enables
139 compliant errors. This option is useful only in debug as for normal
141 is suggested to enable this option only when debugging is required, as the
145 recommended, this option is disabled by default to save code size.
147 algorithms. This option is enabled by default.
149 algorithm in AEAD. This option is enabled by default.
153 The current status of the configuration option is still work in progress
/trusted-firmware-m-3.7.0/platform/ext/cmsis/CMSIS/Driver/Include/
DDriver_WiFi.h632 …int32_t (*SetOption) (uint32_t interface, uint32_t option, const v…
633 …int32_t (*GetOption) (uint32_t interface, uint32_t option, v…
/trusted-firmware-m-3.7.0/docs/building/
Dtests_build_instruction.rst8 ``CONFIG_TFM_TEST_DIR`` option is used. When SPE build system sees this option
62 mechanism for SPE extension as the regression tests above utilising ``CONFIG_TFM_TEST_DIR`` option.
/trusted-firmware-m-3.7.0/bl2/ext/mcuboot/
Dmcuboot_default_config.cmake26 set(MCUBOOT_ALIGN_VAL 1 CACHE STRING "align option for mcuboot and b…
59 …mage for upgrade to this non-secure image. If MCUBOOT_IMAGE_NUMBER == 1 this option has no effect")
60 …re image for upgrade to this secure image. If MCUBOOT_IMAGE_NUMBER == 1 this option has no effect")
DKconfig109 prompt "Align option for mcuboot and build image with imgtool"
224 option has no effect
231 upgrade to this secure image. If MCUBOOT_IMAGE_NUMBER == 1 this option
/trusted-firmware-m-3.7.0/docs/integration_guide/services/
Dtfm_crypto_integration_guide.rst101 This module allows a configuration option ``CONFIG_TFM_CRYPTO_API_RENAME``
105 the interface file. This config option is for the NS environment or
130 config option that point to configuration headers following the legacy Mbed TLS
135 around the ``MBEDTLS_USER_CONFIG_FILE`` option). This is preferred for platform
144 alternative hardware entropy source can be specified using the config option
/trusted-firmware-m-3.7.0/
Dtoolchain_IARARM.cmake112 # library functions for BL2 to override any implicit FPU option, such as '--cpu' option.
113 # Because the implicit hardware FPU option enforces BL2 to initialize FPU but hardware FPU
133 # armasm and armlink have the same option "--fpu" and are both used to
/trusted-firmware-m-3.7.0/docs/design_docs/services/
Dtfm_its_service.rst20 allows larger data sets to be stored securely in external flash, with the option
197 The latter option would make the filesystem slightly more complex: the size of a
208 With this in mind, the proposed option is the second.
220 For the first option, the ITS implementation would need to copy to the flags
229 To implement the second option, a 32-bit ``flag`` field would be added to the
279 The other option for code sharing would be for Protected Storage and ITS to
283 to each partition but not the code. Because of these complications, this option
317 Then encryption can be enabled by setting the build option ``-DITS_ENCRYPTION=ON``.
/trusted-firmware-m-3.7.0/secure_fw/partitions/internal_trusted_storage/
DKconfig.comp23 time, so enabling this option can increase the life of flash memory when
26 If this option enabled, ITS_RAM_FS_SIZE must also be provided by platforms
/trusted-firmware-m-3.7.0/docs/integration_guide/source_structure/
Dplatform_folder.rst58 A platform may provide the option to configure debug authentication. TF-M core
72 `-DDEBUG_AUTHENTICATION="<define>"` option. The default value of
/trusted-firmware-m-3.7.0/docs/platform/stm/common/stm32u5xx/
Dreadme.rst40 - ``regression.sh``: Sets platform option bytes config and erase platform

123