Searched refs:policy (Results 1 – 21 of 21) sorted by relevance
/trusted-firmware-m-3.7.0/docs/platform/cypress/psoc64/security/keys/ |
D | readme.rst | 13 Use cysecuretools to generate new key pairs defined by the policy file, 20 cysecuretools -t cy8ckit-064s0s2-4343w -p policy/policy_multi_CM0_CM4_tfm.json create-keys 27 … cysecuretools -t cy8ckit-064s0s2-4343w -p policy/policy_multi_CM0_CM4_tfm.json re-provision-device
|
/trusted-firmware-m-3.7.0/lib/ext/t_cose/test/ |
D | t_cose_make_psa_test_key.c | 145 psa_key_policy_t policy = psa_key_policy_init(); in make_ecdsa_key_pair() local 146 psa_key_policy_set_usage(&policy, in make_ecdsa_key_pair() 149 crypto_result = psa_set_key_policy(key_handle, &policy); in make_ecdsa_key_pair()
|
/trusted-firmware-m-3.7.0/interface/include/psa/ |
D | crypto_struct.h | 277 psa_key_policy_t MBEDTLS_PRIVATE(policy); 372 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage) = usage_flags; in psa_set_key_usage_flags() 378 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(usage); in psa_get_key_usage_flags() 384 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg) = alg; in psa_set_key_algorithm() 390 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg); in psa_get_key_algorithm()
|
D | crypto_extra.h | 62 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2) = alg2; in psa_set_key_enrollment_algorithm() 74 return attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg2); in psa_get_key_enrollment_algorithm()
|
/trusted-firmware-m-3.7.0/docs/platform/cypress/psoc64/ |
D | cypress_psoc64_spec.rst | 10 containing policy and secure keys. Please refer to the guide at 12 Use the following policy file for provisioning and signing: 199 If the board was previously provisioned with signing keys and policy, copy 217 provisioned policy allows board's re-provisioning. 230 cysecuretools -t cy8ckit-064s0s2-4343w -p policy/policy_multi_CM0_CM4_tfm.json create-keys 236 … cysecuretools -t cy8ckit-064s0s2-4343w -p policy/policy_multi_CM0_CM4_tfm.json re-provision-device 250 --policy platform/ext/target/cypress/psoc64/security/policy/policy_multi_CM0_CM4_tfm.json \ 262 --policy platform/ext/target/cypress/psoc64/security/policy/policy_multi_CM0_CM4_tfm.json \ 280 policy file for the actual ID's. 393 2. Create and copy rootCA files to "certificates" directory next to the policy [all …]
|
/trusted-firmware-m-3.7.0/docs/design_docs/dual-cpu/ |
D | tfm_multi_core_access_check.rst | 59 The check policy in Isolation Level 3 will be defined according to TF-M future 77 policy described in `Memory Access Check Policy`_ above. 309 access check policy. 324 - Or set ``is_valid = true`` and set ``is_secure`` according to platform specific policy. 352 access check policy. 398 access check policy.
|
D | mailbox_ns_agent_update.rst | 87 Services rely on the ``client_id`` to apply policy-checking, hence SPM
|
/trusted-firmware-m-3.7.0/docs/design_docs/ |
D | tfm_builtin_keys.rst | 52 policy dictated by the platform). Correctly abstracts away details of the key 66 policy restrictions for specific users of the keys, e.g. an NS entity, or a 174 that user on that particular key in the policy table. If no policies are 254 policy enforcement via ``tfm_plat_builtin_key_get_desc_table_ptr`` is currently 256 this policy or their own policy (Though this may be changed in future).
|
D | tfm_physical_attack_mitigation.rst | 521 to system policy. The introduction of one more checking point requires one
|
/trusted-firmware-m-3.7.0/platform/ext/target/cypress/psoc64/ |
D | install.cmake | 13 install(FILES ${TARGET_PLATFORM_PATH}/security/policy/policy_multi_CM0_CM4_tfm_dev_certs.json
|
/trusted-firmware-m-3.7.0/docs/security/ |
D | index.rst | 45 TF-M policy is to credit the contributor's name in the published security advisory.
|
/trusted-firmware-m-3.7.0/platform/ext/target/cypress/psoc64/security/ |
D | reprov_helper.py | 169 def re_provision_device(device, policy): argument
|
/trusted-firmware-m-3.7.0/docs/integration_guide/services/ |
D | tfm_ps_integration_guide.rst | 15 The PS service implements an AES-GCM based AEAD encryption policy, as a 297 The encryption policy relies on a secret hardware unique key (HUK) per device. 324 The reference encryption policy is built on AES-GCM, and it **may** be replaced
|
D | tfm_secure_partition_addition.rst | 765 - In the IPC model, SPM will check the security policy and partition
|
/trusted-firmware-m-3.7.0/platform/ |
D | CMakeLists.txt | 183 #TODO import policy
|
/trusted-firmware-m-3.7.0/cmake/ |
D | remote_library.cmake | 228 # See https://cmake.org/cmake/help/latest/policy/CMP0097.html for more info.
|
/trusted-firmware-m-3.7.0/platform/ns/ |
D | toolchain_ns_ARMCLANG.cmake | 137 # https://cmake.org/cmake/help/latest/policy/CMP0123.html
|
/trusted-firmware-m-3.7.0/docs/design_docs/booting/ |
D | secure_boot_rollback_protection.rst | 77 of the software issuer to define which policy to apply.
|
/trusted-firmware-m-3.7.0/ |
D | toolchain_ARMCLANG.cmake | 136 # https://cmake.org/cmake/help/latest/policy/CMP0123.html
|
/trusted-firmware-m-3.7.0/platform/ext/target/cypress/psoc64/libs/core-lib/ |
D | EULA | 53 …Cypress consistent with its Data Privacy Policy (www.cypress.com/privacy-policy), as updated or re…
|
/trusted-firmware-m-3.7.0/docs/security/threat_models/ |
D | generic_threat_model.rst | 647 | | It relies on NS OS to enhance scheduling policy and |
|