Home
last modified time | relevance | path

Searched refs:used (Results 1 – 25 of 205) sorted by relevance

123456789

/trusted-firmware-a/include/lib/
A Dobject_pool.h36 size_t used; member
45 .used = 0U, \
59 if ((pool->used + count) > pool->capacity) { in pool_alloc_n()
61 count, pool->capacity - pool->used); in pool_alloc_n()
65 void *obj = (char *)(pool->objects) + (pool->obj_size * pool->used); in pool_alloc_n()
66 pool->used += count; in pool_alloc_n()
/trusted-firmware-a/lib/zlib/
A Dinftrees.c47 unsigned used; /* code entries in table used */ local
205 used = 1U << root; /* use root table entries */
206 mask = used - 1; /* mask for comparing low */
209 if ((type == LENS && used > ENOUGH_LENS) ||
210 (type == DISTS && used > ENOUGH_DISTS))
277 used += 1U << curr;
278 if ((type == LENS && used > ENOUGH_LENS) ||
279 (type == DISTS && used > ENOUGH_DISTS))
301 *table += used;
/trusted-firmware-a/plat/rockchip/rk3399/drivers/m0/src/
A Dstartup.c18 __attribute__ ((used))
37 __attribute__ ((used, section(".isr_vector")))
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/
A Dcot-binding.rst.txt10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust.
35 Describes certificate properties which are used
70 This property is used to refer public key node present in
84 This property is used by all certificates which are
88 This property is used to refer one of the non-volatile
187 Describes image properties which will be used during
210 hash method. This property is used to refer hash
219 be used to validate the image.
/trusted-firmware-a/docs/components/
A Dcot-binding.rst10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust.
35 Describes certificate properties which are used
70 This property is used to refer public key node present in
84 This property is used by all certificates which are
88 This property is used to refer one of the non-volatile
187 Describes image properties which will be used during
210 hash method. This property is used to refer hash
219 be used to validate the image.
/trusted-firmware-a/plat/nxp/soc-lx2160a/
A Dsoc.def27 # TZC IP Details TZC used is TZC380 or TZC400
33 # Select the DDR PHY generation to be used
93 # Covert to HEX to be used by create_pbl.mk
99 # Covert to HEX to be used by create_pbl.mk
/trusted-firmware-a/docs/design/
A Dauth-framework.rst9 terms of certificate hierarchy and the mechanisms used to verify a
18 - The mechanism used to verify the transported information i.e. the
142 #. Authenticate the image as per the cryptographic algorithms used.
145 be used to authenticate the next image in the CoT.
373 TF-A. This method should only be used by data images.
388 The following enum can be used to define these three methods.
421 The ``init()`` function will be used to initialize the IPL.
494 the ``cookie`` field means that it is not used.
559 field is used to specify the length of the data in the memory.
589 section. These are used to verify the current image.
[all …]
A Dtrusted-board-boot.rst11 Arm DEN0006D. It should be used in conjunction with the
23 be used and its hash embedded into the BL1 and BL2 images (only for
31 enables adding custom extensions to the certificates, which are used to store
41 certificates are used to verify public keys which have been used to sign content
42 certificates. Content certificates are used to store the hash of a boot loader
49 The keys used to establish the CoT are:
58 The private part is used to sign the key certificates corresponding to the
64 The private part is used to sign the key certificate corresponding to the
70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to
83 The following certificates are used to authenticate the images.
[all …]
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/
A Dauth-framework.rst.txt9 terms of certificate hierarchy and the mechanisms used to verify a
18 - The mechanism used to verify the transported information i.e. the
142 #. Authenticate the image as per the cryptographic algorithms used.
145 be used to authenticate the next image in the CoT.
373 TF-A. This method should only be used by data images.
388 The following enum can be used to define these three methods.
421 The ``init()`` function will be used to initialize the IPL.
494 the ``cookie`` field means that it is not used.
559 field is used to specify the length of the data in the memory.
589 section. These are used to verify the current image.
[all …]
A Dtrusted-board-boot.rst.txt11 Arm DEN0006D. It should be used in conjunction with the
23 be used and its hash embedded into the BL1 and BL2 images (only for
31 enables adding custom extensions to the certificates, which are used to store
41 certificates are used to verify public keys which have been used to sign content
42 certificates. Content certificates are used to store the hash of a boot loader
49 The keys used to establish the CoT are:
58 The private part is used to sign the key certificates corresponding to the
64 The private part is used to sign the key certificate corresponding to the
70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to
83 The following certificates are used to authenticate the images.
[all …]
/trusted-firmware-a/plat/nxp/soc-ls1028a/
A Dsoc.def26 # TZC used is TZC380 or TZC400
32 # DDR PHY generation to be used
63 # Covert to HEX to be used by create_pbl.mk
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/
A Darm-build-options.rst.txt16 should match the frame used by the Non-Secure image (normally the Linux
41 this flag is 0. Note that this option is not used on FVP platforms.
46 State-ID yet. Hence this flag is used to configure whether to use the
51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the
55 Firmware. This private key will be used by the certificate generation tool
72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the
100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the
131 compatible change to the MTL protocol, used for AP/SCP communication.
142 is set to 1, then SCMI/SDS drivers will be used. Default is 0.
151 core count, cluster count or other peripherals. This build option is used
/trusted-firmware-a/docs/plat/arm/
A Darm-build-options.rst16 should match the frame used by the Non-Secure image (normally the Linux
41 this flag is 0. Note that this option is not used on FVP platforms.
46 State-ID yet. Hence this flag is used to configure whether to use the
51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the
55 Firmware. This private key will be used by the certificate generation tool
72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the
100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the
131 compatible change to the MTL protocol, used for AP/SCP communication.
142 is set to 1, then SCMI/SDS drivers will be used. Default is 0.
151 core count, cluster count or other peripherals. This build option is used
/trusted-firmware-a/docs/build/latex/
A Dsphinxlatexobjects.sty32 \newcommand{\version}{}% part of \py@release, used by title page and headers
33 % \releaseinfo is used on titlepage (sphinxmanual.cls, sphinxhowto.cls)
41 \newcommand{\sphinxheadercomma}{, }% used in fancyhdr header definition
53 % author's name. This can be used to format them differently, which
61 % With 4.0.0 \pysigline (and \pysiglinewithargsret), used in a fulllineitems
64 \newcommand{\py@itemnewline}[1]{% macro used as \makelabel in fulllineitems
98 % used twice or more in a row for labels sharing common description,
A Dsphinxlatexlists.sty13 % #2 and #3 are counters used by enumerate environment e.g. enumi, enumii.
24 % remove LaTeX's cap on nesting depth if 'maxlistdepth' key used.
26 % is always used in "true" branches: "\if ... \@toodeep \else .. \fi."
31 % do nothing if 'maxlistdepth' key not used or if package enumitem loaded.
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/
A Dlicense.rst.txt22 - Neither the name of Arm nor the names of its contributors may be used to
58 is used under the BSD-3-Clause license with the author's permission.
61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of
66 (NCSA OR MIT). It is used by this project under the terms of the NCSA
75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
/trusted-firmware-a/docs/
A Dlicense.rst22 - Neither the name of Arm nor the names of its contributors may be used to
58 is used under the BSD-3-Clause license with the author's permission.
61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of
66 (NCSA OR MIT). It is used by this project under the terms of the NCSA
75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/process/
A Dcoding-style.rst.txt19 used for units) but code itself is still limited to ASCII characters.
22 character is used to break a line and reset to the first column.
29 spellings of a word, the American English spelling is used.
33 name should be used as-is.
38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO
43 missing extensions are rarely used, however, and should not pose a problem.
51 Static Analysis is used to regularly generate a report of current MISRA defects
80 Single spacing should be used around most operators, including:
164 used, braces must be placed around the statements that form the body of the
322 * This style can be used for additional emphasis.
[all …]
/trusted-firmware-a/docs/process/
A Dcoding-style.rst19 used for units) but code itself is still limited to ASCII characters.
22 character is used to break a line and reset to the first column.
29 spellings of a word, the American English spelling is used.
33 name should be used as-is.
38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO
43 missing extensions are rarely used, however, and should not pose a problem.
51 Static Analysis is used to regularly generate a report of current MISRA defects
80 Single spacing should be used around most operators, including:
164 used, braces must be placed around the statements that form the body of the
322 * This style can be used for additional emphasis.
[all …]
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/fconf/
A Dindex.rst.txt11 retrieved without the requesting entity knowing what backing store is being used
14 It is used to bridge new and old ways of providing platform-specific data.
83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to
104 can be used to fill the C data structure with the data from the config |DTB|.
118 - Properties used inside common code.
119 - Properties used inside platform specific code.
/trusted-firmware-a/docs/components/fconf/
A Dindex.rst11 retrieved without the requesting entity knowing what backing store is being used
14 It is used to bridge new and old ways of providing platform-specific data.
83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to
104 can be used to fill the C data structure with the data from the config |DTB|.
118 - Properties used inside common code.
119 - Properties used inside platform specific code.
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/
A Dporting-guide.rst.txt137 tree at all the power domain levels used by the platform.
177 the array used for PSCI_STAT_COUNT/RESIDENCY accounting.
253 BL2 image identifier, used by BL1 to load BL2.
257 BL31 image identifier, used by BL2 to load BL31.
261 BL33 image identifier, used by BL2 to load BL33.
399 BL32 image identifier, used by BL2 to load BL32.
1112 This function returns a random value that is used to initialize the canary used
1301 sequence used by plat_try_next_boot_source().
1304 layer used to load the next bootloader image.
1882 used in release builds.
[all …]
A Dbuild-options.rst.txt71 - ``BL31_KEY``: This option is used when ``GENERATE_COT=1``. It specifies the
73 this file name will be used to save the key.
87 this file name will be used to save the key.
90 ``fip`` target in case TF-A BL2 is used.
94 this file name will be used to save the key.
595 file name will be used to save the key.
607 this file name will be used to save the key.
687 - ``TRUSTED_WORLD_KEY``: This option is used when ``GENERATE_COT=1``. It
733 device tree and COT descriptors used by BL1 are retained in the code
756 - ``VERSION_STRING``: String used in the log output for each TF-A image.
[all …]
/trusted-firmware-a/docs/getting_started/
A Dporting-guide.rst137 tree at all the power domain levels used by the platform.
177 the array used for PSCI_STAT_COUNT/RESIDENCY accounting.
253 BL2 image identifier, used by BL1 to load BL2.
257 BL31 image identifier, used by BL2 to load BL31.
261 BL33 image identifier, used by BL2 to load BL33.
399 BL32 image identifier, used by BL2 to load BL32.
1112 This function returns a random value that is used to initialize the canary used
1301 sequence used by plat_try_next_boot_source().
1304 layer used to load the next bootloader image.
1882 used in release builds.
[all …]
A Dbuild-options.rst71 - ``BL31_KEY``: This option is used when ``GENERATE_COT=1``. It specifies the
73 this file name will be used to save the key.
87 this file name will be used to save the key.
90 ``fip`` target in case TF-A BL2 is used.
94 this file name will be used to save the key.
595 file name will be used to save the key.
607 this file name will be used to save the key.
687 - ``TRUSTED_WORLD_KEY``: This option is used when ``GENERATE_COT=1``. It
733 device tree and COT descriptors used by BL1 are retained in the code
756 - ``VERSION_STRING``: String used in the log output for each TF-A image.
[all …]

Completed in 46 milliseconds

123456789