| /trusted-firmware-a/include/lib/ |
| A D | object_pool.h | 36 size_t used; member 45 .used = 0U, \ 59 if ((pool->used + count) > pool->capacity) { in pool_alloc_n() 61 count, pool->capacity - pool->used); in pool_alloc_n() 65 void *obj = (char *)(pool->objects) + (pool->obj_size * pool->used); in pool_alloc_n() 66 pool->used += count; in pool_alloc_n()
|
| /trusted-firmware-a/lib/zlib/ |
| A D | inftrees.c | 47 unsigned used; /* code entries in table used */ local 205 used = 1U << root; /* use root table entries */ 206 mask = used - 1; /* mask for comparing low */ 209 if ((type == LENS && used > ENOUGH_LENS) || 210 (type == DISTS && used > ENOUGH_DISTS)) 277 used += 1U << curr; 278 if ((type == LENS && used > ENOUGH_LENS) || 279 (type == DISTS && used > ENOUGH_DISTS)) 301 *table += used;
|
| /trusted-firmware-a/plat/rockchip/rk3399/drivers/m0/src/ |
| A D | startup.c | 18 __attribute__ ((used)) 37 __attribute__ ((used, section(".isr_vector")))
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/ |
| A D | cot-binding.rst.txt | 10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust. 35 Describes certificate properties which are used 70 This property is used to refer public key node present in 84 This property is used by all certificates which are 88 This property is used to refer one of the non-volatile 187 Describes image properties which will be used during 210 hash method. This property is used to refer hash 219 be used to validate the image.
|
| /trusted-firmware-a/docs/components/ |
| A D | cot-binding.rst | 10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust. 35 Describes certificate properties which are used 70 This property is used to refer public key node present in 84 This property is used by all certificates which are 88 This property is used to refer one of the non-volatile 187 Describes image properties which will be used during 210 hash method. This property is used to refer hash 219 be used to validate the image.
|
| /trusted-firmware-a/plat/nxp/soc-lx2160a/ |
| A D | soc.def | 27 # TZC IP Details TZC used is TZC380 or TZC400 33 # Select the DDR PHY generation to be used 93 # Covert to HEX to be used by create_pbl.mk 99 # Covert to HEX to be used by create_pbl.mk
|
| /trusted-firmware-a/docs/design/ |
| A D | auth-framework.rst | 9 terms of certificate hierarchy and the mechanisms used to verify a 18 - The mechanism used to verify the transported information i.e. the 142 #. Authenticate the image as per the cryptographic algorithms used. 145 be used to authenticate the next image in the CoT. 373 TF-A. This method should only be used by data images. 388 The following enum can be used to define these three methods. 421 The ``init()`` function will be used to initialize the IPL. 494 the ``cookie`` field means that it is not used. 559 field is used to specify the length of the data in the memory. 589 section. These are used to verify the current image. [all …]
|
| A D | trusted-board-boot.rst | 11 Arm DEN0006D. It should be used in conjunction with the 23 be used and its hash embedded into the BL1 and BL2 images (only for 31 enables adding custom extensions to the certificates, which are used to store 41 certificates are used to verify public keys which have been used to sign content 42 certificates. Content certificates are used to store the hash of a boot loader 49 The keys used to establish the CoT are: 58 The private part is used to sign the key certificates corresponding to the 64 The private part is used to sign the key certificate corresponding to the 70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to 83 The following certificates are used to authenticate the images. [all …]
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/ |
| A D | auth-framework.rst.txt | 9 terms of certificate hierarchy and the mechanisms used to verify a 18 - The mechanism used to verify the transported information i.e. the 142 #. Authenticate the image as per the cryptographic algorithms used. 145 be used to authenticate the next image in the CoT. 373 TF-A. This method should only be used by data images. 388 The following enum can be used to define these three methods. 421 The ``init()`` function will be used to initialize the IPL. 494 the ``cookie`` field means that it is not used. 559 field is used to specify the length of the data in the memory. 589 section. These are used to verify the current image. [all …]
|
| A D | trusted-board-boot.rst.txt | 11 Arm DEN0006D. It should be used in conjunction with the 23 be used and its hash embedded into the BL1 and BL2 images (only for 31 enables adding custom extensions to the certificates, which are used to store 41 certificates are used to verify public keys which have been used to sign content 42 certificates. Content certificates are used to store the hash of a boot loader 49 The keys used to establish the CoT are: 58 The private part is used to sign the key certificates corresponding to the 64 The private part is used to sign the key certificate corresponding to the 70 For each of SCP_BL2, BL31, BL32 and BL33, the private part is used to 83 The following certificates are used to authenticate the images. [all …]
|
| /trusted-firmware-a/plat/nxp/soc-ls1028a/ |
| A D | soc.def | 26 # TZC used is TZC380 or TZC400 32 # DDR PHY generation to be used 63 # Covert to HEX to be used by create_pbl.mk
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/plat/arm/ |
| A D | arm-build-options.rst.txt | 16 should match the frame used by the Non-Secure image (normally the Linux 41 this flag is 0. Note that this option is not used on FVP platforms. 46 State-ID yet. Hence this flag is used to configure whether to use the 51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the 55 Firmware. This private key will be used by the certificate generation tool 72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the 100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the 131 compatible change to the MTL protocol, used for AP/SCP communication. 142 is set to 1, then SCMI/SDS drivers will be used. Default is 0. 151 core count, cluster count or other peripherals. This build option is used
|
| /trusted-firmware-a/docs/plat/arm/ |
| A D | arm-build-options.rst | 16 should match the frame used by the Non-Secure image (normally the Linux 41 this flag is 0. Note that this option is not used on FVP platforms. 46 State-ID yet. Hence this flag is used to configure whether to use the 51 - ``ARM_ROTPK_LOCATION``: used when ``TRUSTED_BOARD_BOOT=1``. It specifies the 55 Firmware. This private key will be used by the certificate generation tool 72 - ``ARM_ROTPK_HASH``: used when ``ARM_ROTPK_LOCATION=devel_*``. Specifies the 100 - ``ARM_SPMC_MANIFEST_DTS`` : path to an alternate manifest file used as the 131 compatible change to the MTL protocol, used for AP/SCP communication. 142 is set to 1, then SCMI/SDS drivers will be used. Default is 0. 151 core count, cluster count or other peripherals. This build option is used
|
| /trusted-firmware-a/docs/build/latex/ |
| A D | sphinxlatexobjects.sty | 32 \newcommand{\version}{}% part of \py@release, used by title page and headers 33 % \releaseinfo is used on titlepage (sphinxmanual.cls, sphinxhowto.cls) 41 \newcommand{\sphinxheadercomma}{, }% used in fancyhdr header definition 53 % author's name. This can be used to format them differently, which 61 % With 4.0.0 \pysigline (and \pysiglinewithargsret), used in a fulllineitems 64 \newcommand{\py@itemnewline}[1]{% macro used as \makelabel in fulllineitems 98 % used twice or more in a row for labels sharing common description,
|
| A D | sphinxlatexlists.sty | 13 % #2 and #3 are counters used by enumerate environment e.g. enumi, enumii. 24 % remove LaTeX's cap on nesting depth if 'maxlistdepth' key used. 26 % is always used in "true" branches: "\if ... \@toodeep \else .. \fi." 31 % do nothing if 'maxlistdepth' key not used or if package enumitem loaded.
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/ |
| A D | license.rst.txt | 22 - Neither the name of Arm nor the names of its contributors may be used to 58 is used under the BSD-3-Clause license with the author's permission. 61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of 66 (NCSA OR MIT). It is used by this project under the terms of the NCSA 75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
|
| /trusted-firmware-a/docs/ |
| A D | license.rst | 22 - Neither the name of Arm nor the names of its contributors may be used to 58 is used under the BSD-3-Clause license with the author's permission. 61 (GPL-2.0+ OR BSD-2-Clause). It is used by this project under the terms of 66 (NCSA OR MIT). It is used by this project under the terms of the NCSA 75 (GPL-2.0+ OR BSD-3-Clause). It is used by this project under the terms of the
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/process/ |
| A D | coding-style.rst.txt | 19 used for units) but code itself is still limited to ASCII characters. 22 character is used to break a line and reset to the first column. 29 spellings of a word, the American English spelling is used. 33 name should be used as-is. 38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO 43 missing extensions are rarely used, however, and should not pose a problem. 51 Static Analysis is used to regularly generate a report of current MISRA defects 80 Single spacing should be used around most operators, including: 164 used, braces must be placed around the statements that form the body of the 322 * This style can be used for additional emphasis. [all …]
|
| /trusted-firmware-a/docs/process/ |
| A D | coding-style.rst | 19 used for units) but code itself is still limited to ASCII characters. 22 character is used to break a line and reset to the first column. 29 spellings of a word, the American English spelling is used. 33 name should be used as-is. 38 The C language mode used for TF-A is *GNU99*. This is the "GNU dialect of ISO 43 missing extensions are rarely used, however, and should not pose a problem. 51 Static Analysis is used to regularly generate a report of current MISRA defects 80 Single spacing should be used around most operators, including: 164 used, braces must be placed around the statements that form the body of the 322 * This style can be used for additional emphasis. [all …]
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/components/fconf/ |
| A D | index.rst.txt | 11 retrieved without the requesting entity knowing what backing store is being used 14 It is used to bridge new and old ways of providing platform-specific data. 83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to 104 can be used to fill the C data structure with the data from the config |DTB|. 118 - Properties used inside common code. 119 - Properties used inside platform specific code.
|
| /trusted-firmware-a/docs/components/fconf/ |
| A D | index.rst | 11 retrieved without the requesting entity knowing what backing store is being used 14 It is used to bridge new and old ways of providing platform-specific data. 83 This second level wrapper can be used to remap the ``FCONF_GET_PROPERTY()`` to 104 can be used to fill the C data structure with the data from the config |DTB|. 118 - Properties used inside common code. 119 - Properties used inside platform specific code.
|
| /trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/ |
| A D | porting-guide.rst.txt | 137 tree at all the power domain levels used by the platform. 177 the array used for PSCI_STAT_COUNT/RESIDENCY accounting. 253 BL2 image identifier, used by BL1 to load BL2. 257 BL31 image identifier, used by BL2 to load BL31. 261 BL33 image identifier, used by BL2 to load BL33. 399 BL32 image identifier, used by BL2 to load BL32. 1112 This function returns a random value that is used to initialize the canary used 1301 sequence used by plat_try_next_boot_source(). 1304 layer used to load the next bootloader image. 1882 used in release builds. [all …]
|
| A D | build-options.rst.txt | 71 - ``BL31_KEY``: This option is used when ``GENERATE_COT=1``. It specifies the 73 this file name will be used to save the key. 87 this file name will be used to save the key. 90 ``fip`` target in case TF-A BL2 is used. 94 this file name will be used to save the key. 595 file name will be used to save the key. 607 this file name will be used to save the key. 687 - ``TRUSTED_WORLD_KEY``: This option is used when ``GENERATE_COT=1``. It 733 device tree and COT descriptors used by BL1 are retained in the code 756 - ``VERSION_STRING``: String used in the log output for each TF-A image. [all …]
|
| /trusted-firmware-a/docs/getting_started/ |
| A D | porting-guide.rst | 137 tree at all the power domain levels used by the platform. 177 the array used for PSCI_STAT_COUNT/RESIDENCY accounting. 253 BL2 image identifier, used by BL1 to load BL2. 257 BL31 image identifier, used by BL2 to load BL31. 261 BL33 image identifier, used by BL2 to load BL33. 399 BL32 image identifier, used by BL2 to load BL32. 1112 This function returns a random value that is used to initialize the canary used 1301 sequence used by plat_try_next_boot_source(). 1304 layer used to load the next bootloader image. 1882 used in release builds. [all …]
|
| A D | build-options.rst | 71 - ``BL31_KEY``: This option is used when ``GENERATE_COT=1``. It specifies the 73 this file name will be used to save the key. 87 this file name will be used to save the key. 90 ``fip`` target in case TF-A BL2 is used. 94 this file name will be used to save the key. 595 file name will be used to save the key. 607 this file name will be used to save the key. 687 - ``TRUSTED_WORLD_KEY``: This option is used when ``GENERATE_COT=1``. It 733 device tree and COT descriptors used by BL1 are retained in the code 756 - ``VERSION_STRING``: String used in the log output for each TF-A image. [all …]
|