/device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/ |
D | RsaVerify2.c | 193 GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *Payload = "Payload Data for PKCS#7 Signing"; variable 355 (UINT8 *) Payload, in ValidateCryptPkcs7() 356 AsciiStrLen (Payload), in ValidateCryptPkcs7() 376 (UINT8 *) Payload, in ValidateCryptPkcs7() 377 AsciiStrLen (Payload) in ValidateCryptPkcs7()
|
/device/linaro/bootloader/edk2/NetworkPkg/Ip6Dxe/ |
D | Ip6Input.c | 755 OUT UINT8 **Payload, in Ip6PreProcessPacket() argument 864 *Payload = AllocatePool ((UINTN) PayloadLen); in Ip6PreProcessPacket() 865 if (*Payload == NULL) { in Ip6PreProcessPacket() 869 NetbufCopy (*Packet, sizeof (EFI_IP6_HEADER), PayloadLen, *Payload); in Ip6PreProcessPacket() 876 *Payload, in Ip6PreProcessPacket() 943 if (*Payload != NULL) { in Ip6PreProcessPacket() 944 FreePool (*Payload); in Ip6PreProcessPacket() 947 *Payload = AllocatePool ((UINTN) PayloadLen); in Ip6PreProcessPacket() 948 if (*Payload == NULL) { in Ip6PreProcessPacket() 952 NetbufCopy (*Packet, sizeof (EFI_IP6_HEADER), PayloadLen, *Payload); in Ip6PreProcessPacket() [all …]
|
/device/linaro/bootloader/edk2/MdeModulePkg/Library/PlatformVarCleanupLib/ |
D | PlatVarCleanupLib.c | 352 UINT8 *Payload; in CreateTimeBasedPayload() local 368 Payload = *Data; in CreateTimeBasedPayload() 377 if ((Payload != NULL) && (PayloadSize != 0)) { in CreateTimeBasedPayload() 378 CopyMem (NewData + DescriptorSize, Payload, PayloadSize); in CreateTimeBasedPayload() 401 if (Payload != NULL) { in CreateTimeBasedPayload() 402 FreePool (Payload); in CreateTimeBasedPayload() 436 UINT8 *Payload; in CreateCounterBasedPayload() local 452 Payload = *Data; in CreateCounterBasedPayload() 463 if ((Payload != NULL) && (PayloadSize != 0)) { in CreateCounterBasedPayload() 464 CopyMem (NewData + DescriptorSize, Payload, PayloadSize); in CreateCounterBasedPayload() [all …]
|
/device/google/cuttlefish_common/common/vsoc/lib/ |
D | socket_forward_region_view.h | 47 using Payload = char[kMaxPayloadSize]; member 48 Payload payload_data_; 78 Payload& payload() { return payload_data_; } in payload() 80 const Payload& payload() const { return payload_data_; } in payload()
|
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/ |
D | fip_create.sh | 30 --tos-fw FILENAME Secure Payload BL32 (Trusted OS) 31 --tos-fw-extra1 FILENAME Secure Payload BL32 Extra1 (Trusted OS Extra1) 32 --tos-fw-extra2 FILENAME Secure Payload BL32 Extra2 (Trusted OS Extra2)
|
/device/linaro/bootloader/edk2/CorebootPayloadPkg/ |
D | CorebootPayloadPkg.dec | 2 # Coreboot Payload Package 27 ## Defines the token space for the Coreboot Payload Package PCDs.
|
D | BuildAndIntegrationInstructions.txt | 30 This document provides instructions on how to build Coreboot Uefi Payload and 62 3. In the Payload section, 64 2) Type the path of payload image for the option of "Payload path and filename".
|
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
D | TcgStorageCore.h | 42 UINT8 Payload[0]; member 53 UINT8 Payload[0]; member 62 UINT8 Payload[0]; member
|
/device/linaro/bootloader/edk2/MdeModulePkg/Bus/Pci/NvmExpressDxe/ |
D | NvmExpressPassthru.c | 578 Sq->Payload.Raw.Cdw10 = Packet->NvmeCmd->Cdw10; in NvmExpressPassThru() 581 Sq->Payload.Raw.Cdw11 = Packet->NvmeCmd->Cdw11; in NvmExpressPassThru() 584 Sq->Payload.Raw.Cdw12 = Packet->NvmeCmd->Cdw12; in NvmExpressPassThru() 587 Sq->Payload.Raw.Cdw13 = Packet->NvmeCmd->Cdw13; in NvmExpressPassThru() 590 Sq->Payload.Raw.Cdw14 = Packet->NvmeCmd->Cdw14; in NvmExpressPassThru() 593 Sq->Payload.Raw.Cdw15 = Packet->NvmeCmd->Cdw15; in NvmExpressPassThru()
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/ |
D | IpSecDxe.inf | 58 Ikev2/Payload.h 64 Ikev2/Payload.c
|
D | IpSecImpl.c | 1397 NET_BUF *Payload; in IpSecEspInboundPacket() local 1417 Payload = NULL; in IpSecEspInboundPacket() 1427 Payload = NetbufFromExt ( in IpSecEspInboundPacket() 1435 if (Payload == NULL) { in IpSecEspInboundPacket() 1443 EspSize = Payload->TotalSize; in IpSecEspInboundPacket() 1444 EspHeader = (EFI_ESP_HEADER *) NetbufGetByte (Payload, 0, NULL); in IpSecEspInboundPacket() 1491 NetbufCopy (Payload, 0, (UINT32) EspSize, ProcessBuffer); in IpSecEspInboundPacket() 1647 if (Payload != NULL) { in IpSecEspInboundPacket() 1648 NetbufFree (Payload); in IpSecEspInboundPacket()
|
/device/linaro/bootloader/edk2/StdLib/Efi/StdLib/etc/ |
D | protocols | 34 esp 50 IPSEC-ESP # Encap Security Payload [RFC2406] 50 ipcomp 108 IPCOMP # IP Payload Compression Protocol
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/TcgStorageCoreLib/ |
D | TcgStorageCore.c | 142 …CreateStruct->CurPacket = (TCG_PACKET*)(CreateStruct->ComPacket->Payload + SwapBytes32(CreateStruc… in TcgStartPacket() 194 …CreateStruct->CurSubPacket = (TCG_SUB_PACKET*)(CreateStruct->CurPacket->Payload + SwapBytes32(Crea… in TcgStartSubPacket() 370 Dest = CreateStruct->ComPacket->Payload + SwapBytes32(CreateStruct->ComPacket->LengthBE); in TcgAddRawTokenData() 895 ParseStruct->CurPacket = (TCG_PACKET*)ParseStruct->ComPacket->Payload; in TcgInitTcgParseStruct() 905 ParseStruct->CurSubPacket = (TCG_SUB_PACKET*)ParseStruct->CurPacket->Payload; in TcgInitTcgParseStruct() 950 ParseStruct->CurPtr = ParseStruct->CurSubPacket->Payload; in TcgGetNextToken() 953 …EndOfSubPacket = ParseStruct->CurSubPacket->Payload + SwapBytes32(ParseStruct->CurSubPacket->Lengt… in TcgGetNextToken()
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/AuthVariableLib/ |
D | AuthService.c | 918 UINT8 *Payload; in ProcessVarWithPk() local 935 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data); in ProcessVarWithPk() 941 Status = CheckSignatureListFormat(VariableName, VendorGuid, Payload, PayloadSize); in ProcessVarWithPk() 949 Payload, in ProcessVarWithPk() 1039 UINT8 *Payload; in ProcessVarWithKek() local 1069 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data); in ProcessVarWithKek() 1072 Status = CheckSignatureListFormat(VariableName, VendorGuid, Payload, PayloadSize); in ProcessVarWithKek() 1080 Payload, in ProcessVarWithKek()
|
/device/linaro/bootloader/arm-trusted-firmware/docs/plat/ |
D | qemu.rst | 20 - No instructions for how to load a BL32 (Secure Payload)
|
D | xilinx-zynqmp.rst | 10 BL32 is an optional Secure Payload.
|
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | rt-svc-writers-guide.rst | 272 NOTE: The PSCI and Test Secure-EL1 Payload Dispatcher services do not follow 292 Secure-EL1 Payload Dispatcher service (SPD) 296 or other Secure-EL1 Payload are special. These services need to manage the 299 and generally manage the Secure-EL1 Payload through CPU power-state transitions.
|
D | interrupt-framework-design.rst | 277 #. Secure Payload Dispatcher (SPD) service. This service interfaces with the 278 Secure Payload (SP) software which runs in Secure-EL1/Secure-EL0 and is 285 Payload Dispatcher (TSPD) service. 290 #. Secure Payload (SP). On a production system, the Secure Payload corresponds 293 Firmware implements an example secure payload called Test Secure Payload 348 particular type of interrupt. A Secure Payload Dispatcher service should use 399 routing model supported by itself and the Secure Payload. It is also responsible 410 The SPD should determine the mechanism to pass control to the Secure Payload 439 #. It passes control to the Test Secure Payload to perform its 487 A Secure Payload must implement an interrupt handling framework at Secure-EL1 [all …]
|
D | change-log.rst | 311 Included is a minimal AArch32 Secure Payload, **SP-MIN**, that illustrates 316 Payload is supported. 699 the Secure Payload Dispatcher. This is used by the PSCI FEATURES function 776 - A Secure Payload Dispatcher (OPTEED) for the OP-TEE Trusted OS has been 831 - The firmware design documentation for the Test Secure-EL1 Payload (TSP) and 985 - The firmware design documentation for the Test Secure-EL1 Payload (TSP) and 1059 - Moved the Test Secure-EL1 Payload (BL3-2) to execute in Trusted SRAM by 1092 - Added support for secure interrupts targeting the Secure-EL1 Payload (SP) 1107 Payload (BL3-2) to execute in Trusted SRAM by default. 1143 - The firmware design documentation for the Test Secure-EL1 Payload (TSP) and [all …]
|
/device/linaro/bootloader/edk2/MdePkg/Include/Protocol/ |
D | UsbFunctionIo.h | 425 OUT EFI_USBFN_MESSAGE_PAYLOAD *Payload
|
/device/linaro/bootloader/edk2/SecurityPkg/Tcg/Opal/OpalPasswordSmm/ |
D | OpalNvmeMode.c | 992 Sq->Payload.Raw.Cdw10 = Packet->NvmeCmd->Cdw10; in NvmePassThru() 995 Sq->Payload.Raw.Cdw11 = Packet->NvmeCmd->Cdw11; in NvmePassThru() 998 Sq->Payload.Raw.Cdw12 = Packet->NvmeCmd->Cdw12; in NvmePassThru() 1001 Sq->Payload.Raw.Cdw13 = Packet->NvmeCmd->Cdw13; in NvmePassThru() 1004 Sq->Payload.Raw.Cdw14 = Packet->NvmeCmd->Cdw14; in NvmePassThru() 1007 Sq->Payload.Raw.Cdw15 = Packet->NvmeCmd->Cdw15; in NvmePassThru()
|
D | OpalNvmeReg.h | 758 NVME_PAYLOAD Payload; member
|
/device/linaro/bootloader/arm-trusted-firmware/ |
D | readme.rst | 76 - A minimal AArch32 Secure Payload (SP\_MIN) to demonstrate `PSCI`_ library 81 When a Secure-EL1 Payload (SP) is present, for example a Secure OS, the
|
/device/linaro/bootloader/edk2/QuarkPlatformPkg/ |
D | QuarkMin.fdf | 30 # Flash offsets are 0 based, but are relative to FD.Quark BaseAddress, e.g. Payload Base is at 0x40… 35 # FLASH_FV_PAYLOAD_BASE | Payload Image | FLASH_FV_PAYLOAD_SIZE 167 # Quark Payload Image
|
/device/linaro/hikey/uefi-tools/ |
D | edk2-platforms.config | 46 # - ATF_SPD Name of Secure Payload Dispatcher
|