The list of file names, the files are retrieve in chunks. Sl_FsGetFileList (_i32 *pIndex, _u8 Count, _u8 Ma圎ntryLen, _u8 *pBuff, SlFileListFlags_t Flags) Sl_FsProgram (const _u8 *pData, _u16 Len, const _u8 *pKey, _u32 Flags)Įnables to format and configure the device with pre-prepared configuration. Sl_FsCtl (SlFsCtl_e Command, _u32 Token, _u8 *pFileName, const _u8 *pData, _u16 DataLen, _u8 *pOutputData, _u16 OutputDataLen, _u32 *pNewToken)Ĭontrols various file system operations. Assess, plan, implement, and measure software practices and capabilities to modernize and simplify your organization’s business application portfolios. Sl_FsDel (const _u8 *pFileName, const _u32 Token)ĭelete specific file from a storage or all files from a storage (format) More. Sl_FsGetInfo (const _u8 *pFileName, const _u32 Token, SlFsFileInfo_t *pFsFileInfo) securefs is a filesystem in userspace (FUSE) with transparent encryption (when writing) and decryption (when reading). Write block of data to a file in storage device. Sl_FsWrite (const _i32 FileHdl, _u32 Offset, _u8 *pData, _u32 Len) Alternatively, the encrypted SCP (Secure Copy) and HTTP-based WebDAV protocols are also used. Read block of data from a file in storage device. Accessing the file server over the internet typically works with FTP (File Transfer Protocol) or it’s encrypted variant SFTP ( S ecure FTP ). This file is securely deleted when the key is deleted, or it is encrypted in a new way this added protection ensures an attacker must recover every bit of this securely deleted file to recover the key. Sl_FsRead (const _i32 FileHdl, _u32 Offset, _u8 *pData, _u32 Len) The secdiscardable hash is a 512-bit hash of a random 16 KB file stored alongside other information used to reconstruct the key, such as the seed. Sl_FsClose (const _i32 FileHdl, const _u8 *pCeritificateFileName, const _u8 *pSignature, const _u32 SignatureLen) Open file for read or write from/to storage device More. Sl_FsOpen (const _u8 *pFileName, const _u32 AccessModeAndMaxSize, _u32 *pToken) Provides file system capabilities to TI's CC31XX that can be used by both the CC31XX device and the user.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |