Home
last modified time | relevance | path

Searched full:trustzone (Results 1 – 25 of 82) sorted by relevance

1234

/openbmc/u-boot/doc/
H A DREADME.fsl-trustzone-components1 Freescale ARM64 SoCs like LS2080A have ARM TrustZone components like
2 TZPC-BP147 (TrustZone Protection Controller) and TZASC-400 (TrustZone
12 TZPC-BP147 (TrustZone Protection Controller)
19 TZASC-400 (TrustZone Address Space Controller)
H A DREADME.tee8 secure environment, for example, TrustZone on ARM CPUs, or a separate
48 TrustZone based OP-TEE solution that is supported.
62 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
/openbmc/linux/Documentation/devicetree/bindings/rng/
H A Darm-cctrng.yaml7 title: Arm TrustZone CryptoCell TRNG engine
13 Arm TrustZone CryptoCell TRNG (True Random Number Generator) engine.
29 Arm TrustZone CryptoCell TRNG engine has 4 ring oscillators.
/openbmc/linux/arch/arm/mach-mediatek/
H A Dplatsmp.c77 static void __init __mtk_smp_prepare_cpus(unsigned int max_cpus, int trustzone) in __mtk_smp_prepare_cpus() argument
82 if (trustzone) { in __mtk_smp_prepare_cpus()
103 if (trustzone) { in __mtk_smp_prepare_cpus()
104 /* smp_base(trustzone-bootinfo) is reserved by device tree */ in __mtk_smp_prepare_cpus()
/openbmc/linux/drivers/remoteproc/
H A DKconfig191 for the non-TrustZone part of Qualcomm Technology Inc. ADSP and CDSP
192 remote processors. The TrustZone part is handled by QCOM_Q6V5_PAS
212 subsystem based on Hexagon V5. The TrustZone based system is
231 Say y here to support the TrustZone based Peripheral Image Loader
255 a non-TrustZone wireless subsystem.
288 System (PAS) in TrustZone.
/openbmc/u-boot/doc/device-tree-bindings/firmware/
H A Dlinaro,optee-tz.txt4 Execution Environment. The security can be provided with ARM TrustZone, but
10 * OP-TEE based on ARM TrustZone required properties:
/openbmc/qemu/docs/system/arm/
H A Dvexpress.rst43 - BP147 TrustZone Protection Controller
44 - TrustZone Address Space Controller
53 TrustZone or the Virtualization Extensions: if you want these you
H A Dvirt.rst43 - Secure-World-only devices if the CPU has TrustZone:
53 TrustZone emulation is not enabled.
103 Arm Security Extensions (TrustZone). The default is ``off``.
H A Dxlnx-zcu102.rst14 Arm Security Extensions (TrustZone). The default is ``off``.
/openbmc/linux/Documentation/devicetree/bindings/arm/
H A Dsecure.txt3 ARM CPUs with TrustZone support have two distinct address spaces,
5 kernel) are not TrustZone aware and run entirely in either the Normal
7 TrustZone aware and need to be able to determine whether devices are
H A Darm,realview.yaml15 the earlier CPUs such as TrustZone and multicore (MPCore).
28 (HBI-0147) was created as a development board to test ARM TrustZone,
/openbmc/qemu/include/hw/misc/
H A Dtz-mpc.h2 * ARM AHB5 TrustZone Memory Protection Controller emulation
12 /* This is a model of the TrustZone memory protection controller (MPC).
H A Dtz-msc.h2 * ARM TrustZone master security controller emulation
13 * This is a model of the TrustZone master security controller (MSC).
H A Dtz-ppc.h2 * ARM TrustZone peripheral protection controller emulation
12 /* This is a model of the TrustZone peripheral protection controller (PPC).
/openbmc/u-boot/board/freescale/ls1021atwr/
H A DREADME66 - QorIQ Trust Architecture, Secure Boot, and ARM TrustZone supported
75 - QorIQ TrustArchitecture with Secure Boot, as well as ARM TrustZone supported
/openbmc/linux/arch/arm/boot/dts/mediatek/
H A Dmt8127.dtsi50 trustzone-bootinfo@80002000 {
51 compatible = "mediatek,trustzone-bootinfo";
/openbmc/u-boot/board/freescale/ls1021aqds/
H A DREADME66 - QorIQ Trust Architecture, Secure Boot, and ARM TrustZone supported
75 - QorIQ TrustArchitecture with Secure Boot, as well as ARM TrustZone supported
/openbmc/linux/Documentation/staging/
H A Dtee.rst8 secure environment, for example, TrustZone on ARM CPUs, or a separate
124 TrustZone based OP-TEE solution that is supported.
138 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
275 is a dedicated processor that features ARM TrustZone technology, along with a
/openbmc/u-boot/drivers/tee/optee/
H A DKconfig8 ARM TrustZone(R) technology as the underlying hardware isolation
/openbmc/linux/arch/arm/boot/dts/st/
H A Dste-db9500.dtsi24 * to actually call into trustzone to run secure
H A Dste-db8520.dtsi42 * to actually call into trustzone to run secure
/openbmc/u-boot/arch/arm/mach-tegra/
H A Dap.c198 * is restricted to TrustZone-secured requestors. The kernel will use in smmu_enable()
208 * to TrustZone-secured requestors. in smmu_enable()
/openbmc/u-boot/drivers/tee/
H A DKconfig9 environment, for example, TrustZone on ARM cpus, or a separate
/openbmc/linux/arch/arm/common/
H A Dsecure_cntvoff.S16 * mode or secure Monitor mode with SCR.NS==1. If TrustZone is enabled
/openbmc/linux/Documentation/devicetree/bindings/crypto/
H A Darm,cryptocell.yaml7 title: Arm TrustZone CryptoCell cryptographic engine

1234