/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/ |
H A D | optee-os-corstone1000-common.inc | 12 # default disable latency benchmarks (over all OP-TEE layers)
|
/openbmc/u-boot/arch/arm/dts/ |
H A D | k3-am654-base-board.dts | 31 reg = <0 0x9e800000 0 0x01800000>; /* for OP-TEE */
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch | 86 - bool "UEFI variables storage service via OP-TEE" 90 + select TEE 94 + When using the u-boot OP-TEE driver, StandAlonneMM is supported. 97 If OP-TEE is present and running StandAloneMM, dispatch all UEFI 285 + * Issue a door bell event to notify the MM partition (SP) running in OP-TEE 404 * it to OP-TEE 412 + * When using the u-boot OP-TEE driver, StandAlonneMM is supported.
|
/openbmc/openbmc/meta-nuvoton/meta-evb-npcm845/recipes-kernel/linux/linux-nuvoton/ |
H A D | evb-npcm845.cfg | 59 # TEE
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | change-log.rst | 275 - OP-TEE 3.14 280 - OP-TEE: adding smm-gateway partition 291 - OP-TEE 3.14
|
H A D | release-notes.rst | 160 - OP-TEE version 3.14 197 - OP-TEE version 3.14 210 …- Very basic functionality of booting Secure Enclave, Trusted Firmware-A , OP-TEE , u-boot and Lin…
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/n1sdp/ |
H A D | 0002-Modify-BL32-Location-to-DDR4.patch | 6 Since OP-TEE start address is changed to run
|
H A D | 0003-Modify-SPMC-Base-to-DDR4.patch | 6 Since OP-TEE start address is changed to run
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a-n1sdp.inc | 18 file://0001-Reserve-OP-TEE-memory-from-nwd.patch \
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-examples.inc | 1 SUMMARY = "OP-TEE examples"
|
H A D | optee.inc | 18 # FIXME - breaks with Clang 18. See https://github.com/OP-TEE/optee_os/issues/6754
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/optee-test/ |
H A D | 0001-xtest-stats-remove-unneeded-stat.h-include.patch | 17 Upstream-Status: Inappropriate [https://github.com/OP-TEE/optee_test/issues/722]
|
/openbmc/u-boot/board/ti/am65x/ |
H A D | README | 115 Tree: https://github.com/OP-TEE/optee_os.git 141 …aarch64-linux-gnu- ATF=<path to ATF dir>/build/k3/generic/release/bl31.bin TEE=<path to OPTEE OS d…
|
/openbmc/linux/drivers/firmware/broadcom/ |
H A D | Kconfig | 28 depends on (ARCH_BCM_IPROC && OPTEE) || (COMPILE_TEST && TEE)
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/uefi/ |
H A D | edk2-firmware-n1sdp.inc | 24 file://0009-Platform-ARM-N1Sdp-Reserve-OP-TEE-Region-from-UEFI.patch;patchdir=edk2-platforms \
|
/openbmc/linux/drivers/firmware/arm_scmi/ |
H A D | Kconfig | 90 bool "SCMI transport based on OP-TEE service" 97 This enables the OP-TEE service based transport for SCMI. 100 transport based on OP-TEE SCMI service, answer Y.
|
/openbmc/linux/arch/arm/mach-at91/ |
H A D | Kconfig | 226 When running under a TEE, the suspend mode must be requested to be set 227 at TEE level. When enable, this option will use secure monitor calls
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | Kconfig | 46 along with software-based Trusted Execution Environment (TEE) to
|
/openbmc/linux/Documentation/devicetree/bindings/firmware/ |
H A D | arm,scmi.yaml | 45 - description: SCMI compliant firmware with OP-TEE transport 125 Channel specifier required when using OP-TEE transport. 278 Channel specifier required when using OP-TEE transport and
|
/openbmc/linux/arch/arm64/boot/dts/ti/ |
H A D | k3-am62p5-sk.dts | 45 reg = <0x00 0x9e800000 0x00 0x01800000>; /* for OP-TEE */
|
/openbmc/linux/drivers/char/tpm/ |
H A D | Kconfig | 208 tristate "TEE based fTPM Interface" 209 depends on TEE && OPTEE 211 This driver proxies for firmware TPM running in TEE.
|
/openbmc/openbmc/meta-nuvoton/recipes-kernel/linux/linux-nuvoton/ |
H A D | npcm8xx_defconfig | 186 # Enable TEE
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a_%.bbappend | 57 # When using OP-TEE SPMC specify the SPMC manifest file.
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-driver-ccp | 105 Execution Environment (TEE).
|
/openbmc/openbmc/meta-arm/documentation/ |
H A D | trusted-services.md | 37 2. optee-os might require platform specific OP-TEE build parameters (for example what SEL the SPM C…
|