Home
last modified time | relevance | path

Searched refs:TEE (Results 1 – 25 of 80) sorted by relevance

1234

/openbmc/u-boot/doc/
H A DREADME.tee2 TEE uclass
10 communicate with the TEE.
14 - Registration of TEE drivers
20 The TEE interface
44 OP-TEE driver
47 The OP-TEE driver handles OP-TEE [1] based TEEs. Currently it is only the ARM
62 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
71 TEE API.
74 OP-TEE architecture:
86 | TEE | | TEE Internal|
[all …]
H A DREADME.avb221 1.1. AVB using OP-TEE (optional)
23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and
25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM
72 OP-TEE:
/openbmc/linux/Documentation/staging/
H A Dtee.rst2 TEE subsystem
10 communicate with the TEE.
20 The TEE interface
120 OP-TEE driver
147 TEE API.
150 OP-TEE architecture::
165 | Client| || | TEE | OP-TEE | | OP-TEE |
187 OP-TEE notifications
268 AMD-TEE driver
300 | TEE | | TEE | AMD-TEE | | AMD-TEE |
[all …]
/openbmc/u-boot/drivers/tee/optee/
H A DKconfig1 # OP-TEE Trusted Execution Environment Configuration
3 bool "OP-TEE"
6 This implements the OP-TEE Trusted Execution Environment (TEE)
7 driver. OP-TEE is a Trusted OS designed primarily to rely on the
9 mechanism. This driver can request services from OP-TEE, but also
10 handle Remote Procedure Calls (RPC) from OP-TEE needed to
15 menu "OP-TEE options"
21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
/openbmc/u-boot/drivers/tee/
H A DKconfig2 config TEE config
8 Environment (TEE). A TEE is a trusted OS running in some secure
13 if TEE
15 menu "TEE drivers"
18 bool "Sandbox TEE emulator"
22 This emulates a generic TEE needed for testing including the AVB
23 TA. The emulation provides all callbacks of a regular TEE and
/openbmc/u-boot/tools/
H A Dk3_fit_atf.sh17 [ -z "$TEE" ] && TEE="bl32.bin"
19 if [ ! -f $TEE ]; then
20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2
21 TEE=/dev/null
44 data = /incbin/("$TEE");
/openbmc/linux/drivers/tee/optee/
H A DKconfig2 # OP-TEE Trusted Execution Environment Configuration
4 tristate "OP-TEE"
8 This implements the OP-TEE Trusted Execution Environment (TEE)
12 bool "Load OP-TEE image as firmware"
16 This loads the BL32 image for OP-TEE as firmware when the driver is
/openbmc/linux/drivers/tee/amdtee/
H A DKconfig2 # AMD-TEE Trusted Execution Environment Configuration
4 tristate "AMD-TEE"
8 This implements AMD's Trusted Execution Environment (TEE) driver.
/openbmc/u-boot/doc/device-tree-bindings/firmware/
H A Dlinaro,optee-tz.txt1 OP-TEE Device Tree Bindings
3 OP-TEE is a piece of software using hardware features to provide a Trusted
10 * OP-TEE based on ARM TrustZone required properties:
14 - method : The method of calling the OP-TEE Trusted OS. Permitted
/openbmc/linux/drivers/tee/
H A DKconfig3 menuconfig TEE config
12 Environment (TEE).
14 if TEE
/openbmc/u-boot/arch/arm/mach-rockchip/
H A Dfit_spl_optee.its10 description = "Simple image with OP-TEE support";
24 description = "OP-TEE";
44 description = "Rockchip armv7 with OP-TEE";
/openbmc/openbmc/meta-arm/meta-arm/recipes-kernel/linux/files/
H A Dtee.cfg5 # TEE drivers
8 # end of TEE drivers
/openbmc/linux/security/keys/trusted-keys/
H A DKconfig20 bool "TEE-based trusted keys"
21 depends on TEE >= TRUSTED_KEYS
24 Enable use of the Trusted Execution Environment (TEE) as trusted
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-client.inc1 SUMMARY = "OP-TEE Client API"
2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE"
11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \
H A Doptee-os.inc1 SUMMARY = "OP-TEE Trusted OS"
2 DESCRIPTION = "Open Portable Trusted Execution Environment - Trusted side of the TEE"
17 SRC_URI = "git://github.com/OP-TEE/optee_os.git;branch=master;protocol=https"
H A Doptee-os-tadevkit_4.1.0.bb3 SUMMARY = "OP-TEE Trusted OS TA devkit"
4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
H A Doptee-test.inc1 SUMMARY = "OP-TEE sanity testsuite"
14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/uefi/files/n1sdp/
H A D0009-Platform-ARM-N1Sdp-Reserve-OP-TEE-Region-from-UEFI.patch4 Subject: [PATCH] Platform/ARM/N1Sdp: Reserve OP-TEE Region from UEFI
6 To enable cache on N1SDP, OP-TEE has to be moved
40 + // Reserved OP-TEE region
64 + # Base Address of OP-TEE
/openbmc/linux/Documentation/devicetree/bindings/arm/firmware/
H A Dlinaro,optee-tz.yaml7 title: OP-TEE
13 OP-TEE is a piece of software using hardware features to provide a Trusted
37 The method of calling the OP-TEE Trusted OS depending on smc or hvc
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-bus-optee-devices6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid>
15 Allows to distinguish whether an OP-TEE based TA/device requires user-space
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/n1sdp/
H A D0001-Reserve-OP-TEE-memory-from-nwd.patch4 Subject: [PATCH] n1sdp: Reserve OP-TEE memory from NWd
6 The physical memory which is used to run OP-TEE on the N1SDP is known
/openbmc/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone)
36 fuses and is accessible to TEE only.
51 (2) TEE
72 (2) TEE
75 be extended with TEE based measured boot process.
88 (2) TEE
120 * TEE: OP-TEE based on Arm TrustZone based RNG
208 Trusted Keys usage: TEE
218 specific to TEE device implementation. The key length for new keys is always
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/
H A Dtrusted-firmware-a-corstone1000.inc29 # tee driver sends yielding requests to OP-TEE
30 # at a faster pace than OP-TEE processes them,
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/optee-client/
H A Dtee-supplicant@.service2 Description=TEE Supplicant on %i
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/optee-client/
H A Dtee-supplicant@.service2 Description=TEE Supplicant on %i

1234