/openbmc/u-boot/doc/ |
H A D | README.tee | 2 TEE uclass 5 This document describes the TEE uclass in U-Boot 7 A TEE (Trusted Execution Environment) is a trusted OS running in some 9 secure co-processor etc. A TEE driver handles the details needed to 10 communicate with the TEE. 14 - Registration of TEE drivers 16 - Managing shared memory between U-Boot and the TEE 18 - Providing a generic API to the TEE 20 The TEE interface 23 include/tee.h defines the generic interface to a TEE. [all …]
|
H A D | README.avb2 | 21 1.1. AVB using OP-TEE (optional) 23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and 25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM 72 OP-TEE:
|
/openbmc/linux/Documentation/staging/ |
H A D | tee.rst | 2 TEE subsystem 5 This document describes the TEE subsystem in Linux. 7 A TEE (Trusted Execution Environment) is a trusted OS running in some 9 secure co-processor etc. A TEE driver handles the details needed to 10 communicate with the TEE. 14 - Registration of TEE drivers 16 - Managing shared memory between Linux and the TEE 18 - Providing a generic API to the TEE 20 The TEE interface 23 include/uapi/linux/tee.h defines the generic interface to a TEE. [all …]
|
/openbmc/u-boot/drivers/tee/optee/ |
H A D | Kconfig | 1 # OP-TEE Trusted Execution Environment Configuration 3 bool "OP-TEE" 6 This implements the OP-TEE Trusted Execution Environment (TEE) 7 driver. OP-TEE is a Trusted OS designed primarily to rely on the 9 mechanism. This driver can request services from OP-TEE, but also 10 handle Remote Procedure Calls (RPC) from OP-TEE needed to 15 menu "OP-TEE options" 21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
|
/openbmc/u-boot/drivers/tee/ |
H A D | Kconfig | 2 config TEE config 8 Environment (TEE). A TEE is a trusted OS running in some secure 13 if TEE 15 menu "TEE drivers" 18 bool "Sandbox TEE emulator" 22 This emulates a generic TEE needed for testing including the AVB 23 TA. The emulation provides all callbacks of a regular TEE and
|
/openbmc/u-boot/tools/ |
H A D | k3_fit_atf.sh | 17 [ -z "$TEE" ] && TEE="bl32.bin" 19 if [ ! -f $TEE ]; then 20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2 21 TEE=/dev/null 44 data = /incbin/("$TEE");
|
/openbmc/linux/drivers/tee/optee/ |
H A D | Kconfig | 2 # OP-TEE Trusted Execution Environment Configuration 4 tristate "OP-TEE" 8 This implements the OP-TEE Trusted Execution Environment (TEE) 12 bool "Load OP-TEE image as firmware" 16 This loads the BL32 image for OP-TEE as firmware when the driver is
|
/openbmc/u-boot/doc/device-tree-bindings/firmware/ |
H A D | linaro,optee-tz.txt | 1 OP-TEE Device Tree Bindings 3 OP-TEE is a piece of software using hardware features to provide a Trusted 10 * OP-TEE based on ARM TrustZone required properties: 14 - method : The method of calling the OP-TEE Trusted OS. Permitted
|
/openbmc/linux/drivers/tee/amdtee/ |
H A D | Kconfig | 2 # AMD-TEE Trusted Execution Environment Configuration 4 tristate "AMD-TEE" 8 This implements AMD's Trusted Execution Environment (TEE) driver.
|
/openbmc/linux/drivers/tee/ |
H A D | Kconfig | 3 menuconfig TEE config 12 Environment (TEE). 14 if TEE
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/libts/ |
H A D | 0001-Remove-TEE-driver-external-component.patch | 4 Subject: [PATCH] Remove TEE driver external component 95 - printf("error: cannot read TS TEE driver version\n"); 99 - printf("error: TS TEE driver not available\n"); 116 - printf("error: TS TEE driver is v%u.%u.%u but required v%u.%u.%u\n", major, minor, patch, 177 - DOC "Linux FF-A TEE driver include directory" 183 - CACHE STRING "Linux FF-A TEE driver repository URL") 188 - CACHE STRING "Linux FF-A TEE driver git refspec") 191 - CACHE PATH "Location of Linux TEE driver source.") 195 - CACHE PATH "Location of Linux TEE driver source." FORCE) 215 - DOC "Linux FF-A TEE driver include directory"
|
/openbmc/u-boot/arch/arm/mach-rockchip/ |
H A D | fit_spl_optee.its | 10 description = "Simple image with OP-TEE support"; 24 description = "OP-TEE"; 44 description = "Rockchip armv7 with OP-TEE";
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | Kconfig | 20 bool "TEE-based trusted keys" 21 depends on TEE >= TRUSTED_KEYS 24 Enable use of the Trusted Execution Environment (TEE) as trusted
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-kernel/linux/files/ |
H A D | tee.cfg | 5 # TEE drivers 8 # end of TEE drivers
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/ |
H A D | 0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch | 4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE 6 OP-TEE requires SGIs to be handled at S-EL1. The 8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-client.inc | 1 SUMMARY = "OP-TEE Client API" 2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE" 11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \
|
H A D | optee-os.inc | 1 SUMMARY = "OP-TEE Trusted OS" 2 DESCRIPTION = "Open Portable Trusted Execution Environment - Trusted side of the TEE" 17 SRC_URI = "git://github.com/OP-TEE/optee_os.git;branch=master;protocol=https"
|
H A D | optee-os-tadevkit_4.3.0.bb | 3 SUMMARY = "OP-TEE Trusted OS TA devkit" 4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
|
H A D | optee-test.inc | 1 SUMMARY = "OP-TEE sanity testsuite" 14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a-fvp-base.inc | 13 # OP-TEE SPMC related configuration 23 # Set OP-TEE SPMC specific TF-A config settings 42 # Add OP-TEE as BL32.
|
H A D | trusted-firmware-a-corstone1000.inc | 32 # tee driver sends yielding requests to OP-TEE 33 # at a faster pace than OP-TEE processes them,
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-optee-devices | 6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid> 15 Allows to distinguish whether an OP-TEE based TA/device requires user-space
|
/openbmc/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone) 36 fuses and is accessible to TEE only. 51 (2) TEE 72 (2) TEE 75 be extended with TEE based measured boot process. 88 (2) TEE 120 * TEE: OP-TEE based on Arm TrustZone based RNG 208 Trusted Keys usage: TEE 218 specific to TEE device implementation. The key length for new keys is always
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/optee-client/ |
H A D | tee-supplicant@.service | 2 Description=TEE Supplicant on %i
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch | 86 - bool "UEFI variables storage service via OP-TEE" 90 + select TEE 94 + When using the u-boot OP-TEE driver, StandAlonneMM is supported. 97 If OP-TEE is present and running StandAloneMM, dispatch all UEFI 285 + * Issue a door bell event to notify the MM partition (SP) running in OP-TEE 404 * it to OP-TEE 412 + * When using the u-boot OP-TEE driver, StandAlonneMM is supported.
|