Home
last modified time | relevance | path

Searched refs:TEE (Results 1 – 25 of 83) sorted by relevance

1234

/openbmc/u-boot/doc/
H A DREADME.tee2 TEE uclass
5 This document describes the TEE uclass in U-Boot
7 A TEE (Trusted Execution Environment) is a trusted OS running in some
9 secure co-processor etc. A TEE driver handles the details needed to
10 communicate with the TEE.
14 - Registration of TEE drivers
16 - Managing shared memory between U-Boot and the TEE
18 - Providing a generic API to the TEE
20 The TEE interface
23 include/tee.h defines the generic interface to a TEE.
[all …]
H A DREADME.avb221 1.1. AVB using OP-TEE (optional)
23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and
25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM
72 OP-TEE:
/openbmc/linux/Documentation/staging/
H A Dtee.rst2 TEE subsystem
5 This document describes the TEE subsystem in Linux.
7 A TEE (Trusted Execution Environment) is a trusted OS running in some
9 secure co-processor etc. A TEE driver handles the details needed to
10 communicate with the TEE.
14 - Registration of TEE drivers
16 - Managing shared memory between Linux and the TEE
18 - Providing a generic API to the TEE
20 The TEE interface
23 include/uapi/linux/tee.h defines the generic interface to a TEE.
[all …]
/openbmc/u-boot/drivers/tee/optee/
H A DKconfig1 # OP-TEE Trusted Execution Environment Configuration
3 bool "OP-TEE"
6 This implements the OP-TEE Trusted Execution Environment (TEE)
7 driver. OP-TEE is a Trusted OS designed primarily to rely on the
9 mechanism. This driver can request services from OP-TEE, but also
10 handle Remote Procedure Calls (RPC) from OP-TEE needed to
15 menu "OP-TEE options"
21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
/openbmc/u-boot/drivers/tee/
H A DKconfig2 config TEE config
8 Environment (TEE). A TEE is a trusted OS running in some secure
13 if TEE
15 menu "TEE drivers"
18 bool "Sandbox TEE emulator"
22 This emulates a generic TEE needed for testing including the AVB
23 TA. The emulation provides all callbacks of a regular TEE and
/openbmc/u-boot/tools/
H A Dk3_fit_atf.sh17 [ -z "$TEE" ] && TEE="bl32.bin"
19 if [ ! -f $TEE ]; then
20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2
21 TEE=/dev/null
44 data = /incbin/("$TEE");
/openbmc/linux/drivers/tee/optee/
H A DKconfig2 # OP-TEE Trusted Execution Environment Configuration
4 tristate "OP-TEE"
8 This implements the OP-TEE Trusted Execution Environment (TEE)
12 bool "Load OP-TEE image as firmware"
16 This loads the BL32 image for OP-TEE as firmware when the driver is
/openbmc/u-boot/doc/device-tree-bindings/firmware/
H A Dlinaro,optee-tz.txt1 OP-TEE Device Tree Bindings
3 OP-TEE is a piece of software using hardware features to provide a Trusted
10 * OP-TEE based on ARM TrustZone required properties:
14 - method : The method of calling the OP-TEE Trusted OS. Permitted
/openbmc/linux/drivers/tee/amdtee/
H A DKconfig2 # AMD-TEE Trusted Execution Environment Configuration
4 tristate "AMD-TEE"
8 This implements AMD's Trusted Execution Environment (TEE) driver.
/openbmc/linux/drivers/tee/
H A DKconfig3 menuconfig TEE config
12 Environment (TEE).
14 if TEE
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/libts/
H A D0001-Remove-TEE-driver-external-component.patch4 Subject: [PATCH] Remove TEE driver external component
95 - printf("error: cannot read TS TEE driver version\n");
99 - printf("error: TS TEE driver not available\n");
116 - printf("error: TS TEE driver is v%u.%u.%u but required v%u.%u.%u\n", major, minor, patch,
177 - DOC "Linux FF-A TEE driver include directory"
183 - CACHE STRING "Linux FF-A TEE driver repository URL")
188 - CACHE STRING "Linux FF-A TEE driver git refspec")
191 - CACHE PATH "Location of Linux TEE driver source.")
195 - CACHE PATH "Location of Linux TEE driver source." FORCE)
215 - DOC "Linux FF-A TEE driver include directory"
/openbmc/u-boot/arch/arm/mach-rockchip/
H A Dfit_spl_optee.its10 description = "Simple image with OP-TEE support";
24 description = "OP-TEE";
44 description = "Rockchip armv7 with OP-TEE";
/openbmc/linux/security/keys/trusted-keys/
H A DKconfig20 bool "TEE-based trusted keys"
21 depends on TEE >= TRUSTED_KEYS
24 Enable use of the Trusted Execution Environment (TEE) as trusted
/openbmc/openbmc/meta-arm/meta-arm/recipes-kernel/linux/files/
H A Dtee.cfg5 # TEE drivers
8 # end of TEE drivers
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/
H A D0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE
6 OP-TEE requires SGIs to be handled at S-EL1. The
8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-client.inc1 SUMMARY = "OP-TEE Client API"
2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE"
11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \
H A Doptee-os.inc1 SUMMARY = "OP-TEE Trusted OS"
2 DESCRIPTION = "Open Portable Trusted Execution Environment - Trusted side of the TEE"
17 SRC_URI = "git://github.com/OP-TEE/optee_os.git;branch=master;protocol=https"
H A Doptee-os-tadevkit_4.3.0.bb3 SUMMARY = "OP-TEE Trusted OS TA devkit"
4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
H A Doptee-test.inc1 SUMMARY = "OP-TEE sanity testsuite"
14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/
H A Dtrusted-firmware-a-fvp-base.inc13 # OP-TEE SPMC related configuration
23 # Set OP-TEE SPMC specific TF-A config settings
42 # Add OP-TEE as BL32.
H A Dtrusted-firmware-a-corstone1000.inc32 # tee driver sends yielding requests to OP-TEE
33 # at a faster pace than OP-TEE processes them,
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-bus-optee-devices6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid>
15 Allows to distinguish whether an OP-TEE based TA/device requires user-space
/openbmc/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone)
36 fuses and is accessible to TEE only.
51 (2) TEE
72 (2) TEE
75 be extended with TEE based measured boot process.
88 (2) TEE
120 * TEE: OP-TEE based on Arm TrustZone based RNG
208 Trusted Keys usage: TEE
218 specific to TEE device implementation. The key length for new keys is always
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/optee-client/
H A Dtee-supplicant@.service2 Description=TEE Supplicant on %i
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch86 - bool "UEFI variables storage service via OP-TEE"
90 + select TEE
94 + When using the u-boot OP-TEE driver, StandAlonneMM is supported.
97 If OP-TEE is present and running StandAloneMM, dispatch all UEFI
285 + * Issue a door bell event to notify the MM partition (SP) running in OP-TEE
404 * it to OP-TEE
412 + * When using the u-boot OP-TEE driver, StandAlonneMM is supported.

1234