/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/ |
H A D | trusted-firmware-m-2.1.0-src.inc | 11 SRC_URI_TRUSTED_FIRMWARE_M ?= "git://git.trustedfirmware.org/TF-M/trusted-firmware-m.git;protocol=h… 12 SRC_URI_TRUSTED_FIRMWARE_M_EXTRAS ?= "git://git.trustedfirmware.org/TF-M/tf-m-extras.git;protocol=h… 13 SRC_URI_TRUSTED_FIRMWARE_M_TESTS ?= "git://git.trustedfirmware.org/TF-M/tf-m-tests.git;protocol=htt… 30 # TF-Mv2.1.0 33 # TF-Mv2.1.0 36 # TF-Mv2.1.0 51 # PSA-ADAC (intermediate SHA, default value for PLATFORM_PSA_ADAC_VERSION in TF-M)
|
H A D | trusted-firmware-m.inc | 11 UPSTREAM_CHECK_GITTAGREGEX = "^TF-Mv(?P<pver>\d+(\.\d+)+)$" 25 # At present, TF-M Select other GNU Arm compiler versions instead of 11.2: 26 # https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/getting_started/tfm_getting…
|
/openbmc/linux/drivers/mtd/nand/raw/ |
H A D | omap2.c | 61 #define TF(value) (value ? 1 : 0) macro 63 #define P2048e(a) (TF(a & NAND_Ecc_P2048e) << 0) 64 #define P2048o(a) (TF(a & NAND_Ecc_P2048o) << 1) 65 #define P1e(a) (TF(a & NAND_Ecc_P1e) << 2) 66 #define P1o(a) (TF(a & NAND_Ecc_P1o) << 3) 67 #define P2e(a) (TF(a & NAND_Ecc_P2e) << 4) 68 #define P2o(a) (TF(a & NAND_Ecc_P2o) << 5) 69 #define P4e(a) (TF(a & NAND_Ecc_P4e) << 6) 70 #define P4o(a) (TF(a & NAND_Ecc_P4o) << 7) 72 #define P8e(a) (TF(a & NAND_Ecc_P8e) << 0) [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/ |
H A D | 0001-Add-spmc_manifest-for-qemu.patch | 10 integration spcific place. The manifest file is processed by TF-A 11 and I am adding the patch to TF-A to keep things simple. 48 + * This file will be preprocessed by TF-A's build system. If Measured Boot is 49 + * enabled in TF-A's config, the build system will add the MEASURED_BOOT=1 macro
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/ |
H A D | fiptool-native_2.10.9.bb | 2 # It is a packaging format used by TF-A to package the 8 SRC_URI_TRUSTED_FIRMWARE_A ?= "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=h… 12 # Use fiptool from TF-A v2.10.9
|
H A D | fiptool-native_2.12.0.bb | 2 # It is a packaging format used by TF-A to package the 8 SRC_URI_TRUSTED_FIRMWARE_A ?= "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=h… 12 # Use fiptool from TF-A v2.12.0
|
H A D | trusted-firmware-a_2.12.0.bb | 3 # TF-A v2.12.0 9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
|
H A D | trusted-firmware-a_2.11.0.bb | 3 # TF-A v2.11.0 9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
|
H A D | trusted-firmware-a_git.bb | 3 # TF-A master 9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
|
H A D | trusted-firmware-a_2.10.9.bb | 3 # TF-A v2.10.9 9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
|
H A D | trusted-firmware-a_%.bbappend | 5 # arm/aarch32. This is a known testing hole in TF-A. 59 # https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/plat/qemu.rst 66 # https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/plat/qemu.rst
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | software-architecture.rst | 55 comprises of a ROM code (TF-M BL1), MCUboot BL2, and 56 TrustedFirmware-M(`TF-M`_) as runtime software. The software design on 120 and TF-M by checking the signatures of the images. 130 The execution control is passed to TF-M after the verification. TF-M being 134 The TF-M BL1 design details and reasoning can be found in the `TF-M design documents 164 TF-M does not check the FIP signature, it only checks the Trsuted Firmware-A (TF-A) BL2's signature 165 in the FIP. The TF-M BL2 (MCUBoot) gets the offset for the TF-A BL2 by parsing the 167 TF-A BL2. Finally, MCUBoot loads and validates the TF-A BL2 image. 172 is used and its hash embedded into the TF-A BL2 image (only for development purposes). 173 This public key is provided by TF-A source-code. [all …]
|
H A D | change-log.rst | 21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat… 22 - Upgrade to metadata version 2 in TF-M. 23 - Increase the ITS and PS memory size in Secure Flash for TF-M. 226 - GPT support (in TF-M, TF-A, U-boot) 227 - Use TF-M BL1 code as the ROM code instead of MCUboot (the next stage bootloader BL2 remains to be… 389 - TF-M: fix capsule instability issue for Corstone-1000
|
/openbmc/linux/Documentation/admin-guide/pm/ |
H A D | intel-speed-select.rst | 75 Intel(R) SST-TF (feature turbo-freq) is supported 293 SST-TF)). 312 "speed-select-turbo-freq" (Intel(R) SST-TF) is supported at both performance 315 The Intel(R) SST-BF and the Intel(R) SST-TF features are built on a foundation 317 The platform firmware enables this feature when Intel(R) SST-BF or Intel(R) SST-TF 530 Some features like Intel(R) SST-TF can only be enabled when CLOS based prioritization 531 is enabled. For this reason, disabling while Intel(R) SST-TF is enabled can cause 532 Intel(R) SST-TF to fail. This will cause the "disable" command to display an error 533 if Intel(R) SST-TF is already enabled. In turn, to disable, the Intel(R) SST-TF 728 Intel(R) Speed Select Technology - Turbo Frequency (Intel(R) SST-TF) [all …]
|
/openbmc/linux/fs/isofs/ |
H A D | rock.c | 423 if (rr->u.TF.flags & TF_CREATE) { in parse_rock_ridge_inode_internal() 425 iso_date(rr->u.TF.times[cnt++].time, 0), in parse_rock_ridge_inode_internal() 428 if (rr->u.TF.flags & TF_MODIFY) { in parse_rock_ridge_inode_internal() 430 iso_date(rr->u.TF.times[cnt++].time, in parse_rock_ridge_inode_internal() 434 if (rr->u.TF.flags & TF_ACCESS) { in parse_rock_ridge_inode_internal() 436 iso_date(rr->u.TF.times[cnt++].time, in parse_rock_ridge_inode_internal() 440 if (rr->u.TF.flags & TF_ATTRIBUTES) { in parse_rock_ridge_inode_internal() 442 iso_date(rr->u.TF.times[cnt++].time, 0), in parse_rock_ridge_inode_internal()
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | ts-sp-fwu_git.bb | 16 # The GPT parser component is needed from TF-A 17 SRC_URI += "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;name=tfa;protocol=https;branc…
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/wic/ |
H A D | corstone1000-flash-firmware.wks.in | 18 # The size has to be aligned to TF-M's SE_BL2_PARTITION_SIZE (tfm/platform/ext/target/arm/corstone1… 21 # The size has to be aligned to TF-M's TFM_PARTITION_SIZE (tfm/platform/ext/target/arm/corstone1000… 31 # The offset has to be aligned to TF-M's SE_BL2_BANK_1_OFFSET define (tfm/platform/ext/target/arm/c…
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/include/ |
H A D | corstone1000.inc | 5 # TF-M 8 # TF-A
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0019-Align-PSA-Crypto-with-TF-Mv2.1.patch | 4 Subject: [PATCH] Align PSA Crypto with TF-Mv2.1 6 Update following files using the TF-Mv2.1 release (0c4c99b) commit. 9 This is derived from TF-M's tfm_crypto_defs.h file. The crypto function 15 tfm_crypto_pack_iovec struct changed in TF-M so the 21 psa_key_attributes_s struct in TF-M. (psa_crypto.c)
|
/openbmc/openbmc/meta-arm/meta-arm/classes/ |
H A D | tfm_sign_image.bbclass | 2 # TF-M. Signed images are written to the deploy directory by default. 38 # The arguments passed to the TF-M image signing script. Override this variable
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a-sbsa-ref.inc | 1 # sbsa-ref specific TF-A support
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/u-boot/ |
H A D | qemuarm64.cfg | 2 # This must match the address that TF-A jumps to for BL33
|
H A D | qemuarm.cfg | 1 # This must match the address that TF-A jumps to for BL33
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/fvp-base/ |
H A D | optee_spmc_maifest.dts | 33 * This file will be preprocessed by TF-A's build system. If Measured Boot is 34 * enabled in TF-A's config, the build system will add the MEASURED_BOOT=1 macro
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/ |
H A D | template.md | 13 *For example: corstone700 needs DISTRO=poky-tiny, musca only supports TF-M*
|