Home
last modified time | relevance | path

Searched refs:TF (Results 1 – 25 of 75) sorted by relevance

123

/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/
H A Dtrusted-firmware-m-2.1.0-src.inc11 SRC_URI_TRUSTED_FIRMWARE_M ?= "git://git.trustedfirmware.org/TF-M/trusted-firmware-m.git;protocol=h…
12 SRC_URI_TRUSTED_FIRMWARE_M_EXTRAS ?= "git://git.trustedfirmware.org/TF-M/tf-m-extras.git;protocol=h…
13 SRC_URI_TRUSTED_FIRMWARE_M_TESTS ?= "git://git.trustedfirmware.org/TF-M/tf-m-tests.git;protocol=htt…
30 # TF-Mv2.1.0
33 # TF-Mv2.1.0
36 # TF-Mv2.1.0
51 # PSA-ADAC (intermediate SHA, default value for PLATFORM_PSA_ADAC_VERSION in TF-M)
H A Dtrusted-firmware-m.inc11 UPSTREAM_CHECK_GITTAGREGEX = "^TF-Mv(?P<pver>\d+(\.\d+)+)$"
25 # At present, TF-M Select other GNU Arm compiler versions instead of 11.2:
26 # https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/getting_started/tfm_getting…
/openbmc/linux/drivers/mtd/nand/raw/
H A Domap2.c61 #define TF(value) (value ? 1 : 0) macro
63 #define P2048e(a) (TF(a & NAND_Ecc_P2048e) << 0)
64 #define P2048o(a) (TF(a & NAND_Ecc_P2048o) << 1)
65 #define P1e(a) (TF(a & NAND_Ecc_P1e) << 2)
66 #define P1o(a) (TF(a & NAND_Ecc_P1o) << 3)
67 #define P2e(a) (TF(a & NAND_Ecc_P2e) << 4)
68 #define P2o(a) (TF(a & NAND_Ecc_P2o) << 5)
69 #define P4e(a) (TF(a & NAND_Ecc_P4e) << 6)
70 #define P4o(a) (TF(a & NAND_Ecc_P4o) << 7)
72 #define P8e(a) (TF(a & NAND_Ecc_P8e) << 0)
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/
H A D0001-Add-spmc_manifest-for-qemu.patch10 integration spcific place. The manifest file is processed by TF-A
11 and I am adding the patch to TF-A to keep things simple.
48 + * This file will be preprocessed by TF-A's build system. If Measured Boot is
49 + * enabled in TF-A's config, the build system will add the MEASURED_BOOT=1 macro
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/
H A Dfiptool-native_2.10.9.bb2 # It is a packaging format used by TF-A to package the
8 SRC_URI_TRUSTED_FIRMWARE_A ?= "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=h…
12 # Use fiptool from TF-A v2.10.9
H A Dfiptool-native_2.12.0.bb2 # It is a packaging format used by TF-A to package the
8 SRC_URI_TRUSTED_FIRMWARE_A ?= "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=h…
12 # Use fiptool from TF-A v2.12.0
H A Dtrusted-firmware-a_2.12.0.bb3 # TF-A v2.12.0
9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
H A Dtrusted-firmware-a_2.11.0.bb3 # TF-A v2.11.0
9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
H A Dtrusted-firmware-a_git.bb3 # TF-A master
9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
H A Dtrusted-firmware-a_2.10.9.bb3 # TF-A v2.10.9
9 # in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls
H A Dtrusted-firmware-a_%.bbappend5 # arm/aarch32. This is a known testing hole in TF-A.
59 # https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/plat/qemu.rst
66 # https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/plat/qemu.rst
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Dsoftware-architecture.rst55 comprises of a ROM code (TF-M BL1), MCUboot BL2, and
56 TrustedFirmware-M(`TF-M`_) as runtime software. The software design on
120 and TF-M by checking the signatures of the images.
130 The execution control is passed to TF-M after the verification. TF-M being
134 The TF-M BL1 design details and reasoning can be found in the `TF-M design documents
164 TF-M does not check the FIP signature, it only checks the Trsuted Firmware-A (TF-A) BL2's signature
165 in the FIP. The TF-M BL2 (MCUBoot) gets the offset for the TF-A BL2 by parsing the
167 TF-A BL2. Finally, MCUBoot loads and validates the TF-A BL2 image.
172 is used and its hash embedded into the TF-A BL2 image (only for development purposes).
173 This public key is provided by TF-A source-code.
[all …]
H A Dchange-log.rst21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat…
22 - Upgrade to metadata version 2 in TF-M.
23 - Increase the ITS and PS memory size in Secure Flash for TF-M.
226 - GPT support (in TF-M, TF-A, U-boot)
227 - Use TF-M BL1 code as the ROM code instead of MCUboot (the next stage bootloader BL2 remains to be…
389 - TF-M: fix capsule instability issue for Corstone-1000
/openbmc/linux/Documentation/admin-guide/pm/
H A Dintel-speed-select.rst75 Intel(R) SST-TF (feature turbo-freq) is supported
293 SST-TF)).
312 "speed-select-turbo-freq" (Intel(R) SST-TF) is supported at both performance
315 The Intel(R) SST-BF and the Intel(R) SST-TF features are built on a foundation
317 The platform firmware enables this feature when Intel(R) SST-BF or Intel(R) SST-TF
530 Some features like Intel(R) SST-TF can only be enabled when CLOS based prioritization
531 is enabled. For this reason, disabling while Intel(R) SST-TF is enabled can cause
532 Intel(R) SST-TF to fail. This will cause the "disable" command to display an error
533 if Intel(R) SST-TF is already enabled. In turn, to disable, the Intel(R) SST-TF
728 Intel(R) Speed Select Technology - Turbo Frequency (Intel(R) SST-TF)
[all …]
/openbmc/linux/fs/isofs/
H A Drock.c423 if (rr->u.TF.flags & TF_CREATE) { in parse_rock_ridge_inode_internal()
425 iso_date(rr->u.TF.times[cnt++].time, 0), in parse_rock_ridge_inode_internal()
428 if (rr->u.TF.flags & TF_MODIFY) { in parse_rock_ridge_inode_internal()
430 iso_date(rr->u.TF.times[cnt++].time, in parse_rock_ridge_inode_internal()
434 if (rr->u.TF.flags & TF_ACCESS) { in parse_rock_ridge_inode_internal()
436 iso_date(rr->u.TF.times[cnt++].time, in parse_rock_ridge_inode_internal()
440 if (rr->u.TF.flags & TF_ATTRIBUTES) { in parse_rock_ridge_inode_internal()
442 iso_date(rr->u.TF.times[cnt++].time, 0), in parse_rock_ridge_inode_internal()
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-sp-fwu_git.bb16 # The GPT parser component is needed from TF-A
17 SRC_URI += "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;name=tfa;protocol=https;branc…
/openbmc/openbmc/meta-arm/meta-arm-bsp/wic/
H A Dcorstone1000-flash-firmware.wks.in18 # The size has to be aligned to TF-M's SE_BL2_PARTITION_SIZE (tfm/platform/ext/target/arm/corstone1…
21 # The size has to be aligned to TF-M's TFM_PARTITION_SIZE (tfm/platform/ext/target/arm/corstone1000…
31 # The offset has to be aligned to TF-M's SE_BL2_BANK_1_OFFSET define (tfm/platform/ext/target/arm/c…
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/include/
H A Dcorstone1000.inc5 # TF-M
8 # TF-A
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0019-Align-PSA-Crypto-with-TF-Mv2.1.patch4 Subject: [PATCH] Align PSA Crypto with TF-Mv2.1
6 Update following files using the TF-Mv2.1 release (0c4c99b) commit.
9 This is derived from TF-M's tfm_crypto_defs.h file. The crypto function
15 tfm_crypto_pack_iovec struct changed in TF-M so the
21 psa_key_attributes_s struct in TF-M. (psa_crypto.c)
/openbmc/openbmc/meta-arm/meta-arm/classes/
H A Dtfm_sign_image.bbclass2 # TF-M. Signed images are written to the deploy directory by default.
38 # The arguments passed to the TF-M image signing script. Override this variable
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/
H A Dtrusted-firmware-a-sbsa-ref.inc1 # sbsa-ref specific TF-A support
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/u-boot/
H A Dqemuarm64.cfg2 # This must match the address that TF-A jumps to for BL33
H A Dqemuarm.cfg1 # This must match the address that TF-A jumps to for BL33
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/fvp-base/
H A Doptee_spmc_maifest.dts33 * This file will be preprocessed by TF-A's build system. If Measured Boot is
34 * enabled in TF-A's config, the build system will add the MEASURED_BOOT=1 macro
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/
H A Dtemplate.md13 *For example: corstone700 needs DISTRO=poky-tiny, musca only supports TF-M*

123