| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
| H A D | trusted-firmware-a_%.bbappend | 6 MACHINE_TFA_REQUIRE:corstone1000 = "trusted-firmware-a-corstone1000.inc" 7 MACHINE_TFA_REQUIRE:fvp-base = "trusted-firmware-a-fvp-base.inc" 8 MACHINE_TFA_REQUIRE:juno = "trusted-firmware-a-juno.inc" 9 MACHINE_TFA_REQUIRE:sbsa-ref = "trusted-firmware-a-sbsa-ref.inc" 10 MACHINE_TFA_REQUIRE:sgi575 = "trusted-firmware-a-sgi575.inc"
|
| H A D | trusted-firmware-a_2.11.0.bb | 1 require recipes-bsp/trusted-firmware-a/trusted-firmware-a.inc
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/ |
| H A D | trusted-firmware-m_2.1.1.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m.inc
|
| H A D | trusted-firmware-m_2.2.0.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m.inc
|
| H A D | trusted-firmware-m-scripts-native_2.2.0.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-scripts-native.inc
|
| H A D | trusted-firmware-m-scripts-native_2.1.1.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-${PV}-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-scripts-native.inc
|
| H A D | trusted-firmware-m_git.bb | 1 require recipes-bsp/trusted-firmware-m/trusted-firmware-m-git-src.inc 2 require recipes-bsp/trusted-firmware-m/trusted-firmware-m.inc
|
| H A D | trusted-firmware-m-2.1.1-src.inc | 1 # Common src definitions for trusted-firmware-m and trusted-firmware-m-scripts 11 SRC_URI_TRUSTED_FIRMWARE_M ?= "git://git.trustedfirmware.org/TF-M/trusted-firmware-m.git;protocol=h…
|
| /openbmc/phosphor-fan-presence/docs/monitor/ |
| H A D | class.md | 7 determines if the group is trusted by checking each fan sensors listed within 8 the trust group against an algorithm that returns whether they can be trusted or 14 - Determines if the group is trusted by checking if any sensors in the group 16 group are trusted and therefore monitoring of all the sensors in the group
|
| /openbmc/openbmc/meta-arm/documentation/ |
| H A D | trusted-services.md | 4 in `meta-arm/recipes-security/trusted-services` 43 3. trusted-firmware-a might require platform specific TF-A build parameters (SPD and SPMC details o… 44 …See `meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend` for qemuarm64-securebo… 45 …and in `meta-arm-bsp/recipes-bsp/trusted-firmware-a/trusted-firmware-a-corstone1000.inc` for theCo… 59 See `ci/trusted-services.yml` for an example how to include them into an image. 75 [^1]: https://trusted-services.readthedocs.io/en/integration/overview/index.html 77 [^2]: https://trusted-services.readthedocs.io/en/integration/deployments/secure-partitions.html 79 [^3]: https://trusted-services.readthedocs.io/en/integration/deployments/test-executables.html
|
| H A D | quick-start.md | 44 If, as an example, we’re wanting to develop trusted-firmware-a; then fvp-base will work for us. 55 …ware being used on the machine above (in the above example, this will be trusted-firmware-a for fv… 58 $ devtool modify trusted-firmware-a 61 …d print a path at the end where the source code was checked out. In the trusted-firmware-a exampl… 63 > /builder/meta-arm/build/workspace/sources/trusted-firmware-a 70 $ devtool build trusted-firmware-a 88 $ mv 0001-example.patch ~/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/ 90 $ devtool reset trusted-firmware-a 91 …:append = " file://0001-example.patch" >> meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware…
|
| /openbmc/phosphor-fan-presence/monitor/ |
| H A D | trust_manager.hpp | 86 auto trusted = true; in checkTrust() local 97 trusted = false; in checkTrust() 114 return trusted; in checkTrust()
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
| H A D | trusted-services-src.inc | 5 …://git.trustedfirmware.org/TS/trusted-services.git;protocol=https;branch=main;name=trusted-service… 20 S = "${WORKDIR}/git/trusted-services" 54 SRCREV_FORMAT = "trusted-services_dtc_mbedtls_nanopb_qcbor_tcose_cpputest"
|
| H A D | ts-service-test_git.bb | 3 on an Arm platform with real deployments of trusted services." 7 require trusted-services.inc
|
| H A D | ts-demo_git.bb | 3 on an Arm platform with real deployments of trusted services." 7 require trusted-services.inc
|
| H A D | trusted-services.inc | 2 HOMEPAGE = "https://trusted-services.readthedocs.io/en/latest/index.html" 12 require trusted-services-src.inc 14 # By default bitbake includes only ${S} (i.e git/trusted-services) in the maps.
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/ |
| H A D | tc-artifacts-image.bb | 13 # The last image to be built is trusted-firmware-a 14 DEPENDS += " trusted-firmware-a"
|
| /openbmc/u-boot/doc/ |
| H A D | README.armada-secureboot | 1 The trusted boot framework on Marvell Armada 38x 6 1. Overview of the trusted boot 15 1. Overview of the trusted boot 18 The Armada's trusted boot framework enables the SoC to cryptographically verify 48 image, which employs this trusted boot framework, the following tasks need to 61 The documentation of the trusted boot mode is contained in part 1, chapter 88 trusted boot (also known as "security header") 92 Trusted debug mode - A special mode for the trusted boot that allows 93 debugging of devices employing the trusted boot 124 For the trusted boot framework, a additional header is added to the boot image. [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/ |
| H A D | musca-b1.md | 14 To build the trusted firmware-m: 15 ```bash$ bitbake trusted-firmware-m```
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/ |
| H A D | trusted-firmware-a_2.12.1.bb | 1 require recipes-bsp/trusted-firmware-a/trusted-firmware-a.inc
|
| H A D | trusted-firmware-a_2.10.12.bb | 1 require recipes-bsp/trusted-firmware-a/trusted-firmware-a.inc
|
| H A D | trusted-firmware-a_git.bb | 1 require recipes-bsp/trusted-firmware-a/trusted-firmware-a.inc
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
| H A D | change-log.rst | 41 | trusted-firmware-a | 2.11.0 | 43 | trusted-firmware-m | 2.1.0 | 112 | trusted-firmware-a | 2.10.4 | 114 | trusted-firmware-m | 2.0.0 | 183 | trusted-firmware-a | 2.9.0 | 185 | trusted-firmware-m | 1.8.1 | 253 | trusted-firmware-a | 2.8.0-r0 | 255 | trusted-firmware-m | 1.7.0-r0 | 319 | trusted-firmware-a | 2.7.0 | 321 | trusted-firmware-m | 1.6.0 |
|
| /openbmc/u-boot/board/rockchip/evb_rk3328/ |
| H A D | README | 31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 38 > cd arm-trusted-firmware 57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/ |
| H A D | trusted-firmware-m_%.bbappend | 4 MACHINE_TFM_REQUIRE:corstone1000 = "trusted-firmware-m-corstone1000.inc"
|