/openbmc/u-boot/doc/ |
H A D | README.tee | 2 TEE uclass 10 communicate with the TEE. 14 - Registration of TEE drivers 20 The TEE interface 44 OP-TEE driver 47 The OP-TEE driver handles OP-TEE [1] based TEEs. Currently it is only the ARM 62 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a 71 TEE API. 74 OP-TEE architecture: 86 | TEE | | TEE Internal| [all …]
|
H A D | README.avb2 | 21 1.1. AVB using OP-TEE (optional) 23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and 25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM 72 OP-TEE:
|
/openbmc/linux/Documentation/staging/ |
H A D | tee.rst | 2 TEE subsystem 10 communicate with the TEE. 20 The TEE interface 120 OP-TEE driver 147 TEE API. 150 OP-TEE architecture:: 165 | Client| || | TEE | OP-TEE | | OP-TEE | 187 OP-TEE notifications 268 AMD-TEE driver 300 | TEE | | TEE | AMD-TEE | | AMD-TEE | [all …]
|
/openbmc/u-boot/drivers/tee/optee/ |
H A D | Kconfig | 1 # OP-TEE Trusted Execution Environment Configuration 3 bool "OP-TEE" 6 This implements the OP-TEE Trusted Execution Environment (TEE) 7 driver. OP-TEE is a Trusted OS designed primarily to rely on the 9 mechanism. This driver can request services from OP-TEE, but also 10 handle Remote Procedure Calls (RPC) from OP-TEE needed to 15 menu "OP-TEE options" 21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
|
/openbmc/u-boot/drivers/tee/ |
H A D | Kconfig | 2 config TEE config 8 Environment (TEE). A TEE is a trusted OS running in some secure 13 if TEE 15 menu "TEE drivers" 18 bool "Sandbox TEE emulator" 22 This emulates a generic TEE needed for testing including the AVB 23 TA. The emulation provides all callbacks of a regular TEE and
|
/openbmc/u-boot/tools/ |
H A D | k3_fit_atf.sh | 17 [ -z "$TEE" ] && TEE="bl32.bin" 19 if [ ! -f $TEE ]; then 20 echo "WARNING OPTEE file $TEE NOT found, resulting might be non-functional" >&2 21 TEE=/dev/null 44 data = /incbin/("$TEE");
|
/openbmc/linux/drivers/tee/optee/ |
H A D | Kconfig | 2 # OP-TEE Trusted Execution Environment Configuration 4 tristate "OP-TEE" 8 This implements the OP-TEE Trusted Execution Environment (TEE) 12 bool "Load OP-TEE image as firmware" 16 This loads the BL32 image for OP-TEE as firmware when the driver is
|
/openbmc/linux/drivers/tee/amdtee/ |
H A D | Kconfig | 2 # AMD-TEE Trusted Execution Environment Configuration 4 tristate "AMD-TEE" 8 This implements AMD's Trusted Execution Environment (TEE) driver.
|
/openbmc/u-boot/doc/device-tree-bindings/firmware/ |
H A D | linaro,optee-tz.txt | 1 OP-TEE Device Tree Bindings 3 OP-TEE is a piece of software using hardware features to provide a Trusted 10 * OP-TEE based on ARM TrustZone required properties: 14 - method : The method of calling the OP-TEE Trusted OS. Permitted
|
/openbmc/linux/drivers/tee/ |
H A D | Kconfig | 3 menuconfig TEE config 12 Environment (TEE). 14 if TEE
|
/openbmc/u-boot/arch/arm/mach-rockchip/ |
H A D | fit_spl_optee.its | 10 description = "Simple image with OP-TEE support"; 24 description = "OP-TEE"; 44 description = "Rockchip armv7 with OP-TEE";
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-kernel/linux/files/ |
H A D | tee.cfg | 5 # TEE drivers 8 # end of TEE drivers
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | Kconfig | 20 bool "TEE-based trusted keys" 21 depends on TEE >= TRUSTED_KEYS 24 Enable use of the Trusted Execution Environment (TEE) as trusted
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-client.inc | 1 SUMMARY = "OP-TEE Client API" 2 DESCRIPTION = "Open Portable Trusted Execution Environment - Normal World Client side of the TEE" 11 git://github.com/OP-TEE/optee_client.git;branch=master;protocol=https \
|
H A D | optee-os.inc | 1 SUMMARY = "OP-TEE Trusted OS" 2 DESCRIPTION = "Open Portable Trusted Execution Environment - Trusted side of the TEE" 17 SRC_URI = "git://github.com/OP-TEE/optee_os.git;branch=master;protocol=https"
|
H A D | optee-os-tadevkit_4.1.0.bb | 3 SUMMARY = "OP-TEE Trusted OS TA devkit" 4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
|
H A D | optee-test.inc | 1 SUMMARY = "OP-TEE sanity testsuite" 14 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/uefi/files/n1sdp/ |
H A D | 0009-Platform-ARM-N1Sdp-Reserve-OP-TEE-Region-from-UEFI.patch | 4 Subject: [PATCH] Platform/ARM/N1Sdp: Reserve OP-TEE Region from UEFI 6 To enable cache on N1SDP, OP-TEE has to be moved 40 + // Reserved OP-TEE region 64 + # Base Address of OP-TEE
|
/openbmc/linux/Documentation/devicetree/bindings/arm/firmware/ |
H A D | linaro,optee-tz.yaml | 7 title: OP-TEE 13 OP-TEE is a piece of software using hardware features to provide a Trusted 37 The method of calling the OP-TEE Trusted OS depending on smc or hvc
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-optee-devices | 6 OP-TEE bus provides reference to registered drivers under this directory. The <uuid> 15 Allows to distinguish whether an OP-TEE based TA/device requires user-space
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/n1sdp/ |
H A D | 0001-Reserve-OP-TEE-memory-from-nwd.patch | 4 Subject: [PATCH] n1sdp: Reserve OP-TEE memory from NWd 6 The physical memory which is used to run OP-TEE on the N1SDP is known
|
/openbmc/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone) 36 fuses and is accessible to TEE only. 51 (2) TEE 72 (2) TEE 75 be extended with TEE based measured boot process. 88 (2) TEE 120 * TEE: OP-TEE based on Arm TrustZone based RNG 208 Trusted Keys usage: TEE 218 specific to TEE device implementation. The key length for new keys is always
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
H A D | trusted-firmware-a-corstone1000.inc | 29 # tee driver sends yielding requests to OP-TEE 30 # at a faster pace than OP-TEE processes them,
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/optee-client/ |
H A D | tee-supplicant@.service | 2 Description=TEE Supplicant on %i
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/optee-client/ |
H A D | tee-supplicant@.service | 2 Description=TEE Supplicant on %i
|