Searched full:tee (Results 1 – 25 of 28) sorted by relevance
12
4 menuconfig TEE config7 Include TEE drivers in system config9 if TEE11 module = TEE12 module-str = tee16 source "drivers/tee/optee/Kconfig"18 endif # TEE
7 zephyr_library_sources(tee.c)
7 #include <zephyr/drivers/tee.h>
5 bool "OP-TEE driver"8 This implements support of the OP-TEE firmware which is loaded9 as BL32 image. OP-TEE is a Trust Zone OS which implements mechanisms11 Driver requests functions from the OP-TEE and implements RPC mechanism12 needed by OP-TEE to run services. See https://www.op-tee.org for more16 int "Max number of OP-TEE notifications"20 Sets the maximum notifications from OP-TEE to the Normal World. OP-TEE using
11 * This file is exported by OP-TEE and is in kept in sync between secure384 * OP-TEE in secure world is in charge of the release process of secondary385 * cores. The Rich OS issue the this request to ask OP-TEE to boot up the386 * secondary cores, go through the OP-TEE per-core initialization, and then415 * Inform OP-TEE about a new virtual machine418 * OP-TEE records client id of new virtual machine and prepares419 * to receive requests from it. This call is available only if OP-TEE434 * a0 OPTEE_SMC_RETURN_ENOTAVAIL OP-TEE have no resources for444 * Inform OP-TEE about shutdown of a virtual machine447 * OP-TEE will clean up all resources associated with this VM. This call is[all …]
15 * This file defines the OP-TEE message protocol used to communicate16 * with an instance of OP-TEE running in secure world.51 * list of page addresses. OP-TEE core can reconstruct contiguous buffer from87 * Same values as TEE_LOGIN_* from TEE Internal API
8 #include <zephyr/drivers/tee.h>24 * TEE Implementation ID29 * OP-TEE specific capabilities719 * OP-TEE OS. in optee_get_version()990 /* for this command op-tee os should support CFG_CORE_DYN_SHM */ in optee_shm_register()992 /* op-tee OS ingnore this cmd in case when TYPE_TMEM_OUTPUT and NONCONTIG aren't set */ in optee_shm_register()1262 static DEVICE_API(tee, optee_driver_api) = {1275 * Bitmap of the ongoing notificatons, received from OP-TEE. Maximum number is1277 * was received before WAIT command from OP-TEE. In this case WAIT will not create
14 * RPC communication with tee-supplicant is reversed compared to normal
8 * @file drivers/tee.h10 * @brief Public APIs for the tee driver.48 * @defgroup tee_interface TEE Interface52 * The generic interface to work with Trusted Execution Environment (TEE).53 * TEE is Trusted OS, running in the Secure Space, such as TrustZone in ARM cpus.57 * Using TEE syscalls:58 * - tee_get_version() to get current TEE capabilities74 #define TEE_GEN_CAP_GP BIT(0) /* GlobalPlatform compliant TEE */97 * TEEC_ORIGIN_API The error originated within the TEE Client API101 * the TEE.[all …]
5 drivers.tee.optee:8 - tee
10 zephyr_include_directories(${ZEPHYR_BASE}/drivers/tee/optee)
33 path: modules/tee/tf-m/psa-arch-tests45 path: modules/tee/tf-m/tf-m-tests
14 description: The method of calling the OP-TEE Trusted OS.
44 * access to masters only if they are in TEE mode. Since all masters in hardware_init()48 * use case by TEE initialization code. in hardware_init()
30 CONFIG_BT_DEVICE_NAME="dee-yu-tee"
349 path: modules/tee/tf-a/trusted-firmware-a351 - tee354 path: modules/tee/tf-m/trusted-firmware-m356 - tee
90 add_subdirectory_ifdef(CONFIG_TEE tee)
98 source "drivers/tee/Kconfig"
63 ninja -Cbuild run | tee log.log69 ninja -Cbuild run | tee log.log
25 -j | jq . | tee /tmp/backports.json31 -j | jq . | tee /tmp/backports.json
163 $ echo "options usb-storage quirks=483:3744:i" | sudo tee /etc/modprobe.d/local.conf
200 pip freeze | tee -a $FREEZE_FILE
193 folder of the TF-M module (which is in ``modules/tee/tf-m/trusted-firmware-m/``
503 **Trusted Execution Environments (TEE)**
19 #include <zephyr/drivers/tee.h>