Home
last modified time | relevance | path

Searched full:tee (Results 1 – 25 of 28) sorted by relevance

12

/Zephyr-latest/drivers/tee/
DKconfig4 menuconfig TEE config
7 Include TEE drivers in system config
9 if TEE
11 module = TEE
12 module-str = tee
16 source "drivers/tee/optee/Kconfig"
18 endif # TEE
DCMakeLists.txt7 zephyr_library_sources(tee.c)
Dtee.c7 #include <zephyr/drivers/tee.h>
/Zephyr-latest/drivers/tee/optee/
DKconfig5 bool "OP-TEE driver"
8 This implements support of the OP-TEE firmware which is loaded
9 as BL32 image. OP-TEE is a Trust Zone OS which implements mechanisms
11 Driver requests functions from the OP-TEE and implements RPC mechanism
12 needed by OP-TEE to run services. See https://www.op-tee.org for more
16 int "Max number of OP-TEE notifications"
20 Sets the maximum notifications from OP-TEE to the Normal World. OP-TEE using
Doptee_smc.h11 * This file is exported by OP-TEE and is in kept in sync between secure
384 * OP-TEE in secure world is in charge of the release process of secondary
385 * cores. The Rich OS issue the this request to ask OP-TEE to boot up the
386 * secondary cores, go through the OP-TEE per-core initialization, and then
415 * Inform OP-TEE about a new virtual machine
418 * OP-TEE records client id of new virtual machine and prepares
419 * to receive requests from it. This call is available only if OP-TEE
434 * a0 OPTEE_SMC_RETURN_ENOTAVAIL OP-TEE have no resources for
444 * Inform OP-TEE about shutdown of a virtual machine
447 * OP-TEE will clean up all resources associated with this VM. This call is
[all …]
Doptee_msg.h15 * This file defines the OP-TEE message protocol used to communicate
16 * with an instance of OP-TEE running in secure world.
51 * list of page addresses. OP-TEE core can reconstruct contiguous buffer from
87 * Same values as TEE_LOGIN_* from TEE Internal API
Doptee.c8 #include <zephyr/drivers/tee.h>
24 * TEE Implementation ID
29 * OP-TEE specific capabilities
719 * OP-TEE OS. in optee_get_version()
990 /* for this command op-tee os should support CFG_CORE_DYN_SHM */ in optee_shm_register()
992 /* op-tee OS ingnore this cmd in case when TYPE_TMEM_OUTPUT and NONCONTIG aren't set */ in optee_shm_register()
1262 static DEVICE_API(tee, optee_driver_api) = {
1275 * Bitmap of the ongoing notificatons, received from OP-TEE. Maximum number is
1277 * was received before WAIT command from OP-TEE. In this case WAIT will not create
Doptee_rpc_cmd.h14 * RPC communication with tee-supplicant is reversed compared to normal
/Zephyr-latest/include/zephyr/drivers/
Dtee.h8 * @file drivers/tee.h
10 * @brief Public APIs for the tee driver.
48 * @defgroup tee_interface TEE Interface
52 * The generic interface to work with Trusted Execution Environment (TEE).
53 * TEE is Trusted OS, running in the Secure Space, such as TrustZone in ARM cpus.
57 * Using TEE syscalls:
58 * - tee_get_version() to get current TEE capabilities
74 #define TEE_GEN_CAP_GP BIT(0) /* GlobalPlatform compliant TEE */
97 * TEEC_ORIGIN_API The error originated within the TEE Client API
101 * the TEE.
[all …]
/Zephyr-latest/tests/drivers/tee/optee/
Dtestcase.yaml5 drivers.tee.optee:
8 - tee
DCMakeLists.txt10 zephyr_include_directories(${ZEPHYR_BASE}/drivers/tee/optee)
/Zephyr-latest/submanifests/
Doptional.yaml33 path: modules/tee/tf-m/psa-arch-tests
45 path: modules/tee/tf-m/tf-m-tests
/Zephyr-latest/dts/bindings/arm/
Dlinaro,optee-tz.yaml14 description: The method of calling the OP-TEE Trusted OS.
/Zephyr-latest/soc/espressif/esp32c6/
Dhw_init.c44 * access to masters only if they are in TEE mode. Since all masters in hardware_init()
48 * use case by TEE initialization code. in hardware_init()
/Zephyr-latest/tests/bsim/bluetooth/host/l2cap/multilink_peripheral/
Dprj.conf30 CONFIG_BT_DEVICE_NAME="dee-yu-tee"
/Zephyr-latest/
Dwest.yml349 path: modules/tee/tf-a/trusted-firmware-a
351 - tee
354 path: modules/tee/tf-m/trusted-firmware-m
356 - tee
/Zephyr-latest/drivers/
DCMakeLists.txt90 add_subdirectory_ifdef(CONFIG_TEE tee)
DKconfig98 source "drivers/tee/Kconfig"
/Zephyr-latest/doc/develop/test/
Dcoverage.rst63 ninja -Cbuild run | tee log.log
69 ninja -Cbuild run | tee log.log
/Zephyr-latest/scripts/release/
Dlist_backports.py25 -j | jq . | tee /tmp/backports.json
31 -j | jq . | tee /tmp/backports.json
/Zephyr-latest/boards/st/stm32vl_disco/doc/
Dindex.rst163 $ echo "options usb-storage quirks=483:3744:i" | sudo tee /etc/modprobe.d/local.conf
/Zephyr-latest/.github/workflows/
Dtwister.yaml200 pip freeze | tee -a $FREEZE_FILE
/Zephyr-latest/doc/services/tfm/
Doverview.rst193 folder of the TF-M module (which is in ``modules/tee/tf-m/trusted-firmware-m/``
/Zephyr-latest/doc/security/
Dsecurity-overview.rst503 **Trusted Execution Environments (TEE)**
/Zephyr-latest/tests/drivers/tee/optee/src/
Dmain.c19 #include <zephyr/drivers/tee.h>

12