Home
last modified time | relevance | path

Searched refs:chain (Results 1 – 17 of 17) sorted by relevance

/trusted-firmware-a-latest/plat/arm/board/common/swd_rotpk/
DREADME2 root-of-trust key used in the CCA chain of trust.
/trusted-firmware-a-latest/tools/cert_create/
DMakefile41 $(error Unknown chain of trust ${COT})
/trusted-firmware-a-latest/docs/components/
Dcot-binding.rst4 The device tree allows to describe the chain of trust with the help of
10 sub-nodes mentioning properties of all non-volatile-counters used in the chain of trust.
326 Future update to chain of trust binding
Dsecure-partition-manager.rst1161 A call chain represents all SPs in a sequence of invocations of a direct message
1162 request. When execution on a PE is in the secure state, only a single call chain
1185 valid transition that could lead to a loop in the call chain, SPMC denies the
1219 An SP execution context in a call chain could specify a less permissive action
1220 than subsequent SP execution contexts in the same call chain. The less
1312 | WAITING | Signaled | This starts a new call chain in SPMC scheduled|
1365 | WAITING | Signaled | This starts a new call chain in SPMC scheduled |
1378 | | | scheduled call chain. Refer scenario 1 of |
/trusted-firmware-a-latest/docs/plat/arm/corstone1000/
Dindex.rst14 The board boot relies on CoT (chain of trust). The trusted-firmware-a
/trusted-firmware-a-latest/drivers/mentor/i2c/
Dmi2cv.c193 static int mentor_i2c_address_set(uint8_t chain, int command) in mentor_i2c_address_set() argument
197 reg = (chain << I2C_DATA_ADDR_7BIT_OFFS) & I2C_DATA_ADDR_7BIT_MASK; in mentor_i2c_address_set()
/trusted-firmware-a-latest/docs/security_advisories/
Dsecurity-advisory-tfv-10.rst100 Platforms taking their chain of trust from a dynamic configuration file (such as
131 - The platform uses a custom chain of trust which uses the non-volatile counter
135 - The chain of trust uses a custom authentication method that calls
/trusted-firmware-a-latest/plat/nuvoton/npcm845x/
Dplatform.mk314 $(error Unknown chain of trust ${COT})
/trusted-firmware-a-latest/docs/design_documents/
Ddrtm_poc.rst13 As the boot chain grows or firmware becomes dynamically extensible,
Dmeasured_boot.rst11 and critical data at each stage in the boot chain before the code/data is used.
/trusted-firmware-a-latest/docs/plat/nxp/
Dnxp-ls-tbbr.rst200 Using the SAP chain position number 86, following is the output.
/trusted-firmware-a-latest/plat/arm/common/
Darm_common.mk388 $(error Unknown chain of trust ${COT})
/trusted-firmware-a-latest/docs/plat/marvell/armada/
Dbuild.rst432 On Debian/Ubuntu hosts the default GNU ARM tool chain can be installed
439 Only if required, the default tool chain prefix ``arm-linux-gnueabi-`` can be
/trusted-firmware-a-latest/docs/threat_model/
Dthreat_model.rst788 | | | TF-A relies on a chain of trust that starts with the|
791 | | can break this chain of trust, they could execute |
/trusted-firmware-a-latest/docs/getting_started/
Dbuild-options.rst161 - ``COT``: When Trusted Boot is enabled, selects the desired chain of trust.
/trusted-firmware-a-latest/docs/
Dchange-log.md2200 …- introduce new "cca" chain of trust ([56b741d](https://review.trustedfirmware.org/plugins/gitiles…
2659 …- define the cca chain of trust ([0a6bf81](https://review.trustedfirmware.org/plugins/gitiles/TF-A…
5318 - chain of trust and trusted board boot using two modes: MBEDTLS and CSF
6324 - arm/common: Add support for the new `dualroot` chain of trust
6407 - Introduce a new `dualroot` chain of trust.
7669 The chain of trust is extended to support the additional images.
Dporting-guide.rst3544 The layer is designed in such a way that is it possible to chain drivers with