Lines Matching refs:firmware
4 The `Trusted Board Boot` (TBB) feature prevents malicious firmware from running
5 on the platform by authenticating all firmware images up to and including the
23 - The set of firmware images in use on this platform.
24 Typically, most platforms share a common set of firmware images (BL1, BL2,
79 In the TBBR CoT, all firmware binaries and certificates are (directly or
88 The private part of this key is used to sign the trusted boot firmware
120 - **Trusted boot firmware certificate**
123 the BL2 image and hashes of various firmware configuration files
132 - **SCP firmware key certificate**
137 - **SCP firmware content certificate**
142 - **SoC firmware key certificate**
147 - **SoC firmware content certificate**
162 - **Non-trusted firmware key certificate**
167 - **Non-trusted firmware content certificate**
172 The SCP firmware and Trusted OS certificates are optional, but they must be
184 The `dualroot` CoT is targeted at systems where the Normal World firmware is
205 making supply chains for the Arm CCA firmware, the secure world firmware and the
206 platform owner firmware, independent. Hence, this CoT has 3 roots of trust, one
311 implement the optional firmware encryption feature. This feature can be
321 firmware image as input and generates the encrypted firmware image which can