| /rk3399_ARM-atf/docs/design/ |
| H A D | trusted-board-boot.rst | 58 certificate's issuer but by the content of the certificate extensions. To sign 63 certificates are used to verify public keys which have been used to sign content 66 with the hash extracted from the content certificate. Various hash algorithms 106 sign the content certificate for the BL3X image. The public part is stored 137 - **SCP firmware content certificate** 147 - **SoC firmware content certificate** 157 - **Trusted OS content certificate** 167 - **Non-trusted firmware content certificate** 215 - BL1 loads and verifies the BL2 content certificate. The issuer public key is 243 - BL2 loads and verifies the BL3x content certificate. The signature is [all …]
|
| H A D | auth-framework.rst | 214 will have been extracted from the parent image i.e. BL31 content 560 content certificate is stored in an X509v3 custom extension field. An extension
|
| /rk3399_ARM-atf/include/services/ |
| H A D | ffa_svc.h | 356 #define FFA_BOOT_INFO_FLAG_CONTENT(content) \ argument 357 (((content) & FFA_BOOT_INFO_FLAG_CONTENT_MASK) \ 367 uint64_t content; member
|
| /rk3399_ARM-atf/services/std_svc/spm/el3_spmc/ |
| H A D | spmc_setup.c | 417 boot_descriptor->content = content_addr; in spmc_create_boot_info() 443 boot_descriptor->content = content_addr; in spmc_create_boot_info() 456 boot_descriptor->content, in spmc_create_boot_info()
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | ven-el3-service.rst | 104 .. _TCG ACPI specification: https://trustedcomputinggroup.org/wp-content/uploads/TCG-ACPI-Specifica…
|
| H A D | debugfs-design.rst | 59 - bind(): expose the content of a directory to another directory.
|
| /rk3399_ARM-atf/tools/sptool/ |
| H A D | sp_mk_generator.py | 82 def write_to_sp_mk_gen(content, args :dict): argument
|
| /rk3399_ARM-atf/docs/plat/ |
| H A D | hikey960.rst | 136 # The content of config file
|
| /rk3399_ARM-atf/docs/design_documents/ |
| H A D | measured_boot.rst | 228 certificate for later authentication of a content certificate. 243 .. _TCG EFI Protocol Specification: https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protoc…
|
| H A D | cmake_framework.rst | 65 setting groups shall be defined and filled with content in config files.
|
| H A D | measured_boot_poc.rst | 472 The fTPM service used has support only for 16 PCRs, therefore the content 477 we do not validate here if the content of PCR0 is correct or not. For this
|
| /rk3399_ARM-atf/docs/threat_model/firmware_threat_model/ |
| H A D | threat_model_firmware_handoff.rst | 92 | | implementation must prevent said content from being |
|
| /rk3399_ARM-atf/docs/ |
| H A D | porting-guide.rst | 202 Defines the maximum address in secure ROM that BL1's actual content (i.e. 234 Defines the maximum address in secure XIP memory that BL2's actual content 289 BL2 content certificate identifier, used by BL1 to load the BL2 content 304 BL31 content certificate identifier, used by BL2 to load the BL31 content 314 BL33 content certificate identifier, used by BL2 to load the BL33 content 320 FWU content certificate. 405 SCP_BL2 content certificate identifier, used by BL2 to load the SCP_BL2 406 content certificate (mandatory when Trusted Board Boot is enabled). 422 BL32 content certificate identifier, used by BL2 to load the BL32 content 3816 can be the content of either ``ESR_EL3`` or ``DISR_EL1``. [all …]
|
| H A D | change-log.md | 9771 - Added support for warm reset to retain ddr content 11495 - Migrated some content from GitHub wiki to `docs/` directory
|
| /rk3399_ARM-atf/tools/memory/ |
| H A D | poetry.lock | 264 content-hash = "72f05cdcfe5278c3fb4408ba76cc502c83a56615681d8307bf67fe759a9da442"
|
| /rk3399_ARM-atf/licenses/ |
| H A D | LICENSE-APACHE-2.0.txt | 142 origin of the Work and reproducing the content of the NOTICE file.
|
| /rk3399_ARM-atf/tools/cot_dt2c/ |
| H A D | poetry.lock | 368 content-hash = "0f5b2b008bb5de8545881eaeacfdd1a6fe50e5271feea4635d622ffce9e550dc"
|
| /rk3399_ARM-atf/docs/process/ |
| H A D | coding-style.rst | 352 <header content>
|
| /rk3399_ARM-atf/docs/about/ |
| H A D | lts.rst | 17 | | Varun Wadekar | made by both authors, cosmetic changes to the content |
|
| /rk3399_ARM-atf/docs/threat_model/ |
| H A D | supply_chain_threat_model.rst | 723 | | - Updated content | access | |
|
| /rk3399_ARM-atf/ |
| H A D | poetry.lock | 1450 content-hash = "9321e4c575f4ef6361f27e146e5e0caaf69a58fc0e75c5b711dd5fde42ad29fa"
|
| /rk3399_ARM-atf/tools/tlc/ |
| H A D | poetry.lock | 1560 content-hash = "a4b9c3bababadba14f49a8de0ccee1f5a141b6cea23d02a19ab8bf4f8c45533f"
|