Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 141) sorted by relevance

123456

/rk3399_ARM-atf/fdts/
H A Dtbbr_cot_descriptors.dts22 image-id =<TRUSTED_BOOT_FW_CERT_ID>;
41 image-id = <TRUSTED_KEY_CERT_ID>;
53 image-id = <SCP_FW_KEY_CERT_ID>;
64 image-id = <SCP_FW_CONTENT_CERT_ID>;
75 image-id = <SOC_FW_KEY_CERT_ID>;
85 image-id = <SOC_FW_CONTENT_CERT_ID>;
99 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>;
110 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
130 image-id = <NON_TRUSTED_FW_KEY_CERT_ID>;
141 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
[all …]
H A Ddualroot_cot_descriptors.dts17 image-id =<TRUSTED_BOOT_FW_CERT_ID>;
36 image-id = <TRUSTED_KEY_CERT_ID>;
45 image-id = <SCP_FW_KEY_CERT_ID>;
56 image-id = <SCP_FW_CONTENT_CERT_ID>;
67 image-id = <SOC_FW_KEY_CERT_ID>;
77 image-id = <SOC_FW_CONTENT_CERT_ID>;
91 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>;
102 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
123 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
137 image-id = <SIP_SP_CONTENT_CERT_ID>;
[all …]
H A Dcca_cot_descriptors.dts17 image-id =<CCA_CONTENT_CERT_ID>;
45 image-id = <CORE_SWD_KEY_CERT_ID>;
55 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
70 image-id = <PLAT_KEY_CERT_ID>;
80 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
95 image-id = <SIP_SP_CONTENT_CERT_ID>;
115 image-id = <PLAT_SP_CONTENT_CERT_ID>;
140 image-id = <HW_CONFIG_ID>;
146 image-id = <BL31_IMAGE_ID>;
152 image-id = <SOC_FW_CONFIG_ID>;
[all …]
H A Dstm32mp1-cot-descriptors.dtsi17 image-id = <STM32MP_CONFIG_CERT_ID>;
31 image-id = <TRUSTED_KEY_CERT_ID>;
43 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>;
54 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
74 image-id = <NON_TRUSTED_FW_KEY_CERT_ID>;
85 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
100 image-id = <HW_CONFIG_ID>;
106 image-id = <FW_CONFIG_ID>;
112 image-id = <BL32_IMAGE_ID>;
118 image-id = <BL32_EXTRA1_IMAGE_ID>;
[all …]
/rk3399_ARM-atf/tools/cot_dt2c/tests/
H A Dtest_invalid_missing_root.dtsi7 * are image/certificate that missing root certificate
20 image-id = <CORE_SWD_KEY_CERT_ID>;
30 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>;
44 image-id = <PLAT_KEY_CERT_ID>;
54 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
69 image-id = <SIP_SP_CONTENT_CERT_ID>;
89 image-id = <PLAT_SP_CONTENT_CERT_ID>;
114 image-id = <HW_CONFIG_ID>;
120 image-id = <BL31_IMAGE_ID>;
126 image-id = <SOC_FW_CONFIG_ID>;
[all …]
H A Dtest_invalid_undefined_parent.dtsi7 * are image/certificate that points to invalid parent
17 image-id =<36>;
30 image-id = <38>;
40 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>;
59 image-id = <23>;
65 image-id = <25>;
71 image-id = <5>;
77 image-id = <27>;
H A Dtest_invalid_missing_attribute.dtsi7 * are image/certificate that missing mandantory attributes
29 image-id = <38>;
39 image-id = <15>;
55 image-id = <23>;
60 image-id = <25>;
66 image-id = <5>;
72 image-id = <27>;
H A Dtest_invalid_missing_ctr.dtsi7 * are image/certificate that missing definition of
18 image-id =<2>;
34 image-id = <2>;
/rk3399_ARM-atf/tools/fiptool/
H A Dfiptool.c176 if (desc->image) { in free_image_desc()
177 free(desc->image->buffer); in free_image_desc()
178 free(desc->image); in free_image_desc()
343 image_t *image; in parse_fip() local
356 image = xzalloc(sizeof(*image), in parse_fip()
358 image->toc_e = *toc_entry; in parse_fip()
359 image->buffer = xmalloc(toc_entry->size, in parse_fip()
369 memcpy(image->buffer, buf + toc_entry->offset_address, in parse_fip()
387 assert(desc->image == NULL); in parse_fip()
388 desc->image = image; in parse_fip()
[all …]
H A Dfiptool.h39 struct image *image; member
43 typedef struct image { struct
/rk3399_ARM-atf/docs/components/
H A Dfirmware-update.rst59 - Retrieve the image specification (offset and length) of updated images
61 - Set these image specification in the corresponding I/O policies of the
69 and also if the system successfully booted the Normal-world image then
78 .. image:: ../resources/diagrams/PSA-FWU.png
110 :ref:`Trusted Board Boot` design document, which describes the image
137 - FWU image authentication
154 TF-A uses abbreviated image terminology for FWU images like for other TF-A
167 Each FWU image and certificate is identified by a unique ID, defined by the
168 platform, which BL1 uses to fetch an image descriptor (``image_desc_t``) via a
173 The image descriptor includes the following information:
[all …]
H A Dcot-binding.rst7 and 'image' nodes) mentioning properties of the certificate and image respectively.
49 - image-id
57 It refers to their parent image, which typically contains
140 image-id = <TRUSTED_KEY_CERT_ID>;
152 image-id = <SCP_FW_KEY_CERT_ID>;
175 Description: Container of image nodes
189 Describes image properties which will be used during
194 - image-id
195 Usage: Required for every image with unique id.
202 Required for every image to provide a reference to
[all …]
/rk3399_ARM-atf/docs/design/
H A Dauth-framework.rst10 particular image/certificate.
75 a root of trust and culminates in a single data image. The following diagram
76 illustrates how this maps to a CoT for the BL31 image described in the
126 authentication image contains information to authenticate a data image or
127 another authentication image. A data image is usually a boot loader binary, but
133 For every image in a Chain of Trust, the following high level operations are
136 #. Allocate memory for the image either statically or at runtime.
138 #. Identify the image and load it in the allocated memory.
140 #. Check the integrity of the image as per its type.
142 #. Authenticate the image as per the cryptographic algorithms used.
[all …]
/rk3399_ARM-atf/drivers/arm/css/scp/
H A Dcss_bom_bootloader.c104 int css_scp_boot_image_xfer(void *image, unsigned int image_size) in css_scp_boot_image_xfer() argument
111 assert((uintptr_t) image == SCP_BL2_BASE); in css_scp_boot_image_xfer()
121 checksum = *(uint32_t *) image; in css_scp_boot_image_xfer()
122 image = (char *) image + sizeof(checksum); in css_scp_boot_image_xfer()
174 cmd_data_payload->offset = (uintptr_t) image - ARM_TRUSTED_SRAM_BASE; in css_scp_boot_image_xfer()
/rk3399_ARM-atf/plat/marvell/
H A Dmarvell.mk7 BOOT_IMAGE := boot-image.bin
8 BOOT_ENC_IMAGE := boot-image-enc.bin
9 FLASH_IMAGE := flash-image.bin
/rk3399_ARM-atf/docs/plat/marvell/armada/
H A Duart-booting.rst10 Armada37x0 UART image downloading
13 There are two options how to download UART image into any Armada37x0 board.
47 produced by ``mrvl_uart`` target or also with ``flash-image.bin`` file produced by ``mrvl_flash``
63 To download single file image built by ``mrvl_flash`` target at the highest speed, run:
67 > mox-imager -D /dev/ttyUSB<port#> -E -b 6000000 -t flash-image.bin
78 not loose any boot output. It also prints boot output which is sent either by image files or by
79 bootrom during transferring of image files. This mini terminal can be quit by CTRL-\\ + C keypress.
82 A7K/A8K/CN913x UART image downloading
85 A7K/A8K/CN913x uses same image ``flash-image.bin`` for both flashing and booting over UART.
86 For downloading image over UART it is possible to use mvebu64boot tool.
[all …]
H A Dbuild.rst16 Set U-Boot image path (relatively to TF-A root or absolute path)
29 Set MSS/SCP image path (mandatory only for A7K/A8K/CN913x when MSS_SUPPORT=1)
38 Install ARM 32-bit cross compiler, which is required for building WTMI image for CM3
106 Build trusted(=1)/non trusted(=0) image, default is non trusted.
145 When enabled it is required to specify path to the MSS firmware image via ``SCP_BL2``
152 Specify path to the MSS fimware image binary which will run on Cortex-M3 coprocessor.
275 The path of the binary can point to an image which
276 does nothing, an image which supports EFUSE or a customized CM3 firmware
277 binary. The default image is ``fuse.bin`` that built from sources in WTP
278 folder, which is the next option. If the default image is OK, then this
[all …]
/rk3399_ARM-atf/lib/optee/
H A Doptee_utils.c41 optee_image_t *image) in parse_optee_image() argument
46 init_load_addr = ((uint64_t)image->load_addr_hi << 32) | in parse_optee_image()
47 image->load_addr_lo; in parse_optee_image()
48 init_size = image->size; in parse_optee_image()
55 if ((image->load_addr_hi == UINT32_MAX) && in parse_optee_image()
56 (image->load_addr_lo == UINT32_MAX)) { in parse_optee_image()
/rk3399_ARM-atf/docs/getting_started/
H A Dimage-terminology.rst16 - The main name change is to prefix each image with the processor it corresponds
37 - The image names are not case sensitive. For example, ``bl1`` is
49 required by the platform. For example, most platforms require a BL33 image
57 and authenticate an updateable AP firmware image into an executable RAM
58 location, then hand-off control to that image.
80 single or primary image executing at Secure-EL1. In systems where there are
101 abbreviated name should identify the vendor as well as the image
109 image is not provided, TF-A builds Test Realm Payload (TRP) image by default
110 and uses it as the RMM image.
117 and authenticate an updateable SCP firmware image into an executable RAM
[all …]
/rk3399_ARM-atf/docs/plat/arm/automotive_rd/
H A Drdaspen.rst19 Application Processor (AP) BL2 image into the Trusted SRAM at a fixed address.
32 * (Optional step) Find the FIP image in a GPT partition, incase the FIP lies
33 within in a GPT image.
35 * (Optional step) Computes FW_CONFIG image measurement and invokes extend
43 * Reads and loads AP BL31 image into the Trusted SRAM.
44 * (Optional step) Computes AP BL31 image measurement and invokes extend operation of TF-M
47 * (Optional step) Computes HW_CONFIG (DTB) image measurement and invokes
49 * (If present) Reads and loads AP BL32 (Secure Payload) image into Secure DRAM
50 * (Optional step, if present) Computes AP BL32 image measurement and invokes extend
55 * (Optional step) Computes AP BL33 image measurement and invokes extend operation of TF-M
[all …]
/rk3399_ARM-atf/plat/marvell/armada/common/mss/
H A Dmss_scp_bootloader.c307 static int split_and_load_bl2_image(void *image) in split_and_load_bl2_image() argument
314 file_hdr = (file_header_t *)image; in split_and_load_bl2_image()
326 img_hdr = (img_header_t *)((uintptr_t)image + sizeof(file_header_t)); in split_and_load_bl2_image()
327 single_img = (uintptr_t)image + sizeof(file_header_t) + in split_and_load_bl2_image()
350 int scp_bootloader_transfer(void *image, unsigned int image_size) in scp_bootloader_transfer() argument
353 assert((uintptr_t) image == SCP_BL2_BASE); in scp_bootloader_transfer()
364 if (split_and_load_bl2_image(image)) in scp_bootloader_transfer()
/rk3399_ARM-atf/tools/marvell/doimage/secure/
H A Dsec_img_8K.cfg1 # Trusted boot image extension definitions
6 # Only a key with csk_key_index will be used for signing the image
17 # AES-256 symmetric key for image encryption
H A Dsec_img_7K.cfg1 # Trusted boot image extension definitions
6 # Only a key with csk_key_index will be used for signing the image
17 # AES-256 symmetric key for image encryption
/rk3399_ARM-atf/docs/security_advisories/
H A Dsecurity-advisory-tfv-1.rst29 the normal world, while retaining the essential image authentication
52 implementation is designed to copy an image into secure memory for subsequent
68 * clip the block to the required image size.
74 WARN("BL1-FWU: Copy argument block_size > remaining image size."
78 /* Make sure the image src/size is mapped. */
84 INFO("BL1-FWU: Continuing image copy in blocks\n");
86 /* Copy image for given block size. */
92 This code fragment is executed when the image copy operation is performed in
104 /* Make sure the image src/size is mapped. */
119 /* Update the image size. */
[all …]
/rk3399_ARM-atf/plat/xilinx/common/
H A Dplat_startup.c221 entry_point_info_t *image; in xbl_handover() local
266 image = bl32; in xbl_handover()
277 image = bl33; in xbl_handover()
305 image->pc = HandoffParams->partition[i].entry_point; in xbl_handover()
308 EP_SET_EE(image->h.attr, EP_EE_BIG); in xbl_handover()
310 EP_SET_EE(image->h.attr, EP_EE_LITTLE); in xbl_handover()

123456