| /rk3399_ARM-atf/fdts/ |
| H A D | tbbr_cot_descriptors.dts | 22 image-id =<TRUSTED_BOOT_FW_CERT_ID>; 41 image-id = <TRUSTED_KEY_CERT_ID>; 53 image-id = <SCP_FW_KEY_CERT_ID>; 64 image-id = <SCP_FW_CONTENT_CERT_ID>; 75 image-id = <SOC_FW_KEY_CERT_ID>; 85 image-id = <SOC_FW_CONTENT_CERT_ID>; 99 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>; 110 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>; 130 image-id = <NON_TRUSTED_FW_KEY_CERT_ID>; 141 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; [all …]
|
| H A D | dualroot_cot_descriptors.dts | 17 image-id =<TRUSTED_BOOT_FW_CERT_ID>; 36 image-id = <TRUSTED_KEY_CERT_ID>; 45 image-id = <SCP_FW_KEY_CERT_ID>; 56 image-id = <SCP_FW_CONTENT_CERT_ID>; 67 image-id = <SOC_FW_KEY_CERT_ID>; 77 image-id = <SOC_FW_CONTENT_CERT_ID>; 91 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>; 102 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>; 123 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; 137 image-id = <SIP_SP_CONTENT_CERT_ID>; [all …]
|
| H A D | cca_cot_descriptors.dts | 17 image-id =<CCA_CONTENT_CERT_ID>; 45 image-id = <CORE_SWD_KEY_CERT_ID>; 55 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>; 70 image-id = <PLAT_KEY_CERT_ID>; 80 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; 95 image-id = <SIP_SP_CONTENT_CERT_ID>; 115 image-id = <PLAT_SP_CONTENT_CERT_ID>; 140 image-id = <HW_CONFIG_ID>; 146 image-id = <BL31_IMAGE_ID>; 152 image-id = <SOC_FW_CONFIG_ID>; [all …]
|
| H A D | stm32mp1-cot-descriptors.dtsi | 17 image-id = <STM32MP_CONFIG_CERT_ID>; 31 image-id = <TRUSTED_KEY_CERT_ID>; 43 image-id = <TRUSTED_OS_FW_KEY_CERT_ID>; 54 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>; 74 image-id = <NON_TRUSTED_FW_KEY_CERT_ID>; 85 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; 100 image-id = <HW_CONFIG_ID>; 106 image-id = <FW_CONFIG_ID>; 112 image-id = <BL32_IMAGE_ID>; 118 image-id = <BL32_EXTRA1_IMAGE_ID>; [all …]
|
| /rk3399_ARM-atf/tools/cot_dt2c/tests/ |
| H A D | test_invalid_missing_root.dtsi | 7 * are image/certificate that missing root certificate 20 image-id = <CORE_SWD_KEY_CERT_ID>; 30 image-id = <TRUSTED_OS_FW_CONTENT_CERT_ID>; 44 image-id = <PLAT_KEY_CERT_ID>; 54 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; 69 image-id = <SIP_SP_CONTENT_CERT_ID>; 89 image-id = <PLAT_SP_CONTENT_CERT_ID>; 114 image-id = <HW_CONFIG_ID>; 120 image-id = <BL31_IMAGE_ID>; 126 image-id = <SOC_FW_CONFIG_ID>; [all …]
|
| H A D | test_invalid_undefined_parent.dtsi | 7 * are image/certificate that points to invalid parent 17 image-id =<36>; 30 image-id = <38>; 40 image-id = <NON_TRUSTED_FW_CONTENT_CERT_ID>; 59 image-id = <23>; 65 image-id = <25>; 71 image-id = <5>; 77 image-id = <27>;
|
| H A D | test_invalid_missing_attribute.dtsi | 7 * are image/certificate that missing mandantory attributes 29 image-id = <38>; 39 image-id = <15>; 55 image-id = <23>; 60 image-id = <25>; 66 image-id = <5>; 72 image-id = <27>;
|
| H A D | test_invalid_missing_ctr.dtsi | 7 * are image/certificate that missing definition of 18 image-id =<2>; 34 image-id = <2>;
|
| /rk3399_ARM-atf/tools/fiptool/ |
| H A D | fiptool.c | 176 if (desc->image) { in free_image_desc() 177 free(desc->image->buffer); in free_image_desc() 178 free(desc->image); in free_image_desc() 343 image_t *image; in parse_fip() local 356 image = xzalloc(sizeof(*image), in parse_fip() 358 image->toc_e = *toc_entry; in parse_fip() 359 image->buffer = xmalloc(toc_entry->size, in parse_fip() 369 memcpy(image->buffer, buf + toc_entry->offset_address, in parse_fip() 387 assert(desc->image == NULL); in parse_fip() 388 desc->image = image; in parse_fip() [all …]
|
| H A D | fiptool.h | 39 struct image *image; member 43 typedef struct image { struct
|
| /rk3399_ARM-atf/docs/components/ |
| H A D | firmware-update.rst | 59 - Retrieve the image specification (offset and length) of updated images 61 - Set these image specification in the corresponding I/O policies of the 69 and also if the system successfully booted the Normal-world image then 78 .. image:: ../resources/diagrams/PSA-FWU.png 110 :ref:`Trusted Board Boot` design document, which describes the image 137 - FWU image authentication 154 TF-A uses abbreviated image terminology for FWU images like for other TF-A 167 Each FWU image and certificate is identified by a unique ID, defined by the 168 platform, which BL1 uses to fetch an image descriptor (``image_desc_t``) via a 173 The image descriptor includes the following information: [all …]
|
| H A D | cot-binding.rst | 7 and 'image' nodes) mentioning properties of the certificate and image respectively. 49 - image-id 57 It refers to their parent image, which typically contains 140 image-id = <TRUSTED_KEY_CERT_ID>; 152 image-id = <SCP_FW_KEY_CERT_ID>; 175 Description: Container of image nodes 189 Describes image properties which will be used during 194 - image-id 195 Usage: Required for every image with unique id. 202 Required for every image to provide a reference to [all …]
|
| /rk3399_ARM-atf/docs/design/ |
| H A D | auth-framework.rst | 10 particular image/certificate. 75 a root of trust and culminates in a single data image. The following diagram 76 illustrates how this maps to a CoT for the BL31 image described in the 126 authentication image contains information to authenticate a data image or 127 another authentication image. A data image is usually a boot loader binary, but 133 For every image in a Chain of Trust, the following high level operations are 136 #. Allocate memory for the image either statically or at runtime. 138 #. Identify the image and load it in the allocated memory. 140 #. Check the integrity of the image as per its type. 142 #. Authenticate the image as per the cryptographic algorithms used. [all …]
|
| /rk3399_ARM-atf/drivers/arm/css/scp/ |
| H A D | css_bom_bootloader.c | 104 int css_scp_boot_image_xfer(void *image, unsigned int image_size) in css_scp_boot_image_xfer() argument 111 assert((uintptr_t) image == SCP_BL2_BASE); in css_scp_boot_image_xfer() 121 checksum = *(uint32_t *) image; in css_scp_boot_image_xfer() 122 image = (char *) image + sizeof(checksum); in css_scp_boot_image_xfer() 174 cmd_data_payload->offset = (uintptr_t) image - ARM_TRUSTED_SRAM_BASE; in css_scp_boot_image_xfer()
|
| /rk3399_ARM-atf/plat/marvell/ |
| H A D | marvell.mk | 7 BOOT_IMAGE := boot-image.bin 8 BOOT_ENC_IMAGE := boot-image-enc.bin 9 FLASH_IMAGE := flash-image.bin
|
| /rk3399_ARM-atf/docs/plat/marvell/armada/ |
| H A D | uart-booting.rst | 10 Armada37x0 UART image downloading 13 There are two options how to download UART image into any Armada37x0 board. 47 produced by ``mrvl_uart`` target or also with ``flash-image.bin`` file produced by ``mrvl_flash`` 63 To download single file image built by ``mrvl_flash`` target at the highest speed, run: 67 > mox-imager -D /dev/ttyUSB<port#> -E -b 6000000 -t flash-image.bin 78 not loose any boot output. It also prints boot output which is sent either by image files or by 79 bootrom during transferring of image files. This mini terminal can be quit by CTRL-\\ + C keypress. 82 A7K/A8K/CN913x UART image downloading 85 A7K/A8K/CN913x uses same image ``flash-image.bin`` for both flashing and booting over UART. 86 For downloading image over UART it is possible to use mvebu64boot tool. [all …]
|
| H A D | build.rst | 16 Set U-Boot image path (relatively to TF-A root or absolute path) 29 Set MSS/SCP image path (mandatory only for A7K/A8K/CN913x when MSS_SUPPORT=1) 38 Install ARM 32-bit cross compiler, which is required for building WTMI image for CM3 106 Build trusted(=1)/non trusted(=0) image, default is non trusted. 145 When enabled it is required to specify path to the MSS firmware image via ``SCP_BL2`` 152 Specify path to the MSS fimware image binary which will run on Cortex-M3 coprocessor. 275 The path of the binary can point to an image which 276 does nothing, an image which supports EFUSE or a customized CM3 firmware 277 binary. The default image is ``fuse.bin`` that built from sources in WTP 278 folder, which is the next option. If the default image is OK, then this [all …]
|
| /rk3399_ARM-atf/lib/optee/ |
| H A D | optee_utils.c | 41 optee_image_t *image) in parse_optee_image() argument 46 init_load_addr = ((uint64_t)image->load_addr_hi << 32) | in parse_optee_image() 47 image->load_addr_lo; in parse_optee_image() 48 init_size = image->size; in parse_optee_image() 55 if ((image->load_addr_hi == UINT32_MAX) && in parse_optee_image() 56 (image->load_addr_lo == UINT32_MAX)) { in parse_optee_image()
|
| /rk3399_ARM-atf/docs/getting_started/ |
| H A D | image-terminology.rst | 16 - The main name change is to prefix each image with the processor it corresponds 37 - The image names are not case sensitive. For example, ``bl1`` is 49 required by the platform. For example, most platforms require a BL33 image 57 and authenticate an updateable AP firmware image into an executable RAM 58 location, then hand-off control to that image. 80 single or primary image executing at Secure-EL1. In systems where there are 101 abbreviated name should identify the vendor as well as the image 109 image is not provided, TF-A builds Test Realm Payload (TRP) image by default 110 and uses it as the RMM image. 117 and authenticate an updateable SCP firmware image into an executable RAM [all …]
|
| /rk3399_ARM-atf/docs/plat/arm/automotive_rd/ |
| H A D | rdaspen.rst | 19 Application Processor (AP) BL2 image into the Trusted SRAM at a fixed address. 32 * (Optional step) Find the FIP image in a GPT partition, incase the FIP lies 33 within in a GPT image. 35 * (Optional step) Computes FW_CONFIG image measurement and invokes extend 43 * Reads and loads AP BL31 image into the Trusted SRAM. 44 * (Optional step) Computes AP BL31 image measurement and invokes extend operation of TF-M 47 * (Optional step) Computes HW_CONFIG (DTB) image measurement and invokes 49 * (If present) Reads and loads AP BL32 (Secure Payload) image into Secure DRAM 50 * (Optional step, if present) Computes AP BL32 image measurement and invokes extend 55 * (Optional step) Computes AP BL33 image measurement and invokes extend operation of TF-M [all …]
|
| /rk3399_ARM-atf/plat/marvell/armada/common/mss/ |
| H A D | mss_scp_bootloader.c | 307 static int split_and_load_bl2_image(void *image) in split_and_load_bl2_image() argument 314 file_hdr = (file_header_t *)image; in split_and_load_bl2_image() 326 img_hdr = (img_header_t *)((uintptr_t)image + sizeof(file_header_t)); in split_and_load_bl2_image() 327 single_img = (uintptr_t)image + sizeof(file_header_t) + in split_and_load_bl2_image() 350 int scp_bootloader_transfer(void *image, unsigned int image_size) in scp_bootloader_transfer() argument 353 assert((uintptr_t) image == SCP_BL2_BASE); in scp_bootloader_transfer() 364 if (split_and_load_bl2_image(image)) in scp_bootloader_transfer()
|
| /rk3399_ARM-atf/tools/marvell/doimage/secure/ |
| H A D | sec_img_8K.cfg | 1 # Trusted boot image extension definitions 6 # Only a key with csk_key_index will be used for signing the image 17 # AES-256 symmetric key for image encryption
|
| H A D | sec_img_7K.cfg | 1 # Trusted boot image extension definitions 6 # Only a key with csk_key_index will be used for signing the image 17 # AES-256 symmetric key for image encryption
|
| /rk3399_ARM-atf/docs/security_advisories/ |
| H A D | security-advisory-tfv-1.rst | 29 the normal world, while retaining the essential image authentication 52 implementation is designed to copy an image into secure memory for subsequent 68 * clip the block to the required image size. 74 WARN("BL1-FWU: Copy argument block_size > remaining image size." 78 /* Make sure the image src/size is mapped. */ 84 INFO("BL1-FWU: Continuing image copy in blocks\n"); 86 /* Copy image for given block size. */ 92 This code fragment is executed when the image copy operation is performed in 104 /* Make sure the image src/size is mapped. */ 119 /* Update the image size. */ [all …]
|
| /rk3399_ARM-atf/plat/xilinx/common/ |
| H A D | plat_startup.c | 221 entry_point_info_t *image; in xbl_handover() local 266 image = bl32; in xbl_handover() 277 image = bl33; in xbl_handover() 305 image->pc = HandoffParams->partition[i].entry_point; in xbl_handover() 308 EP_SET_EE(image->h.attr, EP_EE_BIG); in xbl_handover() 310 EP_SET_EE(image->h.attr, EP_EE_LITTLE); in xbl_handover()
|