Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 68) sorted by relevance

123

/rk3399_ARM-atf/docs/security_advisories/
H A Dindex.rst8 security-advisory-tfv-1.rst
9 security-advisory-tfv-2.rst
10 security-advisory-tfv-3.rst
11 security-advisory-tfv-4.rst
12 security-advisory-tfv-5.rst
13 security-advisory-tfv-6.rst
14 security-advisory-tfv-7.rst
15 security-advisory-tfv-8.rst
16 security-advisory-tfv-9.rst
17 security-advisory-tfv-10.rst
[all …]
H A Dsecurity-advisory-tfv-9.rst32 This security advisory describes the current understanding of the Trusted
118 .. _Arm Processor Security Update: http://www.arm.com/security-update
121 .. _CVE-2022-23960 mitigation specification: https://developer.arm.com/support/arm-security-updates…
H A Dsecurity-advisory-tfv-6.rst28 This security advisory describes the current understanding of the Trusted
145 Refer to :ref:`security-advisory-tfv-7` for further details on this variant.
149 Refer to :ref:`security-advisory-tfv-9` for further details on this variant.
152 .. _Arm Processor Security Update: http://www.arm.com/security-update
/rk3399_ARM-atf/docs/process/
H A Dindex.rst8 security
17 security-hardening
H A Dsecurity.rst7 We disclose all security vulnerabilities we find, or are advised about, that are
19 community of developers and security researchers.
22 If you think you have found a security vulnerability, please **do not**
24 follow the `TrustedFirmware.org security incident process`_.
38 with the source code and in any published security advisory.
94 .. _TrustedFirmware.org security incident process: https://trusted-firmware-docs.readthedocs.io/en/…
H A Dsecurity-hardening.rst4 This page contains guidance on what to check for additional security measures,
5 including build options that can be modified to improve security or catch issues
11 Part of the security of a platform is handling errors correctly, as described in
12 the previous section. There are several other security considerations covered in
124 Several build options can be used to check for security issues. Refer to the
138 Additional guidelines are provided below for some security-related build
143 console. Keeping this feature enabled is considered dangerous from a security
/rk3399_ARM-atf/include/common/
H A Dep_info.h37 #define SET_SECURITY_STATE(x, security) \ argument
38 ((x) = ((x) & ~EP_SECURITY_MASK) | (security))
/rk3399_ARM-atf/plat/nvidia/tegra/soc/t186/drivers/se/
H A Dse.c244 uint32_t val = 0U, hash_offset = 0U, scratch_offset = 0U, security; in tegra_se_save_sha256_hash() local
250 security = tegra_se_read_32(SE0_SECURITY); in tegra_se_save_sha256_hash()
251 tegra_se_write_32(SE0_SECURITY, security | SE0_SECURITY_SE_SOFT_SETTING); in tegra_se_save_sha256_hash()
262 tegra_se_write_32(SE0_SECURITY, security); in tegra_se_save_sha256_hash()
/rk3399_ARM-atf/plat/nvidia/tegra/soc/t194/drivers/se/
H A Dse.c414 uint32_t security; in tegra_se_calculate_save_sha256() local
420 security = tegra_se_read_32(SE0_SECURITY); in tegra_se_calculate_save_sha256()
421 tegra_se_write_32(SE0_SECURITY, security | SE0_SECURITY_SE_SOFT_SETTING); in tegra_se_calculate_save_sha256()
438 tegra_se_write_32(SE0_SECURITY, security); in tegra_se_calculate_save_sha256()
/rk3399_ARM-atf/docs/components/
H A Dcontext-management-library.rst12 software running in various security states (Secure/Non-Secure/Realm).
14 are not banked per world. When moving between the security states it is the
28 security state and save enough EL3 metadata to be able to return to that exception
29 level and security state. The memory for the context data structures are allocated
33 security states (Non-Secure, Secure, Realm). Each world must have its
34 configuration of system registers independent of other security states to access
37 If the CPU switches across security states (for example: from Non-secure to Secure
41 the architectural features enabled in the former security state will be unconditionally
42 accessible in the latter security state as well. This can be a major concern when
43 dealing with security-specific bits, as they need to be explicitly enabled or
[all …]
H A Dactivity-monitors.rst22 As a security precaution, Trusted Firmware-A does not enable these by default.
/rk3399_ARM-atf/docs/threat_model/firmware_threat_model/
H A Dindex.rst14 current status of the code from a security standpoint.
41 .. _STRIDE threat modeling technique: https://docs.microsoft.com/en-us/azure/security/develop/threa…
H A Dthreat_model_arm_cca.rst31 recommended by `Arm CCA security model`_:
34 *hardware enforced security (CCA HES).*
40 These are requirements of the `Arm CCA security model`_:
44 *[R0149] Any monitor data that may affect the CCA security guarantee, other*
56 This is a requirement of the `Arm CCA security model`_:
68 These are requirements of the `Arm CCA security model`_:
H A Dthreat_model.rst46 bare-minimum security prerequisites for System-on-Chips (SoC).
169 analysis side-channel attacks represent a category of security threats that
231 | | security implications | |
423 | | where memory corruption security errors can arise. |
459 | | sanitized before being used. These security checks |
497 | | execute code if the proper security mechanisms |
640 | | other security-sensitive processes. By observing |
799 | | when the security check is produced before the time |
888 | | branches that are security sensitive, can be used |
950 environment's security.
[all …]
/rk3399_ARM-atf/docs/design_documents/
H A Ddrtm_poc.rst13 enable enforcing security policies.
21 the security of the system.
39 system’s state, measures security-critical attributes of the system,
H A Ddtpm_drivers.rst7 performing security-related operations.
16 TPM measurements establish the security posture of a system and are used for
18 a security standpoint because it ensures hardware-backed attestation earlier
/rk3399_ARM-atf/docs/design/
H A Dinterrupt-framework-design.rst36 Secure-EL1 depending upon the security state of the current execution
40 Secure-EL1, Non-secure EL1 or EL2 depending upon the security state of the
45 depending upon the security state of the current execution context. It is
66 FEL. This register is configured independently by EL3 software for each security
67 state prior to entry into a lower exception level in that security state.
70 its target exception level for each security state. It is represented by a
71 single bit for each security state. A value of ``0`` means that the interrupt
76 either security state.
174 FIQ or IRQ signal to the CPU depending upon the current security state. The
183 This applies when execution is in either security state.
[all …]
/rk3399_ARM-atf/docs/components/spd/
H A Dtrusty-dispatcher.rst9 https://source.android.com/security/trusty
/rk3399_ARM-atf/docs/plat/marvell/armada/misc/
H A Dmvebu-iob.rst10 the enabled windows. If there is a hit and it passes the security checks, it is
/rk3399_ARM-atf/docs/plat/st/
H A Dstm32mp2.rst28 Each line comes with a security option (cryptography & secure boot) and a Cortex-A frequency option:
43 Each line comes with a security option (cryptography & secure boot) and a Cortex-A frequency option:
59 Each line comes with a security option (cryptography & secure boot) and a Cortex-A frequency option:
/rk3399_ARM-atf/docs/perf/
H A Dperformance-monitoring-unit.rst8 implementation and to complement the PMU security guidelines given in the
122 security state unless it is enabled here.
/rk3399_ARM-atf/plat/intel/soc/common/drivers/ccu/
H A Dncore_ccu.h309 CCU_REGION_SECURITY_t security, CCU_REGION_PRIVILEGE_t privilege);
336 CCU_REGION_SECURITY_t security, CCU_REGION_PRIVILEGE_t privilege);
/rk3399_ARM-atf/docs/about/
H A Dfeatures.rst80 security services.
145 - Ongoing security hardening, optimization and quality improvements.
150 .. _Trusty Secure OS: https://source.android.com/security/trusty
/rk3399_ARM-atf/docs/plat/
H A Ds32g274a.rst5 security, high-performance real-time and application processing and network
14 applications, high-performance processing, safety and security applications.
/rk3399_ARM-atf/docs/
H A Dindex.rst45 Users are encouraged to do their own security validation, including penetration
66 and process, how security disclosures are handled, and the guidelines for

123