/optee_os/core/arch/arm/plat-stm32mp1/ |
A D | main.c | 78 bool secure; in console_init() member 81 [1] = { .pa = USART1_BASE, .secure = true, }, in console_init() 82 [2] = { .pa = USART2_BASE, .secure = false, }, in console_init() 83 [3] = { .pa = USART3_BASE, .secure = false, }, in console_init() 84 [4] = { .pa = UART4_BASE, .secure = false, }, in console_init() 85 [5] = { .pa = UART5_BASE, .secure = false, }, in console_init() 86 [6] = { .pa = USART6_BASE, .secure = false, }, in console_init() 87 [7] = { .pa = UART7_BASE, .secure = false, }, in console_init() 88 [8] = { .pa = UART8_BASE, .secure = false, }, in console_init() 99 console_data.secure = uarts[CFG_STM32_EARLY_CONSOLE_UART].secure; in console_init() [all …]
|
A D | shared_resources.c | 459 unsigned int secure = 0; in stm32mp_gpio_bank_is_secure() local 469 secure++; in stm32mp_gpio_bank_is_secure() 471 return secure > 0 && secure == get_gpioz_nbpin(); in stm32mp_gpio_bank_is_secure() 653 bool secure = stm32_rcc_is_secure(); in check_rcc_secure_configuration() local 658 if (stm32mp_is_closed_device() && !secure) in check_rcc_secure_configuration() 665 if ((mckprot_resource(id) && !mckprot) || !secure) { in check_rcc_secure_configuration() 667 secure ? "secure" : "non-secure", in check_rcc_secure_configuration() 684 bool secure = stm32mp_periph_is_secure(shres); in set_gpio_secure_configuration() local 686 stm32_gpio_set_secure_cfg(GPIO_BANK_Z, pin, secure); in set_gpio_secure_configuration()
|
A D | stm32_util.h | 169 static inline int incr_shrefcnt(unsigned int *refcnt, bool secure) in incr_shrefcnt() argument 173 if (secure) { in incr_shrefcnt() 186 static inline int decr_shrefcnt(unsigned int *refcnt, bool secure) in decr_shrefcnt() argument 190 if (secure) { in decr_shrefcnt()
|
/optee_os/core/include/drivers/ |
A D | stm32_gpio.h | 164 bool secure); 168 bool secure __unused) in stm32_gpio_set_secure_cfg()
|
A D | stm32_uart.h | 16 bool secure; member
|
/optee_os/core/drivers/ |
A D | stm32_uart.c | 154 pd->secure = (info.status == DT_STATUS_OK_SEC); in stm32_uart_init_from_dt_node() 168 pd->secure ? MEM_AREA_IO_SEC : in stm32_uart_init_from_dt_node() 186 if (pd->secure) in stm32_uart_init_from_dt_node()
|
A D | stm32_gpio.c | 426 void stm32_gpio_set_secure_cfg(unsigned int bank, unsigned int pin, bool secure) in stm32_gpio_set_secure_cfg() argument 434 if (secure) in stm32_gpio_set_secure_cfg()
|
/optee_os/ |
A D | README.md | 2 This git contains source code for the secure side implementation of OP-TEE
|
A D | CHANGELOG.md | 388 * Add support for using secure storage for TA anti-rollback ([#1928]) 410 * RPMB: fix TA independance issue in secure storage ([#1921]) 414 * PSCI: pass non-secure context to psci_system_suspend() ([#1916]) 610 * Assign non-secure DDR configuration from DT if CFG_DT=y ([#1623]) 621 * plat-ti: add secure paging support ([#1493]) 628 * Remove secure storage based on SQL FS (`CFG_SQL_FS=y`) ([#1490]) 661 * [#1656] qemu_armv8a: init hangs when secure data path and pager are both 744 to share references to secure memory 770 * Add paged secure shared memory that can be transferred between TAs as 858 * ARMv7-A: redesign secure monitor to make it easier to register services [all …]
|
/optee_os/core/arch/arm/dts/ |
A D | stm32mp157a-dk1.dts | 35 st,non-secure-otp;
|
A D | stm32mp157c-dk2.dts | 103 st,non-secure-otp;
|
A D | fsl-lx2160a.dtsi | 487 status = "okay"; secure-status = "disabled"; /* NS-only */ 495 status = "okay"; secure-status = "disabled"; /* NS-only */ 503 status = "disabled"; secure-status = "okay"; /* S-only */ 511 status = "okay"; secure-status = "disabled"; /* workaround for ATF */ 1149 // global secure fault 1151 // combined secure 1153 // global non-secure fault 1155 // combined non-secure
|
A D | stm32mp157c-ed1.dts | 377 st,non-secure-otp;
|
A D | stm32mp151.dtsi | 1499 st,non-secure-otp; 1508 secure-status = "okay";
|
A D | sama5d2.dtsi | 1012 secure-status = "okay";
|
/optee_os/core/arch/arm/mm/ |
A D | core_mmu_v7.c | 568 unsigned int idx, bool secure) in core_mmu_entry_to_finer_grained() argument 592 return secure == (bool)(attr & TEE_MATTR_SECURE); in core_mmu_entry_to_finer_grained() 596 if (attr && secure != (bool)(attr & TEE_MATTR_SECURE)) in core_mmu_entry_to_finer_grained() 607 if (!secure) in core_mmu_entry_to_finer_grained()
|
A D | core_mmu.c | 1721 bool secure; in core_mmu_map_pages() local 1725 secure = core_mmu_type_to_attr(memtype) & TEE_MATTR_SECURE; in core_mmu_map_pages() 1756 secure)) in core_mmu_map_pages() 1799 bool secure = false; in core_mmu_map_contiguous_pages() local 1803 secure = core_mmu_type_to_attr(memtype) & TEE_MATTR_SECURE; in core_mmu_map_contiguous_pages() 1829 secure)) in core_mmu_map_contiguous_pages()
|
A D | core_mmu_lpae.c | 1019 unsigned int idx, bool secure __unused) in core_mmu_entry_to_finer_grained()
|
/optee_os/core/arch/arm/kernel/ |
A D | arm32_sysreg.txt | 92 ATS12NSOPR c7 0 c8 4 WO Stages 1 and 2 Non-secure only PL1 read 93 ATS12NSOPW c7 0 c8 5 WO Stages 1 and 2 Non-secure only PL1 write 94 ATS12NSOUR c7 0 c8 6 WO Stages 1 and 2 Non-secure only unprivileged read 95 ATS12NSOUW c7 0 c8 7 WO Stages 1 and 2 Non-secure only unprivileged write
|
/optee_os/core/drivers/clk/ |
A D | clk-stm32mp15.c | 212 uint8_t secure; member 249 .secure = (_sec), \ 261 .secure = (_sec), \ 273 .secure = (_sec), \ 285 .secure = (_sec), \ 300 .secure = (_sec), \ 310 .secure = (_sec), \
|
/optee_os/out/arm/core/include/generated/ |
A D | arm32_sysreg.S | 481 # Stages 1 and 2 Non-secure only PL1 read 486 # Stages 1 and 2 Non-secure only PL1 write 491 # Stages 1 and 2 Non-secure only unprivileged read 496 # Stages 1 and 2 Non-secure only unprivileged write
|
/optee_os/lib/libmbedtls/mbedtls/ |
A D | README.md | 207 …d in a PSA-compliant platform to build services, such as secure boot, secure storage and secure co…
|
A D | CONTRIBUTING.md | 13 - The code should be secure, and will be reviewed from a security point of view as well.
|
A D | ChangeLog | 57 accesses (typically, an untrusted operating system attacking a secure 443 in a secure element. 521 example, an untrusted OS attacking a secure enclave) could prevent 538 information (typically an untrusted operating system attacking a secure 596 * In the experimental PSA secure element interface, change the encoding of 626 reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee, 636 attacking a secure enclave) could fully recover the ECC private key. 735 untrusted operating system attacking a secure enclave) to fully recover 3625 supports secure renegotiation
|
/optee_os/core/arch/arm/include/mm/ |
A D | core_mmu.h | 503 unsigned int idx, bool secure);
|