Searched refs:trusted (Results 1 – 25 of 41) sorted by relevance
12
70 struct key *trusted);75 struct key *trusted);
1 The trusted boot framework on Marvell Armada 38x6 1. Overview of the trusted boot15 1. Overview of the trusted boot18 The Armada's trusted boot framework enables the SoC to cryptographically verify88 trusted boot (also known as "security header")93 debugging of devices employing the trusted boot204 trusted boot framework, several new options were added to faciliate215 BOX_ID - The BoxID to be used for trusted debugging (a integer219 JTAG_DELAY - The JTAG delay to be used for trusted debugging (a223 in the image (that is, whether to use the trusted debug[all …]
31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git38 > cd arm-trusted-firmware57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
9 - Build the ARM trusted firmware binary21 $ git clone https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git22 $ cd trusted-firmware-a
9 - Build the ARM trusted firmware binary
179 - For **trusted** boot mode : **stm32mp15_trusted_defconfig**188 a) trusted boot on ev1::194 b) trusted with OP-TEE boot on dk2::355 for trusted boot mode: ::575 $> dfu-util -d 0483:5720 -a 3 -D tf-a-stm32mp157c-ev1-trusted.stm32576 $> dfu-util -d 0483:5720 -a 4 -D tf-a-stm32mp157c-ev1-trusted.stm32577 $> dfu-util -d 0483:5720 -a 5 -D u-boot-stm32mp157c-ev1-trusted.img585 $> dfu-util -d 0483:5720 -a 10 -D tf-a-stm32mp157c-ev1-trusted.stm32586 $> dfu-util -d 0483:5720 -a 11 -D tf-a-stm32mp157c-ev1-trusted.stm32587 $> dfu-util -d 0483:5720 -a 12 -D u-boot-stm32mp157c-ev1-trusted.img[all …]
90 git clone https://github.com/ARM-software/arm-trusted-firmware.git91 cd arm-trusted-firmware102 export BL31=/path/to/arm-trusted-firmware/to/bl31.elf113 export BL31=/path/to/arm-trusted-firmware/to/bl31.elf119 export BL31=/path/to/arm-trusted-firmware/to/bl31.elf
96 label = "failsafe trusted firmware";123 label = "trusted firmware";
54 os = "arm-trusted-firmware";
41 os = "arm-trusted-firmware";
144 os = "arm-trusted-firmware";
6 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git7 > cd arm-trusted-firmware
34 > git clone https://github.com/ARM-software/arm-trusted-firmware.git42 > cd arm-trusted-firmware94 > cp arm-trusted-firmware/build/rk3399/release/bl31.elf rkbin/rk33
26 > git clone https://github.com/ARM-software/arm-trusted-firmware52 > cd ~/hikey960/src/arm-trusted-firmware63 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl1.bin64 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl2.bin65 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/fip.bin74 https://github.com/ARM-software/arm-trusted-firmware/blob/master/docs/plat/hikey960.rst
30 Enables support for RPC test trusted application emulation, which
62 u32 trusted; member560 u32 trusted = hdr->trusted; in check_image_header() local563 if (trusted == 1) { in check_image_header()
35 > git clone https://github.com/ARM-software/arm-trusted-firmware60 > cd ~/hikey/src/arm-trusted-firmware77 > ln -sf ~/hikey/src/arm-trusted-firmware/build/hikey/debug/bl1.bin78 > ln -sf ~/hikey/src/arm-trusted-firmware/build/hikey/debug/bl2.bin88 https://github.com/ARM-software/arm-trusted-firmware/blob/master/docs/plat/hikey.rst
8 Environment (TEE). A TEE is a trusted OS running in some secure
32 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git38 > cd arm-trusted-firmware
13 Get ATF from: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git
16 …$ git clone https://git.linaro.org/landing-teams/working/mbl/arm-trusted-firmware.git -b linaro-im…
289 bool "Build image for trusted boot"293 Build an image that employs the ARMADA SoC's trusted boot framework
33 U-boot has a *strong* dependency with the l-loader and the arm trusted firmware59 - https://github.com/Linaro/poplar-arm-trusted-firmware.git91 > git clone https://github.com/Linaro/poplar-arm-trusted-firmware.git atf
Completed in 28 milliseconds