Home
last modified time | relevance | path

Searched refs:TEE (Results 1 – 25 of 69) sorted by relevance

123

/external/arm-trusted-firmware/docs/components/spd/
Doptee-dispatcher.rst1 OP-TEE Dispatcher
4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
6 To build and execute OP-TEE follow the instructions at
7 `OP-TEE build.git`_
13 .. _OP-TEE OS: https://github.com/OP-TEE/build
14 .. _OP-TEE build.git: https://github.com/OP-TEE/build
Dtrusty-dispatcher.rst5 Environment (TEE) on mobile devices, published and maintained by Google.
/external/cpuinfo/test/dmesg/
Dgalaxy-a8-2018.log1791 [ 1.383135] [7: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…
1792 [ 1.383316] [7: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…
1793 [ 1.383649] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…
1795 [ 1.383709] [0: tee_fastcall: 1733] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1
3504 [ 3.322667] [4: kworker/4:1: 1964] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Jul 26 2…
3505 [ 3.322689] [4: kworker/4:1: 1964] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V012…
3507 [ 3.323481] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start:
3518 [ 3.323569] [5: mcDriverDaemon: 2786] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…
3519 [ 3.324985] [5: mcDriverDaemon: 2786] Trustonic TEE: admin_open: daemon connection open, TGID 2…
3524 [ 3.432355] [2: kworker/2:1: 1963] Trustonic TEE: 601|TA SPT2 : Starting.
[all …]
Dgalaxy-s8-global.log302 [ 1.088975] [5: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…
303 [ 1.089096] [5: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…
304 [ 1.089281] [5: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…
306 [ 1.089346] [0: tee_fastcall: 1730] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1
2574 [ 2.419006] [6: kworker/6:1: 1254] Trustonic TEE: mtk|*** Trustonic TEE MTK, Build: Feb 3 2…
2575 [ 2.419018] [6: kworker/6:1: 1254] Trustonic TEE: mtk|MTK: t-base-EXYNOS64-Android-400A-V011…
2576 [ 2.421585] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start:
2587 [ 2.421655] [5: mcDriverDaemon: 3130] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…
2588 [ 2.422124] [3: mcDriverDaemon: 3130] Trustonic TEE: admin_open: daemon connection open, TGID 3…
2589 [ 2.527368] [0: kworker/0:1: 1275] Trustonic TEE: 601|TA SPT2 : Starting.
[all …]
Dgalaxy-j7-prime.log452 [ 4.564337] [6: mcDriverDaemon: 2117] [c6] Trustonic TEE: admin_open: opened by PID(2117), name…
453 [ 4.564551] [0: kworker/0:2: 1239] [c0] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33…
454 [ 4.564568] [0: kworker/0:2: 1239] [c0] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-201…
455 [ 4.565875] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start:
465 [ 4.565999] [1: mcDriverDaemon: 2117] [c1] Trustonic TEE: mobicore_start: SWd uses LPAE MMU tab…
466 [ 4.567271] [7: mcDriverDaemon: 2117] [c7] Trustonic TEE: admin_open: admin connection open, PI…
488 [ 4.678027] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 501|SEC_DRIVER_2.0_2016.03.10
489 [ 4.703853] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|drTima: starting main driver thre…
490 [ 4.703873] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: OpenSSL prema…
491 [ 4.703887] [3: kworker/3:1: 1479] [c3] Trustonic TEE: 601|SCRYPTO DRV [INFO]: Embedded …
[all …]
Dgalaxy-s7-global.log1662 [ 2.244748] [4: swapper/0: 1] Trustonic TEE: mobicore_init: MobiCore mcDrvModuleApi ver…
1663 [ 2.244769] [4: swapper/0: 1] Trustonic TEE: mobicore_probe: MobiCore t-base-EXYNOS64-A…
1664 [ 2.246013] [7: swapper/0: 1] Trustonic TEE: __mc_switch_core: <- cpu=0x00000001, activ…
1665 [ 2.246215] [0: mc_fastcall: 1638] Trustonic TEE: mc_exec_core_switch: CoreSwap ok 0 -> 1
3103 [ 3.996775] [7: mcDriverDaemon: 3090] Trustonic TEE: admin_open: opened by PID(3090), name(mcDr…
3104 [ 3.996994] [7: kworker/7:2: 3016] Trustonic TEE: *** <t MTK, Build: May 5 2016, 21:33:03 *…
3105 [ 3.997004] [7: kworker/7:2: 3016] Trustonic TEE: t-base-EXYNOS64-Android-310B-V007-20160505…
3106 [ 3.997927] [4: mcDriverDaemon: 3090] Trustonic TEE: mobicore_start:
3116 [ 3.997964] [4: mcDriverDaemon: 3090] Trustonic TEE: mobicore_start: SWd uses LPAE MMU table fo…
3117 [ 3.998302] [4: mcDriverDaemon: 3090] Trustonic TEE: admin_open: admin connection open, PID 3090
[all …]
/external/iptables/extensions/
Dlibxt_TEE.txlate1 # iptables-translate -t mangle -A PREROUTING -j TEE --gateway 192.168.0.2 --oif eth0
4 # iptables-translate -t mangle -A PREROUTING -j TEE --gateway 192.168.0.2
7 ip6tables-translate -t mangle -A PREROUTING -j TEE --gateway ab12:00a1:1112:acba::
10 ip6tables-translate -t mangle -A PREROUTING -j TEE --gateway ab12:00a1:1112:acba:: --oif eth0
Dlibxt_TEE.t2 -j TEE --gateway 1.1.1.1;=;OK
3 -j TEE ! --gateway 1.1.1.1;;FAIL
4 -j TEE;;FAIL
Dlibxt_TEE.man12 \-t mangle \-A PREROUTING \-i eth0 \-j TEE \-\-gateway 2001:db8::1
/external/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/
DREADME.md18 The secure firmware utilizes the OP-TEE implementation of the Global Platform specifications. The O…
19 …this repository but is obtained directly from the public release. The build of OP-TEE is based on a
20 native Linux build, however the following installation steps allow OP-TEE to be built under Windows…
27 See the [optee_os documentation](https://github.com/OP-TEE/optee_os/blob/master/documentation/build…
51 If you do not already have a version of the OP-TEE OS repo cloned on your machine you may run:
57 #### 5. Build OP-TEE OS for the target platform
65 Additional information on Microsoft IoT fork of OP-TEE OS can be found [here](https://github.com/ms…
/external/arm-trusted-firmware/docs/
Dglobal_substitutions.txt29 .. |OP-TEE| replace:: :term:`OP-TEE`
54 .. |TEE| replace:: :term:`TEE`
Dglossary.rst101 OP-TEE
102 Open Portable Trusted Execution Environment. An example of a :term:`TEE`
181 TEE
/external/arm-trusted-firmware/docs/plat/
Dti-k3.rst11 R5(U-Boot) --> TF-A BL31 --> BL32(OP-TEE) --> TF-A BL31 --> BL33(U-Boot) --> Linux
32 OP-TEE:
50 make ARCH=arm CROSS_COMPILE=aarch64-linux-gnu- ATF=<path> TEE=<path>
Dstm32mp1.rst89 or if Op-TEE is used:
91 ROM code -> BL2 (compiled with BL2_AT_EL3) -> OP-TEE -> BL33 (U-Boot)
114 To build TF-A with OP-TEE support for all bootable devices:
141 OP-TEE artifacts go into separate partitions as follows:
Dhikey.rst17 - OP-TEE
18 `link <https://github.com/OP-TEE/optee_os>`__
41 git clone https://github.com/OP-TEE/optee_os
Dhikey960.rst17 - OP-TEE:
18 `link <https://github.com/OP-TEE/optee_os>`__
38 git clone https://github.com/OP-TEE/optee_os
Dwarp7.rst12 BootROM --> TF-A BL2 --> BL32(OP-TEE) --> BL33(U-Boot) --> Linux
14 In the WaRP7 port we encapsulate OP-TEE, DTB and U-Boot into a FIP. This FIP is
36 OP-TEE
39 https://github.com/OP-TEE/optee_os.git
Dallwinner.rst42 One can boot Trusted OS(OP-TEE OS, bl32 image) along side bl31 image on Allwinner A64.
/external/llvm-project/llvm/lib/Target/ARM/Utils/
DARMBaseInfo.cpp35 return ChooseMask(PredBlockMask::TET, PredBlockMask::TEE); in expandPredBlockMask()
42 case PredBlockMask::TEE: in expandPredBlockMask()
/external/arm-trusted-firmware/docs/components/measured_boot/
Devent_log.rst22 - tpm_event_log_sm_addr [fvp_nt_fw_config.dts with OP-TEE]
26 Note. Currently OP-TEE does not support reading DTBs from Secure memory
/external/arm-trusted-firmware/bl32/optee/
Doptee.mk15 $(info Trusted Firmware-A built for OP-TEE payload support)
/external/guice/extensions/grapher/src/com/google/inject/grapher/graphviz/
DArrowType.java40 TEE("tee"), enumConstant
/external/arm-trusted-firmware/docs/about/
Dfeatures.rst49 - SPDs for the `OP-TEE Secure OS`_, `NVIDIA Trusted Little Kernel`_
123 .. _OP-TEE Secure OS: https://github.com/OP-TEE/optee_os
/external/guice/core/test/com/google/inject/
DTypeConversionTest.java73 TEE, enumConstant
126 assertEquals(Bar.TEE, foo.enumField); in testConstantInjection()
161 assertEquals(Bar.TEE, foo.enumField); in testConstantInjectionWithExplicitBindingsRequired()
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Target/ARM/Utils/
DARMBaseInfo.h101 TEE = 10, // 0b1010 enumerator

123