/qemu/tests/functional/ |
H A D | test_aarch64_sbsaref.py | 27 - Trusted Firmware v2.12.0 78 # https://github.com/ARM-software/arm-trusted-firmware/blob/v2.8.0/\ 79 # docs/design/trusted-board-boot.rst#trusted-board-boot-sequence 83 # AP Trusted ROM 84 wait_for_console_pattern(self, "Booting Trusted Firmware") 88 # Trusted Boot Firmware 95 # Non-trusted Firmware
|
H A D | test_aarch64_aspeed_ast2700.py | 38 wait_for_console_pattern(self, 'Jumping to BL31 (Trusted Firmware-A)')
|
/qemu/hw/ide/ |
H A D | ide-internal.h | 114 /* TRUSTED NON DATA 0x5B */ 115 /* TRUSTED RECEIVE 0x5C */ 116 /* TRUSTED RECEIVE DMA 0x5D */ 117 /* TRUSTED SEND 0x5E */ 118 /* TRUSTED SEND DMA 0x5F */
|
/qemu/hw/core/ |
H A D | uboot_image.h | 51 IH_OS_ARM_TRUSTED_FIRMWARE, /* ARM Trusted Firmware */ 52 IH_OS_TEE, /* Trusted Execution Environment */ 174 IH_TYPE_TEE, /* Trusted Execution Environment OS Image */
|
/qemu/docs/system/i386/ |
H A D | tdx.rst | 1 Intel Trusted Domain eXtension (TDX) 4 Intel Trusted Domain eXtensions (TDX) refers to an Intel technology that extends
|
H A D | kvm-pv.rst | 84 Tell the guest that guest visible TSC value can be fully trusted for kvmclock
|
/qemu/hw/gpio/ |
H A D | gpio_pwr.c | 11 * Trusted Firmware.).
|
/qemu/docs/system/arm/ |
H A D | xlnx-versal-virt.rst | 98 Boot PetaLinux 2019.2 via ARM Trusted Firmware (2018.3 because the 2019.2 152 Boot Linux as Dom0 on Xen via ARM Trusted Firmware and U-Boot:
|
H A D | virt.rst | 197 ``on``. You will want to disable it if your trusted boot chain
|
/qemu/docs/specs/ |
H A D | ppc-spapr-uv-hcalls.rst | 33 wrapped/encrypted using the public key of a trusted system which has the private
|
H A D | tpm.rst | 14 following the Trusted Computing Group's specification "TCG PC Client 39 QEMU also implements a TPM CRB interface following the Trusted 99 The TCPA and TPM2 ACPI tables follow the Trusted Computing Group
|
/qemu/docs/devel/ |
H A D | maintainers.rst | 79 are also trusted to make a positive contribution to the project and
|
H A D | secure-coding-practices.rst | 41 trusted and may be invalid. Inputs must be checked before using them in a way
|
/qemu/linux-headers/linux/ |
H A D | psci.h | 96 /* PSCI v0.2 multicore support in Trusted OS returned by MIGRATE_INFO_TYPE */
|
/qemu/docs/ |
H A D | bypass-iommu.txt | 68 iommu isolation. So it would be necessary to only bypass iommu for trusted
|
/qemu/qapi/ |
H A D | tpm.json | 6 # = TPM (trusted platform module) devices
|
H A D | dump.json | 64 # corrupted memory, which cannot be trusted
|
/qemu/target/arm/ |
H A D | kvm-consts.h | 93 /* No Trusted OS migration to worry about when offlining CPUs */
|
/qemu/target/arm/tcg/ |
H A D | psci.c | 96 ret = QEMU_PSCI_0_2_RET_TOS_MIGRATION_NOT_REQUIRED; /* No trusted OS */ in arm_handle_psci_call()
|
/qemu/scripts/coverity-scan/ |
H A D | model.c | 60 /* Replay data is considered trusted. */
|
/qemu/docs/system/ |
H A D | security.rst | 172 QEMU and as such should only be made accessible to a trusted management
|
/qemu/pc-bios/ |
HD | u-boot.e500 | __of_translate_address fdt_fixup_memory_banks set_tlb do_bootvx_fdt dev_get_parent_priv device_remove mpc85xx_pci_dm_probe tsec_mdio_probe phy_device_create fs_devread dev_get_uclass_priv virtio_uclass_child_pre_probe virtio_has_feature virtio_pci_set_status virtio_pci_get_config virtio_has_feature dev_get_priv virtqueue_add virtio_pci_set_features ... |
HD | hppa-firmware.img | ... %c. %s t. TPM Configuration The Trusted Platform Module (TPM) is a hardware device in ... |
/qemu/crypto/ |
H A D | tlssession.c | 320 reason = "The certificate is not trusted"; in qcrypto_tls_session_check_certificate()
|
/qemu/docs/system/ppc/ |
H A D | pseries.rst | 112 * ``tpm-spapr``: a Trusted Platform Module (TPM).
|