/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/ |
H A D | trusted_services.py | 18 @OEHasPackage(['ts-demo']) 21 self.run_test_tool('ts-demo') 23 @OEHasPackage(['ts-uefi-test']) 26 self.run_test_tool('uefi-test') 28 @OEHasPackage(['ts-psa-crypto-api-test']) 31 self.run_test_tool('psa-crypto-api-test') 33 @OEHasPackage(['ts-psa-its-api-test']) 36 self.run_test_tool('psa-its-api-test') 38 @OEHasPackage(['ts-psa-ps-api-test']) 41 self.run_test_tool('psa-ps-api-test') [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/ |
H A D | packagegroup-ts-tests.bb | 7 COMPATIBLE_HOST = "aarch64.*-linux" 9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" 11 PACKAGES = "${PN} ${PN}-psa" 14 ts-demo \ 15 ts-service-test \ 16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \ 17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \ 20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs" 21 RDEPENDS:${PN}-psa = "\ 22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \ [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-os-ts.inc | 6 # TS SPs UUIDs definitions 7 require recipes-security/trusted-services/ts-uuid.inc 16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 17 ' ts-sp-its', '' , d)}" 18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 23 ' ts-sp-storage', '' , d)}" 24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 27 # Crypto SP. 28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \ [all …]
|
/openbmc/openbmc/meta-arm/ci/ |
H A D | qemuarm64-secureboot-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/meta-openembedded.yml 11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i… 12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures 13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 14 # Include TS demo/test tools into image 15 IMAGE_INSTALL:append = " packagegroup-ts-tests" 16 # Include TS PSA Arch tests into image 17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
|
H A D | fvp-base-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/fvp-base.yml 7 - ci/meta-openembedded.yml 8 - ci/testimage.yml 15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test" 17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu" 18 # Include TS demo/test tools into image 19 IMAGE_INSTALL:append = " packagegroup-ts-tests" 20 # Include TS PSA Arch tests into image [all …]
|
/openbmc/openbmc/meta-arm/documentation/ |
H A D | trusted-services.md | 1 # The Trusted Services: framework for developing root-of-trust services 3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli… 4 in `meta-arm/recipes-security/trusted-services` 8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions. 10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES. 12 ### How to include TS SPs 14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES 18 | ----------------- | --------------- | 19 | Attestation | ts-attesation | 20 | Crypto | ts-crypto | [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0019-Align-PSA-Crypto-with-TF-Mv2.1.patch | 4 Subject: [PATCH] Align PSA Crypto with TF-Mv2.1 6 Update following files using the TF-Mv2.1 release (0c4c99b) commit. 9 This is derived from TF-M's tfm_crypto_defs.h file. The crypto function 10 ID definitions were reworked. This change had to be done on the TS 15 tfm_crypto_pack_iovec struct changed in TF-M so the 16 psa_ipc_crypto_pack_iovec struct had to be updated in TS to 21 psa_key_attributes_s struct in TF-M. (psa_crypto.c) 23 Signed-off-by: Bence Balogh <bence.balogh@arm.com> 24 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31179/1] 25 --- [all …]
|
H A D | 0005-Fix-psa-api-crypto-test-no-243.patch | 4 Subject: [PATCH 5/8] Fix psa-api-crypto-test no 243 7 PSA-API tests's `psa-api-crypto-test` number 243 as it is 8 required for Corstone-1000. 10 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31177/1] 11 Signed-off-by: Emekcan Aras <emekcan.aras@arm.com> 12 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com> 13 --- 17 diff --git a/platform/providers/arm/corstone1000/platform.cmake b/platform/providers/arm/corstone10… 19 --- a/platform/providers/arm/corstone1000/platform.cmake 21 @@ -14,6 +14,7 @@ target_compile_definitions(${TGT} PRIVATE [all …]
|
H A D | 0002-Fix-in-AEAD-for-psa-arch-test-254.patch | 4 Subject: [PATCH 2/8] Fix in AEAD for psa-arch test 254 6 PSA crypto test 254 fails at checkpoint 6. 7 Fix output arguments in various crypto AEAD functions 8 to match crypto service implementation in TF-M. AEAD API's 9 in TF-M start expecting output size as an argument. 11 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31176] 12 Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com> 13 Signed-off-by: Satish Kumar <satish.kumar01@arm.com> 14 Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org> 15 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com> [all …]
|
H A D | 0013-Fix-error-handling-of-variable-index-loading.patch | 12 Signed-off-by: Gabor Toth <gabor.toth2@arm.com> 13 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/28300] 14 --- 15 .../backend/uefi_variable_store.c | 28 ++++++++++++++----- 16 1 file changed, 21 insertions(+), 7 deletions(-) 18 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 20 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 22 @@ -27,7 +27,7 @@ 23 #include "service/crypto/client/psa/crypto_client.h" 26 -static void load_variable_index(struct uefi_variable_store *context); [all …]
|
H A D | 0014-Provide-crypto-api-to-create-uefi-priv-var-fingerpri.patch | 4 Subject: [PATCH] Provide crypto api to create uefi priv var fingerprint 5 MIME-Version: 1.0 6 Content-Type: text/plain; charset=UTF-8 7 Content-Transfer-Encoding: 8bit 9 Add new call to the crypto backend to calculate a hash of the common 11 of the top-level issuer certificate. 13 Signed-off-by: Gabor Toth <gabor.toth2@arm.com> 14 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/27953] 15 --- 16 .../client/caller/packed-c/crypto_caller.h | 1 + [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | ts-psa-crypto-api-test_git.bb | 1 DESCRIPTION = "Crypto PSA certification tests (psa-arch-test)" 3 TS_ENV = "arm-linux" 5 require ts-psa-api-test-common_${PV}.inc 7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/crypto/${TS_ENV}" 9 PSA_TEST = "psa-crypto-api-test"
|
H A D | ts-sp-crypto_git.bb | 1 DESCRIPTION = "Trusted Services crypto service provider" 3 require ts-sp-common.inc 8 DEPENDS += "python3-protobuf-native python3-jsonschema-native python3-jinja2-native" 10 OECMAKE_SOURCEPATH="${S}/deployments/crypto/config/${TS_SP_CRYPTO_CONFIG}-${TS_ENV}"
|
H A D | trusted-services-src.inc | 3 LICENSE = "Apache-2.0 & BSD-3-Clause & BSD-2-Clause & Zlib" 5 …t://git.trustedfirmware.org/TS/trusted-services.git;protocol=https;branch=main;name=trusted-servic… 11 file://0001-Allow-configuring-flash-image-files-compile-time.patch \ 15 SRCREV_trusted-services = "602be607198ea784bc5ab1c0c9d3ac4e2c67f1d9" 18 S = "${WORKDIR}/git/trusted-services" 31 # Nanopb, tag "nanopb-0.4.7" plus some further fixes 51 SRCREV_FORMAT = "trusted-services_dtc_mbedtls_nanopb_qcbor_tcose_cpputest" 66 # Fine tune MbedTLS configuration for crypto only operation. 67 sh -c "cd ${WORKDIR}/git/mbedtls; python3 scripts/config.py crypto" 70 # Paths to dependencies required by some TS SPs/tools [all …]
|
/openbmc/openbmc/meta-arm/kas/ |
H A D | corstone1000-image-configuration.yml | 18 INITRAMFS_IMAGE:firmware ?= "corstone1000-recovery-image" 19 IMAGE_FSTYPES:firmware:pn-corstone1000-recovery-image = "${INITRAMFS_FSTYPES}" 23 INIT_MANAGER:firmware = "mdev-busybox" 24 VIRTUAL-RUNTIME_init_manager:firmware = "busybox" 27 PACKAGE_EXCLUDE:firmware += "kernel-image-*" 30 PACKAGECONFIG:remove:firmware:pn-kmod = "openssl" 34 RRECOMMENDS:${KERNEL_PACKAGE_NAME}-base = "" 37 CORE_IMAGE_EXTRA_INSTALL += "optee-client" 39 # TS PSA API tests commands for crypto, its, ps and iat 40 CORE_IMAGE_EXTRA_INSTALL += "packagegroup-ts-tests-psa" [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-core/musl/ |
H A D | musl_%.bbappend | 2 …b.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'file://0001-Revert-ldso-fix-non-functional-fix-…
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ |
H A D | ts-psa-api-test.inc | 1 FILESEXTRAPATHS:prepend:corstone1000 := "${THISDIR}/corstone1000/psa-apitest:" 3 include ts-arm-platforms.inc 6 file://0001-corstone1000-port-crypto-config.patch;patchdir=../psatest \ 7 file://0002-corstone1000-Disable-obsolete-algorithms.patch;patchdir=../psatest \ 8 file://0003-corstone1000-Disable-SHA512-384.patch;patchdir=../psatest \
|
/openbmc/openbmc/meta-security/meta-parsec/recipes-parsec/parsec-service/ |
H A D | parsec-service_1.4.1.bb | 3 LICENSE = "Apache-2.0" 6 inherit cargo pkgconfig cargo-update-recipe-crates 8 DEPENDS += "clang-native" 10 SRC_URI += "crate://crates.io/parsec-service/${PV} \ 13 file://parsec-tmpfiles.conf \ 14 file://0002-Fix-unnecessary-qualifications-error.patch \ 16 SRC_URI[parsec-service-1.4.1.sha256sum] = "06ad906fb13d6844ad676d4203a1096ae4efc87fe1abcea0481c507d… 20 PACKAGECONFIG ??= "PKCS11 MBED-CRYPTO" 22 PACKAGECONFIG:append = " ${@bb.utils.contains('BBFILE_COLLECTIONS', 'tpm-layer', '${have_TPM}', '',… 24 …ACKAGECONFIG[ALL] = "all-providers cryptoki/generate-bindings tss-esapi/generate-bindings,,tpm2-ts… [all …]
|
/openbmc/qemu/bsd-user/ |
H A D | main.c | 4 * Copyright (c) 2003-2008 Fabrice Bellard 5 * Copyright (c) 2013-14 Stacey Son 25 #include "qemu/help-texts.h" 28 #include "qemu-version.h" 33 #include "qemu/config-file.h" 34 #include "qemu/error-report.h" 39 #include "exec/exec-all.h" 40 #include "user/guest-base.h" 47 #include "crypto/init.h" 48 #include "qemu/guest-random.h" [all …]
|
/openbmc/qemu/backends/ |
H A D | cryptodev.c | 2 * QEMU Crypto Device Implementation 28 #include "qapi/qapi-commands-cryptodev.h" 29 #include "qapi/qapi-types-stats.h" 31 #include "qemu/config-file.h" 32 #include "qemu/error-report.h" 33 #include "qemu/main-loop.h" 35 #include "hw/virtio/virtio-crypto.h" 37 #define SYM_ENCRYPT_OPS_STR "sym-encrypt-ops" 38 #define SYM_DECRYPT_OPS_STR "sym-decrypt-ops" 39 #define SYM_ENCRYPT_BYTES_STR "sym-encrypt-bytes" [all …]
|
/openbmc/qemu/include/sysemu/ |
H A D | cryptodev.h | 2 * QEMU Crypto Device Implementation 29 #include "qapi/qapi-types-cryptodev.h" 35 * for different cryptodev backends, which provides crypto 40 #define TYPE_CRYPTODEV_BACKEND "cryptodev-backend" 72 /* corresponding with virtio crypto spec */ 96 /* corresponding with virtio crypto spec */ 247 /* Maximum size of each crypto request's content */ 273 /* Tag the cryptodev backend is used by virtio-crypto or not */ 279 ThrottleState ts; member 286 be->sym_stat->op##_bytes += (bytes); \ [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | padlock-aes.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Support for VIA PadLock hardware crypto engine. 11 #include <crypto/algapi.h> 12 #include <crypto/aes.h> 13 #include <crypto/internal/skcipher.h> 14 #include <crypto/padlock.h> 116 return -EINVAL; in aes_set_key() 123 ctx->D = ctx->E; in aes_set_key() 125 ctx->E[0] = le32_to_cpu(key[0]); in aes_set_key() 126 ctx->E[1] = le32_to_cpu(key[1]); in aes_set_key() [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | change-log.rst | 2 # Copyright (c) 2022-2024, Arm Limited. 4 # SPDX-License-Identifier: MIT 11 fixes in each release of Corstone-1000 software stack. 21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat… 22 - Upgrade to metadata version 2 in TF-M. 23 - Increase the ITS and PS memory size in Secure Flash for TF-M. 24 - SW components upgrades. 25 - Bug fixes. 27 Corstone-1000 components versions 30 +-------------------------------------------+-----------------------------------------------------+ [all …]
|
/openbmc/openbmc/meta-security/meta-parsec/ |
H A D | README.md | 1 meta-parsec layer 11 URI: git://git.openembedded.org/meta-openembedded 14 URI git://git.yoctoproject.org/meta-security 17 URI https://github.com/kraj/meta-clang.git 20 Adding the meta-parsec layer to your build 26 location of the meta-parsec layer to bblayers.conf, along with any 31 /path/to/yocto/meta-yocto \ 32 /path/to/yocto/meta-yocto-bsp \ 33 /path/to/meta-openembedded/meta-oe \ 34 /path/to/meta-openembedded/meta-python \ [all …]
|
/openbmc/qemu/linux-user/ |
H A D | main.c | 4 * Copyright (c) 2003-2008 Fabrice Bellard 21 #include "qemu/help-texts.h" 24 #include "qemu-version.h" 32 #include "user-internals.h" 35 #include "qemu/config-file.h" 37 #include "qemu/error-report.h" 41 #include "user/guest-base.h" 42 #include "exec/exec-all.h" 48 #include "qemu/guest-random.h" 52 #include "cpu_loop-common.h" [all …]
|