Home
last modified time | relevance | path

Searched +full:ts +full:- +full:crypto (Results 1 – 25 of 91) sorted by relevance

1234

/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/
H A Dtrusted_services.py18 @OEHasPackage(['ts-demo'])
21 self.run_test_tool('ts-demo')
23 @OEHasPackage(['ts-uefi-test'])
26 self.run_test_tool('uefi-test')
28 @OEHasPackage(['ts-psa-crypto-api-test'])
31 self.run_test_tool('psa-crypto-api-test')
33 @OEHasPackage(['ts-psa-its-api-test'])
36 self.run_test_tool('psa-its-api-test')
38 @OEHasPackage(['ts-psa-ps-api-test'])
41 self.run_test_tool('psa-ps-api-test')
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/
H A Dpackagegroup-ts-tests.bb7 COMPATIBLE_HOST = "aarch64.*-linux"
9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot"
11 PACKAGES = "${PN} ${PN}-psa"
14 ts-demo \
15 ts-service-test \
16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \
17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \
20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs"
21 RDEPENDS:${PN}-psa = "\
22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-os-ts.inc6 # TS SPs UUIDs definitions
7 require recipes-security/trusted-services/ts-uuid.inc
16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
17 ' ts-sp-its', '' , d)}"
18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
23 ' ts-sp-storage', '' , d)}"
24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
27 # Crypto SP.
28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \
[all …]
/openbmc/openbmc/meta-arm/ci/
H A Dqemuarm64-secureboot-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/meta-openembedded.yml
11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i…
12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures
13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
14 # Include TS demo/test tools into image
15 IMAGE_INSTALL:append = " packagegroup-ts-tests"
16 # Include TS PSA Arch tests into image
17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
H A Dfvp-base-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/fvp-base.yml
7 - ci/meta-openembedded.yml
8 - ci/testimage.yml
15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test"
17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu"
18 # Include TS demo/test tools into image
19 IMAGE_INSTALL:append = " packagegroup-ts-tests"
20 # Include TS PSA Arch tests into image
[all …]
/openbmc/openbmc/meta-arm/documentation/
H A Dtrusted-services.md1 # The Trusted Services: framework for developing root-of-trust services
3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli…
4 in `meta-arm/recipes-security/trusted-services`
8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions.
10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES.
12 ### How to include TS SPs
14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES
18 | ----------------- | --------------- |
19 | Attestation | ts-attesation |
20 | Crypto | ts-crypto |
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0019-Align-PSA-Crypto-with-TF-Mv2.1.patch4 Subject: [PATCH] Align PSA Crypto with TF-Mv2.1
6 Update following files using the TF-Mv2.1 release (0c4c99b) commit.
9 This is derived from TF-M's tfm_crypto_defs.h file. The crypto function
10 ID definitions were reworked. This change had to be done on the TS
15 tfm_crypto_pack_iovec struct changed in TF-M so the
16 psa_ipc_crypto_pack_iovec struct had to be updated in TS to
21 psa_key_attributes_s struct in TF-M. (psa_crypto.c)
23 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
24 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31179/1]
25 ---
[all …]
H A D0005-Fix-psa-api-crypto-test-no-243.patch4 Subject: [PATCH 5/8] Fix psa-api-crypto-test no 243
7 PSA-API tests's `psa-api-crypto-test` number 243 as it is
8 required for Corstone-1000.
10 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31177/1]
11 Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
12 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
13 ---
17 diff --git a/platform/providers/arm/corstone1000/platform.cmake b/platform/providers/arm/corstone10…
19 --- a/platform/providers/arm/corstone1000/platform.cmake
21 @@ -14,6 +14,7 @@ target_compile_definitions(${TGT} PRIVATE
[all …]
H A D0002-Fix-in-AEAD-for-psa-arch-test-254.patch4 Subject: [PATCH 2/8] Fix in AEAD for psa-arch test 254
6 PSA crypto test 254 fails at checkpoint 6.
7 Fix output arguments in various crypto AEAD functions
8 to match crypto service implementation in TF-M. AEAD API's
9 in TF-M start expecting output size as an argument.
11 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/31176]
12 Signed-off-by: Emekcan Aras <Emekcan.Aras@arm.com>
13 Signed-off-by: Satish Kumar <satish.kumar01@arm.com>
14 Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
15 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
[all …]
H A D0013-Fix-error-handling-of-variable-index-loading.patch12 Signed-off-by: Gabor Toth <gabor.toth2@arm.com>
13 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/28300]
14 ---
15 .../backend/uefi_variable_store.c | 28 ++++++++++++++-----
16 1 file changed, 21 insertions(+), 7 deletions(-)
18 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
20 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
22 @@ -27,7 +27,7 @@
23 #include "service/crypto/client/psa/crypto_client.h"
26 -static void load_variable_index(struct uefi_variable_store *context);
[all …]
H A D0014-Provide-crypto-api-to-create-uefi-priv-var-fingerpri.patch4 Subject: [PATCH] Provide crypto api to create uefi priv var fingerprint
5 MIME-Version: 1.0
6 Content-Type: text/plain; charset=UTF-8
7 Content-Transfer-Encoding: 8bit
9 Add new call to the crypto backend to calculate a hash of the common
11 of the top-level issuer certificate.
13 Signed-off-by: Gabor Toth <gabor.toth2@arm.com>
14 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/27953]
15 ---
16 .../client/caller/packed-c/crypto_caller.h | 1 +
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-psa-crypto-api-test_git.bb1 DESCRIPTION = "Crypto PSA certification tests (psa-arch-test)"
3 TS_ENV = "arm-linux"
5 require ts-psa-api-test-common_${PV}.inc
7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/crypto/${TS_ENV}"
9 PSA_TEST = "psa-crypto-api-test"
H A Dts-sp-crypto_git.bb1 DESCRIPTION = "Trusted Services crypto service provider"
3 require ts-sp-common.inc
8 DEPENDS += "python3-protobuf-native python3-jsonschema-native python3-jinja2-native"
10 OECMAKE_SOURCEPATH="${S}/deployments/crypto/config/${TS_SP_CRYPTO_CONFIG}-${TS_ENV}"
H A Dtrusted-services-src.inc3 LICENSE = "Apache-2.0 & BSD-3-Clause & BSD-2-Clause & Zlib"
5 …t://git.trustedfirmware.org/TS/trusted-services.git;protocol=https;branch=main;name=trusted-servic…
11 file://0001-Allow-configuring-flash-image-files-compile-time.patch \
15 SRCREV_trusted-services = "602be607198ea784bc5ab1c0c9d3ac4e2c67f1d9"
18 S = "${WORKDIR}/git/trusted-services"
31 # Nanopb, tag "nanopb-0.4.7" plus some further fixes
51 SRCREV_FORMAT = "trusted-services_dtc_mbedtls_nanopb_qcbor_tcose_cpputest"
66 # Fine tune MbedTLS configuration for crypto only operation.
67 sh -c "cd ${WORKDIR}/git/mbedtls; python3 scripts/config.py crypto"
70 # Paths to dependencies required by some TS SPs/tools
[all …]
/openbmc/openbmc/meta-arm/kas/
H A Dcorstone1000-image-configuration.yml18 INITRAMFS_IMAGE:firmware ?= "corstone1000-recovery-image"
19 IMAGE_FSTYPES:firmware:pn-corstone1000-recovery-image = "${INITRAMFS_FSTYPES}"
23 INIT_MANAGER:firmware = "mdev-busybox"
24 VIRTUAL-RUNTIME_init_manager:firmware = "busybox"
27 PACKAGE_EXCLUDE:firmware += "kernel-image-*"
30 PACKAGECONFIG:remove:firmware:pn-kmod = "openssl"
34 RRECOMMENDS:${KERNEL_PACKAGE_NAME}-base = ""
37 CORE_IMAGE_EXTRA_INSTALL += "optee-client"
39 # TS PSA API tests commands for crypto, its, ps and iat
40 CORE_IMAGE_EXTRA_INSTALL += "packagegroup-ts-tests-psa"
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-core/musl/
H A Dmusl_%.bbappend2 …b.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'file://0001-Revert-ldso-fix-non-functional-fix-
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/
H A Dts-psa-api-test.inc1 FILESEXTRAPATHS:prepend:corstone1000 := "${THISDIR}/corstone1000/psa-apitest:"
3 include ts-arm-platforms.inc
6 file://0001-corstone1000-port-crypto-config.patch;patchdir=../psatest \
7 file://0002-corstone1000-Disable-obsolete-algorithms.patch;patchdir=../psatest \
8 file://0003-corstone1000-Disable-SHA512-384.patch;patchdir=../psatest \
/openbmc/openbmc/meta-security/meta-parsec/recipes-parsec/parsec-service/
H A Dparsec-service_1.4.1.bb3 LICENSE = "Apache-2.0"
6 inherit cargo pkgconfig cargo-update-recipe-crates
8 DEPENDS += "clang-native"
10 SRC_URI += "crate://crates.io/parsec-service/${PV} \
13 file://parsec-tmpfiles.conf \
14 file://0002-Fix-unnecessary-qualifications-error.patch \
16 SRC_URI[parsec-service-1.4.1.sha256sum] = "06ad906fb13d6844ad676d4203a1096ae4efc87fe1abcea0481c507d…
20 PACKAGECONFIG ??= "PKCS11 MBED-CRYPTO"
22 PACKAGECONFIG:append = " ${@bb.utils.contains('BBFILE_COLLECTIONS', 'tpm-layer', '${have_TPM}', '',…
24 …ACKAGECONFIG[ALL] = "all-providers cryptoki/generate-bindings tss-esapi/generate-bindings,,tpm2-ts…
[all …]
/openbmc/qemu/bsd-user/
H A Dmain.c4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2013-14 Stacey Son
25 #include "qemu/help-texts.h"
28 #include "qemu-version.h"
33 #include "qemu/config-file.h"
34 #include "qemu/error-report.h"
39 #include "exec/exec-all.h"
40 #include "user/guest-base.h"
47 #include "crypto/init.h"
48 #include "qemu/guest-random.h"
[all …]
/openbmc/qemu/backends/
H A Dcryptodev.c2 * QEMU Crypto Device Implementation
28 #include "qapi/qapi-commands-cryptodev.h"
29 #include "qapi/qapi-types-stats.h"
31 #include "qemu/config-file.h"
32 #include "qemu/error-report.h"
33 #include "qemu/main-loop.h"
35 #include "hw/virtio/virtio-crypto.h"
37 #define SYM_ENCRYPT_OPS_STR "sym-encrypt-ops"
38 #define SYM_DECRYPT_OPS_STR "sym-decrypt-ops"
39 #define SYM_ENCRYPT_BYTES_STR "sym-encrypt-bytes"
[all …]
/openbmc/qemu/include/sysemu/
H A Dcryptodev.h2 * QEMU Crypto Device Implementation
29 #include "qapi/qapi-types-cryptodev.h"
35 * for different cryptodev backends, which provides crypto
40 #define TYPE_CRYPTODEV_BACKEND "cryptodev-backend"
72 /* corresponding with virtio crypto spec */
96 /* corresponding with virtio crypto spec */
247 /* Maximum size of each crypto request's content */
273 /* Tag the cryptodev backend is used by virtio-crypto or not */
279 ThrottleState ts; member
286 be->sym_stat->op##_bytes += (bytes); \
[all …]
/openbmc/linux/drivers/crypto/
H A Dpadlock-aes.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Support for VIA PadLock hardware crypto engine.
11 #include <crypto/algapi.h>
12 #include <crypto/aes.h>
13 #include <crypto/internal/skcipher.h>
14 #include <crypto/padlock.h>
116 return -EINVAL; in aes_set_key()
123 ctx->D = ctx->E; in aes_set_key()
125 ctx->E[0] = le32_to_cpu(key[0]); in aes_set_key()
126 ctx->E[1] = le32_to_cpu(key[1]); in aes_set_key()
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Dchange-log.rst2 # Copyright (c) 2022-2024, Arm Limited.
4 # SPDX-License-Identifier: MIT
11 fixes in each release of Corstone-1000 software stack.
21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat…
22 - Upgrade to metadata version 2 in TF-M.
23 - Increase the ITS and PS memory size in Secure Flash for TF-M.
24 - SW components upgrades.
25 - Bug fixes.
27 Corstone-1000 components versions
30 +-------------------------------------------+-----------------------------------------------------+
[all …]
/openbmc/openbmc/meta-security/meta-parsec/
H A DREADME.md1 meta-parsec layer
11 URI: git://git.openembedded.org/meta-openembedded
14 URI git://git.yoctoproject.org/meta-security
17 URI https://github.com/kraj/meta-clang.git
20 Adding the meta-parsec layer to your build
26 location of the meta-parsec layer to bblayers.conf, along with any
31 /path/to/yocto/meta-yocto \
32 /path/to/yocto/meta-yocto-bsp \
33 /path/to/meta-openembedded/meta-oe \
34 /path/to/meta-openembedded/meta-python \
[all …]
/openbmc/qemu/linux-user/
H A Dmain.c4 * Copyright (c) 2003-2008 Fabrice Bellard
21 #include "qemu/help-texts.h"
24 #include "qemu-version.h"
32 #include "user-internals.h"
35 #include "qemu/config-file.h"
37 #include "qemu/error-report.h"
41 #include "user/guest-base.h"
42 #include "exec/exec-all.h"
48 #include "qemu/guest-random.h"
52 #include "cpu_loop-common.h"
[all …]

1234