Home
last modified time | relevance | path

Searched +full:ts +full:- +full:storage (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-os-ts.inc6 # TS SPs UUIDs definitions
7 require recipes-security/trusted-services/ts-uuid.inc
16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
17 ' ts-sp-its', '' , d)}"
18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
21 # Storage SP
22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
23 ' ts-sp-storage', '' , d)}"
24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \
[all …]
/openbmc/openbmc/meta-arm/ci/
H A Dqemuarm64-secureboot-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/meta-openembedded.yml
11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i…
12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures
13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
14 # Include TS demo/test tools into image
15 IMAGE_INSTALL:append = " packagegroup-ts-tests"
16 # Include TS PSA Arch tests into image
17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
H A Dfvp-base-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/fvp-base.yml
7 - ci/meta-openembedded.yml
8 - ci/testimage.yml
15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test"
17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu ts-logging"
18 MACHINE_FEATURES:append = " arm-branch-protection"
20 # Include TS demo/test tools into image
21 IMAGE_INSTALL:append = " packagegroup-ts-tests"
[all …]
/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/
H A Dtrusted_services.py18 @OEHasPackage(['ts-demo'])
21 self.run_test_tool('ts-demo')
23 @OEHasPackage(['ts-uefi-test'])
26 self.run_test_tool('uefi-test')
28 @OEHasPackage(['ts-psa-crypto-api-test'])
31 self.run_test_tool('psa-crypto-api-test')
33 @OEHasPackage(['ts-psa-its-api-test'])
36 self.run_test_tool('psa-its-api-test')
38 @OEHasPackage(['ts-psa-ps-api-test'])
41 self.run_test_tool('psa-ps-api-test')
[all …]
/openbmc/openbmc/meta-arm/documentation/
H A Dtrusted-services.md1 # The Trusted Services: framework for developing root-of-trust services
3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli…
4 in `meta-arm/recipes-security/trusted-services`
8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions.
10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES.
12 ### How to include TS SPs
14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES
18 | ----------------- | --------------- |
19 | Attestation | ts-attesation |
20 | Crypto | ts-crypto |
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/
H A Dpackagegroup-ts-tests.bb7 COMPATIBLE_HOST = "aarch64.*-linux"
9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot"
11 PACKAGES = "${PN} ${PN}-psa"
14 ts-demo \
15 ts-service-test \
16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \
17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \
20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs"
21 RDEPENDS:${PN}-psa = "\
22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-sp-storage_git.bb1 DESCRIPTION = "Trusted Services secure storage service provider"
3 require ts-sp-common.inc
8 OECMAKE_SOURCEPATH = "${S}/deployments/protected-storage/config/${TS_SP_PS_CONFIG}-${TS_ENV}"
H A Dts-sp-its_git.bb1 DESCRIPTION = "Trusted Services internal secure storage service provider"
3 require ts-sp-common.inc
8 OECMAKE_SOURCEPATH = "${S}/deployments/internal-trusted-storage/config/${TS_SP_ITS_CONFIG}-${TS_ENV…
H A Dts-sp-block-storage_git.bb1 # SPDX-FileCopyrightText: <text>Copyright 2023 Arm Limited and/or its
2 # affiliates <open-source-office@arm.com></text>
4 # SPDX-License-Identifier: MIT
6 DESCRIPTION = "Trusted Services block storage service provider"
8 require ts-sp-common.inc
13 OECMAKE_SOURCEPATH = "${S}/deployments/block-storage/config/${TS_SP_BLOCK_STORAGE_CONFIG}-${TS_ENV}"
H A Dts-psa-ps-api-test_git.bb1 DESCRIPTION = "Protected Storage PSA certification tests (psa-arch-test) for Trusted Services"
3 TS_ENV = "arm-linux"
5 require ts-psa-api-test-common_${PV}.inc
7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/protected_storage/${TS_ENV}"
9 PSA_TEST = "psa-ps-api-test"
H A Dts-psa-its-api-test_git.bb1 DESCRIPTION = "Internal Trusted Storage PSA certification tests (psa-arch-test) for Trusted Service…
3 TS_ENV = "arm-linux"
5 require ts-psa-api-test-common_${PV}.inc
7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/internal_trusted_storage/${TS_ENV}"
9 PSA_TEST = "psa-its-api-test"
/openbmc/telemetry/src/
H A Dtrigger_manager.cpp11 #include <phosphor-logging/log.hpp>
24 managerIface = objServer->add_unique_interface( in TriggerManager()
52 triggerFactory->getLabeledSensorsInfo(yield, sensors); in TriggerManager()
90 namespace ts = utils::tstring; in verifyThresholdParams()
99 if (discreteParam.at_label<ts::UserId>().length() > in verifyThresholdParams()
132 triggers, [](const auto& trigger) { return trigger->getId(); }); in addTrigger()
139 triggers.emplace_back(triggerFactory->make( in addTrigger()
149 triggerStorage->list(); in loadFromPersistent()
153 std::optional<nlohmann::json> data = triggerStorage->load(path); in loadFromPersistent()
158 throw std::runtime_error("Empty storage"); in loadFromPersistent()
[all …]
H A Dreport_manager.cpp10 #include <phosphor-logging/log.hpp>
29 reportManagerIface = objServer->add_unique_interface( in ReportManager()
36 [](const auto&) -> uint64_t { return minInterval.count(); }); in ReportManager()
40 [](const auto&) -> std::vector<std::string> { in ReportManager()
106 namespace ts = utils::tstring; in verifyAddReport()
133 utils::toUnderlying(item.at_label<ts::OperationType>())); in verifyAddReport()
145 reportFactory->convertMetricParams(yield, metricParams); in addReport()
161 reports, [](const auto& report) { return report->getId(); }); in addReport()
170 reportFactory->make(id, name, reportingType, reportActions, interval, in addReport()
179 reportStorage->list(); in loadFromPersistent()
[all …]
/openbmc/qemu/tcg/
H A Dtcg.c30 #include "qemu/error-report.h"
32 #include "qemu/host-utils.h"
33 #include "qemu/qemu-print.h"
38 #include "exec/translation-block.h"
39 #include "exec/tlb-common.h"
41 #include "tcg/tcg-op-common.h"
56 #include "tcg/tcg-ldst.h"
57 #include "tcg/tcg-temp-internal.h"
58 #include "tcg-internal.h"
60 #include "tcg-has.h"
[all …]
/openbmc/u-boot/arch/powerpc/include/asm/
H A Dmmu.h28 unsigned long w:1; /* Write-thru cache mode */
47 unsigned long n:1; /* No-execute */
90 unsigned long w:1; /* Write-thru cache */
109 * Simulated two-level MMU. This structure is used by the kernel
133 pte **pmap; /* Two-level page-map structure */
170 #define BATL_PP_01 0x00000001 /* Read-only */
171 #define BATL_PP_10 0x00000002 /* Read-write */
218 (u32)((((1ull << __ilog2_u64((u64)x)) / (128 * 1024)) - 1) * 4)
238 * During software tablewalk, the registers used perform mask/shift-add
275 #define MI_GUARDED 0x00000010 /* Guarded storage */
[all …]
/openbmc/sdbusplus/include/sdbusplus/async/stdexec/__detail/
H A D__variant.hpp
/openbmc/qemu/block/
H A Dqapi.c4 * Copyright (c) 2003-2008 Fabrice Bellard
29 #include "block/dirty-bitmap.h"
30 #include "block/throttle-groups.h"
31 #include "block/write-threshold.h"
33 #include "qapi/qapi-commands-block-core.h"
34 #include "qapi/qobject-output-visitor.h"
35 #include "qapi/qapi-visit-block-core.h"
41 #include "qemu/qemu-print.h"
42 #include "system/block-backend.h"
57 if (!bs->drv) { in bdrv_block_device_info()
[all …]
/openbmc/u-boot/arch/powerpc/cpu/mpc85xx/
H A Dstart.S1 /* SPDX-License-Identifier: GPL-2.0+ */
3 * Copyright 2004, 2007-2012 Freescale Semiconductor, Inc.
7 /* U-Boot Startup Code for Motorola 85xx PowerPC based Embedded Boards
10 * last 4K page(0xfffff000-0xffffffff) in flash/rom.
14 #include <asm-offsets.h>
62 * e500 Startup -- after reset only the last 4KB of the effective
129 * Disable L2 cache here so that u-boot can enable it later
170 mtspr L1CSR0,r0 /* invalidate d-cache */
171 mtspr L1CSR1,r0 /* invalidate i-cache */
177 .macro create_tlb1_entry esel ts tsize epn wimg rpn perm phy_high scratch
[all …]
/openbmc/qemu/include/tcg/
H A Dtcg.h33 #include "tcg/tcg-mo.h"
34 #include "tcg-target-reg-bits.h"
35 #include "tcg-target.h"
36 #include "tcg/tcg-cond.h"
37 #include "tcg/insn-start-words.h"
38 #include "tcg/debug-assert.h"
70 #include "tcg/tcg-opc.h"
175 i -= TCG_TYPE_V64 - 1; in tcg_type_size()
185 in tcg/README. Target CPU front-end code uses these types to deal
194 to the CPU front-end code.
[all …]
/openbmc/qemu/include/standard-headers/drm/
H A Ddrm_fourcc.h38 * further describe the buffer's format - for example tiling or compression.
41 * ----------------
55 * vendor-namespaced, and as such the relationship between a fourcc code and a
57 * may preserve meaning - such as number of planes - from the fourcc code,
63 * a modifier: a buffer may match a 64-pixel aligned modifier and a 32-pixel
75 * - Kernel and user-space drivers: for drivers it's important that modifiers
79 * - Higher-level programs interfacing with KMS/GBM/EGL/Vulkan/etc: these users
92 * -----------------------
97 * upstream in-kernel or open source userspace user does not apply.
221 * IEEE 754-2008 binary16 half-precision float
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Duser-guide.rst2 # Copyright (c) 2022-2024, Arm Limited.
4 # SPDX-License-Identifier: MIT
11 ------
12 The Corstone-1000 software stack uses the `Yocto Project <https://www.yoctoproject.org/>`__ to build
13 a tiny Linux distribution suitable for the Corstone-1000 platform (kernel and initramfs filesystem …
14 The Yocto Project relies on the `BitBake <https://docs.yoctoproject.org/bitbake.html#bitbake-docume…
19 -------------
26 - Git 1.8.3.1 or greater.
27 - Python 3.8.0 or greater.
28 - GNU Tar 1.28 or greater.
[all …]
H A Dchange-log.rst2 # Copyright (c) 2022-2024, Arm Limited.
4 # SPDX-License-Identifier: MIT
11 fixes in each release of Corstone-1000 software stack.
21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat…
22 - Upgrade to metadata version 2 in TF-M.
23 - Increase the ITS and PS memory size in Secure Flash for TF-M.
24 - SW components upgrades.
25 - Bug fixes.
27 Corstone-1000 components versions
30 +-------------------------------------------+-----------------------------------------------------+
[all …]
/openbmc/phosphor-certificate-manager/test/
H A Dcerts_manager_test.cpp11 #include <systemd/sd-event.h>
105 std::string cmd = "openssl req -x509 -sha256 -newkey rsa:2048 "; in createNewCertificate()
106 cmd += "-keyout cert.pem -out cert.pem -days 365000 -nodes"; in createNewCertificate()
107 cmd += " -subj /O=openbmc-project.xyz/CN=localhost"; in createNewCertificate()
130 ASSERT_EQ(std::system("mkdir -p demoCA"), 0); in createNeverExpiredRootCertificate()
131 ASSERT_EQ(std::system("mkdir -p demoCA/private/"), 0); in createNeverExpiredRootCertificate()
132 ASSERT_EQ(std::system("mkdir -p demoCA/newcerts/"), 0); in createNeverExpiredRootCertificate()
137 "openssl req -x509 -sha256 -newkey rsa:2048 -keyout " in createNeverExpiredRootCertificate()
138 "demoCA/private/cakey.pem -out demoCA/cacert.pem -nodes " in createNeverExpiredRootCertificate()
139 "-subj /O=openbmc-project.xyz/C=US/ST=CA/CN=localhost-ca"), in createNeverExpiredRootCertificate()
[all …]
/openbmc/qemu/linux-user/
H A Delfload.c1 /* This is the Linux kernel elf-loading code, ported into user space */
10 #include "user/tswap-target.h"
11 #include "user/page-protection.h"
12 #include "exec/page-protection.h"
13 #include "exec/mmap-lock.h"
14 #include "exec/translation-block.h"
16 #include "user/guest-base.h"
17 #include "user-internals.h"
18 #include "signal-common.h"
20 #include "user-mmap.h"
[all …]
/openbmc/qemu/qga/
H A Dcommands-win32.c2 * QEMU Guest Agent win32-specific command implementations
11 * See the COPYING file in the top-level directory.
32 #include "guest-agent-core.h"
33 #include "vss-win32.h"
34 #include "qga-qapi-commands.h"
38 #include "qemu/host-utils.h"
40 #include "commands-common.h"
62 #pragma GCC diagnostic ignored "-Wredundant-decls"
82 (365 * (1970 - 1601) + \
83 (1970 - 1601) / 4 - 3))
[all …]

12