/linux-5.10/Documentation/devicetree/bindings/crypto/ |
D | inside-secure-safexcel.txt | 1 Inside Secure SafeXcel cryptographic engine 4 - compatible: Should be "inside-secure,safexcel-eip197b", 5 "inside-secure,safexcel-eip197d" or 6 "inside-secure,safexcel-eip97ies". 7 - reg: Base physical address of the engine and length of memory mapped region. 8 - interrupts: Interrupt numbers for the rings and engine. 9 - interrupt-names: Should be "ring0", "ring1", "ring2", "ring3", "eip", "mem". 12 - clocks: Reference to the crypto engine clocks, the second clock is 14 - clock-names: mandatory if there is a second clock, in this case the 21 - "inside-secure,safexcel-eip197" is equivalent to [all …]
|
/linux-5.10/Documentation/devicetree/bindings/rng/ |
D | omap_rng.txt | 1 OMAP SoC and Inside-Secure HWRNG Module 5 - compatible : Should contain entries for this and backward compatible 7 - "ti,omap2-rng" for OMAP2. 8 - "ti,omap4-rng" for OMAP4, OMAP5 and AM33XX. 9 - "inside-secure,safexcel-eip76" for SoCs with EIP76 IP block 11 - ti,hwmods: Name of the hwmod associated with the RNG module 12 - reg : Offset and length of the register set for the module 13 - interrupts : the interrupt number for the RNG module. 14 Used for "ti,omap4-rng" and "inside-secure,safexcel-eip76" 15 - clocks: the trng clock source. Only mandatory for the [all …]
|
/linux-5.10/drivers/nfc/microread/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 6 This module contains the main code for Inside Secure microread 11 tristate "Inside Secure Microread device support (I2C)" 16 Inside microread chipsets. Select this if your platform is using 23 tristate "Inside Secure Microread device support (MEI)" 28 Inside microread chipsets. Select this if your microread chipset
|
D | mei.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * HCI based Driver for Inside Secure microread NFC Chip 32 return -ENOMEM; in microread_mei_probe() 37 &phy->hdev); in microread_mei_probe() 51 microread_remove(phy->hdev); in microread_mei_remove()
|
/linux-5.10/drivers/s390/crypto/ |
D | zcrypt_ccamisc.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */ 41 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */ 57 /* inside view of a variable length symmetric cipher AES key token */ 81 /* AES-128 512 640 */ 82 /* AES-192 576 640 */ 83 /* AES-256 640 640 */ 97 /* inside view of an CCA secure ECC private key */ 107 u8 htype; /* hash method, 0x02 for SHA-256 */ 133 * Simple check if the token is a valid CCA secure AES data key [all …]
|
D | zcrypt_ep11misc.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 27 /* inside view of an EP11 secure key blob */ 55 return (kb->version == EP11_STRUCT_MAGIC); in is_ep11_keyblob() 114 * Generate (random) EP11 AES secure key. 120 * Generate EP11 AES secure key with given clear key value. 127 * - apqn is online and is in fact an EP11 apqn 128 * - if cardnr is not FFFF only apqns with this cardnr 129 * - if domain is not FFFF only apqns with this domainnr 130 * - if minhwtype > 0 only apqns with hwtype >= minhwtype 131 * - if minapi > 0 only apqns with API_ord_nr >= minapi [all …]
|
D | zcrypt_ccamisc.c | 1 // SPDX-License-Identifier: GPL-2.0+ 49 * Simple check if the token is a valid CCA secure AES data key 60 if (t->type != TOKTYPE_CCA_INTERNAL) { in cca_check_secaeskeytoken() 63 __func__, (int) t->type, TOKTYPE_CCA_INTERNAL); in cca_check_secaeskeytoken() 64 return -EINVAL; in cca_check_secaeskeytoken() 66 if (t->version != TOKVER_CCA_AES) { in cca_check_secaeskeytoken() 69 __func__, (int) t->version, TOKVER_CCA_AES); in cca_check_secaeskeytoken() 70 return -EINVAL; in cca_check_secaeskeytoken() 72 if (keybitsize > 0 && t->bitsize != keybitsize) { in cca_check_secaeskeytoken() 75 __func__, (int) t->bitsize, keybitsize); in cca_check_secaeskeytoken() [all …]
|
/linux-5.10/drivers/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 118 Please note that creation of protected keys from secure keys 142 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2). 152 SHA256 secure hash standard (DFIPS 180-2). 162 SHA512 secure hash standard. 172 SHA3_256 secure hash standard. [all …]
|
D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_ALLWINNER) += allwinner/ 3 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o 5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o 6 obj-$(CONFIG_CRYPTO_DEV_ATMEL_I2C) += atmel-i2c.o 7 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o 8 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA204A) += atmel-sha204a.o 9 obj-$(CONFIG_CRYPTO_DEV_CAVIUM_ZIP) += cavium/ 10 obj-$(CONFIG_CRYPTO_DEV_CCP) += ccp/ [all …]
|
/linux-5.10/Documentation/arm/ |
D | tcm.rst | 2 ARM TCM (Tightly-Coupled Memory) handling in Linux 7 Some ARM SoCs have a so-called TCM (Tightly-Coupled Memory). 8 This is usually just a few (4-64) KiB of RAM inside the ARM 11 Due to being embedded inside the CPU, the TCM has a 12 Harvard-architecture, so there is an ITCM (instruction TCM) 24 determine if ITCM (bits 1-0) and/or DTCM (bit 17-16) is present 47 be able to lock and hide one of the banks for use by the secure 52 - FIQ and other interrupt handlers that need deterministic 55 - Idle loops where all external RAM is set to self-refresh 56 retention mode, so only on-chip RAM is accessible by [all …]
|
/linux-5.10/Documentation/x86/ |
D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are 19 memory. Private memory is encrypted with the guest-specific key, while shared 37 as private. All the DMA operations inside the guest must be performed on shared 39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware 78 - Supported: 81 - Enabled: 84 - Active: 87 kernel is non-zero).
|
/linux-5.10/arch/s390/include/uapi/asm/ |
D | pkey.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 78 /* Struct to hold a CCA AES secure key blob */ 80 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ 110 * Generate CCA AES secure key. 116 struct pkey_seckey seckey; /* out: the secure key blob */ 121 * Construct CCA AES secure key from clear key value 128 struct pkey_seckey seckey; /* out: the secure key blob */ 133 * Fabricate AES protected key from a CCA AES secure key 138 struct pkey_seckey seckey; /* in: the secure key blob */ [all …]
|
/linux-5.10/arch/x86/kvm/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 14 operating systems inside virtual machines (guests). 22 tristate "Kernel-based Virtual Machine (KVM) support" 64 bool "Compile KVM with -Werror" 73 Add -Werror to the build flags for KVM. 85 will be called kvm-intel. 91 Provides support for KVM on AMD processors equipped with the AMD-V 95 will be called kvm-amd. 99 bool "AMD Secure Encrypted Virtualization (SEV) support"
|
/linux-5.10/Documentation/virt/kvm/ |
D | amd-memory-encryption.rst | 2 Secure Encrypted Virtualization (SEV) 8 Secure Encrypted Virtualization (SEV) is a feature found on AMD processors. 10 SEV is an extension to the AMD-V architecture which supports running 44 Hence, the ASID for the SEV-enabled guests must be from 1 to a maximum value 51 Secure Processor (AMD-SP). Firmware running inside the AMD-SP provides a secure 54 information, see the SEV Key Management spec [api-spec]_ 60 likely return ``EFAULT``). If non-NULL, the argument to KVM_MEMORY_ENCRYPT_OP 77 are defined in ``<linux/psp-dev.h>``. 83 --------------- 88 Returns: 0 on success, -negative on error [all …]
|
/linux-5.10/arch/riscv/include/asm/ |
D | thread_info.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 29 * - this struct should fit entirely inside of one cache line 30 * - if the members of this struct changes, the assembly constants 31 * in asm-offsets.c must be updated accordingly 32 * - thread_info is included in task_struct at an offset of 0. This means that 63 * - these are process state flags that various assembly files may need to 65 * - pending work-to-be-done flags are in lowest half-word 66 * - other flags in upper half-word(s) 76 #define TIF_SECCOMP 8 /* syscall secure computing */
|
/linux-5.10/arch/s390/include/asm/ |
D | thread_info.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 29 (THREAD_SIZE - STACK_FRAME_OVERHEAD - sizeof(struct pt_regs)) 33 * - this struct should fit entirely inside of one cache line 34 * - this struct shares the supervisor stack pages 35 * - if the contents of this structure are changed, the assembly constants must also be changed 64 #define TIF_UPROBE 3 /* breakpointed or single-stepping */ 81 #define TIF_SECCOMP 26 /* secure computing */
|
/linux-5.10/arch/nios2/include/asm/ |
D | thread_info.h | 2 * NiosII low-level thread information 35 * - this struct should fit entirely inside of one cache line 36 * - this struct shares the supervisor stack pages 37 * - if the contents of this structure are changed, the assembly constants 46 0-0x7FFFFFFF for user-thead 47 0-0xFFFFFFFF for kernel-thread 71 return (struct thread_info *)(sp & ~(THREAD_SIZE - 1)); in current_thread_info() 77 * - these are process state flags that various assembly files may need to 79 * - pending work-to-be-done flags are in LSW 80 * - other flags in MSW [all …]
|
/linux-5.10/arch/xtensa/include/asm/ |
D | thread_info.h | 2 * include/asm-xtensa/thread_info.h 8 * Copyright (C) 2001 - 2005 Tensilica Inc. 25 * - this struct should fit entirely inside of one cache line 26 * - this struct shares the supervisor stack pages 27 * - if the contents of this structure are changed, the assembly constants 51 unsigned long status; /* thread-synchronous flags */ 107 * - these are process state flags that various assembly files may need to access 119 #define TIF_SECCOMP 10 /* secure computing */ 134 #define THREAD_SIZE_ORDER (KERNEL_STACK_SHIFT - PAGE_SHIFT)
|
/linux-5.10/arch/microblaze/include/asm/ |
D | thread_info.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 22 * - this struct should fit entirely inside of one cache line 23 * - this struct shares the supervisor stack pages 24 * - if the contents of this structure are changed, the assembly constants 38 /* non-volatile registers */ 66 unsigned long status; /* thread-synchronous flags */ 91 return (struct thread_info *)(sp & ~(THREAD_SIZE-1)); in current_thread_info() 99 * - these are process state flags that various assembly files may 101 * - pending work-to-be-done flags are in LSW 102 * - other flags in MSW [all …]
|
/linux-5.10/arch/powerpc/platforms/pseries/ |
D | smp.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 43 #include <asm/code-patching.h> 49 * The Primary thread of each non-boot processor was started from the OF client 58 int qcss_tok = rtas_token("query-cpu-stopped-state"); in smp_query_cpu_stopped() 62 "Firmware doesn't support query-cpu-stopped-state\n"); in smp_query_cpu_stopped() 69 "RTAS query-cpu-stopped-state failed: %i\n", status); in smp_query_cpu_stopped() 77 * smp_startup_cpu() - start the given cpu 84 * 0 - failure 85 * 1 - success 107 /* Fixup atomic count: it exited inside IRQ handler. */ in smp_startup_cpu() [all …]
|
/linux-5.10/security/integrity/ima/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 26 an aggregate integrity value over this list inside the 71 limited to 255 characters. The 'ima-ng' measurement list 78 bool "ima-ng (default)" 80 bool "ima-sig" 87 default "ima-ng" if IMA_NG_TEMPLATE 88 default "ima-sig" if IMA_SIG_TEMPLATE 163 <http://linux-ima.sourceforge.net> 173 based on run time secure boot flags. 221 Kernel module signatures can only be verified by IMA-appraisal, [all …]
|
/linux-5.10/arch/powerpc/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 17 # On Book3S 64, the default virtual address space for 64-bit processes 20 # between bottom-up and top-down allocations for applications that 23 default 29 if PPC_BOOK3S_64 && PPC_64K_PAGES # 29 = 45 (32T) - 16 (64K) 24 default 33 if PPC_BOOK3S_64 # 33 = 45 (32T) - 12 (4K) 26 # On all other 64-bit platforms (currently only Book3E), the virtual 29 default 32 if 64BIT # 32 = 44 (16T) - 12 (4K) 31 # For 32-bit, use the compat values, as they're the same. 36 default 14 if 64BIT && PPC_64K_PAGES # 14 = 30 (1GB) - 16 (64K) 37 default 18 if 64BIT # 18 = 30 (1GB) - 12 (4K) [all …]
|
/linux-5.10/drivers/crypto/inside-secure/ |
D | safexcel.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Antoine Tenart <antoine.tenart@free-electrons.com> 10 #include <linux/dma-mapping.h> 45 writel(0, priv->base + EIP197_FLUE_IFC_LUT(i)); in eip197_trc_cache_setupvirt() 51 for (i = 0; i < priv->config.rings; i++) { in eip197_trc_cache_setupvirt() 52 writel(0, priv->base + EIP197_FLUE_CACHEBASE_LO(i)); in eip197_trc_cache_setupvirt() 53 writel(0, priv->base + EIP197_FLUE_CACHEBASE_HI(i)); in eip197_trc_cache_setupvirt() 55 priv->base + EIP197_FLUE_CONFIG(i)); in eip197_trc_cache_setupvirt() 57 writel(0, priv->base + EIP197_FLUE_OFFSETS); in eip197_trc_cache_setupvirt() 58 writel(0, priv->base + EIP197_FLUE_ARC4_OFFSET); in eip197_trc_cache_setupvirt() [all …]
|
/linux-5.10/arch/arm/mach-omap2/ |
D | pm34xx.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2006-2008 Nokia Corporation 13 * Richard Woodruff <r-woodruff2@ti.com> 29 #include <linux/omap-gpmc.h> 42 #include "cm-regbits-34xx.h" 43 #include "prm-regbits-34xx.h" 47 #include "omap-secure.h" 101 * FIXME: This function should be called before entering off-mode after 102 * OMAP3 secure services have been accessed. Currently it is only called 103 * once during boot sequence, but this works as we are not using secure [all …]
|
/linux-5.10/drivers/char/hw_random/ |
D | omap-rng.c | 2 * omap-rng.c - RNG driver for TI OMAP CPU family 140 * struct omap_rng_pdata - RNG IP block-specific data 166 return __raw_readl(priv->base + priv->pdata->regs[reg]); in omap_rng_read() 172 __raw_writel(val, priv->base + priv->pdata->regs[reg]); in omap_rng_write() 182 priv = (struct omap_rng_dev *)rng->priv; in omap_rng_do_read() 184 if (max < priv->pdata->data_size) in omap_rng_do_read() 188 present = priv->pdata->data_present(priv); in omap_rng_do_read() 197 memcpy_fromio(data, priv->base + priv->pdata->regs[RNG_OUTPUT_0_REG], in omap_rng_do_read() 198 priv->pdata->data_size); in omap_rng_do_read() 200 if (priv->pdata->regs[RNG_INTACK_REG]) in omap_rng_do_read() [all …]
|