Home
last modified time | relevance | path

Searched +full:inside +full:- +full:secure (Results 1 – 25 of 207) sorted by relevance

123456789

/kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/
Dinside-secure-safexcel.txt1 Inside Secure SafeXcel cryptographic engine
4 - compatible: Should be "inside-secure,safexcel-eip197b",
5 "inside-secure,safexcel-eip197d" or
6 "inside-secure,safexcel-eip97ies".
7 - reg: Base physical address of the engine and length of memory mapped region.
8 - interrupts: Interrupt numbers for the rings and engine.
9 - interrupt-names: Should be "ring0", "ring1", "ring2", "ring3", "eip", "mem".
12 - clocks: Reference to the crypto engine clocks, the second clock is
14 - clock-names: mandatory if there is a second clock, in this case the
21 - "inside-secure,safexcel-eip197" is equivalent to
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/
Dinside-secure-safexcel.txt1 Inside Secure SafeXcel cryptographic engine
4 - compatible: Should be "inside-secure,safexcel-eip197b",
5 "inside-secure,safexcel-eip197d" or
6 "inside-secure,safexcel-eip97ies".
7 - reg: Base physical address of the engine and length of memory mapped region.
8 - interrupts: Interrupt numbers for the rings and engine.
9 - interrupt-names: Should be "ring0", "ring1", "ring2", "ring3", "eip", "mem".
12 - clocks: Reference to the crypto engine clocks, the second clock is
14 - clock-names: mandatory if there is a second clock, in this case the
21 - "inside-secure,safexcel-eip197" is equivalent to
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/rng/
Domap_rng.txt1 OMAP SoC and Inside-Secure HWRNG Module
5 - compatible : Should contain entries for this and backward compatible
7 - "ti,omap2-rng" for OMAP2.
8 - "ti,omap4-rng" for OMAP4, OMAP5 and AM33XX.
9 - "inside-secure,safexcel-eip76" for SoCs with EIP76 IP block
11 - ti,hwmods: Name of the hwmod associated with the RNG module
12 - reg : Offset and length of the register set for the module
13 - interrupts : the interrupt number for the RNG module.
14 Used for "ti,omap4-rng" and "inside-secure,safexcel-eip76"
15 - clocks: the trng clock source. Only mandatory for the
[all …]
/kernel/linux/linux-6.6/drivers/nfc/microread/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
6 This module contains the main code for Inside Secure microread
11 tristate "Inside Secure Microread device support (I2C)"
16 Inside microread chipsets. Select this if your platform is using
23 tristate "Inside Secure Microread device support (MEI)"
28 Inside microread chipsets. Select this if your microread chipset
Dmei.c1 // SPDX-License-Identifier: GPL-2.0
5 * HCI based Driver for Inside Secure microread NFC Chip
28 return -ENOMEM; in microread_mei_probe()
32 &phy->hdev); in microread_mei_probe()
46 microread_remove(phy->hdev); in microread_mei_remove()
/kernel/linux/linux-5.10/drivers/nfc/microread/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
6 This module contains the main code for Inside Secure microread
11 tristate "Inside Secure Microread device support (I2C)"
16 Inside microread chipsets. Select this if your platform is using
23 tristate "Inside Secure Microread device support (MEI)"
28 Inside microread chipsets. Select this if your microread chipset
Dmei.c1 // SPDX-License-Identifier: GPL-2.0
5 * HCI based Driver for Inside Secure microread NFC Chip
32 return -ENOMEM; in microread_mei_probe()
37 &phy->hdev); in microread_mei_probe()
51 microread_remove(phy->hdev); in microread_mei_remove()
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/rng/
Domap_rng.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: OMAP SoC and Inside-Secure HWRNG Module
10 - Jayesh Choudhary <j-choudhary@ti.com>
15 - ti,omap2-rng
16 - ti,omap4-rng
17 - inside-secure,safexcel-eip76
33 - description: EIP150 gateable clock
34 - description: Main gateable clock
[all …]
/kernel/linux/linux-5.10/drivers/s390/crypto/
Dzcrypt_ccamisc.h1 /* SPDX-License-Identifier: GPL-2.0+ */
17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */
41 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */
57 /* inside view of a variable length symmetric cipher AES key token */
81 /* AES-128 512 640 */
82 /* AES-192 576 640 */
83 /* AES-256 640 640 */
97 /* inside view of an CCA secure ECC private key */
107 u8 htype; /* hash method, 0x02 for SHA-256 */
133 * Simple check if the token is a valid CCA secure AES data key
[all …]
Dzcrypt_ep11misc.h1 /* SPDX-License-Identifier: GPL-2.0+ */
27 /* inside view of an EP11 secure key blob */
48 return (kb->version == EP11_STRUCT_MAGIC); in is_ep11_keyblob()
107 * Generate (random) EP11 AES secure key.
113 * Generate EP11 AES secure key with given clear key value.
120 * - apqn is online and is in fact an EP11 apqn
121 * - if cardnr is not FFFF only apqns with this cardnr
122 * - if domain is not FFFF only apqns with this domainnr
123 * - if minhwtype > 0 only apqns with hwtype >= minhwtype
124 * - if minapi > 0 only apqns with API_ord_nr >= minapi
[all …]
/kernel/linux/linux-6.6/drivers/s390/crypto/
Dzcrypt_ccamisc.h1 /* SPDX-License-Identifier: GPL-2.0+ */
17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */
41 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */
57 /* inside view of a variable length symmetric cipher AES key token */
81 /* AES-128 512 640 */
82 /* AES-192 576 640 */
83 /* AES-256 640 640 */
97 /* inside view of an CCA secure ECC private key */
107 u8 htype; /* hash method, 0x02 for SHA-256 */
133 * Simple check if the token is a valid CCA secure AES data key
[all …]
Dzcrypt_ep11misc.h1 /* SPDX-License-Identifier: GPL-2.0+ */
29 /* inside view of an EP11 secure key blob */
50 return (kb->version == EP11_STRUCT_MAGIC); in is_ep11_keyblob()
115 * Generate (random) EP11 AES secure key.
121 * Generate EP11 AES secure key with given clear key value.
129 * - apqn is online and is in fact an EP11 apqn
130 * - if cardnr is not FFFF only apqns with this cardnr
131 * - if domain is not FFFF only apqns with this domainnr
132 * - if minhwtype > 0 only apqns with hwtype >= minhwtype
133 * - if minapi > 0 only apqns with API_ord_nr >= minapi
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/arm/tegra/
Dnvidia,tegra194-cbb.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/arm/tegra/nvidia,tegra194-cbb.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Sumit Gupta <sumitg@nvidia.com>
15 multiple hierarchical sub-NOCs (Network-on-Chip) and connects various
19 by the NOCs inside the CBB. NOCs reporting errors are cluster NOCs
20 "AON-NOC, SCE-NOC, RCE-NOC, BPMP-NOC, CV-NOC" and "CBB Central NOC"
28 - For CCPLEX (CPU Complex) initiator, the driver sets ERD bit. So, the
31 - For other initiators, the ERD is disabled. So, the access issuing
[all …]
/kernel/linux/linux-6.6/drivers/crypto/inside-secure/
Dsafexcel.c1 // SPDX-License-Identifier: GPL-2.0
5 * Antoine Tenart <antoine.tenart@free-electrons.com>
10 #include <linux/dma-mapping.h>
45 writel(0, priv->base + EIP197_FLUE_IFC_LUT(i)); in eip197_trc_cache_setupvirt()
51 for (i = 0; i < priv->config.rings; i++) { in eip197_trc_cache_setupvirt()
52 writel(0, priv->base + EIP197_FLUE_CACHEBASE_LO(i)); in eip197_trc_cache_setupvirt()
53 writel(0, priv->base + EIP197_FLUE_CACHEBASE_HI(i)); in eip197_trc_cache_setupvirt()
55 priv->base + EIP197_FLUE_CONFIG(i)); in eip197_trc_cache_setupvirt()
57 writel(0, priv->base + EIP197_FLUE_OFFSETS); in eip197_trc_cache_setupvirt()
58 writel(0, priv->base + EIP197_FLUE_ARC4_OFFSET); in eip197_trc_cache_setupvirt()
[all …]
/kernel/linux/linux-6.6/arch/x86/kvm/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 operating systems inside virtual machines (guests).
22 tristate "Kernel-based Virtual Machine (KVM) support"
67 bool "Compile KVM with -Werror"
76 Add -Werror to the build flags for KVM.
88 will be called kvm-intel.
106 Provides support for KVM on AMD processors equipped with the AMD-V
110 will be called kvm-amd.
114 bool "AMD Secure Encrypted Virtualization (SEV) support"
119 with Encrypted State (SEV-ES) on AMD processors.
[all …]
/kernel/linux/linux-5.10/drivers/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
39 called padlock-aes.
53 called padlock-sha.
61 Say 'Y' here to use the AMD Geode LX processor on-board AES
65 will be called geode-aes.
118 Please note that creation of protected keys from secure keys
142 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
152 SHA256 secure hash standard (DFIPS 180-2).
162 SHA512 secure hash standard.
172 SHA3_256 secure hash standard.
[all …]
/kernel/linux/linux-6.6/drivers/crypto/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
39 called padlock-aes.
53 called padlock-sha.
61 Say 'Y' here to use the AMD Geode LX processor on-board AES
65 will be called geode-aes.
106 Please note that creation of protected keys from secure keys
131 and uses triple-DES to generate secure random numbers like the
132 ANSI X9.17 standard. User-space programs access the
133 pseudo-random-number device through the char device /dev/prandom.
149 sub-units. One set provides the Modular Arithmetic Unit,
[all …]
/kernel/linux/linux-6.6/Documentation/arch/arm/
Dtcm.rst2 ARM TCM (Tightly-Coupled Memory) handling in Linux
7 Some ARM SoCs have a so-called TCM (Tightly-Coupled Memory).
8 This is usually just a few (4-64) KiB of RAM inside the ARM
11 Due to being embedded inside the CPU, the TCM has a
12 Harvard-architecture, so there is an ITCM (instruction TCM)
24 determine if ITCM (bits 1-0) and/or DTCM (bit 17-16) is present
47 be able to lock and hide one of the banks for use by the secure
52 - FIQ and other interrupt handlers that need deterministic
55 - Idle loops where all external RAM is set to self-refresh
56 retention mode, so only on-chip RAM is accessible by
[all …]
/kernel/linux/linux-5.10/Documentation/arm/
Dtcm.rst2 ARM TCM (Tightly-Coupled Memory) handling in Linux
7 Some ARM SoCs have a so-called TCM (Tightly-Coupled Memory).
8 This is usually just a few (4-64) KiB of RAM inside the ARM
11 Due to being embedded inside the CPU, the TCM has a
12 Harvard-architecture, so there is an ITCM (instruction TCM)
24 determine if ITCM (bits 1-0) and/or DTCM (bit 17-16) is present
47 be able to lock and hide one of the banks for use by the secure
52 - FIQ and other interrupt handlers that need deterministic
55 - Idle loops where all external RAM is set to self-refresh
56 retention mode, so only on-chip RAM is accessible by
[all …]
/kernel/linux/linux-5.10/Documentation/x86/
Damd-memory-encryption.rst1 .. SPDX-License-Identifier: GPL-2.0
7 Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are
19 memory. Private memory is encrypted with the guest-specific key, while shared
37 as private. All the DMA operations inside the guest must be performed on shared
39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware
78 - Supported:
81 - Enabled:
84 - Active:
87 kernel is non-zero).
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/mfd/
Dnxp,bbnsm.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: NXP Battery-Backed Non-Secure Module
10 - Jacky Bai <ping.bai@nxp.com>
13 NXP BBNSM serves as non-volatile logic and storage for the system.
17 significant 32 bits of the real-time counter match the value in the
19 The ON/OFF logic inside the BBNSM allows for connecting directly to
26 - enum:
27 - nxp,imx93-bbnsm
[all …]
/kernel/linux/linux-5.10/arch/s390/include/uapi/asm/
Dpkey.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */
78 /* Struct to hold a CCA AES secure key blob */
80 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */
110 * Generate CCA AES secure key.
116 struct pkey_seckey seckey; /* out: the secure key blob */
121 * Construct CCA AES secure key from clear key value
128 struct pkey_seckey seckey; /* out: the secure key blob */
133 * Fabricate AES protected key from a CCA AES secure key
138 struct pkey_seckey seckey; /* in: the secure key blob */
[all …]
/kernel/linux/linux-6.6/arch/s390/include/uapi/asm/
Dpkey.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */
83 /* Struct to hold a CCA AES secure key blob */
85 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */
115 * Generate CCA AES secure key.
121 struct pkey_seckey seckey; /* out: the secure key blob */
126 * Construct CCA AES secure key from clear key value
133 struct pkey_seckey seckey; /* out: the secure key blob */
138 * Fabricate AES protected key from a CCA AES secure key
143 struct pkey_seckey seckey; /* in: the secure key blob */
[all …]
/kernel/linux/linux-5.10/arch/x86/kvm/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
14 operating systems inside virtual machines (guests).
22 tristate "Kernel-based Virtual Machine (KVM) support"
64 bool "Compile KVM with -Werror"
73 Add -Werror to the build flags for KVM.
85 will be called kvm-intel.
91 Provides support for KVM on AMD processors equipped with the AMD-V
95 will be called kvm-amd.
99 bool "AMD Secure Encrypted Virtualization (SEV) support"
/kernel/linux/linux-5.10/Documentation/virt/kvm/
Damd-memory-encryption.rst2 Secure Encrypted Virtualization (SEV)
8 Secure Encrypted Virtualization (SEV) is a feature found on AMD processors.
10 SEV is an extension to the AMD-V architecture which supports running
44 Hence, the ASID for the SEV-enabled guests must be from 1 to a maximum value
51 Secure Processor (AMD-SP). Firmware running inside the AMD-SP provides a secure
54 information, see the SEV Key Management spec [api-spec]_
60 likely return ``EFAULT``). If non-NULL, the argument to KVM_MEMORY_ENCRYPT_OP
77 are defined in ``<linux/psp-dev.h>``.
83 ---------------
88 Returns: 0 on success, -negative on error
[all …]

123456789