Home
last modified time | relevance | path

Searched full:trusted (Results 1 – 25 of 102) sorted by relevance

12345

/Documentation/devicetree/bindings/arm/firmware/
Dtlm,trusted-foundations.yaml4 $id: http://devicetree.org/schemas/arm/firmware/tlm,trusted-foundations.yaml#
7 title: Trusted Foundations
10 Boards that use the Trusted Foundations secure monitor can signal its
18 const: trusted-foundations
21 const: tlm,trusted-foundations
25 description: major version number of Trusted Foundations firmware
29 description: minor version number of Trusted Foundations firmware
41 trusted-foundations {
42 compatible = "tlm,trusted-foundations";
Dlinaro,optee-tz.yaml13 OP-TEE is a piece of software using hardware features to provide a Trusted
37 The method of calling the OP-TEE Trusted OS depending on smc or hvc
/Documentation/security/keys/
Dtrusted-encrypted.rst2 Trusted and Encrypted Keys
5 Trusted and Encrypted Keys are two new key types added to the existing kernel
8 stores, and loads only encrypted blobs. Trusted Keys require the availability
17 A trust source provides the source of security for Trusted Keys. This
23 consumer of the Trusted Keys to determine if the trust source is sufficiently
28 (1) TPM (Trusted Platform Module: hardware device)
33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone)
62 environment verified via Secure/Trusted boot process.
80 verifications match. A loaded Trusted Key can be updated with new
88 Relies on Secure/Trusted boot process for platform integrity. It can
[all …]
Dindex.rst11 trusted-encrypted
Decryptfs.rst35 time after the unsealing of a 'trusted' key in order to perform the mount in a
49 key-type:= 'trusted' | 'user'
/Documentation/tee/
Dts-tee.rst4 TS-TEE (Trusted Services project)
7 This driver provides access to secure services implemented by Trusted Services.
9 Trusted Services [1] is a TrustedFirmware.org project that provides a framework
15 provides the low level communication for this driver. On top of that the Trusted
17 implementation is provided at [6], which is part of the Trusted Services client
20 All Trusted Services (TS) SPs have the same FF-A UUID; it identifies the TS RPC
26 The generic TEE design is to share memory at once with the Trusted OS, which can
27 then be reused to communicate with multiple applications running on the Trusted
36 Overview of a system with Trusted Services components::
41 | Client | | Trusted |
[all …]
Damd-tee.rst4 AMD-TEE (AMD's Trusted Execution Environment)
12 software-based Trusted Execution Environment (TEE) designed to enable
13 third-party Trusted Applications. This feature is currently enabled only for
25 | Client | | | Trusted |
37 | Client | | subsystem | driver | | Trusted |
53 The TEE commands supported by AMD-TEE Trusted OS are:
55 * TEE_CMD_ID_LOAD_TA - loads a Trusted Application (TA) binary into
64 AMD-TEE Trusted OS is the firmware running on AMD Secure Processor.
Dtee.rst4 TEE (Trusted Execution Environment)
12 A TEE is a trusted OS running in some secure environment, for example,
Dop-tee.rst4 OP-TEE (Open Portable Trusted Execution Environment)
39 | Client | | Trusted |
50 | API | \/ | subsys | driver | | Trusted OS |
66 OP-TEE provides a pseudo Trusted Application: drivers/tee/optee/device.c in
68 application to retrieve a list of Trusted Applications which can be registered
107 corresponding option in Trusted Firmware for Arm. The Trusted Firmware for Arm
/Documentation/devicetree/bindings/tpm/
Dmicrosoft,ftpm.yaml7 title: Microsoft firmware-based Trusted Platform Module (fTPM)
15 offer trusted computing features in their CPUs aimed at displacing dedicated
16 trusted hardware. Unfortunately, these CPU architectures raise serious
17 challenges to building trusted systems because they omit providing secure
22 those of dedicated trusted hardware.
Dtcg,tpm-tis-mmio.yaml7 title: MMIO-accessed Trusted Platform Module conforming to TCG TIS specification
13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
Dtcg,tpm_tis-spi.yaml7 title: SPI-attached Trusted Platform Module conforming to TCG TIS specification
13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
Dtcg,tpm-tis-i2c.yaml7 title: I²C-attached Trusted Platform Module conforming to TCG TIS specification
13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
/Documentation/userspace-api/
Dtee.rst5 TEE (Trusted Execution Environment) Userspace API
22 - TEE_IOC_OPEN_SESSION opens a new session to a Trusted Application.
24 - TEE_IOC_INVOKE invokes a function in a Trusted Application.
28 - TEE_IOC_CLOSE_SESSION closes a session to a Trusted Application.
/Documentation/driver-api/
Dtee.rst4 TEE (Trusted Execution Environment) driver API
7 Kernel provides a TEE bus infrastructure where a Trusted Application is
27 Then TEE client driver can talk to a matched Trusted Application using APIs
33 Suppose a TEE client driver needs to communicate with a Trusted Application
/Documentation/admin-guide/hw-vuln/
Dcore-scheduling.rst21 user-designated trusted group can share a core. This increase in core sharing
101 trusted (same cookie) at any point in time. Kernel threads are assumed trusted.
110 the idle task is selected. Idle task is globally trusted.
126 priority task is not trusted with respect to the core wide highest priority
127 task. If a sibling does not have a trusted task to run, it will be forced idle
157 and are considered system-wide trusted. The forced-idling of siblings running
166 Core scheduling tries to guarantee that only trusted tasks run concurrently on a
168 concurrently or kernel could be running concurrently with a task not trusted by
173 Core scheduling selects only trusted tasks to run together. IPI is used to notify
207 allowing system processes (trusted tasks) to share a core.
/Documentation/ABI/testing/
Devm13 trusted/encrypted key stored in the Kernel Key
89 as part of the trusted boot. For more information on
90 creating and loading existing trusted/encrypted keys,
92 Documentation/security/keys/trusted-encrypted.rst. Both
Dsysfs-class-bdi71 be trusted to play fair.
84 which cannot be trusted to play fair.
112 trusted to play fair, or a nbd device.
Dsysfs-bus-optee-devices7 matches Trusted Application (TA) driver and corresponding TA in secure OS. Drivers
/Documentation/filesystems/
Doverlayfs.rst103 creation of trusted.* and/or user.* extended attributes, and must provide
149 as a zero-size regular file with the xattr "trusted.overlay.whiteout".
155 A directory is made opaque by setting the xattr "trusted.overlay.opaque"
161 "trusted.overlay.whiteout", should be additionally marked by setting the xattr
162 "trusted.overlay.opaque" to "x" on the merge directory itself.
163 This is needed to avoid the overhead of checking the "trusted.overlay.whiteout"
211 copied up (but not the contents). Then the "trusted.overlay.redirect"
251 upper directory is stored in a "trusted.overlay.upper" extended attribute
371 "trusted.overlayfs.metacopy" xattr which indicates that the upper file
374 the "trusted.overlayfs.metacopy" xattr is removed from the upper file.
[all …]
/Documentation/arch/x86/
Dintel_txt.rst5 Intel's technology for safer computing, Intel(R) Trusted Execution
7 provide the building blocks for creating trusted platforms.
35 3_David-Grawrock_The-Front-Door-of-Trusted-Computing.pdf
43 Trusted Boot Project Overview
46 Trusted Boot (tboot) is an open source, pre-kernel/VMM module that
211 Security top-level menu and is called "Enable Intel(R) Trusted
220 system and can also be found on the Trusted Boot site. It is an
/Documentation/admin-guide/device-mapper/
Dverity.rst64 and the salt. This hash should be trusted as there is no other authenticity
138 trusted keyring by default, or the secondary trusted keyring if
140 trusted keyring includes by default the builtin trusted keyring, and it can
142 already in the secondary trusted keyring.
/Documentation/security/tpm/
Dindex.rst2 Trusted Platform Module documentation
/Documentation/devicetree/bindings/firmware/
Dmediatek,geniezone.yaml14 providing an isolated execution environment for mTEE (MediaTek Trusted
/Documentation/crypto/
Dasymmetric-keys.rst338 1) Restrict using the kernel builtin trusted keyring
343 The kernel builtin trusted keyring will be searched for the signing key.
344 If the builtin trusted keyring is not configured, all links will be
348 2) Restrict using the kernel builtin and secondary trusted keyrings
353 The kernel builtin and secondary trusted keyrings will be searched for the
354 signing key. If the secondary trusted keyring is not configured, this

12345