Home
last modified time | relevance | path

Searched +full:non +full:- +full:secure (Results 1 – 25 of 613) sorted by relevance

12345678910>>...25

/freebsd/crypto/openssl/test/
H A Dsecmemtest.c2 * Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved.
21 TEST_info("Secure memory is implemented."); in test_sec_mem()
24 /* s = non-secure 20 */ in test_sec_mem()
29 /* r = non-secure 20, s = non-secure 20 */ in test_sec_mem()
36 /* r = non-secure 20, p = secure 20, s = non-secure 20 */ in test_sec_mem()
38 /* 20 secure -> 32-byte minimum allocation unit */ in test_sec_mem()
44 /* r = non-secure 20, p = secure 20, q = non-secure 20, s = non-secure 20 */ in test_sec_mem()
50 /* r = non-secure 20, p = secure 20, q = non-secure 20, s = secure 20 */ in test_sec_mem()
52 /* 2 * 20 secure -> 64 bytes allocated */ in test_sec_mem()
57 /* 20 secure -> 32 bytes allocated */ in test_sec_mem()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/arm/
H A Dsecure.txt1 * ARM Secure world bindings
4 "Normal" and "Secure". Most devicetree consumers (including the Linux
6 world or the Secure world. However some devicetree consumers are
8 visible only in the Secure address space, only in the Normal address
10 virtual machine which boots Secure firmware and wants to tell the
13 The general principle of the naming scheme for Secure world bindings
14 is that any property that needs a different value in the Secure world
15 can be supported by prefixing the property name with "secure-". So for
16 instance "secure-foo" would override "foo". For property names with
17 a vendor prefix, the Secure variant of "vendor,foo" would be
[all …]
H A Dpmu.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Mark Rutland <mark.rutland@arm.com>
11 - Will Deacon <will.deacon@arm.com>
16 representation in the device tree should be done as under:-
21 - enum:
22 - apm,potenza-pmu
23 - apple,avalanche-pmu
24 - apple,blizzard-pmu
[all …]
H A Djuno,scpi.txt5 ------------------------------------
8 - compatible : should be "arm,juno-sram-ns" for Non-secure SRAM
10 Each sub-node represents the reserved area for SCPI.
12 Required sub-node properties:
13 - reg : The base offset and size of the reserved area with the SRAM
14 - compatible : should be "arm,juno-scp-shmem" for Non-secure SRAM based
18 --------------------------------------------------------------
20 - compatible : should be "arm,scpi-sensors".
21 - #thermal-sensor-cells: should be set to 1.
/freebsd/sys/contrib/device-tree/Bindings/iommu/
H A Dqcom,iommu.txt3 Qualcomm "B" family devices which are not compatible with arm-smmu have
6 to non-secure vs secure interrupt line.
10 - compatible : Should be one of:
12 "qcom,msm8916-iommu"
13 "qcom,msm8953-iommu"
15 Followed by "qcom,msm-iommu-v1".
17 - clock-names : Should be a pair of "iface" (required for IOMMUs
21 - clocks : Phandles for respective clocks described by
22 clock-names.
24 - #address-cells : must be 1.
[all …]
H A Dqcom,iommu.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Konrad Dybcio <konradybcio@kernel.org>
13 Qualcomm "B" family devices which are not compatible with arm-smmu have
16 to non-secure vs secure interrupt line.
21 - items:
22 - enum:
23 - qcom,msm8916-iommu
24 - qcom,msm8953-iommu
[all …]
H A Dmsm,iommu-v0.txt5 of the CPU, each connected to the IOMMU through a port called micro-TLB.
9 - compatible: Must contain "qcom,apq8064-iommu".
10 - reg: Base address and size of the IOMMU registers.
11 - interrupts: Specifiers for the MMU fault interrupts. For instances that
12 support secure mode two interrupts must be specified, for non-secure and
13 secure mode, in that order. For instances that don't support secure mode a
15 - #iommu-cells: The number of cells needed to specify the stream id. This
17 - qcom,ncb: The total number of context banks in the IOMMU.
18 - clocks : List of clocks to be used during SMMU register access. See
19 Documentation/devicetree/bindings/clock/clock-bindings.txt
[all …]
/freebsd/sys/contrib/device-tree/Bindings/nvmem/
H A Dst,stm32-romem.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/nvmem/st,stm32-romem.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: STMicroelectronics STM32 Factory-programmed data
10 This represents STM32 Factory-programmed read only non-volatile area: locked
11 flash, OTP, read-only HW regs... This contains various information such as:
16 - Fabrice Gasnier <fabrice.gasnier@foss.st.com>
19 - $ref: nvmem.yaml#
20 - $ref: nvmem-deprecated-cells.yaml#
[all …]
/freebsd/lib/libpmc/pmu-events/arch/arm64/arm/cortex-a75/
H A Dmmu.json9 …lk handled by the MMU. This event is not counted when it is accessible from Non-secure EL0 or EL1",
12 …alk handled by the MMU. This event is not counted when it is accessible from Non-secure EL0 or EL1"
15 …lk handled by the MMU. This event is not counted when it is accessible from Non-secure EL0 or EL1",
18 …alk handled by the MMU. This event is not counted when it is accessible from Non-secure EL0 or EL1"
H A Dexception.json12 …ructions are excluded. This event is not counted when it is accessible from Non-secure EL0 or EL1",
15 …tructions are excluded. This event is not counted when it is accessible from Non-secure EL0 or EL1"
/freebsd/crypto/openssl/doc/man3/
H A DPEM_bytes_read_bio.pod5 PEM_bytes_read_bio, PEM_bytes_read_bio_secmem - read a PEM-encoded data structure from a BIO
20 PEM_bytes_read_bio() reads PEM-formatted (IETF RFC 1421 and IETF RFC 7468)
23 etc.). If multiple PEM-encoded data structures are present in the same
24 stream, PEM_bytes_read_bio() will skip non-matching data types and
25 continue reading. Non-PEM data present in the stream may cause an
36 non-NULL. The caller must free the storage pointed to by I<*pnm>.
38 The returned data is the DER-encoded form of the requested type, in
43 memory from the secure heap for its temporary buffers and the storage
49 PEM_bytes_read_bio_secmem() only enforces that the secure heap is used for
52 allocated from the secure heap. In cases where it is desirable to ensure
[all …]
/freebsd/sys/contrib/device-tree/src/arm64/tesla/
H A Dfsd.dtsi1 // SPDX-License-Identifier: GPL-2.0
3 * Tesla Full Self-Driving SoC device tree source
5 * Copyright (c) 2017-2022 Samsung Electronics Co., Ltd.
7 * Copyright (c) 2017-2022 Tesla, Inc.
11 #include <dt-bindings/clock/fsd-clk.h>
12 #include <dt-bindings/interrupt-controller/arm-gic.h>
16 interrupt-parent = <&gic>;
17 #address-cells = <2>;
18 #size-cells = <2>;
38 #address-cells = <2>;
[all …]
/freebsd/sys/contrib/device-tree/Bindings/arm/tegra/
H A Dnvidia,tegra194-cbb.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/arm/tegra/nvidia,tegra194-cbb.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Sumit Gupta <sumitg@nvidia.com>
15 multiple hierarchical sub-NOCs (Network-on-Chip) and connects various
20 "AON-NOC, SCE-NOC, RCE-NOC, BPMP-NOC, CV-NOC" and "CBB Central NOC"
28 - For CCPLEX (CPU Complex) initiator, the driver sets ERD bit. So, the
31 - For other initiators, the ERD is disabled. So, the access issuing
34 include all engines using Cortex-R5 (which is ARMv7 CPU cluster) and
[all …]
/freebsd/sys/contrib/device-tree/Bindings/arm/samsung/
H A Dsamsung-secure-firmware.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/arm/samsung/samsung-secure-firmware.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Samsung Exynos Secure Firmware
10 - Krzysztof Kozlowski <krzk@kernel.org>
15 - const: samsung,secure-firmware
19 Address of non-secure SYSRAM used for communication with firmware.
23 - compatible
24 - reg
[all …]
/freebsd/sys/contrib/device-tree/Bindings/soc/rockchip/
H A Dgrf.txt7 - GRF, used for general non-secure system,
8 - SGRF, used for general secure system,
9 - PMUGRF, used for always on system
14 - GRF, used for general non-secure system,
15 - SGRF, used for general secure system,
16 - DETECTGRF, used for audio codec system,
17 - COREGRF, used for pvtm,
21 - compatible: GRF should be one of the following:
22 - "rockchip,px30-grf", "syscon": for px30
23 - "rockchip,rk3036-grf", "syscon": for rk3036
[all …]
/freebsd/sys/contrib/device-tree/Bindings/mailbox/
H A Darm,mhu.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Jassi Brar <jaswinder.singh@linaro.org>
13 The ARM's Message-Handling-Unit (MHU) is a mailbox controller that has 3
19 be a 'Secure' resource, hence can't be used by Linux running NS.
22 interrupt signal using a 32-bit register, with all 32-bits logically ORed
28 interrupt. Each of the 32-bits can be used as "doorbell" to alert the remote
37 - arm,mhu
38 - arm,mhu-doorbell
[all …]
/freebsd/usr.sbin/bsdconfig/share/
H A Dmustberoot.subr3 # Copyright (c) 2006-2013 Devin Teske
49 # While in SECURE mode, should authentication as `root' be allowed? Set to
50 # non-NULL to enable authentication as `root', otherwise disabled.
60 # While in SECURE mode, should we divulge (through error message) when the
61 # requested authentication user does not exist? Set to non-NULL to enable,
62 # otherwise a non-existent user is treated like an invalid password.
71 # Re-execution of the current program via sudo is automatically handled.
75 # USE_XDIALOG Either NULL or Non-NULL. If given a value will indicate
83 [ "$( id -u )" = "0" ] && return $SUCCESS
93 if [ ! -e "$checkpath" ]; then
[all …]
/freebsd/sys/contrib/device-tree/Bindings/misc/
H A Dqcom,fastrpc.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Srinivas Kandagatla <srinivas.kandagatla@linaro.org>
13 The FastRPC implements an IPC (Inter-Processor Communication)
25 - adsp
26 - mdsp
27 - sdsp
28 - cdsp
29 - cdsp1
[all …]
H A Dbrcm,kona-smc.txt1 Broadcom Secure Monitor Bounce buffer
2 -----------------------------------------------------
4 used for non-secure to secure communications.
7 - compatible : "brcm,kona-smc"
8 - DEPRECATED: compatible : "bcm,kona-smc"
9 - reg : Location and size of bounce buffer
13 compatible = "brcm,bcm11351-smc", "brcm,kona-smc";
H A Dqcom,fastrpc.txt3 The FastRPC implements an IPC (Inter-Processor Communication)
9 - compatible:
14 - label
20 - qcom,non-secure-domain:
23 Definition: Property to specify that dsp domain is non-secure.
25 - qcom,vmids:
30 - #address-cells
35 - #size-cells
43 - All Compute context banks MUST contain the following properties:
45 - compatible:
[all …]
/freebsd/sys/contrib/device-tree/Bindings/bus/
H A Dst,stm32mp25-rifsc.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/bus/st,stm32mp25-rifsc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Gatien Chevallier <gatien.chevallier@foss.st.com>
19 - RISC registers associated with RISUP logic (resource isolation device unit
20 for peripherals), assign all non-RIF aware peripherals to zero, one or
21 any security domains (secure, privilege, compartment).
22 - RIMC registers: associated with RIMU logic (resource isolation master
23 unit), assign all non RIF-aware bus master to one security domain by
[all …]
/freebsd/contrib/llvm-project/lld/ELF/Arch/
H A DARM.cpp1 //===- ARM.cpp ------------------------------------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
80 // Set the EF_ARM_BE8 flag in the ELF header, if ELF file is big-endian in calcEFlags()
81 // with BE-8 code. in calcEFlags()
84 if (config->armVFPArgs == ARMVFPArgKind::Base || in calcEFlags()
85 config->armVFPArgs == ARMVFPArgKind::Default) in calcEFlags()
87 else if (config->armVFPArgs == ARMVFPArgKind::VFP) in calcEFlags()
90 if (!config->isLE && config->armBe8) in calcEFlags()
125 // (S + A) - GOT_ORG in getRelExpr()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/firmware/
H A Dbrcm,kona-smc.yaml1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause
3 ---
4 $id: http://devicetree.org/schemas/firmware/brcm,kona-smc.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Broadcom Kona family Secure Monitor bounce buffer
10 A bounce buffer used for non-secure to secure communications.
13 - Florian Fainelli <f.fainelli@gmail.com>
18 - enum:
19 - brcm,bcm11351-smc
20 - brcm,bcm21664-smc
[all …]
/freebsd/share/man/man7/
H A Dsecurity.747 multi-user systems have some inherent security, the job of building and
53 only as secure as you make them, and security concerns are ever competing
60 As yesterday's mini-computers and mainframes
74 .Bl -enum -offset indent
89 Typically, DoS attacks are brute-force mechanisms that attempt
99 Brute-force network attacks are harder to deal with.
100 A spoofed-packet attack, for example, is
114 The result is that if you have any moderate-sized user base,
137 may find a bug in a root-run server and be able to break root over a network
138 connection to that server, or the attacker may know of a bug in an SUID-root
[all …]
/freebsd/sys/dev/mpi3mr/
H A Dmpi3mr_pci.c2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2020-2024, Broadcom Inc. All rights reserved.
5 * Support: <fbsd-storage-driver.pdl@broadcom.com>
97 mpi3mr, mpi3mr_identifiers, nitems(mpi3mr_identifiers) - 1);
119 device_get_unit(sc->mpi3mr_dev)); in mpi3mr_setup_sysctl()
120 snprintf(tmpstr2, sizeof(tmpstr2), "%d", device_get_unit(sc->mpi3mr_dev)); in mpi3mr_setup_sysctl()
122 sysctl_ctx = device_get_sysctl_ctx(sc->mpi3mr_dev); in mpi3mr_setup_sysctl()
124 sysctl_tree = device_get_sysctl_tree(sc->mpi3mr_dev); in mpi3mr_setup_sysctl()
127 sysctl_ctx_init(&sc->sysctl_ctx); in mpi3mr_setup_sysctl()
128 sc->sysctl_tree = SYSCTL_ADD_NODE(&sc->sysctl_ctx, in mpi3mr_setup_sysctl()
[all …]

12345678910>>...25