History log of /optee_os/core/drivers/ (Results 26 – 50 of 1354)
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
2dc5245613-Nov-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: ecc: Enable support for ECC curve NIST P256

For this to work, Versal PLM Firmware needs to be compiled with
XSECURE_ECC_SUPPORT_NIST_P256 defined. Like with
XSECURE_ECC_SUPPORT_NIST

drivers: versal: ecc: Enable support for ECC curve NIST P256

For this to work, Versal PLM Firmware needs to be compiled with
XSECURE_ECC_SUPPORT_NIST_P256 defined. Like with
XSECURE_ECC_SUPPORT_NIST_P521 to support NIST P521. Note that NIST P384 is
enabled by default in PLM Firmware.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>

show more ...

9d81cc9327-Oct-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: nvm: Minor fix, use EFUSE_OFFCHIP_REVOCATION_ID_LEN consistently

Function versal_efuse_read_offchip_revoke_id() refers to the OffChip
Revocation eFUSEs, thus use the corresponding l

drivers: versal: nvm: Minor fix, use EFUSE_OFFCHIP_REVOCATION_ID_LEN consistently

Function versal_efuse_read_offchip_revoke_id() refers to the OffChip
Revocation eFUSEs, thus use the corresponding length definition.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

b214ed7127-Oct-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: nvm: Really support PLM API id BBRAM_ZEROIZE

Function versal_bbram_zeroize() does call versal_nvm_write() with API id
0x510 (BBRAM_ZEROIZE).

Fixes: 55667e70aa4b ("drivers: versal:

drivers: versal: nvm: Really support PLM API id BBRAM_ZEROIZE

Function versal_bbram_zeroize() does call versal_nvm_write() with API id
0x510 (BBRAM_ZEROIZE).

Fixes: 55667e70aa4b ("drivers: versal: non volatile memory (eFuse and BBRAM)")
Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>

show more ...

028c0a3a27-Oct-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: nvm: Minor fixes, headers and defines

- Deduplicate inclusion of drivers/versal_nvm.h inclusion.
- Use macro SHIFT_U32() as in other drivers for API id definitions.

Signed-off-by:

drivers: versal: nvm: Minor fixes, headers and defines

- Deduplicate inclusion of drivers/versal_nvm.h inclusion.
- Use macro SHIFT_U32() as in other drivers for API id definitions.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

3249a89203-Mar-2026 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Fix seed life evaluation

User configuration specifies the number of generation operations to do per
seed, and the "elapsed" counter starts at 0.

Signed-off-by: Joachim Foerst

drivers: versal: trng: Fix seed life evaluation

User configuration specifies the number of generation operations to do per
seed, and the "elapsed" counter starts at 0.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

7967c6f002-Dec-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Minor, cleanup includes

Various includes are simply not required, some theoretically missing.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Re

drivers: versal: trng: Minor, cleanup includes

Various includes are simply not required, some theoretically missing.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

759d7bc207-Nov-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Fix, us early_init() instead of driver_init()

hw_get_random_bytes() can be called _before_ driver_init() functions have
been executed. This results in panic()ing since trng_hr

drivers: versal: trng: Fix, us early_init() instead of driver_init()

hw_get_random_bytes() can be called _before_ driver_init() functions have
been executed. This results in panic()ing since trng_hrng_mode_init() needs
to be executed before the first use.

Fixes: cc672e1f1ce0 ("drivers: versal: true random number generator")
Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>

show more ...

f7e5a06027-Nov-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: puf: Minor, remove unneeded initialization of parameter data

In case of PUF registration all members of struct versal_puf_data are pure
outputs from xilpuf API id 0x0c01 (PUF_REGIST

drivers: versal: puf: Minor, remove unneeded initialization of parameter data

In case of PUF registration all members of struct versal_puf_data are pure
outputs from xilpuf API id 0x0c01 (PUF_REGISTRATION).

In case of PUF regeneration member efuse_syn_data of struct versal_puf_data
is irrelevant to xilpuf API id 0x0c02 (PUF_REGENERATION).

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

423aec8824-Nov-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: huk: Fix AES key source check

PLM Firmware XilSecure API id 0x050a (AES_OP_INIT) accepts AES key source
identifiers up to its internal definition: XSECURE_MAX_KEY_SOURCES - 1
[1,2].

drivers: versal: huk: Fix AES key source check

PLM Firmware XilSecure API id 0x050a (AES_OP_INIT) accepts AES key source
identifiers up to its internal definition: XSECURE_MAX_KEY_SOURCES - 1
[1,2]. This definition matches our enum symbol VERSAL_AES_USER_KEY_7 (and
their XSECURE_AES_USER_KEY_7 [3]).

Link: https://github.com/Xilinx/embeddedsw/blob/c0aed2eff7a30f307238ec853fa8fbc45dcabdda/lib/sw_services/xilsecure/src/server/core/aes/xsecure_aes.c#L1933 [1]
Link: https://github.com/Xilinx/embeddedsw/blob/45a18907084e77bb3a450a035d280130d7ff6e26/lib/sw_services/xilsecure/src/common/core/xsecure_core.h#L127 [2]
Link: https://github.com/Xilinx/embeddedsw/blob/45a18907084e77bb3a450a035d280130d7ff6e26/lib/sw_services/xilsecure/src/common/core/xsecure_core.h#L154 [3]
Fixes: cd0d1dd6b232 ("drivers: versal: hardware unique key")
Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>

show more ...

eb8965e811-Dec-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Restructure and update KAT as found in upstream driver v2024.2

The example of the upstream driver v2024.2 does an explicit re-seed
operation with a different seed after the in

drivers: versal: trng: Restructure and update KAT as found in upstream driver v2024.2

The example of the upstream driver v2024.2 does an explicit re-seed
operation with a different seed after the initial seeding and thus expects
a different output.

Furthermore this commit prepares for adding support for the 2nd version of
the TRNG IP Core found in Versal NET's PKI Accelerator by turning those
hard-coded byte sequences (e.g. seeds) into file scope variables to avoid
duplication.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

1440906f06-Dec-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Apply various fixes derived from upstream driver v2024.2

Derived changes:

- Fetch more random data (64 byte) for HRNG reseeding than actually need
for security reasons.

-

drivers: versal: trng: Apply various fixes derived from upstream driver v2024.2

Derived changes:

- Fetch more random data (64 byte) for HRNG reseeding than actually need
for security reasons.

- Proper seed length check in trng_reseed().

- Asserting PRNGMODE_GEN (TRNG_CTRL_PRNGMODE_MASK) next to
TRNG_CTRL_PRNGXS_MASK when generating.

- Do explicit reseeding on initialization in HRNG mode, only!

Extra changes:

- Output error message when seed life is over, in DRNG mode, instead of
rather silently failing.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

56451b8c06-Dec-2025 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: trng: Minor, add comments derived from upstream driver v2024.2

There may even be more explanatory comments.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics

drivers: versal: trng: Minor, add comments derived from upstream driver v2024.2

There may even be more explanatory comments.

Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

f64846a110-Mar-2026 Joachim Foerster <joachim.foerster@missinglinkelectronics.com>

drivers: versal: Update API ids to v2024.1 and newer PLM firmware release, only

IMPORTANT: This commit breaks compatibility with pre-v2024.1 PLM firmware
releases!

Since PLM firmware rel

drivers: versal: Update API ids to v2024.1 and newer PLM firmware release, only

IMPORTANT: This commit breaks compatibility with pre-v2024.1 PLM firmware
releases!

Since PLM firmware release v2022.1 there have been multiple changes to the
PLM firmware, specifically the XilSecure API ids and a new KAT subsystem
API id. Since release v2024.1 the API id situation did not change anymore -
at least up to v2025.1.

In addition to the above changes, the following breaking changes regarding
RSA and PUF support should be highlighted here:

In PLM firmware release v2022.2 module XilSecure has been updated to pack
the RSA public exponent right after the modulus rather than at a fixed 512
bytes (RSA 4096 key size) offset. See PLM firmware commit [1] for v2022.2
and [2] for later versions.

Also in PLM firmware release v2022.2 [3], module XilPuf removed the 1st
member RegMode from structure XPuf_DataAddr and made 4k syndrome mode the
only support one.

Largely based on previous work by
Jeremie Corbier <jeremie.corbier@provenrun.com>.

Link: https://github.com/Xilinx/embeddedsw/commit/c2dd2ebac38e [1]
Link: https://github.com/Xilinx/embeddedsw/commit/5cd79b2891dc [2]
Link: https://github.com/Xilinx/embeddedsw/commit/943aa4479aad [3]
Signed-off-by: Joachim Foerster <joachim.foerster@missinglinkelectronics.com>
Reviewed-by: Nathan Menhorn <nathan.menhorn@amd.com>
Tested-by: Nathan Menhorn <nathan.menhorn@amd.com>
Reviewed-by: Sean McGinn <sean.mcginn@amd.com>
Reviewed-by: Lucas Kiker <lucas.kiker@amd.com>
Reviewed-by: Sindhu Raveendra <Sindhu.Raveendra@amd.com>
Reviewed-by: Clemens Nasenberg <clemens.nasenberg@amd.com>
Reviewed-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

caeaa2ae22-Jan-2026 Jens Wiklander <jens.wiklander@linaro.org>

core: crypto_api: fix underflow in emsa_pkcs1_v1_5_encode()

Guard against an integer underflow in emsa_pkcs1_v1_5_encode() that can
occur when calculating the padding field in the EMA-PKCS1-v1_5 enc

core: crypto_api: fix underflow in emsa_pkcs1_v1_5_encode()

Guard against an integer underflow in emsa_pkcs1_v1_5_encode() that can
occur when calculating the padding field in the EMA-PKCS1-v1_5 encoding.

Fixes: f5a70e3efb80 ("drivers: crypto: generic resources for crypto device driver - RSA")
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
Reviewed-by: Jerome Forissier <jerome.forissier@arm.com>

show more ...

06c4e95e08-Apr-2026 Harish Ediga <harish.ediga@amd.com>

crypto: asu: send hash address in request buffer for digest

Update driver to read digest from hash address sent to firmware
instead of response buffer

Fixes: 74ddb42edbe0 ("crypto: asu: Add crypto

crypto: asu: send hash address in request buffer for digest

Update driver to read digest from hash address sent to firmware
instead of response buffer

Fixes: 74ddb42edbe0 ("crypto: asu: Add crypto hash driver")
Signed-off-by: Harish Ediga <harish.ediga@amd.com>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...

d80b90ce08-Apr-2026 Akshay Belsare <akshay.belsare@amd.com>

drivers: asu: guard wfe() with IRQ-mask check and add response timeout

The wfe()-based response loop in asu_update_queue_buffer_n_send_ipi()
assumes THREAD_EXCP_NATIVE_INTR is clear at every call si

drivers: asu: guard wfe() with IRQ-mask check and add response timeout

The wfe()-based response loop in asu_update_queue_buffer_n_send_ipi()
assumes THREAD_EXCP_NATIVE_INTR is clear at every call site. This
does not hold during early boot: boot_init_primary_final() re-masks all
exceptions including THREAD_EXCP_NATIVE_INTR at boot.c:1103 before
calling thread_update_canaries() -> hw_get_random_bytes(). With
PSTATE.I=1 the GIC cannot deliver SPI 89 (ASU doorbell),
asu_resp_handler() never fires, sev() is never called, and wfe() blocks
indefinitely.

Fix the response loop with two changes:

1. Arm a 2s safety timeout unconditionally before the loop so ASU
firmware failures surface as TEE_ERROR_TARGET_DEAD rather than a
silent hang.

2. Sample thread_get_exceptions() immediately before each wfe() call
with no intervening code between the check and the instruction.
This closes the TOCTOU window where the exception mask could change
between a snapshot taken before the loop and the actual wfe().
- THREAD_EXCP_NATIVE_INTR clear (IRQs unmasked): wfe() yields the
CPU; asu_resp_handler() fires sev() to wake it on response.
- THREAD_EXCP_NATIVE_INTR set (IRQs masked): udelay(10) throttles
the busy-poll, avoiding both a wfe() hang and uncontrolled bus
hammering.

asu_resp_handler() retains its sev() call to support the wfe() path.

Fixes: 7f2d4e10736f ("drivers: amd: Add ASU support")
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...

20da862b06-Apr-2026 Harish Ediga <harish.ediga@amd.com>

crypto: asu: fix command header length and race condition

- Updated asu_create_header() to pass command length in words
(sizeof(*cp)/sizeof(uint32_t)) instead of zero, to align with
ASUFW requir

crypto: asu: fix command header length and race condition

- Updated asu_create_header() to pass command length in words
(sizeof(*cp)/sizeof(uint32_t)) instead of zero, to align with
ASUFW requirements for proper command parsing.
- Multiple crypto drivers can submit request to shared buffer.
Make sure all queue parameters are update in spin_lock.

Fixes: 7f2d4e10736f ("drivers: amd: Add ASU support")
Signed-off-by: Harish Ediga <harish.ediga@amd.com>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...

ac59b32b26-Jan-2026 Philipp Zabel <p.zabel@pengutronix.de>

drivers: imx: rngb: soft reset in case of errors

Soft reset the RNGB core before retrying, if errors are logged in the
ESR register.

The i.MX 6ULL Applications Processor Reference Manual states in

drivers: imx: rngb: soft reset in case of errors

Soft reset the RNGB core before retrying, if errors are logged in the
ESR register.

The i.MX 6ULL Applications Processor Reference Manual states in the
RNG_CR[MASKERR] field description about errors in ESR:

All errors are considered fatal, requiring the RNGB to be reset.
Until the reset occurs, the RNGB does not service any random data.

It was observed that issuing CMD[CE|CI] (Clear error / interrupt
command) did not clear the ESR[SATE] (Statistical test error) state
as expected. Issuing CMD[SR] (Software reset) instead, as suggested
by the reference manual, works.

Signed-off-by: Philipp Zabel <p.zabel@pengutronix.de>
Acked-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

ecb211fc18-Feb-2026 Philipp Zabel <p.zabel@pengutronix.de>

drivers: imx: rngb: split irq_mask() from irq_clear()

Introduce irq_mask() as a counterpart to irq_unmask(), split from
irq_clear(). This way function names match what they do, and we
can replace ir

drivers: imx: rngb: split irq_mask() from irq_clear()

Introduce irq_mask() as a counterpart to irq_unmask(), split from
irq_clear(). This way function names match what they do, and we
can replace irq_clear() with a soft_reset() in the error case next.

Signed-off-by: Philipp Zabel <p.zabel@pengutronix.de>
Acked-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...

2ca959ea26-Jan-2026 Philipp Zabel <p.zabel@pengutronix.de>

drivers: imx: rngb: use explicit seed generation command

Follow the Linux and U-Boot drivers in using the explicit command
to trigger seed generation. Relying on auto-seeding didn't seem
to trigger

drivers: imx: rngb: use explicit seed generation command

Follow the Linux and U-Boot drivers in using the explicit command
to trigger seed generation. Relying on auto-seeding didn't seem
to trigger reseeding when the first try fails the statistics tests.

Only switch to continuous auto-reseeding after initialization
succeeded.

Signed-off-by: Philipp Zabel <p.zabel@pengutronix.de>
Acked-by: Jorge Ramirez-Ortiz <jorge.ramirez@oss.qualcomm.com>

show more ...


/optee_os/core/arch/arm/arm.mk
/optee_os/core/arch/arm/include/kernel/stmm_sp.h
/optee_os/core/arch/arm/kernel/boot.c
/optee_os/core/arch/arm/kernel/entry_a32.S
/optee_os/core/arch/arm/kernel/entry_a64.S
/optee_os/core/arch/arm/kernel/thread.c
/optee_os/core/arch/arm/mm/tee_pager.c
/optee_os/core/arch/arm/sm/pm_a32.S
/optee_os/core/arch/riscv/kernel/thread_arch.c
/optee_os/core/arch/riscv/plat-spike/conf.mk
/optee_os/core/core.mk
imx_rngb.c
/optee_os/core/kernel/sub.mk
/optee_os/core/kernel/thread.c
/optee_os/core/mm/boot_mem.c
/optee_os/core/pta/tests/misc.c
/optee_os/core/tee/tee_ree_fs.c
/optee_os/ldelf/asan.c
/optee_os/ldelf/asan.h
/optee_os/ldelf/ldelf.ld.S
/optee_os/ldelf/ldelf.mk
/optee_os/ldelf/main.c
/optee_os/ldelf/sub.mk
/optee_os/ldelf/ta_elf.c
/optee_os/ldelf/ta_elf_rel.c
/optee_os/lib/libmbedtls/mbedtls/ChangeLog
/optee_os/lib/libmbedtls/mbedtls/README.md
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/bignum.h
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/build_info.h
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/cipher.h
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/cmac.h
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/threading.h
/optee_os/lib/libmbedtls/mbedtls/include/psa/crypto.h
/optee_os/lib/libmbedtls/mbedtls/include/psa/crypto_extra.h
/optee_os/lib/libmbedtls/mbedtls/library/bignum.c
/optee_os/lib/libmbedtls/mbedtls/library/bignum_core.c
/optee_os/lib/libmbedtls/mbedtls/library/bignum_core.h
/optee_os/lib/libmbedtls/mbedtls/library/bignum_core_invasive.h
/optee_os/lib/libmbedtls/mbedtls/library/bignum_internal.h
/optee_os/lib/libmbedtls/mbedtls/library/cipher.c
/optee_os/lib/libmbedtls/mbedtls/library/cipher_invasive.h
/optee_os/lib/libmbedtls/mbedtls/library/cipher_wrap.c
/optee_os/lib/libmbedtls/mbedtls/library/cipher_wrap.h
/optee_os/lib/libmbedtls/mbedtls/library/cmac.c
/optee_os/lib/libmbedtls/mbedtls/library/common.h
/optee_os/lib/libmbedtls/mbedtls/library/dhm.c
/optee_os/lib/libmbedtls/mbedtls/library/ecdsa.c
/optee_os/lib/libmbedtls/mbedtls/library/ecp.c
/optee_os/lib/libmbedtls/mbedtls/library/psa_crypto.c
/optee_os/lib/libmbedtls/mbedtls/library/psa_crypto_cipher.c
/optee_os/lib/libmbedtls/mbedtls/library/psa_crypto_core.h
/optee_os/lib/libmbedtls/mbedtls/library/rsa.c
/optee_os/lib/libmbedtls/mbedtls/library/rsa_alt_helpers.c
/optee_os/lib/libmbedtls/mbedtls/library/rsa_alt_helpers.h
/optee_os/lib/libmbedtls/mbedtls/library/ssl_msg.c
/optee_os/lib/libmbedtls/mbedtls/library/ssl_tls.c
/optee_os/lib/libmbedtls/mbedtls/library/ssl_tls12_client.c
/optee_os/lib/libmbedtls/mbedtls/library/threading.c
/optee_os/lib/libmbedtls/mbedtls/library/threading_internal.h
/optee_os/lib/libutee/include/tee_internal_api_extensions.h
/optee_os/lib/libutee/tee_system_pta.c
/optee_os/lib/libutee/user_ta_entry.c
/optee_os/lib/libutils/ext/asan.c
/optee_os/lib/libutils/ext/asan_test.c
/optee_os/lib/libutils/ext/include/asan.h
/optee_os/lib/libutils/ext/include/asan_test.h
/optee_os/lib/libutils/ext/include/compiler.h
/optee_os/lib/libutils/ext/sub.mk
/optee_os/lib/libutils/isoc/arch/arm/setjmp_a32.S
/optee_os/lib/libutils/isoc/arch/arm/setjmp_a64.S
/optee_os/lib/libutils/isoc/bget_malloc.c
/optee_os/lib/libutils/isoc/sub.mk
/optee_os/mk/config.mk
/optee_os/ta/arch/arm/ta.ld.S
/optee_os/ta/mk/ta_dev_kit.mk
/optee_os/ta/ta.mk
a086221118-Mar-2026 zhaozheng7 <zhaozheng96@outlook.com>

drivers: crypto: hisilicon: fix qp memory leak

Fix the null pointer access issue for hisilicon QM driver.

Fixes: c7f9abcee87f ("drivers: implement HiSilicon Queue Management (QM) module")
Signed-of

drivers: crypto: hisilicon: fix qp memory leak

Fix the null pointer access issue for hisilicon QM driver.

Fixes: c7f9abcee87f ("drivers: implement HiSilicon Queue Management (QM) module")
Signed-off-by: zhaozheng7 <zhaozheng96@outlook.com>
Acked-by: Zexi Yu <yuzexi@hisilicon.com>

show more ...

490a7e0917-Jun-2025 Marco Felsch <m.felsch@pengutronix.de>

drivers: tzc380: add tzc_verify_region0_secure helper

Add a helper which verifies that region0 is only accessible by the
secure world.

Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
Review

drivers: tzc380: add tzc_verify_region0_secure helper

Add a helper which verifies that region0 is only accessible by the
secure world.

Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
Reviewed-by: Sahil Malhotra <sahil.malhotra@nxp.com>
Signed-off-by: Marco Felsch <m.felsch@pengutronix.de>

show more ...

8279b68a17-Jun-2025 Marco Felsch <m.felsch@pengutronix.de>

drivers: tzc380: add support to dump region0

Dumping region0 is interesting too since it may have a insecure sp
configuration applied by the previous running firmware.

Reviewed-by: Sahil Malhotra <

drivers: tzc380: add support to dump region0

Dumping region0 is interesting too since it may have a insecure sp
configuration applied by the previous running firmware.

Reviewed-by: Sahil Malhotra <sahil.malhotra@nxp.com>
Signed-off-by: Marco Felsch <m.felsch@pengutronix.de>

show more ...

74ddb42e26-Feb-2026 Harsh Jain <h.jain@amd.com>

crypto: asu: Add crypto hash driver

Add support for following Hash algorithms
SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512

Signed-off-by: Harsh Jain <h.jain@amd.com>
Signed-off-by: Aksha

crypto: asu: Add crypto hash driver

Add support for following Hash algorithms
SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512

Signed-off-by: Harsh Jain <h.jain@amd.com>
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...

7f2d4e1001-Sep-2025 Akshay Belsare <akshay.belsare@amd.com>

drivers: amd: Add ASU support

Add support for the AMD Application Security Unit (ASU), the on-chip
Hardware Security Module (HSM) for Versal Gen 2.
The ASU manages all device-level security services

drivers: amd: Add ASU support

Add support for the AMD Application Security Unit (ASU), the on-chip
Hardware Security Module (HSM) for Versal Gen 2.
The ASU manages all device-level security services for user
applications, extending beyond accelerator-centric tasks.
Its firmware also exposes several software-based cryptographic
primitives, including:
- Key transfer
- RSA authentication (multiple padding schemes)
- HMAC
- Key Derivation Function (KDF)
- Key wrap / unwrap

Co-developed-by: Harsh Jain <h.jain@amd.com>
Signed-off-by: Harsh Jain <h.jain@amd.com>
Signed-off-by: Akshay Belsare <akshay.belsare@amd.com>
Acked-by: Jens Wiklander <jens.wiklander@linaro.org>

show more ...

12345678910>>...55