| b0946e1d | 09-Mar-2023 |
Thomas BOURGOIN <thomas.bourgoin@foss.st.com> |
drivers: stm32mp15_huk: use DT HUK NVMEM layout API
Adds the possibility to get the HUK from OTP definition in the device tree using the function stm32_bsec_find_otp_in_nvmem_layout().
Signed-off-b
drivers: stm32mp15_huk: use DT HUK NVMEM layout API
Adds the possibility to get the HUK from OTP definition in the device tree using the function stm32_bsec_find_otp_in_nvmem_layout().
Signed-off-by: Thomas BOURGOIN <thomas.bourgoin@foss.st.com> Acked-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| db8ca286 | 24-Mar-2023 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
se050: ecc: SE050-F shared secret
The SE050-F does not support shared secret generation. Allow this operation to also fallback to its software implementation.
Fixes: 6cc77cdd73aa ("crypto: drivers:
se050: ecc: SE050-F shared secret
The SE050-F does not support shared secret generation. Allow this operation to also fallback to its software implementation.
Fixes: 6cc77cdd73aa ("crypto: drivers: se050-f: ecc: can fallback to softw-ops") Test: xtest regression_4009 Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| b300b5a3 | 28-Mar-2023 |
Jerome Forissier <jerome.forissier@linaro.org> |
ci: compile-test as many PTAs as possible on QEMU/QEMUv8
Enable as many PTAs as possible in the QEMU/QEMUv8 CI builds in order to catch compile issues. Some PTAs are not applicable to QEMU though.
ci: compile-test as many PTAs as possible on QEMU/QEMUv8
Enable as many PTAs as possible in the QEMU/QEMUv8 CI builds in order to catch compile issues. Some PTAs are not applicable to QEMU though.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| eb238769 | 27-Mar-2023 |
Clement Faure <clement.faure@nxp.com> |
pta: attestation: fix compilation incompatible pointer warning
To reproduce (any 64bits platform will do): $ make PLATFORM=imx-mx8mmevk CFG_ATTESTATION_PTA=y CFG_WERROR=y
core/pta/attestation.c: In
pta: attestation: fix compilation incompatible pointer warning
To reproduce (any 64bits platform will do): $ make PLATFORM=imx-mx8mmevk CFG_ATTESTATION_PTA=y CFG_WERROR=y
core/pta/attestation.c: In function ‘cmd_get_pubkey’: core/pta/attestation.c:358:30: warning: initialization of ‘uint32_t *’ {aka ‘unsigned int *’} from incompatible pointer type ‘size_t *’ {aka ‘long unsigned int *’} [-Wincompatible-pointer-types] 358 | uint32_t *e_out_sz = ¶ms[0].memref.size; | ^ core/pta/attestation.c:360:30: warning: initialization of ‘uint32_t *’ {aka ‘unsigned int *’} from incompatible pointer type ‘size_t *’ {aka ‘long unsigned int *’} [-Wincompatible-pointer-types] 360 | uint32_t *n_out_sz = ¶ms[1].memref.size; | ^
Fixes: 7509620b8b95 ("GP131: Update TEE_Param") Signed-off-by: Clement Faure <clement.faure@nxp.com> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 552d5e40 | 18-Jul-2022 |
Jelle Sels <jelle.sels@arm.com> |
core: ffa: Allow multiple SPs with same UUID
The FF-A spec allows multiple SPs to have the same UUID. This makes it possible to use the FF-A UUID as a identifier for the protocol on top of the FF-A
core: ffa: Allow multiple SPs with same UUID
The FF-A spec allows multiple SPs to have the same UUID. This makes it possible to use the FF-A UUID as a identifier for the protocol on top of the FF-A layer. To achieve this we have to make sure that the FFA_PARTITION_INFO_GET can return more then one endpoint id if we pass a UUID. To make sure that there is no collision between the SP binaries names, we distinguish between the FF-A UUID and the SP UUID. The SP UUID is used to identify the SP itself. While the FF-A UUID is used as part of the FF-A protocol.
Signed-off-by: Jelle Sels <jelle.sels@arm.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f60c6b9c | 26-Jan-2023 |
Clement Faure <clement.faure@nxp.com> |
drivers: imx_ele: add ELE driver
Add EdgeLock Enclave (or ELE) driver support. ELE is a built-in security subsystem available on imx8ulp and imx93 providing security features to the Cortex-A.
Signe
drivers: imx_ele: add ELE driver
Add EdgeLock Enclave (or ELE) driver support. ELE is a built-in security subsystem available on imx8ulp and imx93 providing security features to the Cortex-A.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 8cd1171e | 26-Jan-2023 |
Clement Faure <clement.faure@nxp.com> |
drivers: imx_mu: add MU base address and size for imx93
Add definition of MU_BASE and MU_SIZE for imx93.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.fori
drivers: imx_mu: add MU base address and size for imx93
Add definition of MU_BASE and MU_SIZE for imx93.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 4f89aed3 | 26-Jan-2023 |
Clement Faure <clement.faure@nxp.com> |
drivers: imx_mu: add MU base address and size for imx8ulp
Add definition of MU_BASE and MU_SIZE for imx8ulp.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.
drivers: imx_mu: add MU base address and size for imx8ulp
Add definition of MU_BASE and MU_SIZE for imx8ulp.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 753e6fe4 | 24-Feb-2023 |
Clement Faure <clement.faure@nxp.com> |
drivers: imx_mu: increase maximum MU message size
Increase MU message maximum size to 17 words. It corresponds to the biggest message of the ELE API.
Signed-off-by: Clement Faure <clement.faure@nxp
drivers: imx_mu: increase maximum MU message size
Increase MU message maximum size to 17 words. It corresponds to the biggest message of the ELE API.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 088116c9 | 24-Feb-2023 |
Clement Faure <clement.faure@nxp.com> |
drivers: imx_mu: add support for imx93
Add MU support for imx93.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carr
drivers: imx_mu: add support for imx93
Add MU support for imx93.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| abbe1d51 | 23-Mar-2023 |
Balint Dobszay <balint.dobszay@arm.com> |
core: spmc: move FIP SP deinit call
Move the FIP SP deinit call to before starting the SPs. This change does not affect functionality, it's just to make the SP packages' lifetime clearer in the code
core: spmc: move FIP SP deinit call
Move the FIP SP deinit call to before starting the SPs. This change does not affect functionality, it's just to make the SP packages' lifetime clearer in the code.
Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Balint Dobszay <balint.dobszay@arm.com>
show more ...
|
| 6d7c8c3d | 28-Feb-2023 |
Balint Dobszay <balint.dobszay@arm.com> |
core: spmc: fix FIP SP loading
The memory management in process_sp_pkg() function contains errors. It tries to add new mappings for the SP packages that reside in the TA_RAM PA range, but this range
core: spmc: fix FIP SP loading
The memory management in process_sp_pkg() function contains errors. It tries to add new mappings for the SP packages that reside in the TA_RAM PA range, but this range is already mapped so this is unnecessary and wrong. Fix the code by simply using phys_to_virt() instead.
Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Balint Dobszay <balint.dobszay@arm.com>
show more ...
|
| 1478437e | 10-Mar-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: ltc: use SHA-3 crypto accelerated function
Uses the recently provided accelerated SHA-3 function in LTC
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <j
core: ltc: use SHA-3 crypto accelerated function
Uses the recently provided accelerated SHA-3 function in LTC
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| c60ed582 | 10-Mar-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: arm64: SHAKE128 using ARMv8.2-A cryptographic extensions
Adds support for SHAKE128 or SHA3-128 sized blocks in sha3_ce_transform().
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> A
core: arm64: SHAKE128 using ARMv8.2-A cryptographic extensions
Adds support for SHAKE128 or SHA3-128 sized blocks in sha3_ce_transform().
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| bfedef0c | 10-Mar-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: arm64: SHA-3 using ARMv8.2-A cryptographic extensions
Import SHA-3 assembly code from the Linux kernel (Linaro contribution). Enabled with CFG_CRYPTO_SHA3_ARM_CE=y, set by default if CFG_CRYPT
core: arm64: SHA-3 using ARMv8.2-A cryptographic extensions
Import SHA-3 assembly code from the Linux kernel (Linaro contribution). Enabled with CFG_CRYPTO_SHA3_ARM_CE=y, set by default if CFG_CRYPTO_WITH_CE82=y.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 2be3770e | 16-Mar-2023 |
Xu Yizhou <xuyizhou1@huawei.com> |
core: arm64: SM4 CE optimization for ARMv8.2
Enabled with CFG_CRYPTO_SM4_ARM_CE=y, set by default if CFG_CRYPTO_WITH_CE82=y.
Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Acked-by: Tianjia Zhang
core: arm64: SM4 CE optimization for ARMv8.2
Enabled with CFG_CRYPTO_SM4_ARM_CE=y, set by default if CFG_CRYPTO_WITH_CE82=y.
Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Acked-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 8b5fb12e | 07-Mar-2023 |
Xu Yizhou <xuyizhou1@huawei.com> |
core: arm64: SM4-AESE optimization for ARMv8
Enabled with CFG_CRYPTO_SM4_ARM_AESE=y, set by default if CFG_CRYPTO_WITH_CE=y.
Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Acked-by: Tianjia Zhang
core: arm64: SM4-AESE optimization for ARMv8
Enabled with CFG_CRYPTO_SM4_ARM_AESE=y, set by default if CFG_CRYPTO_WITH_CE=y.
Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Acked-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 2fb9e950 | 15-Mar-2023 |
Jerome Forissier <jerome.forissier@linaro.org> |
Revert "ci: disable QEMUv8_check_rust job"
This reverts commit 450963c289fe ("ci: disable QEMUv8_check_rust job"). The optee_rust project has been updated in [1] and the Rust tests are now successfu
Revert "ci: disable QEMUv8_check_rust job"
This reverts commit 450963c289fe ("ci: disable QEMUv8_check_rust job"). The optee_rust project has been updated in [1] and the Rust tests are now successful, therefore CI can be re-enabled.
Link: [1] https://github.com/OP-TEE/manifest/commit/beb79c27be83f7a4b90a898552569eb1a7638df8 Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 557fea2d | 15-Mar-2023 |
Jens Wiklander <jens.wiklander@linaro.org> |
Remove checked in .checkpatch-camelcase.git.
Removes a previously checked in copy of .checkpatch-camelcase.git.
Fixes: 0db2982068aa ("core: pta: imx: add manufacturing protection") Signed-off-by: J
Remove checked in .checkpatch-camelcase.git.
Removes a previously checked in copy of .checkpatch-camelcase.git.
Fixes: 0db2982068aa ("core: pta: imx: add manufacturing protection") Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| fdc4a8be | 09-Mar-2023 |
liushiwei <liushiwei@eswincomputing.com> |
ldelf: syscall: support RISC-V ldelf sycall
Added 32-bit and 64-bit RISC-V ldelf system calls.
Signed-off-by: liushiwei <liushiwei@eswincomputing.com> Acked-by: Jerome Forissier <jerome.forissier@l
ldelf: syscall: support RISC-V ldelf sycall
Added 32-bit and 64-bit RISC-V ldelf system calls.
Signed-off-by: liushiwei <liushiwei@eswincomputing.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Marouene Boubakri <marouene.boubakri@nxp.com>
show more ...
|
| 28849def | 13-Mar-2023 |
Jeffrey Kardatzke <jkardatzke@google.com> |
libutee: increase MPI_MEMPOOL_SIZE to 14Kb
With the Widevine v17/v18 OPKs using their new Provisioning 4.0 technique, this pool size needs to be increased to 14Kb from 12Kb.
The sequence that is be
libutee: increase MPI_MEMPOOL_SIZE to 14Kb
With the Widevine v17/v18 OPKs using their new Provisioning 4.0 technique, this pool size needs to be increased to 14Kb from 12Kb.
The sequence that is being executed that requires this is as follows: 1. TEE_GenerateKey(key_handle, 2048, NULL, 0) 2. TEE_GetObjectBufferAttribute(key, TEE_ATTR_RSA_MODULUS, modulus_data, &modulus_len), same for TEE_ATTR_RSA_PUBLIC_EXPONENT and TEE_ATTR_RSA_PRIVATE_EXPONENT. 3. mbedtls_rsa_complete() on a pk object created from the extracted modulus, public exp and private exp.
Signed-off-by: Jeffrey Kardatzke <jkardatzke@google.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 6e99433e | 08-Mar-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
core: remove keep pager directive on core_init_mmu_regs()
Function core_init_mmu_regs() does not need to be unpaged, it is needed at core initialization before MMU is setup. Remove DECLARE_KEEP_PAGE
core: remove keep pager directive on core_init_mmu_regs()
Function core_init_mmu_regs() does not need to be unpaged, it is needed at core initialization before MMU is setup. Remove DECLARE_KEEP_PAGER() directive (as done in core_mmu_lpae.c) as core_init_mmu_map() already brings core_init_mmu_regs() in the init sections.
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| dd884cc2 | 06-Mar-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
plat-stm32mp1: conf: support 32bit MMU
Updates CFG_TEE_RAM_VA_SIZE default value and MAX_XLAT_TABLES when 32bit-MMU mapping is used instead of LPAE and default disable LPAE for STM32MP15 with pager.
plat-stm32mp1: conf: support 32bit MMU
Updates CFG_TEE_RAM_VA_SIZE default value and MAX_XLAT_TABLES when 32bit-MMU mapping is used instead of LPAE and default disable LPAE for STM32MP15 with pager. This setup optimizes pager resident memory by about 4kB (1 physical page) in current platform default configuration.
Acked-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 1a3d47c5 | 08-Mar-2023 |
Etienne Carriere <etienne.carriere@linaro.org> |
clk: stm32mp15: embed clock names only in debug mode
Don't embed clock names when not in debug mode, even when log level is DEBUG_LEVEL. This saves few bytes of SYSRAM for the pager.
Acked-by: Gati
clk: stm32mp15: embed clock names only in debug mode
Don't embed clock names when not in debug mode, even when log level is DEBUG_LEVEL. This saves few bytes of SYSRAM for the pager.
Acked-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 41d9f6c2 | 07-Mar-2023 |
Jerome Forissier <jerome.forissier@linaro.org> |
libutee: add TEE_ALG_ECDSA_SHA* to TEE_ALG_GET_DIGEST_SIZE()
The TEE_ALG_GET_DIGEST_SIZE() macro lacks the ECDSA algorithms. Add them.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org>
libutee: add TEE_ALG_ECDSA_SHA* to TEE_ALG_GET_DIGEST_SIZE()
The TEE_ALG_GET_DIGEST_SIZE() macro lacks the ECDSA algorithms. Add them.
Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|