| #
58087662 |
| 31-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "refactor-arm-key-files" into integration
* changes: feat(mbedtls): optimize SHA256 for reduced memory footprint refactor(arm): rename ARM_ROTPK_HEADER_LEN docs(arm):
Merge changes from topic "refactor-arm-key-files" into integration
* changes: feat(mbedtls): optimize SHA256 for reduced memory footprint refactor(arm): rename ARM_ROTPK_HEADER_LEN docs(arm): update docs to reflect rotpk key changes feat(arm): use provided algs for (swd/p)rotpk feat(arm): use the provided hash alg to hash rotpk
show more ...
|
| #
bd9b01c6 |
| 13-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
refactor(arm): rename ARM_ROTPK_HEADER_LEN
This variable had a misleading name, as it is the length of the header only when the ROTPK is a hash. Also rename arm_rotpk_header to match the new pattern
refactor(arm): rename ARM_ROTPK_HEADER_LEN
This variable had a misleading name, as it is the length of the header only when the ROTPK is a hash. Also rename arm_rotpk_header to match the new pattern.
Change-Id: I36c29998eebf50c356a6ca959ec9223c8837b540 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| #
d51981e1 |
| 11-Nov-2024 |
Ryan Everett <ryan.everett@arm.com> |
feat(arm): use the provided hash alg to hash rotpk
No longer hard code SHA-256 hashed dev rotpks, instead use the algorithm given by HASH_ALG. This means that we no longer need the plat_arm_configs
feat(arm): use the provided hash alg to hash rotpk
No longer hard code SHA-256 hashed dev rotpks, instead use the algorithm given by HASH_ALG. This means that we no longer need the plat_arm_configs (once the protpk and swd_rotpk are also updated to use HASH_ALG).
The rot public key is now generated at build time, as is the header for the key.
Also support some default 3k and 4k RSA keys.
Change-Id: I33538124aeb4fa7d67918d878d17f2a84d3a6756 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| #
11190c1b |
| 10-Jan-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes from topic "cpu_trp_rotpk_fixes" into integration
* changes: fix(rotpk): move rotpk definitions out of arm_def.h feat(cpu): add support for Poseidon V CPU fix(cpu): correct varia
Merge changes from topic "cpu_trp_rotpk_fixes" into integration
* changes: fix(rotpk): move rotpk definitions out of arm_def.h feat(cpu): add support for Poseidon V CPU fix(cpu): correct variant name for default Poseidon CPU fix(rmmd): avoid TRP when external RMM is defined
show more ...
|
| #
0f0fd499 |
| 26-Dec-2023 |
Rohit Mathew <Rohit.Mathew@arm.com> |
fix(rotpk): move rotpk definitions out of arm_def.h
The file arm_def.h currently contains common definitions used by ARM platforms. However, some platforms may have their own definitions, allowing t
fix(rotpk): move rotpk definitions out of arm_def.h
The file arm_def.h currently contains common definitions used by ARM platforms. However, some platforms may have their own definitions, allowing them to avoid a direct dependency on arm_def.h. For a clean platform port of arm_def.h, none of the source files should directly include arm_def.h; instead, they should include the platform header which would indirectly include the required definitions.
Presently, the rotpk module has a source file that directly includes arm_def.h. This could lead to compilation issues if the platform incorporating the rotpk module has a separate implementation of some or all of the definitions in arm_def.h file. To address this, move the relevant definitions out of arm_def.h and into rotpk_def.h.
Signed-off-by: Rohit Mathew <Rohit.Mathew@arm.com> Change-Id: I9e8b0d319391f9a167af5c69a7b2d42ac488e7b4
show more ...
|
| #
0312769f |
| 06-Dec-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "refactor(arm): remove unused global" into integration
|
| #
d8359cfa |
| 04-Dec-2022 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
refactor(arm): remove unused global
Removed unused global from the assembly file.
Change-Id: I17ab70aa888af27865a9fb4436495197f460780f Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
|
| #
24872370 |
| 15-Feb-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "ea/corstone1000" into integration
* changes: feat(corstone1000): identify bank to load fip fix(corstone1000): change base address of FIP in the flash feat(corstone100
Merge changes from topic "ea/corstone1000" into integration
* changes: feat(corstone1000): identify bank to load fip fix(corstone1000): change base address of FIP in the flash feat(corstone1000): implement platform specific psci reset feat(corstone1000): made changes to accommodate 3MB for optee build(corstone1000): rename diphda to corstone1000
show more ...
|
| #
0260eb0d |
| 19-Jan-2022 |
Vishnu Banavath <vishnu.banavath@arm.com> |
build(corstone1000): rename diphda to corstone1000
diphda platform is now being renamed to corstone1000. These changes are to replace all the instances and traces of diphda corstone1000.
Change-Id
build(corstone1000): rename diphda to corstone1000
diphda platform is now being renamed to corstone1000. These changes are to replace all the instances and traces of diphda corstone1000.
Change-Id: I330f3a112d232b99b4721b6bf0236253b068dbba Signed-off-by: Arpita S.K <Arpita.S.K@arm.com> Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com>
show more ...
|
| #
d55d8309 |
| 23-Jul-2021 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge changes from topic "diphda" into integration
* changes: feat: disabling non volatile counters in diphda feat: adding the diphda platform
|
| #
bf3ce993 |
| 21-Apr-2021 |
Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> |
feat: adding the diphda platform
This commit enables trusted-firmware-a with Trusted Board Boot support for the Diphda 64-bit platform.
Diphda uses a FIP image located in the flash. The FIP contain
feat: adding the diphda platform
This commit enables trusted-firmware-a with Trusted Board Boot support for the Diphda 64-bit platform.
Diphda uses a FIP image located in the flash. The FIP contains the following components:
- BL2 - BL31 - BL32 - BL32 SPMC manifest - BL33 - The TBB certificates
The board boot relies on CoT (chain of trust). The trusted-firmware-a BL2 is extracted from the FIP and verified by the Secure Enclave processor. BL2 verification relies on the signature area at the beginning of the BL2 image. This area is needed by the SecureEnclave bootloader.
Then, the application processor is released from reset and starts by executing BL2.
BL2 performs the actions described in the trusted-firmware-a TBB design document.
Signed-off-by: Rui Miguel Silva <rui.silva@arm.com> Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> Change-Id: Iddb1cb9c2a0324a9635e23821c210ac81dfc305d
show more ...
|
| #
350aed43 |
| 07-Feb-2020 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "Adds option to read ROTPK from registers for FVP" into integration
|
| #
a6ffddec |
| 06-Dec-2019 |
Max Shvetsov <maksims.svecovs@arm.com> |
Adds option to read ROTPK from registers for FVP
Enables usage of ARM_ROTPK_LOCATION=regs for FVP board. Removes hard-coded developer keys. Instead, setting ARM_ROTPK_LOCATION=devel_* takes keys fro
Adds option to read ROTPK from registers for FVP
Enables usage of ARM_ROTPK_LOCATION=regs for FVP board. Removes hard-coded developer keys. Instead, setting ARM_ROTPK_LOCATION=devel_* takes keys from default directory. In case of ROT_KEY specified - generates a new hash and replaces the original.
Note: Juno board was tested by original feature author and was not tested for this patch since we don't have access to the private key. Juno implementation was moved to board-specific file without changing functionality. It is not known whether byte-swapping is still needed for this platform.
Change-Id: I0fdbaca0415cdcd78f3a388551c2e478c01ed986 Signed-off-by: Max Shvetsov <maksims.svecovs@arm.com>
show more ...
|