| #
7dc43344 |
| 11-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "update-mbedtls-to-3.6.2" into integration
* changes: feat(mbedtls): mbedtls config update for v3.6.2 docs(prerequisites): update mbedtls to version 3.6.2 refactor(mbe
Merge changes from topic "update-mbedtls-to-3.6.2" into integration
* changes: feat(mbedtls): mbedtls config update for v3.6.2 docs(prerequisites): update mbedtls to version 3.6.2 refactor(mbedtls): rename default mbedtls confs
show more ...
|
| #
640ba634 |
| 09-Dec-2024 |
Ryan Everett <ryan.everett@arm.com> |
refactor(mbedtls): rename default mbedtls confs
Change the name of these confs to be version agnostic, we will later use these configs to enforce the mbedtls minimum version
Change-Id: I1f665c24718
refactor(mbedtls): rename default mbedtls confs
Change the name of these confs to be version agnostic, we will later use these configs to enforce the mbedtls minimum version
Change-Id: I1f665c2471877ecc833270c511749ff845046f10 Signed-off-by: Ryan Everett <ryan.everett@arm.com>
show more ...
|
| #
0631d68d |
| 09-Sep-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge "fix(arm): add extra hash config to validate ROTPK" into integration
|
| #
014975ce |
| 06-Sep-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(arm): add extra hash config to validate ROTPK
The default mbedTLS configuration enables hash algorithms based on the HASH_ALG or MBOOT_EL_HASH_ALG selected. However, the Arm ROTPK is always embe
fix(arm): add extra hash config to validate ROTPK
The default mbedTLS configuration enables hash algorithms based on the HASH_ALG or MBOOT_EL_HASH_ALG selected. However, the Arm ROTPK is always embedded as a SHA256 hash in BL1 and BL2. In the future, we may need to adjust this to use the HASH_ALG algorithm for embedding the ROTPK hash.
As a temporary workaround, a separate mbedTLS configuration has been created for Arm platforms to explicitly set SHA256 defines, rather than relying on the default configuration. This adjustment is reflected in the mbedTLS configuration file for the TC platform as well as in the PSA Crypto configuration file.
Change-Id: Ib3128ce7b0fb5c0858624ecbc998d456968beddf Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| #
02088b64 |
| 15-Feb-2024 |
Olivier Deprez <olivier.deprez@arm.com> |
Merge changes from topic "mb/tc-model-update" into integration
* changes: docs: update FVP TC2 model version and build (11.23/17) fix(tc): increase BL2 maximum size limit refactor(tc): update
Merge changes from topic "mb/tc-model-update" into integration
* changes: docs: update FVP TC2 model version and build (11.23/17) fix(tc): increase BL2 maximum size limit refactor(tc): update platform tests feat(rss): add defines for 'type' range and use them in psa_call() feat(rss): adjust parameter packing to match TF-M changes refactor(tc): remap console logs
show more ...
|
| #
a93bf0aa |
| 22-Dec-2023 |
David Vincze <david.vincze@arm.com> |
refactor(tc): update platform tests
Update the TC's platform test Makefile and related common definitions to correspond to newer TF-M code (commit hash: 4ab7a20).
Change-Id: I6ef3effe194a780a0533f9
refactor(tc): update platform tests
Update the TC's platform test Makefile and related common definitions to correspond to newer TF-M code (commit hash: 4ab7a20).
Change-Id: I6ef3effe194a780a0533f9c0c2eab9d0f4efc1fc Signed-off-by: David Vincze <david.vincze@arm.com>
show more ...
|
| #
c9484b4f |
| 05-Dec-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(tc): provide a mock mbedtls-random generation function" into integration
|
| #
a8778185 |
| 18-Oct-2023 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
feat(tc): provide a mock mbedtls-random generation function
Simulated the utilization of an external RNG through the MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG configuration option in mbedTLS. Consequently, an
feat(tc): provide a mock mbedtls-random generation function
Simulated the utilization of an external RNG through the MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG configuration option in mbedTLS. Consequently, an implementation of mbedtls_psa_external_get_random() is provided. Given the absence of actual external RNG support, we provide a mock implementation by utilizing the system counter to fill the the buffer to provide a random number, specifically tailored for the use exclusively within the TF-M testsuite. While this method is not ideal for generating random numbers, alternatives like the 'rand' library function are not feasible due to lack of support in TF-A. Additionally, the architectural 'rand' instruction is not viable, as it is only supported for platforms with Armv8.5-a+ architecture as an optional feature. mbedtls_psa_external_get_random() function comes into play during the exportation of the public portion of the delegated attestation key.
This helps in using mbedTLS-3.4.1 for running the delegated attestation tests on TC platform.
Change-Id: Ifcf4e3231aad93595e00c353a4b0c606c0ef9fc2 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| #
49246670 |
| 02-May-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge changes Ia1142b31,I424f1cde into integration
* changes: fix(tc): enable the execution of both platform tests fix(tc): update the name of mbedtls config header
|
| #
d5fc8992 |
| 21-Apr-2023 |
Tamas Ban <tamas.ban@arm.com> |
fix(tc): update the name of mbedtls config header
Recently mbedtls_cofig.h was renamed to: - mbedtls_config-2.h - mbedtls_config-3.h
Modify the include order to resolve the static check failure i
fix(tc): update the name of mbedtls config header
Recently mbedtls_cofig.h was renamed to: - mbedtls_config-2.h - mbedtls_config-3.h
Modify the include order to resolve the static check failure in the CI.
Signed-off-by: Tamas Ban <tamas.ban@arm.com> Change-Id: I424f1cde199397b8df780a9514f1042e601c6502
show more ...
|
| #
15a6c959 |
| 20-Dec-2022 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "feat(tc): add delegated attest and measurement tests" into integration
|
| #
25dd2172 |
| 21-Oct-2022 |
Mate Toth-Pal <mate.toth-pal@arm.com> |
feat(tc): add delegated attest and measurement tests
This patch adds Delegated Attestation and Measured Boot tests to the plat/arm/board/tc platform. The test suite can be activated by adding the bu
feat(tc): add delegated attest and measurement tests
This patch adds Delegated Attestation and Measured Boot tests to the plat/arm/board/tc platform. The test suite can be activated by adding the build time option `PLATFORM_TEST=1` to the make command. In this case the boot sequence is not finished, plat_error_handler is called after the tests are run (regardless of the test result.)
The actual test code is coming from the Trusted-Firmware-M project. Some of the files of the tf-m-tests and tf-m-extras repo are linked to the BL31 image.
Versions used for testing: https://git.trustedfirmware.org/TF-M/tf-m-tests 614e8c358377e4146e8ee13d1246e59d01b4bf1b
https: //git.trustedfirmware.org/TF-M/tf-m-extras 3be9fdd557e6df449de93c2101973fb011699b3d
Change-Id: I98f0f5f760a39d2d7e0dd11d33663ddb75f0b6fc Signed-off-by: Mate Toth-Pal <mate.toth-pal@arm.com>
show more ...
|