| #
d1aecd46 |
| 02-Oct-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): update the AES GCM/GCM_GHASH modes return data size" into integration
|
| #
8e476852 |
| 08-Aug-2025 |
Girisha Dengi <girisha.dengi@altera.com> |
fix(intel): update the AES GCM/GCM_GHASH modes return data size
On the Agilex5 platform, in FCS AES method if block mode is GCM/GCM_GHASH mode then the data size written to the destination buffer is
fix(intel): update the AES GCM/GCM_GHASH modes return data size
On the Agilex5 platform, in FCS AES method if block mode is GCM/GCM_GHASH mode then the data size written to the destination buffer is at index[7] instead of [3] as in other cases.
Change-Id: Ide664f594ea63aaee7f74d21e8e2986de48e94a2 Signed-off-by: Girisha Dengi <girisha.dengi@altera.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
da6b3a18 |
| 21-Aug-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): add missing cache flush operation for hmac" into integration
|
| #
13630966 |
| 23-May-2025 |
Mahesh Rao <mahesh.rao@altera.com> |
fix(intel): add missing cache flush operation for hmac
Add missing cache flush operation for HMAC verify operation.Also update the code to query the correct buffer for the final result of HMAC veri
fix(intel): add missing cache flush operation for hmac
Add missing cache flush operation for HMAC verify operation.Also update the code to query the correct buffer for the final result of HMAC verify operation.
Change-Id: I85208765313b9048cfef13727d280dca8af6d548 Signed-off-by: Mahesh Rao <mahesh.rao@altera.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
6d36b699 |
| 19-Aug-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): flush the mailbox response buffer in SiPSVC V3" into integration
|
| #
cb3ceb53 |
| 06-May-2025 |
Girisha Dengi <girisha.dengi@intel.com> |
fix(intel): flush the mailbox response buffer in SiPSVC V3
In SiPSVC V3, the user suppiled buffer will be directly used for collecting the response from SDM mailbox - this way we can avoid keeping t
fix(intel): flush the mailbox response buffer in SiPSVC V3
In SiPSVC V3, the user suppiled buffer will be directly used for collecting the response from SDM mailbox - this way we can avoid keeping the response local copy in the TF-A and improve performance. Once the response is collected in the user buffer, we need to FLUSH to maintain coherency.
Change-Id: I265ce177fe42d7ab647c875d52286de4b998672d Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
f3083e2e |
| 07-Aug-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "feat(intel): move common functions to common lib files" into integration
|
| #
6fcd047b |
| 07-Apr-2025 |
Jit Loon Lim <jit.loon.lim@altera.com> |
feat(intel): move common functions to common lib files
This patch is used to move common functions that used across files into commmon lib files to prevent multiple functions declaration and share a
feat(intel): move common functions to common lib files
This patch is used to move common functions that used across files into commmon lib files to prevent multiple functions declaration and share among files.
Change-Id: I19d9727eac895e7bf597a66076a7b68755cbe0ef Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
18091f72 |
| 06-Jun-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): support SMC 64bit return args in SiPSVC V3" into integration
|
| #
8938a34f |
| 06-Jun-2025 |
Mark Dykes <mark.dykes@arm.com> |
Merge changes I23e51bf9,I0fa9adaf into integration
* changes: fix(intel): verify data size in AES GCM and GCM-GHASH modes fix(intel): update FCS AES method for GCM block modes
|
| #
cdab4018 |
| 20-Apr-2025 |
Girisha Dengi <girisha.dengi@intel.com> |
fix(intel): support SMC 64bit return args in SiPSVC V3
Update SiPSVC V3 framework to support 64bit SMC return arguments and other miscellaneous debug prints.
Change-Id: I659a0aea8e24eb5876e69327e44
fix(intel): support SMC 64bit return args in SiPSVC V3
Update SiPSVC V3 framework to support 64bit SMC return arguments and other miscellaneous debug prints.
Change-Id: I659a0aea8e24eb5876e69327e44a667d2a54c241 Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
34f092a1 |
| 21-Mar-2025 |
Girisha Dengi <girisha.dengi@intel.com> |
fix(intel): verify data size in AES GCM and GCM-GHASH modes
On the Agilex5 platform, in the FCS AES GCM and GCM-GHASH modes enc/dec data size should be 0 or multiple of 16bytes.
Change-Id: I23e51bf
fix(intel): verify data size in AES GCM and GCM-GHASH modes
On the Agilex5 platform, in the FCS AES GCM and GCM-GHASH modes enc/dec data size should be 0 or multiple of 16bytes.
Change-Id: I23e51bf942771e74d16f8a87fbfdbf36ef3c3893 Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
1e1dbad0 |
| 12-Mar-2025 |
Girisha Dengi <girisha.dengi@intel.com> |
fix(intel): update FCS AES method for GCM block modes
On the Agilex5 platform, AES enc/dec with GCM and GCM-GHASH modes, the source and destination size should be in multiples of 16 bytes. For other
fix(intel): update FCS AES method for GCM block modes
On the Agilex5 platform, AES enc/dec with GCM and GCM-GHASH modes, the source and destination size should be in multiples of 16 bytes. For other platforms and other modes, it should be in multiples of 32 bytes.
Change-Id: I0fa9adafb5d7fc4c794a4acb9339cf8259df0c78 Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@altera.com>
show more ...
|
| #
e86efe4b |
| 31-Mar-2025 |
Yann Gautier <yann.gautier@st.com> |
Merge changes I1dfb95aa,I9eb61c48 into integration
* changes: feat(intel): support FCS commands with SiPSVC V3 framework feat(intel): implementation of SiPSVC-V3 protocol framework
|
| #
597fff5f |
| 15-Nov-2024 |
Girisha Dengi <girisha.dengi@intel.com> |
feat(intel): support FCS commands with SiPSVC V3 framework
Support all the FCS(FPGA Crypto Service) commands with SiPSVC verson3 framework.
Change-Id: I1dfb95aaddf7111325ce0082eb26f7a201001141 Sign
feat(intel): support FCS commands with SiPSVC V3 framework
Support all the FCS(FPGA Crypto Service) commands with SiPSVC verson3 framework.
Change-Id: I1dfb95aaddf7111325ce0082eb26f7a201001141 Signed-off-by: Girisha Dengi <girisha.dengi@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@altera.com>
show more ...
|
| #
97d48be0 |
| 30-Aug-2024 |
Mark Dykes <mark.dykes@arm.com> |
Merge "fix(intel): update memcpy to memcpy_s" into integration
|
| #
e264b557 |
| 25-Aug-2024 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce
fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
show more ...
|
| #
bb31fbce |
| 10-Jan-2024 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update fcs crypto init code to check for mode" into integration
|
| #
4cae77d2 |
| 19-Dec-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update fcs functions to check ddr range" into integration
|
| #
e8a3454c |
| 17-Nov-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update fcs functions to check ddr range
The src addr and dest addr of fcs functions are not checked against their valid ddr range. Thus adding the ddr range checking to avoid overlap/ove
fix(intel): update fcs functions to check ddr range
The src addr and dest addr of fcs functions are not checked against their valid ddr range. Thus adding the ddr range checking to avoid overlap/overwritten ddr address.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I9b4d4155dd16d9d5d36e0c91e4a2600c17867daf
show more ...
|
| #
b0f44789 |
| 13-Sep-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update fcs crypto init code to check for mode
The shall code only limit ECB, CBC and CTR mode to flow through the init function. Anything other than that, the code shall reject to preven
fix(intel): update fcs crypto init code to check for mode
The shall code only limit ECB, CBC and CTR mode to flow through the init function. Anything other than that, the code shall reject to prevent security vulnerability.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I702ce90e229188830f8936bee2999610e9559b8b
show more ...
|
| #
2abbb457 |
| 24-May-2023 |
Sandrine Bailleux <sandrine.bailleux@arm.com> |
Merge "fix(intel): update checking for memcpy and memset" into integration
|
| #
c418064e |
| 17-May-2023 |
Jit Loon Lim <jit.loon.lim@intel.com> |
fix(intel): update checking for memcpy and memset
Add checking on the size of source data does not exceed source size when using memcpy and memset.
Add checking on the size of source data in FPGA C
fix(intel): update checking for memcpy and memset
Add checking on the size of source data does not exceed source size when using memcpy and memset.
Add checking on the size of source data in FPGA Crypto Service does not exceed the maximum of expected data size and does not meet the minimum of expected data size.
Signed-off-by: Phui Kei Wong <phui.kei.wong@intel.com> Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Change-Id: Idb18f05c18d9142fbe703c3f4075341d179d8bad
show more ...
|
| #
4bd8c929 |
| 09-May-2023 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes I1bfa797e,I0ec7a70e into integration
* changes: fix(tree): correct some typos fix(rockchip): use semicolon instead of comma
|
| #
1b491eea |
| 13-Feb-2023 |
Elyes Haouas <ehaouas@noos.fr> |
fix(tree): correct some typos
found using codespell (https://github.com/codespell-project/codespell).
Signed-off-by: Elyes Haouas <ehaouas@noos.fr> Change-Id: I1bfa797e3460adddeefa916bb68e22beddaf6
fix(tree): correct some typos
found using codespell (https://github.com/codespell-project/codespell).
Signed-off-by: Elyes Haouas <ehaouas@noos.fr> Change-Id: I1bfa797e3460adddeefa916bb68e22beddaf6373
show more ...
|