| 6726390e | 10-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support AES Crypt Service
Enable Support for AES Crypt Service to send request to encrypt or decrypt a blob. Command will send a memory location that SDM will read and also memory locat
feat(intel): support AES Crypt Service
Enable Support for AES Crypt Service to send request to encrypt or decrypt a blob. Command will send a memory location that SDM will read and also memory location that SDM will write back after encryption or decryption operation. Response will be sent back after the crypto operation is done, and data is written back to the destination
Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I86ea4ff64dda2fbb1000591e30fa8cb2640ce954
show more ...
|
| c05ea296 | 10-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support HMAC SHA-2 MAC verify request
This command sends request on checking the integrity and authenticity of a blob by comparing the calculated MAC with tagged MAC. The comparison res
feat(intel): support HMAC SHA-2 MAC verify request
This command sends request on checking the integrity and authenticity of a blob by comparing the calculated MAC with tagged MAC. The comparison result will be returned in response.
Signed-off-by: Siew Chin Lim <elly.siew.chin.lim@intel.com> Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: Ifefdf67f088d7612d2ec2459d71faf2ec8181222
show more ...
|
| 7e8249a2 | 10-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support SHA-2 hash digest generation on a blob
This command is to request the SHA-2 hash digest on a blob. If input has a key, the output shall be key-hash digest.
Signed-off-by: Siew
feat(intel): support SHA-2 hash digest generation on a blob
This command is to request the SHA-2 hash digest on a blob. If input has a key, the output shall be key-hash digest.
Signed-off-by: Siew Chin Lim <elly.siew.chin.lim@intel.com> Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I08cb82d89a8e8f7bfe04f5f01e079ea49fe38cf5
show more ...
|
| 24f9dc8a | 10-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support extended random number generation
The random number generation (RNG) mailbox command format is updated to extends the support to upto 4080 bytes random number generation. The ne
feat(intel): support extended random number generation
The random number generation (RNG) mailbox command format is updated to extends the support to upto 4080 bytes random number generation. The new RNG format requires an opened crypto service session.
A separated SMC function ID is introduced for the new RNG format and it is only supported by Agilex.
Signed-off-by: Siew Chin Lim <elly.siew.chin.lim@intel.com> Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I3f044a3c01ff7cb50be4705e2c1f982bf6f61432
show more ...
|
| 342a0618 | 09-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support crypto service key operation
Support crypto service key operation mailbox commands through SMC.
Crypto service key operation begin by sending an open crypto service session req
feat(intel): support crypto service key operation
Support crypto service key operation mailbox commands through SMC.
Crypto service key operation begin by sending an open crypto service session request to SDM firmware. Once successfully open the session, send crypto service key management commands (import, export, remove and get key info) with the associated session id to SDM firmware. The crypto service key is required before perform any crypto service (encryption, signing, etc). Last, close the session after finishes crypto service. All crypto service keys associated with this session will be erased by SDM firmware.
Signed-off-by: Siew Chin Lim <elly.siew.chin.lim@intel.com> Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I02406533f38b9607eb1ec7e1395b9dc2d084a9e3
show more ...
|
| 6dc00c24 | 09-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): support crypto service session
Support crypto service open and close session mailbox commands through SMC.
Crypto service support begin by sending an open crypto service session reques
feat(intel): support crypto service session
Support crypto service open and close session mailbox commands through SMC.
Crypto service support begin by sending an open crypto service session request to SDM firmware. Last, close the session after finishes crypto service. All crypto service parameters with this session will be erased by SDM firmware.
Signed-off-by: Siew Chin Lim <elly.siew.chin.lim@intel.com> Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I48968498bbd6f2e71791f4ed38dd5f369e171082
show more ...
|
| 581182c1 | 09-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): extend attestation service to Agilex family
This patch extends the functionality of FPGA Crypto Services (FCS) to support FPGA Attestation feature in Agilex device.
Signed-off-by: Boon
feat(intel): extend attestation service to Agilex family
This patch extends the functionality of FPGA Crypto Services (FCS) to support FPGA Attestation feature in Agilex device.
Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I3c2e29d2fa04d394e9f65d8143d7f4e57389cd02
show more ...
|
| 49d44ec5 | 25-May-2021 |
Boon Khai Ng <boon.khai.ng@intel.com> |
fix(intel): flush dcache before sending certificate to mailbox
Due to the cache coherency issue the dcache need to flush before sending the certificate to the mailbox
Signed-off-by: Boon Khai Ng <b
fix(intel): flush dcache before sending certificate to mailbox
Due to the cache coherency issue the dcache need to flush before sending the certificate to the mailbox
Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I39d5144519d9c7308597698b4cbea1b8aba0a849
show more ...
|
| 651841f2 | 12-Apr-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): introduce a generic response error code
This patch will introduce a generic error code (0x3ff) to be used in case where Secure Device Manager (SDM) mailbox request is not failing (return
fix(intel): introduce a generic response error code
This patch will introduce a generic error code (0x3ff) to be used in case where Secure Device Manager (SDM) mailbox request is not failing (returns OK with no error code) but BL31 instead wants to return error/reject to the calling software. This value aligns with generic error code implemented in SDM for consistency.
Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I9894c7df8897fff9aa80970940a6f3f6bfa30bb7
show more ...
|
| 4837a640 | 06-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): allow non-secure access to FPGA Crypto Services (FCS)
Allows non-secure software to access FPGA Crypto Services (FCS) through secure monitor calls (SMC).
Signed-off-by: Abdul Halim, Muh
fix(intel): allow non-secure access to FPGA Crypto Services (FCS)
Allows non-secure software to access FPGA Crypto Services (FCS) through secure monitor calls (SMC).
Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I805b3f650abf5e118e2c55e469866d5d0ca68048
show more ...
|
| 7facacec | 11-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): single certificate feature enablement
Extend the functionality of FPGA Crypto Service (FCS) to support FPGA single certificate feature so that the counter value can be updated with only
feat(intel): single certificate feature enablement
Extend the functionality of FPGA Crypto Service (FCS) to support FPGA single certificate feature so that the counter value can be updated with only one preauthorized certificate
Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: Ibde87e4ee46367cf7f27f7bb0172838ab8766340
show more ...
|
| d1740831 | 11-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
feat(intel): initial commit for attestation service
This is to extend the functionality of FPGA Crypto Service (FCS) to support FPGA Attestation feature in Stratix 10 device.
Signed-off-by: Boon Kh
feat(intel): initial commit for attestation service
This is to extend the functionality of FPGA Crypto Service (FCS) to support FPGA Attestation feature in Stratix 10 device.
Signed-off-by: Boon Khai Ng <boon.khai.ng@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: Ib15783383dc9a06a2f0dc6dc1786f44b89f32cb1
show more ...
|
| 02d3ef33 | 11-May-2022 |
Sieu Mun Tang <sieu.mun.tang@intel.com> |
fix(intel): update encryption and decryption command logic
This change is to re-align HPS cryption logic with underlying Secure Device Manager's (SDM) mailbox API.
Signed-off-by: Abdul Halim, Muham
fix(intel): update encryption and decryption command logic
This change is to re-align HPS cryption logic with underlying Secure Device Manager's (SDM) mailbox API.
Signed-off-by: Abdul Halim, Muhammad Hadi Asyrafi <muhammad.hadi.asyrafi.abdul.halim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I8fc90982d3cddceaf401c1a112ff8e20861bf4c5
show more ...
|
| f0f631fd | 10-May-2022 |
Madhukar Pappireddy <madhukar.pappireddy@arm.com> |
Merge "feat(intel): add support for F2S and S2F bridge SMC with mask to enable, disable and reset bridge" into integration |
| f41a85e9 | 10-May-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(st): add missing header include" into integration |
| c3bdd3d3 | 09-May-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes Idfd268cd,I362445b9,Ibea052d3,I28cb8f74,I501ae76a, ... into integration
* changes: feat(imx8mp): enable BL32 fdt overlay support on imx8mp feat(imx8mq): enable optee fdt overlay su
Merge changes Idfd268cd,I362445b9,Ibea052d3,I28cb8f74,I501ae76a, ... into integration
* changes: feat(imx8mp): enable BL32 fdt overlay support on imx8mp feat(imx8mq): enable optee fdt overlay support feat(imx8mn): enable optee fdt overlay support feat(imx8mm): enable optee fdt overlay support feat(imx8mp): add trusty for imx8mp feat(imx8mq): enable trusty for imx8mq feat(imx8mn): enable Trusty OS for imx8mn feat(imx8mm): enable Trusty OS on imx8mm feat(imx8/imx8m): switch to xlat_tables_v2 feat(imx8m): enable the coram_s tz by default on imx8mn/mp feat(imx8m): enable the csu init on imx8m feat(imx8m): add a simple csu driver for imx8m family refactor(imx8m): replace magic number with enum type feat(imx8m): add imx csu/rdc enum type defines for imx8m fix(imx8m): check the validation of domain id feat(imx8m): enable conditional build for SDEI
show more ...
|
| 42f31f5f | 09-May-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(plat/imx8m): do not release JR0 to NS if HAB is using it" into integration |
| aeff1464 | 27-Mar-2020 |
Jacky Bai <ping.bai@nxp.com> |
feat(imx8mp): enable BL32 fdt overlay support on imx8mp
Allow OP-TEE to generate a device-tree overlay binary that will be applied by u-boot on the regular dtb.
Signed-off-by: Jacky Bai <ping.bai@n
feat(imx8mp): enable BL32 fdt overlay support on imx8mp
Allow OP-TEE to generate a device-tree overlay binary that will be applied by u-boot on the regular dtb.
Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: Idfd268cdd8b7ba321f8e1b9b85c2bba7ffdeddf0
show more ...
|
| 023750c6 | 25-Mar-2020 |
Silvano di Ninno <silvano.dininno@nxp.com> |
feat(imx8mq): enable optee fdt overlay support
Enable optee fdt overlay support
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I362
feat(imx8mq): enable optee fdt overlay support
Enable optee fdt overlay support
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I362445b93dc293a27c99b0d20a73f6b06ad0cd39
show more ...
|
| 26128912 | 25-Mar-2020 |
Silvano di Ninno <silvano.dininno@nxp.com> |
feat(imx8mn): enable optee fdt overlay support
Enable optee fdt overlay support.
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: Ibe
feat(imx8mn): enable optee fdt overlay support
Enable optee fdt overlay support.
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: Ibea052d35bf746475b8618b3a879eea80875333c
show more ...
|
| 9d0eed11 | 25-Mar-2020 |
Silvano di Ninno <silvano.dininno@nxp.com> |
feat(imx8mm): enable optee fdt overlay support
Enable optee fdt overlay support.
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I28
feat(imx8mm): enable optee fdt overlay support
Enable optee fdt overlay support.
Signed-off-by: Silvano di Ninno <silvano.dininno@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I28cb8f744236868727ef4a09d7d2946070404d4d
show more ...
|
| 8b9c21b4 | 09-Sep-2020 |
Jacky Bai <ping.bai@nxp.com> |
feat(imx8mp): add trusty for imx8mp
Add trusty support on i.MX8MP.
Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I501ae76ac35b8c059b3f0a9ce1d51ed13cbdbfe2 |
| a18e3933 | 21-Feb-2020 |
Ji Luo <ji.luo@nxp.com> |
feat(imx8mq): enable trusty for imx8mq
Add trusty support for imx8mq, default load address and size for trusty os will be 0xfe000000 and 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off
feat(imx8mq): enable trusty for imx8mq
Add trusty support for imx8mq, default load address and size for trusty os will be 0xfe000000 and 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I2b35ee525b25b80bf6c9599a0adcc2d9f069aa41
show more ...
|
| 99349c8e | 21-Feb-2020 |
Ji Luo <ji.luo@nxp.com> |
feat(imx8mn): enable Trusty OS for imx8mn
Add trusty support for imx8mn, default load address and size of trusty are 0xbe000000 and 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off-by:
feat(imx8mn): enable Trusty OS for imx8mn
Add trusty support for imx8mn, default load address and size of trusty are 0xbe000000 and 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I63fd5159027d7400b8c6bfc03193dd1330c43140
show more ...
|
| ff3acfe3 | 21-Feb-2020 |
Ji Luo <ji.luo@nxp.com> |
feat(imx8mm): enable Trusty OS on imx8mm
Add trusty support for imx8mm, default load address and size of trusty are 0xbe000000 anx 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off-by: J
feat(imx8mm): enable Trusty OS on imx8mm
Add trusty support for imx8mm, default load address and size of trusty are 0xbe000000 anx 0x2000000.
Signed-off-by: Ji Luo <ji.luo@nxp.com> Signed-off-by: Jacky Bai <ping.bai@nxp.com> Change-Id: I3f8b1adc08933e38a39f1ab1723947319d19a703
show more ...
|