| d6dccfb0 | 20-Jan-2025 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "build: remove Windows compatibility layer" into integration |
| c3273703 | 13-Jan-2025 |
Chris Kay <chris.kay@arm.com> |
build: remove Windows compatibility layer
For a couple of releases now we have officially withdrawn support for building TF-A on Windows using the native environment, relying instead on POSIX emulat
build: remove Windows compatibility layer
For a couple of releases now we have officially withdrawn support for building TF-A on Windows using the native environment, relying instead on POSIX emulation layers like MSYS2, Mingw64, Cygwin or WSL.
This change removes the remainder of the OS compatibility layer entirely, and migrates the build system over to explicitly relying on a POSIX environment.
Change-Id: I8fb60d998162422e958009afd17eab826e3bc39b Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 42f024ab | 14-Jan-2025 |
dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> |
chore(deps): bump the pip group across 2 directories with 1 update
Bumps the pip group with 1 update in the / directory: [virtualenv](https://github.com/pypa/virtualenv). Bumps the pip group with 1
chore(deps): bump the pip group across 2 directories with 1 update
Bumps the pip group with 1 update in the / directory: [virtualenv](https://github.com/pypa/virtualenv). Bumps the pip group with 1 update in the /tools/tlc directory: [virtualenv](https://github.com/pypa/virtualenv).
Updates `virtualenv` from 20.26.4 to 20.26.6 - [Release notes](https://github.com/pypa/virtualenv/releases) - [Changelog](https://github.com/pypa/virtualenv/blob/main/docs/changelog.rst) - [Commits](https://github.com/pypa/virtualenv/compare/20.26.4...20.26.6)
Updates `virtualenv` from 20.26.5 to 20.26.6 - [Release notes](https://github.com/pypa/virtualenv/releases) - [Changelog](https://github.com/pypa/virtualenv/blob/main/docs/changelog.rst) - [Commits](https://github.com/pypa/virtualenv/compare/20.26.4...20.26.6)
--- updated-dependencies: - dependency-name: virtualenv dependency-type: indirect dependency-group: pip - dependency-name: virtualenv dependency-type: indirect dependency-group: pip ...
Change-Id: I368cd2a93d5e682f6117170d8cd8c7fa696a38d5 Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| f9275111 | 07-Jan-2025 |
dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> |
chore(deps): bump jinja2
Bumps the pip group with 1 update in the /tools/tlc directory: [jinja2](https://github.com/pallets/jinja).
Updates `jinja2` from 3.1.4 to 3.1.5 - [Release notes](https://gi
chore(deps): bump jinja2
Bumps the pip group with 1 update in the /tools/tlc directory: [jinja2](https://github.com/pallets/jinja).
Updates `jinja2` from 3.1.4 to 3.1.5 - [Release notes](https://github.com/pallets/jinja/releases) - [Changelog](https://github.com/pallets/jinja/blob/main/CHANGES.rst) - [Commits](https://github.com/pallets/jinja/compare/3.1.4...3.1.5)
--- updated-dependencies: - dependency-name: jinja2 dependency-type: direct:production dependency-group: pip ...
Change-Id: Ib7988c4ee21d6125c073d5b27241921b53a6cac4 Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 7260474f | 06-Jan-2025 |
Chris Kay <chris.kay@arm.com> |
chore(deps): update pytest for cot-dt2c
This resolves Dependabot vulnerability alert #19, resolving a DoS issue in a dependency of pytest.
Change-Id: I2959da88d3d0422e15d25df5820dfd91f474d6ca Signe
chore(deps): update pytest for cot-dt2c
This resolves Dependabot vulnerability alert #19, resolving a DoS issue in a dependency of pytest.
Change-Id: I2959da88d3d0422e15d25df5820dfd91f474d6ca Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| 0da16fe3 | 18-Sep-2024 |
Maxime Méré <maxime.mere@foss.st.com> |
fix(cert-create): add default keysize to Brainpool ECDSA
By default, the ECDSA Brainpool regular and ECDSA Brainpool twisted algorithms support 256-bit sized keys. Not defining this leads to an erro
fix(cert-create): add default keysize to Brainpool ECDSA
By default, the ECDSA Brainpool regular and ECDSA Brainpool twisted algorithms support 256-bit sized keys. Not defining this leads to an error indicating that '256' is not a valid key size for ECDSA Brainpool. KEY_SIZES matrix must have a value in its table to avoid problems when KEY_SIZE is defined.
Signed-off-by: Maxime Méré <maxime.mere@foss.st.com> Change-Id: I34886659315f59a9582dcee1d92d0e24d4a4138e
show more ...
|
| fcdab0dc | 16-Dec-2024 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "fix(encrypt-fw): put build_msg under LOG_LEVEL flag" into integration |
| 537a25ef | 02-Dec-2024 |
J-Alves <joao.alves@arm.com> |
fix(tlc): pass the flags from client interface
Provide the 'flags' from the arguments of the create command to the TransferList __init__ function.
This is so that the '--flags' argument to the tool
fix(tlc): pass the flags from client interface
Provide the 'flags' from the arguments of the create command to the TransferList __init__ function.
This is so that the '--flags' argument to the tool is actually used.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: Ic3f548e0ce7e704b3a12c2908f03d6a639bfa6f0
show more ...
|
| 7640df6f | 11-Dec-2024 |
Yann Gautier <yann.gautier@st.com> |
fix(encrypt-fw): put build_msg under LOG_LEVEL flag
In tools directory, contrary to other parts of TF-A code, LOG_LEVEL_NOTICE is 20, and LOG_LEVEL_ERROR is 10. If LOG_LEVEL is set to 10, which is t
fix(encrypt-fw): put build_msg under LOG_LEVEL flag
In tools directory, contrary to other parts of TF-A code, LOG_LEVEL_NOTICE is 20, and LOG_LEVEL_ERROR is 10. If LOG_LEVEL is set to 10, which is the case if BUILD_INFO=0, then we can have this compilation warning: src/main.c:29:19: warning: ‘build_msg’ defined but not used [-Wunused-const-variable=] 29 | static const char build_msg[] = "Built : " __TIME__ ", " __DATE__; | ^~~~~~~~~
Avoid that by putting it under '#if LOG_LEVEL >= LOG_LEVEL_NOTICE'.
Signed-off-by: Yann Gautier <yann.gautier@st.com> Change-Id: Ic724610d6df811fc889775dbd361087e0958d31e
show more ...
|
| f0e15ddc | 02-Dec-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(tlc): relax entry addition from YAML files
Relax entry addition from YAML files to allow the addition of entries not known to the tool. It is not possible to keep track of every possible TE, and
fix(tlc): relax entry addition from YAML files
Relax entry addition from YAML files to allow the addition of entries not known to the tool. It is not possible to keep track of every possible TE, and a user might want to add an entry that hasn't yet been specified.
Change-Id: Ib5d227bc41cd3dd8b530699c1bab3165a3114a3c Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| c4c8e26a | 20-Nov-2024 |
J-Alves <joao.alves@arm.com> |
feat(tlc): add --align argument
Extended the command line interface to receive an alignment argument.
TLC tool will align the data of the TEs accordingly.
Signed-off-by: J-Alves <joao.alves@arm.co
feat(tlc): add --align argument
Extended the command line interface to receive an alignment argument.
TLC tool will align the data of the TEs accordingly.
Signed-off-by: J-Alves <joao.alves@arm.com> Change-Id: I281b0b4c1851d58377bf6b31fcee03ee2f53367b
show more ...
|
| 03c2660f | 27-Nov-2024 |
J-Alves <joao.alves@arm.com> |
fix(tlc): add void entries to align data
Add void entries to ensure proper alignment of data in the TL, addressing runtime errors caused by previously unaccounted padding bytes between TE's.
Change
fix(tlc): add void entries to align data
Add void entries to ensure proper alignment of data in the TL, addressing runtime errors caused by previously unaccounted padding bytes between TE's.
Change-Id: Id2acee8f4df0dcc52eedc4372b962a51acb9d8ce Signed-off-by: J-Alves <joao.alves@arm.com> Co-authored-by:: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 5ca0241c | 29-Nov-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
fix(handoff): correct 8-bit modulo csum calculation
Fix the handoff 8-bit modulo checksum calculation to ensure we never get a checksum larger than 8 bits. The previous calculation failed to truncat
fix(handoff): correct 8-bit modulo csum calculation
Fix the handoff 8-bit modulo checksum calculation to ensure we never get a checksum larger than 8 bits. The previous calculation failed to truncate the sum at the final step in update_checksum
Change-Id: Ice0b72eb139af90f416adeff157d337646d6201a Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 157c6197 | 02-Dec-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(tlc): formalise random generation of TEs
To facillitate our testing, add some fixtures to make it easier to generate transfer entry data.
Change-Id: Ieb76e54e69f410f4f7e1b55fc2cff282e592d1a4 S
feat(tlc): formalise random generation of TEs
To facillitate our testing, add some fixtures to make it easier to generate transfer entry data.
Change-Id: Ieb76e54e69f410f4f7e1b55fc2cff282e592d1a4 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 5cc9bdd3 | 09-Dec-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "fix(cert-create): load openSSL configuration before PKCS11 operations" into integration |
| 55570563 | 05-Dec-2024 |
Yann Gautier <yann.gautier@st.com> |
Merge changes I04ecd50f,I830b53e2 into integration
* changes: fix(rcar3-drivers): disable A/B loader support by default fix(rcar-layout): fix tool build |
| 07a6a654 | 15-Nov-2024 |
Govindraj Raja <govindraj.raja@arm.com> |
docs(changelog): changelog for v2.12 release
Generated this change-log using below command: npm run release -- --skip.commit --skip.tag --release-as 2.12.0
Change-Id: Idb74f6a31bf2691e7666e2738030d
docs(changelog): changelog for v2.12 release
Generated this change-log using below command: npm run release -- --skip.commit --skip.tag --release-as 2.12.0
Change-Id: Idb74f6a31bf2691e7666e2738030d6f0e2b8c519 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 785c2c3e | 18-Oct-2024 |
Gatien Chevallier <gatien.chevallier@foss.st.com> |
fix(cert-create): load openSSL configuration before PKCS11 operations
On some version of openSSL (1.1.1 or 1.1.0), OPENSSL_init_crypto() called by ENGINE_load_builtin_engines() will not automaticall
fix(cert-create): load openSSL configuration before PKCS11 operations
On some version of openSSL (1.1.1 or 1.1.0), OPENSSL_init_crypto() called by ENGINE_load_builtin_engines() will not automatically load the configuration. Fix this behavior by calling OPENSSL_init_crypto with OPENSSL_INIT_LOAD_CONFIG as a parameter.
Signed-off-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Change-Id: I2e4c0d646e540d039e9c72fd7814384b17de6dd5
show more ...
|
| 72f4b70e | 09-Nov-2024 |
Marek Vasut <marek.vasut+renesas@mailbox.org> |
fix(rcar-layout): fix tool build
Since 2f1c5e7eb177 ("build: use GCC to link by default") the code does not even compile with GCC14 on debian/unstable with the following error:
/usr/lib/gcc-cross/a
fix(rcar-layout): fix tool build
Since 2f1c5e7eb177 ("build: use GCC to link by default") the code does not even compile with GCC14 on debian/unstable with the following error:
/usr/lib/gcc-cross/aarch64-linux-gnu/14/../../../../aarch64-linux-gnu/bin/ld: bootparam_sa0.elf: error: PHDR segment not covered by LOAD segment /usr/lib/gcc-cross/aarch64-linux-gnu/14/../../../../aarch64-linux-gnu/bin/ld: cert_header_sa6.elf: error: PHDR segment not covered by LOAD segment
Fix the tools build.
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: I830b53e23f25c62da3583c1c3e02e0607a237d15
show more ...
|
| 1297a45d | 25-Sep-2024 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge changes from topic "dynamic-toolchain" into integration
* changes: build: allow multiple toolchain defaults build: determine toolchain tools dynamically |
| 9b05c373 | 21-Aug-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(tlc): add command gen-header
Introduce the gen-header command to the tool, enabling developers to create language bindings. Currently, it supports generating C headers from a transfer list.
Ch
feat(tlc): add command gen-header
Introduce the gen-header command to the tool, enabling developers to create language bindings. Currently, it supports generating C headers from a transfer list.
Change-Id: Ibec75639c38577802d5abe55c7bc718740aad2b8 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| 38487c7f | 29-Aug-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
feat(tlc): add support for tox
Add tox to automate testing across multiple environments, ensuring code robustness and compatibility with different Python versions. This helps ensure consistency in t
feat(tlc): add support for tox
Add tox to automate testing across multiple environments, ensuring code robustness and compatibility with different Python versions. This helps ensure consistency in test environments so both development and CI systems run tests uniformly, and simplifies the execution of tasks like linting and other commands with a single command.
Change-Id: I522adb486e89abecb9a130941ce4cef31332193a Signed-off-by: Harrison Mutai <harrison.mutai@arm.com>
show more ...
|
| fd5b4bc3 | 15-Aug-2024 |
Harrison Mutai <harrison.mutai@arm.com> |
refactor(tlc): fix static check errors and code style
Change-Id: I8cbe5ee940d409ed3f81f792c2ade0b93287ae62 Signed-off-by: Harrison Mutai <harrison.mutai@arm.com> |
| 3789c3c0 | 03-Jun-2024 |
Chris Kay <chris.kay@arm.com> |
build: determine toolchain tools dynamically
Since the introduction of the toolchain detection framework into the build system, we have done determination and identification of the toolchain(s) used
build: determine toolchain tools dynamically
Since the introduction of the toolchain detection framework into the build system, we have done determination and identification of the toolchain(s) used for the build at the initialization of the build system.
This incurs a large cost to the build every time - for every toolchain that has been requested by the current makefile, we try to identify each tool in the list of known tool classes, even if that tool doesn't actually see any use.
For the clean and check-like targets we worked around this by disabling most of the toolchains if we detect these targets, but this is inflexible and not very reliable, and it still means that when building normal targets we are incurring that cost for all tools whether they are used or not.
This change instead modifies the toolchain detection framework to only initialize a tool for a given toolchain when it is first used. This does mean that we can no longer warn about an incorrectly-configured toolchain at the beginning of build system invocation, but it has the advantage of substantially reducing build time and the complexity of *using* the framework (at the cost of an increase in complexity in the framework itself).
Change-Id: I7f3d06b2eb58c1b26a846791a13b0037f32c8013 Signed-off-by: Chris Kay <chris.kay@arm.com>
show more ...
|
| ccbfd01d | 19-Jul-2024 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(tools): update the fiptool and certtool to fix POSIX build
This patch fixes below issue raised:
https://github.com/TrustedFirmware-A/trusted-firmware-a/issues/8 https://github.com/TrustedFirmwa
fix(tools): update the fiptool and certtool to fix POSIX build
This patch fixes below issue raised:
https://github.com/TrustedFirmware-A/trusted-firmware-a/issues/8 https://github.com/TrustedFirmware-A/trusted-firmware-a/issues/9 https://github.com/TrustedFirmware-A/trusted-firmware-a/issues/10
Change-Id: I521bf7410535ffe49198789ba183cc401b3b88a0 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|