| 89c07747 | 05-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
feat(stm32mp1): update ROM code API for header v2 management
Add the new definition field for authentication used in header V2 on STM32MP13.
Change-Id: Id8f0c2584ca9b74b0d21d82c9a98d286500548c4 Sig
feat(stm32mp1): update ROM code API for header v2 management
Add the new definition field for authentication used in header V2 on STM32MP13.
Change-Id: Id8f0c2584ca9b74b0d21d82c9a98d286500548c4 Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| f30034a2 | 05-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
feat(stm32mp1): remove unused function from boot API
Remove old library access from ROM library that is no more used.
Change-Id: I9b91f1efd6ff9d311b69ca36f60474f01268c221 Signed-off-by: Lionel Debi
feat(stm32mp1): remove unused function from boot API
Remove old library access from ROM library that is no more used.
Change-Id: I9b91f1efd6ff9d311b69ca36f60474f01268c221 Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 87dfbd71 | 05-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
refactor(stm32mp1): remove authentication using STM32 image mode
Remove deprecated authentication mode to use the FIP authentication based on TBBR requirements. It will use the new crypto library.
refactor(stm32mp1): remove authentication using STM32 image mode
Remove deprecated authentication mode to use the FIP authentication based on TBBR requirements. It will use the new crypto library.
Change-Id: I95c7baa64ba42c370ae136f59781f2a7a4c7f507 Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 381f465c | 05-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
fix(fconf): fix type error displaying disable_auth
disable_auth is defined as uint32_t and must be displayed as an unsigned int.
lib/fconf/fconf_tbbr_getter.c: In function ‘fconf_populate_tbbr_dyn_
fix(fconf): fix type error displaying disable_auth
disable_auth is defined as uint32_t and must be displayed as an unsigned int.
lib/fconf/fconf_tbbr_getter.c: In function ‘fconf_populate_tbbr_dyn_config’: include/common/debug.h:46:41: error: format ‘%d’ expects argument of type ‘int’, but argument 3 has type ‘uint32_t’ {aka ‘unsigned int’} [-Werror=format=] 46 | #define LOG_MARKER_WARNING "\x1e" /* 30 */ | ^~~~~~ include/common/debug.h:77:32: note: in expansion of macro ‘LOG_MARKER_WARNING’ 77 | # define WARN(...) tf_log(LOG_MARKER_WARNING __VA_ARGS__) | ^~~~~~~~~~~~~~~~~~ lib/fconf/fconf_tbbr_getter.c:47:17: note: in expansion of macro ‘WARN’ 47 | WARN("Invalid value for `%s` cell %d\n", | ^~~~ include/common/debug.h:48:41: error: format ‘%d’ expects argument of type ‘int’, but argument 5 has type ‘uint32_t’ {aka ‘unsigned int’} [-Werror=format=] 48 | #define LOG_MARKER_VERBOSE "\x32" /* 50 */ | ^~~~~~ include/common/debug.h:58:32: note: in definition of macro ‘no_tf_log’ 58 | tf_log(fmt, ##__VA_ARGS__); \ | ^~~ include/common/debug.h:91:35: note: in expansion of macro ‘LOG_MARKER_VERBOSE’ 91 | # define VERBOSE(...) | no_tf_log(LOG_MARKER_VERBOSE __VA_ARGS__) | ^~~~~~~~~~~~~~~~~~ lib/fconf/fconf_tbbr_getter.c:74:9: note: in expansion of macro ‘VERBOSE’ 74 | VERBOSE("%s%s%s %d\n","FCONF: `tbbr.", "disable_auth", | ^~~~~~~ cc1: all warnings being treated as errors
Change-Id: I0164ddfe511406cc1a8d014a368ef3e3c5f8cd27 Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 1ef303f9 | 17-Nov-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
feat(tbbr): increase PK_DER_LEN size
Public key brainpool ECDSA DER certificate are 92 byte long. OID for brainpool curve are 1 byte bigger than the one for NIST curve.
Change-Id: Ifad51da3c576d555
feat(tbbr): increase PK_DER_LEN size
Public key brainpool ECDSA DER certificate are 92 byte long. OID for brainpool curve are 1 byte bigger than the one for NIST curve.
Change-Id: Ifad51da3c576d555da9fc519d2df3d9a0e6ed91b Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
show more ...
|
| ed38366f | 23-Dec-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
fix(auth): correct sign-compare warning
Correct the warning due to comparison between signed and unsigned variable.
drivers/auth/mbedtls/mbedtls_x509_parser.c: In function 'get_ext': drivers/auth/m
fix(auth): correct sign-compare warning
Correct the warning due to comparison between signed and unsigned variable.
drivers/auth/mbedtls/mbedtls_x509_parser.c: In function 'get_ext': drivers/auth/mbedtls/mbedtls_x509_parser.c:120:30: error: comparison of integer expressions of different signedness: 'int' and 'size_t' {aka 'unsigned int'} [-Werror=sign-compare] 120 | if ((oid_len == strlen(oid_str)) && !strcmp(oid, oid_str)) { | ^~
Change-Id: Ic12527f5f92a34e925bee3047c168eacf5e99d8a Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
show more ...
|
| 40f9f644 | 09-Nov-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
feat(auth): allow to verify PublicKey with platform format PK
In some platform the digest of the public key saved in the OTP is not the digest of the exact same public key buffer needed to check the
feat(auth): allow to verify PublicKey with platform format PK
In some platform the digest of the public key saved in the OTP is not the digest of the exact same public key buffer needed to check the signature. Typically, platform checks signature using the DER ROTPK whereas some others add some related information. Add a new platform weak function to transform the public key buffer used by verify_signature to a platform specific public key.
Mark this new weak function as deprecated as it will be replaced by another framework implementation.
Change-Id: I71017b41e3eca9398cededf317ad97e9b511be5f Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| e78ba69e | 14-Nov-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
feat(cert-create): update for ECDSA brainpoolP256r/t1 support
Updated cert_tool to be able to select brainpool P256r/t1 or NIST prim256v1 curve for certificates signature.
Change-Id: I6e80014469706
feat(cert-create): update for ECDSA brainpoolP256r/t1 support
Updated cert_tool to be able to select brainpool P256r/t1 or NIST prim256v1 curve for certificates signature.
Change-Id: I6e800144697069ea83660053b8ba6e21c229243a Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 84498ad1 | 14-Nov-2022 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes I5838964f,Id752c1cc,Idd42d5a2,Iff4680cd,I2b1801a7, ... into integration
* changes: fix(mt8188): add mmap entry for CPU idle SRAM fix(mt8188): refine gic init flow after system resu
Merge changes I5838964f,Id752c1cc,Idd42d5a2,Iff4680cd,I2b1801a7, ... into integration
* changes: fix(mt8188): add mmap entry for CPU idle SRAM fix(mt8188): refine gic init flow after system resume fix(mt8186): fix the DRAM voltage after the system resumes feat(mt8188): add audio support refactor(mt8195): use ptp3 common drivers feat(mt8188): add support for PTP3 feat(mt8188): enable MTK_PUBEVENT_ENABLE
show more ...
|
| db1c6faa | 03-Nov-2022 |
Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com> |
refactor(trng): discarding the used entropy bits
This patch discards all the used entropy bits from the global memory pool after being delivered to the requester (lower exception levels) by overwrit
refactor(trng): discarding the used entropy bits
This patch discards all the used entropy bits from the global memory pool after being delivered to the requester (lower exception levels) by overwriting them with zeroes. It effectively implements the requirement, as part of TRNG FW interface listed at DEN0098 (section 1.2). https://developer.arm.com/documentation/den0098/latest
Change-Id: I447cbccc1a8ad972418a3569c99f010189d4b2f6 Signed-off-by: Jayanth Dodderi Chidanand <jayanthdodderi.chidanand@arm.com>
show more ...
|
| 27423744 | 02-Dec-2020 |
Nicolas Le Bayon <nicolas.le.bayon@foss.st.com> |
feat(stm32mp1): add RNG initialization in BL2 for STM32MP13
Initialize RNG driver at platform level for STM32MP13.
Change-Id: I64832de43e5f6559a12e26680142db54c88f0b9e Signed-off-by: Nicolas Le Bay
feat(stm32mp1): add RNG initialization in BL2 for STM32MP13
Initialize RNG driver at platform level for STM32MP13.
Change-Id: I64832de43e5f6559a12e26680142db54c88f0b9e Signed-off-by: Nicolas Le Bayon <nicolas.le.bayon@foss.st.com>
show more ...
|
| 6b5fc192 | 04-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
feat(st-crypto): remove BL32 HASH driver usage
Remove unused mode for HASH driver. The driver will only be used in BL2 scope.
Change-Id: I1fce09cdaa9da0c11554ac5f73433b4bee776011 Signed-off-by: Lio
feat(st-crypto): remove BL32 HASH driver usage
Remove unused mode for HASH driver. The driver will only be used in BL2 scope.
Change-Id: I1fce09cdaa9da0c11554ac5f73433b4bee776011 Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| ad3e46a3 | 05-Oct-2022 |
Lionel Debieve <lionel.debieve@foss.st.com> |
feat(stm32mp1): add a stm32mp crypto library
Add the crypto library for STM32MP1 to use STM32 hardware accelerators.
Change-Id: I0bbb941001242a6fdc47514ab3efe07b12249285 Signed-off-by: Nicolas Toro
feat(stm32mp1): add a stm32mp crypto library
Add the crypto library for STM32MP1 to use STM32 hardware accelerators.
Change-Id: I0bbb941001242a6fdc47514ab3efe07b12249285 Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| af8dee20 | 18-Apr-2019 |
Yann Gautier <yann.gautier@st.com> |
feat(st-crypto): add STM32 RNG driver
This driver manages the STM32 Random Number Generator peripheral.
Change-Id: I4403ebb2dbdaa8df993a4413f1ef48eeba00427c Signed-off-by: Yann Gautier <yann.gautie
feat(st-crypto): add STM32 RNG driver
This driver manages the STM32 Random Number Generator peripheral.
Change-Id: I4403ebb2dbdaa8df993a4413f1ef48eeba00427c Signed-off-by: Yann Gautier <yann.gautier@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 4bb4e836 | 18-Sep-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
feat(st-crypto): add AES decrypt/auth by SAES IP
Add code to be able to use STMicroelectronics SAES IP. This driver can manage many AES algorithms (CBC, ECB, CCM, GCM). It will be used by the authen
feat(st-crypto): add AES decrypt/auth by SAES IP
Add code to be able to use STMicroelectronics SAES IP. This driver can manage many AES algorithms (CBC, ECB, CCM, GCM). It will be used by the authenticated decryption framework (AES-GCM only).
Change-Id: Ibd4030719fb12877dcecd5d2c395d13b4b15c260 Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
show more ...
|
| b0fbc02a | 30-Sep-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
feat(st-crypto): add ECDSA signature check with PKA
Add code to be able to use STMicroelectronics PKA peripheral in the authentication framework.
Change-Id: Ifeafe84c68db483cd18674f2280576cc065f92e
feat(st-crypto): add ECDSA signature check with PKA
Add code to be able to use STMicroelectronics PKA peripheral in the authentication framework.
Change-Id: Ifeafe84c68db483cd18674f2280576cc065f92ee Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com>
show more ...
|
| 68039f2d | 22-Dec-2020 |
Nicolas Toromanoff <nicolas.toromanoff@st.com> |
feat(st-crypto): update HASH for new hardware version used in STM32MP13
Introduce new flag to manage hardware version. STM32MP15 currently uses the HASH_V2 and STM32MP13 uses the HASH_V4. For STM32_
feat(st-crypto): update HASH for new hardware version used in STM32MP13
Introduce new flag to manage hardware version. STM32MP15 currently uses the HASH_V2 and STM32MP13 uses the HASH_V4. For STM32_HASH_V4: remove MD5 algorithm (no more supported) and add SHA384 and SHA512.
For STM32_HASH_V2: no change.
Change-Id: I3a9ae9e38249a2421c657232cb0877004d04dae1 Signed-off-by: Nicolas Toromanoff <nicolas.toromanoff@st.com> Signed-off-by: Lionel Debieve <lionel.debieve@foss.st.com>
show more ...
|
| 32071c02 | 11-Nov-2022 |
Liju-Clr Chen <liju-clr.chen@mediatek.com> |
fix(mt8188): add mmap entry for CPU idle SRAM
CPU PM driver accesses CPU idle SRAM during the system suspend process. The region of CPU idle SRAM needs to be added as mmap entry. Otherwise, the exec
fix(mt8188): add mmap entry for CPU idle SRAM
CPU PM driver accesses CPU idle SRAM during the system suspend process. The region of CPU idle SRAM needs to be added as mmap entry. Otherwise, the execption would occur.
BUG=b:244215539 TEST=Test of suspend resume passes.
Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com> Change-Id: I5838964fd9cb1b833e4006e2123febb4a4601003
show more ...
|
| 210ebbb0 | 23-Sep-2022 |
James Liao <jamesjj.liao@mediatek.com> |
fix(mt8188): refine gic init flow after system resume
Call gicv3_distif_init() instead of mt_gic_init() in armv8_2_mcusys_pwr_on_common(). This is to prevent gicv3_rdistif_init() and gicv3_cpuif_ena
fix(mt8188): refine gic init flow after system resume
Call gicv3_distif_init() instead of mt_gic_init() in armv8_2_mcusys_pwr_on_common(). This is to prevent gicv3_rdistif_init() and gicv3_cpuif_enable() from being called twice in the power-on flow. gicv3_rdistif_init() and gicv3_cpuif_enable() are called in later armv8_2_cpu_pwr_on_common().
BUG=b:244215539 TEST=Suspend Resume Test pass
Change-Id: Id752c1ccbb9eab277ed6278c2dd90a051a894146 Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com>
show more ...
|
| 600f1681 | 08-Nov-2022 |
Allen-KH Cheng <allen-kh.cheng@mediatek.corp-partner.google.com> |
fix(mt8186): fix the DRAM voltage after the system resumes
The DRAM power supply must sustain at 0.8V after the system resumes. Otherwise, unexpected errors would occur. Therefore, we update the DRA
fix(mt8186): fix the DRAM voltage after the system resumes
The DRAM power supply must sustain at 0.8V after the system resumes. Otherwise, unexpected errors would occur. Therefore, we update the DRAM voltage to 0.8v in PMIC voltage wrap table.
BUG=b:253537849 TEST=Suspend Resume Test
Signed-off-by: Allen-KH Cheng <allen-kh.cheng@mediatek.corp-partner.google.com> Change-Id: Idd42d5a2d646468822e391e48d01d870c3b7f0d3
show more ...
|
| c70f567a | 20-Sep-2022 |
Trevor Wu <trevor.wu@mediatek.com> |
feat(mt8188): add audio support
For MT8188, MTK_AUDIO_SMC_OP_DOMAIN_SIDEBANDS is required for normal mode switch. - Add audio common code and chip specific code. - Add new id (MTK_SIP_AUDIO_CONT
feat(mt8188): add audio support
For MT8188, MTK_AUDIO_SMC_OP_DOMAIN_SIDEBANDS is required for normal mode switch. - Add audio common code and chip specific code. - Add new id (MTK_SIP_AUDIO_CONTROL) to mtk_sip_def.h. - Enable for MT8188.
Signed-off-by: Trevor Wu <trevor.wu@mediatek.com> Change-Id: Iff4680cd0b520b2b519ecf30ecafe100f147cc62
show more ...
|
| f278d84d | 03-Nov-2022 |
Liju-Clr Chen <liju-clr.chen@mediatek.com> |
refactor(mt8195): use ptp3 common drivers
Some 8195 ptp3 drivers are the same in plat/mediatek/drivers/ptp3, so add this patch to reuse them.
Change-Id: I2b1801a73b6a2979e20d49d314c57f663dc5bf04 Si
refactor(mt8195): use ptp3 common drivers
Some 8195 ptp3 drivers are the same in plat/mediatek/drivers/ptp3, so add this patch to reuse them.
Change-Id: I2b1801a73b6a2979e20d49d314c57f663dc5bf04 Signed-off-by: Liju-Clr Chen <liju-clr.chen@mediatek.com>
show more ...
|
| 44a10511 | 17-Oct-2022 |
Riven Chen <riven.chen@mediatek.corp-partner.google.com> |
feat(mt8188): add support for PTP3
Add PTP3 driver to protect CPU from excessive voltage drop in CPU heavy loading.
Signed-off-by: Riven Chen <riven.chen@mediatek.corp-partner.google.com> Change-Id
feat(mt8188): add support for PTP3
Add PTP3 driver to protect CPU from excessive voltage drop in CPU heavy loading.
Signed-off-by: Riven Chen <riven.chen@mediatek.corp-partner.google.com> Change-Id: I394096be43e1d1d615f99b22f38f0b3ae0bb40c1
show more ...
|
| 0b1186a3 | 14-Oct-2022 |
Rex-BC Chen <rex-bc.chen@mediatek.com> |
feat(mt8188): enable MTK_PUBEVENT_ENABLE
Enable MTK_PUBEVENT_ENABLE for subscribing CPUPM events. This patch also corrects the header file naming.
Signed-off-by: Bo-Chen Chen <rex-bc.chen@mediatek.
feat(mt8188): enable MTK_PUBEVENT_ENABLE
Enable MTK_PUBEVENT_ENABLE for subscribing CPUPM events. This patch also corrects the header file naming.
Signed-off-by: Bo-Chen Chen <rex-bc.chen@mediatek.com> Change-Id: Iabd89a4ead21ccafa833390367484bfea5d351f6
show more ...
|
| 797d7446 | 11-Nov-2022 |
Manish V Badarkhe <manish.badarkhe@arm.com> |
Merge "refactor(security): add OpenSSL 1.x compatibility" into integration |