1. 18 Feb, 2020 2 commits
    • Sandrine Bailleux's avatar
      TBBR: Reduce size of hash buffers when possible · 0b4e5921
      Sandrine Bailleux authored
      The TBBR implementation extracts hashes from certificates and stores
      them in static buffers. TF-A supports 3 variants of SHA right now:
      SHA-256, SHA-384 and SHA-512. When support for SHA-512 was added in
      commit 9a3088a5
      
       ("tbbr: Add build flag
      HASH_ALG to let the user to select the SHA"), the hash buffers got
      unconditionally increased from 51 to 83 bytes each. We can reduce that
      space if we're using SHA-256 or SHA-384.
      
      This saves some BSS space in both BL1 and BL2:
      - BL1 with SHA-256: saving 168 bytes.
      - BL1 with SHA-384: saving 80 bytes.
      - BL2 with SHA-256: saving 384 bytes.
      - BL2 with SHA-384: saving 192 bytes.
      
      Change-Id: I0d02e5dc5f0162e82339c768609c9766cfe7e2bd
      Signed-off-by: default avatarSandrine Bailleux <sandrine.bailleux@arm.com>
      0b4e5921
    • Sandrine Bailleux's avatar
      TBBR: Reduce size of ECDSA key buffers · 495599cd
      Sandrine Bailleux authored
      
      
      The TBBR implementation extracts public keys from certificates and
      stores them in static buffers. DER-encoded ECDSA keys are only 91 bytes
      each but were each allocated 294 bytes instead. Reducing the size of
      these buffers saves 609 bytes of BSS in BL2 (294 - 91 = 203 bytes for
      each of the 3 key buffers in use).
      
      Also add a comment claryfing that key buffers are tailored on RSA key
      sizes when both ECDSA and RSA keys are used.
      
      Change-Id: Iad332856e7af1f9814418d012fba3e1e9399f72a
      Signed-off-by: default avatarSandrine Bailleux <sandrine.bailleux@arm.com>
      495599cd
  2. 14 Feb, 2020 3 commits
  3. 13 Feb, 2020 4 commits
  4. 12 Feb, 2020 16 commits
  5. 11 Feb, 2020 3 commits
    • Sandrine Bailleux's avatar
      Merge changes from topic "lm/fconf" into integration · 21c4f56f
      Sandrine Bailleux authored
      * changes:
        arm-io: Panic in case of io setup failure
        MISRA fix: Use boolean essential type
        fconf: Add documentation
        fconf: Move platform io policies into fconf
        fconf: Add mbedtls shared heap as property
        fconf: Add TBBR disable_authentication property
        fconf: Add dynamic config DTBs info as property
        fconf: Populate properties from dtb during bl2 setup
        fconf: Load config dtb from bl1
        fconf: initial commit
      21c4f56f
    • Max Shvetsov's avatar
      Fixes ROTPK hash generation for ECDSA encryption · 698e231d
      Max Shvetsov authored
      
      
      Forced hash generation used to always generate hash via RSA encryption.
      This patch changes encryption based on ARM_ROTPK_LOCATION.
      Also removes setting KEY_ALG based on ARM_ROTPL_LOCATION - there is no
      relation between these two.
      Signed-off-by: default avatarMax Shvetsov <maksims.svecovs@arm.com>
      Change-Id: Id727d2ed06176a243719fd0adfa0cae26c325005
      698e231d
    • Olivier Deprez's avatar
      Merge changes from topic "spmd" into integration · 63aa4094
      Olivier Deprez authored
      * changes:
        SPMD: enable SPM dispatcher support
        SPMD: hook SPMD into standard services framework
        SPMD: add SPM dispatcher based upon SPCI Beta 0 spec
        SPMD: add support to run BL32 in TDRAM and BL31 in secure DRAM on Arm FVP
        SPMD: add support for an example SPM core manifest
        SPMD: add SPCI Beta 0 specification header file
      63aa4094
  6. 10 Feb, 2020 12 commits