Name Last commit Last update
.husky
bl1 Fix MISRA rule 8.4 Part 4
bl2 BL2_AT_EL3: do not try to disable MMU twice on AARCH32
bl2u Merge pull request #1282 from robertovargas-arm/misra-changes
bl31 SPM: Treat SP xlat tables the same as others
bl32 Rename symbols and files relating to CVE-2017-5715
common Fix MISRA Rule 5.3 Part 2
docs Merge pull request #1400 from Andre-ARM/allwinner/v1
drivers Merge pull request #1402 from glneo/for-upstream-uart
fdts Dynamic_config: remove the FVP dtb files
include Merge pull request #1418 from antonio-nino-diaz-arm/an/arm-multi-console
lib Merge pull request #1420 from Yann-lms/mm_cursor_size_check
licenses
make_helpers Allow disabling authentication dynamically
plat Merge pull request #1418 from antonio-nino-diaz-arm/an/arm-multi-console
services SPM: Refactor entry and exit of the SP
tools Dynamic cfg: Enable support on CoT for other configs
.checkpatch.conf checkpatch: Ignore SPDX_LICENSE_TAG
.cz.json
.editorconfig Add .editorconfig file
.gitignore fip: move headers shared between TF and fiptool to include/tools_share
.gitreview
Makefile Allow disabling authentication dynamically
commitlint.config.js
dco.txt Drop requirement for CLA in contribution.md
license.rst Update Arm TF references to TF-A
package-lock.json
package.json
readme.rst Fix SDEI link in readme.rst

Trusted Firmware-A

Trusted Firmware-A (TF-A) is a reference implementation of secure world software for Arm A-Profile architectures (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It provides a suitable starting point for productization of secure world boot and runtime firmware, in either the AArch32 or AArch64 execution states.

TF-A implements Arm interface standards, including:

The code is designed to be portable and reusable across hardware platforms and software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A with reference implementations of Arm standards to benefit developers working with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration testing, on any secure world code derived from TF-A.

More Info and Documentation

To find out more about Trusted Firmware-A, please view the full documentation that is available through trustedfirmware.org.


Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.