<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bcm63xx/atf/drivers/auth/tbbr/tbbr_cot.c, branch master</title>
<subtitle>Broadcom-s Trusted Firmware A</subtitle>
<id>https://git.openwrt.org/project/bcm63xx/atf/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/project/bcm63xx/atf/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/'/>
<updated>2019-09-12T14:27:39Z</updated>
<entry>
<title>Support larger RSA key sizes when using MBEDTLS</title>
<updated>2019-09-12T14:27:39Z</updated>
<author>
<name>Justin Chadwell</name>
</author>
<published>2019-07-29T16:13:10Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=aacff7498c7241696f55a9b80473e59b72d4d095'/>
<id>urn:sha1:aacff7498c7241696f55a9b80473e59b72d4d095</id>
<content type='text'>
Previously, TF-A could not support large RSA key sizes as the
configuration options passed to MBEDTLS prevented storing and performing
calculations with the larger, higher-precision numbers required. With
these changes to the arguments passed to MBEDTLS, TF-A now supports
using 3072 (3K) and 4096 (4K) keys in certificates.

Change-Id: Ib73a6773145d2faa25c28d04f9a42e86f2fd555f
Signed-off-by: Justin Chadwell &lt;justin.chadwell@arm.com&gt;
</content>
</entry>
<entry>
<title>cot-desc: optimise memory further</title>
<updated>2019-04-08T13:24:21Z</updated>
<author>
<name>Joel Hutton</name>
</author>
<published>2019-03-11T11:37:38Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=30070427e3ed30721074465f97ffb68390ee688c'/>
<id>urn:sha1:30070427e3ed30721074465f97ffb68390ee688c</id>
<content type='text'>
This changes the auth_img_desc_t struct to have pointers to struct
arrays instead of struct arrays. This saves memory as many of these
were never used, and can be NULL pointers. Note the memory savings are
only when these arrays are not initialised, as it is assumed these
arrays are fixed length. A possible future optimisation could allow for
variable length.

memory diff:
bl1:        bl2:
    text        text
      -12         -12
    bss         bss
      -1463       0
    data        data
      -56         -48
    rodata      rodata
      -5688       -2592
    total       total
      -7419       -2652

Change-Id: I8f9bdedf75048b8867f40c56381e3a6dc6402bcc
Signed-off-by: Joel Hutton &lt;Joel.Hutton@Arm.com&gt;
</content>
</entry>
<entry>
<title>Reduce memory needed for CoT description</title>
<updated>2019-04-08T13:21:21Z</updated>
<author>
<name>Joel Hutton</name>
</author>
<published>2019-02-20T11:56:46Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=0b6377d1c60c01dd456a1a88dac5b1e83c0e3273'/>
<id>urn:sha1:0b6377d1c60c01dd456a1a88dac5b1e83c0e3273</id>
<content type='text'>
When Trusted Board Boot is enabled, we need to specify the Chain of
Trust (CoT) of the BL1 and BL2 images. A CoT consists of an array
of image descriptors. The authentication module assumes that each
image descriptor in this array is indexed by its unique image
identifier. For example, the Trusted Boot Firmware Certificate has to
be at index [TRUSTED_BOOT_FW_CERT_ID].

Unique image identifiers may not necessarily be consecutive. Also,
a given BL image might not use all image descriptors. For example, BL1
does not need any of the descriptors related to BL31. As a result, the
CoT array might contain holes, which unnecessarily takes up space in
the BL binary.

Using pointers to auth_img_desc_t structs (rather than structs
themselves) means these unused elements only use 1 pointer worth of
space, rather than one struct worth of space. This patch also changes
the code which accesses this array to reflect the change to pointers.

Image descriptors not needed in BL1 or BL2 respectively are also
ifdef'd out in this patch. For example, verifying the BL31 image is
the responsibility of BL2 so BL1 does not need any of the data
structures describing BL31.

memory diff:
bl1:        bl2:
    text        text
      -20         -20
    bss         bss
      -1463       0
    data        data
      -256        -48
    rodata      rodata
      -5240       -1952
    total       total
      -6979       -2020

Change-Id: I163668b174dc2b9bbb183acec817f2126864aaad
Signed-off-by: Joel Hutton &lt;Joel.Hutton@Arm.com&gt;
</content>
</entry>
<entry>
<title>Sanitise includes across codebase</title>
<updated>2019-01-04T10:43:17Z</updated>
<author>
<name>Antonio Nino Diaz</name>
</author>
<published>2018-12-14T00:18:21Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=09d40e0e08283a249e7dce0e106c07c5141f9b7e'/>
<id>urn:sha1:09d40e0e08283a249e7dce0e106c07c5141f9b7e</id>
<content type='text'>
Enforce full include path for includes. Deprecate old paths.

The following folders inside include/lib have been left unchanged:

- include/lib/cpus/${ARCH}
- include/lib/el3_runtime/${ARCH}

The reason for this change is that having a global namespace for
includes isn't a good idea. It defeats one of the advantages of having
folders and it introduces problems that are sometimes subtle (because
you may not know the header you are actually including if there are two
of them).

For example, this patch had to be created because two headers were
called the same way: e0ea0928d5b7 ("Fix gpio includes of mt8173 platform
to avoid collision."). More recently, this patch has had similar
problems: 46f9b2c3a282 ("drivers: add tzc380 support").

This problem was introduced in commit 4ecca33988b9 ("Move include and
source files to logical locations"). At that time, there weren't too
many headers so it wasn't a real issue. However, time has shown that
this creates problems.

Platforms that want to preserve the way they include headers may add the
removed paths to PLAT_INCLUDES, but this is discouraged.

Change-Id: I39dc53ed98f9e297a5966e723d1936d6ccf2fc8f
Signed-off-by: Antonio Nino Diaz &lt;antonio.ninodiaz@arm.com&gt;
</content>
</entry>
<entry>
<title>Dynamic cfg: Enable support on CoT for other configs</title>
<updated>2018-05-18T11:26:38Z</updated>
<author>
<name>Soby Mathew</name>
</author>
<published>2018-03-29T13:29:55Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=17bc617e80e2b31ddaa65215526c556c23ca1374'/>
<id>urn:sha1:17bc617e80e2b31ddaa65215526c556c23ca1374</id>
<content type='text'>
This patch implements support for adding dynamic configurations for
BL31 (soc_fw_config), BL32 (tos_fw_config) and BL33 (nt_fw_config). The
necessary cert tool support and changes to default chain of trust are made
for these configs.

Change-Id: I25f266277b5b5501a196d2f2f79639d838794518
Signed-off-by: Soby Mathew &lt;soby.mathew@arm.com&gt;
</content>
</entry>
<entry>
<title>Dynamic cfg: Add HW and TB_FW configs to CoT</title>
<updated>2018-02-26T16:31:10Z</updated>
<author>
<name>Soby Mathew</name>
</author>
<published>2017-11-07T17:03:57Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=6d31020e90093456efb373cde446b07770d38953'/>
<id>urn:sha1:6d31020e90093456efb373cde446b07770d38953</id>
<content type='text'>
This patch adds image IDs to `hw_config` and `tb_fw_config` and
includes them in the default Chain Of Trust (CoT).

Change-Id: If7bb3e9be8a5e48be76614b35bf43d58fc7fed12
Signed-off-by: Soby Mathew &lt;soby.mathew@arm.com&gt;
</content>
</entry>
<entry>
<title>tbbr: Add build flag HASH_ALG to let the user to select the SHA</title>
<updated>2017-11-21T06:16:18Z</updated>
<author>
<name>Qixiang Xu</name>
</author>
<published>2017-11-09T05:56:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=9a3088a5f509084e60d9c55bf53985c5ec4ca821'/>
<id>urn:sha1:9a3088a5f509084e60d9c55bf53985c5ec4ca821</id>
<content type='text'>
The flag support the following values:
    - sha256 (default)
    - sha384
    - sha512

Change-Id: I7a49d858c361e993949cf6ada0a86575c3291066
Signed-off-by: Qixiang Xu &lt;qixiang.xu@arm.com&gt;
</content>
</entry>
<entry>
<title>Support Trusted OS firmware extra images in TF tools</title>
<updated>2017-08-09T10:06:05Z</updated>
<author>
<name>Summer Qin</name>
</author>
<published>2017-04-20T15:28:39Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=71fb396440f51b21401f24c925b9a97a224a4d24'/>
<id>urn:sha1:71fb396440f51b21401f24c925b9a97a224a4d24</id>
<content type='text'>
Since Trusted OS firmware may have extra images, need to
assign new uuid and image id for them.
The TBBR chain of trust has been extended to add support
for the new images within the existing Trusted OS firmware
content certificate.

Change-Id: I678dac7ba1137e85c5779b05e0c4331134c10e06
Signed-off-by: Summer Qin &lt;summer.qin@arm.com&gt;
</content>
</entry>
<entry>
<title>Fix order of #includes</title>
<updated>2017-07-12T13:45:31Z</updated>
<author>
<name>Isla Mitchell</name>
</author>
<published>2017-07-11T13:54:08Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=2a4b4b71ba8a14148708719077d80889faa6f47b'/>
<id>urn:sha1:2a4b4b71ba8a14148708719077d80889faa6f47b</id>
<content type='text'>
This fix modifies the order of system includes to meet the ARM TF coding
standard. There are some exceptions in order to retain header groupings,
minimise changes to imported headers, and where there are headers within
the #if and #ifndef statements.

Change-Id: I65085a142ba6a83792b26efb47df1329153f1624
Signed-off-by: Isla Mitchell &lt;isla.mitchell@arm.com&gt;
</content>
</entry>
<entry>
<title>cert: move platform_oid.h to include/tools_share for all platforms</title>
<updated>2017-05-23T15:08:35Z</updated>
<author>
<name>Masahiro Yamada</name>
</author>
<published>2017-05-22T03:11:24Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/bcm63xx/atf/commit/?id=bb41eb7a9dc3e3b31df2e20237a2bcf1a3cae72a'/>
<id>urn:sha1:bb41eb7a9dc3e3b31df2e20237a2bcf1a3cae72a</id>
<content type='text'>
Platforms aligned with TBBR are supposed to use their own OIDs, but
defining the same macros with different OIDs does not provide any
value (at least technically).

For easier use of TBBR, this commit allows platforms to reuse the OIDs
obtained by ARM Ltd.  This will be useful for non-ARM vendors that
do not need their own extension fields in their certificate files.

The OIDs of ARM Ltd. have been moved to include/tools_share/tbbr_oid.h

Platforms can include &lt;tbbr_oid.h&gt; instead of &lt;platform_oid.h&gt; by
defining USE_TBBR_DEFS as 1.  USE_TBBR_DEFS is 0 by default to keep the
backward compatibility.

For clarification, I inserted a blank line between headers from the
include/ directory (#include &lt;...&gt;) and ones from a local directory
(#include "..." ).

Signed-off-by: Masahiro Yamada &lt;yamada.masahiro@socionext.com&gt;
</content>
</entry>
</feed>
