<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bcm63xx/atf/drivers/auth, branch master</title>
<subtitle>Broadcom-s Trusted Firmware A</subtitle>
<id>https://git-03.infra.openwrt.org/project/bcm63xx/atf/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/'/>
<updated>2019-09-12T14:27:41Z</updated>
<entry>
<title>Remove RSA PKCS#1 v1.5 support from cert_tool</title>
<updated>2019-09-12T14:27:41Z</updated>
<author>
<name>Justin Chadwell</name>
</author>
<published>2019-09-09T14:24:31Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=6a415a508ea6acec321e4609d3f8e5c03ba67664'/>
<id>urn:sha1:6a415a508ea6acec321e4609d3f8e5c03ba67664</id>
<content type='text'>
Support for PKCS#1 v1.5 was deprecated in SHA 1001202 and fully removed
in SHA fe199e3, however, cert_tool is still able to generate
certificates in that form. This patch fully removes the ability for
cert_tool to generate these certificates.

Additionally, this patch also fixes a bug where the issuing certificate
was a RSA and the issued certificate was EcDSA. In this case, the issued
certificate would be signed using PKCS#1 v1.5 instead of RSAPSS per
PKCS#1 v2.1, preventing TF-A from verifying the image signatures. Now
that PKCS#1 v1.5 support is removed, all certificates that are signed
with RSA now use the more modern padding scheme.

Change-Id: Id87d7d915be594a1876a73080528d968e65c4e9a
Signed-off-by: Justin Chadwell &lt;justin.chadwell@arm.com&gt;
</content>
</entry>
<entry>
<title>Support larger RSA key sizes when using MBEDTLS</title>
<updated>2019-09-12T14:27:39Z</updated>
<author>
<name>Justin Chadwell</name>
</author>
<published>2019-07-29T16:13:10Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=aacff7498c7241696f55a9b80473e59b72d4d095'/>
<id>urn:sha1:aacff7498c7241696f55a9b80473e59b72d4d095</id>
<content type='text'>
Previously, TF-A could not support large RSA key sizes as the
configuration options passed to MBEDTLS prevented storing and performing
calculations with the larger, higher-precision numbers required. With
these changes to the arguments passed to MBEDTLS, TF-A now supports
using 3072 (3K) and 4096 (4K) keys in certificates.

Change-Id: Ib73a6773145d2faa25c28d04f9a42e86f2fd555f
Signed-off-by: Justin Chadwell &lt;justin.chadwell@arm.com&gt;
</content>
</entry>
<entry>
<title>cryptocell: add product version awareness support</title>
<updated>2019-07-25T10:38:07Z</updated>
<author>
<name>Gilad Ben-Yossef</name>
</author>
<published>2019-05-14T11:47:36Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=76f3c7dc8b7c78f5f73d1b6487fac5cc5f320ed4'/>
<id>urn:sha1:76f3c7dc8b7c78f5f73d1b6487fac5cc5f320ed4</id>
<content type='text'>
Add support for multiple Cryptocell revisions which
use different APIs.

This commit only refactors the existing code in preperation to the addition
of another Cryptocell revisions later on.

Signed-off-by: Gilad Ben-Yossef &lt;gilad.benyossef@arm.com&gt;
Change-Id: I16d80b31afb6edd56dc645fee5ea619cc74f09b6
</content>
</entry>
<entry>
<title>cryptocell: move Cryptocell specific API into driver</title>
<updated>2019-07-25T10:29:15Z</updated>
<author>
<name>Gilad Ben-Yossef</name>
</author>
<published>2019-05-14T07:48:18Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=36ec2bb0bcb43b012c1211d73665eebc6012fb48'/>
<id>urn:sha1:36ec2bb0bcb43b012c1211d73665eebc6012fb48</id>
<content type='text'>
Code using Cryptocell specific APIs was used as part of the
arm common board ROT support, instead of being abstracted
in Cryptocell specific driver code, creating two problems:
- Any none arm board that uses Cryptocell wuld need to
  copy and paste the same code.
- Inability to cleanly support multiple versions of Cryptocell
  API and products.

Move over Cryptocell specific API calls into the Cryptocell
driver, creating abstraction API where needed.

Signed-off-by: Gilad Ben-Yossef &lt;gilad.benyossef@arm.com&gt;
Change-Id: I9e03ddce90fcc47cfdc747098bece86dbd11c58e
</content>
</entry>
<entry>
<title>Fix type of cot_desc_ptr</title>
<updated>2019-06-13T10:53:17Z</updated>
<author>
<name>Sandrine Bailleux</name>
</author>
<published>2019-06-07T12:33:51Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=2efb7ddc3b77a1ff11921083f290aebedbc935a2'/>
<id>urn:sha1:2efb7ddc3b77a1ff11921083f290aebedbc935a2</id>
<content type='text'>
The chain of trust description and the pointer pointing to its first
element were incompatible, thus requiring an explicit type cast for
the assignment.

- cot_desc was an array of
  const pointers to const image descriptors.

- cot_desc_ptr was a const pointer to
  (non-constant) pointers to const image descriptors.

Thus, trying to assign cot_desc to cot_desc_ptr (with no cast) would
generate the following compiler warning:

drivers/auth/tbbr/tbbr_cot.c:826:14: warning: initialization discards
  ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers]
 REGISTER_COT(cot_desc);
              ^~~~~~~~

Change-Id: Iae62dd1bdb43fe379e3843d96461d47cc2f68a06
Signed-off-by: Sandrine Bailleux &lt;sandrine.bailleux@arm.com&gt;
</content>
</entry>
<entry>
<title>Mbed TLS: Remove weak heap implementation</title>
<updated>2019-04-12T08:52:52Z</updated>
<author>
<name>Ambroise Vincent</name>
</author>
<published>2019-04-10T11:50:27Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=2374ab1799bedae1acc17fde0205d272f8111836'/>
<id>urn:sha1:2374ab1799bedae1acc17fde0205d272f8111836</id>
<content type='text'>
The implementation of the heap function plat_get_mbedtls_heap() becomes
mandatory for platforms supporting TRUSTED_BOARD_BOOT.

The shared Mbed TLS heap default weak function implementation is
converted to a helper function get_mbedtls_heap_helper() which can be
used by the platforms for their own function implementation.

Change-Id: Ic8f2994e25e3d9fcd371a21ac459fdcafe07433e
Signed-off-by: Ambroise Vincent &lt;ambroise.vincent@arm.com&gt;
</content>
</entry>
<entry>
<title>Checkpatch: Style fix</title>
<updated>2019-04-09T08:29:58Z</updated>
<author>
<name>Joel Hutton</name>
</author>
<published>2019-04-09T08:25:55Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=7a246d64d549ef7ec7c73cdd5ad7d3918b591023'/>
<id>urn:sha1:7a246d64d549ef7ec7c73cdd5ad7d3918b591023</id>
<content type='text'>
Change-Id: I0cb9f0db1ef3491f55c038a10db5a88d37e89697
Signed-off-by: Joel Hutton &lt;Joel.Hutton@Arm.com&gt;
</content>
</entry>
<entry>
<title>cot-desc: optimise memory further</title>
<updated>2019-04-08T13:24:21Z</updated>
<author>
<name>Joel Hutton</name>
</author>
<published>2019-03-11T11:37:38Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=30070427e3ed30721074465f97ffb68390ee688c'/>
<id>urn:sha1:30070427e3ed30721074465f97ffb68390ee688c</id>
<content type='text'>
This changes the auth_img_desc_t struct to have pointers to struct
arrays instead of struct arrays. This saves memory as many of these
were never used, and can be NULL pointers. Note the memory savings are
only when these arrays are not initialised, as it is assumed these
arrays are fixed length. A possible future optimisation could allow for
variable length.

memory diff:
bl1:        bl2:
    text        text
      -12         -12
    bss         bss
      -1463       0
    data        data
      -56         -48
    rodata      rodata
      -5688       -2592
    total       total
      -7419       -2652

Change-Id: I8f9bdedf75048b8867f40c56381e3a6dc6402bcc
Signed-off-by: Joel Hutton &lt;Joel.Hutton@Arm.com&gt;
</content>
</entry>
<entry>
<title>Reduce memory needed for CoT description</title>
<updated>2019-04-08T13:21:21Z</updated>
<author>
<name>Joel Hutton</name>
</author>
<published>2019-02-20T11:56:46Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=0b6377d1c60c01dd456a1a88dac5b1e83c0e3273'/>
<id>urn:sha1:0b6377d1c60c01dd456a1a88dac5b1e83c0e3273</id>
<content type='text'>
When Trusted Board Boot is enabled, we need to specify the Chain of
Trust (CoT) of the BL1 and BL2 images. A CoT consists of an array
of image descriptors. The authentication module assumes that each
image descriptor in this array is indexed by its unique image
identifier. For example, the Trusted Boot Firmware Certificate has to
be at index [TRUSTED_BOOT_FW_CERT_ID].

Unique image identifiers may not necessarily be consecutive. Also,
a given BL image might not use all image descriptors. For example, BL1
does not need any of the descriptors related to BL31. As a result, the
CoT array might contain holes, which unnecessarily takes up space in
the BL binary.

Using pointers to auth_img_desc_t structs (rather than structs
themselves) means these unused elements only use 1 pointer worth of
space, rather than one struct worth of space. This patch also changes
the code which accesses this array to reflect the change to pointers.

Image descriptors not needed in BL1 or BL2 respectively are also
ifdef'd out in this patch. For example, verifying the BL31 image is
the responsibility of BL2 so BL1 does not need any of the data
structures describing BL31.

memory diff:
bl1:        bl2:
    text        text
      -20         -20
    bss         bss
      -1463       0
    data        data
      -256        -48
    rodata      rodata
      -5240       -1952
    total       total
      -6979       -2020

Change-Id: I163668b174dc2b9bbb183acec817f2126864aaad
Signed-off-by: Joel Hutton &lt;Joel.Hutton@Arm.com&gt;
</content>
</entry>
<entry>
<title>Remove several warnings reported with W=2</title>
<updated>2019-04-01T09:43:42Z</updated>
<author>
<name>Ambroise Vincent</name>
</author>
<published>2019-02-14T09:48:21Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=bde2836fcc23e8cb98dfa0250937e6d771b260b7'/>
<id>urn:sha1:bde2836fcc23e8cb98dfa0250937e6d771b260b7</id>
<content type='text'>
Improved support for W=2 compilation flag by solving some nested-extern
and sign-compare warnings.

The libraries are compiling with warnings (which turn into errors with
the Werror flag).

Outside of libraries, some warnings cannot be fixed.

Change-Id: I06b1923857f2a6a50e93d62d0274915b268cef05
Signed-off-by: Ambroise Vincent &lt;ambroise.vincent@arm.com&gt;
</content>
</entry>
</feed>
