Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
563 commits
Select commit Hold shift + click to select a range
36252fc
partial revert: stm : fix error on b_u585i_iot02a with TF-Mv2.1.0
erwango Jun 28, 2024
6580105
build: remove the warning when the version Git tag is not found
tomi-font Jul 10, 2024
7bc2f4a
platform: ext: add local copy of CMSIS v6 files
tomi-font Jul 19, 2024
6404a15
bl2: Add dependency for DIRECT_XIP_REVERT
Vge0rge Aug 23, 2024
60ebade
Platform: STM32H5: Align MCUBOOT_UPGRADE_STRATEGY to flash_layout.h
adeaarm Aug 27, 2024
8134106
MCUboot: Update revision and update shared boot data API
nordicjm Aug 14, 2024
bceac6c
mbedtls: align crypto_sizes.h to the Mbed TLS one
valeriosetti Nov 20, 2024
83c8b2a
Crypto: Reduce stack size to 0x1800
adeaarm Nov 16, 2024
fa020a8
Crypto: Adjust CRYPTO_ENGINE_BUF_SIZE in profiles with RSA encryption
adeaarm Nov 15, 2024
e30b069
npu: Update NPU driver to version 24.08
david-hazi-arm Nov 20, 2024
3fb1f9e
platform: corstone3xx: Fix config check and NPU config
david-hazi-arm Dec 9, 2024
2f13847
stm32u5 hal dma_ex function not inlined with GCC 11 or 12
FRASTM Nov 12, 2024
918f32d
cmake: set `CMAKE_INSTALL_MESSAGE` in single location
JordanYates Feb 18, 2025
0cd40f7
mcuboot: Fix SWAP_USING_MOVE FWU method
david-hazi-arm Jul 10, 2024
f04edd1
BL2: mcuboot: Add checks for NULL pointers
nicola-mazzucato-arm Jan 24, 2025
cb9ba41
module: add security info to module.yml
mrodgers-witekio Jan 30, 2025
976f68c
Platform: Nordic: refactor spu_peripheral_config to use base addr
SebastianBoe May 14, 2024
abba8e0
Platform: Nordic: Add function for calculating spu instances
SebastianBoe May 16, 2024
491afbe
Platform: Nordic: Port spu_peripheral_config
SebastianBoe May 16, 2024
752d8d5
platform: nordic_nrf: Fix missing ifdef
Vge0rge May 28, 2024
20652c2
Platform: nordic_nrf: Don't configure NRF_VMC as non-secure
nordic-mare May 23, 2024
8236896
platform: nordic_nrf: APPROTECT to lock debugging
MarkusLassila Jun 20, 2024
35f70e3
platform: ext: nordic_nrf: Update pin control header
Vge0rge Sep 2, 2024
bd53893
platform: nordic_nrf: Rework PCD memory locking
MarkusLassila Aug 30, 2024
2df797c
platform: nordic_nrf: Add missing include
MarkusLassila Oct 15, 2024
dfd1757
Revert "platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value"
Vge0rge Jan 21, 2025
0a94444
platform: nordic_nrf: Support for building nRF54L15 + sync repos
Vge0rge Mar 1, 2024
e988105
platform: nordic_nrf: Various minor fixes
Vge0rge Dec 27, 2024
ae87a61
platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value
Vge0rge Jan 22, 2025
88ac039
platform: nordic_nrf: Use nordic_hal tag instead of commit hash
Vge0rge Dec 27, 2024
188eae4
Revert "Revert "platform: nordic_nrf: Move partition folder for nordi…
Vge0rge Feb 20, 2025
75146b4
BL2: Platform: Add new macros for shared data region
maulik-arm Dec 18, 2024
3f4e152
platform: nordic_nrf: Add nRF54L15 initial support
Vge0rge Feb 10, 2025
fc73ce9
platform: nordic_nrf: Guard GPIO0_PIN_MASK_SECURE with ifdef
Vge0rge Feb 10, 2025
b30274e
platform: nrf: ifdef MPC OWNERID configuration
nika-nordic Feb 7, 2025
5e3e071
platform: nordic_nrf: Move partition folders to common
Vge0rge Mar 12, 2025
455f4fb
nordic_nrf: Fix UART and FLASH build issues
Vge0rge Mar 17, 2025
25dff73
platform: nordic_nrf: Selectively enable secure UART1
Vge0rge Mar 18, 2025
f5c06e9
platform: nordic_nrf: Fix build issue for nRF54L15
Vge0rge Mar 20, 2025
9118ec3
platform: nordic_nrf: Create a nrf54l folder
Vge0rge Mar 20, 2025
857f369
platform: nordic_nrf: Add initial support for nRF54L10
Vge0rge Mar 24, 2025
74b746e
Revert "platform: nordic_nrf: Add initial support for nRF54L10"
tomi-font Apr 14, 2025
5213d79
Revert "platform: nordic_nrf: Create a nrf54l folder"
tomi-font Apr 14, 2025
8c93916
Revert "platform: nordic_nrf: Fix build issue for nRF54L15"
tomi-font Apr 14, 2025
ccf214a
Revert "platform: nordic_nrf: Selectively enable secure UART1"
tomi-font Apr 14, 2025
bd40f50
Revert "nordic_nrf: Fix UART and FLASH build issues"
tomi-font Apr 14, 2025
b56837a
Revert "platform: nordic_nrf: Move partition folders to common"
tomi-font Apr 14, 2025
cf5721f
Revert "platform: nrf: ifdef MPC OWNERID configuration"
tomi-font Apr 14, 2025
c98bf24
Revert "platform: nordic_nrf: Guard GPIO0_PIN_MASK_SECURE with ifdef"
tomi-font Apr 14, 2025
867eebe
Revert "platform: nordic_nrf: Add nRF54L15 initial support"
tomi-font Apr 14, 2025
ab3fe6e
Revert "BL2: Platform: Add new macros for shared data region"
tomi-font Apr 14, 2025
6b60d6b
Revert "Revert "Revert "platform: nordic_nrf: Move partition folder f…
tomi-font Apr 14, 2025
72ba763
Revert "platform: nordic_nrf: Use nordic_hal tag instead of commit hash"
tomi-font Apr 14, 2025
d6ddc5e
Revert "platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value"
tomi-font Apr 14, 2025
24b05ef
Revert "platform: nordic_nrf: Various minor fixes"
tomi-font Apr 14, 2025
e062190
Revert "platform: nordic_nrf: Support for building nRF54L15 + sync re…
tomi-font Apr 14, 2025
98943f4
Reapply "platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value"
tomi-font Apr 14, 2025
5ef2f36
Revert "platform: nordic_nrf: Add missing include"
tomi-font Apr 14, 2025
9d89c6c
Revert "platform: nordic_nrf: Rework PCD memory locking"
tomi-font Apr 14, 2025
bb3a8cb
Revert "platform: ext: nordic_nrf: Update pin control header"
tomi-font Apr 14, 2025
28928bd
Revert "platform: nordic_nrf: APPROTECT to lock debugging"
tomi-font Apr 14, 2025
d77aace
Revert "Platform: nordic_nrf: Don't configure NRF_VMC as non-secure"
tomi-font Apr 14, 2025
7cf9d37
Revert "platform: nordic_nrf: Fix missing ifdef"
tomi-font Apr 14, 2025
2c157c2
Revert "Platform: Nordic: Port spu_peripheral_config"
tomi-font Apr 14, 2025
762c050
Revert "Platform: Nordic: Add function for calculating spu instances"
tomi-font Apr 14, 2025
a76354d
Revert "Platform: Nordic: refactor spu_peripheral_config to use base …
tomi-font Apr 14, 2025
2f77f8e
Revert "module: add security info to module.yml"
tomi-font Apr 14, 2025
e6caf5c
Revert "BL2: mcuboot: Add checks for NULL pointers"
tomi-font Apr 14, 2025
817e3c1
Revert "mcuboot: Fix SWAP_USING_MOVE FWU method"
tomi-font Apr 14, 2025
c08947d
Revert "cmake: set `CMAKE_INSTALL_MESSAGE` in single location"
tomi-font Apr 14, 2025
76f06e1
Revert "stm32u5 hal dma_ex function not inlined with GCC 11 or 12"
tomi-font Apr 14, 2025
cea1311
Revert "platform: corstone3xx: Fix config check and NPU config"
tomi-font Apr 14, 2025
16aaa81
Revert "npu: Update NPU driver to version 24.08"
tomi-font Apr 14, 2025
daa822b
Revert "Crypto: Adjust CRYPTO_ENGINE_BUF_SIZE in profiles with RSA en…
tomi-font Apr 14, 2025
cf6ba2d
Revert "Crypto: Reduce stack size to 0x1800"
tomi-font Apr 14, 2025
113fd1f
Revert "mbedtls: align crypto_sizes.h to the Mbed TLS one"
tomi-font Apr 14, 2025
5b221fc
Revert "MCUboot: Update revision and update shared boot data API"
tomi-font Apr 14, 2025
85d320c
Revert "Platform: STM32H5: Align MCUBOOT_UPGRADE_STRATEGY to flash_la…
tomi-font Apr 14, 2025
de41e95
Revert "bl2: Add dependency for DIRECT_XIP_REVERT"
tomi-font Apr 14, 2025
acf1b08
Revert "platform: ext: add local copy of CMSIS v6 files"
tomi-font Apr 14, 2025
ab5fef2
Revert "build: remove the warning when the version Git tag is not found"
tomi-font Apr 14, 2025
c3602f4
Revert "partial revert: stm : fix error on b_u585i_iot02a with TF-Mv2…
tomi-font Apr 14, 2025
beb096e
Revert "stm : fix error on b_u585i_iot02a with TF-Mv2.1.0"
tomi-font Apr 14, 2025
3b7ba0f
Revert "platform: nxp: Use generic assert for target_cfg"
tomi-font Apr 14, 2025
4fe9d5e
Revert "platform: rse: Use generic assert for sds"
tomi-font Apr 14, 2025
78b163a
Revert "platform: nordic_nrf: Use generic assert for NRFX_ASSERT"
tomi-font Apr 14, 2025
c30ce4c
Revert "platform: nordic_nrf: restore ARM_Flash_Uninitialize()"
tomi-font Apr 14, 2025
70e531b
Revert "SPM: fix compilation warning"
tomi-font Apr 14, 2025
0d37804
Revert "build: Allow bypassing the tf-m-tests version checks"
tomi-font Apr 14, 2025
166f032
Revert "build: Rename RECOMMEND_TFM_TESTS_VERSION to RECOMMENDED_TFM_…
tomi-font Apr 14, 2025
27696cb
Revert "platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value"
tomi-font Apr 14, 2025
9df1129
Reapply "platform: nordic_nrf: Move partition folder for nordic boards"
tomi-font Apr 14, 2025
2df9bcc
Revert "platform: lpcxpresso55s69: download SDK version MCUX_2.15.000"
tomi-font Apr 14, 2025
abc9d7e
Revert "zephyr: module: Add zephyr module file"
tomi-font Apr 14, 2025
e273232
Revert "lib: ext: Disable t_cose and qcbor if not required"
tomi-font Apr 14, 2025
5cdb1ae
Revert "build: gcc: Force DWARF v4"
tomi-font Apr 14, 2025
9d14c91
SPM: Move update_caller_outvec_len into psa_api
nicola-mazzucato-arm Nov 27, 2024
f36bb37
SPM: psa_api: Move reporting of zero-bytes for outvec_written
nicola-mazzucato-arm Nov 27, 2024
7c906b8
SPM: psa_api: mapped and unmapped are mutually exclusive
nicola-mazzucato-arm Nov 27, 2024
56fea82
Crypto: crypto_init: Fix missing unmapping of input vectors
nicola-mazzucato-arm Nov 27, 2024
6c07e0a
Attest: tfm_attest_req_mngr: Add missing invec unmapping
nicola-mazzucato-arm Nov 27, 2024
ca19a5f
SPM: psa_api: Fix return value to client when psa_connect fails
nicola-mazzucato-arm Dec 11, 2024
54a8a58
platform: ext: adi: max32657: Add platform and fetch hal_adi
Jayashree-Srinivasan-adi Nov 8, 2024
d3036b5
platform: ext: adi: Enable BL2 for MAX32657
ozersa Nov 20, 2024
aa15c18
platform: ext: adi: Enable TF-M for MAX32657
ozersa Nov 21, 2024
3599278
platform: ext: adi: Add PPC driver
ozersa Nov 22, 2024
609ef3f
platform: ext: adi: Define S and NS address
ozersa Nov 26, 2024
098c6bd
platform: ext: adi: Define flash regions
ozersa Nov 26, 2024
8e0d63a
platform: ext: adi: Set TF-M flash related macros
ozersa Nov 26, 2024
dd40134
platform: ext: adi: Add Flash driver
ozersa Dec 11, 2024
258b8fd
platform: ext: adi: Add MAX32657 custom OTP file
ozersa Dec 9, 2024
9509e1b
platform: ext: adi: Allow to NS app read OTP
PicoBoy2017 Nov 27, 2024
6afbbd8
platform: ext: adi: Enable crypto configs for MAX32657
Nov 15, 2024
9089b67
platform: ext: adi: Enable Attestation Partition
Jayashree-Srinivasan-adi Nov 1, 2024
d014530
platform: ext: adi: Add UART driver
ozersa Dec 12, 2024
eb55261
platform: ext: adi: Add MPC driver
PicoBoy2017 Dec 16, 2024
37abe21
platform: ext: adi: Configure peripheral and memory
ozersa Dec 18, 2024
4ae67f6
platform: ext: adi Add NS support
PicoBoy2017 Oct 15, 2024
8877329
platform: ext: adi: Add hal_paltform file
ozersa Dec 23, 2024
cfdc11b
platform: ext: adi: Enable ICC cache
ozersa Dec 23, 2024
915c0c9
platform: ext: adi: Add hal isolation layer
ozersa Dec 23, 2024
fab0109
platform: ext: adi: Enable CP10CP11 for MAX32657
ozersa Jan 6, 2025
881f7e3
platform: ext: adi: Manage UART between NS and S domain
ozersa Jan 3, 2025
037bcfd
platform: ext: adi: Enable system reset for secure domain
ozersa Jan 3, 2025
47ca0b9
platform: ext: common: Add extra SRAM function section
ozersa Feb 22, 2025
6cb4e88
Docs: Update Analog Devices maintainer details
adeaarm Mar 13, 2025
b21f209
platform: ext: adi: Define RAM function section
ozersa Jan 2, 2025
cc6354c
platform: ext: adi: clear FPCA bit of control register
PicoBoy2017 Jan 7, 2025
574cf79
platform: ext: adi: Add MAX32657 MCUBoot header
ozersa Nov 20, 2024
35d4848
platform: ext: common: Do not add BL1 counter if DEFAULT_BL1 is OFF
ozersa Feb 19, 2025
5c0ffdb
platform: ext: adi: Enable provisioning_bundle for MAX32657
ozersa Feb 11, 2025
89f8f96
doc: Add MAX32657
ozersa Jan 30, 2025
b6d24df
platform: ext: adi: Enable ADI TESA extention
ozersa Dec 2, 2024
93ec13a
bl2: mcuboot: Fix wrapper to properly mark NSPE images as such
augustozanellato Feb 18, 2025
b3025d0
platform: ext: adi: Refactor MAX32657 cmake
ozersa Mar 20, 2025
1bd0c2d
platform: ext: adi: Configure S-NS peripherals ownership
ozersa Feb 25, 2025
45609be
platform: ext: adi: Add hal_adi peripheral files
ozersa Mar 20, 2025
935b59f
platform: ext: adi: Add a weak function for peripheral init
ozersa Mar 20, 2025
a51835d
platform: ext: adi: Configure SRAM over overlay file
ozersa Mar 11, 2025
26f9846
platform: ext: adi: Configure flash section over overlay file
ozersa Mar 18, 2025
be61620
SPM: typofix for uni-directional list macro
nicola-mazzucato-arm Apr 26, 2024
88152b8
SPM: Use enumerator for connections status
nicola-mazzucato-arm Jan 9, 2025
f8fb7e8
SPM: local_connection: Invalidate connection status on free in Debug
nicola-mazzucato-arm Jan 13, 2025
cd826e0
SPM: backend_ipc: Catch connection use-after-free
nicola-mazzucato-arm Jan 10, 2025
4db9362
SPM: psa_api: Free connection in backend for DISCONNECT
nicola-mazzucato-arm Jan 10, 2025
9d51ed5
SPM: Combine fixes for reverse-handle issue
nicola-mazzucato-arm Jun 20, 2024
237e2ee
SPM: Rename p_handles to p_reqs
Jianliang-Shen Dec 5, 2023
99cf33c
SPM: Do not set connection status in backend
nicola-mazzucato-arm Apr 17, 2024
03dcd80
SPM: Fix return value warning
hunkob Nov 8, 2024
de70d55
SPM: Add FIH checks to ipc_schedule()
UEWBot Apr 17, 2024
e6ee6aa
SPM: backend_ipc: Remove unnecessary FIH guard for checks in ipc_sche…
nicola-mazzucato-arm Mar 26, 2025
eb94370
Utils: Add missing parentheses in macro
UEWBot Apr 19, 2024
b769443
Crypto: Remove patch for MCUBOOT_USE_PSA_CRYPTO in Mbed TLS guards
adeaarm Sep 23, 2024
b1d5c4e
Crypto: Update to Mbed TLS 3.6.3
davidvincze Mar 21, 2025
2787ed1
Protected Storage: Do not align NV counters in init
MarkusLassila Jan 10, 2025
cc26760
SPM/interrupts: Add missing checks on fih_rc return value
nicola-mazzucato-arm May 23, 2024
89a407f
SPM: Remove specific section for psa_interface_thread_fn_call
nicola-mazzucato-arm May 29, 2024
302a688
Platform: RP2350: Update to Pico SDK 2.1.1
will-v-pi Apr 8, 2025
d3bc815
Crypto: Update mbed TLS includes that were missed in the first upgrade
adeaarm Apr 11, 2025
c3b7140
Interface: Align comments on psa/client.h and psa/service.h
adeaarm Apr 11, 2025
f206ab1
Crypto: The client side interface provides psa_can_do_hash()
adeaarm Apr 11, 2025
0aafafa
Docs: Update maintainers and codeowners
nicola-mazzucato-arm Mar 25, 2025
6c060d1
Docs: Release notes for v2.1.2
nicola-mazzucato-arm Mar 31, 2025
2585554
build: Rename RECOMMEND_TFM_TESTS_VERSION to RECOMMENDED_TFM_TESTS_VE…
tomi-font May 15, 2024
bad99a9
build: Allow bypassing the tf-m-tests version checks
tomi-font May 15, 2024
0625f6c
SPM: fix compilation warning
tomi-font May 17, 2024
2a2fc14
platform: nordic_nrf: restore ARM_Flash_Uninitialize()
tomi-font May 23, 2024
ef2bb1f
platform: nordic_nrf: Use generic assert for NRFX_ASSERT
nicola-mazzucato-arm Jun 24, 2024
49289a7
platform: rse: Use generic assert for sds
nicola-mazzucato-arm Jun 24, 2024
fcd6ffd
platform: nxp: Use generic assert for target_cfg
nicola-mazzucato-arm Jun 24, 2024
612cc52
build: remove the warning when the version Git tag is not found
tomi-font Jul 10, 2024
1766e96
bl2: Add dependency for DIRECT_XIP_REVERT
Vge0rge Aug 23, 2024
21da5c3
Platform: STM32H5: Align MCUBOOT_UPGRADE_STRATEGY to flash_layout.h
adeaarm Aug 27, 2024
55f5caf
MCUboot: Update revision and update shared boot data API
nordicjm Aug 14, 2024
8ebdd54
Crypto: Reduce stack size to 0x1800
adeaarm Nov 16, 2024
45d1dfb
Crypto: Adjust CRYPTO_ENGINE_BUF_SIZE in profiles with RSA encryption
adeaarm Nov 15, 2024
df122dc
npu: Update NPU driver to version 24.08
david-hazi-arm Nov 20, 2024
b3507a7
platform: corstone3xx: Fix config check and NPU config
david-hazi-arm Dec 9, 2024
edbb015
STM32U5 : Do not inline DMA_List_CheckNodesBaseAddresses function
FRASTM Nov 12, 2024
cca4185
cmake: set `CMAKE_INSTALL_MESSAGE` in single location
JordanYates Feb 18, 2025
830e748
mcuboot: Fix SWAP_USING_MOVE FWU method
david-hazi-arm Jul 10, 2024
2802f13
BL2: mcuboot: Add checks for NULL pointers
nicola-mazzucato-arm Jan 24, 2025
78b40e1
Platform: Nordic: refactor spu_peripheral_config to use base addr
SebastianBoe May 14, 2024
2e98ca5
Platform: Nordic: Add function for calculating spu instances
SebastianBoe May 16, 2024
99de406
Platform: Nordic: Port spu_peripheral_config
SebastianBoe May 16, 2024
5c24ce9
platform: nordic_nrf: Fix missing ifdef
Vge0rge May 28, 2024
5a18337
Platform: nordic_nrf: Don't configure NRF_VMC as non-secure
nordic-mare May 23, 2024
3fc7eb1
platform: nordic_nrf: APPROTECT to lock debugging
MarkusLassila Jun 20, 2024
9db730d
platform: ext: nordic_nrf: Update pin control header
Vge0rge Sep 2, 2024
20c98ba
platform: nordic_nrf: Rework PCD memory locking
MarkusLassila Aug 30, 2024
5894861
platform: nordic_nrf: Add missing include
MarkusLassila Oct 15, 2024
2e2407f
platform: nordic_nrf: Support for building nRF54L15 + sync repos
Vge0rge Mar 1, 2024
6fd620c
platform: nordic_nrf: Various minor fixes
Vge0rge Dec 27, 2024
245aa45
platform: nordic_nrf: restore TFM_DRIVER_STDIO's default value
Vge0rge Jan 22, 2025
e2f2dca
platform: nordic_nrf: Use nordic_hal tag instead of commit hash
Vge0rge Dec 27, 2024
99e00e3
BL2: Platform: Add new macros for shared data region
maulik-arm Dec 18, 2024
c496f43
platform: nordic_nrf: Add nRF54L15 initial support
Vge0rge Feb 10, 2025
b74176b
platform: nordic_nrf: Guard GPIO0_PIN_MASK_SECURE with ifdef
Vge0rge Feb 10, 2025
a9bb7c4
platform: nrf: ifdef MPC OWNERID configuration
nika-nordic Feb 7, 2025
dfa491f
platform: nordic_nrf: Move partition folders to common
Vge0rge Mar 12, 2025
28523f2
nordic_nrf: Fix UART and FLASH build issues
Vge0rge Mar 17, 2025
f7d108f
platform: nordic_nrf: Selectively enable secure UART1
Vge0rge Mar 18, 2025
1e1a5d6
platform: nordic_nrf: Fix build issue for nRF54L15
Vge0rge Mar 20, 2025
0ce9b98
platform: nordic_nrf: Create a nrf54l folder
Vge0rge Mar 20, 2025
a25db3c
platform: nordic_nrf: Add initial support for nRF54L10
Vge0rge Mar 24, 2025
2dd101c
build: gcc: Force DWARF v4
nordicjm Sep 30, 2022
f7adcc0
lib: ext: Disable t_cose and qcbor if not required
microbuilder Feb 9, 2023
5a84dbd
zephyr: module: Add zephyr module file
joerchan Oct 20, 2021
9939228
platform: lpcxpresso55s69: download SDK version MCUX_2.15.000
tomi-font May 14, 2024
bb037d4
platform: ext: add local copy of CMSIS v6 files
tomi-font Jul 19, 2024
ffefb75
zephyr: add CPE/PURL security info for 2.1.2
tomi-font Apr 14, 2025
e2288c1
Merge pull request #130 from tomi-font/bump_to_2.1.2
tomi-font Apr 17, 2025
6473899
Revert "platform: ext: add local copy of CMSIS v6 files"
wearyzen May 6, 2025
71781c4
platform: ext: adi: Add configuration flags for ITS, PS...
ozersa Mar 25, 2025
62b39a4
platform: ext: adi Increase RAM_CODE size
ozersa Mar 25, 2025
88630a7
platform: ext: adi: Enable Protected Storage partition
Jayashree-Srinivasan-adi Apr 7, 2025
2e1cf49
platform: ext: adi: Enable Single Part Functions for PS Encryption
Jayashree-Srinivasan-adi Apr 7, 2025
f268e39
Docs: Fix maintainers file entry
tomi-font Apr 17, 2025
6a536fa
Docs: Fix 2.1.2 release notes build
tomi-font Apr 17, 2025
eb65181
Crypto: Add psa_can_do_cipher()
adeaarm Apr 23, 2025
3016569
Docs: Actually fix 2.1.2 release notes build
tomi-font Apr 23, 2025
2e0c915
docs: Update MAX32657
ozersa Apr 29, 2025
c150f48
platform: ext: adi: pull in update from TF-M main
PicoBoy2017 Mar 21, 2025
0ebdbfe
[nrf fromtree] platform: nordic: Add platform memory write service
Vge0rge May 28, 2024
1310ed1
[nrf fromtree] platform: nordic: Allow reading UICR registers
SeppoTakalo Aug 15, 2024
83cac0c
[nrf fromtree] platform: nordic: Guard nvmc header with soc series
SeppoTakalo Aug 21, 2024
049b5b4
[nrf fromtree] Protected Storage: Add capacity in tfm_ps_get_info calls.
MarkusLassila Nov 14, 2024
216dc7f
[nrf fromtree] platform: nordic_nrf: ifdef nrf_rtc.h inclusion
nika-nordic Feb 11, 2025
9569620
[nrf fromtree] doc: Update READMEs to use nrfutil
greg-fer Mar 14, 2025
243c244
[nrf fromtree] platform: nordic_nrf: Fix broken path for NS in nRF54L
Vge0rge Apr 23, 2025
0a680b8
[nrf fromtree] platform: nordic_nrf: Add configuration for GPIOTE sec…
Vge0rge May 2, 2025
4c67a98
[nrf noup] ITS: fix aad_size parameter spelling
tomi-font Apr 9, 2025
a3c6a51
[nrf noup] Remove check for p256-m
SebastianBoe Mar 1, 2024
bdeffd1
[nrf noup] cmake: tools: Dont add a custom command for running the ma…
SebastianBoe Mar 7, 2024
758b6ea
[nrf noup] crypto: Add PAKE support
frkv Aug 15, 2024
6a73770
[nrf noup] Support CMAC KDF and custom builtin solution
frkv Aug 15, 2024
ee64b49
[nrf noup] crypto: Detect wrong headers being included
SebastianBoe Apr 10, 2024
5e7d1fc
[nrf noup] tf-m: Enable support for external PSA core
frkv Sep 5, 2024
7c98235
[nrf noup] attestation: Prevent errors of multiple defs of ARRAY_LENGTH
frkv Sep 21, 2024
9c1d26a
[nrf noup] Add definitions for builtin key support
frkv Sep 26, 2024
386f01b
[nrf noup] tf-m: Reworking a previous version of unitializing uart fo…
frkv Sep 30, 2024
baf9759
[nrf noup] Add KMU ram region at top
Vge0rge Nov 15, 2024
6382fa8
[nrf noup] secure_fw: Add option to log output on a shared UART insta…
frkv Aug 15, 2024
cb95575
[nrf noup] crypto: Have CRYPTO_HW_ACCELERATOR support nrf_security
SebastianBoe Mar 1, 2024
9458653
[nrf noup] inteface: Remove headers existing in the Oberon PSA core
Vge0rge May 12, 2025
7e9fe7c
[nrf noup] partitions: crypto: Fix duplicate functions
Vge0rge May 13, 2025
bf3105b
[nrf noup] build: fix TF-M version
tomi-font May 27, 2025
53a6c1c
[nrf noup] Cherry pick provisioning update
Vge0rge Jun 16, 2025
44bbc98
[nrf fromtree]platform: nordic_nrf: Split the target_cfg for differen…
Vge0rge May 20, 2025
feb2c0e
platform: nordic: Configure the TAMPC for nRF54L series
Vge0rge Jun 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
4 changes: 4 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -20,3 +20,7 @@ localrepos.cmake
*.pyc

.clang-format
**/.DS_Store

# Python venv
venv
1 change: 1 addition & 0 deletions bl2/ext/mcuboot/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,7 @@ config MCUBOOT_CONFIRM_IMAGE
config MCUBOOT_DIRECT_XIP_REVERT
bool "Enable the revert mechanism in direct-xip mode"
default y
depends on MCUBOOT_UPGRADE_STRATEGY_DIRECT_XIP

config MCUBOOT_HW_ROLLBACK_PROT
bool "Enable security counter validation against non-volatile HW counters"
Expand Down
1 change: 1 addition & 0 deletions bl2/ext/mcuboot/config/mcuboot-mbedtls-cfg.h
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@
#define MBEDTLS_ENTROPY_C
#define MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
#define MBEDTLS_PSA_CRYPTO_CONFIG
#define MBEDTLS_PSA_CRYPTO_C
#if defined(MCUBOOT_SIGN_EC256)
#define MBEDTLS_PSA_P256M_DRIVER_ENABLED
#endif
Expand Down
18 changes: 18 additions & 0 deletions bl2/ext/mcuboot/flash_map_extended.c
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
* Git SHA of the original version: ac55554059147fff718015be9f4bd3108123f50a
*/

#include <assert.h>
#include <errno.h>
#include "target.h"
#include "tfm_hal_device_header.h"
Expand All @@ -28,6 +29,9 @@ __WEAK int flash_device_base(uint8_t fd_id, uintptr_t *ret)
fd_id, FLASH_DEVICE_ID);
return -1;
}

assert(ret != NULL);

*ret = FLASH_DEVICE_BASE;
return 0;
}
Expand Down Expand Up @@ -73,6 +77,8 @@ int flash_area_id_to_image_slot(int area_id)

uint8_t flash_area_erased_val(const struct flash_area *fap)
{
assert(fap != NULL);

return DRV_FLASH_AREA(fap)->GetInfo()->erased_value;
}

Expand Down Expand Up @@ -100,3 +106,15 @@ int flash_area_read_is_empty(const struct flash_area *fa, uint32_t off,

return 1;
}

int flash_area_get_sector(const struct flash_area *fa, uint32_t off,
struct flash_sector *sector)
{
assert ((fa != NULL) && (sector != NULL));

sector->fs_off = (off / DRV_FLASH_AREA(fa)->GetInfo()->sector_size) *
DRV_FLASH_AREA(fa)->GetInfo()->sector_size;
sector->fs_size = DRV_FLASH_AREA(fa)->GetInfo()->sector_size;

return 0;
}
8 changes: 4 additions & 4 deletions bl2/ext/mcuboot/include/flash_map/flash_map.h
Original file line number Diff line number Diff line change
Expand Up @@ -64,11 +64,11 @@ extern "C" {
/*
* Shared data area between bootloader and runtime firmware.
*/
#if (defined(BOOT_TFM_SHARED_DATA_BASE) && defined(BOOT_TFM_SHARED_DATA_SIZE))
#define MCUBOOT_SHARED_DATA_BASE BOOT_TFM_SHARED_DATA_BASE
#define MCUBOOT_SHARED_DATA_SIZE BOOT_TFM_SHARED_DATA_SIZE
#if (defined(SHARED_BOOT_MEASUREMENT_BASE) && defined(SHARED_BOOT_MEASUREMENT_SIZE))
#define MCUBOOT_SHARED_DATA_BASE SHARED_BOOT_MEASUREMENT_BASE
#define MCUBOOT_SHARED_DATA_SIZE SHARED_BOOT_MEASUREMENT_SIZE
#else
#error "BOOT_TFM_SHARED_DATA_* must be defined by target."
#error "SHARED_BOOT_MEASUREMENT_* must be defined by target."
#endif

/**
Expand Down
2 changes: 1 addition & 1 deletion bl2/ext/mcuboot/mcuboot_default_config.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ set_property(CACHE MCUBOOT_UPGRADE_STRATEGY PROPERTY STRINGS "OVERWRITE_ONLY;SWA
# platforms requiring specific flash alignmnent
set_property(CACHE MCUBOOT_ALIGN_VAL PROPERTY STRINGS "1;2;4;8;16;32")

set(MCUBOOT_DIRECT_XIP_REVERT ON CACHE BOOL "Enable the revert mechanism in direct-xip mode")
set(MCUBOOT_DIRECT_XIP_REVERT OFF CACHE BOOL "Enable the revert mechanism in direct-xip mode")
set(MCUBOOT_HW_ROLLBACK_PROT ON CACHE BOOL "Enable security counter validation against non-volatile HW counters")
set(MCUBOOT_ENC_IMAGES OFF CACHE BOOL "Enable encrypted image upgrade support")
set(MCUBOOT_BOOTSTRAP OFF CACHE BOOL "Support initial state with empty primary slot and images installed from secondary slots")
Expand Down
4 changes: 2 additions & 2 deletions bl2/ext/mcuboot/scripts/wrapper/wrapper.py
Original file line number Diff line number Diff line change
Expand Up @@ -100,9 +100,9 @@ def wrap(key, align, version, header_size, pad_header, layout, pad, confirm,
rom_fixed = macro_parser.evaluate_macro(layout, rom_fixed_re, 0, 1)

if measured_boot_record:
if "_s" in layout:
if "_s.o" in layout:
record_sw_type = "SPE"
elif "_ns" in layout:
elif "_ns.o" in layout:
record_sw_type = "NSPE"
else:
record_sw_type = "NSPE_SPE"
Expand Down
7 changes: 3 additions & 4 deletions bl2/src/shared_data.c
Original file line number Diff line number Diff line change
Expand Up @@ -170,15 +170,14 @@ static int collect_image_measurement_and_metadata(
* @param[in] hdr Pointer to the image header stored in RAM.
* @param[in] fap Pointer to the flash area where image is stored.
* @param[in] active_slot Which slot is active (to boot).
* @param[in] max_app_size Maximum allowed size of application for update
* slot.
* @param[in] max_app_sizes The maximum sizes of images that can be loaded.
*
* @return 0 on success; nonzero on failure.
*/
int boot_save_shared_data(const struct image_header *hdr,
const struct flash_area *fap,
const uint8_t active_slot,
const int max_app_size)
const struct image_max_size *max_app_sizes)
{
const struct flash_area *temp_fap;
uint8_t mcuboot_image_id = 0;
Expand All @@ -201,7 +200,7 @@ int boot_save_shared_data(const struct image_header *hdr,
#endif /* TFM_MEASURED_BOOT_API */

(void)active_slot;
(void)max_app_size;
(void)max_app_sizes;

if (hdr == NULL || fap == NULL) {
return -1;
Expand Down
110 changes: 2 additions & 108 deletions bl2/src/thin_psa_crypto_core.c
Original file line number Diff line number Diff line change
Expand Up @@ -165,9 +165,7 @@ psa_status_t psa_hash_setup(psa_hash_operation_t *operation,

status = psa_driver_wrapper_hash_setup(operation, alg);

if (status != PSA_SUCCESS) {
psa_hash_abort(operation);
}
assert(status == PSA_SUCCESS);

return status;
}
Expand All @@ -189,9 +187,7 @@ psa_status_t psa_hash_update(psa_hash_operation_t *operation,

status = psa_driver_wrapper_hash_update(operation, input, input_length);

if (status != PSA_SUCCESS) {
psa_hash_abort(operation);
}
assert(status == PSA_SUCCESS);

return status;
}
Expand Down Expand Up @@ -349,28 +345,6 @@ psa_status_t mbedtls_to_psa_error(int ret)
}
}

#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
int mbedtls_psa_get_random(void *p_rng,
unsigned char *output,
size_t output_size)
{
/* This function takes a pointer to the RNG state because that's what
* classic mbedtls functions using an RNG expect. The PSA RNG manages
* its own state internally and doesn't let the caller access that state.
* So we just ignore the state parameter, and in practice we'll pass
* NULL.
*/
(void) p_rng;
psa_status_t status = psa_generate_random(output, output_size);

if (status == PSA_SUCCESS) {
return 0;
} else {
return MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
}
}
#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */

psa_status_t psa_generate_random(uint8_t *output,
size_t output_size)
{
Expand Down Expand Up @@ -446,86 +420,6 @@ psa_status_t psa_verify_hash_builtin(
return PSA_ERROR_NOT_SUPPORTED;
}

/* Required when Mbed TLS backend converts from PSA to Mbed TLS native */
mbedtls_ecp_group_id mbedtls_ecc_group_from_psa(psa_ecc_family_t family,
size_t bits)
{
switch (family) {
case PSA_ECC_FAMILY_SECP_R1:
switch (bits) {
#if defined(PSA_WANT_ECC_SECP_R1_192)
case 192:
return MBEDTLS_ECP_DP_SECP192R1;
#endif
#if defined(PSA_WANT_ECC_SECP_R1_224)
case 224:
return MBEDTLS_ECP_DP_SECP224R1;
#endif
#if defined(PSA_WANT_ECC_SECP_R1_256)
case 256:
return MBEDTLS_ECP_DP_SECP256R1;
#endif
#if defined(PSA_WANT_ECC_SECP_R1_384)
case 384:
return MBEDTLS_ECP_DP_SECP384R1;
#endif
#if defined(PSA_WANT_ECC_SECP_R1_521)
case 521:
return MBEDTLS_ECP_DP_SECP521R1;
#endif
}
break;

case PSA_ECC_FAMILY_BRAINPOOL_P_R1:
switch (bits) {
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
case 256:
return MBEDTLS_ECP_DP_BP256R1;
#endif
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
case 384:
return MBEDTLS_ECP_DP_BP384R1;
#endif
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
case 512:
return MBEDTLS_ECP_DP_BP512R1;
#endif
}
break;

case PSA_ECC_FAMILY_MONTGOMERY:
switch (bits) {
#if defined(PSA_WANT_ECC_MONTGOMERY_255)
case 255:
return MBEDTLS_ECP_DP_CURVE25519;
#endif
#if defined(PSA_WANT_ECC_MONTGOMERY_448)
case 448:
return MBEDTLS_ECP_DP_CURVE448;
#endif
}
break;

case PSA_ECC_FAMILY_SECP_K1:
switch (bits) {
#if defined(PSA_WANT_ECC_SECP_K1_192)
case 192:
return MBEDTLS_ECP_DP_SECP192K1;
#endif
#if defined(PSA_WANT_ECC_SECP_K1_224)
/* secp224k1 is not and will not be supported in PSA (#3541). */
#endif
#if defined(PSA_WANT_ECC_SECP_K1_256)
case 256:
return MBEDTLS_ECP_DP_SECP256K1;
#endif
}
break;
}

return MBEDTLS_ECP_DP_NONE;
}

/* We don't need the full driver wrapper, we know the key is already a public key */
psa_status_t psa_driver_wrapper_export_public_key(
const psa_key_attributes_t *attributes,
Expand Down
67 changes: 36 additions & 31 deletions cmake/install.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,6 @@
#
#-------------------------------------------------------------------------------

# Skip "up-to-date" prints to avoid flooding the build output. Just print "installing"
set(CMAKE_INSTALL_MESSAGE LAZY)

install(DIRECTORY ${CMAKE_BINARY_DIR}/bin/
DESTINATION bin
)
Expand Down Expand Up @@ -75,33 +72,40 @@ if (TFM_PARTITION_INTERNAL_TRUSTED_STORAGE)
endif()

if (TFM_PARTITION_CRYPTO)
install(FILES ${INTERFACE_INC_DIR}/psa/README.rst
${INTERFACE_INC_DIR}/psa/build_info.h
${INTERFACE_INC_DIR}/psa/crypto.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_auto_enabled.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_config_key_pair_types.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_config_synonyms.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_composites.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_key_derivation.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_primitives.h
${INTERFACE_INC_DIR}/psa/crypto_compat.h
${INTERFACE_INC_DIR}/psa/crypto_driver_common.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_composites.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_key_derivation.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_primitives.h
${INTERFACE_INC_DIR}/psa/crypto_extra.h
${INTERFACE_INC_DIR}/psa/crypto_legacy.h
${INTERFACE_INC_DIR}/psa/crypto_platform.h
${INTERFACE_INC_DIR}/psa/crypto_se_driver.h
${INTERFACE_INC_DIR}/psa/crypto_sizes.h
${INTERFACE_INC_DIR}/psa/crypto_struct.h
${INTERFACE_INC_DIR}/psa/crypto_types.h
${INTERFACE_INC_DIR}/psa/crypto_values.h
DESTINATION ${INSTALL_INTERFACE_INC_DIR}/psa)
install(FILES ${INTERFACE_INC_DIR}/tfm_crypto_defs.h
DESTINATION ${INSTALL_INTERFACE_INC_DIR})
install(DIRECTORY ${INTERFACE_INC_DIR}/mbedtls
DESTINATION ${INSTALL_INTERFACE_INC_DIR})
if(PSA_CRYPTO_EXTERNAL_CORE)
include(${TARGET_PLATFORM_PATH}/../external_core_install.cmake)
install(FILES ${INTERFACE_INC_DIR}/tfm_crypto_defs.h
DESTINATION ${INSTALL_INTERFACE_INC_DIR})
else()
install(FILES ${INTERFACE_INC_DIR}/psa/README.rst
${INTERFACE_INC_DIR}/psa/build_info.h
${INTERFACE_INC_DIR}/psa/crypto.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_auto_enabled.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_config_dependencies.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_config_key_pair_types.h
${INTERFACE_INC_DIR}/psa/crypto_adjust_config_synonyms.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_composites.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_key_derivation.h
${INTERFACE_INC_DIR}/psa/crypto_builtin_primitives.h
${INTERFACE_INC_DIR}/psa/crypto_compat.h
${INTERFACE_INC_DIR}/psa/crypto_driver_common.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_composites.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_key_derivation.h
${INTERFACE_INC_DIR}/psa/crypto_driver_contexts_primitives.h
${INTERFACE_INC_DIR}/psa/crypto_extra.h
${INTERFACE_INC_DIR}/psa/crypto_legacy.h
${INTERFACE_INC_DIR}/psa/crypto_platform.h
${INTERFACE_INC_DIR}/psa/crypto_se_driver.h
${INTERFACE_INC_DIR}/psa/crypto_sizes.h
${INTERFACE_INC_DIR}/psa/crypto_struct.h
${INTERFACE_INC_DIR}/psa/crypto_types.h
${INTERFACE_INC_DIR}/psa/crypto_values.h
DESTINATION ${INSTALL_INTERFACE_INC_DIR}/psa)
install(FILES ${INTERFACE_INC_DIR}/tfm_crypto_defs.h
DESTINATION ${INSTALL_INTERFACE_INC_DIR})
install(DIRECTORY ${INTERFACE_INC_DIR}/mbedtls
DESTINATION ${INSTALL_INTERFACE_INC_DIR})
endif()
endif()

if (TFM_PARTITION_INITIAL_ATTESTATION)
Expand Down Expand Up @@ -284,10 +288,11 @@ else()
)
endif()

# PSA_CRYPTO_EXTERNAL_CORE
target_include_directories(psa_interface
INTERFACE
$<INSTALL_INTERFACE:interface/include>
)
)

install(EXPORT tfm-config
FILE spe_export.cmake
Expand Down
9 changes: 9 additions & 0 deletions cmake/spe-CMakeLists.cmake
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,15 @@ target_sources(tfm_api_ns
)

# Include interface headers exported by TF-M
if(PSA_CRYPTO_EXTERNAL_CORE)
include(${TARGET_PLATFORM_PATH}/../external_core.cmake)
else()
target_include_directories(tfm_api_ns
PUBLIC
${INTERFACE_INC_DIR}
)
endif()

target_include_directories(tfm_api_ns
PUBLIC
${INTERFACE_INC_DIR}
Expand Down
Loading