I think that we shouldn't implement these APIs.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Nov 1 2021
Oct 29 2021
Oct 28 2021
Oct 26 2021
Oct 23 2021
Oct 18 2021
Oct 15 2021
Oct 11 2021
Oct 8 2021
Oct 6 2021
mbedTLS PR has now been merged on development branch. Started work focusing on GCM.
Add the remaining case for 8-byte IVs during refactoring work, and when tests are available.
Oct 5 2021
Oct 4 2021
Oct 1 2021
Sep 29 2021
Sep 28 2021
Sep 27 2021
Sep 25 2021
Sep 24 2021
Sep 23 2021
The 1.4.x branch is only intended for security fixes.
https://developer.trustedfirmware.org/w/collaboration/tf_m_security_patch_release/
Sep 22 2021
Thanks for your check. Would you also backport the patch to TF-M 1.4?
Sep 20 2021
Sep 18 2021
Hi ioannisg,
I think you're right.
The Secure PendSV is masked by NSPE, although it has the same priority value 0x80.
It has to have a lower value to preempt the NSPE, having an equal priority value does not work.
Sep 17 2021
Sep 16 2021
Sep 15 2021
Sep 13 2021
Sep 10 2021
Note: Feedback to the PSA spec team for a priority value to be associated to each JSON file for those configurations where we have multiple accelerators available.
Sep 6 2021
The spec currently defines an attribute for an entry point (or family of) in the JSON file, i.e. algorithms, which is used by the core to decide if the entry point needs to be applied for a particular algorithm or not. The JSON file is meant to be consumed as a description of the driver by the mbedTLS parser at build time, in order to link the driver entry points properly into the driver core.
Sep 4 2021
After additional analysis, the summary of the discussion is that these entry points are more suited to be implemented for an hardware which implements a fast way to provide random numbers. CC-312 exposes a TRNG source through the get_entropy entry point, but the remaining part of the DRBG algorithms is implemented in firmware (possibly only partially accelerating parts of them through the driver crypto core transparently calling into the driver from within its own software implementation). For this reason, I am marking this item as Won't do.