Version 4 vs 14
Version 4 vs 14
Content Changes
Content Changes
Trusted Firmware is an open source project implementing foundational software components for creating secure devices.
Currently the project targets A profile and M profile systems. Trusted Firmware implementation requires hardware assisted isolation of system in secure and non secure worlds. On Arm systems this is realized using Arm TrustZone technology which is different for A and M profiles therefore the project has two separate codebases.
**Trusted Firmware A** for A profile systems, specifically Armv8-A. [[./tf_a/ | Continue on to TF-A wiki... ]]
**Trusted Firmware M** for M profile systems, specifically Armv8-M. [[./tf_m/ | Continue on to TF-M wiki...]]
Or continue to [[./resources/ | common resources, including monthly project updates...]]
See also [[./resources/board-minutes/ | the public minutes of the Project Governing Board meetings.]]
Trusted Firmware is an open source project implementing foundational software components for creating secure devices. It currently consists of:
- **Trusted Firmware-A**. A reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It leverages Arm TrustZone technology; this is different for A and M profile systems, which is why the project has two separate codebases. [[./tf_a/ | Continue on to the TF-A wiki... ]]
- **Trusted Firmware M**. A reference implementation of secure world software for Arm M-Profile systems (Armv8-M). [[./tf_m/ | Continue on to the TF-M wiki...]]
- **OP-TEE**. A Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. On Armv8-A systems it runs at Secure-EL1. [[https://optee.readthedocs.io/en/latest/ | Continue on the the OP-TEE documentation...]]
- **Hafnium**. A reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension. It enables multiple, isolated Secure Partitions (SPs) to run at Secure-EL1.
- **Mbed TLS**. A C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. It has many users, including TF-A, TF-M and OP-TEE. [[./mbed-tls/ | Continue on to the Mbed TLS wiki...]]
- **Trusted Services**. A framework for developing and deploying device root-of-trust services across a range of secure processing environments such as those provided by OP-TEE and Hafnium. [[ ./trusted-services | Continue on to the Trusted Services wiki...]]
Additional pointers to TrustedFirmware project activities can be found in the following locations:
- To see a list of **TrustedFirmware project roadmaps**, please go [[./roadmaps|to this summary page]]
- Some project historical project information can be found on the [[./resources/ | common resources pages]]. This includes monthly project updates and the [[./resources/board-minutes/ | the public minutes]] of the Project Governing Board meetings.
- Here is a list of public [[ ./events/ | events ]] relevant to the Trusted Firmware project.
Trusted Firmware is an open source project implementing foundational software components for creating secure devices.
Currently the project targets A profile and M profile systems. Trusted Firmware implementation requires hardware assisted isolation of system in secure and non secure worlds. On Arm systems this is realized using Arm TrustZone technology which is different for A and M profiles therefore the project has two separate codebases.It currently consists of:
**Trusted Firmware A** for A - **Trusted Firmware-A**. A reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It leverages Arm TrustZone technology; this is different for A and M profile systems, specifically Armv8-Awhich is why the project has two separate codebases. [[./tf_a/ | Continue on to the TF-A wiki... ]]
- **Trusted Firmware M** for M profile systems,. specifically A reference implementation of secure world software for Arm M-Profile systems (Armv8-M). [[./tf_m/ | Continue on to the TF-M wiki...]]
Or continue to [[./resources/ | common resources, - **OP-TEE**. A Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. On Armv8-A systems it runs at Secure-EL1. [[https://optee.readthedocs.io/en/latest/ | Continue on the the OP-TEE documentation...]]
- **Hafnium**. A reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension. It enables multiple, isolated Secure Partitions (SPs) to run at Secure-EL1.
- **Mbed TLS**. A C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. It has many users, including TF-A, TF-M and OP-TEE. including monthly project updates[[./mbed-tls/ | Continue on to the Mbed TLS wiki...]]
See also [[./resources/board-minutes/ | the public minutes of the Project Governing Board meetings
- **Trusted Services**. A framework for developing and deploying device root-of-trust services across a range of secure processing environments such as those provided by OP-TEE and Hafnium. [[ ./trusted-services | Continue on to the Trusted Services wiki...]]
Additional pointers to TrustedFirmware project activities can be found in the following locations:
- To see a list of **TrustedFirmware project roadmaps**, please go [[./roadmaps|to this summary page]]
- Some project historical project information can be found on the [[./resources/ | common resources pages]]. This includes monthly project updates and the [[./resources/board-minutes/ | the public minutes]] of the Project Governing Board meetings.
- Here is a list of public [[ ./events/ | events ]] relevant to the Trusted Firmware project.