Version 6 vs 14
Version 6 vs 14
Content Changes
Content Changes
Trusted Firmware is an open source project implementing foundational software components for creating secure devices.
This currently consists of:
- **Trusted Firmware-A**. This is a reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. This leverages Arm TrustZone technology, which is different for A and M profiles, and is why the project has two separate codebases. [[./tf_a/ | Continue on to the TF-A wiki... ]]
- **Trusted Firmware M**. This is a reference implementation of secure world software for Arm M-Profile systems (Armv8-M. [[./tf_m/ | Continue on to the TF-M wiki...]]
- **OP-TEE**. This is a Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. On Armv8-A systems it runs at Secure-EL1. [[https://optee.readthedocs.io/en/latest/ | Continue on the the OP-TEE documentation]]
- **Hafnium**. This is a reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension. It enables multiple, isolated Secure Partitions (SPs) to run at Secure-EL1.
- **Mbed TLS**. is a C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. It includes a reference implementation of the PSA Cryptography API (currently a preview for evaluation purposes only). It has many users, including TF-A and TF-M. [[./mbed-tls/ | Continue on to the Mbed TLS wiki...]]
See also the [[./resources/ | common resources, including monthly project updates...]] , including [[./resources/board-minutes/ | the public minutes of the Project Governing Board meetings.]]
Here is a list of public [[ ./events/ | events ]] relevant to the Trusted Firmware project.
Trusted Firmware is an open source project implementing foundational software components for creating secure devices. It currently consists of:
- **Trusted Firmware-A**. A reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It leverages Arm TrustZone technology; this is different for A and M profile systems, which is why the project has two separate codebases. [[./tf_a/ | Continue on to the TF-A wiki... ]]
- **Trusted Firmware M**. A reference implementation of secure world software for Arm M-Profile systems (Armv8-M). [[./tf_m/ | Continue on to the TF-M wiki...]]
- **OP-TEE**. A Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. On Armv8-A systems it runs at Secure-EL1. [[https://optee.readthedocs.io/en/latest/ | Continue on the the OP-TEE documentation...]]
- **Hafnium**. A reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension. It enables multiple, isolated Secure Partitions (SPs) to run at Secure-EL1.
- **Mbed TLS**. A C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. It has many users, including TF-A, TF-M and OP-TEE. [[./mbed-tls/ | Continue on to the Mbed TLS wiki...]]
- **Trusted Services**. A framework for developing and deploying device root-of-trust services across a range of secure processing environments such as those provided by OP-TEE and Hafnium. [[ ./trusted-services | Continue on to the Trusted Services wiki...]]
Additional pointers to TrustedFirmware project activities can be found in the following locations:
- To see a list of **TrustedFirmware project roadmaps**, please go [[./roadmaps|to this summary page]]
- Some project historical project information can be found on the [[./resources/ | common resources pages]]. This includes monthly project updates and the [[./resources/board-minutes/ | the public minutes]] of the Project Governing Board meetings.
- Here is a list of public [[ ./events/ | events ]] relevant to the Trusted Firmware project.
Trusted Firmware is an open source project implementing foundational software components for creating secure devices. It currently consists of:
This currently consists of: - **Trusted Firmware-A**. A reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. It leverages Arm TrustZone technology; this is different for A and M profile systems, which is why the project has two separate codebases. [[./tf_a/ | Continue on to the TF-A wiki... ]]
- **Trusted Firmware-A**. This is a reference implementation of secure world software for Arm A-Profile systems (Armv8-A and Armv7-A), including an Exception Level 3 (EL3) Secure Monitor. This leverages Arm TrustZone technology, which is different for A and M profiles, M**. and is why the project has two separate codebasesA reference implementation of secure world software for Arm M-Profile systems (Armv8-M). [[./tf_a/m/ | Continue on to the TF-ATF-M wiki... ]]
- **Trusted Firmware M**OP-TEE**. A Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. This is a reference implementation of secure world software for Arm M-Profile systems (Armv8-MOn Armv8-A systems it runs at Secure-EL1. [[./tf_mhttps://optee.readthedocs.io/en/latest/ | Continue on tohe the TF-M wikiOP-TEE documentation...]]
- **OP-TEE**Hafnium**. This is a Trusted Execution Environment (TEE) designed as a companion to a non-secure Linux kernel running on Arm A-Profile systems (Armv8-A and Armv7-A) using TrustZone technology. On Armv8-A systems it runs at Secure-EL1A reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension. [[https://optee.readthedocs.io/en/latest/ | Continue on the the OP-TEE documentation]]It enables multiple, isolated Secure Partitions (SPs) to run at Secure-EL1.
- **Hafnium**Mbed TLS**. A C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. This is a reference Secure Partition Manager (SPM) for systems that implement the Armv8.4-A Secure-EL2 extension.It has many users, including TF-A, It enables multiple,TF-M and OP-TEE. isolated Secure Partitions (SPs) to run at Secure-EL1.[[./mbed-tls/ | Continue on to the Mbed TLS wiki...]]
- **Mbed TLS**. is a C library implementing cryptographic primitives, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint makes it suitable for embedded systems. It includes a reference implementation of the PSA Cryptography API (currently a preview for evaluation purposes only). It has many users,Trusted Services**. including TF-A and TF-MA framework for developing and deploying device root-of-trust services across a range of secure processing environments such as those provided by OP-TEE and Hafnium. [[./mbed-tls/ ./trusted-services | Continue on to the Mbed TLSTrusted Services wiki...]]
See also the [[./resources/ | common resources, including monthly project updates...]] , including [[./resources/board-minutes/ | the public minutes of the Project Governing Board meetings.]]Additional pointers to TrustedFirmware project activities can be found in the following locations:
- To see a list of **TrustedFirmware project roadmaps**, please go [[./roadmaps|to this summary page]]
- Some project historical project information can be found on the [[./resources/ | common resources pages]]. This includes monthly project updates and the [[./resources/board-minutes/ | the public minutes]] of the Project Governing Board meetings.
- Here is a list of public [[ ./events/ | events ]] relevant to the Trusted Firmware project.