Version 1 vs 21
Version 1 vs 21
Edits
Edits
- Edit by • aksjai112, Version 21
- Feb 5 2024 12:37 PM
- Edit by shebuk, Version 1
- Apr 19 2021 2:40 PM
Edit Older Version 1... | Edit Current Version 21... |
Content Changes
Content Changes
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ2'21 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
**CQ2'21 (In Development)**
- PSA Attestation Service
- PSA Protected Storage Service
- FF-A Direct Messaging
- StMM (Stand Alone Management Mode) Updates (for compatibility with SPMC & co-exist with other Trusted Services)
**CQ3'21 **
- PSA Attestation Service Continued
- aarch32 support in Trusted Services
- Storage Backend Integration Enhancements
- Run, pass PSA Func. API ACS Contd.
**CQ3'21 **
- aarch32 support in Trusted Services Contd.
- Boot Flow Enhancements
- Firmwae Update Service
- Run, pass PSA Func. API ACS Contd.
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
Supported Features (Upstreaming in progress)
- Secure Partition Loading, FF-A Message Routing, SPMC
**CQ2'21 (In Development)**
- SPMC Upstreaming
- StMM SPMC Implementation
**CQ3'21 (In Development)**
Aarch32 support - OP-TEE as monitor + SPMD
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ2'24 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Services mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Block Storage Service
- Platform Security Firmware Update Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Pass PSA Functional API Compliance Test Suite
- meta-arm yocto enhancements
- Cloud Migration to CI
- Mbed TLS 3.4.0 Integration
**CQ4'23**
- smm gateway - Authorised variables
- Authentication and Access Control enhancements
- S-EL0 RPM | Storage Backend Integration
**CQ1'24 **
- mbedTLS 3.5 Integration
- Authentication and Access Control enhancements
- Platform Security Firmware Update Service enhancements
**CQ2'24 **
- Yocto recipe updates to support v1.0.0 release
- Storage Backend Integration Enhancements
- Authentication and Access Control of Trusted Services - Contd.
- SP logging prototype
**Future **
- FF-A manifest/tooling
- YP Updates : Enable TS on FVP Platform
- Shim layer for legacy GP TAs to access Trusted Services
- Storage Backend Integration Enhancements - Contd
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Open CI
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ2'214 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Services mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Block Storage Service
- Platform Security Firmware Update Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
**CQ2'21 (In Development)**
- PSA Attestation Service
- PSA Protected Storage Service - FIP based booting
- FF-A Direct Messaging
- StMM (Stand Alone Management Mode) Updates (for compatibility with SPMC & co-exist with other Trusted Services)
**CQ3'21 **
- PSA Attestation Service Continued
- aarch32 support in Trusted Services - Pass PSA Functional API Compliance Test Suite
- Storage Backend Integration E - meta-arm yocto enhancements
- Run, pass PSA Func. API ACS Contd. - Cloud Migration to CI
- Mbed TLS 3.4.0 Integration
**CQ3'21 **4'23**
- smm gateway - Authorised variables
- aarch32 support in Trusted Services Contd.- Authentication and Access Control enhancements
- Boot Flow Enhancements
- Firmwae Update Service
- Run, pass PSA Func. API ACS Contd.
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) **S-EL0 RPM | Storage Backend Integration
**CQ1'24 **
Supported Features (Upstreaming in progress)- mbedTLS 3.5 Integration
- Authentication and Access Control enhancements
- - Platform Secure Partition Loading, FF-A Message Routing, SPMCity Firmware Update Service enhancements
**CQ2'24 **
**CQ2'21 (In Development)**- Yocto recipe updates to support v1.0.0 release
- SPMC Upstreaming- Storage Backend Integration Enhancements
- StMM SPMC Implementation- Authentication and Access Control of Trusted Services - Contd.
- SP logging prototype
**Future **
**CQ3'21 (In Development)**- FF-A manifest/tooling
- YP Updates : Enable TS on FVP Platform
Aarch32 support - OP-TEE as monitor + SPMD
- Shim layer for legacy GP TAs to access Trusted Services
- Storage Backend Integration Enhancements - Contd
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Open CI