Version 10 vs 11
Version 10 vs 11
Content Changes
Content Changes
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ4'22 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Test against PSA Funcation API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
**CQ4'22 (In Development)**
- Trusted Service Beta Release Tag
- Block Storage Service
- FF-A manifest/tooling
- Platform Security Firmware Update Service
**CQ1'23 **
- FF-A manifest/tooling
- smm-gateway - authenticated variables
- Platform Security Firmware Update Service enhancements
- Block Storage Service enhancements
**CQ2'23 **
- Platform Security Firmware Update Service Contd.
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Storage Backend Integration Enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
**Completed **
SPMC Upstreaming - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/
**CQ4'22 (In Development) **
- SPMC Upstreaming in 3.19 - FF-A1.1 boot protocol, documentation
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ1'23 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Block Storage Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Pass PSA Functional API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
**CQ1'23 (In Development)**
- Block Storage Service
- Platform Security Firmware Update Service
- Mbed TLS 3.3.0 Integration
- GP Trusted Application/FF-A Secure Partition Cooperation PoC
- SP logging prototype
**CQ2'23 **
- Trusted Services 1.0 Release
- Platform Security Firmware Update Service enhancements
- FF-A manifest/tooling
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- smm-gateway - authenticated variables
**CQ3'23 **
- FF-A manifest/tooling
- Storage Backend Integration Enhancements
- Authentication and Access Contol enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ4'221'23 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Block Storage Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Test against- Pass PSA Funcational API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
**CQ4'221'23 (In Development)**
- Trusted Service Beta Release Tag
- Block Storage Service
- FF-A manifest/tooling- Platform Security Firmware Update Service
- Platform Security Firmware Update Service
**CQ1'23 **- Mbed TLS 3.3.0 Integration
- - GP Trusted Application/FF-A manifest/toolingSecure Partition Cooperation PoC
- smm-gateway - authenticated variables - SP logging prototype
**CQ2'23 **
- Platform Security Firmware Update - Trusted Service enhancementss 1.0 Release
- Block Storag- Platform Security Firmware Update Service enhancements
**CQ2'23 **
- Platform Security Firmware Update Service Contd. - FF-A manifest/tooling
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- smm-gateway - authenticated variables
**CQ3'23 **
- FF-A manifest/tooling
- Storage Backend Integration Enhancements
- Authentication and Access Contol enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
**Completed **
SPMC Upstreaming - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/
**CQ4'22 (In Development) **
- SPMC Upstreaming in 3.19 - FF-A1.1 boot protocol, documentation