Version 9 vs 10
Version 9 vs 10
Content Changes
Content Changes
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ3'22 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Test against PSA Funcation API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.1 Integration.
**CQ3'22 (In Development)**
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
- FF-A manifest/tooling
- First Trusted Service Release Tag
- Block Storage Service
- Platform Security Firmware Design
**CQ4'22 **
- FF-A manifest/tooling
- smm-gateway - authenticated variables
- Platform Security Firmware Update Service
- Block Storage Service
**CQ1'23 **
- Platform Security Firmware Update Service Contd.
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Storage Backend Integration Enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
**Completed **
- SPMC Upstreaming in 3.16 - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/?v=35
- SPMC Upstreaming in 3.17 - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/
**CQ3'22 (In Development) **
- SPMC Upstreaming in 3.18 - smm-gateway
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ4'22 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Test against PSA Funcation API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
**CQ4'22 (In Development)**
- Trusted Service Beta Release Tag
- Block Storage Service
- FF-A manifest/tooling
- Platform Security Firmware Update Service
**CQ1'23 **
- FF-A manifest/tooling
- smm-gateway - authenticated variables
- Platform Security Firmware Update Service enhancements
- Block Storage Service enhancements
**CQ2'23 **
- Platform Security Firmware Update Service Contd.
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Storage Backend Integration Enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
**Completed **
SPMC Upstreaming - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/
**CQ4'22 (In Development) **
- SPMC Upstreaming in 3.19 - FF-A1.1 boot protocol, documentation
Note that the expected quarter when a feature will be completed based on very rough estimates of the effort involved and therefore can change. Items beyond CQ3'224'22 will be planned in detail and confirmed at the start of the quarter depending on progress made in previous quarter and available bandwidth.
If you are interested in collaborating on any of the roadmap features or other features in the project, please mail Trusted Servies mailing lists - trusted-services@lists.trustedfirmware.org
**Supported Features**
- PSA Crypto Service
- PSA Internal Trusted Storage (ITS) Service
- PSA Protected Storage (PS) Service
- PSA Attestation Service
- Example Application/Tests in Normal World using PSA Crypto and PSA Internal Trusted Storage Services
- Enable Crypto HW Integration (HUK, Key derivation) in PSA Crypto Service
- Enable Storage HW Integration (nwd eMMC RPMB) - leverage op-tee support
- FIP based booting
- FF-A Direct Messaging
- Test against PSA Funcation API Compliance Test Suite
- smm-gateway SP
- Mbed TLS3.1 Integration.
**CQ3'22 (In Development)**
- Mbed TLS3.2 Integration
- meta-arm yocto enhancements
- FF-A manifest/tooling
**CQ4'22 (In Development)**
- First- Trusted Servicee Beta Release Tag
- Block Storage Service
-- FF-A manifest/tooling
- Platform Security Firmware Designe Update Service
**CQ4'22 **1'23 **
- FF-A manifest/tooling
- smm-gateway - authenticated variables
- Platform Security Firmware Update Service enhancements
- Block Storage Service enhancements
**CQ12'23 **
- Platform Security Firmware Update Service Contd.
- GP Trusted Application/FF-A Secure Partition Cooperation demo (sharing storage backend)
- Storage Backend Integration Enhancements
**Future **
- Shim layer for legacy GP TAs to access Trusted Services
- Authentication and Access Control of Trusted Services - Contd.
- Open CI
**OP-TEE **(Enhancement as reference Trusted Operating System used along with Trusted Services) ****
**Completed **
- SPMC Upstreaming in 3.16 - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/?v=35**Completed **
- SPMC Upstreaming in 3.17 - Refer - https://developer.trustedfirmware.org/w/trusted-services/op-tee-spmc/
**CQ34'22 (In Development) **
- SPMC Upstreaming in 3.18 - smm-gateway19 - FF-A1.1 boot protocol, documentation