Version 3 vs 4
Version 3 vs 4
Edits
Edits
- Edit by gyuri-szing, Version 4
- Dec 5 2022 3:04 PM
- Edit by gyuri-szing, Version 3
- Dec 5 2022 2:59 PM
« Previous Change | Next Change » |
Edit Older Version 3... | Edit Older Version 4... |
Content Changes
Content Changes
The release has been tested with with OP-TEE manifest v3.19.0 with the following modifications:
- Trusted Services version changed to ` v1.0.0-beta_rc0`
- A fix applied to OP-TEE/build. For details please see: https://review.trustedfirmware.org/c/OP-TEE/build/+/18157
- The "afm-ffa-user" driver is upgraded to v5.0.0 to add support for 64bit direct messages which is mandatory for the current version of SmmGW SP.
- OP-TEE components are pinned to v3.19.0 instead of master.
The above dependency configuration can be set using the attached local manifest file: {F300866}
**Test configuration**:
- Two set-ups were used for validation:
-- SPs embedded into the OP-TEE SP binary and booted like "Eary TAs". This configuration is referred to as `github-opteesp-emb` hereafter.
-- SPs added and to the FIP package and booted from there. This set-up is refereed as `github-opteesp-fip` hereafter. **In this set-up the PSA-IAT SP is not deployed** due to a limitation in TF-A v2.6 on the number of FIP package entries.
- Test configuration:
-- All tests were executed with the "default" configuration unless noted here.
-- The "psa-iat-api-test" and ts-service-test cases testing the Attestation SP were disabled for github-opteesp-fip`.
**Test results**
All tests passed with the following exceptions:
- psa-crypto-api test:
-- TEST: 262 `psa_hash_suspend` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 263 `psa_hash_resume` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 237/Check 7/Checkpoint 11 fails. To be fixed in the next release.
- psa-ps-api-test:
-- TEST: 414/Check 1/Checkpoint 1 fails. To be fixed in the next release.
- psa-iat-api-test:
-- TEST: 601/Check 1/Checkpoint 2 fails with error 73. To be fixed in the next release.
The release has been tested with with OP-TEE manifest v3.19.0 with the following modifications:
- Trusted Services version changed to ` v1.0.0-beta_rc0`
- A fix applied to OP-TEE/build. For details please see: https://review.trustedfirmware.org/c/OP-TEE/build/+/18157
- The "afm-ffa-user" driver is upgraded to v5.0.0 to add support for 64bit direct messages which is mandatory for the current version of SmmGW SP.
- OP-TEE components are pinned to v3.19.0 instead of master.
The above dependency configuration can be set using the attached local manifest file: {F300866}
**Test configuration**:
- Two set-ups were used for validation:
-- SPs embedded into the OP-TEE SP binary and booted like "Eary TAs". This configuration is referred to as `github-opteesp-emb` hereafter.
-- SPs added and to the FIP package and booted from there. This set-up is refereed as `github-opteesp-fip` hereafter. **In this set-up the PSA-IAT SP is not deployed** due to a limitation in TF-A v2.6 on the number of FIP package entries.
- Test configuration:
-- All tests were executed with the "default" configuration unless noted here.
-- The "psa-iat-api-test" and ts-service-test cases testing the Attestation SP were disabled for github-opteesp-fip`.
Build options:
- `github-opteesp-emb` was built running `make SPMC_TESTS=n`
- `github-opteesp-fip` was built running `make SPMC_TESTS=n SP_PACKAGING_METHOD=fip MEASURED_BOOT=n`
**Test results**
All tests passed with the following exceptions:
- psa-crypto-api test:
-- TEST: 262 `psa_hash_suspend` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 263 `psa_hash_resume` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 237/Check 7/Checkpoint 11 fails. To be fixed in the next release.
- psa-ps-api-test:
-- TEST: 414/Check 1/Checkpoint 1 fails. To be fixed in the next release.
- psa-iat-api-test:
-- TEST: 601/Check 1/Checkpoint 2 fails with error 73. To be fixed in the next release.
The release has been tested with with OP-TEE manifest v3.19.0 with the following modifications:
- Trusted Services version changed to ` v1.0.0-beta_rc0`
- A fix applied to OP-TEE/build. For details please see: https://review.trustedfirmware.org/c/OP-TEE/build/+/18157
- The "afm-ffa-user" driver is upgraded to v5.0.0 to add support for 64bit direct messages which is mandatory for the current version of SmmGW SP.
- OP-TEE components are pinned to v3.19.0 instead of master.
The above dependency configuration can be set using the attached local manifest file: {F300866}
**Test configuration**:
- Two set-ups were used for validation:
-- SPs embedded into the OP-TEE SP binary and booted like "Eary TAs". This configuration is referred to as `github-opteesp-emb` hereafter.
-- SPs added and to the FIP package and booted from there. This set-up is refereed as `github-opteesp-fip` hereafter. **In this set-up the PSA-IAT SP is not deployed** due to a limitation in TF-A v2.6 on the number of FIP package entries.
- Test configuration:
-- All tests were executed with the "default" configuration unless noted here.
-- The "psa-iat-api-test" and ts-service-test cases testing the Attestation SP were disabled for github-opteesp-fip`.
Build options:
- `github-opteesp-emb` was built running `make SPMC_TESTS=n`
- `github-opteesp-fip` was built running `make SPMC_TESTS=n SP_PACKAGING_METHOD=fip MEASURED_BOOT=n`
**Test results**
All tests passed with the following exceptions:
- psa-crypto-api test:
-- TEST: 262 `psa_hash_suspend` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 263 `psa_hash_resume` fails with -134. This operation is not and will not be supported by any future version of TS.
-- TEST: 237/Check 7/Checkpoint 11 fails. To be fixed in the next release.
- psa-ps-api-test:
-- TEST: 414/Check 1/Checkpoint 1 fails. To be fixed in the next release.
- psa-iat-api-test:
-- TEST: 601/Check 1/Checkpoint 2 fails with error 73. To be fixed in the next release.