blob: 33dcf42d996a04aae82cdefb39fde0c7725d9a19 [file] [log] [blame]
Julian Halle76ade82020-11-25 03:07:21 +01001Change Log & Release Notes
2==========================
3
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +01004This document contains a summary of the new features, changes, fixes and known issues in each release of Trusted
5Services.
Julian Halle76ade82020-11-25 03:07:21 +01006
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +01007Version 1.0.0-Beta
8------------------
Julian Halle76ade82020-11-25 03:07:21 +01009
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +010010The first tagged release of the project.
Julian Halle76ade82020-11-25 03:07:21 +010011
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +010012Feature Highlights
13^^^^^^^^^^^^^^^^^^
Julian Halle76ade82020-11-25 03:07:21 +010014
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +010015The project supports the following services:
Julian Halle76ade82020-11-25 03:07:21 +010016
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +010017 - Secure Storage
18 - Crypto
19 - Initial Attestation
20 - Smm Variable
21
22Services may be accessed using client components that implement "`Psacertified v1.0 APIs`_". The project includes deployments
23that integrate `PSA API certification tests`_ with API clients to facilitate end-to-end PSA certification testing.
24
25Known limitations
26'''''''''''''''''
27
28 - Crypto key store partitioning by client is not yet supported.
29 - Discovery support is only currently integrated into the Crypto service provider. In case of services not supporting
30 this feature yet, communication parameters (e.g. maximum buffer size) and supported feature set needs to be hardcode
31 to the service provider and service client.
32
33Supported Trusted Environments
34''''''''''''''''''''''''''''''
35
36In the default configuration each service is deployed to a dedicated FF-A Secure Partition and executes isolated.
37Service implementations are platform, trusted environment and service deployment agonistic. With appropriate enablement
38work services can be enabled to work in any combination of these.
39
40The reference integration uses the SPMC implemented in OP-TEE OS to manage TS SPs. This release supports `OP-TEE v3.19`_.
41
42Supported Integration Systems
43'''''''''''''''''''''''''''''
44
45The reference solution uses the OP-TEE integration methodology. This relies on the google repo tool for high-level dependency
46management and a set of makefiles to capture the build configuration information. For details please refer to
47`OP-TEE git repo documentation`_.
48
49The project is officially enabled in `Yocto meta-arm`_.
50
51Supported Target Platforms
52''''''''''''''''''''''''''
53
54The only reference platform supported by this release is the `AEM FVP`_ build using the OP-TEE integration method.
55
56Known limitations:
57
58 - Non-volatile backend secure storage is not currently provided.
59
60
61Test Report
62^^^^^^^^^^^
63
64Please find the Test Report covering this release in the `tf.org wiki`_.
65
66
Julian Halle76ade82020-11-25 03:07:21 +010067
68--------------
69
Gyorgy Szing0b8b4fa2022-11-17 13:00:45 +010070.. _`FF-A Specification v1.0`: https://developer.arm.com/documentation/den0077/a
71.. _`Psacertified v1.0 APIs`: https://www.psacertified.org/development-resources/building-in-security/specifications-implementations/
72.. _`OP-TEE v3.19`: https://github.com/OP-TEE/optee_os/tree/3.19.0
73.. _`Yocto meta-arm` : https://gitlab.oss.arm.com/engineering/yocto/meta-arm/-/tree/master/meta-arm/recipes-security/trusted-services
74.. _`tf.org wiki`: https://developer.trustedfirmware.org/w/trusted-services/test-reports/v1.0.0-beta/
75.. _`AEM FVP`: https://developer.arm.com/-/media/Files/downloads/ecosystem-models/FVP_Base_RevC-2xAEMvA_11.18_16_Linux64.tgz
76.. _`PSA API certification tests`: https://github.com/ARM-software/psa-arch-tests
77.. _`OP-TEE git repo documentation`: https://optee.readthedocs.io/en/latest/building/gits/build.html
78
79*Copyright (c) 2020-2022, Arm Limited and Contributors. All rights reserved.*
Julian Halle76ade82020-11-25 03:07:21 +010080
81SPDX-License-Identifier: BSD-3-Clause