TrustedFirmware Git Browser
Code Review
Sign In
review.trustedfirmware.org
/
next
/
TF-M
/
trusted-firmware-m
/
e40f9a2701f9c1b89e638e047567ef37444630aa
e40f9a2
Build: Move configurations into a specified directory
by Ken Liu
· 6 years ago
efa7f2a
SST: Replace mem utils with TF-M mem utils
by Jamie Fox
· 6 years ago
b2f3bed
SST: Use correct PSA iovec typenames
by Jamie Fox
· 6 years ago
8e43d0d
SST: Remove duplicated call to sst_crypto_set_iv
by Jamie Fox
· 6 years ago
0b76415
Test: Constify constant buffers in SST tests
by Jamie Fox
· 6 years ago
b5215c3
Docs: Clarify Musca flashing process
by Jamie Fox
· 6 years ago
b8a9270
Docs: Consistently refer to Musca-A
by Jamie Fox
· 6 years ago
024bc46
Test: Add isolation level 2 test cases
by Sherry Zhang
· 6 years ago
065ce4a
Build: Remove support for Armclang version less than 6.10
by Antonio de Angelis
· 6 years ago
bba8564
Build: Unify build artefacts naming
by Tamas Ban
· 6 years ago
5cc9a3f
Boot: Skip MSPLIM setting when current architecture is not Armv8-M
by David Hu
· 6 years ago
4e2051b
Doc: Update maintainers list
by Ashutosh Singh
· 6 years ago
43e80d9
Platform: Ensure flash driver is initialised
by Jamie Fox
· 6 years ago
81fb08c
Build: Add support for Armclang 6.12
by Gary Morrison
· 6 years ago
d332119
Build: Fix compiler related cmake variables
by Sverteczky, Marcell
· 6 years ago
e7efdc6
Docs: Fix rst syntax errors
by Tamas Ban
· 6 years ago
c7b1b6c
Platform: IOCTL for platform-specific services
by Miklos Balint
· 6 years ago
88661e5
Fix compile error on casting pointer type
by Chun-Chieh Li
· 6 years ago
e6322c3
Platform: Adjust required RAM size for SPE in MUSCA_A
by Antonio de Angelis
· 6 years ago
TF-Mv1.0-RC1
c430b99
Core: Add secure lock for IPC model
by Mate Toth-Pal
· 6 years ago
adf0255
Build: Support building IPC model without tests
by Jamie Fox
· 6 years ago
b4a854d
Core: Remove Library mode specific functions for IPC model
by Summer Qin
· 6 years ago
d8e81d1
Build: Remove unused veneer from IPC model
by Edison Ai
· 6 years ago
e4bced6
Test: Remove unused header file from IPC model
by Edison Ai
· 6 years ago
9511e5e
Build: A switch for selecting platform service
by Mingyang Sun
· 6 years ago
56da099
Build: Only build secure test partition if needed
by Jamie Fox
· 6 years ago
707caf7
Crypto: Fixes for PSA Crypto API compliance
by Jamie Fox
· 6 years ago
3298664
Attest: Init hash operation before calling setup
by Jamie Fox
· 6 years ago
2047446
Attest: Fix the detection of option flags
by Tamas Ban
· 6 years ago
c27b5c3
Boot: Fix format specifiers
by Tamas Ban
· 6 years ago
3bfce39
Platform: Fix missing heap for GCC when TFM_LVL!=1
by Jamie Fox
· 6 years ago
c78c62c
Build: Add option to enable or disable Audit Log
by Jamie Fox
· 6 years ago
dcba70b
Boot: Remove format specifier macros
by David Vincze
· 6 years ago
dd02bb3
Core: separate IPC and veneer fn-based code
by Miklos Balint
· 6 years ago
8fb9100
Platform: create, use common secure linker script
by Miklos Balint
· 6 years ago
967eee3
Attest: Update integration guide
by Tamas Ban
· 6 years ago
e2dcd7e
Build: Fix ConfigCoreIPC on Musca-B1
by Tamas Ban
· 6 years ago
1a40a40
Build: Configuration for Regression IPC test
by Edison Ai
· 6 years ago
122360f
Attest: Replace example asymmetric key-pair
by Tamas Ban
· 6 years ago
6c08f9d
Attest: Crypto service binding
by Tamas Ban
· 6 years ago
2a68899
Crypto: Increase the buffer size for memory allocation
by Tamas Ban
· 6 years ago
2ed3022
Attest: Add IPC compatibility
by Kevin Peng
· 6 years ago
8ab36dc
Test: Add maximum token size for attestation tests
by Kevin Peng
· 6 years ago
0a177f6
Platform: Add PSA_INITIAL_ATTEST_TOKEN_MAX_SIZE define
by Kevin Peng
· 6 years ago
9332036
Attest: Increase satck size for level 2 isolation
by Tamas Ban
· 6 years ago
81daed0
Boot: Add RSA-3072 support to MCUBoot
by Tamas Ban
· 6 years ago
7801ed4
Build: Add RSA-3072 support
by Tamas Ban
· 6 years ago
861835c
Boot: Add RSA-3072 support to imgtool script
by Tamas Ban
· 6 years ago
060968d
Boot: Introduce rollback protection
by David Vincze
· 6 years ago
8a2a4e2
Boot: Use overwrite-only mode for image upgrade
by David Vincze
· 6 years ago
4638b2a
Build: Combine compile time MCUBoot switches
by David Vincze
· 6 years ago
ad2baa4
Build: Configuration for PSA API test in IPC mode
by Antonio de Angelis
· 6 years ago
a27bfb5
Crypto: Update default Mbed Crypto config
by Antonio de Angelis
· 6 years ago
ee774c2
Docs: Update crypto service related documentation
by Antonio de Angelis
· 6 years ago
766e94d
SST: Decrease stack size
by Jamie Fox
· 6 years ago
daade49
SST: Crypto service binding
by Jamie Fox
· 6 years ago
9a234e2
Crypto: Support no plaintext in AEAD operations
by Jamie Fox
· 6 years ago
25e2b2d
Crypto: Implement additional PSA Crypto APIs
by Antonio de Angelis
· 6 years ago
3a97d86
Attest: Align to use the updated PSA Crypto API
by Antonio de Angelis
· 6 years ago
cf84203
Test: Amend crypto tests to use the new PSA APIs
by Jamie Fox
· 6 years ago
0e54ebc
Crypto: Migrate the service to use Mbed crypto library
by Jamie Fox
· 6 years ago
4743e67
Crypto: Add IPC compatibility
by Antonio de Angelis
· 6 years ago
e0a3c2f
Boot: Set stack pointer limit for bootloader
by David Vincze
· 6 years ago
e69988c
Platform: Increase bootloader stack size
by David Vincze
· 6 years ago
2ff8c6a
Platform: Extend NV counter interface
by David Vincze
· 6 years ago
fc6d5f1
Platform: Add new NV counter for supported targets
by David Vincze
· 6 years ago
2dbfab5
Platform: Rename NV counter enumerators
by David Vincze
· 6 years ago
db32b21
Boot: Add security counter to image manifest
by David Vincze
· 6 years ago
4653d96
Platform: Reset LMA to RAM for sections
by Ken Liu
· 6 years ago
699d58e
Build: Disable CORE test for IPC model
by Edison Ai
· 6 years ago
752021a
Attest: Unify error handling
by Tamas Ban
· 6 years ago
577672b
Attest: Remove workaround which avoid unaligned access
by Tamas Ban
· 6 years ago
2e413a6
Core: Support boot data handler with IPC
by Edison Ai
· 6 years ago
0e2a2b7
Build: Enable 'REGRESSION' for IPC model
by Edison Ai
· 6 years ago
3204b6c
Core: Update the tfm_service_list.inc
by Shawn Shan
· 6 years ago
8a45e32
Core: Extend stack size in secure client partition
by Summer Qin
· 6 years ago
a9ae8bd
Platform: Refine the stack size
by Summer Qin
· 6 years ago
d00e4db
Core: Use the stack region in the linker file
by Summer Qin
· 6 years ago
b82c1ea
Platform: Refactor the linker files
by Summer Qin
· 6 years ago
ebac810
Core: Decrease the max number of message queue
by Summer Qin
· 6 years ago
16de679
Audit: Remove references to Mbed TLS build
by Antonio de Angelis
· 6 years ago
a0054d7
SST: Permit null pointers with zero length
by Jamie Fox
· 6 years ago
b657d13
Platform: Fix Debug authentication for Musca-B1
by Mate Toth-Pal
· 6 years ago
191c5b2
Platform: Support MUSCA_B1 isolation lvl2 with GCC
by Mingyang Sun
· 6 years ago
1c5937c
Platform: Support AN519 isolation lvl2 with GCC
by Mingyang Sun
· 6 years ago
30ed65d
Platform: Support isolation level 2 for AN519
by Mingyang Sun
· 6 years ago
57a9da5
Platform: Set proper MAIR_ATTR for MPU regions for AN519
by Mingyang Sun
· 6 years ago
91814a1
Platform: Fix LVL2 IPC test runtime error
by Mingyang Sun
· 6 years ago
1c49d24
Platform: Support AN521 isolation lvl2 with GCC
by Mingyang Sun
· 6 years ago
1960b55
Platform: Increase NS image flash area on Musca-B1
by Kevin Peng
· 6 years ago
b86dae7
Build: Fix stack size for secure client partition
by Jamie Fox
· 6 years ago
a99ec6b
Manifest: Fix error msg for missing yaml package
by Mate Toth-Pal
· 6 years ago
fe989c4
Core: Optional features supporting in manifest
by Shawn Shan
· 6 years ago
08596fb
Interface: Add necessary include in tfm_ns_lock.h
by Oren Cohen
· 6 years ago
665d832
Core: Correct minor version check for TFM_VERSION_POLICY_RELAXED
by Oren Cohen
· 6 years ago
b22af9a
Platform: Support isolation level 2 for MUSCA_B1
by Edison Ai
· 6 years ago
10ee5e6
Platform: Set proper MAIR_ATTR for MPU regions for MUSCA_B1
by Edison Ai
· 6 years ago
58369d5
Platform: Correct the region access attribute
by Edison Ai
· 6 years ago
3281499
COSE: Fix typo in license header
by Tamas Ban
· 6 years ago
2ad4e4f
COSE: Correct compatibility with COSE standard
by Laurence Lundblade
· 6 years ago
Next »