Laukik Hase
d116567a66
refactor(esp_tee): Update TEE secure storage interface APIs
2025-05-04 18:03:29 +05:30
Laukik Hase
a0031cff9f
refactor(esp_tee): Remove the redudant eFuse-related service calls
2025-04-17 11:04:29 +05:30
Laukik Hase
4a4d63d36e
feat(esp_tee): Protect the ECC peripheral from REE access
2025-04-16 19:19:04 +05:30
Laukik Hase
fc4802c0d6
feat(esp_tee): Protect the HMAC and DS peripherals from REE access
2025-04-16 19:19:04 +05:30
Laukik Hase
bd314c2460
refactor(esp_tee): Update the SHA clock configuration service call
2025-04-04 10:31:28 +05:30
Laukik Hase
1e8933d296
feat(esp_tee): Add support for SECP192R1
curve in TEE secure storage
2025-04-03 15:35:14 +05:30
Laukik Hase
26fa7109f3
fix(esp_tee): Protect the AES/SHA clock registers from REE access
2025-02-25 16:49:08 +05:30
Laukik Hase
c23714f775
feat(esp_tee): Add support for flash memory isolation and protection (SPI1)
2025-02-11 12:30:05 +05:30
Laukik Hase
37525c605d
refactor(esp_tee): Migrate secure services list from TBL to YAML
2025-02-11 10:15:20 +05:30
harshal.patil
7d8211bf87
feat(mbedtls): Support both SHA block and DMA modes during runtime
...
Dynamically switch the SHA operation modes based on the buffer operating length
2025-02-04 16:49:30 +05:30
Laukik Hase
c4eec756f3
refactor(esp_tee): Revised the secure service ID numbering scheme
...
Also:
- Split the secure service table into two parts: one DRAM-resident and the
other DROM-resident. The former holds the services invoked when the cache is
disabled or suspended while the latter holds rest of the services.
2025-01-23 12:39:19 +05:30
Laukik Hase
a91f89026c
feat(esp_tee): Make the attestation service configurable
2025-01-23 12:39:17 +05:30
Laukik Hase
1499c65754
feat(esp_tee): Add support for flash memory isolation and protection (SPI0)
2025-01-03 11:44:01 +05:30
Laukik Hase
373930655a
feat(esp_tee): Support for ESP-TEE - the main
component
2024-12-02 12:20:05 +05:30