{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":340268303,"defaultBranch":"master","name":"MA35D1_optee_os-v3.9.0","ownerLogin":"OpenNuvoton","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2021-02-19T05:31:08.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/18352608?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1646280077.491441","currentOid":""},"activityList":{"items":[{"before":"2970c26c8d9750bfbbb0be65bc05813b46bc7e52","after":"1439a054df9796cea26143bec8245084a79bcb73","ref":"refs/heads/master","pushedAt":"2024-09-26T06:36:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Update TSI pacth image\n\nAdd CMD_EXT_SET_SYSTICK command support to TSI patch.\n\nChange-Id: I495ab4bee1b4a911be49d679fce817dbe50d29b6","shortMessageHtmlLink":"Update TSI pacth image"}},{"before":"22203b3253765a66a3e0c416b5b36b3e8b3855fe","after":"2970c26c8d9750bfbbb0be65bc05813b46bc7e52","ref":"refs/heads/master","pushedAt":"2024-08-23T10:53:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Avoid initializing TSI multiple times\n\nBefore initializing TSI, check if it has already been initialized.\nIf TSI is already initialized, skip the initialization.\n\nChange-Id: I014e7122723e71df57e2ae69d63381e884ee9eac","shortMessageHtmlLink":"Avoid initializing TSI multiple times"}},{"before":"ba0c64b8b377b614e3d51b210203f98b20745d15","after":"22203b3253765a66a3e0c416b5b36b3e8b3855fe","ref":"refs/heads/master","pushedAt":"2024-08-07T07:30:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Load TSI patch image only if TSI H/W is present\n\nNew MA35D1 parts without TSI, the MA35D16F984 and MA35D16F884, have been\nintroduced. The assumption that all MA35D1 parts always have TSI is no\nlonger valid. This patch adds a check to load the TSI image only if TSI\nhardware is present.\n\nChange-Id: I919ecfaf6311724ae2ce0d7f18854821d9f59f35","shortMessageHtmlLink":"Load TSI patch image only if TSI H/W is present"}},{"before":"d09cf1503c25fd6e5fd743e2aae15123b6db7ea8","after":"ba0c64b8b377b614e3d51b210203f98b20745d15","ref":"refs/heads/master","pushedAt":"2024-06-18T02:27:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Add a function to demonstrate how to program/read OTP\n\nAdded a command to program OTP keys.\nAdded a demo function that includes a complete dump of the\nOTP and an example of how to program the OTP.\n\nChange-Id: I58178ca9ccfbaa444bfe79809bf90219e34046de","shortMessageHtmlLink":"Add a function to demonstrate how to program/read OTP"}},{"before":"b55efaefa1da2da6c382630e26ad69c276c07e92","after":"d09cf1503c25fd6e5fd743e2aae15123b6db7ea8","ref":"refs/heads/master","pushedAt":"2024-02-21T09:25:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Modified the failure message for reading OTP UID\n\nIf OTP UID is not burned, it will result in a failure to\nread the UID. This should not be an error message; this\npatch modifies it to a prompt message.\nIn case OTP UID is not burned, hard-coded key values will\nbe used instead.\n\nChange-Id: I4eb9b49d532a7f1774552a4117f8f5eb457e1428","shortMessageHtmlLink":"Modified the failure message for reading OTP UID"}},{"before":"bc9cb781afbb20fe09bf2341f1cb99b3a52f235f","after":"b55efaefa1da2da6c382630e26ad69c276c07e92","ref":"refs/heads/master","pushedAt":"2024-01-12T06:07:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Fix the mistake of AES TSI key source parameter\n\nOn invoking TSI AES SetMode command. The key source parameter\nis wrong for OTP key. It should be 0x5, but not 0x2 from register.\n\nChange-Id: I0041a13381e0d8a9eddfdda38dd4c8d9fb3a4293","shortMessageHtmlLink":"Fix the mistake of AES TSI key source parameter"}},{"before":"7fbb50197e51d8c2e94fe8fc3732ad42045a88bb","after":"bc9cb781afbb20fe09bf2341f1cb99b3a52f235f","ref":"refs/heads/master","pushedAt":"2024-01-09T10:39:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Add Support for MA35D1 ECC Key Functions to Crypto PTA\n\nIntegrate support for ECC public key generation, ECDSA signature\ngeneration, and ECDSA signature verification functions into the\nCrypto PTA. Additionally, include PTA commands to invoke these\nnew features.\n\nChange-Id: I92abc2d9815b03e69a78eb89f55a3c2488717da6","shortMessageHtmlLink":"Add Support for MA35D1 ECC Key Functions to Crypto PTA"}},{"before":"5ecec4b0c5c386fd38ac9f5de952ea1ea356fe44","after":"7fbb50197e51d8c2e94fe8fc3732ad42045a88bb","ref":"refs/heads/master","pushedAt":"2023-12-07T00:38:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Fix the wrong error messages\n\nSome error messages were not correctly modified during copying,\nfailing to convey the accurate error information. This issue has\nbeen rectified.\n\nChange-Id: Ic15c745689b71d6a49b22940e18c778d8ef1ad44","shortMessageHtmlLink":"Fix the wrong error messages"}},{"before":"075741c5970bdb2b8e7791efa8f85545b96b4cd8","after":"5ecec4b0c5c386fd38ac9f5de952ea1ea356fe44","ref":"refs/heads/master","pushedAt":"2023-12-01T09:37:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Add MA35D1 HUK support for secure storage key\n\nUse Key Store OTP key 0 as the HUK for OP-TEE secure\nstorage key.\nIf Key Store OTP key 0 was not written, a set of default\nkey will be used.\n\nChange-Id: I8b0cc5ef38f69b3f7bea0c7585551d40a7c3c0d7","shortMessageHtmlLink":"Add MA35D1 HUK support for secure storage key"}},{"before":"f9e7ad6e141e8cffd2e92c6160c737dec047394c","after":"075741c5970bdb2b8e7791efa8f85545b96b4cd8","ref":"refs/heads/master","pushedAt":"2023-11-17T01:25:11.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Fix the issue that TSI image was not loaded in case of secure boot\n\nOnce secure boot is enabled, TSI should be used and initialized at the\nboot stage. OPTEE will not load the TSI image if it finds that TSI has\nalready been initialized. This results in the failure of TSI_OTP_Read()\nbecause this command relies on the TSI image.\nThis patch fixes the issue by always loading the TSI image.\n\nChange-Id: I447bba0a59ac33b5448a6f8033478b77d737cba3","shortMessageHtmlLink":"Fix the issue that TSI image was not loaded in case of secure boot"}},{"before":"45c043ac4610d0a8fb693aaaae4ad5db93ed625f","after":"f9e7ad6e141e8cffd2e92c6160c737dec047394c","ref":"refs/heads/master","pushedAt":"2023-11-16T03:29:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Add support for MA35D0 and MA35H0 platform\n\nUpdate Crypto, Key Store, and TRNG PTAs.\n\nChange-Id: Id333989d93cadb5fd7dfcaa9fc9a1ef3012faa7e","shortMessageHtmlLink":"Add support for MA35D0 and MA35H0 platform"}},{"before":"49e947a8e7dc8304d4d6deb20f00d7f4caabab50","after":"45c043ac4610d0a8fb693aaaae4ad5db93ed625f","ref":"refs/heads/master","pushedAt":"2023-11-14T11:09:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ychuang3","name":null,"path":"/ychuang3","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/70507205?s=80&v=4"},"commit":{"message":"Remove useless SYS-PLL init code in case of non-TSI chips\n\nIn case of non-TSI chips, such as MA35D0/H0, the TF-A will perform\nSYS-PLL initialization.\nThis patch removed useless SYS-PLL initialization code.\n\nChange-Id: I41c0ff339872211081936c8d9b7e61f5a9455d33","shortMessageHtmlLink":"Remove useless SYS-PLL init code in case of non-TSI chips"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNlQwNjozNjo1NS4wMDAwMDBazwAAAATBHeWT","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMS0xNFQxMTowOTo0NS4wMDAwMDBazwAAAAOurnKs"}},"title":"Activity ยท OpenNuvoton/MA35D1_optee_os-v3.9.0"}