Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Releases: chipsalliance/caliptra-sw

release_v20250712_0-2.x

12 Jul 10:44
3aa671c
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
feat(rom): Add ECDSA and MLDSA verify commands (#2285)This commit adds support for the ECDSA384_VERIFY mailbox command in ROM,including:- New verify module in common crate with ECDSA verification  implementation- Test cases for valid and invalid signaturesAdded helper methods to MldsaVerifyReq for safely extracting fields fromraw byte slices. This makes it possible to decode a variable sized inputwithout mapping the whole MAX_LEN struct with zerocopy (be it on thestack or in unused mailbox SRAM).Simplified MldsaVerifyCmd to use these new helpers instead of manualunsafe mailbox access. Removed MailboxRawAccess trait since it's nolonger needed.
Loading

release_v20250712_0

12 Jul 12:56
98e26f4
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Increase disk size when using VCK190 tools (#2300)
Loading

release_v20250711_0-2.x

11 Jul 10:44
1cb4236
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
feat(crypto): Add zeroize support for Aes and Mldsa87 (#2296)This commit adds zeroize functionality for Aes and Mldsa87 cryptographicblocks in the error handler. The changes ensure sensitive cryptographicdata is properly cleared during fatal error handling scenarios. Thezeroize methods are marked as unsafe since they must only be called whenpending operations won't be used afterward.
Loading

release_v20250710_0-2.x

10 Jul 10:43
1cb4236
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
feat(crypto): Add zeroize support for Aes and Mldsa87 (#2296)This commit adds zeroize functionality for Aes and Mldsa87 cryptographicblocks in the error handler. The changes ensure sensitive cryptographicdata is properly cleared during fatal error handling scenarios. Thezeroize methods are marked as unsafe since they must only be called whenpending operations won't be used afterward.
Loading

release_v20250710_0

10 Jul 13:16
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Loading

release_v20250709_0

09 Jul 13:33
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Loading

release_v20250708_0

08 Jul 13:26
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Loading

release_v20250709_0-2.x

09 Jul 10:44
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Loading

release_v20250708_0-2.x

08 Jul 10:44
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Loading

release_v20250705_0-2.x

05 Jul 10:43
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
GPG key ID:B5690EEEBB952194
Verified
Learn about vigilant mode.
Compare
Choose a tag to compare
Loading
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Loading
Previous13454243
Previous

[8]ページ先頭

©2009-2025 Movatter.jp