- Notifications
You must be signed in to change notification settings - Fork63
Releases: chipsalliance/caliptra-sw
Releases · chipsalliance/caliptra-sw
release_v20250712_0-2.x
3aa671c
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250712_0-2.xPre-release
Pre-release
feat(rom): Add ECDSA and MLDSA verify commands (#2285)This commit adds support for the ECDSA384_VERIFY mailbox command in ROM,including:- New verify module in common crate with ECDSA verification implementation- Test cases for valid and invalid signaturesAdded helper methods to MldsaVerifyReq for safely extracting fields fromraw byte slices. This makes it possible to decode a variable sized inputwithout mapping the whole MAX_LEN struct with zerocopy (be it on thestack or in unused mailbox SRAM).Simplified MldsaVerifyCmd to use these new helpers instead of manualunsafe mailbox access. Removed MailboxRawAccess trait since it's nolonger needed.
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250712_0
98e26f4
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250712_0Pre-release
Pre-release
Increase disk size when using VCK190 tools (#2300)
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250711_0-2.x
1cb4236
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250711_0-2.xPre-release
Pre-release
feat(crypto): Add zeroize support for Aes and Mldsa87 (#2296)This commit adds zeroize functionality for Aes and Mldsa87 cryptographicblocks in the error handler. The changes ensure sensitive cryptographicdata is properly cleared during fatal error handling scenarios. Thezeroize methods are marked as unsafe since they must only be called whenpending operations won't be used afterward.
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250710_0-2.x
1cb4236
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250710_0-2.xPre-release
Pre-release
feat(crypto): Add zeroize support for Aes and Mldsa87 (#2296)This commit adds zeroize functionality for Aes and Mldsa87 cryptographicblocks in the error handler. The changes ensure sensitive cryptographicdata is properly cleared during fatal error handling scenarios. Thezeroize methods are marked as unsafe since they must only be called whenpending operations won't be used afterward.
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250710_0
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250710_0Pre-release
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250709_0
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250709_0Pre-release
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250708_0
5848b8a
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250708_0Pre-release
Pre-release
Add instructions for FPGA Host Runner (#2236)* Add instructions for FPGA Host Runner* Apply suggestions from code reviewCo-authored-by: Zach Halvorsen <zhalvorsen@google.com>---------Co-authored-by: Zach Halvorsen <zhalvorsen@google.com>
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250709_0-2.x
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250709_0-2.xPre-release
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250708_0-2.x
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250708_0-2.xPre-release
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Assets4
Uh oh!
There was an error while loading.Please reload this page.
release_v20250705_0-2.x
0ffa967
This commit was created on GitHub.com and signed with GitHub’sverified signature.
Compare
Could not load tags
Nothing to show
{{ refName }}defaultLoading
release_v20250705_0-2.xPre-release
Pre-release
Add a mapping between Firmware Image ID to EXEC/GO Bit (#2281)* Add a mapping between Firmware Image ID to the EXEC/GO BitImplement mapping between a specific image to its corresponding EXEC/GoBit in the SOC Manifest.Added an 8-bit field within the 'flags' field in the Image Metadataentry that will map to the exec bit for the image.This will be used when determining which EXEC/GO bit will be set duringfirmware activation when executing the ACTIVATE firmware command.* Addressed feedbackUse only 7 bits for exec/go bit field in manifest* Add comment on on reserved bits for exec bit
Assets4
Uh oh!
There was an error while loading.Please reload this page.