mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 09:34:18 +00:00
![]() When a platform decides to use FEAT_RNG_TRAP, every RNDR or RNDRSS read will trap into EL3. The platform can then emulate those instructions, by either executing the real CPU instructions, potentially conditioning the results, or use rate-limiting or filtering to protect the hardware entropy pool. Another possiblitiy would be to use some platform specific TRNG device to get entropy and returning this. To demonstrate platform specific usage, add a demo implementation for the FVP: It will execute the actual CPU instruction and just return the result. This should serve as reference code to implement platform specific policies. We change the definition of read_rndr() and read_rndrrs() to use the alternative sysreg encoding, so that all assemblers can handle that. Add documentation about the new platform specific RNG handler function. Signed-off-by: Andre Przywara <andre.przywara@arm.com> Change-Id: Ibce817b3b06ad20129d15531b81402e3cc3e9a9e |
||
---|---|---|
.. | ||
_static/css | ||
about | ||
components | ||
design | ||
design_documents | ||
getting_started | ||
perf | ||
plat | ||
process | ||
resources | ||
security_advisories | ||
threat_model | ||
change-log.md | ||
conf.py | ||
global_substitutions.txt | ||
glossary.rst | ||
index.rst | ||
license.rst | ||
Makefile | ||
requirements.in | ||
requirements.txt |