Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use PSA drivers to manage built-in crypto acceleration #8977

Open
gilles-peskine-arm opened this issue Mar 21, 2024 · 0 comments
Open

Use PSA drivers to manage built-in crypto acceleration #8977

gilles-peskine-arm opened this issue Mar 21, 2024 · 0 comments
Labels
component-crypto Crypto primitives and low-level interfaces enhancement needs-design-approval size-m Estimated task size: medium (~1w)

Comments

@gilles-peskine-arm
Copy link
Contributor

The PSA accelerator driver mechanism, as specified, can handle the accelerated crypto modules that we ship (AESNI, AESCE, SHA256 and SHA512 acceleration on armv8-A). This is only practical once the tooling is fully mature, so that users can easily choose between having optional acceleration with fallback, acceleration only or no acceleration.

If the tooling isn't mature enough by the time of the 4.0 release, or if we don't want to put in the work before 4.0, we could potentially do this in a 4.x minor release, keeping the existing options for compatibility but using the driver structure under the hood. This would break for people who have their own handwritten driver wrapper file, which may or may not be a concern.

Related: Mbed-TLS/TF-PSA-Crypto#99

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
component-crypto Crypto primitives and low-level interfaces enhancement needs-design-approval size-m Estimated task size: medium (~1w)
Projects
Status: Mbed TLS 4.0 COULD
Status: Planning needed
Development

No branches or pull requests

1 participant