/trusted-firmware-m-3.5.0/tools/templates/ |
D | partition_load_info.template | 29 {% set counter.dep_counter = manifest.dependencies|count + manifest.weak_dependencies|count %} 30 #define {{"%-55s"|format(manifest.name|upper + "_NDEPS")}} ({{"%d"|format(counter.dep_counter)}}) 31 {% set counter.service_counter = manifest.services|count %} 32 #define {{"%-55s"|format(manifest.name|upper + "_NSERVS")}} ({{"%d"|format(counter.service_counter)… 33 {% set counter.asset_counter = manifest.mmio_regions|count %} 35 #define {{"%-55s"|format(manifest.name|upper + "_NASSETS")}} ({{"%d"|format(counter.asset_counter)}… 37 #define {{"%-55s"|format(manifest.name|upper + "_NASSETS")}} ({{"%d"|format(counter.asset_counter)}… 39 {% set counter.irq_counter = manifest.irqs|count %} 40 #define {{"%-55s"|format(manifest.name|upper + "_NIRQS")}} ({{"%d"|format(counter.irq_counter)}}) 44 REGION_DECLARE(Image$$, PT_{{manifest.name}}_PRIVATE, _DATA_START$$Base); [all …]
|
D | manifestfilename.template | 17 {% if manifest.model == "SFN" %} 18 #define {{"%-55s"|format(manifest.name + "_MODEL_IPC")}} 0 19 #define {{"%-55s"|format(manifest.name + "_MODEL_SFN")}} 1 21 #define {{"%-55s"|format(manifest.name + "_MODEL_IPC")}} 1 22 #define {{"%-55s"|format(manifest.name + "_MODEL_SFN")}} 0 25 {% if manifest.services %} 26 {% for service in manifest.services %} 27 {% if manifest.model == "SFN" %} 35 {% if manifest.irqs %} 36 {% for irq in manifest.irqs %} [all …]
|
D | partition_intermedia.template | 13 {% if config_impl['CONFIG_TFM_SPM_BACKEND_IPC'] == '1' or manifest.model == "IPC" %} 14 uint8_t {{manifest.name.lower()}}_stack[{{manifest.stack_size}}] __attribute__((aligned(8)));
|
/trusted-firmware-m-3.5.0/tools/ |
D | tfm_parse_manifest_list.py | 92 def manifest_validation(manifest, pid): argument 94 This function validates FF-M compliance for partition manifest, and sets 99 service_list = manifest.get('services', []) 100 irq_list = manifest.get('irqs', []) 103 if manifest['psa_framework_version'] not in [1.0, 1.1]: 104 raise Exception('Invalid psa_framework_version of {}'.format(manifest['name'])) 107 if manifest['type'] not in ['PSA-ROT', 'APPLICATION-ROT']: 108 raise Exception('Invalid type of {}'.format(manifest['name'])) 111 if manifest['priority'] not in ['HIGH', 'NORMAL', 'LOW']: 112 raise Exception('Invalid priority of {}'.format(manifest['name'])) [all …]
|
D | CMakeLists.txt | 11 ############################### Manifest lists declaration ##################### 19 # The manifest tool does not recognize CMake varibles. Do configure_file() first. 62 # Get all the manifest files from manifest lists 65 message(FATAL_ERROR "Manifest list ${MANIFEST_LIST} doesn't exist") 68 # Get the path of the manifest list 71 # Get all the "manifest" 72 parse_field_from_yaml(${MANIFEST_LIST} manifest MANIFESTS) 74 foreach(MANIFEST ${MANIFESTS}) 76 if (NOT IS_ABSOLUTE ${MANIFEST}) 77 get_filename_component(MANIFEST "${MANIFEST_LIST_PATH}/${MANIFEST}" ABSOLUTE) [all …]
|
D | tfm_manifest_list.yaml | 10 # The "manifest" field must be relative path to this file or absolute path. 27 "manifest": "../secure_fw/partitions/ns_agent_mailbox/ns_agent_mailbox.yaml", 41 "manifest": "../secure_fw/partitions/protected_storage/tfm_protected_storage.yaml", 55 … "manifest": "../secure_fw/partitions/internal_trusted_storage/tfm_internal_trusted_storage.yaml", 69 "manifest": "../secure_fw/partitions/crypto/tfm_crypto.yaml", 84 "manifest": "../secure_fw/partitions/platform/tfm_platform.yaml", 98 "manifest": "../secure_fw/partitions/initial_attestation/tfm_initial_attestation.yaml", 112 "manifest": "../secure_fw/partitions/firmware_update/tfm_firmware_update.yaml",
|
D | tfm_psa_ff_test_manifest_list.yaml | 18 "manifest": "${PSA_ARCH_TESTS_PATH}/api-tests/platform/manifests/client_partition_psa.json", 35 "manifest": "${PSA_ARCH_TESTS_PATH}/api-tests/platform/manifests/server_partition_psa.json", 52 "manifest": "${PSA_ARCH_TESTS_PATH}/api-tests/platform/manifests/driver_partition_psa.json",
|
/trusted-firmware-m-3.5.0/platform/ext/common/gcc/ |
D | tfm_isolation_l3.ld.template | 100 LONG (LOADADDR(.ER_{{partition.manifest.name}}_RWZI)) 101 LONG (ADDR(.ER_{{partition.manifest.name}}_RWZI)) 102 LONG (SIZEOF(.ER_{{partition.manifest.name}}_RWZI) / 4) 125 LONG (ADDR(.{{partition.manifest.name}}_RWZI_BSS)) 126 LONG (SIZEOF(.{{partition.manifest.name}}_RWZI_BSS) / 4) 149 {% if partition.manifest.type == 'PSA-ROT' %} 150 .{{partition.manifest.name}}_RO : ALIGN(TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT) 164 *({{partition.manifest.name}}_PSA-ROT_ATTR_FN) 167 Image$${{partition.manifest.name}}_RO$$Base = ADDR(.{{partition.manifest.name}}_RO); 168 …Image$${{partition.manifest.name}}_RO$$Limit = ADDR(.{{partition.manifest.name}}_RO) + SIZEOF(.{{p… [all …]
|
/trusted-firmware-m-3.5.0/docs/integration_guide/services/ |
D | tfm_manifest_tool_user_guide.rst | 2 TF-M Manifest Tool User Guide 4 This document describes the TF-M manifest tool and its usage. 15 The TF-M manifest tool is a python script which is used to parse Secure 20 In the TF-M build system, the manifest tool is invoked during building 35 -m manifest list [manifest list ...] 46 **-m/--manifest-lists** 50 A list of TF-M Secure Partition manifest lists which contain one or more 52 See `Manifest List`_ for details. 77 Manifest List 79 A manifest list is a YAML [3]_ file that describes a list of Secure Partition [all …]
|
D | tfm_secure_partition_addition.rst | 45 focuses on the configuration, manifest, implement rules. The actual 61 - `Add manifest`_ 72 - Manifest file 76 Add manifest 78 Each Secure Partition must have resource requirements declared in a manifest 79 file. The Secure Partition Manager (SPM) uses the manifest file to assemble and 80 allocate resources within the SPE. The manifest includes the following: 90 The current manifest format in TF-M is "yaml" which is different from the 93 Here is a manifest reference example for the IPC model: 145 definition uses the ``name`` attribute in the manifest as its name and the [all …]
|
/trusted-firmware-m-3.5.0/platform/ext/common/iar/ |
D | tfm_isolation_l3.icf.template | 92 …ne block ER_{{partition.manifest.name}}_RO with alignment = {{ 'TFM_LINKER_PSA_ROT_LINKER_CODE_AL… 105 {% if partition.manifest.type == 'PSA-ROT' %} 106 section {{partition.manifest.name}}_PSA-ROT_ATTR_FN, 108 {% if partition.manifest.type == 'APPLICATION-ROT' %} 109 section {{partition.manifest.name}}_APP-ROT_ATTR_FN, 158 {% if partition.manifest.type == 'PSA-ROT' %} 160 …define block PT_{{partition.manifest.name}}_PRIVATE_DATA_START with alignment = TFM_LINKER_PSA_ROT… 162 …define block ER_{{partition.manifest.name}}_RWZI with alignment = TFM_LINKER_PSA_ROT_LINKER_DATA_A… 174 section {{partition.manifest.name}}_PSA-ROT_ATTR_RW, 175 section {{partition.manifest.name}}_PSA-ROT_ATTR_ZI, [all …]
|
/trusted-firmware-m-3.5.0/platform/ext/common/armclang/ |
D | tfm_isolation_l3.sct.template | 87 {% if partition.manifest.type == 'PSA-ROT' %} 88 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT { 99 *({{partition.manifest.name}}_PSA-ROT_ATTR_FN) 108 {% if partition.manifest.type == 'APPLICATION-ROT' %} 109 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_APP_ROT_LINKER_CODE_ALIGNMENT { 120 *({{partition.manifest.name}}_APP-ROT_ATTR_FN) 179 {% if partition.manifest.type == 'PSA-ROT' %} 181 …PT_{{partition.manifest.name}}_PRIVATE_DATA_START +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_DATA_ALIGNMEN… 185 ER_{{partition.manifest.name}}_RWZI +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_DATA_ALIGNMENT { 196 *({{partition.manifest.name}}_PSA-ROT_ATTR_RW) [all …]
|
/trusted-firmware-m-3.5.0/platform/ext/target/arm/rss/common/manifest/ |
D | tfm_manifest_list.yaml | 10 # The "manifest" field must be relative path to this file or absolute path. 27 "manifest": "${CMAKE_SOURCE_DIR}/secure_fw/partitions/ns_agent_mailbox/ns_agent_mailbox.yaml", 41 "manifest": "${CMAKE_SOURCE_DIR}/platform/ext/target/arm/rss/common/manifest/tfm_crypto.yaml", 55 "manifest": "${CMAKE_SOURCE_DIR}/secure_fw/partitions/platform/tfm_platform.yaml", 69 …"manifest": "${CMAKE_SOURCE_DIR}/platform/ext/target/arm/rss/common/manifest/tfm_initial_attestati…
|
/trusted-firmware-m-3.5.0/platform/include/ |
D | tfm_plat_defs.h | 38 * \param[in] TFM_PARTITION_NAME TF-M partition name assigned in the manifest 40 * \param[in] TFM_PARTITION_TYPE TF-M partition type assigned in the manifest 53 * \param[in] TFM_PARTITION_NAME TF-M partition name assigned in the manifest 55 * \param[in] TFM_PARTITION_TYPE TF-M partition type assigned in the manifest 68 * \param[in] TFM_PARTITION_NAME TF-M partition name assigned in the manifest 70 * \param[in] TFM_PARTITION_TYPE TF-M partition type assigned in the manifest
|
/trusted-firmware-m-3.5.0/secure_fw/partitions/firmware_update/bootloader/ |
D | tfm_bootloader_fwu_abstraction.h | 36 * \param[in] manifest A pointer to a buffer containing a detached manifest for 37 * the update. If the manifest is bundled with the firmware 38 * image, manifest must be NULL. 39 * \param[in] manifest_size Size of the manifest buffer in bytes. 43 * manifest has failed. 52 const void *manifest,
|
/trusted-firmware-m-3.5.0/docs/design_docs/booting/ |
D | secure_boot_rollback_protection.rst | 20 - Manifest data: Metadata of the software image: size, version, hash, 33 manifest data is checked. 35 Manifest format in MCUBoot 37 MCUBoot has a custom manifest format, which is composed of two parts: 61 counter in the image manifest to ensure anti-rollback protection. During 83 protected part of the image manifest. Because the image header is almost fully 91 can easily be added to the image manifest. 141 and related manifest data is stored in trusted memory then the included 149 corresponding manifest) then the value of security counter must be copied to 177 manifest data (only if it is in trusted memory) or the corresponding
|
D | secure_boot_hw_key_integration.rst | 36 verification the hash of the public key is appended to the image manifest area 38 hash of the public key from the manifest area and compare against the on-the-fly 55 | Image Manifest(TLV) | 83 appended to the image itself in the manifest area. It has the drawback that the 109 | Image Manifest(TLV) | 156 | |Key format in manifest |Key in MCUBoot code| Key in HW |
|
/trusted-firmware-m-3.5.0/interface/include/psa_manifest/ |
D | sid.h.template | 18 {% if partition.manifest.services %} 19 /******** {{partition.manifest.name}} ********/ 20 {% for service in partition.manifest.services %}
|
/trusted-firmware-m-3.5.0/ |
D | Kconfig.misc | 71 ################################# Manifest ##################################### 73 menu "TF-M manifest" 82 string "Extra manifest list file(s)" 98 manifest files
|
/trusted-firmware-m-3.5.0/docs/integration_guide/ |
D | tfm_secure_irq_integration_guide.rst | 71 ``irqs`` attribute of the Secure Partition manifest. 76 Different Firmware Framework versions have different definitions of manifest. 81 Here is an example manifest of Secure Partitions conform to Firmware Framework 128 Here is an example manifest of Secure Partitions conform to Firmware Framework 187 Secure Partition manifest, to enable the Secure Partition to access it. 256 - ``irq_{source}``, if the ``source`` attribute of the IRQ in Partition manifest 260 For example if the manifest declares ``"source": 5``, then the function name
|
/trusted-firmware-m-3.5.0/docs/design_docs/software/ |
D | tfm_code_generation_with_jinja2.rst | 27 substitute the keychains with actual values from the manifest files. 69 {% if partition.manifest.services %} 70 {% for service in partition.manifest.services %}
|
/trusted-firmware-m-3.5.0/interface/include/psa/ |
D | update.h | 188 * @param manifest A pointer to a buffer containing a detached manifest for 190 * @param manifest_size The size of the detached manifest. 195 const void *manifest,
|
/trusted-firmware-m-3.5.0/config/ |
D | tfm_build_log_config.cmake | 14 set(CONFIG_TFM_PARSE_MANIFEST_QUIET ON CACHE BOOL "Parse manifest quietly") 18 set(CONFIG_TFM_PARSE_MANIFEST_QUIET OFF CACHE BOOL "Parse manifest quietly")
|
/trusted-firmware-m-3.5.0/docs/design_docs/services/ |
D | stateless_rot_service.rst | 33 a handle by the manifest tooling, and then generated to header file ``sid.h``. 60 The index is used for organizing stateless services in manifest tool and 72 The ``stateless_handle`` attribute in manifest is only supported by partitions 75 - If ``stateless_handle`` in manifest is set to an integer, the index is
|
/trusted-firmware-m-3.5.0/platform/ext/common/ |
D | tfm_s_linker_alignments.h | 80 * TZ NS agent partition is reworked to use manifest files. */ 86 * partition is reworked to use manifest files. */
|