Home
last modified time | relevance | path

Searched full:sid (Results 1 – 25 of 68) sorted by relevance

123

/trusted-firmware-m-3.6.0/secure_fw/partitions/crypto/
Dcrypto_mac.c35 uint16_t sid = iov->function_id; in tfm_crypto_mac_interface() local
39 if (sid == TFM_CRYPTO_MAC_COMPUTE_SID) { in tfm_crypto_mac_interface()
57 if (sid == TFM_CRYPTO_MAC_VERIFY_SID) { in tfm_crypto_mac_interface()
71 if ((sid == TFM_CRYPTO_MAC_SIGN_SETUP_SID) || in tfm_crypto_mac_interface()
72 (sid == TFM_CRYPTO_MAC_VERIFY_SETUP_SID)) { in tfm_crypto_mac_interface()
82 if ((sid == TFM_CRYPTO_MAC_SIGN_FINISH_SID) || in tfm_crypto_mac_interface()
83 (sid == TFM_CRYPTO_MAC_VERIFY_FINISH_SID) || in tfm_crypto_mac_interface()
84 (sid == TFM_CRYPTO_MAC_ABORT_SID)) { in tfm_crypto_mac_interface()
96 if (sid == TFM_CRYPTO_MAC_ABORT_SID) { in tfm_crypto_mac_interface()
111 switch (sid) { in tfm_crypto_mac_interface()
Dcrypto_hash.c31 uint16_t sid = iov->function_id; in tfm_crypto_hash_interface() local
33 if (sid == TFM_CRYPTO_HASH_COMPUTE_SID) { in tfm_crypto_hash_interface()
51 if (sid == TFM_CRYPTO_HASH_COMPARE_SID) { in tfm_crypto_hash_interface()
65 if (sid == TFM_CRYPTO_HASH_SETUP_SID) { in tfm_crypto_hash_interface()
75 if ((sid == TFM_CRYPTO_HASH_FINISH_SID) || in tfm_crypto_hash_interface()
76 (sid == TFM_CRYPTO_HASH_VERIFY_SID) || in tfm_crypto_hash_interface()
77 (sid == TFM_CRYPTO_HASH_ABORT_SID)) { in tfm_crypto_hash_interface()
89 if (sid == TFM_CRYPTO_HASH_ABORT_SID) { in tfm_crypto_hash_interface()
104 switch (sid) { in tfm_crypto_hash_interface()
Dcrypto_cipher.c35 uint16_t sid = iov->function_id; in tfm_crypto_cipher_interface() local
39 if (sid == TFM_CRYPTO_CIPHER_ENCRYPT_SID) { in tfm_crypto_cipher_interface()
57 if (sid == TFM_CRYPTO_CIPHER_DECRYPT_SID) { in tfm_crypto_cipher_interface()
75 if ((sid == TFM_CRYPTO_CIPHER_ENCRYPT_SETUP_SID) || in tfm_crypto_cipher_interface()
76 (sid == TFM_CRYPTO_CIPHER_DECRYPT_SETUP_SID)) { in tfm_crypto_cipher_interface()
86 if ((sid == TFM_CRYPTO_CIPHER_FINISH_SID) || in tfm_crypto_cipher_interface()
87 (sid == TFM_CRYPTO_CIPHER_ABORT_SID)) { in tfm_crypto_cipher_interface()
99 if (sid == TFM_CRYPTO_CIPHER_ABORT_SID) { in tfm_crypto_cipher_interface()
114 switch (sid) { in tfm_crypto_cipher_interface()
Dcrypto_aead.c38 uint16_t sid = iov->function_id; in tfm_crypto_aead_interface() local
42 if (sid == TFM_CRYPTO_AEAD_ENCRYPT_SID) { in tfm_crypto_aead_interface()
68 if (sid == TFM_CRYPTO_AEAD_DECRYPT_SID) { in tfm_crypto_aead_interface()
94 if ((sid == TFM_CRYPTO_AEAD_ENCRYPT_SETUP_SID) || in tfm_crypto_aead_interface()
95 (sid == TFM_CRYPTO_AEAD_DECRYPT_SETUP_SID)) { in tfm_crypto_aead_interface()
105 if ((sid == TFM_CRYPTO_AEAD_FINISH_SID) || in tfm_crypto_aead_interface()
106 (sid == TFM_CRYPTO_AEAD_VERIFY_SID) || in tfm_crypto_aead_interface()
107 (sid == TFM_CRYPTO_AEAD_ABORT_SID)) { in tfm_crypto_aead_interface()
120 if (sid == TFM_CRYPTO_AEAD_ABORT_SID) { in tfm_crypto_aead_interface()
135 switch (sid) { in tfm_crypto_aead_interface()
Dcrypto_key_derivation.c37 uint16_t sid = iov->function_id; in tfm_crypto_key_derivation_interface() local
41 if (sid == TFM_CRYPTO_RAW_KEY_AGREEMENT_SID) { in tfm_crypto_key_derivation_interface()
52 if (sid == TFM_CRYPTO_KEY_DERIVATION_SETUP_SID) { in tfm_crypto_key_derivation_interface()
65 (sid != TFM_CRYPTO_KEY_DERIVATION_ABORT_SID)) { in tfm_crypto_key_derivation_interface()
69 switch (sid) { in tfm_crypto_key_derivation_interface()
/trusted-firmware-m-3.6.0/secure_fw/partitions/ns_agent_tz/
Dpsa_api_veneers.c32 uint32_t tfm_psa_version_veneer(uint32_t sid) in tfm_psa_version_veneer() argument
34 return psa_version(sid); in tfm_psa_version_veneer()
51 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument
53 return psa_connect(sid, version); in tfm_psa_connect_veneer()
63 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument
65 (void)sid; in tfm_psa_connect_veneer()
Dpsa_api_veneers_v80m.c106 uint32_t tfm_psa_version_veneer(uint32_t sid) in tfm_psa_version_veneer() argument
161 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument
218 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument
/trusted-firmware-m-3.6.0/interface/src/multi_core/
Dtfm_multi_core_psa_ns_api.c57 uint32_t psa_version(uint32_t sid) in psa_version() argument
63 params.psa_version_params.sid = sid; in psa_version()
75 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument
81 params.psa_connect_params.sid = sid; in psa_connect()
/trusted-firmware-m-3.6.0/secure_fw/partitions/lib/runtime/
Dpsa_api_ipc.c20 uint32_t psa_version(uint32_t sid) in psa_version() argument
22 return PART_METADATA()->psa_fns->psa_version(sid); in psa_version()
77 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument
79 return PART_METADATA()->psa_fns->psa_connect(sid, version); in psa_connect()
164 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version, in agent_psa_connect() argument
167 return PART_METADATA()->psa_fns->agent_psa_connect(sid, version, in agent_psa_connect()
/trusted-firmware-m-3.6.0/interface/src/
Dtfm_tz_psa_ns_api.c24 uint32_t psa_version(uint32_t sid) in psa_version() argument
28 sid, in psa_version()
55 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument
57 return tfm_ns_interface_dispatch((veneer_fn)tfm_psa_connect_veneer, sid, version, 0, 0); in psa_connect()
/trusted-firmware-m-3.6.0/secure_fw/spm/core/
Dspm_ipc.c86 struct service_t *tfm_spm_get_service_by_sid(uint32_t sid) in tfm_spm_get_service_by_sid() argument
91 if (p_curr->p_ldinf->sid == sid) { in tfm_spm_get_service_by_sid()
146 int32_t tfm_spm_check_authorization(uint32_t sid, in tfm_spm_check_authorization() argument
168 if (dep[i] == sid) { in tfm_spm_check_authorization()
187 uint32_t sid, version, index; in spm_get_connection() local
207 sid = service->p_ldinf->sid; in spm_get_connection()
213 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in spm_get_connection()
Dpsa_version_api.c20 uint32_t tfm_spm_client_psa_version(uint32_t sid) in tfm_spm_client_psa_version() argument
29 service = tfm_spm_get_service_by_sid(sid); in tfm_spm_client_psa_version()
38 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in tfm_spm_client_psa_version()
Dtfm_rpc.c48 uint32_t tfm_rpc_psa_version(uint32_t sid) in tfm_rpc_psa_version() argument
50 return tfm_spm_client_psa_version(sid); in tfm_rpc_psa_version()
65 psa_status_t tfm_rpc_psa_connect(uint32_t sid, in tfm_rpc_psa_connect() argument
70 return agent_psa_connect(sid, version, ns_client_id, client_data); in tfm_rpc_psa_connect()
Dpsa_interface_sfn.c27 uint32_t psa_version(uint32_t sid) in psa_version() argument
34 return tfm_spm_client_psa_version(sid); in psa_version()
112 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument
124 stat = tfm_spm_client_psa_connect(sid, version); in psa_connect()
297 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version, in agent_psa_connect() argument
310 stat = tfm_spm_agent_psa_connect(sid, version, ns_client_id, client_data); in agent_psa_connect()
Dpsa_connection_api.c20 psa_status_t tfm_spm_client_psa_connect(uint32_t sid, uint32_t version) in tfm_spm_client_psa_connect() argument
32 service = tfm_spm_get_service_by_sid(sid); in tfm_spm_client_psa_connect()
46 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in tfm_spm_client_psa_connect()
Dtfm_rpc.h61 * \param[in] sid RoT Service identity.
67 uint32_t tfm_rpc_psa_version(uint32_t sid);
72 * \param[in] sid RoT Service identity.
84 psa_status_t tfm_rpc_psa_connect(uint32_t sid,
Dpsa_interface_svc.c25 __naked uint32_t psa_version_svc(uint32_t sid) in psa_version_svc() argument
108 __naked psa_handle_t psa_connect_svc(uint32_t sid, uint32_t version) in psa_connect_svc() argument
173 __naked psa_handle_t agent_psa_connect_svc(uint32_t sid, uint32_t version, in agent_psa_connect_svc() argument
Dagent_api.c56 psa_handle_t tfm_spm_agent_psa_connect(uint32_t sid, uint32_t version, in tfm_spm_agent_psa_connect() argument
69 return tfm_spm_client_psa_connect(sid, version); in tfm_spm_agent_psa_connect()
Dpsa_interface_thread_fn_call.c47 uint32_t psa_version_thread_fn_call(uint32_t sid) in psa_version_thread_fn_call() argument
142 psa_handle_t psa_connect_thread_fn_call(uint32_t sid, uint32_t version) in psa_connect_thread_fn_call() argument
246 psa_handle_t agent_psa_connect_thread_fn_call(uint32_t sid, uint32_t version, in agent_psa_connect_thread_fn_call() argument
/trusted-firmware-m-3.6.0/interface/include/
Dtfm_veneers.h30 * \param[in] sid ID of secure service.
34 uint32_t tfm_psa_version_veneer(uint32_t sid);
39 * \param[in] sid ID of secure service.
44 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version);
/trusted-firmware-m-3.6.0/docs/design_docs/services/
Dstateless_rot_service.rst33 a handle by the manifest tooling, and then generated to header file ``sid.h``.
69 ``sid.h`` contains service ID and version. The tooling is extended to generate
82 `Stateless Handle Value Definition`_ section, and writes them to ``sid.h``
95 According to FF-M v1.1, client calling ``psa_connect()`` with the SID of a
116 ``psa_manifest/sid.h`` when requesting a stateless service.
203 ``SID`` for the group. The ``type`` parameter in ``psa_call()`` could be
/trusted-firmware-m-3.6.0/tools/
Dtfm_generated_file_list.yaml21 "description": "SID H file",
22 "template": "interface/include/psa_manifest/sid.h.template",
23 "output": "interface/include/psa_manifest/sid.h"
/trusted-firmware-m-3.6.0/interface/include/psa/
Dclient.h111 * \param[in] sid ID of the RoT Service to query.
117 uint32_t psa_version(uint32_t sid);
120 * \brief Connect to an RoT Service by its SID.
122 * \param[in] sid ID of the RoT Service to connect to.
137 psa_handle_t psa_connect(uint32_t sid, uint32_t version);
/trusted-firmware-m-3.6.0/secure_fw/spm/include/interface/
Druntime_defs.h31 uint32_t (*psa_version)(uint32_t sid);
44 psa_handle_t (*psa_connect)(uint32_t sid, uint32_t version);
73 psa_handle_t (*agent_psa_connect)(uint32_t sid, uint32_t version,
/trusted-firmware-m-3.6.0/secure_fw/spm/include/ffm/
Dagent_api.h56 * \param[in] sid RoT Service identity.
70 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version,

123