/trusted-firmware-m-3.6.0/secure_fw/partitions/crypto/ |
D | crypto_mac.c | 35 uint16_t sid = iov->function_id; in tfm_crypto_mac_interface() local 39 if (sid == TFM_CRYPTO_MAC_COMPUTE_SID) { in tfm_crypto_mac_interface() 57 if (sid == TFM_CRYPTO_MAC_VERIFY_SID) { in tfm_crypto_mac_interface() 71 if ((sid == TFM_CRYPTO_MAC_SIGN_SETUP_SID) || in tfm_crypto_mac_interface() 72 (sid == TFM_CRYPTO_MAC_VERIFY_SETUP_SID)) { in tfm_crypto_mac_interface() 82 if ((sid == TFM_CRYPTO_MAC_SIGN_FINISH_SID) || in tfm_crypto_mac_interface() 83 (sid == TFM_CRYPTO_MAC_VERIFY_FINISH_SID) || in tfm_crypto_mac_interface() 84 (sid == TFM_CRYPTO_MAC_ABORT_SID)) { in tfm_crypto_mac_interface() 96 if (sid == TFM_CRYPTO_MAC_ABORT_SID) { in tfm_crypto_mac_interface() 111 switch (sid) { in tfm_crypto_mac_interface()
|
D | crypto_hash.c | 31 uint16_t sid = iov->function_id; in tfm_crypto_hash_interface() local 33 if (sid == TFM_CRYPTO_HASH_COMPUTE_SID) { in tfm_crypto_hash_interface() 51 if (sid == TFM_CRYPTO_HASH_COMPARE_SID) { in tfm_crypto_hash_interface() 65 if (sid == TFM_CRYPTO_HASH_SETUP_SID) { in tfm_crypto_hash_interface() 75 if ((sid == TFM_CRYPTO_HASH_FINISH_SID) || in tfm_crypto_hash_interface() 76 (sid == TFM_CRYPTO_HASH_VERIFY_SID) || in tfm_crypto_hash_interface() 77 (sid == TFM_CRYPTO_HASH_ABORT_SID)) { in tfm_crypto_hash_interface() 89 if (sid == TFM_CRYPTO_HASH_ABORT_SID) { in tfm_crypto_hash_interface() 104 switch (sid) { in tfm_crypto_hash_interface()
|
D | crypto_cipher.c | 35 uint16_t sid = iov->function_id; in tfm_crypto_cipher_interface() local 39 if (sid == TFM_CRYPTO_CIPHER_ENCRYPT_SID) { in tfm_crypto_cipher_interface() 57 if (sid == TFM_CRYPTO_CIPHER_DECRYPT_SID) { in tfm_crypto_cipher_interface() 75 if ((sid == TFM_CRYPTO_CIPHER_ENCRYPT_SETUP_SID) || in tfm_crypto_cipher_interface() 76 (sid == TFM_CRYPTO_CIPHER_DECRYPT_SETUP_SID)) { in tfm_crypto_cipher_interface() 86 if ((sid == TFM_CRYPTO_CIPHER_FINISH_SID) || in tfm_crypto_cipher_interface() 87 (sid == TFM_CRYPTO_CIPHER_ABORT_SID)) { in tfm_crypto_cipher_interface() 99 if (sid == TFM_CRYPTO_CIPHER_ABORT_SID) { in tfm_crypto_cipher_interface() 114 switch (sid) { in tfm_crypto_cipher_interface()
|
D | crypto_aead.c | 38 uint16_t sid = iov->function_id; in tfm_crypto_aead_interface() local 42 if (sid == TFM_CRYPTO_AEAD_ENCRYPT_SID) { in tfm_crypto_aead_interface() 68 if (sid == TFM_CRYPTO_AEAD_DECRYPT_SID) { in tfm_crypto_aead_interface() 94 if ((sid == TFM_CRYPTO_AEAD_ENCRYPT_SETUP_SID) || in tfm_crypto_aead_interface() 95 (sid == TFM_CRYPTO_AEAD_DECRYPT_SETUP_SID)) { in tfm_crypto_aead_interface() 105 if ((sid == TFM_CRYPTO_AEAD_FINISH_SID) || in tfm_crypto_aead_interface() 106 (sid == TFM_CRYPTO_AEAD_VERIFY_SID) || in tfm_crypto_aead_interface() 107 (sid == TFM_CRYPTO_AEAD_ABORT_SID)) { in tfm_crypto_aead_interface() 120 if (sid == TFM_CRYPTO_AEAD_ABORT_SID) { in tfm_crypto_aead_interface() 135 switch (sid) { in tfm_crypto_aead_interface()
|
D | crypto_key_derivation.c | 37 uint16_t sid = iov->function_id; in tfm_crypto_key_derivation_interface() local 41 if (sid == TFM_CRYPTO_RAW_KEY_AGREEMENT_SID) { in tfm_crypto_key_derivation_interface() 52 if (sid == TFM_CRYPTO_KEY_DERIVATION_SETUP_SID) { in tfm_crypto_key_derivation_interface() 65 (sid != TFM_CRYPTO_KEY_DERIVATION_ABORT_SID)) { in tfm_crypto_key_derivation_interface() 69 switch (sid) { in tfm_crypto_key_derivation_interface()
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/ns_agent_tz/ |
D | psa_api_veneers.c | 32 uint32_t tfm_psa_version_veneer(uint32_t sid) in tfm_psa_version_veneer() argument 34 return psa_version(sid); in tfm_psa_version_veneer() 51 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument 53 return psa_connect(sid, version); in tfm_psa_connect_veneer() 63 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument 65 (void)sid; in tfm_psa_connect_veneer()
|
D | psa_api_veneers_v80m.c | 106 uint32_t tfm_psa_version_veneer(uint32_t sid) in tfm_psa_version_veneer() argument 161 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument 218 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version) in tfm_psa_connect_veneer() argument
|
/trusted-firmware-m-3.6.0/interface/src/multi_core/ |
D | tfm_multi_core_psa_ns_api.c | 57 uint32_t psa_version(uint32_t sid) in psa_version() argument 63 params.psa_version_params.sid = sid; in psa_version() 75 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 81 params.psa_connect_params.sid = sid; in psa_connect()
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/lib/runtime/ |
D | psa_api_ipc.c | 20 uint32_t psa_version(uint32_t sid) in psa_version() argument 22 return PART_METADATA()->psa_fns->psa_version(sid); in psa_version() 77 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 79 return PART_METADATA()->psa_fns->psa_connect(sid, version); in psa_connect() 164 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version, in agent_psa_connect() argument 167 return PART_METADATA()->psa_fns->agent_psa_connect(sid, version, in agent_psa_connect()
|
/trusted-firmware-m-3.6.0/interface/src/ |
D | tfm_tz_psa_ns_api.c | 24 uint32_t psa_version(uint32_t sid) in psa_version() argument 28 sid, in psa_version() 55 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 57 return tfm_ns_interface_dispatch((veneer_fn)tfm_psa_connect_veneer, sid, version, 0, 0); in psa_connect()
|
/trusted-firmware-m-3.6.0/secure_fw/spm/core/ |
D | spm_ipc.c | 86 struct service_t *tfm_spm_get_service_by_sid(uint32_t sid) in tfm_spm_get_service_by_sid() argument 91 if (p_curr->p_ldinf->sid == sid) { in tfm_spm_get_service_by_sid() 146 int32_t tfm_spm_check_authorization(uint32_t sid, in tfm_spm_check_authorization() argument 168 if (dep[i] == sid) { in tfm_spm_check_authorization() 187 uint32_t sid, version, index; in spm_get_connection() local 207 sid = service->p_ldinf->sid; in spm_get_connection() 213 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in spm_get_connection()
|
D | psa_version_api.c | 20 uint32_t tfm_spm_client_psa_version(uint32_t sid) in tfm_spm_client_psa_version() argument 29 service = tfm_spm_get_service_by_sid(sid); in tfm_spm_client_psa_version() 38 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in tfm_spm_client_psa_version()
|
D | tfm_rpc.c | 48 uint32_t tfm_rpc_psa_version(uint32_t sid) in tfm_rpc_psa_version() argument 50 return tfm_spm_client_psa_version(sid); in tfm_rpc_psa_version() 65 psa_status_t tfm_rpc_psa_connect(uint32_t sid, in tfm_rpc_psa_connect() argument 70 return agent_psa_connect(sid, version, ns_client_id, client_data); in tfm_rpc_psa_connect()
|
D | psa_interface_sfn.c | 27 uint32_t psa_version(uint32_t sid) in psa_version() argument 34 return tfm_spm_client_psa_version(sid); in psa_version() 112 psa_handle_t psa_connect(uint32_t sid, uint32_t version) in psa_connect() argument 124 stat = tfm_spm_client_psa_connect(sid, version); in psa_connect() 297 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version, in agent_psa_connect() argument 310 stat = tfm_spm_agent_psa_connect(sid, version, ns_client_id, client_data); in agent_psa_connect()
|
D | psa_connection_api.c | 20 psa_status_t tfm_spm_client_psa_connect(uint32_t sid, uint32_t version) in tfm_spm_client_psa_connect() argument 32 service = tfm_spm_get_service_by_sid(sid); in tfm_spm_client_psa_connect() 46 if (tfm_spm_check_authorization(sid, service, ns_caller) != PSA_SUCCESS) { in tfm_spm_client_psa_connect()
|
D | tfm_rpc.h | 61 * \param[in] sid RoT Service identity. 67 uint32_t tfm_rpc_psa_version(uint32_t sid); 72 * \param[in] sid RoT Service identity. 84 psa_status_t tfm_rpc_psa_connect(uint32_t sid,
|
D | psa_interface_svc.c | 25 __naked uint32_t psa_version_svc(uint32_t sid) in psa_version_svc() argument 108 __naked psa_handle_t psa_connect_svc(uint32_t sid, uint32_t version) in psa_connect_svc() argument 173 __naked psa_handle_t agent_psa_connect_svc(uint32_t sid, uint32_t version, in agent_psa_connect_svc() argument
|
D | agent_api.c | 56 psa_handle_t tfm_spm_agent_psa_connect(uint32_t sid, uint32_t version, in tfm_spm_agent_psa_connect() argument 69 return tfm_spm_client_psa_connect(sid, version); in tfm_spm_agent_psa_connect()
|
D | psa_interface_thread_fn_call.c | 47 uint32_t psa_version_thread_fn_call(uint32_t sid) in psa_version_thread_fn_call() argument 142 psa_handle_t psa_connect_thread_fn_call(uint32_t sid, uint32_t version) in psa_connect_thread_fn_call() argument 246 psa_handle_t agent_psa_connect_thread_fn_call(uint32_t sid, uint32_t version, in agent_psa_connect_thread_fn_call() argument
|
/trusted-firmware-m-3.6.0/interface/include/ |
D | tfm_veneers.h | 30 * \param[in] sid ID of secure service. 34 uint32_t tfm_psa_version_veneer(uint32_t sid); 39 * \param[in] sid ID of secure service. 44 psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version);
|
/trusted-firmware-m-3.6.0/docs/design_docs/services/ |
D | stateless_rot_service.rst | 33 a handle by the manifest tooling, and then generated to header file ``sid.h``. 69 ``sid.h`` contains service ID and version. The tooling is extended to generate 82 `Stateless Handle Value Definition`_ section, and writes them to ``sid.h`` 95 According to FF-M v1.1, client calling ``psa_connect()`` with the SID of a 116 ``psa_manifest/sid.h`` when requesting a stateless service. 203 ``SID`` for the group. The ``type`` parameter in ``psa_call()`` could be
|
/trusted-firmware-m-3.6.0/tools/ |
D | tfm_generated_file_list.yaml | 21 "description": "SID H file", 22 "template": "interface/include/psa_manifest/sid.h.template", 23 "output": "interface/include/psa_manifest/sid.h"
|
/trusted-firmware-m-3.6.0/interface/include/psa/ |
D | client.h | 111 * \param[in] sid ID of the RoT Service to query. 117 uint32_t psa_version(uint32_t sid); 120 * \brief Connect to an RoT Service by its SID. 122 * \param[in] sid ID of the RoT Service to connect to. 137 psa_handle_t psa_connect(uint32_t sid, uint32_t version);
|
/trusted-firmware-m-3.6.0/secure_fw/spm/include/interface/ |
D | runtime_defs.h | 31 uint32_t (*psa_version)(uint32_t sid); 44 psa_handle_t (*psa_connect)(uint32_t sid, uint32_t version); 73 psa_handle_t (*agent_psa_connect)(uint32_t sid, uint32_t version,
|
/trusted-firmware-m-3.6.0/secure_fw/spm/include/ffm/ |
D | agent_api.h | 56 * \param[in] sid RoT Service identity. 70 psa_handle_t agent_psa_connect(uint32_t sid, uint32_t version,
|