/trusted-firmware-m-3.4.0/platform/ext/common/gcc/ |
D | tfm_isolation_l3.ld.template | 96 {% for partition in partitions %} 97 LONG (LOADADDR(.ER_{{partition.manifest.name}}_RWZI)) 98 LONG (ADDR(.ER_{{partition.manifest.name}}_RWZI)) 99 LONG (SIZEOF(.ER_{{partition.manifest.name}}_RWZI) / 4) 118 {% for partition in partitions %} 119 LONG (ADDR(.{{partition.manifest.name}}_RWZI_BSS)) 120 LONG (SIZEOF(.{{partition.manifest.name}}_RWZI_BSS) / 4) 125 /**** Section for holding partition RO load data */ 127 * Sort the partition info by priority to guarantee the initing order. 128 * The first loaded partition will be inited at last in SFN model. [all …]
|
/trusted-firmware-m-3.4.0/config/tests/ |
D | regression_config.cmake | 11 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 12 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 13 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 14 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 15 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition") 18 …set(TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition") 23 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 24 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 28 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 29 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") [all …]
|
D | config_test_psa_api.cmake | 18 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 20 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 21 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition") 25 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 26 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 27 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable Platform partition") 31 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 32 …M_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 33 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") [all …]
|
/trusted-firmware-m-3.4.0/platform/ext/common/iar/ |
D | tfm_isolation_l3.icf.template | 63 /**** Section for holding partition RO load data */ 65 * Sort the partition info by priority to guarantee the initing order. 66 * The first loaded partition will be inited at last in SFN model. 92 {% for partition in partitions %} 93 define block ER_{{partition.manifest.name}}_RO with alignment = {{ 'TFM_LINKER_PSA_ROT_LINKER_CODE… 95 {% if partition.attr.linker_pattern.library_list %} 96 {% for pattern in partition.attr.linker_pattern.library_list %} 101 {% if partition.attr.linker_pattern.object_list %} 102 {% for pattern in partition.attr.linker_pattern.object_list %} 106 {% if partition.manifest.type == 'PSA-ROT' %} [all …]
|
/trusted-firmware-m-3.4.0/secure_fw/spm/cmsis_psa/ |
D | spm_ipc.c | 281 struct partition_t *partition = NULL; in tfm_spm_check_authorization() local 292 partition = GET_CURRENT_COMPONENT(); in tfm_spm_check_authorization() 293 if (!partition) { in tfm_spm_check_authorization() 297 dep = LOAD_INFO_DEPS(partition->p_ldinf); in tfm_spm_check_authorization() 298 for (i = 0; i < partition->p_ldinf->ndeps; i++) { in tfm_spm_check_authorization() 304 if (i == partition->p_ldinf->ndeps) { in tfm_spm_check_authorization() 352 if (partition_id != p_conn_handle->service->partition->p_ldinf->pid) { in spm_get_handle_by_msg_handle() 412 struct partition_t *partition; in tfm_spm_partition_get_running_partition_id() local 414 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_get_running_partition_id() 415 if (partition && partition->p_ldinf) { in tfm_spm_partition_get_running_partition_id() [all …]
|
D | static_loader.c | 76 struct partition_t *partition; in load_a_partition_assuredly() local 110 partition = tfm_allocate_partition_assuredly(); in load_a_partition_assuredly() 111 partition->p_ldinf = p_ptldinf; in load_a_partition_assuredly() 115 UNI_LIST_INSERT_AFTER(head, partition, next); in load_a_partition_assuredly() 117 return partition; in load_a_partition_assuredly() 144 services[i].partition = p_partition; in load_services_assuredly()
|
/trusted-firmware-m-3.4.0/platform/ext/common/armclang/ |
D | tfm_isolation_l3.sct.template | 73 /**** Section for holding partition RO load data */ 75 * Sort the partition info by priority to guarantee the initing order. 76 * The first loaded partition will be inited at last in SFN model. 86 {% for partition in partitions %} 87 {% if partition.manifest.type == 'PSA-ROT' %} 88 ER_{{partition.manifest.name}}_RO +0 ALIGN TFM_LINKER_PSA_ROT_LINKER_CODE_ALIGNMENT { 89 {% if partition.attr.linker_pattern.library_list %} 90 {% for pattern in partition.attr.linker_pattern.library_list %} 94 {% if partition.attr.linker_pattern.object_list %} 95 {% for pattern in partition.attr.linker_pattern.object_list %} [all …]
|
/trusted-firmware-m-3.4.0/secure_fw/spm/ffm/ |
D | psa_api.c | 450 struct partition_t *partition = NULL; in tfm_spm_partition_psa_wait() local 458 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_wait() 467 if ((partition->signals_allowed) && in tfm_spm_partition_psa_wait() 468 (partition->signals_allowed & signal_mask) == 0) { in tfm_spm_partition_psa_wait() 480 return backend_wait(partition, signal_mask); in tfm_spm_partition_psa_wait() 483 return partition->signals_asserted & signal_mask; in tfm_spm_partition_psa_wait() 491 struct partition_t *partition = NULL; in tfm_spm_partition_psa_get() local 502 partition = GET_CURRENT_COMPONENT(); in tfm_spm_partition_psa_get() 509 partition->boundary, (uintptr_t)msg, in tfm_spm_partition_psa_get() 520 if (partition->signals_asserted == 0) { in tfm_spm_partition_psa_get() [all …]
|
/trusted-firmware-m-3.4.0/config/profile/ |
D | profile_medium.cmake | 18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
D | profile_small.cmake | 18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 20 set(TFM_PARTITION_PLATFORM OFF CACHE BOOL "Enable the TF-M Platform partition") 21 set(TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition") 22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
D | profile_medium_arotless.cmake | 18 …TION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 19 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 20 …M_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 21 …PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 22 …TFM_PARTITION_FIRMWARE_UPDATE ON CACHE BOOL "Enable firmware update partition") 23 …M_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition")
|
D | profile_large.cmake | 18 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 19 …FM_PARTITION_INTERNAL_TRUSTED_STORAGE ON CACHE BOOL "Enable Internal Trusted Storage partition") 20 set(TFM_PARTITION_PLATFORM ON CACHE BOOL "Enable the TF-M Platform partition") 21 set(TFM_PARTITION_PROTECTED_STORAGE ON CACHE BOOL "Enable Protected Storage partition") 22 set(TFM_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 24 set(TFM_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition")
|
/trusted-firmware-m-3.4.0/interface/include/psa_manifest/ |
D | sid.h.template | 17 {% for partition in partitions %} 18 {% if partition.manifest.services %} 19 /******** {{partition.manifest.name}} ********/ 20 {% for service in partition.manifest.services %}
|
D | pid.h.template | 18 {% for partition in partitions %} 19 #define {{"%-62s"|format(partition.manifest.name)}} ({{partition.attr.pid}})
|
/trusted-firmware-m-3.4.0/bl2/ext/mcuboot/scripts/ |
D | assemble.py | 60 def add_image(self, source, partition): argument 64 if pos > self.offsets[partition]: 66 if pos < self.offsets[partition]: 67 ofd.write(b'\xFF' * (self.offsets[partition] - pos)) 69 if statinfo.st_size > self.sizes[partition]:
|
/trusted-firmware-m-3.4.0/docs/technical_references/design_docs/ |
D | secure_partition_manager.rst | 32 Services are grouped into `Secure Partition` (aka `partition`). A partition: 47 - Manages partition runtime to follow FF-M. 58 process. Besides this, another important implementation part is partition 63 One partition must work under as `ONE` of the runtime models: 67 A partition that runs under the `IPC` model looks like a classic `process`. 68 There is `ONE` thread inside the partition keeps waiting for signals. SPM 70 and assert a signal to the partition. The partition calls corresponded service 80 model converts multiple service accesses into messages, let the partition 83 The `Secure Function` (`SFN`) model partition is close to a `library`. Each 84 service is provided as a function entry inside the partition. SPM launches [all …]
|
/trusted-firmware-m-3.4.0/config/ |
D | tfm_ipc_config_default.cmake | 18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition") 25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
|
D | tfm_sfn_config_default.cmake | 18 set(TFM_PARTITION_NS_AGENT_MAILBOX ON CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 20 set(TFM_PARTITION_NS_AGENT_MAILBOX OFF CACHE BOOL "Enable Non-Secure Mailbox Agent partition") 23 set(TFM_PARTITION_NS_AGENT_TZ ON CACHE BOOL "Enable Non-Secure TrustZone Agent partition") 25 set(TFM_PARTITION_NS_AGENT_TZ OFF CACHE BOOL "Enable Non-Secure TrustZone Agent partition")
|
D | tfm_fwu_config.cmake | 9 …M_PARTITION_FIRMWARE_UPDATE OFF CACHE BOOL "Enable firmware update partition") 10 … "mcuboot" CACHE STRING "Bootloader configure file for Firmware Update partition") 13 … "" CACHE STRING "The device configuration file for Firmware Update partition")
|
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf9161dk_nrf9161/ |
D | CMakeLists.txt | 15 ../common/nrf91/partition 26 ../common/nrf91/partition 38 ../common/nrf91/partition
|
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf5340dk_nrf5340_cpuapp/ |
D | CMakeLists.txt | 17 ../common/nrf5340/partition 28 ../common/nrf5340/partition 40 ../common/nrf5340/partition
|
/trusted-firmware-m-3.4.0/platform/ext/target/nordic_nrf/nrf9160dk_nrf9160/ |
D | CMakeLists.txt | 17 ../common/nrf91/partition 28 ../common/nrf91/partition 40 ../common/nrf91/partition
|
/trusted-firmware-m-3.4.0/platform/ext/target/lairdconnectivity/bl5340_dvk_cpuapp/ |
D | CMakeLists.txt | 18 ../common/bl5340/partition 29 ../common/bl5340/partition 41 ../common/bl5340/partition
|
/trusted-firmware-m-3.4.0/platform/ext/target/arm/rss/common/ |
D | config.cmake | 36 set(TFM_PARTITION_CRYPTO ON CACHE BOOL "Enable Crypto partition") 37 …M_PARTITION_INITIAL_ATTESTATION ON CACHE BOOL "Enable Initial Attestation partition") 38 …TFM_PARTITION_PROTECTED_STORAGE OFF CACHE BOOL "Enable Protected Storage partition") 39 …TITION_INTERNAL_TRUSTED_STORAGE OFF CACHE BOOL "Enable Internal Trusted Storage partition") 40 set(TFM_PARTITION_MEASURED_BOOT ON CACHE BOOL "Enable Measured boot partition") 46 …measured_boot;delegated_attestation" CACHE STRING "List of extra secure partition directory name(s… 48 …/delegated_attestation_manifest_list.yaml" CACHE STRING "List of extra secure partition manifests") 50 …PARTITION_DELEGATED_ATTESTATION ON CACHE BOOL "Enable Delegated Attestation partition")
|
/trusted-firmware-m-3.4.0/tools/ |
D | tfm_parse_manifest_list.py | 177 for partition in partitions: 178 manifest = partition['manifest'] 190 for partition in dependency_table.keys(): 191 validate_dependency_chain(partition, dependency_table, []) 193 def validate_dependency_chain(partition, argument 207 dependency_chain.append(partition) 208 if partition in dependency_chain[:-1]: 213 for dependency in dependency_table[partition]['dependencies']: 217 dependency_table[partition]['validated'] = True 551 for partition in partitions: [all …]
|