/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/ |
D | tfm_fwu_req_mngr.c | 40 psa_fwu_component_t component; in tfm_fwu_start() local 52 if (msg->in_size[0] != sizeof(component)) { in tfm_fwu_start() 58 psa_read(msg->handle, 0, &component, sizeof(component)); in tfm_fwu_start() 60 if (component >= FWU_COMPONENT_NUMBER) { in tfm_fwu_start() 73 if (fwu_ctx[component].in_use) { in tfm_fwu_start() 74 if (fwu_ctx[component].component_state != PSA_FWU_READY) { in tfm_fwu_start() 79 status = fwu_bootloader_get_image_info(component, true, false, &info); in tfm_fwu_start() 88 status = fwu_bootloader_staging_area_init(component, in tfm_fwu_start() 94 fwu_ctx[component].in_use = true; in tfm_fwu_start() 95 fwu_ctx[component].component_state = PSA_FWU_WRITING; in tfm_fwu_start() [all …]
|
D | Kconfig.comp | 8 menu "FWU component configs"
|
D | Kconfig | 37 Device support TRIAL component state.
|
/trusted-firmware-m-3.6.0/interface/src/ |
D | tfm_fwu_api.c | 12 psa_status_t psa_fwu_start(psa_fwu_component_t component, in psa_fwu_start() argument 17 { .base = &component, .len = sizeof(component) }, in psa_fwu_start() 25 psa_status_t psa_fwu_write(psa_fwu_component_t component, in psa_fwu_write() argument 31 { .base = &component, .len = sizeof(component) }, in psa_fwu_write() 40 psa_status_t psa_fwu_finish(psa_fwu_component_t component) in psa_fwu_finish() argument 43 { .base = &component, .len = sizeof(component) }, in psa_fwu_finish() 56 psa_status_t psa_fwu_cancel(psa_fwu_component_t component) in psa_fwu_cancel() argument 59 { .base = &component, .len = sizeof(component) }, in psa_fwu_cancel() 66 psa_status_t psa_fwu_clean(psa_fwu_component_t component) in psa_fwu_clean() argument 69 { .base = &component, .len = sizeof(component) }, in psa_fwu_clean() [all …]
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/bootloader/mcuboot/ |
D | tfm_mcuboot_fwu.c | 59 static psa_status_t get_active_image_version(psa_fwu_component_t component, in get_active_image_version() argument 80 (GET_FWU_MODULE(tlv_entry.tlv_type) == component)) { in get_active_image_version() 105 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component, in fwu_bootloader_staging_area_init() argument 112 if ((manifest_size != 0) || (component >= FWU_COMPONENT_NUMBER)) { in fwu_bootloader_staging_area_init() 116 if (flash_area_open(FLASH_AREA_IMAGE_SECONDARY(component), in fwu_bootloader_staging_area_init() 127 mcuboot_ctx[component].fap = fap; in fwu_bootloader_staging_area_init() 130 mcuboot_ctx[component].loaded_size = 0; in fwu_bootloader_staging_area_init() 135 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component, in fwu_bootloader_load_image() argument 142 if (block == NULL || component >= FWU_COMPONENT_NUMBER) { in fwu_bootloader_load_image() 147 if (mcuboot_ctx[component].fap != NULL) { in fwu_bootloader_load_image() [all …]
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/bootloader/ |
D | tfm_bootloader_fwu_abstraction.h | 51 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component, 77 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component, 142 psa_status_t fwu_bootloader_reject_staged_image(psa_fwu_component_t component); 156 psa_status_t fwu_bootloader_reject_trial_image(psa_fwu_component_t component); 165 psa_status_t fwu_bootloader_clean_component(psa_fwu_component_t component); 182 psa_status_t fwu_bootloader_get_image_info(psa_fwu_component_t component,
|
/trusted-firmware-m-3.6.0/interface/include/psa/ |
D | update.h | 181 psa_status_t psa_fwu_query(psa_fwu_component_t component, 194 psa_status_t psa_fwu_start(psa_fwu_component_t component, 214 psa_status_t psa_fwu_write(psa_fwu_component_t component, 226 psa_status_t psa_fwu_finish(psa_fwu_component_t component); 235 psa_status_t psa_fwu_cancel(psa_fwu_component_t component); 244 psa_status_t psa_fwu_clean(psa_fwu_component_t component);
|
D | initial_attestation.h.in | 124 * entries, with one entry per software component within the 126 * evidence about the details of the software component. 129 * software component. Value is encoded as short(!) text 133 * component in memory at start-up time. The value must be a 144 * the measurement value of the software component is
|
D | fwu_config.h.in | 38 /* Whether TRIAL component state is supported or not. This is device specific
|
/trusted-firmware-m-3.6.0/docs/design_docs/services/ |
D | tfm_fwu_service.rst | 23 - Image preparation: prepare a new firmware image in the component's firmware store. 27 A typical flow through the component states is shown below [1]_. 32 :name: The component state model transitions. 111 psa_status_t fwu_bootloader_staging_area_init(psa_fwu_component_t component, 117 The component is in READY state. Prepare the staging area of the component for image download. 122 - ``component``: The identifier of the target component in bootloader. 133 psa_status_t fwu_bootloader_load_image(psa_fwu_component_t component, 140 Load the image into the target component. 144 - ``component``: The identifier of the target component in bootloader. 181 Call this API to mark the TRIAL(running) image in component as confirmed to avoid [all …]
|
/trusted-firmware-m-3.6.0/ |
D | Kconfig | 31 # These configs in this menu are local to a component or externally referenced 35 # Other configs above which are not in component menu are TF-M build options to 36 # select which file or component to include into compilation. These are options, 41 menu "TF-M component configs" 50 menu "Secure Partitions component configs"
|
/trusted-firmware-m-3.6.0/platform/ext/target/stm/common/secure_element/ |
D | LICENSE.txt | 1 This software component is provided to you as part of a software package and 3 software component outside of a package or without applicable license terms,
|
/trusted-firmware-m-3.6.0/platform/ext/target/stm/common/stm32h5xx/hal/ |
D | LICENSE.txt | 1 This software component is provided to you as part of a software package and 3 software component outside of a package or without applicable license terms,
|
/trusted-firmware-m-3.6.0/docs/configuration/ |
D | header_file_system.rst | 7 The header file configurations system is used to fine-tune component options. 52 Each component can implement a ``config_<comp_name>_check.h`` to validate component specific config
|
D | index.rst | 22 Specifies which file or component to include into compilation and build. 31 local to a component or externally referenced when components are coupled. 37 Originally, TF-M used CMake variables for both building and component tuning 39 component's configurations. To simplify and improve configurability and 41 :ref:`Header_configuration` and moved component options into a dedicated
|
D | kconfig_system.rst | 31 Contains component options in the header file system. 32 Component options are gathered together in a separate menu ``TF-M component configs`` in
|
/trusted-firmware-m-3.6.0/config/ |
D | tfm_fwu_config.cmake | 21 set(FWU_SUPPORT_TRIAL_STATE ON CACHE BOOL "Device support TRIAL component state.") 24 set(FWU_SUPPORT_TRIAL_STATE OFF CACHE BOOL "Device support TRIAL component state.")
|
/trusted-firmware-m-3.6.0/docs/ |
D | glossary.rst | 61 The TF-M component responsible for enumeration, management and isolation 66 The TF-M component responsible for Secure Partition runtime 75 A component within the TEE that is atomic from a security/trust point of 110 Hardware component providing isolation between Secure, Non-secure 121 Hardware component providing privilege control.
|
/trusted-firmware-m-3.6.0/bl2/ext/mcuboot/include/mcuboot_config/ |
D | mcuboot_config.h.in | 45 * - There are 5 allowed software component claims, 48 * of the software component with a maximum length of 12 bytes, which means
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/platform/ |
D | Kconfig.comp | 8 menu "Platform partition component configs"
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/crypto/ |
D | Kconfig | 20 Whether to enable the TF-M builtin key loader component. Without this, a
|
D | Kconfig.comp | 8 menu "Crypto component options"
|
/trusted-firmware-m-3.6.0/secure_fw/partitions/initial_attestation/ |
D | Kconfig.comp | 8 menu "Initial Attestation component options"
|
/trusted-firmware-m-3.6.0/secure_fw/spm/ |
D | Kconfig.comp | 10 menu "TF-M SPM component configs"
|
/trusted-firmware-m-3.6.0/docs/integration_guide/services/ |
D | tfm_crypto_integration_guide.rst | 27 dispatches them to the component that processes that particular API request 28 - A set of components that process cryptographic API requests, each component 159 disable modules at build time. Each define corresponds to a component as
|