Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 78) sorted by relevance

1234

/trusted-firmware-m-3.7.0/secure_fw/spm/core/
Drom_loader.c137 struct service_t *services; in load_services_assuredly() local
152 services = tfm_allocate_service_assuredly(p_ptldinf->nservices); in load_services_assuredly()
153 for (i = 0; i < p_ptldinf->nservices && services; i++) { in load_services_assuredly()
154 services[i].p_ldinf = &p_servldinf[i]; in load_services_assuredly()
155 services[i].partition = p_partition; in load_services_assuredly()
156 services[i].next = NULL; in load_services_assuredly()
176 stateless_services_ref_tbl[hidx] = &services[i]; in load_services_assuredly()
179 UNI_LIST_INSERT_AFTER(services_listhead, &services[i], next); in load_services_assuredly()
/trusted-firmware-m-3.7.0/docs/design_docs/services/
Dstateless_rot_service.rst16 services.
54 Since connection-based services and stateless services share the same PSA API
60 The index is used for organizing stateless services in manifest tool and
68 header files required by partition and services. For example, the generated
88 This chapter describes the changes in programming API for stateless services.
147 There are particular services that do not need sessions. The access to the
148 service is a one-shot connection. These services provide standalone operations
151 caller. Such services are recommended to be implemented as stateless, to provide
155 state or non-volatile resources while stateless services do not need them.
160 TF-M native services are used widely. They only need standalone operations and
[all …]
Dtfm_uniform_secure_service_signature.rst34 parameters, and there is no need for the secure services to make these checks
42 The signature for such secure services would look like this:
60 secure service veneers would not apply to secure services using the uniform
108 Note that the proposal is for the two types of services (those with proprietary
Dsecure_partition_manager.rst28 Secure services (aka `Service`) is the component providing secure
30 acts as a client when it is accessing its depending services.
34 - Contains services with the same purpose.
39 usage. Clients access services by `SID` or `Handle` through FF-M `Client API`.
100 `IPC model implementation` can handle access to the services in the `SFN`
121 services in one step, an `NSPE` client needs to cross the secure boundaries
150 - These components can provide services: SFN Partition, IPC partition, and
151 built-in services. A built-in service is built up with SPM together.
152 - All partition services must be accessed by `Client API`.
154 - Built-in services are strongly recommended to be accessed by `Client API`.
[all …]
/trusted-firmware-m-3.7.0/platform/ext/target/lairdconnectivity/bl5340_dvk_cpuapp/
DCMakeLists.txt23 …$<$<BOOL:${TFM_PARTITION_PLATFORM}>:${CMAKE_CURRENT_SOURCE_DIR}/services/src/tfm_platform_system.c>
30 services/include
48 install(FILES services/include/tfm_ioctl_api.h
/trusted-firmware-m-3.7.0/platform/ext/target/lairdconnectivity/common/core/
DCMakeLists.txt64 ${NRF_FOLDER_PATH}/services/include
85 ${NRF_FOLDER_PATH}/services/src/tfm_platform_hal_ioctl.c
86 ${NRF_FOLDER_PATH}/services/src/tfm_ioctl_core_s_api.c
91 ${NRF_FOLDER_PATH}/services/src/tfm_ioctl_core_ns_api.c
124 ${NRF_FOLDER_PATH}/services/include
173 install(FILES ${NRF_FOLDER_PATH}/services/include/tfm_ioctl_core_api.h
176 install(FILES ${NRF_FOLDER_PATH}/services/src/tfm_ioctl_core_ns_api.c
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/nrf5340dk_nrf5340_cpuapp/
DCMakeLists.txt22 …$<$<BOOL:${TFM_PARTITION_PLATFORM}>:${CMAKE_CURRENT_SOURCE_DIR}/services/src/tfm_platform_system.c>
29 services/include
55 install(FILES services/include/tfm_ioctl_api.h
/trusted-firmware-m-3.7.0/platform/ext/target/arm/musca_s1/ns/
DCMakeLists.txt22 $<$<BOOL:${PLATFORM_GPLED_ENABLED}>:services/src/tfm_ioctl_ns_api.c>
23 $<$<BOOL:${PLATFORM_GPLED_ENABLED}>:services/src/tfm_gpled_api.c>
36 $<$<BOOL:${PLATFORM_GPLED_ENABLED}>:services/include>
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/nrf9160dk_nrf9160/
DCMakeLists.txt22 …$<$<BOOL:${TFM_PARTITION_PLATFORM}>:${CMAKE_CURRENT_SOURCE_DIR}/services/src/tfm_platform_system.c>
29 services/include
60 install(FILES services/include/tfm_ioctl_api.h
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/nrf9161dk_nrf9161/
DCMakeLists.txt20 …$<$<BOOL:${TFM_PARTITION_PLATFORM}>:${CMAKE_CURRENT_SOURCE_DIR}/services/src/tfm_platform_system.c>
27 services/include
58 install(FILES services/include/tfm_ioctl_api.h
/trusted-firmware-m-3.7.0/interface/include/psa_manifest/
Dsid.h.template18 {% if partition.manifest.services %}
20 {% for service in partition.manifest.services %}
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/common/core/
DCMakeLists.txt74 services/include
121 services/src/tfm_platform_hal_ioctl.c
122 services/src/tfm_ioctl_core_s_api.c
181 install(FILES services/include/tfm_ioctl_core_api.h
184 install(FILES services/src/tfm_ioctl_core_ns_api.c
246 services
/trusted-firmware-m-3.7.0/docs/integration_guide/source_structure/
Dsource_structure.rst79 partitions Default services and SPRTL
90 services and platforms. Avoid putting private headers, not referenced by
95 This folder contains default services implemented as partitions and runtime
108 Here `partition_x` and `partition_y` are examples of RoT services without
114 services complied with PSA FF-M.
/trusted-firmware-m-3.7.0/secure_fw/spm/
DKconfig.comp13 int "Maximal number of handling secure services"
16 The maximal number of secure services that are connected or requested at
/trusted-firmware-m-3.7.0/docs/
Dglossary.rst9 `PSA term`_. The security domain in which additional security services
31 OS using services provided by TF-M.
53 A logical container for secure services.
80 One of PSA services provided by TF-M.
84 One of PSA services provided by TF-M.
/trusted-firmware-m-3.7.0/tools/templates/
Dmanifestfilename.template25 {% if manifest.services %}
26 {% for service in manifest.services %}
/trusted-firmware-m-3.7.0/docs/design_docs/software/
Dtfm_code_generation_with_jinja2.rst64 Below code snippet enumerates services in Secure Partitions:
69 {% if partition.manifest.services %}
70 {% for service in partition.manifest.services %}
/trusted-firmware-m-3.7.0/docs/introduction/
Dreadme.rst23 Firmware Update and Attestation secure services
27 to only include the required secure services and features. Project provides
30 be configured to include required services and features as described in the
40 utilize these secure services with a standardized set of PSA Functional APIs.
41 Applications running on Cortex-M devices can leverage TF-M services to ensure
42 secure connection with edge gateways and IoT cloud services. It also protects
/trusted-firmware-m-3.7.0/docs/design_docs/
Dindex.rst9 Secure Services <services/index>
/trusted-firmware-m-3.7.0/secure_fw/partitions/
Ddir_services.dox13 \brief Source code for secure services.
/trusted-firmware-m-3.7.0/platform/ext/target/arm/musca_s1/
DCMakeLists.txt54 services/include
82 …$<$<BOOL:${TFM_PARTITION_PLATFORM}>:${CMAKE_CURRENT_SOURCE_DIR}/services/src/tfm_platform_system.c>
158 services
/trusted-firmware-m-3.7.0/docs/integration_guide/services/
Dtfm_platform_integration_guide.rst47 their dedicated HAL API functions. Additional platform-specific services can be
53 ``platform/ext/target/<SPECIFIC_TARGET_FOLDER>/services/src/tfm_platform_system.c``
106 isolation level 1. Currently the mechanism by which PSA-RoT services should
/trusted-firmware-m-3.7.0/docs/doxygen/
Dmainpage.dox13 This document gives a reference for the TF-M core and services. This guide does
/trusted-firmware-m-3.7.0/docs/security/security_advisories/
Dprofile_small_key_id_encoding_vulnerability.rst71 Analysis of RoT services in Profile Small
76 services in Profile Small.
119 Default Profile Small RoT services don't initially call Crypto key derivation or
122 According to the analysis of RoT services above, device HUK can be accessed by
134 Impact on vendor RoT services
/trusted-firmware-m-3.7.0/docs/configuration/
Dindex.rst18 a user's needs. A user can select the desired set of services and fine-tune
50 Starting from the base, users can enable required services and features using several
67 *base configuration* a user can enable necessary services and options.
69 This is new in v1.7.0 and it covers only SPM and PSA services. As an output

1234