/trusted-firmware-m-3.7.0/secure_fw/spm/ns_client_ext/ |
D | tfm_ns_client_ext.c | 24 #define IS_INVALID_TOKEN(token) ((token) & 0xff000000) argument 25 #define NS_CLIENT_TOKEN_TO_CTX_IDX(token) (((token) >> 16) & 0xff) argument 26 #define NS_CLIENT_TOKEN_TO_GID(token) (((token) >> 8) & 0xff) argument 27 #define NS_CLIENT_TOKEN_TO_TID(token) ((token) & 0xff) argument 67 uint32_t tfm_nsce_release_ctx(uint32_t token) in tfm_nsce_release_ctx() argument 79 if (IS_INVALID_TOKEN(token)) { in tfm_nsce_release_ctx() 83 ctx_idx = NS_CLIENT_TOKEN_TO_CTX_IDX(token); in tfm_nsce_release_ctx() 84 gid = NS_CLIENT_TOKEN_TO_GID(token); in tfm_nsce_release_ctx() 85 tid = NS_CLIENT_TOKEN_TO_TID(token); in tfm_nsce_release_ctx() 96 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid) in tfm_nsce_load_ctx() argument [all …]
|
/trusted-firmware-m-3.7.0/interface/include/ |
D | tfm_ns_client_ext.h | 74 uint32_t tfm_nsce_release_ctx(uint32_t token); 90 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid); 103 uint32_t tfm_nsce_save_ctx(uint32_t token);
|
/trusted-firmware-m-3.7.0/secure_fw/partitions/initial_attestation/ |
D | attest_core.c | 641 struct q_useful_buf *token, in attest_create_token() argument 680 token); in attest_create_token() 720 struct q_useful_buf token; in initial_attest_get_token() local 725 token.ptr = token_buf; in initial_attest_get_token() 726 token.len = token_buf_size; in initial_attest_get_token() 733 if (token.len == 0) { in initial_attest_get_token() 738 attest_err = attest_create_token(&challenge, &token, &completed_token); in initial_attest_get_token() 755 struct q_useful_buf token; in initial_attest_get_token_size() local 763 token.ptr = NULL; in initial_attest_get_token_size() 764 token.len = INT32_MAX; in initial_attest_get_token_size() [all …]
|
D | Kconfig | 36 hex "The maximum possible size of a token"
|
D | Kconfig.comp | 15 Include optional claims in initial attestation token
|
/trusted-firmware-m-3.7.0/interface/include/psa/ |
D | initial_attestation.h.in | 38 * The maximum size of an attestation token that can be generated by the 45 * The list of fixed claims in the initial attestation token is still evolving, 48 * The initial attestation token is planned to be aligned with future version of 71 * a Relying Party to locate a validation service for the token. 80 * a document that describes the 'profile' of the token, being 82 * and token signing. The document name may include versioning. 157 * \brief Get initial attestation token 165 * \param[out] token_buf Pointer to the buffer where attestation token 167 * \param[in] token_buf_size Size of allocated buffer for token, in bytes. 168 * \param[out] token_size Size of the token that has been returned, in [all …]
|
/trusted-firmware-m-3.7.0/docs/integration_guide/services/ |
D | tfm_attestation_integration_guide.rst | 10 attestation service can create a token on request, which contains a fix set of 19 which is unique per device. The token is signed with the private part of 21 verification entity. The public key is used to verify the token 24 key to generate the authentication tag of token content. The verification 25 entity uses the same symmetric key to verify the token authenticity. 27 The data items in the token used to verify the device integrity and assess its 33 Claims in the initial attestation token 35 The initial attestation token is formed of claims. A claim is a data item, 37 claims are included in the token: 62 token. The value is a text string that can be used to locate the service [all …]
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/icv_key_response/lib/ |
D | main.c | 39 if (pCertStruct->token != DMPU_OEM_KEY_REQ_TOKEN) { in verifyCert() 40 UTIL_LOG_ERR("Ilegal token in cert 0x%x\n", pCertStruct->token); in verifyCert()
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/cc_util/ |
D | cc_util_asset_prov_int.h | 37 uint32_t token; member
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/sbrom/ |
D | cc_asset_prov.h | 36 uint32_t token; member
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/common/ |
D | dmpu_utils.h | 28 uint32_t token; member
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_key_request/ |
D | dmpu_oem_key_request_util.py | 105 token = DMPU_OEM_KEY_REQ_TOKEN 110 … header = struct.pack('<I', token) + struct.pack('<I', certVersion) + struct.pack('<I', certLength)
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/proj/cc3x/ |
D | cc_production_asset.h | 67 uint32_t token; member
|
/trusted-firmware-m-3.7.0/docs/integration_guide/ |
D | non-secure_client_extension_integration_guide.rst | 101 `tid` are the input paramemters. A token will be returned to the NSPE if TF-M 108 uint32_t tfm_nsce_release_ctx(uint32_t token) 117 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid) 119 This function should be called when NSPE RTOS schedules in a NS client. `token` 131 uint32_t tfm_nsce_save_ctx(uint32_t token) 134 input parameter `token` is returned by `tfm_nsce_acquire_ctx()`. 177 should be done before the new task calls any secure service. A valid token 180 - When the kernel schedules in a task with a valid `token` associated, 189 `token` before being switched to another task. Calling `tfm_nsce_load_ctx()`
|
/trusted-firmware-m-3.7.0/ |
D | Kconfig.bl | 18 Used for initial attestation token.
|
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/ |
D | provisioning_data_template.jinja2 | 87 #error "Attestation token profile is incorrect"
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/ |
D | provisioning_data_template.jinja2 | 87 #error "Attestation token profile is incorrect"
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_asset_package/lib/ |
D | main.c | 74 assetPackage.token = PROD_ASSET_PROV_TOKEN; in build_oem_asset_pkg()
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/common_utils/ |
D | cert_cfg_parser_util.py | 367 def build_certificate_header (token, PrjDefines, LIST_OF_CONF_PARAMS, isRmaCert, hbkId, lcsId): argument 373 if token == DEBUG_ENABLER_TOKEN: 381 …headerStrBin = struct.pack('<I', token) + struct.pack('<I', certVersion) + struct.pack('<I', certL…
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/host/src/cc3x_lib/ |
D | mbedtls_cc_util_asset_prov.c | 75 if ((pAssetPackage->token != CC_ASSET_PROV_TOKEN) || in mbedtls_util_asset_pkg_unpack()
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_asset_prov_rt/lib/ |
D | main.c | 148 assetBlob.token = CC_ASSET_PROV_TOKEN; in build_asset_blob()
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/lib/ |
D | main.c | 168 assetPackage.token = PROD_ASSET_PROV_TOKEN; in build_asset_pkg()
|
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/host/src/cc3x_productionlib/common/ |
D | prod_util.c | 66 if ((pPkgAsset->token != PROD_ASSET_PROV_TOKEN) || in CC_PROD_PkgVerify()
|
/trusted-firmware-m-3.7.0/docs/design_docs/services/ |
D | symmetric_initial_attest.rst | 176 :ref:`attest-token-start-figure` below. 178 .. _attest-token-start-figure: 227 :ref:`attest-token-finish-figure` below. 229 .. _attest-token-finish-figure:
|
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/ |
D | config.cmake | 68 …_INITIAL_ATTEST_MAX_TOKEN_SIZE 0x800 CACHE STRING "The maximum possible size of a token") 110 …CHE BOOL "Store measurement values from all the boot stages. Used for initial attestation token.")
|