Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 29) sorted by relevance

12

/trusted-firmware-m-3.7.0/secure_fw/spm/ns_client_ext/
Dtfm_ns_client_ext.c24 #define IS_INVALID_TOKEN(token) ((token) & 0xff000000) argument
25 #define NS_CLIENT_TOKEN_TO_CTX_IDX(token) (((token) >> 16) & 0xff) argument
26 #define NS_CLIENT_TOKEN_TO_GID(token) (((token) >> 8) & 0xff) argument
27 #define NS_CLIENT_TOKEN_TO_TID(token) ((token) & 0xff) argument
67 uint32_t tfm_nsce_release_ctx(uint32_t token) in tfm_nsce_release_ctx() argument
79 if (IS_INVALID_TOKEN(token)) { in tfm_nsce_release_ctx()
83 ctx_idx = NS_CLIENT_TOKEN_TO_CTX_IDX(token); in tfm_nsce_release_ctx()
84 gid = NS_CLIENT_TOKEN_TO_GID(token); in tfm_nsce_release_ctx()
85 tid = NS_CLIENT_TOKEN_TO_TID(token); in tfm_nsce_release_ctx()
96 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid) in tfm_nsce_load_ctx() argument
[all …]
/trusted-firmware-m-3.7.0/interface/include/
Dtfm_ns_client_ext.h74 uint32_t tfm_nsce_release_ctx(uint32_t token);
90 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid);
103 uint32_t tfm_nsce_save_ctx(uint32_t token);
/trusted-firmware-m-3.7.0/secure_fw/partitions/initial_attestation/
Dattest_core.c641 struct q_useful_buf *token, in attest_create_token() argument
680 token); in attest_create_token()
720 struct q_useful_buf token; in initial_attest_get_token() local
725 token.ptr = token_buf; in initial_attest_get_token()
726 token.len = token_buf_size; in initial_attest_get_token()
733 if (token.len == 0) { in initial_attest_get_token()
738 attest_err = attest_create_token(&challenge, &token, &completed_token); in initial_attest_get_token()
755 struct q_useful_buf token; in initial_attest_get_token_size() local
763 token.ptr = NULL; in initial_attest_get_token_size()
764 token.len = INT32_MAX; in initial_attest_get_token_size()
[all …]
DKconfig36 hex "The maximum possible size of a token"
DKconfig.comp15 Include optional claims in initial attestation token
/trusted-firmware-m-3.7.0/interface/include/psa/
Dinitial_attestation.h.in38 * The maximum size of an attestation token that can be generated by the
45 * The list of fixed claims in the initial attestation token is still evolving,
48 * The initial attestation token is planned to be aligned with future version of
71 * a Relying Party to locate a validation service for the token.
80 * a document that describes the 'profile' of the token, being
82 * and token signing. The document name may include versioning.
157 * \brief Get initial attestation token
165 * \param[out] token_buf Pointer to the buffer where attestation token
167 * \param[in] token_buf_size Size of allocated buffer for token, in bytes.
168 * \param[out] token_size Size of the token that has been returned, in
[all …]
/trusted-firmware-m-3.7.0/docs/integration_guide/services/
Dtfm_attestation_integration_guide.rst10 attestation service can create a token on request, which contains a fix set of
19 which is unique per device. The token is signed with the private part of
21 verification entity. The public key is used to verify the token
24 key to generate the authentication tag of token content. The verification
25 entity uses the same symmetric key to verify the token authenticity.
27 The data items in the token used to verify the device integrity and assess its
33 Claims in the initial attestation token
35 The initial attestation token is formed of claims. A claim is a data item,
37 claims are included in the token:
62 token. The value is a text string that can be used to locate the service
[all …]
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/icv_key_response/lib/
Dmain.c39 if (pCertStruct->token != DMPU_OEM_KEY_REQ_TOKEN) { in verifyCert()
40 UTIL_LOG_ERR("Ilegal token in cert 0x%x\n", pCertStruct->token); in verifyCert()
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/cc_util/
Dcc_util_asset_prov_int.h37 uint32_t token; member
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/sbrom/
Dcc_asset_prov.h36 uint32_t token; member
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/common/
Ddmpu_utils.h28 uint32_t token; member
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_key_request/
Ddmpu_oem_key_request_util.py105 token = DMPU_OEM_KEY_REQ_TOKEN
110 … header = struct.pack('<I', token) + struct.pack('<I', certVersion) + struct.pack('<I', certLength)
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/shared/include/proj/cc3x/
Dcc_production_asset.h67 uint32_t token; member
/trusted-firmware-m-3.7.0/docs/integration_guide/
Dnon-secure_client_extension_integration_guide.rst101 `tid` are the input paramemters. A token will be returned to the NSPE if TF-M
108 uint32_t tfm_nsce_release_ctx(uint32_t token)
117 uint32_t tfm_nsce_load_ctx(uint32_t token, int32_t nsid)
119 This function should be called when NSPE RTOS schedules in a NS client. `token`
131 uint32_t tfm_nsce_save_ctx(uint32_t token)
134 input parameter `token` is returned by `tfm_nsce_acquire_ctx()`.
177 should be done before the new task calls any secure service. A valid token
180 - When the kernel schedules in a task with a valid `token` associated,
189 `token` before being switched to another task. Calling `tfm_nsce_load_ctx()`
/trusted-firmware-m-3.7.0/
DKconfig.bl18 Used for initial attestation token.
/trusted-firmware-m-3.7.0/platform/ext/target/armchina/mps3/common/provisioning/
Dprovisioning_data_template.jinja287 #error "Attestation token profile is incorrect"
/trusted-firmware-m-3.7.0/platform/ext/target/arm/mps3/common/provisioning/
Dprovisioning_data_template.jinja287 #error "Attestation token profile is incorrect"
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_asset_package/lib/
Dmain.c74 assetPackage.token = PROD_ASSET_PROV_TOKEN; in build_oem_asset_pkg()
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/common_utils/
Dcert_cfg_parser_util.py367 def build_certificate_header (token, PrjDefines, LIST_OF_CONF_PARAMS, isRmaCert, hbkId, lcsId): argument
373 if token == DEBUG_ENABLER_TOKEN:
381 …headerStrBin = struct.pack('<I', token) + struct.pack('<I', certVersion) + struct.pack('<I', certL…
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/host/src/cc3x_lib/
Dmbedtls_cc_util_asset_prov.c75 if ((pAssetPackage->token != CC_ASSET_PROV_TOKEN) || in mbedtls_util_asset_pkg_unpack()
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_asset_prov_rt/lib/
Dmain.c148 assetBlob.token = CC_ASSET_PROV_TOKEN; in build_asset_blob()
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/utils/src/cmpu_asset_pkg_util/lib/
Dmain.c168 assetPackage.token = PROD_ASSET_PROV_TOKEN; in build_asset_pkg()
/trusted-firmware-m-3.7.0/lib/ext/cryptocell-312-runtime/host/src/cc3x_productionlib/common/
Dprod_util.c66 if ((pPkgAsset->token != PROD_ASSET_PROV_TOKEN) || in CC_PROD_PkgVerify()
/trusted-firmware-m-3.7.0/docs/design_docs/services/
Dsymmetric_initial_attest.rst176 :ref:`attest-token-start-figure` below.
178 .. _attest-token-start-figure:
227 :ref:`attest-token-finish-figure` below.
229 .. _attest-token-finish-figure:
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/
Dconfig.cmake68 …_INITIAL_ATTEST_MAX_TOKEN_SIZE 0x800 CACHE STRING "The maximum possible size of a token")
110 …CHE BOOL "Store measurement values from all the boot stages. Used for initial attestation token.")

12