Home
last modified time | relevance | path

Searched full:psa (Results 1 – 25 of 167) sorted by relevance

1234567

/Zephyr-latest/samples/psa/persistent_key/
DREADME.rst2 :name: PSA Crypto persistent key
4 Manage and use persistent keys via the PSA Crypto API.
9 This sample demonstrates usage of persistent keys in the :ref:`PSA Crypto API <psa_crypto>`.
14 In addition to the PSA Crypto API, an implementation of the
15 `PSA Internal Trusted Storage (ITS) API <https://arm-software.github.io/psa-api/storage/1.0/overvie…
25 This sample is located in :zephyr_file:`samples/psa/persistent_key`.
28 You can use them to build the sample, depending on the PSA ITS provider, as follows:
37 :zephyr-app: samples/psa/persistent_key
41 :west-args: -T sample.psa.persistent_key.tfm
50 :zephyr-app: samples/psa/persistent_key
[all …]
Dsample.yaml2 name: PSA Crypto persistent key sample
3 description: Demonstration of persistent key usage in the PSA Crypto API.
6 - psa.secure_storage
14 sample.psa.persistent_key.tfm:
18 sample.psa.persistent_key.secure_storage.entropy_driver:
25 sample.psa.persistent_key.secure_storage.entropy_not_secure:
/Zephyr-latest/samples/psa/its/
DREADME.rst2 :name: PSA Internal Trusted Storage API
5 Use the PSA ITS API.
11 `PSA Internal Trusted Storage (ITS) API <https://arm-software.github.io/psa-api/storage/1.0/overvie…
12 which is part of the `PSA Secure Storage API <https://arm-software.github.io/psa-api/storage/>`_,
18 An implementation of the PSA ITS API must be present for this sample to build.
27 This sample is located in :zephyr_file:`samples/psa/its`.
30 You can use them to build the sample, depending on the PSA ITS provider, as follows:
39 :zephyr-app: samples/psa/its
43 :west-args: -T sample.psa.its.tfm
52 :zephyr-app: samples/psa/its
[all …]
Dsample.yaml2 name: PSA ITS API sample
3 description: Demonstration of PSA Internal Trusted Storage (ITS) API usage.
6 - psa.secure_storage
14 sample.psa.its.tfm:
18 sample.psa.its.secure_storage.entropy_driver:
25 sample.psa.its.secure_storage.entropy_not_secure:
/Zephyr-latest/samples/tfm_integration/psa_crypto/
DKconfig1 # Private config options for PSA Crypto application
6 mainmenu "PSA Crypto sample application"
10 module = PSA
11 module-str = psa
17 bool "The 'psa' shell command"
20 Enabling this option will make the 'psa' shell command available.
26 private key using PSA APIs and PRIVATE_KEY_STATIC or
/Zephyr-latest/doc/services/tfm/
Dtestsuites.rst7 * psa-arch-tests - Test suites for specific PSA APIs (secure storage, etc.)
18 NS/S boundary via the PSA APIs. They provide a useful sanity check for proper
22 PSA Arch Tests
25 The PSA Arch Test suite, available via :ref:`tfm_psa_test`, contains a number of
26 test suites that can be used to validate that PSA API specifications are
28 the Platform Security Architecture (PSA).
36 The output of these test suites is required to obtain PSA Certification for
37 your specific board, RTOS (Zephyr here), and PSA implementation (TF-M in this
/Zephyr-latest/tests/subsys/secure_storage/psa/its/
Dtestcase.yaml9 - psa.secure_storage
11 secure_storage.psa.its.secure_storage.zms:
30 secure_storage.psa.its.secure_storage.settings.nvs:
35 secure_storage.psa.its.secure_storage.custom.transform:
39 secure_storage.psa.its.secure_storage.custom.store:
44 secure_storage.psa.its.secure_storage.custom.both:
49 secure_storage.psa.its.tfm:
/Zephyr-latest/samples/psa/
Dindex.rst1 .. zephyr:code-sample-category:: psa
2 :name: PSA
6 `Platform Security Architecture (PSA) Certified APIs <https://arm-software.github.io/psa-api/>`_.
/Zephyr-latest/tests/crypto/mbedtls_psa/
Dtestcase.yaml1 # The goal here is to showcase that Mbed TLS's PSA crypto implementation can be
3 # enable support for PSA crypto APIs in Mbed TLS and then test them with:
4 # - psa_crypto_init() which is required before any PSA crypto operation
5 # - psa_generate_random() which is always available as long as PSA crypto is
12 # of PSA crypto is working fine on the platforms that support TF-M.
21 - psa
/Zephyr-latest/subsys/secure_storage/include/psa/
Dstorage_common.h7 * @defgroup psa_secure_storage PSA Secure Storage API
9 * @details For more information on the PSA Secure Storage API, see the
10 * [PSA Certified Secure Storage API](https://arm-software.github.io/psa-api/storage/1.0/)
14 * @file psa/storage_common.h
16 * @brief Common definitions of the PSA Secure Storage API.
19 #include <psa/error.h>
/Zephyr-latest/tests/bsim/bluetooth/mesh/
Doverlay_psa.conf1 # Increase the number of key slots in PSA Crypto core
4 # Increase the number of key slots in PSA Crypto core
7 # Enable mbedTLS PSA as a crypto backend
/Zephyr-latest/samples/tfm_integration/psa_crypto/src/
Dutil_app_log.h9 #include "psa/error.h"
10 #include "psa/initial_attestation.h"
11 #include "psa/protected_storage.h"
18 * @brief Logs PSA response messages other than PSA_SUCCESS for debugging
Dshell.c29 /* Subcommand array for "psa" (level 1). */
37 /* Root command "psa" (level 0). */
38 SHELL_CMD_REGISTER(psa, &sub_psa, "PSA commands", NULL);
Dpsa_crypto.h9 #include "psa/crypto.h"
10 #include "psa/error.h"
22 * @brief Runs a series of PSA Cryptography API test functions.
Dutil_app_log.c10 #include "psa/crypto.h"
21 /* Generic PSA errors (psa/error.h). */ in al_psa_status()
83 /* PSA crypto errors (psa/crypto_values.h). */ in al_psa_status()
/Zephyr-latest/drivers/entropy/
DKconfig.psa_crypto4 # PSA Crypto Random source configuration options
7 bool "PSA Crypto Random source Entropy driver"
12 Enable the PSA Crypto source Entropy driver.
/Zephyr-latest/doc/services/
Dsecure_storage.rst7 …`Platform Security Architecture (PSA) Secure Storage API <https://arm-software.github.io/psa-api/s…
14 The secure storage subsystem makes the PSA Secure Storage API available on all board targets with
23 may secure the data stored via the PSA Secure Storage API at rest.
30 The secure storage subsystem's implementation of the PSA Secure Storage API:
50 …`3.2. Internal Trusted Storage requirements <https://arm-software.github.io/psa-api/storage/1.0/ov…
54 …(`2.4. The Internal Trusted Storage API <https://arm-software.github.io/psa-api/storage/1.0/overvi…
57 …(`2.2. Technical Background <https://arm-software.github.io/psa-api/storage/1.0/overview/architect…
68 * The data stored via the PSA Secure Storage API is not protected from direct
70 …`3.2. Internal Trusted Storage requirements <https://arm-software.github.io/psa-api/storage/1.0/ov…
78 To configure the implementation of the PSA Secure Storage API provided by Zephyr, have a look at the
[all …]
/Zephyr-latest/tests/subsys/secure_storage/psa/crypto/
Dtestcase.yaml3 - psa.secure_storage
5 secure_storage.psa.crypto.secure_storage:
11 secure_storage.psa.crypto.tfm:
/Zephyr-latest/doc/services/crypto/
Dpsa_crypto.rst3 PSA Crypto
9 The PSA (Platform Security Architecture) Crypto API offers a portable
15 It is created and maintained by Arm. Arm developed the PSA as a
19 In Zephyr, the PSA Crypto API is implemented using Mbed TLS, an
33 The PSA Crypto API supports a wide range of cryptographic algorithms,
39 The PSA Crypto API includes robust key management features that
46 The PSA Crypto API abstracts the underlying cryptographic library,
53 By adhering to cryptographic agility, PSA Crypto ensures that
101 Most functions in the PSA Crypto API can return errors. All functions
142 In general, the PSA Crypto API allows either one writer or any number of
[all …]
/Zephyr-latest/subsys/secure_storage/src/its/
DCMakeLists.txt14 The PSA ITS encryption key provider in use generates keys by hashing the device ID
17 This means that the data and keys stored via the PSA APIs may not be secure at rest.")
20 The PSA ITS encryption key provider in use is not secure.
22 This means that the data and keys stored via the PSA APIs will not be secure at rest.
/Zephyr-latest/subsys/net/lib/wifi_credentials/
DKconfig25 Selects whether to use PSA Protected Storage or the Zephyr settings subsystem
34 bool "PSA Protected Storage"
84 The PSA specification mandates to set key identifiers for keys
85 with persistent lifetime. The users of the PSA API are responsible (WIFI credentials
86 management is user of PSA API) to provide correct and unique identifiers.
/Zephyr-latest/samples/tfm_integration/tfm_ipc/
Dsample.yaml27 - "The version of the PSA Framework API is"
28 - "The PSA Crypto service minor version is"
42 - "The version of the PSA Framework API is"
43 - "The PSA Crypto service minor version is"
/Zephyr-latest/modules/mbedtls/
Dcreate_psa_files.py14 "include", "psa", "crypto_config.h")
17 KCONFIG_PATH=os.path.join(SCRIPT_PATH, "Kconfig.psa.auto")
18 HEADER_PATH=os.path.join(SCRIPT_PATH, "configs", "config-psa.h")
31 Promptless symbol to state that there is a PSA crypto API provider
37 bool "All PSA crypto features"
63 # (see "modules/crypto/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h").
66 # - add _BASIC Kconfigs to Kconfig.psa.logic and let them "default y" as soon as
135 print("Error: PSA Kconfig and header files do not match with the current"
/Zephyr-latest/samples/tfm_integration/tfm_ipc/src/
Dmain.c13 #include "psa/crypto.h"
17 * \brief Retrieve the version of the PSA Framework API.
29 printk("The version of the PSA Framework API is %d.\n", in tfm_get_version()
32 printk("The version of the PSA Framework API is not valid!\n"); in tfm_get_version()
53 printk("The PSA Crypto service minor version is %d.\n", version); in tfm_get_sid()
/Zephyr-latest/samples/tfm_integration/psa_protected_storage/
Dsample.yaml3 name: PSA Protected Storage
5 tags: psa
20 - "PSA Protected Storage API Version [0-9]*.[0-9]*"

1234567