commit | ae02c09a584054e055d9b3225856661c5f9dfc39 | [log] [tgz] |
---|---|---|
author | Etienne Carriere <etienne.carriere@linaro.org> | Tue Jul 10 11:11:22 2018 +0200 |
committer | Jens Wiklander <jens.wiklander@linaro.org> | Tue Jul 10 11:52:56 2018 +0200 |
tree | afec85f01ed1b75ebc3bb27c6aa2bf01ca095eea | |
parent | 1c5d96fb2f6abab232bc06705fe557bc4f76964b [diff] |
Raw access to trusted application secure storage This change provides basics for creating, reading and deleting an object in a TA secure storage. The TA implementation shows how to use the GPD TEE Internal Core API for some basic data persistent object manipulations. A TA command allows to create an object in the TA secure storage. A TA command allows to read an object in the TA secure storage. A TA command allows to delete an object from the TA secure storage. This example does not cover all the possibilities of secure storage API provided to TAs: seeking into a object data stream, manipulating key material objects instead of raw data objects, etc. Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
This document describes the sample applications that are included in the OP-TEE, that aim to showcase specific functionality and use case.
For sake of simplicity, all OP-TEE example test application are prefixed with optee_example_
.
Directory hello_world/:
optee_example_hello_world
Directory random/:
TEE_GenerateRandom()
).optee_example_random
Directory aes/:
optee_example_aes
Directory secure_storage/:
optee_example_secure_storage
TA basics documentation presents the basics for implementing and building an OP-TEE trusted application.
One can also refer to the examples provided: source files and make scripts.