Build: Align manifest service

Align manifest service to PSA FF 1.0.0:
- Remove "signal" from service region.
- Change signal macro names postfix from "_SIG" to "_SIGNAL".

Change-Id: Ib405f5cc8ec9b4a04e294a19957c4b425f6ccb65
Signed-off-by: Edison Ai <edison.ai@arm.com>
diff --git a/secure_fw/services/crypto/crypto_init.c b/secure_fw/services/crypto/crypto_init.c
index de28a4a..bdb99e4 100644
--- a/secure_fw/services/crypto/crypto_init.c
+++ b/secure_fw/services/crypto/crypto_init.c
@@ -214,9 +214,9 @@
 
     while (1) {
         signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
-        if (signals & TFM_CRYPTO_SIG) {
+        if (signals & TFM_CRYPTO_SIGNAL) {
             /* Extract the message */
-            if (psa_get(TFM_CRYPTO_SIG, &msg) != PSA_SUCCESS) {
+            if (psa_get(TFM_CRYPTO_SIGNAL, &msg) != PSA_SUCCESS) {
                 /* FIXME: Should be replaced by TF-M error handling */
                 while (1) {
                     ;
diff --git a/secure_fw/services/crypto/psa_manifest/tfm_crypto.h b/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
index 3047087..87b44a1 100644
--- a/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
+++ b/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
@@ -14,7 +14,7 @@
 extern "C" {
 #endif
 
-#define TFM_CRYPTO_SIG                                          (1U << ( 0 + 4))
+#define TFM_CRYPTO_SIGNAL                                       (1U << (0 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/secure_fw/services/crypto/tfm_crypto.yaml b/secure_fw/services/crypto/tfm_crypto.yaml
index 1fa3afc..8d0a90e 100644
--- a/secure_fw/services/crypto/tfm_crypto.yaml
+++ b/secure_fw/services/crypto/tfm_crypto.yaml
@@ -334,7 +334,6 @@
     {
       "name": "TFM_CRYPTO",
       "sid": "0x00000080",
-      "signal": "TFM_CRYPTO_SIG",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
diff --git a/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h b/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
index 6cf3e1e..5433654 100644
--- a/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
+++ b/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
@@ -14,8 +14,8 @@
 extern "C" {
 #endif
 
-#define PSA_ATTEST_GET_TOKEN_SIG                                (1U << ( 0 + 4))
-#define PSA_ATTEST_GET_TOKEN_SIZE_SIG                           (1U << ( 1 + 4))
+#define TFM_ATTEST_GET_TOKEN_SIGNAL                             (1U << (0 + 4))
+#define TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL                        (1U << (1 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c b/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
index 8036fcf..46bafc6 100644
--- a/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
+++ b/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
@@ -145,11 +145,11 @@
 
     while (1) {
         signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
-        if (signals & PSA_ATTEST_GET_TOKEN_SIG) {
-            attest_signal_handle(PSA_ATTEST_GET_TOKEN_SIG,
+        if (signals & TFM_ATTEST_GET_TOKEN_SIGNAL) {
+            attest_signal_handle(TFM_ATTEST_GET_TOKEN_SIGNAL,
                                  psa_attest_get_token);
-        } else if (signals & PSA_ATTEST_GET_TOKEN_SIZE_SIG) {
-            attest_signal_handle(PSA_ATTEST_GET_TOKEN_SIZE_SIG,
+        } else if (signals & TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL) {
+            attest_signal_handle(TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL,
                                  psa_attest_get_token_size);
         } else {
             tfm_abort();
diff --git a/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml b/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
index c5d0cd2..93b9d3e 100644
--- a/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
+++ b/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
@@ -40,7 +40,6 @@
     {
       "name": "TFM_ATTEST_GET_TOKEN",
       "sid": "0x00000020",
-      "signal": "PSA_ATTEST_GET_TOKEN_SIG",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -48,7 +47,6 @@
     {
       "name": "TFM_ATTEST_GET_TOKEN_SIZE",
       "sid": "0x00000021",
-      "signal": "PSA_ATTEST_GET_TOKEN_SIZE_SIG",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
diff --git a/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h b/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
index cd798c3..fc8f5d6 100644
--- a/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
+++ b/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
@@ -14,10 +14,10 @@
 extern "C" {
 #endif
 
-#define TFM_ITS_SET_SIG                                         (1U << ( 0 + 4))
-#define TFM_ITS_GET_SIG                                         (1U << ( 1 + 4))
-#define TFM_ITS_GET_INFO_SIG                                    (1U << ( 2 + 4))
-#define TFM_ITS_REMOVE_SIG                                      (1U << ( 3 + 4))
+#define TFM_ITS_SET_SIGNAL                                      (1U << (0 + 4))
+#define TFM_ITS_GET_SIGNAL                                      (1U << (1 + 4))
+#define TFM_ITS_GET_INFO_SIGNAL                                 (1U << (2 + 4))
+#define TFM_ITS_REMOVE_SIGNAL                                   (1U << (3 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml b/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
index 64937f2..2ab3091 100644
--- a/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
+++ b/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
@@ -46,7 +46,6 @@
   "services" : [{
     "name": "TFM_ITS_SET",
     "sid": "0x00000070",
-    "signal": "TFM_ITS_SET_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -54,7 +53,6 @@
    {
     "name": "TFM_ITS_GET",
     "sid": "0x00000071",
-    "signal": "TFM_ITS_GET_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -62,7 +60,6 @@
    {
     "name": "TFM_ITS_GET_INFO",
     "sid": "0x00000072",
-    "signal": "TFM_ITS_GET_INFO_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -70,7 +67,6 @@
    {
     "name": "TFM_ITS_REMOVE",
     "sid": "0x00000073",
-    "signal": "TFM_ITS_REMOVE_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
diff --git a/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c b/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
index bdd755c..efd12c6 100644
--- a/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
+++ b/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
@@ -362,14 +362,14 @@
 
     while (1) {
         signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
-        if (signals & TFM_ITS_SET_SIG) {
-            its_signal_handle(TFM_ITS_SET_SIG, tfm_its_set_ipc);
-        } else if (signals & TFM_ITS_GET_SIG) {
-            its_signal_handle(TFM_ITS_GET_SIG, tfm_its_get_ipc);
-        } else if (signals & TFM_ITS_GET_INFO_SIG) {
-            its_signal_handle(TFM_ITS_GET_INFO_SIG, tfm_its_get_info_ipc);
-        } else if (signals & TFM_ITS_REMOVE_SIG) {
-            its_signal_handle(TFM_ITS_REMOVE_SIG, tfm_its_remove_ipc);
+        if (signals & TFM_ITS_SET_SIGNAL) {
+            its_signal_handle(TFM_ITS_SET_SIGNAL, tfm_its_set_ipc);
+        } else if (signals & TFM_ITS_GET_SIGNAL) {
+            its_signal_handle(TFM_ITS_GET_SIGNAL, tfm_its_get_ipc);
+        } else if (signals & TFM_ITS_GET_INFO_SIGNAL) {
+            its_signal_handle(TFM_ITS_GET_INFO_SIGNAL, tfm_its_get_info_ipc);
+        } else if (signals & TFM_ITS_REMOVE_SIGNAL) {
+            its_signal_handle(TFM_ITS_REMOVE_SIGNAL, tfm_its_remove_ipc);
         } else {
             tfm_abort();
         }
diff --git a/secure_fw/services/manifestfilename.template b/secure_fw/services/manifestfilename.template
index 7666b6e..0af69ef 100644
--- a/secure_fw/services/manifestfilename.template
+++ b/secure_fw/services/manifestfilename.template
@@ -18,11 +18,7 @@
     {% set ns = namespace(iterator_counter=0) %}
     {% if manifest.services %}
         {% for service in manifest.services %}
-            {% if service.signal %}
-#define {{"%-55s"|format(service.signal)}} (1U << ({{"%2d"|format(ns.iterator_counter)}} + 4))
-            {% else %}
-#define {{"%-55s"|format(service.name+'_SIGNAL')}} (1U << ({{"%2d"|format(ns.iterator_counter)}} + 4))
-            {% endif %}
+#define {{"%-55s"|format(service.name + "_SIGNAL")}} (1U << ({{"%d"|format(ns.iterator_counter)}} + 4))
             {% set ns.iterator_counter = ns.iterator_counter + 1 %}
         {% endfor %}
     {% endif %}
@@ -35,7 +31,7 @@
 
     {% set irq_ns = namespace(irq_iterator_counter=27) %}
     {% for irq in manifest.irqs %}
-#define {{"%-55s"|format(irq.signal)}} (1U << ({{"%2d"|format(irq_ns.irq_iterator_counter)}} + 4))
+#define {{"%-55s"|format(irq.signal)}} (1U << ({{"%d"|format(irq_ns.irq_iterator_counter)}} + 4))
         {% set irq_ns.irq_iterator_counter = irq_ns.irq_iterator_counter - 1 %}
     {% endfor %}
     {% if attr.tfm_partition_ipc %}
diff --git a/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h b/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
index b6ab3dd..5329ce2 100644
--- a/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
+++ b/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
@@ -14,11 +14,11 @@
 extern "C" {
 #endif
 
-#define TFM_SST_SET_SIG                                         (1U << ( 0 + 4))
-#define TFM_SST_GET_SIG                                         (1U << ( 1 + 4))
-#define TFM_SST_GET_INFO_SIG                                    (1U << ( 2 + 4))
-#define TFM_SST_REMOVE_SIG                                      (1U << ( 3 + 4))
-#define TFM_SST_GET_SUPPORT_SIG                                 (1U << ( 4 + 4))
+#define TFM_SST_SET_SIGNAL                                      (1U << (0 + 4))
+#define TFM_SST_GET_SIGNAL                                      (1U << (1 + 4))
+#define TFM_SST_GET_INFO_SIGNAL                                 (1U << (2 + 4))
+#define TFM_SST_REMOVE_SIGNAL                                   (1U << (3 + 4))
+#define TFM_SST_GET_SUPPORT_SIGNAL                              (1U << (4 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/secure_fw/services/secure_storage/tfm_secure_storage.yaml b/secure_fw/services/secure_storage/tfm_secure_storage.yaml
index 2d03998..74e46fa 100644
--- a/secure_fw/services/secure_storage/tfm_secure_storage.yaml
+++ b/secure_fw/services/secure_storage/tfm_secure_storage.yaml
@@ -53,7 +53,6 @@
   "services" : [{
     "name": "TFM_SST_SET",
     "sid": "0x00000060",
-    "signal": "TFM_SST_SET_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -61,7 +60,6 @@
    {
     "name": "TFM_SST_GET",
     "sid": "0x00000061",
-    "signal": "TFM_SST_GET_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -69,7 +67,6 @@
    {
     "name": "TFM_SST_GET_INFO",
     "sid": "0x00000062",
-    "signal": "TFM_SST_GET_INFO_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -77,7 +74,6 @@
    {
     "name": "TFM_SST_REMOVE",
     "sid": "0x00000063",
-    "signal": "TFM_SST_REMOVE_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -85,7 +81,6 @@
    {
     "name": "TFM_SST_GET_SUPPORT",
     "sid": "0x00000064",
-    "signal": "TFM_SST_GET_SUPPORT_SIG",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
diff --git a/secure_fw/services/secure_storage/tfm_sst_req_mngr.c b/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
index a185c31..15141d8 100644
--- a/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
+++ b/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
@@ -472,16 +472,17 @@
 
     while (1) {
         signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
-        if (signals & TFM_SST_SET_SIG) {
-            ps_signal_handle(TFM_SST_SET_SIG, tfm_sst_set_ipc);
-        } else if (signals & TFM_SST_GET_SIG) {
-            ps_signal_handle(TFM_SST_GET_SIG, tfm_sst_get_ipc);
-        } else if (signals & TFM_SST_GET_INFO_SIG) {
-            ps_signal_handle(TFM_SST_GET_INFO_SIG, tfm_sst_get_info_ipc);
-        } else if (signals & TFM_SST_REMOVE_SIG) {
-            ps_signal_handle(TFM_SST_REMOVE_SIG, tfm_sst_remove_ipc);
-        } else if (signals & TFM_SST_GET_SUPPORT_SIG) {
-            ps_signal_handle(TFM_SST_GET_SUPPORT_SIG, tfm_sst_get_support_ipc);
+        if (signals & TFM_SST_SET_SIGNAL) {
+            ps_signal_handle(TFM_SST_SET_SIGNAL, tfm_sst_set_ipc);
+        } else if (signals & TFM_SST_GET_SIGNAL) {
+            ps_signal_handle(TFM_SST_GET_SIGNAL, tfm_sst_get_ipc);
+        } else if (signals & TFM_SST_GET_INFO_SIGNAL) {
+            ps_signal_handle(TFM_SST_GET_INFO_SIGNAL, tfm_sst_get_info_ipc);
+        } else if (signals & TFM_SST_REMOVE_SIGNAL) {
+            ps_signal_handle(TFM_SST_REMOVE_SIGNAL, tfm_sst_remove_ipc);
+        } else if (signals & TFM_SST_GET_SUPPORT_SIGNAL) {
+            ps_signal_handle(TFM_SST_GET_SUPPORT_SIGNAL,
+                             tfm_sst_get_support_ipc);
         } else {
             tfm_abort();
         }
diff --git a/secure_fw/services/tfm_service_list.inc b/secure_fw/services/tfm_service_list.inc
index 964643d..afbb59c 100644
--- a/secure_fw/services/tfm_service_list.inc
+++ b/secure_fw/services/tfm_service_list.inc
@@ -29,7 +29,7 @@
     {
         .name = "TFM_SST_SET",
         .partition_id = TFM_SP_STORAGE,
-        .signal = TFM_SST_SET_SIG,
+        .signal = TFM_SST_SET_SIGNAL,
         .sid = 0x00000060,
         .non_secure_client = true,
         .version = 1,
@@ -38,7 +38,7 @@
     {
         .name = "TFM_SST_GET",
         .partition_id = TFM_SP_STORAGE,
-        .signal = TFM_SST_GET_SIG,
+        .signal = TFM_SST_GET_SIGNAL,
         .sid = 0x00000061,
         .non_secure_client = true,
         .version = 1,
@@ -47,7 +47,7 @@
     {
         .name = "TFM_SST_GET_INFO",
         .partition_id = TFM_SP_STORAGE,
-        .signal = TFM_SST_GET_INFO_SIG,
+        .signal = TFM_SST_GET_INFO_SIGNAL,
         .sid = 0x00000062,
         .non_secure_client = true,
         .version = 1,
@@ -56,7 +56,7 @@
     {
         .name = "TFM_SST_REMOVE",
         .partition_id = TFM_SP_STORAGE,
-        .signal = TFM_SST_REMOVE_SIG,
+        .signal = TFM_SST_REMOVE_SIGNAL,
         .sid = 0x00000063,
         .non_secure_client = true,
         .version = 1,
@@ -65,7 +65,7 @@
     {
         .name = "TFM_SST_GET_SUPPORT",
         .partition_id = TFM_SP_STORAGE,
-        .signal = TFM_SST_GET_SUPPORT_SIG,
+        .signal = TFM_SST_GET_SUPPORT_SIGNAL,
         .sid = 0x00000064,
         .non_secure_client = true,
         .version = 1,
@@ -76,7 +76,7 @@
     {
         .name = "TFM_ITS_SET",
         .partition_id = TFM_SP_ITS,
-        .signal = TFM_ITS_SET_SIG,
+        .signal = TFM_ITS_SET_SIGNAL,
         .sid = 0x00000070,
         .non_secure_client = true,
         .version = 1,
@@ -85,7 +85,7 @@
     {
         .name = "TFM_ITS_GET",
         .partition_id = TFM_SP_ITS,
-        .signal = TFM_ITS_GET_SIG,
+        .signal = TFM_ITS_GET_SIGNAL,
         .sid = 0x00000071,
         .non_secure_client = true,
         .version = 1,
@@ -94,7 +94,7 @@
     {
         .name = "TFM_ITS_GET_INFO",
         .partition_id = TFM_SP_ITS,
-        .signal = TFM_ITS_GET_INFO_SIG,
+        .signal = TFM_ITS_GET_INFO_SIGNAL,
         .sid = 0x00000072,
         .non_secure_client = true,
         .version = 1,
@@ -103,7 +103,7 @@
     {
         .name = "TFM_ITS_REMOVE",
         .partition_id = TFM_SP_ITS,
-        .signal = TFM_ITS_REMOVE_SIG,
+        .signal = TFM_ITS_REMOVE_SIGNAL,
         .sid = 0x00000073,
         .non_secure_client = true,
         .version = 1,
@@ -114,7 +114,7 @@
     {
         .name = "TFM_CRYPTO",
         .partition_id = TFM_SP_CRYPTO,
-        .signal = TFM_CRYPTO_SIG,
+        .signal = TFM_CRYPTO_SIGNAL,
         .sid = 0x00000080,
         .non_secure_client = true,
         .version = 1,
@@ -125,7 +125,7 @@
     {
         .name = "TFM_ATTEST_GET_TOKEN",
         .partition_id = TFM_SP_INITIAL_ATTESTATION,
-        .signal = PSA_ATTEST_GET_TOKEN_SIG,
+        .signal = TFM_ATTEST_GET_TOKEN_SIGNAL,
         .sid = 0x00000020,
         .non_secure_client = true,
         .version = 1,
@@ -134,7 +134,7 @@
     {
         .name = "TFM_ATTEST_GET_TOKEN_SIZE",
         .partition_id = TFM_SP_INITIAL_ATTESTATION,
-        .signal = PSA_ATTEST_GET_TOKEN_SIZE_SIG,
+        .signal = TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL,
         .sid = 0x00000021,
         .non_secure_client = true,
         .version = 1,
@@ -316,7 +316,7 @@
     {
         .name = "TFM_SECURE_CLIENT_SFN_RUN_TESTS",
         .partition_id = TFM_SP_SECURE_TEST_PARTITION,
-        .signal = TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG,
+        .signal = TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL,
         .sid = 0x0000F000,
         .non_secure_client = true,
         .version = 1,
diff --git a/secure_fw/services/tfm_service_list.inc.template b/secure_fw/services/tfm_service_list.inc.template
index 256e3bb..2be5370 100644
--- a/secure_fw/services/tfm_service_list.inc.template
+++ b/secure_fw/services/tfm_service_list.inc.template
@@ -27,11 +27,7 @@
     {{'{'}}
         .name = "{{service.name}}",
         .partition_id = {{manifest.manifest.name}},
-            {% if service.signal %}
-        .signal = {{service.signal}},
-            {% else %}
         .signal = {{service.name}}_SIGNAL,
-            {% endif %}
         .sid = {{service.sid}},
             {% if service.non_secure_clients is sameas true %}
         .non_secure_client = true,
diff --git a/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h b/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
index bdf26dd..346d0b7 100644
--- a/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
+++ b/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
@@ -14,16 +14,16 @@
 extern "C" {
 #endif
 
-#define SPM_CORE_TEST_INIT_SUCCESS_SIGNAL                       (1U << ( 0 + 4))
-#define SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL                   (1U << ( 1 + 4))
-#define SPM_CORE_TEST_MPU_ACCESS_SIGNAL                         (1U << ( 2 + 4))
-#define SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL                 (1U << ( 3 + 4))
-#define SPM_CORE_TEST_SS_TO_SS_SIGNAL                           (1U << ( 4 + 4))
-#define SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL                    (1U << ( 5 + 4))
-#define SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL                       (1U << ( 6 + 4))
-#define SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL                  (1U << ( 7 + 4))
-#define SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL               (1U << ( 8 + 4))
-#define SPM_CORE_TEST_SPM_REQUEST_SIGNAL                        (1U << ( 9 + 4))
+#define SPM_CORE_TEST_INIT_SUCCESS_SIGNAL                       (1U << (0 + 4))
+#define SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL                   (1U << (1 + 4))
+#define SPM_CORE_TEST_MPU_ACCESS_SIGNAL                         (1U << (2 + 4))
+#define SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL                 (1U << (3 + 4))
+#define SPM_CORE_TEST_SS_TO_SS_SIGNAL                           (1U << (4 + 4))
+#define SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL                    (1U << (5 + 4))
+#define SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL                       (1U << (6 + 4))
+#define SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL                  (1U << (7 + 4))
+#define SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL               (1U << (8 + 4))
+#define SPM_CORE_TEST_SPM_REQUEST_SIGNAL                        (1U << (9 + 4))
 #define SPM_CORE_TEST_BLOCK_SIGNAL                              (1U << (10 + 4))
 #define SPM_CORE_TEST_NS_THREAD_SIGNAL                          (1U << (11 + 4))
 
diff --git a/test/test_services/tfm_core_test/tfm_test_core.yaml b/test/test_services/tfm_core_test/tfm_test_core.yaml
index d038986..b198a63 100644
--- a/test/test_services/tfm_core_test/tfm_test_core.yaml
+++ b/test/test_services/tfm_core_test/tfm_test_core.yaml
@@ -51,7 +51,6 @@
     {
       "name": "SPM_CORE_TEST_INIT_SUCCESS",
       "sid": "0x0000F020",
-      "signal": "SPM_CORE_TEST_INIT_SUCCESS_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -59,7 +58,6 @@
     {
       "name": "SPM_CORE_TEST_DIRECT_RECURSION",
       "sid": "0x0000F021",
-      "signal": "SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -67,7 +65,6 @@
     {
       "name": "SPM_CORE_TEST_MPU_ACCESS",
       "sid": "0x0000F022",
-      "signal": "SPM_CORE_TEST_MPU_ACCESS_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -75,7 +72,6 @@
     {
       "name": "SPM_CORE_TEST_MEMORY_PERMISSIONS",
       "sid": "0x0000F023",
-      "signal": "SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -83,7 +79,6 @@
     {
       "name": "SPM_CORE_TEST_SS_TO_SS",
       "sid": "0x0000F024",
-      "signal": "SPM_CORE_TEST_SS_TO_SS_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -91,7 +86,6 @@
     {
       "name": "SPM_CORE_TEST_SS_TO_SS_BUFFER",
       "sid": "0x0000F025",
-      "signal": "SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -99,7 +93,6 @@
     {
       "name": "SPM_CORE_TEST_OUTVEC_WRITE",
       "sid": "0x0000F026",
-      "signal": "SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -107,7 +100,6 @@
     {
       "name": "SPM_CORE_TEST_PERIPHERAL_ACCESS",
       "sid": "0x0000F027",
-      "signal": "SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -115,7 +107,6 @@
     {
       "name": "SPM_CORE_TEST_GET_CALLER_CLIENT_ID",
       "sid": "0x0000F028",
-      "signal": "SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -123,7 +114,6 @@
     {
       "name": "SPM_CORE_TEST_SPM_REQUEST",
       "sid": "0x0000F029",
-      "signal": "SPM_CORE_TEST_SPM_REQUEST_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -131,7 +121,6 @@
     {
       "name": "SPM_CORE_TEST_BLOCK",
       "sid": "0x0000F02A",
-      "signal": "SPM_CORE_TEST_BLOCK_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -139,7 +128,6 @@
     {
       "name": "SPM_CORE_TEST_NS_THREAD",
       "sid": "0x0000F02B",
-      "signal": "SPM_CORE_TEST_NS_THREAD_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
diff --git a/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h b/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
index 53e9ed1..506120a 100644
--- a/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
+++ b/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
@@ -14,12 +14,12 @@
 extern "C" {
 #endif
 
-#define SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL                    (1U << ( 0 + 4))
-#define SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL           (1U << ( 1 + 4))
-#define SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL            (1U << ( 2 + 4))
-#define SPM_CORE_TEST_2_INVERT_SIGNAL                           (1U << ( 3 + 4))
-#define SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL            (1U << ( 4 + 4))
-#define SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL            (1U << ( 5 + 4))
+#define SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL                    (1U << (0 + 4))
+#define SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL           (1U << (1 + 4))
+#define SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL            (1U << (2 + 4))
+#define SPM_CORE_TEST_2_INVERT_SIGNAL                           (1U << (3 + 4))
+#define SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL            (1U << (4 + 4))
+#define SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL            (1U << (5 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml b/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
index 1b828ee..4e8fd28 100644
--- a/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
+++ b/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
@@ -66,7 +66,6 @@
     {
       "name": "SPM_CORE_TEST_2_SLAVE_SERVICE",
       "sid": "0x0000F040",
-      "signal": "SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -74,7 +73,6 @@
     {
       "name": "SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID",
       "sid": "0x0000F041",
-      "signal": "SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -82,7 +80,6 @@
     {
       "name": "SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE",
       "sid": "0x0000F042",
-      "signal": "SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -90,7 +87,6 @@
     {
       "name": "SPM_CORE_TEST_2_INVERT",
       "sid": "0x0000F043",
-      "signal": "SPM_CORE_TEST_2_INVERT_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -98,7 +94,6 @@
     {
     "name": "SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO",
     "sid": "0x0000F044",
-    "signal": "SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
@@ -106,7 +101,6 @@
     {
     "name": "SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO",
     "sid": "0x0000F045",
-    "signal": "SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL",
     "non_secure_clients": true,
     "version": 1,
     "version_policy": "STRICT"
diff --git a/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h b/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
index 8dfde0f..7814ef4 100644
--- a/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
+++ b/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
@@ -14,11 +14,11 @@
 extern "C" {
 #endif
 
-#define IPC_CLIENT_TEST_BASIC_SIGNAL                            (1U << ( 0 + 4))
-#define IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL               (1U << ( 1 + 4))
-#define IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL     (1U << ( 2 + 4))
-#define IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL               (1U << ( 3 + 4))
-#define IPC_CLIENT_TEST_MEM_CHECK_SIGNAL                        (1U << ( 4 + 4))
+#define IPC_CLIENT_TEST_BASIC_SIGNAL                            (1U << (0 + 4))
+#define IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL               (1U << (1 + 4))
+#define IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL     (1U << (2 + 4))
+#define IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL               (1U << (3 + 4))
+#define IPC_CLIENT_TEST_MEM_CHECK_SIGNAL                        (1U << (4 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml b/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
index 6dc714d..9160721 100644
--- a/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
+++ b/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
@@ -19,7 +19,6 @@
     {
       "name": "IPC_CLIENT_TEST_BASIC",
       "sid": "0x0000F060",
-      "signal": "IPC_CLIENT_TEST_BASIC_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -27,7 +26,6 @@
     {
       "name": "IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM",
       "sid": "0x0000F061",
-      "signal": "IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -35,7 +33,6 @@
     {
       "name": "IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM",
       "sid": "0x0000F062",
-      "signal": "IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -43,7 +40,6 @@
     {
       "name": "IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM",
       "sid": "0x0000F063",
-      "signal": "IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -51,7 +47,6 @@
     {
       "name": "IPC_CLIENT_TEST_MEM_CHECK",
       "sid": "0x0000F064",
-      "signal": "IPC_CLIENT_TEST_MEM_CHECK_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
diff --git a/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h b/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
index c12411f..7641c0e 100644
--- a/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
+++ b/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
@@ -14,10 +14,10 @@
 extern "C" {
 #endif
 
-#define IPC_SERVICE_TEST_BASIC_SIGNAL                           (1U << ( 0 + 4))
-#define IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL              (1U << ( 1 + 4))
-#define IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL    (1U << ( 2 + 4))
-#define IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL              (1U << ( 3 + 4))
+#define IPC_SERVICE_TEST_BASIC_SIGNAL                           (1U << (0 + 4))
+#define IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL              (1U << (1 + 4))
+#define IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL    (1U << (2 + 4))
+#define IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL              (1U << (3 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml b/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
index d237f79..d4b23df 100644
--- a/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
+++ b/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
@@ -19,7 +19,6 @@
     {
       "name": "IPC_SERVICE_TEST_BASIC",
       "sid": "0x0000F080",
-      "signal": "IPC_SERVICE_TEST_BASIC_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -27,7 +26,6 @@
     {
       "name": "IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM",
       "sid": "0x0000F081",
-      "signal": "IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -35,7 +33,6 @@
     {
       "name": "IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM",
       "sid": "0x0000F082",
-      "signal": "IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
@@ -43,7 +40,6 @@
     {
       "name": "IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM",
       "sid": "0x0000F083",
-      "signal": "IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"
diff --git a/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h b/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
index 650d97f..658cf95 100644
--- a/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
+++ b/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
@@ -14,8 +14,8 @@
 extern "C" {
 #endif
 
-#define SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL        (1U << ( 0 + 4))
-#define SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL        (1U << ( 1 + 4))
+#define SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL        (1U << (0 + 4))
+#define SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL        (1U << (1 + 4))
 
 #define SPM_CORE_IRQ_TEST_1_SIGNAL_TIMER_0_IRQ                  (1U << (27 + 4))
 
diff --git a/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml b/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
index d65ba4b..fedc1ce 100644
--- a/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
+++ b/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
@@ -50,20 +50,18 @@
   },
   "services": [
     {
-    "name": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO",
-    "sid": "0x0000F0A0",
-    "signal": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL",
-    "non_secure_clients": true,
-    "version": 1,
-    "version_policy": "STRICT"
+      "name": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO",
+      "sid": "0x0000F0A0",
+      "non_secure_clients": true,
+      "version": 1,
+      "version_policy": "STRICT"
     },
     {
-    "name": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO",
-    "sid": "0x0000F0A1",
-    "signal": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL",
-    "non_secure_clients": true,
-    "version": 1,
-    "version_policy": "STRICT"
+      "name": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO",
+      "sid": "0x0000F0A1",
+      "non_secure_clients": true,
+      "version": 1,
+      "version_policy": "STRICT"
     },
   ]
 }
diff --git a/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h b/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
index a7f18fc..fd25397 100644
--- a/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
+++ b/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
@@ -14,7 +14,7 @@
 extern "C" {
 #endif
 
-#define TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG                     (1U << ( 0 + 4))
+#define TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL                  (1U << (0 + 4))
 
 #ifdef __cplusplus
 }
diff --git a/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c b/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
index 32eedf3..fc69c60 100644
--- a/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
+++ b/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
@@ -25,8 +25,8 @@
     psa_msg_t msg;
 
     while (1) {
-        psa_wait(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG, PSA_BLOCK);
-        psa_get(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG, &msg);
+        psa_wait(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL, PSA_BLOCK);
+        psa_get(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL, &msg);
         switch (msg.type) {
         case PSA_IPC_CONNECT:
             psa_reply(msg.handle, PSA_SUCCESS);
diff --git a/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml b/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
index 2aab01e..80159bd 100644
--- a/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
+++ b/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
@@ -32,7 +32,6 @@
     {
       "name": "TFM_SECURE_CLIENT_SFN_RUN_TESTS",
       "sid": "0x0000F000",
-      "signal": "TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG",
       "non_secure_clients": true,
       "version": 1,
       "version_policy": "STRICT"