Build: Align manifest service
Align manifest service to PSA FF 1.0.0:
- Remove "signal" from service region.
- Change signal macro names postfix from "_SIG" to "_SIGNAL".
Change-Id: Ib405f5cc8ec9b4a04e294a19957c4b425f6ccb65
Signed-off-by: Edison Ai <edison.ai@arm.com>
diff --git a/secure_fw/services/crypto/crypto_init.c b/secure_fw/services/crypto/crypto_init.c
index de28a4a..bdb99e4 100644
--- a/secure_fw/services/crypto/crypto_init.c
+++ b/secure_fw/services/crypto/crypto_init.c
@@ -214,9 +214,9 @@
while (1) {
signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
- if (signals & TFM_CRYPTO_SIG) {
+ if (signals & TFM_CRYPTO_SIGNAL) {
/* Extract the message */
- if (psa_get(TFM_CRYPTO_SIG, &msg) != PSA_SUCCESS) {
+ if (psa_get(TFM_CRYPTO_SIGNAL, &msg) != PSA_SUCCESS) {
/* FIXME: Should be replaced by TF-M error handling */
while (1) {
;
diff --git a/secure_fw/services/crypto/psa_manifest/tfm_crypto.h b/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
index 3047087..87b44a1 100644
--- a/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
+++ b/secure_fw/services/crypto/psa_manifest/tfm_crypto.h
@@ -14,7 +14,7 @@
extern "C" {
#endif
-#define TFM_CRYPTO_SIG (1U << ( 0 + 4))
+#define TFM_CRYPTO_SIGNAL (1U << (0 + 4))
#ifdef __cplusplus
}
diff --git a/secure_fw/services/crypto/tfm_crypto.yaml b/secure_fw/services/crypto/tfm_crypto.yaml
index 1fa3afc..8d0a90e 100644
--- a/secure_fw/services/crypto/tfm_crypto.yaml
+++ b/secure_fw/services/crypto/tfm_crypto.yaml
@@ -334,7 +334,6 @@
{
"name": "TFM_CRYPTO",
"sid": "0x00000080",
- "signal": "TFM_CRYPTO_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h b/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
index 6cf3e1e..5433654 100644
--- a/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
+++ b/secure_fw/services/initial_attestation/psa_manifest/tfm_initial_attestation.h
@@ -14,8 +14,8 @@
extern "C" {
#endif
-#define PSA_ATTEST_GET_TOKEN_SIG (1U << ( 0 + 4))
-#define PSA_ATTEST_GET_TOKEN_SIZE_SIG (1U << ( 1 + 4))
+#define TFM_ATTEST_GET_TOKEN_SIGNAL (1U << (0 + 4))
+#define TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL (1U << (1 + 4))
#ifdef __cplusplus
}
diff --git a/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c b/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
index 8036fcf..46bafc6 100644
--- a/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
+++ b/secure_fw/services/initial_attestation/tfm_attestation_req_mngr.c
@@ -145,11 +145,11 @@
while (1) {
signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
- if (signals & PSA_ATTEST_GET_TOKEN_SIG) {
- attest_signal_handle(PSA_ATTEST_GET_TOKEN_SIG,
+ if (signals & TFM_ATTEST_GET_TOKEN_SIGNAL) {
+ attest_signal_handle(TFM_ATTEST_GET_TOKEN_SIGNAL,
psa_attest_get_token);
- } else if (signals & PSA_ATTEST_GET_TOKEN_SIZE_SIG) {
- attest_signal_handle(PSA_ATTEST_GET_TOKEN_SIZE_SIG,
+ } else if (signals & TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL) {
+ attest_signal_handle(TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL,
psa_attest_get_token_size);
} else {
tfm_abort();
diff --git a/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml b/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
index c5d0cd2..93b9d3e 100644
--- a/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
+++ b/secure_fw/services/initial_attestation/tfm_initial_attestation.yaml
@@ -40,7 +40,6 @@
{
"name": "TFM_ATTEST_GET_TOKEN",
"sid": "0x00000020",
- "signal": "PSA_ATTEST_GET_TOKEN_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -48,7 +47,6 @@
{
"name": "TFM_ATTEST_GET_TOKEN_SIZE",
"sid": "0x00000021",
- "signal": "PSA_ATTEST_GET_TOKEN_SIZE_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h b/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
index cd798c3..fc8f5d6 100644
--- a/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
+++ b/secure_fw/services/internal_trusted_storage/psa_manifest/tfm_internal_trusted_storage.h
@@ -14,10 +14,10 @@
extern "C" {
#endif
-#define TFM_ITS_SET_SIG (1U << ( 0 + 4))
-#define TFM_ITS_GET_SIG (1U << ( 1 + 4))
-#define TFM_ITS_GET_INFO_SIG (1U << ( 2 + 4))
-#define TFM_ITS_REMOVE_SIG (1U << ( 3 + 4))
+#define TFM_ITS_SET_SIGNAL (1U << (0 + 4))
+#define TFM_ITS_GET_SIGNAL (1U << (1 + 4))
+#define TFM_ITS_GET_INFO_SIGNAL (1U << (2 + 4))
+#define TFM_ITS_REMOVE_SIGNAL (1U << (3 + 4))
#ifdef __cplusplus
}
diff --git a/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml b/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
index 64937f2..2ab3091 100644
--- a/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
+++ b/secure_fw/services/internal_trusted_storage/tfm_internal_trusted_storage.yaml
@@ -46,7 +46,6 @@
"services" : [{
"name": "TFM_ITS_SET",
"sid": "0x00000070",
- "signal": "TFM_ITS_SET_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -54,7 +53,6 @@
{
"name": "TFM_ITS_GET",
"sid": "0x00000071",
- "signal": "TFM_ITS_GET_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -62,7 +60,6 @@
{
"name": "TFM_ITS_GET_INFO",
"sid": "0x00000072",
- "signal": "TFM_ITS_GET_INFO_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -70,7 +67,6 @@
{
"name": "TFM_ITS_REMOVE",
"sid": "0x00000073",
- "signal": "TFM_ITS_REMOVE_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c b/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
index bdd755c..efd12c6 100644
--- a/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
+++ b/secure_fw/services/internal_trusted_storage/tfm_its_req_mngr.c
@@ -362,14 +362,14 @@
while (1) {
signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
- if (signals & TFM_ITS_SET_SIG) {
- its_signal_handle(TFM_ITS_SET_SIG, tfm_its_set_ipc);
- } else if (signals & TFM_ITS_GET_SIG) {
- its_signal_handle(TFM_ITS_GET_SIG, tfm_its_get_ipc);
- } else if (signals & TFM_ITS_GET_INFO_SIG) {
- its_signal_handle(TFM_ITS_GET_INFO_SIG, tfm_its_get_info_ipc);
- } else if (signals & TFM_ITS_REMOVE_SIG) {
- its_signal_handle(TFM_ITS_REMOVE_SIG, tfm_its_remove_ipc);
+ if (signals & TFM_ITS_SET_SIGNAL) {
+ its_signal_handle(TFM_ITS_SET_SIGNAL, tfm_its_set_ipc);
+ } else if (signals & TFM_ITS_GET_SIGNAL) {
+ its_signal_handle(TFM_ITS_GET_SIGNAL, tfm_its_get_ipc);
+ } else if (signals & TFM_ITS_GET_INFO_SIGNAL) {
+ its_signal_handle(TFM_ITS_GET_INFO_SIGNAL, tfm_its_get_info_ipc);
+ } else if (signals & TFM_ITS_REMOVE_SIGNAL) {
+ its_signal_handle(TFM_ITS_REMOVE_SIGNAL, tfm_its_remove_ipc);
} else {
tfm_abort();
}
diff --git a/secure_fw/services/manifestfilename.template b/secure_fw/services/manifestfilename.template
index 7666b6e..0af69ef 100644
--- a/secure_fw/services/manifestfilename.template
+++ b/secure_fw/services/manifestfilename.template
@@ -18,11 +18,7 @@
{% set ns = namespace(iterator_counter=0) %}
{% if manifest.services %}
{% for service in manifest.services %}
- {% if service.signal %}
-#define {{"%-55s"|format(service.signal)}} (1U << ({{"%2d"|format(ns.iterator_counter)}} + 4))
- {% else %}
-#define {{"%-55s"|format(service.name+'_SIGNAL')}} (1U << ({{"%2d"|format(ns.iterator_counter)}} + 4))
- {% endif %}
+#define {{"%-55s"|format(service.name + "_SIGNAL")}} (1U << ({{"%d"|format(ns.iterator_counter)}} + 4))
{% set ns.iterator_counter = ns.iterator_counter + 1 %}
{% endfor %}
{% endif %}
@@ -35,7 +31,7 @@
{% set irq_ns = namespace(irq_iterator_counter=27) %}
{% for irq in manifest.irqs %}
-#define {{"%-55s"|format(irq.signal)}} (1U << ({{"%2d"|format(irq_ns.irq_iterator_counter)}} + 4))
+#define {{"%-55s"|format(irq.signal)}} (1U << ({{"%d"|format(irq_ns.irq_iterator_counter)}} + 4))
{% set irq_ns.irq_iterator_counter = irq_ns.irq_iterator_counter - 1 %}
{% endfor %}
{% if attr.tfm_partition_ipc %}
diff --git a/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h b/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
index b6ab3dd..5329ce2 100644
--- a/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
+++ b/secure_fw/services/secure_storage/psa_manifest/tfm_secure_storage.h
@@ -14,11 +14,11 @@
extern "C" {
#endif
-#define TFM_SST_SET_SIG (1U << ( 0 + 4))
-#define TFM_SST_GET_SIG (1U << ( 1 + 4))
-#define TFM_SST_GET_INFO_SIG (1U << ( 2 + 4))
-#define TFM_SST_REMOVE_SIG (1U << ( 3 + 4))
-#define TFM_SST_GET_SUPPORT_SIG (1U << ( 4 + 4))
+#define TFM_SST_SET_SIGNAL (1U << (0 + 4))
+#define TFM_SST_GET_SIGNAL (1U << (1 + 4))
+#define TFM_SST_GET_INFO_SIGNAL (1U << (2 + 4))
+#define TFM_SST_REMOVE_SIGNAL (1U << (3 + 4))
+#define TFM_SST_GET_SUPPORT_SIGNAL (1U << (4 + 4))
#ifdef __cplusplus
}
diff --git a/secure_fw/services/secure_storage/tfm_secure_storage.yaml b/secure_fw/services/secure_storage/tfm_secure_storage.yaml
index 2d03998..74e46fa 100644
--- a/secure_fw/services/secure_storage/tfm_secure_storage.yaml
+++ b/secure_fw/services/secure_storage/tfm_secure_storage.yaml
@@ -53,7 +53,6 @@
"services" : [{
"name": "TFM_SST_SET",
"sid": "0x00000060",
- "signal": "TFM_SST_SET_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -61,7 +60,6 @@
{
"name": "TFM_SST_GET",
"sid": "0x00000061",
- "signal": "TFM_SST_GET_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -69,7 +67,6 @@
{
"name": "TFM_SST_GET_INFO",
"sid": "0x00000062",
- "signal": "TFM_SST_GET_INFO_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -77,7 +74,6 @@
{
"name": "TFM_SST_REMOVE",
"sid": "0x00000063",
- "signal": "TFM_SST_REMOVE_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -85,7 +81,6 @@
{
"name": "TFM_SST_GET_SUPPORT",
"sid": "0x00000064",
- "signal": "TFM_SST_GET_SUPPORT_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/secure_fw/services/secure_storage/tfm_sst_req_mngr.c b/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
index a185c31..15141d8 100644
--- a/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
+++ b/secure_fw/services/secure_storage/tfm_sst_req_mngr.c
@@ -472,16 +472,17 @@
while (1) {
signals = psa_wait(PSA_WAIT_ANY, PSA_BLOCK);
- if (signals & TFM_SST_SET_SIG) {
- ps_signal_handle(TFM_SST_SET_SIG, tfm_sst_set_ipc);
- } else if (signals & TFM_SST_GET_SIG) {
- ps_signal_handle(TFM_SST_GET_SIG, tfm_sst_get_ipc);
- } else if (signals & TFM_SST_GET_INFO_SIG) {
- ps_signal_handle(TFM_SST_GET_INFO_SIG, tfm_sst_get_info_ipc);
- } else if (signals & TFM_SST_REMOVE_SIG) {
- ps_signal_handle(TFM_SST_REMOVE_SIG, tfm_sst_remove_ipc);
- } else if (signals & TFM_SST_GET_SUPPORT_SIG) {
- ps_signal_handle(TFM_SST_GET_SUPPORT_SIG, tfm_sst_get_support_ipc);
+ if (signals & TFM_SST_SET_SIGNAL) {
+ ps_signal_handle(TFM_SST_SET_SIGNAL, tfm_sst_set_ipc);
+ } else if (signals & TFM_SST_GET_SIGNAL) {
+ ps_signal_handle(TFM_SST_GET_SIGNAL, tfm_sst_get_ipc);
+ } else if (signals & TFM_SST_GET_INFO_SIGNAL) {
+ ps_signal_handle(TFM_SST_GET_INFO_SIGNAL, tfm_sst_get_info_ipc);
+ } else if (signals & TFM_SST_REMOVE_SIGNAL) {
+ ps_signal_handle(TFM_SST_REMOVE_SIGNAL, tfm_sst_remove_ipc);
+ } else if (signals & TFM_SST_GET_SUPPORT_SIGNAL) {
+ ps_signal_handle(TFM_SST_GET_SUPPORT_SIGNAL,
+ tfm_sst_get_support_ipc);
} else {
tfm_abort();
}
diff --git a/secure_fw/services/tfm_service_list.inc b/secure_fw/services/tfm_service_list.inc
index 964643d..afbb59c 100644
--- a/secure_fw/services/tfm_service_list.inc
+++ b/secure_fw/services/tfm_service_list.inc
@@ -29,7 +29,7 @@
{
.name = "TFM_SST_SET",
.partition_id = TFM_SP_STORAGE,
- .signal = TFM_SST_SET_SIG,
+ .signal = TFM_SST_SET_SIGNAL,
.sid = 0x00000060,
.non_secure_client = true,
.version = 1,
@@ -38,7 +38,7 @@
{
.name = "TFM_SST_GET",
.partition_id = TFM_SP_STORAGE,
- .signal = TFM_SST_GET_SIG,
+ .signal = TFM_SST_GET_SIGNAL,
.sid = 0x00000061,
.non_secure_client = true,
.version = 1,
@@ -47,7 +47,7 @@
{
.name = "TFM_SST_GET_INFO",
.partition_id = TFM_SP_STORAGE,
- .signal = TFM_SST_GET_INFO_SIG,
+ .signal = TFM_SST_GET_INFO_SIGNAL,
.sid = 0x00000062,
.non_secure_client = true,
.version = 1,
@@ -56,7 +56,7 @@
{
.name = "TFM_SST_REMOVE",
.partition_id = TFM_SP_STORAGE,
- .signal = TFM_SST_REMOVE_SIG,
+ .signal = TFM_SST_REMOVE_SIGNAL,
.sid = 0x00000063,
.non_secure_client = true,
.version = 1,
@@ -65,7 +65,7 @@
{
.name = "TFM_SST_GET_SUPPORT",
.partition_id = TFM_SP_STORAGE,
- .signal = TFM_SST_GET_SUPPORT_SIG,
+ .signal = TFM_SST_GET_SUPPORT_SIGNAL,
.sid = 0x00000064,
.non_secure_client = true,
.version = 1,
@@ -76,7 +76,7 @@
{
.name = "TFM_ITS_SET",
.partition_id = TFM_SP_ITS,
- .signal = TFM_ITS_SET_SIG,
+ .signal = TFM_ITS_SET_SIGNAL,
.sid = 0x00000070,
.non_secure_client = true,
.version = 1,
@@ -85,7 +85,7 @@
{
.name = "TFM_ITS_GET",
.partition_id = TFM_SP_ITS,
- .signal = TFM_ITS_GET_SIG,
+ .signal = TFM_ITS_GET_SIGNAL,
.sid = 0x00000071,
.non_secure_client = true,
.version = 1,
@@ -94,7 +94,7 @@
{
.name = "TFM_ITS_GET_INFO",
.partition_id = TFM_SP_ITS,
- .signal = TFM_ITS_GET_INFO_SIG,
+ .signal = TFM_ITS_GET_INFO_SIGNAL,
.sid = 0x00000072,
.non_secure_client = true,
.version = 1,
@@ -103,7 +103,7 @@
{
.name = "TFM_ITS_REMOVE",
.partition_id = TFM_SP_ITS,
- .signal = TFM_ITS_REMOVE_SIG,
+ .signal = TFM_ITS_REMOVE_SIGNAL,
.sid = 0x00000073,
.non_secure_client = true,
.version = 1,
@@ -114,7 +114,7 @@
{
.name = "TFM_CRYPTO",
.partition_id = TFM_SP_CRYPTO,
- .signal = TFM_CRYPTO_SIG,
+ .signal = TFM_CRYPTO_SIGNAL,
.sid = 0x00000080,
.non_secure_client = true,
.version = 1,
@@ -125,7 +125,7 @@
{
.name = "TFM_ATTEST_GET_TOKEN",
.partition_id = TFM_SP_INITIAL_ATTESTATION,
- .signal = PSA_ATTEST_GET_TOKEN_SIG,
+ .signal = TFM_ATTEST_GET_TOKEN_SIGNAL,
.sid = 0x00000020,
.non_secure_client = true,
.version = 1,
@@ -134,7 +134,7 @@
{
.name = "TFM_ATTEST_GET_TOKEN_SIZE",
.partition_id = TFM_SP_INITIAL_ATTESTATION,
- .signal = PSA_ATTEST_GET_TOKEN_SIZE_SIG,
+ .signal = TFM_ATTEST_GET_TOKEN_SIZE_SIGNAL,
.sid = 0x00000021,
.non_secure_client = true,
.version = 1,
@@ -316,7 +316,7 @@
{
.name = "TFM_SECURE_CLIENT_SFN_RUN_TESTS",
.partition_id = TFM_SP_SECURE_TEST_PARTITION,
- .signal = TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG,
+ .signal = TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL,
.sid = 0x0000F000,
.non_secure_client = true,
.version = 1,
diff --git a/secure_fw/services/tfm_service_list.inc.template b/secure_fw/services/tfm_service_list.inc.template
index 256e3bb..2be5370 100644
--- a/secure_fw/services/tfm_service_list.inc.template
+++ b/secure_fw/services/tfm_service_list.inc.template
@@ -27,11 +27,7 @@
{{'{'}}
.name = "{{service.name}}",
.partition_id = {{manifest.manifest.name}},
- {% if service.signal %}
- .signal = {{service.signal}},
- {% else %}
.signal = {{service.name}}_SIGNAL,
- {% endif %}
.sid = {{service.sid}},
{% if service.non_secure_clients is sameas true %}
.non_secure_client = true,
diff --git a/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h b/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
index bdf26dd..346d0b7 100644
--- a/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
+++ b/test/test_services/tfm_core_test/psa_manifest/tfm_test_core.h
@@ -14,16 +14,16 @@
extern "C" {
#endif
-#define SPM_CORE_TEST_INIT_SUCCESS_SIGNAL (1U << ( 0 + 4))
-#define SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL (1U << ( 1 + 4))
-#define SPM_CORE_TEST_MPU_ACCESS_SIGNAL (1U << ( 2 + 4))
-#define SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL (1U << ( 3 + 4))
-#define SPM_CORE_TEST_SS_TO_SS_SIGNAL (1U << ( 4 + 4))
-#define SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL (1U << ( 5 + 4))
-#define SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL (1U << ( 6 + 4))
-#define SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL (1U << ( 7 + 4))
-#define SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL (1U << ( 8 + 4))
-#define SPM_CORE_TEST_SPM_REQUEST_SIGNAL (1U << ( 9 + 4))
+#define SPM_CORE_TEST_INIT_SUCCESS_SIGNAL (1U << (0 + 4))
+#define SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL (1U << (1 + 4))
+#define SPM_CORE_TEST_MPU_ACCESS_SIGNAL (1U << (2 + 4))
+#define SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL (1U << (3 + 4))
+#define SPM_CORE_TEST_SS_TO_SS_SIGNAL (1U << (4 + 4))
+#define SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL (1U << (5 + 4))
+#define SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL (1U << (6 + 4))
+#define SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL (1U << (7 + 4))
+#define SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL (1U << (8 + 4))
+#define SPM_CORE_TEST_SPM_REQUEST_SIGNAL (1U << (9 + 4))
#define SPM_CORE_TEST_BLOCK_SIGNAL (1U << (10 + 4))
#define SPM_CORE_TEST_NS_THREAD_SIGNAL (1U << (11 + 4))
diff --git a/test/test_services/tfm_core_test/tfm_test_core.yaml b/test/test_services/tfm_core_test/tfm_test_core.yaml
index d038986..b198a63 100644
--- a/test/test_services/tfm_core_test/tfm_test_core.yaml
+++ b/test/test_services/tfm_core_test/tfm_test_core.yaml
@@ -51,7 +51,6 @@
{
"name": "SPM_CORE_TEST_INIT_SUCCESS",
"sid": "0x0000F020",
- "signal": "SPM_CORE_TEST_INIT_SUCCESS_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -59,7 +58,6 @@
{
"name": "SPM_CORE_TEST_DIRECT_RECURSION",
"sid": "0x0000F021",
- "signal": "SPM_CORE_TEST_DIRECT_RECURSION_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -67,7 +65,6 @@
{
"name": "SPM_CORE_TEST_MPU_ACCESS",
"sid": "0x0000F022",
- "signal": "SPM_CORE_TEST_MPU_ACCESS_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -75,7 +72,6 @@
{
"name": "SPM_CORE_TEST_MEMORY_PERMISSIONS",
"sid": "0x0000F023",
- "signal": "SPM_CORE_TEST_MEMORY_PERMISSIONS_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -83,7 +79,6 @@
{
"name": "SPM_CORE_TEST_SS_TO_SS",
"sid": "0x0000F024",
- "signal": "SPM_CORE_TEST_SS_TO_SS_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -91,7 +86,6 @@
{
"name": "SPM_CORE_TEST_SS_TO_SS_BUFFER",
"sid": "0x0000F025",
- "signal": "SPM_CORE_TEST_SS_TO_SS_BUFFER_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -99,7 +93,6 @@
{
"name": "SPM_CORE_TEST_OUTVEC_WRITE",
"sid": "0x0000F026",
- "signal": "SPM_CORE_TEST_OUTVEC_WRITE_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -107,7 +100,6 @@
{
"name": "SPM_CORE_TEST_PERIPHERAL_ACCESS",
"sid": "0x0000F027",
- "signal": "SPM_CORE_TEST_PERIPHERAL_ACCESS_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -115,7 +107,6 @@
{
"name": "SPM_CORE_TEST_GET_CALLER_CLIENT_ID",
"sid": "0x0000F028",
- "signal": "SPM_CORE_TEST_GET_CALLER_CLIENT_ID_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -123,7 +114,6 @@
{
"name": "SPM_CORE_TEST_SPM_REQUEST",
"sid": "0x0000F029",
- "signal": "SPM_CORE_TEST_SPM_REQUEST_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -131,7 +121,6 @@
{
"name": "SPM_CORE_TEST_BLOCK",
"sid": "0x0000F02A",
- "signal": "SPM_CORE_TEST_BLOCK_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -139,7 +128,6 @@
{
"name": "SPM_CORE_TEST_NS_THREAD",
"sid": "0x0000F02B",
- "signal": "SPM_CORE_TEST_NS_THREAD_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h b/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
index 53e9ed1..506120a 100644
--- a/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
+++ b/test/test_services/tfm_core_test_2/psa_manifest/tfm_test_core_2.h
@@ -14,12 +14,12 @@
extern "C" {
#endif
-#define SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL (1U << ( 0 + 4))
-#define SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL (1U << ( 1 + 4))
-#define SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL (1U << ( 2 + 4))
-#define SPM_CORE_TEST_2_INVERT_SIGNAL (1U << ( 3 + 4))
-#define SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL (1U << ( 4 + 4))
-#define SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL (1U << ( 5 + 4))
+#define SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL (1U << (0 + 4))
+#define SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL (1U << (1 + 4))
+#define SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL (1U << (2 + 4))
+#define SPM_CORE_TEST_2_INVERT_SIGNAL (1U << (3 + 4))
+#define SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL (1U << (4 + 4))
+#define SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL (1U << (5 + 4))
#ifdef __cplusplus
}
diff --git a/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml b/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
index 1b828ee..4e8fd28 100644
--- a/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
+++ b/test/test_services/tfm_core_test_2/tfm_test_core_2.yaml
@@ -66,7 +66,6 @@
{
"name": "SPM_CORE_TEST_2_SLAVE_SERVICE",
"sid": "0x0000F040",
- "signal": "SPM_CORE_TEST_2_SLAVE_SERVICE_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -74,7 +73,6 @@
{
"name": "SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID",
"sid": "0x0000F041",
- "signal": "SPM_CORE_TEST_2_CHECK_CALLER_CLIENT_ID_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -82,7 +80,6 @@
{
"name": "SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE",
"sid": "0x0000F042",
- "signal": "SPM_CORE_TEST_2_GET_EVERY_SECOND_BYTE_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -90,7 +87,6 @@
{
"name": "SPM_CORE_TEST_2_INVERT",
"sid": "0x0000F043",
- "signal": "SPM_CORE_TEST_2_INVERT_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -98,7 +94,6 @@
{
"name": "SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO",
"sid": "0x0000F044",
- "signal": "SPM_CORE_TEST_2_PREPARE_TEST_SCENARIO_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -106,7 +101,6 @@
{
"name": "SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO",
"sid": "0x0000F045",
- "signal": "SPM_CORE_TEST_2_EXECUTE_TEST_SCENARIO_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h b/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
index 8dfde0f..7814ef4 100644
--- a/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
+++ b/test/test_services/tfm_ipc_client/psa_manifest/tfm_ipc_client_partition.h
@@ -14,11 +14,11 @@
extern "C" {
#endif
-#define IPC_CLIENT_TEST_BASIC_SIGNAL (1U << ( 0 + 4))
-#define IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL (1U << ( 1 + 4))
-#define IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL (1U << ( 2 + 4))
-#define IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL (1U << ( 3 + 4))
-#define IPC_CLIENT_TEST_MEM_CHECK_SIGNAL (1U << ( 4 + 4))
+#define IPC_CLIENT_TEST_BASIC_SIGNAL (1U << (0 + 4))
+#define IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL (1U << (1 + 4))
+#define IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL (1U << (2 + 4))
+#define IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL (1U << (3 + 4))
+#define IPC_CLIENT_TEST_MEM_CHECK_SIGNAL (1U << (4 + 4))
#ifdef __cplusplus
}
diff --git a/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml b/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
index 6dc714d..9160721 100644
--- a/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
+++ b/test/test_services/tfm_ipc_client/tfm_ipc_client_partition.yaml
@@ -19,7 +19,6 @@
{
"name": "IPC_CLIENT_TEST_BASIC",
"sid": "0x0000F060",
- "signal": "IPC_CLIENT_TEST_BASIC_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -27,7 +26,6 @@
{
"name": "IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM",
"sid": "0x0000F061",
- "signal": "IPC_CLIENT_TEST_PSA_ACCESS_APP_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -35,7 +33,6 @@
{
"name": "IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM",
"sid": "0x0000F062",
- "signal": "IPC_CLIENT_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -43,7 +40,6 @@
{
"name": "IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM",
"sid": "0x0000F063",
- "signal": "IPC_CLIENT_TEST_APP_ACCESS_PSA_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -51,7 +47,6 @@
{
"name": "IPC_CLIENT_TEST_MEM_CHECK",
"sid": "0x0000F064",
- "signal": "IPC_CLIENT_TEST_MEM_CHECK_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h b/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
index c12411f..7641c0e 100644
--- a/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
+++ b/test/test_services/tfm_ipc_service/psa_manifest/tfm_ipc_service_partition.h
@@ -14,10 +14,10 @@
extern "C" {
#endif
-#define IPC_SERVICE_TEST_BASIC_SIGNAL (1U << ( 0 + 4))
-#define IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL (1U << ( 1 + 4))
-#define IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL (1U << ( 2 + 4))
-#define IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL (1U << ( 3 + 4))
+#define IPC_SERVICE_TEST_BASIC_SIGNAL (1U << (0 + 4))
+#define IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL (1U << (1 + 4))
+#define IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL (1U << (2 + 4))
+#define IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL (1U << (3 + 4))
#ifdef __cplusplus
}
diff --git a/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml b/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
index d237f79..d4b23df 100644
--- a/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
+++ b/test/test_services/tfm_ipc_service/tfm_ipc_service_partition.yaml
@@ -19,7 +19,6 @@
{
"name": "IPC_SERVICE_TEST_BASIC",
"sid": "0x0000F080",
- "signal": "IPC_SERVICE_TEST_BASIC_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -27,7 +26,6 @@
{
"name": "IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM",
"sid": "0x0000F081",
- "signal": "IPC_SERVICE_TEST_PSA_ACCESS_APP_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -35,7 +33,6 @@
{
"name": "IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM",
"sid": "0x0000F082",
- "signal": "IPC_SERVICE_TEST_PSA_ACCESS_APP_READ_ONLY_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
@@ -43,7 +40,6 @@
{
"name": "IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM",
"sid": "0x0000F083",
- "signal": "IPC_SERVICE_TEST_APP_ACCESS_PSA_MEM_SIGNAL",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"
diff --git a/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h b/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
index 650d97f..658cf95 100644
--- a/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
+++ b/test/test_services/tfm_irq_test_service_1/psa_manifest/tfm_irq_test_service_1.h
@@ -14,8 +14,8 @@
extern "C" {
#endif
-#define SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL (1U << ( 0 + 4))
-#define SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL (1U << ( 1 + 4))
+#define SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL (1U << (0 + 4))
+#define SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL (1U << (1 + 4))
#define SPM_CORE_IRQ_TEST_1_SIGNAL_TIMER_0_IRQ (1U << (27 + 4))
diff --git a/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml b/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
index d65ba4b..fedc1ce 100644
--- a/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
+++ b/test/test_services/tfm_irq_test_service_1/tfm_irq_test_service_1.yaml
@@ -50,20 +50,18 @@
},
"services": [
{
- "name": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO",
- "sid": "0x0000F0A0",
- "signal": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO_SIGNAL",
- "non_secure_clients": true,
- "version": 1,
- "version_policy": "STRICT"
+ "name": "SPM_CORE_IRQ_TEST_1_PREPARE_TEST_SCENARIO",
+ "sid": "0x0000F0A0",
+ "non_secure_clients": true,
+ "version": 1,
+ "version_policy": "STRICT"
},
{
- "name": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO",
- "sid": "0x0000F0A1",
- "signal": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO_SIGNAL",
- "non_secure_clients": true,
- "version": 1,
- "version_policy": "STRICT"
+ "name": "SPM_CORE_IRQ_TEST_1_EXECUTE_TEST_SCENARIO",
+ "sid": "0x0000F0A1",
+ "non_secure_clients": true,
+ "version": 1,
+ "version_policy": "STRICT"
},
]
}
diff --git a/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h b/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
index a7f18fc..fd25397 100644
--- a/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
+++ b/test/test_services/tfm_secure_client_service/psa_manifest/tfm_test_client_service.h
@@ -14,7 +14,7 @@
extern "C" {
#endif
-#define TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG (1U << ( 0 + 4))
+#define TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL (1U << (0 + 4))
#ifdef __cplusplus
}
diff --git a/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c b/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
index 32eedf3..fc69c60 100644
--- a/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
+++ b/test/test_services/tfm_secure_client_service/tfm_secure_client_service.c
@@ -25,8 +25,8 @@
psa_msg_t msg;
while (1) {
- psa_wait(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG, PSA_BLOCK);
- psa_get(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG, &msg);
+ psa_wait(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL, PSA_BLOCK);
+ psa_get(TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIGNAL, &msg);
switch (msg.type) {
case PSA_IPC_CONNECT:
psa_reply(msg.handle, PSA_SUCCESS);
diff --git a/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml b/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
index 2aab01e..80159bd 100644
--- a/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
+++ b/test/test_services/tfm_secure_client_service/tfm_test_client_service.yaml
@@ -32,7 +32,6 @@
{
"name": "TFM_SECURE_CLIENT_SFN_RUN_TESTS",
"sid": "0x0000F000",
- "signal": "TFM_SECURE_CLIENT_SFN_RUN_TESTS_SIG",
"non_secure_clients": true,
"version": 1,
"version_policy": "STRICT"