Crypto: Rename SFN/Secure Function terms
The Secure Function (SFN) is a new terminology introduced in
FF-M v1.1 to refer to RoT Service callback functions.
The "SFN" in crypto is not the same.
This patch renames the SFN/sfn to srv to avoid confusions.
Change-Id: I2e57332fa8c3e71044f2ff73d70cb94f4863ceb3
Signed-off-by: Kevin Peng <kevin.peng@arm.com>
diff --git a/secure_fw/partitions/crypto/crypto_init.c b/secure_fw/partitions/crypto/crypto_init.c
index d11ea84..5c9965c 100644
--- a/secure_fw/partitions/crypto/crypto_init.c
+++ b/secure_fw/partitions/crypto/crypto_init.c
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2018-2021, Arm Limited. All rights reserved.
+ * Copyright (c) 2018-2022, Arm Limited. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*
@@ -111,9 +111,9 @@
scratch.alloc_index = 0;
}
-static psa_status_t tfm_crypto_call_sfn(psa_msg_t *msg,
+static psa_status_t tfm_crypto_call_srv(psa_msg_t *msg,
struct tfm_crypto_pack_iovec *iov,
- const uint32_t sfn_id)
+ const uint32_t srv_id)
{
psa_status_t status = PSA_SUCCESS;
size_t in_len = PSA_MAX_IOVEC, out_len = PSA_MAX_IOVEC, i;
@@ -170,7 +170,7 @@
(void)tfm_crypto_set_scratch_owner(msg->client_id);
/* Call the uniform signature API */
- status = sfid_func_table[sfn_id](in_vec, in_len, out_vec, out_len);
+ status = sfid_func_table[srv_id](in_vec, in_len, out_vec, out_len);
/* Write into the IPC framework outputs from the scratch */
for (i = 0; i < out_len; i++) {
@@ -185,7 +185,7 @@
static psa_status_t tfm_crypto_parse_msg(psa_msg_t *msg,
struct tfm_crypto_pack_iovec *iov,
- uint32_t *sfn_id_p)
+ uint32_t *srv_id_p)
{
size_t read_size;
@@ -199,12 +199,12 @@
return PSA_ERROR_GENERIC_ERROR;
}
- if (iov->sfn_id >= TFM_CRYPTO_SID_MAX) {
- *sfn_id_p = TFM_CRYPTO_SID_INVALID;
+ if (iov->srv_id >= TFM_CRYPTO_SID_MAX) {
+ *srv_id_p = TFM_CRYPTO_SID_INVALID;
return PSA_ERROR_GENERIC_ERROR;
}
- *sfn_id_p = iov->sfn_id;
+ *srv_id_p = iov->srv_id;
return PSA_SUCCESS;
}
@@ -214,7 +214,7 @@
psa_signal_t signals;
psa_msg_t msg;
psa_status_t status = PSA_SUCCESS;
- uint32_t sfn_id = TFM_CRYPTO_SID_INVALID;
+ uint32_t srv_id = TFM_CRYPTO_SID_INVALID;
struct tfm_crypto_pack_iovec iov = {0};
while (1) {
@@ -229,10 +229,10 @@
switch (msg.type) {
case PSA_IPC_CALL:
/* Parse the message */
- status = tfm_crypto_parse_msg(&msg, &iov, &sfn_id);
+ status = tfm_crypto_parse_msg(&msg, &iov, &srv_id);
/* Call the dispatcher based on the SID passed as type */
if (status == PSA_SUCCESS) {
- status = tfm_crypto_call_sfn(&msg, &iov, sfn_id);
+ status = tfm_crypto_call_srv(&msg, &iov, srv_id);
}
psa_reply(msg.handle, status);
break;
diff --git a/secure_fw/partitions/crypto/tfm_crypto_private.h b/secure_fw/partitions/crypto/tfm_crypto_private.h
index b28224a..34a41c8 100644
--- a/secure_fw/partitions/crypto/tfm_crypto_private.h
+++ b/secure_fw/partitions/crypto/tfm_crypto_private.h
@@ -33,12 +33,12 @@
}
/*
- * Validate the IOVEC[] lengths for IPC model. The tfm_crypto_call_sfn()
+ * Validate the IOVEC[] lengths for IPC model. The tfm_crypto_call_srv()
* reduces the entries in IOVEC[] which are empty from `in_len` and `out_len`.
* This means that Crypto service APIs need to ensure that the `in_len`
* and `out_len` are within the expected range.
*
- * Also tfm_crypto_call_sfn() ensures that all entries in IOVEC[] are
+ * Also tfm_crypto_call_srv() ensures that all entries in IOVEC[] are
* initialised. Hence all entries in IOVEC[] can be accessed to
* initialize internal variables even if they are outside `in_len`
* and `out_len`.
diff --git a/secure_fw/partitions/crypto/tfm_crypto_secure_api.c b/secure_fw/partitions/crypto/tfm_crypto_secure_api.c
index 77fa4f1..5cc7e90 100644
--- a/secure_fw/partitions/crypto/tfm_crypto_secure_api.c
+++ b/secure_fw/partitions/crypto/tfm_crypto_secure_api.c
@@ -17,23 +17,23 @@
#ifdef TFM_PSA_API
-#define API_DISPATCH(sfn_name, sfn_id) \
+#define API_DISPATCH(srv_name, srv_id) \
psa_call(TFM_CRYPTO_HANDLE, PSA_IPC_CALL, \
in_vec, ARRAY_SIZE(in_vec), \
out_vec, ARRAY_SIZE(out_vec))
-#define API_DISPATCH_NO_OUTVEC(sfn_name, sfn_id) \
+#define API_DISPATCH_NO_OUTVEC(srv_name, srv_id) \
psa_call(TFM_CRYPTO_HANDLE, PSA_IPC_CALL, \
in_vec, ARRAY_SIZE(in_vec), \
(psa_outvec *)NULL, 0)
#else
-#define API_DISPATCH(sfn_name, sfn_id) \
- sfn_name##_veneer( \
+#define API_DISPATCH(srv_name, srv_id) \
+ srv_name##_veneer( \
in_vec, ARRAY_SIZE(in_vec), \
out_vec, ARRAY_SIZE(out_vec))
-#define API_DISPATCH_NO_OUTVEC(sfn_name, sfn_id) \
- sfn_name##_veneer( \
+#define API_DISPATCH_NO_OUTVEC(srv_name, srv_id) \
+ srv_name##_veneer( \
in_vec, ARRAY_SIZE(in_vec), \
NULL, 0)
#endif /* TFM_PSA_API */
@@ -54,7 +54,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_OPEN_KEY_SID,
+ .srv_id = TFM_CRYPTO_OPEN_KEY_SID,
};
psa_invec in_vec[] = {
{.base = &iov, .len = sizeof(struct tfm_crypto_pack_iovec)},
@@ -78,7 +78,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CLOSE_KEY_SID,
+ .srv_id = TFM_CRYPTO_CLOSE_KEY_SID,
.key_id = key_id,
};
psa_invec in_vec[] = {
@@ -102,7 +102,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_IMPORT_KEY_SID,
+ .srv_id = TFM_CRYPTO_IMPORT_KEY_SID,
};
psa_invec in_vec[] = {
{.base = &iov, .len = sizeof(struct tfm_crypto_pack_iovec)},
@@ -127,7 +127,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_DESTROY_KEY_SID,
+ .srv_id = TFM_CRYPTO_DESTROY_KEY_SID,
.key_id = key_id,
};
psa_invec in_vec[] = {
@@ -149,7 +149,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_GET_KEY_ATTRIBUTES_SID,
+ .srv_id = TFM_CRYPTO_GET_KEY_ATTRIBUTES_SID,
.key_id = key_id,
};
psa_invec in_vec[] = {
@@ -172,7 +172,7 @@
return PSA_ERROR_NOT_SUPPORTED;
#else
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_RESET_KEY_ATTRIBUTES_SID,
+ .srv_id = TFM_CRYPTO_RESET_KEY_ATTRIBUTES_SID,
};
psa_invec in_vec[] = {
{.base = &iov, .len = sizeof(struct tfm_crypto_pack_iovec)},
@@ -198,7 +198,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_EXPORT_KEY_SID,
+ .srv_id = TFM_CRYPTO_EXPORT_KEY_SID,
.key_id = key_id,
};
psa_invec in_vec[] = {
@@ -227,7 +227,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_EXPORT_PUBLIC_KEY_SID,
+ .srv_id = TFM_CRYPTO_EXPORT_PUBLIC_KEY_SID,
.key_id = key_id,
};
@@ -254,7 +254,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_PURGE_KEY_SID,
+ .srv_id = TFM_CRYPTO_PURGE_KEY_SID,
.key_id = key_id,
};
psa_invec in_vec[] = {
@@ -277,7 +277,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_COPY_KEY_SID,
+ .srv_id = TFM_CRYPTO_COPY_KEY_SID,
.key_id = source_key_id,
};
@@ -307,7 +307,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_GENERATE_IV_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_GENERATE_IV_SID,
.op_handle = operation->handle,
};
@@ -337,7 +337,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_SET_IV_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_SET_IV_SID,
.op_handle = operation->handle,
};
@@ -365,7 +365,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_ENCRYPT_SETUP_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_ENCRYPT_SETUP_SID,
.key_id = key_id,
.alg = alg,
.op_handle = operation->handle,
@@ -394,7 +394,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_DECRYPT_SETUP_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_DECRYPT_SETUP_SID,
.key_id = key_id,
.alg = alg,
.op_handle = operation->handle,
@@ -427,7 +427,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_UPDATE_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_UPDATE_SID,
.op_handle = operation->handle,
};
@@ -456,7 +456,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_ABORT_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_ABORT_SID,
.op_handle = operation->handle,
};
@@ -484,7 +484,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_FINISH_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_FINISH_SID,
.op_handle = operation->handle,
};
@@ -513,7 +513,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_SETUP_SID,
+ .srv_id = TFM_CRYPTO_HASH_SETUP_SID,
.alg = alg,
.op_handle = operation->handle,
};
@@ -541,7 +541,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_UPDATE_SID,
+ .srv_id = TFM_CRYPTO_HASH_UPDATE_SID,
.op_handle = operation->handle,
};
@@ -570,7 +570,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_FINISH_SID,
+ .srv_id = TFM_CRYPTO_HASH_FINISH_SID,
.op_handle = operation->handle,
};
@@ -600,7 +600,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_VERIFY_SID,
+ .srv_id = TFM_CRYPTO_HASH_VERIFY_SID,
.op_handle = operation->handle,
};
@@ -626,7 +626,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_ABORT_SID,
+ .srv_id = TFM_CRYPTO_HASH_ABORT_SID,
.op_handle = operation->handle,
};
@@ -652,7 +652,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_CLONE_SID,
+ .srv_id = TFM_CRYPTO_HASH_CLONE_SID,
.op_handle = source_operation->handle,
};
@@ -686,7 +686,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_COMPUTE_SID,
+ .srv_id = TFM_CRYPTO_HASH_COMPUTE_SID,
.alg = alg,
};
@@ -719,7 +719,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_HASH_COMPARE_SID,
+ .srv_id = TFM_CRYPTO_HASH_COMPARE_SID,
.alg = alg,
};
@@ -745,7 +745,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_SIGN_SETUP_SID,
+ .srv_id = TFM_CRYPTO_MAC_SIGN_SETUP_SID,
.key_id = key_id,
.alg = alg,
.op_handle = operation->handle,
@@ -774,7 +774,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_VERIFY_SETUP_SID,
+ .srv_id = TFM_CRYPTO_MAC_VERIFY_SETUP_SID,
.key_id = key_id,
.alg = alg,
.op_handle = operation->handle,
@@ -803,7 +803,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_UPDATE_SID,
+ .srv_id = TFM_CRYPTO_MAC_UPDATE_SID,
.op_handle = operation->handle,
};
@@ -832,7 +832,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_SIGN_FINISH_SID,
+ .srv_id = TFM_CRYPTO_MAC_SIGN_FINISH_SID,
.op_handle = operation->handle,
};
@@ -862,7 +862,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_VERIFY_FINISH_SID,
+ .srv_id = TFM_CRYPTO_MAC_VERIFY_FINISH_SID,
.op_handle = operation->handle,
};
@@ -888,7 +888,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_ABORT_SID,
+ .srv_id = TFM_CRYPTO_MAC_ABORT_SID,
.op_handle = operation->handle,
};
@@ -923,7 +923,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_ENCRYPT_SID,
+ .srv_id = TFM_CRYPTO_AEAD_ENCRYPT_SID,
.key_id = key_id,
.alg = alg,
.aead_in = {.nonce = {0}, .nonce_length = 0}
@@ -993,7 +993,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_DECRYPT_SID,
+ .srv_id = TFM_CRYPTO_AEAD_DECRYPT_SID,
.key_id = key_id,
.alg = alg,
.aead_in = {.nonce = {0}, .nonce_length = 0}
@@ -1055,7 +1055,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_ENCRYPT_SETUP_SID,
+ .srv_id = TFM_CRYPTO_AEAD_ENCRYPT_SETUP_SID,
.key_id = key,
.alg = alg,
.op_handle = operation->handle,
@@ -1083,7 +1083,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_DECRYPT_SETUP_SID,
+ .srv_id = TFM_CRYPTO_AEAD_DECRYPT_SETUP_SID,
.key_id = key,
.alg = alg,
.op_handle = operation->handle,
@@ -1112,7 +1112,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_GENERATE_NONCE_SID,
+ .srv_id = TFM_CRYPTO_AEAD_GENERATE_NONCE_SID,
.op_handle = operation->handle,
};
@@ -1141,7 +1141,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_SET_NONCE_SID,
+ .srv_id = TFM_CRYPTO_AEAD_SET_NONCE_SID,
.op_handle = operation->handle,
};
@@ -1168,7 +1168,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_SET_LENGTHS_SID,
+ .srv_id = TFM_CRYPTO_AEAD_SET_LENGTHS_SID,
.ad_length = ad_length,
.plaintext_length = plaintext_length,
.op_handle = operation->handle,
@@ -1196,7 +1196,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_UPDATE_AD_SID,
+ .srv_id = TFM_CRYPTO_AEAD_UPDATE_AD_SID,
.op_handle = operation->handle,
};
@@ -1242,7 +1242,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_UPDATE_SID,
+ .srv_id = TFM_CRYPTO_AEAD_UPDATE_SID,
.op_handle = operation->handle,
};
@@ -1291,7 +1291,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_FINISH_SID,
+ .srv_id = TFM_CRYPTO_AEAD_FINISH_SID,
.op_handle = operation->handle,
};
@@ -1354,7 +1354,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_VERIFY_SID,
+ .srv_id = TFM_CRYPTO_AEAD_VERIFY_SID,
.op_handle = operation->handle,
};
@@ -1409,7 +1409,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_AEAD_ABORT_SID,
+ .srv_id = TFM_CRYPTO_AEAD_ABORT_SID,
.op_handle = operation->handle,
};
@@ -1439,7 +1439,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_SIGN_MESSAGE_SID,
+ .srv_id = TFM_CRYPTO_SIGN_MESSAGE_SID,
.key_id = key_id,
.alg = alg,
};
@@ -1472,7 +1472,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_VERIFY_MESSAGE_SID,
+ .srv_id = TFM_CRYPTO_VERIFY_MESSAGE_SID,
.key_id = key_id,
.alg = alg
};
@@ -1503,7 +1503,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_SIGN_HASH_SID,
+ .srv_id = TFM_CRYPTO_SIGN_HASH_SID,
.key_id = key_id,
.alg = alg,
};
@@ -1537,7 +1537,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_VERIFY_HASH_SID,
+ .srv_id = TFM_CRYPTO_VERIFY_HASH_SID,
.key_id = key_id,
.alg = alg
};
@@ -1570,7 +1570,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_ASYMMETRIC_ENCRYPT_SID,
+ .srv_id = TFM_CRYPTO_ASYMMETRIC_ENCRYPT_SID,
.key_id = key_id,
.alg = alg
};
@@ -1624,7 +1624,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_ASYMMETRIC_DECRYPT_SID,
+ .srv_id = TFM_CRYPTO_ASYMMETRIC_DECRYPT_SID,
.key_id = key_id,
.alg = alg
};
@@ -1672,7 +1672,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_GET_CAPACITY_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_GET_CAPACITY_SID,
.op_handle = operation->handle,
};
@@ -1701,7 +1701,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_OUTPUT_BYTES_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_OUTPUT_BYTES_SID,
.op_handle = operation->handle,
};
@@ -1730,7 +1730,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_INPUT_KEY_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_INPUT_KEY_SID,
.key_id = key_id,
.step = step,
.op_handle = operation->handle,
@@ -1754,7 +1754,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_ABORT_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_ABORT_SID,
.op_handle = operation->handle,
};
@@ -1785,7 +1785,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_KEY_AGREEMENT_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_KEY_AGREEMENT_SID,
.key_id = private_key,
.step = step,
.op_handle = operation->handle,
@@ -1815,7 +1815,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_GENERATE_RANDOM_SID,
+ .srv_id = TFM_CRYPTO_GENERATE_RANDOM_SID,
};
psa_invec in_vec[] = {
@@ -1845,7 +1845,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_GENERATE_KEY_SID,
+ .srv_id = TFM_CRYPTO_GENERATE_KEY_SID,
};
psa_invec in_vec[] = {
@@ -1877,7 +1877,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_COMPUTE_SID,
+ .srv_id = TFM_CRYPTO_MAC_COMPUTE_SID,
.key_id = key_id,
.alg = alg,
};
@@ -1910,7 +1910,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_MAC_VERIFY_SID,
+ .srv_id = TFM_CRYPTO_MAC_VERIFY_SID,
.key_id = key_id,
.alg = alg,
};
@@ -1941,7 +1941,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_ENCRYPT_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_ENCRYPT_SID,
.key_id = key_id,
.alg = alg,
};
@@ -1975,7 +1975,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_CIPHER_DECRYPT_SID,
+ .srv_id = TFM_CRYPTO_CIPHER_DECRYPT_SID,
.key_id = key_id,
.alg = alg,
};
@@ -2009,7 +2009,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_RAW_KEY_AGREEMENT_SID,
+ .srv_id = TFM_CRYPTO_RAW_KEY_AGREEMENT_SID,
.alg = alg,
.key_id = private_key
};
@@ -2040,7 +2040,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_SETUP_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_SETUP_SID,
.alg = alg,
.op_handle = operation->handle,
};
@@ -2068,7 +2068,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_SET_CAPACITY_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_SET_CAPACITY_SID,
.capacity = capacity,
.op_handle = operation->handle,
};
@@ -2095,7 +2095,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_INPUT_BYTES_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_INPUT_BYTES_SID,
.step = step,
.op_handle = operation->handle,
};
@@ -2122,7 +2122,7 @@
#else
psa_status_t status;
struct tfm_crypto_pack_iovec iov = {
- .sfn_id = TFM_CRYPTO_KEY_DERIVATION_OUTPUT_KEY_SID,
+ .srv_id = TFM_CRYPTO_KEY_DERIVATION_OUTPUT_KEY_SID,
.op_handle = operation->handle,
};