Crypto: Refine how crypto modules are selected
Crypto modules can be only enable/disable by setting the
CRYPTO_XXX_MODULE_DISABLED to 0/1.
This patch refines how the modules are selected. With this patch,
the crypto modules can be enabled/disabled by setting the
CRYPTO_XXX_MODULE_DISABLED to 0/1, OFF/ON or FALSE/TRUE, not
limited to 0/1 anymore.
Change-Id: I4f5ea82805760883639950cd6031cbf658cb0bfc
Signed-off-by: Kevin Peng <kevin.peng@arm.com>
diff --git a/secure_fw/services/crypto/crypto_key.c b/secure_fw/services/crypto/crypto_key.c
index 91c272b..00cf946 100644
--- a/secure_fw/services/crypto/crypto_key.c
+++ b/secure_fw/services/crypto/crypto_key.c
@@ -28,7 +28,7 @@
uint8_t in_use; /*!< Flag to indicate if this in use */
};
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED == 0)
+#ifndef TFM_CRYPTO_KEY_MODULE_DISABLED
static struct tfm_crypto_handle_owner_s
handle_owner[TFM_CRYPTO_MAX_KEY_HANDLES] = {0};
#endif
@@ -44,7 +44,7 @@
*
* \return Return values as described in \ref psa_status_t
*/
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED == 0)
+#ifndef TFM_CRYPTO_KEY_MODULE_DISABLED
static psa_status_t tfm_crypto_open_huk(psa_key_lifetime_t lifetime,
psa_key_handle_t *key_handle)
{
@@ -109,7 +109,7 @@
psa_status_t tfm_crypto_check_handle_owner(psa_key_handle_t handle,
uint32_t *index)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
int32_t partition_id = 0;
@@ -143,7 +143,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 1)) {
@@ -194,7 +194,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 2) || (out_len != 1)) {
@@ -228,7 +228,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
(void)out_vec;
@@ -267,7 +267,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
(void)out_vec;
@@ -300,7 +300,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
(void)out_vec;
@@ -339,7 +339,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 2)) {
@@ -366,7 +366,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 1)) {
@@ -391,7 +391,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 1)) {
@@ -416,7 +416,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
(void)out_vec;
@@ -445,7 +445,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
(void)out_vec;
@@ -477,7 +477,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 1)) {
@@ -502,7 +502,7 @@
psa_outvec out_vec[],
size_t out_len)
{
-#if (TFM_CRYPTO_KEY_MODULE_DISABLED != 0)
+#ifdef TFM_CRYPTO_KEY_MODULE_DISABLED
return PSA_ERROR_NOT_SUPPORTED;
#else
if ((in_len != 1) || (out_len != 1)) {