blob: 650fe5256c4d8c9a4fd9f515199bed7bcfbbd423 [file] [log] [blame]
Ashutosh Singhf4d88672017-11-29 13:35:43 +00001/*
Mate Toth-Pal2a6f8c22018-12-13 16:37:17 +01002 * Copyright (c) 2017-2019, Arm Limited. All rights reserved.
Ashutosh Singhf4d88672017-11-29 13:35:43 +00003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 */
7
8#ifndef __TFM_API_H__
9#define __TFM_API_H__
10
11#ifdef __cplusplus
12extern "C" {
13#endif
14
Mate Toth-Palce61afa2018-08-03 13:51:01 +020015#include <stdint.h>
Jamie Foxcc31d402019-01-28 17:13:52 +000016#include "psa/client.h"
Miklos Balintbf25a402018-06-14 17:43:54 +020017
Mate Toth-Pal261df462018-08-07 12:02:42 +020018#define TFM_INVALID_CLIENT_ID 0
19
20/**
21 * \brief Checks if the provided client ID is a secure client ID.
22 *
23 * \param[in] client_id Client ID to check
24 *
25 * \return Returns 1 if the client Id is secure. Otherwise, returns 0.
26 */
27#define TFM_CLIENT_ID_IS_S(client_id) ((client_id)>0)
28
29/**
30 * \brief Checks if the provided client ID is a non-secure client ID.
31 *
32 * \param[in] client_id Client ID to check
33 *
34 * \return Returns 1 if the client Id is non-secure. Otherwise, returns 0.
35 */
36#define TFM_CLIENT_ID_IS_NS(client_id) ((client_id)<0)
37
Mate Toth-Pal4341de02018-10-02 12:55:47 +020038/* The mask used for timeout values */
39#define PSA_TIMEOUT_MASK PSA_BLOCK
40
Ashutosh Singhf4d88672017-11-29 13:35:43 +000041/* FixMe: sort out DEBUG compile option and limit return value options
42 * on external interfaces */
Mate Toth-Pal2a6f8c22018-12-13 16:37:17 +010043/* For secure functions using prorietary signatures
Ashutosh Singhf4d88672017-11-29 13:35:43 +000044 * TFM will only return values recognized and parsed by TFM core.
45 * Service return codes are not automatically passed on to REE.
46 * Any non-zero return value is interpreted as an error that may trigger
47 * TEE error handling flow.
Mate Toth-Pal2a6f8c22018-12-13 16:37:17 +010048 * For secure functions using the veneers in secure_fw/ns_callable/tfm_veneers.c
49 * (iovec API) this limitation does not apply.
Ashutosh Singhf4d88672017-11-29 13:35:43 +000050 */
51enum tfm_status_e
52{
53 TFM_SUCCESS = 0,
Mate Toth-Pal7de74b52018-02-23 15:46:47 +010054 TFM_PARTITION_BUSY,
Ashutosh Singhf4d88672017-11-29 13:35:43 +000055 TFM_ERROR_SECURE_DOMAIN_LOCKED,
56 TFM_ERROR_INVALID_PARAMETER,
Mate Toth-Pal7de74b52018-02-23 15:46:47 +010057 TFM_ERROR_PARTITION_NON_REENTRANT,
Ashutosh Singhf4d88672017-11-29 13:35:43 +000058 TFM_ERROR_NS_THREAD_MODE_CALL,
Miklos Balint1fdb12f2018-09-11 11:30:30 +020059 TFM_ERROR_NOT_INITIALIZED,
60 TFM_ERROR_NO_ACTIVE_PARTITION,
Ashutosh Singhf4d88672017-11-29 13:35:43 +000061 TFM_ERROR_INVALID_EXC_MODE,
62 TFM_SECURE_LOCK_FAILED,
63 TFM_SECURE_UNLOCK_FAILED,
64 TFM_ERROR_GENERIC = 0x1F,
Mate Toth-Pal7de74b52018-02-23 15:46:47 +010065 TFM_PARTITION_SPECIFIC_ERROR_MIN,
Ashutosh Singhf4d88672017-11-29 13:35:43 +000066};
67
68//==================== Secure function declarations ==========================//
69
Mate Toth-Palce61afa2018-08-03 13:51:01 +020070/**
71 * \brief Assign client ID to the current TZ context
72 *
73 * \param[in] ns_client_id The client ID to be assigned to the current
74 * context
75 * \return TFM_SUCCESS if the client ID assigned successfully, an error code
76 * according to \ref tfm_status_e in case of error.
77 *
78 * \note This function have to be called from handler mode.
79 */
80enum tfm_status_e tfm_register_client_id (int32_t ns_client_id);
Ashutosh Singhf4d88672017-11-29 13:35:43 +000081
Miklos Balint87da2512018-04-19 13:45:50 +020082/**
Edison Aib3e56962018-09-04 19:12:31 +080083 * \brief Retrieve the version of the PSA Framework API that is implemented
84 *
85 * \return The version of the PSA Framework
86 */
87uint32_t tfm_psa_framework_version_veneer(void);
88
89/**
Miklos Balint87da2512018-04-19 13:45:50 +020090 * \brief Return version of secure function provided by secure binary
91 *
92 * \param[in] sid ID of secure service
93 *
94 * \return Version number of secure function
95 */
96uint32_t tfm_psa_version_veneer(uint32_t sid);
97
98/**
99 * \brief Connect to secure function
100 *
101 * \param[in] sid ID of secure service
Summer Qin4b1d03b2019-07-02 14:56:08 +0800102 * \param[in] version Version of SF requested by client
Miklos Balint87da2512018-04-19 13:45:50 +0200103 *
104 * \return Returns handle to connection
105 */
Summer Qin4b1d03b2019-07-02 14:56:08 +0800106psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t version);
Miklos Balint87da2512018-04-19 13:45:50 +0200107
108/**
109 * \brief Call a secure function referenced by a connection handle
110 *
111 * \param[in] handle Handle to connection
Summer Qin4b1d03b2019-07-02 14:56:08 +0800112 * \param[in] type The reuqest type. Must be zero(PSA_IPC_CALL) or
113 * positive.
Miklos Balint87da2512018-04-19 13:45:50 +0200114 * \param[in] in_vecs invec containing pointer/count of input vectors
115 * \param[in] out_vecs invec containing pointer/count of output vectors
116 *
Edison Aib3e56962018-09-04 19:12:31 +0800117 * \return Returns \ref psa_status_t status code
Miklos Balint87da2512018-04-19 13:45:50 +0200118 */
Summer Qin4b1d03b2019-07-02 14:56:08 +0800119psa_status_t tfm_psa_call_veneer(psa_handle_t handle, int32_t type,
Edison Aib3e56962018-09-04 19:12:31 +0800120 const psa_invec *in_vecs,
121 const psa_invec *out_vecs);
Miklos Balint87da2512018-04-19 13:45:50 +0200122
123/**
124 * \brief Close connection to secure function referenced by a connection handle
125 *
126 * \param[in] handle Handle to connection
127 *
Edison Aib3e56962018-09-04 19:12:31 +0800128 * \return Returns \ref psa_status_t status code
Miklos Balint87da2512018-04-19 13:45:50 +0200129 */
Edison Aib3e56962018-09-04 19:12:31 +0800130psa_status_t tfm_psa_close_veneer(psa_handle_t handle);
Miklos Balint87da2512018-04-19 13:45:50 +0200131
Ashutosh Singhf4d88672017-11-29 13:35:43 +0000132//================ End Secure function declarations ==========================//
133
134#ifdef __cplusplus
135}
136#endif
137
138#endif /* __TFM_API_H__ */