Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 1 | /* |
Mate Toth-Pal | 2a6f8c2 | 2018-12-13 16:37:17 +0100 | [diff] [blame] | 2 | * Copyright (c) 2017-2019, Arm Limited. All rights reserved. |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | * |
| 6 | */ |
| 7 | |
| 8 | #ifndef __TFM_API_H__ |
| 9 | #define __TFM_API_H__ |
| 10 | |
| 11 | #ifdef __cplusplus |
| 12 | extern "C" { |
| 13 | #endif |
| 14 | |
Mate Toth-Pal | ce61afa | 2018-08-03 13:51:01 +0200 | [diff] [blame] | 15 | #include <stdint.h> |
Jamie Fox | cc31d40 | 2019-01-28 17:13:52 +0000 | [diff] [blame^] | 16 | #include "psa/client.h" |
Miklos Balint | bf25a40 | 2018-06-14 17:43:54 +0200 | [diff] [blame] | 17 | |
Mate Toth-Pal | 261df46 | 2018-08-07 12:02:42 +0200 | [diff] [blame] | 18 | #define TFM_INVALID_CLIENT_ID 0 |
| 19 | |
| 20 | /** |
| 21 | * \brief Checks if the provided client ID is a secure client ID. |
| 22 | * |
| 23 | * \param[in] client_id Client ID to check |
| 24 | * |
| 25 | * \return Returns 1 if the client Id is secure. Otherwise, returns 0. |
| 26 | */ |
| 27 | #define TFM_CLIENT_ID_IS_S(client_id) ((client_id)>0) |
| 28 | |
| 29 | /** |
| 30 | * \brief Checks if the provided client ID is a non-secure client ID. |
| 31 | * |
| 32 | * \param[in] client_id Client ID to check |
| 33 | * |
| 34 | * \return Returns 1 if the client Id is non-secure. Otherwise, returns 0. |
| 35 | */ |
| 36 | #define TFM_CLIENT_ID_IS_NS(client_id) ((client_id)<0) |
| 37 | |
Mate Toth-Pal | b8ce0dd | 2018-07-25 10:18:34 +0200 | [diff] [blame] | 38 | /* Maximum number of input and output vectors */ |
| 39 | #define PSA_MAX_IOVEC (4) |
| 40 | |
Mate Toth-Pal | 4341de0 | 2018-10-02 12:55:47 +0200 | [diff] [blame] | 41 | /* The mask used for timeout values */ |
| 42 | #define PSA_TIMEOUT_MASK PSA_BLOCK |
| 43 | |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 44 | /* FixMe: sort out DEBUG compile option and limit return value options |
| 45 | * on external interfaces */ |
Mate Toth-Pal | 2a6f8c2 | 2018-12-13 16:37:17 +0100 | [diff] [blame] | 46 | /* For secure functions using prorietary signatures |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 47 | * TFM will only return values recognized and parsed by TFM core. |
| 48 | * Service return codes are not automatically passed on to REE. |
| 49 | * Any non-zero return value is interpreted as an error that may trigger |
| 50 | * TEE error handling flow. |
Mate Toth-Pal | 2a6f8c2 | 2018-12-13 16:37:17 +0100 | [diff] [blame] | 51 | * For secure functions using the veneers in secure_fw/ns_callable/tfm_veneers.c |
| 52 | * (iovec API) this limitation does not apply. |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 53 | */ |
| 54 | enum tfm_status_e |
| 55 | { |
| 56 | TFM_SUCCESS = 0, |
Mate Toth-Pal | 7de74b5 | 2018-02-23 15:46:47 +0100 | [diff] [blame] | 57 | TFM_PARTITION_BUSY, |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 58 | TFM_ERROR_SECURE_DOMAIN_LOCKED, |
| 59 | TFM_ERROR_INVALID_PARAMETER, |
Mate Toth-Pal | 7de74b5 | 2018-02-23 15:46:47 +0100 | [diff] [blame] | 60 | TFM_ERROR_PARTITION_NON_REENTRANT, |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 61 | TFM_ERROR_NS_THREAD_MODE_CALL, |
Miklos Balint | 1fdb12f | 2018-09-11 11:30:30 +0200 | [diff] [blame] | 62 | TFM_ERROR_NOT_INITIALIZED, |
| 63 | TFM_ERROR_NO_ACTIVE_PARTITION, |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 64 | TFM_ERROR_INVALID_EXC_MODE, |
| 65 | TFM_SECURE_LOCK_FAILED, |
| 66 | TFM_SECURE_UNLOCK_FAILED, |
| 67 | TFM_ERROR_GENERIC = 0x1F, |
Mate Toth-Pal | 7de74b5 | 2018-02-23 15:46:47 +0100 | [diff] [blame] | 68 | TFM_PARTITION_SPECIFIC_ERROR_MIN, |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 69 | }; |
| 70 | |
| 71 | //==================== Secure function declarations ==========================// |
| 72 | |
Mate Toth-Pal | ce61afa | 2018-08-03 13:51:01 +0200 | [diff] [blame] | 73 | /** |
| 74 | * \brief Assign client ID to the current TZ context |
| 75 | * |
| 76 | * \param[in] ns_client_id The client ID to be assigned to the current |
| 77 | * context |
| 78 | * \return TFM_SUCCESS if the client ID assigned successfully, an error code |
| 79 | * according to \ref tfm_status_e in case of error. |
| 80 | * |
| 81 | * \note This function have to be called from handler mode. |
| 82 | */ |
| 83 | enum tfm_status_e tfm_register_client_id (int32_t ns_client_id); |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 84 | |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 85 | /** |
Edison Ai | b3e5696 | 2018-09-04 19:12:31 +0800 | [diff] [blame] | 86 | * \brief Retrieve the version of the PSA Framework API that is implemented |
| 87 | * |
| 88 | * \return The version of the PSA Framework |
| 89 | */ |
| 90 | uint32_t tfm_psa_framework_version_veneer(void); |
| 91 | |
| 92 | /** |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 93 | * \brief Return version of secure function provided by secure binary |
| 94 | * |
| 95 | * \param[in] sid ID of secure service |
| 96 | * |
| 97 | * \return Version number of secure function |
| 98 | */ |
| 99 | uint32_t tfm_psa_version_veneer(uint32_t sid); |
| 100 | |
| 101 | /** |
| 102 | * \brief Connect to secure function |
| 103 | * |
| 104 | * \param[in] sid ID of secure service |
| 105 | * \param[in] minor_version Minor version of SF requested by client |
| 106 | * |
| 107 | * \return Returns handle to connection |
| 108 | */ |
| 109 | psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t minor_version); |
| 110 | |
| 111 | /** |
| 112 | * \brief Call a secure function referenced by a connection handle |
| 113 | * |
| 114 | * \param[in] handle Handle to connection |
| 115 | * \param[in] in_vecs invec containing pointer/count of input vectors |
| 116 | * \param[in] out_vecs invec containing pointer/count of output vectors |
| 117 | * |
Edison Ai | b3e5696 | 2018-09-04 19:12:31 +0800 | [diff] [blame] | 118 | * \return Returns \ref psa_status_t status code |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 119 | */ |
Edison Ai | b3e5696 | 2018-09-04 19:12:31 +0800 | [diff] [blame] | 120 | psa_status_t tfm_psa_call_veneer(psa_handle_t handle, |
| 121 | const psa_invec *in_vecs, |
| 122 | const psa_invec *out_vecs); |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 123 | |
| 124 | /** |
| 125 | * \brief Close connection to secure function referenced by a connection handle |
| 126 | * |
| 127 | * \param[in] handle Handle to connection |
| 128 | * |
Edison Ai | b3e5696 | 2018-09-04 19:12:31 +0800 | [diff] [blame] | 129 | * \return Returns \ref psa_status_t status code |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 130 | */ |
Edison Ai | b3e5696 | 2018-09-04 19:12:31 +0800 | [diff] [blame] | 131 | psa_status_t tfm_psa_close_veneer(psa_handle_t handle); |
Miklos Balint | 87da251 | 2018-04-19 13:45:50 +0200 | [diff] [blame] | 132 | |
Ashutosh Singh | f4d8867 | 2017-11-29 13:35:43 +0000 | [diff] [blame] | 133 | //================ End Secure function declarations ==========================// |
| 134 | |
| 135 | #ifdef __cplusplus |
| 136 | } |
| 137 | #endif |
| 138 | |
| 139 | #endif /* __TFM_API_H__ */ |