Merge remote-tracking branch 'feature-ipc' into 'master'

* Remote feature-ipc: (31 commits)
  Platform: Correct region name
  Core: Add ZI and RW regions for seucre data in memory check
  Core: free connection handle in psa_reply
  Core: Support set reverse handle during connecting
  Core: Fix thread list handling
  Core: Config isolation for partitions with PSA API
  Core: Implement the IPC Secure Client API
  Core: Implement PSA service functions
  Core: Add memory check function for IPC
  Core: Adapt PSA API veneer with implemented handler
  Platform: Align region name in armclang and gcc
  Core: Add secure partition manager for IPC
  Core: Enhance manifest to align with PSA
  Core: Add IPC Client and Service Secure Partition
  Core: Add list, message queue, and pool functions
  Core: Fundamental components for secure IPC
  Core: Update IPC implementation framework
  Core: Align with PSA FF specification 1.0-beta-0
  Crypto: Conditional reference PSA types by PSA FF version
  Cmake: Disable regression tests for IPC configuration
  ...

Change-Id: I6527765ab71fe30e7e9fe93c705d899730970789
Signed-off-by: Edison Ai <edison.ai@arm.com>
diff --git a/interface/include/psa_client.h b/interface/include/psa_client.h
index 9fe25d9..71adb80 100644
--- a/interface/include/psa_client.h
+++ b/interface/include/psa_client.h
@@ -15,117 +15,125 @@
 #include <stdint.h>
 #include <stddef.h>
 
-/* ******** ******** PSA Common API ******** ******** */
+/*********************** PSA Client Macros and Types *************************/
 
-/* FixMe: PSA FF v0.9 has not been released. All PSA API subject to change */
-#define PSA_FRAMEWORK_VERSION  (0x0009)
+#define PSA_FRAMEWORK_VERSION  (0x0100)
 
 #define PSA_VERSION_NONE       (0)
 
 /* PSA response types */
 #define PSA_SUCCESS            (0)
 #define PSA_CONNECTION_REFUSED (INT32_MIN + 1)
+#define PSA_CONNECTION_BUSY    (INT32_MIN + 2)
 #define PSA_DROP_CONNECTION    (INT32_MIN)
 
 /* PSA message handles */
 #define PSA_NULL_HANDLE        ((psa_handle_t)0)
 
-typedef int32_t psa_error_t;
-typedef int32_t psa_handle_t;
 typedef int32_t psa_status_t;
+typedef int32_t psa_handle_t;
 
 /**
- * A read-only input memory region provided to a RoT Service.
+ * A read-only input memory region provided to an RoT Service.
  */
 typedef struct psa_invec {
-    const void *base;   /*!< the start address of the memory buffer */
-    size_t len;         /*!< the size in bytes */
+    const void *base;           /*!< the start address of the memory buffer */
+    size_t len;                 /*!< the size in bytes                      */
 } psa_invec;
 
 /**
- * A writable output memory region provided to a RoT Service.
+ * A writable output memory region provided to an RoT Service.
  */
 typedef struct psa_outvec {
-    void *base;         /*!< the start address of the memory buffer */
-    size_t len;         /*!< the size in bytes */
+    void *base;                 /*!< the start address of the memory buffer */
+    size_t len;                 /*!< the size in bytes                      */
 } psa_outvec;
 
+/*************************** PSA Client API **********************************/
+
 /**
  * \brief Retrieve the version of the PSA Framework API that is implemented.
  *
- * \return The version of the PSA Framework implementation that is providing
- *         the runtime services to the caller.
- * \return The major and minor version are encoded as follows:
- * \arg    version[15:8] -- major version number
- * \arg    version[7:0]  -- minor version number
+ * \return version              The version of the PSA Framework implementation
+ *                              that is providing the runtime services to the
+ *                              caller. The major and minor version are encoded
+ *                              as follows:
+ * \arg                           version[15:8] -- major version number.
+ * \arg                           version[7:0]  -- minor version number.
  */
 uint32_t psa_framework_version(void);
 
-/* ******** ******** PSA Client API ******** ******** */
-
 /**
- * \brief Retrieve the minor version of a RoT Service or indicate that
- *        it is not present on this system.
+ * \brief Retrieve the minor version of an RoT Service or indicate that it is
+ *        not present on this system.
  *
- * \param[in] sid              ID of the RoT Service to query
+ * \param[in] sid               ID of the RoT Service to query.
  *
- * \retval PSA_VERSION_NONE    The RoT Service is not implemented, or the
- *                             caller is not permitted to access the service
- * \retval >0                  The minor version of the implemented RoT Service
+ * \retval PSA_VERSION_NONE     The RoT Service is not implemented, or the
+ *                              caller is not permitted to access the service.
+ * \retval > 0                  The minor version of the implemented RoT
+ *                              Service.
  */
 uint32_t psa_version(uint32_t sid);
 
 /**
- * \brief Connect to a RoT Service by its SID.
+ * \brief Connect to an RoT Service by its SID.
  *
- * \param[in] sid                 ID of the RoT Service to connect to
- * \param[in] minor_version       Requested version of the RoT Service
+ * \param[in] sid               ID of the RoT Service to connect to.
+ * \param[in] minor_version     Requested version of the RoT Service.
  *
- * \retval >0                     A handle for the connection
- * \retval PSA_CONNECTION_REFUSED The RoT Service has refused the connection
- * \retval "Does not return"      The RoT Service ID and version are not
- *                                supported, or the caller is not permitted
- *                                to access the service
+ * \retval > 0                  A handle for the connection.
+ * \retval PSA_CONNECTION_REFUSED The SPM or RoT Service has refused the
+ *                              connection.
+ * \retval PSA_CONNECTION_BUSY  The SPM or RoT Service cannot make the
+ *                              connection at the moment.
+ * \retval "Does not return"    The RoT Service ID and version are not
+ *                              supported, or the caller is not permitted to
+ *                              access the service.
  */
 psa_handle_t psa_connect(uint32_t sid, uint32_t minor_version);
 
 /**
- * \brief Calls a RoT Service on an established connection.
+ * \brief Call an RoT Service on an established connection.
  *
- * \param[in] handle           A handle to an established connection
- * \param[in] in_vec           Array of input \ref psa_invec structures
- * \param[in] in_len           Number of input \ref psa_invec structures
- * \param[in] out_vec          Array of input \ref psa_outvec structures
- * \param[in] out_len          Number of input \ref psa_outvec structures
+ * \param[in] handle            A handle to an established connection.
+ * \param[in] in_vec            Array of input \ref psa_invec structures.
+ * \param[in] in_len            Number of input \ref psa_invec structures.
+ * \param[in/out] out_vec       Array of output \ref psa_outvec structures.
+ * \param[in] out_len           Number of output \ref psa_outvec structures.
  *
- * \retval >=0                 Application-specific return code
- * \retval <0                  Application-specific error code
- * \retval PSA_DROP_CONNECTION The connection has been dropped by the RoT
- *                             Service. This indicates that either this or
- *                             a previous message was invalid
- * \retval "Does not return"   The call is invalid, one or more of the following
- *                             are true:
- * \arg                          An invalid handle was passed
- * \arg                          An invalid memory reference was provided
- * \arg                          in_len + out_len > PSA_MAX_IOVEC
- * \arg                          The message is unrecognized by the RoT Service
- *                               or incorrectly formatted
+ * \retval >=0                  RoT Service-specific status value.
+ * \retval <0                   RoT Service-specific error code.
+ * \retval PSA_DROP_CONNECTION  The connection has been dropped by the RoT
+ *                              Service. This indicates that either this or
+ *                              a previous message was invalid.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           An invalid handle was passed.
+ * \arg                           The connection is already handling a request.
+ * \arg                           An invalid memory reference was provided.
+ * \arg                           in_len + out_len > PSA_MAX_IOVEC.
+ * \arg                           The message is unrecognized by the RoT
+ *                                Service or incorrectly formatted.
  */
-psa_error_t psa_call(psa_handle_t handle,
-                    const psa_invec *in_vec,
-                    size_t in_len,
-                    const psa_outvec *out_vec,
-                    size_t out_len);
+psa_status_t psa_call(psa_handle_t handle,
+                      const psa_invec *in_vec,
+                      size_t in_len,
+                      psa_outvec *out_vec,
+                      size_t out_len);
 
 /**
- * \brief Closes a connection to a RoT Service.
+ * \brief Close a connection to an RoT Service.
  *
- * \param[in] handle         A handle to an established connection, or the
- *                           null handle
+ * \param[in] handle            A handle to an established connection, or the
+ *                              null handle.
  *
- * \retval void              Success
- * \retval "Does not return" An invalid handle was provided that is not the
- *                           null handle
+ * \retval void                 Success.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           An invalid handle was provided that is not
+ *                                the null handle.
+ * \arg                           The connection is handling a request.
  */
 void psa_close(psa_handle_t handle);
 
diff --git a/interface/include/psa_service.h b/interface/include/psa_service.h
index e27b420..6453aed 100644
--- a/interface/include/psa_service.h
+++ b/interface/include/psa_service.h
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2018, Arm Limited. All rights reserved.
+ * Copyright (c) 2018-2019, Arm Limited. All rights reserved.
  *
  * SPDX-License-Identifier: BSD-3-Clause
  *
@@ -14,11 +14,16 @@
 
 #include <inttypes.h>
 
+/********************** PSA Secure Partition Macros and Types ****************/
+
 /* PSA wait timeouts */
 #define PSA_POLL                (0x00000000u)
 #define PSA_BLOCK               (0x80000000u)
 
-/* doorbell signal */
+/* A mask value that includes all Secure Partition signals */
+#define PSA_WAIT_ANY            (~0u)
+
+/* Doorbell signal */
 #define PSA_DOORBELL            (0x00000008u)
 
 /* PSA message types */
@@ -26,225 +31,217 @@
 #define PSA_IPC_CALL            (2)
 #define PSA_IPC_DISCONNECT      (3)
 
-/* PSA response types */
-#define PSA_CONNECTION_ACCEPTED (0)
-
-/* maximum number of input and output vectors */
+/* Maximum number of input and output vectors */
 #define PSA_MAX_IOVEC           (4)
 
+/* Return code from psa_get() */
+#define PSA_ERR_NOMSG           (INT32_MIN + 3)
+
+/* Store a set of one or more Secure Partition signals */
 typedef uint32_t psa_signal_t;
 
 /**
- * Describes a message received by a RoT Service after calling \ref psa_get().
+ * Describe a message received by an RoT Service after calling \ref psa_get().
  */
 typedef struct psa_msg_t {
-    uint32_t type;
-    psa_handle_t handle;
-    void *rhandle;
-    size_t in_size[PSA_MAX_IOVEC];
-    size_t out_size[PSA_MAX_IOVEC];
+    uint32_t type;              /* One of the following values:
+                                 * \ref PSA_IPC_CONNECT
+                                 * \ref PSA_IPC_CALL
+                                 * \ref PSA_IPC_DISCONNECT
+                                 */
+    psa_handle_t handle;        /* A reference generated by the SPM to the
+                                 * message returned by psa_get().
+                                 */
+    int32_t client_id;          /* Partition ID of the sender of the message */
+    void *rhandle;              /* Be useful for binding a connection to some
+                                 * application-specific data or function
+                                 * pointer within the RoT Service
+                                 * implementation.
+                                 */
+    size_t in_size[PSA_MAX_IOVEC]; /* Provide the size of each client input
+                                    * vector in bytes.
+                                    */
+    size_t out_size[PSA_MAX_IOVEC];/* Provide the size of each client output
+                                    * vector in bytes.
+                                    */
 } psa_msg_t;
 
-/* ******** ******** PSA Secure Function API ******** ******** */
+/************************* PSA Secure Partition API **************************/
 
 /**
- * \brief Returns the set of signals that have been asserted for a Sercure
- *        Partition.
+ * \brief Return the Secure Partition interrupt signals that have been asserted
+ *        from a subset of signals provided by the caller.
  *
- * \param[in] timeout   Specify either blocking or polling operation
+ * \param[in] signal_mask       A set of signals to query. Signals that are not
+ *                              in this set will be ignored.
+ * \param[in] timeout           Specify either blocking \ref PSA_BLOCK or
+ *                              polling \ref PSA_POLL operation.
  *
- * \retval >0           At least one signal is asserted
- * \retval 0            No signals are asserted. This is only seen if the
- *                      caller used a polling timeout
+ * \retval >0                   At least one signal is asserted.
+ * \retval 0                    No signals are asserted. This is only seen when
+ *                              a polling timeout is used.
  */
-uint32_t psa_wait_any(uint32_t timeout);
+psa_signal_t psa_wait(psa_signal_t signal_mask, uint32_t timeout);
 
 /**
- * \brief Returns the Secure Partition interrupt signals that have been
- *        asserted from the subset of signals indicated in the bitmask provided.
- *
- * \param[in] signal_mask    A set of interrupt and doorbell signals to query.
- *                           Signals that are not in this set will be ignored
- * \param[in] timeout        Specify either blocking or polling operation
- *
- * \retval >0                At least one signal is asserted
- * \retval 0                 No signals are asserted. This case is only seen if
- *                           caller used a polling timeout
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                          signal_mask does not include any interrupt or
- *                               doorbell signals
- * \arg                          signal_mask includes one or more RoT Service
- *                               signals
- */
-uint32_t psa_wait_interrupt(psa_signal_t signal_mask, uint32_t timeout);
-
-/**
- * \brief Get the message which corresponds to a given RoT Service signal
+ * \brief Retrieve the message which corresponds to a given RoT Service signal
  *        and remove the message from the RoT Service queue.
  *
- * \param[in]  signal        The signal value for an asserted RoT Service
- * \param[out] msg           Pointer to \ref psa_msg_t object for receiving
- *                           the message
+ * \param[in] signal            The signal value for an asserted RoT Service.
+ * \param[out] msg              Pointer to \ref psa_msg_t object for receiving
+ *                              the message.
  *
- * \retval void              Success
- * \retval "Does not return" The call is invalid because one or more of the
- *                           following are true:
- * \arg                         signal has more than a single bit set
- * \arg                         signal does not correspond to a RoT Service
- * \arg                         The RoT Service signal is not currently asserted
- * \arg                         The msg pointer provided is not a valid memory
- *                              reference
+ * \retval PSA_SUCCESS          Success, *msg will contain the delivered
+ *                              message.
+ * \retval PSA_ERR_NOMSG        Message could not be delivered.
+ * \retval "Does not return"    The call is invalid because one or more of the
+ *                              following are true:
+ * \arg                           signal has more than a single bit set.
+ * \arg                           signal does not correspond to an RoT Service.
+ * \arg                           The RoT Service signal is not currently
+ *                                asserted.
+ * \arg                           The msg pointer provided is not a valid memory
+ *                                reference.
  */
-void psa_get(psa_signal_t signal, psa_msg_t *msg);
+psa_status_t psa_get(psa_signal_t signal, psa_msg_t *msg);
 
 /**
- * \brief Get the Partition ID of the sender of a message.
+ * \brief Associate some RoT Service private data with a client connection.
  *
- * \param[in] msg_handle     Message handle for an incoming message
+ * \param[in] msg_handle        Handle for the client's message.
+ * \param[in] rhandle           Reverse handle allocated by the RoT Service.
  *
- * \retval >0                ID of a Secure Partition
- * \retval <0                ID of an NSPE client
- * \retval "Does not return" msg_handle is invalid
- *
- * \note Bit[31] is set if the caller is from the NSPE.
- */
-int32_t psa_identity(psa_handle_t msg_handle);
-
-/**
- * \brief Associates some caller-provided private data with a specified client
- *        connection.
- *
- * \param[in] msg_handle     Handle for the client's message
- * \param[in] rhandle        Reverse handle allocated by the RoT Service
- *
- * \retval void              Success, rhandle will be provided with all
- *                           subsequent messages delivered on this connection
- * \retval "Does not return" msg_handle is invalid
+ * \retval void                 Success, rhandle will be provided with all
+ *                              subsequent messages delivered on this
+ *                              connection.
+ * \retval "Does not return"    msg_handle is invalid.
  */
 void psa_set_rhandle(psa_handle_t msg_handle, void *rhandle);
 
 /**
- * \brief Read a message parameter or part of a message parameter from the
- *        client input vector.
+ * \brief Read a message parameter or part of a message parameter from a client
+ *        input vector.
  *
- * \param[in]  msg_handle    Handle for the client's message
- * \param[in]  invec_idx     Index of the input vector to read from. Must be
- *                           less than \ref PSA_MAX_IOVEC
- * \param[out] buffer        Buffer in the Secure Partition to copy the
- *                           requested data to
- * \param[in]  num_bytes     Maximum number of bytes to be read from the client
- *                           input vector
+ * \param[in] msg_handle        Handle for the client's message.
+ * \param[in] invec_idx         Index of the input vector to read from. Must be
+ *                              less than \ref PSA_MAX_IOVEC.
+ * \param[out] buffer           Buffer in the Secure Partition to copy the
+ *                              requested data to.
+ * \param[in] num_bytes         Maximum number of bytes to be read from the
+ *                              client input vector.
  *
- * \retval >0                Number of bytes copied
- * \retval 0                 There was no remaining data in this input vector
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                         msg_handle is invalid
- * \arg                         msg_handle does not refer to a \ref PSA_IPC_CALL
- *                              message
- * \arg                         invec_idx is equal to or greater than
- *                              PSA_MAX_IOVEC
- * \arg                         the memory reference for buffer is invalid or
- *                              not writable
+ * \retval >0                   Number of bytes copied.
+ * \retval 0                    There was no remaining data in this input
+ *                              vector.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           msg_handle is invalid.
+ * \arg                           msg_handle does not refer to a
+ *                                \ref PSA_IPC_CALL message.
+ * \arg                           invec_idx is equal to or greater than
+ *                                \ref PSA_MAX_IOVEC.
+ * \arg                           the memory reference for buffer is invalid or
+ *                                not writable.
  */
 size_t psa_read(psa_handle_t msg_handle, uint32_t invec_idx,
-                    void *buffer, size_t num_bytes);
+                void *buffer, size_t num_bytes);
 
 /**
- * \brief Skip a given number of bytes for an input vector.
+ * \brief Skip over part of a client input vector.
  *
- * \param[in] msg_handle     Handle for the client's message
- * \param[in] invec_idx      Index of input vector in message to skip from.
- *                           Must be less than \ref PSA_MAX_IOVEC
- * \param[in] num_bytes      Maximum number of bytes to skip in the client input
- *                           vector
+ * \param[in] msg_handle        Handle for the client's message.
+ * \param[in] invec_idx         Index of input vector to skip from. Must be
+ *                              less than \ref PSA_MAX_IOVEC.
+ * \param[in] num_bytes         Maximum number of bytes to skip in the client
+ *                              input vector.
  *
- * \retval >0                Number of bytes skipped
- * \retval 0                 There was no remaining data in this input vector
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                         msg_handle is invalid
- * \arg                         msg_handle does not refer to a \ref PSA_IPC_CALL
- *                              message
- * \arg                         invec_idx is equal to or greater than
- *                              PSA_MAX_IOVEC
+ * \retval >0                   Number of bytes skipped.
+ * \retval 0                    There was no remaining data in this input
+ *                              vector.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           msg_handle is invalid.
+ * \arg                           msg_handle does not refer to a
+ *                                \ref PSA_IPC_CALL message.
+ * \arg                           invec_idx is equal to or greater than
+ *                                \ref PSA_MAX_IOVEC.
  */
 size_t psa_skip(psa_handle_t msg_handle, uint32_t invec_idx, size_t num_bytes);
 
 /**
- * \brief Write a message response to the client output vector.
+ * \brief Write a message response to a client output vector.
  *
- * \param[in]  msg_handle    Handle for the client's message
- * \param[out] outvec_idx    Index of output vector in message to write to.
- *                           Must be less than \ref PSA_MAX_IOVEC
- * \param[in]  buffer        Buffer with the data to write
- * \param[in]  num_bytes     Number of bytes to write to the client output
- *                           vector
+ * \param[in] msg_handle        Handle for the client's message.
+ * \param[out] outvec_idx       Index of output vector in message to write to.
+ *                              Must be less than \ref PSA_MAX_IOVEC.
+ * \param[in] buffer            Buffer with the data to write.
+ * \param[in] num_bytes         Number of bytes to write to the client output
+ *                              vector.
  *
- * \retval void              Success
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                         msg_handle is invalid
- * \arg                         msg_handle does not refer to a \ref PSA_IPC_CALL
- *                              message
- * \arg                         outvec_idx is equal to or greater than
- *                              \ref PSA_MAX_IOVEC
- * \arg                         the memory reference for buffer is invalid
- * \arg                         the call attempts to write data past the end of
- *                              the client output vector
+ * \retval void                 Success
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           msg_handle is invalid.
+ * \arg                           msg_handle does not refer to a
+ *                                \ref PSA_IPC_CALL message.
+ * \arg                           outvec_idx is equal to or greater than
+ *                                \ref PSA_MAX_IOVEC.
+ * \arg                           The memory reference for buffer is invalid.
+ * \arg                           The call attempts to write data past the end
+ *                                of the client output vector.
  */
 void psa_write(psa_handle_t msg_handle, uint32_t outvec_idx,
-                    const void *buffer, size_t num_bytes);
+               const void *buffer, size_t num_bytes);
 
 /**
- * \brief Completes handling of a specific message and unblocks the client.
+ * \brief Complete handling of a specific message and unblock the client.
  *
- * \param[in] msg_handle     Handle for the client's message or the null handle
- * \param[in] retval         Return value to be reported to the client
+ * \param[in] msg_handle        Handle for the client's message.
+ * \param[in] status            Message result value to be reported to the
+ *                              client.
  *
- * \retval void              Success
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                         msg_handle is invalid and is not the null handle
- * \arg                         An invalid return code is specified for the type
- *                              of message
+ * \retval void                 Success.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                         msg_handle is invalid.
+ * \arg                         An invalid status code is specified for the
+ *                              type of message.
  */
-void psa_end(psa_handle_t msg_handle, psa_error_t retval);
+void psa_reply(psa_handle_t msg_handle, psa_status_t status);
 
 /**
- * \brief Sends a PSA_DOORBELL signal to a specific Secure Partition.
+ * \brief Send a PSA_DOORBELL signal to a specific Secure Partition.
  *
- * \param[in] partition_id   Secure Partition ID of the target partition
+ * \param[in] partition_id      Secure Partition ID of the target partition.
  *
- * \retval void              Success
- * \retval "Does not return" partition_id does not correspond to a Secure
- *                           Partition
+ * \retval void                 Success.
+ * \retval "Does not return"    partition_id does not correspond to a Secure
+ *                              Partition.
  */
 void psa_notify(int32_t partition_id);
 
 /**
- * \brief Clears the PSA_DOORBELL signal.
+ * \brief Clear the PSA_DOORBELL signal.
  *
- * \retval void              Success
- * \retval "Does not return" The Secure Partition's doorbell signal is not
- *                           currently asserted
+ * \retval void                 Success.
+ * \retval "Does not return"    The Secure Partition's doorbell signal is not
+ *                              currently asserted.
  */
 void psa_clear(void);
 
 /**
- * \brief Informs the SPM that an interrupt has been handled (end of interrupt).
+ * \brief Inform the SPM that an interrupt has been handled (end of interrupt).
  *
- * \param[in] irq_signal     The interrupt signal that has been processed
+ * \param[in] irq_signal        The interrupt signal that has been processed.
  *
- * \retval void              Success
- * \retval "Does not return" The call is invalid, one or more of the following
- *                           are true:
- * \arg                         irq_signal is not an interrupt signal
- * \arg                         irq_signal indicates more than one signal
- * \arg                         irq_signal is not currently asserted
+ * \retval void                 Success.
+ * \retval "Does not return"    The call is invalid, one or more of the
+ *                              following are true:
+ * \arg                           irq_signal is not an interrupt signal.
+ * \arg                           irq_signal indicates more than one signal.
+ * \arg                           irq_signal is not currently asserted.
  */
-void psa_eoi(uint32_t irq_signal);
+void psa_eoi(psa_signal_t irq_signal);
 
 #ifdef __cplusplus
 }
diff --git a/interface/include/tfm_api.h b/interface/include/tfm_api.h
index be36e2e..2ba93c0 100644
--- a/interface/include/tfm_api.h
+++ b/interface/include/tfm_api.h
@@ -13,7 +13,6 @@
 #endif
 
 #include <stdint.h>
-
 #include "psa_client.h"
 
 #define TFM_INVALID_CLIENT_ID 0
@@ -80,6 +79,54 @@
  */
 enum tfm_status_e tfm_register_client_id (int32_t ns_client_id);
 
+/**
+ * \brief Retrieve the version of the PSA Framework API that is implemented
+ *
+ * \return The version of the PSA Framework
+ */
+uint32_t tfm_psa_framework_version_veneer(void);
+
+/**
+ * \brief Return version of secure function provided by secure binary
+ *
+ * \param[in]  sid          ID of secure service
+ *
+ * \return Version number of secure function
+ */
+uint32_t tfm_psa_version_veneer(uint32_t sid);
+
+/**
+ * \brief Connect to secure function
+ *
+ * \param[in]  sid              ID of secure service
+ * \param[in]  minor_version    Minor version of SF requested by client
+ *
+ * \return Returns handle to connection
+ */
+psa_handle_t tfm_psa_connect_veneer(uint32_t sid, uint32_t minor_version);
+
+/**
+ * \brief Call a secure function referenced by a connection handle
+ *
+ * \param[in]  handle   Handle to connection
+ * \param[in]  in_vecs  invec containing pointer/count of input vectors
+ * \param[in]  out_vecs invec containing pointer/count of output vectors
+ *
+ * \return Returns \ref psa_status_t status code
+ */
+psa_status_t tfm_psa_call_veneer(psa_handle_t handle,
+                                 const psa_invec *in_vecs,
+                                 const psa_invec *out_vecs);
+
+/**
+ * \brief Close connection to secure function referenced by a connection handle
+ *
+ * \param[in]  handle   Handle to connection
+ *
+ * \return Returns \ref psa_status_t status code
+ */
+psa_status_t tfm_psa_close_veneer(psa_handle_t handle);
+
 //================ End Secure function declarations ==========================//
 
 #ifdef __cplusplus
diff --git a/interface/include/tfm_veneers.h b/interface/include/tfm_veneers.h
index c238b35..966d8c1 100644
--- a/interface/include/tfm_veneers.h
+++ b/interface/include/tfm_veneers.h
@@ -35,6 +35,14 @@
 psa_status_t tfm_tfm_crypto_destroy_key_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_get_key_information_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_export_key_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_key_policy_init_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_key_policy_set_usage_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_key_policy_get_usage_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_key_policy_get_algorithm_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_set_key_policy_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_get_key_policy_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_get_key_lifetime_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_set_key_lifetime_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_cipher_set_iv_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_cipher_encrypt_setup_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_cipher_decrypt_setup_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
@@ -46,6 +54,14 @@
 psa_status_t tfm_tfm_crypto_hash_finish_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_hash_verify_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 psa_status_t tfm_tfm_crypto_hash_abort_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_sign_setup_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_verify_setup_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_update_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_sign_finish_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_verify_finish_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_mac_abort_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_aead_decrypt_wrapper_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
+psa_status_t tfm_tfm_crypto_aead_encrypt_wrapper_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 
 /******** TFM_SP_PLATFORM ********/
 psa_status_t tfm_platform_sp_system_reset_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
@@ -74,6 +90,14 @@
 psa_status_t tfm_tfm_secure_client_service_sfn_run_tests_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 #endif /* TFM_PARTITION_TEST_SECURE_SERVICES */
 
+#ifdef TFM_PSA_API
+/******** TFM_SP_IPC_SERVICE_TEST ********/
+#endif /* TFM_PSA_API */
+
+#ifdef TFM_PSA_API
+/******** TFM_SP_IPC_CLIENT_TEST ********/
+#endif /* TFM_PSA_API */
+
 #ifdef __cplusplus
 }
 #endif
diff --git a/interface/include/tfm_veneers.h.template b/interface/include/tfm_veneers.h.template
index 4a5727c..78829fa 100644
--- a/interface/include/tfm_veneers.h.template
+++ b/interface/include/tfm_veneers.h.template
@@ -20,7 +20,7 @@
 @!GENERATOR_CONDITIONAL_START!@ @@attr.conditional@@
 #ifdef @@attr.conditional@@
 @!GENERATOR_CONDITIONAL_END!@
-/******** @@manifest.tfm_partition_name@@ ********/
+/******** @@manifest.name@@ ********/
 psa_status_t tfm_@@manifest.secure_functions.tfm_symbol@@_veneer(struct psa_invec *in_vec, size_t in_len, struct psa_outvec *out_vec, size_t out_len);
 @!GENERATOR_CONDITIONAL_START!@ @@attr.conditional@@
 #endif /* @@attr.conditional@@ */