itayzafrir
9bc8bcf0d2
Unify sections titles/comments & fix typo in comment
2019-03-12 11:35:35 +02:00
itayzafrir
5c48d58389
Set handle to PSA_NULL_HANDLE when closing IPC connection
2019-03-12 11:35:34 +02:00
itayzafrir
bf05154461
Use PSA_NULL_HANDLE when testing for invalid handles
2019-03-12 10:53:13 +02:00
itayzafrir
caafc34695
Use psa prefix for crypto.h include
2019-03-12 10:51:31 +02:00
Martin Kojtal
83d70199d1
Merge pull request #10027 from kfnta/tfm_fix_ftype
...
TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
2019-03-11 15:48:49 +01:00
itayzafrir
7a15865e8b
Refactor crypto service proxy
2019-03-11 16:21:34 +02:00
Michael Schwarcz
134a169e35
TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
...
- Fix failing attestation test on LPC55S69
- Link to bug tracking: https://developer.trustedfirmware.org/T276
2019-03-11 11:10:14 +02:00
Alexander Zilberkant
661613c998
Rename psa_system_reset to mbed_psa_system_reset
...
add noreturn attributes
update lifecycle service to use psa/error.h
fix doxygen
2019-03-11 10:43:19 +02:00
Martin Kojtal
5c79394756
Merge pull request #10023 from itayzafrir/crypto-compliance-tests-fix
...
Fix crypto compliance tests
2019-03-11 09:20:36 +01:00
itayzafrir
ea36a89ec7
Fix crypto compliance tests
...
Prevent passing null buffer with size which is non-zero.
2019-03-10 15:47:07 +02:00
Oren Cohen
d0021b5de7
Fix error codes for psa_attestation_inject_key
2019-03-10 10:53:38 +02:00
Martin Kojtal
b9c214b165
Merge pull request #10002 from kegilbert/psa_baremetal_fix
...
Disable PSA in baremetal profiles
2019-03-08 21:15:30 +01:00
Martin Kojtal
820a2e284d
Merge pull request #9908 from morser499/pr/cy-mbed-os-5.12.0
...
Pr/cy mbed os 5.12.0
2019-03-08 11:01:41 +01:00
Cruz Monrreal
57ec1d57b9
Merge pull request #9990 from kfnta/sync_complinace_test_to_latest
...
Sync PSA compliance test to latest version
2019-03-07 23:36:56 -06:00
kegilbert
3fd32884c3
Allow baremetal to build by removing PSA
2019-03-07 16:41:58 -06:00
Ryan Morse
20c2734e7b
Fixed issue with wrong floating point literal
2019-03-07 08:40:20 -08:00
Cruz Monrreal
ff78bc4b7c
Merge pull request #9973 from kfnta/tfm_num_threads
...
TF-M config: Add max_ns_thread_count parameter
2019-03-07 10:28:11 -06:00
Nir Sonnenschein
d473f6d59c
synchronize latest fix to tests
...
synchronize latest fix to test_c043
2019-03-07 17:49:52 +02:00
Cruz Monrreal
a87c7c82f3
Merge pull request #9312 from kfnta/psa_compliance
...
PSA compliance tests suite
2019-03-07 09:14:58 -06:00
Oren Cohen
dbd91bc4e0
Remove unused type which was conflicting wiith errno.h
2019-03-07 14:01:51 +02:00
Michael Schwarcz
14aa347040
TF-M config: Add max_ns_thread_count parameter
2019-03-07 12:18:19 +02:00
Cruz Monrreal
63242cfbb4
Merge pull request #9939 from kfnta/fix_for_secure_partition
...
Fix for secure partition
2019-03-06 20:00:38 -06:00
Cruz Monrreal
254650c03f
Merge pull request #9956 from moranpeker/attestation_doxy
...
Add attestation doxygen
2019-03-06 16:36:00 -06:00
Michael Schwarcz
730e9b83b7
TF-M: Increase TFM_SPM_MAX_ROT_SERV_NUM from 30 to 32
2019-03-06 16:43:09 +02:00
Moran Peker
c0633e56b1
Attestation doxygen
2019-03-06 15:39:08 +02:00
Nir Sonnenschein
c437c9f0b8
use common flag to allow test 3 for PS and ITS
...
add a compilation flag to allow tests which fill up the entire device storage.
storage test 003 (for both PS and its) is unsuitable for the regular CI because:
1. it takes a long time causing timeouts
2. it places a very high attrition load on the storage of the CI boards
and this can cause them to fail much sooner.
2019-03-06 10:53:57 +02:00
Martin Kojtal
bb61ea1433
Merge pull request #9917 from kfnta/attest_doxy
...
Add attestation doxygen
2019-03-06 09:14:26 +01:00
Nir Sonnenschein
172fd650a2
Fix for resource leak in crypto compliance test 43
...
Destroy key after import key in a loop
2019-03-05 17:10:27 +02:00
Nir Sonnenschein
95d0c4d38d
Define psa_storage_info_t for backward compatibility
2019-03-05 17:07:51 +02:00
Netanel Gonen
2982907e37
rework for mbed-os intf for ACK tests
...
-rework test wrapper functions to simplify test main
-move greentea init before test setup code to avoid boards losing sync.
2019-03-05 17:07:34 +02:00
Nir Sonnenschein
f106718366
indentation fix
2019-03-05 15:52:41 +02:00
Nir Sonnenschein
4412e39a72
fix resource leaks
2019-03-05 15:07:14 +02:00
Alon
0d550eeeb6
Fix crypto service get key info out params
2019-03-05 14:57:24 +02:00
Veijo Pesonen
50984e5d2d
ESP8266: makes usable channels runtime configurable
2019-03-05 10:40:22 +02:00
Veijo Pesonen
eb27a23641
ESP8266: Exposes country code config API
2019-03-05 10:40:21 +02:00
Veijo Pesonen
96247dd76a
ESP8266: sets hardcoded country code(CC) policy to track AP's CC
2019-03-05 10:40:21 +02:00
Martin Kojtal
5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
...
Update TF-M sources
2019-03-04 10:53:12 +01:00
Veijo Pesonen
c9eaa07236
ESP8266: astyle, remove from the .astyleignore-file
2019-03-04 09:38:20 +02:00
Nir Sonnenschein
16a59cb992
Allow PS test03 with PS_ALLOW_ENTIRE_STORAGE_FILL flag
2019-03-03 22:51:43 +02:00
Nir Sonnenschein
1650a923eb
add main functions to each compliance test
...
add main function to each compliance test , moving shared code to a common file
2019-03-03 22:50:59 +02:00
Oren Cohen
064dc7d154
Attestation doxygen
2019-03-03 18:46:20 +02:00
Michael Schwarcz
7a2c7d7df4
TF-M patch: Fix tfm_memory_check issue (TF-M issue #224 )
...
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz
749faa6534
TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T236
(cherry picked from commit 008bf1b2d1
)
2019-03-03 16:47:47 +02:00
Michael Schwarcz
8a087a6504
TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T241
(cherry picked from commit da01e3411f
)
2019-03-03 16:47:41 +02:00
Michael Schwarcz
ea8bff57b1
TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T240
(cherry picked from commit fc78640559
)
2019-03-03 16:47:34 +02:00
Michael Schwarcz
03dbd4bb28
TF-M patch: Fix service handles not cleared issue (TF-M issue #230 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T230
(cherry picked from commit 0c23e86989
)
2019-03-03 16:47:28 +02:00
Michael Schwarcz
87f22efcb5
TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T239
(cherry picked from commit 5f2e4b3911
)
2019-03-03 16:47:22 +02:00
Michael Schwarcz
71cd34df32
TF-M patch: General modifications
...
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef
(cherry picked from commit 1f30b52488
)
2019-03-03 16:47:17 +02:00
Michael Schwarcz
823e5a2a7f
[trusted-firmware-m]: Updated to f876e5c
2019-03-03 16:47:11 +02:00
Nir Sonnenschein
67ada4404f
Delete unneeded .mk files after test import
...
delete unneeded .mk files imported as part of the PSA compliance test suite
2019-03-03 16:16:54 +02:00
Nir Sonnenschein
b64fb53d43
[api-tests]: Updated to cb58d2c
2019-03-03 15:51:26 +02:00
Oren Cohen
cfb60ec955
Fixes
...
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz
8fefa25a84
TF-M: Remove not-used platform headers
2019-03-03 10:55:47 +02:00
Michael Schwarcz
b62c48977f
Review fixes
2019-03-03 10:55:46 +02:00
Michael Schwarcz
20d7f817df
Fix astyle
2019-03-03 10:55:46 +02:00
Michael Schwarcz
98efb44ea8
Remove another psa_identity
2019-03-03 10:55:46 +02:00
Michael Schwarcz
ef76ec83ee
Generate psa_manifest/sid.h
2019-03-03 10:55:46 +02:00
Oren Cohen
798e3c393a
Call tfm_panic for SPM_PANIC
2019-03-03 10:55:45 +02:00
Michael Schwarcz
faf5fcf795
Fix typo
2019-03-03 10:55:45 +02:00
Oren Cohen
0e74e09e56
Set default PSA client header for single v7 targets
2019-03-03 10:55:45 +02:00
Oren Cohen
737a3cc350
Advance to PSA-FF 1.0
2019-03-03 10:55:45 +02:00
Oren Cohen
bd9a738473
Move SPM_PANIC to psa/service.h
2019-03-03 10:55:44 +02:00
Oren Cohen
306a51f6c0
Update psa_get() to return psa_status_t
2019-03-03 10:55:44 +02:00
Michael Schwarcz
f9fbd6ae82
Align PSA SPM tests to TF-M
2019-03-03 10:55:42 +02:00
Oren Cohen
483b23c318
Fix SPM warnings
2019-03-03 10:54:55 +02:00
Oren Cohen
dfbc7b6b7a
Adapt partitons
2019-03-03 10:54:54 +02:00
Oren Cohen
aad114aa55
Genrerate SPM data
2019-03-03 10:54:54 +02:00
Oren Cohen
21d09b4156
Unify flags
2019-03-03 10:54:53 +02:00
Oren Cohen
a65baf55c6
Update psa_wait() and client_id
2019-03-03 10:54:53 +02:00
Kevin Bracey
c368021e37
SPIFBlockDevice.h: include SingletonPtr.h
...
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.
Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal
9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
...
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal
befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
...
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal
b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
...
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal
b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
...
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker
83d084afef
add casting to increased void pointer
2019-02-28 20:30:05 +02:00
Martin Kojtal
211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
...
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker
116e14ade6
change license to file that mostly based on TF-M implementation
...
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker
2b8621aa6c
initialized psa_hash_operation_t to zeros before calling hash_setup
...
-initialized psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker
6346442f03
Add SW_SIGNER_ID data to boot status
2019-02-28 15:52:16 +02:00
Moran Peker
bca8091e52
astyle fix
2019-02-28 14:13:24 +02:00
Veijo Pesonen
7bb887fef4
ESP8266: in unknown network state driver tries to disconnect
2019-02-28 12:44:49 +02:00
itayzafrir
362c307d84
Free dynamic memory in crypto proxy
2019-02-28 11:36:31 +02:00
Moran Peker
49c6a1caaf
fix void pointer increasing with bytes
2019-02-28 11:17:31 +02:00
avolinski
e4c7144355
Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy
2019-02-27 18:57:58 +02:00
Moran Peker
b847138819
astyle fix
2019-02-27 16:33:06 +02:00
Martin Kojtal
7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
...
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker
97a9652f3f
Use less stack
2019-02-27 15:34:22 +02:00
Moran Peker
4a2b06ed0d
Remove includes from mbedtls
2019-02-27 15:04:28 +02:00
Moran Peker
6e3d238ffd
Styling
2019-02-27 15:03:45 +02:00
Moran Peker
47f59b16cb
Correct psa-crypto include
2019-02-27 15:02:47 +02:00
Arto Kinnunen
05dc1f2f0e
Sync STM S2LP RF driver to v0.0.2
...
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
e8225fbd7c
Sync with STM S2LP RF driver v0.0.1
...
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
2c78427932
Sync with MCR20a RF driver v1.0.3
...
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen
3a9a50a7d7
Sync with Atmel RF driver v3.0.6
...
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker
89ac1075df
Documented any non apache files
2019-02-27 14:14:45 +02:00
Moran Peker
7dd58b99cc
Add free to allocated buffer while error
2019-02-27 14:14:33 +02:00
Moran Peker
a268b81a57
Remove extra buffers used
...
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker
25fa5a6138
Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
...
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker
c97cecc273
Update TFM attestation code to latest version
...
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd
- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker
2810d369f9
Remove incorrect free place
2019-02-27 14:14:29 +02:00
Moran Peker
661e2f92aa
Remove header files from inc into services/attestation folder
2019-02-27 14:14:29 +02:00
Moran Peker
f02f6e3cf9
Add newline at end of file and remove un needed commant
2019-02-27 14:14:28 +02:00
Moran Peker
92a9b3f736
Remove calling to "psa_crypto_init()"
...
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker
2e7738b8eb
astyle fix
2019-02-27 14:14:27 +02:00
Moran Peker
41bd381462
General fixes of spelling, newline, un needed code
...
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker
de3ee8e376
Using goto exit in attest_public_key_sha256 function
2019-02-27 14:14:26 +02:00
Moran Peker
d3c9860360
Free allocated buffers
2019-02-27 14:14:26 +02:00
Moran Peker
d9b22da91d
Remove calling to psa_crypto_init
...
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker
aa5b79a480
generated file update
2019-02-27 14:14:24 +02:00
Moran Peker
e60af99edb
Attestation: Add comments from temporary data
2019-02-27 14:14:24 +02:00
Moran Peker
2720b5a73d
Update include psa_defs -> psa/client
2019-02-27 14:14:23 +02:00
Moran Peker
f8e4626098
Attestation: move t_code folder place
2019-02-27 14:14:22 +02:00
Moran Peker
b3c6f709ca
Attestation: move qcbor folder place
2019-02-27 14:14:21 +02:00
Moran Peker
bd7061eaba
Attestation: Add close key after open key
2019-02-27 14:14:20 +02:00
Moran Peker
715305accf
Attestation: update boot status data
...
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker
e0c5df50be
Attestation: Add parameter and entry size checks
2019-02-27 14:14:19 +02:00
Moran Peker
773fa44205
Update attestation asymmetric sign to use deterministic alg
...
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker
70a14b2f3a
Update to last version of TFM-Attesttaion code
...
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker
2117a26cb1
Get security lifecycle by psa_security_lifecycle_state function
...
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker
4101ee92df
Add checks ,initialization,remove unneeded code and files license update
2019-02-27 14:14:14 +02:00
Moran Peker
080f4f4e69
Attestation: Update iat claims data
...
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker
636753b404
Attestation: Add a new define for attestation private key id
2019-02-27 14:14:13 +02:00
Moran Peker
0a0bb04dfa
Attestation: Change files license to Apache
...
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker
8fc9c8fdab
Attestation: astyle fixs
...
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker
a994499bf3
Atteststaion: Update header files
...
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker
5f45b0af92
Attestation: aut- generated files by generate_partition_code.py
...
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker
9a4ea3d319
Add PSA Initial Attestation service
...
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.
-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal
6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
...
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal
5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
...
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen
688a4e42bc
ESP8266: recv() is able to handle device busy indication
2019-02-27 09:54:43 +02:00
Cruz Monrreal
d96c9e8800
Merge pull request #9862 from netanelgonen/backward_support_its
...
Backward support PSA_ITS
2019-02-26 23:32:58 -06:00
Cruz Monrreal
d29312e7ac
Merge pull request #9808 from ARMmbed/feature-iar8
...
IAR 8 feature branch merge
2019-02-26 15:30:27 -06:00
Netanel Gonen
3e89a05e0b
add invalid argument incase receiving uid==0
2019-02-26 18:35:38 +02:00
Amir Cohen
5c7f6cb755
Merge SPIF & QSPIF components test to general block device tests
...
The SPIF and QPIF components tests are fully merged into general block device tests and were deleted
2019-02-26 10:28:45 -06:00
Netanel Gonen
d2eb2e4eb5
add backward support to error values
2019-02-26 18:27:15 +02:00
Deepika
d2e11966fc
Revert "rand() by default does increment of 1, randomizing more"
...
This reverts commit f7a6d254f6
.
2019-02-26 09:21:19 -06:00
itayzafrir
fc2b0726b6
Remove duplicate inclusion of header files
...
Remove duplicate inclusion of psa/client.h and psa/service.h
2019-02-26 12:30:20 +02:00
itayzafrir
ca94dc8673
Define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
...
This enables crypto encoding an owner in key file IDs.
Added a static assert check in client side proxy.
2019-02-26 12:30:20 +02:00
itayzafrir
3992b83a52
crypto service: Assemble bit crypto key ids
2019-02-26 12:30:20 +02:00
itayzafrir
2b9b29455f
crypto service: Remove unused IPC argument and unneeded casts
2019-02-26 12:27:55 +02:00
Veijo Pesonen
2e5d1d959b
ESP8266: halts if unable to add an event to the event queue
2019-02-26 09:44:15 +02:00
Cruz Monrreal
15ccb32d31
Merge pull request #9836 from kfnta/tfm_patch
...
TF-M: Fix issues found in SPM tests
2019-02-25 19:58:38 -06:00
Cruz Monrreal
ed350dc533
Merge pull request #9758 from NirSonnenschein/large_buffer_support_for_hash_and_mac
...
allow hash or mac on large buffers with less memory use
2019-02-25 10:34:14 -06:00
Edison Ai
ebc961dab8
TF-M patch: Free connection handle in psa_reply (TF-M issue #263 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T263
2019-02-25 14:35:21 +02:00
Netanel Gonen
b5b0e981f8
reopening #9754 after the changes where overrun
...
changing the SPM error codes from invalid argument to bad state aligned to PSA spec
2019-02-25 11:55:47 +02:00
Nir Sonnenschein
1d4c280d2a
a-style fix for unrelated code
2019-02-25 00:46:06 +02:00
itayzafrir
37cc25726c
Add internal documentation to access control header file
...
This file is for internal use only.
2019-02-24 15:07:54 +02:00
itayzafrir
0c231b0ac9
Move include psa_crypto_core.h to C file
2019-02-24 15:07:54 +02:00
itayzafrir
672712ca8a
Add SPM_PANIC macro for TARGET_TFM
2019-02-24 15:07:54 +02:00
itayzafrir
99032f6967
Change PSA_CRYPTO_ACCESS_CONTROL_RESET into static inline function
2019-02-24 15:07:54 +02:00