Chapter 13: Trusted firmware secure services
Abstract
In this chapter, we will examine the TF-M security services and the API calls available to the Non-Secure application code, but first we will look at the TF-M Non-Secure client, which is used to pass the API calls across the isolation boundary.
Keywords
Trusted firmware secure services; Nonsecure client; Configuration; TF-M client operation; TF-M client test; Protected storage; Internal trusted storage; Attestation service; Audit service; Cryptography service; mbedCrypto
Introduction
In this chapter, we will examine the TF-M security services and the API calls available to the Non-Secure application code, but first we will look at the TF-M Non-Secure client, which is used to pass the ...
Get Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.