55 *
66 */
77
8+ /** @addtogroup PSA-Attestation
9+ * @{
10+ */
11+
12+
813#ifndef __ATTESTATION_H__
914#define __ATTESTATION_H__
1015
1520extern "C" {
1621#endif
1722
18- /*!
23+ /**
1924 * \brief Type of memory access
2025 */
2126enum attest_memory_access_t {
2227 TFM_ATTEST_ACCESS_RO = 1 ,
2328 TFM_ATTEST_ACCESS_RW = 2 ,
2429};
2530
26- /*!
31+ /**
2732 * \brief Copy the boot data (coming from boot loader) from shared memory area
2833 * to service memory area
2934 *
@@ -36,7 +41,7 @@ enum attest_memory_access_t {
3641enum psa_attest_err_t
3742attest_get_boot_data (uint8_t major_type , void * ptr , uint32_t len );
3843
39- /*!
44+ /**
4045 * \brief Get the ID of the caller thread.
4146 *
4247 * \param[out] caller_id Pointer where to store caller ID
@@ -46,7 +51,7 @@ attest_get_boot_data(uint8_t major_type, void *ptr, uint32_t len);
4651enum psa_attest_err_t
4752attest_get_caller_client_id (int32_t * caller_id );
4853
49- /*!
54+ /**
5055 * \brief Verify memory access rights
5156 *
5257 * \param[in] addr Pointer to the base of the address range to check
@@ -61,7 +66,7 @@ attest_check_memory_access(void *addr,
6166 uint32_t size ,
6267 enum attest_memory_access_t access );
6368
64- /*!
69+ /**
6570 * \brief Initialise the initial attestation service during the TF-M boot up
6671 * process.
6772 *
@@ -70,7 +75,7 @@ attest_check_memory_access(void *addr,
7075 */
7176enum psa_attest_err_t attest_init (void );
7277
73- /*!
78+ /**
7479 * \brief Get initial attestation token
7580 *
7681 * \param[in] in_vec Pointer to in_vec array, which contains input data
@@ -105,4 +110,6 @@ initial_attest_get_token_size(const psa_invec *in_vec, uint32_t num_invec,
105110}
106111#endif
107112
113+ /** @}*/ // PSA-Attestation
114+
108115#endif /* __ATTESTATION_H__ */
0 commit comments