Skip to content

Commit 2e86bd5

Browse files
committed
[Doc] Doc formating using pre-commit
1 parent 118e565 commit 2e86bd5

File tree

76 files changed

+428
-439
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+428
-439
lines changed

.github/ISSUE_TEMPLATE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ A clear and concise description of what the bug is.
2323
**How to reproduce the bug (skip if none)**
2424

2525
1. Indicate the global behavior of your application project
26-
2. List the SW modules that you suspect to be the cause of the problem
26+
2. List the SW modules that you suspect to be the cause of the problem
2727
3. Describe the use case that generates the problem
2828
4. How we can reproduce the problem
2929

.github/workflows/doxygen-gh-pages.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ jobs:
1515
github_token: ${{ secrets.GITHUB_TOKEN }}
1616
branch: gh-pages
1717
folder: doc
18-
config_file: doc/STSELib.doxyfile
18+
config_file: doc/STSELib.doxyfile

LICENSE.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
2424
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
2525
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2626
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27-
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27+
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22

33
![STSELib](doc/resources/Pictures/STSELib.png)
44

5-
The STSELib middleware provides a complete set of high-level Application Programming Interface functions to the embedded system developer. This Middleware abstract the build and the sequencing of the commands required to ensure device , accessories and consumable brand protection using STMicroelectronics STSAFE-A secure element family.
5+
The STSELib middleware provides a complete set of high-level Application Programming Interface functions to the embedded system developer. This Middleware abstract the build and the sequencing of the commands required to ensure device , accessories and consumable brand protection using STMicroelectronics STSAFE-A secure element family.
66

7-
This middleware allows a seamless integration of one or multiple STSAFE-A in various host MCU/MPU ecosystem.
7+
This middleware allows a seamless integration of one or multiple STSAFE-A in various host MCU/MPU ecosystem.
88

99
The STSELib middleware is composed of three software modules as illustrated in the figure below. Each layer provides a different level of system abstraction to the embedded system developer.
1010

@@ -14,7 +14,7 @@ The STSELib middleware is composed of three software modules as illustrated in t
1414
This software layer is the entry point for the system application. It provides a set of high level functions allowing interaction with STMicroelectronics Secure Elements.
1515

1616
<b>- Service layer</b>
17-
Provides a set of product services that format all commands supported by the targeted secure element and reports response to higher layers API/Application . This layer can be used directly from Application (for advanced user).
17+
Provides a set of product services that format all commands supported by the targeted secure element and reports response to higher layers API/Application . This layer can be used directly from Application (for advanced user).
1818

1919
<b>- Core layer</b>
2020
Contains generic definition for ST Secure Element and functions for communicating with target secure element.
@@ -41,7 +41,7 @@ Two headers files are mantatories, [`stse_conf.h`](doc/resources/Markdown/03_LIB
4141
### 3. Optional files
4242

4343
For platform-specific integrations and STSafe use-cases, you may implement additional headers. Detailed specifications are available in the HTML documentation included in the release ZIP.
44-
Reference implementation for most common STSE applicative use case can be found in section "Reference applicative examples" of this ReadMe file
44+
Reference implementation for most common STSE applicative use case can be found in section "Reference applicative examples" of this ReadMe file
4545

4646
## Reference applicative examples
4747

doc/documentation.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
<meta http-equiv="refresh" content="0; url=file:.\resources\__html\index.html" />
1+
<meta http-equiv="refresh" content="0; url=file:.\resources\__html\index.html" />

doc/resources/Markdown/00_introduction.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ Thanks to its modular architecture, this middleware enables seamless integration
1212

1313
Each layer provides a distinct level of system abstraction for the embedded system developer:
1414

15-
- **Application Programming Interface (API) Layer**:
15+
- **Application Programming Interface (API) Layer**:
1616
This software layer serves as the entry point for the system application. It offers a set of high-level functions that facilitate interaction with STMicroelectronics Secure Elements.
1717

18-
- **Service Layer**:
18+
- **Service Layer**:
1919
This layer provides a set of product services that format all commands supported by the targeted secure element and report responses to the higher layers (API/Application). Advanced users can directly utilize this layer from the application.
2020

21-
- **Core Layer**:
21+
- **Core Layer**:
2222
This layer contains generic definitions for ST Secure Elements and functions for communicating with the target secure element.
2323

2424
For more details on each layer, please refer to the "Modules Documentation" section of the documentation.
@@ -31,8 +31,3 @@ For more details on each layer, please refer to the "Modules Documentation" sect
3131
\subpage stse_services
3232

3333
\subpage stse_core
34-
35-
36-
37-
38-

doc/resources/Markdown/01_SOFTWARE LICENSE/01_SOFTWARE LICENSE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,4 +26,4 @@ ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
2626
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
2727
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2828
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
29-
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29+
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

doc/resources/Markdown/02_RELEASE_NOTE/release_note.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Release Note
22

33
## v1.1.0 (Latest)
4-
- [all] Library performance and footprint optimization based on stse_conf.h
4+
- [all] Library performance and footprint optimization based on stse_conf.h
55
- [certificate parser] Add ED25519 support
66
- [api] Add STSAFEL support to STSE ECC APIs
77
- [api] Add STSAFEL support to STSE Data storage APIs
@@ -19,7 +19,7 @@
1919

2020
## v1.0.3
2121
- [core] Fix frame debug log usage
22-
- [services] Fix echo usage into host session
22+
- [services] Fix echo usage into host session
2323
- [services & api] Add host key establishment v2
2424
- [api] Fix hash computation
2525

@@ -29,7 +29,7 @@
2929
- [api] Add symmetric key slot provisioning api
3030
- [stsafea] Add AES-GCM & AES-CCM* by chunck
3131
- [stsafea] Add public key slot management
32-
- [stsafea] Add entity authentication
32+
- [stsafea] Add entity authentication
3333
- [stsafea] Update A120 timings
3434
- [core] Simplify I2C platform
3535
- [core] Add SE return status when debug log activated
@@ -45,4 +45,4 @@
4545
- [stsafea] add clear session
4646
- [stsafea] Fix query generic public key slot info
4747
- [stsafea] Fix some issues with CMAC authenticated commands
48-
- [core] Change STSE handler initialization
48+
- [core] Change STSE handler initialization

doc/resources/Markdown/03_LIBRARY_CONFIGURATION/03_LIBRARY_CONFIGURATION.md

Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
# Library configuration
1+
# Library configuration
22

3-
To operate , the STSELib relies on specific configuration parametters to be defined in each applicative projects embedding the library .
4-
A template of the STSELib_config.h file to be added to each project is available in the template directory of the library.
5-
It is recommended to included the file in each projects along with a path to this file in compiler pre-processor include path.
3+
To operate , the STSELib relies on specific configuration parametters to be defined in each applicative projects embedding the library .
4+
A template of the STSELib_config.h file to be added to each project is available in the template directory of the library.
5+
It is recommended to included the file in each projects along with a path to this file in compiler pre-processor include path.
66

77
This configuration file allows the adjustment of API/Services/Core performance , platform call-back adaptation and size optimization of the library .
8-
It is recommended to adjust each application configuration file according to end-application requirements and ST SecureElement type and perso profile. Please also note that the configuration of these parametters allows to simplify the STSELib porting requirement as it helps identifying the low-level callbacks to be implemented at application level to integrate the library on a specific host MCU/MPU host platform .
8+
It is recommended to adjust each application configuration file according to end-application requirements and ST SecureElement type and perso profile. Please also note that the configuration of these parametters allows to simplify the STSELib porting requirement as it helps identifying the low-level callbacks to be implemented at application level to integrate the library on a specific host MCU/MPU host platform .
99

1010
Here is a typical STSELib_config.h definition, followed by an explanation of each parameter:
1111

@@ -126,30 +126,30 @@ extern "C" {
126126
```
127127

128128

129-
The following table lits all parametters
129+
The following table lits all parametters
130130

131131

132-
| <b>Definition</b> | <b>Description</b> | <b>Associated STSE Product Family</b>
132+
| <b>Definition</b> | <b>Description</b> | <b>Associated STSE Product Family</b>
133133
| :---- | :---- | :---- |
134134
| STSE_CONF_STSAFE_A_SUPPORT | Enable STSAFE-A APIs/services support | STSAFE-A
135135
| STSE_CONF_STSAFE_L_SUPPORT | Enable STSAFE-L APIs/services support | STSAFE-L
136136
| STSE_CONF_ECC_NIST_P_256 | Enable ECC NIST-P256 support in API/services/platform | STSAFE-A / STSAFE-L
137-
| STSE_CONF_ECC_NIST_P_384 | Enable ECC NIST-P384 support in API/services/platform | STSAFE-A
138-
| STSE_CONF_ECC_NIST_P_521 | Enable ECC NIST-P521 support in API/services/platform | STSAFE-A
139-
| STSE_CONF_ECC_BRAINPOOL_P_256 | Enable ECC NIST-P256 support in API/services/platform | STSAFE-A
140-
| STSE_CONF_ECC_BRAINPOOL_P_384 | Enable ECC NIST-P384 support in API/services/platform | STSAFE-A
141-
| STSE_CONF_ECC_BRAINPOOL_P_512 | Enable ECC NIST-P512 support in API/services/platform | STSAFE-A
137+
| STSE_CONF_ECC_NIST_P_384 | Enable ECC NIST-P384 support in API/services/platform | STSAFE-A
138+
| STSE_CONF_ECC_NIST_P_521 | Enable ECC NIST-P521 support in API/services/platform | STSAFE-A
139+
| STSE_CONF_ECC_BRAINPOOL_P_256 | Enable ECC NIST-P256 support in API/services/platform | STSAFE-A
140+
| STSE_CONF_ECC_BRAINPOOL_P_384 | Enable ECC NIST-P384 support in API/services/platform | STSAFE-A
141+
| STSE_CONF_ECC_BRAINPOOL_P_512 | Enable ECC NIST-P512 support in API/services/platform | STSAFE-A
142142
| STSE_CONF_ECC_CURVE_25519 | Enable CURVE25519 support in API/services/platform | STSAFE-A / STSAFE-L
143143
| STSE_CONF_ECC_EDWARD_25519 | Enable ED25519 support in API/services/platform | STSAFE-A / STSAFE-L
144-
| STSE_CONF_HASH_SHA_1 | Enable SHA-1 support in API/services/platform | STSAFE-A
145-
| STSE_CONF_HASH_SHA_224 | Enable SHA224 support in API/services/platform | STSAFE-A
146-
| STSE_CONF_HASH_SHA_256 | Enable SHA256 support in API/services/platform | STSAFE-A
147-
| STSE_CONF_HASH_SHA_384 | Enable SHA384 support in API/services/platform | STSAFE-A
148-
| STSE_CONF_HASH_SHA_512 | Enable SHA512 support in API/services/platform | STSAFE-A
149-
| STSE_CONF_HASH_SHA_3_256 | Enable SHA3-256 support in API/services/platform | STSAFE-A
150-
| STSE_CONF_HASH_SHA_3_384 | Enable SHA3-384 support in API/services/platform | STSAFE-A
151-
| STSE_CONF_HASH_SHA_3_512 | Enable SHA3-512 support in API/services/platform | STSAFE-A
152-
| STSE_CONF_USE_HOST_SESSION | Enable Host session support in services/platform | STSAFE-A
144+
| STSE_CONF_HASH_SHA_1 | Enable SHA-1 support in API/services/platform | STSAFE-A
145+
| STSE_CONF_HASH_SHA_224 | Enable SHA224 support in API/services/platform | STSAFE-A
146+
| STSE_CONF_HASH_SHA_256 | Enable SHA256 support in API/services/platform | STSAFE-A
147+
| STSE_CONF_HASH_SHA_384 | Enable SHA384 support in API/services/platform | STSAFE-A
148+
| STSE_CONF_HASH_SHA_512 | Enable SHA512 support in API/services/platform | STSAFE-A
149+
| STSE_CONF_HASH_SHA_3_256 | Enable SHA3-256 support in API/services/platform | STSAFE-A
150+
| STSE_CONF_HASH_SHA_3_384 | Enable SHA3-384 support in API/services/platform | STSAFE-A
151+
| STSE_CONF_HASH_SHA_3_512 | Enable SHA3-512 support in API/services/platform | STSAFE-A
152+
| STSE_CONF_USE_HOST_SESSION | Enable Host session support in services/platform | STSAFE-A
153153
| STSE_CONF_USE_HOST_KEY_ESTABLISHMENT | Enable Host key establishment support via ECDH and key derivation | STSAFE-A
154154
| STSE_CONF_USE_HOST_KEY_PROVISIONING_WRAPPED | Enable Host key secure provisioning using KEK wrapped exchange | STSAFE-A
155155
| STSE_CONF_USE_HOST_KEY_PROVISIONING_WRAPPED_AUTHENTICATED | Enable Host key secure provisioning using KEK wrapped exchange and authentication | STSAFE-A
@@ -163,5 +163,3 @@ The following table lits all parametters
163163
| STSE_FIRST_POLLING_INTERVAL | First polling delay definition in ms (see section below) | STSAFE-A / STSAFE-L
164164
| STSE_POLLING_RETRY_INTERVAL | Polling retry interval definition in ms (see section below) | STSAFE-A / STSAFE-L
165165
| STSE_FRAME_DEBUG_LOG | Enable HOST<->STSE communication logs | STSAFE-A / STSAFE-L
166-
167-

doc/resources/Markdown/04_PORTING_GUIDE/03_PORTINNG_GUIDE.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This Platform Abstraction Layer decouples the STSELibrary Middleware from the un
1616

1717
![PAL_integration](../Pictures/PAL_integration.png)
1818

19-
# Identifying the platform abstraction functions to be implemented
19+
# Identifying the platform abstraction functions to be implemented
2020

2121
To assist developers in identifying the callback functions to be developed and simplify the porting process of the library, it is recommended to use an stse_config.h file that activates only the configuration parameters required by the end application (see Library Configuration documentation section). By doing this, advanced IDEs such as STM32Cube IDE will highlight which platform functions need to be ported. Below is an extract of the platform configuration:
2222

@@ -41,4 +41,3 @@ Following platform files architecture are recommended to simplify the porting of
4141
- @subpage stse_platform_power
4242
- @subpage stse_platform_i2c
4343
- @subpage stse_platform_st1wire
44-

0 commit comments

Comments
 (0)