t-base Developer's Guide

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Trustonic
Edition: 2.5
Publisher: LAPSUS
Year: 2014

Language: English
Pages: 76
Tags: trustonic,t-base,developer's guide

1 Introduction
1.1 Glossary and Abbreviations
2 2.1 3 Development Guidelines
3.1 General Guidelines
3.1.1 Defining the scope of the Trusted Application
3.1.2 Trusted Application Design
3.1.3 Trusted Application Address Space
3.2 Using the Legacy API
3.2.1 Client Applications
3.2.1.1 Trusted Application Connector
3.2.1.2 Using the mcClient API
3.2.1.2.1 Device Sessions
3.2.1.2.2 Trusted Application Sessions
3.2.1.2.3 Message Exchange and Signaling
3.2.1.2.4 Memory Mapping
3.2.1.3 Client Kernel API
3.2.2 Trusted Applications
3.2.2.1 Trusted Application Structure
3.2.2.2 Advanced TCI Communication Protocol
3.2.2.3 Security Considerations
3.2.2.4 3.2.2.5 Secure Objects
3.2.2.6 Endorsement API
3.2.2.7 Checking API return value
3.2.3 Trusted User Interface
3.2.3.1 TUI configuration
3.2.3.2 TUI Session
3.2.3.2.1 Normal world integration
3.2.3.2.2 Error code checking
3.2.3.2.3 Single user service
3.2.3.3 Secure display
3.2.3.4 Secure input
3.2.3.4.1 Asynchronous driver interface
3.2.3.4.2 Trusted Application state machine
3.2.3.4.3 Input filtering and button emulation
3.2.4 DRM API
3.3 Using the GlobalPlatform API
3.3.1 Client Applications
3.3.2 Trusted Applications
3.3.2.1 TA Lifecycle
3.3.2.2 TA Interface
3.3.2.3 TA Secure Storage
3.3.2.4 Implementing the TA Interface
3.3.2.5 Implementing the Operations
3.3.3 Extended APIs
3.3.3.1
4 Using the 4.1 Toolchain Installation
4.1.1 System Requirements
4.1.2 DS-5™ / ARM Compiler
4.1.3 GCC / Linaro Compiler
4.1.4 Android SDK / NDK
4.1.4.1 Using ADB
4.2 Quick Starting Guide
4.2.1 File structure
4.2.2 Setup instructions
4.2.3 Creating the first secure application
4.2.3.1 Trusted Application (TA)
4.2.3.2 Client Application (CA)
4.2.3.3 Android SDK
4.2.4 Running the first secure application
4.2.4.1 On a Commercial Device (running as SP-TA)
4.2.4.2 On a Development Board (running as System-TA or SP-TA)
4.2.5 Creating a secure application following Global Platform scheme
4.2.5.1 Trusted Application (TA)
4.2.5.2 Client Application (CA)
4.2.6 Running a Global Platform application
4.2.6.1 On a Development Board (running as System-TA or SP-TA)
4.3 Compiling and Testing Trusted Applications
4.3.1 Build Environment
4.3.2 Compiling and signing a Trusted Application
4.3.3 Using the SPPA library for provisioning TAs
4.3.3.1 Deployment configuration
4.3.3.2 Provisioning workflow
4.3.3.3 Integration from a Client Application
4.3.4 Running a Trusted Application in a Development Environment
4.3.5 Debugging a Trusted Application
4.3.5.1 Logging
4.3.5.2 Development Platforms
4.3.5.3 Debug Agent
4.3.5.3.1 DS-5 setup
4.3.5.3.1.1 Install DS-5 Version 5.17.
4.3.5.3.1.2 Obtain a license
4.3.5.3.2 Install debug agent
4.3.5.3.2.1 Debug agent setup on PC host
4.3.5.3.2.2 Debug Agent setup on device
4.3.5.3.3 Debugging Trusted Application
4.3.5.3.4 Error Cases
4.4 Compiling and Testing Client Applications
4.4.1 Client Application Structure
4.4.2 Compile a CA with the Android NDK
4.4.2.1 Android NDK Overview
4.4.3 Run your Client Application
4.4.3.1 Connect to the Device via USB
4.4.3.2 Connect to the Device via Ethernet
4.4.3.3 Upload and Test
4.4.3.4 Shared Libraries on the Device
4.4.3.5 Client Application usage from within your Android App
4.4.4 Debug
4.4.4.1 Segmentation Faults
4.4.4.2 GDB
4.4.4.2.1 Debug stand-alone binaries
5 Mobiconvert Manual
5.1 RSA key generation
5.2 UUID generation
5.2.1 For legacy services and drivers
5.2.2 For Global Platform Trusted Applications
5.3 Conversion Features
5.3.1 Driver conversion
5.3.2 Service Provider Trusted Application conversion
5.3.3 System Trusted Application conversion
5.3.4 Header mode
5.3.5 Examples
5.4 Help output