/hal_espressif-latest/components/bootloader_support/src/esp32/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 20 ESP_LOGI(TAG, "Read & write protecting new key..."); in esp_secure_boot_enable_secure_features() 28 ESP_LOGI(TAG, "Disable JTAG..."); in esp_secure_boot_enable_secure_features() 31 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 35 ESP_LOGI(TAG, "Disable ROM BASIC interpreter fallback..."); in esp_secure_boot_enable_secure_features() 38 ESP_LOGW(TAG, "Not disabling ROM BASIC fallback - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 48 ESP_LOGE(TAG, "Blowing secure boot efuse...failed."); in esp_secure_boot_enable_secure_features() 53 ESP_LOGI(TAG, "Disable JTAG..."); in esp_secure_boot_enable_secure_features() 56 ESP_LOGE(TAG, "Disable JTAG...failed."); in esp_secure_boot_enable_secure_features() 60 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() [all …]
|
D | flash_encryption_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "flash_encrypt"; variable 31 ESP_LOGI(TAG, "Setting CRYPT_CONFIG efuse to 0xF"); in esp_flash_encryption_enable_secure_features() 38 ESP_LOGE(TAG, "EFUSE_ENCRYPT_CONFIG should be set 0xF but it is 0x%x", crypt_config); in esp_flash_encryption_enable_secure_features() 42 ESP_LOGI(TAG, "Disable UART bootloader encryption..."); in esp_flash_encryption_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling UART bootloader encryption"); in esp_flash_encryption_enable_secure_features() 49 ESP_LOGI(TAG, "Disable UART bootloader decryption..."); in esp_flash_encryption_enable_secure_features() 52 ESP_LOGW(TAG, "Not disabling UART bootloader decryption - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features() 56 ESP_LOGI(TAG, "Disable UART bootloader MMU cache..."); in esp_flash_encryption_enable_secure_features() 59 ESP_LOGW(TAG, "Not disabling UART bootloader MMU cache - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features() 63 ESP_LOGI(TAG, "Disable JTAG..."); in esp_flash_encryption_enable_secure_features() [all …]
|
D | bootloader_esp32.c | 41 static const char *TAG = "boot.esp32"; variable 77 …ESP_LOGE(TAG, "Chip CPU frequency rated for %dMHz, configured for %dMHz. Modify CPU frequency in m… in bootloader_check_rated_cpu_clock() 123 ESP_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32" (waiti mode)", cpu_name, pc); in wdt_reset_info_dump() 125 ESP_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32, cpu_name, pc); in wdt_reset_info_dump() 127 ESP_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump() 128 ESP_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump() 129 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump() 130 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump() 131 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump() 132 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/ |
D | secure_boot.c | 16 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 31 ESP_LOGE(TAG, "Can not be fixed (err=0x%x).", err); in update_efuses() 36 ESP_LOGE(TAG, "Error programming eFuses (err=0x%x)", err); in update_efuses() 39 ESP_LOGI(TAG, "Fixed"); in update_efuses() 51 ESP_LOGW(TAG, "eFuse BLOCK%d should not be readable. Fixing..", block); in secure_boot_v1_check() 56 ESP_LOGW(TAG, "eFuse BLOCK%d should not be writeable. Fixing..", block); in secure_boot_v1_check() 70 ESP_LOGE(TAG, "eFuse BLOCK%d should be readable", block); in secure_boot_v2_check() 77 ESP_LOGE(TAG, "eFuse BLOCK%d should not be empty", block); in secure_boot_v2_check() 84 ESP_LOGW(TAG, "eFuse BLOCK%d should not be writeable. Fixing..", block); in secure_boot_v2_check() 104 ESP_LOGE(TAG, "eFuse BLOCK%d should be readable", block); in secure_boot_v2_check() [all …]
|
D | flash_encrypt.c | 24 static const char *TAG = "flash_encrypt"; variable 33 …ESP_LOGE(TAG, "Flash encryption eFuse bit was not enabled in bootloader but CONFIG_SECURE_FLASH_EN… in esp_flash_encryption_init_checks() 52 …ESP_LOGE(TAG, "Flash encryption & Secure Boot together requires FLASH_CRYPT_CNT efuse to be write … in esp_flash_encryption_init_checks() 65 …ESP_LOGE(TAG, "Flash encryption settings error: app is configured for RELEASE but efuses are set f… in esp_flash_encryption_init_checks() 66 …ESP_LOGE(TAG, "Mismatch found in security options in bootloader menuconfig and efuse settings. Dev… in esp_flash_encryption_init_checks() 68 ESP_LOGW(TAG, "Flash encryption mode is DEVELOPMENT (not secure)"); in esp_flash_encryption_init_checks() 71 ESP_LOGI(TAG, "Flash encryption mode is RELEASE"); in esp_flash_encryption_init_checks() 171 ESP_LOGE(TAG, "Flash encryption eFuse is not enabled, abort.."); in esp_flash_encryption_set_release_mode() 220 ESP_LOGE(TAG, "Flash encryption mode is DEVELOPMENT, abort.."); in esp_flash_encryption_set_release_mode() 223 ESP_LOGI(TAG, "Flash encryption mode is RELEASE"); in esp_flash_encryption_set_release_mode() [all …]
|
D | bootloader_utility.c | 86 static const char *TAG = "boot"; variable 113 …ESP_LOGE(TAG, "ota_info partition size %"PRIu32" is too small (minimum %d bytes)", ota_info->size,… in read_otadata() 117 ESP_LOGD(TAG, "OTA data offset 0x%"PRIx32, ota_info->offset); in read_otadata() 120 …ESP_LOGE(TAG, "bootloader_mmap(0x%"PRIx32", 0x%"PRIx32") failed", ota_info->offset, ota_info->size… in read_otadata() 141 … ESP_LOGE(TAG, "bootloader_mmap(0x%"PRIx32", 0x%"PRIx32") failed", partition->offset, mmap_size); in bootloader_common_get_partition_description() 165 …ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", ESP_PARTITION_TABLE_OFFSET, ESP_PARTITION_TABL… in bootloader_utility_load_partition_table() 168 …ESP_LOGD(TAG, "mapped partition table 0x%x at 0x%x", ESP_PARTITION_TABLE_OFFSET, (intptr_t)partiti… in bootloader_utility_load_partition_table() 172 ESP_LOGE(TAG, "Failed to verify partition table"); in bootloader_utility_load_partition_table() 176 ESP_LOGI(TAG, "Partition Table:"); in bootloader_utility_load_partition_table() 177 ESP_LOGI(TAG, "## Label Usage Type ST Offset Length"); in bootloader_utility_load_partition_table() [all …]
|
D | bootloader_init.c | 23 static const char *TAG = "boot"; variable 36 ESP_EARLY_LOGE(TAG, "failed to load bootloader image header!"); in bootloader_read_bootloader_header() 47 ESP_EARLY_LOGI(TAG, "chip revision: v%d.%d", major, minor); in bootloader_check_bootloader_validity() 51 …ESP_EARLY_LOGE(TAG, "You are using ESP32 chip revision (%d) that is unsupported. While it may work… in bootloader_check_bootloader_validity() 52 …ESP_EARLY_LOGE(TAG, "Proceeding with this ESP32 chip revision is not recommended unless you fully … in bootloader_check_bootloader_validity() 54 …ESP_EARLY_LOGE(TAG, "If you choose to continue, please enable the 'CONFIG_ESP32_USE_UNSUPPORTED_RE… in bootloader_check_bootloader_validity() 82 ESP_EARLY_LOGD(TAG, "Enabling RTCWDT(%d ms)", CONFIG_BOOTLOADER_WDT_TIME_MS); in bootloader_config_wdt() 100 ESP_EARLY_LOGI(TAG, "Enabling RNG early entropy source..."); in bootloader_enable_random() 107 ESP_EARLY_LOGI(TAG, "MCUboot 2nd stage bootloader"); in bootloader_print_banner() 110 ESP_EARLY_LOGI(TAG, "MCUboot Application image"); in bootloader_print_banner() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/ |
D | secure_boot.c | 27 static const char *TAG = "secure_boot_v2"; variable 34 ESP_LOGD(TAG, "Signature block(%d) invalid/absent.", block_num); in validate_signature_block() 38 ESP_LOGE(TAG, "Magic byte correct but incorrect crc."); in validate_signature_block() 42 ESP_LOGE(TAG, "Magic byte & CRC correct but incorrect image digest."); in validate_signature_block() 45 ESP_LOGD(TAG, "valid signature block(%d) found", block_num); in validate_signature_block() 73 …ESP_LOGD(TAG, "calculating public key digests for sig blocks of image offset 0x%x (sig block offse… in s_calculate_image_public_key_digests() 79 ESP_LOGE(TAG, "error generating image digest, %d", ret); in s_calculate_image_public_key_digests() 83 ESP_LOGD(TAG, "reading signature(s)"); in s_calculate_image_public_key_digests() 86 …ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", sig_block_addr, sizeof(ets_secure_boot_signatu… in s_calculate_image_public_key_digests() 123 ESP_LOGE(TAG, "Secure boot key (%d) verification failed.", i); in s_calculate_image_public_key_digests() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/ |
D | flash_encrypt.c | 40 static const char *TAG = "flash_encrypt"; variable 64 …ESP_LOGE(TAG, "Flash Encryption cannot be enabled (CRYPT_CNT (%d) is write protected)", get_flash_… in esp_flash_encrypt_is_write_protected() 76 ESP_LOGV(TAG, "CRYPT_CNT %d, write protection %d", flash_crypt_cnt, flash_crypt_wr_dis); in esp_flash_encrypt_state() 84 ESP_LOGI(TAG, "flash encryption is enabled (%d plaintext flashes left)", left); in esp_flash_encrypt_state() 101 ESP_LOGE(TAG, "Initialization of Flash encryption key failed (%d)", err); in esp_flash_encrypt_check_and_update() 107 ESP_LOGE(TAG, "Encryption flash contents failed (%d)", err); in esp_flash_encrypt_check_and_update() 113 ESP_LOGE(TAG, "Enabling of Flash encryption failed (%d)", err); in esp_flash_encrypt_check_and_update() 117 ESP_LOGE(TAG, "flash encryption is not enabled, and SECURE_FLASH_REQUIRE_ALREADY_ENABLED " in esp_flash_encrypt_check_and_update() 135 ESP_LOGE(TAG, "Unknown/unsupported CODING_SCHEME value 0x%x", coding_scheme); in check_and_generate_encryption_keys() 149 ESP_LOGE(TAG, "XTS_AES_128_KEY is already in use, XTS_AES_256_KEY_1/2 can not be used"); in check_and_generate_encryption_keys() [all …]
|
/hal_espressif-latest/components/esp_netif/lwip/ |
D | esp_netif_lwip_ppp.c | 23 static const char *TAG = "esp-netif_lwip-ppp"; variable 75 ESP_LOGI(TAG, "Connected"); in on_ppp_status_changed() 78 ESP_LOGE(TAG, "Invalid parameter"); in on_ppp_status_changed() 81 ESP_LOGE(TAG, "Unable to open PPP session"); in on_ppp_status_changed() 84 ESP_LOGE(TAG, "Invalid I/O device for PPP"); in on_ppp_status_changed() 87 ESP_LOGE(TAG, "Unable to allocate resources"); in on_ppp_status_changed() 90 ESP_LOGI(TAG, "User interrupt"); in on_ppp_status_changed() 93 ESP_LOGI(TAG, "Connection lost"); in on_ppp_status_changed() 97 ESP_LOGE(TAG, "esp_event_post failed with code %d", err); in on_ppp_status_changed() 102 ESP_LOGE(TAG, "Failed authentication challenge"); in on_ppp_status_changed() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot.c | 34 static const char *TAG = "secure_boot_v1"; variable 59 ESP_LOGE(TAG, "SPI erase failed: 0x%x", err); in secure_boot_generate() 66 ESP_LOGE(TAG, "bootloader_mmap(0x1000, 0x%x) failed", image_len); in secure_boot_generate() 78 ESP_LOGD(TAG, "write iv+digest to flash"); in secure_boot_generate() 82 ESP_LOGE(TAG, "SPI write failed: 0x%x", err); in secure_boot_generate() 93 ESP_LOGI(TAG, "bootloader secure boot is already enabled." in esp_secure_boot_generate_digest() 100 ESP_LOGE(TAG, "Unknown/unsupported CODING_SCHEME value 0x%x", coding_scheme); in esp_secure_boot_generate_digest() 108 ESP_LOGE(TAG, "bootloader image appears invalid! error %d", err); in esp_secure_boot_generate_digest() 118 ESP_LOGI(TAG, "Generating new secure boot key..."); in esp_secure_boot_generate_digest() 127 ESP_LOGW(TAG, "Using pre-loaded secure boot key in EFUSE block 2"); in esp_secure_boot_generate_digest() [all …]
|
/hal_espressif-latest/zephyr/common/ |
D | soc_init.c | 23 static const char *TAG = "soc_init"; variable 30 ESP_EARLY_LOGI(TAG, "MCUboot 2nd stage bootloader"); in print_banner() 32 ESP_EARLY_LOGI(TAG, "MCUboot Application image"); in print_banner() 34 ESP_EARLY_LOGI(TAG, "ESP Simple boot"); in print_banner() 36 ESP_EARLY_LOGI(TAG, "compile time " __DATE__ " " __TIME__); in print_banner() 39 ESP_EARLY_LOGW(TAG, "Unicore bootloader"); in print_banner() 42 ESP_EARLY_LOGI(TAG, "Multicore bootloader"); in print_banner() 51 ESP_EARLY_LOGE(TAG, "failed to load bootloader image header!"); in read_bootloader_header() 64 ESP_EARLY_LOGE(TAG, "mismatch chip ID, expected %d, found %d", chip_id, in check_chip_validity() 76 TAG, in check_chip_validity() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/esp32c2/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 43 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 54 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 57 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
D | flash_encryption_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "flash_encrypt"; variable 20 ESP_LOGI(TAG, "Disable UART bootloader encryption..."); in esp_flash_encryption_enable_secure_features() 23 ESP_LOGW(TAG, "Not disabling UART bootloader encryption"); in esp_flash_encryption_enable_secure_features() 27 ESP_LOGI(TAG, "Disable UART bootloader cache..."); in esp_flash_encryption_enable_secure_features() 30 ESP_LOGW(TAG, "Not disabling UART bootloader cache - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features() 34 ESP_LOGI(TAG, "Disable JTAG..."); in esp_flash_encryption_enable_secure_features() 37 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features()
|
/hal_espressif-latest/components/bootloader_support/src/esp32c6/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
/hal_espressif-latest/components/bootloader_support/src/esp32h2/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
/hal_espressif-latest/components/bootloader_support/src/esp32s2/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 23 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 26 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 30 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 33 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 37 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 41 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
D | bootloader_esp32s2.c | 45 static const char *TAG = "boot.esp32s2"; variable 75 ESP_EARLY_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32" (waiti mode)", cpu_name, pc); in wdt_reset_info_dump() 77 ESP_EARLY_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32, cpu_name, pc); in wdt_reset_info_dump() 79 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump() 80 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump() 81 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump() 82 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump() 83 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump() 84 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump() 85 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08"PRIx32, cpu_name, lsstat); in wdt_reset_info_dump() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/esp32s3/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
D | bootloader_esp32s3.c | 47 static const char *TAG = "boot.esp32s3"; variable 83 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump() 88 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump() 89 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump() 90 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump() 91 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump() 92 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump() 93 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump() 94 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08"PRIx32, cpu_name, lsstat); in wdt_reset_info_dump() 95 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08"PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump() [all …]
|
/hal_espressif-latest/components/bootloader_support/src/esp32c3/ |
D | secure_boot_secure_features.c | 15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable 22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features() 25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features() 29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features() 36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features() 45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features() 62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features() 66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
|
/hal_espressif-latest/components/esp_wifi/src/ |
D | wifi_init.c | 82 static const char* TAG = "wifi_init"; variable 122 ESP_RETURN_ON_ERROR(err, TAG, "failed to allocate memory for modem (%s) retention", "WiFi MAC"); in init_wifi_mac_sleep_retention() 123 ESP_LOGD(TAG, "WiFi MAC sleep retention initialization"); in init_wifi_mac_sleep_retention() 134 ESP_LOGW(TAG, "failed to allocate sleep retention linked list for wifi mac retention"); in esp_wifi_mac_pd_mem_init() 145 ESP_LOGW(TAG, "failed to free sleep retention linked list for wifi mac retention"); in esp_wifi_mac_pd_mem_deinit() 156 ESP_LOGE(TAG, "Wi-Fi not stop"); in wifi_deinit_internal() 162 ESP_LOGW(TAG, "Failed to unregister Rx callbacks"); in wifi_deinit_internal() 177 ESP_LOGE(TAG, "Failed to deinit Wi-Fi driver (0x%x)", err); in wifi_deinit_internal() 208 ESP_LOGW(TAG, "WiFi MAC sleep retention deinit failed"); in wifi_deinit_internal() 239 ESP_LOGI(TAG, "rx ba win: %d", CONFIG_ESP_WIFI_RX_BA_WIN); in esp_wifi_config_info() [all …]
|
/hal_espressif-latest/zephyr/esp32/src/ |
D | soc_init.c | 13 static const char *TAG = "soc_init"; variable 35 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump() 39 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08" PRIx32, cpu_name, stat); in wdt_reset_info_dump() 40 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08" PRIx32, cpu_name, pid); in wdt_reset_info_dump() 41 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08" PRIx32, cpu_name, inst); in wdt_reset_info_dump() 42 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08" PRIx32, cpu_name, dstat); in wdt_reset_info_dump() 43 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08" PRIx32, cpu_name, data); in wdt_reset_info_dump() 44 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08" PRIx32, cpu_name, pc); in wdt_reset_info_dump() 45 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08" PRIx32, cpu_name, lsstat); in wdt_reset_info_dump() 46 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08" PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump() [all …]
|
/hal_espressif-latest/components/esp_adc/ |
D | adc_oneshot.c | 37 static const char *TAG = "adc_oneshot"; variable 80 …ESP_GOTO_ON_FALSE(init_config && ret_unit, ESP_ERR_INVALID_ARG, err, TAG, "invalid argument: null … in adc_oneshot_new_unit() 81 …ESP_GOTO_ON_FALSE(init_config->unit_id < SOC_ADC_PERIPH_NUM, ESP_ERR_INVALID_ARG, err, TAG, "inval… in adc_oneshot_new_unit() 87 …OC_ADC_DIG_SUPPORTED_UNIT(init_config->unit_id), ESP_ERR_INVALID_ARG, err, TAG, "adc unit not supp… in adc_oneshot_new_unit() 91 ESP_GOTO_ON_FALSE(unit, ESP_ERR_NO_MEM, err, TAG, "no mem for unit"); in adc_oneshot_new_unit() 94 …ESP_GOTO_ON_FALSE(success_claim, ESP_ERR_NOT_FOUND, err, TAG, "adc%d is already in use", init_conf… in adc_oneshot_new_unit() 106 …z(clk_src, ESP_CLK_TREE_SRC_FREQ_PRECISION_CACHED, &clk_src_freq_hz), err, TAG, "clock source not … in adc_oneshot_new_unit() 132 ESP_LOGD(TAG, "new adc unit%"PRId32" is created", unit->unit_id); in adc_oneshot_new_unit() 145 … ESP_RETURN_ON_FALSE(handle && config, ESP_ERR_INVALID_ARG, TAG, "invalid argument: null pointer"); in adc_oneshot_config_channel() 146 …ESP_RETURN_ON_FALSE(config->atten < SOC_ADC_ATTEN_NUM, ESP_ERR_INVALID_ARG, TAG, "invalid attenuat… in adc_oneshot_config_channel() [all …]
|
/hal_espressif-latest/zephyr/esp32s3/src/ |
D | soc_init.c | 16 const static char *TAG = "soc_init"; variable 83 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump() 87 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08" PRIx32, cpu_name, stat); in wdt_reset_info_dump() 88 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08" PRIx32, cpu_name, pid); in wdt_reset_info_dump() 89 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08" PRIx32, cpu_name, inst); in wdt_reset_info_dump() 90 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08" PRIx32, cpu_name, dstat); in wdt_reset_info_dump() 91 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08" PRIx32, cpu_name, data); in wdt_reset_info_dump() 92 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08" PRIx32, cpu_name, pc); in wdt_reset_info_dump() 93 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08" PRIx32, cpu_name, lsstat); in wdt_reset_info_dump() 94 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08" PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump() [all …]
|