Home
last modified time | relevance | path

Searched refs:level (Results 1 – 25 of 87) sorted by relevance

1234

/trusted-firmware-m-3.5.0/config/
Dtfm_secure_log.cmake8 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set default SPM log level as INFO level")
9 …RTITION_LOG_LEVEL_SILENCE CACHE STRING "Set default Secure Partition log level as INFO level")
12 # Enable SP log raw dump when SP log level is higher than silence or TF-M
20 # Enable SPM log when SPM log level is higher than silence or SP log is active.
/trusted-firmware-m-3.5.0/config/build_type/
Ddebug.cmake9 …EL TFM_SPM_LOG_LEVEL_DEBUG CACHE STRING "Set debug SPM log level as Debug level")
10 …VEL TFM_PARTITION_LOG_LEVEL_DEBUG CACHE STRING "Set debug SP log level as Debug level")
Dminsizerel.cmake9 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set minsizerel SPM log level as Silence level")
10 … TFM_PARTITION_LOG_LEVEL_SILENCE CACHE STRING "Set minsizerel SP log level as Silence level")
Drelease.cmake10 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set release SPM log level as Silence level")
11 … TFM_PARTITION_LOG_LEVEL_SILENCE CACHE STRING "Set release SP log level as Silence level")
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/shared/include/pal/
Dcc_pal_log.h64 #define __CC_PAL_LOG_LEVEL_EVAL(level) level argument
104 #define _CC_PAL_LOG(level, format, ...) \ argument
106 …CC_PalLog(CC_PAL_LOG_LEVEL_ ## level, "%s:%s: " format "\n", CC_PAL_LOG_CUR_COMPONENT_NAME, __func…
/trusted-firmware-m-3.5.0/platform/ext/accelerator/cc312/
Dcc312_log.c23 void CC_PalLog(int level, const char* format, ...) in CC_PalLog() argument
25 (void) level; in CC_PalLog()
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/freertos/
Dcc_pal_log.c31 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument
34 CC_UNUSED_PARAM(level); in CC_PalLog()
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/no_os/
Dcc_pal_log.c29 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument
32 CC_UNUSED_PARAM(level); in CC_PalLog()
/trusted-firmware-m-3.5.0/secure_fw/spm/
DKconfig10 int "Isolation level"
15 SFN backend only supports level 1.
17 Isolation level 3 requires platform support.
71 Memory-mapped IOVECs feature, supported only for isolation level 1
103 Not supported for isolation level 3 yet.
110 ################################# SPM log level ################################
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/tests/integration_cc3x/
Dproj_integration_tests.cfg38 # with SCA protection on program level (different from HW level)
41 # Low level driver support
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/linux/
Dcc_pal_log.c40 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument
45 vsyslog(level + LOG_ERR, format, args); in CC_PalLog()
/trusted-firmware-m-3.5.0/platform/ext/target/arm/corstone1000/
Dreg_config_override.cmake8 # Test configuration: host images are not needed and work only with isolation level 1
10 set(TFM_ISOLATION_LEVEL 1 CACHE STRING "Isolation level" FORCE)
Dconfig.cmake29 set(TFM_ISOLATION_LEVEL 2 CACHE STRING "Isolation level")
56 … TFM_SPM_LOG_LEVEL_INFO CACHE STRING "Set default SPM log level as INFO level")
57 …PARTITION_LOG_LEVEL_INFO CACHE STRING "Set default Secure Partition log level as INFO level")
70 set(PLAT_LOG_LEVEL 4 CACHE STRING "Set platform log level.")
73 set(PLAT_LOG_LEVEL 0 CACHE STRING "Set platform log level.")
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/
Dproj.cfg52 # with SCA protection on program level (different from HW level)
55 # Low level driver support
/trusted-firmware-m-3.5.0/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/
Ddynsections.js51 function toggleLevel(level) argument
57 if (l<level+1) {
61 } else if (l==level+1) {
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/key_cert/
Dsb_key_cert.cfg15 # * First certificate in Two-level SB certificate chain
16 # * First certificate in Three-level SB certificate chain
17 # * First certificate in Three-level Secure Debug chain
Dsb_key_cert_hbk0.cfg15 # * First certificate in Two-level SB certificate chain
16 # * First certificate in Three-level SB certificate chain
17 # * First certificate in Three-level Secure Debug chain
Dsb_key_cert_hbk1.cfg15 # * First certificate in Two-level SB certificate chain
16 # * First certificate in Three-level SB certificate chain
17 # * First certificate in Three-level Secure Debug chain
/trusted-firmware-m-3.5.0/platform/ext/target/nxp/lpcxpresso55s69/Native_Driver/drivers/
Dfsl_power.h398 static inline void POWER_SetBodVbatLevel(power_bod_vbat_level_t level, power_bod_hyst_t hyst, bool … in POWER_SetBodVbatLevel() argument
400 …MC->BODVBAT & (~(PMC_BODVBAT_TRIGLVL_MASK | PMC_BODVBAT_HYST_MASK))) | PMC_BODVBAT_TRIGLVL(level) | in POWER_SetBodVbatLevel()
414 static inline void POWER_SetBodCoreLevel(power_bod_core_level_t level, power_bod_hyst_t hyst, bool … in POWER_SetBodCoreLevel() argument
416 …MC->BODCORE & (~(PMC_BODCORE_TRIGLVL_MASK | PMC_BODCORE_HYST_MASK))) | PMC_BODCORE_TRIGLVL(level) | in POWER_SetBodCoreLevel()
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/enabler_cert/
Dsb_enabler_dbg_cert_rma.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
Dx509_sb_enabler_dbg_cert_rma.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
Dsb_enabler_dbg_cert.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
Dsb_enabler_dbg_cert_no_pwd.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
Dsb_enabler_dbg_cert_rma_no_pwd.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
Dx509_sb_enabler_dbg_cert.cfg21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme…
22 # and key-cert-pkg is required if three-level certificate scheme is used.
23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate …
24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…

1234