/trusted-firmware-m-3.5.0/config/ |
D | tfm_secure_log.cmake | 8 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set default SPM log level as INFO level") 9 …RTITION_LOG_LEVEL_SILENCE CACHE STRING "Set default Secure Partition log level as INFO level") 12 # Enable SP log raw dump when SP log level is higher than silence or TF-M 20 # Enable SPM log when SPM log level is higher than silence or SP log is active.
|
/trusted-firmware-m-3.5.0/config/build_type/ |
D | debug.cmake | 9 …EL TFM_SPM_LOG_LEVEL_DEBUG CACHE STRING "Set debug SPM log level as Debug level") 10 …VEL TFM_PARTITION_LOG_LEVEL_DEBUG CACHE STRING "Set debug SP log level as Debug level")
|
D | minsizerel.cmake | 9 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set minsizerel SPM log level as Silence level") 10 … TFM_PARTITION_LOG_LEVEL_SILENCE CACHE STRING "Set minsizerel SP log level as Silence level")
|
D | release.cmake | 10 … TFM_SPM_LOG_LEVEL_SILENCE CACHE STRING "Set release SPM log level as Silence level") 11 … TFM_PARTITION_LOG_LEVEL_SILENCE CACHE STRING "Set release SP log level as Silence level")
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/shared/include/pal/ |
D | cc_pal_log.h | 64 #define __CC_PAL_LOG_LEVEL_EVAL(level) level argument 104 #define _CC_PAL_LOG(level, format, ...) \ argument 106 …CC_PalLog(CC_PAL_LOG_LEVEL_ ## level, "%s:%s: " format "\n", CC_PAL_LOG_CUR_COMPONENT_NAME, __func…
|
/trusted-firmware-m-3.5.0/platform/ext/accelerator/cc312/ |
D | cc312_log.c | 23 void CC_PalLog(int level, const char* format, ...) in CC_PalLog() argument 25 (void) level; in CC_PalLog()
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/freertos/ |
D | cc_pal_log.c | 31 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument 34 CC_UNUSED_PARAM(level); in CC_PalLog()
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/no_os/ |
D | cc_pal_log.c | 29 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument 32 CC_UNUSED_PARAM(level); in CC_PalLog()
|
/trusted-firmware-m-3.5.0/secure_fw/spm/ |
D | Kconfig | 10 int "Isolation level" 15 SFN backend only supports level 1. 17 Isolation level 3 requires platform support. 71 Memory-mapped IOVECs feature, supported only for isolation level 1 103 Not supported for isolation level 3 yet. 110 ################################# SPM log level ################################
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/tests/integration_cc3x/ |
D | proj_integration_tests.cfg | 38 # with SCA protection on program level (different from HW level) 41 # Low level driver support
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/src/pal/linux/ |
D | cc_pal_log.c | 40 void CC_PalLog(int level, const char * format, ...) in CC_PalLog() argument 45 vsyslog(level + LOG_ERR, format, args); in CC_PalLog()
|
/trusted-firmware-m-3.5.0/platform/ext/target/arm/corstone1000/ |
D | reg_config_override.cmake | 8 # Test configuration: host images are not needed and work only with isolation level 1 10 set(TFM_ISOLATION_LEVEL 1 CACHE STRING "Isolation level" FORCE)
|
D | config.cmake | 29 set(TFM_ISOLATION_LEVEL 2 CACHE STRING "Isolation level") 56 … TFM_SPM_LOG_LEVEL_INFO CACHE STRING "Set default SPM log level as INFO level") 57 …PARTITION_LOG_LEVEL_INFO CACHE STRING "Set default Secure Partition log level as INFO level") 70 set(PLAT_LOG_LEVEL 4 CACHE STRING "Set platform log level.") 73 set(PLAT_LOG_LEVEL 0 CACHE STRING "Set platform log level.")
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/host/ |
D | proj.cfg | 52 # with SCA protection on program level (different from HW level) 55 # Low level driver support
|
/trusted-firmware-m-3.5.0/platform/ext/target/cypress/psoc64/libs/core-lib/docs/html/ |
D | dynsections.js | 51 function toggleLevel(level) argument 57 if (l<level+1) { 61 } else if (l==level+1) {
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/key_cert/ |
D | sb_key_cert.cfg | 15 # * First certificate in Two-level SB certificate chain 16 # * First certificate in Three-level SB certificate chain 17 # * First certificate in Three-level Secure Debug chain
|
D | sb_key_cert_hbk0.cfg | 15 # * First certificate in Two-level SB certificate chain 16 # * First certificate in Three-level SB certificate chain 17 # * First certificate in Three-level Secure Debug chain
|
D | sb_key_cert_hbk1.cfg | 15 # * First certificate in Two-level SB certificate chain 16 # * First certificate in Three-level SB certificate chain 17 # * First certificate in Three-level Secure Debug chain
|
/trusted-firmware-m-3.5.0/platform/ext/target/nxp/lpcxpresso55s69/Native_Driver/drivers/ |
D | fsl_power.h | 398 static inline void POWER_SetBodVbatLevel(power_bod_vbat_level_t level, power_bod_hyst_t hyst, bool … in POWER_SetBodVbatLevel() argument 400 …MC->BODVBAT & (~(PMC_BODVBAT_TRIGLVL_MASK | PMC_BODVBAT_HYST_MASK))) | PMC_BODVBAT_TRIGLVL(level) | in POWER_SetBodVbatLevel() 414 static inline void POWER_SetBodCoreLevel(power_bod_core_level_t level, power_bod_hyst_t hyst, bool … in POWER_SetBodCoreLevel() argument 416 …MC->BODCORE & (~(PMC_BODCORE_TRIGLVL_MASK | PMC_BODCORE_HYST_MASK))) | PMC_BODCORE_TRIGLVL(level) | in POWER_SetBodCoreLevel()
|
/trusted-firmware-m-3.5.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/enabler_cert/ |
D | sb_enabler_dbg_cert_rma.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|
D | x509_sb_enabler_dbg_cert_rma.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|
D | sb_enabler_dbg_cert.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|
D | sb_enabler_dbg_cert_no_pwd.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|
D | sb_enabler_dbg_cert_rma_no_pwd.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|
D | x509_sb_enabler_dbg_cert.cfg | 21 … either hbk-id or key-cert-pkg must be defined. hbk-id is required if two-level certificate scheme… 22 # and key-cert-pkg is required if three-level certificate scheme is used. 23 # Mandatory if rma-mode is defined (for rma-mode, only two-level certificate … 24 #key-cert-pkg = Key certificate package, generated by cert_key_util.py, if three-level cert…
|