Home
last modified time | relevance | path

Searched refs:file (Results 1 – 25 of 263) sorted by relevance

1234567891011

/trusted-firmware-m-3.6.0/platform/ext/target/nxp/lpcxpresso55s69/
Dpull_drivers.cmake10 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/casper…
11 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/casper…
13 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/common…
14 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/common…
16 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/common…
17 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/common…
19 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/ctimer…
20 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/ctimer…
22 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/flexco…
23 file(DOWNLOAD https://raw.githubusercontent.com/NXPmicro/mcux-sdk/${NXP_SDK_GIT_TAG}/drivers/flexco…
[all …]
/trusted-firmware-m-3.6.0/platform/ext/target/nxp/common/Native_Driver/utilities/
Dfsl_assert.c15 void __aeabi_assert(const char *failedExpr, const char *file, int line) in __aeabi_assert() argument
18 PRINTF("ASSERT ERROR \" %s \": file \"%s\" Line \"%d\" \n", failedExpr, file, line); in __aeabi_assert()
20 (void)PRINTF("ASSERT ERROR \" %s \": file \"%s\" Line \"%d\" \n", failedExpr, file, line); in __aeabi_assert()
39 void __assert_func(const char *file, int line, const char *func, const char *failedExpr) in __assert_func() argument
41 …F("ASSERT ERROR \" %s \": file \"%s\" Line \"%d\" function name \"%s\" \n", failedExpr, file, line, in __assert_func()
53 void __msl_assertion_failed(char const *failedExpr, char const *file, char const *func, int line) in __msl_assertion_failed() argument
56 PRINTF(" File : %s\r\n", file); in __msl_assertion_failed()
/trusted-firmware-m-3.6.0/config/
Dkconfig.cmake8 # Load multiple config files and merge into one, generates CMake config file and config header file.
30 # Read out the strings of the file. Binary data in the file are ignored
31 file(STRINGS ${cmake_file} CONTENTS)
44 … message(FATAL_ERROR "Including another file in config file is not supported yet: ${LINE}")
143 # It can be only enabled in a Kconfig config file. So append it here.
163 file(REMOVE ${COMMAND_LINE_CONFIG_TO_FILE})
167 file(REMOVE ${CACHE_VAR_CONFIG_FILE})
175 file(WRITE ${PLATFORM_KCONFIG} ${PLATFORM_KCONFIG_OPTIONS})
180 file(APPEND ${PLATFORM_KCONFIG} ${PLATFORM_KCONFIG_OPTIONS})
185 file(APPEND ${CACHE_VAR_CONFIG_FILE} ${PLATFORM_CMAKE_CONFIGS})
[all …]
Dextra_build_config.cmake8 # This file lists the available config options for extra generated files and
21 … CACHE PATH "List of Paths to extra generated file list. Appended to stardard TFM generated f…
26 …set(TFM_EXTRA_MANIFEST_LIST_FILES "" CACHE FILEPATH "List of Extra manifest list file(s),…
Dcp_check.cmake42 # Create test C file.
43 file(WRITE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c "int x;")
48 # Toolchain file shall define a dedicated CP_CHECK_C_FLAGS to collect cpu/arch type
66 file(REMOVE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c)
71 file(REMOVE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.s)
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/icv_key_response/examples/
Ddmpu_icv_key_response.cfg8 # This is configuration file example for generating key request certificate by OEM
10 # oem-cert-pkg = OEM key request certificate package output file. Binary format.
12 #keypwd-filename = Passphrase for the key file, in txt format.
14 #icv-enc-oem-key = The file containing teh encrypted oem key, generated by dmpu_key_resp…
/trusted-firmware-m-3.6.0/bl2/ext/mcuboot/scripts/
Dmacro_parser.py51 def evaluate_macro(file, regexp, matchGroupKey, matchGroupData, bracketless=False): argument
54 if os.path.isabs(file):
55 configFile = file
58 configFile = os.path.join(scriptsDir, file)
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/content_cert/
Dsb_cnt_cert.cfg8 # This is configuration file example for content certificate generation
11 # cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 # aes-enc-key = Text file containing the encryption key for the authenticated SW images. Co…
15 # images-table = Text file containing the list of authenticated SW image files. Each line re…
16 # <image file name> <mem load addr> <flash store addr><code encode flag>
21 # cert-pkg = Content cdertificate output file. Binary format.
Dsb_cnt_cert_verify_flash.cfg8 # This is configuration file example for content certificate generation
11 # cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 # aes-enc-key = Text file containing the encryption key for the authenticated SW images. Co…
15 # images-table = Text file containing the list of authenticated SW image files. Each line re…
16 # <image file name> <mem load addr> <flash store addr><code encode flag>
21 # cert-pkg = Content cdertificate output file. Binary format.
Dsb_cnt_cert_verify_mem.cfg8 # This is configuration file example for content certificate generation
11 # cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 # aes-enc-key = Text file containing the encryption key for the authenticated SW images. Co…
15 # images-table = Text file containing the list of authenticated SW image files. Each line re…
16 # <image file name> <mem load addr> <flash store addr><code encode flag>
21 # cert-pkg = Content cdertificate output file. Binary format.
Dsb_cnt_cert_enc_0.cfg8 # This is configuration file example for content certificate generation
11 # cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 # aes-enc-key = Text file containing the encryption key for the authenticated SW images. Co…
15 # images-table = Text file containing the list of authenticated SW image files. Each line re…
16 # <image file name> <mem load addr> <flash store addr><code encode flag>
21 # cert-pkg = Content cdertificate output file. Binary format.
/trusted-firmware-m-3.6.0/docs/configuration/
Dheader_file_system.rst7 The header file configurations system is used to fine-tune component options.
22 The ``config_tfm.h`` includes a customized project config file provided via compile definition
23 ``PROJECT_CONFIG_HEADER_FILE``. Customized Component options in the project config file overrides
25 The project config header file can be
32 header file.
36 If the build system finds the file, it sets the ``TARGET_CONFIG_HEADER_FILE`` compile definition.
Dkconfig_system.rst25 - CMake config file
29 - Header file
31 Contains component options in the header file system.
37 The ``.config`` file which contains all the above configurations in the Kconfig format.
95 Kconfig file
97 You can also put the frequently used config options into a Kconfig file. When you need to apply the
98 config options in that file, pass it via command line option ``-DKCONFIG_CONFIG_FILE``
109 The command line set options override the ones in the config file.
/trusted-firmware-m-3.6.0/docs/integration_guide/services/
Dtfm_manifest_tool_user_guide.rst36 -f file-list [file-list ...]
54 **-f/--file-list**
79 A manifest list is a YAML [3]_ file that describes a list of Secure Partition
98 The manifest file of the Secure Partition.
173 A generated file list is a YAML file that describes the files to be generated
175 Refer to TF-M default generated file list [5]_ as an example.
183 This attribute is the file path of a Jinja2 [6]_ template.
184 The TF-M manifest tool uses Jinja2 template engine for file generations.
190 The output file of the ``template``.
198 so they are not in any generated file lists since one template generates
[all …]
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_asset_package/examples/
Dasset_oem_ce.cfg8 # This is configuration file example for generating asset package for production phase application …
11 #icv-enc-oem-key = The file containing the encrypted oem key, generated by dmpu_icv_key_…
13 # oem-enc-keypwd = Passphrase for the "oem-enc-keypair" file, in txt format.
16 #pkg-filename = The package file, generated by dmpu_asset_pkg_util.py.
Dasset_oem_cp.cfg8 # This is configuration file example for generating asset package for production phase application …
11 #icv-enc-oem-key = The file containing the encrypted oem key, generated by dmpu_icv_key_…
13 # oem-enc-keypwd = Passphrase for the "oem-enc-keypair" file, in txt format.
16 #pkg-filename = The package file, generated by dmpu_asset_pkg_util.py.
/trusted-firmware-m-3.6.0/secure_fw/partitions/firmware_update/
DKconfig16 string "Bootloader configure file"
19 Bootloader configure file for Firmware Update partition
30 string "The device configuration file for Firmware Update partition"
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/cc3x_boot_cert/examples/developer_cert/
Dsb_developer_dbg_cert.cfg8 # This is configuration file example for developer debug certificate generation
11 #cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 #soc-id = Binary file holding the 16byte SOC_ID.
17 #cert-pkg = Final certificate package (Enabler+Developer) output file. Binary format.
Dsb_developer_dbg_cert_no_pwd.cfg8 # This is configuration file example for developer debug certificate generation
11 #cert-keypair-pwd = Passphrase for the keypair file, in txt format.
13 #soc-id = Binary file holding the 16byte SOC_ID.
17 #cert-pkg = Final certificate package (Enabler+Developer) output file. Binary format.
/trusted-firmware-m-3.6.0/docs/contributing/
Dcoding_guide.rst32 The code needs to be consistent with itself, so if existing code in the file
34 in the file and not break consistency by following the rules listed here.
64 - Put the correct license header at the beginning of the file.
66 file.
69 - In a .c file, #include it's own header file first.
70 - Document all the public functions in the header file only.
71 - Document all the private functions in the source file only.
/trusted-firmware-m-3.6.0/platform/ext/target/cypress/psoc64/Native_Driver/generated_source/
Dcycfg.timestamp5 * Sentinel file for determining if generated source is up to date.
6 * This file was automatically generated and should not be modified.
17 * you may not use this file except in compliance with the License.
Dqspi_config.cfg5 # This file contains a SMIF Bank layout for use with OpenOCD.
6 # This file was automatically generated and should not be modified.
14 # you may not use this file except in compliance with the License.
/trusted-firmware-m-3.6.0/lib/ext/cryptocell-312-runtime/utils/src/dmpu_asset_pkg_util/oem_key_request/examples/
Ddmpu_oem_key_request.cfg8 # This is configuration file example for generating key request certificate by OEM
11 # oem-main-keypwd = Passphrase for the keypair file, in txt format.
14 # oem-cert-pkg = OEM key request certificate package output file. Binary format created …
/trusted-firmware-m-3.6.0/platform/ns/
Dtoolchain_ns_IARARM.cmake28 # This variable name is a bit of a misnomer. The file it is set to is included
112 # Specify the scatter file used to link `target`.
116 # Vendor platform can set a scatter file as property INTERFACE_LINK_DEPENDS of platform_ns.
117 # `target` can fetch the scatter file from platform_ns.
123 # target_add_scatter_file() fetch a scatter file from the install directory.
132 # Try if any scatter file is exported in install directory
138 # If nr_install_dir == 1, search for .icf file under install dir
140 file(GLOB scatter_file "${install_dir}/*.icf")
145 message(FATAL_ERROR "Unable to find NS scatter file ${scatter_file}")
/trusted-firmware-m-3.6.0/lib/ext/tf-m-tests/
Dversion.txt7 # This file tracks the recommended tf-m-tests version to verify TF-M.
9 # TF-M does not rely on this file to build.

1234567891011