Home
last modified time | relevance | path

Searched refs:enabled (Results 1 – 25 of 72) sorted by relevance

123

/trusted-firmware-m-3.7.0/docs/configuration/
Dtest_configuration.rst57 Individual test suites can be enabled when their dependencies like partitions or
63 If regression testing is enabled by ``TEST_NS`` or ``TEST_S``, individual
64 test suites will be enabled or disabled as appropriate for the TF-M
65 configuration (i.e. all enabled secure partitions will be tested).
67 Some cryptographic tests can be enabled and disabled. This is done to prevent
/trusted-firmware-m-3.7.0/platform/ext/target/nordic_nrf/common/core/
Dconfig.cmake22 will trigger SecureFaults even without this option enabled. \
26 # Required if MCUBoot has been built without CONFIG_MCUBOOT_CLEANUP_ARM_CORE enabled
29 # Required if MCUboot has been built without CONFIG_MCUBOOT_NRF_CLEANUP_PERIPHERAL enabled.
/trusted-firmware-m-3.7.0/platform/ext/target/arm/rse/common/ns/
Dconfig.cmake.in18 …ERS @RSE_ENABLE_BRINGUP_HELPERS@ CACHE BOOL "Whether RSE bringup helpers are enabled")
21 …BLE_TRAM @RSE_ENABLE_TRAM@ CACHE BOOL "Whether TRAM encryption is enabled")
/trusted-firmware-m-3.7.0/docs/releases/
D1.8.1.rst9 on the PSA driver API interface in CryptoCell enabled
D1.4.0.rst86 | level 2 when PXN is enabled.
111 * - | IPC Regression test fail when non-secure regression test is enabled and
/trusted-firmware-m-3.7.0/secure_fw/partitions/internal_trusted_storage/
DKconfig.comp26 If this option enabled, ITS_RAM_FS_SIZE must also be provided by platforms
85 ITS files is enabled
92 The size of the nonce used when ITS file encryption is enabled
/trusted-firmware-m-3.7.0/docs/integration_guide/source_structure/
Dplatform_folder.rst62 - `DAUTH_NONE`: Debugging the system is not enabled.
64 enabled.
66 code is enabled.
/trusted-firmware-m-3.7.0/docs/security/security_advisories/
Ddebug_log_vulnerability.rst28 TF-M log subsystem if enabled by ``TFM_SP_LOG_RAW_ENABLED`` config option,
54 option enabled an ARoT partition can expose to the stdout device any memory
Dcc3xx_partial_tag_compare_on_chacha20_poly1305.rst6 | | PSA driver API interface in CryptoCell enabled platforms |
16 | Configurations | CC312 enabled platforms, where the legacy driver API is |
84 For CryptoCell enabled platforms, the software component implementing the PSA
91 By default, CryptoCell enabled platforms don't build the PSA Unified Driver
Dindex.rst35 | | driver API interface in CryptoCell enabled platforms |
/trusted-firmware-m-3.7.0/docs/configuration/profiles/
Dtfm_profile_medium.rst244 .. [1] PS service is enabled by default. Platforms without off-chip storage
262 Will enable testing for all enabled partitions. See above for details of enabled
264 enabled.
319 The following PSA Crypto operationts are enabled by default.
363 ITS service is enabled in top-level Profile Medium CMake config file by default.
376 Data confidentiality, integrity and anti-rollback protection are enabled by
393 If MCUBoot provided by TF-M is enabled, multiple image boot is selected by
447 possible to build with either only TEST_S enabled or only TEST_NS enabled.
Dtfm_profile_medium_arot-less.rst84 As PSA Certified ARoT-less requests, FWU RoT Service is enabled by default to support secure
164 enabled.
214 possible to build with either only TEST_S enabled or only TEST_NS enabled.
Dtfm_profile_small.rst59 - Anti-rollback protection is enabled
188 Neither encryption nor rollback protection is enabled in current ITS
259 If MCUBoot provided by TF-M is enabled, single image boot [10]_ is selected by
367 In SFN model, ``-DPSA_FRAMEWORK_HAS_MM_IOVEC`` is enabled by default.
422 ITS service is enabled in top-level Profile Small CMake config file.
511 If MCUBoot provided by TF-M is enabled, single image boot is selected in TF-M
575 possible to build with either only TEST_S enabled or only TEST_NS enabled.
/trusted-firmware-m-3.7.0/docs/platform/arm/rse/
Drse_provisioning.rst19 the RTL key reads as zero). If ``TFM_DUMMY_PROVISIONING`` is enabled in cmake
21 is not enabled, execution will pause to allow the setting to be set by a
42 enabled the reset will happen automatically, else the external provisioning
75 ``TFM_DUMMY_PROVISIONING`` enabled then it will automatically set the chip to
124 | 0x4 | CM secure provisioning started, secure provisioning mode enabled |
134 | 0x9 | DM secure provisioning started, secure provisioning mode enabled |
Dreadme.rst108 If XIP mode is enabled, the following ``fiptool`` command should be run to
127 If GPT support is enabled, and a host ``fip.bin`` and ``fip_gpt.bin`` has been
174 ``TFM_DUMMY_PROVISIONING`` enabled, BL1_1 expects provisioning bundles to be
182 when ``TFM_DUMMY_PROVISIONING`` is enabled, except that it will not
/trusted-firmware-m-3.7.0/secure_fw/partitions/protected_storage/
DKconfig30 enabled to protect against IV rollback.
/trusted-firmware-m-3.7.0/config/
Dtfm_secure_log.cmake13 # regression test is enabled.
/trusted-firmware-m-3.7.0/docs/platform/nordic_nrf/nrf9160dk_nrf9160/
DREADME.rst64 #. When connecting a J-Link-enabled board such as an nRF9160 DK, a
104 the read back protection mechanism if enabled.
126 SECURE_UART1 is enabled by default when building TF-M on nRF9160 DK, so the secure firmware console…
/trusted-firmware-m-3.7.0/docs/platform/nordic_nrf/nrf9161dk_nrf9161/
DREADME.rst64 #. When connecting a J-Link-enabled board such as an nRF9161 DK, a
104 the read back protection mechanism if enabled.
126 SECURE_UART1 is enabled by default when building TF-M on nRF9161 DK, so the secure firmware console…
/trusted-firmware-m-3.7.0/platform/ext/accelerator/cc312/
DCMakeLists.txt138 # FixMe: Secure tests enabled and Debug builds with FP support set to hardware
152 # FixMe: Secure tests enabled and Debug builds on Musca-B1 need to fallback to
167 … message(FATAL_ERROR "CC3xx and the Legacy Crypto driver API can't be enabled at the same time.")
/trusted-firmware-m-3.7.0/docs/platform/nordic_nrf/nrf5340dk_nrf5340_cpuapp/
DREADME.rst72 #. When connecting a J-Link-enabled board such as an nRF5340 DK, a drive
112 the read back protection mechanism if enabled.
135 SECURE_UART1 is enabled by default when building TF-M on nRF5340 DK, so the secure firmware console…
/trusted-firmware-m-3.7.0/platform/ext/target/arm/drivers/lcm/
Dlcm_drv.h160 enum lcm_error_t lcm_get_sp_enabled(struct lcm_dev_t *dev, enum lcm_bool_t *enabled);
/trusted-firmware-m-3.7.0/docs/integration_guide/
Dplatform_provisioning.rst36 If ``TFM_DUMMY_PROVISIONING`` is enabled in the cmake config (as it is by
59 Provisioning on CryptoCell-312 enabled platforms
/trusted-firmware-m-3.7.0/docs/design_docs/software/
Dcode_sharing.rst72 Simplified steps of building with code sharing enabled:
131 RAM memory layout in MCUboot with code sharing enabled:
147 RAM memory layout in SPE with code sharing enabled:
189 enabled. The patch has no effect on the functional behaviour of the
273 If MCUboot image encryption support is enabled then saving could be up to
322 by default. It can be enabled from the command line with a compile time switch:
330 and some RSA related functions. If image encryption support is enabled in
/trusted-firmware-m-3.7.0/docs/integration_guide/services/
Dtfm_manifest_tool_user_guide.rst66 level and Secure Partition enabled status.
121 If it is omitted, the Secure Partition is always enabled.
276 TF-M regression or PSA compliance tests are enabled.
281 The ``-q`` argument is appended if ``PARSE_MANIFEST_QUIET_FLAG`` is enabled.

123