Lines Matching refs:byte
41 …e sensitive data). Enabled if --debug is used. Use this option to see the byte order of the data b…
50 …tected. The hardware will still have access to them. These keys are burned in reversed byte order.
56 …` and ``BLOCK2`` to burn flash encryption and secure boot v2 keys because byte order will be incor…
81 …d writes the private key into a eFuse block. The key is written to the block in reverse byte order.
97 …distinguish between such keys. The key purpose option determines protection and byte order for key.
120 …cept flash encryption, will be burned in direct byte order. The encryption key is written in rever…
153 … v1 features require the key to be written to the eFuse block in reversed byte order, compared to …
175 Reversing the byte order
218 Reversing the byte order
248 This example uses ``--no-read-protect`` to expose the byte order written into eFuse blocks.
265 Reversing byte order for AES-XTS hardware peripheral
271 Reversing byte order for AES-XTS hardware peripheral
328 Reversing byte order for AES-XTS hardware peripheral