Lines Matching refs:order
41 …sitive data). Enabled if --debug is used. Use this option to see the byte order of the data being …
50 …tected. The hardware will still have access to them. These keys are burned in reversed byte order.
56 … ``BLOCK2`` to burn flash encryption and secure boot v2 keys because byte order will be incorrect …
81 …d writes the private key into a eFuse block. The key is written to the block in reverse byte order.
97 …distinguish between such keys. The key purpose option determines protection and byte order for key.
120 …lash encryption, will be burned in direct byte order. The encryption key is written in reverse byt…
153 …order, compared to the order used by the AES algorithm on the host. Using corresponding block name…
175 Reversing the byte order
202 …Byte order for flash encryption key is reversed. Content of flash encryption key file ("256bit_fe_…
218 Reversing the byte order
248 This example uses ``--no-read-protect`` to expose the byte order written into eFuse blocks.
265 Reversing byte order for AES-XTS hardware peripheral
271 Reversing byte order for AES-XTS hardware peripheral
328 Reversing byte order for AES-XTS hardware peripheral