Lines Matching refs:image

51 Image signing takes an image in binary or Intel Hex format intended for the
56 Create a signed or unsigned image
64 digest instead of complied image. These data
65 can be used for external image signing
71 written. The image signature will be encoded
75 over an image rather than hash of that
76 image.
78 --fix-sig filename fixed signature for the image. It will be
84 image manifest: full key or hash of the key.
92 it from the image version.
93 -d, --dependencies TEXT Add dependence on another image, format:
99 beginning of the image
103 --pad Pad image to --slot-size bytes, adding
105 --confirm When padding the image, mark it as confirmed
115 -c, --clear Output a non-encrypted image with encryption
122 Enable image compression using specified
123 type. Will fall back without image
125 increases the image size.
126 --encrypt-keylen [128|256] When encrypting the image using AES, select
128 -E, --encrypt filename Encrypt image using the provided public key.
134 -F, --rom-fixed INTEGER Set flash address the image is built for.
135 -L, --load-addr INTEGER Load address for image when it should run
146 --non-bootable Mark the image as non-bootable.
156 already prepended a zeroed header to the image. If another build system is
165 about internals of image generated with this option can be found here
175 The optional `--pad` argument will place a trailer on the image that
176 indicates that the image should be considered an upgrade. Writing this image
180 `-d "(image_id, image_version)"`. The `image_id` is the number of the image
181 which the current image depends on. The `image_version` is the minimum version
182 of that image to satisfy compliance. For example `-d "(1, 1.2.3+0)"` means this
183 image depends on Image 1 which version has to be at least 1.2.3+0.
186 key is stored for image authentication. The `hash` option is used by default, in