Lines Matching refs:from

15     executed from ROM or such part of flash memory which supports write
30 By default, the MCUboot project from
39 Bootloader is started when CPU is released from reset. It runs in secure mode.
128 upgrade. In this case the active firmware is always executed from the primary
136 can be executed from either memory slot, but new firmware must be linked to the
145 the content of the secondary slot, before starting the new image from the
160 and the secondary slot will be swapped, before starting the new image from the
162 swapping. Update mark from the secondary slot is removed when the swapping is
184 One of them is linked to be executed from the primary slot memory region and the
185 other from the secondary slot. The firmware upgrade client, which downloads the
195 To select which slot the image is to be executed from, set
217 overwriting, swapping, direct-xip or loading into RAM and executing from
294 The dependencies are composed from two parts:
298 starts from 0.
356 the latest image is copied to RAM and runs from there instead of being
372 for firmware authentication, it calculates the hash of public key from the
373 manifest and compare against the retrieved key-hash from the hardware.
374 This way MCUBoot is independent from the public key(s). Key(s) can be
380 and compare against the retrieved key-hash from the image manifest. After
441 this case, the last component (the build number) automatically increments from
457 bootloader and its aim is to have an independent (from the image version)
471 The security counter can be independent from the image version, but not
474 from the image version number (not including the build number) and this value
479 counter values will be derived from the corresponding image version similar to
520 process is started from a state where the original and the new image are already
731 [INF] Booting image from the secondary slot
765 from. The ``S_IMAGE_LOAD_ADDRESS`` macro must be specified in the target
793 [INF] Image has been copied from the secondary slot in flash to SRAM address 0xA0020000
794 [INF] Booting image from SRAM at address 0xA0020000
813 information of which slot contains the running image from the bootloader.