Home
last modified time | relevance | path

Searched full:enabled (Results 1 – 25 of 67) sorted by relevance

123

/mcuboot-latest/boot/espressif/
Dmain.c118 …BOOT_LOG_WRN("eFuse virtual mode is enabled. If Secure boot or Flash encryption is enabled then it… in main()
128 …BOOT_LOG_ERR("Secure Boot and Flash Encryption cannot be enabled separately, only together (their … in main()
147 BOOT_LOG_INF("secure boot v2 is already enabled, continuing.."); in main()
214 BOOT_LOG_INF("Secure boot permanently enabled"); in main()
229 …BOOT_LOG_ERR("flash encryption is not enabled, and SECURE_FLASH_REQUIRE_ALREADY_ENABLED is set, re… in main()
266 BOOT_LOG_INF("Secure boot permanently enabled"); in main()
274 BOOT_LOG_INF("Resetting with flash encryption enabled..."); in main()
/mcuboot-latest/boot/espressif/hal/src/
Dflash_encrypt.c38 * eFuses, detect whether flash encryption is enabled (by reading eFuse)
68 bool enabled = false; in esp_flash_encryption_enabled()
71 enabled = !enabled; in esp_flash_encryption_enabled()
75 return enabled; in esp_flash_encryption_enabled()
95 …ESP_LOGE(TAG, "Flash Encryption cannot be enabled (CRYPT_CNT (%d) is write protected)", get_flash_… in esp_flash_encrypt_is_write_protected()
115 ESP_LOGI(TAG, "flash encryption is enabled (%d plaintext flashes left)", left); in esp_flash_encrypt_state()
148 ESP_LOGE(TAG, "flash encryption is not enabled, and SECURE_FLASH_REQUIRE_ALREADY_ENABLED " in esp_flash_encrypt_check_and_update()
349 // Go straight to max, permanently enabled in esp_flash_encrypt_enable()
/mcuboot-latest/boot/zephyr/
DKconfig38 # Zephyr one must not be enabled or the MBEDTLS_CONFIG_FILE macros
49 # Zephyr one must not be enabled or the MBEDTLS_CONFIG_FILE macros
216 This option is enabled by default to prevent possible problems when
230 in MCUBoot. If enabled the public key is appended to the signed image
442 If this option is enabled then the maximum number of supported sectors per image will
528 If enabled, the bootloader will store certain boot measurements such as
808 If enabled, will include support for compressed images being loaded to the secondary slot
848 # that works properly with the option enabled.
884 though it will not boot. If swapping is enabled this will be handled
886 enabled then the only mitigation is serial recovery. This feature can
[all …]
DKconfig.serial_recovery54 With the option enabled, the mcuboot serial recovery will
105 If enabled, flash is erased as necessary when receiving new firmware,
113 if enabled, support for the mcumgr echo command is being added.
/mcuboot-latest/boot/cypress/MCUBootApp/config/
Dmcuboot_crypto_config.h214 * it will be enabled automatically by check_config.h
280 * - The pointer is checked to be non-NULL only if this option is enabled.
332 * within the modules that are enabled.
342 * Only works if you have MBEDTLS_TIMING_C enabled.
728 * enabled to remove 3DES based cipher suites.
738 * module. By default all supported curves are enabled.
812 * This option has no effect if #MBEDTLS_ECDH_C is not enabled.
840 * enabled as well):
864 * enabled as well):
895 * enabled as well):
[all …]
/mcuboot-latest/boot/espressif/include/crypto_config/
Dmbedtls_custom_config.h215 * it will be enabled automatically by check_config.h
267 * within the modules that are enabled.
277 * Only works if you have MBEDTLS_TIMING_C enabled.
369 * enabled, then the deterministic ECDH signature functions pass the
619 * module. By default all supported curves are enabled.
694 * enabled as well):
716 * enabled as well):
745 * enabled as well):
764 * enabled as well):
787 * enabled as well):
[all …]
/mcuboot-latest/docs/
Dserial_recovery.md39 if the ``MCUBOOT_PERUSER_MGMT_GROUP_ENABLED`` option is enabled.
47 …ther slots only when the ``MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD`` option is enabled for the platform.
49 …f a slot to which an image is uploaded to if the ``MCUBOOT_ERASE_PROGRESSIVELY`` option is enabled.
Dreadme-nuttx.md10 Also, these are optional features that may be enabled:
12 - `CONFIG_MCUBOOT_WATCHDOG`: If `CONFIG_WATCHDOG` is enabled, MCUboot shall reset the watchdog time…
33 The MCUboot bootloader application may be enabled by selecting the `CONFIG_MCUBOOT_BOOTLOADER` opti…
Dreadme-espressif.md197 Downgrade prevention (avoid updating of images to an older version) can be enabled using the
310 In order to build the bootloader with the feature on, the following configurations must be enabled:
338 enabled and also to avoid any unrecoverable/permanent state change:*
410 On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor
421 After that the Secure Boot feature is permanently enabled and on every next boot the ROM bootloader
424 1. On startup, the ROM bootloader checks the Secure Boot enable bit in the eFuse. If it is enabled,
450 for keeping the key private and safe). After the flash encryption gets enabled through eFuse
455 In order to build the bootloader with the feature on, the following configurations must be enabled:
475 the debugging enabled and also to avoid any unrecoverable/permanent state change:*
492 *Unless the recommended flags for __DEVELOPMENT MODE__ were enabled, the actions made by Flash
[all …]
Dreadme-zephyr.md86 in the `CONFIG_BOOTLOADER_MCUBOOT` Kconfig variable, which must be enabled in
104 `MCUBOOT_VALIDATE_PRIMARY_SLOT` is enabled), the images must be signed.
217 The SMP server implementation can be enabled by the ``CONFIG_MCUBOOT_SERIAL=y`` Kconfig option.
237 …umber, and make sure the ``CONFIG_MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD=y`` Kconfig option is enabled.
Dencrypted_images.md33 decrypted (after validation). If swap upgrades are enabled, the image
126 `MCUBOOT_SWAP_SAVE_ENCTLV` is enabled, the decryption keys are stored in
128 enabled if the scratch area does not reside in the internal flash memory of the
/mcuboot-latest/boot/espressif/port/esp32c2/
Dbootloader.conf15 # When enabled, prevents updating image to an older version
81 # This option must be also enabled when enabling both Secure Boot
/mcuboot-latest/boot/bootutil/include/bootutil/
Dbench.h36 * benchmarks that are enabled, calling `boot_bench_start()` before a
57 /* Without benchmarking enabled, these are just empty. */
/mcuboot-latest/boot/espressif/port/esp32/
Dbootloader.conf15 # When enabled, prevents updating image to an older version
58 # Example of values to be used when multi image is enabled
Dbootloader-multi.conf8 # Example of values to be used when multi image is enabled
/mcuboot-latest/boot/espressif/port/esp32s3/
Dbootloader.conf15 # When enabled, prevents updating image to an older version
30 # Example of values to be used when multi image is enabled
Dbootloader-multi.conf9 # Example of values to be used when multi image is enabled
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/
Dmbedtls_config.h47 * \note This abstraction layer must be enabled on Windows (including MSYS2)
65 * \c mbedtls_ssl_set_timer_cb() for DTLS, or leave it enabled and provide
/mcuboot-latest/docs/release-notes.d/
Dimgtool_sanity_test.md2 - imgtool: added and enabled unittests in GitGub workflow,
/mcuboot-latest/sim/mcuboot-sys/csupport/
Dpsa_crypto_init_stub.c7 /* This file, and the methods within are required when PSA Crypto API is enabled
/mcuboot-latest/boot/espressif/hal/include/mcuboot_config/
Dmcuboot_config.h124 * If logging is enabled the following functions must be defined by the
178 /* This macro might be implemented if the OS / HW watchdog is enabled while
/mcuboot-latest/ext/nrf/
DREADME.md1 # Building MCUboot with nRF52840 CC310 enabled
/mcuboot-latest/boot/bootutil/zephyr/
DCMakeLists.txt21 # allowing the test-build with the hooks feature enabled.
/mcuboot-latest/samples/mcuboot_config/
Dmcuboot_config.template.h146 * If logging is enabled the following functions must be defined by the
179 /* This macro might be implemented if the OS / HW watchdog is enabled while
/mcuboot-latest/boot/espressif/hal/src/esp32s3/
Dapp_cpu_start.c28 // enabled clock and taken APP CPU out of reset. In this case don't reset in appcpu_start()

123