Home
last modified time | relevance | path

Searched full:firmware (Results 1 – 25 of 450) sorted by relevance

12345678910>>...18

/Zephyr-Core-3.5.0/doc/connectivity/bluetooth/api/mesh/
Ddfu.rst3 Device Firmware Update (DFU)
6 Bluetooth mesh supports the distribution of firmware images across a mesh network. The Bluetooth
7 mesh DFU subsystem implements the Bluetooth Mesh Device Firmware Update Model specification version
10 Bluetooth mesh DFU implements a distribution mechanism for firmware images, and does not put any
13 firmware validation and deployment to the application.
32 distribution of firmware images:
35 Target node is the receiver and user of the transferred firmware images. All its functionality is
41 node in the Upload Firmware procedure, then it distributes the uploaded image to other Target
53 Target nodes and their firmware, and will control (and initiate) all firmware updates. The
69 replace the Firmware Distribution Server model with a proprietary mechanism that will access the
[all …]
Ddfd_srv.rst3 Firmware Distribution Server
6 The Firmware Distribution Server model implements the Distributor role for the
8 receive the firmware image binary from the Initiator node. It also instantiates a
9 :ref:`bluetooth_mesh_dfu_cli`, which it uses to distribute firmware updates throughout the mesh
14 Currently, the Firmware Distribution Server supports out-of-band (OOB) retrieval of firmware
17 The Firmware Distribution Server does not have an API of its own, but relies on a Firmware
21 Firmware slots
24 The Firmware Distribution Server is capable of storing multiple firmware images for distribution.
25 Each slot contains a separate firmware image with metadata, and can be distributed to other mesh
26 nodes in the network in any order. The contents, format and size of the firmware images are vendor
[all …]
Ddfu_srv.rst3 Firmware Update Server
6 The Firmware Update Server model implements the Target node functionality of the
8 receive the firmware image binary from the Distributor node.
10 Together with the extended BLOB Transfer Server model, the Firmware Update Server model implements
11 all the required functionality for receiving firmware updates over the mesh network, but does not
14 Firmware images
17 The Firmware Update Server holds a list of all the updatable firmware images on the device. The full
20 started. Each firmware image in the image list must be independently updatable, and should have its
21 own firmware ID.
24 firmware update capabilities could have three entries in the firmware image list, each with their
[all …]
Ddfu_cli.rst3 Firmware Update Client
6 The Firmware Update Client is responsible for distributing firmware updates through the mesh
7 network. The Firmware Update Client uses the :ref:`bluetooth_mesh_blob_cli` as a transport for its
/Zephyr-Core-3.5.0/include/zephyr/bluetooth/mesh/
Ddfd.h17 * @defgroup bt_mesh_dfd Firmware Distribution models
22 /** Firmware distribution status. */
38 /** The requested firmware image is not stored on the Distributor. */
50 /** Another firmware image distribution is in progress. */
65 /** The Check Firmware OOB procedure did not find any new firmware. */
68 /** The suspension of the Distribute Firmware procedure failed. */
72 /** Firmware distribution phases. */
74 /** No firmware distribution is in progress. */
77 /** Firmware distribution is in progress. */
83 /** The Apply Firmware on Target Nodes procedure is being executed. */
[all …]
Ddfd_srv.h9 * @defgroup bt_mesh_dfd_srv Firmware Distribution Server model
12 * @brief API for the Firmware Distribution Server model
85 * @brief Firmware Distribution Server model Composition Data entry.
95 /** Firmware Distribution Server callbacks: */
101 * @c io with a pointer to a writable BLOB stream for the Firmware Distribution
102 * Server to write the firmware image to.
104 * @param srv Firmware Distribution Server model instance.
115 /** @brief Firmware upload OOB start callback.
117 * Called at the start of an OOB firmware upload. The application must
118 * start a firmware check using an OOB mechanism, and then call
[all …]
Ddfu.h20 * @defgroup bt_mesh_dfu Bluetooth Mesh Device Firmware Update
43 /** Ready to start a Receive Firmware procedure. */
49 /** The Receive Firmware procedure is being executed. */
52 /** The Verify Firmware procedure is being executed. */
55 /** The Verify Firmware procedure completed successfully. */
58 /** The Verify Firmware procedure failed. */
61 /** The Apply New Firmware procedure is being executed. */
64 /** Firmware transfer has been canceled. */
67 /** Firmware applying succeeded. */
70 /** Firmware applying failed. */
[all …]
Ddfu_metadata.h9 * @defgroup bt_mesh_dfu_metadata Bluetooth mesh Device Firmware Update (DFU) metadata
28 /** Firmware version. */
30 /** Firmware major version. */
32 /** Firmware minor version. */
34 /** Firmware revision. */
36 /** Firmware build number. */
40 /** Firmware core type. */
50 /** Firmware metadata. */
52 /** New firmware version. */
54 /** New firmware size. */
[all …]
Ddfu_srv.h9 * @defgroup bt_mesh_dfu_srv Firmware Update Server model
12 * @brief API for the Bluetooth mesh Firmware Update Server model
44 * @brief Firmware Update Server model entry.
53 /** @brief Firmware Update Server event callbacks. */
72 * @param srv Firmware Update Server instance.
87 * Called when the Firmware Update Server is ready to start a new DFU transfer.
97 * image, and there's no need to transfer it again. The Firmware Update model
102 * @param srv Firmware Update Server instance.
123 * firmware image, and call either @ref bt_mesh_dfu_srv_verified or
126 * If the transfer fails, the Firmware Update Server will be available for new
[all …]
Ddfu_cli.h9 * @defgroup bt_mesh_dfu_cli Firmware Uppdate Client model
12 * @brief API for the Bluetooth mesh Firmware Update Client model
44 * @brief Firmware Update Client model Composition Data entry.
113 * @param cli Firmware Update Client model instance.
129 /** Firmware Update Client event callbacks. */
135 * @param cli Firmware Update Client model instance.
144 * @param cli Firmware Update Client model instance.
155 * @param cli Firmware Update Client model instance.
164 * @param cli Firmware Update Client model instance.
173 * @param cli Firmware Update Client model instance.
[all …]
/Zephyr-Core-3.5.0/arch/arm/core/cortex_m/tz/
DKconfig18 comment "Secure firmware"
21 comment "Non-secure firmware"
32 bool "Secure Firmware has Secure Entry functions"
35 Option indicates that ARM Secure Firmware contains
58 bool "Non-Secure Firmware uses Secure Entry functions"
61 Option indicates that ARM Non-Secure Firmware uses Secure
62 Entry functions provided by the Secure Firmware. The Secure
63 Firmware must be configured to provide these functions.
73 Firmware that contains secure entry functions, and allows
74 the Non-Secure Firmware to call into the Secure Firmware.
/Zephyr-Core-3.5.0/modules/trusted-firmware-m/
DKconfig.tfm.partitions17 in the trusted-firmware-m repository for details regarding this
19 options are handled by the build system in the trusted-firmware-m
28 in the trusted-firmware-m repository for details regarding this
30 options are handled by the build system in the trusted-firmware-m
39 in the trusted-firmware-m repository for details regarding this
41 options are handled by the build system in the trusted-firmware-m
51 in the trusted-firmware-m repository for details regarding this
53 options are handled by the build system in the trusted-firmware-m
62 in the trusted-firmware-m repository for details regarding this
64 options are handled by the build system in the trusted-firmware-m
[all …]
DKconfig.tfm56 string "Path to private key used to sign secure firmware images."
62 firmware images.
65 string "Path to private key used to sign non-secure firmware images."
71 firmware images.
191 versions of both the secure firmware and non-secure firmware. This sets
192 the secure firmware's version for rollback prevention.
199 versions of both the secure firmware and non-secure firmware. This sets
200 the non-secure firmware's version for rollback prevention.
225 The main one is the TF-M secure firmware. Optionally the TF-M
304 prompt "TF-M Firmware Framework model"
[all …]
/Zephyr-Core-3.5.0/doc/services/device_mgmt/
Dota.rst9 Over-the-Air (OTA) Update is a method for delivering firmware updates to remote
13 infrastructure to host the firmware binary and implement a method of signaling
14 when an update is available. Security is a concern with OTA updates; firmware
17 The :ref:`dfu` section discusses upgrading Zephyr firmware using MCUboot. The
29 configured to observe your available firmware revisions on the Golioth Cloud.
32 TLS/DTLS, and the signed firmware binary is confirmed by MCUboot before the
43 REST api to detect firmware updates. When a new update is detected, the binary
45 upgrading the firmware.
56 signature before upgrading the firmware.
64 A Simple Management Protocol (SMP) server can be used to update firmware via
[all …]
/Zephyr-Core-3.5.0/include/zephyr/drivers/dma/
Ddma_mcux_smartdma.h39 * @brief install SMARTDMA firmware
41 * Install a custom firmware for the smartDMA. This function allows the user
42 * to install a custom firmware into the smartDMA, which implements
43 * different API functions than the standard MCUX SDK firmware.
45 * @param firmware: address of buffer containing smartDMA firmware
46 * @param len: length of firmware buffer
48 void dma_smartdma_install_fw(const struct device *dev, uint8_t *firmware,
/Zephyr-Core-3.5.0/drivers/dma/
Ddma_mcux_smartdma.c178 * Initialize the SMARTDMA with firmware. The default firmware in dma_mcux_smartdma_init()
179 * from MCUX SDK is a display firmware, which has functions in dma_mcux_smartdma_init()
181 * user can install another firmware using `dma_smartdma_install_fw` in dma_mcux_smartdma_init()
205 * @brief install SMARTDMA firmware
207 * Install a custom firmware for the smartDMA. This function allows the user
208 * to install a custom firmware into the smartDMA, which implements
209 * different API functions than the standard MCUX SDK firmware.
211 * @param firmware: address of buffer containing smartDMA firmware
212 * @param len: length of firmware buffer
214 void dma_smartdma_install_fw(const struct device *dev, uint8_t *firmware, in dma_smartdma_install_fw() argument
[all …]
/Zephyr-Core-3.5.0/samples/tfm_integration/
Dtfm_integration.rst17 Trusted Firmware Platform Security Architecture (PSA) APIs are used for the
29 What is Trusted Firmware-M (TF-M)?
32 Trusted Firmware-M (TF-M) is the reference implementation of `Platform Security
39 supports firmware upgrade.
43 Trusted Firmware-M source code is available at
47 `<https://github.com/zephyrproject-rtos/trusted-firmware-m>`_.
/Zephyr-Core-3.5.0/subsys/dfu/
DKconfig64 bool "Erase flash progressively when receiving new firmware"
68 If enabled, flash is erased as necessary when receiving new firmware,
80 a new firmware. This is useful to avoid firmware reboot and test.
81 Another use is to ensure that firmware upgrade routines from internet
/Zephyr-Core-3.5.0/boards/arm/nrf5340_audio_dk_nrf5340/
DKconfig.defconfig13 # For the secure version of the board the firmware is linked at the beginning
15 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
19 # For the non-secure version of the board, the firmware
26 # If the secure firmware is to be combined with a non-secure image
32 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.5.0/subsys/bluetooth/mesh/shell/
DKconfig84 bool "Support for Firmware Distribution Server shell commands"
88 Firmware Distribution Server shell support.
91 bool "Support for Firmware Update Client shell commands"
95 Firmware Update Client shell support.
98 bool "Support for Firmware Update Server shell commands"
102 Firmware Update Server shell support.
/Zephyr-Core-3.5.0/doc/develop/flash_debug/
Dprobes.rst29 microcontroller can support one or more types of firmware that communicate with
31 be programmed with DAPLink firmware to communicate with pyOCD or OpenOCD debug
32 host tools, or with J-Link firmware to communicate with J-Link debug host
83 CMSIS-DAP MCU-Link firmware, which is already installed by default. NXP
107 These probes do not have JLink firmware installed by default, and must be
136 LPC-Link2 firmware. Download and install `LPCScrypt`_ to get the firmware and
139 .. note:: Verify the firmware supports your board by visiting `Firmware for LPCXpresso`_
161 LPC-Link2 firmware. Download and install `LPCScrypt`_ to get the firmware and
164 .. note:: Verify the firmware supports your board by visiting `Firmware for LPCXpresso`_
188 OpenSDA firmware. NXP provides `OpenSDA DAPLink Board-Specific Firmwares`_.
[all …]
/Zephyr-Core-3.5.0/boards/arm/raytac_mdbt53v_db_40_nrf5340/
DKconfig.defconfig27 # For the secure version of the board the firmware is linked at the beginning
29 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
33 # For the non-secure version of the board, the firmware
40 # If the secure firmware is to be combined with a non-secure image
46 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.5.0/boards/arm/nrf5340dk_nrf5340/
DKconfig.defconfig28 # For the secure version of the board the firmware is linked at the beginning
30 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
34 # For the non-secure version of the board, the firmware
41 # If the secure firmware is to be combined with a non-secure image
47 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.5.0/boards/arm/raytac_mdbt53_db_40_nrf5340/
DKconfig.defconfig28 # For the secure version of the board the firmware is linked at the beginning
30 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
34 # For the non-secure version of the board, the firmware
41 # If the secure firmware is to be combined with a non-secure image
47 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.5.0/samples/tfm_integration/psa_crypto/boards/
Dnrf9160dk_nrf9160_ns.overlay8 * for the Secure (TF-M) firmware for the configuration that is
12 /* Increase the size of the Secure Firmware (TF-M).
21 /* Decrease the size of the Non-Secure Firmware (Zephyr),

12345678910>>...18