Home
last modified time | relevance | path

Searched full:firmware (Results 1 – 25 of 547) sorted by relevance

12345678910>>...22

/Zephyr-Core-3.7.0/doc/connectivity/bluetooth/api/mesh/
Ddfu.rst3 Device Firmware Update (DFU)
6 Bluetooth Mesh supports the distribution of firmware images across a mesh network. The Bluetooth
7 mesh DFU subsystem implements the Bluetooth Mesh Device Firmware Update Model specification version
10 Bluetooth Mesh DFU implements a distribution mechanism for firmware images, and does not put any
13 firmware validation and deployment to the application.
32 distribution of firmware images:
35 Target node is the receiver and user of the transferred firmware images. All its functionality is
41 node in the Upload Firmware procedure, then it distributes the uploaded image to other Target
53 Target nodes and their firmware, and will control (and initiate) all firmware updates. The
69 replace the Firmware Distribution Server model with a proprietary mechanism that will access the
[all …]
Ddfd_srv.rst3 Firmware Distribution Server
6 The Firmware Distribution Server model implements the Distributor role for the
8 receive the firmware image binary from the Initiator node. It also instantiates a
9 :ref:`bluetooth_mesh_dfu_cli`, which it uses to distribute firmware updates throughout the mesh
14 Currently, the Firmware Distribution Server supports out-of-band (OOB) retrieval of firmware
17 The Firmware Distribution Server does not have an API of its own, but relies on a Firmware
21 Firmware slots
24 The Firmware Distribution Server is capable of storing multiple firmware images for distribution.
25 Each slot contains a separate firmware image with metadata, and can be distributed to other mesh
26 nodes in the network in any order. The contents, format and size of the firmware images are vendor
[all …]
Ddfu_srv.rst3 Firmware Update Server
6 The Firmware Update Server model implements the Target node functionality of the
8 receive the firmware image binary from the Distributor node.
10 Together with the extended BLOB Transfer Server model, the Firmware Update Server model implements
11 all the required functionality for receiving firmware updates over the mesh network, but does not
14 Firmware images
17 The Firmware Update Server holds a list of all the updatable firmware images on the device. The full
20 started. Each firmware image in the image list must be independently updatable, and should have its
21 own firmware ID.
24 firmware update capabilities could have three entries in the firmware image list, each with their
[all …]
Ddfu_cli.rst3 Firmware Update Client
6 The Firmware Update Client is responsible for distributing firmware updates through the mesh
7 network. The Firmware Update Client uses the :ref:`bluetooth_mesh_blob_cli` as a transport for its
/Zephyr-Core-3.7.0/include/zephyr/bluetooth/mesh/
Ddfd.h17 * @defgroup bt_mesh_dfd Firmware Distribution models
22 /** Firmware distribution status. */
38 /** The requested firmware image is not stored on the Distributor. */
50 /** Another firmware image distribution is in progress. */
65 /** The Check Firmware OOB procedure did not find any new firmware. */
68 /** The suspension of the Distribute Firmware procedure failed. */
72 /** Firmware distribution phases. */
74 /** No firmware distribution is in progress. */
77 /** Firmware distribution is in progress. */
83 /** The Apply Firmware on Target Nodes procedure is being executed. */
[all …]
Ddfd_srv.h9 * @defgroup bt_mesh_dfd_srv Firmware Distribution Server model
12 * @brief API for the Firmware Distribution Server model
85 * @brief Firmware Distribution Server model Composition Data entry.
95 /** Firmware Distribution Server callbacks: */
101 * @c io with a pointer to a writable BLOB stream for the Firmware Distribution
102 * Server to write the firmware image to.
104 * @param srv Firmware Distribution Server model instance.
115 /** @brief Firmware upload OOB start callback.
117 * Called at the start of an OOB firmware upload. The application must
118 * start a firmware check using an OOB mechanism, and then call
[all …]
Ddfu.h20 * @defgroup bt_mesh_dfu Bluetooth Mesh Device Firmware Update
43 /** Ready to start a Receive Firmware procedure. */
49 /** The Receive Firmware procedure is being executed. */
52 /** The Verify Firmware procedure is being executed. */
55 /** The Verify Firmware procedure completed successfully. */
58 /** The Verify Firmware procedure failed. */
61 /** The Apply New Firmware procedure is being executed. */
64 /** Firmware transfer has been canceled. */
67 /** Firmware applying succeeded. */
70 /** Firmware applying failed. */
[all …]
Ddfu_metadata.h9 * @defgroup bt_mesh_dfu_metadata Bluetooth Mesh Device Firmware Update (DFU) metadata
28 /** Firmware version. */
30 /** Firmware major version. */
32 /** Firmware minor version. */
34 /** Firmware revision. */
36 /** Firmware build number. */
40 /** Firmware core type. */
50 /** Firmware metadata. */
52 /** New firmware version. */
54 /** New firmware size. */
[all …]
Ddfu_srv.h9 * @defgroup bt_mesh_dfu_srv Firmware Update Server model
12 * @brief API for the Bluetooth Mesh Firmware Update Server model
44 * @brief Firmware Update Server model entry.
53 /** @brief Firmware Update Server event callbacks. */
72 * @param srv Firmware Update Server instance.
87 * Called when the Firmware Update Server is ready to start a new DFU transfer.
97 * image, and there's no need to transfer it again. The Firmware Update model
102 * @param srv Firmware Update Server instance.
123 * firmware image, and call either @ref bt_mesh_dfu_srv_verified or
126 * If the transfer fails, the Firmware Update Server will be available for new
[all …]
Ddfu_cli.h9 * @defgroup bt_mesh_dfu_cli Firmware Uppdate Client model
12 * @brief API for the Bluetooth Mesh Firmware Update Client model
44 * @brief Firmware Update Client model Composition Data entry.
113 * @param cli Firmware Update Client model instance.
129 /** Firmware Update Client event callbacks. */
135 * @param cli Firmware Update Client model instance.
144 * @param cli Firmware Update Client model instance.
155 * @param cli Firmware Update Client model instance.
164 * @param cli Firmware Update Client model instance.
173 * @param cli Firmware Update Client model instance.
[all …]
/Zephyr-Core-3.7.0/arch/arm/core/cortex_m/tz/
DKconfig18 comment "Secure firmware"
21 comment "Non-secure firmware"
32 bool "Secure Firmware has Secure Entry functions"
35 Option indicates that ARM Secure Firmware contains
58 bool "Non-Secure Firmware uses Secure Entry functions"
61 Option indicates that ARM Non-Secure Firmware uses Secure
62 Entry functions provided by the Secure Firmware. The Secure
63 Firmware must be configured to provide these functions.
73 Firmware that contains secure entry functions, and allows
74 the Non-Secure Firmware to call into the Secure Firmware.
/Zephyr-Core-3.7.0/modules/trusted-firmware-m/
DKconfig.tfm.partitions17 in the trusted-firmware-m repository for details regarding this
19 options are handled by the build system in the trusted-firmware-m
28 in the trusted-firmware-m repository for details regarding this
30 options are handled by the build system in the trusted-firmware-m
39 in the trusted-firmware-m repository for details regarding this
41 options are handled by the build system in the trusted-firmware-m
51 in the trusted-firmware-m repository for details regarding this
53 options are handled by the build system in the trusted-firmware-m
62 in the trusted-firmware-m repository for details regarding this
64 options are handled by the build system in the trusted-firmware-m
[all …]
DKconfig.tfm20 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160
21 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120
22 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP
194 versions of both the secure firmware and non-secure firmware. This sets
195 the secure firmware's version for rollback prevention. This version is
204 versions of both the secure firmware and non-secure firmware. This sets
205 the non-secure firmware's version for rollback prevention.
219 The main one is the TF-M secure firmware. Optionally the TF-M
244 string "The signature type used to sign the secure and non-secure firmware images."
250 string "Path to private key used to sign secure firmware images."
[all …]
/Zephyr-Core-3.7.0/doc/services/device_mgmt/
Dota.rst9 Over-the-Air (OTA) Update is a method for delivering firmware updates to remote
13 infrastructure to host the firmware binary and implement a method of signaling
14 when an update is available. Security is a concern with OTA updates; firmware
17 The :ref:`dfu` section discusses upgrading Zephyr firmware using MCUboot. The
29 configured to observe your available firmware revisions on the Golioth Cloud.
32 TLS/DTLS, and the signed firmware binary is confirmed by MCUboot before the
35 1. A working sample can be found on the `Golioth Firmware SDK repository`_
43 REST api to detect firmware updates. When a new update is detected, the binary
45 upgrading the firmware.
56 signature before upgrading the firmware.
[all …]
/Zephyr-Core-3.7.0/modules/hal_infineon/wifi-host-driver/
DCMakeLists.txt57 # CYW43012 firmware
59 zephyr_include_directories(${hal_wifi_dir}/WiFi_Host_Driver/resources/firmware/COMPONENT_43012)
61 # firmware
63 set(cyw43xx_fw_bin ${hal_blobs_dir}/firmware/COMPONENT_43012/43012C0-mfgtest.bin)
64 zephyr_library_sources(${hal_wifi_dir_resources}/firmware/COMPONENT_43012/43012C0-mfgtest_bin.c)
66 set(cyw43xx_fw_bin ${hal_blobs_dir}/firmware/COMPONENT_43012/43012C0.bin)
67 zephyr_library_sources(${hal_wifi_dir_resources}/firmware/COMPONENT_43012/43012C0_bin.c)
71 # CYW4343W firmware
73 zephyr_include_directories(${hal_wifi_dir_resources}/firmware/COMPONENT_4343W)
75 # firmware
[all …]
/Zephyr-Core-3.7.0/include/zephyr/drivers/dma/
Ddma_mcux_smartdma.h39 * @brief install SMARTDMA firmware
41 * Install a custom firmware for the smartDMA. This function allows the user
42 * to install a custom firmware into the smartDMA, which implements
43 * different API functions than the standard MCUX SDK firmware.
45 * @param firmware: address of buffer containing smartDMA firmware
46 * @param len: length of firmware buffer
48 void dma_smartdma_install_fw(const struct device *dev, uint8_t *firmware,
/Zephyr-Core-3.7.0/boards/nxp/common/
Dopensda-debug.rst6 an :ref:`opensda-onboard-debug-probe`. The default firmware present on this
19 1. If the debug firmware has been modified, follow the instructions provided at
21 probe firmware on this board.
28 J-Link firmware, or a :ref:`jlink-external-debug-probe` can be attached to the
33 1. If the debug firmware has been modified, follow the instructions provided at
35 probe firmware on this board.
Drt1xxx-lpclink2-debug.rst6 an :ref:`lpc-link2-onboard-debug-probe`. The default firmware present on this
24 probe firmware on this board.
31 J-Link firmware, or a :ref:`jlink-external-debug-probe` can be attached to the
37 debug USB, as the J-Link firmware does not power the EVK via the
41 probe firmware on this board.
/Zephyr-Core-3.7.0/subsys/dfu/
DKconfig58 Estimated size of update image data, which is used to prevent loading of firmware updates
70 bool "Erase flash progressively when receiving new firmware"
73 If enabled, flash is erased as necessary when receiving new firmware,
84 a new firmware. This is useful to avoid firmware reboot and test.
85 Another use is to ensure that firmware upgrade routines from internet
/Zephyr-Core-3.7.0/drivers/dma/
Ddma_mcux_smartdma.c179 * Initialize the SMARTDMA with firmware. The default firmware in dma_mcux_smartdma_init()
180 * from MCUX SDK is a display firmware, which has functions in dma_mcux_smartdma_init()
182 * user can install another firmware using `dma_smartdma_install_fw` in dma_mcux_smartdma_init()
205 * @brief install SMARTDMA firmware
207 * Install a custom firmware for the smartDMA. This function allows the user
208 * to install a custom firmware into the smartDMA, which implements
209 * different API functions than the standard MCUX SDK firmware.
211 * @param firmware: address of buffer containing smartDMA firmware
212 * @param len: length of firmware buffer
214 void dma_smartdma_install_fw(const struct device *dev, uint8_t *firmware, in dma_smartdma_install_fw() argument
[all …]
/Zephyr-Core-3.7.0/samples/tfm_integration/
Dtfm_integration.rst17 Trusted Firmware Platform Security Architecture (PSA) APIs are used for the
29 What is Trusted Firmware-M (TF-M)?
32 Trusted Firmware-M (TF-M) is the reference implementation of `Platform Security
39 supports firmware upgrade.
43 Trusted Firmware-M source code is available at
47 `<https://github.com/zephyrproject-rtos/trusted-firmware-m>`_.
/Zephyr-Core-3.7.0/boards/nordic/nrf5340_audio_dk/
DKconfig.defconfig10 # For the secure version of the board the firmware is linked at the beginning
12 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
16 # For the non-secure version of the board, the firmware
23 # If the secure firmware is to be combined with a non-secure image
29 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.7.0/boards/nordic/nrf5340dk/
DKconfig.defconfig10 # For the secure version of the board the firmware is linked at the beginning
12 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
16 # For the non-secure version of the board, the firmware
23 # If the secure firmware is to be combined with a non-secure image
29 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.7.0/boards/raytac/mdbt53v_db_40/
DKconfig.defconfig10 # For the secure version of the board the firmware is linked at the beginning
12 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
16 # For the non-secure version of the board, the firmware
23 # If the secure firmware is to be combined with a non-secure image
29 # For the non-secure version of the board, the firmware image SRAM is
/Zephyr-Core-3.7.0/boards/raytac/mdbt53_db_40/
DKconfig.defconfig10 # For the secure version of the board the firmware is linked at the beginning
12 # be loaded by MCUboot. If the secure firmware is to be combined with a non-
16 # For the non-secure version of the board, the firmware
23 # If the secure firmware is to be combined with a non-secure image
29 # For the non-secure version of the board, the firmware image SRAM is

12345678910>>...22