Searched full:on (Results 1 – 25 of 402) sorted by relevance
12345678910>>...17
/mcuboot-latest/boot/bootutil/include/bootutil/ |
D | bootutil_public.h | 22 * software distributed under the License is distributed on an 65 * Absent a confirm command, revert back on next boot. 103 #define BOOT_MAGIC_ANY 4 /* NOTE: control only, not dependent on sector */ 104 #define BOOT_MAGIC_NOTGOOD 5 /* NOTE: control only, not dependent on sector */ 112 #define BOOT_FLAG_ANY 4 /* NOTE: control only, not dependent on sector */ 157 * @brief Determines the action, if any, that mcuboot will take on a image pair. 161 * @return a BOOT_SWAP_TYPE_[...] constant on success, negative errno code on 171 * @return a BOOT_SWAP_TYPE_[...] constant on success, negative errno code on 177 * Marks the image with the given index in the secondary slot as pending. On the 188 * @return 0 on success; nonzero on failure. [all …]
|
D | boot_record.h | 11 * distributed under the License is distributed on an "AS IS" BASIS, 48 * @return 0 on success; nonzero on failure. 63 * @return 0 on success; nonzero on failure. 78 * @return 0 on success; nonzero on failure.
|
/mcuboot-latest/ext/mbedtls-asn1/include/mbedtls/ |
D | asn1.h | 17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 191 * \param p On entry, \c *p points to the first byte of the length, 193 * On successful completion, \c *p points to the first byte 195 * On error, the value of \c *p is undefined. 197 * \param len On successful completion, \c *len contains the length 214 * \param p On entry, \c *p points to the start of the ASN.1 element. 215 * On successful completion, \c *p points to the first byte 217 * On error, the value of \c *p is undefined. 219 * \param len On successful completion, \c *len contains the length 238 * \param p On entry, \c *p points to the start of the ASN.1 element. [all …]
|
D | md.h | 19 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 150 * If you have called mbedtls_md_setup() on \p ctx, you must 175 * \return \c 0 on success. 176 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification 178 * \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure. 186 * \note You must call mbedtls_md_setup() on \c dst before calling 198 * \return \c 0 on success. 199 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification failure. 246 * \return \c 0 on success. 247 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification [all …]
|
D | ecp.h | 28 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 203 * reduction. It must return 0 on success and non-zero on failure. 277 * Trade code size for speed on fixed-point multiplication. 441 * restart context be the same on successive calls for the 455 * mbedtls_ecdh_enable_restart() was previously called on 475 * lower value. That minimum depends on the curve size, and 539 * \return The associated curve information on success. 540 * \return NULL on failure. 550 * \return The associated curve information on success. 551 * \return NULL on failure. [all …]
|
D | rsa.h | 23 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 169 * \return \c 0 on success. 188 * \note See mbedtls_rsa_complete() for more information on which 202 * \return \c 0 on success. 203 * \return A non-zero error code on failure. 222 * \note See mbedtls_rsa_complete() for more information on which 241 * \return \c 0 on success. 242 * \return A non-zero error code on failure. 278 * \return \c 0 on success. 318 * \return \c 0 on success. [all …]
|
D | bignum.h | 17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 219 * \return Another negative error code on other kinds of failure. 236 * \return Another negative error code on other kinds of failure. 251 * \return Another negative error code on other kinds of failure. 285 * \return Another negative error code on other kinds of failure. 309 * \return Another negative error code on other kinds of failure. 322 * \return Another negative error code on other kinds of failure. 332 * \return \c 0 or \c 1 on success, depending on whether bit \c pos 334 * \return A negative error code on failure. 351 * \return Another negative error code on other kinds of failure. [all …]
|
D | ecdsa.h | 24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 71 * \warning Performing multiple operations concurrently on the same 165 * \return \c 0 on success. 167 * or \c MBEDTLS_MPI_XXX error code on failure. 209 * \return \c 0 on success. 211 * error code on failure. 247 * \return \c 0 on success. 251 * error code on failure for any other reason. 303 * \return \c 0 on success. 305 * \c MBEDTLS_ERR_ASN1_XXX error code on failure. [all …]
|
D | pk.h | 17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 296 * \return 0 on success, 297 * MBEDTLS_ERR_PK_BAD_INPUT_DATA on invalid input, 298 * MBEDTLS_ERR_PK_ALLOC_FAILED on allocation failure. 320 * mbedtls_pk_free() is called on this context. The wrapped 327 * \return \c 0 on success. 328 * \return #MBEDTLS_ERR_PK_BAD_INPUT_DATA on invalid input 332 * \return #MBEDTLS_ERR_PK_ALLOC_FAILED on allocation failure. 349 * \return 0 on success, or MBEDTLS_ERR_PK_BAD_INPUT_DATA if the 365 * \return Key size in bits, or 0 on error [all …]
|
D | mbedtls_config.h | 12 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 47 * \note This abstraction layer must be enabled on Windows (including MSYS2) 48 * as other module rely on it for a fixed snprintf implementation. 62 * \note The provided implementation only works on POSIX/Unix (including Linux, 63 * BSD and OS X) and Windows. On other platforms, you can either disable that 82 //#define MBEDTLS_MEMORY_ALIGN_MULTIPLE 4 /**< Align on multiples of this value */
|
D | platform_util.h | 18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 68 * is later compromised. Call this function on sensitive data 69 * stored on the stack before returning from a function, and on 70 * sensitive data stored on the heap before freeing the heap 111 * \return Pointer to an object of type struct tm on success, otherwise
|
/mcuboot-latest/boot/zephyr/ |
D | Kconfig | 103 depends on BOOT_IMG_HASH_ALG_SHA256_ALLOW 109 depends on BOOT_IMG_HASH_ALG_SHA384_ALLOW 115 depends on BOOT_IMG_HASH_ALG_SHA512_ALLOW 160 depends on HAS_HW_NRF_CC310 208 depends on CPU_CORTEX_M 235 bool "Validate image in the primary slot on every boot" 245 depends on !BOOT_VALIDATE_SLOT0 && SINGLE_APPLICATION_SLOT 275 This is the most conservative swap mode but it can work even on 300 If y, mcuboot selects the newest valid image based on the image version 309 If y, mcuboot selects the newest valid image based on the image version [all …]
|
D | Kconfig.serial_recovery | 16 depends on !BOOT_FIRMWARE_LOADER 46 the chosen, leaving console on CDC ACM. 52 depends on !SINGLE_APPLICATION_SLOT 107 on some hardware that has long erase times, to prevent long wait 141 depends on GPIO 148 depends on BOOT_SERIAL_ENTRANCE_GPIO 150 Used to prevent the bootloader from loading on button press. 151 Useful for powering on when using the same button as 156 depends on BOOT_SERIAL_UART || BOOT_SERIAL_CDC_ACM 165 depends on BOOT_SERIAL_WAIT_FOR_DFU [all …]
|
D | Kconfig.firmware_loader | 11 depends on GPIO 18 depends on BOOT_FIRMWARE_LOADER_ENTRANCE_GPIO 20 Used to prevent the bootloader from loading on button press. 21 Useful for powering on when using the same button as 26 depends on RETENTION_BOOT_MODE
|
D | firmware_loader.c | 34 * @return FIH_SUCCESS on success, error code otherwise 102 * @param[out] rsp Parameters for booting image, on success 104 * @return FIH_SUCCESS on success; non-zero on failure. 144 * Gather information on image and prepare for booting. Will boot from main 149 * @param[out] rsp Parameters for booting image, on success 151 * @return FIH_SUCCESS on success; non-zero on failure.
|
/mcuboot-latest/docs/ |
D | readme-zephyr.md | 8 Please see the [design document](design.md) for documentation on the design 10 on all supported RTOSs. 21 needed (see end of this help file for details on creating a scratch partition 55 if the primary slot should be validated on every boot. 68 `boot/zephyr/include/target.h`. Depending on the board, this information 70 MCUboot on a per-SoC family basis. 76 on the target and flash tool used, this might erase the whole of the flash 90 a simple application with everything you need. You can try it on your 91 board and then just make a copy of it to get started on your own 108 repository. See below on how to make your own signatures. [all …]
|
D | encrypted_images.md | 14 - software distributed under the License is distributed on an 27 device or while residing on an external flash, `MCUboot` has support 28 for encrypting/decrypting images on-the-fly while upgrading. 40 if the image is not residing on the device or is written to external 58 applied over the un-encrypted data. Validation on encrypted images, checks 66 block (allowing for simple resume operations on swap interruptions). 74 encrypted using either RSA-OAEP, AES-KW (128 or 256 bits depending on the 86 multiple standards which differ only on which building blocks are used; for 87 MCUboot we settled on some primitives that are easily found on our crypto 95 * Derive the new keys from the secret using HKDF (built on HMAC-SHA256). We
|
D | readme-espressif.md | 3 The MCUBoot Espressif's port depends on HAL (Hardware Abstraction Layer) sources based on ESP-IDF 23 the bootloader own memory layout to avoid overlapping. More information on the section 86 `-DMCUBOOT_CONFIG_FILE` argument on the first step below. 212 It is also possible to rely on a security counter, also added to the image when signing with 224 # [Security Chain on Espressif port](#security-chain-on-espressif-port) 231 on the MCUboot Espressif port. 299 The Secure Boot implementation is based on 302 role for ensuring that only authorized code will be executed on the device. This is done through 310 In order to build the bootloader with the feature on, the following configurations must be enabled: 337 *On development phase is recommended add the following configuration in order to keep the debugging [all …]
|
/mcuboot-latest/sim/mcuboot-sys/csupport/storage/ |
D | flash_map.h | 13 * software distributed under the License is distributed on an 47 * @brief Structure describing an area on a flash device. 100 * On success, the address will be stored in the value pointed to by 103 * Returns 0 on success, or an error code on failure. 142 * Returns 0 on success, or an error code on failure. 151 * Returns 0 on success, or an error code on failure.
|
/mcuboot-latest/boot/zephyr/include/flash_map_backend/ |
D | flash_map_backend.h | 40 * On success, the address will be stored in the value pointed to by 43 * Returns 0 on success, or an error code on failure. 61 * Returns 0 on success, or an error code on failure. 103 * Returns 0 on success, -ERANGE if @p off is beyond flash area size, 104 * other negative errno code on failure.
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | README.md | 5 Given solution demonstrates operation of MCUboot on Cypress' PSoC6 device. 12 - CY8CPROTO-062-4343W - PSoC 6 2M on board 13 - CY8CKIT-062-WIFI-BT - PSoC 6 1M on board 14 - CY8CPROTO-062S3-4343W - PSoC 6 512K on board 29 …ication and uses completely SW implementation of cryptographic functions based on Mbed TLS Library. 38 Cypress PSOC6 MCU family supports hardware acceleration of cryptography based on Mbed TLS Library v… 83 Multi-image operation considers upgrading and verification of more then one image on the device. 85 …to 2 (only dual-image is supported at the moment). This could also be done on build time by passin… 124 2. `CY_SMIF_SLAVE_SELECT_0` is used as definition SMIF driver API. This configuration is used on ev… 204 Regular shell/terminal combination on Linux and MacOS. [all …]
|
D | ExternalMemory.md | 8 The memory module present on board is S25FL512SAGMFI010 512-Mbit external Quad SPI NOR Flash. 14 The design is based on using SFDP command's auto-discovery functionality of memory module IC and Cy… 67 3. Define which slave select is used for external memory on a board by setting `smif_id` value in `… 70 …nal memory code is developed basing on PDL and can be run on CM0p core only. It may require modifi… 96 1. Press SW3 Mode button on a board to switch the board into DAP Link mode.
|
/mcuboot-latest/ |
D | LICENSE | 41 form, that is based on (or derived from) the Work and for which the 52 or by an individual or Legal Entity authorized to submit on behalf of 56 communication on electronic mailing lists, source code control systems, 57 and issue tracking systems that are managed by, or on behalf of, the 63 on behalf of whom a Contribution has been received by Licensor and 145 Contributor provides its Contributions) on an "AS IS" BASIS, 170 on Your own behalf and on Your sole responsibility, not on behalf 185 file or class name and description of purpose be included on the 198 distributed under the License is distributed on an "AS IS" BASIS,
|
/mcuboot-latest/boot/cypress/MCUBootApp/config/ |
D | mcuboot_crypto_config.h | 21 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 67 * division on a 32-bit platform, 128-bit division on a 64-bit platform). 83 * Furthermore, a 64-bit type is always required even on a 32-bit 100 * operands with a 64-bit result in order to speed up computations. On some 105 * removes the dependency of that library on platforms that lack a hardware 108 * Note that depending on the compiler, this may decrease performance compared 188 * This makes sure there are no linking errors on platforms that do not support 213 * \note MBEDTLS_PLATFORM_SNPRINTF_ALT is required on Windows; 244 * Uncomment to get warnings on using deprecated functions. 256 * Uncomment to get errors on using deprecated functions. [all …]
|
/mcuboot-latest/ci/fih_test_docker/ |
D | execute_test.sh | 12 # distributed under the License is distributed on an "AS IS" BASIS, 42 -DTEST_S=ON \ 43 -DTEST_NS=ON \ 44 -DTFM_PSA_API=ON \
|
12345678910>>...17