Home
last modified time | relevance | path

Searched full:received (Results 1 – 11 of 11) sorted by relevance

/mcuboot-latest/boot/boot_serial/include/boot_serial/
Dboot_serial.h49 * This function will return if there is no mcumgr command received within
50 * the given timeout. If a command is received within this timeout, the
/mcuboot-latest/boot/boot_serial/
Dsyscfg.yml46 received, the boot loader runs in the normal (non-serial) mode.
59 started. If the period expires without this string being received,
/mcuboot-latest/boot/mynewt/src/
Dmain.c104 * @return true if the management string was received;
105 * false if the management string was not received
137 /* If the full management string has been received, indicate that in serial_detect_uart_string()
/mcuboot-latest/boot/zephyr/
DKconfig.serial_recovery90 Number of receive buffers for data received via the serial port.
96 Maximum length of received commands via the serial port (this should
/mcuboot-latest/boot/boot_serial/src/
Dboot_serial.c780 const uint8_t *img_chunk = NULL; /* Pointer to buffer with received image chunk */ in bs_upload()
781 size_t img_chunk_len = 0; /* Length of received image chunk */ in bs_upload()
796 * to allow currently received chunk to be written; in bs_upload()
896 * an image is received. in bs_upload()
908 /* If received chunk offset does not match expected one jump, pretend in bs_upload()
1039 /* Last sector received, now start a decryption on the image if it is encrypted */ in bs_upload()
1281 * Returns 1 if full packet has been received.
1431 * If within this timeout no mcumgr command is received, the function is
/mcuboot-latest/boot/bootutil/include/bootutil/crypto/
Dhmac_sha256.h124 * HMAC the key and check that our received MAC matches the generated tag in bootutil_hmac_sha256_finish()
/mcuboot-latest/docs/
Dreadme-nuttx.md25 …bsystem. Through MCUboot APIs an application is able to install a newly received application firmw…
/mcuboot-latest/boot/zephyr/include/mcuboot_config/
Dmcuboot_config.h265 * to erase flash progressively, as update fragments are received,
/mcuboot-latest/boot/bootutil/src/
Dencrypted.c568 * HMAC the key and check that our received MAC matches the generated tag in boot_decrypt_key()
600 * Finally decrypt the received ciphered key in boot_decrypt_key()
/mcuboot-latest/
DLICENSE63 on behalf of whom a Contribution has been received by Licensor and
/mcuboot-latest/ext/tinycrypt/lib/source/
Dccm_mode.c258 /* comparing the received tag and the computed one: */ in tc_ccm_decryption_verification()