Searched +full:runs +full:- +full:on (Results 1 – 13 of 13) sorted by relevance
/mcuboot-3.6.0/samples/zephyr/ |
D | Makefile | 2 # Sample multi-part application Makefile 11 # http://www.apache.org/licenses/LICENSE-2.0 14 # distributed under the License is distributed on an "AS IS" BASIS, 21 # deploy and upgrade images. The image building should work on any 23 # the flash addresses, depending on the partition layout of the device 33 # signed-hello1.bin: A signed sample. 34 # signed-hello2.bin: An upgrade image, signed and marked for 52 # semicolon-separated list (i.e., a CMake list). 66 SIGNING_KEY ?= ../../root-rsa-2048.pem 98 $(ASSEMBLE) -b $(BUILD_DIR_BOOT) \ [all …]
|
/mcuboot-3.6.0/boot/boot_serial/ |
D | syscfg.yml | 9 # http://www.apache.org/licenses/LICENSE-2.0 12 # software distributed under the License is distributed on an 23 value: '-1' 25 - '(BOOT_SERIAL_DETECT_PIN != -1) || 27 (BOOT_SERIAL_NVREG_INDEX != -1)' 42 The duration, in milliseconds, to listen on the UART for the 46 received, the boot loader runs in the normal (non-serial) mode. 47 Specify 0 to disable listening on the UART for the management 51 - '(BOOT_SERIAL_DETECT_PIN != -1) || 53 (BOOT_SERIAL_NVREG_INDEX != -1)' [all …]
|
/mcuboot-3.6.0/.github/workflows/ |
D | zephyr_build.yaml | 1 # Copyright (c) 2022-2023 Nordic Semiconductor ASA 2 # SPDX-License-Identifier: Apache-2.0 6 # Workflow triggers on PRs, pushes to main, once per day at midnight and can be started manually. 7 on: 11 - main 14 - main 16 - cron: 0 0 * * * 33 # Only cancel ongoing runs for PRs 35 group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} 36 cancel-in-progress: true [all …]
|
D | mynewt.yaml | 1 # For development, trigger this on any push. 2 on: 5 - main 11 group: mynewt-${{ github.event.pull_request.number || github.ref }} 12 cancel-in-progress: true 16 runs-on: ubuntu-latest 18 - uses: actions/checkout@v2 20 fetch-depth: 0 21 - name: Print the environment 23 uname -a [all …]
|
D | imgtool.yaml | 1 on: 4 - main 5 - v*-branch 10 group: imgtool-${{ github.event.pull_request.number || github.ref }} 11 cancel-in-progress: true 15 runs-on: ubuntu-latest 17 - uses: actions/checkout@v2 19 fetch-depth: 0 20 - name: Cache pip 24 key: ${{ runner.os }}-pip [all …]
|
D | espressif.yaml | 1 # SPDX-FileCopyrightText: 2021 Espressif Systems (Shanghai) CO LTD 2 # SPDX-License-Identifier: Apache-2.0 4 # For development, trigger this on any push. 5 on: 8 - main 14 group: espressif-${{ github.event.pull_request.number || github.ref }} 15 cancel-in-progress: true 23 … - "secureboot-sign-rsa2048,secureboot-sign-rsa3072,secureboot-sign-ec256,secureboot-sign-ed25519" 24 - "serialrecovery" 26 - targets: esp32 [all …]
|
D | fih_tests.yaml | 1 on: 4 - main 10 group: fih-${{ github.event.pull_request.number || github.ref }} 11 cancel-in-progress: true 16 fail-fast: false 21 - "RELEASE 2,4,6 SIGNATURE" 22 - "RELEASE 2,4,6 SIGNATURE LOW" 23 - "RELEASE 2,4,6 SIGNATURE MEDIUM" 24 - "RELEASE 8,10 SIGNATURE" 25 - "RELEASE 8,10 SIGNATURE LOW" [all …]
|
D | stale_issue.yml | 2 on: 4 - cron: "16 00 * * *" 9 runs-on: ubuntu-latest 10 if: github.repository == 'mcu-tools/mcuboot' 12 - uses: actions/stale@v3 14 repo-token: ${{ secrets.GITHUB_TOKEN }} 15 …-pr-message: 'This pull request has been marked as stale because it has been open (more than) 60 d… 16 …-issue-message: 'This issue has been marked as stale because it has been open (more than) 60 days … 17 days-before-stale: 180 18 days-before-close: 14 [all …]
|
D | sim.yaml | 1 # For development, trigger this on any push. 2 on: 5 - main 11 group: sim-${{ github.event.pull_request.number || github.ref }} 12 cancel-in-progress: true 19 - "sig-ecdsa,sig-ecdsa-mbedtls,sig-ed25519,enc-kw,bootstrap" 20 - "sig-rsa,sig-rsa3072,overwrite-only,validate-primary-slot,swap-move" 21 - "enc-rsa,enc-rsa max-align-32" 22 - "enc-aes256-rsa,enc-aes256-rsa max-align-32" 23 - "enc-ec256,enc-ec256 max-align-32" [all …]
|
/mcuboot-3.6.0/ext/mbedtls-asn1/include/mbedtls/ |
D | rsa.h | 4 * \brief This file provides an API for the RSA public-key cryptosystem. 6 * The RSA public-key cryptosystem is defined in <em>Public-Key 8 * and <em>Public-Key Cryptography Standards (PKCS) #1 v2.1: 14 * SPDX-License-Identifier: Apache-2.0 20 * http://www.apache.org/licenses/LICENSE-2.0 23 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 44 #define MBEDTLS_ERR_RSA_BAD_INPUT_DATA -0x4080 /**< Bad input parameters to fun… 45 #define MBEDTLS_ERR_RSA_INVALID_PADDING -0x4100 /**< Input data contains invalid… 46 #define MBEDTLS_ERR_RSA_KEY_GEN_FAILED -0x4180 /**< Something failed during gen… 47 #define MBEDTLS_ERR_RSA_KEY_CHECK_FAILED -0x4200 /**< Key failed to pass the vali… [all …]
|
/mcuboot-3.6.0/sim/tests/ |
D | core.rs | 1 // Copyright (c) 2017-2021 Linaro LTD 2 // Copyright (c) 2017-2019 JUUL Labs 3 // Copyright (c) 2021-2023 Arm Limited 5 // SPDX-License-Identifier: Apache-2.0 39 /// A typical test calls a particular constructor, and runs a given test on 62 #[cfg(not(feature = "max-align-32"))] 121 // If the first image is not met, we should hold back on the 145 // Test one image with a valid dependency on the first image. 152 // Test one image with an invalid dependency on the first image. 167 // Test one image with a valid dependency on the second image. [all …]
|
/mcuboot-3.6.0/docs/ |
D | readme-zephyr.md | 8 Please see the [design document](design.md) for documentation on the design 10 on all supported RTOSs. 15 - `boot_partition`: for MCUboot itself 16 - `slot0_partition`: the primary slot of Image 0 17 - `slot1_partition`: the secondary slot of Image 0 19 It is not recommended to use the swap-using-scratch algorithm of MCUboot, but 21 needed (see end of this help file for details on creating a scratch partition 22 and how to use the swap-using-scratch algorithm): 24 - `scratch_partition`: the scratch slot 28 so your SoC runs it out of reset. If there are multiple updateable images [all …]
|
/mcuboot-3.6.0/sim/src/ |
D | image.rs | 1 // Copyright (c) 2019-2021 Linaro LTD 2 // Copyright (c) 2019-2020 JUUL Labs 3 // Copyright (c) 2019-2023 Arm Limited 5 // SPDX-License-Identifier: Apache-2.0 60 /// For testing, use a non-zero offset for the ram-load, to make sure the offset is getting used 86 /// When doing multi-image, there is an instance of this information for 94 /// The Rust-side representation of an image. For unencrypted images, this 104 /// multi-image builds, these may not correspond with the offsets. This has to be computed early, 143 pub fn new(device: DeviceName, align: usize, erased_val: u8) -> Result<Self, String> { in new() 182 trailer_off: primary_base + primary_len - offset_from_end, in new() [all …]
|