/mcuboot-3.6.0/sim/simflash/src/ |
D | lib.rs | 23 io::{self, Write}, 36 #[error("Invalid write: {0}")] 37 Write(String), enumerator 38 #[error("Write failed by chance: {0}")] 56 fn write(&mut self, offset: usize, payload: &[u8]) -> Result<()>; in write() method 77 FlashError::Write(message.as_ref().to_owned()) in ewrite() 182 fn write(&mut self, offset: usize, payload: &[u8]) -> Result<()> { in write() method 189 format!("Ignoring write to {:#x}-{:#x}", off, off + len))); in write() 195 panic!("Write outside of device"); in write() 200 panic!("Misaligned write address"); in write() [all …]
|
/mcuboot-3.6.0/boot/boot_serial/include/boot_serial/ |
D | boot_serial.h | 28 * Function pointers to read/write data from uart. 32 * write takes as it's arguments pointer to data to write, and the count 37 void (*write)(const char *ptr, int cnt); member
|
/mcuboot-3.6.0/scripts/imgtool/keys/ |
D | ed25519.py | 44 """Write the public key to the given file.""" 49 f.write(pem) 91 Write the private key to the given file, protecting it with the 103 f.write(pem)
|
D | x25519.py | 50 """Write the public key to the given file.""" 55 f.write(pem) 96 Write the private key to the given file, protecting it with the 108 f.write(pem)
|
D | general.py | 63 file.write(self.get_public_bytes()) 65 sys.stdout.buffer.write(self.get_public_bytes()) 72 file.write(digest.finalize()) 74 sys.stdout.buffer.write(digest.finalize())
|
D | rsa.py | 60 """Write the public key to the given file.""" 65 f.write(pem) 154 """Write the private key to the given file, protecting it with the 165 f.write(pem)
|
D | ecdsa.py | 53 """Write the public key to the given file.""" 58 f.write(pem) 130 """Write the private key to the given file, protecting it with ' 141 f.write(pem)
|
/mcuboot-3.6.0/docs/ |
D | readme-nuttx.md | 21 …vers using standard POSIX filesystem operations (e.g. `open()` / `close()` / `read()` / `write()`). 43 ### Write access alignment 45 …passes through the `BCH` and `FTL` layers, which appropriately handle the write alignment restrict… 52 …one task calls `flash_area_open` and another task calls `flash_area_<read/write/close>` passing th…
|
D | readme-mbed.md | 25 * Its minimum supported read and write sizes (granularities) are _no larger than_ 16 byte, which MC…
|
D | design.md | 143 2. A write to one area does not restrict writes to other areas. 449 ~ Swap status (BOOT_MAX_IMG_SECTORS * min-write-size * 3) ~ 491 *"min-write-size" is a property of the flash hardware. If the hardware* 493 *min-write-size is 1. If the hardware only allows writes at even addresses,* 494 *then min-write-size is 2, and so on.* 518 The factor of min-write-size is due to the behavior of flash hardware. The factor 556 distinct values depending on the maximum supported write alignment 583 supported write alignment value is encoded in the MAGIC field, followed by a fixed 904 + c. Write updated swap status (i). 910 + f. Write updated swap status (ii). [all …]
|
/mcuboot-3.6.0/ptest/src/ |
D | main.rs | 19 io::{ErrorKind, stdout, Write}, 121 // Write the output into a file. in done() 129 .write(true) in done() 135 error!("Unable to write log file to current directory: {:?}", err); in done() 270 use std::fmt::Write; in textual() 274 write!(&mut buf, "{}:", self.env).unwrap(); in textual() 276 write!(&mut buf, " {}", v).unwrap(); in textual()
|
/mcuboot-3.6.0/boot/espressif/include/serial_adapter/ |
D | serial_adapter.h | 10 * Serial write implementation used by MCUboot boot serial structure 22 * Initialize GPIOs used by console serial read/write
|
/mcuboot-3.6.0/ext/mbedtls-asn1/include/mbedtls/ |
D | pk.h | 55 #define MBEDTLS_ERR_PK_FILE_IO_ERROR -0x3E00 /**< Read/write of file failed. */ 494 * \param sig Place to write the signature. 532 * \param sig Place to write the signature. 623 * \param items Place to write debug items 761 * \brief Write a private key to a PKCS#1 or SEC1 DER structure 767 * \param buf buffer to write to 776 * \brief Write a public key to a SubjectPublicKeyInfo DER structure 782 * \param buf buffer to write to 792 * \brief Write a public key to a PEM string 795 * \param buf Buffer to write to. The output includes a [all …]
|
/mcuboot-3.6.0/boot/espressif/ |
D | main.c | 25 .write = console_write 107 * 1) Calculate the SHA-256 hash digest of the public key and write to EFUSE. in main() 111 * 4) Generate Flash Encryption key and write to EFUSE. in main() 221 * 4) Generate Flash Encryption key and write to EFUSE. in main()
|
/mcuboot-3.6.0/scripts/ |
D | assemble.py | 91 ofd.write(buf) 96 ofd.write(ibuf) 116 help='Filename to write full image to')
|
/mcuboot-3.6.0/boot/boot_serial/src/ |
D | boot_serial.c | 638 uint8_t rem_bytes; /* Reminder bytes after aligning chunk write to 654 * is needed to be able to write current chunk. 737 * result. Make sure the user cannot write it from an image to skip validation. 787 /* Writes are aligned to flash write alignment, so may drop a few bytes 790 * write. 800 /* Write flash aligned chunk, note that img_chunk_len now holds aligned length */ 804 /* Buffer address incompatible with write address, use buffer to write */ 836 * written by the above write, so we are left with the rem_bytes. 1114 boot_uf->write(pkt_start, sizeof(pkt_start)); 1116 boot_uf->write(pkt_cont, sizeof(pkt_cont)); [all …]
|
/mcuboot-3.6.0/boot/zephyr/ |
D | CMakeLists.txt | 390 # Check both slots for the one with the largest write/erase block size 392 dt_prop(write_size_slot0 PATH "${slot0_flash}" PROPERTY "write-block-size") 394 dt_prop(write_size_slot1 PATH "${slot1_flash}" PROPERTY "write-block-size") 421 dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size") 425 dt_prop(write_size PATH "${slot0_flash}" PROPERTY "write-block-size") 434 …message(WARNING "Unable to determine write size of slot0 or slot1 partition, setting to 8 (this is…
|
D | shared_data.c | 101 LOG_ERR("Shared data TLV header write failed: %d", rc); in boot_add_data_to_shared_area() 109 LOG_ERR("Shared data TLV data write failed: %d", rc); in boot_add_data_to_shared_area()
|
/mcuboot-3.6.0/boot/espressif/hal/src/ |
D | flash_encrypt.c | 95 …ESP_LOGE(TAG, "Flash Encryption cannot be enabled (CRYPT_CNT (%d) is write protected)", get_flash_… in esp_flash_encrypt_is_write_protected() 107 ESP_LOGV(TAG, "CRYPT_CNT %d, write protection %d", flash_crypt_cnt, flash_crypt_wr_dis); in esp_flash_encrypt_state() 228 … ESP_LOGE(TAG, "Failed to write efuse block with purpose (err=0x%x). Can't continue.", err); in check_and_generate_encryption_keys() 237 … ESP_LOGE(TAG, "Invalid key state, check read&write protection for key and keypurpose(if exists)"); in check_and_generate_encryption_keys() 361 …// It is important to protect XTS_KEY_LENGTH_256 from further changing it to 1. Set write protecti… in esp_flash_encrypt_enable()
|
/mcuboot-3.6.0/boot/nuttx/src/flash_map_backend/ |
D | flash_map_backend.c | 452 * Write data to flash area. 453 * Area write boundaries are asserted before write request. API has the 454 * same limitation regarding write-block alignment and size as the 461 * len - Number of bytes to write. 484 BOOT_LOG_ERR("Attempt to write out of flash area bounds"); in flash_area_write() 501 /* Write the buffer to the flash block */ in flash_area_write() 503 nbytes = write(dev->fd, src, len); in flash_area_write() 508 BOOT_LOG_ERR("Write to %s failed: %d", fa->fa_mtd_path, errcode); in flash_area_write() 586 * Get write block size of the flash area. 587 * Write block size might be treated as read block size, although most
|
/mcuboot-3.6.0/docs/release-notes.d/ |
D | bootutil-sector.md | 5 - bootutil: Added debug logging to show write location of swap status
|
/mcuboot-3.6.0/sim/src/ |
D | image.rs | 23 io::{Cursor, Write}, 1086 /// and warn that write fails were detected... 1132 error!("Error running upgrade with status write fails"); in run_with_status_fails_complete() 1140 /// and warn that write fails were detected... 1182 error!("Error running upgrade with status write fails"); in run_with_status_fails_with_reset() 1402 // Disabling write verification the only assert triggered by in reset_bad_status() 1892 // Since images are always non-encrypted in the primary slot, we first write in install_image() 1904 dev.write(offset, &encbuf).unwrap(); in install_image() 1916 dev.write(offset, &buf).unwrap(); in install_image() 1928 dev.write(offset, &buf).unwrap(); in install_image() [all …]
|
/mcuboot-3.6.0/boot/cypress/MCUBootApp/ |
D | main.c | 93 * either disabled or enabled & running a valid application for flash write in main() 94 * to work from CM0+. Since flash write may happen in boot_go() for updating in main()
|
/mcuboot-3.6.0/boot/nuttx/include/flash_map_backend/ |
D | flash_map_backend.h | 275 * Write data to flash area. 276 * Area write boundaries are asserted before write request. API has the 277 * same limitation regarding write-block alignment and size as the 284 * len - Number of bytes to write. 320 * Get write block size of the flash area. 321 * Write block size might be treated as read block size, although most
|
/mcuboot-3.6.0/boot/zephyr/boards/ |
D | nrf52840dk_ram.overlay | 38 write-block-size = <1>;
|