Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 45) sorted by relevance

12

/Zephyr-Core-3.5.0/subsys/jwt/
DKconfig11 prompt "JWT signature algorithm"
18 bool "Use RSA signature (RS-256)"
23 bool "Use ECDSA signature (ES-256)"
/Zephyr-Core-3.5.0/cmake/
Dtarget_toolchain_flags.cmake3 # What we are looking for, is a signature definition that is defined
12 # * CMAKE_C_COMPILER_ID is taking the CMake compiler id for extra signature.
14 # methods, where an upgraded compiler could have same signature due to ccache
16 # and thus generate a new signature.
18 # Toolchains with the same signature will always support the same set of flags.
23 # Extend the CMAKE_C_COMPILER_MD5_SUM with the compiler signature.
Dmcuboot.cmake26 # No signature key file, no signed binaries. No error, though:
/Zephyr-Core-3.5.0/arch/x86/core/
Dacpi.c135 void *z_acpi_find_table(uint32_t signature) in z_acpi_find_table() argument
173 if (t->signature == signature && check_sum(t)) { in z_acpi_find_table()
215 if (t->signature == signature && check_sum(t)) { in z_acpi_find_table()
/Zephyr-Core-3.5.0/cmake/linker/armlink/
Dlinker_flags.cmake1 # The ARMClang linker, armlink, requires a dedicated linking signature in
/Zephyr-Core-3.5.0/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dshell.py12 from inspect import signature
98 cls_fields = {field for field in signature(cls).parameters}
/Zephyr-Core-3.5.0/samples/tfm_integration/psa_crypto/
DCMakeLists.txt23 # insufficient memory failure while verifying signature. Increase it to 0x2400.
DREADME.rst40 - Verify the signature using the public key
333 [00:00:03.658,000] <inf> app: Verifying signature for SHA-256 hash
/Zephyr-Core-3.5.0/include/zephyr/acpi/
Dacpi.h142 void *acpi_table_get(char *signature, int inst);
/Zephyr-Core-3.5.0/doc/services/device_mgmt/
Dota.rst44 is downloaded and installed. MCUboot can be used to verify the signature before
56 signature before upgrading the firmware.
Dmcumgr.rst389 validate the image, using the SHA-256 and/or the signature (depending on
391 valid is to run ``imgtool verify -k <your-signature-key> <your-image>``,
392 where ``-k <your-signature-key`` can be skipped if no signature validation
/Zephyr-Core-3.5.0/share/sysbuild/images/bootloader/
DKconfig45 bool "No signature; use only hash check"
/Zephyr-Core-3.5.0/modules/
DKconfig.tinycrypt48 bool "ECC_DSA digital signature algorithm"
/Zephyr-Core-3.5.0/drivers/dma/
Ddma_iproc_pax.h443 uint32_t signature:16; member
/Zephyr-Core-3.5.0/lib/acpi/
Dacpi.c628 void *acpi_table_get(char *signature, int inst) in acpi_table_get() argument
641 status = AcpiGetTable(signature, inst, &table); in acpi_table_get()
/Zephyr-Core-3.5.0/doc/services/retention/
Dblinfo.rst107 * ``blinfo/signature_type`` The signature type MCUboot is configured for
/Zephyr-Core-3.5.0/boards/xtensa/intel_adsp_cavs25/doc/
Dchromebooks_adsp.rst79 Now you need to turn of signature verification in the bootloader
80 (because obviously we'll be breaking whatever signature existed).
81 Note that signature verification is something done by the ROM
296 there because the boot requires a valid signature, even though as
/Zephyr-Core-3.5.0/cmake/modules/
DFindZephyr-sdk.cmake7 # Its purpose is to allow the find_package basic signature mode to lookup Zephyr
/Zephyr-Core-3.5.0/doc/
DCMakeLists.txt69 # This function has the same signature as `add_custom_target()`
/Zephyr-Core-3.5.0/doc/security/
Dsensor-threat.rst151 The bootloader is responsible for verifying the signature of the
155 The bootloader shall verify the signature of the update image
163 this image, the bootloader shall verify a digital signature of the
234 certificate chain has a valid signature path from a root
/Zephyr-Core-3.5.0/doc/releases/
Dmigration-guide-3.5.rst20 * The kernel :c:func:`k_mem_slab_free` function has changed its signature, now
22 The new signature will not immediately trigger a compiler error or warning,
258 * The ``accept()`` callback's signature in :c:struct:`bt_l2cap_server` has
/Zephyr-Core-3.5.0/doc/develop/api/
Ddesign_guidelines.rst15 specifying the signature of a callback:
/Zephyr-Core-3.5.0/doc/services/crypto/
Dtinycrypt.rst75 * Type of primitive: Digital signature.
255 * Digital signature (EC-DSA);
/Zephyr-Core-3.5.0/scripts/ci/
Dpylintrc114 unexpected-special-method-signature,
/Zephyr-Core-3.5.0/doc/connectivity/networking/api/
Dnet_mgmt.rst142 You define your handler modeled with this signature:

12