Searched refs:encrypt (Results 1 – 7 of 7) sorted by relevance
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | BlinkyApp.mk | 115 SIGN_ARGS += --encrypt ../../$(ENC_KEY_FILE).pem
|
/mcuboot-latest/boot/mbed/ |
D | mcuboot_imgtool.cmake | 36 …set(MCUBOOT_ENCRYPTION_KEY "" CACHE STRING "Path to key file (.pem) used to encrypt firmware updat… 43 …message(FATAL_ERROR "Since mcuboot.encrypt-rsa is enabled, you must specify the path to a valid im… 79 set(IMGTOOL_EXTRA_ARGS --encrypt ${MCUBOOT_ENCRYPTION_KEY_ABSPATH})
|
/mcuboot-latest/scripts/imgtool/ |
D | main.py | 448 endian, encrypt_keylen, encrypt, compression, infile, outfile, argument 469 enckey = load_key(encrypt) if encrypt else None
|
D | image.py | 672 cipherkey = enckey._get_public().encrypt(
|
/mcuboot-latest/docs/ |
D | imgtool.md | 126 --encrypt-keylen [128|256] When encrypting the image using AES, select 128 -E, --encrypt filename Encrypt image using the provided public key.
|
D | readme-espressif.md | 452 When enabling the Flash Encryption, the user can encrypt the content either using a **device 499 Encryption, encrypt the flash content including bootloader and image slots, burn the eFuses that no 595 The **first boot** will encrypt the flash content using the host key burned in the eFuse instead
|
/mcuboot-latest/ext/tinycrypt/documentation/ |
D | tinycrypt.rst | 164 * The AES-CTR mode limits the size of a data message they encrypt to 2^32 165 blocks. If you need to encrypt larger data sets, your application would
|