/mcuboot-latest/sim/src/ |
D | tlv.rs | 192 let flag = if aes_key_size == 256 { in new_enc_rsa() localVariable 198 flags: flag, in new_enc_rsa() 206 let flag = if aes_key_size == 256 { in new_sig_enc_rsa() localVariable 212 flags: flag, in new_sig_enc_rsa() 220 let flag = if aes_key_size == 256 { in new_enc_kw() localVariable 226 flags: flag, in new_enc_kw() 234 let flag = if aes_key_size == 256 { in new_rsa_kw() localVariable 240 flags: flag, in new_rsa_kw() 248 let flag = if aes_key_size == 256 { in new_ecdsa_kw() localVariable 254 flags: flag, in new_ecdsa_kw() [all …]
|
D | image.rs | 1872 let flag = TlvFlags::ENCRYPTED_AES128 as u32 | TlvFlags::ENCRYPTED_AES256 as u32; in install_image() localVariable 1873 let is_encrypted = (tlv.get_flags() & flag) != 0; in install_image() 1876 let flag = TlvFlags::ENCRYPTED_AES256 as u32; in install_image() localVariable 1877 let aes256 = (tlv.get_flags() & flag) == flag; in install_image()
|
/mcuboot-latest/boot/bootutil/src/ |
D | bootutil_public.c | 156 boot_flag_decode(uint8_t flag) in boot_flag_decode() argument 158 if (flag != BOOT_FLAG_SET) { in boot_flag_decode() 218 boot_read_flag(const struct flash_area *fap, uint8_t *flag, uint32_t off) in boot_read_flag() argument 222 rc = flash_area_read(fap, off, flag, sizeof *flag); in boot_read_flag() 226 if (bootutil_buffer_is_erased(fap, flag, sizeof *flag)) { in boot_read_flag() 227 *flag = BOOT_FLAG_UNSET; in boot_read_flag() 229 *flag = boot_flag_decode(*flag); in boot_read_flag()
|
/mcuboot-latest/samples/zephyr/ |
D | run-tests.go | 40 var logIn = flag.String("login", "/tmp/zephyr.out", "File name of terminal log from Zephyr device") 43 var logOut = flag.String("logout", "tests.log", "Log file to write to") 45 var preBuilt = flag.String("prebuilt", "", "Name of file with prebuilt tests") 55 flag.Parse()
|
D | test-compile.go | 24 var outFile = flag.String("out", "test-images.zip", "Name of zip file to put built tests into") 34 flag.Parse()
|
/mcuboot-latest/scripts/imgtool/ |
D | dumpinfo.py | 267 for flag in image.IMAGE_F.keys(): 268 if value & image.IMAGE_F[flag]: 272 flag, hex(image.IMAGE_F[flag]))
|
D | image.py | 401 flag = bytearray([self.erased_val] * self.max_align) 402 flag[0] = 0x01 # image_ok = 0x01 404 bytes(flag))
|
/mcuboot-latest/ext/tinycrypt/lib/source/ |
D | ccm_mode.c | 65 unsigned int flag, TCAesKeySched_t sched) in ccm_cbc_mac() argument 70 if (flag > 0) { in ccm_cbc_mac()
|
/mcuboot-latest/sim/mcuboot-sys/ |
D | build.rs | 477 conf.conf.flag("-Wall"); in main() 478 conf.conf.flag("-Werror"); in main() 483 conf.conf.flag("-std=c99"); in main()
|
/mcuboot-latest/boot/cypress/MCUBootApp/ |
D | README.md | 40 To enable hardware acceleration in `MCUBootApp` pass flag `USE_CRYPTO_HW=1` to `make` while build. 152 * To Build MCUBootApp with external memory support - pass `USE_EXTERNAL_FLASH=1` flag to `make` com… 160 To enable image encryption support use `ENC_IMG=1` build flag (BlinkyApp should also be built with …
|
D | ExternalMemory.md | 65 1. Pass `USE_EXTERNAL_FLASH=1` flag to `make` command when building MCUBootApp.
|
/mcuboot-latest/boot/cypress/BlinkyApp/ |
D | Readme.md | 68 To get appropriate artifacts to use with multi image MCUBootApp, makefile flag `HEADER_OFFSET=` can… 106 To obtain encrypted upgrade image of BlinkyApp extra flag `ENC_IMG=1` should be passed in command l…
|
/mcuboot-latest/boot/espressif/ |
D | CMakeLists.txt | 11 message(FATAL_ERROR "MCUBOOT_TARGET not defined. Please pass -DMCUBOOT_TARGET flag.") 55 # This flag is needed when redefining a different compiler toolchain at this point
|
/mcuboot-latest/docs/ |
D | testplan-mynewt.md | 29 *flag `--rsa-pss` eg:*
|
D | release-notes.md | 256 - imgtool: added possibility to set confirm flag for hex files as well. 358 - Add a `-x` (or `--hex_addr`) flag to imgtool to set the base address 437 to act as a flag parameter.
|
D | readme-espressif.md | 401 Flash the bootloader as following, with `--after no_reset` flag, so you can reset the device only
|