Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 58) sorted by relevance

123

/Zephyr-latest/subsys/jwt/
DKconfig14 prompt "JWT signature algorithm"
20 bool "Use RSA signature (RS-256). Use Mbed TLS as crypto library."
26 bool "Use RSA signature (RS-256). Use PSA Crypto API."
35 bool "Use ECDSA signature (ES-256). Use PSA Crypto API."
/Zephyr-latest/cmake/
Dtarget_toolchain_flags.cmake3 # What we are looking for, is a signature definition that is defined
12 # * CMAKE_C_COMPILER_ID is taking the CMake compiler id for extra signature.
14 # methods, where an upgraded compiler could have same signature due to ccache
16 # and thus generate a new signature.
18 # Toolchains with the same signature will always support the same set of flags.
23 # Extend the CMAKE_C_COMPILER_MD5_SUM with the compiler signature.
/Zephyr-latest/scripts/pylib/pytest-twister-harness/src/twister_harness/helpers/
Dshell.py12 from inspect import signature
122 cls_fields = {field for field in signature(cls).parameters}
/Zephyr-latest/doc/services/device_mgmt/
Dota.rst44 is downloaded and installed. MCUboot can be used to verify the signature before
56 signature before upgrading the firmware.
/Zephyr-latest/include/zephyr/acpi/
Dacpi.h234 void *acpi_table_get(char *signature, int inst);
/Zephyr-latest/soc/nxp/imxrt/imxrt118x/
DKconfig42 format consists container header, image arrary entry, signature block
/Zephyr-latest/modules/
DKconfig.tinycrypt53 bool "ECC_DSA digital signature algorithm"
/Zephyr-latest/boards/starfive/visionfive2/doc/
Dindex.rst23 is a jh7110 signature tool used to generate spl header information
/Zephyr-latest/doc/hardware/peripherals/sensor/
Dfetch_and_get.rst43 a function signature matching :c:type:`sensor_trigger_handler_t` using
/Zephyr-latest/cmake/linker/lld/
Dtarget.cmake113 # signature to ensure that standard c and runtime libraries are correctly placed
/Zephyr-latest/boards/waveshare/esp32s3_touch_lcd_1_28/doc/
Dindex.rst45 - Cryptographic hardware acceleration: (AES-128/256, Hash, RSA, RNG, HMAC, Digital signature)
/Zephyr-latest/drivers/dma/
Ddma_iproc_pax.h443 uint32_t signature:16; member
/Zephyr-latest/doc/releases/
Dmigration-guide-4.0.rst567 * By default, the signature is now computed using the PSA Crypto API for both RSA and ECDSA
573 * The following new symbols were added to allow specifying both the signature
576 * :kconfig:option:`CONFIG_JWT_SIGN_RSA_PSA` (default) RSA signature using the PSA Crypto API;
577 * :kconfig:option:`CONFIG_JWT_SIGN_RSA_LEGACY` RSA signature using Mbed TLS;
578 * :kconfig:option:`CONFIG_JWT_SIGN_ECDSA_PSA` ECDSA signature using the PSA Crypto API.
Dmigration-guide-3.5.rst20 * The kernel :c:func:`k_mem_slab_free` function has changed its signature, now
22 The new signature will not immediately trigger a compiler error or warning,
287 * The ``accept()`` callback's signature in :c:struct:`bt_l2cap_server` has
/Zephyr-latest/doc/services/retention/
Dblinfo.rst107 * ``blinfo/signature_type`` The signature type MCUboot is configured for
/Zephyr-latest/boards/intel/adsp/doc/
Dchromebooks_adsp.rst77 Now you need to turn of signature verification in the bootloader
78 (because obviously we'll be breaking whatever signature existed).
79 Note that signature verification is something done by the ROM
294 there because the boot requires a valid signature, even though as
/Zephyr-latest/doc/
DCMakeLists.txt81 # This function has the same signature as `add_custom_target()`
/Zephyr-latest/lib/acpi/
Dacpi.c648 void *acpi_table_get(char *signature, int inst) in acpi_table_get() argument
661 status = AcpiGetTable(signature, inst, &table); in acpi_table_get()
/Zephyr-latest/doc/security/
Dsensor-threat.rst151 The bootloader is responsible for verifying the signature of the
155 The bootloader shall verify the signature of the update image
163 this image, the bootloader shall verify a digital signature of the
234 certificate chain has a valid signature path from a root
/Zephyr-latest/doc/services/llext/
Dload.rst49 signature that is compatible with the :c:func:`k_thread_create` API, and will
/Zephyr-latest/scripts/ci/
Dpylintrc113 unexpected-special-method-signature,
/Zephyr-latest/doc/develop/api/
Ddesign_guidelines.rst15 specifying the signature of a callback:
/Zephyr-latest/share/sysbuild/images/bootloader/
DKconfig129 bool "No signature; use only hash check"
/Zephyr-latest/cmake/modules/
DFindZephyr-sdk.cmake11 # Its purpose is to allow the find_package basic signature mode to lookup Zephyr
/Zephyr-latest/doc/connectivity/networking/api/
Dnet_mgmt.rst182 You define your handler modeled with this signature:

123