Home
last modified time | relevance | path

Searched refs:image (Results 351 – 375 of 966) sorted by relevance

1...<<11121314151617181920>>...39

/Zephyr-latest/.github/ISSUE_TEMPLATE/
D002_enhancement.md27 Add any other context or graphics (drag-and-drop an image) about the feature request here.
D004_feature_request.md27 Add any other context or graphics (drag-and-drop an image) about the feature request here.
/Zephyr-latest/soc/nuvoton/npcx/
DKconfig11 On NPCX series chip, the NPCX ROM code loads firmware image from flash
29 This is generated from the npcx BIN image.
131 bool "Firmware image crc check"
133 When enabled, the firmware image will be verified at boot using a
/Zephyr-latest/doc/build/flashing/
Dconfiguration.rst38 means that the command will be ran once with the first image flashing process per set of board
39 targets, or to ``last`` which will be ran once for the final image flash per set of board targets.
90 include MCUboot as a secondary image:
99 first image:
/Zephyr-latest/boards/st/nucleo_f412zg/doc/
Dindex.rst100 .. image:: img/nucleo_f412zg_zio_left.jpg
103 .. image:: img/nucleo_f412zg_zio_right.jpg
106 .. image:: img/nucleo_f412zg_morpho_left.jpg
109 .. image:: img/nucleo_f412zg_morpho_right.jpg
/Zephyr-latest/boards/nxp/frdm_rw612/doc/
Dindex.rst158 with the application image directly, forming one single monolithic image.
168 with the application image directly, forming one single monolithic image.
/Zephyr-latest/doc/services/tfm/
Doverview.rst32 has certain implications about what the Zephyr application image can and can
36 * Resource allocation for Zephyr relies on choices made in the secure image.
43 order (secure boot > secure image > ns image).
63 the (TF-M) Secure Processing Environment image happens based on a set of PSA
90 secure boot image, which verifies that the secure and non-secure images are
94 this image is **immutable**.
112 Zephyr application image in this case.
158 * Client software is responsible for writing a new image to the secondary slot
168 * The ``AES-CTR`` key is included in the image and can be encrypted using:
184 Once the secure bootloader has finished executing, a TF-M based secure image
/Zephyr-latest/boards/ezurio/bl5340_dvk/doc/
Dindex.rst169 incorporated for application image storage and large datasets.
277 firmware image for the application core. The Secure image can be built
284 By default the Secure image for BL5340's application core is
290 The process to build the Secure firmware image using TF-M and the
291 Non-Secure firmware image using Zephyr requires the following steps:
300 * Build the Non-Secure firmware image as a regular Zephyr application
301 * Build a TF-M (secure) firmware image
302 * Merge the output image binaries together
303 * Optionally build a bootloader image (MCUboot)
308 be required, to adjust the Non-Secure image Flash and SRAM starting
/Zephyr-latest/subsys/mgmt/mcumgr/grp/img_mgmt/include/mgmt/mcumgr/grp/img_mgmt/
Dimg_mgmt_priv.h142 int img_mgmt_get_next_boot_slot(int image, enum img_mgmt_next_boot_type *type);
/Zephyr-latest/samples/subsys/ipc/ipc_service/static_vrings/
Dsysbuild.cmake21 # remote core's build, such as the output image's LMA
/Zephyr-latest/soc/raspberrypi/rpi_pico/rp2350/
DKconfig29 RP23XX devices to consider this a valid image in flash.
/Zephyr-latest/boards/arduino/opta/
Darduino_opta_stm32h747xx_m4.dts37 label = "image-0";
/Zephyr-latest/boards/arm/mps2/
DCMakeLists.txt7 # Building a firmware image for CPU1: this requires a binary
/Zephyr-latest/boards/seco/stm32f3_seco_d23/
Dstm32f3_seco_d23.dts200 label = "image-0";
204 label = "image-1";
212 label = "image-scratch";
/Zephyr-latest/boards/u-blox/ubx_bmd330eval/
Dubx_bmd330eval_nrf52810.dts201 label = "image-0";
205 label = "image-1";
209 label = "image-scratch";
/Zephyr-latest/boards/u-blox/ubx_bmd360eval/
Dubx_bmd360eval_nrf52811.dts202 label = "image-0";
206 label = "image-1";
210 label = "image-scratch";
/Zephyr-latest/boards/st/nucleo_wb55rg/
Dnucleo_wb55rg.dts231 label = "image-0";
235 label = "image-1";
239 label = "image-scratch";
/Zephyr-latest/boards/st/sensortile_box/
Dsensortile_box.dts229 label = "image-0";
233 label = "image-1";
237 label = "image-scratch";
/Zephyr-latest/boards/ezurio/mg100/
Dmg100.dts199 label = "image-0";
227 label = "image-1";
232 label = "image-scratch";
/Zephyr-latest/share/sysbuild/images/bootloader/
DKconfig66 MCUboot will take contents of secondary slot of an image and will overwrite primary slot
77 can boot from either partition and will select one with higher application image version,
101 will select the image with the higher version number, copy it to RAM and begin execution
102 from there. The image must be linked to execute from RAM, the address that it is copied
157 bool "Encrypted image support"
/Zephyr-latest/subsys/bindesc/
DKconfig.host_info14 The name of the host that the image was compiled on
/Zephyr-latest/samples/subsys/llext/modules/
DKconfig18 linked in the Zephyr image.
/Zephyr-latest/arch/arm/core/cortex_m/
Dvector_table_pad.ld9 * Zephyr image does not attempt to use the area which we reserve to
/Zephyr-latest/boards/nxp/mimxrt1160_evk/
DKconfig.defconfig22 # Adjust the offset of the output image if building for RT11xx SOC
/Zephyr-latest/boards/nxp/mimxrt1170_evk/
DKconfig.defconfig22 # Adjust the offset of the output image if building for RT11xx SOC

1...<<11121314151617181920>>...39