Lines Matching full:images
1 README on how boot images are created for secure TI devices
8 and combined with various headers, certificates, and other binary images.
11 from Texas Instruments. The tools used to generate boot images for secure
66 image. The output binary images should be used in place of the standard
67 non-secure binary images (see the platform-specific user's guides and
68 releases notes for how the non-secure images are typically used)
98 image. The output binary images should be used in place of the standard
99 non-secure binary images (see the platform-specific user's guides and
100 releases notes for how the non-secure images are typically used)
125 The output binary images should be used in place of the standard
126 non-secure binary images (see the platform-specific user's guides
127 and releases notes for how the non-secure images are typically used)
153 The output binary images should be used in place of the standard
154 non-secure binary images (see the platform-specific user's guides
155 and releases notes for how the non-secure images are typically used)
177 build procedure for secure TI devices will secure these images before
178 they are integrated into the FIT image. When those images are extracted
189 The exact details of the how the images are secured is handled by the
203 to perform the validation on the secured images. The details of the