Lines Matching refs:f
118 err_msg = f"Unexpected chip ID value {chip_id}."
144 err_msg = f"Unexpected chip magic value {chip_magic_value:#010x}."
160 f"{err_msg} Failed to autodetect chip type."
204 with open(args.filename, "wb") as f:
207 f.write(struct.pack(b"<I", d))
208 if f.tell() % 1024 == 0:
210 "%d bytes read... (%d %%)" % (f.tell(), f.tell() * 100 // args.size)
213 print_overwrite("Read %d bytes" % f.tell(), last_line=True)
235 f"(FlashID={flash_id:#x}, SizeID={size_id:#x}), defaulting to 4MB"
331 f"\tExpected calculated SHA: {hexify(sha_digest_calculated)}\n"
332 f"\tSHA stored in binary: {hexify(image_stored_sha)}"
366 f"{argfile.name} is not an {esp.CHIP_NAME} image. "
385 error_str = f"{argfile.name} requires chip revision in range "
387 f"[v{image.min_rev_full // 100}.{image.min_rev_full % 100} - "
393 f"v{image.max_rev_full // 100}.{image.max_rev_full % 100}] "
395 error_str += f"(this chip is revision v{rev // 100}.{rev % 100})"
396 raise FatalError(f"{error_str}. Use --force to flash anyway.")
407 f"{argfile.name} requires chip revision "
408 f"{image.min_rev} or higher (this chip is revision {rev}). "
493 f"WARNING: Set --flash_size {args.flash_size} "
494 f"is larger than the available flash size of {flash_end_str}."
504 f"File {argfile.name} (length {argfile.tell()}) at offset "
505 f"{address} will not fit in {flash_end} bytes of flash. "
819 f"WP pin: {image.wp_pin:#02x}",
840 print(f"Chip ID: {image.chip_id} ({chip.CHIP_NAME})")
842 print(f"Chip ID: {image.chip_id} (Unknown ID)")
845 f"v{image.min_rev_full // 100}.{image.min_rev_full % 100}, "
846 f"(legacy min_rev = {image.min_rev})"
850 f"v{image.max_rev_full // 100}.{image.max_rev_full % 100}"
885 title = f"{args.chip.upper()} image footer"
931 print(f'Project name: {project_name.decode("utf-8")}')
932 print(f'App version: {version.decode("utf-8")}')
933 print(f'Compile time: {date.decode("utf-8")} {time.decode("utf-8")}')
934 print(f"ELF file SHA256: {hexify(app_elf_sha256, uppercase=False)}")
935 print(f'ESP-IDF: {idf_ver.decode("utf-8")}')
936 print(f"Secure version: {secure_version}")
954 print(f"Bootloader version: {version}")
955 print(f'ESP-IDF: {idf_ver.decode("utf-8")}')
956 print(f'Compile time: {date_time.decode("utf-8")}')
958 print(f"File size: {get_file_size(args.filename)} (bytes)")
959 with open(args.filename, "rb") as f:
962 common_header = f.read(8)
971 f"This is not a valid image (invalid magic number: {magic:#x})"
976 extended_header = f.read(16)
988 raise FatalError(f"Unknown image chip ID ({chip_id})")
992 print(f"Detected image type: {args.chip.upper()}")
1048 with open(seg, "rb") as f:
1049 data = f.read()
1194 print(f"Flash type set in eFuse: {flash_type_str}")
1202 print(f"SFDP[{args.addr}..{args.addr+args.bytes-1}]: ", end="")
1204 print(f"{sfdp&0xff:02X} ", end="")
1232 with open(args.filename, "wb") as f:
1233 f.write(data)
1312 raise ValueError(f"Invalid flag name: {flag_name}")
1323 print(f"Key Purposes: {si['key_purposes']}")
1326 f"BLOCK_KEY{key_num} - {esp.KEY_PURPOSES.get(purpose, 'UNKNOWN')}"
1331 print(f" {desc}")
1357 print(f"\tSecure Boot Key{i} is Revoked\n")
1372 print(f"{CRYPT_CNT_STRING}: {si['flash_crypt_cnt']:#x}")
1397 else f"Invalid chip choice: '{args.chip}'"
1399 msg = f"{msg} (choose from {', '.join(CHIP_LIST)})"
1410 f"Output file target offset is {args.target_offset:#x}. "
1411 f"Input file offset {first_addr:#x} is before this."
1422 print(f"Adding {argfile.name} at {addr:#x}")
1427 f"Wrote {os.path.getsize(args.output):#x} bytes to file {args.output}, "
1428 f"ready to be flashed with any ESP USB Bridge"
1446 f"Wrote {of.tell():#x} bytes to file {args.output}, "
1447 f"ready to flash to offset {args.target_offset:#x}"
1466 f"Wrote {os.path.getsize(args.output):#x} bytes to file {args.output}, "
1467 f"ready to flash to offset {args.target_offset:#x}"