/hal_espressif-3.7.0/tools/esptool_py/esptool/ |
D | cmds.py | 172 image = LoadFirmwareImage(esp.CHIP_NAME, args.filename) 175 for seg in image.segments: 190 print("All segments done, executing at %08x" % image.entrypoint) 191 esp.mem_finish(image.entrypoint) 243 def _update_image_flash_params(esp, address, args, image): argument 247 if len(image) < 8: 248 return image # not long enough to be a bootloader image 251 magic, _, flash_mode, flash_size_freq = struct.unpack("BBBB", image[:4]) 253 return image # not flashing bootloader offset, so don't modify this 256 return image # all settings are 'keep', not modifying anything [all …]
|
D | uf2_writer.py | 85 def add_file(self, addr: int, image: bytes) -> None: 86 blocks = div_roundup(len(image), self.CHUNK_SIZE) 88 image[i : i + self.CHUNK_SIZE] 89 for i in range(0, len(image), self.CHUNK_SIZE)
|
/hal_espressif-3.7.0/components/bootloader_support/src/secure_boot_v1/ |
D | secure_boot.c | 44 const uint32_t *image; in secure_boot_generate() local 64 image = bootloader_mmap(ESP_BOOTLOADER_OFFSET, image_len); in secure_boot_generate() 65 if (!image) { in secure_boot_generate() 70 ets_secure_boot_hash(&image[i/sizeof(uint32_t)]); in secure_boot_generate() 72 bootloader_munmap(image); in secure_boot_generate() 133 if(bootloader_data.image.hash_appended) { in esp_secure_boot_generate_digest()
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/advanced-topics/ |
D | firmware-image-format.rst | 17 This is technical documentation for the firmware image format used by the ROM bootloader. These are… 30 The image header is 8 bytes long: 113 …line option. These bytes are only overridden if this is a bootloader image (an image written to a … 124 …The 16-byte long extended header comes right after the image header, individual segments come righ… 133 …| 4-5 | Chip ID (which ESP device is this image for) … 135 …| 6 | Minimal chip revision supported by the image (deprecated, use the following field) … 137 …| 7-8 | Minimal chip revision supported by the image (in format: major * 100 + minor) … 139 …| 9-10 | Maximal chip revision supported by the image (in format: major * 100 + minor) … 166 …image) is appended after the checksum. This digest is separate to secure boot and only used for de… 168 …ata). This image signature is `Secure Boot V1 <https://docs.espressif.com/projects/esp-idf/en/late… [all …]
|
D | index.rst | 9 Firmware Image Format <firmware-image-format>
|
/hal_espressif-3.7.0/components/esp_app_format/ |
D | Kconfig.projbuild | 8 …structure. If not set, time/date stamp will be excluded from app image. This can be useful for get… 9 same binary image files made from the same source, but at different times. 12 bool "Exclude PROJECT_VER from firmware image" 15 The PROJECT_VER variable from the build system will not affect the firmware image. 19 bool "Exclude PROJECT_NAME from firmware image" 22 The PROJECT_NAME variable from the build system will not affect the firmware image.
|
/hal_espressif-3.7.0/components/bootloader_support/src/ |
D | esp_image_format.c | 94 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen… 226 for (int i = 0; i < data->image.segment_count; i++) { in image_load() 314 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen… in verify_image_header() argument 319 image->magic, in verify_image_header() 320 image->segment_count, in verify_image_header() 321 image->spi_mode, in verify_image_header() 322 image->spi_size, in verify_image_header() 323 image->entry_addr); in verify_image_header() 325 if (image->magic != ESP_IMAGE_HEADER_MAGIC) { in verify_image_header() 332 CHECK_ERR(bootloader_common_check_chip_validity(image, ESP_IMAGE_APPLICATION)); in verify_image_header() [all …]
|
D | bootloader_utility.c | 139 const uint8_t *image = bootloader_mmap(partition->offset, mmap_size); in bootloader_common_get_partition_description() local 140 if (image == NULL) { in bootloader_common_get_partition_description() 145 memcpy(app_desc, image + app_desc_offset, sizeof(esp_app_desc_t)); in bootloader_common_get_partition_description() 146 bootloader_munmap(image); in bootloader_common_get_partition_description() 755 for (int i = 0; i < data->image.segment_count; i++) { 778 data->image.entry_addr); 792 for (int i = 0; i < data->image.segment_count; i++) { 823 data->image.entry_addr); 994 const void * image = bootloader_mmap(flash_offset, partial_image_len); local 995 if (image == NULL) { [all …]
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/esptool/ |
D | basic-commands.rst | 47 …eeded as the default is to keep the flash mode and size from the ``.bin`` image file. See the :ref… 94 …shing. If a valid firmware image is detected, the ``Chip ID`` and ``Minimum chip revision`` fields… 95 …If the image turns out to be incompatible with the chip in use or requires a newer chip revision, … 123 …If ``write_flash`` updated the boot image's :ref:`flash mode and flash size <flash-modes>` during … 181 .. _elf-2-image: 194 …ch can be used to set the default values in the image header. This is important when generating an… 195 …image with a recalculated SHA256 digest, otherwise, the image SHA256 digest would be invalidated b… 203 …image file suitable for use with a software bootloader stub such as `rboot <https://github.com/rab… 211 …For {IDF_TARGET_NAME}, elf2image produces a single output binary "image file". By default this has… 217 In the above example, the output image file would be called ``my_esp_app.bin``. [all …]
|
D | advanced-commands.rst | 32 …image (offset {IDF_TARGET_BOOTLOADER_OFFSET} for {IDF_TARGET_NAME}) then any ``--flash_mode``, ``-… 51 The ``load_ram`` command allows the loading of an executable binary image (created with the ``elf2i… 59 …image must only contain IRAM- and DRAM-resident segments. Any SPI flash mapped segments will not l… 138 .. _make-image: 143 …``make_image`` allows you to manually assemble a firmware image from binary segments (such as thos… 153 …In general, it is better to create an ELF image (including any binary data as part of the ELF, by …
|
D | flash-modes.rst | 16 A header at the beginning of a bootable image contains these values. 24 These options are only consulted when flashing a bootable image to an {IDF_TARGET_NAME} at offset {… 29 …``. The default is ``keep``, which keeps whatever value is already in the image file. This paramet… 46 …z). The default is ``keep``, which keeps whatever value is already in the image file. This paramet… 86 …er flash size than you really have, as long as you don't need to write an image larger than this s…
|
D | basic-options.rst | 16 * Binary image generation commands, such as :ref:`elf2image <elf-2-image>` or :ref:`merge_bin <merg…
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 22 The following command should be used to get an image signed using an external HSM. :: 26 …s a signature for an image using the HSM, and then creates a signature block and appends it to the… 38 Once the signed image is generated, we can verify it using the following command: ::
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/ |
D | resources.rst | 30 .. image:: https://img.youtube.com/vi/zh-Y_s4X6zs/maxresdefault.jpg 38 .. image:: https://img.youtube.com/vi/GjWGKzu3XTk/maxresdefault.jpg
|
/hal_espressif-3.7.0/components/bootloader/ |
D | CMakeLists.txt | 20 # Also attach an image to the project flash target
|
D | Kconfig.projbuild | 274 … This option prevents rollback to previous firmware/application image with lower security version. 323 bool "Skip image validation when exiting deep sleep" 324 # note: dependencies for this config item are different to other "skip image validation" 332 This option disables the normal validation of an image coming out of 334 between wakeup performance from deep sleep, and image integrity checks. 346 bool "Skip image validation from power on reset (READ HELP FIRST)" 355 Note that in this case it's not possible for the bootloader to detect if an app image is 360 … Following other reset types, the bootloader will still validate the app image. This increases 362 …the bootloader will fall back to a valid app image. To increase the chances of successfully recove… 368 bool "Skip image validation always (READ HELP FIRST)" [all …]
|
/hal_espressif-3.7.0/components/bootloader_support/include/ |
D | esp_image_format.h | 31 esp_image_header_t image; /* Header for entire image */ member
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/inc/ |
D | summary_ESP32.rst | 65 …): Secure boot V1 is enabled for bootloader image = False R/W (0… 66 …): Secure boot V2 is enabled for bootloader image = False R/W (0…
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/ |
D | summary-cmd.rst | 66 "description": "Secure boot V1 is enabled for bootloader image", 135 …) Secure boot V1 is enabled for bootloader image = False R/W (0…
|
/hal_espressif-3.7.0/components/efuse/esp32/ |
D | esp_efuse_table.csv | 107 … EFUSE_BLK0, 196, 1, [] Secure boot V1 is enabled for bootloader image 108 … EFUSE_BLK0, 197, 1, [] Secure boot V2 is enabled for bootloader image
|
/hal_espressif-3.7.0/components/esp_system/ld/esp32c2/ |
D | memory.ld.in | 41 * (0x20 offset above is a convenience for the app binary image generation.
|
/hal_espressif-3.7.0/tools/esptool_py/espsecure/ |
D | __init__.py | 95 _check_output_is_not_input(args.image, args.output) 102 plaintext_image = args.image.read() 103 args.image.seek(0) 107 fw_image = esptool.bin_image.ESP32FirmwareImage(args.image) 144 args.output = os.path.splitext(args.image.name)[0] + "-digest-0x0000.bin"
|
/hal_espressif-3.7.0/components/esp_system/ld/esp32c3/ |
D | memory.ld.in | 51 * (0x20 offset above is a convenience for the app binary image generation.
|
/hal_espressif-3.7.0/components/esp_system/ld/esp32c6/ |
D | memory.ld.in | 58 * (0x20 offset above is a convenience for the app binary image generation.
|
/hal_espressif-3.7.0/components/esp_system/ld/esp32h2/ |
D | memory.ld.in | 58 * (0x20 offset above is a convenience for the app binary image generation.
|