Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 42) sorted by relevance

12

/hal_espressif-3.7.0/tools/esptool_py/esptool/
Dcmds.py172 image = LoadFirmwareImage(esp.CHIP_NAME, args.filename)
175 for seg in image.segments:
190 print("All segments done, executing at %08x" % image.entrypoint)
191 esp.mem_finish(image.entrypoint)
243 def _update_image_flash_params(esp, address, args, image): argument
247 if len(image) < 8:
248 return image # not long enough to be a bootloader image
251 magic, _, flash_mode, flash_size_freq = struct.unpack("BBBB", image[:4])
253 return image # not flashing bootloader offset, so don't modify this
256 return image # all settings are 'keep', not modifying anything
[all …]
Duf2_writer.py85 def add_file(self, addr: int, image: bytes) -> None:
86 blocks = div_roundup(len(image), self.CHUNK_SIZE)
88 image[i : i + self.CHUNK_SIZE]
89 for i in range(0, len(image), self.CHUNK_SIZE)
/hal_espressif-3.7.0/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot.c44 const uint32_t *image; in secure_boot_generate() local
64 image = bootloader_mmap(ESP_BOOTLOADER_OFFSET, image_len); in secure_boot_generate()
65 if (!image) { in secure_boot_generate()
70 ets_secure_boot_hash(&image[i/sizeof(uint32_t)]); in secure_boot_generate()
72 bootloader_munmap(image); in secure_boot_generate()
133 if(bootloader_data.image.hash_appended) { in esp_secure_boot_generate_digest()
/hal_espressif-3.7.0/tools/esptool_py/docs/en/advanced-topics/
Dfirmware-image-format.rst17 This is technical documentation for the firmware image format used by the ROM bootloader. These are…
30 The image header is 8 bytes long:
113 …line option. These bytes are only overridden if this is a bootloader image (an image written to a …
124 …The 16-byte long extended header comes right after the image header, individual segments come righ…
133 …| 4-5 | Chip ID (which ESP device is this image for) …
135 …| 6 | Minimal chip revision supported by the image (deprecated, use the following field) …
137 …| 7-8 | Minimal chip revision supported by the image (in format: major * 100 + minor) …
139 …| 9-10 | Maximal chip revision supported by the image (in format: major * 100 + minor) …
166image) is appended after the checksum. This digest is separate to secure boot and only used for de…
168 …ata). This image signature is `Secure Boot V1 <https://docs.espressif.com/projects/esp-idf/en/late…
[all …]
Dindex.rst9 Firmware Image Format <firmware-image-format>
/hal_espressif-3.7.0/components/esp_app_format/
DKconfig.projbuild8 …structure. If not set, time/date stamp will be excluded from app image. This can be useful for get…
9 same binary image files made from the same source, but at different times.
12 bool "Exclude PROJECT_VER from firmware image"
15 The PROJECT_VER variable from the build system will not affect the firmware image.
19 bool "Exclude PROJECT_NAME from firmware image"
22 The PROJECT_NAME variable from the build system will not affect the firmware image.
/hal_espressif-3.7.0/components/bootloader_support/src/
Desp_image_format.c94 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen…
226 for (int i = 0; i < data->image.segment_count; i++) { in image_load()
314 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen… in verify_image_header() argument
319 image->magic, in verify_image_header()
320 image->segment_count, in verify_image_header()
321 image->spi_mode, in verify_image_header()
322 image->spi_size, in verify_image_header()
323 image->entry_addr); in verify_image_header()
325 if (image->magic != ESP_IMAGE_HEADER_MAGIC) { in verify_image_header()
332 CHECK_ERR(bootloader_common_check_chip_validity(image, ESP_IMAGE_APPLICATION)); in verify_image_header()
[all …]
Dbootloader_utility.c139 const uint8_t *image = bootloader_mmap(partition->offset, mmap_size); in bootloader_common_get_partition_description() local
140 if (image == NULL) { in bootloader_common_get_partition_description()
145 memcpy(app_desc, image + app_desc_offset, sizeof(esp_app_desc_t)); in bootloader_common_get_partition_description()
146 bootloader_munmap(image); in bootloader_common_get_partition_description()
755 for (int i = 0; i < data->image.segment_count; i++) {
778 data->image.entry_addr);
792 for (int i = 0; i < data->image.segment_count; i++) {
823 data->image.entry_addr);
994 const void * image = bootloader_mmap(flash_offset, partial_image_len); local
995 if (image == NULL) {
[all …]
/hal_espressif-3.7.0/tools/esptool_py/docs/en/esptool/
Dbasic-commands.rst47 …eeded as the default is to keep the flash mode and size from the ``.bin`` image file. See the :ref…
94 …shing. If a valid firmware image is detected, the ``Chip ID`` and ``Minimum chip revision`` fields…
95 …If the image turns out to be incompatible with the chip in use or requires a newer chip revision, …
123 …If ``write_flash`` updated the boot image's :ref:`flash mode and flash size <flash-modes>` during …
181 .. _elf-2-image:
194 …ch can be used to set the default values in the image header. This is important when generating an…
195image with a recalculated SHA256 digest, otherwise, the image SHA256 digest would be invalidated b…
203image file suitable for use with a software bootloader stub such as `rboot <https://github.com/rab…
211 …For {IDF_TARGET_NAME}, elf2image produces a single output binary "image file". By default this has…
217 In the above example, the output image file would be called ``my_esp_app.bin``.
[all …]
Dadvanced-commands.rst32image (offset {IDF_TARGET_BOOTLOADER_OFFSET} for {IDF_TARGET_NAME}) then any ``--flash_mode``, ``-…
51 The ``load_ram`` command allows the loading of an executable binary image (created with the ``elf2i…
59image must only contain IRAM- and DRAM-resident segments. Any SPI flash mapped segments will not l…
138 .. _make-image:
143 …``make_image`` allows you to manually assemble a firmware image from binary segments (such as thos…
153 …In general, it is better to create an ELF image (including any binary data as part of the ELF, by …
Dflash-modes.rst16 A header at the beginning of a bootable image contains these values.
24 These options are only consulted when flashing a bootable image to an {IDF_TARGET_NAME} at offset {…
29 …``. The default is ``keep``, which keeps whatever value is already in the image file. This paramet…
46 …z). The default is ``keep``, which keeps whatever value is already in the image file. This paramet…
86 …er flash size than you really have, as long as you don't need to write an image larger than this s…
Dbasic-options.rst16 * Binary image generation commands, such as :ref:`elf2image <elf-2-image>` or :ref:`merge_bin <merg…
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espsecure/
Dindex.rst22 The following command should be used to get an image signed using an external HSM. ::
26 …s a signature for an image using the HSM, and then creates a signature block and appends it to the…
38 Once the signed image is generated, we can verify it using the following command: ::
/hal_espressif-3.7.0/tools/esptool_py/docs/en/
Dresources.rst30 .. image:: https://img.youtube.com/vi/zh-Y_s4X6zs/maxresdefault.jpg
38 .. image:: https://img.youtube.com/vi/GjWGKzu3XTk/maxresdefault.jpg
/hal_espressif-3.7.0/components/bootloader/
DCMakeLists.txt20 # Also attach an image to the project flash target
DKconfig.projbuild274 … This option prevents rollback to previous firmware/application image with lower security version.
323 bool "Skip image validation when exiting deep sleep"
324 # note: dependencies for this config item are different to other "skip image validation"
332 This option disables the normal validation of an image coming out of
334 between wakeup performance from deep sleep, and image integrity checks.
346 bool "Skip image validation from power on reset (READ HELP FIRST)"
355 Note that in this case it's not possible for the bootloader to detect if an app image is
360 … Following other reset types, the bootloader will still validate the app image. This increases
362 …the bootloader will fall back to a valid app image. To increase the chances of successfully recove…
368 bool "Skip image validation always (READ HELP FIRST)"
[all …]
/hal_espressif-3.7.0/components/bootloader_support/include/
Desp_image_format.h31 esp_image_header_t image; /* Header for entire image */ member
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/inc/
Dsummary_ESP32.rst65 …): Secure boot V1 is enabled for bootloader image = False R/W (0…
66 …): Secure boot V2 is enabled for bootloader image = False R/W (0…
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espefuse/
Dsummary-cmd.rst66 "description": "Secure boot V1 is enabled for bootloader image",
135 …) Secure boot V1 is enabled for bootloader image = False R/W (0…
/hal_espressif-3.7.0/components/efuse/esp32/
Desp_efuse_table.csv107 … EFUSE_BLK0, 196, 1, [] Secure boot V1 is enabled for bootloader image
108 … EFUSE_BLK0, 197, 1, [] Secure boot V2 is enabled for bootloader image
/hal_espressif-3.7.0/components/esp_system/ld/esp32c2/
Dmemory.ld.in41 * (0x20 offset above is a convenience for the app binary image generation.
/hal_espressif-3.7.0/tools/esptool_py/espsecure/
D__init__.py95 _check_output_is_not_input(args.image, args.output)
102 plaintext_image = args.image.read()
103 args.image.seek(0)
107 fw_image = esptool.bin_image.ESP32FirmwareImage(args.image)
144 args.output = os.path.splitext(args.image.name)[0] + "-digest-0x0000.bin"
/hal_espressif-3.7.0/components/esp_system/ld/esp32c3/
Dmemory.ld.in51 * (0x20 offset above is a convenience for the app binary image generation.
/hal_espressif-3.7.0/components/esp_system/ld/esp32c6/
Dmemory.ld.in58 * (0x20 offset above is a convenience for the app binary image generation.
/hal_espressif-3.7.0/components/esp_system/ld/esp32h2/
Dmemory.ld.in58 * (0x20 offset above is a convenience for the app binary image generation.

12