/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32xx/ |
D | execute_efuse_script.py | 3 espefuse(esp, efuses, args, 'burn_efuse DIS_FORCE_DOWNLOAD 1 DIS_DOWNLOAD_MODE 1') 4 espefuse(esp, efuses, args, 'burn_bit BLOCK_USR_DATA 64 66 69 72 78 82 83 90') 5 espefuse(esp, efuses, args, 'read_protect_efuse BLOCK_SYS_DATA2') 6 espefuse(esp, efuses, args, 'write_protect_efuse BLOCK_SYS_DATA2') 7 espefuse(esp, efuses, args, 'burn_block_data BLOCK_KEY5 ../../images/efuse/256bit') 8 espefuse(esp, efuses, args, 'burn_key BLOCK_KEY0 ../../images/efuse/256bit XTS_AES_128_KEY --no-rea… 9 espefuse(esp, efuses, args, 'burn_key_digest BLOCK_KEY1 ../../secure_images/rsa_secure_boot_signing… 11 efuses.burn_all() 13 espefuse(esp, efuses, args, 'summary') 14 espefuse(esp, efuses, args, 'adc_info') [all …]
|
D | execute_efuse_script2.py | 3 espefuse(esp, efuses, args, 'burn_efuse DIS_FORCE_DOWNLOAD 1 DIS_DOWNLOAD_MODE 1') 4 if efuses["DIS_FORCE_DOWNLOAD"].get() != 0: 7 espefuse(esp, efuses, args, 'burn_bit BLOCK_USR_DATA 64 66 69 72 78 82 83 90') 8 if efuses["BLOCK_USR_DATA"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00… 11 espefuse(esp, efuses, args, 'read_protect_efuse BLOCK_SYS_DATA2') 12 espefuse(esp, efuses, args, 'write_protect_efuse BLOCK_SYS_DATA2') 13 if not efuses["BLOCK_SYS_DATA2"].is_readable() or not efuses["BLOCK_SYS_DATA2"].is_writeable(): 16 espefuse(esp, efuses, args, 'burn_block_data BLOCK_KEY5 ../../images/efuse/256bit') 17 if efuses["BLOCK_KEY5"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 … 20 espefuse(esp, efuses, args, 'burn_key BLOCK_KEY0 ../../images/efuse/256bit XTS_AES_128_KEY --no-rea… [all …]
|
/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32/ |
D | execute_efuse_script.py | 3 espefuse(esp, efuses, args, "burn_efuse JTAG_DISABLE 1 DISABLE_SDIO_HOST 1 CONSOLE_DEBUG_DISABLE 1") 4 espefuse(esp, efuses, args, "burn_key flash_encryption ../../images/efuse/256bit --no-protect-key") 5 espefuse(esp, efuses, args, "burn_key_digest ../../secure_images/rsa_secure_boot_signing_key.pem") 6 espefuse(esp, efuses, args, "burn_bit BLOCK3 64 66 69 72 78 82 83 90") 7 espefuse(esp, efuses, args, "burn_custom_mac AA:BB:CC:DD:EE:88") 9 efuses.burn_all() 11 espefuse(esp, efuses, args, "summary") 12 espefuse(esp, efuses, args, "adc_info") 13 espefuse(esp, efuses, args, "get_custom_mac") 17 if efuses["JTAG_DISABLE"].get() != 1: [all …]
|
D | execute_efuse_script2.py | 3 espefuse(esp, efuses, args, "burn_efuse JTAG_DISABLE 1 DISABLE_SDIO_HOST 1 CONSOLE_DEBUG_DISABLE 1") 4 if efuses["JTAG_DISABLE"].get() != 0: 7 espefuse(esp, efuses, args, "burn_key flash_encryption ../../images/efuse/256bit --no-protect-key") 8 if efuses["BLOCK1"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0… 10 if not efuses["BLOCK1"].is_readable() or not efuses["BLOCK1"].is_writeable(): 13 espefuse(esp, efuses, args, "burn_key_digest ../../secure_images/rsa_secure_boot_signing_key.pem") 14 if efuses["BLOCK2"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0… 16 if not efuses["BLOCK2"].is_readable() or not efuses["BLOCK2"].is_writeable(): 19 espefuse(esp, efuses, args, "burn_bit BLOCK3 64 66 69 72 78 82 83 90") 20 espefuse(esp, efuses, args, "burn_custom_mac AA:BB:CC:DD:EE:88") [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c6/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 178 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s2/ |
D | operations.py | 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 179 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2beta1/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 170 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 177 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3/ |
D | operations.py | 54 def add_commands(subparsers, efuses): argument 55 add_common_commands(subparsers, efuses) 66 choices=efuses.BLOCKS_FOR_KEYS, 80 for _ in efuses.BLOCKS_FOR_KEYS: 87 choices=efuses.BLOCKS_FOR_KEYS, 117 choices=efuses.BLOCKS_FOR_KEYS, 131 for _ in efuses.BLOCKS_FOR_KEYS: 138 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 179 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3beta2/ |
D | operations.py | 54 def add_commands(subparsers, efuses): argument 55 add_common_commands(subparsers, efuses) 66 choices=efuses.BLOCKS_FOR_KEYS, 80 for _ in efuses.BLOCKS_FOR_KEYS: 87 choices=efuses.BLOCKS_FOR_KEYS, 117 choices=efuses.BLOCKS_FOR_KEYS, 131 for _ in efuses.BLOCKS_FOR_KEYS: 138 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 179 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 170 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 177 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c3/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 178 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32/ |
D | operations.py | 32 def add_commands(subparsers, efuses): argument 33 add_common_commands(subparsers, efuses) 36 help="Burn a 256-bit key to EFUSE: %s" % ", ".join(efuses.BLOCKS_FOR_KEYS), 52 choices=efuses.BLOCKS_FOR_KEYS, 60 for _ in efuses.BLOCKS_FOR_KEYS: 68 choices=efuses.BLOCKS_FOR_KEYS, 112 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 119 def burn_custom_mac(esp, efuses, args): argument 124 efuses["CUSTOM_MAC"].save(args.mac) 125 if not efuses.burn_all(check_batch_mode=True): [all …]
|
D | fields.py | 98 self.efuses = [EfuseField.convert(self, efuse) for efuse in self.Fields.EFUSES] 100 self.efuses += [ 103 self.efuses += [ 106 self.efuses += [ 111 self.efuses += [ 116 self.efuses += [ 125 self.efuses += [ 129 self.efuses += [ 133 self.efuses += [ 139 for e in self.efuses: [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c2/ |
D | operations.py | 49 def add_commands(subparsers, efuses): argument 50 add_common_commands(subparsers, efuses) 61 choices=efuses.BLOCKS_FOR_KEYS, 82 choices=efuses.BLOCKS_FOR_KEYS, 128 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 135 def burn_custom_mac(esp, efuses, args): argument 136 efuses["CUSTOM_MAC"].save(args.mac) 137 efuses["CUSTOM_MAC_USED"].save(1) 138 if not efuses.burn_all(check_batch_mode=True): 140 get_custom_mac(esp, efuses, args) [all …]
|
D | fields.py | 95 self.efuses = [EfuseField.convert(self, efuse) for efuse in self.Fields.EFUSES] 96 self.efuses += [ 100 self.efuses += [ 106 self.efuses += [ 113 for e in self.efuses: 121 self.efuses += [ 127 for e in self.efuses:
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/ |
D | base_operations.py | 20 def add_common_commands(subparsers, efuses): argument 25 self.efuses = kwargs.get("efuses") 53 check_arg = base_fields.CheckArgValue(self.efuses, efuse_name) 60 check_arg = base_fields.CheckArgValue(self.efuses, efuse_name) 70 "[{}].".format(", ".join([e.name for e in efuses.efuses])), 74 efuse_choices=[e.name for e in efuses.efuses] 75 + [name for e in efuses.efuses for name in e.alt_names if name != ""], 76 efuses=efuses, 92 choices=[e.name for e in efuses.efuses if e.read_disable_bit is not None] 95 for e in efuses.efuses [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c61/ |
D | operations.py | 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 179 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 178 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5beta3/ |
D | operations.py | 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 178 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32p4/ |
D | operations.py | 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 179 def burn_custom_mac(esp, efuses, args): argument [all …]
|
/hal_espressif-latest/tools/esptool_py/esptool/targets/ |
D | esp8266.py | 73 def _get_flash_size(self, efuses): argument 75 r0_4 = (efuses & (1 << 4)) != 0 76 r3_25 = (efuses & (1 << 121)) != 0 77 r3_26 = (efuses & (1 << 122)) != 0 78 r3_27 = (efuses & (1 << 123)) != 0 93 efuses = self.get_efuses() 95 efuses & ((1 << 4) | 1 << 80) 98 flash_size = self._get_flash_size(efuses) 100 efuses & (1 << 5)
|
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/ |
D | execute-scripts-cmd.rst | 21 This command allows burning all needed efuses at one time based on your own python script and contr… 30 …use.py --help``. To run a efuse command you need to call ``espefuse(esp, efuses, args, 'burn_efuse… 31 If necessary, you can call ``efuses.burn_all()`` which prompts ``Type 'BURN' (all capitals) to cont… 39 …, you can implement some checks based on the value of efuses. To get value of an efuse use ``efuse… 49 …print("connected chip: %s, coding scheme %s" % (esp.get_chip_description(), efuses["CODING_SCHEME"… 51 espefuse(esp, efuses, args, "burn_key flash_encryption flash_encryption_key.bin") 55 espefuse(esp, efuses, args, 'burn_efuse FLASH_CRYPT_CNT 0x7') 57 current_flash_crypt_cnt = efuses['FLASH_CRYPT_CNT'].get() 59 espefuse(esp, efuses, args, 'burn_efuse FLASH_CRYPT_CNT') 61 espefuse(esp, efuses, args, 'burn_efuse DISABLE_DL_ENCRYPT 1') [all …]
|
D | read-write-protections-cmd.rst | 48 Permanently read-disabling efuses MAC_VERSION, BLOCK3 49 Permanently read-disabling efuses MAC_VERSION, BLOCK3 59 Reading updated efuses... 60 Checking efuses... 69 Permanently write-disabling efuses FLASH_CRYPT_CNT, UART_DOWNLOAD_DIS 79 Reading updated efuses... 80 Checking efuses...
|
D | set-flash-voltage-cmd.rst | 47 …efuses (``{IDF_TARGET_VDD_FORCE}``, ``{IDF_TARGET_VDD_REG}``, ``{IDF_TARGET_VDD_TIEH}``) can be bu… 94 … efuse is burned it cannot be un-burned. However, changes can be made by burning additional efuses: 119 Reading updated efuses... 140 Reading updated efuses... 160 Reading updated efuses...
|
/hal_espressif-latest/tools/esptool_py/espefuse/ |
D | __init__.py | 274 efuses, efuse_operations = get_efuses( 287 efuse_operations.add_commands(subparsers, efuses) 306 efuses.batch_mode_cnt += 1 308 efuses.postpone = common_args.postpone 330 operation_func(esp, efuses, args) 333 efuses.batch_mode_cnt -= 1 334 if not efuses.burn_all(check_batch_mode=True): 352 operation_func(esp, efuses, args)
|