Home
last modified time | relevance | path

Searched refs:get_meaning (Results 1 – 13 of 13) sorted by relevance

/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32xx/
Dexecute_efuse_script.py23 if efuses["BLOCK_USR_DATA"].get_meaning() != "00 00 00 00 00 00 00 00 25 41 0c 04 00 00 00 00 00 00…
31 if efuses["BLOCK_KEY5"].get_meaning() != "a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af b0 b1 b2 …
35 if efuses["BLOCK_KEY0"].get_meaning() != "bf be bd bc bb ba b9 b8 b7 b6 b5 b4 b3 b2 b1 b0 af ae ad …
41 if efuses["KEY_PURPOSE_0"].get_meaning() != "XTS_AES_128_KEY":
48 if efuses["BLOCK_KEY1"].get_meaning() != "cb 27 91 a3 71 b0 c0 32 2b f7 37 04 78 ba 09 62 22 4c ab …
51 if efuses["KEY_PURPOSE_1"].get_meaning() != "SECURE_BOOT_DIGEST0":
Dexecute_efuse_script2.py8 if efuses["BLOCK_USR_DATA"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00…
17 if efuses["BLOCK_KEY5"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …
21 if efuses["BLOCK_KEY0"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …
27 if efuses["BLOCK_KEY1"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …
/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32/
Dexecute_efuse_script.py25 if efuses["BLOCK1"].get_meaning() != "bf be bd bc bb ba b9 b8 b7 b6 b5 b4 b3 b2 b1 b0 af ae ad ac a…
32 if efuses["BLOCK2"].get_meaning() != "cb 27 91 a3 71 b0 c0 32 2b f7 37 04 78 ba 09 62 22 4c ab 1c f…
39 if efuses["BLOCK3"].get_meaning() != "69 aa bb cc dd ee 88 00 25 41 0c 04 00 00 00 00 00 00 00 00 0…
42 if efuses["CUSTOM_MAC"].get_meaning() != "aa:bb:cc:dd:ee:88 (CRC 0x69 OK)":
Dexecute_efuse_script2.py8 if efuses["BLOCK1"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0…
14 if efuses["BLOCK2"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0…
22 if efuses["BLOCK3"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0…
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dexecute-scripts-cmd.rst40 See how it is done (for ESP32) for ``CODING_SCHEME`` when ``get_meaning()`` is called:
49 … chip: %s, coding scheme %s" % (esp.get_chip_description(), efuses["CODING_SCHEME"].get_meaning()))
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c2/
Doperations.py164 print("BLK_VERSION_MINOR = {}".format(efuses["BLK_VERSION_MINOR"].get_meaning()))
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c3/
Doperations.py210 print("BLK_VERSION_MAJOR = {}".format(efuses["BLK_VERSION_MAJOR"].get_meaning()))
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c6/
Doperations.py217 print("BLK_VERSION_MINOR = {}".format(efuses["BLK_VERSION_MINOR"].get_meaning()))
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s2/
Doperations.py260 print("BLK_VERSION_MINOR = ", efuses["BLK_VERSION_MINOR"].get_meaning())
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3/
Doperations.py260 print("BLK_VERSION_MAJOR = ", efuses["BLK_VERSION_MAJOR"].get_meaning())
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3beta2/
Doperations.py260 print("BLK_VERSION_MAJOR = ", efuses["BLK_VERSION_MAJOR"].get_meaning())
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/
Dbase_operations.py312 base_value = e.get_meaning()
Dbase_fields.py821 def get_meaning(self, from_read=True): member in EfuseFieldBase