Home
last modified time | relevance | path

Searched refs:image (Results 1 – 25 of 44) sorted by relevance

12

/hal_espressif-latest/tools/esptool_py/esptool/
Dcmds.py172 image = LoadFirmwareImage(esp.CHIP_NAME, args.filename)
175 for seg in image.segments:
190 print("All segments done, executing at %08x" % image.entrypoint)
191 esp.mem_finish(image.entrypoint)
243 def _update_image_flash_params(esp, address, args, image): argument
247 if len(image) < 8:
248 return image # not long enough to be a bootloader image
251 magic, _, flash_mode, flash_size_freq = struct.unpack("BBBB", image[:4])
253 return image # not flashing bootloader offset, so don't modify this
256 return image # all settings are 'keep', not modifying anything
[all …]
Duf2_writer.py85 def add_file(self, addr: int, image: bytes) -> None:
86 blocks = div_roundup(len(image), self.CHUNK_SIZE)
88 image[i : i + self.CHUNK_SIZE]
89 for i in range(0, len(image), self.CHUNK_SIZE)
/hal_espressif-latest/tools/esptool_py/test/
Dtest_imagegen.py64 def assertImageDoesNotContainSection(self, image, elf, section_name): argument
76 for seg in sorted(image.segments, key=lambda s: s.addr):
84 def assertImageContainsSection(self, image, elf, section_name): argument
99 for seg in sorted(image.segments, key=lambda s: s.addr):
185 image = esptool.bin_image.LoadFirmwareImage("esp8266", self.BIN_LOAD)
188 assert len(image.segments) == 2
189 self.assertImageContainsSection(image, self.ELF, ".data")
190 self.assertImageContainsSection(image, self.ELF, ".text")
193 self.assertImageDoesNotContainSection(image, self.ELF, ".rodata")
211 image = esptool.bin_image.LoadFirmwareImage("esp8266", self.BIN_LOAD)
[all …]
Dtest_esptool.py834 image = f"images/bootloader_{arg_chip}.bin"
836 with open(image, "rb") as f:
841 self.verify_readback(offset, image_len, image)
1291 for image in ["images/one_kb.bin", "images/one_kb_all_ef.bin"]:
1296 self.verify_readback(bl_offset, 1024, image)
1465 def verify_image(self, offset, length, image, compare_to): argument
1466 with open(image, "rb") as f:
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot.c44 const uint32_t *image; in secure_boot_generate() local
64 image = bootloader_mmap(ESP_BOOTLOADER_OFFSET, image_len); in secure_boot_generate()
65 if (!image) { in secure_boot_generate()
70 ets_secure_boot_hash(&image[i/sizeof(uint32_t)]); in secure_boot_generate()
72 bootloader_munmap(image); in secure_boot_generate()
133 if(bootloader_data.image.hash_appended) { in esp_secure_boot_generate_digest()
/hal_espressif-latest/tools/esptool_py/docs/en/advanced-topics/
Dfirmware-image-format.rst17 This is technical documentation for the firmware image format used by the ROM bootloader. These are…
30 The image header is 8 bytes long:
113 …line option. These bytes are only overridden if this is a bootloader image (an image written to a …
124 …The 16-byte long extended header comes right after the image header, individual segments come righ…
133 …| 4-5 | Chip ID (which ESP device is this image for) …
135 …| 6 | Minimal chip revision supported by the image (deprecated, use the following field) …
137 …| 7-8 | Minimal chip revision supported by the image (in format: major * 100 + minor) …
139 …| 9-10 | Maximal chip revision supported by the image (in format: major * 100 + minor) …
166image) is appended after the checksum. This digest is separate to secure boot and only used for de…
168 …ata). This image signature is `Secure Boot V1 <https://docs.espressif.com/projects/esp-idf/en/late…
[all …]
Dindex.rst9 Firmware Image Format <firmware-image-format>
/hal_espressif-latest/components/esp_app_format/
DKconfig.projbuild8 …structure. If not set, time/date stamp will be excluded from app image. This can be useful for get…
9 same binary image files made from the same source, but at different times.
12 bool "Exclude PROJECT_VER from firmware image"
15 The PROJECT_VER variable from the build system will not affect the firmware image.
19 bool "Exclude PROJECT_NAME from firmware image"
22 The PROJECT_NAME variable from the build system will not affect the firmware image.
/hal_espressif-latest/components/bootloader_support/src/
Desp_image_format.c96 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen…
228 for (int i = 0; i < data->image.segment_count; i++) { in image_load()
331 static esp_err_t verify_image_header(uint32_t src_addr, const esp_image_header_t *image, bool silen… in verify_image_header() argument
336 image->magic, in verify_image_header()
337 image->segment_count, in verify_image_header()
338 image->spi_mode, in verify_image_header()
339 image->spi_size, in verify_image_header()
340 image->entry_addr); in verify_image_header()
342 if (image->magic != ESP_IMAGE_HEADER_MAGIC) { in verify_image_header()
349 CHECK_ERR(bootloader_common_check_chip_validity(image, ESP_IMAGE_APPLICATION)); in verify_image_header()
[all …]
Dbootloader_utility.c139 const uint8_t *image = bootloader_mmap(partition->offset, mmap_size); in bootloader_common_get_partition_description() local
140 if (image == NULL) { in bootloader_common_get_partition_description()
145 memcpy(app_desc, image + app_desc_offset, sizeof(esp_app_desc_t)); in bootloader_common_get_partition_description()
146 bootloader_munmap(image); in bootloader_common_get_partition_description()
755 for (int i = 0; i < data->image.segment_count; i++) {
778 data->image.entry_addr);
792 for (int i = 0; i < data->image.segment_count; i++) {
823 data->image.entry_addr);
994 const void * image = bootloader_mmap(flash_offset, partial_image_len); local
995 if (image == NULL) {
[all …]
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/
Dbasic-commands.rst47 …eeded as the default is to keep the flash mode and size from the ``.bin`` image file. See the :ref…
94 …shing. If a valid firmware image is detected, the ``Chip ID`` and ``Minimum chip revision`` fields…
95 …If the image turns out to be incompatible with the chip in use or requires a newer chip revision, …
123 …If ``write_flash`` updated the boot image's :ref:`flash mode and flash size <flash-modes>` during …
181 .. _elf-2-image:
194 …ch can be used to set the default values in the image header. This is important when generating an…
195image with a recalculated SHA256 digest, otherwise, the image SHA256 digest would be invalidated b…
203image file suitable for use with a software bootloader stub such as `rboot <https://github.com/rab…
211 …For {IDF_TARGET_NAME}, elf2image produces a single output binary "image file". By default this has…
217 In the above example, the output image file would be called ``my_esp_app.bin``.
[all …]
Dadvanced-commands.rst32image (offset {IDF_TARGET_BOOTLOADER_OFFSET} for {IDF_TARGET_NAME}) then any ``--flash_mode``, ``-…
51 The ``load_ram`` command allows the loading of an executable binary image (created with the ``elf2i…
59image must only contain IRAM- and DRAM-resident segments. Any SPI flash mapped segments will not l…
150 .. _make-image:
155 …``make_image`` allows you to manually assemble a firmware image from binary segments (such as thos…
165 …In general, it is better to create an ELF image (including any binary data as part of the ELF, by …
Dflash-modes.rst16 A header at the beginning of a bootable image contains these values.
24 These options are only consulted when flashing a bootable image to an {IDF_TARGET_NAME} at offset {…
29 …``. The default is ``keep``, which keeps whatever value is already in the image file. This paramet…
46 …z). The default is ``keep``, which keeps whatever value is already in the image file. This paramet…
86 …er flash size than you really have, as long as you don't need to write an image larger than this s…
Dbasic-options.rst16 * Binary image generation commands, such as :ref:`elf2image <elf-2-image>` or :ref:`merge_bin <merg…
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/
Dindex.rst22 The following command should be used to get an image signed using an external HSM. ::
26 …s a signature for an image using the HSM, and then creates a signature block and appends it to the…
38 Once the signed image is generated, we can verify it using the following command: ::
/hal_espressif-latest/tools/esptool_py/docs/en/
Dresources.rst30 .. image:: https://img.youtube.com/vi/zh-Y_s4X6zs/maxresdefault.jpg
38 .. image:: https://img.youtube.com/vi/GjWGKzu3XTk/maxresdefault.jpg
/hal_espressif-latest/components/bootloader/
DCMakeLists.txt20 # Also attach an image to the project flash target
DKconfig.projbuild306 … This option prevents rollback to previous firmware/application image with lower security version.
355 bool "Skip image validation when exiting deep sleep"
356 # note: dependencies for this config item are different to other "skip image validation"
364 This option disables the normal validation of an image coming out of
366 between wakeup performance from deep sleep, and image integrity checks.
378 bool "Skip image validation from power on reset (READ HELP FIRST)"
387 Note that in this case it's not possible for the bootloader to detect if an app image is
392 … Following other reset types, the bootloader will still validate the app image. This increases
394 …the bootloader will fall back to a valid app image. To increase the chances of successfully recove…
400 bool "Skip image validation always (READ HELP FIRST)"
[all …]
/hal_espressif-latest/components/bootloader_support/include/
Desp_image_format.h31 esp_image_header_t image; /* Header for entire image */ member
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/inc/
Dsummary_ESP32.rst65 …): Secure boot V1 is enabled for bootloader image = False R/W (0…
66 …): Secure boot V2 is enabled for bootloader image = False R/W (0…
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dsummary-cmd.rst66 "description": "Secure boot V1 is enabled for bootloader image",
135 …) Secure boot V1 is enabled for bootloader image = False R/W (0…
/hal_espressif-latest/tools/esptool_py/
DCHANGELOG.md43 - **cmds/write_flash**: Recalculated SHA digest for image binary
87 - Index image segments from 0 instead of 1
255 - **elf2image**: Simplify bootloader image selection
/hal_espressif-latest/components/efuse/esp32/
Desp_efuse_table.csv107 … EFUSE_BLK0, 196, 1, [] Secure boot V1 is enabled for bootloader image
108 … EFUSE_BLK0, 197, 1, [] Secure boot V2 is enabled for bootloader image
/hal_espressif-latest/components/esp_system/ld/esp32c2/
Dmemory.ld.in41 * (0x20 offset above is a convenience for the app binary image generation.
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py100 _check_output_is_not_input(args.image, args.output)
107 plaintext_image = args.image.read()
108 args.image.seek(0)
112 fw_image = esptool.bin_image.ESP32FirmwareImage(args.image)
149 args.output = os.path.splitext(args.image.name)[0] + "-digest-0x0000.bin"

12