/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-S3 chip 54 def add_commands(subparsers, efuses): argument 55 add_common_commands(subparsers, efuses) 66 choices=efuses.BLOCKS_FOR_KEYS, 80 for _ in efuses.BLOCKS_FOR_KEYS: 87 choices=efuses.BLOCKS_FOR_KEYS, 117 choices=efuses.BLOCKS_FOR_KEYS, 131 for _ in efuses.BLOCKS_FOR_KEYS: 138 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32xx/ |
D | execute_efuse_script.py | 3 espefuse(esp, efuses, args, 'burn_efuse DIS_FORCE_DOWNLOAD 1 DIS_DOWNLOAD_MODE 1') 4 espefuse(esp, efuses, args, 'burn_bit BLOCK_USR_DATA 64 66 69 72 78 82 83 90') 5 espefuse(esp, efuses, args, 'read_protect_efuse BLOCK_SYS_DATA2') 6 espefuse(esp, efuses, args, 'write_protect_efuse BLOCK_SYS_DATA2') 7 espefuse(esp, efuses, args, 'burn_block_data BLOCK_KEY5 ../../images/efuse/256bit') 8 espefuse(esp, efuses, args, 'burn_key BLOCK_KEY0 ../../images/efuse/256bit XTS_AES_128_KEY --no-rea… 9 espefuse(esp, efuses, args, 'burn_key_digest BLOCK_KEY1 ../../secure_images/rsa_secure_boot_signing… 11 efuses.burn_all() 13 espefuse(esp, efuses, args, 'summary') 14 espefuse(esp, efuses, args, 'adc_info') [all …]
|
D | execute_efuse_script2.py | 3 espefuse(esp, efuses, args, 'burn_efuse DIS_FORCE_DOWNLOAD 1 DIS_DOWNLOAD_MODE 1') 4 if efuses["DIS_FORCE_DOWNLOAD"].get() != 0: 7 espefuse(esp, efuses, args, 'burn_bit BLOCK_USR_DATA 64 66 69 72 78 82 83 90') 8 if efuses["BLOCK_USR_DATA"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00… 11 espefuse(esp, efuses, args, 'read_protect_efuse BLOCK_SYS_DATA2') 12 espefuse(esp, efuses, args, 'write_protect_efuse BLOCK_SYS_DATA2') 13 if not efuses["BLOCK_SYS_DATA2"].is_readable() or not efuses["BLOCK_SYS_DATA2"].is_writeable(): 16 espefuse(esp, efuses, args, 'burn_block_data BLOCK_KEY5 ../../images/efuse/256bit') 17 if efuses["BLOCK_KEY5"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 … 20 espefuse(esp, efuses, args, 'burn_key BLOCK_KEY0 ../../images/efuse/256bit XTS_AES_128_KEY --no-rea… [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2beta1/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-H2 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 170 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s2/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32S2 chip 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32s3beta2/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-S3(beta2) chip 54 def add_commands(subparsers, efuses): argument 55 add_common_commands(subparsers, efuses) 66 choices=efuses.BLOCKS_FOR_KEYS, 80 for _ in efuses.BLOCKS_FOR_KEYS: 87 choices=efuses.BLOCKS_FOR_KEYS, 117 choices=efuses.BLOCKS_FOR_KEYS, 131 for _ in efuses.BLOCKS_FOR_KEYS: 138 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c6/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C6 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32h2/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-H2 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 170 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/test/efuse_scripts/esp32/ |
D | execute_efuse_script.py | 3 espefuse(esp, efuses, args, "burn_efuse JTAG_DISABLE 1 DISABLE_SDIO_HOST 1 CONSOLE_DEBUG_DISABLE 1") 4 espefuse(esp, efuses, args, "burn_key flash_encryption ../../images/efuse/256bit --no-protect-key") 5 espefuse(esp, efuses, args, "burn_key_digest ../../secure_images/rsa_secure_boot_signing_key.pem") 6 espefuse(esp, efuses, args, "burn_bit BLOCK3 64 66 69 72 78 82 83 90") 7 espefuse(esp, efuses, args, "burn_custom_mac AA:BB:CC:DD:EE:88") 9 efuses.burn_all() 11 espefuse(esp, efuses, args, "summary") 12 espefuse(esp, efuses, args, "adc_info") 13 espefuse(esp, efuses, args, "get_custom_mac") 16 # Checks written eFuses [all …]
|
D | execute_efuse_script2.py | 3 espefuse(esp, efuses, args, "burn_efuse JTAG_DISABLE 1 DISABLE_SDIO_HOST 1 CONSOLE_DEBUG_DISABLE 1") 4 if efuses["JTAG_DISABLE"].get() != 0: 7 espefuse(esp, efuses, args, "burn_key flash_encryption ../../images/efuse/256bit --no-protect-key") 8 if efuses["BLOCK1"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0… 10 if not efuses["BLOCK1"].is_readable() or not efuses["BLOCK1"].is_writeable(): 13 espefuse(esp, efuses, args, "burn_key_digest ../../secure_images/rsa_secure_boot_signing_key.pem") 14 if efuses["BLOCK2"].get_meaning() != "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0… 16 if not efuses["BLOCK2"].is_readable() or not efuses["BLOCK2"].is_writeable(): 19 espefuse(esp, efuses, args, "burn_bit BLOCK3 64 66 69 72 78 82 83 90") 20 espefuse(esp, efuses, args, "burn_custom_mac AA:BB:CC:DD:EE:88") [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c3/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C3 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/ |
D | base_operations.py | 1 # This file includes the common operations with eFuses for chips 20 def add_common_commands(subparsers, efuses): argument 25 self.efuses = kwargs.get("efuses") 27 del kwargs["efuses"] 53 check_arg = base_fields.CheckArgValue(self.efuses, efuse_name) 60 check_arg = base_fields.CheckArgValue(self.efuses, efuse_name) 70 "[{}].".format(", ".join([e.name for e in efuses.efuses])), 74 efuse_choices=[e.name for e in efuses.efuses] 75 + [name for e in efuses.efuses for name in e.alt_names if name != ""], 76 efuses=efuses, [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c61/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C61 chip 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32 chip 32 def add_commands(subparsers, efuses): argument 33 add_common_commands(subparsers, efuses) 36 help="Burn a 256-bit key to EFUSE: %s" % ", ".join(efuses.BLOCKS_FOR_KEYS), 52 choices=efuses.BLOCKS_FOR_KEYS, 60 for _ in efuses.BLOCKS_FOR_KEYS: 68 choices=efuses.BLOCKS_FOR_KEYS, 112 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 119 def burn_custom_mac(esp, efuses, args): argument 124 efuses["CUSTOM_MAC"].save(args.mac) [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c2/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C2 chip 49 def add_commands(subparsers, efuses): argument 50 add_common_commands(subparsers, efuses) 61 choices=efuses.BLOCKS_FOR_KEYS, 82 choices=efuses.BLOCKS_FOR_KEYS, 128 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), 135 def burn_custom_mac(esp, efuses, args): argument 136 efuses["CUSTOM_MAC"].save(args.mac) 137 efuses["CUSTOM_MAC_USED"].save(1) 138 if not efuses.burn_all(check_batch_mode=True): [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32p4/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-P4 chip 53 def add_commands(subparsers, efuses): argument 54 add_common_commands(subparsers, efuses) 65 choices=efuses.BLOCKS_FOR_KEYS, 79 for _ in efuses.BLOCKS_FOR_KEYS: 86 choices=efuses.BLOCKS_FOR_KEYS, 116 choices=efuses.BLOCKS_FOR_KEYS, 130 for _ in efuses.BLOCKS_FOR_KEYS: 137 choices=efuses.BLOCKS_FOR_KEYS, 172 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C5 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/espefuse/efuse/esp32c5beta3/ |
D | operations.py | 1 # This file includes the operations with eFuses for ESP32-C5 beta3 chip 52 def add_commands(subparsers, efuses): argument 53 add_common_commands(subparsers, efuses) 64 choices=efuses.BLOCKS_FOR_KEYS, 78 for _ in efuses.BLOCKS_FOR_KEYS: 85 choices=efuses.BLOCKS_FOR_KEYS, 115 choices=efuses.BLOCKS_FOR_KEYS, 129 for _ in efuses.BLOCKS_FOR_KEYS: 136 choices=efuses.BLOCKS_FOR_KEYS, 171 type=fields.base_fields.CheckArgValue(efuses, "CUSTOM_MAC"), [all …]
|
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/ |
D | execute-scripts-cmd.rst | 21 This command allows burning all needed efuses at one time based on your own python script and contr… 30 … you need to call ``espefuse(esp, efuses, args, 'burn_efuse DISABLE_DL_DECRYPT 1')``. This command… 31 If necessary, you can call ``efuses.burn_all()`` which prompts ``Type 'BURN' (all capitals) to cont… 39 …some checks based on the value of efuses. To get value of an efuse use ``efuses['FLASH_CRYPT_CNT']… 49 …print("connected chip: %s, coding scheme %s" % (esp.get_chip_description(), efuses["CODING_SCHEME"… 51 espefuse(esp, efuses, args, "burn_key flash_encryption flash_encryption_key.bin") 55 espefuse(esp, efuses, args, 'burn_efuse FLASH_CRYPT_CNT 0x7') 57 current_flash_crypt_cnt = efuses['FLASH_CRYPT_CNT'].get() 59 espefuse(esp, efuses, args, 'burn_efuse FLASH_CRYPT_CNT') 61 espefuse(esp, efuses, args, 'burn_efuse DISABLE_DL_ENCRYPT 1') [all …]
|
D | read-write-protections-cmd.rst | 15 … software from reading eFuse fields, only hardware can access such eFuses. Such eFuses are read as… 19 Not all eFuses have read and write protections. See the help for these commands for the eFuse names… 21 eFuses are often read/write protected as a group, so protecting one of eFuse will result in some re… 48 Permanently read-disabling efuses MAC_VERSION, BLOCK3 49 Permanently read-disabling efuses MAC_VERSION, BLOCK3 59 Reading updated efuses... 60 Checking efuses... 69 Permanently write-disabling efuses FLASH_CRYPT_CNT, UART_DOWNLOAD_DIS 79 Reading updated efuses... 80 Checking efuses...
|
D | burn-efuse-cmd.rst | 6 The ``espefuse.py burn_efuse`` command burns eFuses. The arguments to ``burn_efuse`` are eFuse name… 15 * ``--force``. Suppress an error to burn eFuses. The tool checks for incompatible eFuse states to p… 19 …ny back to 0 will have no effect. Most eFuses have a limited bit width (many are only 1-bit flags)… 21 This command supports simultaneous burning of multiple eFuses, it doesn't matter if they are from d… 28 The efuses to burn: 33 Burning efuses: 45 By default, ``espefuse.py`` will ask you to type ``BURN`` before it permanently sets eFuses. The ``… 51 Reading updated efuses... 52 Checking efuses... 60 The following efuses configure the SPI flash pins which are used to boot: [all …]
|
D | summary-cmd.rst | 6 The ``espefuse.py summary`` command reads the eFuses from the chip and outputs them in text or json… 13 …e displayed. For more information, refer to the :ref:`Filtering eFuses <filtering-eFuses>` section. 14 - ``--file`` - File to save the efuse summary. Usage ``--file efuses.json``. 15 - List of eFuses to filter. For more information, refer to the :ref:`Filtering eFuses <filtering-eF… 41 Some eFuses have no protection at all, and some eFuses have only one read or write protection. Ther… 55 The json representation of eFuses for the ESP32 chip is shown below. 110 > espefuse.py summary --format json --file efuses.json 118 Saving efuse values to efuses.json 120 .. _filtering-eFuses: 122 Filtering Efuses and Displaying Only the Value [all …]
|
/hal_espressif-latest/components/soc/esp32/include/soc/ |
D | efuse_defs.h | 19 #define EFUSE_WR_DIS_MAC_SPI_CONFIG_HD (1<<3) /*< disable writing MAC & SPI config hd efuses */ 20 #define EFUSE_WR_DIS_XPD_SDIO (1<<5) /*< disable writing SDIO config efuses */ 21 #define EFUSE_WR_DIS_SPI_PAD_CONFIG (1<<6) /*< disable writing SPI_PAD_CONFIG efuses */ 22 #define EFUSE_WR_DIS_BLK1 (1<<7) /*< disable writing BLK1 efuses */ 23 #define EFUSE_WR_DIS_BLK2 (1<<8) /*< disable writing BLK2 efuses */ 24 #define EFUSE_WR_DIS_BLK3 (1<<9) /*< disable writing BLK3 efuses */ 25 …LASH_CRYPT_CODING_SCHEME (1<<10) /*< disable writing FLASH_CRYPT_CONFIG and CODING_SCHEME efuses */ 29 …riting CONSOLE_DEBUG_DISABLE, DISABLE_DL_ENCRYPT, DISABLE_DL_DECRYPT and DISABLE_DL_CACHE efuses */
|
/hal_espressif-latest/tools/esptool_py/esptool/targets/ |
D | esp8266.py | 73 def _get_flash_size(self, efuses): argument 75 r0_4 = (efuses & (1 << 4)) != 0 76 r3_25 = (efuses & (1 << 121)) != 0 77 r3_26 = (efuses & (1 << 122)) != 0 78 r3_27 = (efuses & (1 << 123)) != 0 93 efuses = self.get_efuses() 95 efuses & ((1 << 4) | 1 << 80) 98 flash_size = self._get_flash_size(efuses) 100 efuses & (1 << 5)
|
/hal_espressif-latest/tools/esptool_py/espefuse/ |
D | __init__.py | 230 help="Do not pause for confirmation before permanently writing efuses. " 236 help="Postpone burning some efuses from BLOCK0 at the end, " 237 "(efuses which disable access to blocks or chip).", 274 efuses, efuse_operations = get_efuses( 287 efuse_operations.add_commands(subparsers, efuses) 306 efuses.batch_mode_cnt += 1 308 efuses.postpone = common_args.postpone 330 operation_func(esp, efuses, args) 333 efuses.batch_mode_cnt -= 1 334 if not efuses.burn_all(check_batch_mode=True): [all …]
|