1 2.. first_boot_enc 3 4.. code-block:: bash 5 6 rst:0x1 (POWERON),boot:0xf (SPI_FAST_FLASH_BOOT) 7 SPIWP:0xee 8 mode:DIO, clock div:2 9 load:0x3fcd6260,len:0x1b8 10 load:0x3fcd6418,len:0x2538 11 load:0x403ce000,len:0x704 12 load:0x403d0000,len:0x34f0 13 entry 0x403ce03e 14 I (12) boot: ESP-IDF qa-test-v4.3-20201113-766-g870d 2nd stage bootloader 15 I (13) boot: compile time 12:10:57 16 I (13) boot: chip revision: 0 17 I (16) boot.esp32c3: SPI Speed : 40MHz 18 I (17) boot.esp32c3: SPI Mode : DIO 19 I (19) boot.esp32c3: SPI Flash Size : 2MB 20 I (22) boot: Enabling RNG early entropy source... 21 I (28) boot: Partition Table: 22 I (30) boot: ## Label Usage Type ST Offset Length 23 I (33) boot: 0 nvs WiFi data 01 02 0000a000 00006000 24 I (37) boot: 1 storage Unknown data 01 ff 00010000 00001000 25 I (41) boot: 2 factory factory app 00 00 00020000 00100000 26 I (44) boot: End of partition table 27 I (46) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map 28 I (61) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324) load 29 I (64) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688) load 30 0x40380000: _vector_table at ??:? 31 32 I (81) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724) 33 I (84) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map 34 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63 35 36 I (132) boot: Loaded app from partition at offset 0x20000 37 I (133) boot: Checking flash encryption... 38 I (137) efuse: Batch mode of writing fields is enabled 39 I (140) flash_encrypt: Generating new flash encryption key... 40 I (144) efuse: Writing EFUSE_BLK_KEY0 with purpose 4 41 W (148) flash_encrypt: Not disabling UART bootloader encryption 42 I (152) flash_encrypt: Disable UART bootloader cache... 43 I (155) flash_encrypt: Disable JTAG... 44 I (161) efuse: Batch mode. Prepared fields are committed 45 I (162) esp_image: segment 0: paddr=0x00000020 vaddr=0x3fcd6260 size=0x001b8 ( 440) 46 I (164) esp_image: segment 1: paddr=0x000001e0 vaddr=0x3fcd6418 size=0x02538 ( 9528) 47 I (173) esp_image: segment 2: paddr=0x00002720 vaddr=0x403ce000 size=0x00704 ( 1796) 48 I (174) esp_image: segment 3: paddr=0x00002e2c vaddr=0x403d0000 size=0x034f0 ( 13552) 49 I (571) flash_encrypt: bootloader encrypted successfully 50 I (627) flash_encrypt: partition table encrypted and loaded successfully 51 I (628) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)... 52 I (685) flash_encrypt: Done encrypting 53 I (686) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map 54 I (696) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324) 55 I (699) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688) 56 0x40380000: _vector_table at ??:? 57 58 I (715) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724) 59 I (717) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map 60 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63 61 62 I (760) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)... 63 I (14797) flash_encrypt: Done encrypting 64 I (14801) flash_encrypt: Flash encryption completed 65 I (14802) boot: Resetting with flash encryption enabled... 66 67 68------ 69 70.. already_en_enc 71 72.. code-block:: bash 73 74 rst:0x3 (RTC_SW_SYS_RST),boot:0xf (SPI_FAST_FLASH_BOOT) 75 Saved PC:0x403d0dde 76 SPIWP:0xee 77 mode:DIO, clock div:2 78 load:0x3fcd6260,len:0x1b8 79 load:0x3fcd6418,len:0x2538 80 load:0x403ce000,len:0x704 81 load:0x403d0000,len:0x34f0 82 entry 0x403ce03e 83 I (15) boot: ESP-IDF qa-test-v4.3-20201113-766-g870d 2nd stage bootloader 84 I (15) boot: compile time 12:10:57 85 I (16) boot: chip revision: 0 86 I (19) boot.esp32c3: SPI Speed : 40MHz 87 I (19) boot.esp32c3: SPI Mode : DIO 88 I (22) boot.esp32c3: SPI Flash Size : 2MB 89 I (24) boot: Enabling RNG early entropy source... 90 I (30) boot: Partition Table: 91 I (32) boot: ## Label Usage Type ST Offset Length 92 I (36) boot: 0 nvs WiFi data 01 02 0000a000 00006000 93 I (39) boot: 1 storage Unknown data 01 ff 00010000 00001000 94 I (43) boot: 2 factory factory app 00 00 00020000 00100000 95 I (47) boot: End of partition table 96 I (49) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map 97 I (64) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324) load 98 I (67) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688) load 99 0x40380000: _vector_table at ??:? 100 101 I (86) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724) 102 I (88) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map 103 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63 104 105 I (139) boot: Loaded app from partition at offset 0x20000 106 I (139) boot: Checking flash encryption... 107 I (144) flash_encrypt: flash encryption is enabled (1 plaintext flashes left) 108 I (148) boot: Disabling RNG early entropy source... 109 I (160) cpu_start: Pro cpu start user code 110 I (160) cpu_start: cpu freq: 40000000 111 I (161) cpu_start: Application information: 112 I (161) cpu_start: Project name: flash_encryption 113 I (164) cpu_start: App version: qa-test-v4.3-20201113-766-g870d 114 I (168) cpu_start: Compile time: Dec 21 2020 12:10:55 115 I (171) cpu_start: ELF file SHA256: 209e8947c2e6a6a6... 116 I (174) cpu_start: ESP-IDF: qa-test-v4.3-20201113-766-g870d 117 I (178) heap_init: Initializing. RAM available for dynamic allocation: 118 I (181) heap_init: At 3FC8A9F0 len 00035610 (213 KiB): D/IRAM 119 I (184) heap_init: At 3FCC0000 len 0001F260 (124 KiB): STACK/DRAM 120 I (188) heap_init: At 50000000 len 00002000 (8 KiB): FAKEDRAM 121 W (192) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure) 122 I (195) spi_flash: detected chip: gd 123 I (197) spi_flash: flash io: dio 124 W (199) spi_flash: Detected size(4096k) larger than the size in the binary image header(2048k). Using the size in the binary image header. 125 I (207) cpu_start: Starting scheduler. 126 127 Example to check Flash Encryption status 128 This is esp32c3 chip with 1 CPU core(s), WiFi/BLE, silicon revision 0, 2MB external flash 129 FLASH_CRYPT_CNT eFuse value is 1 130 Flash encryption feature is enabled in DEVELOPMENT mode 131 132 133------ 134