mirror of
https://github.com/espressif/esptool.git
synced 2025-10-17 16:01:18 +08:00
docs(sphinx-lint): Fix issues reported by sphinx-lint before adding it to pre-commit
This commit is contained in:
@@ -96,7 +96,7 @@ Conventional Commits
|
||||
Ruff
|
||||
""""
|
||||
|
||||
``esptool.py`` is `PEP8 <https://peps.python.org/pep-0008/>` compliant and enforces this style guide. For compliancy checking, we use `ruff <https://docs.astral.sh/ruff/>`.
|
||||
``esptool.py`` is `PEP8 <https://peps.python.org/pep-0008/>`_ compliant and enforces this style guide. For compliancy checking, we use `ruff <https://docs.astral.sh/ruff/>`_.
|
||||
``Ruff`` also auto-format files in the same style as previously used ``black``.
|
||||
|
||||
|
||||
@@ -104,6 +104,11 @@ Ruff
|
||||
|
||||
When you submit a Pull Request, the GitHub Actions automated build system will run automated checks using these tools.
|
||||
|
||||
Shinx-lint
|
||||
""""""""""
|
||||
|
||||
The documentation is checked for stylistic and formal issues by ``sphinx-lint``.
|
||||
|
||||
Automated Integration Tests
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
|
@@ -31,7 +31,7 @@ Burning bits to BLOCK2:
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[02] BLOCK2 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -65,7 +65,7 @@ Burning In Multiple Blocks
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[02] BLOCK2 is empty, will burn the new value
|
||||
[03] BLOCK3 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -31,7 +31,7 @@ Optional arguments:
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[03] BLOCK3 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -35,7 +35,7 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[03] BLOCK3 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -47,12 +47,12 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
> espefuse.py summary
|
||||
...
|
||||
MAC_VERSION (BLOCK3): Version of the MAC field = Custom MAC in BLOCK3 R/W (0x01)
|
||||
CUSTOM_MAC (BLOCK3): Custom MAC
|
||||
= 48:63:92:15:72:16 (CRC 0x75 OK) R/W
|
||||
CUSTOM_MAC (BLOCK3): Custom MAC
|
||||
= 48:63:92:15:72:16 (CRC 0x75 OK) R/W
|
||||
CUSTOM_MAC_CRC (BLOCK3): CRC of custom MAC = 117 R/W (0x75)
|
||||
...
|
||||
BLOCK3 (BLOCK3): Variable Block 3
|
||||
= 75 48 63 92 15 72 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK3 (BLOCK3): Variable Block 3
|
||||
= 75 48 63 92 15 72 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
.. only:: esp32c2
|
||||
|
||||
@@ -75,7 +75,7 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
(to write): 0x0400000000000000
|
||||
(coding scheme = NONE)
|
||||
[01] BLOCK1 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -88,8 +88,8 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
> espefuse.py summary
|
||||
...
|
||||
CUSTOM_MAC_USED (BLOCK0) Enable CUSTOM_MAC programming = True R/W (0b1)
|
||||
CUSTOM_MAC (BLOCK1) Custom MAC addr
|
||||
= 48:63:92:15:72:16 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK1) Custom MAC addr
|
||||
= 48:63:92:15:72:16 (OK) R/W
|
||||
|
||||
.. only:: esp32c3 or esp32s2 or esp32s3
|
||||
|
||||
@@ -105,7 +105,7 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[03] BLOCK_USR_DATA is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -116,5 +116,5 @@ If ``CUSTOM_MAC`` is placed in an eFuse block with a coding scheme and already h
|
||||
|
||||
> espefuse.py summary
|
||||
...
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC Address
|
||||
= 48:63:92:15:72:16 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC Address
|
||||
= 48:63:92:15:72:16 (OK) R/W
|
||||
|
@@ -78,7 +78,7 @@ Optional arguments:
|
||||
|
||||
.. only:: esp32h2
|
||||
|
||||
{IDF_TARGET_NAME} has the ECDSA accelerator for signature purposes and supports private keys based on the NIST192p or NIST256p curve. These two commands below can be used to generate such keys (``PEM`` file). The ``burn_key`` command with the ``ECDSA_KEY`` purpose takes the ``PEM`` file and writes the private key into a eFuse block. The key is written to the block in reverse byte order.
|
||||
{IDF_TARGET_NAME} has the ECDSA accelerator for signature purposes and supports private keys based on the NIST192p or NIST256p curve. These two commands below can be used to generate such keys (``PEM`` file). The ``burn_key`` command with the ``ECDSA_KEY`` purpose takes the ``PEM`` file and writes the private key into a eFuse block. The key is written to the block in reverse byte order.
|
||||
|
||||
For NIST192p, the private key is 192 bits long, so 8 padding bytes ("0x00") are added.
|
||||
|
||||
@@ -166,7 +166,7 @@ Usage
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
> espefuse.py burn_key flash_encryption 256bit_fe_key.bin
|
||||
> espefuse.py burn_key flash_encryption 256bit_fe_key.bin
|
||||
|
||||
=== Run "burn_key" command ===
|
||||
Sensitive data will be hidden (see --show-sensitive-info)
|
||||
@@ -177,13 +177,13 @@ Usage
|
||||
Disabling write to key block
|
||||
|
||||
Burn keys in efuse blocks.
|
||||
The key block will be read and write protected
|
||||
The key block will be read and write protected
|
||||
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
[01] BLOCK1 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -196,15 +196,15 @@ Usage
|
||||
|
||||
> espefuse.py summary
|
||||
...
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? -/-
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? -/-
|
||||
|
||||
Byte order for flash encryption key is reversed. Content of flash encryption key file ("256bit_fe_key.bin"):
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
0001 0203 0405 0607 0809 0a0b 0c0d 0e0f 1011 1213 1415 1617 1819 1a1b 1c1d 1e1f
|
||||
|
||||
|
||||
When the ``no protection`` option is used then you can see the burned key:
|
||||
|
||||
.. code-block:: none
|
||||
@@ -219,12 +219,12 @@ Usage
|
||||
|
||||
Key is left unprotected as per --no-protect-key argument.
|
||||
Burn keys in efuse blocks.
|
||||
The key block will left readable and writeable (due to --no-protect-key)
|
||||
The key block will left readable and writeable (due to --no-protect-key)
|
||||
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[01] BLOCK1 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -236,8 +236,8 @@ Usage
|
||||
|
||||
> espefuse.py summary
|
||||
...
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= 1f 1e 1d 1c 1b 1a 19 18 17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 02 01 00 R/W
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= 1f 1e 1d 1c 1b 1a 19 18 17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 02 01 00 R/W
|
||||
|
||||
.. only:: esp32s2 or esp32s3
|
||||
|
||||
@@ -280,7 +280,7 @@ Usage
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
[04] BLOCK_KEY0 is empty, will burn the new value
|
||||
[05] BLOCK_KEY1 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -297,12 +297,12 @@ Usage
|
||||
...
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: XTS_AES_256_KEY_1
|
||||
Encryption key0 or user data
|
||||
= 1f 1e 1d 1c 1b 1a 19 18 17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 02 01 00 R/-
|
||||
Encryption key0 or user data
|
||||
= 1f 1e 1d 1c 1b 1a 19 18 17 16 15 14 13 12 11 10 0f 0e 0d 0c 0b 0a 09 08 07 06 05 04 03 02 01 00 R/-
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: XTS_AES_256_KEY_2
|
||||
Encryption key1 or user data
|
||||
= 3f 3e 3d 3c 3b 3a 39 38 37 36 35 34 33 32 31 30 2f 2e 2d 2c 2b 2a 29 28 27 26 25 24 23 22 21 20 R/-
|
||||
Encryption key1 or user data
|
||||
= 3f 3e 3d 3c 3b 3a 39 38 37 36 35 34 33 32 31 30 2f 2e 2d 2c 2b 2a 29 28 27 26 25 24 23 22 21 20 R/-
|
||||
|
||||
.. only:: esp32c2
|
||||
|
||||
@@ -336,7 +336,7 @@ Usage
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
[03] BLOCK_KEY0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -3,7 +3,7 @@
|
||||
Burn key Digest
|
||||
===============
|
||||
|
||||
The ``espefuse.py burn_key_digest`` command parses a RSA public key and burns the digest to eFuse block for use with `Secure Boot V2 <https://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.html#signature-block-format>`_.
|
||||
The ``espefuse.py burn_key_digest`` command parses a RSA public key and burns the digest to eFuse block for use with `Secure Boot V2 <https://docs.espressif.com/projects/esp-idf/en/latest/{IDF_TARGET_PATH_NAME}/security/secure-boot-v2.html#signature-block-format>`_.
|
||||
|
||||
Positional arguments:
|
||||
|
||||
@@ -11,7 +11,7 @@ Positional arguments:
|
||||
|
||||
:not esp32 and not esp32c2: - ``block`` - Name of key block.
|
||||
- ``Keyfile``. Key file to digest (PEM format).
|
||||
:not esp32 and not esp32c2: - ``Key purpose``. The purpose of this key [``SECURE_BOOT_DIGEST0``, ``SECURE_BOOT_DIGEST1``, ``SECURE_BOOT_DIGEST2``].
|
||||
:not esp32 and not esp32c2: - ``Key purpose``. The purpose of this key [``SECURE_BOOT_DIGEST0``, ``SECURE_BOOT_DIGEST1``, ``SECURE_BOOT_DIGEST2``].
|
||||
|
||||
.. only:: not esp32 and not esp32c2
|
||||
|
||||
@@ -55,7 +55,7 @@ Usage
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
[02] BLOCK2 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -66,8 +66,8 @@ Usage
|
||||
|
||||
> espefuse.py summary
|
||||
...
|
||||
BLOCK2 (BLOCK2): Secure boot key
|
||||
= a2 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
BLOCK2 (BLOCK2): Secure boot key
|
||||
= a2 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
|
||||
.. only:: esp32c2
|
||||
|
||||
@@ -75,7 +75,7 @@ Usage
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
> espefuse.py burn_key_digest secure_boot_v2_ecdsa192.pem
|
||||
> espefuse.py burn_key_digest secure_boot_v2_ecdsa192.pem
|
||||
|
||||
=== Run "burn_key_digest" command ===
|
||||
Sensitive data will be hidden (see --show-sensitive-info)
|
||||
@@ -87,7 +87,7 @@ Usage
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
[03] BLOCK_KEY0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -97,18 +97,18 @@ Usage
|
||||
Successful
|
||||
|
||||
> espefuse.py summary
|
||||
...
|
||||
...
|
||||
XTS_KEY_LENGTH_256 (BLOCK0) Flash encryption key length = 128 bits key R/W (0b0)
|
||||
...
|
||||
BLOCK_KEY0 (BLOCK3) BLOCK_KEY0 - 256-bits. 256-bit key of Flash Encryp
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 c2 bd 9c 1a b4 b7 44 22 59 c6 d3 12 0b 79 1f R/-
|
||||
tion
|
||||
BLOCK_KEY0_LOW_128 (BLOCK3) BLOCK_KEY0 - lower 128-bits. 128-bit key of Flash
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/-
|
||||
Encryption
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 c2 bd 9c 1a b4 b7 44 22 59 c6 d3 12 0b 79 1f R/-
|
||||
tion
|
||||
BLOCK_KEY0_LOW_128 (BLOCK3) BLOCK_KEY0 - lower 128-bits. 128-bit key of Flash
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/-
|
||||
Encryption
|
||||
BLOCK_KEY0_HI_128 (BLOCK3) BLOCK_KEY0 - higher 128-bits. 128-bits key of Secu
|
||||
= 02 c2 bd 9c 1a b4 b7 44 22 59 c6 d3 12 0b 79 1f R/-
|
||||
re Boot.
|
||||
= 02 c2 bd 9c 1a b4 b7 44 22 59 c6 d3 12 0b 79 1f R/-
|
||||
re Boot.
|
||||
|
||||
.. only:: esp32c3 or esp32s2 or esp32s3
|
||||
|
||||
@@ -143,7 +143,7 @@ Usage
|
||||
[04] BLOCK_KEY0 is empty, will burn the new value
|
||||
[05] BLOCK_KEY1 is empty, will burn the new value
|
||||
[06] BLOCK_KEY2 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -162,13 +162,13 @@ Usage
|
||||
...
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: SECURE_BOOT_DIGEST0
|
||||
Encryption key0 or user data
|
||||
= a2 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
Encryption key0 or user data
|
||||
= a2 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: SECURE_BOOT_DIGEST1
|
||||
Encryption key1 or user data
|
||||
Encryption key1 or user data
|
||||
= a3 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: SECURE_BOOT_DIGEST2
|
||||
Encryption key2 or user data
|
||||
Encryption key2 or user data
|
||||
= a4 cd 39 85 df 00 d7 95 07 0f f6 7c 8b ab e1 7d 39 11 95 c4 5b 37 6e 7b f0 ec 04 5e 36 30 02 5d R/-
|
||||
|
@@ -74,7 +74,7 @@ Repairs encoding errors in eFuse blocks, if possible.
|
||||
BLOCK0 ( ) [0 ] err__regs: 00000000 00000000 00000000 00000000 00000000 00000000
|
||||
EFUSE_RD_RS_ERR0_REG 0x00008990
|
||||
EFUSE_RD_RS_ERR1_REG 0x00000000
|
||||
Recovery of block coding errors.
|
||||
Recovery of block coding errors.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -59,7 +59,7 @@ The order of registers in the dump:
|
||||
.. only:: not esp32 and not esp32c2
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
|
||||
> espefuse.py dump
|
||||
|
||||
Connecting....
|
||||
@@ -111,4 +111,3 @@ These dump files can be written to another chip:
|
||||
> espefuse.py burn_block_data BLOCK0 backup/chip1/blk0.bin \
|
||||
BLOCK1 backup/chip1/blk1.bin \
|
||||
BLOCK2 backup/chip1/blk2.bin
|
||||
|
@@ -16,11 +16,11 @@
|
||||
|
||||
Flash fuses:
|
||||
FORCE_SEND_RESUME (BLOCK0) Set this bit to force ROM code to send a resume co = False R/W (0b0)
|
||||
mmand during SPI boot
|
||||
mmand during SPI boot
|
||||
FLASH_TPUW (BLOCK0) Configures flash waiting time after power-up; in u = 0 R/W (0x0)
|
||||
nit of ms. If the value is less than 15; the waiti
|
||||
ng time is the configurable value. Otherwise; the
|
||||
waiting time is twice the configurable value
|
||||
waiting time is twice the configurable value
|
||||
|
||||
Identity fuses:
|
||||
DISABLE_WAFER_VERSION_MAJOR (BLOCK0) Disables check of wafer version major = False R/W (0b0)
|
||||
@@ -36,31 +36,31 @@
|
||||
|
||||
Mac fuses:
|
||||
CUSTOM_MAC_USED (BLOCK0) True if MAC_CUSTOM is burned = False R/W (0b0)
|
||||
CUSTOM_MAC (BLOCK1) Custom MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK2) MAC address
|
||||
= 10:97:bd:f0:e5:28 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK1) Custom MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK2) MAC address
|
||||
= 10:97:bd:f0:e5:28 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_DOWNLOAD_ICACHE (BLOCK0) The bit be set to disable icache in download mode = False R/W (0b0)
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) The bit be set to disable manual encryption = False R/W (0b0)
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disables otherwise
|
||||
and disables otherwise
|
||||
XTS_KEY_LENGTH_256 (BLOCK0) Flash encryption key length = 128 bits key R/W (0b0)
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Set this bit to disable download mode (boot_mode[3 = False R/W (0b0)
|
||||
:0] = 0; 1; 2; 4; 5; 6; 7)
|
||||
:0] = 0; 1; 2; 4; 5; 6; 7)
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Set this bit to enable secure UART download mode = False R/W (0b0)
|
||||
SECURE_BOOT_EN (BLOCK0) The bit be set to enable secure boot = False R/W (0b0)
|
||||
SECURE_VERSION (BLOCK0) Secure version for anti-rollback = 0 R/W (0x0)
|
||||
BLOCK_KEY0 (BLOCK3) BLOCK_KEY0 - 256-bits. 256-bit key of Flash Encryp
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
tion
|
||||
BLOCK_KEY0_LOW_128 (BLOCK3) BLOCK_KEY0 - lower 128-bits. 128-bit key of Flash
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Encryption
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
tion
|
||||
BLOCK_KEY0_LOW_128 (BLOCK3) BLOCK_KEY0 - lower 128-bits. 128-bit key of Flash
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Encryption
|
||||
BLOCK_KEY0_HI_128 (BLOCK3) BLOCK_KEY0 - higher 128-bits. 128-bits key of Secu
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
re Boot
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
re Boot
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) RTC watchdog timeout threshold; in unit of slow cl = 40000 R/W (0b00)
|
||||
|
@@ -2,7 +2,7 @@
|
||||
|
||||
> espefuse.py -p PORT summary
|
||||
|
||||
Connecting....
|
||||
Connecting....
|
||||
Detecting chip type... ESP32-C3
|
||||
|
||||
=== Run "summary" command ===
|
||||
@@ -34,18 +34,18 @@
|
||||
DIS_DIRECT_BOOT (BLOCK0) Disable direct boot mode = False R/W (0b0)
|
||||
UART_PRINT_CONTROL (BLOCK0) Set the default UARTboot message output mode = Enable R/W (0b00)
|
||||
ERR_RST_ENABLE (BLOCK0) Use BLOCK0 to check error record registers = with check R/W (0b1)
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TPUW (BLOCK0) Configures flash waiting time after power-up; in u = 0 R/W (0x0)
|
||||
nit of ms. If the value is less than 15; the waiti
|
||||
ng time is the configurable value; Otherwise; the
|
||||
waiting time is twice the configurable value
|
||||
ng time is the configurable value; Otherwise; the
|
||||
waiting time is twice the configurable value
|
||||
FORCE_SEND_RESUME (BLOCK0) Set this bit to force ROM code to send a resume co = False R/W (0b0)
|
||||
mmand during SPI boot
|
||||
mmand during SPI boot
|
||||
|
||||
Identity fuses:
|
||||
DISABLE_WAFER_VERSION_MAJOR (BLOCK0) Disables check of wafer version major = False R/W (0b0)
|
||||
@@ -55,34 +55,34 @@
|
||||
BLK_VERSION_MINOR (BLOCK1) BLK_VERSION_MINOR = 2 R/W (0b010)
|
||||
WAFER_VERSION_MINOR_HI (BLOCK1) WAFER_VERSION_MINOR most significant bit = False R/W (0b0)
|
||||
WAFER_VERSION_MAJOR (BLOCK1) WAFER_VERSION_MAJOR = 0 R/W (0b00)
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 25 60 04 96 c3 fd 41 6f be ed 2c 51 1d e3 7e 21 R/W
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 25 60 04 96 c3 fd 41 6f be ed 2c 51 1d e3 7e 21 R/W
|
||||
BLK_VERSION_MAJOR (BLOCK2) BLK_VERSION_MAJOR of BLOCK2 = With calibration R/W (0b01)
|
||||
WAFER_VERSION_MINOR (BLOCK0) calc WAFER VERSION MINOR = WAFER_VERSION_MINOR_HI = 3 R/W (0x3)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
|
||||
Jtag fuses:
|
||||
SOFT_DIS_JTAG (BLOCK0) Set these bits to disable JTAG in the soft way (od = 0 R/W (0b000)
|
||||
d number 1 means disable ). JTAG can be enabled in
|
||||
HMAC module
|
||||
HMAC module
|
||||
DIS_PAD_JTAG (BLOCK0) Set this bit to disable JTAG in the hard way. JTAG = False R/W (0b0)
|
||||
is disabled permanently
|
||||
is disabled permanently
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 58:cf:79:0f:96:8c (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 58:cf:79:0f:96:8c (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_DOWNLOAD_ICACHE (BLOCK0) Set this bit to disable Icache in download mode (b = False R/W (0b0)
|
||||
oot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
oot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Set this bit to disable the function that forces c = False R/W (0b0)
|
||||
hip into download mode
|
||||
hip into download mode
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Set this bit to disable flash encryption when in d = False R/W (0b0)
|
||||
ownload boot modes
|
||||
ownload boot modes
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disables otherwise
|
||||
and disables otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -94,36 +94,36 @@
|
||||
KEY_PURPOSE_5 (BLOCK0) Purpose of Key5 = USER R/W (0x0)
|
||||
SECURE_BOOT_EN (BLOCK0) Set this bit to enable secure boot = False R/W (0b0)
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Set this bit to enable revoking aggressive secure = False R/W (0b0)
|
||||
boot
|
||||
boot
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Set this bit to disable download mode (boot_mode[3 = False R/W (0b0)
|
||||
:0] = 0; 1; 2; 3; 6; 7)
|
||||
:0] = 0; 1; 2; 3; 6; 7)
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Set this bit to enable secure UART download mode = False R/W (0b0)
|
||||
SECURE_VERSION (BLOCK0) Secure version (used by ESP-IDF anti-rollback feat = 0 R/W (0x0000)
|
||||
ure)
|
||||
ure)
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Spi Pad fuses:
|
||||
SPI_PAD_CONFIG_CLK (BLOCK1) SPI PAD CLK = 0 R/W (0b000000)
|
||||
@@ -140,7 +140,7 @@
|
||||
|
||||
Usb fuses:
|
||||
DIS_USB_JTAG (BLOCK0) Set this bit to disable function of usb switch to = False R/W (0b0)
|
||||
jtag in module of usb device
|
||||
jtag in module of usb device
|
||||
DIS_USB_SERIAL_JTAG (BLOCK0) USB-Serial-JTAG = Enable R/W (0b0)
|
||||
USB_EXCHG_PINS (BLOCK0) Set this bit to exchange USB D+ and D- pins = False R/W (0b0)
|
||||
DIS_USB_SERIAL_JTAG_ROM_PRINT (BLOCK0) USB printing = Enable R/W (0b0)
|
||||
|
@@ -2,7 +2,7 @@
|
||||
|
||||
> espefuse.py -p PORT summary
|
||||
|
||||
Connecting....
|
||||
Connecting....
|
||||
Detecting chip type... ESP32-C6
|
||||
|
||||
=== Run "summary" command ===
|
||||
@@ -12,27 +12,27 @@
|
||||
WR_DIS (BLOCK0) Disable programming of individual eFuses = 0 R/W (0x00000000)
|
||||
RD_DIS (BLOCK0) Disable reading from BlOCK4-10 = 0 R/W (0b0000000)
|
||||
SWAP_UART_SDIO_EN (BLOCK0) Represents whether pad of uart and sdio is swapped = False R/W (0b0)
|
||||
or not. 1: swapped. 0: not swapped
|
||||
or not. 1: swapped. 0: not swapped
|
||||
DIS_ICACHE (BLOCK0) Represents whether icache is disabled or enabled. = False R/W (0b0)
|
||||
1: disabled. 0: enabled
|
||||
1: disabled. 0: enabled
|
||||
DIS_TWAI (BLOCK0) Represents whether TWAI function is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
DIS_DIRECT_BOOT (BLOCK0) Represents whether direct boot mode is disabled or = False R/W (0b0)
|
||||
enabled. 1: disabled. 0: enabled
|
||||
enabled. 1: disabled. 0: enabled
|
||||
UART_PRINT_CONTROL (BLOCK0) Set the default UARTboot message output mode = Enable R/W (0b00)
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TPUW (BLOCK0) Represents the flash waiting time after power-up; = 0 R/W (0x0)
|
||||
in unit of ms. When the value less than 15; the wa
|
||||
iting time is the programmed value. Otherwise; the
|
||||
waiting time is 2 times the programmed value
|
||||
waiting time is 2 times the programmed value
|
||||
FORCE_SEND_RESUME (BLOCK0) Represents whether ROM code is forced to send a re = False R/W (0b0)
|
||||
sume command during SPI boot. 1: forced. 0:not for
|
||||
ced
|
||||
ced
|
||||
FLASH_CAP (BLOCK1) = 0 R/W (0b000)
|
||||
FLASH_TEMP (BLOCK1) = 0 R/W (0b00)
|
||||
FLASH_VENDOR (BLOCK1) = 0 R/W (0b000)
|
||||
@@ -45,41 +45,41 @@
|
||||
BLK_VERSION_MINOR (BLOCK1) BLK_VERSION_MINOR of BLOCK2 = 0 R/W (0b000)
|
||||
BLK_VERSION_MAJOR (BLOCK1) BLK_VERSION_MAJOR of BLOCK2 = 0 R/W (0b00)
|
||||
PKG_VERSION (BLOCK1) Package version = 0 R/W (0b000)
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Jtag fuses:
|
||||
JTAG_SEL_ENABLE (BLOCK0) Represents whether the selection between usb_to_jt = False R/W (0b0)
|
||||
ag and pad_to_jtag through strapping gpio15 when b
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0 is enabled or disabled. 1: enabled. 0:
|
||||
disabled
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0 is enabled or disabled. 1: enabled. 0:
|
||||
disabled
|
||||
SOFT_DIS_JTAG (BLOCK0) Represents whether JTAG is disabled in soft way. O = 0 R/W (0b000)
|
||||
dd number: disabled. Even number: enabled
|
||||
dd number: disabled. Even number: enabled
|
||||
DIS_PAD_JTAG (BLOCK0) Represents whether JTAG is disabled in the hard wa = False R/W (0b0)
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 60:55:f9:f6:03:24 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = 00:00 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 60:55:f9:f6:03:24 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = 00:00 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_DOWNLOAD_ICACHE (BLOCK0) Represents whether icache is disabled or enabled i = False R/W (0b0)
|
||||
n Download mode. 1: disabled. 0: enabled
|
||||
n Download mode. 1: disabled. 0: enabled
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Represents whether the function that forces chip i = False R/W (0b0)
|
||||
nto download mode is disabled or enabled. 1: disab
|
||||
led. 0: enabled
|
||||
led. 0: enabled
|
||||
SPI_DOWNLOAD_MSPI_DIS (BLOCK0) Represents whether SPI0 controller during boot_mod = False R/W (0b0)
|
||||
e_download is disabled or enabled. 1: disabled. 0:
|
||||
enabled
|
||||
enabled
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Represents whether flash encrypt function is disab = False R/W (0b0)
|
||||
led or enabled(except in SPI boot mode). 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disables otherwise
|
||||
and disables otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -90,64 +90,64 @@
|
||||
KEY_PURPOSE_4 (BLOCK0) Represents the purpose of Key4 = USER R/W (0x0)
|
||||
KEY_PURPOSE_5 (BLOCK0) Represents the purpose of Key5 = USER R/W (0x0)
|
||||
SEC_DPA_LEVEL (BLOCK0) Represents the spa secure level by configuring the = 0 R/W (0b00)
|
||||
clock random divide mode
|
||||
clock random divide mode
|
||||
CRYPT_DPA_ENABLE (BLOCK0) Represents whether anti-dpa attack is enabled. 1:e = False R/W (0b0)
|
||||
nabled. 0: disabled
|
||||
nabled. 0: disabled
|
||||
SECURE_BOOT_EN (BLOCK0) Represents whether secure boot is enabled or disab = False R/W (0b0)
|
||||
led. 1: enabled. 0: disabled
|
||||
led. 1: enabled. 0: disabled
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Represents whether revoking aggressive secure boot = False R/W (0b0)
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Represents whether Download mode is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled or = False R/W (0b0)
|
||||
disabled. 1: enabled. 0: disabled
|
||||
disabled. 1: enabled. 0: disabled
|
||||
SECURE_VERSION (BLOCK0) Represents the version used by ESP-IDF anti-rollba = 0 R/W (0x0000)
|
||||
ck feature
|
||||
ck feature
|
||||
SECURE_BOOT_DISABLE_FAST_WAKE (BLOCK0) Represents whether FAST VERIFY ON WAKE is disabled = False R/W (0b0)
|
||||
or enabled when Secure Boot is enabled. 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Usb fuses:
|
||||
DIS_USB_JTAG (BLOCK0) Represents whether the function of usb switch to j = False R/W (0b0)
|
||||
tag is disabled or enabled. 1: disabled. 0: enable
|
||||
d
|
||||
d
|
||||
DIS_USB_SERIAL_JTAG (BLOCK0) Represents whether USB-Serial-JTAG is disabled or = False R/W (0b0)
|
||||
enabled. 1: disabled. 0: enabled
|
||||
enabled. 1: disabled. 0: enabled
|
||||
USB_EXCHG_PINS (BLOCK0) Represents whether the D+ and D- pins is exchanged = False R/W (0b0)
|
||||
. 1: exchanged. 0: not exchanged
|
||||
. 1: exchanged. 0: not exchanged
|
||||
DIS_USB_SERIAL_JTAG_ROM_PRINT (BLOCK0) Represents whether print from USB-Serial-JTAG is d = False R/W (0b0)
|
||||
isabled or enabled. 1: disabled. 0: enabled
|
||||
isabled or enabled. 1: disabled. 0: enabled
|
||||
DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE (BLOCK0) Represents whether the USB-Serial-JTAG download fu = False R/W (0b0)
|
||||
nction is disabled or enabled. 1: disabled. 0: ena
|
||||
bled
|
||||
bled
|
||||
|
||||
Vdd fuses:
|
||||
VDD_SPI_AS_GPIO (BLOCK0) Represents whether vdd spi pin is functioned as gp = False R/W (0b0)
|
||||
io. 1: functioned. 0: not functioned
|
||||
io. 1: functioned. 0: not functioned
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) Represents whether RTC watchdog timeout threshold = 0 R/W (0b00)
|
||||
|
@@ -2,7 +2,7 @@
|
||||
|
||||
> espefuse.py -p PORT summary
|
||||
|
||||
Connecting....
|
||||
Connecting....
|
||||
Detecting chip type... ESP32-H2
|
||||
|
||||
=== Run "summary" command ===
|
||||
@@ -12,29 +12,29 @@
|
||||
WR_DIS (BLOCK0) Disable programming of individual eFuses = 0 R/W (0x00000000)
|
||||
RD_DIS (BLOCK0) Disable reading from BlOCK4-10 = 0 R/W (0b0000000)
|
||||
DIS_ICACHE (BLOCK0) Represents whether icache is disabled or enabled. = False R/W (0b0)
|
||||
1: disabled. 0: enabled
|
||||
1: disabled. 0: enabled
|
||||
POWERGLITCH_EN (BLOCK0) Represents whether power glitch function is enable = False R/W (0b0)
|
||||
d. 1: enabled. 0: disabled
|
||||
d. 1: enabled. 0: disabled
|
||||
DIS_TWAI (BLOCK0) Represents whether TWAI function is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
DIS_DIRECT_BOOT (BLOCK0) Represents whether direct boot mode is disabled or = False R/W (0b0)
|
||||
enabled. 1: disabled. 0: enabled
|
||||
enabled. 1: disabled. 0: enabled
|
||||
UART_PRINT_CONTROL (BLOCK0) Set the default UARTboot message output mode = Enable R/W (0b00)
|
||||
HYS_EN_PAD0 (BLOCK0) Set bits to enable hysteresis function of PAD0~5 = 0 R/W (0b000000)
|
||||
HYS_EN_PAD1 (BLOCK0) Set bits to enable hysteresis function of PAD6~27 = 0 R/W (0b0000000000000000000000)
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TPUW (BLOCK0) Represents the flash waiting time after power-up; = 0 R/W (0x0)
|
||||
in unit of ms. When the value less than 15; the wa
|
||||
iting time is the programmed value. Otherwise; the
|
||||
waiting time is 2 times the programmed value
|
||||
waiting time is 2 times the programmed value
|
||||
FORCE_SEND_RESUME (BLOCK0) Represents whether ROM code is forced to send a re = False R/W (0b0)
|
||||
sume command during SPI boot. 1: forced. 0:not for
|
||||
ced
|
||||
ced
|
||||
FLASH_CAP (BLOCK1) = 0 R/W (0b000)
|
||||
FLASH_TEMP (BLOCK1) = 0 R/W (0b00)
|
||||
FLASH_VENDOR (BLOCK1) = 0 R/W (0b000)
|
||||
@@ -44,8 +44,8 @@
|
||||
WAFER_VERSION_MAJOR (BLOCK1) = 0 R/W (0b00)
|
||||
DISABLE_WAFER_VERSION_MAJOR (BLOCK1) Disables check of wafer version major = False R/W (0b0)
|
||||
PKG_VERSION (BLOCK1) Package version = 0 R/W (0b000)
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLK_VERSION_MINOR (BLOCK2) BLK_VERSION_MINOR of BLOCK2 = 0 R/W (0b000)
|
||||
BLK_VERSION_MAJOR (BLOCK2) BLK_VERSION_MAJOR of BLOCK2 = 0 R/W (0b00)
|
||||
DISABLE_BLK_VERSION_MAJOR (BLOCK2) Disables check of blk version major = False R/W (0b0)
|
||||
@@ -53,32 +53,32 @@
|
||||
Jtag fuses:
|
||||
JTAG_SEL_ENABLE (BLOCK0) Set this bit to enable selection between usb_to_jt = False R/W (0b0)
|
||||
ag and pad_to_jtag through strapping gpio25 when b
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0
|
||||
SOFT_DIS_JTAG (BLOCK0) Represents whether JTAG is disabled in soft way. O = 0 R/W (0b000)
|
||||
dd number: disabled. Even number: enabled
|
||||
dd number: disabled. Even number: enabled
|
||||
DIS_PAD_JTAG (BLOCK0) Represents whether JTAG is disabled in the hard wa = False R/W (0b0)
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 60:55:f9:f7:2c:05 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = ff:fe (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 60:55:f9:f7:2c:05 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = ff:fe (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Represents whether the function that forces chip i = False R/W (0b0)
|
||||
nto download mode is disabled or enabled. 1: disab
|
||||
led. 0: enabled
|
||||
led. 0: enabled
|
||||
SPI_DOWNLOAD_MSPI_DIS (BLOCK0) Represents whether SPI0 controller during boot_mod = False R/W (0b0)
|
||||
e_download is disabled or enabled. 1: disabled. 0:
|
||||
enabled
|
||||
enabled
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Represents whether flash encrypt function is disab = False R/W (0b0)
|
||||
led or enabled(except in SPI boot mode). 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disables otherwise
|
||||
and disables otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -89,65 +89,65 @@
|
||||
KEY_PURPOSE_4 (BLOCK0) Represents the purpose of Key4 = USER R/W (0x0)
|
||||
KEY_PURPOSE_5 (BLOCK0) Represents the purpose of Key5 = USER R/W (0x0)
|
||||
SEC_DPA_LEVEL (BLOCK0) Represents the spa secure level by configuring the = 0 R/W (0b00)
|
||||
clock random divide mode
|
||||
clock random divide mode
|
||||
ECDSA_FORCE_USE_HARDWARE_K (BLOCK0) Represents whether hardware random number k is for = False R/W (0b0)
|
||||
ced used in ESDCA. 1: force used. 0: not force use
|
||||
d
|
||||
d
|
||||
CRYPT_DPA_ENABLE (BLOCK0) Represents whether anti-dpa attack is enabled. 1:e = False R/W (0b0)
|
||||
nabled. 0: disabled
|
||||
nabled. 0: disabled
|
||||
SECURE_BOOT_EN (BLOCK0) Represents whether secure boot is enabled or disab = False R/W (0b0)
|
||||
led. 1: enabled. 0: disabled
|
||||
led. 1: enabled. 0: disabled
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Represents whether revoking aggressive secure boot = False R/W (0b0)
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Represents whether Download mode is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled or = False R/W (0b0)
|
||||
disabled. 1: enabled. 0: disabled
|
||||
disabled. 1: enabled. 0: disabled
|
||||
SECURE_VERSION (BLOCK0) Represents the version used by ESP-IDF anti-rollba = 0 R/W (0x0000)
|
||||
ck feature
|
||||
ck feature
|
||||
SECURE_BOOT_DISABLE_FAST_WAKE (BLOCK0) Represents whether FAST VERIFY ON WAKE is disabled = False R/W (0b0)
|
||||
or enabled when Secure Boot is enabled. 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Usb fuses:
|
||||
DIS_USB_JTAG (BLOCK0) Represents whether the function of usb switch to j = False R/W (0b0)
|
||||
tag is disabled or enabled. 1: disabled. 0: enable
|
||||
d
|
||||
d
|
||||
USB_EXCHG_PINS (BLOCK0) Represents whether the D+ and D- pins is exchanged = False R/W (0b0)
|
||||
. 1: exchanged. 0: not exchanged
|
||||
. 1: exchanged. 0: not exchanged
|
||||
DIS_USB_SERIAL_JTAG_ROM_PRINT (BLOCK0) Set this bit to disable USB-Serial-JTAG print duri = False R/W (0b0)
|
||||
ng rom boot
|
||||
ng rom boot
|
||||
DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE (BLOCK0) Represents whether the USB-Serial-JTAG download fu = False R/W (0b0)
|
||||
nction is disabled or enabled. 1: disabled. 0: ena
|
||||
bled
|
||||
bled
|
||||
|
||||
Vdd fuses:
|
||||
VDD_SPI_AS_GPIO (BLOCK0) Represents whether vdd spi pin is functioned as gp = False R/W (0b0)
|
||||
io. 1: functioned. 0: not functioned
|
||||
io. 1: functioned. 0: not functioned
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) Represents whether RTC watchdog timeout threshold = 0 R/W (0b00)
|
||||
|
@@ -12,27 +12,27 @@
|
||||
WR_DIS (BLOCK0) Disable programming of individual eFuses = 0 R/W (0x00000000)
|
||||
RD_DIS (BLOCK0) Disable reading from BlOCK4-10 = 0 R/W (0b0000000)
|
||||
POWERGLITCH_EN (BLOCK0) Represents whether power glitch function is enable = False R/W (0b0)
|
||||
d. 1: enabled. 0: disabled
|
||||
d. 1: enabled. 0: disabled
|
||||
DIS_TWAI (BLOCK0) Represents whether TWAI function is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
KM_HUK_GEN_STATE_LOW (BLOCK0) Set this bit to control validation of HUK generate = 0 R/W (0b000000)
|
||||
mode. Odd of 1 is invalid; even of 1 is valid
|
||||
mode. Odd of 1 is invalid; even of 1 is valid
|
||||
KM_HUK_GEN_STATE_HIGH (BLOCK0) Set this bit to control validation of HUK generate = 0 R/W (0b000)
|
||||
mode. Odd of 1 is invalid; even of 1 is valid
|
||||
mode. Odd of 1 is invalid; even of 1 is valid
|
||||
KM_RND_SWITCH_CYCLE (BLOCK0) Set bits to control key manager random number swit = 0 R/W (0b00)
|
||||
ch cycle. 0: control by register. 1: 8 km clk cycl
|
||||
es. 2: 16 km cycles. 3: 32 km cycles
|
||||
es. 2: 16 km cycles. 3: 32 km cycles
|
||||
KM_DEPLOY_ONLY_ONCE (BLOCK0) Set each bit to control whether corresponding key = 0 R/W (0x0)
|
||||
can only be deployed once. 1 is true; 0 is false.
|
||||
Bit0: ecdsa. Bit1: xts. Bit2: hmac. Bit3: ds
|
||||
can only be deployed once. 1 is true; 0 is false.
|
||||
Bit0: ecdsa. Bit1: xts. Bit2: hmac. Bit3: ds
|
||||
DIS_DIRECT_BOOT (BLOCK0) Represents whether direct boot mode is disabled or = False R/W (0b0)
|
||||
enabled. 1: disabled. 0: enabled
|
||||
enabled. 1: disabled. 0: enabled
|
||||
UART_PRINT_CONTROL (BLOCK0) Represents the type of UART printing. 00: force en = 0 R/W (0b00)
|
||||
able printing. 01: enable printing when GPIO8 is r
|
||||
eset at low level. 10: enable printing when GPIO8
|
||||
eset at low level. 10: enable printing when GPIO8
|
||||
is reset at high level. 11: force disable printing
|
||||
HYS_EN_PAD (BLOCK0) Represents whether the hysteresis function of corr = False R/W (0b0)
|
||||
esponding PAD is enabled. 1: enabled. 0:disabled
|
||||
esponding PAD is enabled. 1: enabled. 0:disabled
|
||||
DCDC_VSET (BLOCK0) Set the dcdc voltage default = 0 R/W (0b00000)
|
||||
PXA0_TIEH_SEL_0 (BLOCK0) TBD = 0 R/W (0b00)
|
||||
PXA0_TIEH_SEL_1 (BLOCK0) TBD = 0 R/W (0b00)
|
||||
@@ -42,63 +42,63 @@
|
||||
HP_PWR_SRC_SEL (BLOCK0) HP system power source select. 0:LDO. 1: DCDC = False R/W (0b0)
|
||||
DCDC_VSET_EN (BLOCK0) Select dcdc vset use efuse_dcdc_vset = False R/W (0b0)
|
||||
DIS_SWD (BLOCK0) Set this bit to disable super-watchdog = False R/W (0b0)
|
||||
BLOCK_SYS_DATA1 (BLOCK2) System data part 1
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
BLOCK_SYS_DATA1 (BLOCK2) System data part 1
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TYPE (BLOCK0) The type of interfaced flash. 0: four data lines; = False R/W (0b0)
|
||||
1: eight data lines
|
||||
1: eight data lines
|
||||
FLASH_PAGE_SIZE (BLOCK0) Set flash page size = 0 R/W (0b00)
|
||||
FLASH_ECC_EN (BLOCK0) Set this bit to enable ecc for flash boot = False R/W (0b0)
|
||||
FLASH_TPUW (BLOCK0) Represents the flash waiting time after power-up; = 0 R/W (0x0)
|
||||
in unit of ms. When the value less than 15; the wa
|
||||
iting time is the programmed value. Otherwise; the
|
||||
waiting time is 2 times the programmed value
|
||||
waiting time is 2 times the programmed value
|
||||
FORCE_SEND_RESUME (BLOCK0) Represents whether ROM code is forced to send a re = False R/W (0b0)
|
||||
sume command during SPI boot. 1: forced. 0:not for
|
||||
ced
|
||||
|
||||
ced
|
||||
|
||||
Jtag fuses:
|
||||
JTAG_SEL_ENABLE (BLOCK0) Represents whether the selection between usb_to_jt = False R/W (0b0)
|
||||
ag and pad_to_jtag through strapping gpio15 when b
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0 is enabled or disabled. 1: enabled. 0:
|
||||
disabled
|
||||
oth EFUSE_DIS_PAD_JTAG and EFUSE_DIS_USB_JTAG are
|
||||
equal to 0 is enabled or disabled. 1: enabled. 0:
|
||||
disabled
|
||||
SOFT_DIS_JTAG (BLOCK0) Represents whether JTAG is disabled in soft way. O = 0 R/W (0b000)
|
||||
dd number: disabled. Even number: enabled
|
||||
dd number: disabled. Even number: enabled
|
||||
DIS_PAD_JTAG (BLOCK0) Represents whether JTAG is disabled in the hard wa = False R/W (0b0)
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
|
||||
y(permanently). 1: disabled. 0: enabled
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = 00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC_EXT (BLOCK1) Stores the extended bits of MAC address = 00:00 (OK) R/W
|
||||
MAC_EUI64 (BLOCK1) calc MAC_EUI64 = MAC[0]:MAC[1]:MAC[2]:MAC_EXT[0]:M
|
||||
= 00:00:00:00:00:00:00:00 (OK) R/W
|
||||
AC_EXT[1]:MAC[3]:MAC[4]:MAC[5]
|
||||
|
||||
= 00:00:00:00:00:00:00:00 (OK) R/W
|
||||
AC_EXT[1]:MAC[3]:MAC[4]:MAC[5]
|
||||
|
||||
Security fuses:
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Represents whether the function that forces chip i = False R/W (0b0)
|
||||
nto download mode is disabled or enabled. 1: disab
|
||||
led. 0: enabled
|
||||
led. 0: enabled
|
||||
SPI_DOWNLOAD_MSPI_DIS (BLOCK0) Set this bit to disable accessing MSPI flash/MSPI = False R/W (0b0)
|
||||
ram by SYS AXI matrix during boot_mode_download
|
||||
ram by SYS AXI matrix during boot_mode_download
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Represents whether flash encrypt function is disab = False R/W (0b0)
|
||||
led or enabled(except in SPI boot mode). 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
FORCE_USE_KEY_MANAGER_KEY (BLOCK0) Set each bit to control whether corresponding key = 0 R/W (0x0)
|
||||
must come from key manager.. 1 is true; 0 is false
|
||||
. Bit0: ecdsa. Bit1: xts. Bit2: hmac. Bit3: ds
|
||||
. Bit0: ecdsa. Bit1: xts. Bit2: hmac. Bit3: ds
|
||||
FORCE_DISABLE_SW_INIT_KEY (BLOCK0) Set this bit to disable software written init key; = False R/W (0b0)
|
||||
and force use efuse_init_key
|
||||
and force use efuse_init_key
|
||||
XTS_KEY_LENGTH_256 (BLOCK0) Set this bit to configure flash encryption use xts = False R/W (0b0)
|
||||
-128 key; else use xts-256 key
|
||||
-128 key; else use xts-256 key
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disables otherwise
|
||||
and disables otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -109,68 +109,67 @@
|
||||
KEY_PURPOSE_4 (BLOCK0) Represents the purpose of Key4 = USER R/W (0x0)
|
||||
KEY_PURPOSE_5 (BLOCK0) Represents the purpose of Key5 = USER R/W (0x0)
|
||||
SEC_DPA_LEVEL (BLOCK0) Represents the spa secure level by configuring the = 0 R/W (0b00)
|
||||
clock random divide mode
|
||||
clock random divide mode
|
||||
ECDSA_ENABLE_SOFT_K (BLOCK0) Represents whether hardware random number k is for = False R/W (0b0)
|
||||
ced used in ESDCA. 1: force used. 0: not force use
|
||||
d
|
||||
d
|
||||
CRYPT_DPA_ENABLE (BLOCK0) Represents whether anti-dpa attack is enabled. 1:e = False R/W (0b0)
|
||||
nabled. 0: disabled
|
||||
nabled. 0: disabled
|
||||
SECURE_BOOT_EN (BLOCK0) Represents whether secure boot is enabled or disab = False R/W (0b0)
|
||||
led. 1: enabled. 0: disabled
|
||||
led. 1: enabled. 0: disabled
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Represents whether revoking aggressive secure boot = False R/W (0b0)
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
is enabled or disabled. 1: enabled. 0: disabled
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Represents whether Download mode is disabled or en = False R/W (0b0)
|
||||
abled. 1: disabled. 0: enabled
|
||||
abled. 1: disabled. 0: enabled
|
||||
LOCK_KM_KEY (BLOCK0) TBD = False R/W (0b0)
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Represents whether security download is enabled or = False R/W (0b0)
|
||||
disabled. 1: enabled. 0: disabled
|
||||
disabled. 1: enabled. 0: disabled
|
||||
SECURE_VERSION (BLOCK0) Represents the version used by ESP-IDF anti-rollba = 0 R/W (0x0000)
|
||||
ck feature
|
||||
ck feature
|
||||
SECURE_BOOT_DISABLE_FAST_WAKE (BLOCK0) Represents whether FAST VERIFY ON WAKE is disabled = False R/W (0b0)
|
||||
or enabled when Secure Boot is enabled. 1: disabl
|
||||
ed. 0: enabled
|
||||
ed. 0: enabled
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Usb fuses:
|
||||
USB_DEVICE_EXCHG_PINS (BLOCK0) Enable usb device exchange pins of D+ and D- = False R/W (0b0)
|
||||
USB_OTG11_EXCHG_PINS (BLOCK0) Enable usb otg11 exchange pins of D+ and D- = False R/W (0b0)
|
||||
DIS_USB_JTAG (BLOCK0) Represents whether the function of usb switch to j = False R/W (0b0)
|
||||
tag is disabled or enabled. 1: disabled. 0: enable
|
||||
d
|
||||
d
|
||||
USB_PHY_SEL (BLOCK0) TBD = False R/W (0b0)
|
||||
DIS_USB_OTG_DOWNLOAD_MODE (BLOCK0) Set this bit to disable download via USB-OTG = False R/W (0b0)
|
||||
DIS_USB_SERIAL_JTAG_ROM_PRINT (BLOCK0) Represents whether print from USB-Serial-JTAG is d = False R/W (0b0)
|
||||
isabled or enabled. 1: disabled. 0: enabled
|
||||
isabled or enabled. 1: disabled. 0: enabled
|
||||
DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE (BLOCK0) Represents whether the USB-Serial-JTAG download fu = False R/W (0b0)
|
||||
nction is disabled or enabled. 1: disabled. 0: ena
|
||||
bled
|
||||
|
||||
bled
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) Represents whether RTC watchdog timeout threshold = 0 R/W (0b00)
|
||||
is selected at startup. 1: selected. 0: not select
|
||||
ed
|
||||
ed
|
||||
DIS_WDT (BLOCK0) Set this bit to disable watch dog = False R/W (0b0)
|
||||
|
@@ -34,27 +34,27 @@
|
||||
DIS_ICACHE (BLOCK0) Set this bit to disable Icache = False R/W (0b0)
|
||||
DIS_DCACHE (BLOCK0) Set this bit to disable Dcache = False R/W (0b0)
|
||||
DIS_TWAI (BLOCK0) Set this bit to disable the TWAI Controller functi = False R/W (0b0)
|
||||
on
|
||||
on
|
||||
DIS_BOOT_REMAP (BLOCK0) Disables capability to Remap RAM to ROM address sp = False R/W (0b0)
|
||||
ace
|
||||
ace
|
||||
DIS_LEGACY_SPI_BOOT (BLOCK0) Set this bit to disable Legacy SPI boot mode = False R/W (0b0)
|
||||
UART_PRINT_CHANNEL (BLOCK0) Selects the default UART for printing boot message = UART0 R/W (0b0)
|
||||
s
|
||||
s
|
||||
UART_PRINT_CONTROL (BLOCK0) Set the default UART boot message output mode = Enable R/W (0b00)
|
||||
PIN_POWER_SELECTION (BLOCK0) Set default power supply for GPIO33-GPIO37; set wh = VDD3P3_CPU R/W (0b0)
|
||||
en SPI flash is initialized
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
en SPI flash is initialized
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TPUW (BLOCK0) Configures flash startup delay after SoC power-up; = 0 R/W (0x0)
|
||||
in unit of (ms/2). When the value is 15; delay is
|
||||
7.5 ms
|
||||
7.5 ms
|
||||
FLASH_TYPE (BLOCK0) SPI flash type = 4 data lines R/W (0b0)
|
||||
FORCE_SEND_RESUME (BLOCK0) If set; forces ROM code to send an SPI flash resum = False R/W (0b0)
|
||||
e command during SPI boot
|
||||
e command during SPI boot
|
||||
FLASH_VERSION (BLOCK1) Flash version = 1 R/W (0x1)
|
||||
|
||||
Identity fuses:
|
||||
@@ -67,11 +67,11 @@
|
||||
PSRAM_VERSION (BLOCK1) PSRAM version = 0 R/W (0x0)
|
||||
PKG_VERSION (BLOCK1) Package version = 0 R/W (0x0)
|
||||
WAFER_VERSION_MINOR_LO (BLOCK1) WAFER_VERSION_MINOR least significant bits = 0 R/W (0b000)
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= d9 8f 05 d0 86 77 53 db 80 6c ee 40 df 5d ef b0 R/W
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= d9 8f 05 d0 86 77 53 db 80 6c ee 40 df 5d ef b0 R/W
|
||||
BLK_VERSION_MINOR (BLOCK2) BLK_VERSION_MINOR of BLOCK2 = ADC calib V1 R/W (0b001)
|
||||
WAFER_VERSION_MINOR (BLOCK0) calc WAFER VERSION MINOR = WAFER_VERSION_MINOR_HI = 0 R/W (0x0)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
|
||||
Jtag fuses:
|
||||
SOFT_DIS_JTAG (BLOCK0) Software disables JTAG. When software disabled; JT = False R/W (0b0)
|
||||
@@ -79,20 +79,20 @@
|
||||
HARD_DIS_JTAG (BLOCK0) Hardware disables JTAG permanently = False R/W (0b0)
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 7c:df:a1:00:48:34 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 7c:df:a1:00:48:34 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_DOWNLOAD_ICACHE (BLOCK0) Disables Icache when SoC is in Download mode = False R/W (0b0)
|
||||
DIS_DOWNLOAD_DCACHE (BLOCK0) Disables Dcache when SoC is in Download mode = False R/W (0b0)
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Set this bit to disable the function that forces c = False R/W (0b0)
|
||||
hip into download mode
|
||||
hip into download mode
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Disables flash encryption when in download boot mo = False R/W (0b0)
|
||||
des
|
||||
des
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disabled otherwise
|
||||
and disabled otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -104,36 +104,36 @@
|
||||
KEY_PURPOSE_5 (BLOCK0) Purpose of KEY5 = USER R/W (0x0)
|
||||
SECURE_BOOT_EN (BLOCK0) Set this bit to enable secure boot = False R/W (0b0)
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Set this bit to enable aggressive secure boot key = False R/W (0b0)
|
||||
revocation mode
|
||||
revocation mode
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Set this bit to disable all download boot modes = False R/W (0b0)
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Set this bit to enable secure UART download mode ( = False R/W (0b0)
|
||||
read/write flash only)
|
||||
read/write flash only)
|
||||
SECURE_VERSION (BLOCK0) Secure version (used by ESP-IDF anti-rollback feat = 0 R/W (0x0000)
|
||||
ure)
|
||||
ure)
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Spi Pad fuses:
|
||||
SPI_PAD_CONFIG_CLK (BLOCK1) SPI_PAD_configure CLK = 0 R/W (0b000000)
|
||||
@@ -154,19 +154,19 @@
|
||||
USB_EXT_PHY_ENABLE (BLOCK0) Set this bit to enable external USB PHY = False R/W (0b0)
|
||||
USB_FORCE_NOPERSIST (BLOCK0) If set; forces USB BVALID to 1 = False R/W (0b0)
|
||||
DIS_USB_DOWNLOAD_MODE (BLOCK0) Set this bit to disable use of USB OTG in UART dow = False R/W (0b0)
|
||||
nload boot mode
|
||||
nload boot mode
|
||||
|
||||
Vdd fuses:
|
||||
VDD_SPI_XPD (BLOCK0) If VDD_SPI_FORCE is 1; this value determines if th = False R/W (0b0)
|
||||
e VDD_SPI regulator is powered on
|
||||
VDD_SPI_TIEH (BLOCK0) If VDD_SPI_FORCE is 1; determines VDD_SPI voltage
|
||||
e VDD_SPI regulator is powered on
|
||||
VDD_SPI_TIEH (BLOCK0) If VDD_SPI_FORCE is 1; determines VDD_SPI voltage
|
||||
= VDD_SPI connects to 1.8 V LDO R/W (0b0)
|
||||
VDD_SPI_FORCE (BLOCK0) Set this bit to use XPD_VDD_PSI_REG and VDD_SPI_TI = False R/W (0b0)
|
||||
EH to configure VDD_SPI LDO
|
||||
EH to configure VDD_SPI LDO
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) RTC watchdog timeout threshold; in unit of slow cl = 40000 R/W (0b00)
|
||||
ock cycle
|
||||
ock cycle
|
||||
|
||||
Flash voltage (VDD_SPI) determined by GPIO45 on reset (GPIO45=High: VDD_SPI pin is powered from internal 1.8V LDO
|
||||
GPIO45=Low or NC: VDD_SPI pin is powered directly from VDD3P3_RTC_IO via resistor Rspi. Typically this voltage is 3.3 V).
|
||||
|
@@ -18,23 +18,23 @@
|
||||
DIS_DIRECT_BOOT (BLOCK0) Disable direct boot mode = False R/W (0b0)
|
||||
UART_PRINT_CONTROL (BLOCK0) Set the default UART boot message output mode = Enable R/W (0b00)
|
||||
PIN_POWER_SELECTION (BLOCK0) Set default power supply for GPIO33-GPIO37; set wh = VDD3P3_CPU R/W (0b0)
|
||||
en SPI flash is initialized
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
en SPI flash is initialized
|
||||
BLOCK_USR_DATA (BLOCK3) User data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_SYS_DATA2 (BLOCK10) System data part 2 (reserved)
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Flash fuses:
|
||||
FLASH_TPUW (BLOCK0) Configures flash waiting time after power-up; in u = 0 R/W (0x0)
|
||||
nit of ms. If the value is less than 15; the waiti
|
||||
ng time is the configurable value. Otherwise; the
|
||||
waiting time is twice the configurable value
|
||||
waiting time is twice the configurable value
|
||||
FLASH_ECC_MODE (BLOCK0) Flash ECC mode in ROM = 16to18 byte R/W (0b0)
|
||||
FLASH_TYPE (BLOCK0) SPI flash type = 4 data lines R/W (0b0)
|
||||
FLASH_PAGE_SIZE (BLOCK0) Set Flash page size = 0 R/W (0b00)
|
||||
FLASH_ECC_EN (BLOCK0) Set 1 to enable ECC for flash boot = False R/W (0b0)
|
||||
FORCE_SEND_RESUME (BLOCK0) Set this bit to force ROM code to send a resume co = False R/W (0b0)
|
||||
mmand during SPI boot
|
||||
mmand during SPI boot
|
||||
|
||||
Identity fuses:
|
||||
DISABLE_WAFER_VERSION_MAJOR (BLOCK0) Disables check of wafer version major = False R/W (0b0)
|
||||
@@ -44,40 +44,40 @@
|
||||
BLK_VERSION_MINOR (BLOCK1) BLK_VERSION_MINOR = 0 R/W (0b000)
|
||||
WAFER_VERSION_MINOR_HI (BLOCK1) WAFER_VERSION_MINOR most significant bit = False R/W (0b0)
|
||||
WAFER_VERSION_MAJOR (BLOCK1) WAFER_VERSION_MAJOR = 0 R/W (0b00)
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
OPTIONAL_UNIQUE_ID (BLOCK2) Optional unique 128-bit ID
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLK_VERSION_MAJOR (BLOCK2) BLK_VERSION_MAJOR of BLOCK2 = No calib R/W (0b00)
|
||||
WAFER_VERSION_MINOR (BLOCK0) calc WAFER VERSION MINOR = WAFER_VERSION_MINOR_HI = 0 R/W (0x0)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
<< 3 + WAFER_VERSION_MINOR_LO (read only)
|
||||
|
||||
Jtag fuses:
|
||||
SOFT_DIS_JTAG (BLOCK0) Set these bits to disable JTAG in the soft way (od = 0 R/W (0b000)
|
||||
d number 1 means disable ). JTAG can be enabled in
|
||||
HMAC module
|
||||
HMAC module
|
||||
DIS_PAD_JTAG (BLOCK0) Set this bit to disable JTAG in the hard way. JTAG = False R/W (0b0)
|
||||
is disabled permanently
|
||||
is disabled permanently
|
||||
STRAP_JTAG_SEL (BLOCK0) Set this bit to enable selection between usb_to_jt = False R/W (0b0)
|
||||
ag and pad_to_jtag through strapping gpio10 when b
|
||||
oth reg_dis_usb_jtag and reg_dis_pad_jtag are equa
|
||||
l to 0
|
||||
l to 0
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK1) MAC address
|
||||
= 7c:df:a1:e0:00:58 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
MAC (BLOCK1) MAC address
|
||||
= 7c:df:a1:e0:00:58 (OK) R/W
|
||||
CUSTOM_MAC (BLOCK3) Custom MAC
|
||||
= 00:00:00:00:00:00 (OK) R/W
|
||||
|
||||
Security fuses:
|
||||
DIS_DOWNLOAD_ICACHE (BLOCK0) Set this bit to disable Icache in download mode (b = False R/W (0b0)
|
||||
oot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
oot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
DIS_DOWNLOAD_DCACHE (BLOCK0) Set this bit to disable Dcache in download mode ( = False R/W (0b0)
|
||||
boot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
boot_mode[3:0] is 0; 1; 2; 3; 6; 7)
|
||||
DIS_FORCE_DOWNLOAD (BLOCK0) Set this bit to disable the function that forces c = False R/W (0b0)
|
||||
hip into download mode
|
||||
hip into download mode
|
||||
DIS_DOWNLOAD_MANUAL_ENCRYPT (BLOCK0) Set this bit to disable flash encryption when in d = False R/W (0b0)
|
||||
ownload boot modes
|
||||
ownload boot modes
|
||||
SPI_BOOT_CRYPT_CNT (BLOCK0) Enables flash encryption when 1 or 3 bits are set = Disable R/W (0b000)
|
||||
and disabled otherwise
|
||||
and disabled otherwise
|
||||
SECURE_BOOT_KEY_REVOKE0 (BLOCK0) Revoke 1st secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE1 (BLOCK0) Revoke 2nd secure boot key = False R/W (0b0)
|
||||
SECURE_BOOT_KEY_REVOKE2 (BLOCK0) Revoke 3rd secure boot key = False R/W (0b0)
|
||||
@@ -89,36 +89,36 @@
|
||||
KEY_PURPOSE_5 (BLOCK0) Purpose of Key5 = USER R/W (0x0)
|
||||
SECURE_BOOT_EN (BLOCK0) Set this bit to enable secure boot = False R/W (0b0)
|
||||
SECURE_BOOT_AGGRESSIVE_REVOKE (BLOCK0) Set this bit to enable revoking aggressive secure = False R/W (0b0)
|
||||
boot
|
||||
boot
|
||||
DIS_DOWNLOAD_MODE (BLOCK0) Set this bit to disable download mode (boot_mode[3 = False R/W (0b0)
|
||||
:0] = 0; 1; 2; 3; 6; 7)
|
||||
:0] = 0; 1; 2; 3; 6; 7)
|
||||
ENABLE_SECURITY_DOWNLOAD (BLOCK0) Set this bit to enable secure UART download mode = False R/W (0b0)
|
||||
SECURE_VERSION (BLOCK0) Secure version (used by ESP-IDF anti-rollback feat = 0 R/W (0x0000)
|
||||
ure)
|
||||
ure)
|
||||
BLOCK_KEY0 (BLOCK4)
|
||||
Purpose: USER
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key0 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY1 (BLOCK5)
|
||||
Purpose: USER
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key1 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY2 (BLOCK6)
|
||||
Purpose: USER
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key2 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY3 (BLOCK7)
|
||||
Purpose: USER
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key3 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY4 (BLOCK8)
|
||||
Purpose: USER
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key4 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK_KEY5 (BLOCK9)
|
||||
Purpose: USER
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
Key5 or user data
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Spi Pad fuses:
|
||||
SPI_PAD_CONFIG_CLK (BLOCK1) SPI_PAD_configure CLK = 0 R/W (0b000000)
|
||||
@@ -138,26 +138,26 @@
|
||||
USB_EXCHG_PINS (BLOCK0) Set this bit to exchange USB D+ and D- pins = False R/W (0b0)
|
||||
USB_EXT_PHY_ENABLE (BLOCK0) Set this bit to enable external PHY = False R/W (0b0)
|
||||
DIS_USB_JTAG (BLOCK0) Set this bit to disable function of usb switch to = False R/W (0b0)
|
||||
jtag in module of usb device
|
||||
jtag in module of usb device
|
||||
DIS_USB_SERIAL_JTAG (BLOCK0) Set this bit to disable usb device = False R/W (0b0)
|
||||
USB_PHY_SEL (BLOCK0) This bit is used to switch internal PHY and extern
|
||||
= internal PHY is assigned to USB Device while external PHY is assigned to USB OTG R/W (0b0)
|
||||
al PHY for USB OTG and USB Device
|
||||
al PHY for USB OTG and USB Device
|
||||
DIS_USB_SERIAL_JTAG_ROM_PRINT (BLOCK0) USB printing = Enable R/W (0b0)
|
||||
DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE (BLOCK0) Set this bit to disable UART download mode through = False R/W (0b0)
|
||||
USB
|
||||
USB
|
||||
DIS_USB_OTG_DOWNLOAD_MODE (BLOCK0) Set this bit to disable download through USB-OTG = False R/W (0b0)
|
||||
|
||||
Vdd fuses:
|
||||
VDD_SPI_XPD (BLOCK0) SPI regulator power up signal = False R/W (0b0)
|
||||
VDD_SPI_TIEH (BLOCK0) If VDD_SPI_FORCE is 1; determines VDD_SPI voltage
|
||||
VDD_SPI_TIEH (BLOCK0) If VDD_SPI_FORCE is 1; determines VDD_SPI voltage
|
||||
= VDD_SPI connects to 1.8 V LDO R/W (0b0)
|
||||
VDD_SPI_FORCE (BLOCK0) Set this bit and force to use the configuration of = False R/W (0b0)
|
||||
eFuse to configure VDD_SPI
|
||||
eFuse to configure VDD_SPI
|
||||
|
||||
Wdt fuses:
|
||||
WDT_DELAY_SEL (BLOCK0) RTC watchdog timeout threshold; in unit of slow cl = 40000 R/W (0b00)
|
||||
ock cycle
|
||||
ock cycle
|
||||
|
||||
Flash voltage (VDD_SPI) determined by GPIO45 on reset (GPIO45=High: VDD_SPI pin is powered from internal 1.8V LDO
|
||||
GPIO45=Low or NC: VDD_SPI pin is powered directly from VDD3P3_RTC_IO via resistor Rspi. Typically this voltage is 3.3 V).
|
||||
|
@@ -19,16 +19,16 @@
|
||||
DIS_CACHE (BLOCK0): Disables cache = False R/W (0b0)
|
||||
CHIP_CPU_FREQ_LOW (BLOCK0): If set alongside EFUSE_RD_CHIP_CPU_FREQ_RATED; the = False R/W (0b0)
|
||||
ESP32's max CPU frequency is rated for 160MHz. 24
|
||||
0MHz otherwise
|
||||
0MHz otherwise
|
||||
CHIP_CPU_FREQ_RATED (BLOCK0): If set; the ESP32's maximum CPU frequency has been = True R/W (0b1)
|
||||
rated
|
||||
rated
|
||||
BLK3_PART_RESERVE (BLOCK0): BLOCK3 partially served for ADC calibration data = False R/W (0b0)
|
||||
CLK8M_FREQ (BLOCK0): 8MHz clock freq override = 51 R/W (0x33)
|
||||
VOL_LEVEL_HP_INV (BLOCK0): This field stores the voltage level for CPU to run = 0 R/W (0b00)
|
||||
at 240 MHz; or for flash/PSRAM to run at 80 MHz.0
|
||||
x0: level 7; 0x1: level 6; 0x2: level 5; 0x3: leve
|
||||
l 4. (RO)
|
||||
CODING_SCHEME (BLOCK0): Efuse variable block length scheme
|
||||
l 4. (RO)
|
||||
CODING_SCHEME (BLOCK0): Efuse variable block length scheme
|
||||
= NONE (BLK1-3 len=256 bits) R/W (0b00)
|
||||
CONSOLE_DEBUG_DISABLE (BLOCK0): Disable ROM BASIC interpreter fallback = True R/W (0b1)
|
||||
DISABLE_SDIO_HOST (BLOCK0): = False R/W (0b0)
|
||||
@@ -36,7 +36,7 @@
|
||||
|
||||
Flash fuses:
|
||||
FLASH_CRYPT_CNT (BLOCK0): Flash encryption is enabled if this field has an o = 0 R/W (0b0000000)
|
||||
dd number of bits set
|
||||
dd number of bits set
|
||||
FLASH_CRYPT_CONFIG (BLOCK0): Flash encryption config (key tweak bits) = 0 R/W (0x0)
|
||||
|
||||
Identity fuses:
|
||||
@@ -46,34 +46,34 @@
|
||||
CHIP_VER_REV2 (BLOCK0): = True R/W (0b1)
|
||||
WAFER_VERSION_MINOR (BLOCK0): = 0 R/W (0b00)
|
||||
WAFER_VERSION_MAJOR (BLOCK0): calc WAFER VERSION MAJOR from CHIP_VER_REV1 and CH = 3 R/W (0b011)
|
||||
IP_VER_REV2 and apb_ctl_date (read only)
|
||||
IP_VER_REV2 and apb_ctl_date (read only)
|
||||
PKG_VERSION (BLOCK0): calc Chip package = CHIP_PACKAGE_4BIT << 3 + CHIP_ = 1 R/W (0x1)
|
||||
PACKAGE (read only)
|
||||
PACKAGE (read only)
|
||||
|
||||
Jtag fuses:
|
||||
JTAG_DISABLE (BLOCK0): Disable JTAG = False R/W (0b0)
|
||||
|
||||
Mac fuses:
|
||||
MAC (BLOCK0): MAC address
|
||||
= 94:b9:7e:5a:6e:58 (CRC 0xe2 OK) R/W
|
||||
MAC (BLOCK0): MAC address
|
||||
= 94:b9:7e:5a:6e:58 (CRC 0xe2 OK) R/W
|
||||
MAC_CRC (BLOCK0): CRC8 for MAC address = 226 R/W (0xe2)
|
||||
MAC_VERSION (BLOCK3): Version of the MAC field = 0 R/W (0x00)
|
||||
|
||||
Security fuses:
|
||||
UART_DOWNLOAD_DIS (BLOCK0): Disable UART download mode. Valid for ESP32 V3 and = False R/W (0b0)
|
||||
newer; only
|
||||
newer; only
|
||||
ABS_DONE_0 (BLOCK0): Secure boot V1 is enabled for bootloader image = False R/W (0b0)
|
||||
ABS_DONE_1 (BLOCK0): Secure boot V2 is enabled for bootloader image = False R/W (0b0)
|
||||
DISABLE_DL_ENCRYPT (BLOCK0): Disable flash encryption in UART bootloader = False R/W (0b0)
|
||||
DISABLE_DL_DECRYPT (BLOCK0): Disable flash decryption in UART bootloader = False R/W (0b0)
|
||||
KEY_STATUS (BLOCK0): Usage of efuse block 3 (reserved) = False R/W (0b0)
|
||||
SECURE_VERSION (BLOCK3): Secure version for anti-rollback = 0 R/W (0x00000000)
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK2 (BLOCK2): Security boot key
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK3 (BLOCK3): Variable Block 3
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK1 (BLOCK1): Flash encryption key
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK2 (BLOCK2): Security boot key
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
BLOCK3 (BLOCK3): Variable Block 3
|
||||
= 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 R/W
|
||||
|
||||
Spi Pad fuses:
|
||||
SPI_PAD_CONFIG_HD (BLOCK0): read for SPI_pad_config_hd = 0 R/W (0b00000)
|
||||
|
@@ -75,7 +75,7 @@ The coding scheme helps the eFuse controller to detect an error of the eFuse blo
|
||||
{IDF_TARGET_NAME} supports the following coding schemes:
|
||||
|
||||
.. only:: esp32
|
||||
|
||||
|
||||
* ``None`` no need any special encoding data. BLOCK0 is always None.
|
||||
* ``3/4``, requires encoding data. The BLOCK length is reduced from 256 bits to 192 bits.
|
||||
* ``Repeat`` not supported by this tool and IDF. The BLOCK length is reduced from 256 bits to 128 bits.
|
||||
@@ -83,7 +83,7 @@ The coding scheme helps the eFuse controller to detect an error of the eFuse blo
|
||||
BLOCK1-3 can have any of this coding scheme. It depends on the ``CODING_SCHEME`` eFuse.
|
||||
|
||||
.. only:: not esp32
|
||||
|
||||
|
||||
* ``None`` no need any special encoding data, but internally it copies data four times. BLOCK0.
|
||||
* ``RS`` (Reed-Solomon), it uses 6 bytes of automatic error correction.
|
||||
|
||||
|
@@ -51,7 +51,7 @@ Usage
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -71,7 +71,7 @@ Usage
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -13,7 +13,7 @@ The ``espefuse.py set_flash_voltage`` command permanently sets the internal flas
|
||||
|
||||
Positional arguments:
|
||||
|
||||
- ``voltage`` - Voltage selection ['1.8V', '3.3V', 'OFF'].
|
||||
- ``voltage`` - Voltage selection ['1.8V', '3.3V', 'OFF'].
|
||||
|
||||
.. only:: esp32c2 or esp32c3
|
||||
|
||||
@@ -111,7 +111,7 @@ Once an efuse is burned it cannot be un-burned. However, changes can be made by
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -132,7 +132,7 @@ Once an efuse is burned it cannot be un-burned. However, changes can be made by
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
@@ -146,13 +146,13 @@ Once an efuse is burned it cannot be un-burned. However, changes can be made by
|
||||
> espefuse.py set_flash_voltage OFF
|
||||
|
||||
=== Run "set_flash_voltage" command ===
|
||||
Disable internal flash voltage regulator (VDD_SPI). SPI flash will
|
||||
Disable internal flash voltage regulator (VDD_SPI). SPI flash will
|
||||
VDD_SPI setting complete.
|
||||
|
||||
Check all blocks for burn...
|
||||
idx, BLOCK_NAME, Conclusion
|
||||
[00] BLOCK0 is empty, will burn the new value
|
||||
.
|
||||
.
|
||||
This is an irreversible operation!
|
||||
Type 'BURN' (all capitals) to continue.
|
||||
BURN
|
||||
|
@@ -19,7 +19,7 @@ However, if you are wiring the chip yourself to a USB/Serial adapter or similar
|
||||
|
||||
Note that TX (transmit) on the ESP chip is connected to RX (receive) on the serial port connection, and vice versa.
|
||||
|
||||
Do not connect the chip to 5V TTL serial adapters, and especially not to "standard" RS-232 adapters! 3.3V serial only!
|
||||
Do not connect the chip to 5V TTL serial adapters, and especially not to "standard" RS-232 adapters! 3.3V serial only!
|
||||
|
||||
.. _serial-port-settings:
|
||||
|
||||
@@ -28,7 +28,7 @@ Serial Port Settings
|
||||
|
||||
When communicating with the {IDF_TARGET_NAME} ROM serial bootloader, the following serial port settings are recommended:
|
||||
|
||||
+---------------------+-------------------+
|
||||
+---------------------+-------------------+
|
||||
| Baud rate | {IDF_TARGET_BAUD_RATE} |
|
||||
+---------------------+-------------------+
|
||||
| Data bits | 8 |
|
||||
@@ -41,7 +41,7 @@ When communicating with the {IDF_TARGET_NAME} ROM serial bootloader, the followi
|
||||
+---------------------+-------------------+
|
||||
|
||||
.. only:: esp32c2
|
||||
|
||||
|
||||
.. note::
|
||||
|
||||
You might experience issues when using low baud rates on {IDF_TARGET_NAME}. If you encounter any problems when connecting, please use at least 115200 or higher.
|
||||
|
Reference in New Issue
Block a user