2024-11-11 08:29:31 by Thomas Klausner | Files touched by this commit (862) |
Log message:
py-*: remove unused tool dependency
py-setuptools includes the py-wheel functionality nowadays
|
2024-09-21 15:19:49 by Greg Troxel | Files touched by this commit (3) |
Log message:
comms/py-esptool: Update to 4.8.0
Upstream NEWS content:
ESP32-C5: Added full support
ESP32-C61: Added full support
ESP32-P4: Enabled USB-Serial/JTAG in flasher stub
ESP32-P4: Updated eFuse table
ESP32-P4: Added ECO1 magic number
ESP32-P4: Added external spi flash connection restriction checks
ESP32-P4: Added wafer and pkg_version fields
ESP32-C5-beta3: Added preview support
ESP32-S3: Clear boot control register on hard reset to avoid going back to \
download mode
Added a new read_flash_sfdp command to read the flash chip SFDP register
Added serial port filtering and selection by VID/PID/Name
Added advisory port locking
Added new ROM bootloader flash error definitions
Added an option to retry connecting to the chip in a loop
Automatically reconnect if a serial port disconnects during reset
write_flash: Retry flashing if the chip disconnects during writing data
write_flash: Added image binary SHA digest recalculation if fields change
flash_id: Print flash voltage
get_security_info: Print key_purpose fields
loader: Enabled usage of context managers for esp instances
espefuse: Added support to extend eFuse table by user CSV file
espefuse: Added eFuse dump formats: joint(default) and split(new)
espefuse: Added incompatible eFuse settings check for ESP32-S3
espefuse: Allow eFuse filtering based on command line arguments
espefuse: Added a check for correctness of written data
espefuse: Updated adc_info command for all chips
espefuse: Enabled operation with coding scheme == 3
espefuse: Updated eFuses of ESP32-C6 and ESP32-H2
espefuse: Postpone burning of some eFuses to the very end
espefuse: Improved help for burn_efuse cmd
espefuse: check_error --recover chip even if there are errors
espsecure: Added support for secure boot v2 using ECDSA-P384 signatures
cli: Added support for autocompletions
|
2024-01-31 00:47:13 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message:
py-esptool: updated to 4.7.0
v4.7.0 (2023-12-13)
New Features
test_esptool: Added test for embedded and detected flash size match
spi_connection: Support --spi-connection on all chips
espefuse: Support XTS_AES_256_KEY key_purpose for ESP32P4
xip_psram: support xip psram feature on esp32p4
add support for intel hex format
esp32p4: Stub flasher support
elf2image: add ram-only-header argument
rfc2217_server: Add hard reset sequence
espefuse: Adds efuse ADC calibration data for ESP32H2
espefuse: Update the way to complete the operation
add support for get_security_info on esp32c3 ECO7
loader: Added hints for some serial port issues when rising port error
Add support for Python 3.12
esp32c3: Support ECO6 and ECO7 magic numbers
merge_bin: add support for uf2 format
esp32-s3: Support >16MB quad flash chips
efuse: Update key purpose table and tests
efuse: ESP32P4 adds ecdsa_key support
espefuse: Add support for esp32p4 chip
esptool: added target to esp32p4
espsecure: Allow prompting for HSM PIN in read_hsm_config
esptool: Add new packages for ESP32C3 and flash efuses
esptool: Add tests for get_chip_features
esptool: Add PICO package for ESP32S3 and flash/psram efuses
get_security_info: Improved the output format and added more details
Bug Fixes
esp32c2: Added get_flash_cap and get_flash_vendor
testloadram: Windows assertion error
fixed exit() to be used from right module
esp32c2: Recommend using higher baud rate if connection fails
test_esptool: Fixed connection issue on Windows
esptool: Rephrase the --ram-only-header command message
load_ram: check for overlaps in bss section
tests/intelhex: make sure file is closed on Windows
spi_connection: Unattach previously attached SPI flash
espefuse: Fix ECDSA_FORCE_USE_HARDWARE_K for ECDSA key (esp32h2)
loader: Could not open serial port message adjusted
flasher_stub: fix usb-serial-jtag enabled non-related intr source
bin_image: Check only ELF sections when searching for .flash.appdesc
danger-github: Fir Danger GitHub token permission
Fix redirection of STDOUT
autodetection: Remove the ESP32-S2 ROM class from get_security_info autodetection
assert in esp32 exclusive workaround
elf2image: fix text/rodata mapping overlap issue on uni-idrom bus chips
dangerGH: Update token permissions - allow Danger to add comments to PR
expand file args: Correctly print the expanded command
esp32-c2: Enable flashing in secure download mode
Code Refactoring
stub_flasher: Cleanup, make adding new targets easier
|
2022-12-12 14:46:15 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message:
py-esptool: updated to 4.4
Version 4.4
New Features
flasher_stub: Increased read/write speeds over USB-JTAG/Serial or USB-OTG modes, \
making some operations nearly twice as fast.
Added detection for guru meditation errors induced by the flasher stub or ROM \
bootloader.
Added a readable error message for serial-related failures, giving more \
information about possible HW issues.
espsecure.py: Improved AES-XTS encryption speed.
Bug Fixes
ESP32-S3 v0.0: Fixed chip revision detection.
bitstring: Added a workaround for breaking changes of bitstring==4
get_default_connected_device: Fixed to close unused serial ports.
flash_freq: Fall back to a chip-specific default flash frequency when no \
flash_freq arg is specified.
ESP32-C6: Fixed chip type detection and SPI flash communication.
|
2022-07-08 15:24:51 by Greg Troxel | Files touched by this commit (3) |
Log message:
comms/py-esptool: Update to 4.1
Mark as not for python 2.7.
Summary of upstream release notes, less bugfixes:
* Version 4.1
ESP32-C2: Added flash encryption support
elf2image: Added argument to disable appending SHA256 digests
* Version 4.0
Starting from v4.0.0, esptool adopts the semantic versioning
specification, please read the related "Versions" esptool
documentation page when deciding which version to use.
** Breaking changes
Public API has been defined by limiting access to internals that
have been refactored into multiple source files. Changing or
refactoring these limited internals won't be considered a breaking
change in future releases. Migration is easy and self-explanatory
(you will get an import error if something has moved) and is
required only in projects that import esptool directly.
If active security features are detected, the default behavior
changes to prevent unintentional bricking (#699):
If flash encryption is enabled, erase_flash and erase_region
cannot be executed.
If secure boot is enabled, erase_flash, erase_region and
write_flash operations cannot be performed (write_flash is just
restricted to protect the bootloader region 0x0000->0x8000).
An override flag --force lets the users execute these operations
anyways.
Flash parameters in an image header can now be changed only when no
SHA256 digest is appended (espressif/esp-idf#8798).
Python versions 2.7, 3.4, 3.5, and 3.6 have been deprecated, the
code is now Python 3-only compatible. Releases v4 and later can't be
installed from PyPI on these deprecated Python versions.
The ESP8684 alias has been removed, ESP32-C2 has to be used.
Megabit flash sizes have been deprecated, use megabyte units from
now on.
** New Features
Added stub flasher support for ESP32-C2 ECO1, deprecated ECO0 stub (can still \
be used with ROM).
espefuse.py: Added a new package - ESP32-D0WDR2-V3
|
2022-04-21 13:00:02 by Thomas Klausner | Files touched by this commit (18) |
Log message:
*: convert to versioned_dependencies for py-cryptography
|
2022-04-20 14:22:11 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message:
py-esptool: updated to 3.3
Version 3.3
New Features
Added flash size options up to 128MB.
Added stub flasher support for ESP32-C2.
Added --flash-mmu-page-size option to change flash MMU page size on ESP32-C2.
Added address and dummy cycles configuration to SPI flash commands, allowed \
reading flash SFDP registers.
Added target-specific flash frequency options.
espsecure.py
Added support for ECDSA P192 and P256 signatures in Secure Boot V2.
Refined Secure Boot V2 ECC support.
Added support for XTS_AES_128 using 128 bit key FE scheme.
espefuse.py
Added execute_scripts nesting support, a script can now be called from another \
script.
Added ESP32-C2 espefuse.py support.
Fixed power-out time for VDDQ settings for ESP32-S3.
Removed dysfunctional JTAG_SEL_ENABLE on ESP32-C3.
Removed unused eFuse fields on ESP32-C3 and ESP32-H2.
Added execute_scripts error handling in script files.
Added support for running multiple commands at once.
Added checks for secure download mode.
Added a recovery option to fix eFuse blocks after encoding errors.
Internal features
These features are intended for use inside Espressif:
Preview support for ESP32-H2-beta2 has been added. This SoC is not generally \
available, so it is unsupported in this release. Official support will be added \
in a later esptool.py release.
Bug Fixes
Fixed autodetection on ESP32-S2 in USB-OTG mode.
Fixed flash.rodata not being recognized as part of IRAM in the ELF parser.
Fixed wrong UART_RXFIFO_CNT_M mask values in the stub flasher.
Added overerase detection and a fix sequence for certain XMC flash chips.
Allowed USB PID detection for USB-JTAG-Serial mode on lowercase port names.
Fixed chip autodetection to work in secure download mode.
Fixed wrong firmware image being returned for beta chips.
Fixed a wrong bootloader flashing offset on ESP32-S3.
Miscellaneous Changes
Launched a new self-hosted esptool.py documentation and heavily updated its contents.
Renamed the ESP8684 target to ESP32-C2 (added alias for compatibility).
Added a warning for flash sizes that are not supported by the stub flasher.
|
2022-01-04 21:55:40 by Thomas Klausner | Files touched by this commit (1595) |
Log message:
*: bump PKGREVISION for egg.mk users
They now have a tool dependency on py-setuptools instead of a DEPENDS
|
2021-12-16 21:08:52 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message:
py-esptool: updated to 3.2
Version 3.2
New Features
Support for ESP32-S3 SoC has been added (removed ESP32-S3-beta3).
Added USB-JTAG-Serial and USB-CDC support for ESP32-S3.
Added a check to disable stub when connecting to an unsupported chip.
Added boot log detection and context of failures logging.
Improved error messages to cover more cases and provide more information.
Added get_security_info command stub support.
Augmented chip autodetection to work even in secure download mode. (ESP32-C3 and \
later only)
Added flash chip connection verification check.
Added ESP8266 version 3 image format support.
espsecure.py
Added option for 512bit keys for encrypt_flash_data.
espefuse.py
Added a new command which can execute custom python scripts to burn efuses all \
at once.
Added ESP32-S2 flash_ver, psram_ver, and pkg_ver efuses.
Corrected lenght of soft_dis_jtag efuse.
Added custom_mac eFuse field for ESP32-C3/-S2/-S3/-H2.
Added a check for read_protect_efuse.
Added support for 512bit XTS_AES flash encryption key.
Added a step to close the serial port after espefuse operations.
Added a security confirmation flag to espefuse tests.
Internal features
These features are intended for use inside Espressif:
Preview support for ESP32-H2 and ESP8684 has been added. These SoCs are not \
generally available, so they are unsupported in this release. Official support \
will be added in a later esptool release.
Added automatic delay for boot time after ESP32 reset in FPGA.
Bug Fixes
Fixed build from sources (require wheel only when installing from pip).
Fixed failing flashing process on some supported chips.
Fixed ESP32-C3 package detection.
Fixed test child processes being blocked waiting for the OS pipe buffer to \
accept more data.
Fixed MacOS USB PID detection on tty and cu ports.
Fixed erroneous comparison when handling deflated data.
Miscellaneous Changes
Changed unnecessarily alarming error to a warning.
Removed ESP32 rev0 connection workaround.
Added a readable error and a use example to merge_bin.
|
2021-10-26 12:06:07 by Nia Alarie | Files touched by this commit (85) |
Log message:
comms: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
|