You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -404,7 +405,7 @@ On the **first boot**, the bootloader will:
404
405
405
406
First ensure that the application image is able to perform encrypted read and write operations to the SPI Flash. Also ensure that the **UART ROM Download Mode is not disabled** - or that the **Secure Download Mode is enabled**.
406
407
Before flashing, generate the encryption key using `espsecure.py` tool:
@@ -418,12 +419,12 @@ Burn the key into the device's eFuse (keep a copy on the host), this action can
418
419
---
419
420
420
421
- ESP32
421
-
```
422
+
```bash
422
423
espefuse.py --port PORT burn_key flash_encryption <FLASH_ENCRYPTION_KEY.bin>
423
424
```
424
425
425
426
- ESP32S2, ESP32C3 and ESP32S3
426
-
```
427
+
```bash
427
428
espefuse.py --port PORT burn_key BLOCK <FLASH_ENCRYPTION_KEY.bin><KEYPURPOSE>
428
429
```
429
430
@@ -432,11 +433,10 @@ BLOCK is a free keyblock between BLOCK_KEY0 and BLOCK_KEY5. And KEYPURPOSE is ei
432
433
Now, similar as the Device generated key, the bootloader and application can be flashed plaintext. The **first boot** will encrypt the flash content using the host key burned in the eFuse instead of generate a new one.
### [Image version dependency](#image-version-dependency)
550
550
551
551
MCUboot allows version dependency check between the images when updating them. As `imgtool.py` allows a version assigment when signing an image, it is also possible to add the version dependency constraint:
@@ -571,13 +570,6 @@ Supposing that the image 0 is being signed, its version is 1.0.0 and it depends
571
570
572
571
Serial recovery mode allows management through MCUMGR (more information and how to install it: https://github.com/apache/mynewt-mcumgr-cli) for communicating and uploading a firmware to the device.
573
572
574
-
---
575
-
***Note***
576
-
577
-
Supported on ESP32, ESP32-C3, ESP32-S2 and ESP32-S3.
578
-
579
-
---
580
-
581
573
Configuration example:
582
574
```
583
575
# Enables the MCUboot Serial Recovery, that allows the use of
@@ -605,8 +597,10 @@ Serial mode then uses the UART port configured for communication (`<CONFIG_ESP_S
605
597
606
598
### [Serial Recovery through USB JTAG Serial port](#serial-recovery-through-usb-jtag-serial-port)
607
599
608
-
Some chips, like ESP32-C3, have an integrated USB JTAG Serial Controller that implements a serial port (CDC) that can also be used for handling MCUboot Serial Recovery.
609
-
More information about the USB pins and hardware configuration on ESP32-C3: https://docs.espressif.com/projects/esp-idf/en/latest/esp32c3/api-guides/usb-serial-jtag-console.html.
600
+
Some chips, like ESP32-C3 and ESP32-S3 have an integrated USB JTAG Serial Controller that implements a serial port (CDC) that can also be used for handling MCUboot Serial Recovery.
601
+
More information about the USB pins and hardware configuration:
*When working with Flash Encryption enabled, `CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY` must be ***disabled***, although it is recommended for common Serial Recovery usage*
0 commit comments