2022-07-08 05:33:19 -04:00
/*
2022-11-18 06:26:58 -05:00
* SPDX - FileCopyrightText : 2017 - 2022 Espressif Systems ( Shanghai ) CO LTD
2022-07-08 05:33:19 -04:00
*
* SPDX - License - Identifier : Apache - 2.0
*/
# include "sdkconfig.h"
# include "esp_efuse.h"
# include <assert.h>
# include "esp_efuse_table.h"
2022-12-15 02:12:40 -05:00
// md5_digest_table 19131923372be226ce98d85f5a13f16a
2022-07-08 05:33:19 -04:00
// This file was generated from the file esp_efuse_table.csv. DO NOT CHANGE THIS FILE MANUALLY.
// If you want to change some fields, you need to change esp_efuse_table.csv file
// then run `efuse_common_table` or `efuse_custom_table` command it will generate this file.
// To show efuse_table run the command 'show_efuse_table'.
static const esp_efuse_desc_t WR_DIS [ ] = {
{ EFUSE_BLK0 , 0 , 32 } , // Write protection,
} ;
static const esp_efuse_desc_t WR_DIS_RD_DIS [ ] = {
{ EFUSE_BLK0 , 0 , 1 } , // Write protection for RD_DIS_KEY0 RD_DIS_KEY1 RD_DIS_KEY2 RD_DIS_KEY3 RD_DIS_KEY4 RD_DIS_KEY5 RD_DIS_SYS_DATA_PART2,
} ;
static const esp_efuse_desc_t WR_DIS_SWAP_UART_SDIO_EN [ ] = {
{ EFUSE_BLK0 , 1 , 1 } , // Write protection for SWAP_UART_SDIO_EN,
} ;
static const esp_efuse_desc_t WR_DIS_GROUP_1 [ ] = {
{ EFUSE_BLK0 , 2 , 1 } , // Write protection for DIS_ICACHE DIS_USB_JTAG DIS_DOWNLOAD_ICACHE DIS_USB_SERIAL_JTAG DIS_FORCE_DOWNLOAD DIS_TWAI DIS_JTAG_SEL_ENABLE SOFT_DIS_JTAG DIS_PADJTAG DIS_DOWNLOAD_MANUAL_ENCRYPT,
} ;
static const esp_efuse_desc_t WR_DIS_GROUP_2 [ ] = {
{ EFUSE_BLK0 , 3 , 1 } , // Write protection for WDT_DELAY_SEL,
} ;
static const esp_efuse_desc_t WR_DIS_SPI_BOOT_CRYPT_CNT [ ] = {
{ EFUSE_BLK0 , 4 , 1 } , // Write protection for SPI_BOOT_CRYPT_CNT,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_KEY_REVOKE0 [ ] = {
{ EFUSE_BLK0 , 5 , 1 } , // Write protection for SECURE_BOOT_KEY_REVOKE0,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_KEY_REVOKE1 [ ] = {
{ EFUSE_BLK0 , 6 , 1 } , // Write protection for SECURE_BOOT_KEY_REVOKE1,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_KEY_REVOKE2 [ ] = {
{ EFUSE_BLK0 , 7 , 1 } , // Write protection for SECURE_BOOT_KEY_REVOKE2,
} ;
static const esp_efuse_desc_t WR_DIS_KEY0_PURPOSE [ ] = {
{ EFUSE_BLK0 , 8 , 1 } , // Write protection for key_purpose. KEY0,
} ;
static const esp_efuse_desc_t WR_DIS_KEY1_PURPOSE [ ] = {
{ EFUSE_BLK0 , 9 , 1 } , // Write protection for key_purpose. KEY1,
} ;
static const esp_efuse_desc_t WR_DIS_KEY2_PURPOSE [ ] = {
{ EFUSE_BLK0 , 10 , 1 } , // Write protection for key_purpose. KEY2,
} ;
static const esp_efuse_desc_t WR_DIS_KEY3_PURPOSE [ ] = {
{ EFUSE_BLK0 , 11 , 1 } , // Write protection for key_purpose. KEY3,
} ;
static const esp_efuse_desc_t WR_DIS_KEY4_PURPOSE [ ] = {
{ EFUSE_BLK0 , 12 , 1 } , // Write protection for key_purpose. KEY4,
} ;
static const esp_efuse_desc_t WR_DIS_KEY5_PURPOSE [ ] = {
{ EFUSE_BLK0 , 13 , 1 } , // Write protection for key_purpose. KEY5,
} ;
static const esp_efuse_desc_t WR_DIS_SEC_DPA_LEVEL [ ] = {
{ EFUSE_BLK0 , 14 , 1 } , // Write protection for SEC_DPA_LEVEL,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_EN [ ] = {
{ EFUSE_BLK0 , 15 , 1 } , // Write protection for SECURE_BOOT_EN,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_AGGRESSIVE_REVOKE [ ] = {
{ EFUSE_BLK0 , 16 , 1 } , // Write protection for SECURE_BOOT_AGGRESSIVE_REVOKE,
} ;
static const esp_efuse_desc_t WR_DIS_GROUP_3 [ ] = {
{ EFUSE_BLK0 , 18 , 1 } , // Write protection for FLASH_TPUW DIS_DOWNLOAD_MODE DIS_DIRECT_BOOT DIS_USB_PRINT DIS_USB_DOWNLOAD_MODE ENABLE_SECURITY_DOWNLOAD UART_PRINT_CONTROLFLASH_TYPE FORCE_SEND_RESUME SECURE_VERSION,
} ;
static const esp_efuse_desc_t WR_DIS_SECURE_BOOT_DISABLE_FAST_WAKE [ ] = {
{ EFUSE_BLK0 , 19 , 1 } , // Write protection for SECURE_BOOT_DISABLE_FAST_WAKE,
} ;
static const esp_efuse_desc_t WR_DIS_BLK1 [ ] = {
{ EFUSE_BLK0 , 20 , 1 } , // Write protection for EFUSE_BLK1. MAC_SPI_8M_SYS,
} ;
static const esp_efuse_desc_t WR_DIS_SYS_DATA_PART1 [ ] = {
{ EFUSE_BLK0 , 21 , 1 } , // Write protection for EFUSE_BLK2. SYS_DATA_PART1,
} ;
static const esp_efuse_desc_t WR_DIS_USER_DATA [ ] = {
{ EFUSE_BLK0 , 22 , 1 } , // Write protection for EFUSE_BLK3. USER_DATA,
} ;
static const esp_efuse_desc_t WR_DIS_KEY0 [ ] = {
{ EFUSE_BLK0 , 23 , 1 } , // Write protection for EFUSE_BLK4. KEY0,
} ;
static const esp_efuse_desc_t WR_DIS_KEY1 [ ] = {
{ EFUSE_BLK0 , 24 , 1 } , // Write protection for EFUSE_BLK5. KEY1,
} ;
static const esp_efuse_desc_t WR_DIS_KEY2 [ ] = {
{ EFUSE_BLK0 , 25 , 1 } , // Write protection for EFUSE_BLK6. KEY2,
} ;
static const esp_efuse_desc_t WR_DIS_KEY3 [ ] = {
{ EFUSE_BLK0 , 26 , 1 } , // Write protection for EFUSE_BLK7. KEY3,
} ;
static const esp_efuse_desc_t WR_DIS_KEY4 [ ] = {
{ EFUSE_BLK0 , 27 , 1 } , // Write protection for EFUSE_BLK8. KEY4,
} ;
static const esp_efuse_desc_t WR_DIS_KEY5 [ ] = {
{ EFUSE_BLK0 , 28 , 1 } , // Write protection for EFUSE_BLK9. KEY5,
} ;
static const esp_efuse_desc_t WR_DIS_SYS_DATA_PART2 [ ] = {
{ EFUSE_BLK0 , 29 , 1 } , // Write protection for EFUSE_BLK10. SYS_DATA_PART2,
} ;
static const esp_efuse_desc_t RD_DIS [ ] = {
{ EFUSE_BLK0 , 32 , 7 } , // Read protection,
} ;
static const esp_efuse_desc_t RD_DIS_KEY0 [ ] = {
{ EFUSE_BLK0 , 32 , 1 } , // Read protection for EFUSE_BLK4. KEY0,
} ;
static const esp_efuse_desc_t RD_DIS_KEY1 [ ] = {
{ EFUSE_BLK0 , 33 , 1 } , // Read protection for EFUSE_BLK5. KEY1,
} ;
static const esp_efuse_desc_t RD_DIS_KEY2 [ ] = {
{ EFUSE_BLK0 , 34 , 1 } , // Read protection for EFUSE_BLK6. KEY2,
} ;
static const esp_efuse_desc_t RD_DIS_KEY3 [ ] = {
{ EFUSE_BLK0 , 35 , 1 } , // Read protection for EFUSE_BLK7. KEY3,
} ;
static const esp_efuse_desc_t RD_DIS_KEY4 [ ] = {
{ EFUSE_BLK0 , 36 , 1 } , // Read protection for EFUSE_BLK8. KEY4,
} ;
static const esp_efuse_desc_t RD_DIS_KEY5 [ ] = {
{ EFUSE_BLK0 , 37 , 1 } , // Read protection for EFUSE_BLK9. KEY5,
} ;
static const esp_efuse_desc_t RD_DIS_SYS_DATA_PART2 [ ] = {
{ EFUSE_BLK0 , 38 , 1 } , // Read protection for EFUSE_BLK10. SYS_DATA_PART2,
} ;
static const esp_efuse_desc_t SWAP_UART_SDIO_EN [ ] = {
{ EFUSE_BLK0 , 39 , 1 } , // Swap pad of uart and sdio.,
} ;
static const esp_efuse_desc_t DIS_ICACHE [ ] = {
{ EFUSE_BLK0 , 40 , 1 } , // Disable Icache,
} ;
static const esp_efuse_desc_t DIS_USB_JTAG [ ] = {
{ EFUSE_BLK0 , 41 , 1 } , // Disable USB JTAG,
} ;
static const esp_efuse_desc_t DIS_DOWNLOAD_ICACHE [ ] = {
{ EFUSE_BLK0 , 42 , 1 } , // Disable Icache in download mode,
} ;
static const esp_efuse_desc_t DIS_USB_SERIAL_JTAG [ ] = {
{ EFUSE_BLK0 , 43 , 1 } , // Disable USB_SERIAL_JTAG,
} ;
static const esp_efuse_desc_t DIS_FORCE_DOWNLOAD [ ] = {
{ EFUSE_BLK0 , 44 , 1 } , // Disable force chip go to download mode function,
} ;
2022-11-18 06:26:58 -05:00
static const esp_efuse_desc_t DIS_SPI_DOWNLOAD_MSPI [ ] = {
{ EFUSE_BLK0 , 45 , 1 } , // Represents whether the SPI0 controller is disabled in boot_mode_download,
} ;
2022-07-08 05:33:19 -04:00
static const esp_efuse_desc_t DIS_TWAI [ ] = {
{ EFUSE_BLK0 , 46 , 1 } , // Disable TWAI function,
} ;
static const esp_efuse_desc_t JTAG_SEL_ENABLE [ ] = {
{ EFUSE_BLK0 , 47 , 1 } , // Set this bit to enable selection between usb_to_jtag and pad_to_jtag through strapping gpio10 when both reg_dis_usb_jtag and reg_dis_pad_jtag are equal to 0.,
} ;
static const esp_efuse_desc_t SOFT_DIS_JTAG [ ] = {
2022-11-18 06:26:58 -05:00
{ EFUSE_BLK0 , 48 , 3 } , // Set these bits to soft disable JTAG (odd number 1 means disable). JTAG can be enabled in HMAC module.,
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t DIS_PAD_JTAG [ ] = {
2022-11-18 06:26:58 -05:00
{ EFUSE_BLK0 , 51 , 1 } , // Hard disable JTAG. JTAG is disabled permanently.,
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t DIS_DOWNLOAD_MANUAL_ENCRYPT [ ] = {
{ EFUSE_BLK0 , 52 , 1 } , // Disable flash encryption when in download boot modes.,
} ;
static const esp_efuse_desc_t USB_EXCHG_PINS [ ] = {
{ EFUSE_BLK0 , 57 , 1 } , // Exchange D+ D- pins,
} ;
static const esp_efuse_desc_t VDD_SPI_AS_GPIO [ ] = {
{ EFUSE_BLK0 , 58 , 1 } , // Set this bit to vdd spi pin function as gpio,
} ;
static const esp_efuse_desc_t WDT_DELAY_SEL [ ] = {
{ EFUSE_BLK0 , 80 , 2 } , // Select RTC WDT time out threshold,
} ;
static const esp_efuse_desc_t SPI_BOOT_CRYPT_CNT [ ] = {
{ EFUSE_BLK0 , 82 , 3 } , // SPI boot encrypt decrypt enable. odd number 1 enable. even number 1 disable,
} ;
static const esp_efuse_desc_t SECURE_BOOT_KEY_REVOKE0 [ ] = {
{ EFUSE_BLK0 , 85 , 1 } , // Enable revoke first secure boot key,
} ;
static const esp_efuse_desc_t SECURE_BOOT_KEY_REVOKE1 [ ] = {
{ EFUSE_BLK0 , 86 , 1 } , // Enable revoke second secure boot key,
} ;
static const esp_efuse_desc_t SECURE_BOOT_KEY_REVOKE2 [ ] = {
{ EFUSE_BLK0 , 87 , 1 } , // Enable revoke third secure boot key,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_0 [ ] = {
{ EFUSE_BLK0 , 88 , 4 } , // Key0 purpose,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_1 [ ] = {
{ EFUSE_BLK0 , 92 , 4 } , // Key1 purpose,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_2 [ ] = {
{ EFUSE_BLK0 , 96 , 4 } , // Key2 purpose,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_3 [ ] = {
{ EFUSE_BLK0 , 100 , 4 } , // Key3 purpose,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_4 [ ] = {
{ EFUSE_BLK0 , 104 , 4 } , // Key4 purpose,
} ;
static const esp_efuse_desc_t KEY_PURPOSE_5 [ ] = {
{ EFUSE_BLK0 , 108 , 4 } , // Key5 purpose,
} ;
static const esp_efuse_desc_t SEC_DPA_LEVEL [ ] = {
2022-11-18 06:26:58 -05:00
{ EFUSE_BLK0 , 112 , 2 } , // Configures the clock random divide mode to determine the DPA security level,
} ;
static const esp_efuse_desc_t CRYPT_DPA_ENABLE [ ] = {
{ EFUSE_BLK0 , 115 , 1 } , // Represents whether defense against DPA attack is enabled,
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t SECURE_BOOT_EN [ ] = {
{ EFUSE_BLK0 , 116 , 1 } , // Secure boot enable,
} ;
static const esp_efuse_desc_t SECURE_BOOT_AGGRESSIVE_REVOKE [ ] = {
{ EFUSE_BLK0 , 117 , 1 } , // Enable aggressive secure boot revoke,
} ;
static const esp_efuse_desc_t FLASH_TPUW [ ] = {
{ EFUSE_BLK0 , 124 , 4 } , // Flash wait time after power up. (unit is ms). When value is 15. the time is 30 ms,
} ;
static const esp_efuse_desc_t DIS_DOWNLOAD_MODE [ ] = {
{ EFUSE_BLK0 , 128 , 1 } , // Disble download mode include boot_mode[3:0] is 0 1 2 3 6 7,
} ;
static const esp_efuse_desc_t DIS_DIRECT_BOOT [ ] = {
{ EFUSE_BLK0 , 129 , 1 } , // Disable direct boot mode,
} ;
2022-11-18 06:26:58 -05:00
static const esp_efuse_desc_t DIS_USB_SERIAL_JTAG_ROM_PRINT [ ] = {
{ EFUSE_BLK0 , 130 , 1 } , // Represents whether print from USB-Serial-JTAG during ROM boot is disabled,
2022-07-08 05:33:19 -04:00
} ;
2022-11-18 06:26:58 -05:00
static const esp_efuse_desc_t DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE [ ] = {
{ EFUSE_BLK0 , 132 , 1 } , // Represents whether the USB-Serial-JTAG download func- tion is disabled,
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t ENABLE_SECURITY_DOWNLOAD [ ] = {
2022-11-18 06:26:58 -05:00
{ EFUSE_BLK0 , 133 , 1 } , // Enable secure download mode,
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t UART_PRINT_CONTROL [ ] = {
{ EFUSE_BLK0 , 134 , 2 } , // b00:force print. b01:control by GPIO8 - low level print. b10:control by GPIO8 - high level print. b11:force disable print.,
} ;
static const esp_efuse_desc_t FORCE_SEND_RESUME [ ] = {
{ EFUSE_BLK0 , 141 , 1 } , // Force ROM code to send a resume command during SPI boot,
} ;
static const esp_efuse_desc_t SECURE_VERSION [ ] = {
{ EFUSE_BLK0 , 142 , 16 } , // Secure version for anti-rollback,
} ;
2022-11-18 06:26:58 -05:00
static const esp_efuse_desc_t SECURE_BOOT_DISABLE_FAST_WAKE [ ] = {
{ EFUSE_BLK0 , 158 , 1 } , // Represents whether FAST VERIFY ON WAKE is disabled or enabled when Secure Boot is enabled,
} ;
2022-07-08 05:33:19 -04:00
static const esp_efuse_desc_t DISABLE_WAFER_VERSION_MAJOR [ ] = {
{ EFUSE_BLK0 , 160 , 1 } , // Disables check of wafer version major,
} ;
static const esp_efuse_desc_t DISABLE_BLK_VERSION_MAJOR [ ] = {
{ EFUSE_BLK0 , 161 , 1 } , // Disables check of blk version major,
} ;
static const esp_efuse_desc_t MAC_FACTORY [ ] = {
{ EFUSE_BLK1 , 40 , 8 } , // Factory MAC addr [0],
{ EFUSE_BLK1 , 32 , 8 } , // Factory MAC addr [1],
{ EFUSE_BLK1 , 24 , 8 } , // Factory MAC addr [2],
{ EFUSE_BLK1 , 16 , 8 } , // Factory MAC addr [3],
{ EFUSE_BLK1 , 8 , 8 } , // Factory MAC addr [4],
{ EFUSE_BLK1 , 0 , 8 } , // Factory MAC addr [5],
} ;
2022-12-15 02:12:40 -05:00
static const esp_efuse_desc_t MAC_EXT [ ] = {
{ EFUSE_BLK1 , 48 , 8 } , // Extend MAC addr [0],
{ EFUSE_BLK1 , 56 , 8 } , // Extend MAC addr [1],
2022-07-08 05:33:19 -04:00
} ;
static const esp_efuse_desc_t WAFER_VERSION_MINOR [ ] = {
{ EFUSE_BLK1 , 114 , 3 } , // WAFER_VERSION_MINOR least significant bits,
{ EFUSE_BLK1 , 183 , 1 } , // WAFER_VERSION_MINOR most significant bit,
} ;
static const esp_efuse_desc_t PKG_VERSION [ ] = {
{ EFUSE_BLK1 , 117 , 3 } , // Package version 0:ESP32C3,
} ;
static const esp_efuse_desc_t BLK_VERSION_MINOR [ ] = {
{ EFUSE_BLK1 , 120 , 3 } , // BLK_VERSION_MINOR,
} ;
static const esp_efuse_desc_t OPTIONAL_UNIQUE_ID [ ] = {
{ EFUSE_BLK2 , 0 , 128 } , // Optional unique 128-bit ID,
} ;
static const esp_efuse_desc_t BLK_VERSION_MAJOR [ ] = {
{ EFUSE_BLK2 , 128 , 2 } , // BLK_VERSION_MAJOR of BLOCK2,
} ;
static const esp_efuse_desc_t TEMP_CALIB [ ] = {
{ EFUSE_BLK2 , 131 , 9 } , // Temperature calibration data,
} ;
static const esp_efuse_desc_t OCODE [ ] = {
{ EFUSE_BLK2 , 140 , 8 } , // ADC OCode,
} ;
static const esp_efuse_desc_t ADC1_INIT_CODE_ATTEN0 [ ] = {
{ EFUSE_BLK2 , 148 , 10 } , // ADC1 init code at atten0,
} ;
static const esp_efuse_desc_t ADC1_INIT_CODE_ATTEN1 [ ] = {
{ EFUSE_BLK2 , 158 , 10 } , // ADC1 init code at atten1,
} ;
static const esp_efuse_desc_t ADC1_INIT_CODE_ATTEN2 [ ] = {
{ EFUSE_BLK2 , 168 , 10 } , // ADC1 init code at atten2,
} ;
static const esp_efuse_desc_t ADC1_INIT_CODE_ATTEN3 [ ] = {
{ EFUSE_BLK2 , 178 , 10 } , // ADC1 init code at atten3,
} ;
static const esp_efuse_desc_t ADC1_CAL_VOL_ATTEN0 [ ] = {
{ EFUSE_BLK2 , 188 , 10 } , // ADC1 calibration voltage at atten0,
} ;
static const esp_efuse_desc_t ADC1_CAL_VOL_ATTEN1 [ ] = {
{ EFUSE_BLK2 , 198 , 10 } , // ADC1 calibration voltage at atten1,
} ;
static const esp_efuse_desc_t ADC1_CAL_VOL_ATTEN2 [ ] = {
{ EFUSE_BLK2 , 208 , 10 } , // ADC1 calibration voltage at atten2,
} ;
static const esp_efuse_desc_t ADC1_CAL_VOL_ATTEN3 [ ] = {
{ EFUSE_BLK2 , 218 , 10 } , // ADC1 calibration voltage at atten3,
} ;
static const esp_efuse_desc_t USER_DATA [ ] = {
{ EFUSE_BLK3 , 0 , 256 } , // User data,
} ;
static const esp_efuse_desc_t USER_DATA_MAC_CUSTOM [ ] = {
{ EFUSE_BLK3 , 200 , 48 } , // Custom MAC,
} ;
static const esp_efuse_desc_t KEY0 [ ] = {
{ EFUSE_BLK4 , 0 , 256 } , // Key0 or user data,
} ;
static const esp_efuse_desc_t KEY1 [ ] = {
{ EFUSE_BLK5 , 0 , 256 } , // Key1 or user data,
} ;
static const esp_efuse_desc_t KEY2 [ ] = {
{ EFUSE_BLK6 , 0 , 256 } , // Key2 or user data,
} ;
static const esp_efuse_desc_t KEY3 [ ] = {
{ EFUSE_BLK7 , 0 , 256 } , // Key3 or user data,
} ;
static const esp_efuse_desc_t KEY4 [ ] = {
{ EFUSE_BLK8 , 0 , 256 } , // Key4 or user data,
} ;
static const esp_efuse_desc_t KEY5 [ ] = {
{ EFUSE_BLK9 , 0 , 256 } , // Key5 or user data,
} ;
static const esp_efuse_desc_t SYS_DATA_PART2 [ ] = {
{ EFUSE_BLK10 , 0 , 256 } , // System configuration,
} ;
static const esp_efuse_desc_t K_RTC_LDO [ ] = {
{ EFUSE_BLK1 , 135 , 7 } , // BLOCK1 K_RTC_LDO,
} ;
static const esp_efuse_desc_t K_DIG_LDO [ ] = {
{ EFUSE_BLK1 , 142 , 7 } , // BLOCK1 K_DIG_LDO,
} ;
static const esp_efuse_desc_t V_RTC_DBIAS20 [ ] = {
{ EFUSE_BLK1 , 149 , 8 } , // BLOCK1 voltage of rtc dbias20,
} ;
static const esp_efuse_desc_t V_DIG_DBIAS20 [ ] = {
{ EFUSE_BLK1 , 157 , 8 } , // BLOCK1 voltage of digital dbias20,
} ;
static const esp_efuse_desc_t DIG_DBIAS_HVT [ ] = {
{ EFUSE_BLK1 , 165 , 5 } , // BLOCK1 digital dbias when hvt,
} ;
static const esp_efuse_desc_t THRES_HVT [ ] = {
{ EFUSE_BLK1 , 170 , 10 } , // BLOCK1 pvt threshold when hvt,
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS [ ] = {
& WR_DIS [ 0 ] , // Write protection
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_RD_DIS [ ] = {
& WR_DIS_RD_DIS [ 0 ] , // Write protection for RD_DIS_KEY0 RD_DIS_KEY1 RD_DIS_KEY2 RD_DIS_KEY3 RD_DIS_KEY4 RD_DIS_KEY5 RD_DIS_SYS_DATA_PART2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SWAP_UART_SDIO_EN [ ] = {
& WR_DIS_SWAP_UART_SDIO_EN [ 0 ] , // Write protection for SWAP_UART_SDIO_EN
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_GROUP_1 [ ] = {
& WR_DIS_GROUP_1 [ 0 ] , // Write protection for DIS_ICACHE DIS_USB_JTAG DIS_DOWNLOAD_ICACHE DIS_USB_SERIAL_JTAG DIS_FORCE_DOWNLOAD DIS_TWAI DIS_JTAG_SEL_ENABLE SOFT_DIS_JTAG DIS_PADJTAG DIS_DOWNLOAD_MANUAL_ENCRYPT
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_GROUP_2 [ ] = {
& WR_DIS_GROUP_2 [ 0 ] , // Write protection for WDT_DELAY_SEL
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SPI_BOOT_CRYPT_CNT [ ] = {
& WR_DIS_SPI_BOOT_CRYPT_CNT [ 0 ] , // Write protection for SPI_BOOT_CRYPT_CNT
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_KEY_REVOKE0 [ ] = {
& WR_DIS_SECURE_BOOT_KEY_REVOKE0 [ 0 ] , // Write protection for SECURE_BOOT_KEY_REVOKE0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_KEY_REVOKE1 [ ] = {
& WR_DIS_SECURE_BOOT_KEY_REVOKE1 [ 0 ] , // Write protection for SECURE_BOOT_KEY_REVOKE1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_KEY_REVOKE2 [ ] = {
& WR_DIS_SECURE_BOOT_KEY_REVOKE2 [ 0 ] , // Write protection for SECURE_BOOT_KEY_REVOKE2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY0_PURPOSE [ ] = {
& WR_DIS_KEY0_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY1_PURPOSE [ ] = {
& WR_DIS_KEY1_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY2_PURPOSE [ ] = {
& WR_DIS_KEY2_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY3_PURPOSE [ ] = {
& WR_DIS_KEY3_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY4_PURPOSE [ ] = {
& WR_DIS_KEY4_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY4
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY5_PURPOSE [ ] = {
& WR_DIS_KEY5_PURPOSE [ 0 ] , // Write protection for key_purpose. KEY5
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SEC_DPA_LEVEL [ ] = {
& WR_DIS_SEC_DPA_LEVEL [ 0 ] , // Write protection for SEC_DPA_LEVEL
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_EN [ ] = {
& WR_DIS_SECURE_BOOT_EN [ 0 ] , // Write protection for SECURE_BOOT_EN
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_AGGRESSIVE_REVOKE [ ] = {
& WR_DIS_SECURE_BOOT_AGGRESSIVE_REVOKE [ 0 ] , // Write protection for SECURE_BOOT_AGGRESSIVE_REVOKE
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_GROUP_3 [ ] = {
& WR_DIS_GROUP_3 [ 0 ] , // Write protection for FLASH_TPUW DIS_DOWNLOAD_MODE DIS_DIRECT_BOOT DIS_USB_PRINT DIS_USB_DOWNLOAD_MODE ENABLE_SECURITY_DOWNLOAD UART_PRINT_CONTROLFLASH_TYPE FORCE_SEND_RESUME SECURE_VERSION
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SECURE_BOOT_DISABLE_FAST_WAKE [ ] = {
& WR_DIS_SECURE_BOOT_DISABLE_FAST_WAKE [ 0 ] , // Write protection for SECURE_BOOT_DISABLE_FAST_WAKE
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_BLK1 [ ] = {
& WR_DIS_BLK1 [ 0 ] , // Write protection for EFUSE_BLK1. MAC_SPI_8M_SYS
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SYS_DATA_PART1 [ ] = {
& WR_DIS_SYS_DATA_PART1 [ 0 ] , // Write protection for EFUSE_BLK2. SYS_DATA_PART1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_USER_DATA [ ] = {
& WR_DIS_USER_DATA [ 0 ] , // Write protection for EFUSE_BLK3. USER_DATA
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY0 [ ] = {
& WR_DIS_KEY0 [ 0 ] , // Write protection for EFUSE_BLK4. KEY0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY1 [ ] = {
& WR_DIS_KEY1 [ 0 ] , // Write protection for EFUSE_BLK5. KEY1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY2 [ ] = {
& WR_DIS_KEY2 [ 0 ] , // Write protection for EFUSE_BLK6. KEY2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY3 [ ] = {
& WR_DIS_KEY3 [ 0 ] , // Write protection for EFUSE_BLK7. KEY3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY4 [ ] = {
& WR_DIS_KEY4 [ 0 ] , // Write protection for EFUSE_BLK8. KEY4
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_KEY5 [ ] = {
& WR_DIS_KEY5 [ 0 ] , // Write protection for EFUSE_BLK9. KEY5
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WR_DIS_SYS_DATA_PART2 [ ] = {
& WR_DIS_SYS_DATA_PART2 [ 0 ] , // Write protection for EFUSE_BLK10. SYS_DATA_PART2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS [ ] = {
& RD_DIS [ 0 ] , // Read protection
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY0 [ ] = {
& RD_DIS_KEY0 [ 0 ] , // Read protection for EFUSE_BLK4. KEY0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY1 [ ] = {
& RD_DIS_KEY1 [ 0 ] , // Read protection for EFUSE_BLK5. KEY1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY2 [ ] = {
& RD_DIS_KEY2 [ 0 ] , // Read protection for EFUSE_BLK6. KEY2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY3 [ ] = {
& RD_DIS_KEY3 [ 0 ] , // Read protection for EFUSE_BLK7. KEY3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY4 [ ] = {
& RD_DIS_KEY4 [ 0 ] , // Read protection for EFUSE_BLK8. KEY4
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_KEY5 [ ] = {
& RD_DIS_KEY5 [ 0 ] , // Read protection for EFUSE_BLK9. KEY5
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_RD_DIS_SYS_DATA_PART2 [ ] = {
& RD_DIS_SYS_DATA_PART2 [ 0 ] , // Read protection for EFUSE_BLK10. SYS_DATA_PART2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SWAP_UART_SDIO_EN [ ] = {
& SWAP_UART_SDIO_EN [ 0 ] , // Swap pad of uart and sdio.
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_ICACHE [ ] = {
& DIS_ICACHE [ 0 ] , // Disable Icache
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_USB_JTAG [ ] = {
& DIS_USB_JTAG [ 0 ] , // Disable USB JTAG
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_DOWNLOAD_ICACHE [ ] = {
& DIS_DOWNLOAD_ICACHE [ 0 ] , // Disable Icache in download mode
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_USB_SERIAL_JTAG [ ] = {
& DIS_USB_SERIAL_JTAG [ 0 ] , // Disable USB_SERIAL_JTAG
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_FORCE_DOWNLOAD [ ] = {
& DIS_FORCE_DOWNLOAD [ 0 ] , // Disable force chip go to download mode function
NULL
} ;
2022-11-18 06:26:58 -05:00
const esp_efuse_desc_t * ESP_EFUSE_DIS_SPI_DOWNLOAD_MSPI [ ] = {
& DIS_SPI_DOWNLOAD_MSPI [ 0 ] , // Represents whether the SPI0 controller is disabled in boot_mode_download
NULL
} ;
2022-07-08 05:33:19 -04:00
const esp_efuse_desc_t * ESP_EFUSE_DIS_TWAI [ ] = {
& DIS_TWAI [ 0 ] , // Disable TWAI function
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_JTAG_SEL_ENABLE [ ] = {
& JTAG_SEL_ENABLE [ 0 ] , // Set this bit to enable selection between usb_to_jtag and pad_to_jtag through strapping gpio10 when both reg_dis_usb_jtag and reg_dis_pad_jtag are equal to 0.
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SOFT_DIS_JTAG [ ] = {
2022-11-18 06:26:58 -05:00
& SOFT_DIS_JTAG [ 0 ] , // Set these bits to soft disable JTAG (odd number 1 means disable). JTAG can be enabled in HMAC module.
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_PAD_JTAG [ ] = {
2022-11-18 06:26:58 -05:00
& DIS_PAD_JTAG [ 0 ] , // Hard disable JTAG. JTAG is disabled permanently.
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT [ ] = {
& DIS_DOWNLOAD_MANUAL_ENCRYPT [ 0 ] , // Disable flash encryption when in download boot modes.
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_USB_EXCHG_PINS [ ] = {
& USB_EXCHG_PINS [ 0 ] , // Exchange D+ D- pins
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_VDD_SPI_AS_GPIO [ ] = {
& VDD_SPI_AS_GPIO [ 0 ] , // Set this bit to vdd spi pin function as gpio
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WDT_DELAY_SEL [ ] = {
& WDT_DELAY_SEL [ 0 ] , // Select RTC WDT time out threshold
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SPI_BOOT_CRYPT_CNT [ ] = {
& SPI_BOOT_CRYPT_CNT [ 0 ] , // SPI boot encrypt decrypt enable. odd number 1 enable. even number 1 disable
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_KEY_REVOKE0 [ ] = {
& SECURE_BOOT_KEY_REVOKE0 [ 0 ] , // Enable revoke first secure boot key
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_KEY_REVOKE1 [ ] = {
& SECURE_BOOT_KEY_REVOKE1 [ 0 ] , // Enable revoke second secure boot key
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_KEY_REVOKE2 [ ] = {
& SECURE_BOOT_KEY_REVOKE2 [ 0 ] , // Enable revoke third secure boot key
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_0 [ ] = {
& KEY_PURPOSE_0 [ 0 ] , // Key0 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_1 [ ] = {
& KEY_PURPOSE_1 [ 0 ] , // Key1 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_2 [ ] = {
& KEY_PURPOSE_2 [ 0 ] , // Key2 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_3 [ ] = {
& KEY_PURPOSE_3 [ 0 ] , // Key3 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_4 [ ] = {
& KEY_PURPOSE_4 [ 0 ] , // Key4 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY_PURPOSE_5 [ ] = {
& KEY_PURPOSE_5 [ 0 ] , // Key5 purpose
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SEC_DPA_LEVEL [ ] = {
2022-11-18 06:26:58 -05:00
& SEC_DPA_LEVEL [ 0 ] , // Configures the clock random divide mode to determine the DPA security level
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_CRYPT_DPA_ENABLE [ ] = {
& CRYPT_DPA_ENABLE [ 0 ] , // Represents whether defense against DPA attack is enabled
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_EN [ ] = {
& SECURE_BOOT_EN [ 0 ] , // Secure boot enable
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_AGGRESSIVE_REVOKE [ ] = {
& SECURE_BOOT_AGGRESSIVE_REVOKE [ 0 ] , // Enable aggressive secure boot revoke
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_FLASH_TPUW [ ] = {
& FLASH_TPUW [ 0 ] , // Flash wait time after power up. (unit is ms). When value is 15. the time is 30 ms
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_DOWNLOAD_MODE [ ] = {
& DIS_DOWNLOAD_MODE [ 0 ] , // Disble download mode include boot_mode[3:0] is 0 1 2 3 6 7
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIS_DIRECT_BOOT [ ] = {
& DIS_DIRECT_BOOT [ 0 ] , // Disable direct boot mode
NULL
} ;
2022-11-18 06:26:58 -05:00
const esp_efuse_desc_t * ESP_EFUSE_DIS_USB_SERIAL_JTAG_ROM_PRINT [ ] = {
& DIS_USB_SERIAL_JTAG_ROM_PRINT [ 0 ] , // Represents whether print from USB-Serial-JTAG during ROM boot is disabled
2022-07-08 05:33:19 -04:00
NULL
} ;
2022-11-18 06:26:58 -05:00
const esp_efuse_desc_t * ESP_EFUSE_DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE [ ] = {
& DIS_USB_SERIAL_JTAG_DOWNLOAD_MODE [ 0 ] , // Represents whether the USB-Serial-JTAG download func- tion is disabled
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ENABLE_SECURITY_DOWNLOAD [ ] = {
2022-11-18 06:26:58 -05:00
& ENABLE_SECURITY_DOWNLOAD [ 0 ] , // Enable secure download mode
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_UART_PRINT_CONTROL [ ] = {
& UART_PRINT_CONTROL [ 0 ] , // b00:force print. b01:control by GPIO8 - low level print. b10:control by GPIO8 - high level print. b11:force disable print.
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_FORCE_SEND_RESUME [ ] = {
& FORCE_SEND_RESUME [ 0 ] , // Force ROM code to send a resume command during SPI boot
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SECURE_VERSION [ ] = {
& SECURE_VERSION [ 0 ] , // Secure version for anti-rollback
NULL
} ;
2022-11-18 06:26:58 -05:00
const esp_efuse_desc_t * ESP_EFUSE_SECURE_BOOT_DISABLE_FAST_WAKE [ ] = {
& SECURE_BOOT_DISABLE_FAST_WAKE [ 0 ] , // Represents whether FAST VERIFY ON WAKE is disabled or enabled when Secure Boot is enabled
NULL
} ;
2022-07-08 05:33:19 -04:00
const esp_efuse_desc_t * ESP_EFUSE_DISABLE_WAFER_VERSION_MAJOR [ ] = {
& DISABLE_WAFER_VERSION_MAJOR [ 0 ] , // Disables check of wafer version major
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DISABLE_BLK_VERSION_MAJOR [ ] = {
& DISABLE_BLK_VERSION_MAJOR [ 0 ] , // Disables check of blk version major
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_MAC_FACTORY [ ] = {
& MAC_FACTORY [ 0 ] , // Factory MAC addr [0]
& MAC_FACTORY [ 1 ] , // Factory MAC addr [1]
& MAC_FACTORY [ 2 ] , // Factory MAC addr [2]
& MAC_FACTORY [ 3 ] , // Factory MAC addr [3]
& MAC_FACTORY [ 4 ] , // Factory MAC addr [4]
& MAC_FACTORY [ 5 ] , // Factory MAC addr [5]
NULL
} ;
2022-12-15 02:12:40 -05:00
const esp_efuse_desc_t * ESP_EFUSE_MAC_EXT [ ] = {
& MAC_EXT [ 0 ] , // Extend MAC addr [0]
& MAC_EXT [ 1 ] , // Extend MAC addr [1]
2022-07-08 05:33:19 -04:00
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_WAFER_VERSION_MINOR [ ] = {
& WAFER_VERSION_MINOR [ 0 ] , // WAFER_VERSION_MINOR least significant bits
& WAFER_VERSION_MINOR [ 1 ] , // WAFER_VERSION_MINOR most significant bit
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_PKG_VERSION [ ] = {
& PKG_VERSION [ 0 ] , // Package version 0:ESP32C3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_BLK_VERSION_MINOR [ ] = {
& BLK_VERSION_MINOR [ 0 ] , // BLK_VERSION_MINOR
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_OPTIONAL_UNIQUE_ID [ ] = {
& OPTIONAL_UNIQUE_ID [ 0 ] , // Optional unique 128-bit ID
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_BLK_VERSION_MAJOR [ ] = {
& BLK_VERSION_MAJOR [ 0 ] , // BLK_VERSION_MAJOR of BLOCK2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_TEMP_CALIB [ ] = {
& TEMP_CALIB [ 0 ] , // Temperature calibration data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_OCODE [ ] = {
& OCODE [ 0 ] , // ADC OCode
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_INIT_CODE_ATTEN0 [ ] = {
& ADC1_INIT_CODE_ATTEN0 [ 0 ] , // ADC1 init code at atten0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_INIT_CODE_ATTEN1 [ ] = {
& ADC1_INIT_CODE_ATTEN1 [ 0 ] , // ADC1 init code at atten1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_INIT_CODE_ATTEN2 [ ] = {
& ADC1_INIT_CODE_ATTEN2 [ 0 ] , // ADC1 init code at atten2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_INIT_CODE_ATTEN3 [ ] = {
& ADC1_INIT_CODE_ATTEN3 [ 0 ] , // ADC1 init code at atten3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_CAL_VOL_ATTEN0 [ ] = {
& ADC1_CAL_VOL_ATTEN0 [ 0 ] , // ADC1 calibration voltage at atten0
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_CAL_VOL_ATTEN1 [ ] = {
& ADC1_CAL_VOL_ATTEN1 [ 0 ] , // ADC1 calibration voltage at atten1
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_CAL_VOL_ATTEN2 [ ] = {
& ADC1_CAL_VOL_ATTEN2 [ 0 ] , // ADC1 calibration voltage at atten2
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_ADC1_CAL_VOL_ATTEN3 [ ] = {
& ADC1_CAL_VOL_ATTEN3 [ 0 ] , // ADC1 calibration voltage at atten3
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_USER_DATA [ ] = {
& USER_DATA [ 0 ] , // User data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_USER_DATA_MAC_CUSTOM [ ] = {
& USER_DATA_MAC_CUSTOM [ 0 ] , // Custom MAC
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY0 [ ] = {
& KEY0 [ 0 ] , // Key0 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY1 [ ] = {
& KEY1 [ 0 ] , // Key1 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY2 [ ] = {
& KEY2 [ 0 ] , // Key2 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY3 [ ] = {
& KEY3 [ 0 ] , // Key3 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY4 [ ] = {
& KEY4 [ 0 ] , // Key4 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_KEY5 [ ] = {
& KEY5 [ 0 ] , // Key5 or user data
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_SYS_DATA_PART2 [ ] = {
& SYS_DATA_PART2 [ 0 ] , // System configuration
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_K_RTC_LDO [ ] = {
& K_RTC_LDO [ 0 ] , // BLOCK1 K_RTC_LDO
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_K_DIG_LDO [ ] = {
& K_DIG_LDO [ 0 ] , // BLOCK1 K_DIG_LDO
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_V_RTC_DBIAS20 [ ] = {
& V_RTC_DBIAS20 [ 0 ] , // BLOCK1 voltage of rtc dbias20
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_V_DIG_DBIAS20 [ ] = {
& V_DIG_DBIAS20 [ 0 ] , // BLOCK1 voltage of digital dbias20
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_DIG_DBIAS_HVT [ ] = {
& DIG_DBIAS_HVT [ 0 ] , // BLOCK1 digital dbias when hvt
NULL
} ;
const esp_efuse_desc_t * ESP_EFUSE_THRES_HVT [ ] = {
& THRES_HVT [ 0 ] , // BLOCK1 pvt threshold when hvt
NULL
} ;