Hi AngusESP_Angus wrote:Hi Rahul,
If the FLASH_CRYPT_CNT is already 0xFF then, as others have said, no further updates are possible - flash encryption is permanently enabled. This normally would only happen after 4 serial re-flash cycles, as described here:
http://esp-idf.readthedocs.io/en/latest ... ed-updates
However it is possible to manually burn FLASH_CRYPT_CNT to 0xFF via espefuse.py - in which case this will bypass any remaining re-flash steps and effective disable serial updating of that ESP32 chip. (This option is made available for factory setups where the factory knows for certain that only OTA updates will be used from that time forward.)
Can you please specify exactly which commands you have run with this ESP32, either "make flash" (with or without flash encryption) or "espefuse.py ..."? Also, can you please post the output of "espefuse.py summary"?
->I have first use 'make flash' with flash encryption with one time flash option.
->Then I was getting 'flash read err, 1000' on boot as expected.
->so I disabled flash encryption in make menuconfig, again 'make flash' the app.
->then used espefuse.py burn_efuse FLASH_CRYPT_CNT
summery of this efuse command is :
"A fatal error occurred: Value mask for efuse FLASH_CRYPT_CNT is 0xff. Value 0x1ff is too large."
Thanks.