Other Parts Discussed in Thread: UNIFLASH
I'm developing a custom board which will have on-board USB to allow firmware updates without using OTA.
Using a USB sniffer, I can see various commands being sent from Uniflash which do not appear in the Bootloader documentation SWPA231 Jan 2019
I can guess at what some of them do, but would appreciate confirmation, as to the other, and - particularly - whether they are necessary for successful image update. I have omitted the 00 CC ACK packets in the interest of clarity
Command 0x3a (Seems to be "Fetch MAC address")
Command: 00 07 3a 3a 00 00 00 00
Response: 00 08 4d 90 e2 02 86 ef 64
Command 0x37 (not managed go guess that yet))
Command: 00 03 37 37
Response: 00 26 dc 10 00 04 00 01 5e 00 10 00 15 02 6a 02 7d 00 00 f0 01 00 ff 38 04 0b 00 00 00 00 00 00 00 00 0f 00 13 00 00
Command 0x31 (not managed go guess this one)
Command: 00 07 33 31 00 00 00 02
Response: 00 0a 14 10 00 04 00 00 c2 28 16
In addition to the above, I see various commands and responses beginning with 0x2a (i.e. '*') which I assume are private communication between Uniflash and the XDS - I probably don't need to know what they are for in my use case, but if there is a document on that, perhaps you could point me to it?