| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | // Copyright 2015-2016 Espressif Systems (Shanghai) PTE LTD
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // Licensed under the Apache License, Version 2.0 (the "License");
 | 
					
						
							|  |  |  | // you may not use this file except in compliance with the License.
 | 
					
						
							|  |  |  | // You may obtain a copy of the License at
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | //     http://www.apache.org/licenses/LICENSE-2.0
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // Unless required by applicable law or agreed to in writing, software
 | 
					
						
							|  |  |  | // distributed under the License is distributed on an "AS IS" BASIS,
 | 
					
						
							|  |  |  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
					
						
							|  |  |  | // See the License for the specific language governing permissions and
 | 
					
						
							|  |  |  | // limitations under the License.
 | 
					
						
							| 
									
										
										
										
											2019-06-26 11:02:15 +10:00
										 |  |  | #pragma once
 | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | 
 | 
					
						
							|  |  |  | #include <stdbool.h>
 | 
					
						
							| 
									
										
										
										
											2017-01-26 18:29:18 +11:00
										 |  |  | #include "esp_attr.h"
 | 
					
						
							|  |  |  | #include "esp_err.h"
 | 
					
						
							| 
									
										
										
										
											2018-01-12 13:49:13 +11:00
										 |  |  | #ifndef BOOTLOADER_BUILD
 | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | #include "esp_spi_flash.h"
 | 
					
						
							| 
									
										
										
										
											2018-01-12 13:49:13 +11:00
										 |  |  | #endif
 | 
					
						
							| 
									
										
										
										
											2019-05-13 18:02:45 +08:00
										 |  |  | #include "soc/efuse_periph.h"
 | 
					
						
							| 
									
										
										
										
											2019-05-27 14:29:43 +08:00
										 |  |  | #include "sdkconfig.h"
 | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-06-26 11:02:15 +10:00
										 |  |  | #ifdef __cplusplus
 | 
					
						
							|  |  |  | extern "C" { | 
					
						
							|  |  |  | #endif
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-21 22:14:56 +08:00
										 |  |  | /* @brief Flash encryption mode based on efuse values
 | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | typedef enum { | 
					
						
							|  |  |  |     ESP_FLASH_ENC_MODE_DISABLED,          // flash encryption is not enabled (flash crypt cnt=0)
 | 
					
						
							|  |  |  |     ESP_FLASH_ENC_MODE_DEVELOPMENT,       // flash encryption is enabled but for Development (reflash over UART allowed)
 | 
					
						
							|  |  |  |     ESP_FLASH_ENC_MODE_RELEASE            // flash encryption is enabled for Release (reflash over UART disabled)
 | 
					
						
							| 
									
										
										
										
											2019-06-26 11:02:15 +10:00
										 |  |  | } esp_flash_enc_mode_t; | 
					
						
							| 
									
										
										
										
											2019-01-21 22:14:56 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-02-14 12:48:28 +11:00
										 |  |  | /**
 | 
					
						
							|  |  |  |  * @file esp_partition.h | 
					
						
							|  |  |  |  * @brief Support functions for flash encryption features | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Can be compiled as part of app or bootloader code. | 
					
						
							|  |  |  |  */ | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | 
 | 
					
						
							|  |  |  | /** @brief Is flash encryption currently enabled in hardware?
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Flash encryption is enabled if the FLASH_CRYPT_CNT efuse has an odd number of bits set. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @return true if flash encryption is enabled. | 
					
						
							|  |  |  |  */ | 
					
						
							| 
									
										
										
										
											2019-05-27 14:29:43 +08:00
										 |  |  | static inline /** @cond */ IRAM_ATTR /** @endcond */ bool esp_flash_encryption_enabled(void) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     uint32_t flash_crypt_cnt; | 
					
						
							|  |  |  | #if CONFIG_IDF_TARGET_ESP32
 | 
					
						
							|  |  |  |     flash_crypt_cnt = REG_GET_FIELD(EFUSE_BLK0_RDATA0_REG, EFUSE_RD_FLASH_CRYPT_CNT); | 
					
						
							| 
									
										
										
										
											2020-01-17 11:47:08 +08:00
										 |  |  | #elif CONFIG_IDF_TARGET_ESP32S2
 | 
					
						
							| 
									
										
										
										
											2019-05-27 14:29:43 +08:00
										 |  |  |     flash_crypt_cnt = REG_GET_FIELD(EFUSE_RD_REPEAT_DATA1_REG, EFUSE_SPI_BOOT_CRYPT_CNT); | 
					
						
							|  |  |  | #endif
 | 
					
						
							| 
									
										
										
										
											2017-01-26 18:29:18 +11:00
										 |  |  |     /* __builtin_parity is in flash, so we calculate parity inline */ | 
					
						
							|  |  |  |     bool enabled = false; | 
					
						
							| 
									
										
										
										
											2019-05-27 14:29:43 +08:00
										 |  |  |     while (flash_crypt_cnt) { | 
					
						
							| 
									
										
										
										
											2017-01-26 18:29:18 +11:00
										 |  |  |         if (flash_crypt_cnt & 1) { | 
					
						
							|  |  |  |             enabled = !enabled; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |         flash_crypt_cnt >>= 1; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     return enabled; | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /* @brief Update on-device flash encryption
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Intended to be called as part of the bootloader process if flash | 
					
						
							|  |  |  |  * encryption is enabled in device menuconfig. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * If FLASH_CRYPT_CNT efuse parity is 1 (ie odd number of bits set), | 
					
						
							|  |  |  |  * then return ESP_OK immediately (indicating flash encryption is enabled | 
					
						
							|  |  |  |  * and functional). | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * If FLASH_CRYPT_CNT efuse parity is 0 (ie even number of bits set), | 
					
						
							|  |  |  |  * assume the flash has just been written with plaintext that needs encrypting. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * The following regions of flash are encrypted in place: | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * - The bootloader image, if a valid plaintext image is found.[*] | 
					
						
							|  |  |  |  * - The partition table, if a valid plaintext table is found. | 
					
						
							|  |  |  |  * - Any app partition that contains a valid plaintext app image. | 
					
						
							|  |  |  |  * - Any other partitions with the "encrypt" flag set. [**] | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * After the re-encryption process completes, a '1' bit is added to the | 
					
						
							|  |  |  |  * FLASH_CRYPT_CNT value (setting the parity to 1) and the EFUSE is re-burned. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * [*] If reflashing bootloader with secure boot enabled, pre-encrypt | 
					
						
							|  |  |  |  * the bootloader before writing it to flash or secure boot will fail. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * [**] For this reason, if serial re-flashing a previous flashed | 
					
						
							|  |  |  |  * device with secure boot enabled and using FLASH_CRYPT_CNT to | 
					
						
							|  |  |  |  * trigger re-encryption, you must simultaneously re-flash plaintext | 
					
						
							|  |  |  |  * content to all partitions with the "encrypt" flag set or this | 
					
						
							|  |  |  |  * data will be corrupted (encrypted twice). | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @note The post-condition of this function is that all | 
					
						
							|  |  |  |  * partitions that should be encrypted are encrypted. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @note Take care not to power off the device while this function | 
					
						
							|  |  |  |  * is running, or the partition currently being encrypted will be lost. | 
					
						
							|  |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-07-26 17:07:36 +08:00
										 |  |  |  * @note RTC_WDT will reset while encryption operations will be performed (if RTC_WDT is configured). | 
					
						
							|  |  |  |  * | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  |  * @return ESP_OK if all operations succeeded, ESP_ERR_INVALID_STATE | 
					
						
							|  |  |  |  * if a fatal error occured during encryption of all partitions. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | esp_err_t esp_flash_encrypt_check_and_update(void); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /** @brief Encrypt-in-place a block of flash sectors
 | 
					
						
							|  |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-07-26 17:07:36 +08:00
										 |  |  |  * @note This function resets RTC_WDT between operations with sectors. | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  |  * @param src_addr Source offset in flash. Should be multiple of 4096 bytes. | 
					
						
							|  |  |  |  * @param data_length Length of data to encrypt in bytes. Will be rounded up to next multiple of 4096 bytes. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @return ESP_OK if all operations succeeded, ESP_ERR_FLASH_OP_FAIL | 
					
						
							|  |  |  |  * if SPI flash fails, ESP_ERR_FLASH_OP_TIMEOUT if flash times out. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | esp_err_t esp_flash_encrypt_region(uint32_t src_addr, size_t data_length); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-08-07 17:29:11 +05:30
										 |  |  | /** @brief Write protect FLASH_CRYPT_CNT
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Intended to be called as a part of boot process if flash encryption | 
					
						
							|  |  |  |  * is enabled but secure boot is not used. This should protect against | 
					
						
							|  |  |  |  * serial re-flashing of an unauthorised code in absence of secure boot. | 
					
						
							|  |  |  |  * | 
					
						
							| 
									
										
										
										
											2020-04-25 16:36:53 +10:00
										 |  |  |  * @note On ESP32 V3 only, write protecting FLASH_CRYPT_CNT will also prevent | 
					
						
							|  |  |  |  * disabling UART Download Mode. If both are wanted, call | 
					
						
							|  |  |  |  * esp_efuse_disable_rom_download_mode() before calling this function. | 
					
						
							|  |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-08-07 17:29:11 +05:30
										 |  |  |  */ | 
					
						
							| 
									
										
										
										
											2019-07-16 16:33:30 +07:00
										 |  |  | void esp_flash_write_protect_crypt_cnt(void); | 
					
						
							| 
									
										
										
										
											2018-08-07 17:29:11 +05:30
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-01-21 22:14:56 +08:00
										 |  |  | /** @brief Return the flash encryption mode
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * The API is called during boot process but can also be called by | 
					
						
							|  |  |  |  * application to check the current flash encryption mode of ESP32 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @return | 
					
						
							|  |  |  |  */ | 
					
						
							| 
									
										
										
										
											2019-07-16 16:33:30 +07:00
										 |  |  | esp_flash_enc_mode_t esp_get_flash_encryption_mode(void); | 
					
						
							| 
									
										
										
										
											2019-01-21 22:14:56 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-07-12 16:29:40 +10:00
										 |  |  | 
 | 
					
						
							|  |  |  | /** @brief Check the flash encryption mode during startup
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * @note This function is called automatically during app startup, | 
					
						
							|  |  |  |  * it doesn't need to be called from the app. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Verifies the flash encryption config during startup: | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * - Correct any insecure flash encryption settings if hardware | 
					
						
							|  |  |  |  *   Secure Boot is enabled. | 
					
						
							|  |  |  |  * - Log warnings if the efuse config doesn't match the project | 
					
						
							|  |  |  |  *  config in any way | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | void esp_flash_encryption_init_checks(void); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-06-26 11:02:15 +10:00
										 |  |  | #ifdef __cplusplus
 | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2016-11-11 17:00:34 +11:00
										 |  |  | #endif
 |