mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-11-04 00:51:42 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			67 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			67 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# SPDX-FileCopyrightText: 2018-2022 Espressif Systems (Shanghai) CO LTD
 | 
						|
# SPDX-License-Identifier: Apache-2.0
 | 
						|
 | 
						|
from __future__ import print_function
 | 
						|
 | 
						|
import binascii
 | 
						|
from collections import namedtuple
 | 
						|
from io import BytesIO
 | 
						|
 | 
						|
import espsecure
 | 
						|
import pytest
 | 
						|
from pytest_embedded import Dut
 | 
						|
 | 
						|
 | 
						|
# To prepare a test runner for this example:
 | 
						|
# 1. Generate zero flash encryption key:
 | 
						|
#   dd if=/dev/zero of=key.bin bs=1 count=32
 | 
						|
# 2.Burn Efuses:
 | 
						|
#   espefuse.py --do-not-confirm -p $ESPPORT burn_efuse FLASH_CRYPT_CONFIG 0xf
 | 
						|
#   espefuse.py --do-not-confirm -p $ESPPORT burn_efuse FLASH_CRYPT_CNT 0x1
 | 
						|
#   espefuse.py --do-not-confirm -p $ESPPORT burn_key flash_encryption key.bin
 | 
						|
@pytest.mark.esp32
 | 
						|
@pytest.mark.esp32c3
 | 
						|
@pytest.mark.flash_encryption
 | 
						|
def test_examples_security_flash_encryption(dut: Dut) -> None:
 | 
						|
    # Erase the nvs_key partition
 | 
						|
    dut.serial.erase_partition('nvs_key')
 | 
						|
    # calculate the expected ciphertext
 | 
						|
    flash_addr = dut.app.partition_table['storage']['offset']
 | 
						|
    plain_hex_str = '00 01 02 03 04 05 06 07  08 09 0a 0b 0c 0d 0e 0f'
 | 
						|
    plain_data = binascii.unhexlify(plain_hex_str.replace(' ', ''))
 | 
						|
 | 
						|
    # espsecure uses the cryptography package for encrypting
 | 
						|
    # with aes-xts, but does not allow for a symmetric key
 | 
						|
    # so the key for later chips are not all zeros
 | 
						|
    if dut.target == 'esp32':
 | 
						|
        key_bytes = b'\x00' * 32
 | 
						|
        aes_xts = False
 | 
						|
    else:
 | 
						|
        key_bytes = b'\xff' + b'\x00' * 31
 | 
						|
        aes_xts = True
 | 
						|
 | 
						|
    # Emulate espsecure encrypt_flash_data command
 | 
						|
    EncryptFlashDataArgs = namedtuple('EncryptFlashDataArgs', ['output', 'plaintext_file', 'address', 'keyfile', 'flash_crypt_conf', 'aes_xts'])
 | 
						|
    args = EncryptFlashDataArgs(BytesIO(), BytesIO(plain_data), flash_addr, BytesIO(key_bytes), 0xF, aes_xts)
 | 
						|
    espsecure.encrypt_flash_data(args)
 | 
						|
 | 
						|
    expected_ciphertext = args.output.getvalue()
 | 
						|
    hex_ciphertext = binascii.hexlify(expected_ciphertext).decode('ascii')
 | 
						|
    expected_str = (' '.join(hex_ciphertext[i:i + 2] for i in range(0, 16, 2)) + '  ' +
 | 
						|
                    ' '.join(hex_ciphertext[i:i + 2] for i in range(16, 32, 2)))
 | 
						|
 | 
						|
    lines = [
 | 
						|
        'FLASH_CRYPT_CNT eFuse value is 1',
 | 
						|
        'Flash encryption feature is enabled in DEVELOPMENT mode',
 | 
						|
        'with esp_partition_write',
 | 
						|
        plain_hex_str,
 | 
						|
        'with esp_partition_read',
 | 
						|
        plain_hex_str,
 | 
						|
        'with spi_flash_read',
 | 
						|
        expected_str,
 | 
						|
        # The status of NVS encryption for the "nvs" partition
 | 
						|
        'NVS partition "nvs" is encrypted.'
 | 
						|
    ]
 | 
						|
    for line in lines:
 | 
						|
        dut.expect(line, timeout=2)
 |