efuse.h 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346
  1. /*
  2. * SPDX-FileCopyrightText: 2020-2022 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #ifndef _ROM_EFUSE_H_
  7. #define _ROM_EFUSE_H_
  8. #ifdef __cplusplus
  9. extern "C" {
  10. #endif
  11. #include <stdint.h>
  12. #include <stddef.h>
  13. #include <stdbool.h>
  14. /** \defgroup efuse_APIs efuse APIs
  15. * @brief ESP32 efuse read/write APIs
  16. * @attention
  17. *
  18. */
  19. /** @addtogroup efuse_APIs
  20. * @{
  21. */
  22. typedef enum {
  23. ETS_EFUSE_KEY_PURPOSE_USER = 0,
  24. ETS_EFUSE_KEY_PURPOSE_RESERVED = 1,
  25. ETS_EFUSE_KEY_PURPOSE_XTS_AES_128_KEY = 4,
  26. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_ALL = 5,
  27. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_JTAG = 6,
  28. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_DIGITAL_SIGNATURE = 7,
  29. ETS_EFUSE_KEY_PURPOSE_HMAC_UP = 8,
  30. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST0 = 9,
  31. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST1 = 10,
  32. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST2 = 11,
  33. ETS_EFUSE_KEY_PURPOSE_MAX,
  34. } ets_efuse_purpose_t;
  35. typedef enum {
  36. ETS_EFUSE_BLOCK0 = 0,
  37. ETS_EFUSE_MAC_SPI_SYS_0 = 1,
  38. ETS_EFUSE_BLOCK_SYS_DATA = 2,
  39. ETS_EFUSE_BLOCK_USR_DATA = 3,
  40. ETS_EFUSE_BLOCK_KEY0 = 4,
  41. ETS_EFUSE_BLOCK_KEY1 = 5,
  42. ETS_EFUSE_BLOCK_KEY2 = 6,
  43. ETS_EFUSE_BLOCK_KEY3 = 7,
  44. ETS_EFUSE_BLOCK_KEY4 = 8,
  45. ETS_EFUSE_BLOCK_KEY5 = 9,
  46. ETS_EFUSE_BLOCK_KEY6 = 10,
  47. ETS_EFUSE_BLOCK_MAX,
  48. } ets_efuse_block_t;
  49. /**
  50. * @brief set timing accroding the apb clock, so no read error or write error happens.
  51. *
  52. * @param clock: apb clock in HZ, only accept 5M(in FPGA), 10M(in FPGA), 20M, 40M, 80M.
  53. *
  54. * @return : 0 if success, others if clock not accepted
  55. */
  56. int ets_efuse_set_timing(uint32_t clock);
  57. /**
  58. * @brief Efuse read operation: copies data from physical efuses to efuse read registers.
  59. *
  60. * @param null
  61. *
  62. * @return : 0 if success, others if apb clock is not accepted
  63. */
  64. int ets_efuse_read(void);
  65. /**
  66. * @brief Efuse write operation: Copies data from efuse write registers to efuse. Operates on a single block of efuses at a time.
  67. *
  68. * @note This function does not update read efuses, call ets_efuse_read() once all programming is complete.
  69. *
  70. * @return : 0 if success, others if apb clock is not accepted
  71. */
  72. int ets_efuse_program(ets_efuse_block_t block);
  73. /**
  74. * @brief Set all Efuse program registers to zero.
  75. *
  76. * Call this before writing new data to the program registers.
  77. */
  78. void ets_efuse_clear_program_registers(void);
  79. /**
  80. * @brief Program a block of key data to an efuse block
  81. *
  82. * @param key_block Block to read purpose for. Must be in range ETS_EFUSE_BLOCK_KEY0 to ETS_EFUSE_BLOCK_KEY6. Key block must be unused (@ref ets_efuse_key_block_unused).
  83. * @param purpose Purpose to set for this key. Purpose must be already unset.
  84. * @param data Pointer to data to write.
  85. * @param data_len Length of data to write.
  86. *
  87. * @note This function also calls ets_efuse_program() for the specified block, and for block 0 (setting the purpose)
  88. */
  89. int ets_efuse_write_key(ets_efuse_block_t key_block, ets_efuse_purpose_t purpose, const void *data, size_t data_len);
  90. /* @brief Return the address of a particular efuse block's first read register
  91. *
  92. * @param block Index of efuse block to look up
  93. *
  94. * @return 0 if block is invalid, otherwise a numeric read register address
  95. * of the first word in the block.
  96. */
  97. uint32_t ets_efuse_get_read_register_address(ets_efuse_block_t block);
  98. /**
  99. * @brief Return the current purpose set for an efuse key block
  100. *
  101. * @param key_block Block to read purpose for. Must be in range ETS_EFUSE_BLOCK_KEY0 to ETS_EFUSE_BLOCK_KEY6.
  102. */
  103. ets_efuse_purpose_t ets_efuse_get_key_purpose(ets_efuse_block_t key_block);
  104. /**
  105. * @brief Find a key block with the particular purpose set
  106. *
  107. * @param purpose Purpose to search for.
  108. * @param[out] key_block Pointer which will be set to the key block if found. Can be NULL, if only need to test the key block exists.
  109. * @return true if found, false if not found. If false, value at key_block pointer is unchanged.
  110. */
  111. bool ets_efuse_find_purpose(ets_efuse_purpose_t purpose, ets_efuse_block_t *key_block);
  112. /**
  113. * Return true if the key block is unused, false otherwise.
  114. *
  115. * An unused key block is all zero content, not read or write protected,
  116. * and has purpose 0 (ETS_EFUSE_KEY_PURPOSE_USER)
  117. *
  118. * @param key_block key block to check.
  119. *
  120. * @return true if key block is unused, false if key block or used
  121. * or the specified block index is not a key block.
  122. */
  123. bool ets_efuse_key_block_unused(ets_efuse_block_t key_block);
  124. /**
  125. * @brief Search for an unused key block and return the first one found.
  126. *
  127. * See @ref ets_efuse_key_block_unused for a description of an unused key block.
  128. *
  129. * @return First unused key block, or ETS_EFUSE_BLOCK_MAX if no unused key block is found.
  130. */
  131. ets_efuse_block_t ets_efuse_find_unused_key_block(void);
  132. /**
  133. * @brief Return the number of unused efuse key blocks (0-6)
  134. */
  135. unsigned ets_efuse_count_unused_key_blocks(void);
  136. /**
  137. * @brief Calculate Reed-Solomon Encoding values for a block of efuse data.
  138. *
  139. * @param data Pointer to data buffer (length 32 bytes)
  140. * @param rs_values Pointer to write encoded data to (length 12 bytes)
  141. */
  142. void ets_efuse_rs_calculate(const void *data, void *rs_values);
  143. /**
  144. * @brief Read spi flash pads configuration from Efuse
  145. *
  146. * @return
  147. * - 0 for default SPI pins.
  148. * - 1 for default HSPI pins.
  149. * - Other values define a custom pin configuration mask. Pins are encoded as per the EFUSE_SPICONFIG_RET_SPICLK,
  150. * EFUSE_SPICONFIG_RET_SPIQ, EFUSE_SPICONFIG_RET_SPID, EFUSE_SPICONFIG_RET_SPICS0, EFUSE_SPICONFIG_RET_SPIHD macros.
  151. * WP pin (for quad I/O modes) is not saved in efuse and not returned by this function.
  152. */
  153. uint32_t ets_efuse_get_spiconfig(void);
  154. /**
  155. * @brief Read spi flash wp pad from Efuse
  156. *
  157. * @return
  158. * - 0x3f for invalid.
  159. * - 0~46 is valid.
  160. */
  161. uint32_t ets_efuse_get_wp_pad(void);
  162. /**
  163. * @brief Read if download mode disabled from Efuse
  164. *
  165. * @return
  166. * - true for efuse disable download mode.
  167. * - false for efuse doesn't disable download mode.
  168. */
  169. bool ets_efuse_download_modes_disabled(void);
  170. /**
  171. * @brief Read if legacy spi flash boot mode disabled from Efuse
  172. *
  173. * @return
  174. * - true for efuse disable legacy spi flash boot mode.
  175. * - false for efuse doesn't disable legacy spi flash boot mode.
  176. */
  177. bool ets_efuse_legacy_spi_boot_mode_disabled(void);
  178. /**
  179. * @brief Read if uart print control value from Efuse
  180. *
  181. * @return
  182. * - 0 for uart force print.
  183. * - 1 for uart print when GPIO8 is low when digital reset.
  184. * 2 for uart print when GPIO8 is high when digital reset.
  185. * 3 for uart force slient
  186. */
  187. uint32_t ets_efuse_get_uart_print_control(void);
  188. /**
  189. * @brief Read if USB-Serial-JTAG print during rom boot is disabled from Efuse
  190. *
  191. * @return
  192. * - 1 for efuse disable USB-Serial-JTAG print during rom boot.
  193. * - 0 for efuse doesn't disable USB-Serial-JTAG print during rom boot.
  194. */
  195. uint32_t ets_efuse_usb_serial_jtag_print_is_disabled(void);
  196. /**
  197. * @brief Read if usb download mode disabled from Efuse
  198. *
  199. * (Also returns true if security download mode is enabled, as this mode
  200. * disables USB download.)
  201. *
  202. * @return
  203. * - true for efuse disable usb download mode.
  204. * - false for efuse doesn't disable usb download mode.
  205. */
  206. bool ets_efuse_usb_download_mode_disabled(void);
  207. /**
  208. * @brief Read if usb module disabled from Efuse
  209. *
  210. * @return
  211. * - true for efuse disable usb module.
  212. * - false for efuse doesn't disable usb module.
  213. */
  214. bool ets_efuse_usb_module_disabled(void);
  215. /**
  216. * @brief Read if security download modes enabled from Efuse
  217. *
  218. * @return
  219. * - true for efuse enable security download mode.
  220. * - false for efuse doesn't enable security download mode.
  221. */
  222. bool ets_efuse_security_download_modes_enabled(void);
  223. /**
  224. * @brief Return true if secure boot is enabled in EFuse
  225. */
  226. bool ets_efuse_secure_boot_enabled(void);
  227. /**
  228. * @brief Return true if secure boot aggressive revoke is enabled in EFuse
  229. */
  230. bool ets_efuse_secure_boot_aggressive_revoke_enabled(void);
  231. /**
  232. * @brief Return true if cache encryption (flash, etc) is enabled from boot via EFuse
  233. */
  234. bool ets_efuse_cache_encryption_enabled(void);
  235. /**
  236. * @brief Return true if OPI pins GPIO33-37 are powered by VDDSPI, otherwise by VDD33CPU
  237. */
  238. bool ets_efuse_flash_opi_5pads_power_sel_vddspi(void);
  239. /**
  240. * @brief Return true if EFuse indicates to send a flash resume command.
  241. */
  242. bool ets_efuse_force_send_resume(void);
  243. /**
  244. * @brief return the time in us ROM boot need wait flash to power on from Efuse
  245. *
  246. * @return
  247. * - uint32_t the time in us.
  248. */
  249. uint32_t ets_efuse_get_flash_delay_us(void);
  250. #define EFUSE_SPICONFIG_SPI_DEFAULTS 0
  251. #define EFUSE_SPICONFIG_HSPI_DEFAULTS 1
  252. #define EFUSE_SPICONFIG_RET_SPICLK_MASK 0x3f
  253. #define EFUSE_SPICONFIG_RET_SPICLK_SHIFT 0
  254. #define EFUSE_SPICONFIG_RET_SPICLK(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPICLK_SHIFT) & EFUSE_SPICONFIG_RET_SPICLK_MASK)
  255. #define EFUSE_SPICONFIG_RET_SPIQ_MASK 0x3f
  256. #define EFUSE_SPICONFIG_RET_SPIQ_SHIFT 6
  257. #define EFUSE_SPICONFIG_RET_SPIQ(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPIQ_SHIFT) & EFUSE_SPICONFIG_RET_SPIQ_MASK)
  258. #define EFUSE_SPICONFIG_RET_SPID_MASK 0x3f
  259. #define EFUSE_SPICONFIG_RET_SPID_SHIFT 12
  260. #define EFUSE_SPICONFIG_RET_SPID(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPID_SHIFT) & EFUSE_SPICONFIG_RET_SPID_MASK)
  261. #define EFUSE_SPICONFIG_RET_SPICS0_MASK 0x3f
  262. #define EFUSE_SPICONFIG_RET_SPICS0_SHIFT 18
  263. #define EFUSE_SPICONFIG_RET_SPICS0(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPICS0_SHIFT) & EFUSE_SPICONFIG_RET_SPICS0_MASK)
  264. #define EFUSE_SPICONFIG_RET_SPIHD_MASK 0x3f
  265. #define EFUSE_SPICONFIG_RET_SPIHD_SHIFT 24
  266. #define EFUSE_SPICONFIG_RET_SPIHD(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPIHD_SHIFT) & EFUSE_SPICONFIG_RET_SPIHD_MASK)
  267. /**
  268. * @brief Enable JTAG temporarily by writing a JTAG HMAC "key" into
  269. * the JTAG_CTRL registers.
  270. *
  271. * Works if JTAG has been "soft" disabled by burning the EFUSE_SOFT_DIS_JTAG efuse.
  272. *
  273. * Will enable the HMAC module to generate a "downstream" HMAC value from a key already saved in efuse, and then write the JTAG HMAC "key" which will enable JTAG if the two keys match.
  274. *
  275. * @param jtag_hmac_key Pointer to a 32 byte array containing a valid key. Supplied by user.
  276. * @param key_block Index of a key block containing the source for this key.
  277. *
  278. * @return ETS_FAILED if HMAC operation fails or invalid parameter, ETS_OK otherwise. ETS_OK doesn't necessarily mean that JTAG was enabled.
  279. */
  280. int ets_jtag_enable_temporarily(const uint8_t *jtag_hmac_key, ets_efuse_block_t key_block);
  281. /**
  282. * @brief A crc8 algorithm used for MAC addresses in efuse
  283. *
  284. * @param unsigned char const *p : Pointer to original data.
  285. *
  286. * @param unsigned int len : Data length in byte.
  287. *
  288. * @return unsigned char: Crc value.
  289. */
  290. unsigned char esp_crc8(unsigned char const *p, unsigned int len);
  291. /**
  292. * @}
  293. */
  294. #ifdef __cplusplus
  295. }
  296. #endif
  297. #endif /* _ROM_EFUSE_H_ */