efuse.h 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. /*
  2. * SPDX-FileCopyrightText: 2015-2022 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #pragma once
  7. #ifdef __cplusplus
  8. extern "C" {
  9. #endif
  10. #include <stdint.h>
  11. #include <stddef.h>
  12. #include <stdbool.h>
  13. /** \defgroup efuse_APIs efuse APIs
  14. * @brief ESP32 efuse read/write APIs
  15. * @attention
  16. *
  17. */
  18. /** @addtogroup efuse_APIs
  19. * @{
  20. */
  21. typedef enum {
  22. ETS_EFUSE_KEY_PURPOSE_USER = 0,
  23. ETS_EFUSE_KEY_PURPOSE_RESERVED = 1,
  24. ETS_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_1 = 2,
  25. ETS_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_2 = 3,
  26. ETS_EFUSE_KEY_PURPOSE_XTS_AES_128_KEY = 4,
  27. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_ALL = 5,
  28. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_JTAG = 6,
  29. ETS_EFUSE_KEY_PURPOSE_HMAC_DOWN_DIGITAL_SIGNATURE = 7,
  30. ETS_EFUSE_KEY_PURPOSE_HMAC_UP = 8,
  31. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST0 = 9,
  32. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST1 = 10,
  33. ETS_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST2 = 11,
  34. ETS_EFUSE_KEY_PURPOSE_MAX,
  35. } ets_efuse_purpose_t;
  36. typedef enum {
  37. ETS_EFUSE_BLOCK0 = 0,
  38. ETS_EFUSE_MAC_SPI_SYS_0 = 1,
  39. ETS_EFUSE_BLOCK_SYS_DATA = 2,
  40. ETS_EFUSE_BLOCK_USR_DATA = 3,
  41. ETS_EFUSE_BLOCK_KEY0 = 4,
  42. ETS_EFUSE_BLOCK_KEY1 = 5,
  43. ETS_EFUSE_BLOCK_KEY2 = 6,
  44. ETS_EFUSE_BLOCK_KEY3 = 7,
  45. ETS_EFUSE_BLOCK_KEY4 = 8,
  46. ETS_EFUSE_BLOCK_KEY5 = 9,
  47. ETS_EFUSE_BLOCK_KEY6 = 10,
  48. ETS_EFUSE_BLOCK_MAX,
  49. } ets_efuse_block_t;
  50. /**
  51. * @brief set timing accroding the apb clock, so no read error or write error happens.
  52. *
  53. * @param clock: apb clock in HZ, only accept 5M(in FPGA), 10M(in FPGA), 20M, 40M, 80M.
  54. *
  55. * @return : 0 if success, others if clock not accepted
  56. */
  57. int ets_efuse_set_timing(uint32_t clock);
  58. /**
  59. * @brief Efuse read operation: copies data from physical efuses to efuse read registers.
  60. *
  61. * @param null
  62. *
  63. * @return : 0 if success, others if apb clock is not accepted
  64. */
  65. int ets_efuse_read(void);
  66. /**
  67. * @brief Efuse write operation: Copies data from efuse write registers to efuse. Operates on a single block of efuses at a time.
  68. *
  69. * @note This function does not update read efuses, call ets_efuse_read() once all programming is complete.
  70. *
  71. * @return : 0 if success, others if apb clock is not accepted
  72. */
  73. int ets_efuse_program(ets_efuse_block_t block);
  74. /**
  75. * @brief Set all Efuse program registers to zero.
  76. *
  77. * Call this before writing new data to the program registers.
  78. */
  79. void ets_efuse_clear_program_registers(void);
  80. /**
  81. * @brief Program a block of key data to an efuse block
  82. *
  83. * @param key_block Block to read purpose for. Must be in range ETS_EFUSE_BLOCK_KEY0 to ETS_EFUSE_BLOCK_KEY6. Key block must be unused (@ref ets_efuse_key_block_unused).
  84. * @param purpose Purpose to set for this key. Purpose must be already unset.
  85. * @param data Pointer to data to write.
  86. * @param data_len Length of data to write.
  87. *
  88. * @note This function also calls ets_efuse_program() for the specified block, and for block 0 (setting the purpose)
  89. */
  90. int ets_efuse_write_key(ets_efuse_block_t key_block, ets_efuse_purpose_t purpose, const void *data, size_t data_len);
  91. /* @brief Return the address of a particular efuse block's first read register
  92. *
  93. * @param block Index of efuse block to look up
  94. *
  95. * @return 0 if block is invalid, otherwise a numeric read register address
  96. * of the first word in the block.
  97. */
  98. uint32_t ets_efuse_get_read_register_address(ets_efuse_block_t block);
  99. /**
  100. * @brief Return the current purpose set for an efuse key block
  101. *
  102. * @param key_block Block to read purpose for. Must be in range ETS_EFUSE_BLOCK_KEY0 to ETS_EFUSE_BLOCK_KEY6.
  103. */
  104. ets_efuse_purpose_t ets_efuse_get_key_purpose(ets_efuse_block_t key_block);
  105. /**
  106. * @brief Find a key block with the particular purpose set
  107. *
  108. * @param purpose Purpose to search for.
  109. * @param[out] key_block Pointer which will be set to the key block if found. Can be NULL, if only need to test the key block exists.
  110. * @return true if found, false if not found. If false, value at key_block pointer is unchanged.
  111. */
  112. bool ets_efuse_find_purpose(ets_efuse_purpose_t purpose, ets_efuse_block_t *key_block);
  113. /**
  114. * Return true if the key block is unused, false otherwise.
  115. *
  116. * An unused key block is all zero content, not read or write protected,
  117. * and has purpose 0 (ETS_EFUSE_KEY_PURPOSE_USER)
  118. *
  119. * @param key_block key block to check.
  120. *
  121. * @return true if key block is unused, false if key block or used
  122. * or the specified block index is not a key block.
  123. */
  124. bool ets_efuse_key_block_unused(ets_efuse_block_t key_block);
  125. /**
  126. * @brief Search for an unused key block and return the first one found.
  127. *
  128. * See @ref ets_efuse_key_block_unused for a description of an unused key block.
  129. *
  130. * @return First unused key block, or ETS_EFUSE_BLOCK_MAX if no unused key block is found.
  131. */
  132. ets_efuse_block_t ets_efuse_find_unused_key_block(void);
  133. /**
  134. * @brief Return the number of unused efuse key blocks (0-6)
  135. */
  136. unsigned ets_efuse_count_unused_key_blocks(void);
  137. /**
  138. * @brief Calculate Reed-Solomon Encoding values for a block of efuse data.
  139. *
  140. * @param data Pointer to data buffer (length 32 bytes)
  141. * @param rs_values Pointer to write encoded data to (length 12 bytes)
  142. */
  143. void ets_efuse_rs_calculate(const void *data, void *rs_values);
  144. /**
  145. * @brief Read spi flash pads configuration from Efuse
  146. *
  147. * @return
  148. * - 0 for default SPI pins.
  149. * - 1 for default HSPI pins.
  150. * - Other values define a custom pin configuration mask. Pins are encoded as per the EFUSE_SPICONFIG_RET_SPICLK,
  151. * EFUSE_SPICONFIG_RET_SPIQ, EFUSE_SPICONFIG_RET_SPID, EFUSE_SPICONFIG_RET_SPICS0, EFUSE_SPICONFIG_RET_SPIHD macros.
  152. * WP pin (for quad I/O modes) is not saved in efuse and not returned by this function.
  153. */
  154. uint32_t ets_efuse_get_spiconfig(void);
  155. /**
  156. * @brief Read spi flash wp pad from Efuse
  157. *
  158. * @return
  159. * - 0x3f for invalid.
  160. * - 0~46 is valid.
  161. */
  162. uint32_t ets_efuse_get_wp_pad(void);
  163. /**
  164. * @brief Read if download mode disabled from Efuse
  165. *
  166. * @return
  167. * - true for efuse disable download mode.
  168. * - false for efuse doesn't disable download mode.
  169. */
  170. bool ets_efuse_download_modes_disabled(void);
  171. /**
  172. * @brief Read if legacy spi flash boot mode disabled from Efuse
  173. *
  174. * @return
  175. * - true for efuse disable legacy spi flash boot mode.
  176. * - false for efuse doesn't disable legacy spi flash boot mode.
  177. */
  178. bool ets_efuse_legacy_spi_boot_mode_disabled(void);
  179. /**
  180. * @brief Read if uart print control value from Efuse
  181. *
  182. * @return
  183. * - 0 for uart force print.
  184. * - 1 for uart print when GPIO46 is low when digital reset.
  185. * 2 for uart print when GPIO46 is high when digital reset.
  186. * 3 for uart force slient
  187. */
  188. uint32_t ets_efuse_get_uart_print_control(void);
  189. /**
  190. * @brief Read if USB-Serial-JTAG print during rom boot is disabled from Efuse
  191. *
  192. * @return
  193. * - 1 for efuse disable USB-Serial-JTAG print during rom boot.
  194. * - 0 for efuse doesn't disable USB-Serial-JTAG print during rom boot.
  195. */
  196. uint32_t ets_efuse_usb_serial_jtag_print_is_disabled(void);
  197. /**
  198. * @brief Read if usb download mode disabled from Efuse
  199. *
  200. * (Also returns true if security download mode is enabled, as this mode
  201. * disables USB download.)
  202. *
  203. * @return
  204. * - true for efuse disable usb download mode.
  205. * - false for efuse doesn't disable usb download mode.
  206. */
  207. bool ets_efuse_usb_download_mode_disabled(void);
  208. /**
  209. * @brief Read if usb module disabled from Efuse
  210. *
  211. * @return
  212. * - true for efuse disable usb module.
  213. * - false for efuse doesn't disable usb module.
  214. */
  215. bool ets_efuse_usb_module_disabled(void);
  216. /**
  217. * @brief Read if security download modes enabled from Efuse
  218. *
  219. * @return
  220. * - true for efuse enable security download mode.
  221. * - false for efuse doesn't enable security download mode.
  222. */
  223. bool ets_efuse_security_download_modes_enabled(void);
  224. /**
  225. * @brief Return true if secure boot is enabled in EFuse
  226. */
  227. bool ets_efuse_secure_boot_enabled(void);
  228. /**
  229. * @brief Return true if secure boot aggressive revoke is enabled in EFuse
  230. */
  231. bool ets_efuse_secure_boot_aggressive_revoke_enabled(void);
  232. /**
  233. * @brief Return true if cache encryption (flash, PSRAM, etc) is enabled from boot via EFuse
  234. */
  235. bool ets_efuse_cache_encryption_enabled(void);
  236. /**
  237. * @brief Return true if OPI pins GPIO33-37 are powered by VDDSPI, otherwise by VDD33CPU
  238. */
  239. bool ets_efuse_flash_opi_5pads_power_sel_vddspi(void);
  240. /**
  241. * @brief Return true if EFuse indicates to send a flash resume command.
  242. */
  243. bool ets_efuse_force_send_resume(void);
  244. /**
  245. * @brief return the time in us ROM boot need wait flash to power on from Efuse
  246. *
  247. * @return
  248. * - uint32_t the time in us.
  249. */
  250. uint32_t ets_efuse_get_flash_delay_us(void);
  251. #define EFUSE_SPICONFIG_SPI_DEFAULTS 0
  252. #define EFUSE_SPICONFIG_HSPI_DEFAULTS 1
  253. #define EFUSE_SPICONFIG_RET_SPICLK_MASK 0x3f
  254. #define EFUSE_SPICONFIG_RET_SPICLK_SHIFT 0
  255. #define EFUSE_SPICONFIG_RET_SPICLK(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPICLK_SHIFT) & EFUSE_SPICONFIG_RET_SPICLK_MASK)
  256. #define EFUSE_SPICONFIG_RET_SPIQ_MASK 0x3f
  257. #define EFUSE_SPICONFIG_RET_SPIQ_SHIFT 6
  258. #define EFUSE_SPICONFIG_RET_SPIQ(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPIQ_SHIFT) & EFUSE_SPICONFIG_RET_SPIQ_MASK)
  259. #define EFUSE_SPICONFIG_RET_SPID_MASK 0x3f
  260. #define EFUSE_SPICONFIG_RET_SPID_SHIFT 12
  261. #define EFUSE_SPICONFIG_RET_SPID(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPID_SHIFT) & EFUSE_SPICONFIG_RET_SPID_MASK)
  262. #define EFUSE_SPICONFIG_RET_SPICS0_MASK 0x3f
  263. #define EFUSE_SPICONFIG_RET_SPICS0_SHIFT 18
  264. #define EFUSE_SPICONFIG_RET_SPICS0(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPICS0_SHIFT) & EFUSE_SPICONFIG_RET_SPICS0_MASK)
  265. #define EFUSE_SPICONFIG_RET_SPIHD_MASK 0x3f
  266. #define EFUSE_SPICONFIG_RET_SPIHD_SHIFT 24
  267. #define EFUSE_SPICONFIG_RET_SPIHD(ret) (((ret) >> EFUSE_SPICONFIG_RET_SPIHD_SHIFT) & EFUSE_SPICONFIG_RET_SPIHD_MASK)
  268. /**
  269. * @brief Enable JTAG temporarily by writing a JTAG HMAC "key" into
  270. * the JTAG_CTRL registers.
  271. *
  272. * Works if JTAG has been "soft" disabled by burning the EFUSE_SOFT_DIS_JTAG efuse.
  273. *
  274. * Will enable the HMAC module to generate a "downstream" HMAC value from a key already saved in efuse, and then write the JTAG HMAC "key" which will enable JTAG if the two keys match.
  275. *
  276. * @param jtag_hmac_key Pointer to a 32 byte array containing a valid key. Supplied by user.
  277. * @param key_block Index of a key block containing the source for this key.
  278. *
  279. * @return ETS_FAILED if HMAC operation fails or invalid parameter, ETS_OK otherwise. ETS_OK doesn't necessarily mean that JTAG was enabled.
  280. */
  281. int ets_jtag_enable_temporarily(const uint8_t *jtag_hmac_key, ets_efuse_block_t key_block);
  282. /**
  283. * @brief A crc8 algorithm used for MAC addresses in efuse
  284. *
  285. * @param unsigned char const *p : Pointer to original data.
  286. *
  287. * @param unsigned int len : Data length in byte.
  288. *
  289. * @return unsigned char: Crc value.
  290. */
  291. unsigned char esp_crc8(unsigned char const *p, unsigned int len);
  292. /**
  293. * @}
  294. */
  295. #ifdef __cplusplus
  296. }
  297. #endif