| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152 |
- /*
- * SPDX-FileCopyrightText: 2022-2023 Espressif Systems (Shanghai) CO LTD
- *
- * SPDX-License-Identifier: Apache-2.0
- */
- #include <strings.h>
- #include "esp_flash_encrypt.h"
- #include "esp_secure_boot.h"
- #include "esp_efuse.h"
- #include "esp_efuse_table.h"
- #include "esp_log.h"
- #include "sdkconfig.h"
- static __attribute__((unused)) const char *TAG = "flash_encrypt";
- esp_err_t esp_flash_encryption_enable_secure_features(void)
- {
- #ifndef CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC
- ESP_LOGI(TAG, "Disable UART bootloader encryption...");
- esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
- #else
- ESP_LOGW(TAG, "Not disabling UART bootloader encryption");
- #endif
- #ifndef CONFIG_SECURE_BOOT_ALLOW_JTAG
- ESP_LOGI(TAG, "Disable JTAG...");
- esp_efuse_write_field_bit(ESP_EFUSE_DIS_PAD_JTAG);
- esp_efuse_write_field_bit(ESP_EFUSE_DIS_USB_JTAG);
- #else
- ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED");
- #endif
- esp_efuse_write_field_bit(ESP_EFUSE_DIS_DIRECT_BOOT);
- #if defined(CONFIG_SECURE_BOOT_V2_ENABLED) && !defined(CONFIG_SECURE_BOOT_V2_ALLOW_EFUSE_RD_DIS)
- // This bit is set when enabling Secure Boot V2, but we can't enable it until this later point in the first boot
- // otherwise the Flash Encryption key cannot be read protected
- esp_efuse_write_field_bit(ESP_EFUSE_WR_DIS_RD_DIS);
- #endif
- #ifdef CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
- // Set write-protection for DIS_ICACHE to prevent bricking chip in case it will be set accidentally.
- // esp32h2 has DIS_ICACHE. Write-protection bit = 2.
- // List of eFuses with the same write protection bit:
- // DIS_ICACHE, DIS_USB_JTAG, POWERGLITCH_EN, DIS_FORCE_DOWNLOAD, SPI_DOWNLOAD_MSPI_DIS,
- // DIS_TWAI, JTAG_SEL_ENABLE, DIS_PAD_JTAG, DIS_DOWNLOAD_MANUAL_ENCRYPT
- esp_efuse_write_field_bit(ESP_EFUSE_WR_DIS_DIS_ICACHE);
- #endif
- return ESP_OK;
- }
|