flash_encrypt.c 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. /*
  2. * SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <strings.h>
  7. #include "sdkconfig.h"
  8. #include "esp_log.h"
  9. #include "esp_efuse.h"
  10. #include "esp_efuse_table.h"
  11. #include "esp_flash_encrypt.h"
  12. #include "esp_secure_boot.h"
  13. #if CONFIG_IDF_TARGET_ESP32
  14. #define CRYPT_CNT ESP_EFUSE_FLASH_CRYPT_CNT
  15. #define WR_DIS_CRYPT_CNT ESP_EFUSE_WR_DIS_FLASH_CRYPT_CNT
  16. #else
  17. #define CRYPT_CNT ESP_EFUSE_SPI_BOOT_CRYPT_CNT
  18. #define WR_DIS_CRYPT_CNT ESP_EFUSE_WR_DIS_SPI_BOOT_CRYPT_CNT
  19. #endif
  20. static const char *TAG = "flash_encrypt";
  21. #ifndef BOOTLOADER_BUILD
  22. void esp_flash_encryption_init_checks()
  23. {
  24. esp_flash_enc_mode_t mode;
  25. #ifdef CONFIG_SECURE_FLASH_CHECK_ENC_EN_IN_APP
  26. if (!esp_flash_encryption_enabled()) {
  27. ESP_LOGE(TAG, "Flash encryption eFuse bit was not enabled in bootloader but CONFIG_SECURE_FLASH_ENC_ENABLED is on");
  28. abort();
  29. }
  30. #endif // CONFIG_SECURE_FLASH_CHECK_ENC_EN_IN_APP
  31. // First check is: if Release mode flash encryption & secure boot are enabled then
  32. // FLASH_CRYPT_CNT *must* be write protected. This will have happened automatically
  33. // if bootloader is IDF V4.0 or newer but may not have happened for previous ESP-IDF bootloaders.
  34. #ifdef CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  35. #ifdef CONFIG_SECURE_BOOT
  36. if (esp_secure_boot_enabled() && esp_flash_encryption_enabled()) {
  37. bool flash_crypt_cnt_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  38. if (!flash_crypt_cnt_wr_dis) {
  39. uint8_t flash_crypt_cnt = 0;
  40. esp_efuse_read_field_blob(CRYPT_CNT, &flash_crypt_cnt, CRYPT_CNT[0]->bit_count);
  41. if (flash_crypt_cnt == (1<<(CRYPT_CNT[0]->bit_count))-1) {
  42. // If encryption counter is already max, no need to write protect it
  43. // (this distinction is important on ESP32 ECO3 where write-procted FLASH_CRYPT_CNT also write-protects UART_DL_DIS)
  44. } else {
  45. ESP_LOGE(TAG, "Flash encryption & Secure Boot together requires FLASH_CRYPT_CNT efuse to be write protected. Fixing now...");
  46. esp_flash_write_protect_crypt_cnt();
  47. }
  48. }
  49. }
  50. #endif // CONFIG_SECURE_BOOT
  51. #endif // CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  52. // Second check is to print a warning or error if the current running flash encryption mode
  53. // doesn't match the expectation from project config (due to mismatched bootloader and app, probably)
  54. mode = esp_get_flash_encryption_mode();
  55. if (mode == ESP_FLASH_ENC_MODE_DEVELOPMENT) {
  56. #ifdef CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  57. ESP_LOGE(TAG, "Flash encryption settings error: app is configured for RELEASE but efuses are set for DEVELOPMENT");
  58. ESP_LOGE(TAG, "Mismatch found in security options in bootloader menuconfig and efuse settings. Device is not secure.");
  59. #else
  60. ESP_LOGW(TAG, "Flash encryption mode is DEVELOPMENT (not secure)");
  61. #endif // CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  62. } else if (mode == ESP_FLASH_ENC_MODE_RELEASE) {
  63. ESP_LOGI(TAG, "Flash encryption mode is RELEASE");
  64. }
  65. }
  66. #endif // BOOTLOADER_BUILD
  67. /**
  68. * This former inlined function must not be defined in the header file anymore.
  69. * As it depends on efuse component, any use of it outside of `bootloader_support`,
  70. * would require the caller component to include `efuse` as part of its `REQUIRES` or
  71. * `PRIV_REQUIRES` entries.
  72. * Attribute IRAM_ATTR must be specified for the app build.
  73. */
  74. bool IRAM_ATTR esp_flash_encryption_enabled(void)
  75. {
  76. uint32_t flash_crypt_cnt = 0;
  77. #ifndef CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH
  78. flash_crypt_cnt = efuse_ll_get_flash_crypt_cnt();
  79. #else
  80. #if CONFIG_IDF_TARGET_ESP32
  81. esp_efuse_read_field_blob(ESP_EFUSE_FLASH_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_FLASH_CRYPT_CNT[0]->bit_count);
  82. #else
  83. esp_efuse_read_field_blob(ESP_EFUSE_SPI_BOOT_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_SPI_BOOT_CRYPT_CNT[0]->bit_count);
  84. #endif
  85. #endif
  86. /* __builtin_parity is in flash, so we calculate parity inline */
  87. bool enabled = false;
  88. while (flash_crypt_cnt) {
  89. if (flash_crypt_cnt & 1) {
  90. enabled = !enabled;
  91. }
  92. flash_crypt_cnt >>= 1;
  93. }
  94. return enabled;
  95. }
  96. void esp_flash_write_protect_crypt_cnt(void)
  97. {
  98. esp_efuse_write_field_bit(WR_DIS_CRYPT_CNT);
  99. }
  100. esp_flash_enc_mode_t esp_get_flash_encryption_mode(void)
  101. {
  102. bool flash_crypt_cnt_wr_dis = false;
  103. esp_flash_enc_mode_t mode = ESP_FLASH_ENC_MODE_DEVELOPMENT;
  104. if (esp_flash_encryption_enabled()) {
  105. /* Check if FLASH CRYPT CNT is write protected */
  106. flash_crypt_cnt_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  107. if (!flash_crypt_cnt_wr_dis) {
  108. uint8_t flash_crypt_cnt = 0;
  109. esp_efuse_read_field_blob(CRYPT_CNT, &flash_crypt_cnt, CRYPT_CNT[0]->bit_count);
  110. if (flash_crypt_cnt == (1 << (CRYPT_CNT[0]->bit_count)) - 1) {
  111. flash_crypt_cnt_wr_dis = true;
  112. }
  113. }
  114. if (flash_crypt_cnt_wr_dis) {
  115. #if CONFIG_IDF_TARGET_ESP32
  116. bool dis_dl_cache = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_CACHE);
  117. bool dis_dl_enc = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_ENCRYPT);
  118. bool dis_dl_dec = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_DECRYPT);
  119. /* Check if DISABLE_DL_DECRYPT, DISABLE_DL_ENCRYPT & DISABLE_DL_CACHE are set */
  120. if ( dis_dl_cache && dis_dl_enc && dis_dl_dec ) {
  121. mode = ESP_FLASH_ENC_MODE_RELEASE;
  122. }
  123. #elif CONFIG_IDF_TARGET_ESP32S2 || CONFIG_IDF_TARGET_ESP32S3
  124. bool dis_dl_enc = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  125. bool dis_dl_icache = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  126. bool dis_dl_dcache = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_DCACHE);
  127. if (dis_dl_enc && dis_dl_icache && dis_dl_dcache) {
  128. mode = ESP_FLASH_ENC_MODE_RELEASE;
  129. }
  130. #elif CONFIG_IDF_TARGET_ESP32C2 || CONFIG_IDF_TARGET_ESP32C3 || CONFIG_IDF_TARGET_ESP32H4 || CONFIG_IDF_TARGET_ESP32C6
  131. bool dis_dl_enc = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  132. bool dis_dl_icache = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  133. if (dis_dl_enc && dis_dl_icache) {
  134. mode = ESP_FLASH_ENC_MODE_RELEASE;
  135. #ifdef CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  136. // This chip supports two types of key: AES128_DERIVED and AES128.
  137. // To be in RELEASE mode, it is important for the AES128_DERIVED key that XTS_KEY_LENGTH_256 be write-protected.
  138. bool xts_key_len_256_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  139. mode = (xts_key_len_256_wr_dis) ? ESP_FLASH_ENC_MODE_RELEASE : ESP_FLASH_ENC_MODE_DEVELOPMENT;
  140. #endif // CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  141. }
  142. #endif
  143. }
  144. } else {
  145. mode = ESP_FLASH_ENC_MODE_DISABLED;
  146. }
  147. return mode;
  148. }
  149. void esp_flash_encryption_set_release_mode(void)
  150. {
  151. esp_flash_enc_mode_t mode = esp_get_flash_encryption_mode();
  152. if (mode == ESP_FLASH_ENC_MODE_RELEASE) {
  153. return;
  154. }
  155. if (mode == ESP_FLASH_ENC_MODE_DISABLED) {
  156. ESP_LOGE(TAG, "Flash encryption eFuse is not enabled, abort..");
  157. abort();
  158. return;
  159. }
  160. // ESP_FLASH_ENC_MODE_DEVELOPMENT -> ESP_FLASH_ENC_MODE_RELEASE
  161. esp_efuse_batch_write_begin();
  162. if (!esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT)) {
  163. size_t flash_crypt_cnt = 0;
  164. esp_efuse_read_field_cnt(CRYPT_CNT, &flash_crypt_cnt);
  165. if (flash_crypt_cnt != CRYPT_CNT[0]->bit_count) {
  166. esp_efuse_write_field_cnt(CRYPT_CNT, CRYPT_CNT[0]->bit_count - flash_crypt_cnt);
  167. }
  168. }
  169. #if CONFIG_IDF_TARGET_ESP32
  170. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_CACHE);
  171. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_ENCRYPT);
  172. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_DECRYPT);
  173. #elif CONFIG_IDF_TARGET_ESP32S2 || CONFIG_IDF_TARGET_ESP32S3
  174. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  175. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  176. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_DCACHE);
  177. #elif CONFIG_IDF_TARGET_ESP32C2 || CONFIG_IDF_TARGET_ESP32C3 || CONFIG_IDF_TARGET_ESP32H4 || CONFIG_IDF_TARGET_ESP32C6
  178. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  179. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  180. #ifdef CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  181. // For AES128_DERIVED, FE key is 16 bytes and XTS_KEY_LENGTH_256 is 0.
  182. // It is important to protect XTS_KEY_LENGTH_256 from further changing it to 1. Set write protection for this bit.
  183. // Burning WR_DIS_CRYPT_CNT, blocks further changing of eFuses: DIS_DOWNLOAD_MANUAL_ENCRYPT, SPI_BOOT_CRYPT_CNT, [XTS_KEY_LENGTH_256], SECURE_BOOT_EN.
  184. esp_efuse_write_field_bit(WR_DIS_CRYPT_CNT);
  185. #endif // CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  186. #else
  187. ESP_LOGE(TAG, "Flash Encryption support not added, abort..");
  188. abort();
  189. #endif
  190. #if CONFIG_SOC_SUPPORTS_SECURE_DL_MODE
  191. esp_efuse_enable_rom_secure_download_mode();
  192. #else
  193. esp_efuse_disable_rom_download_mode();
  194. #endif
  195. esp_efuse_batch_write_commit();
  196. if (esp_get_flash_encryption_mode() != ESP_FLASH_ENC_MODE_RELEASE) {
  197. ESP_LOGE(TAG, "Flash encryption mode is DEVELOPMENT, abort..");
  198. abort();
  199. }
  200. ESP_LOGI(TAG, "Flash encryption mode is RELEASE");
  201. }