bootloader_random_esp32s2.c 3.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. /*
  2. * SPDX-FileCopyrightText: 2019-2021 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include "sdkconfig.h"
  7. #include "bootloader_random.h"
  8. #include "soc/rtc_periph.h"
  9. #include "soc/sens_periph.h"
  10. #include "soc/syscon_periph.h"
  11. #include "soc/dport_reg.h"
  12. #include "soc/i2s_periph.h"
  13. #include "esp_log.h"
  14. #include "soc/io_mux_reg.h"
  15. #include "soc/apb_saradc_reg.h"
  16. #include "regi2c_ctrl.h"
  17. #include "hal/adc_ll.h"
  18. #ifndef BOOTLOADER_BUILD
  19. #include "esp_private/periph_ctrl.h"
  20. #endif
  21. void bootloader_random_enable(void)
  22. {
  23. /* Ensure the Wifi clock for RNG modiule is enabled following a soft reset. This should always be the case already
  24. (this clock is never disabled while the CPU is running), this is a "belt and braces" type check.
  25. */
  26. #ifdef BOOTLOADER_BUILD
  27. DPORT_SET_PERI_REG_MASK(DPORT_WIFI_CLK_EN_REG, DPORT_WIFI_CLK_RNG_EN);
  28. #else
  29. periph_module_enable(PERIPH_RNG_MODULE);
  30. #endif // BOOTLOADER_BUILD
  31. // Enable 8M clock source for RNG (this is actually enough to produce strong random results,
  32. // but enabling the SAR ADC as well adds some insurance.)
  33. REG_SET_BIT(RTC_CNTL_CLK_CONF_REG, RTC_CNTL_DIG_CLK8M_EN);
  34. // Enable SAR ADC to read a disconnected input for additional entropy
  35. SET_PERI_REG_MASK(DPORT_PERIP_CLK_EN0_REG,DPORT_APB_SARADC_CLK_EN);
  36. REG_SET_FIELD(APB_SARADC_APB_ADC_CLKM_CONF_REG, APB_SARADC_CLK_SEL, 2);
  37. CLEAR_PERI_REG_MASK(RTC_CNTL_ANA_CONF_REG, RTC_CNTL_SAR_I2C_FORCE_PD_M);
  38. SET_PERI_REG_MASK(RTC_CNTL_ANA_CONF_REG, RTC_CNTL_SAR_I2C_FORCE_PU_M);
  39. CLEAR_PERI_REG_MASK(ANA_CONFIG_REG, BIT(18));
  40. SET_PERI_REG_MASK(ANA_CONFIG2_REG, BIT(16));
  41. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SAR1_DREF_ADDR, 0x4);
  42. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SAR2_DREF_ADDR, 0x4);
  43. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENCAL_REF_ADDR, 1);
  44. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENT_TSENS_ADDR, 1);
  45. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENT_RTC_ADDR, 0);
  46. REG_SET_FIELD(APB_SARADC_CTRL_REG, APB_SARADC_SAR1_PATT_LEN, 0);
  47. WRITE_PERI_REG(APB_SARADC_SAR1_PATT_TAB1_REG,0xafffffff); // set adc1 channel & bitwidth & atten
  48. REG_SET_FIELD(APB_SARADC_CTRL_REG, APB_SARADC_SAR2_PATT_LEN, 0);
  49. WRITE_PERI_REG(APB_SARADC_SAR2_PATT_TAB1_REG,0xafffffff); //set adc2 channel & bitwidth & atten
  50. SET_PERI_REG_MASK(SENS_SAR_MEAS1_MUX_REG,SENS_SAR1_DIG_FORCE);
  51. REG_SET_FIELD(APB_SARADC_CTRL_REG,APB_SARADC_WORK_MODE, 1);
  52. CLEAR_PERI_REG_MASK(APB_SARADC_CTRL2_REG,APB_SARADC_MEAS_NUM_LIMIT);
  53. REG_SET_FIELD(SENS_SAR_POWER_XPD_SAR_REG, SENS_FORCE_XPD_SAR, 3);
  54. SET_PERI_REG_MASK(APB_SARADC_CTRL2_REG,APB_SARADC_TIMER_SEL);
  55. REG_SET_FIELD(APB_SARADC_CTRL2_REG, APB_SARADC_TIMER_TARGET, 100);
  56. CLEAR_PERI_REG_MASK(APB_SARADC_CTRL_REG,APB_SARADC_START_FORCE);
  57. SET_PERI_REG_MASK(APB_SARADC_CTRL2_REG,APB_SARADC_TIMER_EN);
  58. }
  59. void bootloader_random_disable(void)
  60. {
  61. /* Restore internal I2C bus state */
  62. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SAR1_DREF_ADDR, 0x1);
  63. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SAR2_DREF_ADDR, 0x1);
  64. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENCAL_REF_ADDR, 0);
  65. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENT_TSENS_ADDR, 0);
  66. REGI2C_WRITE_MASK(I2C_SAR_ADC, ADC_SARADC_ENT_RTC_ADDR, 0);
  67. /* Restore SARADC to default mode */
  68. CLEAR_PERI_REG_MASK(SENS_SAR_MEAS1_MUX_REG, SENS_SAR1_DIG_FORCE);
  69. SET_PERI_REG_MASK(DPORT_PERIP_CLK_EN0_REG, DPORT_APB_SARADC_CLK_EN);
  70. SET_PERI_REG_BITS(SENS_SAR_POWER_XPD_SAR_REG, SENS_FORCE_XPD_SAR, 0, SENS_FORCE_XPD_SAR_S);
  71. CLEAR_PERI_REG_MASK(APB_SARADC_CTRL2_REG, APB_SARADC_TIMER_EN);
  72. /* Note: the 8M CLK entropy source continues running even after this function is called,
  73. but as mentioned above it's better to enable Wi-Fi or BT or call bootloader_random_enable()
  74. in order to get a secondary entropy source.
  75. */
  76. }