flash_encrypt.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443
  1. /*
  2. * SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <strings.h>
  7. #include "sdkconfig.h"
  8. #include "esp_log.h"
  9. #include "esp_efuse.h"
  10. #include "esp_efuse_table.h"
  11. #include "esp_flash_encrypt.h"
  12. #include "esp_secure_boot.h"
  13. #include "hal/efuse_hal.h"
  14. #if CONFIG_IDF_TARGET_ESP32
  15. #define CRYPT_CNT ESP_EFUSE_FLASH_CRYPT_CNT
  16. #define WR_DIS_CRYPT_CNT ESP_EFUSE_WR_DIS_FLASH_CRYPT_CNT
  17. #else
  18. #define CRYPT_CNT ESP_EFUSE_SPI_BOOT_CRYPT_CNT
  19. #define WR_DIS_CRYPT_CNT ESP_EFUSE_WR_DIS_SPI_BOOT_CRYPT_CNT
  20. #endif
  21. static const char *TAG = "flash_encrypt";
  22. #ifndef BOOTLOADER_BUILD
  23. void esp_flash_encryption_init_checks()
  24. {
  25. esp_flash_enc_mode_t mode;
  26. #ifdef CONFIG_SECURE_FLASH_CHECK_ENC_EN_IN_APP
  27. if (!esp_flash_encryption_enabled()) {
  28. ESP_LOGE(TAG, "Flash encryption eFuse bit was not enabled in bootloader but CONFIG_SECURE_FLASH_ENC_ENABLED is on");
  29. abort();
  30. }
  31. #endif // CONFIG_SECURE_FLASH_CHECK_ENC_EN_IN_APP
  32. // First check is: if Release mode flash encryption & secure boot are enabled then
  33. // FLASH_CRYPT_CNT *must* be write protected. This will have happened automatically
  34. // if bootloader is IDF V4.0 or newer but may not have happened for previous ESP-IDF bootloaders.
  35. #ifdef CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  36. #ifdef CONFIG_SECURE_BOOT
  37. if (esp_secure_boot_enabled() && esp_flash_encryption_enabled()) {
  38. bool flash_crypt_cnt_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  39. if (!flash_crypt_cnt_wr_dis) {
  40. uint8_t flash_crypt_cnt = 0;
  41. esp_efuse_read_field_blob(CRYPT_CNT, &flash_crypt_cnt, CRYPT_CNT[0]->bit_count);
  42. if (flash_crypt_cnt == (1<<(CRYPT_CNT[0]->bit_count))-1) {
  43. // If encryption counter is already max, no need to write protect it
  44. // (this distinction is important on ESP32 ECO3 where write-procted FLASH_CRYPT_CNT also write-protects UART_DL_DIS)
  45. } else {
  46. ESP_LOGE(TAG, "Flash encryption & Secure Boot together requires FLASH_CRYPT_CNT efuse to be write protected. Fixing now...");
  47. esp_flash_write_protect_crypt_cnt();
  48. }
  49. }
  50. }
  51. #endif // CONFIG_SECURE_BOOT
  52. #endif // CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  53. // Second check is to print a warning or error if the current running flash encryption mode
  54. // doesn't match the expectation from project config (due to mismatched bootloader and app, probably)
  55. mode = esp_get_flash_encryption_mode();
  56. if (mode == ESP_FLASH_ENC_MODE_DEVELOPMENT) {
  57. #ifdef CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  58. ESP_LOGE(TAG, "Flash encryption settings error: app is configured for RELEASE but efuses are set for DEVELOPMENT");
  59. ESP_LOGE(TAG, "Mismatch found in security options in bootloader menuconfig and efuse settings. Device is not secure.");
  60. #else
  61. ESP_LOGW(TAG, "Flash encryption mode is DEVELOPMENT (not secure)");
  62. #endif // CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE
  63. } else if (mode == ESP_FLASH_ENC_MODE_RELEASE) {
  64. ESP_LOGI(TAG, "Flash encryption mode is RELEASE");
  65. }
  66. }
  67. #endif // BOOTLOADER_BUILD
  68. /**
  69. * This former inlined function must not be defined in the header file anymore.
  70. * As it depends on efuse component, any use of it outside of `bootloader_support`,
  71. * would require the caller component to include `efuse` as part of its `REQUIRES` or
  72. * `PRIV_REQUIRES` entries.
  73. * Attribute IRAM_ATTR must be specified for the app build.
  74. */
  75. bool IRAM_ATTR esp_flash_encryption_enabled(void)
  76. {
  77. #ifndef CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH
  78. return efuse_hal_flash_encryption_enabled();
  79. #else
  80. uint32_t flash_crypt_cnt = 0;
  81. #if CONFIG_IDF_TARGET_ESP32
  82. esp_efuse_read_field_blob(ESP_EFUSE_FLASH_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_FLASH_CRYPT_CNT[0]->bit_count);
  83. #else
  84. esp_efuse_read_field_blob(ESP_EFUSE_SPI_BOOT_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_SPI_BOOT_CRYPT_CNT[0]->bit_count);
  85. #endif
  86. /* __builtin_parity is in flash, so we calculate parity inline */
  87. bool enabled = false;
  88. while (flash_crypt_cnt) {
  89. if (flash_crypt_cnt & 1) {
  90. enabled = !enabled;
  91. }
  92. flash_crypt_cnt >>= 1;
  93. }
  94. return enabled;
  95. #endif // CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH
  96. }
  97. void esp_flash_write_protect_crypt_cnt(void)
  98. {
  99. esp_efuse_write_field_bit(WR_DIS_CRYPT_CNT);
  100. }
  101. esp_flash_enc_mode_t esp_get_flash_encryption_mode(void)
  102. {
  103. bool flash_crypt_cnt_wr_dis = false;
  104. esp_flash_enc_mode_t mode = ESP_FLASH_ENC_MODE_DEVELOPMENT;
  105. if (esp_flash_encryption_enabled()) {
  106. /* Check if FLASH CRYPT CNT is write protected */
  107. flash_crypt_cnt_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  108. if (!flash_crypt_cnt_wr_dis) {
  109. uint8_t flash_crypt_cnt = 0;
  110. esp_efuse_read_field_blob(CRYPT_CNT, &flash_crypt_cnt, CRYPT_CNT[0]->bit_count);
  111. if (flash_crypt_cnt == (1 << (CRYPT_CNT[0]->bit_count)) - 1) {
  112. flash_crypt_cnt_wr_dis = true;
  113. }
  114. }
  115. if (flash_crypt_cnt_wr_dis) {
  116. #if CONFIG_IDF_TARGET_ESP32
  117. bool dis_dl_cache = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_CACHE);
  118. bool dis_dl_enc = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_ENCRYPT);
  119. bool dis_dl_dec = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_DECRYPT);
  120. /* Check if DISABLE_DL_DECRYPT, DISABLE_DL_ENCRYPT & DISABLE_DL_CACHE are set */
  121. if ( dis_dl_cache && dis_dl_enc && dis_dl_dec ) {
  122. mode = ESP_FLASH_ENC_MODE_RELEASE;
  123. }
  124. #else
  125. if (esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT)
  126. #if SOC_EFUSE_DIS_DOWNLOAD_ICACHE
  127. && esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE)
  128. #endif
  129. #if SOC_EFUSE_DIS_DOWNLOAD_DCACHE
  130. && esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_DCACHE)
  131. #endif
  132. ) {
  133. mode = ESP_FLASH_ENC_MODE_RELEASE;
  134. #ifdef CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  135. // This chip supports two types of key: AES128_DERIVED and AES128.
  136. // To be in RELEASE mode, it is important for the AES128_DERIVED key that XTS_KEY_LENGTH_256 be write-protected.
  137. bool xts_key_len_256_wr_dis = esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT);
  138. mode = (xts_key_len_256_wr_dis) ? ESP_FLASH_ENC_MODE_RELEASE : ESP_FLASH_ENC_MODE_DEVELOPMENT;
  139. #endif // CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  140. }
  141. #endif // !CONFIG_IDF_TARGET_ESP32
  142. }
  143. } else {
  144. mode = ESP_FLASH_ENC_MODE_DISABLED;
  145. }
  146. return mode;
  147. }
  148. void esp_flash_encryption_set_release_mode(void)
  149. {
  150. esp_flash_enc_mode_t mode = esp_get_flash_encryption_mode();
  151. if (mode == ESP_FLASH_ENC_MODE_RELEASE) {
  152. return;
  153. }
  154. if (mode == ESP_FLASH_ENC_MODE_DISABLED) {
  155. ESP_LOGE(TAG, "Flash encryption eFuse is not enabled, abort..");
  156. abort();
  157. return;
  158. }
  159. // ESP_FLASH_ENC_MODE_DEVELOPMENT -> ESP_FLASH_ENC_MODE_RELEASE
  160. esp_efuse_batch_write_begin();
  161. if (!esp_efuse_read_field_bit(WR_DIS_CRYPT_CNT)) {
  162. size_t flash_crypt_cnt = 0;
  163. esp_efuse_read_field_cnt(CRYPT_CNT, &flash_crypt_cnt);
  164. if (flash_crypt_cnt != CRYPT_CNT[0]->bit_count) {
  165. esp_efuse_write_field_cnt(CRYPT_CNT, CRYPT_CNT[0]->bit_count - flash_crypt_cnt);
  166. }
  167. }
  168. #if CONFIG_IDF_TARGET_ESP32
  169. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_CACHE);
  170. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_ENCRYPT);
  171. esp_efuse_write_field_bit(ESP_EFUSE_DISABLE_DL_DECRYPT);
  172. #else
  173. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  174. #if SOC_EFUSE_DIS_DOWNLOAD_ICACHE
  175. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  176. #endif
  177. #if SOC_EFUSE_DIS_DOWNLOAD_DCACHE
  178. esp_efuse_write_field_bit(ESP_EFUSE_DIS_DOWNLOAD_DCACHE);
  179. #endif
  180. #ifdef CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  181. // For AES128_DERIVED, FE key is 16 bytes and XTS_KEY_LENGTH_256 is 0.
  182. // It is important to protect XTS_KEY_LENGTH_256 from further changing it to 1. Set write protection for this bit.
  183. // Burning WR_DIS_CRYPT_CNT, blocks further changing of eFuses: DIS_DOWNLOAD_MANUAL_ENCRYPT, SPI_BOOT_CRYPT_CNT, [XTS_KEY_LENGTH_256], SECURE_BOOT_EN.
  184. esp_efuse_write_field_bit(WR_DIS_CRYPT_CNT);
  185. #endif // CONFIG_SOC_FLASH_ENCRYPTION_XTS_AES_128_DERIVED
  186. #endif // !CONFIG_IDF_TARGET_ESP32
  187. #ifdef CONFIG_IDF_TARGET_ESP32
  188. esp_efuse_write_field_bit(ESP_EFUSE_WR_DIS_DIS_CACHE);
  189. #else
  190. #if SOC_EFUSE_DIS_ICACHE
  191. esp_efuse_write_field_bit(ESP_EFUSE_WR_DIS_DIS_ICACHE);
  192. #endif
  193. #endif // !CONFIG_IDF_TARGET_ESP32
  194. #if CONFIG_SOC_SUPPORTS_SECURE_DL_MODE
  195. esp_efuse_enable_rom_secure_download_mode();
  196. #else
  197. esp_efuse_disable_rom_download_mode();
  198. #endif
  199. esp_efuse_batch_write_commit();
  200. if (esp_get_flash_encryption_mode() != ESP_FLASH_ENC_MODE_RELEASE) {
  201. ESP_LOGE(TAG, "Flash encryption mode is DEVELOPMENT, abort..");
  202. abort();
  203. }
  204. ESP_LOGI(TAG, "Flash encryption mode is RELEASE");
  205. }
  206. #ifdef CONFIG_IDF_TARGET_ESP32
  207. bool esp_flash_encryption_cfg_verify_release_mode(void)
  208. {
  209. bool result = false;
  210. bool secure;
  211. secure = esp_flash_encryption_enabled();
  212. result = secure;
  213. if (!secure) {
  214. ESP_LOGW(TAG, "Not enabled Flash Encryption (FLASH_CRYPT_CNT->1 or max)");
  215. }
  216. uint8_t crypt_config = 0;
  217. esp_efuse_read_field_blob(ESP_EFUSE_ENCRYPT_CONFIG, &crypt_config, 4);
  218. if (crypt_config != EFUSE_FLASH_CRYPT_CONFIG) {
  219. result &= false;
  220. ESP_LOGW(TAG, "ENCRYPT_CONFIG must be set 0xF (set ENCRYPT_CONFIG->0xF)");
  221. }
  222. uint8_t flash_crypt_cnt = 0;
  223. esp_efuse_read_field_blob(ESP_EFUSE_FLASH_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_FLASH_CRYPT_CNT[0]->bit_count);
  224. if (flash_crypt_cnt != (1 << (ESP_EFUSE_FLASH_CRYPT_CNT[0]->bit_count)) - 1) {
  225. if (!esp_efuse_read_field_bit(ESP_EFUSE_WR_DIS_FLASH_CRYPT_CNT)) {
  226. result &= false;
  227. ESP_LOGW(TAG, "Not release mode of Flash Encryption (set FLASH_CRYPT_CNT->max or WR_DIS_FLASH_CRYPT_CNT->1)");
  228. }
  229. }
  230. secure = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_ENCRYPT);
  231. result &= secure;
  232. if (!secure) {
  233. ESP_LOGW(TAG, "Not disabled UART bootloader encryption (set DISABLE_DL_ENCRYPT->1)");
  234. }
  235. secure = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_DECRYPT);
  236. result &= secure;
  237. if (!secure) {
  238. ESP_LOGW(TAG, "Not disabled UART bootloader decryption (set DISABLE_DL_DECRYPT->1)");
  239. }
  240. secure = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_DL_CACHE);
  241. result &= secure;
  242. if (!secure) {
  243. ESP_LOGW(TAG, "Not disabled UART bootloader MMU cache (set DISABLE_DL_CACHE->1)");
  244. }
  245. secure = esp_efuse_read_field_bit(ESP_EFUSE_DISABLE_JTAG);
  246. result &= secure;
  247. if (!secure) {
  248. ESP_LOGW(TAG, "Not disabled JTAG (set DISABLE_JTAG->1)");
  249. }
  250. secure = esp_efuse_read_field_bit(ESP_EFUSE_CONSOLE_DEBUG_DISABLE);
  251. result &= secure;
  252. if (!secure) {
  253. ESP_LOGW(TAG, "Not disabled ROM BASIC interpreter fallback (set CONSOLE_DEBUG_DISABLE->1)");
  254. }
  255. secure = esp_efuse_read_field_bit(ESP_EFUSE_WR_DIS_DIS_CACHE);
  256. result &= secure;
  257. if (!secure) {
  258. ESP_LOGW(TAG, "Not write-protected DIS_CACHE (set WR_DIS_DIS_CACHE->1)");
  259. }
  260. secure = esp_efuse_read_field_bit(ESP_EFUSE_RD_DIS_BLK1);
  261. result &= secure;
  262. if (!secure) {
  263. ESP_LOGW(TAG, "Not read-protected flash ecnryption key (set RD_DIS_BLK1->1)");
  264. }
  265. secure = esp_efuse_read_field_bit(ESP_EFUSE_WR_DIS_BLK1);
  266. result &= secure;
  267. if (!secure) {
  268. ESP_LOGW(TAG, "Not write-protected flash ecnryption key (set WR_DIS_BLK1->1)");
  269. }
  270. return result;
  271. }
  272. #else // not CONFIG_IDF_TARGET_ESP32
  273. bool esp_flash_encryption_cfg_verify_release_mode(void)
  274. {
  275. bool result = false;
  276. bool secure;
  277. secure = esp_flash_encryption_enabled();
  278. result = secure;
  279. if (!secure) {
  280. ESP_LOGW(TAG, "Not enabled Flash Encryption (SPI_BOOT_CRYPT_CNT->1 or max)");
  281. }
  282. uint8_t flash_crypt_cnt = 0;
  283. esp_efuse_read_field_blob(ESP_EFUSE_SPI_BOOT_CRYPT_CNT, &flash_crypt_cnt, ESP_EFUSE_SPI_BOOT_CRYPT_CNT[0]->bit_count);
  284. if (flash_crypt_cnt != (1 << (ESP_EFUSE_SPI_BOOT_CRYPT_CNT[0]->bit_count)) - 1) {
  285. if (!esp_efuse_read_field_bit(ESP_EFUSE_WR_DIS_SPI_BOOT_CRYPT_CNT)) {
  286. result &= false;
  287. ESP_LOGW(TAG, "Not release mode of Flash Encryption (set SPI_BOOT_CRYPT_CNT->max or WR_DIS_SPI_BOOT_CRYPT_CNT->1)");
  288. }
  289. }
  290. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_MANUAL_ENCRYPT);
  291. result &= secure;
  292. if (!secure) {
  293. ESP_LOGW(TAG, "Not disabled UART bootloader encryption (set DIS_DOWNLOAD_MANUAL_ENCRYPT->1)");
  294. }
  295. #if SOC_EFUSE_DIS_DOWNLOAD_DCACHE
  296. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_DCACHE);
  297. result &= secure;
  298. if (!secure) {
  299. ESP_LOGW(TAG, "Not disabled UART bootloader Dcache (set DIS_DOWNLOAD_DCACHE->1)");
  300. }
  301. #endif
  302. #if SOC_EFUSE_DIS_DOWNLOAD_ICACHE
  303. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DOWNLOAD_ICACHE);
  304. result &= secure;
  305. if (!secure) {
  306. ESP_LOGW(TAG, "Not disabled UART bootloader cache (set DIS_DOWNLOAD_ICACHE->1)");
  307. }
  308. #endif
  309. #if SOC_EFUSE_DIS_PAD_JTAG
  310. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_PAD_JTAG);
  311. result &= secure;
  312. if (!secure) {
  313. ESP_LOGW(TAG, "Not disabled JTAG PADs (set DIS_PAD_JTAG->1)");
  314. }
  315. #endif
  316. #if SOC_EFUSE_DIS_USB_JTAG
  317. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_USB_JTAG);
  318. result &= secure;
  319. if (!secure) {
  320. ESP_LOGW(TAG, "Not disabled USB JTAG (set DIS_USB_JTAG->1)");
  321. }
  322. #endif
  323. #if SOC_EFUSE_DIS_DIRECT_BOOT
  324. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_DIRECT_BOOT);
  325. result &= secure;
  326. if (!secure) {
  327. ESP_LOGW(TAG, "Not disabled direct boot mode (set DIS_DIRECT_BOOT->1)");
  328. }
  329. #endif
  330. #if SOC_EFUSE_HARD_DIS_JTAG
  331. secure = esp_efuse_read_field_bit(ESP_EFUSE_HARD_DIS_JTAG);
  332. result &= secure;
  333. if (!secure) {
  334. ESP_LOGW(TAG, "Not disabled JTAG (set HARD_DIS_JTAG->1)");
  335. }
  336. #endif
  337. #if SOC_EFUSE_DIS_BOOT_REMAP
  338. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_BOOT_REMAP);
  339. result &= secure;
  340. if (!secure) {
  341. ESP_LOGW(TAG, "Not disabled boot from RAM (set DIS_BOOT_REMAP->1)");
  342. }
  343. #endif
  344. #if SOC_EFUSE_DIS_LEGACY_SPI_BOOT
  345. secure = esp_efuse_read_field_bit(ESP_EFUSE_DIS_LEGACY_SPI_BOOT);
  346. result &= secure;
  347. if (!secure) {
  348. ESP_LOGW(TAG, "Not disabled Legcy SPI boot (set DIS_LEGACY_SPI_BOOT->1)");
  349. }
  350. #endif
  351. #if SOC_EFUSE_DIS_ICACHE
  352. secure = esp_efuse_read_field_bit(ESP_EFUSE_WR_DIS_DIS_ICACHE);
  353. result &= secure;
  354. if (!secure) {
  355. ESP_LOGW(TAG, "Not write-protected DIS_ICACHE (set WR_DIS_DIS_ICACHE->1)");
  356. }
  357. #endif
  358. esp_efuse_purpose_t purposes[] = {
  359. #if SOC_FLASH_ENCRYPTION_XTS_AES_256
  360. ESP_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_1,
  361. ESP_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_2,
  362. #endif
  363. #if SOC_FLASH_ENCRYPTION_XTS_AES_128
  364. ESP_EFUSE_KEY_PURPOSE_XTS_AES_128_KEY,
  365. #endif
  366. };
  367. // S2 and S3 chips have both XTS_AES_128_KEY and XTS_AES_256_KEY_1/2.
  368. // The check below does not take into account that XTS_AES_128_KEY and XTS_AES_256_KEY_1/2
  369. // are mutually exclusive because this will make the chip not functional.
  370. // Only one type key must be configured in eFuses.
  371. secure = false;
  372. for (unsigned i = 0; i < sizeof(purposes) / sizeof(esp_efuse_purpose_t); i++) {
  373. esp_efuse_block_t block;
  374. if (esp_efuse_find_purpose(purposes[i], &block)) {
  375. secure = esp_efuse_get_key_dis_read(block);
  376. result &= secure;
  377. if (!secure) {
  378. ESP_LOGW(TAG, "Not read-protected Flash encryption key in BLOCK%d (set RD_DIS_KEY%d->1)", block, block - EFUSE_BLK_KEY0);
  379. }
  380. secure = esp_efuse_get_key_dis_write(block);
  381. result &= secure;
  382. if (!secure) {
  383. ESP_LOGW(TAG, "Not write-protected Flash encryption key in BLOCK%d (set WR_DIS_KEY%d->1)", block, block - EFUSE_BLK_KEY0);
  384. }
  385. #if SOC_EFUSE_KEY_PURPOSE_FIELD
  386. secure = esp_efuse_get_keypurpose_dis_write(block);
  387. result &= secure;
  388. if (!secure) {
  389. ESP_LOGW(TAG, "Not write-protected KEY_PURPOSE for BLOCK%d (set WR_DIS_KEY_PURPOSE%d->1)", block, block - EFUSE_BLK_KEY0);
  390. }
  391. #endif
  392. }
  393. }
  394. result &= secure;
  395. return result;
  396. }
  397. #endif // not CONFIG_IDF_TARGET_ESP32