esp_efuse.h 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782
  1. /*
  2. * SPDX-FileCopyrightText: 2017-2021 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #pragma once
  7. #ifdef __cplusplus
  8. extern "C" {
  9. #endif
  10. #include <stdint.h>
  11. #include "esp_err.h"
  12. #include "esp_log.h"
  13. #include "soc/soc_caps.h"
  14. #include "sdkconfig.h"
  15. #include_next "esp_efuse.h"
  16. #define ESP_ERR_EFUSE 0x1600 /*!< Base error code for efuse api. */
  17. #define ESP_OK_EFUSE_CNT (ESP_ERR_EFUSE + 0x01) /*!< OK the required number of bits is set. */
  18. #define ESP_ERR_EFUSE_CNT_IS_FULL (ESP_ERR_EFUSE + 0x02) /*!< Error field is full. */
  19. #define ESP_ERR_EFUSE_REPEATED_PROG (ESP_ERR_EFUSE + 0x03) /*!< Error repeated programming of programmed bits is strictly forbidden. */
  20. #define ESP_ERR_CODING (ESP_ERR_EFUSE + 0x04) /*!< Error while a encoding operation. */
  21. #define ESP_ERR_NOT_ENOUGH_UNUSED_KEY_BLOCKS (ESP_ERR_EFUSE + 0x05) /*!< Error not enough unused key blocks available */
  22. /**
  23. * @brief Type definition for an eFuse field
  24. */
  25. typedef struct {
  26. esp_efuse_block_t efuse_block: 8; /**< Block of eFuse */
  27. uint8_t bit_start; /**< Start bit [0..255] */
  28. uint16_t bit_count; /**< Length of bit field [1..-]*/
  29. } esp_efuse_desc_t;
  30. /**
  31. * @brief Type definition for ROM log scheme
  32. */
  33. typedef enum {
  34. ESP_EFUSE_ROM_LOG_ALWAYS_ON, /**< Always enable ROM logging */
  35. ESP_EFUSE_ROM_LOG_ON_GPIO_LOW, /**< ROM logging is enabled when specific GPIO level is low during start up */
  36. ESP_EFUSE_ROM_LOG_ON_GPIO_HIGH, /**< ROM logging is enabled when specific GPIO level is high during start up */
  37. ESP_EFUSE_ROM_LOG_ALWAYS_OFF /**< Disable ROM logging permanently */
  38. } esp_efuse_rom_log_scheme_t;
  39. /**
  40. * @brief Reads bits from EFUSE field and writes it into an array.
  41. *
  42. * The number of read bits will be limited to the minimum value
  43. * from the description of the bits in "field" structure or "dst_size_bits" required size.
  44. * Use "esp_efuse_get_field_size()" function to determine the length of the field.
  45. *
  46. * @note Please note that reading in the batch mode does not show uncommitted changes.
  47. *
  48. * @param[in] field A pointer to the structure describing the fields of efuse.
  49. * @param[out] dst A pointer to array that will contain the result of reading.
  50. * @param[in] dst_size_bits The number of bits required to read.
  51. * If the requested number of bits is greater than the field,
  52. * the number will be limited to the field size.
  53. *
  54. * @return
  55. * - ESP_OK: The operation was successfully completed.
  56. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  57. */
  58. esp_err_t esp_efuse_read_field_blob(const esp_efuse_desc_t* field[], void* dst, size_t dst_size_bits);
  59. /**
  60. * @brief Read a single bit eFuse field as a boolean value.
  61. *
  62. * @note The value must exist and must be a single bit wide. If there is any possibility of an error
  63. * in the provided arguments, call esp_efuse_read_field_blob() and check the returned value instead.
  64. *
  65. * @note If assertions are enabled and the parameter is invalid, execution will abort
  66. * @note Please note that reading in the batch mode does not show uncommitted changes.
  67. *
  68. * @param[in] field A pointer to the structure describing the fields of efuse.
  69. * @return
  70. * - true: The field parameter is valid and the bit is set.
  71. * - false: The bit is not set, or the parameter is invalid and assertions are disabled.
  72. *
  73. */
  74. bool esp_efuse_read_field_bit(const esp_efuse_desc_t *field[]);
  75. /**
  76. * @brief Reads bits from EFUSE field and returns number of bits programmed as "1".
  77. *
  78. * If the bits are set not sequentially, they will still be counted.
  79. * @note Please note that reading in the batch mode does not show uncommitted changes.
  80. *
  81. * @param[in] field A pointer to the structure describing the fields of efuse.
  82. * @param[out] out_cnt A pointer that will contain the number of programmed as "1" bits.
  83. *
  84. * @return
  85. * - ESP_OK: The operation was successfully completed.
  86. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  87. */
  88. esp_err_t esp_efuse_read_field_cnt(const esp_efuse_desc_t* field[], size_t* out_cnt);
  89. /**
  90. * @brief Writes array to EFUSE field.
  91. *
  92. * The number of write bits will be limited to the minimum value
  93. * from the description of the bits in "field" structure or "src_size_bits" required size.
  94. * Use "esp_efuse_get_field_size()" function to determine the length of the field.
  95. * After the function is completed, the writing registers are cleared.
  96. * @param[in] field A pointer to the structure describing the fields of efuse.
  97. * @param[in] src A pointer to array that contains the data for writing.
  98. * @param[in] src_size_bits The number of bits required to write.
  99. *
  100. * @return
  101. * - ESP_OK: The operation was successfully completed.
  102. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  103. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  104. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  105. */
  106. esp_err_t esp_efuse_write_field_blob(const esp_efuse_desc_t* field[], const void* src, size_t src_size_bits);
  107. /**
  108. * @brief Writes a required count of bits as "1" to EFUSE field.
  109. *
  110. * If there are no free bits in the field to set the required number of bits to "1",
  111. * ESP_ERR_EFUSE_CNT_IS_FULL error is returned, the field will not be partially recorded.
  112. * After the function is completed, the writing registers are cleared.
  113. * @param[in] field A pointer to the structure describing the fields of efuse.
  114. * @param[in] cnt Required number of programmed as "1" bits.
  115. *
  116. * @return
  117. * - ESP_OK: The operation was successfully completed.
  118. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  119. * - ESP_ERR_EFUSE_CNT_IS_FULL: Not all requested cnt bits is set.
  120. */
  121. esp_err_t esp_efuse_write_field_cnt(const esp_efuse_desc_t* field[], size_t cnt);
  122. /**
  123. * @brief Write a single bit eFuse field to 1
  124. *
  125. * For use with eFuse fields that are a single bit. This function will write the bit to value 1 if
  126. * it is not already set, or does nothing if the bit is already set.
  127. *
  128. * This is equivalent to calling esp_efuse_write_field_cnt() with the cnt parameter equal to 1,
  129. * except that it will return ESP_OK if the field is already set to 1.
  130. *
  131. * @param[in] field Pointer to the structure describing the efuse field.
  132. *
  133. * @return
  134. * - ESP_OK: The operation was successfully completed, or the bit was already set to value 1.
  135. * - ESP_ERR_INVALID_ARG: Error in the passed arugments, including if the efuse field is not 1 bit wide.
  136. */
  137. esp_err_t esp_efuse_write_field_bit(const esp_efuse_desc_t* field[]);
  138. /**
  139. * @brief Sets a write protection for the whole block.
  140. *
  141. * After that, it is impossible to write to this block.
  142. * The write protection does not apply to block 0.
  143. * @param[in] blk Block number of eFuse. (EFUSE_BLK1, EFUSE_BLK2 and EFUSE_BLK3)
  144. *
  145. * @return
  146. * - ESP_OK: The operation was successfully completed.
  147. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  148. * - ESP_ERR_EFUSE_CNT_IS_FULL: Not all requested cnt bits is set.
  149. * - ESP_ERR_NOT_SUPPORTED: The block does not support this command.
  150. */
  151. esp_err_t esp_efuse_set_write_protect(esp_efuse_block_t blk);
  152. /**
  153. * @brief Sets a read protection for the whole block.
  154. *
  155. * After that, it is impossible to read from this block.
  156. * The read protection does not apply to block 0.
  157. * @param[in] blk Block number of eFuse. (EFUSE_BLK1, EFUSE_BLK2 and EFUSE_BLK3)
  158. *
  159. * @return
  160. * - ESP_OK: The operation was successfully completed.
  161. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  162. * - ESP_ERR_EFUSE_CNT_IS_FULL: Not all requested cnt bits is set.
  163. * - ESP_ERR_NOT_SUPPORTED: The block does not support this command.
  164. */
  165. esp_err_t esp_efuse_set_read_protect(esp_efuse_block_t blk);
  166. /**
  167. * @brief Returns the number of bits used by field.
  168. *
  169. * @param[in] field A pointer to the structure describing the fields of efuse.
  170. *
  171. * @return Returns the number of bits used by field.
  172. */
  173. int esp_efuse_get_field_size(const esp_efuse_desc_t* field[]);
  174. /**
  175. * @brief Returns value of efuse register.
  176. *
  177. * This is a thread-safe implementation.
  178. * Example: EFUSE_BLK2_RDATA3_REG where (blk=2, num_reg=3)
  179. * @note Please note that reading in the batch mode does not show uncommitted changes.
  180. *
  181. * @param[in] blk Block number of eFuse.
  182. * @param[in] num_reg The register number in the block.
  183. *
  184. * @return Value of register
  185. */
  186. uint32_t esp_efuse_read_reg(esp_efuse_block_t blk, unsigned int num_reg);
  187. /**
  188. * @brief Write value to efuse register.
  189. *
  190. * Apply a coding scheme if necessary.
  191. * This is a thread-safe implementation.
  192. * Example: EFUSE_BLK3_WDATA0_REG where (blk=3, num_reg=0)
  193. * @param[in] blk Block number of eFuse.
  194. * @param[in] num_reg The register number in the block.
  195. * @param[in] val Value to write.
  196. *
  197. * @return
  198. * - ESP_OK: The operation was successfully completed.
  199. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  200. */
  201. esp_err_t esp_efuse_write_reg(esp_efuse_block_t blk, unsigned int num_reg, uint32_t val);
  202. /**
  203. * @brief Return efuse coding scheme for blocks.
  204. *
  205. * Note: The coding scheme is applicable only to 1, 2 and 3 blocks. For 0 block, the coding scheme is always ``NONE``.
  206. *
  207. * @param[in] blk Block number of eFuse.
  208. * @return Return efuse coding scheme for blocks
  209. */
  210. esp_efuse_coding_scheme_t esp_efuse_get_coding_scheme(esp_efuse_block_t blk);
  211. /**
  212. * @brief Read key to efuse block starting at the offset and the required size.
  213. *
  214. * @note Please note that reading in the batch mode does not show uncommitted changes.
  215. *
  216. * @param[in] blk Block number of eFuse.
  217. * @param[in] dst_key A pointer to array that will contain the result of reading.
  218. * @param[in] offset_in_bits Start bit in block.
  219. * @param[in] size_bits The number of bits required to read.
  220. *
  221. * @return
  222. * - ESP_OK: The operation was successfully completed.
  223. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  224. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  225. */
  226. esp_err_t esp_efuse_read_block(esp_efuse_block_t blk, void* dst_key, size_t offset_in_bits, size_t size_bits);
  227. /**
  228. * @brief Write key to efuse block starting at the offset and the required size.
  229. *
  230. * @param[in] blk Block number of eFuse.
  231. * @param[in] src_key A pointer to array that contains the key for writing.
  232. * @param[in] offset_in_bits Start bit in block.
  233. * @param[in] size_bits The number of bits required to write.
  234. *
  235. * @return
  236. * - ESP_OK: The operation was successfully completed.
  237. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  238. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  239. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits
  240. */
  241. esp_err_t esp_efuse_write_block(esp_efuse_block_t blk, const void* src_key, size_t offset_in_bits, size_t size_bits);
  242. /**
  243. * @brief Returns chip version from efuse
  244. *
  245. * @return chip version
  246. */
  247. uint8_t esp_efuse_get_chip_ver(void);
  248. /**
  249. * @brief Returns chip package from efuse
  250. *
  251. * @return chip package
  252. */
  253. uint32_t esp_efuse_get_pkg_ver(void);
  254. /**
  255. * @brief Permanently update values written to the efuse write registers
  256. *
  257. * After updating EFUSE_BLKx_WDATAx_REG registers with new values to
  258. * write, call this function to permanently write them to efuse.
  259. *
  260. * @note Setting bits in efuse is permanent, they cannot be unset.
  261. *
  262. * @note Due to this restriction you don't need to copy values to
  263. * Efuse write registers from the matching read registers, bits which
  264. * are set in the read register but unset in the matching write
  265. * register will be unchanged when new values are burned.
  266. *
  267. * @note This function is not threadsafe, if calling code updates
  268. * efuse values from multiple tasks then this is caller's
  269. * responsibility to serialise.
  270. *
  271. * After burning new efuses, the read registers are updated to match
  272. * the new efuse values.
  273. */
  274. void esp_efuse_burn_new_values(void);
  275. /**
  276. * @brief Reset efuse write registers
  277. *
  278. * Efuse write registers are written to zero, to negate
  279. * any changes that have been staged here.
  280. *
  281. * @note This function is not threadsafe, if calling code updates
  282. * efuse values from multiple tasks then this is caller's
  283. * responsibility to serialise.
  284. */
  285. void esp_efuse_reset(void);
  286. #ifdef CONFIG_IDF_TARGET_ESP32
  287. /**
  288. * @brief Disable BASIC ROM Console via efuse
  289. *
  290. * By default, if booting from flash fails the ESP32 will boot a
  291. * BASIC console in ROM.
  292. *
  293. * Call this function (from bootloader or app) to permanently disable the console on this chip.
  294. *
  295. */
  296. void esp_efuse_disable_basic_rom_console(void);
  297. #endif
  298. /**
  299. * @brief Disable ROM Download Mode via eFuse
  300. *
  301. * Permanently disables the ROM Download Mode feature. Once disabled, if the SoC is booted with
  302. * strapping pins set for ROM Download Mode then an error is printed instead.
  303. *
  304. * @note Not all SoCs support this option. An error will be returned if called on an ESP32
  305. * with a silicon revision lower than 3, as these revisions do not support this option.
  306. *
  307. * @note If ROM Download Mode is already disabled, this function does nothing and returns success.
  308. *
  309. * @return
  310. * - ESP_OK If the eFuse was successfully burned, or had already been burned.
  311. * - ESP_ERR_NOT_SUPPORTED (ESP32 only) This SoC is not capable of disabling UART download mode
  312. * - ESP_ERR_INVALID_STATE (ESP32 only) This eFuse is write protected and cannot be written
  313. */
  314. esp_err_t esp_efuse_disable_rom_download_mode(void);
  315. /**
  316. * @brief Set boot ROM log scheme via eFuse
  317. *
  318. * @note By default, the boot ROM will always print to console. This API can be called to set the log scheme only once per chip,
  319. * once the value is changed from the default it can't be changed again.
  320. *
  321. * @param log_scheme Supported ROM log scheme
  322. * @return
  323. * - ESP_OK If the eFuse was successfully burned, or had already been burned.
  324. * - ESP_ERR_NOT_SUPPORTED (ESP32 only) This SoC is not capable of setting ROM log scheme
  325. * - ESP_ERR_INVALID_STATE This eFuse is write protected or has been burned already
  326. */
  327. esp_err_t esp_efuse_set_rom_log_scheme(esp_efuse_rom_log_scheme_t log_scheme);
  328. #if SOC_SUPPORTS_SECURE_DL_MODE
  329. /**
  330. * @brief Switch ROM Download Mode to Secure Download mode via eFuse
  331. *
  332. * Permanently enables Secure Download mode. This mode limits the use of ROM Download Mode functions
  333. * to simple flash read, write and erase operations, plus a command to return a summary of currently
  334. * enabled security features.
  335. *
  336. * @note If Secure Download mode is already enabled, this function does nothing and returns success.
  337. *
  338. * @note Disabling the ROM Download Mode also disables Secure Download Mode.
  339. *
  340. * @return
  341. * - ESP_OK If the eFuse was successfully burned, or had already been burned.
  342. * - ESP_ERR_INVALID_STATE ROM Download Mode has been disabled via eFuse, so Secure Download mode is unavailable.
  343. */
  344. esp_err_t esp_efuse_enable_rom_secure_download_mode(void);
  345. #endif
  346. /**
  347. * @brief Write random data to efuse key block write registers
  348. *
  349. * @note Caller is responsible for ensuring efuse
  350. * block is empty and not write protected, before calling.
  351. *
  352. * @note Behaviour depends on coding scheme: a 256-bit key is
  353. * generated and written for Coding Scheme "None", a 192-bit key
  354. * is generated, extended to 256-bits by the Coding Scheme,
  355. * and then writtten for 3/4 Coding Scheme.
  356. *
  357. * @note This function does not burn the new values, caller should
  358. * call esp_efuse_burn_new_values() when ready to do this.
  359. *
  360. * @param blk_wdata0_reg Address of the first data write register
  361. * in the block
  362. */
  363. void esp_efuse_write_random_key(uint32_t blk_wdata0_reg);
  364. /**
  365. * @brief Return secure_version from efuse field.
  366. * @return Secure version from efuse field
  367. */
  368. uint32_t esp_efuse_read_secure_version(void);
  369. /**
  370. * @brief Check secure_version from app and secure_version and from efuse field.
  371. *
  372. * @param secure_version Secure version from app.
  373. * @return
  374. * - True: If version of app is equal or more then secure_version from efuse.
  375. */
  376. bool esp_efuse_check_secure_version(uint32_t secure_version);
  377. /**
  378. * @brief Write efuse field by secure_version value.
  379. *
  380. * Update the secure_version value is available if the coding scheme is None.
  381. * Note: Do not use this function in your applications. This function is called as part of the other API.
  382. *
  383. * @param[in] secure_version Secure version from app.
  384. * @return
  385. * - ESP_OK: Successful.
  386. * - ESP_FAIL: secure version of app cannot be set to efuse field.
  387. * - ESP_ERR_NOT_SUPPORTED: Anti rollback is not supported with the 3/4 and Repeat coding scheme.
  388. */
  389. esp_err_t esp_efuse_update_secure_version(uint32_t secure_version);
  390. /**
  391. * @brief Initializes variables: offset and size to simulate the work of an eFuse.
  392. *
  393. * Note: To simulate the work of an eFuse need to set CONFIG_BOOTLOADER_EFUSE_SECURE_VERSION_EMULATE option
  394. * and to add in the partition.csv file a line `efuse_em, data, efuse, , 0x2000,`.
  395. *
  396. * @param[in] offset The starting address of the partition where the eFuse data will be located.
  397. * @param[in] size The size of the partition.
  398. */
  399. void esp_efuse_init(uint32_t offset, uint32_t size);
  400. /**
  401. * @brief Set the batch mode of writing fields.
  402. *
  403. * This mode allows you to write the fields in the batch mode when need to burn several efuses at one time.
  404. * To enable batch mode call begin() then perform as usually the necessary operations
  405. * read and write and at the end call commit() to actually burn all written efuses.
  406. * The batch mode can be used nested. The commit will be done by the last commit() function.
  407. * The number of begin() functions should be equal to the number of commit() functions.
  408. *
  409. * @note Please note that reading in the batch mode does not show uncommitted changes.
  410. *
  411. * Note: If batch mode is enabled by the first task, at this time the second task cannot write/read efuses.
  412. * The second task will wait for the first task to complete the batch operation.
  413. *
  414. * \code{c}
  415. * // Example of using the batch writing mode.
  416. *
  417. * // set the batch writing mode
  418. * esp_efuse_batch_write_begin();
  419. *
  420. * // use any writing functions as usual
  421. * esp_efuse_write_field_blob(ESP_EFUSE_...);
  422. * esp_efuse_write_field_cnt(ESP_EFUSE_...);
  423. * esp_efuse_set_write_protect(EFUSE_BLKx);
  424. * esp_efuse_write_reg(EFUSE_BLKx, ...);
  425. * esp_efuse_write_block(EFUSE_BLKx, ...);
  426. * esp_efuse_write(ESP_EFUSE_1, 3); // ESP_EFUSE_1 == 1, here we write a new value = 3. The changes will be burn by the commit() function.
  427. * esp_efuse_read_...(ESP_EFUSE_1); // this function returns ESP_EFUSE_1 == 1 because uncommitted changes are not readable, it will be available only after commit.
  428. * ...
  429. *
  430. * // esp_efuse_batch_write APIs can be called recursively.
  431. * esp_efuse_batch_write_begin();
  432. * esp_efuse_set_write_protect(EFUSE_BLKx);
  433. * esp_efuse_batch_write_commit(); // the burn will be skipped here, it will be done in the last commit().
  434. *
  435. * ...
  436. *
  437. * // Write all of these fields to the efuse registers
  438. * esp_efuse_batch_write_commit();
  439. * esp_efuse_read_...(ESP_EFUSE_1); // this function returns ESP_EFUSE_1 == 3.
  440. *
  441. * \endcode
  442. *
  443. * @return
  444. * - ESP_OK: Successful.
  445. */
  446. esp_err_t esp_efuse_batch_write_begin(void);
  447. /**
  448. * @brief Reset the batch mode of writing fields.
  449. *
  450. * It will reset the batch writing mode and any written changes.
  451. *
  452. * @return
  453. * - ESP_OK: Successful.
  454. * - ESP_ERR_INVALID_STATE: Tha batch mode was not set.
  455. */
  456. esp_err_t esp_efuse_batch_write_cancel(void);
  457. /**
  458. * @brief Writes all prepared data for the batch mode.
  459. *
  460. * Must be called to ensure changes are written to the efuse registers.
  461. * After this the batch writing mode will be reset.
  462. *
  463. * @return
  464. * - ESP_OK: Successful.
  465. * - ESP_ERR_INVALID_STATE: The deferred writing mode was not set.
  466. */
  467. esp_err_t esp_efuse_batch_write_commit(void);
  468. /**
  469. * @brief Checks that the given block is empty.
  470. *
  471. * @return
  472. * - True: The block is empty.
  473. * - False: The block is not empty or was an error.
  474. */
  475. bool esp_efuse_block_is_empty(esp_efuse_block_t block);
  476. /**
  477. * @brief Returns a read protection for the key block.
  478. *
  479. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  480. *
  481. * @return True: The key block is read protected
  482. * False: The key block is readable.
  483. */
  484. bool esp_efuse_get_key_dis_read(esp_efuse_block_t block);
  485. /**
  486. * @brief Sets a read protection for the key block.
  487. *
  488. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  489. *
  490. * @return
  491. * - ESP_OK: Successful.
  492. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  493. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  494. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  495. */
  496. esp_err_t esp_efuse_set_key_dis_read(esp_efuse_block_t block);
  497. /**
  498. * @brief Returns a write protection for the key block.
  499. *
  500. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  501. *
  502. * @return True: The key block is write protected
  503. * False: The key block is writeable.
  504. */
  505. bool esp_efuse_get_key_dis_write(esp_efuse_block_t block);
  506. /**
  507. * @brief Sets a write protection for the key block.
  508. *
  509. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  510. *
  511. * @return
  512. * - ESP_OK: Successful.
  513. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  514. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  515. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  516. */
  517. esp_err_t esp_efuse_set_key_dis_write(esp_efuse_block_t block);
  518. /**
  519. * @brief Returns true if the key block is unused, false otherwise.
  520. *
  521. * An unused key block is all zero content, not read or write protected,
  522. * and has purpose 0 (ESP_EFUSE_KEY_PURPOSE_USER)
  523. *
  524. * @param block key block to check.
  525. *
  526. * @return
  527. * - True if key block is unused,
  528. * - False if key block is used or the specified block index is not a key block.
  529. */
  530. bool esp_efuse_key_block_unused(esp_efuse_block_t block);
  531. #ifndef CONFIG_IDF_TARGET_ESP32
  532. /**
  533. * @brief Type of key purpose
  534. */
  535. typedef enum {
  536. ESP_EFUSE_KEY_PURPOSE_USER = 0,
  537. ESP_EFUSE_KEY_PURPOSE_RESERVED = 1,
  538. ESP_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_1 = 2,
  539. ESP_EFUSE_KEY_PURPOSE_XTS_AES_256_KEY_2 = 3,
  540. ESP_EFUSE_KEY_PURPOSE_XTS_AES_128_KEY = 4,
  541. ESP_EFUSE_KEY_PURPOSE_HMAC_DOWN_ALL = 5,
  542. ESP_EFUSE_KEY_PURPOSE_HMAC_DOWN_JTAG = 6,
  543. ESP_EFUSE_KEY_PURPOSE_HMAC_DOWN_DIGITAL_SIGNATURE = 7,
  544. ESP_EFUSE_KEY_PURPOSE_HMAC_UP = 8,
  545. ESP_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST0 = 9,
  546. ESP_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST1 = 10,
  547. ESP_EFUSE_KEY_PURPOSE_SECURE_BOOT_DIGEST2 = 11,
  548. ESP_EFUSE_KEY_PURPOSE_MAX,
  549. } esp_efuse_purpose_t;
  550. /**
  551. * @brief Returns a pointer to a key purpose for an efuse key block.
  552. *
  553. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  554. *
  555. * To get the value of this field use esp_efuse_read_field_blob() or esp_efuse_get_key_purpose().
  556. *
  557. * @return Pointer: If Successful returns a pointer to the corresponding efuse field otherwise NULL.
  558. */
  559. const esp_efuse_desc_t **esp_efuse_get_purpose_field(esp_efuse_block_t block);
  560. /**
  561. * @brief Returns a pointer to a key block.
  562. *
  563. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  564. *
  565. * @return Pointer: If Successful returns a pointer to the corresponding efuse field otherwise NULL.
  566. */
  567. const esp_efuse_desc_t** esp_efuse_get_key(esp_efuse_block_t block);
  568. /**
  569. * @brief Returns the current purpose set for an efuse key block.
  570. *
  571. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  572. *
  573. * @return
  574. * - Value: If Successful, it returns the value of the purpose related to the given key block.
  575. * - ESP_EFUSE_KEY_PURPOSE_MAX: Otherwise.
  576. */
  577. esp_efuse_purpose_t esp_efuse_get_key_purpose(esp_efuse_block_t block);
  578. /**
  579. * @brief Sets a key purpose for an efuse key block.
  580. *
  581. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  582. * @param[in] purpose Key purpose.
  583. *
  584. * @return
  585. * - ESP_OK: Successful.
  586. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  587. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  588. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  589. */
  590. esp_err_t esp_efuse_set_key_purpose(esp_efuse_block_t block, esp_efuse_purpose_t purpose);
  591. /**
  592. * @brief Returns a write protection of the key purpose field for an efuse key block.
  593. *
  594. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  595. *
  596. * @return True: The key purpose is write protected.
  597. * False: The key purpose is writeable.
  598. */
  599. bool esp_efuse_get_keypurpose_dis_write(esp_efuse_block_t block);
  600. /**
  601. * @brief Sets a write protection of the key purpose field for an efuse key block.
  602. *
  603. * @param[in] block A key block in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  604. *
  605. * @return
  606. * - ESP_OK: Successful.
  607. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  608. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  609. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  610. */
  611. esp_err_t esp_efuse_set_keypurpose_dis_write(esp_efuse_block_t block);
  612. /**
  613. * @brief Find a key block with the particular purpose set.
  614. *
  615. * @param[in] purpose Purpose to search for.
  616. * @param[out] block Pointer in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX which will be set to the key block if found.
  617. * Can be NULL, if only need to test the key block exists.
  618. *
  619. * @return
  620. * - True: If found,
  621. * - False: If not found (value at block pointer is unchanged).
  622. */
  623. bool esp_efuse_find_purpose(esp_efuse_purpose_t purpose, esp_efuse_block_t *block);
  624. /**
  625. * @brief Search for an unused key block and return the first one found.
  626. *
  627. * See esp_efuse_key_block_unused for a description of an unused key block.
  628. *
  629. * @return First unused key block, or EFUSE_BLK_KEY_MAX if no unused key block is found.
  630. */
  631. esp_efuse_block_t esp_efuse_find_unused_key_block(void);
  632. /**
  633. * @brief Return the number of unused efuse key blocks in the range EFUSE_BLK_KEY0..EFUSE_BLK_KEY_MAX
  634. */
  635. unsigned esp_efuse_count_unused_key_blocks(void);
  636. /**
  637. * @brief Returns the status of the Secure Boot public key digest revocation bit.
  638. *
  639. * @param[in] num_digest The number of digest in range 0..2
  640. *
  641. * @return
  642. * - True: If key digest is revoked,
  643. * - False; If key digest is not revoked.
  644. */
  645. bool esp_efuse_get_digest_revoke(unsigned num_digest);
  646. /**
  647. * @brief Sets the Secure Boot public key digest revocation bit.
  648. *
  649. * @param[in] num_digest The number of digest in range 0..2
  650. *
  651. * @return
  652. * - ESP_OK: Successful.
  653. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  654. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  655. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  656. */
  657. esp_err_t esp_efuse_set_digest_revoke(unsigned num_digest);
  658. /**
  659. * @brief Returns a write protection of the Secure Boot public key digest revocation bit.
  660. *
  661. * @param[in] num_digest The number of digest in range 0..2
  662. *
  663. * @return True: The revocation bit is write protected.
  664. * False: The revocation bit is writeable.
  665. */
  666. bool esp_efuse_get_write_protect_of_digest_revoke(unsigned num_digest);
  667. /**
  668. * @brief Sets a write protection of the Secure Boot public key digest revocation bit.
  669. *
  670. * @param[in] num_digest The number of digest in range 0..2
  671. *
  672. * @return
  673. * - ESP_OK: Successful.
  674. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  675. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  676. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  677. */
  678. esp_err_t esp_efuse_set_write_protect_of_digest_revoke(unsigned num_digest);
  679. /**
  680. * @brief Program a block of key data to an efuse block
  681. *
  682. * The burn of a key, protection bits, and a purpose happens in batch mode.
  683. *
  684. * @param[in] block Block to read purpose for. Must be in range EFUSE_BLK_KEY0 to EFUSE_BLK_KEY_MAX. Key block must be unused (esp_efuse_key_block_unused).
  685. * @param[in] purpose Purpose to set for this key. Purpose must be already unset.
  686. * @param[in] key Pointer to data to write.
  687. * @param[in] key_size_bytes Bytes length of data to write.
  688. *
  689. * @return
  690. * - ESP_OK: Successful.
  691. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  692. * - ESP_ERR_INVALID_STATE: Error in efuses state, unused block not found.
  693. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  694. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  695. */
  696. esp_err_t esp_efuse_write_key(esp_efuse_block_t block, esp_efuse_purpose_t purpose, const void *key, size_t key_size_bytes);
  697. /**
  698. * @brief Program keys to unused efuse blocks
  699. *
  700. * The burn of keys, protection bits, and purposes happens in batch mode.
  701. *
  702. * @param[in] purposes Array of purposes (purpose[number_of_keys]).
  703. * @param[in] keys Array of keys (uint8_t keys[number_of_keys][32]). Each key is 32 bytes long.
  704. * @param[in] number_of_keys The number of keys to write (up to 6 keys).
  705. *
  706. * @return
  707. * - ESP_OK: Successful.
  708. * - ESP_ERR_INVALID_ARG: Error in the passed arguments.
  709. * - ESP_ERR_INVALID_STATE: Error in efuses state, unused block not found.
  710. * - ESP_ERR_NOT_ENOUGH_UNUSED_KEY_BLOCKS: Error not enough unused key blocks available
  711. * - ESP_ERR_EFUSE_REPEATED_PROG: Error repeated programming of programmed bits is strictly forbidden.
  712. * - ESP_ERR_CODING: Error range of data does not match the coding scheme.
  713. */
  714. esp_err_t esp_efuse_write_keys(esp_efuse_purpose_t purposes[], uint8_t keys[][32], unsigned number_of_keys);
  715. #endif // not CONFIG_IDF_TARGET_ESP32
  716. #ifdef __cplusplus
  717. }
  718. #endif