/* Static functions to return register address & mask for clk_en / rst of each peripheral */
static uint32_t get_clk_en_mask(periph_module_t periph);
-static uint32_t get_rst_en_mask(periph_module_t periph);
+static uint32_t get_rst_en_mask(periph_module_t periph, bool enable);
static uint32_t get_clk_en_reg(periph_module_t periph);
static uint32_t get_rst_en_reg(periph_module_t periph);
{
portENTER_CRITICAL(&periph_spinlock);
DPORT_SET_PERI_REG_MASK(get_clk_en_reg(periph), get_clk_en_mask(periph));
- DPORT_CLEAR_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph));
+ DPORT_CLEAR_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph, true));
portEXIT_CRITICAL(&periph_spinlock);
}
{
portENTER_CRITICAL(&periph_spinlock);
DPORT_CLEAR_PERI_REG_MASK(get_clk_en_reg(periph), get_clk_en_mask(periph));
- DPORT_SET_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph));
+ DPORT_SET_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph, false));
portEXIT_CRITICAL(&periph_spinlock);
}
void periph_module_reset(periph_module_t periph)
{
portENTER_CRITICAL(&periph_spinlock);
- DPORT_SET_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph));
- DPORT_CLEAR_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph));
+ DPORT_SET_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph, false));
+ DPORT_CLEAR_PERI_REG_MASK(get_rst_en_reg(periph), get_rst_en_mask(periph, false));
portEXIT_CRITICAL(&periph_spinlock);
}
return DPORT_BT_BASEBAND_EN;
case PERIPH_BT_LC_MODULE:
return DPORT_BT_LC_EN;
+ case PERIPH_AES_MODULE:
+ return DPORT_PERI_EN_AES;
+ case PERIPH_SHA_MODULE:
+ return DPORT_PERI_EN_SHA;
+ case PERIPH_RSA_MODULE:
+ return DPORT_PERI_EN_RSA;
default:
return 0;
}
}
-static uint32_t get_rst_en_mask(periph_module_t periph)
+static uint32_t get_rst_en_mask(periph_module_t periph, bool enable)
{
switch(periph) {
case PERIPH_RMT_MODULE:
return DPORT_CAN_RST;
case PERIPH_EMAC_MODULE:
return DPORT_EMAC_RST;
+ case PERIPH_AES_MODULE:
+ if (enable == true) {
+ // Clear reset on digital signature & secure boot units, otherwise AES unit is held in reset also.
+ return (DPORT_PERI_EN_AES | DPORT_PERI_EN_DIGITAL_SIGNATURE | DPORT_PERI_EN_SECUREBOOT);
+ } else {
+ //Don't return other units to reset, as this pulls reset on RSA & SHA units, respectively.
+ return DPORT_PERI_EN_AES;
+ }
+ case PERIPH_SHA_MODULE:
+ if (enable == true) {
+ // Clear reset on secure boot, otherwise SHA is held in reset
+ return (DPORT_PERI_EN_SHA | DPORT_PERI_EN_SECUREBOOT);
+ } else {
+ // Don't assert reset on secure boot, otherwise AES is held in reset
+ return DPORT_PERI_EN_SHA;
+ }
+ case PERIPH_RSA_MODULE:
+ if (enable == true) {
+ // Also clear reset on digital signature, otherwise RSA is held in reset
+ return (DPORT_PERI_EN_RSA | DPORT_PERI_EN_DIGITAL_SIGNATURE);
+ } else {
+ // Don't reset digital signature unit, as this resets AES also
+ return DPORT_PERI_EN_RSA;
+ }
case PERIPH_WIFI_MODULE:
case PERIPH_BT_MODULE:
case PERIPH_WIFI_BT_COMMON_MODULE:
static uint32_t get_clk_en_reg(periph_module_t periph)
{
- return is_wifi_clk_peripheral(periph) ? DPORT_WIFI_CLK_EN_REG : DPORT_PERIP_CLK_EN_REG;
+ if (periph == PERIPH_AES_MODULE || periph == PERIPH_SHA_MODULE || periph == PERIPH_RSA_MODULE) {
+ return DPORT_PERI_CLK_EN_REG;
+ } else {
+ return is_wifi_clk_peripheral(periph) ? DPORT_WIFI_CLK_EN_REG : DPORT_PERIP_CLK_EN_REG;
+ }
}
static uint32_t get_rst_en_reg(periph_module_t periph)
{
- return is_wifi_clk_peripheral(periph) ? DPORT_CORE_RST_EN_REG : DPORT_PERIP_RST_EN_REG;
+ if (periph == PERIPH_AES_MODULE || periph == PERIPH_SHA_MODULE || periph == PERIPH_RSA_MODULE) {
+ return DPORT_PERI_RST_EN_REG;
+ } else {
+ return is_wifi_clk_peripheral(periph) ? DPORT_CORE_RST_EN_REG : DPORT_PERIP_RST_EN_REG;
+ }
}
--- /dev/null
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include "esp_types.h"
+#include "esp_clk.h"
+
+#include "freertos/FreeRTOS.h"
+#include "freertos/task.h"
+#include "freertos/semphr.h"
+#include "freertos/xtensa_timer.h"
+#include "soc/cpu.h"
+#include "unity.h"
+#include "rom/uart.h"
+#include "rom/sha.h"
+#include "soc/uart_reg.h"
+#include "soc/dport_reg.h"
+#include "soc/rtc.h"
+#include "esp_log.h"
+#include "mbedtls/sha256.h"
+#include "hwcrypto/sha.h"
+#include "hwcrypto/aes.h"
+#include "mbedtls/rsa.h"
+
+static const char *TAG = "test";
+static volatile bool exit_flag = false;
+#define TASK_STACK_SIZE (8*1024)
+
+static void aes_task(void *pvParameters)
+{
+ xSemaphoreHandle *sema = (xSemaphoreHandle *) pvParameters;
+ ESP_LOGI(TAG, "aes_task is started");
+ esp_aes_context ctx = {
+ .key_bytes = 16,
+ .key = {101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116}
+ };
+ const unsigned char input[16] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16};
+ unsigned char output[16];
+ unsigned char output2[16];
+ while (exit_flag == false) {
+ memset(output, 0, sizeof(output));
+ memset(output, 0, sizeof(output2));
+ esp_internal_aes_encrypt(&ctx, input, output);
+ esp_internal_aes_decrypt(&ctx, output, output2);
+ TEST_ASSERT_EQUAL_MEMORY_MESSAGE(input, output2, sizeof(input), "AES must match");
+ }
+ xSemaphoreGive(*sema);
+ vTaskDelete(NULL);
+}
+
+static void sha_task(void *pvParameters)
+{
+ xSemaphoreHandle *sema = (xSemaphoreHandle *) pvParameters;
+ ESP_LOGI(TAG, "sha_task is started");
+ const char *input = "Space!#$%&()*+,-.0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_abcdefghijklmnopqrstuvwxyz~DEL0123456789";
+ unsigned char output[64];
+ unsigned char output_origin[64];
+ esp_sha(SHA2_512, (const unsigned char *)input, sizeof(input), output);
+ memcpy(output_origin, output, sizeof(output));
+ while (exit_flag == false) {
+ memset(output, 0, sizeof(output));
+ esp_sha(SHA2_512, (const unsigned char *)input, sizeof(input), output);
+ TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "SHA256 must match");
+ }
+ xSemaphoreGive(*sema);
+ vTaskDelete(NULL);
+}
+
+static void mbedtls_sha256_task(void *pvParameters)
+{
+ xSemaphoreHandle *sema = (xSemaphoreHandle *) pvParameters;
+ ESP_LOGI(TAG, "mbedtls_sha256_task is started");
+ const char *input = "@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_abcdefghijklmnopqrstuvwxyz~DEL0123456789Space!#$%&()*+,-.0123456789:;<=>?";
+ mbedtls_sha256_context sha256_ctx;
+ unsigned char output[32];
+ unsigned char output_origin[32];
+
+ mbedtls_sha256_init(&sha256_ctx);
+ memset(output, 0, sizeof(output));
+ mbedtls_sha256_starts_ret(&sha256_ctx, false);
+ for (int i = 0; i < 3; ++i) {
+ mbedtls_sha256_update_ret(&sha256_ctx, (unsigned char *)input, 100);
+ }
+ mbedtls_sha256_finish_ret(&sha256_ctx, output);
+ memcpy(output_origin, output, sizeof(output));
+
+ while (exit_flag == false) {
+ mbedtls_sha256_init(&sha256_ctx);
+ memset(output, 0, sizeof(output));
+ mbedtls_sha256_starts_ret(&sha256_ctx, false);
+ for (int i = 0; i < 3; ++i) {
+ mbedtls_sha256_update_ret(&sha256_ctx, (unsigned char *)input, 100);
+ }
+ mbedtls_sha256_finish_ret(&sha256_ctx, output);
+
+ TEST_ASSERT_EQUAL_MEMORY_MESSAGE(output, output_origin, sizeof(output), "MBEDTLS SHA256 must match");
+ }
+ xSemaphoreGive(*sema);
+ vTaskDelete(NULL);
+}
+
+TEST_CASE("Test shared using AES SHA512 SHA256", "[hw_crypto]")
+{
+#ifndef CONFIG_FREERTOS_UNICORE
+ const int max_tasks = 6;
+#else
+ const int max_tasks = 3;
+#endif
+ xSemaphoreHandle exit_sema[max_tasks];
+
+ for (int i = 0; i < max_tasks; ++i) {
+ exit_sema[i] = xSemaphoreCreateBinary();
+ }
+ exit_flag = false;
+#ifndef CONFIG_FREERTOS_UNICORE
+ xTaskCreatePinnedToCore(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+ xTaskCreatePinnedToCore(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+ xTaskCreatePinnedToCore(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[2], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+ xTaskCreatePinnedToCore(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[3], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+ xTaskCreatePinnedToCore(&mbedtls_sha256_task, "mbedtls_sha256_task", TASK_STACK_SIZE, &exit_sema[4], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+ xTaskCreatePinnedToCore(&mbedtls_sha256_task, "mbedtls_sha256_task", TASK_STACK_SIZE, &exit_sema[5], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+#else
+ xTaskCreate(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&mbedtls_sha256_task, "mbedtls_sha256_task", TASK_STACK_SIZE, &exit_sema[2], UNITY_FREERTOS_PRIORITY - 1, NULL);
+#endif
+
+ ESP_LOGI(TAG, "Waiting for 10s ...");
+ vTaskDelay(10000 / portTICK_PERIOD_MS);
+
+ // set exit flag to let thread exit
+ exit_flag = true;
+ for (int i = 0; i < max_tasks; ++i) {
+ if (!xSemaphoreTake(exit_sema[i], 2000/portTICK_PERIOD_MS)) {
+ TEST_FAIL_MESSAGE("exit_sema not released by test task");
+ }
+ vSemaphoreDelete(exit_sema[i]);
+ }
+}
+
+static void rsa_task(void *pvParameters)
+{
+ xSemaphoreHandle *sema = (xSemaphoreHandle *) pvParameters;
+ ESP_LOGI(TAG, "rsa_task is started");
+ while (exit_flag == false) {
+ mbedtls_rsa_self_test(0);
+ }
+ xSemaphoreGive(*sema);
+ vTaskDelete(NULL);
+}
+
+TEST_CASE("Test shared using AES RSA", "[hw_crypto]")
+{
+#ifndef CONFIG_FREERTOS_UNICORE
+ const int max_tasks = 2;
+#else
+ const int max_tasks = 2;
+#endif
+ xSemaphoreHandle exit_sema[max_tasks];
+
+ for (int i = 0; i < max_tasks; ++i) {
+ exit_sema[i] = xSemaphoreCreateBinary();
+ }
+ exit_flag = false;
+#ifndef CONFIG_FREERTOS_UNICORE
+ xTaskCreatePinnedToCore(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+ xTaskCreatePinnedToCore(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+#else
+ xTaskCreate(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL);
+#endif
+
+ ESP_LOGI(TAG, "Waiting for 10s ...");
+ vTaskDelay(10000 / portTICK_PERIOD_MS);
+
+ // set exit flag to let thread exit
+ exit_flag = true;
+ for (int i = 0; i < max_tasks; ++i) {
+ if (!xSemaphoreTake(exit_sema[i], 2000/portTICK_PERIOD_MS)) {
+ TEST_FAIL_MESSAGE("exit_sema not released by test task");
+ }
+ vSemaphoreDelete(exit_sema[i]);
+ }
+}
+
+TEST_CASE("Test shared using SHA512 RSA", "[hw_crypto]")
+{
+#ifndef CONFIG_FREERTOS_UNICORE
+ const int max_tasks = 2;
+#else
+ const int max_tasks = 2;
+#endif
+ xSemaphoreHandle exit_sema[max_tasks];
+
+ for (int i = 0; i < max_tasks; ++i) {
+ exit_sema[i] = xSemaphoreCreateBinary();
+ }
+ exit_flag = false;
+#ifndef CONFIG_FREERTOS_UNICORE
+ xTaskCreatePinnedToCore(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 2, NULL, 1);
+ xTaskCreatePinnedToCore(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+#else
+ xTaskCreate(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL);
+#endif
+
+ ESP_LOGI(TAG, "Waiting for 10s ...");
+ vTaskDelay(10000 / portTICK_PERIOD_MS);
+
+ // set exit flag to let thread exit
+ exit_flag = true;
+ for (int i = 0; i < max_tasks; ++i) {
+ if (!xSemaphoreTake(exit_sema[i], 2000/portTICK_PERIOD_MS)) {
+ TEST_FAIL_MESSAGE("exit_sema not released by test task");
+ }
+ vSemaphoreDelete(exit_sema[i]);
+ }
+}
+
+TEST_CASE("Test shared using SHA256 RSA", "[hw_crypto]")
+{
+#ifndef CONFIG_FREERTOS_UNICORE
+ const int max_tasks = 2;
+#else
+ const int max_tasks = 2;
+#endif
+ xSemaphoreHandle exit_sema[max_tasks];
+
+ for (int i = 0; i < max_tasks; ++i) {
+ exit_sema[i] = xSemaphoreCreateBinary();
+ }
+ exit_flag = false;
+#ifndef CONFIG_FREERTOS_UNICORE
+ xTaskCreatePinnedToCore(&mbedtls_sha256_task, "mbedtls_sha256_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+ xTaskCreatePinnedToCore(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+#else
+ xTaskCreate(&mbedtls_sha256_task, "mbedtls_sha256_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL);
+#endif
+
+ ESP_LOGI(TAG, "Waiting for 10s ...");
+ vTaskDelay(10000 / portTICK_PERIOD_MS);
+
+ // set exit flag to let thread exit
+ exit_flag = true;
+ for (int i = 0; i < max_tasks; ++i) {
+ if (!xSemaphoreTake(exit_sema[i], 2000/portTICK_PERIOD_MS)) {
+ TEST_FAIL_MESSAGE("exit_sema not released by test task");
+ }
+ vSemaphoreDelete(exit_sema[i]);
+ }
+}
+
+TEST_CASE("Test shared using AES SHA RSA", "[hw_crypto]")
+{
+#ifndef CONFIG_FREERTOS_UNICORE
+ const int max_tasks = 3;
+#else
+ const int max_tasks = 3;
+#endif
+ xSemaphoreHandle exit_sema[max_tasks];
+
+ for (int i = 0; i < max_tasks; ++i) {
+ exit_sema[i] = xSemaphoreCreateBinary();
+ }
+ exit_flag = false;
+#ifndef CONFIG_FREERTOS_UNICORE
+ xTaskCreatePinnedToCore(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+ xTaskCreatePinnedToCore(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL, 0);
+ xTaskCreatePinnedToCore(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[2], UNITY_FREERTOS_PRIORITY - 1, NULL, 1);
+#else
+ xTaskCreate(&aes_task, "aes_task", TASK_STACK_SIZE, &exit_sema[0], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&sha_task, "sha_task", TASK_STACK_SIZE, &exit_sema[1], UNITY_FREERTOS_PRIORITY - 1, NULL);
+ xTaskCreate(&rsa_task, "rsa_task", TASK_STACK_SIZE, &exit_sema[2], UNITY_FREERTOS_PRIORITY - 1, NULL);
+#endif
+
+ ESP_LOGI(TAG, "Waiting for 10s ...");
+ vTaskDelay(10000 / portTICK_PERIOD_MS);
+
+ // set exit flag to let thread exit
+ exit_flag = true;
+ for (int i = 0; i < max_tasks; ++i) {
+ if (!xSemaphoreTake(exit_sema[i], 2000/portTICK_PERIOD_MS)) {
+ TEST_FAIL_MESSAGE("exit_sema not released by test task");
+ }
+ vSemaphoreDelete(exit_sema[i]);
+ }
+}