summaryrefslogtreecommitdiff
path: root/utils/imxtools/sbtools/sb1.c
diff options
context:
space:
mode:
Diffstat (limited to 'utils/imxtools/sbtools/sb1.c')
-rw-r--r--utils/imxtools/sbtools/sb1.c288
1 files changed, 288 insertions, 0 deletions
diff --git a/utils/imxtools/sbtools/sb1.c b/utils/imxtools/sbtools/sb1.c
new file mode 100644
index 0000000..19f53b0
--- /dev/null
+++ b/utils/imxtools/sbtools/sb1.c
@@ -0,0 +1,288 @@
+/***************************************************************************
+ * __________ __ ___.
+ * Open \______ \ ____ ____ | | _\_ |__ _______ ___
+ * Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ /
+ * Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < <
+ * Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \
+ * \/ \/ \/ \/ \/
+ * $Id$
+ *
+ * Copyright (C) 2012 Amaury Pouly
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+ * KIND, either express or implied.
+ *
+ ****************************************************************************/
+#include <stdio.h>
+#include <time.h>
+#include <stdlib.h>
+#include <ctype.h>
+#include "misc.h"
+#include "crypto.h"
+#include "sb1.h"
+
+static uint16_t swap16(uint16_t t)
+{
+ return (t << 8) | (t >> 8);
+}
+
+static void fix_version(struct sb1_version_t *ver)
+{
+ ver->major = swap16(ver->major);
+ ver->minor = swap16(ver->minor);
+ ver->revision = swap16(ver->revision);
+}
+
+enum sb1_error_t sb1_write_file(struct sb1_file_t *sb, const char *filename)
+{
+ return SB1_ERROR;
+}
+
+struct sb1_file_t *sb1_read_file(const char *filename, void *u,
+ sb1_color_printf cprintf, enum sb1_error_t *err)
+{
+ return sb1_read_file_ex(filename, 0, -1, u, cprintf, err);
+}
+
+struct sb1_file_t *sb1_read_file_ex(const char *filename, size_t offset, size_t size, void *u,
+ sb1_color_printf cprintf, enum sb1_error_t *err)
+{
+ #define fatal(e, ...) \
+ do { if(err) *err = e; \
+ cprintf(u, true, GREY, __VA_ARGS__); \
+ free(buf); \
+ return NULL; } while(0)
+
+ FILE *f = fopen(filename, "rb");
+ void *buf = NULL;
+ if(f == NULL)
+ fatal(SB1_OPEN_ERROR, "Cannot open file for reading\n");
+ fseek(f, 0, SEEK_END);
+ size_t read_size = ftell(f);
+ fseek(f, offset, SEEK_SET);
+ if(size != (size_t)-1)
+ read_size = size;
+ buf = xmalloc(read_size);
+ if(fread(buf, read_size, 1, f) != 1)
+ {
+ fclose(f);
+ fatal(SB1_READ_ERROR, "Cannot read file\n");
+ }
+ fclose(f);
+
+ struct sb1_file_t *ret = sb1_read_memory(buf, read_size, u, cprintf, err);
+ free(buf);
+ return ret;
+
+ #undef fatal
+}
+
+static const char *sb1_cmd_name(int cmd)
+{
+ switch(cmd)
+ {
+ case SB1_INST_LOAD: return "load";
+ case SB1_INST_FILL: return "fill";
+ case SB1_INST_JUMP: return "jump";
+ case SB1_INST_CALL: return "call";
+ case SB1_INST_MODE: return "mode";
+ case SB1_INST_SDRAM: return "sdram";
+ default: return "unknown";
+ }
+}
+
+struct sb1_file_t *sb1_read_memory(void *_buf, size_t filesize, void *u,
+ sb1_color_printf cprintf, enum sb1_error_t *err)
+{
+ struct sb1_file_t *sb1_file = NULL;
+ uint8_t *buf = _buf;
+
+ #define printf(c, ...) cprintf(u, false, c, __VA_ARGS__)
+ #define fatal(e, ...) \
+ do { if(err) *err = e; \
+ cprintf(u, true, GREY, __VA_ARGS__); \
+ sb1_free(sb1_file); \
+ return NULL; } while(0)
+ #define print_hex(c, p, len, nl) \
+ do { printf(c, ""); print_hex(p, len, nl); } while(0)
+
+ sb1_file = xmalloc(sizeof(struct sb1_file_t));
+ memset(sb1_file, 0, sizeof(struct sb1_file_t));
+ struct sb1_header_t *header = (struct sb1_header_t *)buf;
+
+ if(memcmp(header->signature, "STMP", 4) != 0)
+ fatal(SB1_FORMAT_ERROR, "Bad signature\n");
+ if(header->image_size > filesize)
+ fatal(SB1_FORMAT_ERROR, "File too small (should be at least %d bytes)\n",
+ header->image_size);
+ if(header->header_size != sizeof(struct sb1_header_t))
+ fatal(SB1_FORMAT_ERROR, "Bad header size\n");
+
+ printf(BLUE, "Basic info:\n");
+ printf(GREEN, " ROM version: ");
+ printf(YELLOW, "%x\n", header->rom_version);
+ printf(GREEN, " Userdata offset: ");
+ printf(YELLOW, "%x\n", header->userdata_offset);
+ printf(GREEN, " Pad: ");
+ printf(YELLOW, "%x\n", header->pad2);
+
+ struct sb1_version_t product_ver = header->product_ver;
+ fix_version(&product_ver);
+ struct sb1_version_t component_ver = header->component_ver;
+ fix_version(&component_ver);
+
+ memcpy(&sb1_file->product_ver, &product_ver, sizeof(product_ver));
+ memcpy(&sb1_file->component_ver, &component_ver, sizeof(component_ver));
+
+ printf(GREEN, " Product version: ");
+ printf(YELLOW, "%X.%X.%X\n", product_ver.major, product_ver.minor, product_ver.revision);
+ printf(GREEN, " Component version: ");
+ printf(YELLOW, "%X.%X.%X\n", component_ver.major, component_ver.minor, component_ver.revision);
+
+ printf(GREEN, " Drive tag: ");
+ printf(YELLOW, "%x\n", header->drive_tag);
+
+ /* reduce size w.r.t to userdata part */
+ uint32_t userdata_size = 0;
+ if(header->userdata_offset != 0)
+ {
+ userdata_size = header->image_size - header->userdata_offset;
+ header->image_size -= userdata_size;
+ }
+
+ if(header->image_size % SECTOR_SIZE)
+ {
+ if(g_force)
+ printf(GREY, "Image size is not a multiple of sector size\n");
+ else
+ fatal(SB1_FORMAT_ERROR, "Image size is not a multiple of sector size\n");
+ }
+
+ /* find key */
+ union xorcrypt_key_t key[2];
+ bool valid_key = false;
+ uint8_t sector[SECTOR_SIZE];
+
+ for(int i = 0; i < g_nr_keys; i++)
+ {
+ if(!g_key_array[i].method == CRYPTO_XOR_KEY)
+ continue;
+ /* copy key and data because it's modified by the crypto code */
+ memcpy(key, g_key_array[i].u.xor_key, sizeof(key));
+ memcpy(sector, header + 1, SECTOR_SIZE - header->header_size);
+ /* try to decrypt the first sector */
+ uint32_t mark = xor_decrypt(key, sector, SECTOR_SIZE - 4 - header->header_size);
+ if(mark != *(uint32_t *)&sector[SECTOR_SIZE - 4 - header->header_size])
+ continue;
+ /* found ! */
+ valid_key = true;
+ /* copy key again it's modified by the crypto code */
+ memcpy(key, g_key_array[i].u.xor_key, sizeof(key));
+ break;
+ }
+
+ printf(BLUE, "Crypto\n");
+ for(int i = 0; i < 2; i++)
+ {
+ printf(RED, " Key %d\n", i);
+ printf(OFF, " ");
+ for(int j = 0; j < 64; j++)
+ {
+ printf(YELLOW, "%02x ", key[i].key[j]);
+ if((j + 1) % 16 == 0)
+ {
+ printf(OFF, "\n");
+ if(j + 1 != 64)
+ printf(OFF, " ");
+ }
+ }
+ }
+
+ if(!valid_key)
+ fatal(SB1_NO_VALID_KEY, "No valid key found\n");
+
+ /* decrypt image in-place (and removing crypto markers) */
+ void *ptr = header + 1;
+ void *copy_ptr = header + 1;
+ int offset = header->header_size;
+ for(unsigned i = 0; i < header->image_size / SECTOR_SIZE; i++)
+ {
+ int size = SECTOR_SIZE - 4 - offset;
+ uint32_t mark = xor_decrypt(key, ptr, size);
+ if(mark != *(uint32_t *)(ptr + size))
+ fatal(SB1_CHECKSUM_ERROR, "Crypto mark mismatch\n");
+ memmove(copy_ptr, ptr, size);
+ ptr += size + 4;
+ copy_ptr += size;
+ offset = 0;
+ }
+
+ /* reduce image size given the removed marks */
+ header->image_size -= header->image_size / SECTOR_SIZE;
+
+ printf(BLUE, "Commands\n");
+ struct sb1_cmd_header_t *cmd = (void *)(header + 1);
+ while((void *)cmd < (void *)header + header->image_size)
+ {
+ printf(GREEN, " Command");
+ printf(YELLOW, " %#x\n", cmd->cmd);
+ printf(YELLOW, " Size:");
+ printf(RED, " %#x\n", SB1_CMD_SIZE(cmd->cmd));
+ printf(YELLOW, " Critical:");
+ printf(RED, " %d\n", SB1_CMD_CRITICAL(cmd->cmd));
+ printf(YELLOW, " Data Type:");
+ printf(RED, " %#x\n", SB1_CMD_DATATYPE(cmd->cmd));
+ printf(YELLOW, " Bytes:");
+ printf(RED, " %#x\n", SB1_CMD_BYTES(cmd->cmd));
+ printf(YELLOW, " Boot:");
+ printf(RED, " %#x (%s)\n", SB1_CMD_BOOT(cmd->cmd), sb1_cmd_name(SB1_CMD_BOOT(cmd->cmd)));
+ printf(YELLOW, " Addr:");
+ printf(RED, " %#x\n", cmd->addr);
+
+ /* last instruction ? */
+ if(SB1_CMD_BOOT(cmd->cmd) == SB1_INST_JUMP ||
+ SB1_CMD_BOOT(cmd->cmd) == SB1_INST_MODE)
+ break;
+
+ cmd = (void *)cmd + 4 + 4 * SB1_CMD_SIZE(cmd->cmd);
+ }
+
+ sb1_file->data_size = header->image_size - header->header_size;
+ sb1_file->data = malloc(sb1_file->data_size);
+ memcpy(sb1_file->data, header + 1, sb1_file->data_size);
+
+ return sb1_file;
+ #undef printf
+ #undef fatal
+ #undef print_hex
+}
+
+void sb1_free(struct sb1_file_t *file)
+{
+ if(!file) return;
+
+ free(file->data);
+ free(file);
+}
+
+void sb1_dump(struct sb1_file_t *file, void *u, sb1_color_printf cprintf)
+{
+ #define printf(c, ...) cprintf(u, false, c, __VA_ARGS__)
+ #define print_hex(c, p, len, nl) \
+ do { printf(c, ""); print_hex(p, len, nl); } while(0)
+
+ #define TREE RED
+ #define HEADER GREEN
+ #define TEXT YELLOW
+ #define TEXT2 BLUE
+ #define SEP OFF
+
+ #undef printf
+ #undef print_hex
+}
+