summaryrefslogtreecommitdiff
path: root/utils/imxtools/sbtools/sb.h (follow)
Commit message (Collapse)AuthorAge
* imxtools/sbtools: rework cryptographyAmaury Pouly2017-01-16
| | | | | | | | | | It was a mess, a mix of crypto_* and cbc_mac calls. I made everything call crypto functions, and also separate key setup from cryptographic operations, this will be useful to speed up the code in the upcoming commits. Drop support for "usbotp" key, since the crypto code for that was never mainlined and we can always get the keys from a device as long as we have code execution (using the DCP debug registers). Change-Id: I7aa24d12207ffb744225d1b9cc7cb1dc7281dd22
* imxtools: rework sb file productionAmaury Pouly2017-01-16
| | | | | | | | | | | | | | | | | | | | The old code had some annoying way of dealing with padding by adding explicit instructions to the stream, which is 1) ugly 2) not in par with freescale tools. The trick, which this new version implements, is to put the useful length of the section in the section header, and the actual (with padding) length in the boot tag. This way the tools can just ignore padding instruction by reading the section header, and the bootloader can still load the image because it uses the boot tags. Also correctly handle the case where the first section does not start right after the header (there is a bug in freescale tools for this case by the way). There is an ambiguity in the way the padding instructions should be encrypted: the bootloader should logically treat them as regular instruction of the section stream, but it appears the freescale tools do not generate them as part of the stream and instead encrypt them like boot tags, which is stupid because there is no way the bootloader could decrypt them, and anyway we don't care because the bootloader doesn't decrypt them at all. Change-Id: Iabdc1d1f9f82d374779bf03efb75c2c3998f5b5d
* sbtools: add option to ignore sha1 errorsAmaury Pouly2014-09-07
| | | | Change-Id: I6bf9e4671e57f8ff3f436660e8ecb561027a036c
* sbtools: more work on sbtoelf and elftosb, support more attributesAmaury Pouly2013-08-22
| | | | | | | Now handle timestamp, sb minor version, component/product versions, section flags. Change-Id: I35313efe60c28f04ea3732b36e5e01be3213cf9e
* sbtools: now generate a db file along with with elf/rsrc filesAmaury Pouly2013-08-22
| | | | | | | | | | Now always generate a "make.db" file which aims at being the exact representation of the file, ie running sbtoelf and elftosb using the generated command file should produce the exact same file (except for the random paddings). We still miss the support for some option parsing to achieve that though. Change-Id: Ib7d6b241f7855fd35225df8ab8e0711f69d9ee5a
* sbtools: more code refactoringAmaury Pouly2013-08-21
| | | | | | Factor all printf method with a unique one defined in misc.h Change-Id: I58fbf8916b76e873a2e6678506d2c8aece7834ec
* sbtools: more printf fixingAmaury Pouly2013-08-10
| | | | Change-Id: Id617297c196b381fd1c381da3eff4345e3157529
* sbtools: fix handling of NOP instructionsAmaury Pouly2013-08-06
| | | | Change-Id: I05ab8176f368a6e2d075dfb2059692871e0c00b3
* sbtools: refactor and cleanupAmaury Pouly2013-07-18
| | | | | | | Factor common elf/sb read/write/printf routines. Factor sb zero key, move sb version guess. Change-Id: I5ae1885587456736e782e623610281bbee545039
* sbtools,mkximboot: fix whitespaceAmaury Pouly2013-06-15
| | | | Change-Id: I8d8adb783707172d1aaef302366c240310350ed8
* imxtools: move tools to a new sbtools/ subdirectoryAmaury Pouly2012-05-31
Change-Id: I0d8d6831b35037725486f61fc363de87bc8ba92e