diff options
author | Amaury Pouly <pamaury@rockbox.org> | 2011-11-06 01:49:13 +0000 |
---|---|---|
committer | Amaury Pouly <pamaury@rockbox.org> | 2011-11-06 01:49:13 +0000 |
commit | 5827937270bac874ae9e04679b3130fef9e306c4 (patch) | |
tree | 51bc262dedecdb7620300b46f23005c4b0eed311 | |
parent | 33d6bd61b51178b42a07a97118a689d849666331 (diff) |
sbtools: rename to imxtools, move imx_hid_recovery to imxtools/sbloader, fix tools to correctly handle/free memory, properly return error codes
git-svn-id: svn://svn.rockbox.org/rockbox/trunk@30907 a1c6a512-1295-4272-9138-f99709370657
-rw-r--r-- | utils/imx_hid_recovery/Makefile | 15 | ||||
-rw-r--r-- | utils/imxtools/Makefile (renamed from utils/sbtools/Makefile) | 8 | ||||
-rw-r--r-- | utils/imxtools/README (renamed from utils/sbtools/README) | 0 | ||||
-rw-r--r-- | utils/imxtools/aes128.c (renamed from utils/sbtools/aes128.c) | 0 | ||||
-rw-r--r-- | utils/imxtools/crc.c (renamed from utils/sbtools/crc.c) | 0 | ||||
-rw-r--r-- | utils/imxtools/crypto.c (renamed from utils/sbtools/crypto.c) | 0 | ||||
-rw-r--r-- | utils/imxtools/crypto.h (renamed from utils/sbtools/crypto.h) | 1 | ||||
-rw-r--r-- | utils/imxtools/dbparser.c (renamed from utils/sbtools/dbparser.c) | 164 | ||||
-rw-r--r-- | utils/imxtools/dbparser.h (renamed from utils/sbtools/dbparser.h) | 4 | ||||
-rw-r--r-- | utils/imxtools/elf.c (renamed from utils/sbtools/elf.c) | 21 | ||||
-rw-r--r-- | utils/imxtools/elf.h (renamed from utils/sbtools/elf.h) | 0 | ||||
-rw-r--r-- | utils/imxtools/elftosb.c (renamed from utils/sbtools/elftosb.c) | 24 | ||||
-rw-r--r-- | utils/imxtools/fuze+_key_file.txt (renamed from utils/sbtools/fuze+_key_file.txt) | 0 | ||||
-rw-r--r-- | utils/imxtools/misc.c (renamed from utils/sbtools/misc.c) | 14 | ||||
-rw-r--r-- | utils/imxtools/misc.h (renamed from utils/sbtools/misc.h) | 2 | ||||
-rw-r--r-- | utils/imxtools/sb.c (renamed from utils/sbtools/sb.c) | 285 | ||||
-rw-r--r-- | utils/imxtools/sb.h (renamed from utils/sbtools/sb.h) | 26 | ||||
-rw-r--r-- | utils/imxtools/sbloader.c (renamed from utils/imx_hid_recovery/imx_hid_recovery.c) | 0 | ||||
-rw-r--r-- | utils/imxtools/sbtoelf.c (renamed from utils/sbtools/sbtoelf.c) | 18 | ||||
-rw-r--r-- | utils/imxtools/sha1.c (renamed from utils/sbtools/sha1.c) | 0 |
20 files changed, 388 insertions, 194 deletions
diff --git a/utils/imx_hid_recovery/Makefile b/utils/imx_hid_recovery/Makefile deleted file mode 100644 index 24d0b8e3d3..0000000000 --- a/utils/imx_hid_recovery/Makefile +++ /dev/null @@ -1,15 +0,0 @@ -CC=gcc -LD=gcc - -all: imx_hid_recovery - -imx_hid_recovery.o: imx_hid_recovery.c - $(CC) -c -Wall -O2 -std=c99 `pkg-config --cflags libusb-1.0` -o $@ $< - -imx_hid_recovery: imx_hid_recovery.o - $(LD) -o $@ $< `pkg-config --libs libusb-1.0` - -clean: - rm -rf imx_hid_recovery.o - - diff --git a/utils/sbtools/Makefile b/utils/imxtools/Makefile index 69e63c9ac2..7a09d86d24 100644 --- a/utils/sbtools/Makefile +++ b/utils/imxtools/Makefile @@ -3,8 +3,9 @@ CC=gcc LD=gcc CFLAGS=-g -std=c99 -W -Wall `pkg-config --cflags libusb-1.0` $(DEFINES) LDFLAGS=`pkg-config --libs libusb-1.0` +BINS=elftosb sbtoelf sbloader -all: elftosb sbtoelf +all: $(BINS) %.o: %.c $(CC) $(CFLAGS) -c -o $@ $< @@ -15,8 +16,11 @@ sbtoelf: sbtoelf.o crc.o crypto.o aes128.o sha1.o elf.o misc.o sb.o elftosb: elftosb.o crc.o crypto.o aes128.o sha1.o elf.o dbparser.o misc.o sb.o $(LD) -o $@ $^ $(LDFLAGS) +sbloader: sbloader.o + $(LD) -o $@ $^ $(LDFLAGS) + clean: rm -fr *.o veryclean: - rm -rf sbtoelf elftosb + rm -rf $(BINS) diff --git a/utils/sbtools/README b/utils/imxtools/README index 8bf6fd5f8e..8bf6fd5f8e 100644 --- a/utils/sbtools/README +++ b/utils/imxtools/README diff --git a/utils/sbtools/aes128.c b/utils/imxtools/aes128.c index 5870813db8..5870813db8 100644 --- a/utils/sbtools/aes128.c +++ b/utils/imxtools/aes128.c diff --git a/utils/sbtools/crc.c b/utils/imxtools/crc.c index eaf257ddfe..eaf257ddfe 100644 --- a/utils/sbtools/crc.c +++ b/utils/imxtools/crc.c diff --git a/utils/sbtools/crypto.c b/utils/imxtools/crypto.c index d4afc6c816..d4afc6c816 100644 --- a/utils/sbtools/crypto.c +++ b/utils/imxtools/crypto.c diff --git a/utils/sbtools/crypto.h b/utils/imxtools/crypto.h index 51f44406db..452db6a28d 100644 --- a/utils/sbtools/crypto.h +++ b/utils/imxtools/crypto.h @@ -63,6 +63,7 @@ void crypto_setup(enum crypto_method_t method, void *param); #define CRYPTO_ERROR_DEVREJECT -5 /* device rejected cypto operation */ #define CRYPTO_ERROR_DEVSILENT -6 /* device did not notify completion */ #define CRYPTO_ERROR_DEVERR -7 /* device did something wrong (like return too small buffer) */ +#define CRYPTO_NUM_ERRORS 8 /* return 0 on success, <0 on error */ int crypto_apply( byte *in_data, /* Input data */ diff --git a/utils/sbtools/dbparser.c b/utils/imxtools/dbparser.c index 3cd0652d49..b2027e5ad7 100644 --- a/utils/sbtools/dbparser.c +++ b/utils/imxtools/dbparser.c @@ -19,6 +19,7 @@ * ****************************************************************************/ +#define _POSIX_C_SOURCE 200809L /* for strdup */ #include <stdio.h> #include <ctype.h> #include <stdint.h> @@ -48,6 +49,7 @@ enum lexem_type_t struct lexem_t { enum lexem_type_t type; + /* if str is not NULL, it must be a malloc'd pointer */ char *str; uint32_t num; int line; @@ -390,8 +392,15 @@ struct lex_ctx_t struct lexem_t lexem; }; -static inline void next(struct lex_ctx_t *ctx) +/* When lexems hold strings (like identifier), it might be useful to steal + * the pointer and don't clean the lexem but in other case, one don't want + * to keep the pointer to the string and just want to release the memory. + * Thus clean_lexem should be true except when one keeps a pointer */ +static inline void next(struct lex_ctx_t *ctx, bool clean_lexem) { + if(clean_lexem) + free(ctx->lexem.str); + memset(&ctx->lexem, 0, sizeof(struct lexem_t)); next_lexem(&ctx->ctx, &ctx->lexem); } @@ -411,7 +420,7 @@ static uint32_t parse_term_expr(struct lex_ctx_t *ctx, struct cmd_option_t *cons } else parse_error(ctx->lexem, "Number or constant identifier expected\n"); - next(ctx); + next(ctx, true); return ret; } @@ -420,7 +429,7 @@ static uint32_t parse_shift_expr(struct lex_ctx_t *ctx, struct cmd_option_t *con uint32_t v = parse_term_expr(ctx, const_list); while(ctx->lexem.type == LEX_LSHIFT) { - next(ctx); + next(ctx, true); v <<= parse_term_expr(ctx, const_list); } return v; @@ -431,7 +440,7 @@ static uint32_t parse_or_expr(struct lex_ctx_t *ctx, struct cmd_option_t *const_ uint32_t v = parse_shift_expr(ctx, const_list); while(ctx->lexem.type == LEX_OR) { - next(ctx); + next(ctx, true); v |= parse_shift_expr(ctx, const_list); } return v; @@ -470,7 +479,7 @@ struct cmd_file_t *db_parse_file(const char *file) { struct cmd_option_t *opt = xmalloc(sizeof(struct cmd_option_t)); memset(opt, 0, sizeof(struct cmd_option_t)); - opt->name = init_const_name[i]; + opt->name = strdup(init_const_name[i]); opt->is_string = false; opt->val = init_const_value[i]; opt->next = cmd_file->constant_list; @@ -483,14 +492,14 @@ struct cmd_file_t *db_parse_file(const char *file) lctx.ctx.begin = buf; lctx.ctx.ptr = buf; lctx.ctx.end = buf + size; - #define next() next(&lctx) + #define next(clean_lexem) next(&lctx, clean_lexem) #define lexem lctx.lexem /* init lexer */ - next(); + next(false); /* don't clean init lexem because it doesn't exist */ /* constants ? */ if(lexem.type == LEX_IDENTIFIER && !strcmp(lexem.str, "constants")) { - next(); + next(true); if(lexem.type != LEX_LBRACE) parse_error(lexem, "'{' expected after 'constants'\n"); @@ -498,16 +507,16 @@ struct cmd_file_t *db_parse_file(const char *file) { struct cmd_option_t *opt = xmalloc(sizeof(struct cmd_option_t)); memset(opt, 0, sizeof(struct cmd_option_t)); - next(); + next(true); if(lexem.type == LEX_RBRACE) break; if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "Identifier expected in constants\n"); opt->name = lexem.str; - next(); + next(false); /* lexem string is kept as option name */ if(lexem.type != LEX_EQUAL) parse_error(lexem, "'=' expected after identifier\n"); - next(); + next(true); opt->is_string = false; opt->val = parse_intexpr(&lctx, cmd_file->constant_list); opt->next = cmd_file->constant_list; @@ -515,34 +524,34 @@ struct cmd_file_t *db_parse_file(const char *file) if(lexem.type != LEX_SEMICOLON) parse_error(lexem, "';' expected after string\n"); } - next(); + next(true); } /* options ? */ if(lexem.type == LEX_IDENTIFIER && !strcmp(lexem.str, "options")) { - next(); + next(true); if(lexem.type != LEX_LBRACE) parse_error(lexem, "'{' expected after 'options'\n"); while(true) { - struct cmd_option_t *opt = xmalloc(sizeof(struct cmd_option_t)); - memset(opt, 0, sizeof(struct cmd_option_t)); - next(); + next(true); if(lexem.type == LEX_RBRACE) break; + struct cmd_option_t *opt = xmalloc(sizeof(struct cmd_option_t)); + memset(opt, 0, sizeof(struct cmd_option_t)); if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "Identifier expected in options\n"); opt->name = lexem.str; - next(); + next(false); /* lexem string is kept as option name */ if(lexem.type != LEX_EQUAL) parse_error(lexem, "'=' expected after identifier\n"); - next(); + next(true); if(lexem.type == LEX_STRING) { opt->is_string = true; opt->str = lexem.str; - next(); + next(false); /* lexem string is kept as option name */ } else { @@ -554,18 +563,18 @@ struct cmd_file_t *db_parse_file(const char *file) if(lexem.type != LEX_SEMICOLON) parse_error(lexem, "';' expected after string\n"); } - next(); + next(true); } /* sources */ if(lexem.type != LEX_IDENTIFIER || strcmp(lexem.str, "sources")) parse_error(lexem, "'sources' expected\n"); - next(); + next(true); if(lexem.type != LEX_LBRACE) parse_error(lexem, "'{' expected after 'sources'\n"); while(true) { - next(); + next(true); if(lexem.type == LEX_RBRACE) break; struct cmd_source_t *src = xmalloc(sizeof(struct cmd_source_t)); @@ -573,28 +582,28 @@ struct cmd_file_t *db_parse_file(const char *file) if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "identifier expected in sources\n"); src->identifier = lexem.str; - next(); + next(false); /* lexem string is kept as source name */ if(lexem.type != LEX_EQUAL) parse_error(lexem, "'=' expected after identifier\n"); - next(); + next(true); if(lexem.type == LEX_STRING) { src->is_extern = false; src->filename = lexem.str; - next(); + next(false); /* lexem string is kept as file name */ } else if(lexem.type == LEX_IDENTIFIER && !strcmp(lexem.str, "extern")) { src->is_extern = true; - src->filename = "<extern>"; - next(); + src->filename = strdup("<extern>"); /* duplicate because it will be free'd */ + next(true); if(lexem.type != LEX_LPAREN) parse_error(lexem, "'(' expected after 'extern'\n"); - next(); + next(true); src->extern_nr = parse_intexpr(&lctx, cmd_file->constant_list); if(lexem.type != LEX_RPAREN) parse_error(lexem, "')' expected\n"); - next(); + next(true); } else parse_error(lexem, "String or 'extern' expected after '='\n"); @@ -612,18 +621,18 @@ struct cmd_file_t *db_parse_file(const char *file) struct cmd_section_t *end_sec = NULL; while(true) { + next(true); + if(lexem.type == LEX_EOF) + break; struct cmd_section_t *sec = xmalloc(sizeof(struct cmd_section_t)); struct cmd_inst_t *end_list = NULL; memset(sec, 0, sizeof(struct cmd_section_t)); - next(); - if(lexem.type == LEX_EOF) - break; if(lexem.type != LEX_IDENTIFIER || strcmp(lexem.str, "section") != 0) parse_error(lexem, "'section' expected\n"); - next(); + next(true); if(lexem.type != LEX_LPAREN) parse_error(lexem, "'(' expected after 'section'\n"); - next(); + next(true); /* can be any number */ sec->identifier = parse_intexpr(&lctx, cmd_file->constant_list); /* options ? */ @@ -631,21 +640,21 @@ struct cmd_file_t *db_parse_file(const char *file) { do { - next(); + next(true); struct cmd_option_t *opt = xmalloc(sizeof(struct cmd_option_t)); memset(opt, 0, sizeof(struct cmd_option_t)); if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "Identifier expected for section option\n"); opt->name = lexem.str; - next(); + next(false); /* lexem string is kept as option name */ if(lexem.type != LEX_EQUAL) parse_error(lexem, "'=' expected after option identifier\n"); - next(); + next(true); if(lexem.type == LEX_STRING) { opt->is_string = true; opt->str = lexem.str; - next(); + next(false); /* lexem string is kept as option string */ } else { @@ -658,18 +667,18 @@ struct cmd_file_t *db_parse_file(const char *file) } if(lexem.type != LEX_RPAREN) parse_error(lexem, "')' expected after section identifier\n"); - next(); + next(true); if(lexem.type == LEX_LBRACE) { sec->is_data = false; /* commands */ while(true) { - struct cmd_inst_t *inst = xmalloc(sizeof(struct cmd_inst_t)); - memset(inst, 0, sizeof(struct cmd_inst_t)); - next(); + next(true); if(lexem.type == LEX_RBRACE) break; + struct cmd_inst_t *inst = xmalloc(sizeof(struct cmd_inst_t)); + memset(inst, 0, sizeof(struct cmd_inst_t)); if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "Instruction expected in section\n"); if(strcmp(lexem.str, "load") == 0) @@ -682,7 +691,7 @@ struct cmd_file_t *db_parse_file(const char *file) inst->type = CMD_MODE; else parse_error(lexem, "Instruction expected in section\n"); - next(); + next(true); if(inst->type == CMD_LOAD) { @@ -691,12 +700,12 @@ struct cmd_file_t *db_parse_file(const char *file) inst->identifier = lexem.str; if(db_find_source_by_id(cmd_file, inst->identifier) == NULL) parse_error(lexem, "Undefined reference to source '%s'\n", inst->identifier); - next(); + next(false); /* lexem string kept as identifier */ if(lexem.type == LEX_RANGLE) { // load at inst->type = CMD_LOAD_AT; - next(); + next(true); inst->addr = parse_intexpr(&lctx, cmd_file->constant_list); } if(lexem.type != LEX_SEMICOLON) @@ -709,7 +718,7 @@ struct cmd_file_t *db_parse_file(const char *file) inst->identifier = lexem.str; if(db_find_source_by_id(cmd_file, inst->identifier) == NULL) parse_error(lexem, "Undefined reference to source '%s'\n", inst->identifier); - next(); + next(false); /* lexem string kept as identifier */ } else { @@ -719,11 +728,11 @@ struct cmd_file_t *db_parse_file(const char *file) if(lexem.type == LEX_LPAREN) { - next(); + next(true); inst->argument = parse_intexpr(&lctx, cmd_file->constant_list); if(lexem.type != LEX_RPAREN) parse_error(lexem, "Expected closing brace\n"); - next(); + next(true); } if(lexem.type != LEX_SEMICOLON) parse_error(lexem, "';' expected after command\n"); @@ -751,11 +760,11 @@ struct cmd_file_t *db_parse_file(const char *file) else if(lexem.type == LEX_LE) { sec->is_data = true; - next(); + next(true); if(lexem.type != LEX_IDENTIFIER) parse_error(lexem, "Identifier expected after '<='\n"); sec->source_id = lexem.str; - next(); + next(false); /* lexem string is kept as source id */ if(lexem.type != LEX_SEMICOLON) parse_error(lexem, "';' expected after identifier\n"); } @@ -776,6 +785,7 @@ struct cmd_file_t *db_parse_file(const char *file) #undef lexem #undef next + free(buf); return cmd_file; } @@ -783,3 +793,57 @@ void db_generate_default_sb_version(struct sb_version_t *ver) { ver->major = ver->minor = ver->revision = 0x999; } + +void db_free_option_list(struct cmd_option_t *opt_list) +{ + while(opt_list) + { + struct cmd_option_t *next = opt_list->next; + fflush(stdout); + free(opt_list->name); + free(opt_list->str); + free(opt_list); + opt_list = next; + } +} + +void db_free(struct cmd_file_t *file) +{ + db_free_option_list(file->opt_list); + db_free_option_list(file->constant_list); + struct cmd_source_t *src = file->source_list; + while(src) + { + struct cmd_source_t *next = src->next; + free(src->identifier); + fflush(stdout); + free(src->filename); + if(src->loaded) + { + if(src->type == CMD_SRC_BIN) + free(src->bin.data); + if(src->type == CMD_SRC_ELF) + elf_release(&src->elf); + } + free(src); + src = next; + } + struct cmd_section_t *sec = file->section_list; + while(sec) + { + struct cmd_section_t *next = sec->next; + db_free_option_list(sec->opt_list); + free(sec->source_id); + struct cmd_inst_t *inst = sec->inst_list; + while(inst) + { + struct cmd_inst_t *next = inst->next; + free(inst->identifier); + free(inst); + inst = next; + } + free(sec); + sec = next; + } + free(file); +} diff --git a/utils/sbtools/dbparser.h b/utils/imxtools/dbparser.h index cfb1a692fa..4a36861583 100644 --- a/utils/sbtools/dbparser.h +++ b/utils/imxtools/dbparser.h @@ -102,7 +102,7 @@ struct cmd_section_t struct cmd_file_t { struct cmd_option_t *opt_list; - struct cmd_option_t *constant_list; /* constant all always integers */ + struct cmd_option_t *constant_list; /* constant are always integers */ struct cmd_source_t *source_list; struct cmd_section_t *section_list; }; @@ -112,5 +112,7 @@ struct cmd_option_t *db_find_option_by_id(struct cmd_option_t *opt, const char * bool db_parse_sb_version(struct sb_version_t *ver, char *str); void db_generate_default_sb_version(struct sb_version_t *ver); struct cmd_file_t *db_parse_file(const char *file); +void db_free_option_list(struct cmd_option_t *opt_list); +void db_free(struct cmd_file_t *file); #endif /* __DBPARSER__ */ diff --git a/utils/sbtools/elf.c b/utils/imxtools/elf.c index 91b5d74848..481ab98dd6 100644 --- a/utils/sbtools/elf.c +++ b/utils/imxtools/elf.c @@ -153,10 +153,7 @@ typedef struct void elf_init(struct elf_params_t *params) { - params->has_start_addr = false; - params->start_addr = 0; - params->first_section = NULL; - params->last_section = NULL; + memset(params, 0, sizeof(struct elf_params_t)); } extern void *xmalloc(size_t s); @@ -463,6 +460,7 @@ bool elf_read_file(struct elf_params_t *params, elf_read_fn_t read, if(!read(user, shdr.sh_offset, data, shdr.sh_size)) error_printf("error read self section data\n"); elf_add_load_section(params, shdr.sh_addr, shdr.sh_size, data); + free(data); if(strtab) printf(user, false, "create load segment for %s\n", &strtab[shdr.sh_name]); @@ -480,6 +478,7 @@ bool elf_read_file(struct elf_params_t *params, elf_read_fn_t read, } } + free(strtab); /* run through segments */ for(int i = 1; i < ehdr.e_phnum; i++) { @@ -557,16 +556,20 @@ int elf_get_nr_sections(struct elf_params_t *params) void elf_release(struct elf_params_t *params) { - struct elf_section_t *sec, *next_sec; - sec = params->first_section; + struct elf_section_t *sec = params->first_section; while(sec) { - next_sec = sec->next; + struct elf_section_t *next_sec = sec->next; if(sec->type == EST_LOAD) free(sec->section); free(sec); sec = next_sec; } - params->first_section = NULL; - params->last_section = NULL; + struct elf_segment_t *seg = params->first_segment; + while(seg) + { + struct elf_segment_t *next_seg = seg->next; + free(seg); + seg = next_seg; + } } diff --git a/utils/sbtools/elf.h b/utils/imxtools/elf.h index 2166833276..2166833276 100644 --- a/utils/sbtools/elf.h +++ b/utils/imxtools/elf.h diff --git a/utils/sbtools/elftosb.c b/utils/imxtools/elftosb.c index b8d68b82e7..2f8700551f 100644 --- a/utils/sbtools/elftosb.c +++ b/utils/imxtools/elftosb.c @@ -20,6 +20,7 @@ ****************************************************************************/ #define _ISOC99_SOURCE +#define _POSIX_C_SOURCE 200809L /* for strdup */ #include <stdio.h> #include <errno.h> #include <stdlib.h> @@ -77,7 +78,9 @@ static void resolve_extern(struct cmd_source_t *src) src->is_extern = false; if(src->extern_nr < 0 || src->extern_nr >= g_extern_count) bug("There aren't enough file on command file to resolve extern(%d)\n", src->extern_nr); - src->filename = g_extern[src->extern_nr]; + /* first free the old src->filename content */ + free(src->filename); + src->filename = strdup(g_extern[src->extern_nr]); } static void load_elf_by_id(struct cmd_file_t *cmd_file, const char *id) @@ -206,7 +209,7 @@ static struct sb_file_t *apply_cmd_file(struct cmd_file_t *cmd_file) sec->insts[0].inst = SB_INST_DATA; sec->insts[0].size = bin->size; - sec->insts[0].data = bin->data; + sec->insts[0].data = memdup(bin->data, bin->size); } else { @@ -266,7 +269,7 @@ static struct sb_file_t *apply_cmd_file(struct cmd_file_t *cmd_file) sec->insts[idx].inst = SB_INST_LOAD; sec->insts[idx].addr = esec->addr; sec->insts[idx].size = esec->size; - sec->insts[idx++].data = esec->section; + sec->insts[idx++].data = memdup(esec->section, esec->size); } else if(esec->type == EST_FILL) { @@ -296,7 +299,7 @@ static struct sb_file_t *apply_cmd_file(struct cmd_file_t *cmd_file) struct bin_param_t *bin = &db_find_source_by_id(cmd_file, cinst->identifier)->bin; sec->insts[idx].inst = SB_INST_LOAD; sec->insts[idx].addr = cinst->addr; - sec->insts[idx].data = bin->data; + sec->insts[idx].data = memdup(bin->data, bin->size); sec->insts[idx++].size = bin->size; } else if(cinst->type == CMD_MODE) @@ -431,11 +434,18 @@ int main(int argc, char **argv) struct cmd_file_t *cmd_file = db_parse_file(cmd_filename); struct sb_file_t *sb_file = apply_cmd_file(cmd_file); + db_free(cmd_file); if(real_key.method == CRYPTO_KEY) - sb_file->real_key = &real_key.u.key; + { + sb_file->override_real_key = true; + memcpy(sb_file->real_key, real_key.u.key, 16); + } if(crypto_iv.method == CRYPTO_KEY) - sb_file->crypto_iv = &crypto_iv.u.key; + { + sb_file->override_crypto_iv = true; + memcpy(sb_file->crypto_iv, crypto_iv.u.key, 16); + } /* fill with default parameters since there is no command file support for them */ sb_file->drive_tag = 0; @@ -444,6 +454,8 @@ int main(int argc, char **argv) sb_file->minor_version = 1; sb_write_file(sb_file, output_filename); + sb_free(sb_file); + clear_keys(); return 0; } diff --git a/utils/sbtools/fuze+_key_file.txt b/utils/imxtools/fuze+_key_file.txt index a965e715f7..a965e715f7 100644 --- a/utils/sbtools/fuze+_key_file.txt +++ b/utils/imxtools/fuze+_key_file.txt diff --git a/utils/sbtools/misc.c b/utils/imxtools/misc.c index 4eeda4ef33..8d7cea89d7 100644 --- a/utils/sbtools/misc.c +++ b/utils/imxtools/misc.c @@ -29,6 +29,14 @@ bool g_debug = false; /** * Misc */ + +void *memdup(void *p, size_t len) +{ + void *cpy = xmalloc(len); + memcpy(cpy, p, len); + return cpy; +} + void generate_random_data(void *buf, size_t sz) { FILE *rand_fd = fopen("/dev/urandom", "rb"); @@ -144,6 +152,12 @@ void add_keys(key_array_t ka, int kac) g_nr_keys += kac; } +void clear_keys() +{ + free(g_key_array); + g_nr_keys = 0; +} + void add_keys_from_file(const char *key_file) { int size; diff --git a/utils/sbtools/misc.h b/utils/imxtools/misc.h index 9f14497680..b0b7dfeba6 100644 --- a/utils/sbtools/misc.h +++ b/utils/imxtools/misc.h @@ -38,6 +38,7 @@ typedef struct crypto_key_t *key_array_t; int g_nr_keys; key_array_t g_key_array; +void *memdup(void *p, size_t len); void *augment_array(void *arr, size_t elem_sz, size_t cnt, void *aug, size_t aug_cnt); void generate_random_data(void *buf, size_t sz); void *xmalloc(size_t s); @@ -47,6 +48,7 @@ void add_keys(key_array_t ka, int kac); bool parse_key(char **str, struct crypto_key_t *key); void add_keys_from_file(const char *key_file); void print_key(struct crypto_key_t *key, bool newline); +void clear_keys(); typedef char color_t[]; diff --git a/utils/sbtools/sb.c b/utils/imxtools/sb.c index d620c00f42..44db56b7d1 100644 --- a/utils/sbtools/sb.c +++ b/utils/imxtools/sb.c @@ -138,7 +138,7 @@ static void compute_sb_offsets(struct sb_file_t *sb) if(sb->sections[i].is_data) { nr_aug_insts = 1; - aug_insts = malloc(sizeof(struct sb_inst_t)); + aug_insts = xmalloc(sizeof(struct sb_inst_t)); memset(aug_insts, 0, sizeof(struct sb_inst_t)); aug_insts[0].inst = SB_INST_DATA; aug_insts[0].size = missing_sz * BLOCK_SIZE; @@ -150,7 +150,7 @@ static void compute_sb_offsets(struct sb_file_t *sb) else { nr_aug_insts = missing_sz; - aug_insts = malloc(sizeof(struct sb_inst_t) * nr_aug_insts); + aug_insts = xmalloc(sizeof(struct sb_inst_t) * nr_aug_insts); memset(aug_insts, 0, sizeof(struct sb_inst_t) * nr_aug_insts); for(int j = 0; j < nr_aug_insts; j++) { @@ -163,6 +163,7 @@ static void compute_sb_offsets(struct sb_file_t *sb) sb->sections[i].insts = augment_array(sb->sections[i].insts, sizeof(struct sb_inst_t), sb->sections[i].nr_insts, aug_insts, nr_aug_insts); sb->sections[i].nr_insts += nr_aug_insts; + free(aug_insts); /* augment image and section size */ sb->image_size += missing_sz; @@ -299,12 +300,8 @@ void produce_sb_instruction(struct sb_inst_t *inst, cmd->hdr.checksum = instruction_checksum(&cmd->hdr); } -void sb_write_file(struct sb_file_t *sb, const char *filename) +enum sb_error_t sb_write_file(struct sb_file_t *sb, const char *filename) { - FILE *fd = fopen(filename, "wb"); - if(fd == NULL) - bugp("cannot open output file"); - struct crypto_key_t real_key; real_key.method = CRYPTO_KEY; byte crypto_iv[16]; @@ -324,8 +321,13 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) /* produce and write header */ struct sb_header_t sb_hdr; produce_sb_header(sb, &sb_hdr); + /* allocate image */ + byte *buf = xmalloc(sb_hdr.image_size * BLOCK_SIZE); + byte *buf_p = buf; + #define write(p, sz) do { memcpy(buf_p, p, sz); buf_p += sz; } while(0) + sha_1_update(&file_sha1, (byte *)&sb_hdr, sizeof(sb_hdr)); - fwrite(&sb_hdr, 1, sizeof(sb_hdr), fd); + write(&sb_hdr, sizeof(sb_hdr)); memcpy(crypto_iv, &sb_hdr, 16); @@ -340,7 +342,7 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) struct sb_section_header_t sb_sec_hdr; produce_sb_section_header(&sb->sections[i], &sb_sec_hdr); sha_1_update(&file_sha1, (byte *)&sb_sec_hdr, sizeof(sb_sec_hdr)); - fwrite(&sb_sec_hdr, 1, sizeof(sb_sec_hdr), fd); + write(&sb_sec_hdr, sizeof(sb_sec_hdr)); /* update CBC-MACs */ for(int j = 0; j < g_nr_keys; j++) crypto_cbc((byte *)&sb_sec_hdr, NULL, sizeof(sb_sec_hdr) / BLOCK_SIZE, @@ -354,16 +356,18 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) crypto_cbc(real_key.u.key, entry.key, 1, &g_key_array[i], crypto_iv, NULL, 1); - fwrite(&entry, 1, sizeof(entry), fd); + write(&entry, sizeof(entry)); sha_1_update(&file_sha1, (byte *)&entry, sizeof(entry)); } + free(cbc_macs); + /* HACK HACK HACK HACK HACK HACK HACK HACK HACK HACK HACK HACK HACK HACK */ /* Image crafting, don't use it unless you understand what you do */ - if(sb->real_key != NULL) - memcpy(real_key.u.key, *sb->real_key, 16); - if(sb->crypto_iv != NULL) - memcpy(crypto_iv, *sb->crypto_iv, 16); + if(sb->override_real_key) + memcpy(real_key.u.key, sb->real_key, 16); + if(sb->override_crypto_iv) + memcpy(crypto_iv, sb->crypto_iv, 16); /* KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH KCAH */ if(g_debug) { @@ -386,7 +390,7 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) crypto_cbc((byte *)&tag_cmd, (byte *)&tag_cmd, sizeof(tag_cmd) / BLOCK_SIZE, &real_key, crypto_iv, NULL, 1); sha_1_update(&file_sha1, (byte *)&tag_cmd, sizeof(tag_cmd)); - fwrite(&tag_cmd, 1, sizeof(tag_cmd), fd); + write(&tag_cmd, sizeof(tag_cmd)); /* produce other commands */ byte cur_cbc_mac[16]; memcpy(cur_cbc_mac, crypto_iv, 16); @@ -402,7 +406,7 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) crypto_cbc((byte *)&cmd, (byte *)&cmd, sizeof(cmd) / BLOCK_SIZE, &real_key, cur_cbc_mac, &cur_cbc_mac, 1); sha_1_update(&file_sha1, (byte *)&cmd, sizeof(cmd)); - fwrite(&cmd, 1, sizeof(cmd), fd); + write(&cmd, sizeof(cmd)); } /* data */ if(inst->inst == SB_INST_LOAD || inst->inst == SB_INST_DATA) @@ -415,7 +419,7 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) crypto_cbc(data, data, sz / BLOCK_SIZE, &real_key, cur_cbc_mac, &cur_cbc_mac, 1); sha_1_update(&file_sha1, data, sz); - fwrite(data, 1, sz, fd); + write(data, sz); free(data); } } @@ -427,22 +431,35 @@ void sb_write_file(struct sb_file_t *sb, const char *filename) generate_random_data(final_sig + 20, 12); if(g_nr_keys > 0) crypto_cbc(final_sig, final_sig, 2, &real_key, crypto_iv, NULL, 1); - fwrite(final_sig, 1, 32, fd); + write(final_sig, 32); + + if(buf_p - buf != sb_hdr.image_size * BLOCK_SIZE) + bug("SB image buffer was not entirely filled !"); + FILE *fd = fopen(filename, "wb"); + if(fd == NULL) + return SB_OPEN_ERROR; + if(fwrite(buf, sb_hdr.image_size * BLOCK_SIZE, 1, fd) != 1) + { + free(buf); + return SB_WRITE_ERROR; + } fclose(fd); -} + free(buf); -static void *memdup(void *p, size_t len) -{ - void *cpy = xmalloc(len); - memcpy(cpy, p, len); - return cpy; + return SB_SUCCESS; } static struct sb_section_t *read_section(bool data_sec, uint32_t id, byte *buf, - int size, const char *indent, void *u, sb_color_printf cprintf) + int size, const char *indent, void *u, sb_color_printf cprintf, enum sb_error_t *err) { #define printf(c, ...) cprintf(u, false, c, __VA_ARGS__) + #define fatal(e, ...) \ + do { if(err) *err = e; \ + cprintf(u, true, GREY, __VA_ARGS__); \ + sb_free_section(*sec); \ + free(sec); \ + return NULL; } while(0) struct sb_section_t *sec = xmalloc(sizeof(struct sb_section_t)); memset(sec, 0, sizeof(struct sb_section_t)); @@ -474,7 +491,7 @@ static struct sb_section_t *read_section(bool data_sec, uint32_t id, byte *buf, printf(OFF, "%s", indent); uint8_t checksum = instruction_checksum(hdr); if(checksum != hdr->checksum) - printf(GREY, "[Bad checksum]"); + fatal(SB_CHECKSUM_ERROR, "Bad instruction checksum"); if(hdr->flags != 0) { printf(GREY, "["); @@ -501,7 +518,10 @@ static struct sb_section_t *read_section(bool data_sec, uint32_t id, byte *buf, if(load->crc == computed_crc) printf(RED, " Ok\n"); else + { printf(RED, " Failed (crc=0x%08x)\n", computed_crc); + fatal(SB_CHECKSUM_ERROR, "Instruction data crc error\n"); + } pos += load->len + sizeof(struct sb_instruction_load_t); } @@ -559,7 +579,7 @@ static struct sb_section_t *read_section(bool data_sec, uint32_t id, byte *buf, } else { - printf(RED, "Unknown instruction %d at address 0x%08lx\n", hdr->opcode, (unsigned long)pos); + fatal(SB_FORMAT_ERROR, "Unknown instruction %d at address 0x%08lx\n", hdr->opcode, (unsigned long)pos); break; } @@ -569,6 +589,7 @@ static struct sb_section_t *read_section(bool data_sec, uint32_t id, byte *buf, return sec; #undef printf + #undef fatal } void sb_fill_section_name(char name[5], uint32_t identifier) @@ -595,25 +616,37 @@ static uint32_t guess_alignment(uint32_t off) } struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, - sb_color_printf cprintf) + sb_color_printf cprintf, enum sb_error_t *err) { + uint8_t *buf = NULL; + struct sb_file_t *sb_file = NULL; + #define printf(c, ...) cprintf(u, false, c, __VA_ARGS__) - #define fatal(...) do { cprintf(u, true, GREY, __VA_ARGS__); return NULL; } while(0) + #define fatal(e, ...) \ + do { if(err) *err = e; \ + cprintf(u, true, GREY, __VA_ARGS__); \ + free(buf); \ + sb_free(sb_file); \ + return NULL; } while(0) #define print_hex(c, p, len, nl) \ do { printf(c, ""); print_hex(p, len, nl); } while(0) FILE *f = fopen(filename, "rb"); if(f == NULL) - fatal("Cannot open file for reading\n"); + fatal(SB_OPEN_ERROR, "Cannot open file for reading\n"); fseek(f, 0, SEEK_END); long filesize = ftell(f); fseek(f, 0, SEEK_SET); - uint8_t *buf = xmalloc(filesize); - fread(buf, 1, filesize, f); + buf = xmalloc(filesize); + if(fread(buf, filesize, 1, f) != 1) + { + fclose(f); + fatal(SB_READ_ERROR, "Cannot read file\n"); + } fclose(f); struct sha_1_params_t sha_1_params; - struct sb_file_t *sb_file = xmalloc(sizeof(struct sb_file_t)); + sb_file = xmalloc(sizeof(struct sb_file_t)); memset(sb_file, 0, sizeof(struct sb_file_t)); struct sb_header_t *sb_header = (struct sb_header_t *)buf; @@ -624,13 +657,13 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, sb_file->first_boot_sec_id = sb_header->first_boot_sec_id; if(memcmp(sb_header->signature, "STMP", 4) != 0) - fatal("Bad signature\n"); + fatal(SB_FORMAT_ERROR, "Bad signature\n"); if(sb_header->image_size * BLOCK_SIZE > filesize) - fatal("File too small mismatch"); + fatal(SB_FORMAT_ERROR, "File too small"); if(sb_header->header_size * BLOCK_SIZE != sizeof(struct sb_header_t)) - fatal("Bad header size"); + fatal(SB_FORMAT_ERROR, "Bad header size"); if(sb_header->sec_hdr_size * BLOCK_SIZE != sizeof(struct sb_section_header_t)) - fatal("Bad section header size"); + fatal(SB_FORMAT_ERROR, "Bad section header size"); if(filesize > sb_header->image_size * BLOCK_SIZE) { @@ -707,86 +740,106 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, /* encryption cbc-mac */ byte real_key[16]; bool valid_key = false; /* false until a matching key was found */ + if(sb_header->nr_keys > 0) { - if(sb_header->nr_keys > g_nr_keys) - { - fatal("SB file has %d keys but only %d were specified\n", - sb_header->nr_keys, g_nr_keys); - } - printf(BLUE, "Encryption data\n"); - for(int i = 0; i < sb_header->nr_keys; i++) + byte (*cbcmacs)[16] = xmalloc(16 * g_nr_keys); + printf(BLUE, "Encryption keys\n"); + for(int i = 0; i < g_nr_keys; i++) { printf(RED, " Key %d: ", i); printf(YELLOW, ""); print_key(&g_key_array[i], true); - printf(GREEN, " CBC-MAC of headers: "); + printf(GREEN, " CBC-MAC: "); + /* check it */ + byte zero[16]; + memset(zero, 0, 16); + int ret = crypto_cbc(buf, NULL, sb_header->header_size + sb_header->nr_sections, + &g_key_array[i], zero, &cbcmacs[i], 1); + if(ret != CRYPTO_ERROR_SUCCESS) + { + free(cbcmacs); + fatal(SB_FIRST_CRYPTO_ERROR + ret, "Crypto error: %d", ret); + } + print_hex(YELLOW, cbcmacs[i], 16, true); + } + printf(BLUE, "DEK\n"); + for(int i = 0; i < sb_header->nr_keys; i++) + { + printf(RED, " Entry %d\n", i); uint32_t ofs = sizeof(struct sb_header_t) + sizeof(struct sb_section_header_t) * sb_header->nr_sections + sizeof(struct sb_key_dictionary_entry_t) * i; struct sb_key_dictionary_entry_t *dict_entry = (struct sb_key_dictionary_entry_t *)&buf[ofs]; /* cbc mac */ + printf(GREEN, " Encrypted key: "); + print_hex(YELLOW, dict_entry->key, 16, true); + printf(GREEN, " CBC-MAC : "); print_hex(YELLOW, dict_entry->hdr_cbc_mac, 16, false); /* check it */ - byte computed_cbc_mac[16]; - byte zero[16]; - memset(zero, 0, 16); - crypto_cbc(buf, NULL, sb_header->header_size + sb_header->nr_sections, - &g_key_array[i], zero, &computed_cbc_mac, 1); - - bool ok = memcmp(dict_entry->hdr_cbc_mac, computed_cbc_mac, 16) == 0; - if(ok) - { - valid_key = true; - printf(RED, " Ok\n"); - } - else - printf(RED, " Failed\n"); - - printf(GREEN, " Encrypted key : "); - print_hex(YELLOW, dict_entry->key, 16, true); - /* decrypt */ - byte decrypted_key[16]; - byte iv[16]; - memcpy(iv, buf, 16); /* uses the first 16-bytes of SHA-1 sig as IV */ - crypto_cbc(dict_entry->key, decrypted_key, 1, &g_key_array[i], iv, NULL, 0); - printf(GREEN, " Decrypted key : "); - print_hex(YELLOW, decrypted_key, 16, false); - /* cross-check or copy */ - if(valid_key && ok) - memcpy(real_key, decrypted_key, 16); - else if(valid_key) + int idx = 0; + while(idx < g_nr_keys && memcmp(dict_entry->hdr_cbc_mac, cbcmacs[idx], 16) != 0) + idx++; + if(idx != g_nr_keys) { - if(memcmp(real_key, decrypted_key, 16) == 0) - printf(RED, " Cross-Check Ok"); + printf(RED, " Match\n"); + /* decrypt */ + byte decrypted_key[16]; + byte iv[16]; + memcpy(iv, buf, 16); /* uses the first 16-bytes of SHA-1 sig as IV */ + int ret = crypto_cbc(dict_entry->key, decrypted_key, 1, &g_key_array[idx], iv, NULL, 0); + if(ret != CRYPTO_ERROR_SUCCESS) + { + free(cbcmacs); + fatal(SB_FIRST_CRYPTO_ERROR + ret, "Crypto error: %d\n", ret); + } + printf(GREEN, " Decrypted key: "); + print_hex(YELLOW, decrypted_key, 16, false); + if(valid_key) + { + if(memcmp(real_key, decrypted_key, 16) == 0) + printf(RED, " Cross-Check Ok"); + else + printf(RED, " Cross-Check Failed"); + } else - printf(RED, " Cross-Check Failed"); + { + memcpy(real_key, decrypted_key, 16); + valid_key = true; + } + printf(OFF, "\n"); } - printf(OFF, "\n"); + else + printf(RED, " Don't Match\n"); } - } - if(getenv("SB_REAL_KEY") != 0) - { - struct crypto_key_t k; - char *env = getenv("SB_REAL_KEY"); - if(!parse_key(&env, &k) || *env) - bug("Invalid SB_REAL_KEY\n"); - memcpy(real_key, k.u.key, 16); - } + free(cbcmacs); + + if(!valid_key) + fatal(SB_NO_VALID_KEY, "No valid key found\n"); + + if(getenv("SB_REAL_KEY") != 0) + { + struct crypto_key_t k; + char *env = getenv("SB_REAL_KEY"); + if(!parse_key(&env, &k) || *env) + bug("Invalid SB_REAL_KEY\n"); + memcpy(real_key, k.u.key, 16); + } - printf(RED, " Summary:\n"); - printf(GREEN, " Real key: "); - print_hex(YELLOW, real_key, 16, true); - printf(GREEN, " IV : "); - print_hex(YELLOW, buf, 16, true); + printf(RED, " Summary:\n"); + printf(GREEN, " Real key: "); + print_hex(YELLOW, real_key, 16, true); + printf(GREEN, " IV : "); + print_hex(YELLOW, buf, 16, true); - sb_file->real_key = xmalloc(16); - memcpy(*sb_file->real_key, real_key, 16); - sb_file->crypto_iv = xmalloc(16); - memcpy(*sb_file->crypto_iv, buf, 16); + sb_file->override_real_key = true; + memcpy(sb_file->real_key, real_key, 16); + sb_file->override_crypto_iv = true; + memcpy(sb_file->crypto_iv, buf, 16); + } /* sections */ if(!raw_mode) @@ -831,7 +884,7 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, memcpy(sec, buf + pos, size); struct sb_section_t *s = read_section(data_sec, sec_hdr->identifier, - sec, size, " ", u, cprintf); + sec, size, " ", u, cprintf, err); if(s) { s->is_cleartext = !encrypted; @@ -839,6 +892,8 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, memcpy(&sb_file->sections[i], s, sizeof(struct sb_section_t)); free(s); } + else + fatal(*err, "Error reading section\n"); free(sec); } @@ -919,7 +974,7 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, memcpy(sec, buf + pos, size); struct sb_section_t *s = read_section(data_sec, tag->identifier, - sec, size, " ", u, cprintf); + sec, size, " ", u, cprintf, err); if(s) { s->is_cleartext = !encrypted; @@ -929,6 +984,8 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, s, 1); free(s); } + else + fatal(*err, "Error reading section\n"); free(sec); /* last one ? */ @@ -938,7 +995,7 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, } else { - printf(RED, "Unknown instruction %d at address 0x%08lx\n", hdr->opcode, (long)offset); + fatal(SB_FORMAT_ERROR, "Unknown instruction %d at address 0x%08lx\n", hdr->opcode, (long)offset); break; } } @@ -970,7 +1027,10 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, if(memcmp(decrypted_block, computed_sha1, 20) == 0) printf(RED, " Ok\n"); else + { printf(RED, " Failed\n"); + fatal(SB_CHECKSUM_ERROR, "File SHA-1 error\n"); + } free(buf); return sb_file; @@ -979,6 +1039,27 @@ struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, #undef print_hex } +void sb_free_section(struct sb_section_t sec) +{ + for(int j = 0; j < sec.nr_insts; j++) + { + free(sec.insts[j].padding); + free(sec.insts[j].data); + } + free(sec.insts); +} + +void sb_free(struct sb_file_t *file) +{ + if(!file) return; + + for(int i = 0; i < file->nr_sections; i++) + sb_free_section(file->sections[i]); + + free(file->sections); + free(file); +} + void sb_dump(struct sb_file_t *file, void *u, sb_color_printf cprintf) { #define printf(c, ...) cprintf(u, false, c, __VA_ARGS__) @@ -1007,17 +1088,17 @@ void sb_dump(struct sb_file_t *file, void *u, sb_color_printf cprintf) sb_fill_section_name(name, file->first_boot_sec_id); printf(TEXT, "%08x (%s)\n", file->first_boot_sec_id, name); - if(file->real_key) + if(file->override_real_key) { printf(TREE, "+-"); printf(HEADER, "Real key: "); - print_hex(TEXT, *file->real_key, 16, true); + print_hex(TEXT, file->real_key, 16, true); } - if(file->crypto_iv) + if(file->override_crypto_iv) { printf(TREE, "+-"); printf(HEADER, "IV : "); - print_hex(TEXT, *file->crypto_iv, 16, true); + print_hex(TEXT, file->crypto_iv, 16, true); } printf(TREE, "+-"); printf(HEADER, "Product Version: "); diff --git a/utils/sbtools/sb.h b/utils/imxtools/sb.h index 39bb8ce59b..ced6481a80 100644 --- a/utils/sbtools/sb.h +++ b/utils/imxtools/sb.h @@ -191,9 +191,11 @@ struct sb_section_t struct sb_file_t { /* override real, otherwise it is randomly generated */ - uint8_t (*real_key)[16]; + bool override_real_key; + uint8_t real_key[16]; /* override crypto IV, use with caution ! Use NULL to generate it */ - uint8_t (*crypto_iv)[16]; + bool override_crypto_iv; + uint8_t crypto_iv[16]; int nr_sections; uint16_t drive_tag; @@ -207,13 +209,29 @@ struct sb_file_t uint32_t image_size; /* in blocks */ }; -void sb_write_file(struct sb_file_t *sb, const char *filename); +enum sb_error_t +{ + SB_SUCCESS = 0, + SB_ERROR = -1, + SB_OPEN_ERROR = -2, + SB_READ_ERROR = -3, + SB_WRITE_ERROR = -4, + SB_FORMAT_ERROR = -5, + SB_CHECKSUM_ERROR = -6, + SB_NO_VALID_KEY = -7, + SB_FIRST_CRYPTO_ERROR = -8, + SB_LAST_CRYPTO_ERROR = SB_FIRST_CRYPTO_ERROR - CRYPTO_NUM_ERRORS, +}; + +enum sb_error_t sb_write_file(struct sb_file_t *sb, const char *filename); typedef void (*sb_color_printf)(void *u, bool err, color_t c, const char *f, ...); struct sb_file_t *sb_read_file(const char *filename, bool raw_mode, void *u, - sb_color_printf printf); + sb_color_printf printf, enum sb_error_t *err); void sb_fill_section_name(char name[5], uint32_t identifier); void sb_dump(struct sb_file_t *file, void *u, sb_color_printf printf); +void sb_free_section(struct sb_section_t file); +void sb_free(struct sb_file_t *file); #endif /* __SB_H__ */ diff --git a/utils/imx_hid_recovery/imx_hid_recovery.c b/utils/imxtools/sbloader.c index ba4645f8ab..ba4645f8ab 100644 --- a/utils/imx_hid_recovery/imx_hid_recovery.c +++ b/utils/imxtools/sbloader.c diff --git a/utils/sbtools/sbtoelf.c b/utils/imxtools/sbtoelf.c index 179f91262f..fda70b1180 100644 --- a/utils/sbtools/sbtoelf.c +++ b/utils/imxtools/sbtoelf.c @@ -268,7 +268,15 @@ int main(int argc, char **argv) const char *sb_filename = argv[optind]; - struct sb_file_t *file = sb_read_file(sb_filename, raw_mode, NULL, sb_printf); + enum sb_error_t err; + struct sb_file_t *file = sb_read_file(sb_filename, raw_mode, NULL, sb_printf, &err); + if(file == NULL) + { + color(OFF); + printf("SB read failed: %d\n", err); + return 1; + } + color(OFF); if(g_out_prefix) extract_sb_file(file); @@ -283,12 +291,12 @@ int main(int argc, char **argv) /* sb_read_file will fill real key and IV but we don't want to override * them when looping back otherwise the output will be inconsistent and * garbage */ - free(file->real_key); - file->real_key = NULL; - free(file->crypto_iv); - file->crypto_iv = NULL; + file->override_real_key = false; + file->override_crypto_iv = false; sb_write_file(file, loopback); } + sb_free(file); + clear_keys(); return 0; } diff --git a/utils/sbtools/sha1.c b/utils/imxtools/sha1.c index 0ad05bb5cd..0ad05bb5cd 100644 --- a/utils/sbtools/sha1.c +++ b/utils/imxtools/sha1.c |