diff options
Diffstat (limited to 'rbutil/rbutilqt/irivertools/irivertools.cpp')
-rw-r--r-- | rbutil/rbutilqt/irivertools/irivertools.cpp | 532 |
1 files changed, 532 insertions, 0 deletions
diff --git a/rbutil/rbutilqt/irivertools/irivertools.cpp b/rbutil/rbutilqt/irivertools/irivertools.cpp new file mode 100644 index 0000000000..f2cc59a8c2 --- /dev/null +++ b/rbutil/rbutilqt/irivertools/irivertools.cpp @@ -0,0 +1,532 @@ +/*************************************************************************** + * __________ __ ___. + * Open \______ \ ____ ____ | | _\_ |__ _______ ___ + * Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ / + * Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < < + * Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \ + * \/ \/ \/ \/ \/ + * Module: rbutil + * File: irivertools.cpp + * + * Copyright (C) 2007 Dominik Wenger + * + * All files in this archive are subject to the GNU General Public License. + * See the file COPYING in the source tree root for full license agreement. + * + * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY + * KIND, either express or implied. + * + ****************************************************************************/ + +#include "irivertools.h" + + +const unsigned char munge[] = { + 0x7a, 0x36, 0xc4, 0x43, 0x49, 0x6b, 0x35, 0x4e, 0xa3, 0x46, 0x25, 0x84, + 0x4d, 0x73, 0x74, 0x61 +}; + +const unsigned char header_modify[] = "* IHPFIRM-DECODED "; + +const char * const models[] = { "iHP-100", "iHP-120/iHP-140", "H300 series", + NULL }; + +/* aligns with models array; expected min firmware size */ +const unsigned int firmware_minsize[] = { 0x100000, 0x100000, 0x200000 }; +/* aligns with models array; expected max firmware size */ +const unsigned int firmware_maxsize[] = { 0x200000, 0x200000, 0x400000 }; + +const unsigned char header[][16] = { + { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 }, + { 0x20, 0x03, 0x08, 0x27, 0x24, 0x00, 0x02, 0x30, 0x19, 0x17, 0x65, 0x73, + 0x85, 0x32, 0x83, 0x22 }, + { 0x20, 0x04, 0x03, 0x27, 0x20, 0x50, 0x01, 0x70, 0x80, 0x30, 0x80, 0x06, + 0x30, 0x19, 0x17, 0x65 } +}; + +/* begin mkboot.c excerpt */ +unsigned char image[0x400000 + 0x220 + 0x400000/0x200]; + +bool mkboot(QString infile, QString outfile,QString bootloader,int origin,Ui::InstallProgressFrm* dp) +{ + int i; + int len,bllen; + int actual_length, total_length, binary_length, num_chksums; + + memset(image, 0xff, sizeof(image)); + + /* First, read the iriver original firmware into the image */ + QFile f(infile); + if(!f.open(QIODevice::ReadOnly)) + { + dp->listProgress->addItem("Could not open: %1" + infile); + return false; + } + i = f.read((char*)image,16); + if(i < 16) { + dp->listProgress->addItem("reading header failed"); + return false; + } + + /* This is the length of the binary image without the scrambling + overhead (but including the ESTFBINR header) */ + binary_length = image[4] + (image[5] << 8) + + (image[6] << 16) + (image[7] << 24); + + /* Read the rest of the binary data, but not the checksum block */ + len = binary_length+0x200-16; + i = f.read((char*)image+16, len); + if(i < len) { + dp->listProgress->addItem("reading firmware failed"); + return false; + } + + f.close(); + /* Now, read the boot loader into the image */ + f.setFileName(bootloader); + if(!f.open(QIODevice::ReadOnly)) + { + dp->listProgress->addItem("Could not open: %1" + bootloader); + return false; + } + + bllen = f.size(); + + i = f.read((char*)image+0x220 + origin, bllen); + if(i < bllen) { + dp->listProgress->addItem("reading bootloader failed"); + return false; + } + + f.close(); + f.setFileName(outfile); + if(!f.open(QIODevice::WriteOnly)) + { + dp->listProgress->addItem("Could not open: %1" + outfile); + return false; + } + + /* Patch the reset vector to start the boot loader */ + image[0x220 + 4] = image[origin + 0x220 + 4]; + image[0x220 + 5] = image[origin + 0x220 + 5]; + image[0x220 + 6] = image[origin + 0x220 + 6]; + image[0x220 + 7] = image[origin + 0x220 + 7]; + + /* This is the actual length of the binary, excluding all headers */ + actual_length = origin + bllen; + + /* Patch the ESTFBINR header */ + image[0x20c] = (actual_length >> 24) & 0xff; + image[0x20d] = (actual_length >> 16) & 0xff; + image[0x20e] = (actual_length >> 8) & 0xff; + image[0x20f] = actual_length & 0xff; + + image[0x21c] = (actual_length >> 24) & 0xff; + image[0x21d] = (actual_length >> 16) & 0xff; + image[0x21e] = (actual_length >> 8) & 0xff; + image[0x21f] = actual_length & 0xff; + + /* This is the length of the binary, including the ESTFBINR header and + rounded up to the nearest 0x200 boundary */ + binary_length = (actual_length + 0x20 + 0x1ff) & 0xfffffe00; + + /* The number of checksums, i.e number of 0x200 byte blocks */ + num_chksums = binary_length / 0x200; + + /* The total file length, including all headers and checksums */ + total_length = binary_length + num_chksums + 0x200; + + /* Patch the scrambler header with the new length info */ + image[0] = total_length & 0xff; + image[1] = (total_length >> 8) & 0xff; + image[2] = (total_length >> 16) & 0xff; + image[3] = (total_length >> 24) & 0xff; + + image[4] = binary_length & 0xff; + image[5] = (binary_length >> 8) & 0xff; + image[6] = (binary_length >> 16) & 0xff; + image[7] = (binary_length >> 24) & 0xff; + + image[8] = num_chksums & 0xff; + image[9] = (num_chksums >> 8) & 0xff; + image[10] = (num_chksums >> 16) & 0xff; + image[11] = (num_chksums >> 24) & 0xff; + + i = f.write((char*)image,total_length); + if(i < total_length) { + dp->listProgress->addItem("writing bootloader failed"); + return false; + } + + f.close(); + + return true; +} + +/* end mkboot.c excerpt */ + + +int intable(char *md5, struct sumpairs *table, int len) +{ + int i; + for (i = 0; i < len; i++) { + if (strncmp(md5, table[i].unpatched, 32) == 0) { + return i; + } + } + return -1; +} + + + + +static int testheader( const unsigned char * const data ) +{ + const unsigned char * const d = data+16; + const char * const * m = models; + int index = 0; + while( *m ) + { + if( memcmp( header[ index ], d, 16 ) == 0 ) + return index; + index++; + m++; + }; + return -1; +}; + +static void modifyheader( unsigned char * data ) +{ + const unsigned char * h = header_modify; + int i; + for( i=0; i<512; i++ ) + { + if( *h == '\0' ) + h = header_modify; + *data++ ^= *h++; + }; +}; + +int iriver_decode(QString infile_name, QString outfile_name, unsigned int modify, + enum striptype stripmode,Ui::InstallProgressFrm* dp ) +{ + QFile infile(infile_name); + QFile outfile(outfile_name); + int i = -1; + unsigned char headerdata[512]; + unsigned long dwLength1, dwLength2, dwLength3, fp = 0; + unsigned char blockdata[16+16]; + unsigned char out[16]; + unsigned char newmunge; + signed long lenread; + int s = 0; + unsigned char * pChecksums, * ppChecksums = 0; + unsigned char ck; + + + if(!infile.open(QIODevice::ReadOnly)) + { + dp->listProgress->addItem("Could not open: %1" + infile_name); + return -1; + } + if(!outfile.open(QIODevice::WriteOnly)) + { + dp->listProgress->addItem("Could not open: %1" + outfile_name); + return -1; + } + lenread = infile.read( (char*)headerdata, 512); + if( lenread != 512 ) + { + dp->listProgress->addItem("This doesn't look like a valid encrypted iHP" + "firmware - reason: header length."); + infile.close(); + outfile.close(); + return -1; + }; + + i = testheader( headerdata ); + if( i == -1 ) + { + dp->listProgress->addItem("This firmware is for an unknown model, or is not" + " a valid encrypted iHP firmware."); + infile.close(); + outfile.close(); + return -1; + }; + fprintf( stderr, "Model %s\n", models[ i ] ); + + dwLength1 = headerdata[0] | (headerdata[1]<<8) | + (headerdata[2]<<16) | (headerdata[3]<<24); + dwLength2 = headerdata[4] | (headerdata[5]<<8) | + (headerdata[6]<<16) | (headerdata[7]<<24); + dwLength3 = headerdata[8] | (headerdata[9]<<8) | + (headerdata[10]<<16) | (headerdata[11]<<24); + + if( dwLength1 < firmware_minsize[ i ] || + dwLength1 > firmware_maxsize[ i ] || + dwLength2 < firmware_minsize[ i ] || + dwLength2 > dwLength1 || + dwLength3 > dwLength1 || + dwLength2>>9 != dwLength3 || + dwLength2+dwLength3+512 != dwLength1 ) + { + dp->listProgress->addItem("This doesn't look like a valid encrypted " + "iHP firmware - reason: file 'length' data."); + infile.close(); + outfile.close(); + return -1; + }; + + pChecksums = ppChecksums = (unsigned char *)( malloc( dwLength3 ) ); + + if( modify ) + { + modifyheader( headerdata ); + }; + + if( stripmode == STRIP_NONE ) + outfile.write( (char*)headerdata, 512); + + memset( blockdata, 0, 16 ); + + ck = 0; + while( ( fp < dwLength2 ) && + ( lenread = infile.read( (char*)blockdata+16, 16) == 16) ) + { + fp += 16; + + for( i=0; i<16; ++i ) + { + newmunge = blockdata[16+i] ^ munge[i]; + out[i] = newmunge ^ blockdata[i]; + blockdata[i] = newmunge; + ck += out[i]; + } + + if( fp > ESTF_SIZE || stripmode != STRIP_HEADER_CHECKSUM_ESTF ) + { + outfile.write( (char*)out+4, 12); + outfile.write( (char*)out, 4); + } + else + { + if( ESTF_SIZE - fp < 16 ) + { + memcpy( out+4, blockdata+16, 12 ); + memcpy( out, blockdata+28, 4 ); + outfile.write((char*) blockdata+16+ESTF_SIZE-fp, ESTF_SIZE-fp); + } + } + + + if( s == 496 ) + { + s = 0; + memset( blockdata, 0, 16 ); + *ppChecksums++ = ck; + ck = 0; + } + else + s+=16; + }; + + if( fp != dwLength2 ) + { + dp->listProgress->addItem("This doesn't look like a valid encrypted " + "iHP firmware - reason: 'length2' mismatch."); + infile.close(); + outfile.close(); + return -1; + }; + + fp = 0; + ppChecksums = pChecksums; + while( ( fp < dwLength3 ) && + ( lenread = infile.read((char*) blockdata, 32 ) ) > 0 ) + { + fp += lenread; + if( stripmode == STRIP_NONE ) + outfile.write((char*) blockdata, lenread ); + if( memcmp( ppChecksums, blockdata, lenread ) != 0 ) + { + dp->listProgress->addItem("This doesn't look like a valid encrypted " + "iHP firmware - reason: Checksum mismatch!"); + infile.close(); + outfile.close(); + return -1; + }; + ppChecksums += lenread; + }; + + if( fp != dwLength3 ) + { + dp->listProgress->addItem("This doesn't look like a valid encrypted " + "iHP firmware - reason: 'length3' mismatch."); + infile.close(); + outfile.close(); + return -1; + }; + + + fprintf( stderr, "File decoded correctly and all checksums matched!\n" ); + switch( stripmode ) + { + default: + case STRIP_NONE: + fprintf(stderr, "Output file contains all headers and " + "checksums\n"); + break; + case STRIP_HEADER_CHECKSUM: + fprintf( stderr, "NB: output file contains only ESTFBINR header" + " and decoded firmware code\n" ); + break; + case STRIP_HEADER_CHECKSUM_ESTF: + fprintf( stderr, "NB: output file contains only raw decoded " + "firmware code\n" ); + break; + }; + + infile.close(); + outfile.close(); + return 0; + +}; + +int iriver_encode(QString infile_name, QString outfile_name, unsigned int modify,Ui::InstallProgressFrm* dp ) +{ + QFile infile(infile_name); + QFile outfile(outfile_name); + int i = -1; + unsigned char headerdata[512]; + unsigned long dwLength1, dwLength2, dwLength3, fp = 0; + unsigned char blockdata[16+16]; + unsigned char out[16]; + unsigned char newmunge; + signed long lenread; + int s = 0; + unsigned char * pChecksums, * ppChecksums; + unsigned char ck; + + if(!infile.open(QIODevice::ReadOnly)) + { + dp->listProgress->addItem("Could not open: %1" + infile_name); + return -1; + } + if(!outfile.open(QIODevice::WriteOnly)) + { + dp->listProgress->addItem("Could not open: %1" + outfile_name); + return -1; + } + + lenread = infile.read((char*) headerdata, 512 ); + if( lenread != 512 ) + { + dp->listProgress->addItem("This doesn't look like a valid decoded " + "iHP firmware - reason: header length."); + infile.close(); + outfile.close(); + }; + + if( modify ) + { + modifyheader( headerdata ); /* reversible */ + }; + + i = testheader( headerdata ); + if( i == -1 ) + { + dp->listProgress->addItem("This firmware is for an unknown model, or is not" + " a valid decoded iHP firmware."); + infile.close(); + outfile.close(); + }; + fprintf( stderr, "Model %s\n", models[ i ] ); + + dwLength1 = headerdata[0] | (headerdata[1]<<8) | + (headerdata[2]<<16) | (headerdata[3]<<24); + dwLength2 = headerdata[4] | (headerdata[5]<<8) | + (headerdata[6]<<16) | (headerdata[7]<<24); + dwLength3 = headerdata[8] | (headerdata[9]<<8) | + (headerdata[10]<<16) | (headerdata[11]<<24); + + if( dwLength1 < firmware_minsize[i] || + dwLength1 > firmware_maxsize[i] || + dwLength2 < firmware_minsize[i] || + dwLength2 > dwLength1 || + dwLength3 > dwLength1 || + dwLength2+dwLength3+512 != dwLength1 ) + { + dp->listProgress->addItem("This doesn't look like a valid decoded " + "iHP firmware - reason:file 'length' data."); + infile.close(); + outfile.close(); + }; + + pChecksums = ppChecksums = (unsigned char *)( malloc( dwLength3 ) ); + + outfile.write( (char*)headerdata, 512); + + memset( blockdata, 0, 16 ); + ck = 0; + while( ( fp < dwLength2 ) && + ( lenread = infile.read((char*) blockdata+16, 16) ) == 16 ) + { + fp += 16; + for( i=0; i<16; ++i ) + { + newmunge = blockdata[16+((12+i)&0xf)] ^ blockdata[i]; + out[i] = newmunge ^ munge[i]; + ck += blockdata[16+i]; + blockdata[i] = newmunge; + }; + outfile.write( (char*)out, 16); + + if( s == 496 ) + { + s = 0; + memset( blockdata, 0, 16 ); + *ppChecksums++ = ck; + ck = 0; + } + else + s+=16; + }; + + if( fp != dwLength2 ) + { + dp->listProgress->addItem("This doesn't look like a valid decoded " + "iHP firmware - reason: 'length1' mismatch."); + infile.close(); + outfile.close(); + }; + + /* write out remainder w/out applying descrambler */ + fp = 0; + lenread = dwLength3; + ppChecksums = pChecksums; + while( ( fp < dwLength3) && + ( lenread = outfile.write((char*) ppChecksums, lenread) ) > 0 ) + { + fp += lenread; + ppChecksums += lenread; + lenread = dwLength3 - fp; + }; + + if( fp != dwLength3 ) + { + dp->listProgress->addItem("This doesn't look like a valid decoded " + "iHP firmware - 'length2' mismatch."); + infile.close(); + outfile.close(); + }; + + fprintf( stderr, "File encoded successfully and checksum table built!\n" ); + + infile.close(); + outfile.close(); + return 0; + +}; + + + |