mirror of https://github.com/wolfSSL/wolfBoot.git
wolfBoot improvements (from elms):
* Add `WOLFBOOT_DUALBOOT` for dynamic fallback * Refactor header field parsing * Cleanup compiler warnings and logic extra check * Option to leave out partition based functions * Add `WOLFBOOT_FIXED_PARTITIONS` enable using partition enum and related functions * Wrap all delta update references * Update raspberry documentation * EFI refactoring * Add `keytools_check` target * Add "library" targetpull/203/head
parent
99e897da53
commit
6068a8047c
52
Makefile
52
Makefile
|
@ -16,15 +16,18 @@ LDFLAGS:=
|
||||||
LD_START_GROUP:=-Wl,--start-group
|
LD_START_GROUP:=-Wl,--start-group
|
||||||
LD_END_GROUP:=-Wl,--end-group
|
LD_END_GROUP:=-Wl,--end-group
|
||||||
|
|
||||||
|
V?=0
|
||||||
|
|
||||||
OBJS:= \
|
OBJS:= \
|
||||||
./hal/$(TARGET).o \
|
./hal/$(TARGET).o \
|
||||||
./src/loader.o \
|
|
||||||
./src/string.o \
|
./src/string.o \
|
||||||
./src/image.o \
|
./src/image.o \
|
||||||
./src/libwolfboot.o
|
./src/libwolfboot.o
|
||||||
WOLFCRYPT_OBJS:=
|
WOLFCRYPT_OBJS:=
|
||||||
PUBLIC_KEY_OBJS:=
|
PUBLIC_KEY_OBJS:=
|
||||||
UPDATE_OBJS:=
|
ifneq ("$(NO_LOADER)","1")
|
||||||
|
OBJS+=./src/loader.o
|
||||||
|
endif
|
||||||
|
|
||||||
## Architecture/CPU configuration
|
## Architecture/CPU configuration
|
||||||
include arch.mk
|
include arch.mk
|
||||||
|
@ -39,12 +42,10 @@ CFLAGS+= \
|
||||||
-D"PLATFORM_$(TARGET)"
|
-D"PLATFORM_$(TARGET)"
|
||||||
|
|
||||||
# Setup default optimizations (for GCC)
|
# Setup default optimizations (for GCC)
|
||||||
ifneq ($(TARGET),x86_64_efi)
|
ifeq ($(USE_GCC_HEADLESS),1)
|
||||||
ifeq ($(USE_GCC),1)
|
CFLAGS+=-Wall -Wextra -Wno-main -ffreestanding -Wno-unused -nostartfiles
|
||||||
CFLAGS+=-Wall -Wextra -Wno-main -ffreestanding -Wno-unused -nostartfiles
|
CFLAGS+=-ffunction-sections -fdata-sections
|
||||||
CFLAGS+=-ffunction-sections -fdata-sections
|
LDFLAGS+=-T $(LSCRIPT) -Wl,-gc-sections -Wl,-Map=wolfboot.map -ffreestanding -nostartfiles
|
||||||
LDFLAGS+=-T $(LSCRIPT) -Wl,-gc-sections -Wl,-Map=wolfboot.map -ffreestanding -nostartfiles
|
|
||||||
endif
|
|
||||||
endif
|
endif
|
||||||
|
|
||||||
MAIN_TARGET=factory.bin
|
MAIN_TARGET=factory.bin
|
||||||
|
@ -63,12 +64,18 @@ ifeq ($(TARGET),x86_64_efi)
|
||||||
MAIN_TARGET:=wolfboot.efi
|
MAIN_TARGET:=wolfboot.efi
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ASFLAGS:=$(CFLAGS)
|
ifeq ($(TARGET),library)
|
||||||
|
CFLAGS+=-g
|
||||||
|
MAIN_TARGET:=test-lib
|
||||||
|
endif
|
||||||
|
|
||||||
BOOTLOADER_PARTITION_SIZE?=$$(( $(WOLFBOOT_PARTITION_BOOT_ADDRESS) - $(ARCH_FLASH_OFFSET)))
|
BOOTLOADER_PARTITION_SIZE?=$$(( $(WOLFBOOT_PARTITION_BOOT_ADDRESS) - $(ARCH_FLASH_OFFSET)))
|
||||||
|
|
||||||
all: $(MAIN_TARGET)
|
all: $(MAIN_TARGET)
|
||||||
|
|
||||||
|
test-lib: $(OBJS)
|
||||||
|
$(Q)$(CC) $(CFLAGS) -o $@ $^
|
||||||
|
|
||||||
wolfboot.efi: wolfboot.elf
|
wolfboot.efi: wolfboot.elf
|
||||||
@echo "\t[BIN] $@"
|
@echo "\t[BIN] $@"
|
||||||
$(Q)$(OBJCOPY) -j .text -j .sdata -j .data \
|
$(Q)$(OBJCOPY) -j .text -j .sdata -j .data \
|
||||||
|
@ -106,20 +113,17 @@ include tools/test-enc.mk
|
||||||
include tools/test-delta.mk
|
include tools/test-delta.mk
|
||||||
include tools/test-renode.mk
|
include tools/test-renode.mk
|
||||||
|
|
||||||
ed25519.der:
|
PYTHON?=python3
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/ed25519_pub_key.c
|
keytools_check:
|
||||||
ed448.der:
|
$(Q)(test -x "$(KEYGEN_TOOL)") || \
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/ed448_pub_key.c
|
($(PYTHON) -c "import wolfcrypt" > /dev/null 2>&1) || \
|
||||||
ecc256.der:
|
(echo "ERROR: Key tool unavailable '$(KEYGEN_TOOL)'.\n"\
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/ecc256_pub_key.c
|
"Run 'make keytools' or install wolfcrypt 'pip3 install wolfcrypt'" && false)
|
||||||
ecc384.der:
|
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/ecc384_pub_key.c
|
|
||||||
ecc521.der:
|
%.der:
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/ecc521_pub_key.c
|
$(Q)$(MAKE) keytools_check
|
||||||
rsa2048.der:
|
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/$(@:.der=)_pub_key.c
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/rsa2048_pub_key.c
|
|
||||||
rsa4096.der:
|
|
||||||
$(Q)$(KEYGEN_TOOL) $(KEYGEN_OPTIONS) src/rsa4096_pub_key.c
|
|
||||||
|
|
||||||
keytools:
|
keytools:
|
||||||
@make -C tools/keytools clean
|
@make -C tools/keytools clean
|
||||||
|
@ -222,4 +226,4 @@ check_config:
|
||||||
|
|
||||||
FORCE:
|
FORCE:
|
||||||
|
|
||||||
.PHONY: FORCE clean
|
.PHONY: FORCE clean keytool_check
|
||||||
|
|
16
arch.mk
16
arch.mk
|
@ -1,6 +1,4 @@
|
||||||
## CPU Architecture selection via $ARCH
|
## CPU Architecture selection via $ARCH
|
||||||
UPDATE_OBJS:=./src/update_flash.o
|
|
||||||
|
|
||||||
|
|
||||||
# check for FASTMATH or SP_MATH
|
# check for FASTMATH or SP_MATH
|
||||||
ifeq ($(SPMATH),1)
|
ifeq ($(SPMATH),1)
|
||||||
|
@ -341,8 +339,8 @@ endif
|
||||||
|
|
||||||
CFLAGS+=-DARCH_FLASH_OFFSET=$(ARCH_FLASH_OFFSET)
|
CFLAGS+=-DARCH_FLASH_OFFSET=$(ARCH_FLASH_OFFSET)
|
||||||
|
|
||||||
|
|
||||||
USE_GCC?=1
|
USE_GCC?=1
|
||||||
|
USE_GCC_HEADLESS?=1
|
||||||
ifeq ($(USE_GCC),1)
|
ifeq ($(USE_GCC),1)
|
||||||
## Toolchain setup
|
## Toolchain setup
|
||||||
CC=$(CROSS_COMPILE)gcc
|
CC=$(CROSS_COMPILE)gcc
|
||||||
|
@ -355,12 +353,14 @@ endif
|
||||||
|
|
||||||
|
|
||||||
ifeq ($(TARGET),x86_64_efi)
|
ifeq ($(TARGET),x86_64_efi)
|
||||||
|
USE_GCC_HEADLESS=0
|
||||||
GNU_EFI_LIB_PATH?=/usr/lib
|
GNU_EFI_LIB_PATH?=/usr/lib
|
||||||
GNU_EFI_CRT0=$(GNU_EFI_LIB_PATH)/crt0-efi-x86_64.o
|
GNU_EFI_CRT0=$(GNU_EFI_LIB_PATH)/crt0-efi-x86_64.o
|
||||||
GNU_EFI_LSCRIPT=$(GNU_EFI_LIB_PATH)/elf_x86_64_efi.lds
|
GNU_EFI_LSCRIPT=$(GNU_EFI_LIB_PATH)/elf_x86_64_efi.lds
|
||||||
CFLAGS += -fpic -ffreestanding -fno-stack-protector -fno-stack-check \
|
CFLAGS += -fpic -ffreestanding -fno-stack-protector -fno-stack-check \
|
||||||
-fshort-wchar -mno-red-zone -maccumulate-outgoing-args
|
-fshort-wchar -mno-red-zone -maccumulate-outgoing-args
|
||||||
CFLAGS += -I/usr/include/efi -I/usr/include/efi/x86_64 -DPLATFORM_X86_64_EFI
|
CFLAGS += -I/usr/include/efi -I/usr/include/efi/x86_64 \
|
||||||
|
-DPLATFORM_X86_64_EFI -DWOLFBOOT_DUALBOOT
|
||||||
LDFLAGS = -shared -Bsymbolic -L/usr/lib -T$(GNU_EFI_LSCRIPT)
|
LDFLAGS = -shared -Bsymbolic -L/usr/lib -T$(GNU_EFI_LSCRIPT)
|
||||||
LD_START_GROUP = $(GNU_EFI_CRT0)
|
LD_START_GROUP = $(GNU_EFI_CRT0)
|
||||||
LD_END_GROUP = -lgnuefi -lefi
|
LD_END_GROUP = -lgnuefi -lefi
|
||||||
|
@ -372,13 +372,19 @@ BOOT_IMG?=test-app/image.bin
|
||||||
|
|
||||||
## Update mechanism
|
## Update mechanism
|
||||||
ifeq ($(ARCH),AARCH64)
|
ifeq ($(ARCH),AARCH64)
|
||||||
CFLAGS+=-DMMU
|
CFLAGS+=-DMMU -DWOLFBOOT_DUALBOOT
|
||||||
UPDATE_OBJS:=src/update_ram.o
|
UPDATE_OBJS:=src/update_ram.o
|
||||||
endif
|
endif
|
||||||
ifeq ($(DUALBANK_SWAP),1)
|
ifeq ($(DUALBANK_SWAP),1)
|
||||||
|
CFLAGS+=-DWOLFBOOT_DUALBOOT
|
||||||
UPDATE_OBJS:=src/update_flash_hwswap.o
|
UPDATE_OBJS:=src/update_flash_hwswap.o
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
ifeq ("$(UPDATE_OBJS)","")
|
||||||
|
UPDATE_OBJS:=./src/update_flash.o
|
||||||
|
endif
|
||||||
|
|
||||||
|
|
||||||
## Debug
|
## Debug
|
||||||
ifeq ($(DEBUG),1)
|
ifeq ($(DEBUG),1)
|
||||||
WOLFCRYPT_OBJS+=./lib/wolfssl/wolfcrypt/src/logging.o
|
WOLFCRYPT_OBJS+=./lib/wolfssl/wolfcrypt/src/logging.o
|
||||||
|
|
|
@ -0,0 +1,12 @@
|
||||||
|
ARCH=
|
||||||
|
NO_LOADER=1
|
||||||
|
USE_GCC_HEADLESS=0
|
||||||
|
# ends up double including this to work around defaulting to update_flash
|
||||||
|
UPDATE_OBJS:=hal/library.o
|
||||||
|
TARGET=library
|
||||||
|
WOLFBOOT_SMALL_STACK=1
|
||||||
|
SIGN?=ED25519
|
||||||
|
HASH?=SHA256
|
||||||
|
IMAGE_HEADER_SIZE?=0x100
|
||||||
|
DEBUG=0
|
||||||
|
SPMATH=0
|
|
@ -7,3 +7,4 @@ DEBUG=1
|
||||||
SPMATH=0
|
SPMATH=0
|
||||||
# required for keytools
|
# required for keytools
|
||||||
WOLFBOOT_SECTOR_SIZE?=0x1000
|
WOLFBOOT_SECTOR_SIZE?=0x1000
|
||||||
|
WOLFBOOT_NO_PARTITIONS=1
|
|
@ -98,6 +98,7 @@ openssl rsautl -sign -keyform der -inkey rsa2048.der -in test-app/image_v1_diges
|
||||||
# OR
|
# OR
|
||||||
python3 ./tools/keytools/sign.py --rsa2048 --sha256 --manual-sign test-app/image.bin rsa4096_pub.der 1 test-app/image_v1.sig
|
python3 ./tools/keytools/sign.py --rsa2048 --sha256 --manual-sign test-app/image.bin rsa4096_pub.der 1 test-app/image_v1.sig
|
||||||
|
|
||||||
# Combine into factory image
|
# Combine into factory image (0xc0000 is the WOLFBOOT_PARTITION_BOOT_ADDRESS)
|
||||||
cat wolfboot-align.bin test-app/image_v1_signed.bin > factory.bin
|
tools/bin-assemble/bin-assemble factory.bin 0x0 wolfboot.bin \
|
||||||
|
0xc0000 test-app/image_v1_signed.bin
|
||||||
```
|
```
|
||||||
|
|
|
@ -815,7 +815,7 @@ cd $wolfboot_dir
|
||||||
|
|
||||||
```
|
```
|
||||||
cp config/examples/raspi3.config .config
|
cp config/examples/raspi3.config .config
|
||||||
make wolfboot-align.bin
|
make wolfboot.bin
|
||||||
```
|
```
|
||||||
|
|
||||||
* Sign Image
|
* Sign Image
|
||||||
|
@ -826,7 +826,8 @@ tools/keytools/sign.py --rsa4096 --sha3 Image rsa4096.der 1
|
||||||
* Compose the image
|
* Compose the image
|
||||||
|
|
||||||
```
|
```
|
||||||
cat wolfboot-align.bin Image_v1_signed.bin >wolfboot_linux_raspi.bin
|
tools/bin-assemble/bin-assemble wolfboot_linux_raspi.bin 0x0 wolfboot.bin \
|
||||||
|
0xc0000 Image_v1_signed.bin
|
||||||
dd if=bcm2710-rpi-3-b.dtb of=wolfboot_linux_raspi.bin bs=1 seek=128K conv=notrunc
|
dd if=bcm2710-rpi-3-b.dtb of=wolfboot_linux_raspi.bin bs=1 seek=128K conv=notrunc
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,31 @@
|
||||||
|
```
|
||||||
|
ln -s config/examples/library.config .config
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
cat > include/target.h << EOF
|
||||||
|
#ifndef H_TARGETS_TARGET_
|
||||||
|
#define H_TARGETS_TARGET_
|
||||||
|
|
||||||
|
#define WOLFBOOT_NO_PARTITIONS
|
||||||
|
|
||||||
|
#define WOLFBOOT_SECTOR_SIZE 0x20000
|
||||||
|
#define WOLFBOOT_PARTITION_SIZE 0x20000
|
||||||
|
|
||||||
|
#endif /* !H_TARGETS_TARGET_ */
|
||||||
|
|
||||||
|
EOF
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
touch empty
|
||||||
|
make keytools
|
||||||
|
./tools/keytools/keygen --ed25519 src/ed25519_pub_key.c
|
||||||
|
./tools/keytools/sign --ed25519 --sha256 empty ed25519.der 1
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
make test-lib
|
||||||
|
./test-lib empty_v1_signed.bin
|
||||||
|
```
|
|
@ -0,0 +1,167 @@
|
||||||
|
/* library.c
|
||||||
|
*
|
||||||
|
* Copyright (C) 2022 wolfSSL Inc.
|
||||||
|
*
|
||||||
|
* This file is part of wolfBoot.
|
||||||
|
*
|
||||||
|
* wolfBoot is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation; either version 2 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* wolfBoot is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
#if 1 /* for desktop testing */
|
||||||
|
#define HAVE_UNISTD_H
|
||||||
|
#define PRINTF_ENABLED
|
||||||
|
#else /* restricted build */
|
||||||
|
#define NO_FILESYSTEM
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef HAVE_UNISTD_H
|
||||||
|
#include <unistd.h>
|
||||||
|
#define exit _exit
|
||||||
|
#else
|
||||||
|
#define exit(x) while(1) ;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#include "image.h"
|
||||||
|
#include "printf.h"
|
||||||
|
|
||||||
|
void hal_init(void) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
int hal_flash_write(uint32_t address, const uint8_t *data, int len) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
int hal_flash_erase(uint32_t address, int len) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
void hal_flash_unlock(void) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
void hal_flash_lock(void) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
void hal_prepare_boot(void) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
int do_boot(uint32_t* v) {
|
||||||
|
wolfBoot_printf("booting %p"
|
||||||
|
#ifdef HAVE_UNISTD_H
|
||||||
|
"(actually exiting)"
|
||||||
|
#else
|
||||||
|
"(actually spin loop)"
|
||||||
|
#endif
|
||||||
|
"\n", v);
|
||||||
|
exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
uintptr_t gImage;
|
||||||
|
uint8_t test_img[] = {
|
||||||
|
0x57, 0x4F, 0x4C, 0x46, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x04, 0x00, 0x01,
|
||||||
|
0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0x02, 0x00, 0x08, 0x00, 0x1E, 0xBC,
|
||||||
|
0x0E, 0x62, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x02, 0x00, 0x01, 0x01, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x03, 0x00, 0x20, 0x00, 0x08, 0xF9, 0x46, 0x2E,
|
||||||
|
0x0F, 0x70, 0x33, 0x38, 0xAC, 0x19, 0xFF, 0x82, 0xC8, 0xAC, 0xD6, 0x9A, 0xF9,
|
||||||
|
0xB2, 0x1F, 0xED, 0x60, 0x3F, 0x68, 0x7B, 0x85, 0xDB, 0x46, 0x8B, 0x3A, 0x7E,
|
||||||
|
0x65, 0xE0, 0x10, 0x00, 0x20, 0x00, 0x02, 0x45, 0x14, 0xB0, 0x5A, 0x37, 0x95,
|
||||||
|
0x3E, 0x17, 0x49, 0xAD, 0x75, 0xE7, 0x71, 0xD5, 0x65, 0xBB, 0x78, 0x7F, 0xFA,
|
||||||
|
0xF6, 0x31, 0x4F, 0x63, 0xF9, 0x20, 0x3D, 0xA1, 0x56, 0xB2, 0x71, 0x7C, 0x20,
|
||||||
|
0x00, 0x40, 0x00, 0xC6, 0x7A, 0xEB, 0x04, 0xB1, 0xB8, 0x82, 0xE7, 0x97, 0xD8,
|
||||||
|
0x00, 0x80, 0x1D, 0x93, 0xA9, 0x80, 0x37, 0xE0, 0x63, 0x7F, 0x78, 0x15, 0xD8,
|
||||||
|
0xD1, 0x22, 0xD6, 0x75, 0x0B, 0x04, 0xE9, 0x71, 0x12, 0xB7, 0x09, 0x32, 0xBC,
|
||||||
|
0xB7, 0xFC, 0xA1, 0x9D, 0x32, 0xC0, 0x7D, 0xDB, 0x63, 0xE2, 0x12, 0xF2, 0xE2,
|
||||||
|
0x41, 0xF4, 0x15, 0x7A, 0x38, 0xB5, 0xCD, 0xAA, 0x01, 0xB3, 0x5E, 0xF2, 0xCC,
|
||||||
|
0xD9, 0x02, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
|
int wolfBoot_start(void)
|
||||||
|
{
|
||||||
|
struct wolfBoot_image os_image;
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
os_image.hdr = (uint8_t*)gImage;
|
||||||
|
|
||||||
|
if ((ret = wolfBoot_open_image_address(&os_image, (uint8_t*)gImage)) < 0 ) {
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((ret = wolfBoot_verify_integrity(&os_image)) < 0) {
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((ret = wolfBoot_verify_authenticity(&os_image)) < 0) {
|
||||||
|
goto exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
wolfBoot_printf("Firmware Valid\n");
|
||||||
|
|
||||||
|
do_boot((uint32_t*)os_image.fw_base);
|
||||||
|
|
||||||
|
exit:
|
||||||
|
if (ret < 0) {
|
||||||
|
wolfBoot_printf("Failure %d: Hdr %d, Hash %d, Sig %d\n", ret,
|
||||||
|
os_image.hdr_ok, os_image.sha_ok, os_image.signature_ok);
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int main(int argc, const char* argv[])
|
||||||
|
{
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
#ifdef NO_FILESYSTEM
|
||||||
|
gImage = (uintptr_t)test_img;
|
||||||
|
#else
|
||||||
|
if (argc > 1) {
|
||||||
|
size_t sz = 0;
|
||||||
|
FILE* img = fopen(argv[1], "rb");
|
||||||
|
fseek(img, 0, SEEK_END);
|
||||||
|
sz = ftell(img);
|
||||||
|
fseek(img, 0, SEEK_SET);
|
||||||
|
|
||||||
|
gImage = (uintptr_t)malloc(sz);
|
||||||
|
if (((void*)gImage) == NULL) {
|
||||||
|
wolfBoot_printf("failed to malloc %zu bytes for image\n", sz);
|
||||||
|
ret = -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t bread = fread((void*)gImage, 1, sz, img);
|
||||||
|
if (bread != sz) {
|
||||||
|
ret = -2;
|
||||||
|
wolfBoot_printf("read %zu of %zu bytes from %s\n", bread, sz, argv[1]);
|
||||||
|
}
|
||||||
|
fclose(img);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
ret = wolfBoot_start();
|
||||||
|
|
||||||
|
#ifndef NO_FILESYSTEM
|
||||||
|
free((void*)gImage);
|
||||||
|
#endif
|
||||||
|
return ret;
|
||||||
|
}
|
|
@ -70,17 +70,28 @@ int RAMFUNCTION hal_flash_erase(uint32_t address, int len)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void* hal_get_primary_address(void)
|
||||||
|
{
|
||||||
|
return (void*)kernel_addr;
|
||||||
|
}
|
||||||
|
void* hal_get_update_address(void)
|
||||||
|
{
|
||||||
|
return (void*)update_addr;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
static void panic()
|
static void panic()
|
||||||
{
|
{
|
||||||
while(1) {}
|
while(1) {}
|
||||||
}
|
}
|
||||||
|
|
||||||
void RAMFUNCTION x86_64_efi_do_boot(uint8_t *kernel)
|
void RAMFUNCTION x86_64_efi_do_boot(uint32_t *kernel_addr)
|
||||||
{
|
{
|
||||||
MEMMAP_DEVICE_PATH mem_path_device[2];
|
MEMMAP_DEVICE_PATH mem_path_device[2];
|
||||||
EFI_HANDLE kernelImageHandle;
|
EFI_HANDLE kernelImageHandle;
|
||||||
EFI_STATUS status;
|
EFI_STATUS status;
|
||||||
uint32_t *size;
|
uint32_t *size;
|
||||||
|
uint8_t* kernel = (uint8_t*)kernel_addr;
|
||||||
|
|
||||||
size = (uint32_t *)(kernel + 4);
|
size = (uint32_t *)(kernel + 4);
|
||||||
kernel += IMAGE_HEADER_SIZE;
|
kernel += IMAGE_HEADER_SIZE;
|
||||||
|
|
|
@ -24,7 +24,6 @@
|
||||||
#ifndef H_HAL_
|
#ifndef H_HAL_
|
||||||
#define H_HAL_
|
#define H_HAL_
|
||||||
|
|
||||||
#include <inttypes.h>
|
|
||||||
|
|
||||||
#include "target.h"
|
#include "target.h"
|
||||||
|
|
||||||
|
@ -48,6 +47,11 @@ void hal_prepare_boot(void);
|
||||||
void hal_flash_dualbank_swap(void);
|
void hal_flash_dualbank_swap(void);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_DUALBOOT
|
||||||
|
void* hal_get_primary_address(void);
|
||||||
|
void* hal_get_update_address(void);
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifndef SPI_FLASH
|
#ifndef SPI_FLASH
|
||||||
/* user supplied external flash interfaces */
|
/* user supplied external flash interfaces */
|
||||||
int ext_flash_write(uintptr_t address, const uint8_t *data, int len);
|
int ext_flash_write(uintptr_t address, const uint8_t *data, int len);
|
||||||
|
|
|
@ -497,6 +497,7 @@ static void wolfBoot_image_confirm_signature_ok(struct wolfBoot_image *img)
|
||||||
|
|
||||||
/* Defined in image.c */
|
/* Defined in image.c */
|
||||||
int wolfBoot_open_image(struct wolfBoot_image *img, uint8_t part);
|
int wolfBoot_open_image(struct wolfBoot_image *img, uint8_t part);
|
||||||
|
int wolfBoot_open_image_address(struct wolfBoot_image* img, uint8_t* image);
|
||||||
int wolfBoot_verify_integrity(struct wolfBoot_image *img);
|
int wolfBoot_verify_integrity(struct wolfBoot_image *img);
|
||||||
int wolfBoot_verify_authenticity(struct wolfBoot_image *img);
|
int wolfBoot_verify_authenticity(struct wolfBoot_image *img);
|
||||||
int wolfBoot_get_partition_state(uint8_t part, uint8_t *st);
|
int wolfBoot_get_partition_state(uint8_t part, uint8_t *st);
|
||||||
|
|
|
@ -38,6 +38,8 @@
|
||||||
# include "xil_printf.h"
|
# include "xil_printf.h"
|
||||||
# define wolfBoot_printf(_f_, ...) xil_printf(_f_, ##__VA_ARGS__)
|
# define wolfBoot_printf(_f_, ...) xil_printf(_f_, ##__VA_ARGS__)
|
||||||
# elif defined(WOLFBOOT_DEBUG_EFI)
|
# elif defined(WOLFBOOT_DEBUG_EFI)
|
||||||
|
# include "efi/efi.h"
|
||||||
|
# include "efi/efilib.h"
|
||||||
/* NOTE: %s arguments will not work as EFI uses widechar string */
|
/* NOTE: %s arguments will not work as EFI uses widechar string */
|
||||||
# define wolfBoot_printf(_f_, ...) Print(L##_f_, ##__VA_ARGS__)
|
# define wolfBoot_printf(_f_, ...) Print(L##_f_, ##__VA_ARGS__)
|
||||||
# else
|
# else
|
||||||
|
|
|
@ -27,7 +27,11 @@
|
||||||
#ifndef H_TARGETS_TARGET_
|
#ifndef H_TARGETS_TARGET_
|
||||||
#define H_TARGETS_TARGET_
|
#define H_TARGETS_TARGET_
|
||||||
|
|
||||||
#ifndef PLATFORM_X86_64_EFI
|
#ifndef WOLFBOOT_NO_PARTITIONS
|
||||||
|
# define WOLFBOOT_FIXED_PARTITIONS
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
#define WOLFBOOT_SECTOR_SIZE ##WOLFBOOT_SECTOR_SIZE##
|
#define WOLFBOOT_SECTOR_SIZE ##WOLFBOOT_SECTOR_SIZE##
|
||||||
#define WOLFBOOT_PARTITION_BOOT_ADDRESS ##WOLFBOOT_PARTITION_BOOT_ADDRESS##
|
#define WOLFBOOT_PARTITION_BOOT_ADDRESS ##WOLFBOOT_PARTITION_BOOT_ADDRESS##
|
||||||
#define WOLFBOOT_PARTITION_SIZE ##WOLFBOOT_PARTITION_SIZE##
|
#define WOLFBOOT_PARTITION_SIZE ##WOLFBOOT_PARTITION_SIZE##
|
||||||
|
@ -39,15 +43,6 @@
|
||||||
#define WOLFBOOT_DTS_UPDATE_ADDRESS ##WOLFBOOT_DTS_UPDATE_ADDRESS##
|
#define WOLFBOOT_DTS_UPDATE_ADDRESS ##WOLFBOOT_DTS_UPDATE_ADDRESS##
|
||||||
#define WOLFBOOT_LOAD_ADDRESS ##WOLFBOOT_LOAD_ADDRESS##
|
#define WOLFBOOT_LOAD_ADDRESS ##WOLFBOOT_LOAD_ADDRESS##
|
||||||
#define WOLFBOOT_LOAD_DTS_ADDRESS ##WOLFBOOT_LOAD_DTS_ADDRESS##
|
#define WOLFBOOT_LOAD_DTS_ADDRESS ##WOLFBOOT_LOAD_DTS_ADDRESS##
|
||||||
#else
|
|
||||||
#include "efi/efi.h"
|
|
||||||
extern EFI_PHYSICAL_ADDRESS kernel_addr;
|
|
||||||
extern EFI_PHYSICAL_ADDRESS update_addr;
|
|
||||||
#define WOLFBOOT_PARTITION_BOOT_ADDRESS (kernel_addr)
|
|
||||||
#define WOLFBOOT_PARTITION_UPDATE_ADDRESS (update_addr)
|
|
||||||
#define WOLFBOOT_PARTITION_SWAP_ADDRESS 0
|
|
||||||
#define WOLFBOOT_SECTOR_SIZE 0x1000
|
|
||||||
#define WOLFBOOT_PARTITION_SIZE (2 * 1024 * 1024 * 1024ULL)
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif /* !H_TARGETS_TARGET_ */
|
#endif /* !H_TARGETS_TARGET_ */
|
||||||
|
|
|
@ -102,6 +102,7 @@
|
||||||
#endif /* defined WOLFBOOT_SIGN_ECC256 || WOLFBOOT_SIGN_ED25519 */
|
#endif /* defined WOLFBOOT_SIGN_ECC256 || WOLFBOOT_SIGN_ED25519 */
|
||||||
#endif /* defined WOLFBOOT */
|
#endif /* defined WOLFBOOT */
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
#define PART_BOOT 0
|
#define PART_BOOT 0
|
||||||
#define PART_UPDATE 1
|
#define PART_UPDATE 1
|
||||||
#define PART_SWAP 2
|
#define PART_SWAP 2
|
||||||
|
@ -110,6 +111,7 @@
|
||||||
#define PART_DTS (0x10)
|
#define PART_DTS (0x10)
|
||||||
#define PART_DTS_BOOT (PART_DTS | PART_BOOT)
|
#define PART_DTS_BOOT (PART_DTS | PART_BOOT)
|
||||||
#define PART_DTS_UPDATE (PART_DTS | PART_UPDATE)
|
#define PART_DTS_UPDATE (PART_DTS | PART_UPDATE)
|
||||||
|
#endif /* WOLFBOOT_FIXED_PARTITIONS */
|
||||||
|
|
||||||
#ifndef WOLFBOOT_FLAGS_INVERT
|
#ifndef WOLFBOOT_FLAGS_INVERT
|
||||||
#define IMG_STATE_NEW 0xFF
|
#define IMG_STATE_NEW 0xFF
|
||||||
|
@ -123,20 +125,27 @@
|
||||||
#define IMG_STATE_SUCCESS 0xFF
|
#define IMG_STATE_SUCCESS 0xFF
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
void wolfBoot_erase_partition(uint8_t part);
|
|
||||||
void wolfBoot_update_trigger(void);
|
void wolfBoot_update_trigger(void);
|
||||||
void wolfBoot_success(void);
|
void wolfBoot_success(void);
|
||||||
uint32_t wolfBoot_image_size(uint8_t *image);
|
uint32_t wolfBoot_image_size(uint8_t *image);
|
||||||
|
uint32_t wolfBoot_get_blob_version(uint8_t *blob);
|
||||||
|
uint32_t wolfBoot_get_blob_type(uint8_t *blob);
|
||||||
|
uint32_t wolfBoot_get_blob_diffbase_version(uint8_t *blob);
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
|
void wolfBoot_erase_partition(uint8_t part);
|
||||||
uint32_t wolfBoot_get_image_version(uint8_t part);
|
uint32_t wolfBoot_get_image_version(uint8_t part);
|
||||||
uint16_t wolfBoot_get_image_type(uint8_t part);
|
uint16_t wolfBoot_get_image_type(uint8_t part);
|
||||||
|
uint32_t wolfBoot_get_diffbase_version(uint8_t part);
|
||||||
#define wolfBoot_current_firmware_version() wolfBoot_get_image_version(PART_BOOT)
|
#define wolfBoot_current_firmware_version() wolfBoot_get_image_version(PART_BOOT)
|
||||||
#define wolfBoot_update_firmware_version() wolfBoot_get_image_version(PART_UPDATE)
|
#define wolfBoot_update_firmware_version() wolfBoot_get_image_version(PART_UPDATE)
|
||||||
uint32_t wolfBoot_get_diffbase_version(uint8_t part);
|
#endif
|
||||||
|
|
||||||
int wolfBoot_fallback_is_possible(void);
|
int wolfBoot_fallback_is_possible(void);
|
||||||
int wolfBoot_dualboot_candidate(void);
|
int wolfBoot_dualboot_candidate(void);
|
||||||
|
|
||||||
|
int wolfBoot_dualboot_candidate_addr(void**);
|
||||||
|
|
||||||
/* Hashing function configuration */
|
/* Hashing function configuration */
|
||||||
#if defined(WOLFBOOT_HASH_SHA256)
|
#if defined(WOLFBOOT_HASH_SHA256)
|
||||||
# define WOLFBOOT_SHA_BLOCK_SIZE (256)
|
# define WOLFBOOT_SHA_BLOCK_SIZE (256)
|
||||||
|
|
|
@ -375,6 +375,10 @@ ifeq ($(HASH),SHA384)
|
||||||
endif
|
endif
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
ifeq ($(WOLFBOOT_NO_PARTITIONS),1)
|
||||||
|
CFLAGS+=-D"WOLFBOOT_NO_PARTITIONS"
|
||||||
|
endif
|
||||||
|
|
||||||
ifeq ($(HASH),SHA3)
|
ifeq ($(HASH),SHA3)
|
||||||
WOLFCRYPT_OBJS+=./lib/wolfssl/wolfcrypt/src/sha3.o
|
WOLFCRYPT_OBJS+=./lib/wolfssl/wolfcrypt/src/sha3.o
|
||||||
CFLAGS+=-D"WOLFBOOT_HASH_SHA3_384"
|
CFLAGS+=-D"WOLFBOOT_HASH_SHA3_384"
|
||||||
|
|
|
@ -18,6 +18,7 @@
|
||||||
* along with this program; if not, write to the Free Software
|
* along with this program; if not, write to the Free Software
|
||||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||||
*/
|
*/
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <delta.h>
|
#include <delta.h>
|
||||||
|
@ -336,4 +337,4 @@ int wb_diff(WB_DIFF_CTX *ctx, uint8_t *patch, uint32_t len)
|
||||||
return (p_off);
|
return (p_off);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif /* DELTA_UPDATES */
|
||||||
|
|
41
src/image.c
41
src/image.c
|
@ -732,9 +732,32 @@ uint32_t wolfBoot_image_size(uint8_t *image)
|
||||||
return im2n(*size);
|
return im2n(*size);
|
||||||
}
|
}
|
||||||
|
|
||||||
int wolfBoot_open_image(struct wolfBoot_image *img, uint8_t part)
|
int wolfBoot_open_image_address(struct wolfBoot_image* img, uint8_t* image)
|
||||||
{
|
{
|
||||||
uint32_t *magic;
|
uint32_t *magic;
|
||||||
|
|
||||||
|
img->hdr = image;
|
||||||
|
|
||||||
|
magic = (uint32_t *)(image);
|
||||||
|
if (*magic != WOLFBOOT_MAGIC)
|
||||||
|
return -1;
|
||||||
|
img->fw_size = wolfBoot_image_size(image);
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
|
if (img->fw_size > (WOLFBOOT_PARTITION_SIZE - IMAGE_HEADER_SIZE)) {
|
||||||
|
img->fw_size = 0;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
img->trailer = img->hdr + WOLFBOOT_PARTITION_SIZE;
|
||||||
|
#endif
|
||||||
|
img->hdr_ok = 1;
|
||||||
|
img->fw_base = img->hdr + IMAGE_HEADER_SIZE;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
|
int wolfBoot_open_image(struct wolfBoot_image *img, uint8_t part)
|
||||||
|
{
|
||||||
uint32_t *size;
|
uint32_t *size;
|
||||||
uint8_t *image;
|
uint8_t *image;
|
||||||
if (!img)
|
if (!img)
|
||||||
|
@ -789,19 +812,9 @@ int wolfBoot_open_image(struct wolfBoot_image *img, uint8_t part)
|
||||||
else
|
else
|
||||||
image = (uint8_t *)img->hdr;
|
image = (uint8_t *)img->hdr;
|
||||||
|
|
||||||
magic = (uint32_t *)(image);
|
return wolfBoot_open_image_address(img, image);
|
||||||
if (*magic != WOLFBOOT_MAGIC)
|
|
||||||
return -1;
|
|
||||||
img->fw_size = wolfBoot_image_size(image);
|
|
||||||
if (img->fw_size > (WOLFBOOT_PARTITION_SIZE - IMAGE_HEADER_SIZE)) {
|
|
||||||
img->fw_size = 0;
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
img->hdr_ok = 1;
|
|
||||||
img->fw_base = img->hdr + IMAGE_HEADER_SIZE;
|
|
||||||
img->trailer = img->hdr + WOLFBOOT_PARTITION_SIZE;
|
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
#endif /* WOLFBOOT_FIXED_PARTITIONS */
|
||||||
|
|
||||||
int wolfBoot_verify_integrity(struct wolfBoot_image *img)
|
int wolfBoot_verify_integrity(struct wolfBoot_image *img)
|
||||||
{
|
{
|
||||||
|
@ -811,7 +824,7 @@ int wolfBoot_verify_integrity(struct wolfBoot_image *img)
|
||||||
if (stored_sha_len != WOLFBOOT_SHA_DIGEST_SIZE)
|
if (stored_sha_len != WOLFBOOT_SHA_DIGEST_SIZE)
|
||||||
return -1;
|
return -1;
|
||||||
if (image_hash(img, digest) != 0)
|
if (image_hash(img, digest) != 0)
|
||||||
return -1;
|
return -1;
|
||||||
#if defined(WOLFBOOT_TPM) && defined(WOLFBOOT_MEASURED_BOOT)
|
#if defined(WOLFBOOT_TPM) && defined(WOLFBOOT_MEASURED_BOOT)
|
||||||
/*
|
/*
|
||||||
* TPM measurement must be performed regardless of the
|
* TPM measurement must be performed regardless of the
|
||||||
|
|
|
@ -20,14 +20,15 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
#include <inttypes.h>
|
|
||||||
|
|
||||||
#include "hal.h"
|
#include "hal.h"
|
||||||
#include "wolfboot/wolfboot.h"
|
#include "wolfboot/wolfboot.h"
|
||||||
#include "image.h"
|
#include "image.h"
|
||||||
|
|
||||||
#ifdef UNIT_TEST
|
#ifdef UNIT_TEST
|
||||||
# define unit_dbg printf
|
# include "printf.h"
|
||||||
|
# define unit_dbg wolfBoot_printf
|
||||||
#else
|
#else
|
||||||
# define unit_dbg(...) do{}while(0)
|
# define unit_dbg(...) do{}while(0)
|
||||||
#endif
|
#endif
|
||||||
|
@ -199,6 +200,19 @@ static void RAMFUNCTION set_partition_magic(uint8_t part)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
#elif !defined(WOLFBOOT_FIXED_PARTITIONS)
|
||||||
|
static uint8_t* RAMFUNCTION get_trailer_at(uint8_t part, uint32_t at)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
static void RAMFUNCTION set_trailer_at(uint8_t part, uint32_t at, uint8_t val)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
static void RAMFUNCTION set_partition_magic(uint8_t part)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
#else
|
#else
|
||||||
static uint8_t* RAMFUNCTION get_trailer_at(uint8_t part, uint32_t at)
|
static uint8_t* RAMFUNCTION get_trailer_at(uint8_t part, uint32_t at)
|
||||||
|
@ -207,8 +221,9 @@ static uint8_t* RAMFUNCTION get_trailer_at(uint8_t part, uint32_t at)
|
||||||
return (void *)(PART_BOOT_ENDFLAGS - (sizeof(uint32_t) + at));
|
return (void *)(PART_BOOT_ENDFLAGS - (sizeof(uint32_t) + at));
|
||||||
else if (part == PART_UPDATE) {
|
else if (part == PART_UPDATE) {
|
||||||
return (void *)(PART_UPDATE_ENDFLAGS - (sizeof(uint32_t) + at));
|
return (void *)(PART_UPDATE_ENDFLAGS - (sizeof(uint32_t) + at));
|
||||||
} else
|
}
|
||||||
return NULL;
|
|
||||||
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void RAMFUNCTION set_trailer_at(uint8_t part, uint32_t at, uint8_t val)
|
static void RAMFUNCTION set_trailer_at(uint8_t part, uint32_t at, uint8_t val)
|
||||||
|
@ -234,6 +249,7 @@ static void RAMFUNCTION set_partition_magic(uint8_t part)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
static uint32_t* RAMFUNCTION get_partition_magic(uint8_t part)
|
static uint32_t* RAMFUNCTION get_partition_magic(uint8_t part)
|
||||||
{
|
{
|
||||||
return (uint32_t *)get_trailer_at(part, 0);
|
return (uint32_t *)get_trailer_at(part, 0);
|
||||||
|
@ -322,33 +338,32 @@ int wolfBoot_get_update_sector_flag(uint16_t sector, uint8_t *flag)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void RAMFUNCTION wolfBoot_erase_partition(uint8_t part)
|
void RAMFUNCTION wolfBoot_erase_partition(uint8_t part)
|
||||||
{
|
{
|
||||||
|
uint32_t address = 0;
|
||||||
|
int size = 0;
|
||||||
|
|
||||||
if (part == PART_BOOT) {
|
if (part == PART_BOOT) {
|
||||||
if (PARTN_IS_EXT(PART_BOOT)) {
|
address = WOLFBOOT_PARTITION_BOOT_ADDRESS;
|
||||||
ext_flash_unlock();
|
size = WOLFBOOT_PARTITION_SIZE;
|
||||||
ext_flash_erase(WOLFBOOT_PARTITION_BOOT_ADDRESS, WOLFBOOT_PARTITION_SIZE);
|
|
||||||
ext_flash_lock();
|
|
||||||
} else {
|
|
||||||
hal_flash_erase(WOLFBOOT_PARTITION_BOOT_ADDRESS, WOLFBOOT_PARTITION_SIZE);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if (part == PART_UPDATE) {
|
if (part == PART_UPDATE) {
|
||||||
if (PARTN_IS_EXT(PART_UPDATE)) {
|
address = WOLFBOOT_PARTITION_UPDATE_ADDRESS;
|
||||||
ext_flash_unlock();
|
size = WOLFBOOT_PARTITION_SIZE;
|
||||||
ext_flash_erase(WOLFBOOT_PARTITION_UPDATE_ADDRESS, WOLFBOOT_PARTITION_SIZE);
|
|
||||||
ext_flash_lock();
|
|
||||||
} else {
|
|
||||||
hal_flash_erase(WOLFBOOT_PARTITION_UPDATE_ADDRESS, WOLFBOOT_PARTITION_SIZE);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if (part == PART_SWAP) {
|
if (part == PART_SWAP) {
|
||||||
if (PARTN_IS_EXT(PART_SWAP)) {
|
address = WOLFBOOT_PARTITION_SWAP_ADDRESS;
|
||||||
|
size = WOLFBOOT_SECTOR_SIZE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (size > 0) {
|
||||||
|
if (PARTN_IS_EXT(part)) {
|
||||||
ext_flash_unlock();
|
ext_flash_unlock();
|
||||||
ext_flash_erase(WOLFBOOT_PARTITION_SWAP_ADDRESS, WOLFBOOT_SECTOR_SIZE);
|
ext_flash_erase(address, size);
|
||||||
ext_flash_lock();
|
ext_flash_lock();
|
||||||
} else {
|
} else {
|
||||||
hal_flash_erase(WOLFBOOT_PARTITION_SWAP_ADDRESS, WOLFBOOT_SECTOR_SIZE);
|
hal_flash_erase(address, size);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -396,6 +411,7 @@ void RAMFUNCTION wolfBoot_success(void)
|
||||||
wolfBoot_erase_encrypt_key();
|
wolfBoot_erase_encrypt_key();
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
#endif /* WOLFBOOT_FIXED_PARTITIONS */
|
||||||
|
|
||||||
uint16_t wolfBoot_find_header(uint8_t *haystack, uint16_t type, uint8_t **ptr)
|
uint16_t wolfBoot_find_header(uint8_t *haystack, uint16_t type, uint8_t **ptr)
|
||||||
{
|
{
|
||||||
|
@ -425,6 +441,7 @@ uint16_t wolfBoot_find_header(uint8_t *haystack, uint16_t type, uint8_t **ptr)
|
||||||
len = p[2] | (p[3] << 8);
|
len = p[2] | (p[3] << 8);
|
||||||
if ((4 + len) > (uint16_t)(IMAGE_HEADER_SIZE - IMAGE_HEADER_OFFSET)) {
|
if ((4 + len) > (uint16_t)(IMAGE_HEADER_SIZE - IMAGE_HEADER_OFFSET)) {
|
||||||
unit_dbg("This field is too large (bigger than the space available in the current header)\n");
|
unit_dbg("This field is too large (bigger than the space available in the current header)\n");
|
||||||
|
unit_dbg("%d %d %d\n", len, IMAGE_HEADER_SIZE, IMAGE_HEADER_OFFSET);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
if (p + 4 + len > max_p) {
|
if (p + 4 + len > max_p) {
|
||||||
|
@ -522,6 +539,7 @@ uint32_t wolfBoot_get_blob_version(uint8_t *blob)
|
||||||
{
|
{
|
||||||
uint32_t *version_field = NULL;
|
uint32_t *version_field = NULL;
|
||||||
uint32_t *magic = NULL;
|
uint32_t *magic = NULL;
|
||||||
|
|
||||||
magic = (uint32_t *)blob;
|
magic = (uint32_t *)blob;
|
||||||
if (*magic != WOLFBOOT_MAGIC)
|
if (*magic != WOLFBOOT_MAGIC)
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -532,37 +550,22 @@ uint32_t wolfBoot_get_blob_version(uint8_t *blob)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
uint32_t wolfBoot_get_blob_type(uint8_t *blob)
|
||||||
uint32_t wolfBoot_get_image_version(uint8_t part)
|
|
||||||
{
|
{
|
||||||
uint8_t *image = (uint8_t *)0x00000000;
|
uint32_t *type_field = NULL;
|
||||||
if(part == PART_UPDATE) {
|
uint32_t *magic = NULL;
|
||||||
if (PARTN_IS_EXT(PART_UPDATE))
|
magic = (uint32_t *)blob;
|
||||||
{
|
if (*magic != WOLFBOOT_MAGIC)
|
||||||
#ifdef EXT_FLASH
|
return 0;
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_UPDATE_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
if (wolfBoot_find_header(blob + IMAGE_HEADER_OFFSET, HDR_IMG_TYPE, (void *)&type_field) == 0)
|
||||||
hdr_cpy_done = 1;
|
return 0;
|
||||||
image = hdr_cpy;
|
if (type_field)
|
||||||
#endif
|
return im2ns(*type_field);
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_UPDATE_ADDRESS;
|
return 0;
|
||||||
}
|
|
||||||
} else if (part == PART_BOOT) {
|
|
||||||
if (PARTN_IS_EXT(PART_BOOT)) {
|
|
||||||
#ifdef EXT_FLASH
|
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_BOOT_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
|
||||||
hdr_cpy_done = 1;
|
|
||||||
image = hdr_cpy;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_BOOT_ADDRESS;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
/* Don't check image against NULL to allow using address 0x00000000 */
|
|
||||||
return wolfBoot_get_blob_version(image);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static uint32_t wolfBoot_get_blob_diffbase_version(uint8_t *blob)
|
uint32_t wolfBoot_get_blob_diffbase_version(uint8_t *blob)
|
||||||
{
|
{
|
||||||
uint32_t *delta_base = NULL;
|
uint32_t *delta_base = NULL;
|
||||||
uint32_t *magic = NULL;
|
uint32_t *magic = NULL;
|
||||||
|
@ -576,87 +579,57 @@ static uint32_t wolfBoot_get_blob_diffbase_version(uint8_t *blob)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
|
static uint8_t* wolfBoot_get_image_from_part(uint8_t part) {
|
||||||
|
uint8_t *image = (uint8_t *)0x00000000;
|
||||||
|
|
||||||
|
if(part == PART_UPDATE) {
|
||||||
|
image = (uint8_t *)WOLFBOOT_PARTITION_UPDATE_ADDRESS;
|
||||||
|
|
||||||
|
} else if (part == PART_BOOT) {
|
||||||
|
image = (uint8_t *)WOLFBOOT_PARTITION_BOOT_ADDRESS;
|
||||||
|
}
|
||||||
|
#ifdef EXT_FLASH
|
||||||
|
if (PARTN_IS_EXT(part))
|
||||||
|
{
|
||||||
|
ext_flash_check_read((uintptr_t)image, hdr_cpy, IMAGE_HEADER_SIZE);
|
||||||
|
hdr_cpy_done = 1;
|
||||||
|
image = hdr_cpy;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return image;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
uint32_t wolfBoot_get_image_version(uint8_t part)
|
||||||
|
{
|
||||||
|
/* Don't check image against NULL to allow using address 0x00000000 */
|
||||||
|
return wolfBoot_get_blob_version(wolfBoot_get_image_from_part(part));
|
||||||
|
}
|
||||||
|
|
||||||
uint32_t wolfBoot_get_diffbase_version(uint8_t part)
|
uint32_t wolfBoot_get_diffbase_version(uint8_t part)
|
||||||
{
|
{
|
||||||
uint8_t *image = (uint8_t *)0x00000000;
|
|
||||||
if(part == PART_UPDATE) {
|
|
||||||
if (PARTN_IS_EXT(PART_UPDATE))
|
|
||||||
{
|
|
||||||
#ifdef EXT_FLASH
|
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_UPDATE_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
|
||||||
hdr_cpy_done = 1;
|
|
||||||
image = hdr_cpy;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_UPDATE_ADDRESS;
|
|
||||||
}
|
|
||||||
} else if (part == PART_BOOT) {
|
|
||||||
if (PARTN_IS_EXT(PART_BOOT)) {
|
|
||||||
#ifdef EXT_FLASH
|
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_BOOT_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
|
||||||
hdr_cpy_done = 1;
|
|
||||||
image = hdr_cpy;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_BOOT_ADDRESS;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
/* Don't check image against NULL to allow using address 0x00000000 */
|
/* Don't check image against NULL to allow using address 0x00000000 */
|
||||||
return wolfBoot_get_blob_diffbase_version(image);
|
return wolfBoot_get_blob_diffbase_version(wolfBoot_get_image_from_part(part));
|
||||||
}
|
}
|
||||||
|
|
||||||
uint16_t wolfBoot_get_image_type(uint8_t part)
|
uint16_t wolfBoot_get_image_type(uint8_t part)
|
||||||
{
|
{
|
||||||
uint16_t *type_field = NULL;
|
uint8_t *image = wolfBoot_get_image_from_part(part);
|
||||||
uint8_t *image = NULL;
|
|
||||||
uint32_t *magic = NULL;
|
|
||||||
if(part == PART_UPDATE) {
|
|
||||||
if (PARTN_IS_EXT(PART_UPDATE))
|
|
||||||
{
|
|
||||||
#ifdef EXT_FLASH
|
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_UPDATE_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
|
||||||
hdr_cpy_done = 1;
|
|
||||||
image = hdr_cpy;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_UPDATE_ADDRESS;
|
|
||||||
}
|
|
||||||
} else if (part == PART_BOOT) {
|
|
||||||
if (PARTN_IS_EXT(PART_BOOT)) {
|
|
||||||
#ifdef EXT_FLASH
|
|
||||||
ext_flash_check_read((uintptr_t)WOLFBOOT_PARTITION_BOOT_ADDRESS, hdr_cpy, IMAGE_HEADER_SIZE);
|
|
||||||
hdr_cpy_done = 1;
|
|
||||||
image = hdr_cpy;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
image = (uint8_t *)WOLFBOOT_PARTITION_BOOT_ADDRESS;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (image) {
|
if (image) {
|
||||||
magic = (uint32_t *)image;
|
return wolfBoot_get_blob_type(image);
|
||||||
if (*magic != WOLFBOOT_MAGIC)
|
|
||||||
return 0;
|
|
||||||
if (wolfBoot_find_header(image + IMAGE_HEADER_OFFSET, HDR_IMG_TYPE, (void *)&type_field) == 0)
|
|
||||||
return 0;
|
|
||||||
if (type_field)
|
|
||||||
return im2ns(*type_field);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
#endif /* WOLFBOOT_FIXED_PARTITIONS */
|
||||||
|
|
||||||
#if defined(ARCH_AARCH64) || defined(DUALBANK_SWAP) || defined(PLATFORM_X86_64_EFI)
|
#if defined(WOLFBOOT_DUALBOOT)
|
||||||
|
|
||||||
int wolfBoot_fallback_is_possible(void)
|
#if defined(WOLFBOOT_FIXED_PARTITIONS)
|
||||||
{
|
|
||||||
uint32_t boot_v, update_v;
|
|
||||||
boot_v = wolfBoot_current_firmware_version();
|
|
||||||
update_v = wolfBoot_update_firmware_version();
|
|
||||||
if ((boot_v == 0) || (update_v == 0))
|
|
||||||
return 0;
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
int wolfBoot_dualboot_candidate(void)
|
int wolfBoot_dualboot_candidate(void)
|
||||||
{
|
{
|
||||||
|
@ -691,14 +664,57 @@ int wolfBoot_dualboot_candidate(void)
|
||||||
return candidate;
|
return candidate;
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
int wolfBoot_dualboot_candidate(void) { return 0; }
|
|
||||||
|
static int wolfBoot_current_firmware_version()
|
||||||
|
{
|
||||||
|
return wolfBoot_get_blob_version(hal_get_primary_address());
|
||||||
|
}
|
||||||
|
static int wolfBoot_update_firmware_version() {
|
||||||
|
return wolfBoot_get_blob_version(hal_get_update_address());
|
||||||
|
}
|
||||||
|
|
||||||
|
int wolfBoot_dualboot_candidate_addr(void** addr)
|
||||||
|
{
|
||||||
|
int fallback_possible = 0;
|
||||||
|
uint32_t boot_v, update_v;
|
||||||
|
uint8_t p_state;
|
||||||
|
int retval = 0;
|
||||||
|
|
||||||
|
/* Find the candidate */
|
||||||
|
boot_v = wolfBoot_current_firmware_version();
|
||||||
|
update_v = wolfBoot_update_firmware_version();
|
||||||
|
/* -1 means no images available */
|
||||||
|
if ((boot_v == 0) && (update_v == 0))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
*addr = hal_get_primary_address();
|
||||||
|
|
||||||
|
if (boot_v == 0) { /* No primary image */
|
||||||
|
retval = 1;
|
||||||
|
*addr = hal_get_update_address();
|
||||||
|
}
|
||||||
|
else if ((boot_v > 0) && (update_v > 0)) {
|
||||||
|
fallback_possible = 1;
|
||||||
|
if (update_v > boot_v) {
|
||||||
|
retval = 1;
|
||||||
|
*addr = hal_get_update_address();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return retval;
|
||||||
|
}
|
||||||
|
#endif /* WOLFBOOT_FIXED_PARTITIONS */
|
||||||
|
|
||||||
int wolfBoot_fallback_is_possible(void)
|
int wolfBoot_fallback_is_possible(void)
|
||||||
{
|
{
|
||||||
if (wolfBoot_update_firmware_version() > 0)
|
uint32_t boot_v, update_v;
|
||||||
return 1;
|
boot_v = wolfBoot_current_firmware_version();
|
||||||
return 0;
|
update_v = wolfBoot_update_firmware_version();
|
||||||
|
if ((boot_v == 0) || (update_v == 0))
|
||||||
|
return 0;
|
||||||
|
return 1;
|
||||||
}
|
}
|
||||||
#endif /* ARCH_AARCH64 || DUALBANK_SWAP */
|
#endif /* WOLFBOOT_DUALBOOT */
|
||||||
|
|
||||||
#ifdef EXT_ENCRYPTED
|
#ifdef EXT_ENCRYPTED
|
||||||
#include "encrypt.h"
|
#include "encrypt.h"
|
||||||
|
@ -981,4 +997,3 @@ int ext_flash_decrypt_read(uintptr_t address, uint8_t *data, int len)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif /* EXT_ENCRYPTED */
|
#endif /* EXT_ENCRYPTED */
|
||||||
|
|
||||||
|
|
|
@ -39,14 +39,20 @@
|
||||||
|
|
||||||
extern void hal_flash_dualbank_swap(void);
|
extern void hal_flash_dualbank_swap(void);
|
||||||
|
|
||||||
|
static inline void boot_panic(void)
|
||||||
|
{
|
||||||
|
while(1)
|
||||||
|
;
|
||||||
|
}
|
||||||
|
|
||||||
void RAMFUNCTION wolfBoot_start(void)
|
void RAMFUNCTION wolfBoot_start(void)
|
||||||
{
|
{
|
||||||
int active, ret = 0;
|
int active, ret = 0;
|
||||||
struct wolfBoot_image os_image;
|
struct wolfBoot_image os_image;
|
||||||
#ifdef PLATFORM_X86_64_EFI
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
uint32_t* load_address = (uint32_t*)kernel_addr;
|
|
||||||
#else
|
|
||||||
uint32_t* load_address = (uint32_t*)WOLFBOOT_LOAD_ADDRESS;
|
uint32_t* load_address = (uint32_t*)WOLFBOOT_LOAD_ADDRESS;
|
||||||
|
#else
|
||||||
|
uint32_t* load_address = hal_get_primary_address();
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
uint8_t* image_ptr;
|
uint8_t* image_ptr;
|
||||||
|
@ -55,18 +61,19 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
uint32_t* dts_address = NULL;
|
uint32_t* dts_address = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
active = wolfBoot_dualboot_candidate();
|
active = wolfBoot_dualboot_candidate();
|
||||||
|
#else
|
||||||
|
active = wolfBoot_dualboot_candidate_addr((void**)&load_address);
|
||||||
|
#endif
|
||||||
|
|
||||||
wolfBoot_printf("Active Part %d\n", active);
|
wolfBoot_printf("Active Part %d\n", active);
|
||||||
|
|
||||||
if (active < 0) /* panic if no images available */
|
if (active < 0) /* panic if no images available */
|
||||||
wolfBoot_panic();
|
wolfBoot_panic();
|
||||||
|
|
||||||
#ifdef PLATFORM_X86_64_EFI
|
wolfBoot_printf("Active Part %x\n", load_address);
|
||||||
if (active == 1)
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
load_address = (uint32_t *)update_addr;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Check current status for failure (image still in TESTING), and fall-back
|
/* Check current status for failure (image still in TESTING), and fall-back
|
||||||
* if an alternative is available
|
* if an alternative is available
|
||||||
*/
|
*/
|
||||||
|
@ -76,13 +83,15 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
{
|
{
|
||||||
active ^= 1; /* switch to other partition if available */
|
active ^= 1; /* switch to other partition if available */
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
wolfBoot_printf("Active Part %d %x\n", active, load_address);
|
||||||
|
|
||||||
for (;;) {
|
for (;;) {
|
||||||
if (((ret = wolfBoot_open_image(&os_image, active)) < 0) ||
|
if (((ret = wolfBoot_open_image_address(&os_image, (uint8_t*)load_address)) < 0) ||
|
||||||
((ret = wolfBoot_verify_integrity(&os_image) < 0)) ||
|
((ret = wolfBoot_verify_integrity(&os_image) < 0)) ||
|
||||||
((ret = wolfBoot_verify_authenticity(&os_image)) < 0)) {
|
((ret = wolfBoot_verify_authenticity(&os_image)) < 0)) {
|
||||||
|
|
||||||
wolfBoot_printf("Failure %d: Part %d, Hdr %d, Hash %d, Sig %d\n", ret,
|
wolfBoot_printf("Failure %d: Part %d, Hdr %d, Hash %d, Sig %d\n", ret,
|
||||||
active, os_image.hdr_ok, os_image.sha_ok, os_image.signature_ok);
|
active, os_image.hdr_ok, os_image.sha_ok, os_image.signature_ok);
|
||||||
|
|
||||||
/* panic if authentication fails and no backup */
|
/* panic if authentication fails and no backup */
|
||||||
|
@ -105,6 +114,7 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
/* First time we boot this update, set to TESTING to await
|
/* First time we boot this update, set to TESTING to await
|
||||||
* confirmation from the system
|
* confirmation from the system
|
||||||
*/
|
*/
|
||||||
|
#ifdef WOLFBOOT_FIXED_PARTITIONS
|
||||||
if ((wolfBoot_get_partition_state(active, &p_state) == 0) &&
|
if ((wolfBoot_get_partition_state(active, &p_state) == 0) &&
|
||||||
(p_state == IMG_STATE_UPDATING))
|
(p_state == IMG_STATE_UPDATING))
|
||||||
{
|
{
|
||||||
|
@ -112,6 +122,7 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
wolfBoot_set_partition_state(active, IMG_STATE_TESTING);
|
wolfBoot_set_partition_state(active, IMG_STATE_TESTING);
|
||||||
hal_flash_lock();
|
hal_flash_lock();
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Check for U-Boot Legacy format image header */
|
/* Check for U-Boot Legacy format image header */
|
||||||
image_ptr = wolfBoot_peek_image(&os_image, 0, NULL);
|
image_ptr = wolfBoot_peek_image(&os_image, 0, NULL);
|
||||||
|
@ -130,7 +141,7 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
if (PART_IS_EXT(&os_image)) {
|
if (PART_IS_EXT(&os_image)) {
|
||||||
wolfBoot_printf("Loading %d to RAM at %08lx\n", os_image.fw_size, load_address);
|
wolfBoot_printf("Loading %d to RAM at %08lx\n", os_image.fw_size, load_address);
|
||||||
|
|
||||||
ext_flash_read((uintptr_t)os_image.fw_base,
|
ext_flash_read((uintptr_t)os_image.fw_base,
|
||||||
(uint8_t*)load_address,
|
(uint8_t*)load_address,
|
||||||
os_image.fw_size);
|
os_image.fw_size);
|
||||||
}
|
}
|
||||||
|
@ -146,7 +157,7 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
if (PART_IS_EXT(&os_image)) {
|
if (PART_IS_EXT(&os_image)) {
|
||||||
wolfBoot_printf("Loading DTS %d to RAM at %08lx\n", os_image.fw_size, dts_address);
|
wolfBoot_printf("Loading DTS %d to RAM at %08lx\n", os_image.fw_size, dts_address);
|
||||||
|
|
||||||
ext_flash_read((uintptr_t)os_image.fw_base,
|
ext_flash_read((uintptr_t)os_image.fw_base,
|
||||||
(uint8_t*)dts_address,
|
(uint8_t*)dts_address,
|
||||||
os_image.fw_size);
|
os_image.fw_size);
|
||||||
}
|
}
|
||||||
|
@ -154,7 +165,7 @@ void RAMFUNCTION wolfBoot_start(void)
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
wolfBoot_printf("Booting at %08lx\n", load_address);
|
wolfBoot_printf("Booting at %08lx\n", load_address);
|
||||||
hal_prepare_boot();
|
hal_prepare_boot();
|
||||||
|
|
||||||
|
|
|
@ -180,8 +180,9 @@ static void header_append_tag(uint8_t* header, uint32_t* idx, uint16_t tag,
|
||||||
|
|
||||||
|
|
||||||
/* Globals */
|
/* Globals */
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
static const char wolfboot_delta_file[] = "/tmp/wolfboot-delta.bin";
|
static const char wolfboot_delta_file[] = "/tmp/wolfboot-delta.bin";
|
||||||
|
#endif
|
||||||
|
|
||||||
static union {
|
static union {
|
||||||
#ifdef HAVE_ED25519
|
#ifdef HAVE_ED25519
|
||||||
|
@ -931,6 +932,7 @@ static int make_header(uint8_t *pubkey, uint32_t pubkey_sz,
|
||||||
return make_header_ex(0, pubkey, pubkey_sz, image_file, outfile, 0, 0, 0, 0);
|
return make_header_ex(0, pubkey, pubkey_sz, image_file, outfile, 0, 0, 0, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
static int make_header_delta(uint8_t *pubkey, uint32_t pubkey_sz,
|
static int make_header_delta(uint8_t *pubkey, uint32_t pubkey_sz,
|
||||||
const char *image_file, const char *outfile,
|
const char *image_file, const char *outfile,
|
||||||
uint32_t delta_base_version, uint16_t patch_len,
|
uint32_t delta_base_version, uint16_t patch_len,
|
||||||
|
@ -1154,6 +1156,7 @@ cleanup:
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif /* DELTA_UPDATES */
|
||||||
|
|
||||||
static const char Hashes_str[] = "[--sha256 | --sha384 | --sha3]";
|
static const char Hashes_str[] = "[--sha256 | --sha384 | --sha3]";
|
||||||
static const char Enc_str[] = "[--chacha | --aes128 | --aes256]";
|
static const char Enc_str[] = "[--chacha | --aes128 | --aes256]";
|
||||||
|
@ -1181,7 +1184,10 @@ int main(int argc, char** argv)
|
||||||
/* Check arguments and print usage */
|
/* Check arguments and print usage */
|
||||||
if (argc < 4 || argc > 10) {
|
if (argc < 4 || argc > 10) {
|
||||||
printf("Usage: %s %s %s [--wolfboot-update] [--encrypt enc_key.bin] %s"
|
printf("Usage: %s %s %s [--wolfboot-update] [--encrypt enc_key.bin] %s"
|
||||||
" [--delta image_vX_signed.bin] image key.der fw_version\n",
|
#ifdef DELTA_UPDATES
|
||||||
|
" [--delta image_vX_signed.bin] "
|
||||||
|
#endif
|
||||||
|
"image key.der fw_version\n",
|
||||||
argv[0], Hashes_str, Sign_algo_str, Enc_str);
|
argv[0], Hashes_str, Sign_algo_str, Enc_str);
|
||||||
printf(" - or - \n");
|
printf(" - or - \n");
|
||||||
printf(" %s %s [--wolfboot-update] image pub_key.der fw_version\n",
|
printf(" %s %s [--wolfboot-update] image pub_key.der fw_version\n",
|
||||||
|
@ -1270,10 +1276,12 @@ int main(int argc, char** argv)
|
||||||
else if (strcmp(argv[i], "--chacha") == 0) {
|
else if (strcmp(argv[i], "--chacha") == 0) {
|
||||||
CMD.encrypt = ENC_CHACHA;
|
CMD.encrypt = ENC_CHACHA;
|
||||||
}
|
}
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
else if (strcmp(argv[i], "--delta") == 0) {
|
else if (strcmp(argv[i], "--delta") == 0) {
|
||||||
CMD.delta = 1;
|
CMD.delta = 1;
|
||||||
CMD.delta_base_file = argv[++i];
|
CMD.delta_base_file = argv[++i];
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
else {
|
else {
|
||||||
i--;
|
i--;
|
||||||
break;
|
break;
|
||||||
|
@ -1315,6 +1323,7 @@ int main(int argc, char** argv)
|
||||||
if (CMD.sign != NO_SIGN) {
|
if (CMD.sign != NO_SIGN) {
|
||||||
printf("Public key: %s\n", CMD.key_file);
|
printf("Public key: %s\n", CMD.key_file);
|
||||||
}
|
}
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
if (CMD.delta) {
|
if (CMD.delta) {
|
||||||
printf("Delta Base file: %s\n", CMD.delta_base_file);
|
printf("Delta Base file: %s\n", CMD.delta_base_file);
|
||||||
snprintf(CMD.output_diff_file, sizeof(CMD.output_image_file),
|
snprintf(CMD.output_diff_file, sizeof(CMD.output_image_file),
|
||||||
|
@ -1322,6 +1331,7 @@ int main(int argc, char** argv)
|
||||||
(char*)buf, CMD.fw_version);
|
(char*)buf, CMD.fw_version);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
printf("Output %6s: %s\n", CMD.sha_only ? "digest" : "image",
|
printf("Output %6s: %s\n", CMD.sha_only ? "digest" : "image",
|
||||||
CMD.output_image_file);
|
CMD.output_image_file);
|
||||||
if (CMD.encrypt) {
|
if (CMD.encrypt) {
|
||||||
|
@ -1382,9 +1392,12 @@ int main(int argc, char** argv)
|
||||||
} /* CMD.sign != NO_SIGN */
|
} /* CMD.sign != NO_SIGN */
|
||||||
make_header(pubkey, pubkey_sz, CMD.image_file, CMD.output_image_file);
|
make_header(pubkey, pubkey_sz, CMD.image_file, CMD.output_image_file);
|
||||||
|
|
||||||
|
#ifdef DELTA_UPDATES
|
||||||
if (CMD.delta) {
|
if (CMD.delta) {
|
||||||
ret = base_diff(CMD.delta_base_file, pubkey, pubkey_sz);
|
ret = base_diff(CMD.delta_base_file, pubkey, pubkey_sz);
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
if (kbuf)
|
if (kbuf)
|
||||||
free(kbuf);
|
free(kbuf);
|
||||||
if (CMD.sign == SIGN_ED25519) {
|
if (CMD.sign == SIGN_ED25519) {
|
||||||
|
|
|
@ -17,6 +17,8 @@ else
|
||||||
endif
|
endif
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
ifneq ("$(wildcard $(WOLFBOOT_ROOT)/tools/keytools/sign)","")
|
ifneq ("$(wildcard $(WOLFBOOT_ROOT)/tools/keytools/sign)","")
|
||||||
SIGN_TOOL=$(WOLFBOOT_ROOT)/tools/keytools/sign
|
SIGN_TOOL=$(WOLFBOOT_ROOT)/tools/keytools/sign
|
||||||
else
|
else
|
||||||
|
|
Loading…
Reference in New Issue