mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-23 17:55:01 +00:00
These were macros that were never used, or that were only set to one thing and could be substituted up front. I left in code guarded by the HAVE_ENDIAN_H and HAVE_LITTLE_ENDIAN macros even though those are never defined because they guard a reportedly significantly faster implementation of some functionality, at least according to a comment in the source. It would be a good idea to enable that code path and see if it really does make a big difference before removing it entirely. BUG=None TEST=Built for Link, Daisy, and the host with FEATURES=test. Built depthcharge for Link and booted in normal mode. BRANCH=None Change-Id: I934a4dd0da169ac018ba07350d56924ab88b1acc Signed-off-by: Gabe Black <gabeblack@google.com> Reviewed-on: https://gerrit.chromium.org/gerrit/45687 Reviewed-by: Randall Spangler <rspangler@chromium.org> Commit-Queue: Gabe Black <gabeblack@chromium.org> Tested-by: Gabe Black <gabeblack@chromium.org>
249 lines
7.3 KiB
C
249 lines
7.3 KiB
C
/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*/
|
|
|
|
/* Routines for verifying a file's signature. Useful in testing the core
|
|
* RSA verification implementation.
|
|
*/
|
|
|
|
#include <inttypes.h> /* For PRIu64 macro */
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include "gbb_header.h"
|
|
#include "host_common.h"
|
|
#include "load_firmware_fw.h"
|
|
#include "load_kernel_fw.h"
|
|
#include "rollback_index.h"
|
|
#include "vboot_common.h"
|
|
#include "vboot_kernel.h"
|
|
|
|
#define LBA_BYTES 512
|
|
#define KERNEL_BUFFER_SIZE 0xA00000
|
|
|
|
/* Global variables for stub functions */
|
|
static LoadKernelParams lkp;
|
|
static VbNvContext vnc;
|
|
static FILE *image_file = NULL;
|
|
|
|
|
|
/* Boot device stub implementations to read from the image file */
|
|
VbError_t VbExDiskRead(VbExDiskHandle_t handle, uint64_t lba_start,
|
|
uint64_t lba_count, void *buffer) {
|
|
printf("Read(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count);
|
|
|
|
if (lba_start > lkp.ending_lba ||
|
|
lba_start + lba_count - 1 > lkp.ending_lba) {
|
|
fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n",
|
|
lba_start, lba_count, lkp.ending_lba);
|
|
return 1;
|
|
}
|
|
|
|
fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET);
|
|
if (1 != fread(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) {
|
|
fprintf(stderr, "Read error.");
|
|
return 1;
|
|
}
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
VbError_t VbExDiskWrite(VbExDiskHandle_t handle, uint64_t lba_start,
|
|
uint64_t lba_count, const void *buffer) {
|
|
printf("Write(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count);
|
|
|
|
if (lba_start > lkp.ending_lba ||
|
|
lba_start + lba_count - 1 > lkp.ending_lba) {
|
|
fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n",
|
|
lba_start, lba_count, lkp.ending_lba);
|
|
return 1;
|
|
}
|
|
|
|
/* TODO: enable writes, once we're sure it won't trash our example file */
|
|
return VBERROR_SUCCESS;
|
|
|
|
fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET);
|
|
if (1 != fwrite(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) {
|
|
fprintf(stderr, "Read error.");
|
|
return 1;
|
|
}
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
/* Main routine */
|
|
int main(int argc, char* argv[]) {
|
|
|
|
const char* image_name;
|
|
uint64_t key_size;
|
|
uint8_t* key_blob = NULL;
|
|
VbSharedDataHeader* shared;
|
|
GoogleBinaryBlockHeader* gbb;
|
|
VbError_t rv;
|
|
int c, argsleft;
|
|
int errorcnt = 0;
|
|
char *e = 0;
|
|
|
|
Memset(&lkp, 0, sizeof(LoadKernelParams));
|
|
lkp.bytes_per_lba = LBA_BYTES;
|
|
lkp.boot_flags = BOOT_FLAG_RECOVERY;
|
|
Memset(&vnc, 0, sizeof(VbNvContext));
|
|
VbNvSetup(&vnc);
|
|
lkp.nv_context = &vnc;
|
|
|
|
/* Parse options */
|
|
opterr = 0;
|
|
while ((c=getopt(argc, argv, ":b:")) != -1)
|
|
{
|
|
switch (c)
|
|
{
|
|
case 'b':
|
|
lkp.boot_flags = strtoull(optarg, &e, 0);
|
|
if (!*optarg || (e && *e))
|
|
{
|
|
fprintf(stderr, "Invalid argument to -%c: \"%s\"\n", c, optarg);
|
|
errorcnt++;
|
|
}
|
|
break;
|
|
case '?':
|
|
fprintf(stderr, "Unrecognized switch: -%c\n", optopt);
|
|
errorcnt++;
|
|
break;
|
|
case ':':
|
|
fprintf(stderr, "Missing argument to -%c\n", optopt);
|
|
errorcnt++;
|
|
break;
|
|
default:
|
|
errorcnt++;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Update argc */
|
|
argsleft = argc - optind;
|
|
|
|
if (errorcnt || !argsleft)
|
|
{
|
|
fprintf(stderr, "usage: %s [options] <drive_image> [<sign_key>]\n",
|
|
argv[0]);
|
|
fprintf(stderr, "\noptions:\n");
|
|
/* These cases are because uint64_t isn't necessarily the same as ULL. */
|
|
fprintf(stderr, " -b NUM boot flag bits (default %" PRIu64 "):\n",
|
|
(uint64_t)BOOT_FLAG_RECOVERY);
|
|
fprintf(stderr, " %" PRIu64 " = developer mode on\n",
|
|
(uint64_t)BOOT_FLAG_DEVELOPER);
|
|
fprintf(stderr, " %" PRIu64 " = recovery mode on\n",
|
|
(uint64_t)BOOT_FLAG_RECOVERY);
|
|
return 1;
|
|
}
|
|
|
|
image_name = argv[optind];
|
|
|
|
/* Read header signing key blob */
|
|
if (argsleft > 1) {
|
|
key_blob = ReadFile(argv[optind+1], &key_size);
|
|
if (!key_blob) {
|
|
fprintf(stderr, "Unable to read key file %s\n", argv[optind+1]);
|
|
return 1;
|
|
}
|
|
printf("Read %" PRIu64 " bytes of key from %s\n", key_size, argv[optind+1]);
|
|
}
|
|
|
|
/* Initialize the GBB */
|
|
lkp.gbb_size = sizeof(GoogleBinaryBlockHeader) + key_size;
|
|
lkp.gbb_data = (void*)malloc(lkp.gbb_size);
|
|
gbb = (GoogleBinaryBlockHeader*)lkp.gbb_data;
|
|
Memset(gbb, 0, lkp.gbb_size);
|
|
Memcpy(gbb->signature, GBB_SIGNATURE, GBB_SIGNATURE_SIZE);
|
|
gbb->major_version = GBB_MAJOR_VER;
|
|
gbb->minor_version = GBB_MINOR_VER;
|
|
gbb->header_size = sizeof(GoogleBinaryBlockHeader);
|
|
/* Fill in the given key, if any, for both root and recovery */
|
|
if (key_blob) {
|
|
gbb->rootkey_offset = gbb->header_size;
|
|
gbb->rootkey_size = key_size;
|
|
Memcpy((uint8_t*)gbb + gbb->rootkey_offset, key_blob, key_size);
|
|
|
|
gbb->recovery_key_offset = gbb->rootkey_offset;
|
|
gbb->recovery_key_size = key_size;
|
|
}
|
|
|
|
/* Initialize the shared data area */
|
|
lkp.shared_data_blob = malloc(VB_SHARED_DATA_REC_SIZE);
|
|
lkp.shared_data_size = VB_SHARED_DATA_REC_SIZE;
|
|
shared = (VbSharedDataHeader*)lkp.shared_data_blob;
|
|
if (0 != VbSharedDataInit(shared, lkp.shared_data_size)) {
|
|
fprintf(stderr, "Unable to init shared data\n");
|
|
return 1;
|
|
}
|
|
/* Copy in the key blob, if any */
|
|
if (key_blob) {
|
|
if (0 != VbSharedDataSetKernelKey(shared, (VbPublicKey*)key_blob)) {
|
|
fprintf(stderr, "Unable to set key in shared data\n");
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* Free the key blob, now that we're done with it */
|
|
free(key_blob);
|
|
|
|
printf("bootflags = %" PRIu64 "\n", lkp.boot_flags);
|
|
|
|
/* Get image size */
|
|
printf("Reading from image: %s\n", image_name);
|
|
image_file = fopen(image_name, "rb");
|
|
if (!image_file) {
|
|
fprintf(stderr, "Unable to open image file %s\n", image_name);
|
|
return 1;
|
|
}
|
|
fseek(image_file, 0, SEEK_END);
|
|
lkp.ending_lba = (ftell(image_file) / LBA_BYTES) - 1;
|
|
rewind(image_file);
|
|
printf("Ending LBA: %" PRIu64 "\n", lkp.ending_lba);
|
|
|
|
/* Allocate a buffer for the kernel */
|
|
lkp.kernel_buffer = malloc(KERNEL_BUFFER_SIZE);
|
|
if(!lkp.kernel_buffer) {
|
|
fprintf(stderr, "Unable to allocate kernel buffer.\n");
|
|
return 1;
|
|
}
|
|
lkp.kernel_buffer_size = KERNEL_BUFFER_SIZE;
|
|
|
|
/* Call LoadKernel() */
|
|
rv = LoadKernel(&lkp);
|
|
printf("LoadKernel() returned %d\n", rv);
|
|
|
|
if (VBERROR_SUCCESS == rv) {
|
|
printf("Partition number: %" PRIu64 "\n", lkp.partition_number);
|
|
printf("Bootloader address: %" PRIu64 "\n", lkp.bootloader_address);
|
|
printf("Bootloader size: %" PRIu64 "\n", lkp.bootloader_size);
|
|
printf("Partition guid: "
|
|
"%02x%02x%02x%02x-%02x%02x-%02x%02x"
|
|
"-%02x%02x-%02x%02x%02x%02x%02x%02x\n",
|
|
lkp.partition_guid[3],
|
|
lkp.partition_guid[2],
|
|
lkp.partition_guid[1],
|
|
lkp.partition_guid[0],
|
|
lkp.partition_guid[5],
|
|
lkp.partition_guid[4],
|
|
lkp.partition_guid[7],
|
|
lkp.partition_guid[6],
|
|
lkp.partition_guid[8],
|
|
lkp.partition_guid[9],
|
|
lkp.partition_guid[10],
|
|
lkp.partition_guid[11],
|
|
lkp.partition_guid[12],
|
|
lkp.partition_guid[13],
|
|
lkp.partition_guid[14],
|
|
lkp.partition_guid[15]);
|
|
}
|
|
|
|
fclose(image_file);
|
|
free(lkp.kernel_buffer);
|
|
return rv != VBERROR_SUCCESS;
|
|
}
|