289 lines
9.1 KiB
C
289 lines
9.1 KiB
C
|
/***************************************************************************
|
||
|
* __________ __ ___.
|
||
|
* Open \______ \ ____ ____ | | _\_ |__ _______ ___
|
||
|
* Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ /
|
||
|
* Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < <
|
||
|
* Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \
|
||
|
* \/ \/ \/ \/ \/
|
||
|
* $Id$
|
||
|
*
|
||
|
* Copyright (C) 2012 Amaury Pouly
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or
|
||
|
* modify it under the terms of the GNU General Public License
|
||
|
* as published by the Free Software Foundation; either version 2
|
||
|
* of the License, or (at your option) any later version.
|
||
|
*
|
||
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||
|
* KIND, either express or implied.
|
||
|
*
|
||
|
****************************************************************************/
|
||
|
#include <stdio.h>
|
||
|
#include <time.h>
|
||
|
#include <stdlib.h>
|
||
|
#include <ctype.h>
|
||
|
#include "misc.h"
|
||
|
#include "crypto.h"
|
||
|
#include "sb1.h"
|
||
|
|
||
|
static uint16_t swap16(uint16_t t)
|
||
|
{
|
||
|
return (t << 8) | (t >> 8);
|
||
|
}
|
||
|
|
||
|
static void fix_version(struct sb1_version_t *ver)
|
||
|
{
|
||
|
ver->major = swap16(ver->major);
|
||
|
ver->minor = swap16(ver->minor);
|
||
|
ver->revision = swap16(ver->revision);
|
||
|
}
|
||
|
|
||
|
enum sb1_error_t sb1_write_file(struct sb1_file_t *sb, const char *filename)
|
||
|
{
|
||
|
return SB1_ERROR;
|
||
|
}
|
||
|
|
||
|
struct sb1_file_t *sb1_read_file(const char *filename, void *u,
|
||
|
sb1_color_printf cprintf, enum sb1_error_t *err)
|
||
|
{
|
||
|
return sb1_read_file_ex(filename, 0, -1, u, cprintf, err);
|
||
|
}
|
||
|
|
||
|
struct sb1_file_t *sb1_read_file_ex(const char *filename, size_t offset, size_t size, void *u,
|
||
|
sb1_color_printf cprintf, enum sb1_error_t *err)
|
||
|
{
|
||
|
#define fatal(e, ...) \
|
||
|
do { if(err) *err = e; \
|
||
|
cprintf(u, true, GREY, __VA_ARGS__); \
|
||
|
free(buf); \
|
||
|
return NULL; } while(0)
|
||
|
|
||
|
FILE *f = fopen(filename, "rb");
|
||
|
void *buf = NULL;
|
||
|
if(f == NULL)
|
||
|
fatal(SB1_OPEN_ERROR, "Cannot open file for reading\n");
|
||
|
fseek(f, 0, SEEK_END);
|
||
|
size_t read_size = ftell(f);
|
||
|
fseek(f, offset, SEEK_SET);
|
||
|
if(size != (size_t)-1)
|
||
|
read_size = size;
|
||
|
buf = xmalloc(read_size);
|
||
|
if(fread(buf, read_size, 1, f) != 1)
|
||
|
{
|
||
|
fclose(f);
|
||
|
fatal(SB1_READ_ERROR, "Cannot read file\n");
|
||
|
}
|
||
|
fclose(f);
|
||
|
|
||
|
struct sb1_file_t *ret = sb1_read_memory(buf, read_size, u, cprintf, err);
|
||
|
free(buf);
|
||
|
return ret;
|
||
|
|
||
|
#undef fatal
|
||
|
}
|
||
|
|
||
|
static const char *sb1_cmd_name(int cmd)
|
||
|
{
|
||
|
switch(cmd)
|
||
|
{
|
||
|
case SB1_INST_LOAD: return "load";
|
||
|
case SB1_INST_FILL: return "fill";
|
||
|
case SB1_INST_JUMP: return "jump";
|
||
|
case SB1_INST_CALL: return "call";
|
||
|
case SB1_INST_MODE: return "mode";
|
||
|
case SB1_INST_SDRAM: return "sdram";
|
||
|
default: return "unknown";
|
||
|
}
|
||
|
}
|
||
|
|
||
|
struct sb1_file_t *sb1_read_memory(void *_buf, size_t filesize, void *u,
|
||
|
sb1_color_printf cprintf, enum sb1_error_t *err)
|
||
|
{
|
||
|
struct sb1_file_t *sb1_file = NULL;
|
||
|
uint8_t *buf = _buf;
|
||
|
|
||
|
#define printf(c, ...) cprintf(u, false, c, __VA_ARGS__)
|
||
|
#define fatal(e, ...) \
|
||
|
do { if(err) *err = e; \
|
||
|
cprintf(u, true, GREY, __VA_ARGS__); \
|
||
|
sb1_free(sb1_file); \
|
||
|
return NULL; } while(0)
|
||
|
#define print_hex(c, p, len, nl) \
|
||
|
do { printf(c, ""); print_hex(p, len, nl); } while(0)
|
||
|
|
||
|
sb1_file = xmalloc(sizeof(struct sb1_file_t));
|
||
|
memset(sb1_file, 0, sizeof(struct sb1_file_t));
|
||
|
struct sb1_header_t *header = (struct sb1_header_t *)buf;
|
||
|
|
||
|
if(memcmp(header->signature, "STMP", 4) != 0)
|
||
|
fatal(SB1_FORMAT_ERROR, "Bad signature\n");
|
||
|
if(header->image_size > filesize)
|
||
|
fatal(SB1_FORMAT_ERROR, "File too small (should be at least %d bytes)\n",
|
||
|
header->image_size);
|
||
|
if(header->header_size != sizeof(struct sb1_header_t))
|
||
|
fatal(SB1_FORMAT_ERROR, "Bad header size\n");
|
||
|
|
||
|
printf(BLUE, "Basic info:\n");
|
||
|
printf(GREEN, " ROM version: ");
|
||
|
printf(YELLOW, "%x\n", header->rom_version);
|
||
|
printf(GREEN, " Userdata offset: ");
|
||
|
printf(YELLOW, "%x\n", header->userdata_offset);
|
||
|
printf(GREEN, " Pad: ");
|
||
|
printf(YELLOW, "%x\n", header->pad2);
|
||
|
|
||
|
struct sb1_version_t product_ver = header->product_ver;
|
||
|
fix_version(&product_ver);
|
||
|
struct sb1_version_t component_ver = header->component_ver;
|
||
|
fix_version(&component_ver);
|
||
|
|
||
|
memcpy(&sb1_file->product_ver, &product_ver, sizeof(product_ver));
|
||
|
memcpy(&sb1_file->component_ver, &component_ver, sizeof(component_ver));
|
||
|
|
||
|
printf(GREEN, " Product version: ");
|
||
|
printf(YELLOW, "%X.%X.%X\n", product_ver.major, product_ver.minor, product_ver.revision);
|
||
|
printf(GREEN, " Component version: ");
|
||
|
printf(YELLOW, "%X.%X.%X\n", component_ver.major, component_ver.minor, component_ver.revision);
|
||
|
|
||
|
printf(GREEN, " Drive tag: ");
|
||
|
printf(YELLOW, "%x\n", header->drive_tag);
|
||
|
|
||
|
/* reduce size w.r.t to userdata part */
|
||
|
uint32_t userdata_size = 0;
|
||
|
if(header->userdata_offset != 0)
|
||
|
{
|
||
|
userdata_size = header->image_size - header->userdata_offset;
|
||
|
header->image_size -= userdata_size;
|
||
|
}
|
||
|
|
||
|
if(header->image_size % SECTOR_SIZE)
|
||
|
{
|
||
|
if(g_force)
|
||
|
printf(GREY, "Image size is not a multiple of sector size\n");
|
||
|
else
|
||
|
fatal(SB1_FORMAT_ERROR, "Image size is not a multiple of sector size\n");
|
||
|
}
|
||
|
|
||
|
/* find key */
|
||
|
union xorcrypt_key_t key[2];
|
||
|
bool valid_key = false;
|
||
|
uint8_t sector[SECTOR_SIZE];
|
||
|
|
||
|
for(int i = 0; i < g_nr_keys; i++)
|
||
|
{
|
||
|
if(!g_key_array[i].method == CRYPTO_XOR_KEY)
|
||
|
continue;
|
||
|
/* copy key and data because it's modified by the crypto code */
|
||
|
memcpy(key, g_key_array[i].u.xor_key, sizeof(key));
|
||
|
memcpy(sector, header + 1, SECTOR_SIZE - header->header_size);
|
||
|
/* try to decrypt the first sector */
|
||
|
uint32_t mark = xor_decrypt(key, sector, SECTOR_SIZE - 4 - header->header_size);
|
||
|
if(mark != *(uint32_t *)§or[SECTOR_SIZE - 4 - header->header_size])
|
||
|
continue;
|
||
|
/* found ! */
|
||
|
valid_key = true;
|
||
|
/* copy key again it's modified by the crypto code */
|
||
|
memcpy(key, g_key_array[i].u.xor_key, sizeof(key));
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
printf(BLUE, "Crypto\n");
|
||
|
for(int i = 0; i < 2; i++)
|
||
|
{
|
||
|
printf(RED, " Key %d\n", i);
|
||
|
printf(OFF, " ");
|
||
|
for(int j = 0; j < 64; j++)
|
||
|
{
|
||
|
printf(YELLOW, "%02x ", key[i].key[j]);
|
||
|
if((j + 1) % 16 == 0)
|
||
|
{
|
||
|
printf(OFF, "\n");
|
||
|
if(j + 1 != 64)
|
||
|
printf(OFF, " ");
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if(!valid_key)
|
||
|
fatal(SB1_NO_VALID_KEY, "No valid key found\n");
|
||
|
|
||
|
/* decrypt image in-place (and removing crypto markers) */
|
||
|
void *ptr = header + 1;
|
||
|
void *copy_ptr = header + 1;
|
||
|
int offset = header->header_size;
|
||
|
for(unsigned i = 0; i < header->image_size / SECTOR_SIZE; i++)
|
||
|
{
|
||
|
int size = SECTOR_SIZE - 4 - offset;
|
||
|
uint32_t mark = xor_decrypt(key, ptr, size);
|
||
|
if(mark != *(uint32_t *)(ptr + size))
|
||
|
fatal(SB1_CHECKSUM_ERROR, "Crypto mark mismatch\n");
|
||
|
memmove(copy_ptr, ptr, size);
|
||
|
ptr += size + 4;
|
||
|
copy_ptr += size;
|
||
|
offset = 0;
|
||
|
}
|
||
|
|
||
|
/* reduce image size given the removed marks */
|
||
|
header->image_size -= header->image_size / SECTOR_SIZE;
|
||
|
|
||
|
printf(BLUE, "Commands\n");
|
||
|
struct sb1_cmd_header_t *cmd = (void *)(header + 1);
|
||
|
while((void *)cmd < (void *)header + header->image_size)
|
||
|
{
|
||
|
printf(GREEN, " Command");
|
||
|
printf(YELLOW, " %#x\n", cmd->cmd);
|
||
|
printf(YELLOW, " Size:");
|
||
|
printf(RED, " %#x\n", SB1_CMD_SIZE(cmd->cmd));
|
||
|
printf(YELLOW, " Critical:");
|
||
|
printf(RED, " %d\n", SB1_CMD_CRITICAL(cmd->cmd));
|
||
|
printf(YELLOW, " Data Type:");
|
||
|
printf(RED, " %#x\n", SB1_CMD_DATATYPE(cmd->cmd));
|
||
|
printf(YELLOW, " Bytes:");
|
||
|
printf(RED, " %#x\n", SB1_CMD_BYTES(cmd->cmd));
|
||
|
printf(YELLOW, " Boot:");
|
||
|
printf(RED, " %#x (%s)\n", SB1_CMD_BOOT(cmd->cmd), sb1_cmd_name(SB1_CMD_BOOT(cmd->cmd)));
|
||
|
printf(YELLOW, " Addr:");
|
||
|
printf(RED, " %#x\n", cmd->addr);
|
||
|
|
||
|
/* last instruction ? */
|
||
|
if(SB1_CMD_BOOT(cmd->cmd) == SB1_INST_JUMP ||
|
||
|
SB1_CMD_BOOT(cmd->cmd) == SB1_INST_MODE)
|
||
|
break;
|
||
|
|
||
|
cmd = (void *)cmd + 4 + 4 * SB1_CMD_SIZE(cmd->cmd);
|
||
|
}
|
||
|
|
||
|
sb1_file->data_size = header->image_size - header->header_size;
|
||
|
sb1_file->data = malloc(sb1_file->data_size);
|
||
|
memcpy(sb1_file->data, header + 1, sb1_file->data_size);
|
||
|
|
||
|
return sb1_file;
|
||
|
#undef printf
|
||
|
#undef fatal
|
||
|
#undef print_hex
|
||
|
}
|
||
|
|
||
|
void sb1_free(struct sb1_file_t *file)
|
||
|
{
|
||
|
if(!file) return;
|
||
|
|
||
|
free(file->data);
|
||
|
free(file);
|
||
|
}
|
||
|
|
||
|
void sb1_dump(struct sb1_file_t *file, void *u, sb1_color_printf cprintf)
|
||
|
{
|
||
|
#define printf(c, ...) cprintf(u, false, c, __VA_ARGS__)
|
||
|
#define print_hex(c, p, len, nl) \
|
||
|
do { printf(c, ""); print_hex(p, len, nl); } while(0)
|
||
|
|
||
|
#define TREE RED
|
||
|
#define HEADER GREEN
|
||
|
#define TEXT YELLOW
|
||
|
#define TEXT2 BLUE
|
||
|
#define SEP OFF
|
||
|
|
||
|
#undef printf
|
||
|
#undef print_hex
|
||
|
}
|
||
|
|