summaryrefslogtreecommitdiffstats
path: root/utils/imxtools/sbtools
AgeCommit message (Collapse)AuthorFilesLines
2020-06-21sbtools: Avoid calling pkg-config on each compiler invocation.Dominik Riebeling1-7/+9
Only expand pkg-config calls once by making the compiler flags simply expanded variables. Makes things more predicable and slightly faster. Change-Id: Ie2ed066f205a95ec8a7708cefeb29e9989815db6
2020-03-29FS13192: rbutil: Fix linking error on Fedora 32 betaSolomon Peachy1-2/+2
Change-Id: I350553db037ad9f65aced3f974afeaeee3fe822a
2019-11-09rbutil: fix windows cross compile (via M cross environment)Franklin Wei1-1/+1
This fixes a couple of issues when cross-compiling for windows: - lib builds (i.e. mks5lboot) were overriding the cross CC/CXX with the native CC, producing incompatible binaries. - Qt made the accessibility plugin part of the core library, so we no longer need to import it. Change-Id: I9d884aee62dfa51d3624a3fa9b99c23b3b375f20
2017-01-16imxtools/sbtools: switch SHA1 implementation to Crypto++Amaury Pouly4-156/+27
The current implementation was custom and super slow. Since we use Crypto++ anyway, we might as well get use a good implementation. Change-Id: I761ad7401653471e54000e1c2bc3d9882378112f
2017-01-16imxtools/sbtools: switch AES implementation to Crypto++Amaury Pouly4-311/+82
Instead of having our own copy of the AES code, use a good library to do that. Crypto++ is well-maintained, supports a lot of ciphers, works on many OSes, and is optimized for many architectures. Change-Id: I7d7d24b47993206d7338c5f9bac8bbdd3915a667
2017-01-16imxtools/sbtools: various fixesAmaury Pouly6-24/+39
Change bug() macro, fix memory leaks, always use -h for help, fix usage(), fix comment, remove useless macro Change-Id: I30554b5e07e6f2845560a570808603cf8c4da5ad
2017-01-16imxtools/sbtools: rework cryptographyAmaury Pouly9-318/+171
It was a mess, a mix of crypto_* and cbc_mac calls. I made everything call crypto functions, and also separate key setup from cryptographic operations, this will be useful to speed up the code in the upcoming commits. Drop support for "usbotp" key, since the crypto code for that was never mainlined and we can always get the keys from a device as long as we have code execution (using the DCP debug registers). Change-Id: I7aa24d12207ffb744225d1b9cc7cb1dc7281dd22
2017-01-16imxtools: correctly read unencrypted images in raw modeAmaury Pouly1-0/+2
Change-Id: I87830b81a017f36d2887d9c289d09812f227b157
2017-01-16imxtools: rework key/IV overriding logicAmaury Pouly2-9/+0
The overriding of the IV and real key should be the exception, there is no need to manually set them to false. Change-Id: Id66754f20a79aa5c1a991839345d1242e0aa587d
2017-01-16imxtools: rework sb file productionAmaury Pouly2-73/+82
The old code had some annoying way of dealing with padding by adding explicit instructions to the stream, which is 1) ugly 2) not in par with freescale tools. The trick, which this new version implements, is to put the useful length of the section in the section header, and the actual (with padding) length in the boot tag. This way the tools can just ignore padding instruction by reading the section header, and the bootloader can still load the image because it uses the boot tags. Also correctly handle the case where the first section does not start right after the header (there is a bug in freescale tools for this case by the way). There is an ambiguity in the way the padding instructions should be encrypted: the bootloader should logically treat them as regular instruction of the section stream, but it appears the freescale tools do not generate them as part of the stream and instead encrypt them like boot tags, which is stupid because there is no way the bootloader could decrypt them, and anyway we don't care because the bootloader doesn't decrypt them at all. Change-Id: Iabdc1d1f9f82d374779bf03efb75c2c3998f5b5d
2017-01-01imxtools: fix bug aes128 (did not update cbc-macp)Amaury Pouly1-0/+2
Although this does bug is never triggered because we never decrypt and use the resulting CBC-MAC, it's a major overlook. Change-Id: I3c5d318e6428d528483bf888ea284e9ded3889f0
2014-12-20sb1: fix buggy comparisonAmaury Pouly1-1/+1
cppcheck reported: [rockbox/utils/imxtools/sbtools/sb1.c:440]: (warning) Comparison of a boolean expression with an integer other than 0 or 1. Thanks to Thomas Jarosch Change-Id: I0078232706d4014a1f2acea310a7a0d0edf7788b
2014-09-07sbtools: add option to ignore sha1 errorsAmaury Pouly3-14/+30
Change-Id: I6bf9e4671e57f8ff3f436660e8ecb561027a036c
2014-09-07sbtools: use default transfer size if it cannot be probedAmaury Pouly1-9/+14
A older commit removed this ability but it tends to be a problem since the HID driver can prevent probing of transfer size which then needs to be entered by hand on the command line. Change-Id: Ie5a556ffdcc2adec0e1c984810983e19136b6473
2013-12-06imxtools/sbtools/sb1: fix parsing/debug bug about jump/call argumentsAmaury Pouly1-2/+4
Change-Id: Ib406cfc03ced6c8689ed467c154d6a7447a34e5c
2013-12-06imxtools/sbtools/elf: fix debug codeAmaury Pouly1-5/+5
Change-Id: If043eb214417a41f71e6c05fc6a725eb8f983373
2013-12-06elftosb: fix crash on invalid command fileAmaury Pouly1-0/+2
Change-Id: Ifef61b7ca6a391960d1d696ba455e0d14462c967
2013-10-09imxtools/sbloader: rewrite hid codeAmaury Pouly1-37/+121
Rewrite code with proper documentation: it uses a UMS like CBW/CSW to wrap commands and status. Change-Id: I10476c87aaea96d4b9e54f8c1c266835c8e89721
2013-10-09imxtools/sbtools: always probe report size for HID recovery modeAmaury Pouly1-3/+4
Some older versions of the ROM (TA3 for example), use a 64 byte report size instead of 1024, so hardcoding 1024 is just a bad idea. Change-Id: I720c4465cfe2f519bffa307175614bba58766dce
2013-09-10imxtools/efltosb: fix extern() in db filesAmaury Pouly1-1/+1
Change-Id: I5f1acd619b2f280e709d2bd06a28a3e88cc05e27
2013-08-22sbtools: fix elf section namingAmaury Pouly1-1/+1
Change-Id: I4500bf70028af26cc4b8136f111f527e1396d16e
2013-08-22sbtools: more work on sbtoelf and elftosb, support more attributesAmaury Pouly6-86/+107
Now handle timestamp, sb minor version, component/product versions, section flags. Change-Id: I35313efe60c28f04ea3732b36e5e01be3213cf9e
2013-08-22sbtools: factor code in command parserAmaury Pouly1-83/+19
Change-Id: I790c373b8a0319cdb00650d3c59919bd4b0b96f6
2013-08-22sbtools: now generate a db file along with with elf/rsrc filesAmaury Pouly6-9/+315
Now always generate a "make.db" file which aims at being the exact representation of the file, ie running sbtoelf and elftosb using the generated command file should produce the exact same file (except for the random paddings). We still miss the support for some option parsing to achieve that though. Change-Id: Ib7d6b241f7855fd35225df8ab8e0711f69d9ee5a
2013-08-22sbtools: fix buffer overflowAmaury Pouly1-1/+1
Change-Id: I7b1c963e58eec88da215722ec219569a0a5a9cea
2013-08-21sbtools: fix redAmaury Pouly1-1/+1
Change-Id: I28b7d4d59d8f14abbba2a70e2bdea6987b6a3a98
2013-08-21sbtools: more code refactoringAmaury Pouly11-98/+66
Factor all printf method with a unique one defined in misc.h Change-Id: I58fbf8916b76e873a2e6678506d2c8aece7834ec
2013-08-10sbtools: more printf fixingAmaury Pouly3-44/+49
Change-Id: Id617297c196b381fd1c381da3eff4345e3157529
2013-08-06sbtools: fix output printingAmaury Pouly3-25/+60
The code used printf instead of the provided printf functions, resulting in strange output. Change-Id: I2c7c2531d8d54ecdea97e8c189d18d351320ca7d
2013-08-06sbtools: fix handling of NOP instructionsAmaury Pouly2-1/+16
Change-Id: I05ab8176f368a6e2d075dfb2059692871e0c00b3
2013-08-06elf: fix handling of virtual/physical addressesAmaury Pouly4-16/+3
Remove the hackish elf_translate_addresses which should not have existed in the first place, on write always compute the physical address of a section using elf_translate_virtual_address which makes it possible to specify any virtual to physical mapping and fail nicely if there is none. Change-Id: I4f436945e90280a6fd9430de6c642dbeb8e23d40
2013-08-06sbtools: various fixesAmaury Pouly2-2/+5
Change-Id: I82c4642aea325cf22d66e9b49fc2d47319cd70eb
2013-08-06sbtools: standard sb print function is now standardAmaury Pouly1-2/+3
Change-Id: I2746bfff9a360ef4fc823853859609ffed5d2b67
2013-08-06sbtools: elf library can now load global symbolsAmaury Pouly3-35/+171
Change-Id: I4d9f38ce31e65542d6ab192158bff52b6fad8f09
2013-08-06sbtools: add helper to determine if a file is a valid ELF imageAmaury Pouly2-0/+15
Change-Id: Ie0e9c05569ca9b02fd36f31fd7323f02b14e1b60
2013-08-06sbtools: make code aware of elf section namesAmaury Pouly3-23/+39
Change-Id: I7ab657959e38d2fcb2c7e6d9858facfb83101423
2013-07-18sbtools: refactor and cleanupAmaury Pouly12-123/+131
Factor common elf/sb read/write/printf routines. Factor sb zero key, move sb version guess. Change-Id: I5ae1885587456736e782e623610281bbee545039
2013-06-18sbtools: fix sbloader (allow transfer size override)Amaury Pouly1-2/+5
Change-Id: Id6d3188b7f837726c29845f01b0b1588acf40407
2013-06-17sbtools: various little fixes, mostly cosmeticsAmaury Pouly3-20/+23
Change-Id: Ic53ef0283bdaee8d3272f648b71eff567b25059b
2013-06-17sbtools: add Sansa Express bootloader keyAmaury Pouly1-0/+1
Change-Id: I167a6410e40478173e5ce496ace4f705c3e26a1b
2013-06-15sbtools,mkximboot: fix whitespaceAmaury Pouly15-83/+83
Change-Id: I8d8adb783707172d1aaef302366c240310350ed8
2013-06-13imxtools: add Zen, Zen Mozaic and Zen X-Fi bootloader keysAmaury Pouly3-0/+3
Change-Id: I856e5b91c8e9a1c02b367960052c36f9b527046b
2013-06-13imxtools: rewrite sbloader to handle both versions + user friendlyAmaury Pouly1-36/+346
The tool can now load sb1 and sb files to devices. Detection has been improved and the tool can infer the packet size for the HID description as well. The command line interface has been vastly improved too, this breaks the old one. Change-Id: I01a0ff8f8a007514aa81c56f114c0f0a86e3303c
2013-06-13sbtools: fix encryption and cosmeticsAmaury Pouly1-4/+9
Change-Id: Id302f236ad3ec13a5166de4e22a3fc85b2a6c64f
2013-02-18imxtools/sbtools: silence warningAmaury Pouly1-0/+1
Change-Id: I423e760bbc8e418bcce3afe01c5831b5a3e655f3
2013-02-18imxtools/sbtools: add -jump command, fix helpAmaury Pouly1-0/+8
Change-Id: I0d5d61c1dc137333bda5e403d06a43d16f2750bf
2013-02-18sbtools/elftosb1: implement key file loadingAmaury Pouly1-0/+8
Change-Id: I2273b8d6314250620611ec50d159237edc6d76c2
2013-02-16sbtools: add brute force option for sb1 in sbtoelfAmaury Pouly6-3/+218
After some reverse engineering, it appears that the keys of the sb1 format are very weak: the 128 bytes are generated from the laserfuse words 4,5 and 6 but in a weird manner: 4 and 5 are simply ORed and 6 is only half used (somehow), making it "only" a 48 bit word to find. Change-Id: I40702e19d0924ef51c01894efce3cb65bd664456
2013-02-16sbtools: increase performance by compiling with O3, add zenv keyAmaury Pouly3-1/+2
Change-Id: I2301f695e49d306d21bb9efa9c44acf1d3296a08
2013-01-29imxtools/sbtoelf: add more robust version guessAmaury Pouly1-8/+12
Change-Id: I41ce1005d997cf35153e085b19294bb7d418e968