+RAMFS_COPY_BIN='osafeloader oseama'
+
PART_NAME=firmware
# $(1): file to read magic from
"netgear,r7900") echo "chk U12H315T30_NETGEAR"; return;;
"netgear,r8000") echo "chk U12H315T00_NETGEAR"; return;;
"netgear,r8500") echo "chk U12H334T00_NETGEAR"; return;;
+ "tplink,archer-c9-v1") echo "safeloader"; return;;
esac
}
return
}
+ if osafeloader info "$1" > /dev/null 2>&1; then
+ echo "safeloader"
+ return
+ fi
+
echo "unknown"
}
error=1
fi
;;
+ "safeloader")
+ ;;
"seama")
local img_signature=$(oseama info "$1" | grep "Meta entry:.*signature=" | sed "s/.*=//")
local dev_signature=$(platform_expected_image)
}
;;
"trx")
+ local expected=$(platform_expected_image)
+
+ [ "$expected" == "safeloader" ] && {
+ echo "This device expects SafeLoader format and may not work with TRX"
+ error=1
+ }
+
if ! otrx check "$1"; then
echo "Invalid (corrupted?) TRX firmware"
error=1
}
platform_pre_upgrade() {
- export RAMFS_COPY_BIN="${RAMFS_COPY_BIN} /usr/bin/oseama /bin/sed"
-
local file_type=$(platform_identify "$1")
[ "$(platform_flash_type)" != "nand" ] && return
echo -n dd bs=32 skip=1
}
+platform_img_from_safeloader() {
+ local dir="/tmp/sysupgrade-bcm53xx"
+
+ # Extract partitions from SafeLoader
+ rm -fR $dir
+ mkdir -p $dir
+ osafeloader extract "$1" \
+ -p "os-image" \
+ -o $dir/os-image
+ osafeloader extract "$1" \
+ -p "file-system" \
+ -o $dir/file-system
+
+ mtd write $dir/file-system rootfs
+
+ echo -n $dir/os-image
+}
+
platform_img_from_seama() {
local dir="/tmp/sysupgrade-bcm53xx"
local offset=$(oseama info "$1" -e 0 | grep "Entity offset:" | sed "s/.*:\s*//")
case "$file_type" in
"chk") cmd=$(platform_trx_from_chk_cmd "$trx");;
"cybertan") cmd=$(platform_trx_from_cybertan_cmd "$trx");;
+ "safeloader") trx=$(platform_img_from_safeloader "$trx");;
"seama") trx=$(platform_img_from_seama "$trx");;
esac