d9ccfbc1e0422634046d6066b913c30e54398428
[openwrt/staging/ldir.git] / tools / firmware-utils / src / mksenaofw.c
1 /*
2 *
3 * Copyright (C) 2012 OpenWrt.org
4 * Copyright (C) 2012 Mikko Hissa <mikko.hissa@uta.fi>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License version 2 as published
8 * by the Free Software Foundation.
9 *
10 */
11
12 #include <stdio.h>
13 #include <stdlib.h>
14 #include <string.h>
15 #include <stdarg.h>
16 #include <libgen.h>
17 #include <errno.h>
18 #include <arpa/inet.h>
19 #include <unistd.h>
20 #include "md5.h"
21
22 #define HDR_LEN 0x60
23 #define BUF_SIZE 0x200
24 #define VERSION_SIZE 0x10
25 #define MD5_SIZE 0x10
26 #define PAD_SIZE 0x20
27
28 #define DEFAULT_BLOCK_SIZE 65535
29
30 #define DEFAULT_HEAD_VALUE 0x0
31 #define DEFAULT_VERSION "123"
32 #define DEFAULT_MAGIC 0x12345678
33
34 typedef struct {
35 uint32_t head;
36 uint32_t vendor_id;
37 uint32_t product_id;
38 uint8_t version[VERSION_SIZE];
39 uint32_t firmware_type;
40 uint32_t filesize;
41 uint32_t zero;
42 uint8_t md5sum[MD5_SIZE];
43 uint8_t pad[PAD_SIZE];
44 uint32_t chksum;
45 uint32_t magic;
46 } img_header;
47
48 typedef struct {
49 uint8_t id;
50 char * name;
51 } firmware_type;
52
53 typedef enum {
54 NONE, ENCODE, DECODE
55 } op_mode;
56
57 static firmware_type FIRMWARE_TYPES[] = {
58 { 0x00, "combo" }, /* Used for new capwap-included style header */
59 { 0x01, "bootloader" },
60 { 0x02, "kernel" },
61 { 0x03, "kernelapp" },
62 { 0x04, "apps" },
63 /* The types below this line vary by manufacturer */
64 { 0x05, "littleapps (D-Link)/factoryapps (EnGenius)" },
65 { 0x06, "sounds (D-Link)/littleapps (EnGenius)" },
66 { 0x07, "userconfig (D-Link)/appdata (EnGenius)" },
67 { 0x08, "userconfig (EnGenius)"},
68 { 0x09, "odmapps (EnGenius)"},
69 { 0x0a, "factoryapps (D-Link)" },
70 { 0x0b, "odmapps (D-Link)" },
71 { 0x0c, "langpack (D-Link)" }
72 };
73
74 #define MOD_DEFAULT 0x616C6C00
75 #define SKU_DEFAULT 0x0
76 #define DATECODE_NONE 0xFFFFFFFF
77 #define FIRMWARE_TYPE_NONE 0xFF
78
79 struct capwap_header {
80 uint32_t mod;
81 uint32_t sku;
82 uint32_t firmware_ver[3];
83 uint32_t datecode;
84 uint32_t capwap_ver[3];
85 uint32_t model_size;
86 uint8_t model[];
87 };
88
89 static long get_file_size(const char *filename)
90 {
91 FILE *fp_file;
92 long result;
93
94 fp_file = fopen(filename, "r");
95 if (!fp_file)
96 return -1;
97 fseek(fp_file, 0, SEEK_END);
98 result = ftell(fp_file);
99 fclose(fp_file);
100 return result;
101 }
102
103 static int header_checksum(void *data, size_t len)
104 {
105 int sum = 0; /* shouldn't this be unsigned ? */
106 size_t i;
107
108 if (data != NULL && len > 0) {
109 for (i = 0; i < len; ++i)
110 sum += ((unsigned char *)data)[i];
111 return sum;
112 }
113
114 return -1;
115 }
116
117 static int md5_file(const char *filename, uint8_t *dst)
118 {
119 FILE *fp_src;
120 MD5_CTX ctx;
121 char buf[BUF_SIZE];
122 size_t bytes_read;
123
124 MD5_Init(&ctx);
125
126 fp_src = fopen(filename, "r+b");
127 if (!fp_src) {
128 return -1;
129 }
130 while (!feof(fp_src)) {
131 bytes_read = fread(&buf, 1, BUF_SIZE, fp_src);
132 MD5_Update(&ctx, &buf, bytes_read);
133 }
134 fclose(fp_src);
135
136 MD5_Final(dst, &ctx);
137
138 return 0;
139 }
140
141 static int encode_image(const char *input_file_name,
142 const char *output_file_name, img_header *header,
143 struct capwap_header *cw_header, int block_size)
144 {
145 char buf[BUF_SIZE];
146 size_t pad_len = 0;
147 size_t bytes_avail;
148 size_t bytes_read;
149
150 FILE *fp_output;
151 FILE *fp_input;
152
153 int model_size;
154 long magic;
155 size_t i;
156
157 fp_input = fopen(input_file_name, "r+b");
158 if (!fp_input) {
159 fprintf(stderr, "Cannot open %s !!\n", input_file_name);
160 return -1;
161 }
162
163 fp_output = fopen(output_file_name, "w+b");
164 if (!fp_output) {
165 fprintf(stderr, "Cannot open %s !!\n", output_file_name);
166 fclose(fp_input);
167 return -1;
168 }
169
170 header->filesize = get_file_size(input_file_name);
171 if (!header->filesize) {
172 fprintf(stderr, "File %s open/size error!\n", input_file_name);
173 fclose(fp_input);
174 fclose(fp_output);
175 return -1;
176 }
177 /*
178 * Zero padding
179 */
180 if (block_size > 0) {
181 pad_len = block_size - (header->filesize % block_size);
182 }
183
184 if (md5_file(input_file_name, (uint8_t *) &header->md5sum) < 0) {
185 fprintf(stderr, "MD5 failed on file %s\n", input_file_name);
186 fclose(fp_input);
187 fclose(fp_output);
188 return -1;
189 }
190 header->zero = 0;
191 header->chksum = header_checksum(header, HDR_LEN);
192 if (cw_header) {
193 header->chksum += header_checksum(cw_header,
194 sizeof(struct capwap_header) + cw_header->model_size);
195 }
196
197 header->head = htonl(header->head);
198 header->vendor_id = htonl(header->vendor_id);
199 header->product_id = htonl(header->product_id);
200 header->firmware_type = htonl(header->firmware_type);
201 header->filesize = htonl(header->filesize);
202 header->chksum = htonl(header->chksum);
203 magic = header->magic;
204 header->magic = htonl(header->magic);
205
206 fwrite(header, HDR_LEN, 1, fp_output);
207
208 if (cw_header) {
209 model_size = cw_header->model_size;
210 cw_header->mod = htonl(cw_header->mod);
211 cw_header->sku = htonl(cw_header->sku);
212 cw_header->firmware_ver[0] = htonl(cw_header->firmware_ver[0]);
213 cw_header->firmware_ver[1] = htonl(cw_header->firmware_ver[1]);
214 cw_header->firmware_ver[2] = htonl(cw_header->firmware_ver[2]);
215 cw_header->datecode = htonl(cw_header->datecode);
216 cw_header->capwap_ver[0] = htonl(cw_header->capwap_ver[0]);
217 cw_header->capwap_ver[1] = htonl(cw_header->capwap_ver[1]);
218 cw_header->capwap_ver[2] = htonl(cw_header->capwap_ver[2]);
219 cw_header->model_size = htonl(cw_header->model_size);
220 fwrite(cw_header, sizeof(struct capwap_header) + model_size, 1,
221 fp_output);
222 }
223
224 while (!feof(fp_input) || pad_len > 0) {
225
226 if (!feof(fp_input))
227 bytes_read = fread(&buf, 1, BUF_SIZE, fp_input);
228 else
229 bytes_read = 0;
230
231 /*
232 * No more bytes read, start padding
233 */
234 if (bytes_read < BUF_SIZE && pad_len > 0) {
235 bytes_avail = BUF_SIZE - bytes_read;
236 memset( &buf[bytes_read], 0, bytes_avail);
237 bytes_read += bytes_avail < pad_len ? bytes_avail : pad_len;
238 pad_len -= bytes_avail < pad_len ? bytes_avail : pad_len;
239 }
240
241 for (i = 0; i < bytes_read; i++)
242 buf[i] ^= magic >> (i % 8) & 0xff;
243 fwrite(&buf, bytes_read, 1, fp_output);
244 }
245
246 fclose(fp_input);
247 fclose(fp_output);
248 return 1;
249 }
250
251 int decode_image(const char *input_file_name, const char *output_file_name)
252 {
253 struct capwap_header cw_header;
254 char buf[BUF_SIZE];
255 img_header header;
256
257 char *pmodel = NULL;
258 FILE *fp_input;
259 FILE *fp_output;
260
261 size_t bytes_read;
262 size_t bytes_written;
263 unsigned int i;
264
265 fp_input = fopen(input_file_name, "r+b");
266 if (!fp_input) {
267 fprintf(stderr, "Cannot open %s !!\n", input_file_name);
268 return -1;
269 }
270
271 fp_output = fopen(output_file_name, "w+b");
272 if (!fp_output) {
273 fprintf(stderr, "Cannot open %s !!\n", output_file_name);
274 fclose(fp_input);
275 return -1;
276 }
277
278 if (fread(&header, 1, HDR_LEN, fp_input) != HDR_LEN) {
279 fprintf(stderr, "Incorrect header size reading base header!!");
280 fclose(fp_input);
281 fclose(fp_output);
282 return -1;
283 }
284
285 header.head = ntohl(header.head);
286 header.vendor_id = ntohl(header.vendor_id);
287 header.product_id = ntohl(header.product_id);
288 header.firmware_type = ntohl(header.firmware_type);
289 header.filesize = ntohl(header.filesize);
290 header.chksum = ntohl(header.chksum);
291 header.magic = ntohl(header.magic);
292
293 /* read capwap header if firmware_type is zero */
294 if (header.firmware_type == 0) {
295 if (fread(&cw_header, 1, sizeof(struct capwap_header),
296 fp_input) != sizeof(struct capwap_header)) {
297 fprintf(stderr, "Incorrect header size reading capwap_header!!");
298 fclose(fp_input);
299 fclose(fp_output);
300 return -1;
301 }
302 cw_header.mod = ntohl(cw_header.mod);
303 cw_header.sku = ntohl(cw_header.sku);
304 cw_header.firmware_ver[0] = ntohl(cw_header.firmware_ver[0]);
305 cw_header.firmware_ver[1] = ntohl(cw_header.firmware_ver[1]);
306 cw_header.firmware_ver[2] = ntohl(cw_header.firmware_ver[2]);
307 cw_header.datecode = ntohl(cw_header.datecode);
308 cw_header.capwap_ver[0] = ntohl(cw_header.capwap_ver[0]);
309 cw_header.capwap_ver[1] = ntohl(cw_header.capwap_ver[1]);
310 cw_header.capwap_ver[2] = ntohl(cw_header.capwap_ver[2]);
311 cw_header.model_size = ntohl(cw_header.model_size);
312
313 pmodel = malloc(cw_header.model_size + 1);
314 if (pmodel) {
315 pmodel[cw_header.model_size] = '\0';
316 if (fread(pmodel, 1, cw_header.model_size, fp_input) !=
317 cw_header.model_size) {
318 fprintf(stderr, "Incorrect header size reading model name!!");
319 free(pmodel);
320 fclose(fp_input);
321 fclose(fp_output);
322 return -1;
323 }
324 free(pmodel);
325 } else {
326 fprintf(stderr, "Incorrect header size reading model name!!");
327 fclose(fp_input);
328 fclose(fp_output);
329 return -1;
330 }
331 }
332
333 bytes_written = 0;
334 while (!feof(fp_input)) {
335
336 bytes_read = fread(&buf, 1, BUF_SIZE, fp_input);
337 for (i = 0; i < bytes_read; i++)
338 buf[i] ^= header.magic >> (i % 8) & 0xff;
339
340 /*
341 * Handle padded source file
342 */
343 if (bytes_written + bytes_read > header.filesize) {
344 bytes_read = header.filesize - bytes_written;
345 if (bytes_read > 0)
346 fwrite(&buf, bytes_read, 1, fp_output);
347 break;
348 }
349
350 fwrite(&buf, bytes_read, 1, fp_output);
351 bytes_written += bytes_read;
352 }
353
354 fclose(fp_input);
355 fclose(fp_output);
356
357 return 1;
358 }
359
360 static void usage(const char *progname, int status)
361 {
362 FILE *stream = (status != EXIT_SUCCESS) ? stderr : stdout;
363 size_t i;
364
365 fprintf(stream, "Usage: %s [OPTIONS...]\n", progname);
366 fprintf(stream, "\n"
367 "Options:\n"
368 " -e <file> encode image file <file>\n"
369 " -d <file> decode image file <file>\n"
370 " -o <file> write output to the file <file>\n"
371 " -t <type> set image type to <type>\n"
372 " valid image <type> values:\n");
373 for (i = 0; i < sizeof(FIRMWARE_TYPES) / sizeof(firmware_type); i++) {
374 fprintf(stream, " %-5i= %s\n", FIRMWARE_TYPES[i].id,
375 FIRMWARE_TYPES[i].name);
376 }
377 fprintf(stream, " -v <version> set image version to <version>\n"
378 " -r <vendor> set image vendor id to <vendor>\n"
379 " -p <product> set image product id to <product>\n"
380 " -m <magic> set encoding magic <magic>\n"
381 " -z enable image padding to <blocksize>\n"
382 " -b <blocksize> set image <blocksize>, defaults to %u\n"
383 " -c <datecode> add capwap header with <datecode> (e.g. 171101)\n"
384 " -w <fw_ver> firmware version for capwap header (e.g. 3.0.1)\n"
385 " -x <cw_ver> capwap firmware version for capwap header (e.g. 1.8.53)\n"
386 " -n <name> model name for capwap header (e.g. ENS620EXT)\n"
387 " -h show this screen\n", DEFAULT_BLOCK_SIZE);
388 exit(status);
389 }
390
391 int main(int argc, char *argv[])
392 {
393 static const char period[2] = ".";
394 struct capwap_header cw_header;
395 img_header header;
396
397 struct capwap_header *pcw_header = NULL;
398 char *output_file = NULL;
399 char *input_file = NULL;
400 char *progname = NULL;
401 char *mod_name = NULL;
402 char *token;
403
404 op_mode mode = NONE;
405 int tmp, pad = 0;
406 int block_size;
407 size_t i;
408 int opt;
409
410 block_size = DEFAULT_BLOCK_SIZE;
411 progname = basename(argv[0]);
412
413 memset(&header, 0, sizeof(img_header));
414 header.magic = DEFAULT_MAGIC;
415 header.head = DEFAULT_HEAD_VALUE;
416 header.firmware_type = FIRMWARE_TYPE_NONE;
417 memset(&cw_header, 0, sizeof(struct capwap_header));
418 cw_header.mod = MOD_DEFAULT;
419 cw_header.sku = SKU_DEFAULT;
420 cw_header.datecode = DATECODE_NONE;
421 strncpy( (char*)&header.version, DEFAULT_VERSION, VERSION_SIZE - 1);
422
423 while ((opt = getopt(argc, argv, ":o:e:d:t:v:r:p:m:b:c:w:x:n:h?z")) != -1) {
424 switch (opt) {
425 case 'e':
426 input_file = optarg;
427 mode = ENCODE;
428 break;
429 case 'd':
430 input_file = optarg;
431 mode = DECODE;
432 break;
433 case 'o':
434 output_file = optarg;
435 break;
436 case 't':
437 tmp = strtol(optarg, 0, 10);
438 for (i = 0; i < sizeof(FIRMWARE_TYPES) / sizeof(firmware_type);
439 i++) {
440 if (FIRMWARE_TYPES[i].id == tmp) {
441 header.firmware_type = FIRMWARE_TYPES[i].id;
442 break;
443 }
444 }
445 if (header.firmware_type == FIRMWARE_TYPE_NONE) {
446 fprintf(stderr, "Invalid firmware type \"0\"!\n");
447 usage(progname, EXIT_FAILURE);
448 }
449 break;
450 case 'v':
451 strncpy( (char*)&header.version, optarg,
452 VERSION_SIZE - 1);
453 break;
454 case 'r':
455 header.vendor_id = strtol(optarg, 0, 0);
456 break;
457 case 'p':
458 header.product_id = strtol(optarg, 0, 0);
459 break;
460 case 'm':
461 header.magic = strtoul(optarg, 0, 16);
462 break;
463 case 'z':
464 pad = 1;
465 break;
466 case 'b':
467 block_size = strtol(optarg, 0, 10);
468 break;
469 case 'c':
470 cw_header.datecode = strtoul(optarg, 0, 10);
471 break;
472 case 'w':
473 token = strtok(optarg, period);
474 i = 0;
475 while (token && (i < 3)) {
476 cw_header.firmware_ver[i++] =
477 strtoul(token, 0, 10);
478 token = strtok(NULL, period);
479 }
480 break;
481 case 'x':
482 token = strtok(optarg, period);
483 i = 0;
484 while (token && (i < 3)) {
485 cw_header.capwap_ver[i++] =
486 strtoul(token, 0, 10);
487 token = strtok(NULL, period);
488 }
489 break;
490 case 'n':
491 mod_name = optarg;
492 cw_header.model_size = strlen(mod_name);
493 break;
494 case 'h':
495 usage(progname, EXIT_SUCCESS);
496 break;
497 case ':':
498 fprintf(stderr, "Option -%c requires an operand\n", optopt);
499 usage(progname, EXIT_FAILURE);
500 break;
501 case '?':
502 fprintf(stderr, "Unrecognized option: -%c\n", optopt);
503 usage(progname, EXIT_FAILURE);
504 break;
505 default:
506 usage(progname, EXIT_FAILURE);
507 break;
508 }
509 }
510
511 /* Check required arguments */
512 if (mode == NONE) {
513 fprintf(stderr, "A mode must be defined\n");
514 usage(progname, EXIT_FAILURE);
515 }
516
517 if (input_file == NULL || output_file == NULL) {
518 fprintf(stderr, "Input and output files must be defined\n");
519 usage(progname, EXIT_FAILURE);
520 }
521
522 if (mode == DECODE) {
523 if (decode_image(input_file, output_file) < 0)
524 return EXIT_FAILURE;
525
526 return EXIT_SUCCESS;
527 }
528
529 if ((header.firmware_type == 0) &&
530 (cw_header.datecode == DATECODE_NONE)) {
531 fprintf(stderr, "Firmware type must be non-zero for non-capwap images\n");
532 usage(progname, EXIT_FAILURE);
533 }
534
535 if (header.vendor_id == 0 || header.product_id == 0) {
536 fprintf(stderr, "Vendor ID and Product ID must be defined and non-zero\n");
537 usage(progname, EXIT_FAILURE);
538 }
539
540 /* Check capwap header specific arguments */
541 if (cw_header.datecode != DATECODE_NONE) {
542 if (!mod_name) {
543 fprintf(stderr, "Capwap header specified: model name must be specified\n");
544 usage(progname, EXIT_FAILURE);
545 }
546 if (!cw_header.firmware_ver[0] && !cw_header.firmware_ver[1] &&
547 !cw_header.firmware_ver[2]) {
548 fprintf(stderr, "Capwap header specified, fw_ver must be non-zero\n");
549 }
550 if (!cw_header.capwap_ver[0] && !cw_header.capwap_ver[1] &&
551 !cw_header.capwap_ver[2]) {
552 fprintf(stderr, "Capwap header specified, cw_ver must be non-zero\n");
553 }
554 pcw_header = malloc(sizeof(struct capwap_header) +
555 cw_header.model_size);
556 if (pcw_header) {
557 memcpy(pcw_header, &cw_header,
558 sizeof(struct capwap_header));
559 memcpy(&(pcw_header->model), mod_name,
560 cw_header.model_size);
561 } else {
562 fprintf(stderr, "Failed to allocate memory\n");
563 return EXIT_FAILURE;
564 }
565 }
566
567 if (encode_image(input_file, output_file, &header, pcw_header,
568 pad ? block_size : 0) < 0)
569 return EXIT_FAILURE;
570
571 return EXIT_SUCCESS;
572 }