]>
Commit | Line | Data |
---|---|---|
83d290c5 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
6bf4ca07 HS |
2 | /* |
3 | * (C) Copyright 2014 | |
4 | * DENX Software Engineering | |
5 | * Heiko Schocher <[email protected]> | |
6 | * | |
7 | * (C) Copyright 2008 Semihalf | |
8 | * | |
9 | * (C) Copyright 2000-2004 | |
10 | * DENX Software Engineering | |
11 | * Wolfgang Denk, [email protected] | |
12 | * | |
13 | * Updated-by: Prafulla Wadaskar <[email protected]> | |
14 | * FIT image specific code abstracted from mkimage.c | |
15 | * some functions added to address abstraction | |
16 | * | |
17 | * All rights reserved. | |
6bf4ca07 HS |
18 | */ |
19 | ||
20 | #include "imagetool.h" | |
21 | #include "mkimage.h" | |
22 | #include "fit_common.h" | |
23 | #include <image.h> | |
24 | #include <u-boot/crc.h> | |
25 | ||
26 | int fit_verify_header(unsigned char *ptr, int image_size, | |
27 | struct image_tool_params *params) | |
28 | { | |
6f08eee6 SE |
29 | int ret; |
30 | ||
31 | if (fdt_check_header(ptr) != EXIT_SUCCESS) | |
d32aa3ca JH |
32 | return EXIT_FAILURE; |
33 | ||
6f08eee6 SE |
34 | ret = fit_check_format(ptr, IMAGE_SIZE_INVAL); |
35 | if (ret) { | |
36 | if (ret != -EADDRNOTAVAIL) | |
37 | return EXIT_FAILURE; | |
38 | fprintf(stderr, "Image contains unit addresses @, this will break signing\n"); | |
39 | } | |
40 | ||
d32aa3ca | 41 | return EXIT_SUCCESS; |
6bf4ca07 HS |
42 | } |
43 | ||
44 | int fit_check_image_types(uint8_t type) | |
45 | { | |
46 | if (type == IH_TYPE_FLATDT) | |
47 | return EXIT_SUCCESS; | |
48 | else | |
49 | return EXIT_FAILURE; | |
50 | } | |
51 | ||
a9468115 | 52 | int mmap_fdt(const char *cmdname, const char *fname, size_t size_inc, |
7d57485a LB |
53 | void **blobp, struct stat *sbuf, bool delete_on_error, |
54 | bool read_only) | |
6bf4ca07 HS |
55 | { |
56 | void *ptr; | |
57 | int fd; | |
58 | ||
59 | /* Load FIT blob into memory (we need to write hashes/signatures) */ | |
7d57485a | 60 | fd = open(fname, (read_only ? O_RDONLY : O_RDWR) | O_BINARY); |
6bf4ca07 HS |
61 | |
62 | if (fd < 0) { | |
63 | fprintf(stderr, "%s: Can't open %s: %s\n", | |
64 | cmdname, fname, strerror(errno)); | |
ef0af64b | 65 | goto err; |
6bf4ca07 HS |
66 | } |
67 | ||
68 | if (fstat(fd, sbuf) < 0) { | |
69 | fprintf(stderr, "%s: Can't stat %s: %s\n", | |
70 | cmdname, fname, strerror(errno)); | |
ef0af64b | 71 | goto err; |
6bf4ca07 HS |
72 | } |
73 | ||
a9468115 SG |
74 | if (size_inc) { |
75 | sbuf->st_size += size_inc; | |
76 | if (ftruncate(fd, sbuf->st_size)) { | |
77 | fprintf(stderr, "%s: Can't expand %s: %s\n", | |
78 | cmdname, fname, strerror(errno)); | |
79 | goto err; | |
80 | } | |
81 | } | |
82 | ||
6bf4ca07 | 83 | errno = 0; |
7d57485a LB |
84 | ptr = mmap(0, sbuf->st_size, |
85 | (read_only ? PROT_READ : PROT_READ | PROT_WRITE), MAP_SHARED, | |
86 | fd, 0); | |
6bf4ca07 HS |
87 | if ((ptr == MAP_FAILED) || (errno != 0)) { |
88 | fprintf(stderr, "%s: Can't read %s: %s\n", | |
89 | cmdname, fname, strerror(errno)); | |
ef0af64b | 90 | goto err; |
6bf4ca07 HS |
91 | } |
92 | ||
93 | /* check if ptr has a valid blob */ | |
94 | if (fdt_check_header(ptr)) { | |
95 | fprintf(stderr, "%s: Invalid FIT blob\n", cmdname); | |
ef0af64b | 96 | goto err; |
6bf4ca07 HS |
97 | } |
98 | ||
a9468115 SG |
99 | /* expand if needed */ |
100 | if (size_inc) { | |
101 | int ret; | |
102 | ||
103 | ret = fdt_open_into(ptr, ptr, sbuf->st_size); | |
104 | if (ret) { | |
105 | fprintf(stderr, "%s: Cannot expand FDT: %s\n", | |
106 | cmdname, fdt_strerror(ret)); | |
107 | goto err; | |
108 | } | |
109 | } | |
110 | ||
6bf4ca07 HS |
111 | *blobp = ptr; |
112 | return fd; | |
ef0af64b SG |
113 | |
114 | err: | |
115 | if (fd >= 0) | |
116 | close(fd); | |
117 | if (delete_on_error) | |
118 | unlink(fname); | |
119 | ||
120 | return -1; | |
6bf4ca07 | 121 | } |
e291a5c9 SG |
122 | |
123 | int copyfile(const char *src, const char *dst) | |
124 | { | |
125 | int fd_src = -1, fd_dst = -1; | |
126 | void *buf = NULL; | |
127 | ssize_t size; | |
128 | size_t count; | |
129 | int ret = -1; | |
130 | ||
131 | fd_src = open(src, O_RDONLY); | |
132 | if (fd_src < 0) { | |
133 | printf("Can't open file %s (%s)\n", src, strerror(errno)); | |
134 | goto out; | |
135 | } | |
136 | ||
7ae46c35 | 137 | fd_dst = open(dst, O_WRONLY | O_CREAT | O_TRUNC, 0666); |
e291a5c9 SG |
138 | if (fd_dst < 0) { |
139 | printf("Can't open file %s (%s)\n", dst, strerror(errno)); | |
140 | goto out; | |
141 | } | |
142 | ||
143 | buf = calloc(1, 512); | |
144 | if (!buf) { | |
145 | printf("Can't allocate buffer to copy file\n"); | |
146 | goto out; | |
147 | } | |
148 | ||
149 | while (1) { | |
150 | size = read(fd_src, buf, 512); | |
151 | if (size < 0) { | |
152 | printf("Can't read file %s\n", src); | |
153 | goto out; | |
154 | } | |
155 | if (!size) | |
156 | break; | |
157 | ||
158 | count = size; | |
159 | size = write(fd_dst, buf, count); | |
160 | if (size < 0) { | |
161 | printf("Can't write file %s\n", dst); | |
162 | goto out; | |
163 | } | |
164 | } | |
165 | ||
166 | ret = 0; | |
167 | ||
168 | out: | |
169 | if (fd_src >= 0) | |
170 | close(fd_src); | |
171 | if (fd_dst >= 0) | |
172 | close(fd_dst); | |
173 | if (buf) | |
174 | free(buf); | |
175 | ||
176 | return ret; | |
177 | } | |
2d2384bb SG |
178 | |
179 | void summary_show(struct image_summary *summary, const char *imagefile, | |
180 | const char *keydest) | |
181 | { | |
182 | if (summary->sig_offset) { | |
183 | printf("Signature written to '%s', node '%s'\n", imagefile, | |
184 | summary->sig_path); | |
185 | if (keydest) { | |
186 | printf("Public key written to '%s', node '%s'\n", | |
187 | keydest, summary->keydest_path); | |
188 | } | |
189 | } | |
190 | } |