summaryrefslogtreecommitdiff
path: root/tools/firmware-utils/src/mkhilinkfw.c
diff options
context:
space:
mode:
authorJohn Crispin <john@openwrt.org>2014-01-12 12:07:46 +0000
committerJohn Crispin <john@openwrt.org>2014-01-12 12:07:46 +0000
commit2b4a04089ffa854324a8bc16cfe208d5fc058c62 (patch)
tree0dee6dc96274a0ba664648159ed89f6134ea0a4d /tools/firmware-utils/src/mkhilinkfw.c
parent3a64ddd0a18efe3c8fbf65579dca58672bf04fb1 (diff)
downloadmtk-20170518-2b4a04089ffa854324a8bc16cfe208d5fc058c62.zip
mtk-20170518-2b4a04089ffa854324a8bc16cfe208d5fc058c62.tar.gz
mtk-20170518-2b4a04089ffa854324a8bc16cfe208d5fc058c62.tar.bz2
firmware-utils: add HLK-RM04 tool
Signed-off-by: John Crispin <blogic@openwrt.org> SVN-Revision: 39238
Diffstat (limited to 'tools/firmware-utils/src/mkhilinkfw.c')
-rw-r--r--tools/firmware-utils/src/mkhilinkfw.c320
1 files changed, 320 insertions, 0 deletions
diff --git a/tools/firmware-utils/src/mkhilinkfw.c b/tools/firmware-utils/src/mkhilinkfw.c
new file mode 100644
index 0000000..fe6a200
--- /dev/null
+++ b/tools/firmware-utils/src/mkhilinkfw.c
@@ -0,0 +1,320 @@
+/*
+ * Copyright (C) 2013 Jeff Kent <jeff@jkent.net>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ *
+ * This tool encrypts and decrypts uImage formatted firmware for Hilink
+ * HLK-RM04 wireless modules. It will also truncate a dump of mtd6 and make
+ * it an image suitable for flashing via the stock firmware upgrade page.
+ *
+ * Build instructions:
+ * gcc -lcrypto hlkcrypt.c -o hlkcrypt
+ */
+
+#include <errno.h>
+#include <fcntl.h>
+#include <getopt.h>
+#include <openssl/des.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/mman.h>
+#include <unistd.h>
+
+#define DES_KEY "H@L9K*(3"
+
+#ifndef min
+#define min(a,b) \
+ ({ __typeof__ (a) _a = (a); \
+ __typeof__ (b) _b = (b); \
+ _a < _b ? _a : _b; })
+#endif
+
+#define IH_MAGIC 0x27051956
+#define IH_NMLEN 32
+typedef struct image_header {
+ uint32_t ih_magic; /* Image Header Magic Number */
+ uint32_t ih_hcrc; /* Image Header CRC Checksum */
+ uint32_t ih_time; /* Image Creation Timestamp */
+ uint32_t ih_size; /* Image Data Size */
+ uint32_t ih_load; /* Data Load Address */
+ uint32_t ih_ep; /* Entry Point Address */
+ uint32_t ih_dcrc; /* Image Data CRC Checksum */
+ uint8_t ih_os; /* Operating System */
+ uint8_t ih_arch; /* CPU architecture */
+ uint8_t ih_type; /* Image Type */
+ uint8_t ih_comp; /* Compression Type */
+ uint8_t ih_name[IH_NMLEN]; /* Image Name */
+} image_header_t;
+
+static int temp_fd = -1;
+static DES_key_schedule schedule;
+
+static void show_usage(const char *arg0);
+static void exit_cleanup(void);
+static void copy_file(int src, int dst);
+static void encrypt(void *p, off_t len);
+static void decrypt(void *p, off_t len);
+
+
+int main(int argc, char **argv)
+{
+ int encrypt_opt = 0;
+ int decrypt_opt = 0;
+ int input_opt = 0;
+ int output_opt = 0;
+ char *input_filename = NULL;
+ char *output_filename = NULL;
+
+ int input_fd;
+ int output_fd;
+ off_t file_len;
+ char *p;
+ char buf[sizeof(image_header_t) + 3];
+ image_header_t *header;
+
+ while (1) {
+ static struct option long_options[] = {
+ {"encrypt", no_argument, 0, 'e'},
+ {"decrypt", no_argument, 0, 'd'},
+ {"input", required_argument, 0, 'i'},
+ {"output", required_argument, 0, 'o'},
+ {0, 0, 0, 0 }
+ };
+ int option_index = 0;
+ int c = getopt_long(argc, argv, "dei:o:",
+ long_options, &option_index);
+ if (c == -1)
+ break;
+
+ switch (c) {
+ case 'd':
+ decrypt_opt++;
+ if (decrypt_opt > 1) {
+ fprintf(stderr, "%s: decrypt may only be specified once\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+ break;
+
+ case 'e':
+ encrypt_opt++;
+ if (encrypt_opt > 1) {
+ fprintf(stderr, "%s: encrypt may only be specified once\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+ break;
+
+ case 'i':
+ input_opt++;
+ if (input_opt > 1) {
+ fprintf(stderr, "%s: only one input file may be specified\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+ if (strcmp("-", optarg) != 0) {
+ input_filename = optarg;
+ }
+ break;
+
+ case 'o':
+ output_opt++;
+ if (output_opt > 1) {
+ fprintf(stderr, "%s: only one output file may be specified\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+ if (strcmp("-", optarg) != 0) {
+ output_filename = optarg;
+ }
+ break;
+
+ case '?':
+ exit(-1);
+
+ default:
+ abort();
+ }
+ }
+
+ if (decrypt_opt && encrypt_opt) {
+ fprintf(stderr, "%s: decrypt and encrypt may not be used together\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+
+ if (!decrypt_opt && !encrypt_opt) {
+ fprintf(stderr, "%s: neither decrypt or encrypt were specified\n",
+ argv[0]);
+ show_usage(argv[0]);
+ }
+
+ temp_fd = fileno(tmpfile());
+ if (temp_fd < 0) {
+ fprintf(stderr, "Can't create temporary file\n");
+ exit(EXIT_FAILURE);
+ }
+
+ atexit(exit_cleanup);
+ DES_set_key_unchecked((const_DES_cblock *)DES_KEY, &schedule);
+
+ if (input_filename) {
+ input_fd = open(input_filename, O_RDONLY);
+ if (input_fd < 0) {
+ fprintf(stderr, "Can't open %s for reading: %s\n", input_filename,
+ strerror(errno));
+ exit(EXIT_FAILURE);
+ }
+ copy_file(input_fd, temp_fd);
+ close(input_fd);
+ }
+ else {
+ copy_file(STDIN_FILENO, temp_fd);
+ }
+
+ file_len = lseek(temp_fd, 0, SEEK_CUR);
+ if (file_len < 64) {
+ fprintf(stderr, "Not enough data\n");
+ exit(EXIT_FAILURE);
+ }
+
+ p = mmap(0, file_len, PROT_READ|PROT_WRITE, MAP_SHARED, temp_fd, 0);
+ if (p == MAP_FAILED) {
+ fprintf(stderr, "mmap failed: %s\n", strerror(errno));
+ exit(EXIT_FAILURE);
+ }
+
+ if (encrypt_opt) {
+ header = (image_header_t *)p;
+ off_t len = min(file_len,
+ ntohl(header->ih_size) + sizeof(image_header_t));
+ if (ntohl(header->ih_magic) != IH_MAGIC) {
+ fprintf(stderr, "Header magic incorrect: "
+ "expected 0x%08X, got 0x%08X\n",
+ IH_MAGIC, ntohl(header->ih_magic));
+ munmap(p, file_len);
+ exit(EXIT_FAILURE);
+ }
+ encrypt(p, len);
+ munmap(p, file_len);
+ if (len != file_len) {
+ if (ftruncate(temp_fd, len) < 0) {
+ fprintf(stderr, "ftruncate failed: %s\n", strerror(errno));
+ exit(EXIT_FAILURE);
+ }
+ }
+ }
+
+ if (decrypt_opt) {
+ off_t header_len = min(file_len, sizeof(image_header_t) + 3);
+ memcpy(buf, p, header_len);
+ decrypt(buf, header_len);
+ header = (image_header_t *)buf;
+ if (ntohl(header->ih_magic) != IH_MAGIC) {
+ fprintf(stderr, "Header magic incorrect: "
+ "expected 0x%08X, got 0x%08X\n",
+ IH_MAGIC, ntohl(header->ih_magic));
+ exit(EXIT_FAILURE);
+ }
+ decrypt(p, file_len);
+ munmap(p, file_len);
+ }
+
+ lseek(temp_fd, 0, SEEK_SET);
+ if (output_filename) {
+ output_fd = creat(output_filename, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH);
+ if (output_fd < 0) {
+ fprintf(stderr, "Can't open %s for writing: %s\n",
+ output_filename, strerror(errno));
+ exit(EXIT_FAILURE);
+ }
+ copy_file(temp_fd, output_fd);
+ close(output_fd);
+ }
+ else {
+ copy_file(temp_fd, STDOUT_FILENO);
+ }
+
+ exit(EXIT_SUCCESS);
+ return 0;
+}
+
+static void show_usage(const char *arg0)
+{
+ fprintf(stderr, "usage: %s -d|-e [-i FILE] [-o FILE]\n\n", arg0);
+ fprintf(stderr, "%-15s %s\n", "-d, --decrypt", "decrypt data");
+ fprintf(stderr, "%-15s %s\n", "-e, --encrypt", "encrypt data");
+ fprintf(stderr, "%-15s %s\n", "-i, --input", "intput file (defaults to stdin)");
+ fprintf(stderr, "%-15s %s\n", "-o, --output", "output file (defaults to stdout)");
+ exit(-1);
+}
+
+static void exit_cleanup(void)
+{
+ if (temp_fd >= 0) {
+ close(temp_fd);
+ }
+}
+
+static void copy_file(int src, int dst)
+{
+ char buf[4096];
+ ssize_t size;
+
+ while ((size = read(src, buf, 4096)) > 0) {
+ write(dst, buf, size);
+ }
+}
+
+static void encrypt(void *p, off_t len)
+{
+ DES_cblock *pblock;
+ int num_blocks;
+
+ num_blocks = len / 8;
+ pblock = (DES_cblock *) p;
+ while (num_blocks--) {
+ DES_ecb_encrypt(pblock, pblock, &schedule, DES_ENCRYPT);
+ pblock++;
+ }
+
+ num_blocks = (len - 3) / 8;
+ pblock = (DES_cblock *) (p + 3);
+ while (num_blocks--) {
+ DES_ecb_encrypt(pblock, pblock, &schedule, DES_ENCRYPT);
+ pblock++;
+ }
+}
+
+static void decrypt(void *p, off_t len)
+{
+ DES_cblock *pblock;
+ int num_blocks;
+
+ num_blocks = (len - 3) / 8;
+ pblock = (DES_cblock *) (p + 3);
+ while (num_blocks--) {
+ DES_ecb_encrypt(pblock, pblock, &schedule, DES_DECRYPT);
+ pblock++;
+ }
+
+ num_blocks = len / 8;
+ pblock = (DES_cblock *) p;
+ while (num_blocks--) {
+ DES_ecb_encrypt(pblock, pblock, &schedule, DES_DECRYPT);
+ pblock++;
+ }
+}