David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 1 | /// Interface wrappers to C API entering to the bootloader |
| 2 | |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 3 | use crate::area::AreaDesc; |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 4 | use simflash::SimMultiFlash; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 5 | use libc; |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 6 | use crate::api; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 7 | |
| 8 | /// Invoke the bootloader on this flash device. |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 9 | pub fn boot_go(multiflash: &mut SimMultiFlash, areadesc: &AreaDesc, |
Fabio Utzig | afb2bc9 | 2018-11-19 16:11:52 -0200 | [diff] [blame] | 10 | counter: Option<&mut i32>, catch_asserts: bool) -> (i32, u8) { |
David Brown | ee61c83 | 2017-11-06 11:13:25 -0700 | [diff] [blame] | 11 | unsafe { |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 12 | for (&dev_id, flash) in multiflash.iter_mut() { |
Fabio Utzig | afb2bc9 | 2018-11-19 16:11:52 -0200 | [diff] [blame] | 13 | api::set_flash(dev_id, flash); |
| 14 | } |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 15 | } |
| 16 | let mut sim_ctx = api::CSimContext { |
| 17 | flash_counter: match counter { |
David Brown | ee61c83 | 2017-11-06 11:13:25 -0700 | [diff] [blame] | 18 | None => 0, |
| 19 | Some(ref c) => **c as libc::c_int |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 20 | }, |
| 21 | jumped: 0, |
| 22 | c_asserts: 0, |
| 23 | c_catch_asserts: if catch_asserts { 1 } else { 0 }, |
| 24 | boot_jmpbuf: [0; 16], |
| 25 | }; |
| 26 | let result = unsafe { |
| 27 | raw::invoke_boot_go(&mut sim_ctx as *mut _, &areadesc.get_c() as *const _) as i32 |
| 28 | }; |
| 29 | let asserts = sim_ctx.c_asserts; |
| 30 | counter.map(|c| *c = sim_ctx.flash_counter); |
David Brown | ee61c83 | 2017-11-06 11:13:25 -0700 | [diff] [blame] | 31 | unsafe { |
David Brown | 7610157 | 2019-02-28 11:29:03 -0700 | [diff] [blame] | 32 | for (&dev_id, _) in multiflash { |
Fabio Utzig | afb2bc9 | 2018-11-19 16:11:52 -0200 | [diff] [blame] | 33 | api::clear_flash(dev_id); |
| 34 | } |
David Brown | ee61c83 | 2017-11-06 11:13:25 -0700 | [diff] [blame] | 35 | }; |
Fabio Utzig | 9b0ee90 | 2017-11-23 19:49:00 -0200 | [diff] [blame] | 36 | (result, asserts) |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 37 | } |
| 38 | |
David Brown | 541860c | 2017-11-06 11:25:42 -0700 | [diff] [blame] | 39 | pub fn boot_trailer_sz(align: u8) -> u32 { |
Christopher Collins | 2adef70 | 2019-05-22 14:37:31 -0700 | [diff] [blame] | 40 | unsafe { raw::boot_trailer_sz(align) } |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 41 | } |
| 42 | |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 43 | pub fn boot_magic_sz() -> usize { |
| 44 | unsafe { raw::BOOT_MAGIC_SZ as usize } |
| 45 | } |
| 46 | |
| 47 | pub fn boot_max_align() -> usize { |
David Brown | e0bb1f9 | 2019-10-01 15:57:01 -0600 | [diff] [blame^] | 48 | unsafe { raw::boot_max_align() as usize } |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 49 | } |
| 50 | |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 51 | pub fn rsa_oaep_encrypt(pubkey: &[u8], seckey: &[u8]) -> Result<[u8; 256], &'static str> { |
| 52 | unsafe { |
| 53 | let mut encbuf: [u8; 256] = [0; 256]; |
| 54 | if raw::rsa_oaep_encrypt_(pubkey.as_ptr(), pubkey.len() as u32, |
| 55 | seckey.as_ptr(), seckey.len() as u32, |
| 56 | encbuf.as_mut_ptr()) == 0 { |
| 57 | return Ok(encbuf); |
| 58 | } |
| 59 | return Err("Failed to encrypt buffer"); |
| 60 | } |
| 61 | } |
| 62 | |
| 63 | pub fn kw_encrypt(kek: &[u8], seckey: &[u8]) -> Result<[u8; 24], &'static str> { |
| 64 | unsafe { |
| 65 | let mut encbuf = [0u8; 24]; |
| 66 | if raw::kw_encrypt_(kek.as_ptr(), seckey.as_ptr(), encbuf.as_mut_ptr()) == 0 { |
| 67 | return Ok(encbuf); |
| 68 | } |
| 69 | return Err("Failed to encrypt buffer"); |
| 70 | } |
| 71 | } |
| 72 | |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 73 | mod raw { |
David Brown | 65de6d1 | 2019-01-02 11:38:38 -0700 | [diff] [blame] | 74 | use crate::area::CAreaDesc; |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 75 | use crate::api::CSimContext; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 76 | use libc; |
| 77 | |
| 78 | extern "C" { |
| 79 | // This generates a warning about `CAreaDesc` not being foreign safe. There doesn't appear to |
| 80 | // be any way to get rid of this warning. See https://github.com/rust-lang/rust/issues/34798 |
| 81 | // for information and tracking. |
Fabio Utzig | 8000e32 | 2019-08-05 08:14:32 -0300 | [diff] [blame] | 82 | pub fn invoke_boot_go(sim_ctx: *mut CSimContext, areadesc: *const CAreaDesc) -> libc::c_int; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 83 | |
Christopher Collins | 2adef70 | 2019-05-22 14:37:31 -0700 | [diff] [blame] | 84 | pub fn boot_trailer_sz(min_write_sz: u8) -> u32; |
Fabio Utzig | a0bc9b5 | 2017-06-28 09:19:55 -0300 | [diff] [blame] | 85 | |
| 86 | pub static BOOT_MAGIC_SZ: u32; |
David Brown | e0bb1f9 | 2019-10-01 15:57:01 -0600 | [diff] [blame^] | 87 | pub fn boot_max_align() -> u32; |
Fabio Utzig | 92be3fb | 2017-12-05 08:52:53 -0200 | [diff] [blame] | 88 | |
Fabio Utzig | 1e48b91 | 2018-09-18 09:04:18 -0300 | [diff] [blame] | 89 | pub fn rsa_oaep_encrypt_(pubkey: *const u8, pubkey_len: libc::c_uint, |
| 90 | seckey: *const u8, seckey_len: libc::c_uint, |
| 91 | encbuf: *mut u8) -> libc::c_int; |
| 92 | |
| 93 | pub fn kw_encrypt_(kek: *const u8, seckey: *const u8, |
| 94 | encbuf: *mut u8) -> libc::c_int; |
David Brown | de7729e | 2017-01-09 10:41:35 -0700 | [diff] [blame] | 95 | } |
| 96 | } |