blob: 1df7a2f6476b8648e79d56c0545f4ae1ec00a09f [file] [log] [blame]
Christopher Collins92ea77f2016-12-12 15:59:26 -08001/*
2 * Licensed to the Apache Software Foundation (ASF) under one
3 * or more contributor license agreements. See the NOTICE file
4 * distributed with this work for additional information
5 * regarding copyright ownership. The ASF licenses this file
6 * to you under the Apache License, Version 2.0 (the
7 * "License"); you may not use this file except in compliance
8 * with the License. You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing,
13 * software distributed under the License is distributed on an
14 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15 * KIND, either express or implied. See the License for the
16 * specific language governing permissions and limitations
17 * under the License.
18 */
19#include <assert.h>
20#include <stddef.h>
21#include <inttypes.h>
22#include <ctype.h>
23#include <stdio.h>
Almir Okato90be6e62022-09-23 14:52:25 -030024#include <errno.h>
Piotr Dymacz6a8746d2023-06-26 17:13:48 +020025#include <limits.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080026
27#include "sysflash/sysflash.h"
28
Fabio Utzig1a2e41a2017-11-17 12:13:09 -020029#include "bootutil/bootutil_log.h"
30
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020031#ifdef __ZEPHYR__
Fabio Baltieri888e2612022-07-19 20:54:26 +000032#include <zephyr/sys/reboot.h>
33#include <zephyr/sys/byteorder.h>
34#include <zephyr/sys/__assert.h>
35#include <zephyr/drivers/flash.h>
Gerard Marull-Paretas4eca54f2022-10-06 11:45:11 +020036#include <zephyr/kernel.h>
Fabio Baltieri888e2612022-07-19 20:54:26 +000037#include <zephyr/sys/crc.h>
38#include <zephyr/sys/base64.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030039#include <hal/hal_flash.h>
40#elif __ESPRESSIF__
41#include <bootloader_utility.h>
42#include <esp_rom_sys.h>
Almir Okato7d3622f2022-10-20 12:44:58 -030043#include <esp_crc.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030044#include <endian.h>
45#include <mbedtls/base64.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020046#else
Christopher Collins92ea77f2016-12-12 15:59:26 -080047#include <bsp/bsp.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080048#include <hal/hal_system.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030049#include <hal/hal_flash.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080050#include <os/endian.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080051#include <os/os_cputime.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020052#include <crc/crc16.h>
53#include <base64/base64.h>
Andrzej Puzdrowski386b5922018-04-06 19:26:24 +020054#endif /* __ZEPHYR__ */
55
Jamie McCraecb07e882023-04-14 09:28:24 +010056#include <zcbor_decode.h>
57#include <zcbor_encode.h>
58#include "zcbor_bulk.h"
59
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +020060#include <flash_map_backend/flash_map_backend.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020061#include <os/os.h>
62#include <os/os_malloc.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080063
64#include <bootutil/image.h>
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +020065#include <bootutil/bootutil.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080066
67#include "boot_serial/boot_serial.h"
68#include "boot_serial_priv.h"
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030069#include "mcuboot_config/mcuboot_config.h"
Christopher Collins92ea77f2016-12-12 15:59:26 -080070
Dominik Ermel3d4e55d2021-07-09 11:14:10 +000071#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +020072#include "bootutil_priv.h"
73#endif
74
Wouter Cappelle953a7612021-05-03 16:53:05 +020075#ifdef MCUBOOT_ENC_IMAGES
76#include "single_loader.h"
77#endif
78
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +020079#include "bootutil/boot_hooks.h"
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +010080
Carlos Falgueras Garcíaa4b4b0f2021-06-22 10:00:22 +020081BOOT_LOG_MODULE_DECLARE(mcuboot);
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +010082
Jamie McCraecb07e882023-04-14 09:28:24 +010083#ifndef ARRAY_SIZE
84#define ARRAY_SIZE ZCBOR_ARRAY_SIZE
85#endif
86
Jamie McCraead1fb3d2022-12-01 14:24:37 +000087#ifndef MCUBOOT_SERIAL_MAX_RECEIVE_SIZE
88#define MCUBOOT_SERIAL_MAX_RECEIVE_SIZE 512
89#endif
90
Jamie McCraefac2cab2023-03-30 10:07:36 +010091#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
92#define BOOT_SERIAL_IMAGE_STATE_SIZE_MAX 48
93#else
94#define BOOT_SERIAL_IMAGE_STATE_SIZE_MAX 0
95#endif
96#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
97#define BOOT_SERIAL_HASH_SIZE_MAX 36
98#else
99#define BOOT_SERIAL_HASH_SIZE_MAX 0
100#endif
101
102#define BOOT_SERIAL_OUT_MAX ((128 + BOOT_SERIAL_IMAGE_STATE_SIZE_MAX + \
103 BOOT_SERIAL_HASH_SIZE_MAX) * BOOT_IMAGE_NUMBER)
104
Piotr Dymaczf5e77532022-10-30 17:43:45 +0100105#define BOOT_SERIAL_FRAME_MTU 124 /* 127 - pkt start (2 bytes) and stop (1 byte) */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800106
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200107#ifdef __ZEPHYR__
Carles Cufi0165be82018-03-26 17:43:51 +0200108/* base64 lib encodes data to null-terminated string */
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200109#define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
110
111#define CRC16_INITIAL_CRC 0 /* what to seed crc16 with */
112#define CRC_CITT_POLYMINAL 0x1021
113
114#define ntohs(x) sys_be16_to_cpu(x)
115#define htons(x) sys_cpu_to_be16(x)
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300116#elif __ESPRESSIF__
117#define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
118#define CRC16_INITIAL_CRC 0 /* what to seed crc16 with */
119
120#define ntohs(x) be16toh(x)
121#define htons(x) htobe16(x)
122
123#define base64_decode mbedtls_base64_decode
124#define base64_encode mbedtls_base64_encode
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200125#endif
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +0100126
Fabio Utzig6f49c272019-08-23 11:42:58 -0300127#if (BOOT_IMAGE_NUMBER > 1)
128#define IMAGES_ITER(x) for ((x) = 0; (x) < BOOT_IMAGE_NUMBER; ++(x))
129#else
130#define IMAGES_ITER(x)
131#endif
132
Jamie McCraead1fb3d2022-12-01 14:24:37 +0000133static char in_buf[MCUBOOT_SERIAL_MAX_RECEIVE_SIZE + 1];
134static char dec_buf[MCUBOOT_SERIAL_MAX_RECEIVE_SIZE + 1];
Marko Kiiskila8b1ce3a2018-06-14 13:20:46 -0700135const struct boot_uart_funcs *boot_uf;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800136static struct nmgr_hdr *bs_hdr;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100137static bool bs_entry;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800138
139static char bs_obuf[BOOT_SERIAL_OUT_MAX];
140
Christopher Collins92ea77f2016-12-12 15:59:26 -0800141static void boot_serial_output(void);
142
Jamie McCrae827118f2023-03-10 13:24:57 +0000143#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
144static int boot_serial_get_hash(const struct image_header *hdr,
145 const struct flash_area *fap, uint8_t *hash);
146#endif
147
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100148static zcbor_state_t cbor_state[2];
Christopher Collins92ea77f2016-12-12 15:59:26 -0800149
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000150void reset_cbor_state(void)
151{
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100152 zcbor_new_encode_state(cbor_state, 2, (uint8_t *)bs_obuf,
Daniel DeGrassec393b542023-05-23 21:52:09 +0000153 sizeof(bs_obuf), 0);
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000154}
155
Dominik Ermel3d51e432021-06-25 17:29:50 +0000156/**
Dominik Ermelbd69c3d2021-07-28 11:27:31 +0000157 * Function that processes MGMT_GROUP_ID_PERUSER mcumgr group and may be
158 * used to process any groups that have not been processed by generic boot
159 * serial implementation.
Dominik Ermel3d51e432021-06-25 17:29:50 +0000160 *
161 * @param[in] hdr -- the decoded header of mcumgr message;
162 * @param[in] buffer -- buffer with first mcumgr message;
163 * @param[in] len -- length of of data in buffer;
164 * @param[out] *cs -- object with encoded response.
165 *
166 * @return 0 on success; non-0 error code otherwise.
167 */
168extern int bs_peruser_system_specific(const struct nmgr_hdr *hdr,
169 const char *buffer,
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100170 int len, zcbor_state_t *cs);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800171
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000172#define zcbor_tstr_put_lit_cast(state, string) \
Jamie McCrae393af792023-04-14 11:31:16 +0100173 zcbor_tstr_encode_ptr(state, (char *)string, sizeof(string) - 1)
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000174
175#ifndef MCUBOOT_USE_SNPRINTF
Christopher Collins92ea77f2016-12-12 15:59:26 -0800176/*
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300177 * Convert version into string without use of snprintf().
Christopher Collins92ea77f2016-12-12 15:59:26 -0800178 */
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300179static int
180u32toa(char *tgt, uint32_t val)
Christopher Collins92ea77f2016-12-12 15:59:26 -0800181{
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300182 char *dst;
183 uint32_t d = 1;
184 uint32_t dgt;
185 int n = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800186
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300187 dst = tgt;
188 while (val / d >= 10) {
189 d *= 10;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800190 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300191 while (d) {
192 dgt = val / d;
193 val %= d;
194 d /= 10;
195 if (n || dgt > 0 || d == 0) {
196 *dst++ = dgt + '0';
197 ++n;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800198 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800199 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300200 *dst = '\0';
201
202 return dst - tgt;
203}
204
205/*
206 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
207 */
208static void
209bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
210{
211 int off;
212
213 off = u32toa(dst, ver->iv_major);
214 dst[off++] = '.';
215 off += u32toa(dst + off, ver->iv_minor);
216 dst[off++] = '.';
217 off += u32toa(dst + off, ver->iv_revision);
Jamie McCraee5c57dd2023-03-21 14:45:21 +0000218
219 if (ver->iv_build_num != 0) {
220 dst[off++] = '.';
221 off += u32toa(dst + off, ver->iv_build_num);
222 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800223}
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000224#else
225/*
226 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
227 */
228static void
229bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
230{
Jamie McCraee5c57dd2023-03-21 14:45:21 +0000231 int len;
232
233 len = snprintf(dst, maxlen, "%hu.%hu.%hu", (uint16_t)ver->iv_major,
234 (uint16_t)ver->iv_minor, ver->iv_revision);
235
236 if (ver->iv_build_num != 0 && len > 0 && len < maxlen) {
237 snprintf(&dst[len], (maxlen - len), "%u", ver->iv_build_num);
238 }
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000239}
240#endif /* !MCUBOOT_USE_SNPRINTF */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800241
242/*
243 * List images.
244 */
245static void
246bs_list(char *buf, int len)
247{
Christopher Collins92ea77f2016-12-12 15:59:26 -0800248 struct image_header hdr;
Øyvind Rønningstad9f4aefd2021-03-08 21:11:25 +0100249 uint32_t slot, area_id;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800250 const struct flash_area *fap;
Fabio Utzig6f49c272019-08-23 11:42:58 -0300251 uint8_t image_index;
Jamie McCrae827118f2023-03-10 13:24:57 +0000252#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
253 uint8_t hash[32];
254#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800255
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100256 zcbor_map_start_encode(cbor_state, 1);
257 zcbor_tstr_put_lit_cast(cbor_state, "images");
258 zcbor_list_start_encode(cbor_state, 5);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300259 image_index = 0;
260 IMAGES_ITER(image_index) {
Jamie McCraefac2cab2023-03-30 10:07:36 +0100261#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
262 int swap_status = boot_swap_type_multi(image_index);
263#endif
264
Fabio Utzig6f49c272019-08-23 11:42:58 -0300265 for (slot = 0; slot < 2; slot++) {
Jamie McCrae82feb9a2023-06-26 09:35:05 +0100266 FIH_DECLARE(fih_rc, FIH_FAILURE);
Jamie McCraefac2cab2023-03-30 10:07:36 +0100267 uint8_t tmpbuf[64];
268
269#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
270 bool active = false;
271 bool confirmed = false;
272 bool pending = false;
273 bool permanent = false;
274#endif
275
Fabio Utzig6f49c272019-08-23 11:42:58 -0300276 area_id = flash_area_id_from_multi_image_slot(image_index, slot);
277 if (flash_area_open(area_id, &fap)) {
278 continue;
279 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800280
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200281 int rc = BOOT_HOOK_CALL(boot_read_image_header_hook,
282 BOOT_HOOK_REGULAR, image_index, slot, &hdr);
283 if (rc == BOOT_HOOK_REGULAR)
284 {
285 flash_area_read(fap, 0, &hdr, sizeof(hdr));
286 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800287
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200288 if (hdr.ih_magic == IMAGE_MAGIC)
289 {
290 BOOT_HOOK_CALL_FIH(boot_image_check_hook,
Michael Grand5047f032022-11-24 16:49:56 +0100291 FIH_BOOT_HOOK_REGULAR,
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200292 fih_rc, image_index, slot);
Michael Grand5047f032022-11-24 16:49:56 +0100293 if (FIH_EQ(fih_rc, FIH_BOOT_HOOK_REGULAR))
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200294 {
Wouter Cappelle953a7612021-05-03 16:53:05 +0200295#ifdef MCUBOOT_ENC_IMAGES
296 if (slot == 0 && IS_ENCRYPTED(&hdr)) {
297 /* Clear the encrypted flag we didn't supply a key
298 * This flag could be set if there was a decryption in place
299 * performed before. We will try to validate the image without
300 * decryption by clearing the flag in the heder. If
301 * still encrypted the validation will fail.
302 */
303 hdr.ih_flags &= ~(ENCRYPTIONFLAGS);
304 }
305#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200306 FIH_CALL(bootutil_img_validate, fih_rc, NULL, 0, &hdr, fap, tmpbuf, sizeof(tmpbuf),
307 NULL, 0, NULL);
308 }
Jamie McCrae82feb9a2023-06-26 09:35:05 +0100309 }
Jamie McCraefac2cab2023-03-30 10:07:36 +0100310
Jamie McCrae82feb9a2023-06-26 09:35:05 +0100311 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
312 flash_area_close(fap);
313 continue;
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200314 }
315
Jamie McCrae827118f2023-03-10 13:24:57 +0000316#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
317 /* Retrieve SHA256 hash of image for identification */
318 rc = boot_serial_get_hash(&hdr, fap, hash);
319#endif
320
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200321 flash_area_close(fap);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100322 zcbor_map_start_encode(cbor_state, 20);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300323
324#if (BOOT_IMAGE_NUMBER > 1)
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100325 zcbor_tstr_put_lit_cast(cbor_state, "image");
326 zcbor_uint32_put(cbor_state, image_index);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300327#endif
328
Jamie McCraefac2cab2023-03-30 10:07:36 +0100329#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
330 if (swap_status == BOOT_SWAP_TYPE_NONE) {
331 if (slot == BOOT_PRIMARY_SLOT) {
332 confirmed = true;
333 active = true;
334 }
335 } else if (swap_status == BOOT_SWAP_TYPE_TEST) {
336 if (slot == BOOT_PRIMARY_SLOT) {
337 confirmed = true;
338 } else {
339 pending = true;
340 }
341 } else if (swap_status == BOOT_SWAP_TYPE_PERM) {
342 if (slot == BOOT_PRIMARY_SLOT) {
343 confirmed = true;
344 } else {
345 pending = true;
346 permanent = true;
347 }
348 } else if (swap_status == BOOT_SWAP_TYPE_REVERT) {
349 if (slot == BOOT_PRIMARY_SLOT) {
350 active = true;
351 } else {
352 confirmed = true;
353 }
354 }
355
356 if (!(hdr.ih_flags & IMAGE_F_NON_BOOTABLE)) {
357 zcbor_tstr_put_lit_cast(cbor_state, "bootable");
Jamie McCrae82feb9a2023-06-26 09:35:05 +0100358 zcbor_bool_put(cbor_state, true);
Jamie McCraefac2cab2023-03-30 10:07:36 +0100359 }
360
361 if (confirmed) {
362 zcbor_tstr_put_lit_cast(cbor_state, "confirmed");
363 zcbor_bool_put(cbor_state, true);
364 }
365
366 if (active) {
367 zcbor_tstr_put_lit_cast(cbor_state, "active");
368 zcbor_bool_put(cbor_state, true);
369 }
370
371 if (pending) {
372 zcbor_tstr_put_lit_cast(cbor_state, "pending");
373 zcbor_bool_put(cbor_state, true);
374 }
375
376 if (permanent) {
377 zcbor_tstr_put_lit_cast(cbor_state, "permanent");
378 zcbor_bool_put(cbor_state, true);
379 }
380#endif
381
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100382 zcbor_tstr_put_lit_cast(cbor_state, "slot");
383 zcbor_uint32_put(cbor_state, slot);
Jamie McCrae827118f2023-03-10 13:24:57 +0000384
385#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
386 if (rc == 0) {
387 zcbor_tstr_put_lit_cast(cbor_state, "hash");
388 zcbor_bstr_encode_ptr(cbor_state, hash, sizeof(hash));
389 }
390#endif
391
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100392 zcbor_tstr_put_lit_cast(cbor_state, "version");
Fabio Utzig6f49c272019-08-23 11:42:58 -0300393
394 bs_list_img_ver((char *)tmpbuf, sizeof(tmpbuf), &hdr.ih_ver);
Jamie McCrae827118f2023-03-10 13:24:57 +0000395
Jamie McCrae393af792023-04-14 11:31:16 +0100396 zcbor_tstr_encode_ptr(cbor_state, (char *)tmpbuf, strlen((char *)tmpbuf));
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100397 zcbor_map_end_encode(cbor_state, 20);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800398 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800399 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100400 zcbor_list_end_encode(cbor_state, 5);
401 zcbor_map_end_encode(cbor_state, 1);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800402 boot_serial_output();
403}
404
Jamie McCraefac2cab2023-03-30 10:07:36 +0100405#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
406/*
407 * Set image state.
408 */
409static void
410bs_set(char *buf, int len)
411{
412 /*
413 * Expected data format.
414 * {
415 * "confirm":<true for confirm, false for test>
416 * "hash":<hash of image (OPTIONAL for single image only)>
417 * }
418 */
419 uint8_t image_index = 0;
420 size_t decoded = 0;
421 uint8_t hash[32];
422 bool confirm;
423 struct zcbor_string img_hash;
424 bool ok;
425 int rc;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000426
Jamie McCraefac2cab2023-03-30 10:07:36 +0100427#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
428 bool found = false;
429#endif
430
431 zcbor_state_t zsd[4];
432 zcbor_new_state(zsd, sizeof(zsd) / sizeof(zcbor_state_t), (uint8_t *)buf, len, 1);
433
434 struct zcbor_map_decode_key_val image_set_state_decode[] = {
435 ZCBOR_MAP_DECODE_KEY_DECODER("confirm", zcbor_uint32_decode, &confirm),
436#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
437 ZCBOR_MAP_DECODE_KEY_DECODER("hash", zcbor_bstr_decode, &img_hash),
438#endif
439 };
440
441 ok = zcbor_map_decode_bulk(zsd, image_set_state_decode, ARRAY_SIZE(image_set_state_decode),
442 &decoded) == 0;
443
Piotr Dymaczf2cb5502023-06-28 12:09:19 +0200444 if (!ok) {
Jamie McCraefac2cab2023-03-30 10:07:36 +0100445 rc = MGMT_ERR_EINVAL;
446 goto out;
447 }
448
449#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
450 if ((img_hash.len != sizeof(hash) && img_hash.len != 0) ||
451 (img_hash.len == 0 && BOOT_IMAGE_NUMBER > 1)) {
452 /* Hash is required and was not provided or is invalid size */
453 rc = MGMT_ERR_EINVAL;
454 goto out;
455 }
456
457 if (img_hash.len != 0) {
458 for (image_index = 0; image_index < BOOT_IMAGE_NUMBER; ++image_index) {
459 struct image_header hdr;
460 uint32_t area_id;
461 const struct flash_area *fap;
462 uint8_t tmpbuf[64];
463
464 area_id = flash_area_id_from_multi_image_slot(image_index, 1);
465 if (flash_area_open(area_id, &fap)) {
466 BOOT_LOG_ERR("Failed to open flash area ID %d", area_id);
467 continue;
468 }
469
470 rc = BOOT_HOOK_CALL(boot_read_image_header_hook,
471 BOOT_HOOK_REGULAR, image_index, 1, &hdr);
472 if (rc == BOOT_HOOK_REGULAR)
473 {
474 flash_area_read(fap, 0, &hdr, sizeof(hdr));
475 }
476
477 if (hdr.ih_magic == IMAGE_MAGIC)
478 {
479 FIH_DECLARE(fih_rc, FIH_FAILURE);
480
481 BOOT_HOOK_CALL_FIH(boot_image_check_hook,
482 FIH_BOOT_HOOK_REGULAR,
483 fih_rc, image_index, 1);
484 if (FIH_EQ(fih_rc, FIH_BOOT_HOOK_REGULAR))
485 {
486 FIH_CALL(bootutil_img_validate, fih_rc, NULL, 0, &hdr, fap,
487 tmpbuf, sizeof(tmpbuf), NULL, 0, NULL);
488 }
489
490 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
491 continue;
492 }
493 }
494
495 /* Retrieve SHA256 hash of image for identification */
496 rc = boot_serial_get_hash(&hdr, fap, hash);
497 flash_area_close(fap);
498
499 if (rc == 0 && memcmp(hash, img_hash.value, sizeof(hash)) == 0) {
500 /* Hash matches, set this slot for test or confirmation */
501 found = true;
502 break;
503 }
504 }
505
506 if (!found) {
507 /* Image was not found with specified hash */
508 BOOT_LOG_ERR("Did not find image with specified hash");
509 rc = MGMT_ERR_ENOENT;
510 goto out;
511 }
512 }
513#endif
514
515 rc = boot_set_pending_multi(image_index, confirm);
516
517out:
518 if (rc == 0) {
519 /* Success - return updated list of images */
520 bs_list(buf, len);
521 } else {
522 /* Error code, only return the error */
523 zcbor_map_start_encode(cbor_state, 10);
524 zcbor_tstr_put_lit_cast(cbor_state, "rc");
525 zcbor_int32_put(cbor_state, rc);
526 zcbor_map_end_encode(cbor_state, 10);
527
528 boot_serial_output();
529 }
530}
531#endif
532
533/*
534 * Send rc code only.
535 */
536static void
537bs_rc_rsp(int rc_code)
538{
539 zcbor_map_start_encode(cbor_state, 10);
540 zcbor_tstr_put_lit_cast(cbor_state, "rc");
541 zcbor_int32_put(cbor_state, rc_code);
542 zcbor_map_end_encode(cbor_state, 10);
543 boot_serial_output();
544}
545
546static void
547bs_list_set(uint8_t op, char *buf, int len)
548{
549 if (op == NMGR_OP_READ) {
550 bs_list(buf, len);
551 } else {
552#ifdef MCUBOOT_SERIAL_IMG_GRP_IMAGE_STATE
553 bs_set(buf, len);
554#else
555 bs_rc_rsp(MGMT_ERR_ENOTSUP);
556#endif
557 }
558}
559
560#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000561/** Erases range of flash, aligned to sector size
562 *
563 * Function will erase all sectors withing [start, end] range; it does not check
564 * the @p start for alignment, and it will use @p end to find boundaries of las
565 * sector to erase. Function returns offset of the first byte past the last
566 * erased sector, so basically offset of next sector to be erased if needed.
567 * The function is intended to be called iteratively with previously returned
568 * offset as @p start.
569 *
570 * @param start starting offset, aligned to sector offset;
571 * @param end ending offset, maybe anywhere within sector;
572 *
573 * @retval On success: offset of the first byte past last erased sector;
574 * On failure: -EINVAL.
575 */
576static off_t erase_range(const struct flash_area *fap, off_t start, off_t end)
577{
578 struct flash_sector sect;
579 size_t size;
580 int rc;
581
582 if (end >= flash_area_get_size(fap)) {
583 return -EINVAL;
584 }
585
586 if (end < start) {
587 return start;
588 }
589
Dominik Ermel24769882023-01-05 13:36:35 +0000590 if (flash_area_get_sector(fap, end, &sect)) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000591 return -EINVAL;
592 }
593
594 size = flash_sector_get_off(&sect) + flash_sector_get_size(&sect) - start;
Stephanos Ioannidis09e2bd72022-07-11 22:01:49 +0900595 BOOT_LOG_INF("Erasing range 0x%jx:0x%jx", (intmax_t)start,
596 (intmax_t)(start + size - 1));
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000597
598 rc = flash_area_erase(fap, start, size);
599 if (rc != 0) {
600 BOOT_LOG_ERR("Error %d while erasing range", rc);
601 return -EINVAL;
602 }
603
604 return start + size;
605}
606#endif
607
Christopher Collins92ea77f2016-12-12 15:59:26 -0800608/*
609 * Image upload request.
610 */
611static void
612bs_upload(char *buf, int len)
613{
Dominik Ermel5bd87442022-06-13 15:14:01 +0000614 static size_t img_size; /* Total image size, held for duration of upload */
615 static uint32_t curr_off; /* Expected current offset */
616 const uint8_t *img_chunk = NULL; /* Pointer to buffer with received image chunk */
617 size_t img_chunk_len = 0; /* Length of received image chunk */
618 size_t img_chunk_off = SIZE_MAX; /* Offset of image chunk within image */
619 uint8_t rem_bytes; /* Reminder bytes after aligning chunk write to
620 * to flash alignment */
Piotr Dymacz6a8746d2023-06-26 17:13:48 +0200621 uint32_t img_num_tmp = UINT_MAX; /* Temp variable for image number */
622 static uint32_t img_num = 0;
Dominik Ermel5bd87442022-06-13 15:14:01 +0000623 size_t img_size_tmp = SIZE_MAX; /* Temp variable for image size */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800624 const struct flash_area *fap = NULL;
625 int rc;
Jamie McCraecb07e882023-04-14 09:28:24 +0100626 struct zcbor_string img_chunk_data;
627 size_t decoded = 0;
628 bool ok;
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000629#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000630 static off_t not_yet_erased = 0; /* Offset of next byte to erase; writes to flash
631 * are done in consecutive manner and erases are done
632 * to allow currently received chunk to be written;
633 * this state variable holds information where last
634 * erase has stopped to let us know whether erase
635 * is needed to be able to write current chunk.
636 */
637 static struct flash_sector status_sector;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200638#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800639
Jamie McCraecb07e882023-04-14 09:28:24 +0100640 zcbor_state_t zsd[4];
641 zcbor_new_state(zsd, sizeof(zsd) / sizeof(zcbor_state_t), (uint8_t *)buf, len, 1);
642
643 struct zcbor_map_decode_key_val image_upload_decode[] = {
Piotr Dymacz6a8746d2023-06-26 17:13:48 +0200644 ZCBOR_MAP_DECODE_KEY_DECODER("image", zcbor_uint32_decode, &img_num_tmp),
Jamie McCraecb07e882023-04-14 09:28:24 +0100645 ZCBOR_MAP_DECODE_KEY_DECODER("data", zcbor_bstr_decode, &img_chunk_data),
646 ZCBOR_MAP_DECODE_KEY_DECODER("len", zcbor_size_decode, &img_size_tmp),
647 ZCBOR_MAP_DECODE_KEY_DECODER("off", zcbor_size_decode, &img_chunk_off),
648 };
649
650 ok = zcbor_map_decode_bulk(zsd, image_upload_decode, ARRAY_SIZE(image_upload_decode),
651 &decoded) == 0;
652
653 if (!ok) {
654 goto out_invalid_data;
655 }
656
657 img_chunk = img_chunk_data.value;
658 img_chunk_len = img_chunk_data.len;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300659
660 /*
661 * Expected data format.
662 * {
Fabio Utzig6f49c272019-08-23 11:42:58 -0300663 * "image":<image number in a multi-image set (OPTIONAL)>
664 * "data":<image data>
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300665 * "len":<image len>
666 * "off":<current offset of image data>
667 * }
668 */
669
Dominik Ermel5bd87442022-06-13 15:14:01 +0000670 if (img_chunk_off == SIZE_MAX || img_chunk == NULL) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300671 /*
672 * Offset must be set in every block.
673 */
674 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800675 }
676
Piotr Dymacz6a8746d2023-06-26 17:13:48 +0200677 /* Use image number only from packet with offset == 0. */
678 if (img_chunk_off == 0) {
679 if (img_num_tmp != UINT_MAX) {
680 img_num = img_num_tmp;
681 } else {
682 img_num = 0;
683 }
684 }
685
Dominik Ermel48decca2021-07-09 10:23:58 +0000686#if !defined(MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD)
Fabio Utzig6f49c272019-08-23 11:42:58 -0300687 rc = flash_area_open(flash_area_id_from_multi_image_slot(img_num, 0), &fap);
Dominik Ermel48decca2021-07-09 10:23:58 +0000688#else
689 rc = flash_area_open(flash_area_id_from_direct_image(img_num), &fap);
690#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800691 if (rc) {
692 rc = MGMT_ERR_EINVAL;
693 goto out;
694 }
695
Dominik Ermel5bd87442022-06-13 15:14:01 +0000696 if (img_chunk_off == 0) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000697 /* Receiving chunk with 0 offset resets the upload state; this basically
698 * means that upload has started from beginning.
699 */
700 const size_t area_size = flash_area_get_size(fap);
Dominik Ermel5bd87442022-06-13 15:14:01 +0000701
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000702 curr_off = 0;
703#ifdef MCUBOOT_ERASE_PROGRESSIVELY
704 /* Get trailer sector information; this is done early because inability to get
705 * that sector information means that upload will not work anyway.
706 * TODO: This is single occurrence issue, it should get detected during tests
707 * and fixed otherwise you are deploying broken mcuboot.
708 */
Dominik Ermel24769882023-01-05 13:36:35 +0000709 if (flash_area_get_sector(fap, boot_status_off(fap), &status_sector)) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000710 rc = MGMT_ERR_EUNKNOWN;
711 BOOT_LOG_ERR("Unable to determine flash sector of the image trailer");
712 goto out;
713 }
714#endif
715
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200716#if defined(MCUBOOT_VALIDATE_PRIMARY_SLOT_ONCE)
717 /* We are using swap state at end of flash area to store validation
718 * result. Make sure the user cannot write it from an image to skip validation.
719 */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000720 if (img_size_tmp > (area_size - BOOT_MAGIC_SZ)) {
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200721 goto out_invalid_data;
722 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000723#else
724 if (img_size_tmp > area_size) {
725 goto out_invalid_data;
726 }
727
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200728#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000729
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000730#ifndef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000731 /* Non-progressive erase erases entire image slot when first chunk of
732 * an image is received.
733 */
734 rc = flash_area_erase(fap, 0, area_size);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800735 if (rc) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300736 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800737 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000738#else
739 not_yet_erased = 0;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200740#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000741
Dominik Ermel5bd87442022-06-13 15:14:01 +0000742 img_size = img_size_tmp;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000743 } else if (img_chunk_off != curr_off) {
744 /* If received chunk offset does not match expected one jump, pretend
745 * success and jump to out; out will respond to client with success
746 * and request the expected offset, held by curr_off.
747 */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800748 rc = 0;
749 goto out;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000750 } else if (curr_off + img_chunk_len > img_size) {
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200751 rc = MGMT_ERR_EINVAL;
752 goto out;
753 }
754
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000755#ifdef MCUBOOT_ERASE_PROGRESSIVELY
756 /* Progressive erase will erase enough flash, aligned to sector size,
757 * as needed for the current chunk to be written.
758 */
759 not_yet_erased = erase_range(fap, not_yet_erased,
760 curr_off + img_chunk_len - 1);
761
762 if (not_yet_erased < 0) {
763 rc = MGMT_ERR_EINVAL;
764 goto out;
765 }
766#endif
767
768 /* Writes are aligned to flash write alignment, so may drop a few bytes
769 * from the end of the buffer; we will request these bytes again with
770 * new buffer by responding with request for offset after the last aligned
771 * write.
772 */
Dominik Ermel5bd87442022-06-13 15:14:01 +0000773 rem_bytes = img_chunk_len % flash_area_align(fap);
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000774 img_chunk_len -= rem_bytes;
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200775
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000776 if (curr_off + img_chunk_len + rem_bytes < img_size) {
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200777 rem_bytes = 0;
Fabio Utzig30f6b2a2018-03-29 16:18:53 -0300778 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200779
Dominik Ermel5bd87442022-06-13 15:14:01 +0000780 BOOT_LOG_INF("Writing at 0x%x until 0x%x", curr_off, curr_off + img_chunk_len);
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000781 /* Write flash aligned chunk, note that img_chunk_len now holds aligned length */
Jamie McCrae9d3fd7f2022-11-30 15:44:44 +0000782#if defined(MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE) && MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE > 0
783 if (flash_area_align(fap) > 1 &&
784 (((size_t)img_chunk) & (flash_area_align(fap) - 1)) != 0) {
785 /* Buffer address incompatible with write address, use buffer to write */
786 uint8_t write_size = MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE;
787 uint8_t wbs_aligned[MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE];
788
789 while (img_chunk_len >= flash_area_align(fap)) {
790 if (write_size > img_chunk_len) {
791 write_size = img_chunk_len;
792 }
793
794 memset(wbs_aligned, flash_area_erased_val(fap), sizeof(wbs_aligned));
795 memcpy(wbs_aligned, img_chunk, write_size);
796
797 rc = flash_area_write(fap, curr_off, wbs_aligned, write_size);
798
799 if (rc != 0) {
800 goto out;
801 }
802
803 curr_off += write_size;
804 img_chunk += write_size;
805 img_chunk_len -= write_size;
806 }
807 } else {
808 rc = flash_area_write(fap, curr_off, img_chunk, img_chunk_len);
809 }
810#else
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000811 rc = flash_area_write(fap, curr_off, img_chunk, img_chunk_len);
Jamie McCrae9d3fd7f2022-11-30 15:44:44 +0000812#endif
813
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000814 if (rc == 0 && rem_bytes) {
815 /* Non-zero rem_bytes means that last chunk needs alignment; the aligned
816 * part, in the img_chunk_len - rem_bytes count bytes, has already been
817 * written by the above write, so we are left with the rem_bytes.
818 */
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200819 uint8_t wbs_aligned[BOOT_MAX_ALIGN];
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200820
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000821 memset(wbs_aligned, flash_area_erased_val(fap), sizeof(wbs_aligned));
822 memcpy(wbs_aligned, img_chunk + img_chunk_len, rem_bytes);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200823
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000824 rc = flash_area_write(fap, curr_off + img_chunk_len, wbs_aligned,
825 flash_area_align(fap));
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200826 }
827
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300828 if (rc == 0) {
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000829 curr_off += img_chunk_len + rem_bytes;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200830 if (curr_off == img_size) {
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200831#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200832 /* Assure that sector for image trailer was erased. */
833 /* Check whether it was erased during previous upload. */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000834 off_t start = flash_sector_get_off(&status_sector);
835
836 if (erase_range(fap, start, start) < 0) {
837 rc = MGMT_ERR_EUNKNOWN;
838 goto out;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200839 }
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200840#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200841 rc = BOOT_HOOK_CALL(boot_serial_uploaded_hook, 0, img_num, fap,
842 img_size);
843 if (rc) {
844 BOOT_LOG_ERR("Error %d post upload hook", rc);
845 goto out;
846 }
847 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300848 } else {
849 out_invalid_data:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800850 rc = MGMT_ERR_EINVAL;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800851 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200852
Christopher Collins92ea77f2016-12-12 15:59:26 -0800853out:
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200854 BOOT_LOG_INF("RX: 0x%x", rc);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100855 zcbor_map_start_encode(cbor_state, 10);
856 zcbor_tstr_put_lit_cast(cbor_state, "rc");
Jamie McCrae0b6d3432022-12-02 09:24:10 +0000857 zcbor_int32_put(cbor_state, rc);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800858 if (rc == 0) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100859 zcbor_tstr_put_lit_cast(cbor_state, "off");
860 zcbor_uint32_put(cbor_state, curr_off);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800861 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100862 zcbor_map_end_encode(cbor_state, 10);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800863
864 boot_serial_output();
865 flash_area_close(fap);
Wouter Cappelle953a7612021-05-03 16:53:05 +0200866
867#ifdef MCUBOOT_ENC_IMAGES
868 if (curr_off == img_size) {
869 /* Last sector received, now start a decryption on the image if it is encrypted*/
870 rc = boot_handle_enc_fw();
871 }
872#endif //#ifdef MCUBOOT_ENC_IMAGES
Christopher Collins92ea77f2016-12-12 15:59:26 -0800873}
874
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200875#ifdef MCUBOOT_BOOT_MGMT_ECHO
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200876static void
877bs_echo(char *buf, int len)
878{
Jamie McCraecb07e882023-04-14 09:28:24 +0100879 struct zcbor_string value = { 0 };
880 struct zcbor_string key;
881 bool ok;
Dominik Ermel88bd5672022-06-07 15:17:06 +0000882 uint32_t rc = MGMT_ERR_EINVAL;
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200883
Jamie McCraecb07e882023-04-14 09:28:24 +0100884 zcbor_state_t zsd[4];
885 zcbor_new_state(zsd, sizeof(zsd) / sizeof(zcbor_state_t), (uint8_t *)buf, len, 1);
886
887 if (!zcbor_map_start_decode(zsd)) {
Dominik Ermel88bd5672022-06-07 15:17:06 +0000888 goto out;
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200889 }
Dominik Ermel88bd5672022-06-07 15:17:06 +0000890
Jamie McCraecb07e882023-04-14 09:28:24 +0100891 do {
892 ok = zcbor_tstr_decode(zsd, &key);
893
894 if (ok) {
895 if (key.len == 1 && *key.value == 'd') {
896 ok = zcbor_tstr_decode(zsd, &value);
897 break;
898 }
899
900 ok = zcbor_any_skip(zsd, NULL);
901 }
902 } while (ok);
903
904 if (!ok || !zcbor_map_end_decode(zsd)) {
Dominik Ermel88bd5672022-06-07 15:17:06 +0000905 goto out;
906 }
907
908 zcbor_map_start_encode(cbor_state, 10);
909 zcbor_tstr_put_term(cbor_state, "r");
Jamie McCraecb07e882023-04-14 09:28:24 +0100910 if (zcbor_tstr_encode(cbor_state, &value) && zcbor_map_end_encode(cbor_state, 10)) {
Dominik Ermel88bd5672022-06-07 15:17:06 +0000911 boot_serial_output();
912 return;
913 } else {
914 rc = MGMT_ERR_ENOMEM;
915 }
916
917out:
918 reset_cbor_state();
919 bs_rc_rsp(rc);
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200920}
921#endif
922
Christopher Collins92ea77f2016-12-12 15:59:26 -0800923/*
Christopher Collins92ea77f2016-12-12 15:59:26 -0800924 * Reset, and (presumably) boot to newly uploaded image. Flush console
925 * before restarting.
926 */
Andrzej Puzdrowski268cdd02018-04-10 12:57:54 +0200927static void
Christopher Collins92ea77f2016-12-12 15:59:26 -0800928bs_reset(char *buf, int len)
929{
Dominik Ermelb26fc482022-12-09 17:10:20 +0000930 int rc = BOOT_HOOK_CALL(boot_reset_request_hook, 0, false);
931 if (rc == BOOT_RESET_REQUEST_HOOK_BUSY) {
932 rc = MGMT_ERR_EBUSY;
933 } else {
934 /* Currently whatever else is returned it is just converted
935 * to 0/no error. Boot serial starts accepting "force" parameter
936 * in command this needs to change.
937 */
938 rc = 0;
939 }
940 bs_rc_rsp(rc);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800941
Dominik Ermelb26fc482022-12-09 17:10:20 +0000942 if (rc == 0) {
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200943#ifdef __ZEPHYR__
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200944#ifdef CONFIG_MULTITHREADING
Dominik Ermelb26fc482022-12-09 17:10:20 +0000945 k_sleep(K_MSEC(250));
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200946#else
Dominik Ermelb26fc482022-12-09 17:10:20 +0000947 k_busy_wait(250000);
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200948#endif
Dominik Ermelb26fc482022-12-09 17:10:20 +0000949 sys_reboot(SYS_REBOOT_COLD);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300950#elif __ESPRESSIF__
Dominik Ermelb26fc482022-12-09 17:10:20 +0000951 esp_rom_delay_us(250000);
952 bootloader_reset();
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200953#else
Dominik Ermelb26fc482022-12-09 17:10:20 +0000954 os_cputime_delay_usecs(250000);
955 hal_system_reset();
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200956#endif
Dominik Ermelb26fc482022-12-09 17:10:20 +0000957 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800958}
959
960/*
961 * Parse incoming line of input from console.
962 * Expect newtmgr protocol with serial transport.
963 */
964void
965boot_serial_input(char *buf, int len)
966{
967 struct nmgr_hdr *hdr;
968
969 hdr = (struct nmgr_hdr *)buf;
970 if (len < sizeof(*hdr) ||
971 (hdr->nh_op != NMGR_OP_READ && hdr->nh_op != NMGR_OP_WRITE) ||
972 (ntohs(hdr->nh_len) < len - sizeof(*hdr))) {
973 return;
974 }
975 bs_hdr = hdr;
976 hdr->nh_group = ntohs(hdr->nh_group);
977
978 buf += sizeof(*hdr);
979 len -= sizeof(*hdr);
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300980
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000981 reset_cbor_state();
Christopher Collins92ea77f2016-12-12 15:59:26 -0800982
983 /*
984 * Limited support for commands.
985 */
986 if (hdr->nh_group == MGMT_GROUP_ID_IMAGE) {
987 switch (hdr->nh_id) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300988 case IMGMGR_NMGR_ID_STATE:
Jamie McCraefac2cab2023-03-30 10:07:36 +0100989 bs_list_set(hdr->nh_op, buf, len);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800990 break;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300991 case IMGMGR_NMGR_ID_UPLOAD:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800992 bs_upload(buf, len);
993 break;
994 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000995 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800996 break;
997 }
998 } else if (hdr->nh_group == MGMT_GROUP_ID_DEFAULT) {
999 switch (hdr->nh_id) {
Wouter Cappellee3ff1752021-05-03 16:36:22 +02001000 case NMGR_ID_ECHO:
1001#ifdef MCUBOOT_BOOT_MGMT_ECHO
1002 bs_echo(buf, len);
1003#endif
1004 break;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001005 case NMGR_ID_CONS_ECHO_CTRL:
Dominik Ermelc9dc2242021-07-28 17:08:23 +00001006 bs_rc_rsp(0);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001007 break;
1008 case NMGR_ID_RESET:
1009 bs_reset(buf, len);
1010 break;
1011 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +00001012 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001013 break;
1014 }
Dominik Ermelbd69c3d2021-07-28 11:27:31 +00001015 } else if (MCUBOOT_PERUSER_MGMT_GROUP_ENABLED == 1) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +01001016 if (bs_peruser_system_specific(hdr, buf, len, cbor_state) == 0) {
Dominik Ermel3d51e432021-06-25 17:29:50 +00001017 boot_serial_output();
1018 }
Dominik Ermelc9dc2242021-07-28 17:08:23 +00001019 } else {
1020 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001021 }
Wouter Cappellee3822f82022-01-19 15:39:43 +01001022#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
1023 bs_entry = true;
1024#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -08001025}
1026
1027static void
1028boot_serial_output(void)
1029{
1030 char *data;
Piotr Dymaczf5e77532022-10-30 17:43:45 +01001031 int len, out;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001032 uint16_t crc;
1033 uint16_t totlen;
Piotr Dymaczf5e77532022-10-30 17:43:45 +01001034 char pkt_cont[2] = { SHELL_NLIP_DATA_START1, SHELL_NLIP_DATA_START2 };
Christopher Collins92ea77f2016-12-12 15:59:26 -08001035 char pkt_start[2] = { SHELL_NLIP_PKT_START1, SHELL_NLIP_PKT_START2 };
Dominik Ermel5ff89582022-03-03 17:09:07 +00001036 char buf[BOOT_SERIAL_OUT_MAX + sizeof(*bs_hdr) + sizeof(crc) + sizeof(totlen)];
1037 char encoded_buf[BASE64_ENCODE_SIZE(sizeof(buf))];
Christopher Collins92ea77f2016-12-12 15:59:26 -08001038
1039 data = bs_obuf;
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +01001040 len = (uint32_t)cbor_state->payload_mut - (uint32_t)bs_obuf;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001041
1042 bs_hdr->nh_op++;
Marko Kiiskilace50ab02018-06-06 11:33:33 +03001043 bs_hdr->nh_flags = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001044 bs_hdr->nh_len = htons(len);
1045 bs_hdr->nh_group = htons(bs_hdr->nh_group);
1046
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001047#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +01001048 crc = crc16_itu_t(CRC16_INITIAL_CRC, (uint8_t *)bs_hdr, sizeof(*bs_hdr));
1049 crc = crc16_itu_t(crc, data, len);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -03001050#elif __ESPRESSIF__
1051 /* For ESP32 it was used the CRC API in rom/crc.h */
Almir Okato7d3622f2022-10-20 12:44:58 -03001052 crc = ~esp_crc16_be(~CRC16_INITIAL_CRC, (uint8_t *)bs_hdr, sizeof(*bs_hdr));
1053 crc = ~esp_crc16_be(~crc, (uint8_t *)data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001054#else
Christopher Collins92ea77f2016-12-12 15:59:26 -08001055 crc = crc16_ccitt(CRC16_INITIAL_CRC, bs_hdr, sizeof(*bs_hdr));
1056 crc = crc16_ccitt(crc, data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001057#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -08001058 crc = htons(crc);
1059
Christopher Collins92ea77f2016-12-12 15:59:26 -08001060 totlen = len + sizeof(*bs_hdr) + sizeof(crc);
1061 totlen = htons(totlen);
1062
1063 memcpy(buf, &totlen, sizeof(totlen));
1064 totlen = sizeof(totlen);
1065 memcpy(&buf[totlen], bs_hdr, sizeof(*bs_hdr));
1066 totlen += sizeof(*bs_hdr);
1067 memcpy(&buf[totlen], data, len);
1068 totlen += len;
1069 memcpy(&buf[totlen], &crc, sizeof(crc));
1070 totlen += sizeof(crc);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001071#ifdef __ZEPHYR__
1072 size_t enc_len;
Carles Cufi0165be82018-03-26 17:43:51 +02001073 base64_encode(encoded_buf, sizeof(encoded_buf), &enc_len, buf, totlen);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001074 totlen = enc_len;
Almir Okatoe8cbc0d2022-06-13 10:45:39 -03001075#elif __ESPRESSIF__
1076 size_t enc_len;
1077 base64_encode((unsigned char *)encoded_buf, sizeof(encoded_buf), &enc_len, (unsigned char *)buf, totlen);
1078 totlen = enc_len;
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001079#else
Christopher Collins92ea77f2016-12-12 15:59:26 -08001080 totlen = base64_encode(buf, totlen, encoded_buf, 1);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001081#endif
Piotr Dymaczf5e77532022-10-30 17:43:45 +01001082
1083 out = 0;
1084 while (out < totlen) {
1085 if (out == 0) {
1086 boot_uf->write(pkt_start, sizeof(pkt_start));
1087 } else {
1088 boot_uf->write(pkt_cont, sizeof(pkt_cont));
1089 }
1090
1091 len = MIN(BOOT_SERIAL_FRAME_MTU, totlen - out);
1092 boot_uf->write(&encoded_buf[out], len);
1093
1094 out += len;
1095
1096 boot_uf->write("\n", 1);
1097 }
1098
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001099 BOOT_LOG_INF("TX");
Christopher Collins92ea77f2016-12-12 15:59:26 -08001100}
1101
1102/*
1103 * Returns 1 if full packet has been received.
1104 */
1105static int
1106boot_serial_in_dec(char *in, int inlen, char *out, int *out_off, int maxout)
1107{
1108 int rc;
1109 uint16_t crc;
1110 uint16_t len;
Marko Kiiskilae5aeee42018-12-21 15:00:16 +02001111
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001112#ifdef __ZEPHYR__
1113 int err;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001114 err = base64_decode( &out[*out_off], maxout - *out_off, &rc, in, inlen - 2);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001115 if (err) {
1116 return -1;
1117 }
Almir Okatoe8cbc0d2022-06-13 10:45:39 -03001118#elif __ESPRESSIF__
1119 int err;
1120 err = base64_decode((unsigned char *)&out[*out_off], maxout - *out_off, (size_t *)&rc, (unsigned char *)in, inlen);
1121 if (err) {
1122 return -1;
1123 }
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001124#else
Christopher Collins92ea77f2016-12-12 15:59:26 -08001125 if (*out_off + base64_decode_len(in) >= maxout) {
1126 return -1;
1127 }
1128 rc = base64_decode(in, &out[*out_off]);
1129 if (rc < 0) {
1130 return -1;
1131 }
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +02001132#endif
Fabio Utzig6f49c272019-08-23 11:42:58 -03001133
Christopher Collins92ea77f2016-12-12 15:59:26 -08001134 *out_off += rc;
Fabio Utzig6f49c272019-08-23 11:42:58 -03001135 if (*out_off <= sizeof(uint16_t)) {
1136 return 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001137 }
Fabio Utzig6f49c272019-08-23 11:42:58 -03001138
1139 len = ntohs(*(uint16_t *)out);
1140 if (len != *out_off - sizeof(uint16_t)) {
1141 return 0;
1142 }
1143
1144 if (len > *out_off - sizeof(uint16_t)) {
1145 len = *out_off - sizeof(uint16_t);
1146 }
1147
1148 out += sizeof(uint16_t);
1149#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +01001150 crc = crc16_itu_t(CRC16_INITIAL_CRC, out, len);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -03001151#elif __ESPRESSIF__
Almir Okato7d3622f2022-10-20 12:44:58 -03001152 crc = ~esp_crc16_be(~CRC16_INITIAL_CRC, (uint8_t *)out, len);
Fabio Utzig6f49c272019-08-23 11:42:58 -03001153#else
1154 crc = crc16_ccitt(CRC16_INITIAL_CRC, out, len);
1155#endif
1156 if (crc || len <= sizeof(crc)) {
1157 return 0;
1158 }
1159 *out_off -= sizeof(crc);
1160 out[*out_off] = '\0';
1161
1162 return 1;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001163}
1164
1165/*
1166 * Task which waits reading console, expecting to get image over
1167 * serial port.
1168 */
Wouter Cappellee3822f82022-01-19 15:39:43 +01001169static void
1170boot_serial_read_console(const struct boot_uart_funcs *f,int timeout_in_ms)
Christopher Collins92ea77f2016-12-12 15:59:26 -08001171{
1172 int rc;
1173 int off;
David Brown57f0df32020-05-12 08:39:21 -06001174 int dec_off = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001175 int full_line;
Marko Kiiskila149b4572018-06-06 14:18:54 +03001176 int max_input;
Wouter Cappellee3822f82022-01-19 15:39:43 +01001177 int elapsed_in_ms = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001178
Marko Kiiskila149b4572018-06-06 14:18:54 +03001179 boot_uf = f;
Marko Kiiskila149b4572018-06-06 14:18:54 +03001180 max_input = sizeof(in_buf);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001181
1182 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +01001183 while (timeout_in_ms > 0 || bs_entry) {
Piotr Dymacz067f30a2022-08-12 18:25:34 +02001184 /*
1185 * Don't enter CPU idle state here if timeout based serial recovery is
1186 * used as otherwise the boot process hangs forever, waiting for input
1187 * from serial console (if single-thread mode is used).
1188 */
Piotr Dymacz3942e9b2022-07-18 10:19:25 +02001189#ifndef MCUBOOT_SERIAL_WAIT_FOR_DFU
Andrzej Puzdrowskiaea38eb2021-06-11 12:28:59 +02001190 MCUBOOT_CPU_IDLE();
Piotr Dymacz3942e9b2022-07-18 10:19:25 +02001191#endif
Hein Wessels56d28f02021-11-19 08:42:08 +01001192 MCUBOOT_WATCHDOG_FEED();
Wouter Cappellee3822f82022-01-19 15:39:43 +01001193#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
1194 uint32_t start = k_uptime_get_32();
1195#endif
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001196 rc = f->read(in_buf + off, sizeof(in_buf) - off, &full_line);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001197 if (rc <= 0 && !full_line) {
Wouter Cappellee3822f82022-01-19 15:39:43 +01001198 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001199 }
1200 off += rc;
1201 if (!full_line) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +03001202 if (off == max_input) {
1203 /*
1204 * Full line, no newline yet. Reset the input buffer.
1205 */
1206 off = 0;
1207 }
Wouter Cappellee3822f82022-01-19 15:39:43 +01001208 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001209 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001210 if (in_buf[0] == SHELL_NLIP_PKT_START1 &&
1211 in_buf[1] == SHELL_NLIP_PKT_START2) {
Christopher Collins92ea77f2016-12-12 15:59:26 -08001212 dec_off = 0;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001213 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
1214 } else if (in_buf[0] == SHELL_NLIP_DATA_START1 &&
1215 in_buf[1] == SHELL_NLIP_DATA_START2) {
1216 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001217 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001218
1219 /* serve errors: out of decode memory, or bad encoding */
Christopher Collins92ea77f2016-12-12 15:59:26 -08001220 if (rc == 1) {
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +02001221 boot_serial_input(&dec_buf[2], dec_off - 2);
Christopher Collins92ea77f2016-12-12 15:59:26 -08001222 }
1223 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +01001224check_timeout:
1225 /* Subtract elapsed time */
1226#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
1227 elapsed_in_ms = (k_uptime_get_32() - start);
1228#endif
1229 timeout_in_ms -= elapsed_in_ms;
Christopher Collins92ea77f2016-12-12 15:59:26 -08001230 }
1231}
Wouter Cappellee3822f82022-01-19 15:39:43 +01001232
1233/*
1234 * Task which waits reading console, expecting to get image over
1235 * serial port.
1236 */
1237void
1238boot_serial_start(const struct boot_uart_funcs *f)
1239{
1240 bs_entry = true;
1241 boot_serial_read_console(f,0);
1242}
1243
1244#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
1245/*
1246 * Task which waits reading console for a certain amount of timeout.
1247 * If within this timeout no mcumgr command is received, the function is
1248 * returning, else the serial boot is never exited
1249 */
1250void
1251boot_serial_check_start(const struct boot_uart_funcs *f, int timeout_in_ms)
1252{
1253 bs_entry = false;
1254 boot_serial_read_console(f,timeout_in_ms);
1255}
1256#endif
Jamie McCrae827118f2023-03-10 13:24:57 +00001257
1258#ifdef MCUBOOT_SERIAL_IMG_GRP_HASH
1259/* Function to find the hash of an image, returns 0 on success. */
1260static int boot_serial_get_hash(const struct image_header *hdr,
1261 const struct flash_area *fap, uint8_t *hash)
1262{
1263 struct image_tlv_iter it;
1264 uint32_t offset;
1265 uint16_t len;
1266 uint16_t type;
1267 int rc;
1268
1269 /* Manifest data is concatenated to the end of the image.
1270 * It is encoded in TLV format.
1271 */
1272 rc = bootutil_tlv_iter_begin(&it, hdr, fap, IMAGE_TLV_ANY, false);
1273 if (rc) {
1274 return -1;
1275 }
1276
1277 /* Traverse through the TLV area to find the image hash TLV. */
1278 while (true) {
1279 rc = bootutil_tlv_iter_next(&it, &offset, &len, &type);
1280 if (rc < 0) {
1281 return -1;
1282 } else if (rc > 0) {
1283 break;
1284 }
1285
1286 if (type == IMAGE_TLV_SHA256) {
1287 /* Get the image's hash value from the manifest section. */
1288 if (len != 32) {
1289 return -1;
1290 }
1291
1292 rc = flash_area_read(fap, offset, hash, len);
1293 if (rc) {
1294 return -1;
1295 }
1296
1297 return 0;
1298 }
1299 }
1300
1301 return -1;
1302}
1303#endif