blob: c9a9a376efa3a3e3735fab39238cff1ff1ef0b01 [file] [log] [blame]
Christopher Collins92ea77f2016-12-12 15:59:26 -08001/*
2 * Licensed to the Apache Software Foundation (ASF) under one
3 * or more contributor license agreements. See the NOTICE file
4 * distributed with this work for additional information
5 * regarding copyright ownership. The ASF licenses this file
6 * to you under the Apache License, Version 2.0 (the
7 * "License"); you may not use this file except in compliance
8 * with the License. You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing,
13 * software distributed under the License is distributed on an
14 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15 * KIND, either express or implied. See the License for the
16 * specific language governing permissions and limitations
17 * under the License.
18 */
19#include <assert.h>
20#include <stddef.h>
21#include <inttypes.h>
22#include <ctype.h>
23#include <stdio.h>
Almir Okato90be6e62022-09-23 14:52:25 -030024#include <errno.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080025
26#include "sysflash/sysflash.h"
27
Fabio Utzig1a2e41a2017-11-17 12:13:09 -020028#include "bootutil/bootutil_log.h"
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +010029#include "zcbor_encode.h"
Fabio Utzig1a2e41a2017-11-17 12:13:09 -020030
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020031#ifdef __ZEPHYR__
Fabio Baltieri888e2612022-07-19 20:54:26 +000032#include <zephyr/sys/reboot.h>
33#include <zephyr/sys/byteorder.h>
34#include <zephyr/sys/__assert.h>
35#include <zephyr/drivers/flash.h>
Gerard Marull-Paretas4eca54f2022-10-06 11:45:11 +020036#include <zephyr/kernel.h>
Fabio Baltieri888e2612022-07-19 20:54:26 +000037#include <zephyr/sys/crc.h>
38#include <zephyr/sys/base64.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030039#include <hal/hal_flash.h>
40#elif __ESPRESSIF__
41#include <bootloader_utility.h>
42#include <esp_rom_sys.h>
Almir Okato7d3622f2022-10-20 12:44:58 -030043#include <esp_crc.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030044#include <endian.h>
45#include <mbedtls/base64.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020046#else
Christopher Collins92ea77f2016-12-12 15:59:26 -080047#include <bsp/bsp.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080048#include <hal/hal_system.h>
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030049#include <hal/hal_flash.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080050#include <os/endian.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080051#include <os/os_cputime.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020052#include <crc/crc16.h>
53#include <base64/base64.h>
Andrzej Puzdrowski386b5922018-04-06 19:26:24 +020054#endif /* __ZEPHYR__ */
55
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +020056#include <flash_map_backend/flash_map_backend.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020057#include <os/os.h>
58#include <os/os_malloc.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080059
60#include <bootutil/image.h>
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +020061#include <bootutil/bootutil.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080062
63#include "boot_serial/boot_serial.h"
64#include "boot_serial_priv.h"
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030065#include "mcuboot_config/mcuboot_config.h"
Christopher Collins92ea77f2016-12-12 15:59:26 -080066
Dominik Ermel3d4e55d2021-07-09 11:14:10 +000067#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +020068#include "bootutil_priv.h"
69#endif
70
Wouter Cappelle953a7612021-05-03 16:53:05 +020071#ifdef MCUBOOT_ENC_IMAGES
72#include "single_loader.h"
73#endif
74
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +010075#include "serial_recovery_cbor.h"
Dominik Ermel88bd5672022-06-07 15:17:06 +000076#include "serial_recovery_echo.h"
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +020077#include "bootutil/boot_hooks.h"
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +010078
Carlos Falgueras Garcíaa4b4b0f2021-06-22 10:00:22 +020079BOOT_LOG_MODULE_DECLARE(mcuboot);
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +010080
Jamie McCraead1fb3d2022-12-01 14:24:37 +000081#ifndef MCUBOOT_SERIAL_MAX_RECEIVE_SIZE
82#define MCUBOOT_SERIAL_MAX_RECEIVE_SIZE 512
83#endif
84
Andrzej Puzdrowskic9ac5cc2021-11-19 11:58:05 +010085#define BOOT_SERIAL_OUT_MAX (128 * BOOT_IMAGE_NUMBER)
Piotr Dymaczf5e77532022-10-30 17:43:45 +010086#define BOOT_SERIAL_FRAME_MTU 124 /* 127 - pkt start (2 bytes) and stop (1 byte) */
Christopher Collins92ea77f2016-12-12 15:59:26 -080087
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020088#ifdef __ZEPHYR__
Carles Cufi0165be82018-03-26 17:43:51 +020089/* base64 lib encodes data to null-terminated string */
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020090#define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
91
92#define CRC16_INITIAL_CRC 0 /* what to seed crc16 with */
93#define CRC_CITT_POLYMINAL 0x1021
94
95#define ntohs(x) sys_be16_to_cpu(x)
96#define htons(x) sys_cpu_to_be16(x)
Almir Okatoe8cbc0d2022-06-13 10:45:39 -030097#elif __ESPRESSIF__
98#define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
99#define CRC16_INITIAL_CRC 0 /* what to seed crc16 with */
100
101#define ntohs(x) be16toh(x)
102#define htons(x) htobe16(x)
103
104#define base64_decode mbedtls_base64_decode
105#define base64_encode mbedtls_base64_encode
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200106#endif
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +0100107
Fabio Utzig6f49c272019-08-23 11:42:58 -0300108#if (BOOT_IMAGE_NUMBER > 1)
109#define IMAGES_ITER(x) for ((x) = 0; (x) < BOOT_IMAGE_NUMBER; ++(x))
110#else
111#define IMAGES_ITER(x)
112#endif
113
Jamie McCraead1fb3d2022-12-01 14:24:37 +0000114static char in_buf[MCUBOOT_SERIAL_MAX_RECEIVE_SIZE + 1];
115static char dec_buf[MCUBOOT_SERIAL_MAX_RECEIVE_SIZE + 1];
Marko Kiiskila8b1ce3a2018-06-14 13:20:46 -0700116const struct boot_uart_funcs *boot_uf;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800117static struct nmgr_hdr *bs_hdr;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100118static bool bs_entry;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800119
120static char bs_obuf[BOOT_SERIAL_OUT_MAX];
121
Christopher Collins92ea77f2016-12-12 15:59:26 -0800122static void boot_serial_output(void);
123
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100124static zcbor_state_t cbor_state[2];
Christopher Collins92ea77f2016-12-12 15:59:26 -0800125
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000126void reset_cbor_state(void)
127{
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100128 zcbor_new_encode_state(cbor_state, 2, (uint8_t *)bs_obuf,
129 (size_t)bs_obuf + sizeof(bs_obuf), 0);
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000130}
131
Dominik Ermel3d51e432021-06-25 17:29:50 +0000132/**
Dominik Ermelbd69c3d2021-07-28 11:27:31 +0000133 * Function that processes MGMT_GROUP_ID_PERUSER mcumgr group and may be
134 * used to process any groups that have not been processed by generic boot
135 * serial implementation.
Dominik Ermel3d51e432021-06-25 17:29:50 +0000136 *
137 * @param[in] hdr -- the decoded header of mcumgr message;
138 * @param[in] buffer -- buffer with first mcumgr message;
139 * @param[in] len -- length of of data in buffer;
140 * @param[out] *cs -- object with encoded response.
141 *
142 * @return 0 on success; non-0 error code otherwise.
143 */
144extern int bs_peruser_system_specific(const struct nmgr_hdr *hdr,
145 const char *buffer,
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100146 int len, zcbor_state_t *cs);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800147
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000148#define zcbor_tstr_put_lit_cast(state, string) \
149 zcbor_tstr_encode_ptr(state, (uint8_t *)string, sizeof(string) - 1)
150
151#ifndef MCUBOOT_USE_SNPRINTF
Christopher Collins92ea77f2016-12-12 15:59:26 -0800152/*
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300153 * Convert version into string without use of snprintf().
Christopher Collins92ea77f2016-12-12 15:59:26 -0800154 */
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300155static int
156u32toa(char *tgt, uint32_t val)
Christopher Collins92ea77f2016-12-12 15:59:26 -0800157{
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300158 char *dst;
159 uint32_t d = 1;
160 uint32_t dgt;
161 int n = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800162
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300163 dst = tgt;
164 while (val / d >= 10) {
165 d *= 10;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800166 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300167 while (d) {
168 dgt = val / d;
169 val %= d;
170 d /= 10;
171 if (n || dgt > 0 || d == 0) {
172 *dst++ = dgt + '0';
173 ++n;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800174 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800175 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300176 *dst = '\0';
177
178 return dst - tgt;
179}
180
181/*
182 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
183 */
184static void
185bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
186{
187 int off;
188
189 off = u32toa(dst, ver->iv_major);
190 dst[off++] = '.';
191 off += u32toa(dst + off, ver->iv_minor);
192 dst[off++] = '.';
193 off += u32toa(dst + off, ver->iv_revision);
194 dst[off++] = '.';
195 off += u32toa(dst + off, ver->iv_build_num);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800196}
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000197#else
198/*
199 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
200 */
201static void
202bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
203{
204 snprintf(dst, maxlen, "%hu.%hu.%hu.%u", (uint16_t)ver->iv_major,
205 (uint16_t)ver->iv_minor, ver->iv_revision, ver->iv_build_num);
206}
207#endif /* !MCUBOOT_USE_SNPRINTF */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800208
209/*
210 * List images.
211 */
212static void
213bs_list(char *buf, int len)
214{
Christopher Collins92ea77f2016-12-12 15:59:26 -0800215 struct image_header hdr;
216 uint8_t tmpbuf[64];
Øyvind Rønningstad9f4aefd2021-03-08 21:11:25 +0100217 uint32_t slot, area_id;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800218 const struct flash_area *fap;
Fabio Utzig6f49c272019-08-23 11:42:58 -0300219 uint8_t image_index;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800220
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100221 zcbor_map_start_encode(cbor_state, 1);
222 zcbor_tstr_put_lit_cast(cbor_state, "images");
223 zcbor_list_start_encode(cbor_state, 5);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300224 image_index = 0;
225 IMAGES_ITER(image_index) {
226 for (slot = 0; slot < 2; slot++) {
227 area_id = flash_area_id_from_multi_image_slot(image_index, slot);
228 if (flash_area_open(area_id, &fap)) {
229 continue;
230 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800231
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200232 int rc = BOOT_HOOK_CALL(boot_read_image_header_hook,
233 BOOT_HOOK_REGULAR, image_index, slot, &hdr);
234 if (rc == BOOT_HOOK_REGULAR)
235 {
236 flash_area_read(fap, 0, &hdr, sizeof(hdr));
237 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800238
Michael Grand5047f032022-11-24 16:49:56 +0100239 FIH_DECLARE(fih_rc, FIH_FAILURE);
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200240
241 if (hdr.ih_magic == IMAGE_MAGIC)
242 {
243 BOOT_HOOK_CALL_FIH(boot_image_check_hook,
Michael Grand5047f032022-11-24 16:49:56 +0100244 FIH_BOOT_HOOK_REGULAR,
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200245 fih_rc, image_index, slot);
Michael Grand5047f032022-11-24 16:49:56 +0100246 if (FIH_EQ(fih_rc, FIH_BOOT_HOOK_REGULAR))
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200247 {
Wouter Cappelle953a7612021-05-03 16:53:05 +0200248#ifdef MCUBOOT_ENC_IMAGES
249 if (slot == 0 && IS_ENCRYPTED(&hdr)) {
250 /* Clear the encrypted flag we didn't supply a key
251 * This flag could be set if there was a decryption in place
252 * performed before. We will try to validate the image without
253 * decryption by clearing the flag in the heder. If
254 * still encrypted the validation will fail.
255 */
256 hdr.ih_flags &= ~(ENCRYPTIONFLAGS);
257 }
258#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200259 FIH_CALL(bootutil_img_validate, fih_rc, NULL, 0, &hdr, fap, tmpbuf, sizeof(tmpbuf),
260 NULL, 0, NULL);
261 }
262 }
263
264 flash_area_close(fap);
265
Michael Grand5047f032022-11-24 16:49:56 +0100266 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
Fabio Utzig6f49c272019-08-23 11:42:58 -0300267 continue;
268 }
Fabio Utzig6f49c272019-08-23 11:42:58 -0300269
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100270 zcbor_map_start_encode(cbor_state, 20);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300271
272#if (BOOT_IMAGE_NUMBER > 1)
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100273 zcbor_tstr_put_lit_cast(cbor_state, "image");
274 zcbor_uint32_put(cbor_state, image_index);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300275#endif
276
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100277 zcbor_tstr_put_lit_cast(cbor_state, "slot");
278 zcbor_uint32_put(cbor_state, slot);
279 zcbor_tstr_put_lit_cast(cbor_state, "version");
Fabio Utzig6f49c272019-08-23 11:42:58 -0300280
281 bs_list_img_ver((char *)tmpbuf, sizeof(tmpbuf), &hdr.ih_ver);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100282 zcbor_tstr_encode_ptr(cbor_state, tmpbuf, strlen((char *)tmpbuf));
283 zcbor_map_end_encode(cbor_state, 20);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800284 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800285 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100286 zcbor_list_end_encode(cbor_state, 5);
287 zcbor_map_end_encode(cbor_state, 1);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800288 boot_serial_output();
289}
290
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000291#ifdef MCUBOOT_ERASE_PROGRESSIVELY
292
293/** Erases range of flash, aligned to sector size
294 *
295 * Function will erase all sectors withing [start, end] range; it does not check
296 * the @p start for alignment, and it will use @p end to find boundaries of las
297 * sector to erase. Function returns offset of the first byte past the last
298 * erased sector, so basically offset of next sector to be erased if needed.
299 * The function is intended to be called iteratively with previously returned
300 * offset as @p start.
301 *
302 * @param start starting offset, aligned to sector offset;
303 * @param end ending offset, maybe anywhere within sector;
304 *
305 * @retval On success: offset of the first byte past last erased sector;
306 * On failure: -EINVAL.
307 */
308static off_t erase_range(const struct flash_area *fap, off_t start, off_t end)
309{
310 struct flash_sector sect;
311 size_t size;
312 int rc;
313
314 if (end >= flash_area_get_size(fap)) {
315 return -EINVAL;
316 }
317
318 if (end < start) {
319 return start;
320 }
321
Dominik Ermel24769882023-01-05 13:36:35 +0000322 if (flash_area_get_sector(fap, end, &sect)) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000323 return -EINVAL;
324 }
325
326 size = flash_sector_get_off(&sect) + flash_sector_get_size(&sect) - start;
Stephanos Ioannidis09e2bd72022-07-11 22:01:49 +0900327 BOOT_LOG_INF("Erasing range 0x%jx:0x%jx", (intmax_t)start,
328 (intmax_t)(start + size - 1));
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000329
330 rc = flash_area_erase(fap, start, size);
331 if (rc != 0) {
332 BOOT_LOG_ERR("Error %d while erasing range", rc);
333 return -EINVAL;
334 }
335
336 return start + size;
337}
338#endif
339
Christopher Collins92ea77f2016-12-12 15:59:26 -0800340/*
341 * Image upload request.
342 */
343static void
344bs_upload(char *buf, int len)
345{
Dominik Ermel5bd87442022-06-13 15:14:01 +0000346 static size_t img_size; /* Total image size, held for duration of upload */
347 static uint32_t curr_off; /* Expected current offset */
348 const uint8_t *img_chunk = NULL; /* Pointer to buffer with received image chunk */
349 size_t img_chunk_len = 0; /* Length of received image chunk */
350 size_t img_chunk_off = SIZE_MAX; /* Offset of image chunk within image */
351 uint8_t rem_bytes; /* Reminder bytes after aligning chunk write to
352 * to flash alignment */
Fabio Utzig6f49c272019-08-23 11:42:58 -0300353 int img_num;
Dominik Ermel5bd87442022-06-13 15:14:01 +0000354 size_t img_size_tmp = SIZE_MAX; /* Temp variable for image size */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800355 const struct flash_area *fap = NULL;
356 int rc;
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000357#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000358 static off_t not_yet_erased = 0; /* Offset of next byte to erase; writes to flash
359 * are done in consecutive manner and erases are done
360 * to allow currently received chunk to be written;
361 * this state variable holds information where last
362 * erase has stopped to let us know whether erase
363 * is needed to be able to write current chunk.
364 */
365 static struct flash_sector status_sector;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200366#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800367
Fabio Utzig6f49c272019-08-23 11:42:58 -0300368 img_num = 0;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300369
370 /*
371 * Expected data format.
372 * {
Fabio Utzig6f49c272019-08-23 11:42:58 -0300373 * "image":<image number in a multi-image set (OPTIONAL)>
374 * "data":<image data>
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300375 * "len":<image len>
376 * "off":<current offset of image data>
377 * }
378 */
379
Øyvind Rønningstad212a35b2021-05-07 21:06:48 +0200380 struct Upload upload;
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100381 size_t decoded_len;
382 uint_fast8_t result = cbor_decode_Upload((const uint8_t *)buf, len, &upload, &decoded_len);
Øyvind Rønningstad212a35b2021-05-07 21:06:48 +0200383
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100384 if ((result != ZCBOR_SUCCESS) || (len != decoded_len)) {
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100385 goto out_invalid_data;
386 }
Dominik Ermel470e2f32020-01-10 13:28:48 +0000387
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100388 for (int i = 0; i < upload._Upload_members_count; i++) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100389 struct Member_ *member = &upload._Upload_members[i]._Upload_members;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100390 switch(member->_Member_choice) {
391 case _Member_image:
392 img_num = member->_Member_image;
393 break;
394 case _Member_data:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000395 img_chunk = member->_Member_data.value;
396 img_chunk_len = member->_Member_data.len;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100397 break;
398 case _Member_len:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000399 img_size_tmp = member->_Member_len;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100400 break;
401 case _Member_off:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000402 img_chunk_off = member->_Member_off;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100403 break;
404 case _Member_sha:
405 default:
406 /* Nothing to do. */
407 break;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300408 }
409 }
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100410
Dominik Ermel5bd87442022-06-13 15:14:01 +0000411 if (img_chunk_off == SIZE_MAX || img_chunk == NULL) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300412 /*
413 * Offset must be set in every block.
414 */
415 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800416 }
417
Dominik Ermel48decca2021-07-09 10:23:58 +0000418#if !defined(MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD)
Fabio Utzig6f49c272019-08-23 11:42:58 -0300419 rc = flash_area_open(flash_area_id_from_multi_image_slot(img_num, 0), &fap);
Dominik Ermel48decca2021-07-09 10:23:58 +0000420#else
421 rc = flash_area_open(flash_area_id_from_direct_image(img_num), &fap);
422#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800423 if (rc) {
424 rc = MGMT_ERR_EINVAL;
425 goto out;
426 }
427
Dominik Ermel5bd87442022-06-13 15:14:01 +0000428 if (img_chunk_off == 0) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000429 /* Receiving chunk with 0 offset resets the upload state; this basically
430 * means that upload has started from beginning.
431 */
432 const size_t area_size = flash_area_get_size(fap);
Dominik Ermel5bd87442022-06-13 15:14:01 +0000433
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000434 curr_off = 0;
435#ifdef MCUBOOT_ERASE_PROGRESSIVELY
436 /* Get trailer sector information; this is done early because inability to get
437 * that sector information means that upload will not work anyway.
438 * TODO: This is single occurrence issue, it should get detected during tests
439 * and fixed otherwise you are deploying broken mcuboot.
440 */
Dominik Ermel24769882023-01-05 13:36:35 +0000441 if (flash_area_get_sector(fap, boot_status_off(fap), &status_sector)) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000442 rc = MGMT_ERR_EUNKNOWN;
443 BOOT_LOG_ERR("Unable to determine flash sector of the image trailer");
444 goto out;
445 }
446#endif
447
448
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200449#if defined(MCUBOOT_VALIDATE_PRIMARY_SLOT_ONCE)
450 /* We are using swap state at end of flash area to store validation
451 * result. Make sure the user cannot write it from an image to skip validation.
452 */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000453 if (img_size_tmp > (area_size - BOOT_MAGIC_SZ)) {
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200454 goto out_invalid_data;
455 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000456#else
457 if (img_size_tmp > area_size) {
458 goto out_invalid_data;
459 }
460
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200461#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000462
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000463#ifndef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000464 /* Non-progressive erase erases entire image slot when first chunk of
465 * an image is received.
466 */
467 rc = flash_area_erase(fap, 0, area_size);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800468 if (rc) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300469 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800470 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000471#else
472 not_yet_erased = 0;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200473#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000474
Dominik Ermel5bd87442022-06-13 15:14:01 +0000475 img_size = img_size_tmp;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000476 } else if (img_chunk_off != curr_off) {
477 /* If received chunk offset does not match expected one jump, pretend
478 * success and jump to out; out will respond to client with success
479 * and request the expected offset, held by curr_off.
480 */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800481 rc = 0;
482 goto out;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000483 } else if (curr_off + img_chunk_len > img_size) {
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200484 rc = MGMT_ERR_EINVAL;
485 goto out;
486 }
487
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000488#ifdef MCUBOOT_ERASE_PROGRESSIVELY
489 /* Progressive erase will erase enough flash, aligned to sector size,
490 * as needed for the current chunk to be written.
491 */
492 not_yet_erased = erase_range(fap, not_yet_erased,
493 curr_off + img_chunk_len - 1);
494
495 if (not_yet_erased < 0) {
496 rc = MGMT_ERR_EINVAL;
497 goto out;
498 }
499#endif
500
501 /* Writes are aligned to flash write alignment, so may drop a few bytes
502 * from the end of the buffer; we will request these bytes again with
503 * new buffer by responding with request for offset after the last aligned
504 * write.
505 */
Dominik Ermel5bd87442022-06-13 15:14:01 +0000506 rem_bytes = img_chunk_len % flash_area_align(fap);
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000507 img_chunk_len -= rem_bytes;
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200508
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000509 if (curr_off + img_chunk_len + rem_bytes < img_size) {
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200510 rem_bytes = 0;
Fabio Utzig30f6b2a2018-03-29 16:18:53 -0300511 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200512
Dominik Ermel5bd87442022-06-13 15:14:01 +0000513 BOOT_LOG_INF("Writing at 0x%x until 0x%x", curr_off, curr_off + img_chunk_len);
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000514 /* Write flash aligned chunk, note that img_chunk_len now holds aligned length */
Jamie McCrae9d3fd7f2022-11-30 15:44:44 +0000515#if defined(MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE) && MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE > 0
516 if (flash_area_align(fap) > 1 &&
517 (((size_t)img_chunk) & (flash_area_align(fap) - 1)) != 0) {
518 /* Buffer address incompatible with write address, use buffer to write */
519 uint8_t write_size = MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE;
520 uint8_t wbs_aligned[MCUBOOT_SERIAL_UNALIGNED_BUFFER_SIZE];
521
522 while (img_chunk_len >= flash_area_align(fap)) {
523 if (write_size > img_chunk_len) {
524 write_size = img_chunk_len;
525 }
526
527 memset(wbs_aligned, flash_area_erased_val(fap), sizeof(wbs_aligned));
528 memcpy(wbs_aligned, img_chunk, write_size);
529
530 rc = flash_area_write(fap, curr_off, wbs_aligned, write_size);
531
532 if (rc != 0) {
533 goto out;
534 }
535
536 curr_off += write_size;
537 img_chunk += write_size;
538 img_chunk_len -= write_size;
539 }
540 } else {
541 rc = flash_area_write(fap, curr_off, img_chunk, img_chunk_len);
542 }
543#else
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000544 rc = flash_area_write(fap, curr_off, img_chunk, img_chunk_len);
Jamie McCrae9d3fd7f2022-11-30 15:44:44 +0000545#endif
546
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000547 if (rc == 0 && rem_bytes) {
548 /* Non-zero rem_bytes means that last chunk needs alignment; the aligned
549 * part, in the img_chunk_len - rem_bytes count bytes, has already been
550 * written by the above write, so we are left with the rem_bytes.
551 */
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200552 uint8_t wbs_aligned[BOOT_MAX_ALIGN];
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200553
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000554 memset(wbs_aligned, flash_area_erased_val(fap), sizeof(wbs_aligned));
555 memcpy(wbs_aligned, img_chunk + img_chunk_len, rem_bytes);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200556
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000557 rc = flash_area_write(fap, curr_off + img_chunk_len, wbs_aligned,
558 flash_area_align(fap));
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200559 }
560
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300561 if (rc == 0) {
Dominik Ermel7d2f0bf2022-06-21 16:15:34 +0000562 curr_off += img_chunk_len + rem_bytes;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200563 if (curr_off == img_size) {
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200564#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200565 /* Assure that sector for image trailer was erased. */
566 /* Check whether it was erased during previous upload. */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000567 off_t start = flash_sector_get_off(&status_sector);
568
569 if (erase_range(fap, start, start) < 0) {
570 rc = MGMT_ERR_EUNKNOWN;
571 goto out;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200572 }
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200573#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200574 rc = BOOT_HOOK_CALL(boot_serial_uploaded_hook, 0, img_num, fap,
575 img_size);
576 if (rc) {
577 BOOT_LOG_ERR("Error %d post upload hook", rc);
578 goto out;
579 }
580 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300581 } else {
582 out_invalid_data:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800583 rc = MGMT_ERR_EINVAL;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800584 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200585
Christopher Collins92ea77f2016-12-12 15:59:26 -0800586out:
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200587 BOOT_LOG_INF("RX: 0x%x", rc);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100588 zcbor_map_start_encode(cbor_state, 10);
589 zcbor_tstr_put_lit_cast(cbor_state, "rc");
Jamie McCrae0b6d3432022-12-02 09:24:10 +0000590 zcbor_int32_put(cbor_state, rc);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800591 if (rc == 0) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100592 zcbor_tstr_put_lit_cast(cbor_state, "off");
593 zcbor_uint32_put(cbor_state, curr_off);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800594 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100595 zcbor_map_end_encode(cbor_state, 10);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800596
597 boot_serial_output();
598 flash_area_close(fap);
Wouter Cappelle953a7612021-05-03 16:53:05 +0200599
600#ifdef MCUBOOT_ENC_IMAGES
601 if (curr_off == img_size) {
602 /* Last sector received, now start a decryption on the image if it is encrypted*/
603 rc = boot_handle_enc_fw();
604 }
605#endif //#ifdef MCUBOOT_ENC_IMAGES
Christopher Collins92ea77f2016-12-12 15:59:26 -0800606}
607
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000608/*
609 * Send rc code only.
610 */
611static void
612bs_rc_rsp(int rc_code)
613{
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100614 zcbor_map_start_encode(cbor_state, 10);
615 zcbor_tstr_put_lit_cast(cbor_state, "rc");
Jamie McCrae0b6d3432022-12-02 09:24:10 +0000616 zcbor_int32_put(cbor_state, rc_code);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100617 zcbor_map_end_encode(cbor_state, 10);
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000618 boot_serial_output();
619}
620
621
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200622#ifdef MCUBOOT_BOOT_MGMT_ECHO
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200623static void
624bs_echo(char *buf, int len)
625{
Dominik Ermel88bd5672022-06-07 15:17:06 +0000626 struct Echo echo = { 0 };
627 size_t decoded_len;
628 uint32_t rc = MGMT_ERR_EINVAL;
629 uint_fast8_t result = cbor_decode_Echo((const uint8_t *)buf, len, &echo, &decoded_len);
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200630
Dominik Ermel88bd5672022-06-07 15:17:06 +0000631 if ((result != ZCBOR_SUCCESS) || (len != decoded_len)) {
632 goto out;
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200633 }
Dominik Ermel88bd5672022-06-07 15:17:06 +0000634
635 if (echo._Echo_d.value == NULL) {
636 goto out;
637 }
638
639 zcbor_map_start_encode(cbor_state, 10);
640 zcbor_tstr_put_term(cbor_state, "r");
641 if (zcbor_tstr_encode(cbor_state, &echo._Echo_d) && zcbor_map_end_encode(cbor_state, 10)) {
642 boot_serial_output();
643 return;
644 } else {
645 rc = MGMT_ERR_ENOMEM;
646 }
647
648out:
649 reset_cbor_state();
650 bs_rc_rsp(rc);
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200651}
652#endif
653
Christopher Collins92ea77f2016-12-12 15:59:26 -0800654/*
Christopher Collins92ea77f2016-12-12 15:59:26 -0800655 * Reset, and (presumably) boot to newly uploaded image. Flush console
656 * before restarting.
657 */
Andrzej Puzdrowski268cdd02018-04-10 12:57:54 +0200658static void
Christopher Collins92ea77f2016-12-12 15:59:26 -0800659bs_reset(char *buf, int len)
660{
Dominik Ermelb26fc482022-12-09 17:10:20 +0000661 int rc = BOOT_HOOK_CALL(boot_reset_request_hook, 0, false);
662 if (rc == BOOT_RESET_REQUEST_HOOK_BUSY) {
663 rc = MGMT_ERR_EBUSY;
664 } else {
665 /* Currently whatever else is returned it is just converted
666 * to 0/no error. Boot serial starts accepting "force" parameter
667 * in command this needs to change.
668 */
669 rc = 0;
670 }
671 bs_rc_rsp(rc);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800672
Dominik Ermelb26fc482022-12-09 17:10:20 +0000673 if (rc == 0) {
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200674#ifdef __ZEPHYR__
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200675#ifdef CONFIG_MULTITHREADING
Dominik Ermelb26fc482022-12-09 17:10:20 +0000676 k_sleep(K_MSEC(250));
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200677#else
Dominik Ermelb26fc482022-12-09 17:10:20 +0000678 k_busy_wait(250000);
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200679#endif
Dominik Ermelb26fc482022-12-09 17:10:20 +0000680 sys_reboot(SYS_REBOOT_COLD);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300681#elif __ESPRESSIF__
Dominik Ermelb26fc482022-12-09 17:10:20 +0000682 esp_rom_delay_us(250000);
683 bootloader_reset();
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200684#else
Dominik Ermelb26fc482022-12-09 17:10:20 +0000685 os_cputime_delay_usecs(250000);
686 hal_system_reset();
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200687#endif
Dominik Ermelb26fc482022-12-09 17:10:20 +0000688 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800689}
690
691/*
692 * Parse incoming line of input from console.
693 * Expect newtmgr protocol with serial transport.
694 */
695void
696boot_serial_input(char *buf, int len)
697{
698 struct nmgr_hdr *hdr;
699
700 hdr = (struct nmgr_hdr *)buf;
701 if (len < sizeof(*hdr) ||
702 (hdr->nh_op != NMGR_OP_READ && hdr->nh_op != NMGR_OP_WRITE) ||
703 (ntohs(hdr->nh_len) < len - sizeof(*hdr))) {
704 return;
705 }
706 bs_hdr = hdr;
707 hdr->nh_group = ntohs(hdr->nh_group);
708
709 buf += sizeof(*hdr);
710 len -= sizeof(*hdr);
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300711
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000712 reset_cbor_state();
Christopher Collins92ea77f2016-12-12 15:59:26 -0800713
714 /*
715 * Limited support for commands.
716 */
717 if (hdr->nh_group == MGMT_GROUP_ID_IMAGE) {
718 switch (hdr->nh_id) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300719 case IMGMGR_NMGR_ID_STATE:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800720 bs_list(buf, len);
721 break;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300722 case IMGMGR_NMGR_ID_UPLOAD:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800723 bs_upload(buf, len);
724 break;
725 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000726 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800727 break;
728 }
729 } else if (hdr->nh_group == MGMT_GROUP_ID_DEFAULT) {
730 switch (hdr->nh_id) {
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200731 case NMGR_ID_ECHO:
732#ifdef MCUBOOT_BOOT_MGMT_ECHO
733 bs_echo(buf, len);
734#endif
735 break;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800736 case NMGR_ID_CONS_ECHO_CTRL:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000737 bs_rc_rsp(0);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800738 break;
739 case NMGR_ID_RESET:
740 bs_reset(buf, len);
741 break;
742 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000743 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800744 break;
745 }
Dominik Ermelbd69c3d2021-07-28 11:27:31 +0000746 } else if (MCUBOOT_PERUSER_MGMT_GROUP_ENABLED == 1) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100747 if (bs_peruser_system_specific(hdr, buf, len, cbor_state) == 0) {
Dominik Ermel3d51e432021-06-25 17:29:50 +0000748 boot_serial_output();
749 }
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000750 } else {
751 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800752 }
Wouter Cappellee3822f82022-01-19 15:39:43 +0100753#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
754 bs_entry = true;
755#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800756}
757
758static void
759boot_serial_output(void)
760{
761 char *data;
Piotr Dymaczf5e77532022-10-30 17:43:45 +0100762 int len, out;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800763 uint16_t crc;
764 uint16_t totlen;
Piotr Dymaczf5e77532022-10-30 17:43:45 +0100765 char pkt_cont[2] = { SHELL_NLIP_DATA_START1, SHELL_NLIP_DATA_START2 };
Christopher Collins92ea77f2016-12-12 15:59:26 -0800766 char pkt_start[2] = { SHELL_NLIP_PKT_START1, SHELL_NLIP_PKT_START2 };
Dominik Ermel5ff89582022-03-03 17:09:07 +0000767 char buf[BOOT_SERIAL_OUT_MAX + sizeof(*bs_hdr) + sizeof(crc) + sizeof(totlen)];
768 char encoded_buf[BASE64_ENCODE_SIZE(sizeof(buf))];
Christopher Collins92ea77f2016-12-12 15:59:26 -0800769
770 data = bs_obuf;
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100771 len = (uint32_t)cbor_state->payload_mut - (uint32_t)bs_obuf;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800772
773 bs_hdr->nh_op++;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300774 bs_hdr->nh_flags = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800775 bs_hdr->nh_len = htons(len);
776 bs_hdr->nh_group = htons(bs_hdr->nh_group);
777
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200778#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +0100779 crc = crc16_itu_t(CRC16_INITIAL_CRC, (uint8_t *)bs_hdr, sizeof(*bs_hdr));
780 crc = crc16_itu_t(crc, data, len);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300781#elif __ESPRESSIF__
782 /* For ESP32 it was used the CRC API in rom/crc.h */
Almir Okato7d3622f2022-10-20 12:44:58 -0300783 crc = ~esp_crc16_be(~CRC16_INITIAL_CRC, (uint8_t *)bs_hdr, sizeof(*bs_hdr));
784 crc = ~esp_crc16_be(~crc, (uint8_t *)data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200785#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800786 crc = crc16_ccitt(CRC16_INITIAL_CRC, bs_hdr, sizeof(*bs_hdr));
787 crc = crc16_ccitt(crc, data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200788#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800789 crc = htons(crc);
790
Christopher Collins92ea77f2016-12-12 15:59:26 -0800791 totlen = len + sizeof(*bs_hdr) + sizeof(crc);
792 totlen = htons(totlen);
793
794 memcpy(buf, &totlen, sizeof(totlen));
795 totlen = sizeof(totlen);
796 memcpy(&buf[totlen], bs_hdr, sizeof(*bs_hdr));
797 totlen += sizeof(*bs_hdr);
798 memcpy(&buf[totlen], data, len);
799 totlen += len;
800 memcpy(&buf[totlen], &crc, sizeof(crc));
801 totlen += sizeof(crc);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200802#ifdef __ZEPHYR__
803 size_t enc_len;
Carles Cufi0165be82018-03-26 17:43:51 +0200804 base64_encode(encoded_buf, sizeof(encoded_buf), &enc_len, buf, totlen);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200805 totlen = enc_len;
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300806#elif __ESPRESSIF__
807 size_t enc_len;
808 base64_encode((unsigned char *)encoded_buf, sizeof(encoded_buf), &enc_len, (unsigned char *)buf, totlen);
809 totlen = enc_len;
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200810#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800811 totlen = base64_encode(buf, totlen, encoded_buf, 1);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200812#endif
Piotr Dymaczf5e77532022-10-30 17:43:45 +0100813
814 out = 0;
815 while (out < totlen) {
816 if (out == 0) {
817 boot_uf->write(pkt_start, sizeof(pkt_start));
818 } else {
819 boot_uf->write(pkt_cont, sizeof(pkt_cont));
820 }
821
822 len = MIN(BOOT_SERIAL_FRAME_MTU, totlen - out);
823 boot_uf->write(&encoded_buf[out], len);
824
825 out += len;
826
827 boot_uf->write("\n", 1);
828 }
829
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200830 BOOT_LOG_INF("TX");
Christopher Collins92ea77f2016-12-12 15:59:26 -0800831}
832
833/*
834 * Returns 1 if full packet has been received.
835 */
836static int
837boot_serial_in_dec(char *in, int inlen, char *out, int *out_off, int maxout)
838{
839 int rc;
840 uint16_t crc;
841 uint16_t len;
Marko Kiiskilae5aeee42018-12-21 15:00:16 +0200842
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200843#ifdef __ZEPHYR__
844 int err;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200845 err = base64_decode( &out[*out_off], maxout - *out_off, &rc, in, inlen - 2);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200846 if (err) {
847 return -1;
848 }
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300849#elif __ESPRESSIF__
850 int err;
851 err = base64_decode((unsigned char *)&out[*out_off], maxout - *out_off, (size_t *)&rc, (unsigned char *)in, inlen);
852 if (err) {
853 return -1;
854 }
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200855#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800856 if (*out_off + base64_decode_len(in) >= maxout) {
857 return -1;
858 }
859 rc = base64_decode(in, &out[*out_off]);
860 if (rc < 0) {
861 return -1;
862 }
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200863#endif
Fabio Utzig6f49c272019-08-23 11:42:58 -0300864
Christopher Collins92ea77f2016-12-12 15:59:26 -0800865 *out_off += rc;
Fabio Utzig6f49c272019-08-23 11:42:58 -0300866 if (*out_off <= sizeof(uint16_t)) {
867 return 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800868 }
Fabio Utzig6f49c272019-08-23 11:42:58 -0300869
870 len = ntohs(*(uint16_t *)out);
871 if (len != *out_off - sizeof(uint16_t)) {
872 return 0;
873 }
874
875 if (len > *out_off - sizeof(uint16_t)) {
876 len = *out_off - sizeof(uint16_t);
877 }
878
879 out += sizeof(uint16_t);
880#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +0100881 crc = crc16_itu_t(CRC16_INITIAL_CRC, out, len);
Almir Okatoe8cbc0d2022-06-13 10:45:39 -0300882#elif __ESPRESSIF__
Almir Okato7d3622f2022-10-20 12:44:58 -0300883 crc = ~esp_crc16_be(~CRC16_INITIAL_CRC, (uint8_t *)out, len);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300884#else
885 crc = crc16_ccitt(CRC16_INITIAL_CRC, out, len);
886#endif
887 if (crc || len <= sizeof(crc)) {
888 return 0;
889 }
890 *out_off -= sizeof(crc);
891 out[*out_off] = '\0';
892
893 return 1;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800894}
895
896/*
897 * Task which waits reading console, expecting to get image over
898 * serial port.
899 */
Wouter Cappellee3822f82022-01-19 15:39:43 +0100900static void
901boot_serial_read_console(const struct boot_uart_funcs *f,int timeout_in_ms)
Christopher Collins92ea77f2016-12-12 15:59:26 -0800902{
903 int rc;
904 int off;
David Brown57f0df32020-05-12 08:39:21 -0600905 int dec_off = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800906 int full_line;
Marko Kiiskila149b4572018-06-06 14:18:54 +0300907 int max_input;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100908 int elapsed_in_ms = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800909
Marko Kiiskila149b4572018-06-06 14:18:54 +0300910 boot_uf = f;
Marko Kiiskila149b4572018-06-06 14:18:54 +0300911 max_input = sizeof(in_buf);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800912
913 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100914 while (timeout_in_ms > 0 || bs_entry) {
Piotr Dymacz067f30a2022-08-12 18:25:34 +0200915 /*
916 * Don't enter CPU idle state here if timeout based serial recovery is
917 * used as otherwise the boot process hangs forever, waiting for input
918 * from serial console (if single-thread mode is used).
919 */
Piotr Dymacz3942e9b2022-07-18 10:19:25 +0200920#ifndef MCUBOOT_SERIAL_WAIT_FOR_DFU
Andrzej Puzdrowskiaea38eb2021-06-11 12:28:59 +0200921 MCUBOOT_CPU_IDLE();
Piotr Dymacz3942e9b2022-07-18 10:19:25 +0200922#endif
Hein Wessels56d28f02021-11-19 08:42:08 +0100923 MCUBOOT_WATCHDOG_FEED();
Wouter Cappellee3822f82022-01-19 15:39:43 +0100924#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
925 uint32_t start = k_uptime_get_32();
926#endif
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200927 rc = f->read(in_buf + off, sizeof(in_buf) - off, &full_line);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800928 if (rc <= 0 && !full_line) {
Wouter Cappellee3822f82022-01-19 15:39:43 +0100929 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800930 }
931 off += rc;
932 if (!full_line) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300933 if (off == max_input) {
934 /*
935 * Full line, no newline yet. Reset the input buffer.
936 */
937 off = 0;
938 }
Wouter Cappellee3822f82022-01-19 15:39:43 +0100939 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800940 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200941 if (in_buf[0] == SHELL_NLIP_PKT_START1 &&
942 in_buf[1] == SHELL_NLIP_PKT_START2) {
Christopher Collins92ea77f2016-12-12 15:59:26 -0800943 dec_off = 0;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200944 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
945 } else if (in_buf[0] == SHELL_NLIP_DATA_START1 &&
946 in_buf[1] == SHELL_NLIP_DATA_START2) {
947 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800948 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200949
950 /* serve errors: out of decode memory, or bad encoding */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800951 if (rc == 1) {
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200952 boot_serial_input(&dec_buf[2], dec_off - 2);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800953 }
954 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100955check_timeout:
956 /* Subtract elapsed time */
957#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
958 elapsed_in_ms = (k_uptime_get_32() - start);
959#endif
960 timeout_in_ms -= elapsed_in_ms;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800961 }
962}
Wouter Cappellee3822f82022-01-19 15:39:43 +0100963
964/*
965 * Task which waits reading console, expecting to get image over
966 * serial port.
967 */
968void
969boot_serial_start(const struct boot_uart_funcs *f)
970{
971 bs_entry = true;
972 boot_serial_read_console(f,0);
973}
974
975#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
976/*
977 * Task which waits reading console for a certain amount of timeout.
978 * If within this timeout no mcumgr command is received, the function is
979 * returning, else the serial boot is never exited
980 */
981void
982boot_serial_check_start(const struct boot_uart_funcs *f, int timeout_in_ms)
983{
984 bs_entry = false;
985 boot_serial_read_console(f,timeout_in_ms);
986}
987#endif