1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
/*
* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*
* Alternatively, this software may be distributed under the terms of the
* GNU General Public License ("GPL") version 2 as published by the Free
* Software Foundation.
*/
#include <common.h>
#include <chromeos/common.h>
#include <chromeos/gbb.h>
#include <gbb_header.h>
#define PREFIX "gbb: "
int gbb_init(read_buf_type gbb, firmware_storage_t *file, uint32_t gbb_offset)
{
#ifndef CONFIG_HARDWARE_MAPPED_SPI
GoogleBinaryBlockHeader *gbbh = (GoogleBinaryBlockHeader *)gbb;
if (file->read(file, gbb_offset, sizeof(*gbbh), gbbh)) {
VBDEBUG(PREFIX "failed to read GBB header\n");
return 1;
}
if (file->read(file, gbb_offset + gbbh->hwid_offset,
gbbh->hwid_size,
gbb + gbbh->hwid_offset)) {
VBDEBUG(PREFIX "failed to read hwid\n");
return 1;
}
if (file->read(file, gbb_offset + gbbh->rootkey_offset,
gbbh->rootkey_size,
gbb + gbbh->rootkey_offset)) {
VBDEBUG(PREFIX "failed to read root key\n");
return 1;
}
#else
if (file->read(file, gbb_offset,
sizeof(GoogleBinaryBlockHeader), gbb)) {
VBDEBUG(PREFIX "failed to read GBB header\n");
return 1;
}
#endif
return 0;
}
#ifndef CONFIG_HARDWARE_MAPPED_SPI
int gbb_read_bmp_block(void *gbb, firmware_storage_t *file, uint32_t gbb_offset)
{
GoogleBinaryBlockHeader *gbbh = (GoogleBinaryBlockHeader *)gbb;
if (file->read(file, gbb_offset + gbbh->bmpfv_offset,
gbbh->bmpfv_size,
gbb + gbbh->bmpfv_offset)) {
VBDEBUG(PREFIX "failed to read bmp block\n");
return 1;
}
return 0;
}
int gbb_read_recovery_key(void *gbb,
firmware_storage_t *file, uint32_t gbb_offset)
{
GoogleBinaryBlockHeader *gbbh = (GoogleBinaryBlockHeader *)gbb;
if (file->read(file, gbb_offset + gbbh->recovery_key_offset,
gbbh->recovery_key_size,
gbb + gbbh->recovery_key_offset)) {
VBDEBUG(PREFIX "failed to read recovery key\n");
return 1;
}
return 0;
}
#endif
int gbb_check_integrity(uint8_t *gbb)
{
/*
* Avoid a second "$GBB" signature in the binary. Some utility programs
* that parses the contents of firmware image could fail if there are
* multiple signatures.
*/
if (gbb[0] == '$' && gbb[1] == 'G' && gbb[2] == 'B' && gbb[3] == 'B')
return 0;
else
return 1;
}
|