From b5ca0cffac1b27fd6662d52a909be7a2199398dc Mon Sep 17 00:00:00 2001 From: Marcin Bukat Date: Wed, 11 Dec 2013 15:42:25 +0100 Subject: adfuload: utility to upload and exec binary using brom adfu mode of atj213x SoC Change-Id: If52aa34124be2801c2ac316641ff9aa0bbd837c6 --- utils/atj2137/adfuload/Makefile | 7 + utils/atj2137/adfuload/adfuload.c | 467 ++++++++++++++++++++++++++++++++++++++ utils/atj2137/adfuload/encrypt.c | 96 ++++++++ utils/atj2137/adfuload/encrypt.h | 21 ++ 4 files changed, 591 insertions(+) create mode 100644 utils/atj2137/adfuload/Makefile create mode 100644 utils/atj2137/adfuload/adfuload.c create mode 100644 utils/atj2137/adfuload/encrypt.c create mode 100644 utils/atj2137/adfuload/encrypt.h (limited to 'utils') diff --git a/utils/atj2137/adfuload/Makefile b/utils/atj2137/adfuload/Makefile new file mode 100644 index 0000000000..c6a432aaa6 --- /dev/null +++ b/utils/atj2137/adfuload/Makefile @@ -0,0 +1,7 @@ +all: adfuload + +adfuload: adfuload.c encrypt.c + gcc -g -std=c99 -o $@ -W -Wall -I/usr/include/libusb-1.0/ $^ -lusb-1.0 + +clean: + rm -fr *.o adfuload diff --git a/utils/atj2137/adfuload/adfuload.c b/utils/atj2137/adfuload/adfuload.c new file mode 100644 index 0000000000..5e32a9354b --- /dev/null +++ b/utils/atj2137/adfuload/adfuload.c @@ -0,0 +1,467 @@ +/*************************************************************************** + * __________ __ ___. + * Open \______ \ ____ ____ | | _\_ |__ _______ ___ + * Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ / + * Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < < + * Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \ + * \/ \/ \/ \/ \/ + * + * Copyright (C) 2013 by Marcin Bukat + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY + * KIND, either express or implied. + * + ****************************************************************************/ + +#include +#include +#include +#include +#include +#include + +#include "encrypt.h" + +#define VERSION "v0.1" + +#define RETRY_MAX 5 +#define USB_TIMEOUT 512 +#define VENDORID 0x10d6 +#define PRODUCTID 0xff96 + +#define OUT_EP 0x01 +#define IN_EP 0x82 + +#define CBW_SIGNATURE 0x43425355 +#define CSW_SIGNATURE 0x53425355 + +struct CBWCB_t +{ + uint8_t cbCode; + uint8_t cbLun; + uint32_t LBA; + uint32_t cbLen; + uint8_t reseved; + uint8_t control; +} __attribute__((__packed__)); + +struct CBW_t +{ + uint32_t dCBWSignature; + uint32_t dCBWTag; + uint32_t dCBWDataTransferLength; + uint8_t bmCBWFlags; + uint8_t bCBWLUN; + uint8_t bCBWCBLength; + uint8_t CBWCB[16]; +} __attribute__((__packed__)); + +struct CSW_t +{ + uint32_t dCSWSignature; + uint32_t dCSWTag; + uint32_t dCSWDataResidue; + uint8_t bCSWStatus; +} __attribute__((__packed__)); + +static int send_msc_cmd(libusb_device_handle *hdev, void *cbwcb, uint32_t data_len, uint32_t *reftag) +{ + struct CBW_t cbw; + int ret, repeat, transferred; + + memset(&cbw, 0, sizeof(cbw)); + cbw.dCBWSignature = CBW_SIGNATURE; + cbw.dCBWTag = 0; + cbw.dCBWDataTransferLength = data_len; + cbw.bmCBWFlags = 0; + cbw.bCBWLUN = 0; + cbw.bCBWCBLength = ((((char *)cbwcb)[0] == 0x10) ? 0 : 0x10); + memcpy(cbw.CBWCB, cbwcb, sizeof(struct CBWCB_t)); + + *reftag = cbw.dCBWTag; + do + { + /* transfer command to the device */ + ret = libusb_bulk_transfer(hdev, OUT_EP, (unsigned char*)&cbw, 31, &transferred, USB_TIMEOUT); + if (ret == LIBUSB_ERROR_PIPE) + { + libusb_clear_halt(hdev, OUT_EP); + } + repeat++; + } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX)); + + if (ret != LIBUSB_SUCCESS) + { + printf("error: command transfer error\n"); + return -1; + } + + return 0; +} + +static int get_msc_csw(libusb_device_handle *hdev, uint32_t reftag) +{ + struct CSW_t csw; + int ret, repeat, transferred; + + /* get CSW response from device */ + repeat = 0; + do + { + ret = libusb_bulk_transfer(hdev, IN_EP, (unsigned char *)&csw, 13, &transferred, USB_TIMEOUT); + if (ret == LIBUSB_ERROR_PIPE) + { + libusb_clear_halt(hdev, IN_EP); + } + repeat++; + } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX)); + + if (ret != LIBUSB_SUCCESS) + { + printf("error reading CSW\n"); + return -3; + } + + if (transferred != 13) + { + printf("error wrong size of CSW packet\n"); + return -4; + } + + if (csw.dCSWSignature != CSW_SIGNATURE) + { + printf("error: wrong CSW signature.\n"); + return -5; + } + if (csw.dCSWTag != reftag) + { + printf("error: CSW dCSWTag mismatch. Is 0x%x, expected 0x%x\n", csw.dCSWTag, reftag); + return -6; + } + + if (csw.bCSWStatus) + { + /* In case of CSW indicating error dump the content of the packet */ + printf ("dCSWSignature: 0x%0x\n", csw.dCSWSignature); + printf ("dCSWTag: 0x%0x\n", csw.dCSWTag); + printf ("dCSWDataResidue: 0x%0x\n", csw.dCSWDataResidue); + printf ("bCSWStatus: 0x%0x\n", csw.bCSWStatus); + } + + return csw.bCSWStatus; +} + +static void adfu_upload(libusb_device_handle *hdev, unsigned char *buf, int size, uint32_t address) +{ + uint8_t cmdbuf[16]; + uint32_t reftag; + int transferred; + + memset(cmdbuf, 0, sizeof(cmdbuf)); + + fprintf(stderr,"[info]: loading binary @ 0x%08x size %d bytes\n", address, size); + + cmdbuf[0] = 0x05; /* transfer */ + + cmdbuf[1] = address & 0xff; /* addr LSB */ + cmdbuf[2] = (address >> 8) & 0xff; + cmdbuf[3] = (address >> 16) & 0xff; + cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */ + + cmdbuf[5] = size & 0xff; /* len LSB */ + cmdbuf[6] = (size >> 8) & 0xff; + cmdbuf[7] = (size >> 16) & 0xff; + cmdbuf[8] = (size >> 24) & 0xff; /* len MSB */ + + send_msc_cmd(hdev, (void *)cmdbuf, size, &reftag); + + libusb_bulk_transfer(hdev, OUT_EP, buf, size, &transferred, USB_TIMEOUT); + fprintf(stderr, "[info]: actual xfered data: %d bytes\n", transferred); + + /* get CSW from device*/ + fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag)); +} + +#if 0 +/* unused, I'll leve it here for reference */ +static void adfu_download(libusb_device_handle *hdev, unsigned char *buf, int size, uint32_t address) +{ + uint8_t cmdbuf[16]; + int transferred, ret, repeat; + uint32_t reftag; + + fprintf(stderr, "[info]: downloading %d bytes from 0x%08x\n", size, address); + memset(cmdbuf, 0, sizeof(cmdbuf)); + + cmdbuf[0] = 0x05; + + cmdbuf[1] = address & 0xff; /* addr LSB */ + cmdbuf[2] = (address >> 8) & 0xff; + cmdbuf[3] = (address >> 16) & 0xff; + cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */ + + cmdbuf[5] = size & 0xff; /* len LSB */ + cmdbuf[6] = (size >> 8) & 0xff; + cmdbuf[7] = (size >> 16) & 0xff; + cmdbuf[8] = (size >> 24) & 0xff; /* len MSB */ + + cmdbuf[9] = 0x80; /* send data from device */ + + send_msc_cmd(hdev, (void *)cmdbuf, size, &reftag); + + memset(buf, 0, sizeof(buf)); + + /* get data from device */ + repeat = 0; + do + { + ret = libusb_bulk_transfer(hdev, IN_EP, buf, size, &transferred, USB_TIMEOUT); + if (ret == LIBUSB_ERROR_PIPE) + { + libusb_clear_halt(hdev, IN_EP); + } + repeat++; + } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX)); + + fprintf(stderr, "[info]: actual xfered data: %d bytes\n", transferred); + + /* get CSW from device*/ + fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag)); +} +#endif + +static void adfu_execute(libusb_device_handle *hdev, uint32_t address) +{ + uint8_t cmdbuf[16]; + uint32_t reftag; + + fprintf(stderr, "[info]: jumping to address 0x%08x\n", address); + memset(cmdbuf, 0, sizeof(cmdbuf)); + + cmdbuf[0] = 0x10; /* execute */ + + cmdbuf[1] = address & 0xff; /* addr LSB */ + cmdbuf[2] = (address >> 8) & 0xff; + cmdbuf[3] = (address >> 16) & 0xff; + cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */ + + send_msc_cmd(hdev, (void *)cmdbuf, 0, &reftag); + + /* get CSW from device*/ + fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag)); +} + +static void usage(char *name) +{ + printf("usage: (sudo) %s [-e] -s1 stage1.bin -s2 stage2.bin\n", name); + printf("stage1.bin - binary of the stage1 (ADEC_N63.BIN for example)\n"); + printf("stage2.bin - binary of the custom user code\n"); + printf("\n"); + printf("options:\n"); + printf("-e - encode stage1 binary as needed by brom adfu mode\n"); +} + +int main (int argc, char **argv) +{ + libusb_device_handle *hdev; + int ret = 0; + int i = 1; + uint8_t *buf; + uint32_t filesize, filesize_round; + char *s1_filename, *s2_filename; + bool encode = false; + FILE *fp; + + while (i < argc) + { + if (strcmp(argv[i],"-e") == 0) + { + encode = true; + i++; + } + else if (strcmp(argv[i],"-s1") == 0) + { + i++; + if (i == argc) + { + usage(argv[0]); + return -1; + } + s1_filename = argv[i]; + i++; + } + else if (strcmp(argv[i],"-s2") == 0) + { + i++; + if (i == argc) + { + usage(argv[0]); + return -2; + } + s2_filename = argv[i]; + i++; + } + else + { + usage(argv[0]); + return -3; + } + } + + /* print banner */ + fprintf(stderr,"adfuload " VERSION "\n"); + fprintf(stderr,"(C) Marcin Bukat 2013\n"); + fprintf(stderr,"This is free software; see the source for copying conditions. There is NO\n"); + fprintf(stderr,"warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.\n\n"); + + /* initialize libusb */ + libusb_init(NULL); + + hdev = libusb_open_device_with_vid_pid(NULL, VENDORID, PRODUCTID); + if (hdev == NULL) + { + fprintf(stderr, "[error]: can't open device with VID:PID=0x%0x:0x%0x\n", VENDORID, PRODUCTID); + libusb_exit(NULL); + return -4; + } + + ret = libusb_kernel_driver_active(hdev, 0); + + if (ret < 0) + { + fprintf(stderr, "[error]: checking kernel driver active\n"); + ret = -5; + goto end; + } + else + { + if (ret) + libusb_detach_kernel_driver(hdev, 0); + } + + ret = libusb_set_configuration(hdev, 1); + if (ret < 0) + { + fprintf(stderr, "[error]: could not select configuration (1)\n"); + ret = -6; + goto end; + } + + ret = libusb_claim_interface(hdev, 0); + if (ret < 0) + { + fprintf(stderr, "[error]: could not claim interface #0\n"); + ret = -7; + goto end; + } + + ret = libusb_set_interface_alt_setting(hdev, 0, 0); + if ( ret != LIBUSB_SUCCESS) + { + fprintf(stderr, "[error]: could not set alt setting for interface #0\n"); + ret = -8; + goto end; + } + + fp = fopen(s1_filename, "rb"); + + if (fp == NULL) + { + fprintf(stderr, "[error]: Could not open file \"%s\"\n", s1_filename); + ret = -10; + goto end; + } + + fseek(fp, 0, SEEK_END); + filesize = (uint32_t)ftell(fp); + fseek(fp, 0, SEEK_SET); + + filesize_round = ( (filesize + 511) / 512 ) * 512; + + buf = malloc(filesize_round); + + if (buf == NULL) + { + fprintf(stderr, "[error]: Cannot allocate %d bytes of memory\n", filesize_round); + ret = -11; + goto end_fclose; + } + + if (fread(buf, 1, filesize, fp) != filesize) + { + fprintf(stderr, "[error]: can't read file: %s\n", s1_filename); + ret = -12; + goto end_free; + } + + fclose(fp); + + fprintf(stderr, "[info]: file %s\n", s2_filename); + + if (encode) + { + fprintf(stderr, "[info]: encrypting binary\n"); + ret = encrypt(buf, filesize_round); + + if (ret) + { + fprintf(stderr, "[error]: can't encrypt binary\n"); + ret = -13; + goto end_free; + } + } + + adfu_upload(hdev, buf, filesize_round, 0xb4040000); + adfu_execute(hdev, 0xb4040000); + /* Now ADEC_N63.BIN should be operational */ + + /* upload custom binary and run it */ + fp = fopen(s2_filename, "rb"); + + if (fp == NULL) + { + fprintf(stderr, "[error]: could not open file \"%s\"\n", s2_filename); + ret = -20; + goto end; + } + + fseek(fp, 0, SEEK_END); + filesize = (uint32_t)ftell(fp); + fseek(fp, 0, SEEK_SET); + + buf = realloc(buf, filesize); + + if (buf == NULL) + { + fprintf(stderr, "[error]: can't allocate %d bytes of memory\n", filesize); + ret = -21; + goto end_fclose; + } + + if (fread(buf, 1, filesize, fp) != filesize) + { + fprintf(stderr, "[error]: can't read file: %s\n", s2_filename); + ret = -22; + goto end_free; + } + + fprintf(stderr, "[info]: file %s\n", s2_filename); + /* upload binary to the begining of DRAM */ + adfu_upload(hdev, buf, filesize, 0xa0000000); + adfu_execute(hdev, 0xa0000000); + +end_free: + free(buf); +end_fclose: + fclose(fp); +end: + libusb_close(hdev); + libusb_exit(NULL); + + return ret; +} diff --git a/utils/atj2137/adfuload/encrypt.c b/utils/atj2137/adfuload/encrypt.c new file mode 100644 index 0000000000..fee7a5a83d --- /dev/null +++ b/utils/atj2137/adfuload/encrypt.c @@ -0,0 +1,96 @@ +/*************************************************************************** + * __________ __ ___. + * Open \______ \ ____ ____ | | _\_ |__ _______ ___ + * Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ / + * Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < < + * Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \ + * \/ \/ \/ \/ \/ + * + * Copyright (C) 2013 by Amaury Pouly + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY + * KIND, either express or implied. + * + ****************************************************************************/ + +const unsigned char xor_key[512] = +{ + 0x9b, 0x94, 0xf6, 0x9e, 0x2f, 0x0a, 0x40, 0xfd, 0x9a, 0x78, 0x2c, 0xdd, 0x4f, 0x96, 0x5e, 0xdd, + 0xc9, 0x01, 0xd3, 0x9d, 0x71, 0x8f, 0xda, 0xbb, 0xc1, 0xdf, 0x5f, 0x01, 0xaa, 0x35, 0x6f, 0xdc, + 0x33, 0x85, 0xf9, 0x10, 0x64, 0xce, 0xd2, 0xab, 0x62, 0xaa, 0xfc, 0x37, 0xdb, 0x22, 0x28, 0x34, + 0xa4, 0xc6, 0x79, 0xc6, 0xa1, 0xfe, 0x8b, 0xaa, 0xe6, 0x9b, 0xb4, 0x6e, 0x1b, 0xb1, 0x8a, 0xe2, + 0x25, 0xa9, 0xa5, 0xca, 0x03, 0x92, 0xa6, 0xd5, 0xf5, 0xb8, 0x77, 0xd3, 0xe4, 0x78, 0xd5, 0x22, + 0xfe, 0x52, 0x0c, 0x69, 0xa1, 0x40, 0x02, 0x89, 0x7a, 0x46, 0x77, 0xd1, 0xee, 0x4b, 0x8b, 0x72, + 0xb8, 0x27, 0x81, 0x32, 0xd4, 0xfd, 0xc2, 0x64, 0x9c, 0xcb, 0x25, 0x17, 0x32, 0x3f, 0x6d, 0x8e, + 0x1d, 0xcd, 0x14, 0xf0, 0x37, 0xfe, 0x47, 0x41, 0xc6, 0x0b, 0x31, 0x91, 0xe9, 0xaa, 0x7c, 0x73, + 0x36, 0x28, 0x15, 0xb1, 0xa1, 0xb8, 0x30, 0x3e, 0x9f, 0x0b, 0x8d, 0x6c, 0x8c, 0x20, 0xf9, 0x5f, + 0x4a, 0x5e, 0x17, 0xc2, 0x2c, 0xe0, 0x60, 0xb8, 0x12, 0x10, 0x69, 0x16, 0xd5, 0x77, 0x64, 0xcf, + 0xe5, 0xd3, 0xea, 0xb0, 0x30, 0x6a, 0xf8, 0x4d, 0x46, 0x9f, 0x37, 0x3b, 0xbb, 0xc3, 0x80, 0x7f, + 0xcd, 0x2d, 0x9f, 0x47, 0x47, 0x8d, 0x57, 0xd8, 0xa6, 0x7d, 0xa7, 0xc8, 0x79, 0x59, 0x4c, 0x6d, + 0x0e, 0x51, 0x87, 0x95, 0x4a, 0xbc, 0x20, 0x77, 0xd9, 0xaf, 0xab, 0xea, 0x88, 0xcf, 0x0a, 0xd5, + 0xee, 0x63, 0x33, 0xe7, 0x52, 0xae, 0x34, 0x88, 0xc9, 0x7b, 0x74, 0x0f, 0x9f, 0xf9, 0x3b, 0x35, + 0xf8, 0xc9, 0x74, 0xc9, 0xb7, 0x56, 0xb2, 0xa6, 0x9f, 0x65, 0x72, 0xe3, 0xb8, 0xed, 0xa0, 0x49, + 0xf5, 0x28, 0x5c, 0x0a, 0x13, 0xea, 0xfd, 0xaf, 0xc4, 0x32, 0x56, 0x53, 0x0d, 0xfe, 0x39, 0x0f, + 0xed, 0x64, 0x3a, 0xb5, 0x3f, 0xdf, 0xb5, 0xc1, 0xe1, 0xe7, 0x13, 0x8c, 0x16, 0xc4, 0x48, 0xc3, + 0x29, 0xa3, 0xa0, 0x18, 0x54, 0xea, 0xbc, 0x37, 0xdf, 0xc9, 0xd7, 0xfc, 0x8c, 0x11, 0x4f, 0xe3, + 0x33, 0x4a, 0x60, 0xc0, 0xaa, 0x00, 0x32, 0xb0, 0xe7, 0x5d, 0x16, 0x4f, 0x69, 0xfd, 0x0c, 0x2b, + 0xd4, 0xfd, 0x8a, 0x79, 0xdb, 0x55, 0x78, 0x07, 0x62, 0x68, 0x7f, 0x72, 0xe4, 0xda, 0x83, 0x99, + 0x13, 0xa2, 0x6e, 0x51, 0xbf, 0x60, 0x30, 0x5b, 0xf9, 0xf0, 0x04, 0x93, 0x78, 0x3f, 0xf4, 0x69, + 0x3c, 0x5d, 0x9f, 0x95, 0x70, 0xd4, 0x3a, 0x07, 0x95, 0x39, 0xd5, 0x1d, 0xdd, 0x00, 0xdf, 0x19, + 0xd5, 0x94, 0xed, 0xd2, 0x47, 0xa8, 0xb7, 0xaa, 0x5f, 0xc7, 0x63, 0xbf, 0x0c, 0x33, 0x07, 0x66, + 0xa9, 0xec, 0x69, 0xd5, 0xdd, 0x0f, 0x09, 0x1f, 0xc0, 0x61, 0x61, 0x66, 0x3f, 0x2c, 0x6b, 0x4b, + 0xc1, 0x4a, 0x64, 0xaa, 0x0b, 0x7f, 0xd0, 0x85, 0x60, 0x0c, 0xbe, 0x3d, 0xed, 0x80, 0x4d, 0x08, + 0x65, 0xd2, 0x6f, 0x9f, 0xe9, 0xad, 0xed, 0x37, 0x2a, 0x0b, 0xab, 0x00, 0xd1, 0x05, 0x2e, 0x18, + 0x1f, 0xe9, 0x5b, 0x41, 0xd0, 0x8e, 0x81, 0xd4, 0x46, 0xe4, 0x9a, 0x74, 0xe3, 0xcf, 0xce, 0x38, + 0xb7, 0x36, 0x39, 0x5c, 0x5b, 0x57, 0xee, 0x37, 0x1c, 0x5d, 0x3c, 0x6d, 0x5c, 0x34, 0x30, 0x66, + 0x36, 0x9c, 0x5a, 0xff, 0x61, 0x7c, 0xd4, 0x7f, 0x57, 0x79, 0x81, 0xcc, 0xb6, 0xc8, 0x93, 0xdf, + 0xe6, 0x40, 0x50, 0x75, 0xfc, 0xb4, 0x15, 0x07, 0xde, 0x7f, 0x9b, 0xfd, 0xa8, 0x60, 0x79, 0x1f, + 0x4f, 0x89, 0xea, 0x4c, 0x85, 0xf2, 0xd1, 0x6e, 0xdc, 0xf3, 0xfa, 0xad, 0x2d, 0x12, 0xa3, 0xe3, + 0x3b, 0x1a, 0x3b, 0x50, 0x94, 0x6d, 0x69, 0x90, 0xb8, 0x9a, 0x50, 0xc9, 0x7d, 0x32, 0x12, 0x29, +}; + +static void perm_it(unsigned char *data, int length) +{ + int i, j; + for(i = 0; (i + 12) < length; i += 12) + { + unsigned char perm[8]; + perm[0] = data[i + 1]; + perm[1] = data[i + 7]; + perm[2] = data[i + 2]; + perm[3] = data[i + 4]; + perm[4] = data[i + 0]; + perm[5] = data[i + 6]; + perm[6] = data[i + 3]; + perm[7] = data[i + 5]; + for(j = 0; j < 8; j++) + data[i + j] = perm[j]; + } +} + +static void xor_it(unsigned char *data, int length) +{ + int i, j; + for(i = 0; i < length; i += 4) + { + unsigned char Ekey = xor_key[xor_key[data[i]] + 256]; + for(j = 1; j < 4; j++) + data[i + j] ^= Ekey; + } +} + +int encrypt(unsigned char *data, int length) +{ + if (length % 512) + return -1; + + xor_it(data, length); + perm_it(data, length); + + return 0; +} diff --git a/utils/atj2137/adfuload/encrypt.h b/utils/atj2137/adfuload/encrypt.h new file mode 100644 index 0000000000..ba64c945ef --- /dev/null +++ b/utils/atj2137/adfuload/encrypt.h @@ -0,0 +1,21 @@ +/*************************************************************************** + * __________ __ ___. + * Open \______ \ ____ ____ | | _\_ |__ _______ ___ + * Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ / + * Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < < + * Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \ + * \/ \/ \/ \/ \/ + * + * Copyright (C) 2013 by Amaury Pouly + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY + * KIND, either express or implied. + * + ****************************************************************************/ + +int encrypt(unsigned char *data, int length); -- cgit v1.2.3