2021-05-09 22:56:51 -04:00
|
|
|
/*
|
|
|
|
* SPDX-FileCopyrightText: 2018-2021 Espressif Systems (Shanghai) CO LTD
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*/
|
2018-04-16 11:35:41 -04:00
|
|
|
#pragma once
|
|
|
|
|
2019-04-16 05:01:31 -04:00
|
|
|
#include "bootloader_config.h"
|
2018-04-16 11:35:41 -04:00
|
|
|
#include "esp_image_format.h"
|
2019-05-27 02:29:43 -04:00
|
|
|
#include "bootloader_config.h"
|
2018-04-16 11:35:41 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Load partition table.
|
|
|
|
*
|
|
|
|
* Parse partition table, get useful data such as location of
|
|
|
|
* OTA data partition, factory app partition, and test app partition.
|
|
|
|
*
|
|
|
|
* @param[out] bs Bootloader state structure used to save read data.
|
|
|
|
* @return Return true if the partition table was succesfully loaded and MD5 checksum is valid.
|
|
|
|
*/
|
|
|
|
bool bootloader_utility_load_partition_table(bootloader_state_t* bs);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Return the index of the selected boot partition.
|
|
|
|
*
|
|
|
|
* This is the preferred boot partition, as determined by the partition table &
|
|
|
|
* any OTA sequence number found in OTA data.
|
|
|
|
* This partition will only be booted if it contains a valid app image, otherwise load_boot_image() will search
|
|
|
|
* for a valid partition using this selection as the starting point.
|
|
|
|
*
|
|
|
|
* @param[in] bs Bootloader state structure.
|
|
|
|
* @return Returns the index on success, INVALID_INDEX otherwise.
|
|
|
|
*/
|
|
|
|
int bootloader_utility_get_selected_boot_partition(const bootloader_state_t *bs);
|
|
|
|
|
|
|
|
/**
|
2018-04-19 00:42:26 -04:00
|
|
|
* @brief Load the selected partition and start application.
|
2018-04-16 11:35:41 -04:00
|
|
|
*
|
|
|
|
* Start from partition 'start_index', if not bootable then work backwards to FACTORY_INDEX
|
|
|
|
* (ie try any OTA slots in descending order and then the factory partition).
|
|
|
|
* If still nothing, start from 'start_index + 1' and work up to highest numbered OTA partition.
|
|
|
|
* If still nothing, try TEST_APP_INDEX.
|
2018-04-19 00:42:26 -04:00
|
|
|
* Everything this function calls must be located in the iram_loader_seg segment.
|
2018-04-16 11:35:41 -04:00
|
|
|
*
|
|
|
|
* @param[in] bs Bootloader state structure.
|
|
|
|
* @param[in] start_index The index from which the search for images begins.
|
|
|
|
*/
|
2018-04-19 00:42:26 -04:00
|
|
|
__attribute__((noreturn)) void bootloader_utility_load_boot_image(const bootloader_state_t *bs, int start_index);
|
2018-07-19 01:27:35 -04:00
|
|
|
|
2019-07-05 06:18:58 -04:00
|
|
|
#ifdef CONFIG_BOOTLOADER_SKIP_VALIDATE_IN_DEEP_SLEEP
|
|
|
|
/**
|
|
|
|
* @brief Load that application which was worked before we go to the deep sleep.
|
|
|
|
*
|
|
|
|
* Checks the reboot reason if it is the deep sleep and has a valid partition in the RTC memory
|
|
|
|
* then try to load the application which was worked before we go to the deep sleep.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void bootloader_utility_load_boot_image_from_deep_sleep(void);
|
|
|
|
#endif
|
2018-07-19 01:27:35 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Software reset the ESP32
|
|
|
|
*
|
|
|
|
* Bootloader code should call this in the case that it cannot proceed.
|
|
|
|
*
|
|
|
|
* It is not recommended to call this function from an app (if called, the app will abort).
|
|
|
|
*/
|
|
|
|
__attribute__((noreturn)) void bootloader_reset(void);
|
2019-04-16 05:01:31 -04:00
|
|
|
|
2020-04-30 09:30:15 -04:00
|
|
|
/**
|
|
|
|
* @brief Do any cleanup before exiting the bootloader, before starting the app or resetting
|
|
|
|
*/
|
|
|
|
void bootloader_atexit(void);
|
|
|
|
|
2019-04-16 05:01:31 -04:00
|
|
|
/**
|
|
|
|
* @brief Converts an array to a printable string.
|
|
|
|
*
|
|
|
|
* This function is useful for printing SHA-256 digest.
|
|
|
|
* \code{c}
|
|
|
|
* // Example of using. image_hash will be printed
|
|
|
|
* #define HASH_LEN 32 // SHA-256 digest length
|
|
|
|
* ...
|
|
|
|
* char hash_print[HASH_LEN * 2 + 1];
|
|
|
|
* hash_print[HASH_LEN * 2] = 0;
|
|
|
|
* bootloader_sha256_hex_to_str(hash_print, image_hash, HASH_LEN);
|
|
|
|
* ESP_LOGI(TAG, %s", hash_print);
|
|
|
|
* \endcode
|
|
|
|
|
|
|
|
* @param[out] out_str Output string
|
|
|
|
* @param[in] in_array_hex Pointer to input array
|
|
|
|
* @param[in] len Length of input array
|
|
|
|
*
|
|
|
|
* @return ESP_OK: Successful
|
|
|
|
* ESP_ERR_INVALID_ARG: Error in the passed arguments
|
|
|
|
*/
|
|
|
|
esp_err_t bootloader_sha256_hex_to_str(char *out_str, const uint8_t *in_array_hex, size_t len);
|
2019-05-27 02:29:43 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Debug log contents of a buffer as hexadecimal
|
|
|
|
*
|
|
|
|
* @note Only works if component log level is DEBUG or higher.
|
|
|
|
*
|
|
|
|
* @param buffer Buffer to log
|
|
|
|
* @param length Length of buffer in bytes. Maximum length 128 bytes.
|
|
|
|
* @param label Label to print at beginning of log line.
|
|
|
|
*/
|
|
|
|
void bootloader_debug_buffer(const void *buffer, size_t length, const char *label);
|
2020-02-24 14:51:41 -05:00
|
|
|
|
|
|
|
/** @brief Generates the digest of the data between offset & offset+length.
|
|
|
|
*
|
|
|
|
* This function should be used when the size of the data is larger than 3.2MB.
|
2020-11-10 02:40:01 -05:00
|
|
|
* The MMU capacity is 3.2MB (50 pages - 64KB each). This function generates the SHA-256
|
|
|
|
* of the data in chunks of 3.2MB, considering the MMU capacity.
|
|
|
|
*
|
2020-02-24 14:51:41 -05:00
|
|
|
* @param[in] flash_offset Offset of the data in flash.
|
|
|
|
* @param[in] len Length of data in bytes.
|
2020-11-10 02:40:01 -05:00
|
|
|
* @param[out] digest Pointer to buffer where the digest is written, if ESP_OK is returned.
|
|
|
|
*
|
2020-02-24 14:51:41 -05:00
|
|
|
* @return ESP_OK if secure boot digest is generated successfully.
|
|
|
|
*/
|
|
|
|
esp_err_t bootloader_sha256_flash_contents(uint32_t flash_offset, uint32_t len, uint8_t *digest);
|