panda/board/bootstub.c

77 lines
1.4 KiB
C
Raw Normal View History

2017-04-06 19:11:36 -06:00
#ifdef STM32F4
#define PANDA
#include "stm32f4xx.h"
#else
#include "stm32f2xx.h"
#endif
#include "early.h"
#include "libc.h"
2017-04-06 19:11:36 -06:00
2017-04-25 19:03:58 -06:00
#include "crypto/rsa.h"
#include "crypto/sha.h"
#include "obj/cert.h"
2017-04-27 21:32:16 -06:00
void lock_bootloader() {
if (FLASH->OPTCR & FLASH_OPTCR_nWRP_0) {
FLASH->OPTKEYR = 0x08192A3B;
FLASH->OPTKEYR = 0x4C5D6E7F;
// write protect the bootloader
FLASH->OPTCR &= ~FLASH_OPTCR_nWRP_0;
// OPT program
FLASH->OPTCR |= FLASH_OPTCR_OPTSTRT;
while (FLASH->SR & FLASH_SR_BSY);
// relock it
FLASH->OPTCR |= FLASH_OPTCR_OPTLOCK;
// reset
NVIC_SystemReset();
}
}
2017-04-06 19:11:36 -06:00
void __initialize_hardware_early() {
2017-04-28 10:29:31 -06:00
//lock_bootloader();
2017-04-06 19:11:36 -06:00
early();
}
2017-04-25 19:03:58 -06:00
void fail() {
enter_bootloader_mode = ENTER_BOOTLOADER_MAGIC;
NVIC_SystemReset();
}
2017-04-06 19:11:36 -06:00
int main() {
2017-04-17 14:57:34 -06:00
clock_init();
2017-04-25 19:03:58 -06:00
// validate length
int len = _app_start[0];
2017-04-26 11:41:57 -06:00
if (len < 8) fail();
2017-04-25 19:03:58 -06:00
// compute SHA hash
char digest[SHA_DIGEST_SIZE];
2017-04-26 11:41:57 -06:00
SHA_hash(&_app_start[1], len-4, digest);
2017-04-25 19:03:58 -06:00
// verify RSA signature
2017-04-28 16:06:01 -06:00
if (RSA_verify(&release_rsa_key, ((void*)&_app_start[0]) + len, RSANUMBYTES, digest, SHA_DIGEST_SIZE)) {
goto good;
2017-04-26 11:41:57 -06:00
}
2017-04-17 14:57:34 -06:00
2017-04-28 17:56:40 -06:00
// allow debug cert if unlocked
if ( ((FLASH->OPTCR>>8)&0xFF) == 0xAA ) {
if (RSA_verify(&debug_rsa_key, ((void*)&_app_start[0]) + len, RSANUMBYTES, digest, SHA_DIGEST_SIZE)) {
goto good;
}
2017-04-28 16:06:01 -06:00
}
// here is a failure
fail();
good:
2017-04-17 14:57:34 -06:00
// jump to flash
((void(*)()) _app_start[1])();
2017-04-06 19:11:36 -06:00
return 0;
}