mirror of
https://github.com/jialexd/sdk-ameba-v4.0c_180328.git
synced 2024-11-23 06:24:19 +00:00
1759 lines
55 KiB
C
Executable file
1759 lines
55 KiB
C
Executable file
/**
|
|
******************************************************************************
|
|
* @file rtl8711b_ota.c
|
|
* @author
|
|
* @version V1.0.0
|
|
* @date 2016-12-19
|
|
* @brief This file contains the code which is used to update firmware over the air(OTA) in local area network
|
|
*
|
|
* @verbatim
|
|
*
|
|
* ===================================================================
|
|
* How to use the local OTA upgrade code
|
|
* ===================================================================
|
|
* 1. Firstly, read the OTA related documents to know about how the code to realize updating firmware
|
|
* over the air(OTA), and some protocol included in it.
|
|
*
|
|
* 2. Read the source code and APIs in this file.
|
|
*
|
|
* 3. Porting this code in this file to the specified cloud platform according to the upgrade flow and parameters of
|
|
* the specified cloud service providers
|
|
*
|
|
* 4. Test the code after porting on the specified cloud platform.
|
|
*
|
|
* 5. Generate the release verision that will run in AmebaZ.
|
|
*
|
|
* ===================================================================
|
|
* the basic flow of the local ota upgrade code
|
|
* ===================================================================
|
|
* (1) AmebaZ connects to server
|
|
*
|
|
* (2) Receive newer firmware file header from server
|
|
*
|
|
* (3) Parse firmware file header and get the target OTA image header
|
|
*
|
|
* (4) Erase flash space for new firmware
|
|
*
|
|
* (5) Download new firmware from server and write it to flash
|
|
*
|
|
* (6) Verify checksum and update signature
|
|
*
|
|
* (7) OTA upgrade successfully, restart device
|
|
* @endverbatim
|
|
*
|
|
******************************************************************************
|
|
* @attention
|
|
*
|
|
* This module is a confidential and proprietary property of RealTek and
|
|
* possession or use of this module requires written permission of RealTek.
|
|
*
|
|
* Copyright(c) 2016, Realtek Semiconductor Corporation. All rights reserved.
|
|
******************************************************************************
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <FreeRTOS.h>
|
|
#include <task.h>
|
|
#include <lwip/sockets.h>
|
|
#include <sys.h>
|
|
|
|
#include "flash_api.h"
|
|
#include <device_lock.h>
|
|
#include "rtl8710b_ota.h"
|
|
#include "lwip/netdb.h"
|
|
|
|
#define OTA2_DEFAULT_ADDR (0x08080000)
|
|
|
|
#if CONFIG_CUSTOM_SIGNATURE
|
|
/* ---------------------------------------------------
|
|
* Customized Signature
|
|
* This signature can be used to verify the correctness of the image
|
|
* It will be located in fixed location in application image:
|
|
* (after 32B IMG2 header )
|
|
* ---------------------------------------------------*/
|
|
IMAGE2_CUSTOM_SIGNATURE
|
|
const unsigned char cus_sig_demo[32] = "Customer Signature-modelxxx";
|
|
#endif
|
|
|
|
#define STACK_SIZE 1024
|
|
#define TASK_PRIORITY tskIDLE_PRIORITY + 1
|
|
#define ETH_ALEN 6
|
|
|
|
#define SERVER_LOCAL 1
|
|
#define SERVER_CLOUD 2
|
|
#define UPDATE_DBG 1
|
|
|
|
#if (SERVER_TYPE == SERVER_LOCAL)
|
|
typedef struct
|
|
{
|
|
uint32_t ip_addr;
|
|
uint16_t port;
|
|
}update_cfg_local_t;
|
|
const update_file_img_id OtaImgId[2] =
|
|
{
|
|
{"OTA1"},
|
|
{"OTA2"}
|
|
};
|
|
|
|
const u8 RdpImg[4] = "RDP";
|
|
#endif
|
|
|
|
#if (SERVER_TYPE == SERVER_CLOUD)
|
|
#define REPOSITORY_LEN 16
|
|
#define FILE_PATH_LEN 64
|
|
typedef struct
|
|
{
|
|
uint8_t repository[REPOSITORY_LEN];
|
|
uint8_t file_path[FILE_PATH_LEN];
|
|
}update_cfg_cloud_t;
|
|
#endif
|
|
|
|
sys_thread_t TaskOTA = NULL;
|
|
//---------------------------------------------------------------------
|
|
void* ota_update_malloc(unsigned int size)
|
|
{
|
|
return pvPortMalloc(size);
|
|
}
|
|
|
|
//---------------------------------------------------------------------
|
|
void ota_update_free(void *buf)
|
|
{
|
|
vPortFree(buf);
|
|
}
|
|
|
|
//---------------------------------------------------------------------
|
|
#if (SERVER_TYPE == SERVER_LOCAL)
|
|
/**
|
|
reset CPU
|
|
*/
|
|
void ota_platform_reset(void)
|
|
{
|
|
//wifi_off();
|
|
|
|
/* Set processor clock to default before system reset */
|
|
//HAL_WRITE32(SYSTEM_CTRL_BASE, REG_SYS_CLK_CTRL1, 0x00000021);
|
|
CPU_ClkSet(CLK_31_25M);
|
|
osDelay(100);
|
|
|
|
|
|
/* CPU reset: Cortex-M3 SCB->AIRCR*/
|
|
NVIC_SystemReset();
|
|
}
|
|
|
|
/**
|
|
write OTA2 address to the first Dword in the system data space
|
|
ota_addr: OTA2 address
|
|
*/
|
|
int ota_write_ota2_addr(uint32_t ota_addr)
|
|
{
|
|
uint32_t data;
|
|
/* Get upgraded image 2 addr from offset */
|
|
data = HAL_READ32(SPI_FLASH_BASE, OFFSET_DATA);
|
|
printf("\n\r[%s] data 0x%x ota_addr 0x%x", __FUNCTION__, data, ota_addr);
|
|
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
/* erase old data if needed, write new data*/
|
|
if ((data != 0xFFFFFFFF) && (data != ota_addr)) {
|
|
FLASH_EreaseDwordsXIP(OFFSET_DATA, 1);
|
|
FLASH_TxData12BXIP(OFFSET_DATA, 4, (u8*)&ota_addr);
|
|
}
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* get current image2 OTA index: OTA_INDEX_1 or OTA_INDEX_2 */
|
|
u32 ota_get_cur_index(void)
|
|
{
|
|
u32 check_addr = (u32)cus_sig_demo;
|
|
|
|
if (check_addr == OTA1_ADDR + IMAGE_HEADER_LEN)
|
|
return OTA_INDEX_1;
|
|
else
|
|
return OTA_INDEX_2;
|
|
}
|
|
|
|
#if SINGLE_IMG_OTA_UPGRADE
|
|
|
|
/**
|
|
receive file_info from server. This operation is patched for the compatibility with ameba1
|
|
Recvbuf: point for receiving buffer
|
|
len: length of file info
|
|
socket: socket handle
|
|
*/
|
|
u32 recv_file_info_from_server(u8 * Recvbuf, u32 len, int socket)
|
|
{
|
|
int read_bytes = 0;
|
|
u32 TempLen;
|
|
u8 * buf;
|
|
|
|
/*read 4 Dwords from server, get image header number and header length*/
|
|
buf = Recvbuf;
|
|
TempLen = len;
|
|
while(TempLen > 0) {
|
|
read_bytes = read(socket, buf, TempLen);
|
|
if(read_bytes < 0){
|
|
printf("\n\r[%s] read socket failed\n", __FUNCTION__);
|
|
goto error;
|
|
}
|
|
if(read_bytes == 0) {
|
|
break;
|
|
}
|
|
TempLen -= read_bytes;
|
|
buf += read_bytes;
|
|
}
|
|
|
|
return 1;
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
receive OTA firmware file header from server
|
|
Recvbuf: pointer to buffer for receiving OTA header of firmware file
|
|
len: data length to be received from server
|
|
pOtaTgtHdr: point to target image OTA header
|
|
socket: socket handle
|
|
*/
|
|
u32 recv_ota_file_hdr(u8 * Recvbuf, u32 * len, update_ota_target_hdr * pOtaTgtHdr, int socket)
|
|
{
|
|
int read_bytes = 0;
|
|
u32 TempLen;
|
|
u8 * buf;
|
|
update_file_hdr * pOtaFileHdr;
|
|
update_file_img_hdr * pOtaFileImgHdr;
|
|
|
|
/*read 4 Dwords from server, get image header number and header length*/
|
|
buf = Recvbuf;
|
|
TempLen = 16;
|
|
while(TempLen > 0) {
|
|
read_bytes = read(socket, buf, TempLen);
|
|
if(read_bytes < 0){
|
|
printf("\n\r[%s] read socket failed\n", __FUNCTION__);
|
|
goto error;
|
|
}
|
|
if(read_bytes == 0) {
|
|
break;
|
|
}
|
|
TempLen -= read_bytes;
|
|
buf += read_bytes;
|
|
}
|
|
|
|
pOtaFileHdr = (update_file_hdr *)Recvbuf;
|
|
pOtaFileImgHdr = (update_file_img_hdr *)(Recvbuf + 8);
|
|
|
|
pOtaTgtHdr->FileHdr.FwVer = pOtaFileHdr->FwVer;
|
|
pOtaTgtHdr->FileHdr.HdrNum = pOtaFileHdr->HdrNum;
|
|
|
|
/*read the remaining Header info*/
|
|
buf = Recvbuf + 16;
|
|
TempLen = (pOtaFileHdr->HdrNum * pOtaFileImgHdr->ImgHdrLen) - 8;
|
|
while(TempLen > 0) {
|
|
read_bytes = read(socket, buf, TempLen);
|
|
if(read_bytes < 0){
|
|
printf("\n\r[%s] read socket failed\n", __FUNCTION__);
|
|
goto error;
|
|
}
|
|
if(read_bytes == 0) {
|
|
break;
|
|
}
|
|
TempLen -= read_bytes;
|
|
buf += read_bytes;
|
|
}
|
|
|
|
*len = (pOtaFileHdr->HdrNum * pOtaFileImgHdr->ImgHdrLen) + 8;
|
|
|
|
return 1;
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
parse firmware file header and get the desired OTA header
|
|
buf: point to buffer for receiving OTA header of new firmware
|
|
len: data length to be received from server
|
|
pOtaTgtHdr:point to target image OTA header
|
|
ImgId: point to image identification strings
|
|
*/
|
|
u32 get_ota_tartget_header(u8* buf, u32 len, update_ota_target_hdr * pOtaTgtHdr, u8 * ImgId)
|
|
{
|
|
update_file_img_hdr * ImgHdr;
|
|
update_file_hdr * FileHdr;
|
|
u8 * pTempAddr;
|
|
u32 i;
|
|
u32 ImageFg = 0;
|
|
|
|
pOtaTgtHdr->RdpStatus = DISABLE;
|
|
|
|
/*check if buf and len is valid or not*/
|
|
if((len < (sizeof(update_file_img_hdr) + 8)) || (!buf)) {
|
|
goto error;
|
|
}
|
|
|
|
FileHdr = (update_file_hdr *)buf;
|
|
ImgHdr = (update_file_img_hdr *)(buf + 8);
|
|
pTempAddr = buf + 8;
|
|
|
|
if(len < (FileHdr->HdrNum * ImgHdr->ImgHdrLen + 8)) {
|
|
goto error;
|
|
}
|
|
|
|
/*get the target OTA header from the new firmware file header*/
|
|
for(i = 0; i < FileHdr->HdrNum; i++) {
|
|
pTempAddr = buf + 8 + ImgHdr->ImgHdrLen * i;
|
|
|
|
/*check OTA header*/
|
|
if(strncmp(ImgId, pTempAddr, 4) == 0) {
|
|
ImageFg = 1;
|
|
_memcpy((u8*)(&pOtaTgtHdr->FileImgHdr), pTempAddr, sizeof(update_file_img_hdr));
|
|
continue;
|
|
}
|
|
|
|
/*check RDP header*/
|
|
if(strncmp(RdpImg, pTempAddr, 3) == 0) {
|
|
DBG_8195A("there exists RDP image in firmware file\n");
|
|
pOtaTgtHdr->RdpStatus = ENABLE;
|
|
ImageFg = 1;
|
|
_memcpy((u8*)(&pOtaTgtHdr->FileRdpHdr), pTempAddr, sizeof(update_file_img_hdr));
|
|
continue;
|
|
}
|
|
|
|
if(i == FileHdr->HdrNum - 1) {
|
|
if(ImageFg == 0) {
|
|
printf("\n\r[%s] no matched image\n", __FUNCTION__);
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
erase the flash space for new firmware
|
|
addr: new image address
|
|
len: new image length
|
|
*/
|
|
void erase_ota_target_flash( u32 addr, u32 len)
|
|
{
|
|
u32 NewImg2BlkSize;
|
|
u32 i;
|
|
flash_t * flash;
|
|
/* Erase upgraded image 2 region */
|
|
printf("\n\r[%s] NewImg2Len %d ", __FUNCTION__, len);
|
|
NewImg2BlkSize = ((len - 1)/4096) + 1;
|
|
|
|
printf("\n\r[%s] NewImg2BlkSize %d 0x%8x", __FUNCTION__, NewImg2BlkSize, NewImg2BlkSize);
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
for( i = 0; i < NewImg2BlkSize; i++)
|
|
flash_erase_sector(flash, addr -SPI_FLASH_BASE + i * 4096);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
}
|
|
|
|
/**
|
|
download new firmware from server and write it to flash
|
|
addr: new image address
|
|
socket: socket handle
|
|
pOtaTgtHdr: point to target image OTA header
|
|
signature: point to signature strings
|
|
*/
|
|
s32 download_new_fw_from_server(u32 addr, int socket, update_ota_target_hdr * pOtaTgtHdr, u8 * signature)
|
|
{
|
|
u8 * alloc;
|
|
u8 * buf;
|
|
s32 size = 0;
|
|
int read_bytes;
|
|
int read_bytes_buf;
|
|
u32 TempLen;
|
|
flash_t flash;
|
|
u32 ImageCnt;
|
|
update_dw_info DownloadInfo[2];
|
|
/*initialize the variables used in downloading procedure*/
|
|
u32 OtaFg = 0;
|
|
u32 IncFg = 0;
|
|
s32 RemainBytes;
|
|
u32 SigCnt = 0;
|
|
u32 TempCnt = 0;
|
|
u32 i;
|
|
s32 OtaImgSize;
|
|
|
|
/*acllocate buffer for downloading image from server*/
|
|
alloc = ota_update_malloc(BUF_SIZE);
|
|
|
|
buf = alloc;
|
|
|
|
/*init download information buffer*/
|
|
memset((u8 *)&DownloadInfo, 0, 2*sizeof(update_dw_info));
|
|
|
|
/*arrange OTA/RDP image download information*/
|
|
if(pOtaTgtHdr->RdpStatus == ENABLE) {
|
|
ImageCnt = 2;
|
|
if(pOtaTgtHdr->FileImgHdr.Offset < pOtaTgtHdr->FileRdpHdr.Offset) {
|
|
DownloadInfo[0].ImgId = OTA_IMAG;
|
|
/* get OTA image and Write New Image to flash, skip the signature,
|
|
not write signature first for power down protection*/
|
|
DownloadInfo[0].FlashAddr = addr -SPI_FLASH_BASE + 8;
|
|
DownloadInfo[0].ImageLen = pOtaTgtHdr->FileImgHdr.ImgLen - 8;/*skip the signature*/
|
|
DownloadInfo[0].ImgOffset = pOtaTgtHdr->FileImgHdr.Offset;
|
|
DownloadInfo[1].ImgId = RDP_IMAG;
|
|
DownloadInfo[1].FlashAddr = RDP_FLASH_ADDR - SPI_FLASH_BASE;
|
|
DownloadInfo[1].ImageLen = pOtaTgtHdr->FileRdpHdr.ImgLen;
|
|
DownloadInfo[1].ImgOffset = pOtaTgtHdr->FileRdpHdr.Offset;
|
|
} else {
|
|
DownloadInfo[0].ImgId = RDP_IMAG;
|
|
DownloadInfo[0].FlashAddr = RDP_FLASH_ADDR - SPI_FLASH_BASE;
|
|
DownloadInfo[0].ImageLen = pOtaTgtHdr->FileRdpHdr.ImgLen;
|
|
DownloadInfo[0].ImgOffset = pOtaTgtHdr->FileRdpHdr.Offset;
|
|
DownloadInfo[1].ImgId = OTA_IMAG;
|
|
/* get OTA image and Write New Image to flash, skip the signature,
|
|
not write signature first for power down protection*/
|
|
DownloadInfo[1].FlashAddr = addr -SPI_FLASH_BASE + 8;
|
|
DownloadInfo[1].ImageLen = pOtaTgtHdr->FileImgHdr.ImgLen - 8;/*skip the signature*/
|
|
DownloadInfo[1].ImgOffset = pOtaTgtHdr->FileImgHdr.Offset;
|
|
}
|
|
}else {
|
|
ImageCnt = 1;
|
|
DownloadInfo[0].ImgId = OTA_IMAG;
|
|
/* get OTA image and Write New Image to flash, skip the signature,
|
|
not write signature first for power down protection*/
|
|
DownloadInfo[0].FlashAddr = addr -SPI_FLASH_BASE + 8;
|
|
DownloadInfo[0].ImageLen = pOtaTgtHdr->FileImgHdr.ImgLen - 8;/*skip the signature*/
|
|
DownloadInfo[0].ImgOffset = pOtaTgtHdr->FileImgHdr.Offset;
|
|
}
|
|
|
|
/*initialize the reveiving counter*/
|
|
TempLen = (pOtaTgtHdr->FileHdr.HdrNum * pOtaTgtHdr->FileImgHdr.ImgHdrLen) + sizeof(update_file_hdr);
|
|
|
|
printf("\n\r OTA Image Address = %x\n", addr);
|
|
if(pOtaTgtHdr->RdpStatus == ENABLE) {
|
|
printf("\n\r RDP Image Address = %x\n", RDP_FLASH_ADDR);
|
|
}
|
|
|
|
/*downloading parse the OTA and RDP image from the data stream sent by server*/
|
|
for(i = 0; i < ImageCnt; i++) {
|
|
/*the next image length*/
|
|
RemainBytes = DownloadInfo[i].ImageLen;
|
|
/*download the new firmware from server*/
|
|
while(RemainBytes > 0){
|
|
buf = alloc;
|
|
if(IncFg == 1) {
|
|
IncFg = 0;
|
|
read_bytes = read_bytes_buf;
|
|
} else {
|
|
memset(buf, 0, BUF_SIZE);
|
|
read_bytes = read(socket, buf, BUF_SIZE);
|
|
if(read_bytes == 0){
|
|
break; // Read end
|
|
}
|
|
if(read_bytes < 0){
|
|
OtaImgSize = -1;
|
|
printf("\n\r[%s] Read socket failed", __FUNCTION__);
|
|
goto exit;
|
|
}
|
|
read_bytes_buf = read_bytes;
|
|
TempLen += read_bytes;
|
|
}
|
|
|
|
if(TempLen > DownloadInfo[i].ImgOffset) {
|
|
if(!OtaFg) { /*reach the desired image, the first packet process*/
|
|
OtaFg = 1;
|
|
TempCnt = TempLen -DownloadInfo[i].ImgOffset;
|
|
if(DownloadInfo[i].ImgId == OTA_IMAG) {
|
|
if(TempCnt < 8) {
|
|
SigCnt = TempCnt;
|
|
} else {
|
|
SigCnt = 8;
|
|
}
|
|
|
|
_memcpy(signature, buf + read_bytes -TempCnt, SigCnt);
|
|
|
|
if((SigCnt < 8) || (TempCnt -8 == 0)) {
|
|
continue;
|
|
}
|
|
|
|
buf = buf + (read_bytes -TempCnt + 8);
|
|
read_bytes = TempCnt -8;
|
|
} else {
|
|
buf = buf + read_bytes -TempCnt;
|
|
read_bytes = TempCnt;
|
|
}
|
|
} else { /*normal packet process*/
|
|
if(DownloadInfo[i].ImgId == OTA_IMAG) {
|
|
if(SigCnt < 8) {
|
|
if(read_bytes < (8 -SigCnt)) {
|
|
_memcpy(signature + SigCnt, buf, read_bytes);
|
|
SigCnt += read_bytes;
|
|
continue;
|
|
} else {
|
|
_memcpy(signature + SigCnt, buf, (8 -SigCnt));
|
|
buf = buf + (8 - SigCnt);
|
|
read_bytes -= (8 - SigCnt) ;
|
|
SigCnt = 8;
|
|
if(!read_bytes) {
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
RemainBytes -= read_bytes;
|
|
if(RemainBytes < 0) {
|
|
read_bytes = read_bytes -(-RemainBytes);
|
|
}
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
if(flash_stream_write(&flash, DownloadInfo[i].FlashAddr + size, read_bytes, buf) < 0){
|
|
printf("\n\r[%s] Write sector failed", __FUNCTION__);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
goto exit;
|
|
}
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
size += read_bytes;
|
|
}
|
|
|
|
}
|
|
/*if complete downloading OTA image, acquire the image size*/
|
|
if(DownloadInfo[i].ImgId == OTA_IMAG) {
|
|
OtaImgSize = size;
|
|
}
|
|
/*update flag status*/
|
|
size = 0;
|
|
OtaFg = 0;
|
|
IncFg = 1;
|
|
}
|
|
|
|
exit:
|
|
|
|
ota_update_free(alloc);
|
|
|
|
return OtaImgSize;
|
|
|
|
}
|
|
|
|
/**
|
|
verify new firmware checksum
|
|
addr: new image address
|
|
len: new image length
|
|
signature: point to signature strings
|
|
pOtaTgtHdr: point to target image OTA header
|
|
*/
|
|
u32 verify_ota_checksum(u32 addr, u32 len, u8 * signature, update_ota_target_hdr * pOtaTgtHdr)
|
|
{
|
|
u32 i;
|
|
flash_t flash;
|
|
u32 flash_checksum=0;
|
|
u32 rdp_checksum=0;
|
|
#if CONFIG_CUSTOM_SIGNATURE
|
|
uint32_t read_custom_sig[8];
|
|
#endif
|
|
u32 NewImg2BlkSize;
|
|
NewImg2BlkSize = ((len - 1)/4096) + 1;
|
|
u8 * pTempbuf;
|
|
int k;
|
|
int rlen;
|
|
|
|
#if CONFIG_CUSTOM_SIGNATURE
|
|
/*unmask the upgrade space to read the signature in new firmware*/
|
|
OTF_Mask(1, (addr - SPI_FLASH_BASE), NewImg2BlkSize, 0);
|
|
|
|
/* check custom signature */
|
|
_memcpy(read_custom_sig, (void const*)(addr + IMAGE_HEADER_LEN), 32);
|
|
printf("\n\r[%s] read_custom_sig %s\n", __FUNCTION__ , (char*)read_custom_sig);
|
|
Cache_Flush();
|
|
|
|
if (strcmp((char*)read_custom_sig, cus_sig_demo)) {
|
|
goto error;
|
|
}
|
|
#endif
|
|
|
|
/*the upgrade space should be masked, because the encrypt firmware is used
|
|
for checksum calculation*/
|
|
OTF_Mask(1, (addr - SPI_FLASH_BASE), NewImg2BlkSize, 1);
|
|
|
|
pTempbuf = ota_update_malloc(BUF_SIZE);
|
|
|
|
/* read flash data back and calculate checksum */
|
|
for(i=0;i<len;i+=BUF_SIZE){
|
|
rlen = (len-i)>BUF_SIZE?BUF_SIZE:(len-i);
|
|
flash_stream_read(&flash, addr - SPI_FLASH_BASE+i+8, rlen, pTempbuf);
|
|
Cache_Flush();
|
|
for(k=0;k<rlen;k++)
|
|
flash_checksum+=pTempbuf[k];
|
|
}
|
|
/*add signature's checksum*/
|
|
for(i = 0; i < 8; i++) {
|
|
flash_checksum += signature[i];
|
|
}
|
|
|
|
printf("\n\rUpdate file size = %d flash checksum 0x%8x attached checksum 0x%8x\n", len, flash_checksum, pOtaTgtHdr->FileImgHdr.Checksum);
|
|
|
|
/*mask the rdp flash space to read the rdp image and calculate the checksum*/
|
|
if(pOtaTgtHdr->RdpStatus == ENABLE) {
|
|
for(i = 0; i < pOtaTgtHdr->FileRdpHdr.ImgLen; i++) {
|
|
flash_stream_read(&flash, RDP_FLASH_ADDR - SPI_FLASH_BASE+i, 1, pTempbuf);
|
|
Cache_Flush();
|
|
rdp_checksum += pTempbuf[0];
|
|
}
|
|
}
|
|
|
|
OTF_Mask(1, (addr - SPI_FLASH_BASE), NewImg2BlkSize, 0);
|
|
|
|
ota_update_free(pTempbuf);
|
|
|
|
if(flash_checksum != pOtaTgtHdr->FileImgHdr.Checksum) {
|
|
printf("\n\r OTA image checksum error!!!\n");
|
|
goto error;
|
|
} else {
|
|
printf("\n\r OTA image checksum ok!!!\n");
|
|
}
|
|
|
|
if(pOtaTgtHdr->RdpStatus == ENABLE) {
|
|
if(rdp_checksum != pOtaTgtHdr->FileRdpHdr.Checksum) {
|
|
printf("\n\r RDP image checksum error!!!\n");
|
|
goto error;
|
|
} else {
|
|
printf("\n\r RDP image checksum ok!!!\n");
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
update signature
|
|
addr: new image address
|
|
*/
|
|
u32 change_ota_signature(u32 addr, u8 * signature, u32 ota_target_index)
|
|
{
|
|
flash_t flash;
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
/*write the signature finally*/
|
|
if(flash_stream_write(&flash, addr - SPI_FLASH_BASE, 8, signature) < 0){
|
|
printf("\n\r[%s] Write sector failed", __FUNCTION__);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
goto error;
|
|
}
|
|
OTA_Change(ota_target_index);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
printf("\n\r[%s] Update OTA success!", __FUNCTION__);
|
|
return 1;
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
get the address for arranging new firmware and check new address validity
|
|
*/
|
|
u32 get_ota_address(u32 ota_target_index, u32 * new_addr, update_ota_target_hdr * pOtaTgtHdr)
|
|
{
|
|
IMAGE_HEADER *OTA1Hdr = NULL;
|
|
uint32_t OTA1Len = 0;
|
|
IMAGE_HEADER *FlashImgDataHdr = NULL;
|
|
uint32_t ota2_addr;
|
|
|
|
ota2_addr = HAL_READ32(SPI_FLASH_BASE, OFFSET_DATA);
|
|
|
|
printf("ota2_addr = %x\n", ota2_addr);
|
|
|
|
/*if the OTA2 address is not programmed in system data zone, the default OTA2
|
|
address is used. This operation is just used in the local OTA update demo. For the
|
|
cloud OTA upgrade based on this demo, this operation may not be used.*/
|
|
if(ota2_addr == 0xffffffff) {
|
|
ota_write_ota2_addr(OTA2_DEFAULT_ADDR);
|
|
ota2_addr = HAL_READ32(SPI_FLASH_BASE, OFFSET_DATA);
|
|
}
|
|
|
|
if((ota2_addr%4096) != 0) {
|
|
printf("\n\r[%s] ota addr in sys data space not 4k aligned 0x%x", __FUNCTION__, ota2_addr);
|
|
goto error;
|
|
}
|
|
|
|
if(ota_target_index == OTA_INDEX_2) {
|
|
/* OAT2 address should not in OTA1 image & should 4K alignment */
|
|
OTA1Hdr = (IMAGE_HEADER *)(OTA1_ADDR);
|
|
OTA1Len = OTA1Hdr->image_size;
|
|
FlashImgDataHdr = (IMAGE_HEADER *)((u32)OTA1Hdr + OTA1Len + IMAGE_HEADER_LEN);
|
|
if ((ota2_addr < ((u32)FlashImgDataHdr + FlashImgDataHdr->image_size + IMAGE_HEADER_LEN)) && ((ota2_addr & 0xfff) == 0)) {
|
|
printf("\n\r[%s] illegal ota addr 0x%x", __FUNCTION__, ota2_addr);
|
|
goto error;
|
|
}
|
|
*new_addr = ota2_addr;
|
|
} else {
|
|
*new_addr = OTA1_ADDR;
|
|
/* if OTA1 will be update, image size should not cross OTA2 */
|
|
if(pOtaTgtHdr->FileImgHdr.ImgLen > (ota2_addr - *new_addr)) {
|
|
printf("\n\r[%s] illegal new image length 0x%x", __FUNCTION__, pOtaTgtHdr->FileImgHdr.ImgLen);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/*if the flash offset parameter of the corresponding OTA index in file firmware header received from
|
|
server is needed in cloud OTA upgrade based on this demo, add code here*/
|
|
#if 1
|
|
/*check the OTA Image Address*/
|
|
if((*new_addr) != pOtaTgtHdr->FileImgHdr.FlashOffset){
|
|
printf("\n\r[%s] pOtaTgtHdr->FileImgHdr.FlashOffset = %p\n", __FUNCTION__, pOtaTgtHdr->FileImgHdr.FlashOffset);
|
|
/*add code for cloud OTA upgrade use*/
|
|
#if 1
|
|
goto error;
|
|
#endif
|
|
}
|
|
#endif
|
|
|
|
if(*new_addr == 0xFFFFFFFF) {
|
|
printf("\n\r[%s] update address is invalid \n", __FUNCTION__);
|
|
goto error;
|
|
}
|
|
|
|
return 1;
|
|
|
|
error:
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* @brief OTA upgrade task for single image method
|
|
* step1: connect to server
|
|
* step2: receive firmware file header
|
|
* step3: parse firmware file header and get the target OTA image header
|
|
* step4: erase flash space for new firmware
|
|
* step5: download new firmware from server and write it to flash
|
|
* step6: verify checksum and update signature
|
|
* step7: OTA upgrade successfully, restart device
|
|
* @retval None
|
|
*/
|
|
static void ota_update_single_img_local_task(void *param)
|
|
{
|
|
int server_socket;
|
|
struct sockaddr_in server_addr;
|
|
unsigned char *buf, *alloc;
|
|
int read_bytes = 0, size = 0;
|
|
update_cfg_local_t *cfg = (update_cfg_local_t *)param;
|
|
flash_t flash;
|
|
uint32_t NewImg2Len = 0, NewImg2Addr = 0, file_info[3];
|
|
int ret = -1 ;
|
|
uint32_t ota_target_index = OTA_INDEX_2;
|
|
update_ota_target_hdr OtaTargetHdr;
|
|
char * pImgId;
|
|
u32 RevHdrLen;
|
|
u8 signature[9] = {0};
|
|
|
|
memset((u8 *)&OtaTargetHdr, 0, sizeof(update_ota_target_hdr));
|
|
|
|
printf("\n\r[%s] Update task start\n", __FUNCTION__);
|
|
alloc = ota_update_malloc(BUF_SIZE);
|
|
if(!alloc){
|
|
printf("\n\r[%s] Alloc buffer failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/*-------------------step1: connect to server-------------------*/
|
|
server_socket = socket(AF_INET, SOCK_STREAM, 0);
|
|
if(server_socket < 0){
|
|
printf("\n\r[%s] Create socket failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
server_addr.sin_family = AF_INET;
|
|
server_addr.sin_addr.s_addr = cfg->ip_addr;
|
|
server_addr.sin_port = cfg->port;
|
|
|
|
if(connect(server_socket, (struct sockaddr *)&server_addr, sizeof(server_addr)) == -1){
|
|
printf("\n\r[%s] socket connect failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
DBG_INFO_MSG_OFF(_DBG_SPI_FLASH_);
|
|
/* check OTA index we should update */
|
|
if (ota_get_cur_index() == OTA_INDEX_1) {
|
|
ota_target_index = OTA_INDEX_2;
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("OTA2 address space will be upgraded\n");
|
|
#endif
|
|
} else {
|
|
ota_target_index = OTA_INDEX_1;
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("OTA1 address space will be upgraded\n");
|
|
#endif
|
|
}
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("ota_target_index = %d\n", ota_target_index);
|
|
#endif
|
|
|
|
/*=============receive file_info[] from server=====================*/
|
|
/*Because Ameba1 has this operation below. For the compatibility, AmebaZ also do this.
|
|
This file_info includes the file_size and checksum information of the total firmware file
|
|
(Firmware Header + OTA1+OTA2...). Even though the file_info is received from server
|
|
in this step, however, it won't be used for AmebaZ.*/
|
|
/*clear file_info buffer*/
|
|
memset(file_info, 0, sizeof(file_info));
|
|
if(!recv_file_info_from_server((u8 *)file_info, sizeof(file_info), server_socket)) {
|
|
printf("\n\r[%s] receive file_info failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
printf("file_info[0] (checksum)= %p\n", file_info[0]);
|
|
printf("file_info[1] (NULL)= %p\n", file_info[1]);
|
|
printf("file_info[2] (file size)= %p\n", file_info[2]);
|
|
|
|
/*----------------step2: receive firmware file header---------------------*/
|
|
if(!recv_ota_file_hdr(alloc, &RevHdrLen, &OtaTargetHdr, server_socket)) {
|
|
printf("\n\r[%s] rev firmware header failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
pImgId = (char *)(&OtaImgId[ota_target_index]);
|
|
printf("\n\rTempBuf = %s\n",pImgId);
|
|
|
|
/* -----step3: parse firmware file header and get the target OTA image header-----*/
|
|
if(!get_ota_tartget_header(alloc, RevHdrLen, &OtaTargetHdr, pImgId)) {
|
|
printf("\n\rget OTA header failed\n");
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
ota_update_free(alloc);
|
|
|
|
/*get new image addr and check new address validity*/
|
|
if(!get_ota_address(ota_target_index, &NewImg2Addr, &OtaTargetHdr)) {
|
|
printf("\n\rget OTA address failed\n");
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/*get new image length from the firmware header*/
|
|
NewImg2Len = OtaTargetHdr.FileImgHdr.ImgLen;
|
|
|
|
/*-------------------step4: erase flash space for new firmware--------------*/
|
|
/*erase flash space new OTA image */
|
|
erase_ota_target_flash(NewImg2Addr, NewImg2Len);
|
|
/*erase flash space for new RDP image*/
|
|
if(OtaTargetHdr.RdpStatus == ENABLE) {
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
flash_erase_sector(&flash, RDP_FLASH_ADDR - SPI_FLASH_BASE);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
}
|
|
|
|
|
|
/*---------step5: download new firmware from server and write it to flash--------*/
|
|
size = download_new_fw_from_server(NewImg2Addr, server_socket, &OtaTargetHdr, signature);
|
|
if((size < 0) || (size != (OtaTargetHdr.FileImgHdr.ImgLen - 8))) {
|
|
printf("\n\rdownload new firmware failed\n");
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
printf("\nsize = %x\n", size);
|
|
printf("\nbuffer signature is: = %s",signature);
|
|
|
|
/*-------------step6: verify checksum and update signature-----------------*/
|
|
if(verify_ota_checksum(NewImg2Addr, size, signature, &OtaTargetHdr)){
|
|
if(!change_ota_signature(NewImg2Addr, signature, ota_target_index)) {
|
|
printf("\n%s: change signature failed\n");
|
|
goto update_ota_exit;
|
|
}
|
|
ret = 0;
|
|
} else {
|
|
/*if checksum error, clear the signature zone which has been
|
|
written in flash in case of boot from the wrong firmware*/
|
|
#if 1
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
flash_erase_sector(&flash, NewImg2Addr - SPI_FLASH_BASE);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
#endif
|
|
}
|
|
|
|
update_ota_exit:
|
|
if(alloc)
|
|
ota_update_free(alloc);
|
|
if(server_socket >= 0)
|
|
close(server_socket);
|
|
if(param)
|
|
ota_update_free(param);
|
|
|
|
TaskOTA = NULL;
|
|
printf("\n\r[%s] Update task exit", __FUNCTION__);
|
|
/*-------------step7: OTA upgrade successfully, restart device------------*/
|
|
if(!ret){
|
|
printf("\n\r[%s] Ready to reboot", __FUNCTION__);
|
|
ota_platform_reset();
|
|
}
|
|
vTaskDelete(NULL);
|
|
return;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void ota_update_local_task(void *param)
|
|
{
|
|
int server_socket;
|
|
struct sockaddr_in server_addr;
|
|
unsigned char *buf, *alloc;
|
|
union { uint32_t u; unsigned char c[4]; } file_checksum;
|
|
int read_bytes = 0, write_bytes = 0, size = 0, i = 0;
|
|
update_cfg_local_t *cfg = (update_cfg_local_t *)param;
|
|
uint32_t address, flash_checksum=0;
|
|
flash_t flash;
|
|
uint32_t NewImg2BlkSize = 0, NewImg2Len = 0, NewImg2Addr = 0, file_info[3];
|
|
uint32_t OTA1Len = 0;
|
|
int ret = -1 ;
|
|
uint32_t ota2_addr = OTA2_ADDR;
|
|
IMAGE_HEADER *OTA1Hdr = NULL;
|
|
IMAGE_HEADER *FlashImgDataHdr = NULL;
|
|
uint32_t ota_target_index = OTA_INDEX_2;
|
|
|
|
#if CONFIG_CUSTOM_SIGNATURE
|
|
uint32_t read_custom_sig[8];
|
|
#endif
|
|
|
|
printf("\n\r[%s] Update task start", __FUNCTION__);
|
|
alloc = ota_update_malloc(BUF_SIZE);
|
|
if(!alloc){
|
|
printf("\n\r[%s] Alloc buffer failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/* Connect socket */
|
|
server_socket = socket(AF_INET, SOCK_STREAM, 0);
|
|
if(server_socket < 0){
|
|
printf("\n\r[%s] Create socket failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
server_addr.sin_family = AF_INET;
|
|
server_addr.sin_addr.s_addr = cfg->ip_addr;
|
|
server_addr.sin_port = cfg->port;
|
|
|
|
if(connect(server_socket, (struct sockaddr *)&server_addr, sizeof(server_addr)) == -1){
|
|
printf("\n\r[%s] socket connect failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
DBG_INFO_MSG_OFF(_DBG_SPI_FLASH_);
|
|
|
|
/* OAT2 address should not in OTA1 image & should 4K alignment */
|
|
OTA1Hdr = (IMAGE_HEADER *)(OTA1_ADDR);
|
|
OTA1Len = OTA1Hdr->image_size;
|
|
FlashImgDataHdr = (IMAGE_HEADER *)((u32)OTA1Hdr + OTA1Len + IMAGE_HEADER_LEN);
|
|
if ((ota2_addr > ((u32)FlashImgDataHdr + FlashImgDataHdr->image_size + IMAGE_HEADER_LEN)) && ((ota2_addr & 0xfff) == 0)) {
|
|
ota_write_ota2_addr( &flash, ota2_addr);
|
|
} else {
|
|
printf("\n\r[%s] illegal ota addr 0x%x", __FUNCTION__, ota2_addr);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/* check OTA index we should update */
|
|
if (ota_get_cur_index() == OTA_INDEX_1) {
|
|
NewImg2Addr = OTA2_ADDR;
|
|
ota_target_index = OTA_INDEX_2;
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("OTA2 address space will be upgraded\n");
|
|
#endif
|
|
} else {
|
|
NewImg2Addr = OTA1_ADDR;
|
|
ota_target_index = OTA_INDEX_1;
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("OTA1 address space will be upgraded\n");
|
|
#endif
|
|
}
|
|
|
|
#if OTA_DEBUG_INFO
|
|
DBG_8195A("ota_target_index = %d\n", ota_target_index);
|
|
#endif
|
|
|
|
/*-------------AmebaZ handshakes with server-------------*/
|
|
|
|
alloc[0] = (unsigned char)ota_target_index;
|
|
|
|
/*firstly, AmebaZ should send the OTA index needed for upgrade to server*/
|
|
write_bytes = write(server_socket, alloc, 1);
|
|
if(write_bytes < 0){
|
|
printf("\n\r[%s] write socket failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/* get update image info from server*/
|
|
memset(file_info, 0, sizeof(file_info));
|
|
printf("\n\r[%s] Read info first", __FUNCTION__);
|
|
read_bytes = read(server_socket, file_info, sizeof(file_info));
|
|
// !DW checksum !DW padding 0 !DW file size !DW
|
|
printf("\n\r[%s] info %d bytes", __FUNCTION__, read_bytes);
|
|
printf("\n\r[%s] tx chechsum 0x%x, file size 0x%x", __FUNCTION__, file_info[0],file_info[2]);
|
|
printf("\n\r[%s] OTA index received from server is %d", __FUNCTION__, file_info[1]);
|
|
if(file_info[2] == 0){
|
|
printf("\n\r[%s] No checksum and file size", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
NewImg2Len = file_info[2];
|
|
|
|
printf("\n\r[%s] update addr:%x update len: %x", __FUNCTION__, NewImg2Addr, NewImg2Len);
|
|
|
|
/* if OTA1 will be update, image size should not cross OTA2 */
|
|
if(NewImg2Addr == OTA1_ADDR) {
|
|
if(NewImg2Len > (OTA2_ADDR-OTA1_ADDR) ){ // firmware size too large
|
|
printf("\n\r[%s] image size should not cross OTA2 \n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
}
|
|
if(NewImg2Addr == 0xFFFFFFFF) {
|
|
printf("\n\r[%s] update address is invalid \n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/* Erase upgraded image 2 region */
|
|
printf("\n\r[%s] NewImg2Len %d ", __FUNCTION__, NewImg2Len);
|
|
NewImg2BlkSize = ((NewImg2Len - 1)/4096) + 1;
|
|
|
|
printf("\n\r[%s] NewImg2BlkSize %d 0x%8x", __FUNCTION__, NewImg2BlkSize, NewImg2BlkSize);
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
for( i = 0; i < NewImg2BlkSize; i++)
|
|
flash_erase_sector(&flash, NewImg2Addr -SPI_FLASH_BASE + i * 4096);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
|
|
/*the upgrade space should be masked, because the encrypt firmware is used
|
|
for checksum calculation*/
|
|
OTF_Mask(1, (NewImg2Addr - SPI_FLASH_BASE), NewImg2BlkSize, 1);
|
|
|
|
/* get OTA image and Write New Image to flash */
|
|
address = NewImg2Addr -SPI_FLASH_BASE ;
|
|
printf("\n\r");
|
|
while(1){
|
|
memset(alloc, 0, BUF_SIZE);
|
|
read_bytes = read(server_socket, alloc, BUF_SIZE);
|
|
if(read_bytes == 0) break; // Read end
|
|
if(read_bytes < 0){
|
|
printf("\n\r[%s] Read socket failed", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
if(read_bytes<4)
|
|
printf("\n\r[%s] recv small packet", __FUNCTION__);
|
|
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
if(flash_stream_write(&flash, address + size, read_bytes, alloc) < 0){
|
|
printf("\n\r[%s] Write sector failed", __FUNCTION__);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
goto update_ota_exit;
|
|
}
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
size += read_bytes;
|
|
|
|
if(size == NewImg2Len)
|
|
break;
|
|
}
|
|
printf("\n\r");
|
|
|
|
file_checksum.u = file_info[0];
|
|
|
|
#if CONFIG_CUSTOM_SIGNATURE
|
|
/*unmask the upgrade space to read the signature in new firmware*/
|
|
OTF_Mask(1, (NewImg2Addr - SPI_FLASH_BASE), NewImg2BlkSize, 0);
|
|
|
|
/* check custom signature */
|
|
_memcpy(read_custom_sig, (void const*)(NewImg2Addr + IMAGE_HEADER_LEN), 32);
|
|
printf("\n\r[%s] read_custom_sig %s", __FUNCTION__ , (char*)read_custom_sig);
|
|
Cache_Flush();
|
|
|
|
if (strcmp((char*)read_custom_sig, cus_sig_demo)) {
|
|
goto update_ota_exit;
|
|
}
|
|
OTF_Mask(1, (NewImg2Addr - SPI_FLASH_BASE), NewImg2BlkSize, 1);
|
|
#endif
|
|
|
|
/* read flash data back and calculate checksum */
|
|
for(i=0;i<size;i+=BUF_SIZE){
|
|
int k;
|
|
int rlen = (size-i)>BUF_SIZE?BUF_SIZE:(size-i);
|
|
flash_stream_read(&flash, NewImg2Addr - SPI_FLASH_BASE+i, rlen, alloc);
|
|
for(k=0;k<rlen;k++)
|
|
flash_checksum+=alloc[k];
|
|
}
|
|
|
|
printf("\n\rUpdate file size = %d flash checksum 0x%8x attached checksum 0x%8x", size, flash_checksum, file_checksum.u);
|
|
|
|
OTF_Mask(1, (NewImg2Addr - SPI_FLASH_BASE), NewImg2BlkSize, 0);
|
|
|
|
/* compare checksum with received checksum */
|
|
if (file_checksum.u == flash_checksum) {
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
OTA_Change(ota_target_index);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
printf("\n\r[%s] Update OTA success!", __FUNCTION__);
|
|
|
|
ret = 0;
|
|
} else {
|
|
/*if checksum error, clear the signature zone which has been
|
|
written in flash in case of boot from the wrong firmware*/
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
flash_erase_sector(&flash, NewImg2Addr - SPI_FLASH_BASE);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
}
|
|
|
|
update_ota_exit:
|
|
if(alloc)
|
|
ota_update_free(alloc);
|
|
if(server_socket >= 0)
|
|
close(server_socket);
|
|
if(param)
|
|
ota_update_free(param);
|
|
|
|
TaskOTA = NULL;
|
|
printf("\n\r[%s] Update task exit", __FUNCTION__);
|
|
if(!ret){
|
|
printf("\n\r[%s] Ready to reboot", __FUNCTION__);
|
|
ota_platform_reset();
|
|
}
|
|
vTaskDelete(NULL);
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------
|
|
int update_ota_local(char *ip, int port)
|
|
{
|
|
update_cfg_local_t *pUpdateCfg;
|
|
|
|
if(TaskOTA){
|
|
printf("\n\r[%s] Update task has created.", __FUNCTION__);
|
|
return 0;
|
|
}
|
|
pUpdateCfg = ota_update_malloc(sizeof(update_cfg_local_t));
|
|
if(pUpdateCfg == NULL){
|
|
printf("\n\r[%s] Alloc update cfg failed", __FUNCTION__);
|
|
return -1;
|
|
}
|
|
pUpdateCfg->ip_addr = inet_addr(ip);
|
|
pUpdateCfg->port = ntohs(port);
|
|
#if SINGLE_IMG_OTA_UPGRADE
|
|
if(xTaskCreate(ota_update_single_img_local_task, "OTA_server", STACK_SIZE, pUpdateCfg, TASK_PRIORITY, &TaskOTA) != pdPASS){
|
|
ota_update_free(pUpdateCfg);
|
|
printf("\n\r[%s] Create update task failed", __FUNCTION__);
|
|
}
|
|
#else
|
|
if(xTaskCreate(ota_update_local_task, "OTA_server", STACK_SIZE, pUpdateCfg, TASK_PRIORITY, &TaskOTA) != pdPASS){
|
|
ota_update_free(pUpdateCfg);
|
|
printf("\n\r[%s] Create update task failed", __FUNCTION__);
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
#endif // #if (SERVER_TYPE == SERVER_LOCAL)
|
|
|
|
//---------------------------------------------------------------------
|
|
#if (SERVER_TYPE == SERVER_CLOUD)
|
|
//---------------------------------------------------------------------
|
|
int update_ota_cloud(char *repository, char *file_path)
|
|
{
|
|
update_cfg_cloud_t *pUpdateCfg;
|
|
|
|
if(TaskOTA){
|
|
printf("\n\r[%s] Update task has created.", __FUNCTION__);
|
|
return 0;
|
|
}
|
|
pUpdateCfg = ota_update_malloc(sizeof(update_cfg_cloud_t));
|
|
if(pUpdateCfg == NULL){
|
|
printf("\n\r[%s] Alloc update cfg failed.", __FUNCTION__);
|
|
goto exit;
|
|
}
|
|
if(strlen(repository) > (REPOSITORY_LEN-1)){
|
|
printf("\n\r[%s] Repository length is too long.", __FUNCTION__);
|
|
goto exit;
|
|
}
|
|
if(strlen(file_path) > (FILE_PATH_LEN-1)){
|
|
printf("\n\r[%s] File path length is too long.", __FUNCTION__);
|
|
goto exit;
|
|
}
|
|
strcpy((char*)pUpdateCfg->repository, repository);
|
|
strcpy((char*)pUpdateCfg->file_path, file_path);
|
|
|
|
if(xTaskCreate(update_ota_cloud_task, "OTA_server", STACK_SIZE, pUpdateCfg, TASK_PRIORITY, &TaskOTA) != pdPASS){
|
|
printf("\n\r[%s] Create update task failed", __FUNCTION__);
|
|
goto exit;
|
|
}
|
|
|
|
exit:
|
|
ota_update_free(pUpdateCfg);
|
|
return 0;
|
|
}
|
|
#endif // #if (SERVER_TYPE == SERVER_CLOUD)
|
|
|
|
//---------------------------------------------------------------------
|
|
void cmd_update(int argc, char **argv)
|
|
{
|
|
// printf("\n\r[%s] Firmware A", __FUNCTION__);
|
|
#if (SERVER_TYPE == SERVER_LOCAL)
|
|
int port;
|
|
if(argc != 3){
|
|
printf("\n\r[%s] Usage: update IP PORT", __FUNCTION__);
|
|
return;
|
|
}
|
|
port = atoi(argv[2]);
|
|
update_ota_local(argv[1], port);
|
|
#endif
|
|
#if (SERVER_TYPE == SERVER_CLOUD)
|
|
if(argc != 3){
|
|
printf("\n\r[%s] Usage: update REPOSITORY FILE_PATH", __FUNCTION__);
|
|
return;
|
|
}
|
|
update_ota_cloud(argv[1], argv[2]);
|
|
#endif
|
|
}
|
|
|
|
/* chose to boot ota2 image or not */
|
|
void cmd_ota_image(bool cmd)
|
|
{
|
|
if (cmd == 1)
|
|
OTA_Change(OTA_INDEX_2);
|
|
else
|
|
OTA_Change(OTA_INDEX_1);
|
|
}
|
|
|
|
#ifdef HTTP_OTA_UPDATE
|
|
//static flash_t flash_ota_rtl8710b;
|
|
uint32_t http_ota_target_index = OTA_INDEX_2;
|
|
|
|
/******************************************************************************************************************
|
|
** Function Name : update_ota_http_connect_server
|
|
** Description : connect to the OTA server
|
|
** Input : server_socket: the socket used
|
|
** host: host address of the OTA server
|
|
** port: port of the OTA server
|
|
** Return : connect ok: socket value
|
|
** Failed: -1
|
|
*******************************************************************************************************************/
|
|
int update_ota_http_connect_server(int server_socket, char *host, int port){
|
|
struct sockaddr_in server_addr;
|
|
struct hostent *server;
|
|
|
|
server_socket = socket(AF_INET, SOCK_STREAM, 0);
|
|
if(server_socket < 0){
|
|
printf("\n\r[%s] Create socket failed", __FUNCTION__);
|
|
return -1;
|
|
}
|
|
printf("[%s] Create socket: %d success!\n", __FUNCTION__, server_socket);
|
|
server = gethostbyname(host);
|
|
if(server == NULL){
|
|
printf("[ERROR] Get host ip failed\n");
|
|
return -1;
|
|
}
|
|
|
|
memset(&server_addr,0,sizeof(server_addr));
|
|
server_addr.sin_family = AF_INET;
|
|
server_addr.sin_port = htons(port);
|
|
memcpy(&server_addr.sin_addr.s_addr,server->h_addr,server->h_length);
|
|
|
|
if (connect(server_socket,(struct sockaddr *)&server_addr, sizeof(server_addr)) < 0){
|
|
printf("\n\r[%s] Socket connect failed", __FUNCTION__);
|
|
return -1;
|
|
}
|
|
|
|
return server_socket;
|
|
}
|
|
|
|
/******************************************************************************************************************
|
|
** Function Name : parse_http_response
|
|
** Description : Parse the http response to get some useful parameters
|
|
** Input : response : The http response got from server
|
|
** response_len: The length of http response
|
|
** result : The struct that store the usful infor about the http response
|
|
** Return : Parse OK: 1 -> Only got the status code
|
|
** 3 -> Got the status code and content_length, but didn't get the full header
|
|
** 4 -> Got all the information needed
|
|
** Failed: -1
|
|
*******************************************************************************************************************/
|
|
int parse_http_response(uint8_t *response, uint32_t response_len, http_response_result_t *result) {
|
|
uint32_t i, p, q, m;
|
|
uint32_t header_end = 0;
|
|
|
|
//Get status code
|
|
if(0 == result->parse_status){//didn't get the http response
|
|
uint8_t status[4] = {0};
|
|
i = p = q = m = 0;
|
|
for (; i < response_len; ++i) {
|
|
if (' ' == response[i]) {
|
|
++m;
|
|
if (1 == m) {//after HTTP/1.1
|
|
p = i;
|
|
}
|
|
else if (2 == m) {//after status code
|
|
q = i;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (!p || !q || q-p != 4) {//Didn't get the status code
|
|
return -1;
|
|
}
|
|
memcpy(status, response+p+1, 3);//get the status code
|
|
result->status_code = atoi((char const *)status);
|
|
if(result->status_code == 200)
|
|
result->parse_status = 1;
|
|
else{
|
|
printf("\n\r[%s] The http response status code is %d", __FUNCTION__, result->status_code);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
//if didn't receive the full http header
|
|
if(3 == result->parse_status){//didn't get the http response
|
|
p = q = 0;
|
|
for (i = 0; i < response_len; ++i) {
|
|
if (response[i] == '\r' && response[i+1] == '\n' &&
|
|
response[i+2] == '\r' && response[i+3] == '\n') {//the end of header
|
|
header_end = i+4;
|
|
result->parse_status = 4;
|
|
result->header_len = header_end;
|
|
result->body = response + header_end;
|
|
break;
|
|
}
|
|
}
|
|
if (3 == result->parse_status) {//Still didn't receive the full header
|
|
result->header_bak = ota_update_malloc(HEADER_BAK_LEN + 1);
|
|
memset(result->header_bak, 0, strlen(result->header_bak));
|
|
memcpy(result->header_bak, response + response_len - HEADER_BAK_LEN, HEADER_BAK_LEN);
|
|
}
|
|
}
|
|
|
|
//Get Content-Length
|
|
if(1 == result->parse_status){//didn't get the content length
|
|
uint32_t content_length = 0;
|
|
const uint8_t *content_length_buf1 = "CONTENT-LENGTH";
|
|
const uint8_t *content_length_buf2 = "Content-Length";
|
|
const uint32_t content_length_buf_len = strlen(content_length_buf1);
|
|
p = q = 0;
|
|
|
|
for (i = 0; i < response_len; ++i) {
|
|
if (response[i] == '\r' && response[i+1] == '\n') {
|
|
q = i;//the end of the line
|
|
if (!memcmp(response+p, content_length_buf1, content_length_buf_len) ||
|
|
!memcmp(response+p, content_length_buf2, content_length_buf_len)) {//get the content length
|
|
int j1 = p+content_length_buf_len, j2 = q-1;
|
|
while ( j1 < q && (*(response+j1) == ':' || *(response+j1) == ' ') ) ++j1;
|
|
while ( j2 > j1 && *(response+j2) == ' ') --j2;
|
|
uint8_t len_buf[12] = {0};
|
|
memcpy(len_buf, response+j1, j2-j1+1);
|
|
result->body_len = atoi((char const *)len_buf);
|
|
result->parse_status = 2;
|
|
}
|
|
p = i+2;
|
|
}
|
|
if (response[i] == '\r' && response[i+1] == '\n' &&
|
|
response[i+2] == '\r' && response[i+3] == '\n') {//Get the end of header
|
|
header_end = i+4;//p is the start of the body
|
|
if(result->parse_status == 2){//get the full header and the content length
|
|
result->parse_status = 4;
|
|
result->header_len = header_end;
|
|
result->body = response + header_end;
|
|
}
|
|
else {//there are no content length in header
|
|
printf("\n\r[%s] No Content-Length in header", __FUNCTION__);
|
|
return -1;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (1 == result->parse_status) {//didn't get the content length and the full header
|
|
result->header_bak = ota_update_malloc(HEADER_BAK_LEN + 1);
|
|
memset(result->header_bak, 0, strlen(result->header_bak));
|
|
memcpy(result->header_bak, response + response_len - HEADER_BAK_LEN, HEADER_BAK_LEN);
|
|
}
|
|
else if (2 == result->parse_status) {//didn't get the full header but get the content length
|
|
result->parse_status = 3;
|
|
result->header_bak = ota_update_malloc(HEADER_BAK_LEN + 1);
|
|
memset(result->header_bak, 0, strlen(result->header_bak));
|
|
memcpy(result->header_bak, response + response_len - HEADER_BAK_LEN, HEADER_BAK_LEN);
|
|
}
|
|
}
|
|
|
|
return result->parse_status;
|
|
}
|
|
|
|
/**
|
|
get the address for arranging new firmware and check new address validity
|
|
*/
|
|
uint32_t update_ota_prepare_addr(void)
|
|
{
|
|
|
|
uint32_t NewImg2Addr = 0;
|
|
IMAGE_HEADER *FlashImgDataHdr = NULL;
|
|
IMAGE_HEADER *OTA1Hdr = NULL;
|
|
uint32_t OTA1Len = 0;
|
|
uint32_t ota2_addr = OTA2_ADDR;
|
|
|
|
/*For future expansion*/
|
|
#if 0
|
|
ota2_addr = HAL_READ32(SPI_FLASH_BASE, OFFSET_DATA);
|
|
#else
|
|
ota2_addr = OTA2_ADDR;
|
|
#endif
|
|
|
|
if((ota2_addr%4096) != 0) {
|
|
printf("\n[%s] ota addr in sys data space not 4k aligned 0x%x\n", __FUNCTION__, ota2_addr);
|
|
return 0xFFFFFFFF;
|
|
}
|
|
if(ota2_addr <= OTA2_ADDR) {
|
|
ota2_addr = OTA2_ADDR;
|
|
}
|
|
|
|
DBG_INFO_MSG_OFF(_DBG_SPI_FLASH_);
|
|
/* check OTA index we should update */
|
|
if (ota_get_cur_index() == OTA_INDEX_1) {
|
|
http_ota_target_index = OTA_INDEX_2;
|
|
printf("OTA2 address space will be upgraded\n");
|
|
} else {
|
|
http_ota_target_index = OTA_INDEX_1;
|
|
printf("OTA1 address space will be upgraded\n");
|
|
}
|
|
|
|
if(http_ota_target_index == OTA_INDEX_2) {
|
|
/* OAT2 address should not in OTA1 image & should 4K alignment */
|
|
OTA1Hdr = (IMAGE_HEADER *)(OTA1_ADDR);
|
|
OTA1Len = OTA1Hdr->image_size;
|
|
FlashImgDataHdr = (IMAGE_HEADER *)((u32)OTA1Hdr + OTA1Len + IMAGE_HEADER_LEN);
|
|
if ((ota2_addr > ((u32)FlashImgDataHdr + FlashImgDataHdr->image_size + IMAGE_HEADER_LEN)) && ((ota2_addr & 0xfff) == 0)) {
|
|
ota_write_ota2_addr(ota2_addr);
|
|
} else {
|
|
printf("\n[%s] illegal ota addr 0x%x\n", __FUNCTION__, ota2_addr);
|
|
return 0xFFFFFFFF;
|
|
}
|
|
NewImg2Addr = ota2_addr;
|
|
} else {
|
|
NewImg2Addr = OTA1_ADDR;
|
|
}
|
|
|
|
return NewImg2Addr;
|
|
}
|
|
|
|
static int restore_ota_file_hdr(int writelen, int len, uint8_t *buf, int socketid)
|
|
{
|
|
int TempLen = 0, read_bytes = 0;
|
|
if (writelen < len) {
|
|
TempLen = len - writelen;
|
|
while(TempLen) {
|
|
read_bytes = recv(socketid, buf, TempLen, 0);
|
|
if(read_bytes < 0){
|
|
printf("[%s] read socket failed\n", __FUNCTION__);
|
|
return -1;
|
|
}
|
|
if(read_bytes == 0) {
|
|
writelen = len;
|
|
break;
|
|
}
|
|
TempLen -= read_bytes;
|
|
buf += read_bytes;
|
|
}
|
|
writelen = len;
|
|
}
|
|
writelen -= len;
|
|
return writelen;
|
|
}
|
|
|
|
/******************************************************
|
|
functionname : http_read_socket
|
|
description : read data form socket
|
|
socket : http server socket
|
|
recevie_buf : data buf.
|
|
buf_len : read data length
|
|
return : >0 the data length read form
|
|
socket
|
|
<0 error,and need to close
|
|
the socket.
|
|
******************************************************/
|
|
int http_read_socket( int socket, uint8_t *recevie_buf, int buf_len )
|
|
{
|
|
int bytes_rcvd = -1;
|
|
if( socket < 0 ) {
|
|
printf("[%s], socket is invalid\n", __FUNCTION__);
|
|
return bytes_rcvd;
|
|
}
|
|
memset(recevie_buf, 0, buf_len);
|
|
|
|
bytes_rcvd = recv(socket, recevie_buf, buf_len, 0 );
|
|
if(bytes_rcvd <= 0) {
|
|
printf("[%s], Close HTTP Socket[%d].\n", socket, __FUNCTION__);
|
|
return -2;
|
|
}
|
|
return bytes_rcvd;
|
|
}
|
|
|
|
int http_update_ota(char *host, int port, char *resource)
|
|
{
|
|
int server_socket = -1;
|
|
unsigned char *buf, *alloc=NULL, *request=NULL;
|
|
int read_bytes = 0, i = 0;
|
|
uint32_t address;
|
|
uint32_t NewImg2Len = 0, NewImg2Addr = 0;
|
|
int ret = -1;
|
|
http_response_result_t rsp_result = {0};
|
|
|
|
int writelen = 0;
|
|
int templen = 0;
|
|
int RevHdrLen = 0;
|
|
u8 *TempBuf = NULL;
|
|
uint32_t NewImg2BlkSize = 0;
|
|
flash_t flash;
|
|
int ota_total_len = 0;
|
|
static int RemainBytes = 0;
|
|
u32 TempCnt = 0;
|
|
static u32 SigCnt = 0;
|
|
static unsigned long tick1, tick2;
|
|
|
|
update_ota_target_hdr http_ota_target_hdr;
|
|
u8 http_signature[9] = {0};
|
|
int http_size = 0;
|
|
|
|
alloc = (unsigned char *)ota_update_malloc(BUF_SIZE);
|
|
if(!alloc){
|
|
printf("[%s] Alloc buffer failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
// Connect server
|
|
server_socket = update_ota_http_connect_server(server_socket, host, port);
|
|
if(server_socket == -1){
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
NewImg2Addr = update_ota_prepare_addr();
|
|
if(NewImg2Addr == -1){
|
|
printf("[%s] illegal ota addr 0x%x\n", __FUNCTION__, NewImg2Addr);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/* Write New Image 2 sector*/
|
|
if(NewImg2Addr != 0xFFFFFFFF){
|
|
uint32_t idx = 0;
|
|
int data_len = 0;
|
|
printf("\n\r");
|
|
|
|
/*send http request*/
|
|
request = (unsigned char *) ota_update_malloc(strlen("GET /") + strlen(resource) + strlen(" HTTP/1.1\r\nHost: ")
|
|
+ strlen(host) + strlen("\r\n\r\n") + 1);
|
|
sprintf(request, "GET /%s HTTP/1.1\r\nHost: %s\r\n\r\n", resource, host);
|
|
|
|
ret = write(server_socket, request, strlen(request));
|
|
if(ret < 0){
|
|
printf("[%s] Send HTTP request failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
while (3 >= rsp_result.parse_status){//still read header
|
|
if(0 == rsp_result.parse_status){//didn't get the http response
|
|
memset(alloc, 0, BUF_SIZE);
|
|
read_bytes = read(server_socket, alloc, BUF_SIZE);
|
|
if(read_bytes <= 0){
|
|
printf("[%s] Read socket failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
idx = read_bytes;
|
|
memset(&rsp_result, 0, sizeof(rsp_result));
|
|
if(parse_http_response(alloc, idx, &rsp_result) == -1){
|
|
goto update_ota_exit;
|
|
}
|
|
} else if ((1 == rsp_result.parse_status) || (3 == rsp_result.parse_status)){//just get the status code
|
|
memset(alloc, 0, BUF_SIZE);
|
|
memcpy(alloc, rsp_result.header_bak, HEADER_BAK_LEN);
|
|
ota_update_free(rsp_result.header_bak);
|
|
rsp_result.header_bak = NULL;
|
|
read_bytes = read(server_socket, alloc + HEADER_BAK_LEN, (BUF_SIZE - HEADER_BAK_LEN));
|
|
if(read_bytes <= 0){
|
|
printf("[%s] Read socket failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
idx = read_bytes + HEADER_BAK_LEN;
|
|
|
|
if (parse_http_response(alloc, read_bytes + HEADER_BAK_LEN, &rsp_result) == -1){
|
|
goto update_ota_exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (0 == rsp_result.body_len) {
|
|
printf("[%s] New firmware size = 0 !\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
} else {
|
|
printf("[%s] Download new firmware begin, total size : %d\n", __FUNCTION__, rsp_result.body_len);
|
|
}
|
|
|
|
buf = alloc + idx;
|
|
writelen = idx - rsp_result.header_len;
|
|
writelen = restore_ota_file_hdr(writelen, 16, buf, server_socket);
|
|
|
|
if (writelen < 0) {
|
|
printf("[%s] read socket failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
buf = alloc + rsp_result.header_len;
|
|
memcpy((u8*)(&http_ota_target_hdr.FileHdr), buf, sizeof(http_ota_target_hdr.FileHdr));
|
|
memcpy((u8*)(&http_ota_target_hdr.FileImgHdr), buf+8, 8);
|
|
|
|
/*read the remaining Header info*/
|
|
buf = alloc + rsp_result.header_len + 16 + writelen;
|
|
templen = (http_ota_target_hdr.FileHdr.HdrNum * http_ota_target_hdr.FileImgHdr.ImgHdrLen) - 8;
|
|
writelen = restore_ota_file_hdr(writelen, templen, buf, server_socket);
|
|
if (writelen < 0) {
|
|
printf("[%s] read socket failed\n", __FUNCTION__);
|
|
goto update_ota_exit;
|
|
}
|
|
/* ----- parse firmware file header and get the target OTA image header-----*/
|
|
buf = alloc + rsp_result.header_len;
|
|
RevHdrLen = (http_ota_target_hdr.FileHdr.HdrNum * http_ota_target_hdr.FileImgHdr.ImgHdrLen) + 8;
|
|
TempBuf = (u8 *)(&OtaImgId[http_ota_target_index]);
|
|
printf("TempBuf = %s\n", TempBuf);
|
|
if (!get_ota_tartget_header(buf, RevHdrLen, &http_ota_target_hdr, TempBuf)) {
|
|
printf("Get OTA header failed\n");
|
|
goto update_ota_exit;
|
|
}
|
|
|
|
/*get new image length from the firmware header*/
|
|
NewImg2Len = http_ota_target_hdr.FileImgHdr.ImgLen;
|
|
NewImg2BlkSize = ((NewImg2Len - 1)/4096) + 1;
|
|
|
|
/* if OTA1 will be update, image size should not cross OTA2 */
|
|
if(http_ota_target_index== OTA_INDEX_1) {
|
|
if(http_ota_target_hdr.FileImgHdr.ImgLen > (OTA2_ADDR - OTA1_ADDR)) {
|
|
printf("\n\r[%s] illegal new image length 0x%x", __FUNCTION__, http_ota_target_hdr.FileImgHdr.ImgLen);
|
|
goto update_ota_exit;
|
|
}
|
|
}
|
|
|
|
/* Erase upgraded image 2 region */
|
|
printf("[%s] NewImg2BlkSize %d\n", __FUNCTION__, NewImg2BlkSize);
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
for( i = 0; i < NewImg2BlkSize; i++)
|
|
flash_erase_sector(&flash, NewImg2Addr -SPI_FLASH_BASE + i * 4096);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
|
|
/*the upgrade space should be masked, because the encrypt firmware is used
|
|
for checksum calculation*/
|
|
OTF_Mask(1, (NewImg2Addr - SPI_FLASH_BASE), NewImg2BlkSize, 1);
|
|
/* get OTA image and Write New Image to flash, skip the signature,
|
|
not write signature first for power down protection*/
|
|
address = NewImg2Addr -SPI_FLASH_BASE + 8;
|
|
templen = (http_ota_target_hdr.FileHdr.HdrNum * http_ota_target_hdr.FileImgHdr.ImgHdrLen) + sizeof(http_ota_target_hdr.FileHdr);
|
|
RemainBytes = http_ota_target_hdr.FileImgHdr.ImgLen - 8;
|
|
if (writelen > 0) {
|
|
writelen = idx - rsp_result.header_len;
|
|
} else {
|
|
writelen = templen;
|
|
}
|
|
|
|
buf = alloc + rsp_result.header_len;
|
|
ota_total_len += writelen;
|
|
/*download the new firmware from server*/
|
|
do {
|
|
if (ota_total_len > http_ota_target_hdr.FileImgHdr.Offset) {
|
|
tick1 = xTaskGetTickCount();
|
|
/*reach the the desired image, the first packet process, restore signature*/
|
|
TempCnt = ota_total_len - http_ota_target_hdr.FileImgHdr.Offset;
|
|
if (TempCnt < 8) {
|
|
SigCnt = TempCnt;
|
|
} else {
|
|
SigCnt = 8;
|
|
}
|
|
memcpy(http_signature, buf + writelen - TempCnt, SigCnt);
|
|
if((SigCnt < 8) || (TempCnt -8 == 0)) {
|
|
while (SigCnt < 8) {
|
|
writelen = http_read_socket(server_socket, alloc, 8 -SigCnt);
|
|
if(writelen < 0 ) {
|
|
printf("[%s], socket recv ota file fail!recived: %d\n", __func__, ota_total_len);
|
|
goto update_ota_exit;
|
|
}
|
|
memcpy(http_signature + SigCnt, alloc, writelen);
|
|
SigCnt += writelen;
|
|
};
|
|
ota_total_len += (8 - TempCnt);
|
|
} else {
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
if(flash_stream_write(&flash, address + http_size, TempCnt -8, (buf + writelen-TempCnt + 8) ) < 0){
|
|
printf("[%s] Write sector failed\n", __FUNCTION__);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
goto update_ota_exit;
|
|
}
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
http_size += TempCnt -8;
|
|
RemainBytes -= http_size;
|
|
}
|
|
printf("signature: %s, RemainBytes: %d, flash address: %d, http_size: %d\n", http_signature, RemainBytes, address, http_size);
|
|
/*normal packet process*/
|
|
while (RemainBytes) {
|
|
writelen = http_read_socket(server_socket, alloc, BUF_SIZE);
|
|
if(writelen < 0 ) {
|
|
printf("[%s], socket recv ota file fail!recived: %d\n", __func__, ota_total_len);
|
|
goto update_ota_exit;
|
|
}
|
|
ota_total_len += writelen;
|
|
RemainBytes -= writelen;
|
|
if (RemainBytes <= 0) {
|
|
writelen = writelen - (-RemainBytes);
|
|
RemainBytes = 0;
|
|
}
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
if (flash_stream_write(&flash, address + http_size, writelen, alloc) < 0){
|
|
printf("[%s] Write sector failed\n", __FUNCTION__);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
goto update_ota_exit;
|
|
}
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
http_size += writelen;
|
|
tick2 = xTaskGetTickCount();
|
|
if (tick2 - tick1 > 1000) {
|
|
printf("Download OTA file: %d Bytes, RemainBytes = %d Bytes\n", http_size, RemainBytes);
|
|
tick1 = tick2;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (RemainBytes) {
|
|
writelen = http_read_socket(server_socket, alloc, BUF_SIZE);
|
|
if(writelen < 0 ) {
|
|
printf("[%s], socket recv ota file fail!recived:0x%x\n", __func__, ota_total_len);
|
|
goto update_ota_exit;
|
|
}
|
|
ota_total_len += writelen;
|
|
buf = alloc;
|
|
}
|
|
} while( RemainBytes );
|
|
|
|
printf("[%s] Download new firmware %d bytes completed\n", __FUNCTION__, idx);
|
|
printf("signature: %s, size = %d, OtaTargetHdr.FileImgHdr.ImgLen = %d\n", http_signature, http_size, http_ota_target_hdr.FileImgHdr.ImgLen);
|
|
/*------------- verify checksum and update signature-----------------*/
|
|
if(verify_ota_checksum(NewImg2Addr, http_size, http_signature, &http_ota_target_hdr)){
|
|
if(!change_ota_signature(NewImg2Addr, http_signature, http_ota_target_index)) {
|
|
ret = -1;
|
|
printf("\n[%s], change signature failed\n", __FUNCTION__);
|
|
}
|
|
printf("\n\r[%s] Update OTA success!", __FUNCTION__);
|
|
ret = 0;
|
|
} else {
|
|
/*if checksum error, clear the signature zone which has been written in flash in case of boot from the wrong firmware*/
|
|
device_mutex_lock(RT_DEV_LOCK_FLASH);
|
|
flash_erase_sector(&flash, NewImg2Addr - SPI_FLASH_BASE);
|
|
device_mutex_unlock(RT_DEV_LOCK_FLASH);
|
|
printf("\n\r[%s] The checksume is wrong!\n\r", __FUNCTION__);
|
|
ret = -1;
|
|
goto update_ota_exit;
|
|
}
|
|
}
|
|
update_ota_exit:
|
|
if(alloc)
|
|
ota_update_free(alloc);
|
|
if(request)
|
|
ota_update_free(request);
|
|
if(server_socket >= 0)
|
|
close(server_socket);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
//---------------------------------------------------------------------
|
|
|