mirror of
https://github.com/bkerler/edl
synced 2024-11-22 06:26:24 +00:00
7f14a79019
Remove Some useless Codes Replace '2018-2023' to '2018-2024'
340 lines
11 KiB
Python
340 lines
11 KiB
Python
#!/usr/bin/env python3
|
|
# -*- coding: utf-8 -*-
|
|
# (c) B.Kerler 2018-2024 under GPLv3 license
|
|
# If you use my code, make sure you refer to my name
|
|
#
|
|
# !!!!! If you use this code in commercial products, your product is automatically
|
|
# GPLv3 and has to be open sourced under GPLv3 as well. !!!!!
|
|
|
|
from edlclient.Library.utils import structhelper_io
|
|
from io import BytesIO
|
|
|
|
SAHARA_VERSION = 2
|
|
SAHARA_MIN_VERSION = 1
|
|
|
|
|
|
class DataError(Exception):
|
|
pass
|
|
|
|
|
|
class cmd_t:
|
|
SAHARA_HELLO_REQ = 0x1
|
|
SAHARA_HELLO_RSP = 0x2
|
|
SAHARA_READ_DATA = 0x3
|
|
SAHARA_END_TRANSFER = 0x4
|
|
SAHARA_DONE_REQ = 0x5
|
|
SAHARA_DONE_RSP = 0x6
|
|
SAHARA_RESET_REQ = 0x7
|
|
SAHARA_RESET_RSP = 0x8
|
|
SAHARA_MEMORY_DEBUG = 0x9
|
|
SAHARA_MEMORY_READ = 0xA
|
|
SAHARA_CMD_READY = 0xB
|
|
SAHARA_SWITCH_MODE = 0xC
|
|
SAHARA_EXECUTE_REQ = 0xD
|
|
SAHARA_EXECUTE_RSP = 0xE
|
|
SAHARA_EXECUTE_DATA = 0xF
|
|
SAHARA_64BIT_MEMORY_DEBUG = 0x10
|
|
SAHARA_64BIT_MEMORY_READ = 0x11
|
|
SAHARA_64BIT_MEMORY_READ_DATA = 0x12
|
|
SAHARA_RESET_STATE_MACHINE_ID = 0x13
|
|
|
|
|
|
class cmd_t_version:
|
|
SAHARA_HELLO_REQ = 0x1
|
|
SAHARA_HELLO_RSP = 1
|
|
SAHARA_READ_DATA = 1
|
|
SAHARA_END_TRANSFER = 1
|
|
SAHARA_DONE_REQ = 1
|
|
SAHARA_DONE_RSP = 1
|
|
SAHARA_RESET_REQ = 1
|
|
SAHARA_RESET_RSP = 1
|
|
SAHARA_MEMORY_DEBUG = 2
|
|
SAHARA_MEMORY_READ = 2
|
|
SAHARA_CMD_READY = 2
|
|
SAHARA_SWITCH_MODE = 2
|
|
SAHARA_EXECUTE_REQ = 2
|
|
SAHARA_EXECUTE_RSP = 2
|
|
SAHARA_EXECUTE_DATA = 2
|
|
SAHARA_64BIT_MEMORY_DEBUG = 2
|
|
SAHARA_64BIT_MEMORY_READ = 2
|
|
SAHARA_64BIT_MEMORY_READ_DATA = 2
|
|
SAHARA_RESET_STATE_MACHINE_ID = 2
|
|
|
|
|
|
class exec_cmd_t:
|
|
SAHARA_EXEC_CMD_NOP = 0x00
|
|
SAHARA_EXEC_CMD_SERIAL_NUM_READ = 0x01
|
|
SAHARA_EXEC_CMD_MSM_HW_ID_READ = 0x02
|
|
SAHARA_EXEC_CMD_OEM_PK_HASH_READ = 0x03
|
|
SAHARA_EXEC_CMD_SWITCH_TO_DMSS_DLOAD = 0x04
|
|
SAHARA_EXEC_CMD_SWITCH_TO_STREAM_DLOAD = 0x05
|
|
SAHARA_EXEC_CMD_READ_DEBUG_DATA = 0x06
|
|
SAHARA_EXEC_CMD_GET_SOFTWARE_VERSION_SBL = 0x07
|
|
SAHARA_EXEC_CMD_GET_COMMAND_ID_LIST = 0x08
|
|
SAHARA_EXEC_CMD_GET_TRAINING_DATA = 0x09
|
|
|
|
|
|
class sahara_mode_t:
|
|
SAHARA_MODE_IMAGE_TX_PENDING = 0x0
|
|
SAHARA_MODE_IMAGE_TX_COMPLETE = 0x1
|
|
SAHARA_MODE_MEMORY_DEBUG = 0x2
|
|
SAHARA_MODE_COMMAND = 0x3
|
|
|
|
|
|
class status_t:
|
|
SAHARA_STATUS_SUCCESS = 0x00 # Invalid command received in current state
|
|
SAHARA_NAK_INVALID_CMD = 0x01 # Protocol mismatch between host and target
|
|
SAHARA_NAK_PROTOCOL_MISMATCH = 0x02 # Invalid target protocol version
|
|
SAHARA_NAK_INVALID_TARGET_PROTOCOL = 0x03 # Invalid host protocol version
|
|
SAHARA_NAK_INVALID_HOST_PROTOCOL = 0x04 # Invalid packet size received
|
|
SAHARA_NAK_INVALID_PACKET_SIZE = 0x05 # Unexpected image ID received
|
|
SAHARA_NAK_UNEXPECTED_IMAGE_ID = 0x06 # Invalid image header size received
|
|
SAHARA_NAK_INVALID_HEADER_SIZE = 0x07 # Invalid image data size received
|
|
SAHARA_NAK_INVALID_DATA_SIZE = 0x08 # Invalid image type received
|
|
SAHARA_NAK_INVALID_IMAGE_TYPE = 0x09 # Invalid tranmission length
|
|
SAHARA_NAK_INVALID_TX_LENGTH = 0x0A # Invalid reception length
|
|
SAHARA_NAK_INVALID_RX_LENGTH = 0x0B # General transmission or reception error
|
|
SAHARA_NAK_GENERAL_TX_RX_ERROR = 0x0C # Error while transmitting READ_DATA packet
|
|
SAHARA_NAK_READ_DATA_ERROR = 0x0D # Cannot receive specified number of program headers
|
|
SAHARA_NAK_UNSUPPORTED_NUM_PHDRS = 0x0E # Invalid data length received for program headers
|
|
SAHARA_NAK_INVALID_PDHR_SIZE = 0x0F # Multiple shared segments found in ELF image
|
|
SAHARA_NAK_MULTIPLE_SHARED_SEG = 0x10 # Uninitialized program header location
|
|
SAHARA_NAK_UNINIT_PHDR_LOC = 0x11 # Invalid destination address
|
|
SAHARA_NAK_INVALID_DEST_ADDR = 0x12 # Invalid data size received in image header
|
|
SAHARA_NAK_INVALID_IMG_HDR_DATA_SIZE = 0x13 # Invalid ELF header received
|
|
SAHARA_NAK_INVALID_ELF_HDR = 0x14 # Unknown host error received in HELLO_RESP
|
|
SAHARA_NAK_UNKNOWN_HOST_ERROR = 0x15 # Timeout while receiving data
|
|
SAHARA_NAK_TIMEOUT_RX = 0x16 # Timeout while transmitting data
|
|
SAHARA_NAK_TIMEOUT_TX = 0x17 # Invalid mode received from host
|
|
SAHARA_NAK_INVALID_HOST_MODE = 0x18 # Invalid memory read access
|
|
SAHARA_NAK_INVALID_MEMORY_READ = 0x19 # Host cannot handle read data size requested
|
|
SAHARA_NAK_INVALID_DATA_SIZE_REQUEST = 0x1A # Memory debug not supported
|
|
SAHARA_NAK_MEMORY_DEBUG_NOT_SUPPORTED = 0x1B # Invalid mode switch
|
|
SAHARA_NAK_INVALID_MODE_SWITCH = 0x1C # Failed to execute command
|
|
SAHARA_NAK_CMD_EXEC_FAILURE = 0x1D # Invalid parameter passed to command execution
|
|
SAHARA_NAK_EXEC_CMD_INVALID_PARAM = 0x1E # Unsupported client command received
|
|
SAHARA_NAK_EXEC_CMD_UNSUPPORTED = 0x1F # Invalid client command received for data response
|
|
SAHARA_NAK_EXEC_DATA_INVALID_CLIENT_CMD = 0x20 # Failed to authenticate hash table
|
|
SAHARA_NAK_HASH_TABLE_AUTH_FAILURE = 0x21 # Failed to verify hash for a given segment of ELF image
|
|
SAHARA_NAK_HASH_VERIFICATION_FAILURE = 0x22 # Failed to find hash table in ELF image
|
|
SAHARA_NAK_HASH_TABLE_NOT_FOUND = 0x23 # Target failed to initialize
|
|
SAHARA_NAK_TARGET_INIT_FAILURE = 0x24 # Failed to authenticate generic image
|
|
SAHARA_NAK_IMAGE_AUTH_FAILURE = 0x25 # Invalid ELF hash table size. Too bit or small.
|
|
SAHARA_NAK_INVALID_IMG_HASH_TABLE_SIZE = 0x26
|
|
SAHARA_NAK_ENUMERATION_FAILURE = 0x27
|
|
SAHARA_NAK_HW_BULK_TRANSFER_ERROR = 0x28
|
|
SAHARA_NAK_MAX_CODE = 0x7FFFFFFF # To ensure 32-bits wide */
|
|
|
|
|
|
ErrorDesc = {
|
|
0x00: "Invalid command received in current state",
|
|
0x01: "Protocol mismatch between host and target",
|
|
0x02: "Invalid target protocol version",
|
|
0x03: "Invalid host protocol version",
|
|
0x04: "Invalid packet size received",
|
|
0x05: "Unexpected image ID received",
|
|
0x06: "Invalid image header size received",
|
|
0x07: "Invalid image data size received",
|
|
0x08: "Invalid image type received",
|
|
0x09: "Invalid tranmission length",
|
|
0x0A: "Invalid reception length",
|
|
0x0B: "General transmission or reception error",
|
|
0x0C: "Error while transmitting READ_DATA packet",
|
|
0x0D: "Cannot receive specified number of program headers",
|
|
0x0E: "Invalid data length received for program headers",
|
|
0x0F: "Multiple shared segments found in ELF image",
|
|
0x10: "Uninitialized program header location",
|
|
0x11: "Invalid destination address",
|
|
0x12: "Invalid data size received in image header",
|
|
0x13: "Invalid ELF header received",
|
|
0x14: "Unknown host error received in HELLO_RESP",
|
|
0x15: "Timeout while receiving data",
|
|
0x16: "Timeout while transmitting data",
|
|
0x17: "Invalid mode received from host",
|
|
0x18: "Invalid memory read access",
|
|
0x19: "Host cannot handle read data size requested",
|
|
0x1A: "Memory debug not supported",
|
|
0x1B: "Invalid mode switch",
|
|
0x1C: "Failed to execute command",
|
|
0x1D: "Invalid parameter passed to command execution",
|
|
0x1E: "Unsupported client command received",
|
|
0x1F: "Invalid client command received for data response",
|
|
0x20: "Failed to authenticate hash table",
|
|
0x21: "Failed to verify hash for a given segment of ELF image",
|
|
0x22: "Failed to find hash table in ELF image",
|
|
0x23: "Target failed to initialize",
|
|
0x24: "Failed to authenticate generic image",
|
|
0x25: "Invalid ELF hash table size. Too bit or small.",
|
|
0x26: "Invalid IMG Hash Table Size",
|
|
0x27: "Enumeration failed",
|
|
0x28: "Hardware Bulk transfer error"
|
|
}
|
|
|
|
|
|
class CommandHandler:
|
|
|
|
def pkt_hello_req(self, data):
|
|
if len(data) < 0xC * 0x4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
version = st.dword()
|
|
version_supported = st.dword()
|
|
cmd_packet_length = st.dword()
|
|
mode = st.dword()
|
|
reserved1 = st.dword()
|
|
reserved2 = st.dword()
|
|
reserved3 = st.dword()
|
|
reserved4 = st.dword()
|
|
reserved5 = st.dword()
|
|
reserved6 = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_cmd_hdr(self, data):
|
|
if len(data) < 2 * 4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_read_data(self, data):
|
|
if len(data) < 0x5 * 0x4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
image_id = st.dword()
|
|
data_offset = st.dword()
|
|
data_len = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_read_data_64(self, data):
|
|
if len(data) < 0x8 + 0x3 * 0x8:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
image_id = st.qword()
|
|
data_offset = st.qword()
|
|
data_len = st.qword()
|
|
|
|
return req
|
|
|
|
def pkt_memory_debug(self, data):
|
|
if len(data) < 0x8 + 0x2 * 0x4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
memory_table_addr = st.dword()
|
|
memory_table_length = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_memory_debug_64(self, data):
|
|
if len(data) < 0x8 + 0x2 * 0x8:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
memory_table_addr = st.qword()
|
|
memory_table_length = st.qword()
|
|
|
|
return req
|
|
|
|
def pkt_execute_rsp_cmd(self, data):
|
|
if len(data) < 0x4 * 0x4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
client_cmd = st.dword()
|
|
data_len = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_image_end(self, data):
|
|
if len(data) < 0x4 * 0x4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
image_id = st.dword()
|
|
image_tx_status = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_done(self, data):
|
|
if len(data) < 0x3 * 4:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
cmd = st.dword()
|
|
len = st.dword()
|
|
image_tx_status = st.dword()
|
|
|
|
return req
|
|
|
|
def pkt_info(self, data):
|
|
if len(data) < 0x3 * 4 + 0x20:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
serial = st.dword()
|
|
msm_id = st.dword()
|
|
pk_hash = st.bytes(32)
|
|
pbl_sw = st.dword()
|
|
|
|
return req
|
|
|
|
def parttbl(self, data):
|
|
if len(data) < (0x3 * 4) + 20 + 20:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
save_pref = st.dword()
|
|
mem_base = st.dword()
|
|
length = st.dword()
|
|
desc = st.string(20)
|
|
filename = st.string(20)
|
|
|
|
return req
|
|
|
|
def parttbl_64bit(self, data):
|
|
if len(data) < (0x3 * 8) + 20 + 20:
|
|
raise DataError
|
|
st = structhelper_io(BytesIO(data))
|
|
|
|
class req:
|
|
save_pref = st.qword()
|
|
mem_base = st.qword()
|
|
length = st.qword()
|
|
desc = st.string(20)
|
|
filename = st.string(20)
|
|
|
|
return req
|