amiro-blt / Target / Modules / DiWheelDrive_1-1 / Boot / hooks.c @ fad4c1e7
History | View | Annotate | Download (22.177 KB)
1 |
/************************************************************************************//** |
---|---|
2 |
* \file Demo\ARMCM3_STM32_Olimex_STM32P103_GCC\Boot\hooks.c
|
3 |
* \brief Bootloader callback source file.
|
4 |
* \ingroup Boot_ARMCM3_STM32_Olimex_STM32P103_GCC
|
5 |
* \internal
|
6 |
*----------------------------------------------------------------------------------------
|
7 |
* C O P Y R I G H T
|
8 |
*----------------------------------------------------------------------------------------
|
9 |
* Copyright (c) 2012 by Feaser http://www.feaser.com All rights reserved
|
10 |
*
|
11 |
*----------------------------------------------------------------------------------------
|
12 |
* L I C E N S E
|
13 |
*----------------------------------------------------------------------------------------
|
14 |
* This file is part of OpenBLT. OpenBLT is free software: you can redistribute it and/or
|
15 |
* modify it under the terms of the GNU General Public License as published by the Free
|
16 |
* Software Foundation, either version 3 of the License, or (at your option) any later
|
17 |
* version.
|
18 |
*
|
19 |
* OpenBLT is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
|
20 |
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
21 |
* PURPOSE. See the GNU General Public License for more details.
|
22 |
*
|
23 |
* You should have received a copy of the GNU General Public License along with OpenBLT.
|
24 |
* If not, see <http://www.gnu.org/licenses/>.
|
25 |
*
|
26 |
* A special exception to the GPL is included to allow you to distribute a combined work
|
27 |
* that includes OpenBLT without being obliged to provide the source code for any
|
28 |
* proprietary components. The exception text is included at the bottom of the license
|
29 |
* file <license.html>.
|
30 |
*
|
31 |
* \endinternal
|
32 |
****************************************************************************************/
|
33 |
|
34 |
/****************************************************************************************
|
35 |
* Include files
|
36 |
****************************************************************************************/
|
37 |
#include "boot.h" /* bootloader generic header */ |
38 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
39 |
#include "stm32f10x.h" /* STM32 registers */ |
40 |
#include "stm32f10x_conf.h" /* STM32 peripheral drivers */ |
41 |
#endif
|
42 |
|
43 |
/****************************************************************************************
|
44 |
* B A C K D O O R E N T R Y H O O K F U N C T I O N S
|
45 |
****************************************************************************************/
|
46 |
|
47 |
#if (BOOT_BACKDOOR_HOOKS_ENABLE > 0) |
48 |
|
49 |
static blt_int32u backdoorOpenTime;
|
50 |
#define BACKDOOR_ENTRY_TIMEOUT_MS 500 |
51 |
static blt_bool timeRanOut = BLT_FALSE;
|
52 |
enum BOOT_STATE {BOOT_FLASH_CHECK,
|
53 |
BOOT_FLASH_WAIT, |
54 |
BOOT_OS_SYNC, |
55 |
BOOT_OS_START |
56 |
} boot_state; |
57 |
|
58 |
#define SYS_PD_N_PIN GPIO_Pin_8
|
59 |
#define SYS_PD_N_GPIO GPIOC
|
60 |
#define SYS_SYNC_N_PIN GPIO_Pin_1
|
61 |
#define SYS_SYNC_N_GPIO GPIOC
|
62 |
|
63 |
/************************************************************************************//** |
64 |
** \brief Initializes the backdoor entry option.
|
65 |
** \return none.
|
66 |
**
|
67 |
****************************************************************************************/
|
68 |
void BackDoorInitHook(void) |
69 |
{ |
70 |
backdoorOpenTime = TimerGet(); |
71 |
boot_state = BOOT_FLASH_CHECK; |
72 |
} /*** end of BackDoorInitHook ***/
|
73 |
|
74 |
|
75 |
/************************************************************************************//** |
76 |
** \brief Checks if it has to stay in backdoor.
|
77 |
** \return BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
|
78 |
**
|
79 |
****************************************************************************************/
|
80 |
blt_bool BackDoorEntryCheck(void)
|
81 |
{ |
82 |
/* evaluate the fsm state */
|
83 |
switch (boot_state) {
|
84 |
case BOOT_FLASH_CHECK:
|
85 |
{ |
86 |
/* wait for a timeout */
|
87 |
if (timeRanOut == BLT_FALSE) {
|
88 |
if (TimerGet() > backdoorOpenTime+BACKDOOR_ENTRY_TIMEOUT_MS) {
|
89 |
timeRanOut = BLT_TRUE; |
90 |
boot_state = BOOT_FLASH_WAIT; |
91 |
GPIO_SetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN); |
92 |
} |
93 |
} |
94 |
return BLT_TRUE;
|
95 |
break;
|
96 |
} |
97 |
case BOOT_FLASH_WAIT:
|
98 |
{ |
99 |
/* wait for the SYS_SYNC_N signal to go up */
|
100 |
if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
|
101 |
return BLT_TRUE;
|
102 |
} else {
|
103 |
boot_state = BOOT_OS_SYNC; |
104 |
return BLT_FALSE;
|
105 |
} |
106 |
} |
107 |
default:
|
108 |
return BLT_FALSE;
|
109 |
break;
|
110 |
} |
111 |
return BLT_FALSE;
|
112 |
} /*** end of BackDoorEntryHook ***/
|
113 |
|
114 |
|
115 |
/************************************************************************************//** |
116 |
** \brief Checks if a backdoor entry is requested.
|
117 |
** \return BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
|
118 |
**
|
119 |
****************************************************************************************/
|
120 |
blt_bool BackDoorEntryHook(void)
|
121 |
{ |
122 |
/* default implementation always activates the bootloader after a reset */
|
123 |
return BLT_TRUE;
|
124 |
} /*** end of BackDoorEntryHook ***/
|
125 |
#endif /* BOOT_BACKDOOR_HOOKS_ENABLE > 0 */ |
126 |
|
127 |
|
128 |
/************************************************************************************//** |
129 |
** \brief Notice that there is still an open connection over COM
|
130 |
** \return -
|
131 |
**
|
132 |
****************************************************************************************/
|
133 |
void BackDoorComIsConnected(void) |
134 |
{ |
135 |
backdoorOpenTime = TimerGet(); |
136 |
} |
137 |
|
138 |
|
139 |
/****************************************************************************************
|
140 |
* C P U D R I V E R H O O K F U N C T I O N S
|
141 |
****************************************************************************************/
|
142 |
|
143 |
#if (BOOT_CPU_USER_PROGRAM_START_HOOK > 0) |
144 |
/************************************************************************************//** |
145 |
** \brief Callback that gets called when the bootloader is about to exit and
|
146 |
** hand over control to the user program. This is the last moment that
|
147 |
** some final checking can be performed and if necessary prevent the
|
148 |
** bootloader from activiting the user program.
|
149 |
** \return BLT_TRUE if it is okay to start the user program, BLT_FALSE to keep
|
150 |
** keep the bootloader active.
|
151 |
**
|
152 |
****************************************************************************************/
|
153 |
blt_bool CpuUserProgramStartHook(void)
|
154 |
{ |
155 |
/* evaluate the fsm state */
|
156 |
switch (boot_state) {
|
157 |
case BOOT_OS_SYNC:
|
158 |
{ |
159 |
/* wait for the SYS_SYNC_N signal to go down */
|
160 |
|
161 |
if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
|
162 |
boot_state = BOOT_OS_START; |
163 |
} |
164 |
return BLT_FALSE;
|
165 |
break;
|
166 |
} |
167 |
case BOOT_OS_START:
|
168 |
{ |
169 |
/* pull down SYS_SYNC_N to indicate that the module is busy
|
170 |
* note: This is optional at this point. The OS however MUST pull down SYS_SYNC_N until it is ready */
|
171 |
GPIO_ResetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN); |
172 |
return BLT_TRUE;
|
173 |
} |
174 |
default:
|
175 |
return BLT_FALSE;
|
176 |
break;
|
177 |
} |
178 |
return BLT_FALSE;
|
179 |
|
180 |
} /*** end of CpuUserProgramStartHook ***/
|
181 |
#endif /* BOOT_CPU_USER_PROGRAM_START_HOOK > 0 */ |
182 |
|
183 |
|
184 |
/****************************************************************************************
|
185 |
* N O N - V O L A T I L E M E M O R Y D R I V E R H O O K F U N C T I O N S
|
186 |
****************************************************************************************/
|
187 |
|
188 |
#if (BOOT_NVM_HOOKS_ENABLE > 0) |
189 |
/************************************************************************************//** |
190 |
** \brief Callback that gets called at the start of the internal NVM driver
|
191 |
** initialization routine.
|
192 |
** \return none.
|
193 |
**
|
194 |
****************************************************************************************/
|
195 |
void NvmInitHook(void) |
196 |
{ |
197 |
} /*** end of NvmInitHook ***/
|
198 |
|
199 |
|
200 |
/************************************************************************************//** |
201 |
** \brief Callback that gets called at the start of the NVM driver write
|
202 |
** routine. It allows additional memory to be operated on. If the address
|
203 |
** is not within the range of the additional memory, then
|
204 |
** BLT_NVM_NOT_IN_RANGE must be returned to indicate that the data hasn't
|
205 |
** been written yet.
|
206 |
** \param addr Start address.
|
207 |
** \param len Length in bytes.
|
208 |
** \param data Pointer to the data buffer.
|
209 |
** \return BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
|
210 |
** not within the supported memory range, or BLT_NVM_ERROR is the write
|
211 |
** operation failed.
|
212 |
**
|
213 |
****************************************************************************************/
|
214 |
blt_int8u NvmWriteHook(blt_addr addr, blt_int32u len, blt_int8u *data) |
215 |
{ |
216 |
return BLT_NVM_NOT_IN_RANGE;
|
217 |
} /*** end of NvmWriteHook ***/
|
218 |
|
219 |
|
220 |
/************************************************************************************//** |
221 |
** \brief Callback that gets called at the start of the NVM driver erase
|
222 |
** routine. It allows additional memory to be operated on. If the address
|
223 |
** is not within the range of the additional memory, then
|
224 |
** BLT_NVM_NOT_IN_RANGE must be returned to indicate that the memory
|
225 |
** hasn't been erased yet.
|
226 |
** \param addr Start address.
|
227 |
** \param len Length in bytes.
|
228 |
** \return BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
|
229 |
** not within the supported memory range, or BLT_NVM_ERROR is the erase
|
230 |
** operation failed.
|
231 |
**
|
232 |
****************************************************************************************/
|
233 |
blt_int8u NvmEraseHook(blt_addr addr, blt_int32u len) |
234 |
{ |
235 |
return BLT_NVM_NOT_IN_RANGE;
|
236 |
} /*** end of NvmEraseHook ***/
|
237 |
|
238 |
|
239 |
/************************************************************************************//** |
240 |
** \brief Callback that gets called at the end of the NVM programming session.
|
241 |
** \return BLT_TRUE is successful, BLT_FALSE otherwise.
|
242 |
**
|
243 |
****************************************************************************************/
|
244 |
blt_bool NvmDoneHook(void)
|
245 |
{ |
246 |
return BLT_TRUE;
|
247 |
} /*** end of NvmDoneHook ***/
|
248 |
#endif /* BOOT_NVM_HOOKS_ENABLE > 0 */ |
249 |
|
250 |
|
251 |
#if (BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0) |
252 |
/************************************************************************************//** |
253 |
** \brief Verifies the checksum, which indicates that a valid user program is
|
254 |
** present and can be started.
|
255 |
** \return BLT_TRUE if successful, BLT_FALSE otherwise.
|
256 |
**
|
257 |
****************************************************************************************/
|
258 |
blt_bool NvmVerifyChecksumHook(void)
|
259 |
{ |
260 |
return BLT_TRUE;
|
261 |
} /*** end of NvmVerifyChecksum ***/
|
262 |
|
263 |
|
264 |
/************************************************************************************//** |
265 |
** \brief Writes a checksum of the user program to non-volatile memory. This is
|
266 |
** performed once the entire user program has been programmed. Through
|
267 |
** the checksum, the bootloader can check if a valid user programming is
|
268 |
** present and can be started.
|
269 |
** \return BLT_TRUE if successful, BLT_FALSE otherwise.
|
270 |
**
|
271 |
****************************************************************************************/
|
272 |
blt_bool NvmWriteChecksumHook(void)
|
273 |
{ |
274 |
return BLT_TRUE;
|
275 |
} |
276 |
#endif /* BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0 */ |
277 |
|
278 |
|
279 |
/****************************************************************************************
|
280 |
* W A T C H D O G D R I V E R H O O K F U N C T I O N S
|
281 |
****************************************************************************************/
|
282 |
|
283 |
#if (BOOT_COP_HOOKS_ENABLE > 0) |
284 |
/************************************************************************************//** |
285 |
** \brief Callback that gets called at the end of the internal COP driver
|
286 |
** initialization routine. It can be used to configure and enable the
|
287 |
** watchdog.
|
288 |
** \return none.
|
289 |
**
|
290 |
****************************************************************************************/
|
291 |
void CopInitHook(void) |
292 |
{ |
293 |
} /*** end of CopInitHook ***/
|
294 |
|
295 |
|
296 |
/************************************************************************************//** |
297 |
** \brief Callback that gets called at the end of the internal COP driver
|
298 |
** service routine. This gets called upon initialization and during
|
299 |
** potential long lasting loops and routine. It can be used to service
|
300 |
** the watchdog to prevent a watchdog reset.
|
301 |
** \return none.
|
302 |
**
|
303 |
****************************************************************************************/
|
304 |
void CopServiceHook(void) |
305 |
{ |
306 |
} /*** end of CopServiceHook ***/
|
307 |
#endif /* BOOT_COP_HOOKS_ENABLE > 0 */ |
308 |
|
309 |
|
310 |
/****************************************************************************************
|
311 |
* F I L E S Y S T E M I N T E R F A C E H O O K F U N C T I O N S
|
312 |
****************************************************************************************/
|
313 |
|
314 |
#if (BOOT_FILE_SYS_ENABLE > 0) |
315 |
|
316 |
/****************************************************************************************
|
317 |
* Constant data declarations
|
318 |
****************************************************************************************/
|
319 |
/** \brief Firmware filename. */
|
320 |
static const blt_char firmwareFilename[] = "/demoprog_olimex_stm32p103.srec"; |
321 |
|
322 |
|
323 |
/****************************************************************************************
|
324 |
* Local data declarations
|
325 |
****************************************************************************************/
|
326 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
327 |
/** \brief Data structure for grouping log-file related information. */
|
328 |
static struct |
329 |
{ |
330 |
FIL handle; /**< FatFS handle to the log-file. */
|
331 |
blt_bool canUse; /**< Flag to indicate if the log-file can be used. */
|
332 |
} logfile; |
333 |
#endif
|
334 |
|
335 |
|
336 |
/************************************************************************************//** |
337 |
** \brief Callback that gets called to check whether a firmware update from
|
338 |
** local file storage should be started. This could for example be when
|
339 |
** a switch is pressed, when a certain file is found on the local file
|
340 |
** storage, etc.
|
341 |
** \return BLT_TRUE if a firmware update is requested, BLT_FALSE otherwise.
|
342 |
**
|
343 |
****************************************************************************************/
|
344 |
blt_bool FileIsFirmwareUpdateRequestedHook(void)
|
345 |
{ |
346 |
FILINFO fileInfoObject = { 0 }; /* needs to be zeroed according to f_stat docs */; |
347 |
|
348 |
/* Current example implementation looks for a predetermined firmware file on the
|
349 |
* SD-card. If the SD-card is accessible and the firmware file was found the firmware
|
350 |
* update is started. When successfully completed, the firmware file is deleted.
|
351 |
* During the firmware update, progress information is written to a file called
|
352 |
* bootlog.txt and additionally outputted on UART @57600 bps for debugging purposes.
|
353 |
*/
|
354 |
/* check if firmware file is present and SD-card is accessible */
|
355 |
if (f_stat(firmwareFilename, &fileInfoObject) == FR_OK)
|
356 |
{ |
357 |
/* check if the filesize is valid and that it is not a directory */
|
358 |
if ( (fileInfoObject.fsize > 0) && (!(fileInfoObject.fattrib & AM_DIR)) ) |
359 |
{ |
360 |
/* all conditions are met to start a firmware update from local file storage */
|
361 |
return BLT_TRUE;
|
362 |
} |
363 |
} |
364 |
/* still here so no firmware update request is pending */
|
365 |
return BLT_FALSE;
|
366 |
} /*** end of FileIsFirmwareUpdateRequestedHook ***/
|
367 |
|
368 |
|
369 |
/************************************************************************************//** |
370 |
** \brief Callback to obtain the filename of the firmware file that should be
|
371 |
** used during the firmware update from the local file storage. This
|
372 |
** hook function is called at the beginning of the firmware update from
|
373 |
** local storage sequence.
|
374 |
** \return valid firmware filename with full path or BLT_NULL.
|
375 |
**
|
376 |
****************************************************************************************/
|
377 |
const blt_char *FileGetFirmwareFilenameHook(void) |
378 |
{ |
379 |
return firmwareFilename;
|
380 |
} /*** end of FileGetFirmwareFilenameHook ***/
|
381 |
|
382 |
|
383 |
#if (BOOT_FILE_STARTED_HOOK_ENABLE > 0) |
384 |
/************************************************************************************//** |
385 |
** \brief Callback that gets called to inform the application that a firmware
|
386 |
** update from local storage just started.
|
387 |
** \return none.
|
388 |
**
|
389 |
****************************************************************************************/
|
390 |
void FileFirmwareUpdateStartedHook(void) |
391 |
{ |
392 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
393 |
/* create/overwrite the logfile */
|
394 |
logfile.canUse = BLT_FALSE; |
395 |
if (f_open(&logfile.handle, "/bootlog.txt", FA_CREATE_ALWAYS | FA_WRITE) == FR_OK) |
396 |
{ |
397 |
logfile.canUse = BLT_TRUE; |
398 |
} |
399 |
#endif
|
400 |
} /*** end of FileFirmwareUpdateStartedHook ***/
|
401 |
#endif /* BOOT_FILE_STARTED_HOOK_ENABLE > 0 */ |
402 |
|
403 |
|
404 |
#if (BOOT_FILE_COMPLETED_HOOK_ENABLE > 0) |
405 |
/************************************************************************************//** |
406 |
** \brief Callback that gets called to inform the application that a firmware
|
407 |
** update was successfully completed.
|
408 |
** \return none.
|
409 |
**
|
410 |
****************************************************************************************/
|
411 |
void FileFirmwareUpdateCompletedHook(void) |
412 |
{ |
413 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
414 |
/* close the log file */
|
415 |
if (logfile.canUse == BLT_TRUE)
|
416 |
{ |
417 |
f_close(&logfile.handle); |
418 |
} |
419 |
/* wait for all logging related transmission to complete */
|
420 |
while(USART_GetFlagStatus(USART2, USART_FLAG_TC) == RESET);
|
421 |
#endif
|
422 |
/* now delete the firmware file from the disk since the update was successful */
|
423 |
f_unlink(firmwareFilename); |
424 |
} /*** end of FileFirmwareUpdateCompletedHook ***/
|
425 |
#endif /* BOOT_FILE_COMPLETED_HOOK_ENABLE > 0 */ |
426 |
|
427 |
|
428 |
#if (BOOT_FILE_ERROR_HOOK_ENABLE > 0) |
429 |
/************************************************************************************//** |
430 |
** \brief Callback that gets called in case an error occurred during a firmware
|
431 |
** update. Refer to <file.h> for a list of available error codes.
|
432 |
** \return none.
|
433 |
**
|
434 |
****************************************************************************************/
|
435 |
void FileFirmwareUpdateErrorHook(blt_int8u error_code)
|
436 |
{ |
437 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
438 |
/* error detected which stops the firmware update, so close the log file */
|
439 |
if (logfile.canUse == BLT_TRUE)
|
440 |
{ |
441 |
f_close(&logfile.handle); |
442 |
} |
443 |
#endif
|
444 |
} /*** end of FileFirmwareUpdateErrorHook ***/
|
445 |
#endif /* BOOT_FILE_ERROR_HOOK_ENABLE > 0 */ |
446 |
|
447 |
|
448 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
449 |
/************************************************************************************//** |
450 |
** \brief Callback that gets called each time new log information becomes
|
451 |
** available during a firmware update.
|
452 |
** \param info_string Pointer to a character array with the log entry info.
|
453 |
** \return none.
|
454 |
**
|
455 |
****************************************************************************************/
|
456 |
void FileFirmwareUpdateLogHook(blt_char *info_string)
|
457 |
{ |
458 |
/* write the string to the log file */
|
459 |
if (logfile.canUse == BLT_TRUE)
|
460 |
{ |
461 |
if (f_puts(info_string, &logfile.handle) < 0) |
462 |
{ |
463 |
logfile.canUse = BLT_FALSE; |
464 |
f_close(&logfile.handle); |
465 |
} |
466 |
} |
467 |
/* echo all characters in the string on UART */
|
468 |
while(*info_string != '\0') |
469 |
{ |
470 |
/* write character to transmit holding register */
|
471 |
USART_SendData(USART2, *info_string); |
472 |
/* wait for tx holding register to be empty */
|
473 |
while(USART_GetFlagStatus(USART2, USART_FLAG_TXE) == RESET);
|
474 |
/* point to the next character in the string */
|
475 |
info_string++; |
476 |
} |
477 |
} /*** end of FileFirmwareUpdateLogHook ***/
|
478 |
#endif /* BOOT_FILE_LOGGING_ENABLE > 0 */ |
479 |
|
480 |
|
481 |
#endif /* BOOT_FILE_SYS_ENABLE > 0 */ |
482 |
|
483 |
|
484 |
/****************************************************************************************
|
485 |
* S E E D / K E Y S E C U R I T Y H O O K F U N C T I O N S
|
486 |
****************************************************************************************/
|
487 |
|
488 |
#if (BOOT_XCP_SEED_KEY_ENABLE > 0) |
489 |
/************************************************************************************//** |
490 |
** \brief Provides a seed to the XCP master that will be used for the key
|
491 |
** generation when the master attempts to unlock the specified resource.
|
492 |
** Called by the GET_SEED command.
|
493 |
** \param resource Resource that the seed if requested for (XCP_RES_XXX).
|
494 |
** \param seed Pointer to byte buffer wher the seed will be stored.
|
495 |
** \return Length of the seed in bytes.
|
496 |
**
|
497 |
****************************************************************************************/
|
498 |
blt_int8u XcpGetSeedHook(blt_int8u resource, blt_int8u *seed) |
499 |
{ |
500 |
/* request seed for unlocking ProGraMming resource */
|
501 |
if ((resource & XCP_RES_PGM) != 0) |
502 |
{ |
503 |
seed[0] = 0x55; |
504 |
} |
505 |
|
506 |
/* return seed length */
|
507 |
return 1; |
508 |
} /*** end of XcpGetSeedHook ***/
|
509 |
|
510 |
|
511 |
/************************************************************************************//** |
512 |
** \brief Called by the UNLOCK command and checks if the key to unlock the
|
513 |
** specified resource was correct. If so, then the resource protection
|
514 |
** will be removed.
|
515 |
** \param resource resource to unlock (XCP_RES_XXX).
|
516 |
** \param key pointer to the byte buffer holding the key.
|
517 |
** \param len length of the key in bytes.
|
518 |
** \return 1 if the key was correct, 0 otherwise.
|
519 |
**
|
520 |
****************************************************************************************/
|
521 |
blt_int8u XcpVerifyKeyHook(blt_int8u resource, blt_int8u *key, blt_int8u len) |
522 |
{ |
523 |
/* suppress compiler warning for unused parameter */
|
524 |
len = len; |
525 |
|
526 |
/* the example key algorithm in "FeaserKey.dll" works as follows:
|
527 |
* - PGM will be unlocked if key = seed - 1
|
528 |
*/
|
529 |
|
530 |
/* check key for unlocking ProGraMming resource */
|
531 |
if ((resource == XCP_RES_PGM) && (key[0] == (0x55-1))) |
532 |
{ |
533 |
/* correct key received for unlocking PGM resource */
|
534 |
return 1; |
535 |
} |
536 |
|
537 |
/* still here so key incorrect */
|
538 |
return 0; |
539 |
} /*** end of XcpVerifyKeyHook ***/
|
540 |
#endif /* BOOT_XCP_SEED_KEY_ENABLE > 0 */ |
541 |
|
542 |
|
543 |
/*********************************** end of hooks.c ************************************/
|