amiro-blt / Target / Modules / DiWheelDrive_1-1 / Boot / hooks.c @ master
History | View | Annotate | Download (22.186 KB)
1 |
/************************************************************************************//** |
---|---|
2 |
* \file Demo\ARMCM3_STM32_Olimex_STM32P103_GCC\Boot\hooks.c
|
3 |
* \brief Bootloader callback source file.
|
4 |
* \ingroup Boot_ARMCM3_STM32_Olimex_STM32P103_GCC
|
5 |
* \internal
|
6 |
*----------------------------------------------------------------------------------------
|
7 |
* C O P Y R I G H T
|
8 |
*----------------------------------------------------------------------------------------
|
9 |
* Copyright (c) 2012 by Feaser http://www.feaser.com All rights reserved
|
10 |
*
|
11 |
*----------------------------------------------------------------------------------------
|
12 |
* L I C E N S E
|
13 |
*----------------------------------------------------------------------------------------
|
14 |
* This file is part of OpenBLT. OpenBLT is free software: you can redistribute it and/or
|
15 |
* modify it under the terms of the GNU General Public License as published by the Free
|
16 |
* Software Foundation, either version 3 of the License, or (at your option) any later
|
17 |
* version.
|
18 |
*
|
19 |
* OpenBLT is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
|
20 |
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
21 |
* PURPOSE. See the GNU General Public License for more details.
|
22 |
*
|
23 |
* You should have received a copy of the GNU General Public License along with OpenBLT.
|
24 |
* If not, see <http://www.gnu.org/licenses/>.
|
25 |
*
|
26 |
* A special exception to the GPL is included to allow you to distribute a combined work
|
27 |
* that includes OpenBLT without being obliged to provide the source code for any
|
28 |
* proprietary components. The exception text is included at the bottom of the license
|
29 |
* file <license.html>.
|
30 |
*
|
31 |
* \endinternal
|
32 |
****************************************************************************************/
|
33 |
|
34 |
/****************************************************************************************
|
35 |
* Include files
|
36 |
****************************************************************************************/
|
37 |
#include "boot.h" /* bootloader generic header */ |
38 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
39 |
#include "stm32f10x.h" /* STM32 registers */ |
40 |
#include "stm32f10x_conf.h" /* STM32 peripheral drivers */ |
41 |
#endif
|
42 |
|
43 |
/****************************************************************************************
|
44 |
* B A C K D O O R E N T R Y H O O K F U N C T I O N S
|
45 |
****************************************************************************************/
|
46 |
|
47 |
#if (BOOT_BACKDOOR_HOOKS_ENABLE > 0) |
48 |
|
49 |
static blt_int32u backdoorOpenTime;
|
50 |
#define BACKDOOR_ENTRY_TIMEOUT_MS 500 |
51 |
static blt_bool timeRanOut = BLT_FALSE;
|
52 |
enum BOOT_STATE {BOOT_FLASH_CHECK,
|
53 |
BOOT_FLASH_WAIT, |
54 |
BOOT_OS_SYNC, |
55 |
BOOT_OS_START |
56 |
} boot_state; |
57 |
|
58 |
#define SYS_PD_N_PIN GPIO_Pin_8
|
59 |
#define SYS_PD_N_GPIO GPIOC
|
60 |
#define SYS_SYNC_N_PIN GPIO_Pin_1
|
61 |
#define SYS_SYNC_N_GPIO GPIOC
|
62 |
|
63 |
/************************************************************************************//** |
64 |
** \brief Initializes the backdoor entry option.
|
65 |
** \return none.
|
66 |
**
|
67 |
****************************************************************************************/
|
68 |
void BackDoorInitHook(void) |
69 |
{ |
70 |
backdoorOpenTime = TimerGet(); |
71 |
boot_state = BOOT_FLASH_CHECK; |
72 |
} /*** end of BackDoorInitHook ***/
|
73 |
|
74 |
|
75 |
/************************************************************************************//** |
76 |
** \brief Checks if it has to stay in backdoor.
|
77 |
** \return BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
|
78 |
**
|
79 |
****************************************************************************************/
|
80 |
blt_bool BackDoorEntryCheck(void)
|
81 |
{ |
82 |
/* evaluate the fsm state */
|
83 |
switch (boot_state) {
|
84 |
case BOOT_FLASH_CHECK:
|
85 |
{ |
86 |
/* wait for a timeout */
|
87 |
if (timeRanOut == BLT_FALSE) {
|
88 |
if (TimerGet() > backdoorOpenTime+BACKDOOR_ENTRY_TIMEOUT_MS) {
|
89 |
timeRanOut = BLT_TRUE; |
90 |
boot_state = BOOT_FLASH_WAIT; |
91 |
GPIO_SetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN); |
92 |
} |
93 |
} |
94 |
return BLT_TRUE;
|
95 |
break;
|
96 |
} |
97 |
case BOOT_FLASH_WAIT:
|
98 |
{ |
99 |
/* wait for the SYS_SYNC_N signal to go up */
|
100 |
if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
|
101 |
return BLT_TRUE;
|
102 |
} else {
|
103 |
boot_state = BOOT_OS_SYNC; |
104 |
return BLT_FALSE;
|
105 |
} |
106 |
break;
|
107 |
} |
108 |
default:
|
109 |
return BLT_FALSE;
|
110 |
break;
|
111 |
} |
112 |
return BLT_FALSE;
|
113 |
} /*** end of BackDoorEntryCheck ***/
|
114 |
|
115 |
/************************************************************************************//** |
116 |
** \brief Checks if a backdoor entry is requested.
|
117 |
** \return BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
|
118 |
**
|
119 |
****************************************************************************************/
|
120 |
blt_bool BackDoorEntryHook(void)
|
121 |
{ |
122 |
/* default implementation always activates the bootloader after a reset */
|
123 |
return BLT_TRUE;
|
124 |
} /*** end of BackDoorEntryHook ***/
|
125 |
#endif /* BOOT_BACKDOOR_HOOKS_ENABLE > 0 */ |
126 |
|
127 |
|
128 |
/************************************************************************************//** |
129 |
** \brief Notice that there is still an open connection over COM
|
130 |
** \return -
|
131 |
**
|
132 |
****************************************************************************************/
|
133 |
void BackDoorComIsConnected(void) |
134 |
{ |
135 |
backdoorOpenTime = TimerGet(); |
136 |
} |
137 |
|
138 |
|
139 |
/****************************************************************************************
|
140 |
* C P U D R I V E R H O O K F U N C T I O N S
|
141 |
****************************************************************************************/
|
142 |
|
143 |
#if (BOOT_CPU_USER_PROGRAM_START_HOOK > 0) |
144 |
/************************************************************************************//** |
145 |
** \brief Callback that gets called when the bootloader is about to exit and
|
146 |
** hand over control to the user program. This is the last moment that
|
147 |
** some final checking can be performed and if necessary prevent the
|
148 |
** bootloader from activiting the user program.
|
149 |
** \return BLT_TRUE if it is okay to start the user program, BLT_FALSE to keep
|
150 |
** keep the bootloader active.
|
151 |
**
|
152 |
****************************************************************************************/
|
153 |
blt_bool CpuUserProgramStartHook(void)
|
154 |
{ |
155 |
/* evaluate the fsm state */
|
156 |
switch (boot_state) {
|
157 |
case BOOT_OS_SYNC:
|
158 |
{ |
159 |
/* wait for the SYS_SYNC_N signal to go down */
|
160 |
if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
|
161 |
boot_state = BOOT_OS_START; |
162 |
} |
163 |
return BLT_FALSE;
|
164 |
break;
|
165 |
} |
166 |
case BOOT_OS_START:
|
167 |
{ |
168 |
/* pull down SYS_SYNC_N to indicate that the module is busy
|
169 |
* note: This is optional at this point. The OS however MUST pull down SYS_SYNC_N until it is ready */
|
170 |
GPIO_ResetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN); |
171 |
return BLT_TRUE;
|
172 |
} |
173 |
default:
|
174 |
return BLT_FALSE;
|
175 |
break;
|
176 |
} |
177 |
return BLT_FALSE;
|
178 |
} /*** end of CpuUserProgramStartHook ***/
|
179 |
#endif /* BOOT_CPU_USER_PROGRAM_START_HOOK > 0 */ |
180 |
|
181 |
|
182 |
/****************************************************************************************
|
183 |
* N O N - V O L A T I L E M E M O R Y D R I V E R H O O K F U N C T I O N S
|
184 |
****************************************************************************************/
|
185 |
|
186 |
#if (BOOT_NVM_HOOKS_ENABLE > 0) |
187 |
/************************************************************************************//** |
188 |
** \brief Callback that gets called at the start of the internal NVM driver
|
189 |
** initialization routine.
|
190 |
** \return none.
|
191 |
**
|
192 |
****************************************************************************************/
|
193 |
void NvmInitHook(void) |
194 |
{ |
195 |
} /*** end of NvmInitHook ***/
|
196 |
|
197 |
|
198 |
/************************************************************************************//** |
199 |
** \brief Callback that gets called at the start of the NVM driver write
|
200 |
** routine. It allows additional memory to be operated on. If the address
|
201 |
** is not within the range of the additional memory, then
|
202 |
** BLT_NVM_NOT_IN_RANGE must be returned to indicate that the data hasn't
|
203 |
** been written yet.
|
204 |
** \param addr Start address.
|
205 |
** \param len Length in bytes.
|
206 |
** \param data Pointer to the data buffer.
|
207 |
** \return BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
|
208 |
** not within the supported memory range, or BLT_NVM_ERROR is the write
|
209 |
** operation failed.
|
210 |
**
|
211 |
****************************************************************************************/
|
212 |
blt_int8u NvmWriteHook(blt_addr addr, blt_int32u len, blt_int8u *data) |
213 |
{ |
214 |
return BLT_NVM_NOT_IN_RANGE;
|
215 |
} /*** end of NvmWriteHook ***/
|
216 |
|
217 |
|
218 |
/************************************************************************************//** |
219 |
** \brief Callback that gets called at the start of the NVM driver erase
|
220 |
** routine. It allows additional memory to be operated on. If the address
|
221 |
** is not within the range of the additional memory, then
|
222 |
** BLT_NVM_NOT_IN_RANGE must be returned to indicate that the memory
|
223 |
** hasn't been erased yet.
|
224 |
** \param addr Start address.
|
225 |
** \param len Length in bytes.
|
226 |
** \return BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
|
227 |
** not within the supported memory range, or BLT_NVM_ERROR is the erase
|
228 |
** operation failed.
|
229 |
**
|
230 |
****************************************************************************************/
|
231 |
blt_int8u NvmEraseHook(blt_addr addr, blt_int32u len) |
232 |
{ |
233 |
return BLT_NVM_NOT_IN_RANGE;
|
234 |
} /*** end of NvmEraseHook ***/
|
235 |
|
236 |
|
237 |
/************************************************************************************//** |
238 |
** \brief Callback that gets called at the end of the NVM programming session.
|
239 |
** \return BLT_TRUE is successful, BLT_FALSE otherwise.
|
240 |
**
|
241 |
****************************************************************************************/
|
242 |
blt_bool NvmDoneHook(void)
|
243 |
{ |
244 |
return BLT_TRUE;
|
245 |
} /*** end of NvmDoneHook ***/
|
246 |
#endif /* BOOT_NVM_HOOKS_ENABLE > 0 */ |
247 |
|
248 |
|
249 |
#if (BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0) |
250 |
/************************************************************************************//** |
251 |
** \brief Verifies the checksum, which indicates that a valid user program is
|
252 |
** present and can be started.
|
253 |
** \return BLT_TRUE if successful, BLT_FALSE otherwise.
|
254 |
**
|
255 |
****************************************************************************************/
|
256 |
blt_bool NvmVerifyChecksumHook(void)
|
257 |
{ |
258 |
return BLT_TRUE;
|
259 |
} /*** end of NvmVerifyChecksum ***/
|
260 |
|
261 |
|
262 |
/************************************************************************************//** |
263 |
** \brief Writes a checksum of the user program to non-volatile memory. This is
|
264 |
** performed once the entire user program has been programmed. Through
|
265 |
** the checksum, the bootloader can check if a valid user programming is
|
266 |
** present and can be started.
|
267 |
** \return BLT_TRUE if successful, BLT_FALSE otherwise.
|
268 |
**
|
269 |
****************************************************************************************/
|
270 |
blt_bool NvmWriteChecksumHook(void)
|
271 |
{ |
272 |
return BLT_TRUE;
|
273 |
} |
274 |
#endif /* BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0 */ |
275 |
|
276 |
|
277 |
/****************************************************************************************
|
278 |
* W A T C H D O G D R I V E R H O O K F U N C T I O N S
|
279 |
****************************************************************************************/
|
280 |
|
281 |
#if (BOOT_COP_HOOKS_ENABLE > 0) |
282 |
/************************************************************************************//** |
283 |
** \brief Callback that gets called at the end of the internal COP driver
|
284 |
** initialization routine. It can be used to configure and enable the
|
285 |
** watchdog.
|
286 |
** \return none.
|
287 |
**
|
288 |
****************************************************************************************/
|
289 |
void CopInitHook(void) |
290 |
{ |
291 |
} /*** end of CopInitHook ***/
|
292 |
|
293 |
|
294 |
/************************************************************************************//** |
295 |
** \brief Callback that gets called at the end of the internal COP driver
|
296 |
** service routine. This gets called upon initialization and during
|
297 |
** potential long lasting loops and routine. It can be used to service
|
298 |
** the watchdog to prevent a watchdog reset.
|
299 |
** \return none.
|
300 |
**
|
301 |
****************************************************************************************/
|
302 |
void CopServiceHook(void) |
303 |
{ |
304 |
} /*** end of CopServiceHook ***/
|
305 |
#endif /* BOOT_COP_HOOKS_ENABLE > 0 */ |
306 |
|
307 |
|
308 |
/****************************************************************************************
|
309 |
* F I L E S Y S T E M I N T E R F A C E H O O K F U N C T I O N S
|
310 |
****************************************************************************************/
|
311 |
|
312 |
#if (BOOT_FILE_SYS_ENABLE > 0) |
313 |
|
314 |
/****************************************************************************************
|
315 |
* Constant data declarations
|
316 |
****************************************************************************************/
|
317 |
/** \brief Firmware filename. */
|
318 |
static const blt_char firmwareFilename[] = "/demoprog_olimex_stm32p103.srec"; |
319 |
|
320 |
|
321 |
/****************************************************************************************
|
322 |
* Local data declarations
|
323 |
****************************************************************************************/
|
324 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
325 |
/** \brief Data structure for grouping log-file related information. */
|
326 |
static struct |
327 |
{ |
328 |
FIL handle; /**< FatFS handle to the log-file. */
|
329 |
blt_bool canUse; /**< Flag to indicate if the log-file can be used. */
|
330 |
} logfile; |
331 |
#endif
|
332 |
|
333 |
|
334 |
/************************************************************************************//** |
335 |
** \brief Callback that gets called to check whether a firmware update from
|
336 |
** local file storage should be started. This could for example be when
|
337 |
** a switch is pressed, when a certain file is found on the local file
|
338 |
** storage, etc.
|
339 |
** \return BLT_TRUE if a firmware update is requested, BLT_FALSE otherwise.
|
340 |
**
|
341 |
****************************************************************************************/
|
342 |
blt_bool FileIsFirmwareUpdateRequestedHook(void)
|
343 |
{ |
344 |
FILINFO fileInfoObject = { 0 }; /* needs to be zeroed according to f_stat docs */; |
345 |
|
346 |
/* Current example implementation looks for a predetermined firmware file on the
|
347 |
* SD-card. If the SD-card is accessible and the firmware file was found the firmware
|
348 |
* update is started. When successfully completed, the firmware file is deleted.
|
349 |
* During the firmware update, progress information is written to a file called
|
350 |
* bootlog.txt and additionally outputted on UART @57600 bps for debugging purposes.
|
351 |
*/
|
352 |
/* check if firmware file is present and SD-card is accessible */
|
353 |
if (f_stat(firmwareFilename, &fileInfoObject) == FR_OK)
|
354 |
{ |
355 |
/* check if the filesize is valid and that it is not a directory */
|
356 |
if ( (fileInfoObject.fsize > 0) && (!(fileInfoObject.fattrib & AM_DIR)) ) |
357 |
{ |
358 |
/* all conditions are met to start a firmware update from local file storage */
|
359 |
return BLT_TRUE;
|
360 |
} |
361 |
} |
362 |
/* still here so no firmware update request is pending */
|
363 |
return BLT_FALSE;
|
364 |
} /*** end of FileIsFirmwareUpdateRequestedHook ***/
|
365 |
|
366 |
|
367 |
/************************************************************************************//** |
368 |
** \brief Callback to obtain the filename of the firmware file that should be
|
369 |
** used during the firmware update from the local file storage. This
|
370 |
** hook function is called at the beginning of the firmware update from
|
371 |
** local storage sequence.
|
372 |
** \return valid firmware filename with full path or BLT_NULL.
|
373 |
**
|
374 |
****************************************************************************************/
|
375 |
const blt_char *FileGetFirmwareFilenameHook(void) |
376 |
{ |
377 |
return firmwareFilename;
|
378 |
} /*** end of FileGetFirmwareFilenameHook ***/
|
379 |
|
380 |
|
381 |
#if (BOOT_FILE_STARTED_HOOK_ENABLE > 0) |
382 |
/************************************************************************************//** |
383 |
** \brief Callback that gets called to inform the application that a firmware
|
384 |
** update from local storage just started.
|
385 |
** \return none.
|
386 |
**
|
387 |
****************************************************************************************/
|
388 |
void FileFirmwareUpdateStartedHook(void) |
389 |
{ |
390 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
391 |
/* create/overwrite the logfile */
|
392 |
logfile.canUse = BLT_FALSE; |
393 |
if (f_open(&logfile.handle, "/bootlog.txt", FA_CREATE_ALWAYS | FA_WRITE) == FR_OK) |
394 |
{ |
395 |
logfile.canUse = BLT_TRUE; |
396 |
} |
397 |
#endif
|
398 |
} /*** end of FileFirmwareUpdateStartedHook ***/
|
399 |
#endif /* BOOT_FILE_STARTED_HOOK_ENABLE > 0 */ |
400 |
|
401 |
|
402 |
#if (BOOT_FILE_COMPLETED_HOOK_ENABLE > 0) |
403 |
/************************************************************************************//** |
404 |
** \brief Callback that gets called to inform the application that a firmware
|
405 |
** update was successfully completed.
|
406 |
** \return none.
|
407 |
**
|
408 |
****************************************************************************************/
|
409 |
void FileFirmwareUpdateCompletedHook(void) |
410 |
{ |
411 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
412 |
/* close the log file */
|
413 |
if (logfile.canUse == BLT_TRUE)
|
414 |
{ |
415 |
f_close(&logfile.handle); |
416 |
} |
417 |
/* wait for all logging related transmission to complete */
|
418 |
while(USART_GetFlagStatus(USART2, USART_FLAG_TC) == RESET);
|
419 |
#endif
|
420 |
/* now delete the firmware file from the disk since the update was successful */
|
421 |
f_unlink(firmwareFilename); |
422 |
} /*** end of FileFirmwareUpdateCompletedHook ***/
|
423 |
#endif /* BOOT_FILE_COMPLETED_HOOK_ENABLE > 0 */ |
424 |
|
425 |
|
426 |
#if (BOOT_FILE_ERROR_HOOK_ENABLE > 0) |
427 |
/************************************************************************************//** |
428 |
** \brief Callback that gets called in case an error occurred during a firmware
|
429 |
** update. Refer to <file.h> for a list of available error codes.
|
430 |
** \return none.
|
431 |
**
|
432 |
****************************************************************************************/
|
433 |
void FileFirmwareUpdateErrorHook(blt_int8u error_code)
|
434 |
{ |
435 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
436 |
/* error detected which stops the firmware update, so close the log file */
|
437 |
if (logfile.canUse == BLT_TRUE)
|
438 |
{ |
439 |
f_close(&logfile.handle); |
440 |
} |
441 |
#endif
|
442 |
} /*** end of FileFirmwareUpdateErrorHook ***/
|
443 |
#endif /* BOOT_FILE_ERROR_HOOK_ENABLE > 0 */ |
444 |
|
445 |
|
446 |
#if (BOOT_FILE_LOGGING_ENABLE > 0) |
447 |
/************************************************************************************//** |
448 |
** \brief Callback that gets called each time new log information becomes
|
449 |
** available during a firmware update.
|
450 |
** \param info_string Pointer to a character array with the log entry info.
|
451 |
** \return none.
|
452 |
**
|
453 |
****************************************************************************************/
|
454 |
void FileFirmwareUpdateLogHook(blt_char *info_string)
|
455 |
{ |
456 |
/* write the string to the log file */
|
457 |
if (logfile.canUse == BLT_TRUE)
|
458 |
{ |
459 |
if (f_puts(info_string, &logfile.handle) < 0) |
460 |
{ |
461 |
logfile.canUse = BLT_FALSE; |
462 |
f_close(&logfile.handle); |
463 |
} |
464 |
} |
465 |
/* echo all characters in the string on UART */
|
466 |
while(*info_string != '\0') |
467 |
{ |
468 |
/* write character to transmit holding register */
|
469 |
USART_SendData(USART2, *info_string); |
470 |
/* wait for tx holding register to be empty */
|
471 |
while(USART_GetFlagStatus(USART2, USART_FLAG_TXE) == RESET);
|
472 |
/* point to the next character in the string */
|
473 |
info_string++; |
474 |
} |
475 |
} /*** end of FileFirmwareUpdateLogHook ***/
|
476 |
#endif /* BOOT_FILE_LOGGING_ENABLE > 0 */ |
477 |
|
478 |
|
479 |
#endif /* BOOT_FILE_SYS_ENABLE > 0 */ |
480 |
|
481 |
|
482 |
/****************************************************************************************
|
483 |
* S E E D / K E Y S E C U R I T Y H O O K F U N C T I O N S
|
484 |
****************************************************************************************/
|
485 |
|
486 |
#if (BOOT_XCP_SEED_KEY_ENABLE > 0) |
487 |
/************************************************************************************//** |
488 |
** \brief Provides a seed to the XCP master that will be used for the key
|
489 |
** generation when the master attempts to unlock the specified resource.
|
490 |
** Called by the GET_SEED command.
|
491 |
** \param resource Resource that the seed if requested for (XCP_RES_XXX).
|
492 |
** \param seed Pointer to byte buffer wher the seed will be stored.
|
493 |
** \return Length of the seed in bytes.
|
494 |
**
|
495 |
****************************************************************************************/
|
496 |
blt_int8u XcpGetSeedHook(blt_int8u resource, blt_int8u *seed) |
497 |
{ |
498 |
/* request seed for unlocking ProGraMming resource */
|
499 |
if ((resource & XCP_RES_PGM) != 0) |
500 |
{ |
501 |
seed[0] = 0x55; |
502 |
} |
503 |
|
504 |
/* return seed length */
|
505 |
return 1; |
506 |
} /*** end of XcpGetSeedHook ***/
|
507 |
|
508 |
|
509 |
/************************************************************************************//** |
510 |
** \brief Called by the UNLOCK command and checks if the key to unlock the
|
511 |
** specified resource was correct. If so, then the resource protection
|
512 |
** will be removed.
|
513 |
** \param resource resource to unlock (XCP_RES_XXX).
|
514 |
** \param key pointer to the byte buffer holding the key.
|
515 |
** \param len length of the key in bytes.
|
516 |
** \return 1 if the key was correct, 0 otherwise.
|
517 |
**
|
518 |
****************************************************************************************/
|
519 |
blt_int8u XcpVerifyKeyHook(blt_int8u resource, blt_int8u *key, blt_int8u len) |
520 |
{ |
521 |
/* suppress compiler warning for unused parameter */
|
522 |
len = len; |
523 |
|
524 |
/* the example key algorithm in "FeaserKey.dll" works as follows:
|
525 |
* - PGM will be unlocked if key = seed - 1
|
526 |
*/
|
527 |
|
528 |
/* check key for unlocking ProGraMming resource */
|
529 |
if ((resource == XCP_RES_PGM) && (key[0] == (0x55-1))) |
530 |
{ |
531 |
/* correct key received for unlocking PGM resource */
|
532 |
return 1; |
533 |
} |
534 |
|
535 |
/* still here so key incorrect */
|
536 |
return 0; |
537 |
} /*** end of XcpVerifyKeyHook ***/
|
538 |
#endif /* BOOT_XCP_SEED_KEY_ENABLE > 0 */ |
539 |
|
540 |
|
541 |
/*********************************** end of hooks.c ************************************/
|