FreeCalypso > hg > leo2moko-debug
diff g23m/condat/com/src/comlib/sec_drv_prim.c @ 0:509db1a7b7b8
initial import: leo2moko-r1
author | Space Falcon <falcon@ivan.Harhan.ORG> |
---|---|
date | Mon, 01 Jun 2015 03:24:05 +0000 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/g23m/condat/com/src/comlib/sec_drv_prim.c Mon Jun 01 03:24:05 2015 +0000 @@ -0,0 +1,715 @@ +#include "general.h" +#include "typedefs.h" +#include "vsi.h" +#include <stdlib.h> +#include <string.h> +#include "sec_drv.h" +#include "sec_drv_prim.h" +#include "ffs/ffs.h" + +#ifndef NON_ENCRYPTED_MODE +#include "cl_des.h" +#include "cl_imei.h" +#endif + + +/* +Layout of flash: + T_SEC_DRV_GLOBAL_CONF + T_SEC_DRV_KEY (failure count) + T_SEC_DRV_CONFIGURATION + { + T_SEC_DRV_KEY + T_SEC_DRV_CATEGORY (T_SEC_DRV_CAT_HDR + SEC_DRV_CAT_MAX_SIZE*UINT8) + }[configuration -> number of categories] +*/ + + +/******************************************* + Global variables +*******************************************/ + +#ifndef FFS_MODE_ENABLED +/* SIM lock data area in flash */ +#pragma DATA_SECTION(d_mepd_data, ".mepd") +volatile const UINT8 d_mepd_data; // Adress of first byte in 8 kb buffer +#endif /* FFS_MODE_ENABLED */ + +static T_SEC_DRV_GLOBAL_CONF gGlobalConf; +static INT8 gGlobalConfRead = FALSE; +INT8 sec_drv_fast_write = FALSE; +static INT16 gMaxCategories = 0; + +#if (defined(RSA_HEAP_IS_INTERNAL) && defined(FIRSTBOOT_RSA_ENABLED)) || (defined(USE_RSAHEAP_FOR_FLASH) && !defined(FFS_MODE_ENABLED)) +#ifdef USE_RSAHEAP_FOR_FLASH +char sec_drv_buffer[SEC_FLASH_SIZE]; +#else /* USE_RSAHEAP_FOR_FLASH */ +char sec_drv_buffer[RSA_HEAP_SIZE]; +#endif /* USE_RSAHEAP_FOR_FLASH */ +#endif + + +/******************************************* + Trace functionality +*******************************************/ +#ifdef SEC_TRACES_ENABLED +static void _trace(const char *str) +{ + T_FFS_FD test_file; + test_file = ffs_open("/testfile.txt", FFS_O_CREATE | FFS_O_WRONLY | FFS_O_APPEND); + if (test_file > 0) + { + ffs_write(test_file, (char *)str, strlen((char *)str)); + ffs_close(test_file); + } +} +void test_trace(const char *str) +{ + char *s = (char *)str; + T_FFS_FD test_file; + test_file = ffs_open("/testfile.txt", FFS_O_CREATE | FFS_O_WRONLY | FFS_O_APPEND); + if (test_file > 0) + { + ffs_write(test_file, s, strlen(s)); + s = "\n"; + ffs_write(test_file, s, strlen(s)); + ffs_close(test_file); + } +} +void hex_trace(const char *str, const void *in, unsigned long int size) +{ + char buffer[4]; + unsigned long int i; + _trace(str); + for (i=0; i<size; i++) + { + sprintf(buffer, "%02x ", ((volatile unsigned char *)in)[i]); + _trace(buffer); + } + _trace("\n"); +} +#endif /* SEC_TRACES_ENABLED */ + + +#ifdef FFS_MODE_ENABLED +/******************************************* + FFS functions +*******************************************/ +void sec_drv_flash_backup(void) +{ } + + +void sec_drv_remove_backup(void) +{ } + + +void sec_drv_erase_flash(void) +{ } + + +void sec_drv_read_flash(UINT32 offset, void *pDest, UINT32 size) +{ + T_FFS_FD file; + file = ffs_open(FFS_MEPD_FILENAME, FFS_O_RDONLY); + if (file <= 0) + { + memset(pDest, 0, size); + TRACE("sec_drv_read_flash - FAILed opening file!"); + } + else + { + ffs_seek(file, offset, FFS_SEEK_SET); + ffs_read(file, pDest, size); + ffs_close(file); + } +} + + +void sec_drv_write_flash(UINT32 offset, const void *pSrc, UINT32 size) +{ + T_FFS_FD file; + file = ffs_open(FFS_MEPD_FILENAME, FFS_O_WRONLY ); + if (!(file <= 0)) + { + ffs_seek(file, offset, FFS_SEEK_SET); + ffs_write(file, (void *)pSrc, size); + ffs_close(file); + } + else + { + TRACE("sec_drv_write_flash - FAILed opening file!"); + } +} + +#else /* FFS_MODE_ENABLED */ + +/******************************************* + Memory functions +*******************************************/ +UINT32 gBackupOffset; + +void sec_drv_flash_backup(void) +{ + if (!sec_drv_fast_write) + { + TRACE("sec_drv_flash_backup"); +#ifdef USE_RSAHEAP_FOR_FLASH + sec_drv_read_flash(0, (void *)SEC_DRV_RSA_HEAP, SEC_FLASH_SIZE); +#else /* USE_RSAHEAP_FOR_FLASH */ +#error "QUESTION: what if we don't have the space required?" + T_FFS_FD file = ffs_open(FLASH_BACKUP_NAME, FFS_O_CREATE | FFS_O_WRONLY | FFS_O_TRUNC); + ffs_write(file, (void *)SEC_BASE, SEC_FLASH_SIZE); + ffs_close(file); +#endif /* USE_RSAHEAP_FOR_FLASH */ + gBackupOffset = 0; + } +} + + +void sec_drv_remove_backup(void) +{ + if (!sec_drv_fast_write) + { +#ifdef USE_RSAHEAP_FOR_FLASH + copy_to_flash(0, 0, 0, gBackupOffset, SEC_FLASH_SIZE); + TRACE("sec_drv_remove_backup"); + memset(SEC_DRV_RSA_HEAP, 0xFF, SEC_FLASH_SIZE); +#else /* USE_RSAHEAP_FOR_FLASH */ +#error "QUESTION: what if we don't have the space required?" + T_FFS_FD file; + void *buf; + + TRACE("sec_drv_remove_backup"); + buf = M_ALLOC(BACKUP_BUF_SIZE); + file = ffs_open(FLASH_BACKUP_NAME, FFS_O_RDONLY); + copy_to_flash(file, buf, BACKUP_BUF_SIZE, gBackupOffset, SEC_FLASH_SIZE); + ffs_close(file); + M_FREE(buf); + + ffs_remove(FLASH_BACKUP_NAME); +#endif /* USE_RSAHEAP_FOR_FLASH */ + } +} + + +void sec_drv_erase_flash(void) +{ + if (!sec_drv_fast_write) + { + TRACE("sec_drv_erase_flash"); + sec_drv_amd_erase(); + } +} + + +void sec_drv_read_flash(UINT32 offset, void *pDest, UINT32 size) +{ + void *pSrc = (void *)((UINT32)SEC_BASE + offset); + assert(pSrc != 0L); + assert(pDest != 0L); + assert(size > 0L); + assert(offset >= 0L && (offset+size) <= SEC_FLASH_SIZE); + + memcpy(pDest, pSrc, size); +} + + +static void copy_to_flash(T_FFS_FD file, void *pBuf, UINT32 bufSize, UINT32 offset, UINT32 maxOffset) +{ + UINT32 size = maxOffset-offset; + TRACE("copy_to_flash"); +#ifdef USE_RSAHEAP_FOR_FLASH + sec_drv_amd_write((void *)((UINT32)SEC_BASE+offset), (const void *)((UINT32)SEC_DRV_RSA_HEAP+offset), size); +#else /* USE_RSAHEAP_FOR_FLASH */ + ffs_seek(file, offset, FFS_SEEK_SET); + while(offset < maxOffset) + { + size = (maxOffset-offset > bufSize)? bufSize : maxOffset-offset; + ffs_read(file, pBuf, size); + sec_drv_amd_write((void *)(SEC_BASE + offset), pBuf, size); + offset += size; + } +#endif /* USE_RSAHEAP_FOR_FLASH */ +} + + +void sec_drv_write_flash(UINT32 offset, const void *pSrc, UINT32 size) +{ + assert(pSrc != 0L); + assert(size > 0L); + assert(offset >= 0L && (offset+size) <= SEC_FLASH_SIZE); + + if (sec_drv_fast_write) + { + TRACE("sec_drv_write_flash"); + sec_drv_amd_write((void *)((UINT32)SEC_BASE+offset), pSrc, size); + } + else + { +#ifdef USE_RSAHEAP_FOR_FLASH + copy_to_flash(0, 0, 0, gBackupOffset, offset); + HEXTRACE("sec_drv_write_flash - offset: ", &offset, sizeof(UINT32)); + sec_drv_amd_write((void *)((UINT32)SEC_BASE+offset), pSrc, size); + gBackupOffset = offset+size; +#else /* USE_RSAHEAP_FOR_FLASH */ + T_FFS_FD file; + void *buf; + TRACE("Using FFS"); + buf = M_ALLOC(BACKUP_BUF_SIZE); + file = ffs_open(FLASH_BACKUP_NAME, FFS_O_RDONLY); + copy_to_flash(file, buf, BACKUP_BUF_SIZE, gBackupOffset, offset); + sec_drv_amd_write((void *)((UINT32)SEC_BASE + offset), pSrc, size); + gBackupOffset += size; + ffs_close(file); + M_FREE(buf); +#endif /* USE_RSAHEAP_FOR_FLASH */ + } +} + +#endif /* FFS_MODE_ENABLED */ + + +/******************************************* + DES de-/encryption +*******************************************/ + +/** + * Returns the DES key from the DSP + * + * @return The DES key for use by de-encryption + */ +static const UINT8 *GetDESKey(void) +{ +#ifdef DSP_DES_KEY_ENABLED +#error "Not yet implemented" +#else /* DSP_DES_KEY_ENABLED */ +static const UINT8 desKey[8] = {0x12, 0x34, 0x56, 0x78, 0x12, 0x34, 0x56, 0x78}; +#ifndef NON_ENCRYPTED_MODE +#ifdef CL_IMEI_CALYPSO_PLATFORM +#ifdef FF_PROTECTED_IMEI + volatile USHORT *reg_p = (USHORT *) CL_IMEI_DIE_ID_REG; + USHORT *outBuf16 = (USHORT*)&desKey[0]; + INT8 i; + for (i = 0; i < CL_IMEI_DIE_ID_SIZE; i++) + { + /* Die ID is 4 BYTE long, extract it to 8 BYTE. */ + outBuf16[i] = (USHORT)(*(UINT8*)(reg_p)++); + } +#endif +#endif +#endif + return desKey; +#endif /* DSP_DES_KEY_ENABLED */ +} + + +/** + * Read a crypted block of the secure_area. + * + * @param offset Offset into the secure area from which to read the block. + * @param pDest Pointer to the receiving buffer. + * @param size Size of the block to read. Minimum 1. + */ +static void read_crypted_flash(UINT32 offset, void *pDest, UINT32 size) +{ +#ifndef NON_ENCRYPTED_MODE + UINT8 inbuffer[CRYPT_BLOCK_SIZE]; + UINT8 outbuffer[CRYPT_BLOCK_SIZE]; +#endif + UINT32 blocksize; + assert(offset != 0L); + assert(pDest != 0L); + assert(size > 0L); + assert(offset >= 0L && (offset+size) <= SEC_FLASH_SIZE); + do + { + blocksize = (size>CRYPT_BLOCK_SIZE)? CRYPT_BLOCK_SIZE : size; +#ifdef NON_ENCRYPTED_MODE + sec_drv_read_flash(offset, pDest, blocksize); +#else + sec_drv_read_flash(offset, inbuffer, CRYPT_BLOCK_SIZE); + cl_des((UBYTE *)inbuffer, (UBYTE *)GetDESKey(), (UBYTE *)outbuffer, (UBYTE)CL_DES_DECRYPTION); + memcpy(pDest, outbuffer, blocksize); +#endif + offset += blocksize; + pDest = (void *)((UINT32)pDest + blocksize); + size -= blocksize; + } while(size); +} + + +/** + * Write a crypted block of the secure_area. + * + * @param offset Offset into the secure area from which to write the block. + * @param pDest Pointer to the input buffer. + * @param size Size of the block to write. Minimum 1. + */ +static void write_crypted_flash(UINT32 offset, const void *pSrc, UINT32 size) +{ + UINT8 inbuffer[CRYPT_BLOCK_SIZE]; + UINT8 outbuffer[CRYPT_BLOCK_SIZE]; + UINT32 blocksize; + assert(offset != 0L); + assert(pSrc != 0L); + assert(size > 0L); + assert(offset >= 0L && (offset+size) <= SEC_FLASH_SIZE); + + sec_drv_flash_backup(); + sec_drv_erase_flash(); + do + { + blocksize = (size>CRYPT_BLOCK_SIZE)? CRYPT_BLOCK_SIZE : size; + memset(inbuffer, 0, CRYPT_BLOCK_SIZE); + memcpy(inbuffer, pSrc, blocksize); +#ifdef NON_ENCRYPTED_MODE + memcpy(outbuffer, inbuffer, CRYPT_BLOCK_SIZE); +#else + cl_des((UBYTE *)inbuffer, (UBYTE *)GetDESKey(), (UBYTE *)outbuffer, (UBYTE)CL_DES_ENCRYPTION); +#endif + /* write crypted datablock to flash */ + sec_drv_write_flash(offset, outbuffer, CRYPT_BLOCK_SIZE); + offset += blocksize; + pSrc = (void *)((UINT32)pSrc + blocksize); + size -= blocksize; + } while(size); + sec_drv_remove_backup(); +} + + +/******************************************* + Offset calculations +*******************************************/ + +static UINT32 offset_global_conf(void) +{ + return 0; +} + + +static UINT32 offset_fc_key(void) +{ + return ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_GLOBAL_CONF)); +} + + +static UINT32 offset_configuration(void) +{ + return ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_GLOBAL_CONF)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)); +} + + +static UINT32 offset_category_key(int rec_num) +{ + return ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_GLOBAL_CONF)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CONFIGURATION)) + + rec_num * (ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CAT_HDR)) + + ALIGN_CRYPT_BLOCK(SEC_DRV_CAT_MAX_SIZE)); +} + + +static UINT32 offset_category_header(int rec_num) +{ + return ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_GLOBAL_CONF)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CONFIGURATION)) + + rec_num * (ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CAT_HDR)) + + ALIGN_CRYPT_BLOCK(SEC_DRV_CAT_MAX_SIZE)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)); +} + + +static UINT32 offset_category_body(int rec_num) +{ + return ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_GLOBAL_CONF)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CONFIGURATION)) + + rec_num * (ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CAT_HDR)) + + ALIGN_CRYPT_BLOCK(SEC_DRV_CAT_MAX_SIZE)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_KEY)) + + ALIGN_CRYPT_BLOCK(sizeof(T_SEC_DRV_CAT_HDR)); +} + + +/******************************************* + Helper functions +*******************************************/ + +/** + * Check whether or not the secure area has been initialized. + * + * @return TRUE if the secure area has been initialized. + */ +static int check_firstboot_pattern_ok(void) +{ + sec_prim_get_global_conf(0); + if (gGlobalConf.firstboot_pattern != SEC_PATTERN_INITIALIZED) + { + TRACE("check_firstboot_pattern_ok - FAIL"); + return FALSE; + } + return TRUE; +} + + +/** + * Check whether or not the given number of categories is within bounds. + * + * @return TRUE if the given number of categories is within bounds. + */ +static int check_number_categories(int catNum) +{ + BOOL result; + if (!gMaxCategories) + { + T_SEC_DRV_CONFIGURATION conf; + if (sec_prim_get_configuration(&conf)) + { + gMaxCategories = conf.NumCategories; + HEXTRACE("check_number_categories - max: ", &gMaxCategories, sizeof(int)); + } + } + return (catNum >= 0) && (catNum < gMaxCategories); +} + + +/******************************************* + PRIMITIVES +*******************************************/ + +/** + * Read the global configuration for the secure flash area used to store + * SIM lock data. + * + * @param pGlobalConf Pointer where to store the global configuration. + * @return TRUE if the global configuration could be read. + */ +BOOL sec_prim_get_global_conf(T_SEC_DRV_GLOBAL_CONF *pGlobalConf) +{ + if (!gGlobalConfRead) + { + sec_drv_read_flash(offset_global_conf(), &gGlobalConf, sizeof(T_SEC_DRV_GLOBAL_CONF)); + HEXTRACE("sec_prim_get_global_conf: ", &gGlobalConf, sizeof(T_SEC_DRV_GLOBAL_CONF)); + gGlobalConfRead = TRUE; + } + if (pGlobalConf != 0L) + { + memcpy(pGlobalConf, &gGlobalConf, sizeof(T_SEC_DRV_GLOBAL_CONF)); + return TRUE; + } + return FALSE; +} + +/** + * Store the global configuration for the secure flash area used to store + * SIM lock data. + * + * @param pGlobalConf Pointer to a global configuration. + * @return TRUE if the global configuration could be written. + */ +BOOL sec_prim_set_global_conf(const T_SEC_DRV_GLOBAL_CONF *pGlobalConf) +{ + /* Calc total size needed for this configuration */ + if (pGlobalConf == 0L) return FALSE; + + HEXTRACE("sec_prim_set_global_conf: ", pGlobalConf, sizeof(T_SEC_DRV_GLOBAL_CONF)); + sec_drv_flash_backup(); + sec_drv_erase_flash(); + sec_drv_write_flash(offset_global_conf(), pGlobalConf, sizeof(T_SEC_DRV_GLOBAL_CONF)); + sec_drv_remove_backup(); + gGlobalConfRead = FALSE; + return TRUE; +} + + +/** + * Read the configuration for the MEPD structure. + * + * @param pConf Pointer to buffer where the result will be placed + * @Return 0 if flash area hasn't been configured. + */ +BOOL sec_prim_get_configuration(T_SEC_DRV_CONFIGURATION *pConf) +{ + if (! check_firstboot_pattern_ok()) return FALSE; + + read_crypted_flash(offset_configuration(), pConf, sizeof(T_SEC_DRV_CONFIGURATION)); + HEXTRACE("sec_prim_get_configuration: ", pConf, sizeof(T_SEC_DRV_CONFIGURATION)); + return TRUE; +} + + +/** + * Store the configuration for the MEPD structure. + * + * @param pConf Pointer to configuration to set + * @Return TRUE if ok. + */ +BOOL sec_prim_set_configuration(const T_SEC_DRV_CONFIGURATION *pConf) +{ + if (! check_firstboot_pattern_ok()) return FALSE; + if (pConf == 0L) return FALSE; + + HEXTRACE("sec_prim_set_configuration: ", pConf, sizeof(T_SEC_DRV_CONFIGURATION)); + write_crypted_flash(offset_configuration(), pConf, sizeof(T_SEC_DRV_CONFIGURATION)); + gMaxCategories = 0; + return TRUE; +} + + +/** + * Read the key for either the failure counter (category -1) or a + * lock-category (category 0..n). + * + * @param rec_num Category number to operate on + * @param pKey Pointer to keybuffer + * @Return TRUE if ok. + */ +BOOL sec_prim_get_key(int rec_num, T_SEC_DRV_KEY *pKey) +{ + if (pKey!=0L) + { + if ((rec_num == -1) && (check_firstboot_pattern_ok())) + { + /* failure counter key */ + read_crypted_flash(offset_fc_key(), pKey, sizeof(T_SEC_DRV_KEY)); + HEXTRACE("sec_prim_get_key: ", pKey, sizeof(T_SEC_DRV_KEY)); + return TRUE; + } + else if (check_number_categories(rec_num)) + { + /* category key */ + read_crypted_flash(offset_category_key(rec_num), pKey, sizeof(T_SEC_DRV_KEY)); + HEXTRACE("sec_prim_get_key: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_get_key: ", pKey, sizeof(T_SEC_DRV_KEY)); + return TRUE; + } + } + return FALSE; +} + + +/** + * Store the key for either the failure counter (category -1) or a + * lock-category (category 0..n). + * + * @param rec_num Category number to operate on + * @param pKey Pointer to keybuffer + * @Return TRUE if ok. + */ +BOOL sec_prim_set_key(int rec_num, const T_SEC_DRV_KEY *pKey) +{ + if (pKey!=0L) + { + if ((rec_num == -1) && (check_firstboot_pattern_ok())) + { + /* failure counter key */ + HEXTRACE("sec_prim_set_key - FC: ", pKey, sizeof(T_SEC_DRV_KEY)); + write_crypted_flash(offset_fc_key(), pKey, sizeof(T_SEC_DRV_KEY)); + return TRUE; + } + else if (check_number_categories(rec_num)) + { + /* category key */ + HEXTRACE("sec_prim_set_key: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_set_key: ", pKey, sizeof(T_SEC_DRV_KEY)); + write_crypted_flash(offset_category_key(rec_num), pKey, sizeof(T_SEC_DRV_KEY)); + return TRUE; + } + } + return FALSE; +} + + +/** + * Read a lock-category header. + * + * @param rec_num Category number to operate on + * @param pHdr Where to place the read category header? + * @Return TRUE if ok. + */ +BOOL sec_prim_get_cat_header(int rec_num, T_SEC_DRV_CAT_HDR *pHdr) +{ + if (!check_number_categories(rec_num)) return FALSE; + if (pHdr == 0L) return FALSE; + + read_crypted_flash(offset_category_header(rec_num), pHdr, sizeof(T_SEC_DRV_CAT_HDR)); + HEXTRACE("sec_prim_get_cat_header: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_get_cat_header: ", pHdr, sizeof(T_SEC_DRV_CAT_HDR)); + return TRUE; +} + + +/** + * Store a lock-category header. + * + * @param rec_num Category number to operate on + * @param pHdr Pointer to the category header + * @Return TRUE if ok. + */ +BOOL sec_prim_set_cat_header(int rec_num, const T_SEC_DRV_CAT_HDR *pHdr) +{ + if (!check_number_categories(rec_num)) return FALSE; + if (pHdr == 0L) return FALSE; + + HEXTRACE("sec_prim_set_cat_header: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_set_cat_header: ", pHdr, sizeof(T_SEC_DRV_CAT_HDR)); + write_crypted_flash(offset_category_header(rec_num), pHdr, sizeof(T_SEC_DRV_CAT_HDR)); + return TRUE; +} + + +/** + * Read a lock-category body (client data). + * + * @param rec_num Category number to operate on + * @param pBody Pointer to buffer where the result will be placed + * @param size Size of the buffer + * @Return TRUE if ok. + */ +BOOL sec_prim_get_cat_body(int rec_num, void *pBody, UINT16 size) +{ + if (!check_number_categories(rec_num)) return FALSE; + if (pBody == 0L) return FALSE; + if (size==0 || size>SEC_DRV_CAT_MAX_SIZE) return FALSE; + + read_crypted_flash(offset_category_body(rec_num), pBody, size); + HEXTRACE("sec_prim_get_cat_body: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_get_cat_body: ", pBody, size); + return TRUE; +} + + +/** + * Store a lock-category body (client data). + * + * @param rec_num Category number to operate on + * @param pBody Pointer to data-buffer + * @param size Size of the buffer + * @Return TRUE if ok. + */ +BOOL sec_prim_set_cat_body(int rec_num, const void *pBody, UINT16 size) +{ + T_SEC_DRV_CAT_HDR hdr; + + if (!check_number_categories(rec_num)) return FALSE; + if (pBody == 0L) return FALSE; + + sec_prim_get_cat_header(rec_num, &hdr); + if (hdr.DataLen != size) + { + hdr.DataLen = size; + sec_prim_set_cat_header(rec_num, &hdr); + } + if (size) + { + HEXTRACE("sec_prim_set_cat_body: ", &rec_num, sizeof(int)); + HEXTRACE("sec_prim_set_cat_body: ", pBody, size); + write_crypted_flash(offset_category_body(rec_num), pBody, size); + } + return TRUE; +}