summaryrefslogtreecommitdiff
path: root/bootloader
diff options
context:
space:
mode:
Diffstat (limited to 'bootloader')
-rw-r--r--bootloader/README.md4
-rw-r--r--bootloader/ota-dfu-python/Fork.txt1
-rw-r--r--bootloader/ota-dfu-python/LICENSE201
-rw-r--r--bootloader/ota-dfu-python/README.md118
-rw-r--r--bootloader/ota-dfu-python/ble_legacy_dfu_controller.py291
-rw-r--r--bootloader/ota-dfu-python/ble_secure_dfu_controller.py323
-rwxr-xr-xbootloader/ota-dfu-python/dfu.py188
-rw-r--r--bootloader/ota-dfu-python/nrf_ble_dfu_controller.py263
-rw-r--r--bootloader/ota-dfu-python/unpacker.py52
-rw-r--r--bootloader/ota-dfu-python/util.py70
10 files changed, 1509 insertions, 2 deletions
diff --git a/bootloader/README.md b/bootloader/README.md
index facc0500..a6ab1626 100644
--- a/bootloader/README.md
+++ b/bootloader/README.md
@@ -41,10 +41,10 @@ Pack the image into a .zip file for the NRF DFU protocol:
adafruit-nrfutil dfu genpkg --dev-type 0x0052 --application image.bin dfu.zip
`
-Use NRFConnect or dfu.py to upload the zip file to the device:
+Use NRFConnect or dfu.py (in <project root>/bootloader/ota-dfu-python) to upload the zip file to the device:
`
sudo dfu.py -z /home/jf/nrf52/bootloader/dfu.zip -a <pinetime MAC address> --legacy
`
-**TODO** : dfu.py \ No newline at end of file
+**Note** : dfu.py is a slightly modified version of [this repo](https://github.com/daniel-thompson/ota-dfu-python). \ No newline at end of file
diff --git a/bootloader/ota-dfu-python/Fork.txt b/bootloader/ota-dfu-python/Fork.txt
new file mode 100644
index 00000000..dbc10561
--- /dev/null
+++ b/bootloader/ota-dfu-python/Fork.txt
@@ -0,0 +1 @@
+This directory contains source forked from https://github.com/daniel-thompson/ota-dfu-python.
diff --git a/bootloader/ota-dfu-python/LICENSE b/bootloader/ota-dfu-python/LICENSE
new file mode 100644
index 00000000..261eeb9e
--- /dev/null
+++ b/bootloader/ota-dfu-python/LICENSE
@@ -0,0 +1,201 @@
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+ Copyright [yyyy] [name of copyright owner]
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
diff --git a/bootloader/ota-dfu-python/README.md b/bootloader/ota-dfu-python/README.md
new file mode 100644
index 00000000..3397db4d
--- /dev/null
+++ b/bootloader/ota-dfu-python/README.md
@@ -0,0 +1,118 @@
+# Python nRF5 OTA DFU Controller
+
+So... this is my fork of dingara's fork of astronomer80's fork of
+foldedtoad's Python OTA DFU utility.
+
+My own contribution is little more than a brute force conversion to
+python3. It is sparsely tested so there are likely to be a few
+remaining bytes versus string bugs remaining in the places I didn't test
+. I used it primarily as part of
+[wasp-os](https://github.com/daniel-thompson/wasp-os) as a way to
+deliver OTA updates to nRF52-based smart watches, especially the
+[Pine64 PineTime](https://www.pine64.org/pinetime/).
+
+## What does it do?
+
+This is a Python program that uses `gatttool` (provided with the Linux BlueZ driver) to achieve Over The Air (OTA) Device Firmware Updates (DFU) to a Nordic Semiconductor nRF5 (either nRF51 or nRF52) device via Bluetooth Low Energy (BLE).
+
+### Main features:
+
+* Perform OTA DFU to an nRF5 peripheral without an external USB BLE dongle.
+* Ability to detect if the peripheral is running in application mode or bootloader, and automatically switch if needed (buttonless).
+* Support for both Legacy (SDK <= 11) and Secure (SDK >= 12) bootloader.
+
+Before using this utility the nRF5 peripheral device needs to be programmed with a DFU bootloader (see Nordic Semiconductor documentation/examples for instructions on that).
+
+## Prerequisites
+
+* BlueZ 5.4 or above
+* Python 3.6
+* Python `pexpect` module (available via pip)
+* Python `intelhex` module (available via pip)
+
+## Firmware Build Requirement
+
+* Your nRF5 peripheral firmware build method will produce a firmware file ending with either `*.hex` or `*.bin`.
+* Your nRF5 firmware build method will produce an Init file ending with `.dat`.
+* The typical naming convention is `application.bin` and `application.dat`, but this utility will accept other names.
+
+## Generating init files
+
+### Legacy bootloader
+
+Use the `gen_dat` application (you need to compile it with `gcc gen_dat.c -o gen_dat` on first run) to generate a `.dat` file from your `.bin` file. Example:
+
+ ./gen_dat application.bin application.dat
+
+Note: The `gen_dat` utility expects a `.bin` file input, so you'll get Cyclic Redundancy Check (CRC) errors during DFU using a `.dat` file generated from a `.hex` file.
+
+An alternative is to use `nrfutil` from Nordic Semiconductor, but I've found this method to be easier. You may need to edit the `gen_dat` source to fit your specific application.
+
+### Secure bootloader
+
+You need to use `nrfutil` to generate firmware packages for the new secure bootloader (SDK > 12) as the package needs to be signed with a private/public key pair. Note that the bootloader will need to be programmed with the corresponding public key. See the [nrfutil repo](https://github.com/NordicSemiconductor/pc-nrfutil) for details.
+
+Note: I've had problems with the pip version of `nrfutil`. I recommend [installing from source](https://github.com/NordicSemiconductor/pc-nrfutil#running-and-installing-from-source) instead.
+
+## Usage
+
+There are two ways to specify firmware files for this utility. Either by specifying both the `.hex` or `.bin` file with the `.dat` file, or more easily by the `.zip` file, which contains both the hex and dat files.
+
+The new `.zip` file form is encouraged by Nordic, but the older hex/bin + dat file methods should still work.
+
+## Usage Examples
+
+ > sudo ./dfu.py -f ~/application.hex -d ~/application.dat -a CD:E3:4A:47:1C:E4
+
+or:
+
+ > sudo ./dfu.py -z ~/application.zip -a CD:E3:4A:47:1C:E4
+
+You can use the `hcitool lescan` to figure out the address of a DFU target, for example:
+
+ $ sudo hcitool -i hci0 lescan
+ LE Scan ...
+ CD:E3:4A:47:1C:E4 <TARGET_NAME>
+ CD:E3:4A:47:1C:E4 (unknown)
+
+
+## Example Output
+
+ ================================
+ == ==
+ == DFU Server ==
+ == ==
+ ================================
+
+ Sending file application.bin to CD:E3:4A:47:1C:E4
+ bin array size: 60788
+ Checking DFU State...
+ Board needs to switch in DFU mode
+ Switching to DFU mode
+ Enable Notifications in DFU mode
+ Sending hex file size
+ Waiting for Image Size notification
+ Waiting for INIT DFU notification
+ Begin DFU
+ Progress: |xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx| 100.0% Complete (60788 of 60788 bytes)
+
+ Upload complete in 0 minutes and 14 seconds
+ segments sent: 3040
+ Waiting for DFU complete notification
+ Waiting for Firmware Validation notification
+ Activate and reset
+ DFU Server done
+
+## TODO:
+
+* Implement link-loss procedure for Legacy Controller.
+* Update example output in readme.
+* Add makefile examples.
+* More code cleanup.
+
+## Info & References
+
+* [Nordic Legacy DFU Service](http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v11.0.0/bledfu_transport_bleservice.html?cp=4_0_3_4_3_1_4_1)
+* [Nordic Legacy DFU sequence diagrams](http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v11.0.0/bledfu_transport_bleprofile.html?cp=4_0_3_4_3_1_4_0_1_6#ota_profile_pkt_rcpt_notif)
+* [Nordic Secure DFU bootloader](http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v12.2.0/lib_dfu_transport_ble.html?cp=4_0_1_3_5_2_2)
+* [nrfutil](https://github.com/NordicSemiconductor/pc-nrfutil)
diff --git a/bootloader/ota-dfu-python/ble_legacy_dfu_controller.py b/bootloader/ota-dfu-python/ble_legacy_dfu_controller.py
new file mode 100644
index 00000000..325b4489
--- /dev/null
+++ b/bootloader/ota-dfu-python/ble_legacy_dfu_controller.py
@@ -0,0 +1,291 @@
+import math
+import pexpect
+import time
+
+from array import array
+from util import *
+
+from nrf_ble_dfu_controller import NrfBleDfuController
+
+verbose = False
+
+class Procedures:
+ START_DFU = 1
+ INITIALIZE_DFU = 2
+ RECEIVE_FIRMWARE_IMAGE = 3
+ VALIDATE_FIRMWARE = 4
+ ACTIVATE_IMAGE_AND_RESET = 5
+ RESET_SYSTEM = 6
+ REPORT_RECEIVED_IMAGE_SIZE = 7
+ PRN_REQUEST = 8
+ RESPONSE = 16
+ PACKET_RECEIPT_NOTIFICATION = 17
+
+ string_map = {
+ START_DFU : "START_DFU",
+ INITIALIZE_DFU : "INITIALIZE_DFU",
+ RECEIVE_FIRMWARE_IMAGE : "RECEIVE_FIRMWARE_IMAGE",
+ VALIDATE_FIRMWARE : "VALIDATE_FIRMWARE",
+ ACTIVATE_IMAGE_AND_RESET : "ACTIVATE_IMAGE_AND_RESET",
+ RESET_SYSTEM : "RESET_SYSTEM",
+ REPORT_RECEIVED_IMAGE_SIZE : "REPORT_RECEIVED_IMAGE_SIZE",
+ PRN_REQUEST : "PACKET_RECEIPT_NOTIFICATION_REQUEST",
+ RESPONSE : "RESPONSE",
+ PACKET_RECEIPT_NOTIFICATION : "PACKET_RECEIPT_NOTIFICATION",
+ }
+
+ @staticmethod
+ def to_string(proc):
+ return Procedures.string_map[proc]
+
+ @staticmethod
+ def from_string(proc_str):
+ return int(proc_str, 16)
+
+class Responses:
+ SUCCESS = 1
+ INVALID_STATE = 2
+ NOT_SUPPORTED = 3
+ DATA_SIZE_EXCEEDS_LIMITS = 4
+ CRC_ERROR = 5
+ OPERATION_FAILED = 6
+
+ string_map = {
+ SUCCESS : "SUCCESS",
+ INVALID_STATE : "INVALID_STATE",
+ NOT_SUPPORTED : "NOT_SUPPORTED",
+ DATA_SIZE_EXCEEDS_LIMITS : "DATA_SIZE_EXCEEDS_LIMITS",
+ CRC_ERROR : "CRC_ERROR",
+ OPERATION_FAILED : "OPERATION_FAILED",
+ }
+
+ @staticmethod
+ def to_string(res):
+ return Responses.string_map[res]
+
+ @staticmethod
+ def from_string(res_str):
+ return int(res_str, 16)
+
+
+class BleDfuControllerLegacy(NrfBleDfuController):
+ # Class constants
+ UUID_CONTROL_POINT = "00001531-1212-efde-1523-785feabcd123"
+ UUID_PACKET = "00001532-1212-efde-1523-785feabcd123"
+ UUID_VERSION = "00001534-1212-efde-1523-785feabcd123"
+
+ # Constructor inherited from abstract base class
+
+ # --------------------------------------------------------------------------
+ # Start the firmware update process
+ # --------------------------------------------------------------------------
+ def start(self, verbose=False):
+ (_, self.ctrlpt_handle, self.ctrlpt_cccd_handle) = self._get_handles(self.UUID_CONTROL_POINT)
+ (_, self.data_handle, _) = self._get_handles(self.UUID_PACKET)
+
+ self.pkt_receipt_interval = 10
+
+ if verbose:
+ print('Control Point Handle: 0x%04x, CCCD: 0x%04x' % (self.ctrlpt_handle, self.ctrlpt_cccd_handle))
+ print('Packet handle: 0x%04x' % (self.data_handle))
+
+ # Subscribe to notifications from Control Point characteristic
+ if verbose: print("Enabling notifications")
+ self._enable_notifications(self.ctrlpt_cccd_handle)
+
+ # Send 'START DFU' + Application Command
+ if verbose: print("Sending START_DFU")
+ self._dfu_send_command(Procedures.START_DFU, [0x04])
+
+ # Transmit binary image size
+ # Need to pad the byte array with eight zero bytes
+ # (because that's what the bootloader is expecting...)
+ hex_size_array_lsb = uint32_to_bytes_le(len(self.bin_array))
+ zero_pad_array_le(hex_size_array_lsb, 8)
+ self._dfu_send_data(hex_size_array_lsb)
+
+ # Wait for response to Image Size
+ print("Waiting for Image Size notification")
+ self._wait_and_parse_notify()
+
+ # Send 'INIT DFU' + Init Packet Command
+ self._dfu_send_command(Procedures.INITIALIZE_DFU, [0x00])
+
+ # Transmit the Init image (DAT).
+ self._dfu_send_init()
+
+ # Send 'INIT DFU' + Init Packet Complete Command
+ self._dfu_send_command(Procedures.INITIALIZE_DFU, [0x01])
+
+ print("Waiting for INIT DFU notification")
+ # Wait for INIT DFU notification (indicates flash erase completed)
+ self._wait_and_parse_notify()
+
+ # Set the Packet Receipt Notification interval
+ if verbose: print("Setting pkt receipt notification interval")
+ prn = uint16_to_bytes_le(self.pkt_receipt_interval)
+ self._dfu_send_command(Procedures.PRN_REQUEST, prn)
+
+ # Send 'RECEIVE FIRMWARE IMAGE' command to set DFU in firmware receive state.
+ self._dfu_send_command(Procedures.RECEIVE_FIRMWARE_IMAGE)
+
+ # Send bin_array contents as as series of packets (burst mode).
+ # Each segment is pkt_payload_size bytes long.
+ # For every pkt_receipt_interval sends, wait for notification.
+ segment_count = 0
+ segment_total = int(math.ceil(self.image_size/float(self.pkt_payload_size)))
+ time_start = time.time()
+ last_send_time = time.time()
+ print("Begin DFU")
+ for i in range(0, self.image_size, self.pkt_payload_size):
+ segment = self.bin_array[i:i + self.pkt_payload_size]
+ self._dfu_send_data(segment)
+ segment_count += 1
+
+ # print "segment #{} of {}, dt = {}".format(segment_count, segment_total, time.time() - last_send_time)
+ # last_send_time = time.time()
+
+ if (segment_count == segment_total):
+ print_progress(self.image_size, self.image_size, prefix = 'Progress:', suffix = 'Complete', barLength = 50)
+
+ duration = time.time() - time_start
+ print("\nUpload complete in {} minutes and {} seconds".format(int(duration / 60), int(duration % 60)))
+ if verbose: print("segments sent: {}".format(segment_count))
+
+ print("Waiting for DFU complete notification")
+ # Wait for DFU complete notification
+ self._wait_and_parse_notify()
+
+ elif (segment_count % self.pkt_receipt_interval) == 0:
+ (proc, res, pkts) = self._wait_and_parse_notify()
+
+ # TODO: Check pkts == segment_count * pkt_payload_size
+
+ if res != Responses.SUCCESS:
+ raise Exception("bad notification status: {}".format(Responses.to_string(res)))
+
+ print_progress(pkts, self.image_size, prefix = 'Progress:', suffix = 'Complete', barLength = 50)
+
+ # Send Validate Command
+ self._dfu_send_command(Procedures.VALIDATE_FIRMWARE)
+
+ print("Waiting for Firmware Validation notification")
+ # Wait for Firmware Validation notification
+ self._wait_and_parse_notify()
+
+ # Wait a bit for copy on the peer to be finished
+ time.sleep(1)
+
+ # Send Activate and Reset Command
+ print("Activate and reset")
+ self._dfu_send_command(Procedures.ACTIVATE_IMAGE_AND_RESET)
+
+ # --------------------------------------------------------------------------
+ # Check if the peripheral is running in bootloader (DFU) or application mode
+ # Returns True if the peripheral is in DFU mode
+ # --------------------------------------------------------------------------
+ def check_DFU_mode(self):
+ if verbose: print("Checking DFU State...")
+
+ cmd = 'char-read-uuid %s' % self.UUID_VERSION
+
+ if verbose: print(cmd)
+
+ self.ble_conn.sendline(cmd)
+
+ # Skip two rows
+ try:
+ res = self.ble_conn.expect('handle:.*', timeout=10)
+ # res = self.ble_conn.expect('handle:', timeout=10)
+ except pexpect.TIMEOUT as e:
+ print("State timeout")
+ except:
+ pass
+
+ return self.ble_conn.after.find(b'value: 08 00')!=-1
+
+ def switch_to_dfu_mode(self):
+ (_, bl_value_handle, bl_cccd_handle) = self._get_handles(self.UUID_CONTROL_POINT)
+
+ # Enable notifications
+ cmd = 'char-write-req 0x%02x %02x' % (bl_cccd_handle, 1)
+ if verbose: print(cmd)
+ self.ble_conn.sendline(cmd)
+
+ # Reset the board in DFU mode. After reset the board will be disconnected
+ cmd = 'char-write-req 0x%02x 0104' % (bl_value_handle)
+ if verbose: print(cmd)
+ self.ble_conn.sendline(cmd)
+
+ time.sleep(0.5)
+
+ #print "Send 'START DFU' + Application Command"
+ #self._dfu_state_set(0x0104)
+
+ # Reconnect the board.
+ #ret = self.scan_and_connect()
+ #if verbose: print("Connected " + str(ret))
+
+ #return ret
+ return 1
+
+
+ # --------------------------------------------------------------------------
+ # Parse notification status results
+ # --------------------------------------------------------------------------
+ def _dfu_parse_notify(self, notify):
+ if len(notify) < 3:
+ print("notify data length error")
+ return None
+
+ if verbose: print(notify)
+
+ dfu_notify_opcode = Procedures.from_string(notify[0])
+
+ if dfu_notify_opcode == Procedures.RESPONSE:
+
+ dfu_procedure = Procedures.from_string(notify[1])
+ dfu_response = Responses.from_string(notify[2])
+
+ procedure_str = Procedures.to_string(dfu_procedure)
+ response_str = Responses.to_string(dfu_response)
+
+ if verbose: print("opcode: 0x%02x, proc: %s, res: %s" % (dfu_notify_opcode, procedure_str, response_str))
+
+ return (dfu_procedure, dfu_response)
+
+ if dfu_notify_opcode == Procedures.PACKET_RECEIPT_NOTIFICATION:
+ receipt = bytes_to_uint32_le(notify[1:5])
+ return (dfu_notify_opcode, Responses.SUCCESS, receipt)
+
+ # --------------------------------------------------------------------------
+ # Wait for a notification and parse the response
+ # --------------------------------------------------------------------------
+ def _wait_and_parse_notify(self):
+ if verbose: print("Waiting for notification")
+ notify = self._dfu_wait_for_notify()
+
+ if notify is None:
+ raise Exception("No notification received")
+
+ if verbose: print("Parsing notification")
+
+ result = self._dfu_parse_notify(notify)
+ if result[1] != Responses.SUCCESS:
+ raise Exception("Error in {} procedure, reason: {}".format(
+ Procedures.to_string(result[0]),
+ Responses.to_string(result[1])))
+
+ return result
+
+ #--------------------------------------------------------------------------
+ # Send the Init info (*.dat file contents) to peripheral device.
+ #--------------------------------------------------------------------------
+ def _dfu_send_init(self):
+ if verbose: print("dfu_send_init")
+
+ # Open the DAT file and create array of its contents
+ init_bin_array = array('B', open(self.datfile_path, 'rb').read())
+
+ # Transmit Init info
+ self._dfu_send_data(init_bin_array)
diff --git a/bootloader/ota-dfu-python/ble_secure_dfu_controller.py b/bootloader/ota-dfu-python/ble_secure_dfu_controller.py
new file mode 100644
index 00000000..7065458a
--- /dev/null
+++ b/bootloader/ota-dfu-python/ble_secure_dfu_controller.py
@@ -0,0 +1,323 @@
+import math
+import pexpect
+import time
+
+from array import array
+from util import *
+
+from nrf_ble_dfu_controller import NrfBleDfuController
+
+verbose = False
+
+class Procedures:
+ CREATE = 0x01
+ SET_PRN = 0x02
+ CALC_CHECKSUM = 0x03
+ EXECUTE = 0x04
+ SELECT = 0x06
+ RESPONSE = 0x60
+
+ PARAM_COMMAND = 0x01
+ PARAM_DATA = 0x02
+
+ string_map = {
+ CREATE : "CREATE",
+ SET_PRN : "SET_PRN",
+ CALC_CHECKSUM : "CALC_CHECKSUM",
+ EXECUTE : "EXECUTE",
+ SELECT : "SELECT",
+ RESPONSE : "RESPONSE",
+ }
+
+ @staticmethod
+ def to_string(proc):
+ return Procedures.string_map[proc]
+
+ @staticmethod
+ def from_string(proc_str):
+ return int(proc_str, 16)
+
+class Results:
+ INVALID_CODE = 0x00
+ SUCCESS = 0x01
+ OPCODE_NOT_SUPPORTED = 0x02
+ INVALID_PARAMETER = 0x03
+ INSUFF_RESOURCES = 0x04
+ INVALID_OBJECT = 0x05
+ UNSUPPORTED_TYPE = 0x07
+ OPERATION_NOT_PERMITTED = 0x08
+ OPERATION_FAILED = 0x0A
+
+ string_map = {
+ INVALID_CODE : "INVALID_CODE",
+ SUCCESS : "SUCCESS",
+ OPCODE_NOT_SUPPORTED : "OPCODE_NOT_SUPPORTED",
+ INVALID_PARAMETER : "INVALID_PARAMETER",
+ INSUFF_RESOURCES : "INSUFFICIENT_RESOURCES",
+ INVALID_OBJECT : "INVALID_OBJECT",
+ UNSUPPORTED_TYPE : "UNSUPPORTED_TYPE",
+ OPERATION_NOT_PERMITTED : "OPERATION_NOT_PERMITTED",
+ OPERATION_FAILED : "OPERATION_FAILED",
+ }
+
+ @staticmethod
+ def to_string(res):
+ return Results.string_map[res]
+
+ @staticmethod
+ def from_string(res_str):
+ return int(res_str, 16)
+
+
+class BleDfuControllerSecure(NrfBleDfuController):
+ # Class constants
+ UUID_BUTTONLESS = '8e400001-f315-4f60-9fb8-838830daea50'
+ UUID_CONTROL_POINT = '8ec90001-f315-4f60-9fb8-838830daea50'
+ UUID_PACKET = '8ec90002-f315-4f60-9fb8-838830daea50'
+
+ # Constructor inherited from abstract base class
+
+ # --------------------------------------------------------------------------
+ # Start the firmware update process
+ # --------------------------------------------------------------------------
+ def start(self):
+ (_, self.ctrlpt_handle, self.ctrlpt_cccd_handle) = self._get_handles(self.UUID_CONTROL_POINT)
+ (_, self.data_handle, _) = self._get_handles(self.UUID_PACKET)
+
+ if verbose:
+ print('Control Point Handle: 0x%04x, CCCD: 0x%04x' % (self.ctrlpt_handle, self.ctrlpt_cccd_handle))
+ print('Packet handle: 0x%04x' % (self.data_handle))
+
+ # Subscribe to notifications from Control Point characteristic
+ self._enable_notifications(self.ctrlpt_cccd_handle)
+
+ # Set the Packet Receipt Notification interval
+ prn = uint16_to_bytes_le(self.pkt_receipt_interval)
+ self._dfu_send_command(Procedures.SET_PRN, prn)
+
+ self._dfu_send_init()
+
+ self._dfu_send_image()
+
+ # --------------------------------------------------------------------------
+ # Check if the peripheral is running in bootloader (DFU) or application mode
+ # Returns True if the peripheral is in DFU mode
+ # --------------------------------------------------------------------------
+ def check_DFU_mode(self):
+ print("Checking DFU State...")
+
+ self.ble_conn.sendline('characteristics')
+
+ dfu_mode = False
+
+ try:
+ self.ble_conn.expect([self.UUID_BUTTONLESS], timeout=2)
+ except pexpect.TIMEOUT as e:
+ dfu_mode = True
+
+ return dfu_mode
+
+ def switch_to_dfu_mode(self):
+ (_, bl_value_handle, bl_cccd_handle) = self._get_handles(self.UUID_BUTTONLESS)
+
+ self._enable_notifications(bl_cccd_handle)
+
+ # Reset the board in DFU mode. After reset the board will be disconnected
+ cmd = 'char-write-req 0x%04x 01' % (bl_value_handle)
+ self.ble_conn.sendline(cmd)
+
+ # Wait some time for board to reboot
+ time.sleep(0.5)
+
+ # Increase the mac address by one and reconnect
+ self.target_mac_increase(1)
+ return self.scan_and_connect()
+
+ # --------------------------------------------------------------------------
+ # Parse notification status results
+ # --------------------------------------------------------------------------
+ def _dfu_parse_notify(self, notify):
+ if len(notify) < 3:
+ print("notify data length error")
+ return None
+
+ if verbose: print(notify)
+
+ dfu_notify_opcode = Procedures.from_string(notify[0])
+ if dfu_notify_opcode == Procedures.RESPONSE:
+
+ dfu_procedure = Procedures.from_string(notify[1])
+ dfu_result = Results.from_string(notify[2])
+
+ procedure_str = Procedures.to_string(dfu_procedure)
+ result_str = Results.to_string(dfu_result)
+
+ # if verbose: print "opcode: {0}, proc: {1}, res: {2}".format(dfu_notify_opcode, procedure_str, result_str)
+ if verbose: print("opcode: 0x%02x, proc: %s, res: %s" % (dfu_notify_opcode, procedure_str, result_str))
+
+ # Packet Receipt notifications are sent in the exact same format
+ # as responses to the CALC_CHECKSUM procedure.
+ if(dfu_procedure == Procedures.CALC_CHECKSUM and dfu_result == Results.SUCCESS):
+ offset = bytes_to_uint32_le(notify[3:7])
+ crc32 = bytes_to_uint32_le(notify[7:11])
+
+ return (dfu_procedure, dfu_result, offset, crc32)
+
+ elif(dfu_procedure == Procedures.SELECT and dfu_result == Results.SUCCESS):
+ max_size = bytes_to_uint32_le(notify[3:7])
+ offset = bytes_to_uint32_le(notify[7:11])
+ crc32 = bytes_to_uint32_le(notify[11:15])
+
+ return (dfu_procedure, dfu_result, max_size, offset, crc32)
+
+ else:
+ return (dfu_procedure, dfu_result)
+
+ # --------------------------------------------------------------------------
+ # Wait for a notification and parse the response
+ # --------------------------------------------------------------------------
+ def _wait_and_parse_notify(self):
+ if verbose: print("Waiting for notification")
+ notify = self._dfu_wait_for_notify()
+
+ if notify is None:
+ raise Exception("No notification received")
+
+ if verbose: print("Parsing notification")
+
+ result = self._dfu_parse_notify(notify)
+ if result[1] != Results.SUCCESS:
+ raise Exception("Error in {} procedure, reason: {}".format(
+ Procedures.to_string(result[0]),
+ Results.to_string(result[1])))
+
+ return result
+
+ # --------------------------------------------------------------------------
+ # Send the Init info (*.dat file contents) to peripheral device.
+ # --------------------------------------------------------------------------
+ def _dfu_send_init(self):
+ if verbose: print("dfu_send_init")
+
+ # Open the DAT file and create array of its contents
+ init_bin_array = array('B', open(self.datfile_path, 'rb').read())
+ init_size = len(init_bin_array)
+ init_crc = 0;
+
+ # Select command
+ self._dfu_send_command(Procedures.SELECT, [Procedures.PARAM_COMMAND]);
+ (proc, res, max_size, offset, crc32) = self._wait_and_parse_notify()
+
+ if offset != init_size or crc32 != init_crc:
+ if offset == 0 or offset > init_size:
+ # Create command
+ self._dfu_send_command(Procedures.CREATE, [Procedures.PARAM_COMMAND] + uint32_to_bytes_le(init_size))
+ res = self._wait_and_parse_notify()
+
+ segment_count = 0
+ segment_total = int(math.ceil(init_size/float(self.pkt_payload_size)))
+
+ for i in range(0, init_size, self.pkt_payload_size):
+ segment = init_bin_array[i:i + self.pkt_payload_size]
+ self._dfu_send_data(segment)
+ segment_count += 1
+
+ if (segment_count % self.pkt_receipt_interval) == 0:
+ (proc, res, offset, crc32) = self._wait_and_parse_notify()
+
+ if res != Results.SUCCESS:
+ raise Exception("bad notification status: {}".format(Results.to_string(res)))
+
+ # Calculate CRC
+ self._dfu_send_command(Procedures.CALC_CHECKSUM)
+ self._wait_and_parse_notify()
+
+ # Execute command
+ self._dfu_send_command(Procedures.EXECUTE)
+ self._wait_and_parse_notify()
+
+ print("Init packet successfully transfered")
+
+ # --------------------------------------------------------------------------
+ # Send the Firmware image to peripheral device.
+ # --------------------------------------------------------------------------
+ def _dfu_send_image(self):
+ if verbose: print("dfu_send_image")
+
+ # Select Data Object
+ self._dfu_send_command(Procedures.SELECT, [Procedures.PARAM_DATA])
+ (proc, res, max_size, offset, crc32) = self._wait_and_parse_notify()
+
+ # Split the firmware into multiple objects
+ num_objects = int(math.ceil(self.image_size / float(max_size)))
+ print("Max object size: %d, num objects: %d, offset: %d, total size: %d" % (max_size, num_objects, offset, self.image_size))
+
+ time_start = time.time()
+ last_send_time = time.time()
+
+ obj_offset = (offset/max_size)*max_size
+ while(obj_offset < self.image_size):
+ # print "\nSending object {} of {}".format(obj_offset/max_size+1, num_objects)
+ obj_offset += self._dfu_send_object(obj_offset, max_size)
+
+ # Image uploaded successfully, update the progress bar
+ print_progress(self.image_size, self.image_size, prefix = 'Progress:', suffix = 'Complete', barLength = 50)
+
+ duration = time.time() - time_start
+ print("\nUpload complete in {} minutes and {} seconds".format(int(duration / 60), int(duration % 60)))
+
+ # --------------------------------------------------------------------------
+ # Send a single data object of given size and offset.
+ # --------------------------------------------------------------------------
+ def _dfu_send_object(self, offset, obj_max_size):
+ if offset != self.image_size:
+ if offset == 0 or offset >= obj_max_size or crc32 != crc32_unsigned(self.bin_array[0:offset]):
+ # Create Data Object
+ size = min(obj_max_size, self.image_size - offset)
+ self._dfu_send_command(Procedures.CREATE, [Procedures.PARAM_DATA] + uint32_to_bytes_le(size))
+ self._wait_and_parse_notify()
+
+ segment_count = 0
+ segment_total = int(math.ceil(min(obj_max_size, self.image_size-offset)/float(self.pkt_payload_size)))
+
+ segment_begin = offset
+ segment_end = min(offset+obj_max_size, self.image_size)
+
+ for i in range(segment_begin, segment_end, self.pkt_payload_size):
+ num_bytes = min(self.pkt_payload_size, segment_end - i)
+ segment = self.bin_array[i:i + num_bytes]
+ self._dfu_send_data(segment)
+ segment_count += 1
+
+ # print "j: {} i: {}, end: {}, bytes: {}, size: {} segment #{} of {}".format(
+ # offset, i, segment_end, num_bytes, self.image_size, segment_count, segment_total)
+
+ if (segment_count % self.pkt_receipt_interval) == 0:
+ try:
+ (proc, res, offset, crc32) = self._wait_and_parse_notify()
+ except e:
+ # Likely no notification received, need to re-transmit object
+ return 0
+
+ if res != Results.SUCCESS:
+ raise Exception("bad notification status: {}".format(Results.to_string(res)))
+
+ if crc32 != crc32_unsigned(self.bin_array[0:offset]):
+ # Something went wrong, need to re-transmit this object
+ return 0
+
+ print_progress(offset, self.image_size, prefix = 'Progress:', suffix = 'Complete', barLength = 50)
+
+ # Calculate CRC
+ self._dfu_send_command(Procedures.CALC_CHECKSUM)
+ (proc, res, offset, crc32) = self._wait_and_parse_notify()
+ if(crc32 != crc32_unsigned(self.bin_array[0:offset])):
+ # Need to re-transmit object
+ return 0
+
+ # Execute command
+ self._dfu_send_command(Procedures.EXECUTE)
+ self._wait_and_parse_notify()
+
+ # If everything executed correctly, return amount of bytes transfered
+ return obj_max_size
diff --git a/bootloader/ota-dfu-python/dfu.py b/bootloader/ota-dfu-python/dfu.py
new file mode 100755
index 00000000..207962d0
--- /dev/null
+++ b/bootloader/ota-dfu-python/dfu.py
@@ -0,0 +1,188 @@
+#!/usr/bin/env python3
+"""
+------------------------------------------------------------------------------
+ DFU Server for Nordic nRF51 based systems.
+ Conforms to nRF51_SDK 11.0 BLE_DFU requirements.
+------------------------------------------------------------------------------
+"""
+import os, re
+import sys
+import optparse
+import time
+import math
+import traceback
+
+from unpacker import Unpacker
+
+from ble_secure_dfu_controller import BleDfuControllerSecure
+from ble_legacy_dfu_controller import BleDfuControllerLegacy
+
+def main():
+
+ init_msg = """
+ ================================
+ == ==
+ == DFU Server ==
+ == ==
+ ================================
+ """
+
+ # print "DFU Server start"
+ print(init_msg)
+
+ try:
+ parser = optparse.OptionParser(usage='%prog -f <hex_file> -a <dfu_target_address>\n\nExample:\n\tdfu.py -f application.hex -d application.dat -a cd:e3:4a:47:1c:e4',
+ version='0.5')
+
+ parser.add_option('-a', '--address',
+ action='store',
+ dest="address",
+ type="string",
+ default=None,
+ help='DFU target address.'
+ )
+
+ parser.add_option('-f', '--file',
+ action='store',
+ dest="hexfile",
+ type="string",
+ default=None,
+ help='hex file to be uploaded.'
+ )
+
+ parser.add_option('-d', '--dat',
+ action='store',
+ dest="datfile",
+ type="string",
+ default=None,
+ help='dat file to be uploaded.'
+ )
+
+ parser.add_option('-z', '--zip',
+ action='store',
+ dest="zipfile",
+ type="string",
+ default=None,
+ help='zip file to be used.'
+ )
+
+ parser.add_option('--secure',
+ action='store_true',
+ dest='secure_dfu',
+ default=True,
+ help='Use secure bootloader (Nordic SDK > 12)'
+ )
+
+ parser.add_option('--legacy',
+ action='store_false',
+ dest='secure_dfu',
+ help='Use secure bootloader (Nordic SDK < 12)'
+ )
+
+ options, args = parser.parse_args()
+
+ except Exception as e:
+ print(e)
+ print("For help use --help")
+ sys.exit(2)
+
+ try:
+
+ ''' Validate input parameters '''
+
+ if not options.address:
+ parser.print_help()
+ exit(2)
+
+ unpacker = None
+ hexfile = None
+ datfile = None
+
+ if options.zipfile != None:
+
+ if (options.hexfile != None) or (options.datfile != None):
+ print("Conflicting input directives")
+ exit(2)
+
+ unpacker = Unpacker()
+ #print options.zipfile
+ try:
+ hexfile, datfile = unpacker.unpack_zipfile(options.zipfile)
+ except Exception as e:
+ print("ERR")
+ print(e)
+ pass
+
+ else:
+ if (not options.hexfile) or (not options.datfile):
+ parser.print_help()
+ exit(2)
+
+ if not os.path.isfile(options.hexfile):
+ print("Error: Hex file doesn't exist")
+ exit(2)
+
+ if not os.path.isfile(options.datfile):
+ print("Error: DAT file doesn't exist")
+ exit(2)
+
+ hexfile = options.hexfile
+ datfile = options.datfile
+
+
+ ''' Start of Device Firmware Update processing '''
+
+ if options.secure_dfu:
+ ble_dfu = BleDfuControllerSecure(options.address.upper(), hexfile, datfile)
+ else:
+ ble_dfu = BleDfuControllerLegacy(options.address.upper(), hexfile, datfile)
+
+ # Initialize inputs
+ ble_dfu.input_setup()
+
+ # Connect to peer device. Assume application mode.
+ if ble_dfu.scan_and_connect():
+ if not ble_dfu.check_DFU_mode():
+ print("Need to switch to DFU mode")
+ success = ble_dfu.switch_to_dfu_mode()
+ if not success:
+ print("Couldn't reconnect")
+ else:
+ # The device might already be in DFU mode (MAC + 1)
+ ble_dfu.target_mac_increase(1)
+
+ # Try connection with new address
+ print("Couldn't connect, will try DFU MAC")
+ if not ble_dfu.scan_and_connect():
+ raise Exception("Can't connect to device")
+
+ ble_dfu.start()
+
+ # Disconnect from peer device if not done already and clean up.
+ ble_dfu.disconnect()
+
+ except Exception as e:
+ # print traceback.format_exc()
+ print("Exception at line {}: {}".format(sys.exc_info()[2].tb_lineno, e))
+ pass
+
+ except:
+ pass
+
+ # If Unpacker for zipfile used then delete Unpacker
+ if unpacker != None:
+ unpacker.delete()
+
+ print("DFU Server done")
+
+"""
+------------------------------------------------------------------------------
+
+------------------------------------------------------------------------------
+"""
+if __name__ == '__main__':
+
+ # Do not litter the world with broken .pyc files.
+ sys.dont_write_bytecode = True
+
+ main()
diff --git a/bootloader/ota-dfu-python/nrf_ble_dfu_controller.py b/bootloader/ota-dfu-python/nrf_ble_dfu_controller.py
new file mode 100644
index 00000000..85de15a6
--- /dev/null
+++ b/bootloader/ota-dfu-python/nrf_ble_dfu_controller.py
@@ -0,0 +1,263 @@
+import os
+import pexpect
+import re
+
+from abc import ABCMeta, abstractmethod
+from array import array
+from util import *
+
+verbose = False
+
+class NrfBleDfuController(object, metaclass=ABCMeta):
+ ctrlpt_handle = 0
+ ctrlpt_cccd_handle = 0
+ data_handle = 0
+
+ pkt_receipt_interval = 10
+ pkt_payload_size = 20
+
+ # --------------------------------------------------------------------------
+ # Start the firmware update process
+ # --------------------------------------------------------------------------
+ @abstractmethod
+ def start(self):
+ pass
+
+ # --------------------------------------------------------------------------
+ # Check if the peripheral is running in bootloader (DFU) or application mode
+ # Returns True if the peripheral is in DFU mode
+ # --------------------------------------------------------------------------
+ @abstractmethod
+ def check_DFU_mode(self):
+ pass
+
+ @abstractmethod
+ # --------------------------------------------------------------------------
+ # Switch from application to bootloader (DFU)
+ # --------------------------------------------------------------------------
+ def switch_to_dfu_mode(self):
+ pass
+
+ # --------------------------------------------------------------------------
+ # Parse notification status results
+ # --------------------------------------------------------------------------
+ @abstractmethod
+ def _dfu_parse_notify(self, notify):
+ pass
+
+ # --------------------------------------------------------------------------
+ # Wait for a notification and parse the response
+ # --------------------------------------------------------------------------
+ @abstractmethod
+ def _wait_and_parse_notify(self):
+ pass
+
+ def __init__(self, target_mac, firmware_path, datfile_path):
+ self.target_mac = target_mac
+
+ self.firmware_path = firmware_path
+ self.datfile_path = datfile_path
+
+ self.ble_conn = pexpect.spawn("gatttool -b '%s' -t random --interactive" % target_mac)
+ self.ble_conn.delaybeforesend = 0
+
+ # --------------------------------------------------------------------------
+ # Start the firmware update process
+ # --------------------------------------------------------------------------
+ def start(self):
+ (_, self.ctrlpt_handle, self.ctrlpt_cccd_handle) = self._get_handles(self.UUID_CONTROL_POINT)
+ (_, self.data_handle, _) = self._get_handles(self.UUID_PACKET)
+
+ if verbose:
+ print('Control Point Handle: 0x%04x, CCCD: 0x%04x' % (self.ctrlpt_handle, self.ctrlpt_cccd_handle))
+ print('Packet handle: 0x%04x' % (self.data_handle))
+
+ # Subscribe to notifications from Control Point characteristic
+ self._enable_notifications(self.ctrlpt_cccd_handle)
+
+ # Set the Packet Receipt Notification interval
+ prn = uint16_to_bytes_le(self.pkt_receipt_interval)
+ self._dfu_send_command(Procedures.SET_PRN, prn)
+
+ self._dfu_send_init()
+
+ self._dfu_send_image()
+
+ # --------------------------------------------------------------------------
+ # Initialize:
+ # Hex: read and convert hexfile into bin_array
+ # Bin: read binfile into bin_array
+ # --------------------------------------------------------------------------
+ def input_setup(self):
+ print("Sending file " + os.path.split(self.firmware_path)[1] + " to " + self.target_mac)
+
+ if self.firmware_path == None:
+ raise Exception("input invalid")
+
+ name, extent = os.path.splitext(self.firmware_path)
+
+ if extent == ".bin":
+ self.bin_array = array('B', open(self.firmware_path, 'rb').read())
+
+ self.image_size = len(self.bin_array)
+ print("Binary imge size: %d" % self.image_size)
+ print("Binary CRC32: %d" % crc32_unsigned(array_to_hex_string(self.bin_array)))
+
+ return
+
+ if extent == ".hex":
+ intelhex = IntelHex(self.firmware_path)
+ self.bin_array = intelhex.tobinarray()
+ self.image_size = len(self.bin_array)
+ print("bin array size: ", self.image_size)
+ return
+
+ raise Exception("input invalid")
+
+ # --------------------------------------------------------------------------
+ # Perform a scan and connect via gatttool.
+ # Will return True if a connection was established, False otherwise
+ # --------------------------------------------------------------------------
+ def scan_and_connect(self, timeout=2):
+ if verbose: print("scan_and_connect")
+
+ print("Connecting to %s" % (self.target_mac))
+
+ try:
+ self.ble_conn.expect('\[LE\]>', timeout=timeout)
+ except pexpect.TIMEOUT as e:
+ return False
+
+ self.ble_conn.sendline('connect')
+
+ try:
+ res = self.ble_conn.expect('.*Connection successful.*', timeout=timeout)
+ except pexpect.TIMEOUT as e:
+ return False
+
+ return True
+
+ # --------------------------------------------------------------------------
+ # Disconnect from the peripheral and close the gatttool connection
+ # --------------------------------------------------------------------------
+ def disconnect(self):
+ self.ble_conn.sendline('exit')
+ self.ble_conn.close()
+
+ def target_mac_increase(self, inc):
+ self.target_mac = uint_to_mac_string(mac_string_to_uint(self.target_mac) + inc)
+
+ # Re-start gatttool with the new address
+ self.disconnect()
+ self.ble_conn = pexpect.spawn("gatttool -b '%s' -t random --interactive" % self.target_mac)
+ self.ble_conn.delaybeforesend = 0
+
+ # --------------------------------------------------------------------------
+ # Fetch handles for a given UUID.
+ # Will return a three-tuple: (char handle, value handle, CCCD handle)
+ # Will raise an exception if the UUID is not found
+ # --------------------------------------------------------------------------
+ def _get_handles(self, uuid):
+ self.ble_conn.before = ""
+ self.ble_conn.sendline('characteristics')
+
+ try:
+ self.ble_conn.expect([uuid], timeout=2)
+ handles = re.findall(b'.*handle: (0x....),.*char value handle: (0x....)', self.ble_conn.before)
+ (handle, value_handle) = handles[-1]
+ except pexpect.TIMEOUT as e:
+ raise Exception("UUID not found: {}".format(uuid))
+
+ return (int(handle, 16), int(value_handle, 16), int(value_handle, 16)+1)
+
+ # --------------------------------------------------------------------------
+ # Wait for notification to arrive.
+ # Example format: "Notification handle = 0x0019 value: 10 01 01"
+ # --------------------------------------------------------------------------
+ def _dfu_wait_for_notify(self):
+ while True:
+ if verbose: print("dfu_wait_for_notify")
+
+ if not self.ble_conn.isalive():
+ print("connection not alive")
+ return None
+
+ try:
+ index = self.ble_conn.expect('Notification handle = .*? \r\n', timeout=30)
+
+ except pexpect.TIMEOUT:
+ #
+ # The gatttool does not report link-lost directly.
+ # The only way found to detect it is monitoring the prompt '[CON]'
+ # and if it goes to '[ ]' this indicates the connection has
+ # been broken.
+ # In order to get a updated prompt string, issue an empty
+ # sendline(''). If it contains the '[ ]' string, then
+ # raise an exception. Otherwise, if not a link-lost condition,
+ # continue to wait.
+ #
+ self.ble_conn.sendline('')
+ string = self.ble_conn.before
+ if '[ ]' in string:
+ print('Connection lost! ')
+ raise Exception('Connection Lost')
+ return None
+
+ if index == 0:
+ after = self.ble_conn.after
+ hxstr = after.split()[3:]
+ handle = int(float.fromhex(hxstr[0].decode('UTF-8')))
+ return hxstr[2:]
+
+ else:
+ print("unexpeced index: {0}".format(index))
+ return None
+
+ # --------------------------------------------------------------------------
+ # Send a procedure + any parameters required
+ # --------------------------------------------------------------------------
+ def _dfu_send_command(self, procedure, params=[]):
+ if verbose: print('_dfu_send_command')
+
+ cmd = 'char-write-req 0x%04x %02x' % (self.ctrlpt_handle, procedure)
+ cmd += array_to_hex_string(params)
+
+ if verbose: print(cmd)
+
+ self.ble_conn.sendline(cmd)
+
+ # Verify that command was successfully written
+ try:
+ res = self.ble_conn.expect('Characteristic value was written successfully.*', timeout=10)
+ except pexpect.TIMEOUT as e:
+ print("State timeout")
+
+ # --------------------------------------------------------------------------
+ # Send an array of bytes
+ # --------------------------------------------------------------------------
+ def _dfu_send_data(self, data):
+ cmd = 'char-write-cmd 0x%04x' % (self.data_handle)
+ cmd += ' '
+ cmd += array_to_hex_string(data)
+
+ if verbose: print(cmd)
+
+ self.ble_conn.sendline(cmd)
+
+ # --------------------------------------------------------------------------
+ # Enable notifications from the Control Point Handle
+ # --------------------------------------------------------------------------
+ def _enable_notifications(self, cccd_handle):
+ if verbose: print('_enable_notifications')
+
+ cmd = 'char-write-req 0x%04x %s' % (cccd_handle, '0100')
+
+ if verbose: print(cmd)
+
+ self.ble_conn.sendline(cmd)
+
+ # Verify that command was successfully written
+ try:
+ res = self.ble_conn.expect('Characteristic value was written successfully.*', timeout=10)
+ except pexpect.TIMEOUT as e:
+ print("State timeout")
diff --git a/bootloader/ota-dfu-python/unpacker.py b/bootloader/ota-dfu-python/unpacker.py
new file mode 100644
index 00000000..960ef9de
--- /dev/null
+++ b/bootloader/ota-dfu-python/unpacker.py
@@ -0,0 +1,52 @@
+import os.path
+import zipfile
+import tempfile
+import random
+import string
+import shutil
+import re
+
+from os.path import basename
+
+class Unpacker(object):
+ #--------------------------------------------------------------------------
+ #
+ #--------------------------------------------------------------------------
+ def entropy(self, length):
+ return ''.join(random.choice('abcdefghijklmnopqrstuvwxyz') for i in range (length))
+
+ #--------------------------------------------------------------------------
+ #
+ #--------------------------------------------------------------------------
+ def unpack_zipfile(self, file):
+
+ if not os.path.isfile(file):
+ raise Exception("Error: file, not found!")
+
+ # Create unique working direction into which the zip file is expanded
+ self.unzip_dir = "{0}/{1}_{2}".format(tempfile.gettempdir(), os.path.splitext(basename(file))[0], self.entropy(6))
+
+ datfilename = ""
+ binfilename = ""
+
+ with zipfile.ZipFile(file, 'r') as zip:
+ files = [item.filename for item in zip.infolist()]
+ datfilename = [m.group(0) for f in files for m in [re.search('.*\.dat', f)] if m].pop()
+ binfilename = [m.group(0) for f in files for m in [re.search('.*\.bin', f)] if m].pop()
+
+ zip.extractall(r'{0}'.format(self.unzip_dir))
+
+ datfile = "{0}/{1}".format(self.unzip_dir, datfilename)
+ binfile = "{0}/{1}".format(self.unzip_dir, binfilename)
+
+ # print "DAT file: " + datfile
+ # print "BIN file: " + binfile
+
+ return binfile, datfile
+
+ #--------------------------------------------------------------------------
+ #
+ #--------------------------------------------------------------------------
+ def delete(self):
+ # delete self.unzip_dir and its contents
+ shutil.rmtree(self.unzip_dir)
diff --git a/bootloader/ota-dfu-python/util.py b/bootloader/ota-dfu-python/util.py
new file mode 100644
index 00000000..401d4948
--- /dev/null
+++ b/bootloader/ota-dfu-python/util.py
@@ -0,0 +1,70 @@
+import sys
+import binascii
+import re
+
+def bytes_to_uint32_le(bytes):
+ return (int(bytes[3], 16) << 24) | (int(bytes[2], 16) << 16) | (int(bytes[1], 16) << 8) | (int(bytes[0], 16) << 0)
+
+def uint32_to_bytes_le(uint32):
+ return [(uint32 >> 0) & 0xff,
+ (uint32 >> 8) & 0xff,
+ (uint32 >> 16) & 0xff,
+ (uint32 >> 24) & 0xff]
+
+def uint16_to_bytes_le(value):
+ return [(value >> 0 & 0xFF),
+ (value >> 8 & 0xFF)]
+
+def zero_pad_array_le(data, padsize):
+ for i in range(0, padsize):
+ data.insert(0, 0)
+
+def array_to_hex_string(arr):
+ hex_str = ""
+ for val in arr:
+ if val > 255:
+ raise Exception("Value is greater than it is possible to represent with one byte")
+ hex_str += "%02x" % val
+
+ return hex_str
+
+def crc32_unsigned(bytestring):
+ return binascii.crc32(bytestring.encode('UTF-8')) % (1 << 32)
+
+def mac_string_to_uint(mac):
+ parts = list(re.match('(..):(..):(..):(..):(..):(..)', mac).groups())
+ ints = [int(x, 16) for x in parts]
+
+ res = 0
+ for i in range(0, len(ints)):
+ res += (ints[len(ints)-1 - i] << 8*i)
+
+ return res
+
+def uint_to_mac_string(mac):
+ ints = [0, 0, 0, 0, 0, 0]
+ for i in range(0, len(ints)):
+ ints[len(ints)-1 - i] = (mac >> 8*i) & 0xff
+
+ return ':'.join(['{:02x}'.format(x).upper() for x in ints])
+
+# Print a nice console progress bar
+def print_progress(iteration, total, prefix = '', suffix = '', decimals = 1, barLength = 100):
+ """
+ Call in a loop to create terminal progress bar
+ @params:
+ iteration - Required : current iteration (Int)
+ total - Required : total iterations (Int)
+ prefix - Optional : prefix string (Str)
+ suffix - Optional : suffix string (Str)
+ decimals - Optional : positive number of decimals in percent complete (Int)
+ barLength - Optional : character length of bar (Int)
+ """
+ formatStr = "{0:." + str(decimals) + "f}"
+ percents = formatStr.format(100 * (iteration / float(total)))
+ filledLength = int(round(barLength * iteration / float(total)))
+ bar = 'x' * filledLength + '-' * (barLength - filledLength)
+ sys.stdout.write('\r%s |%s| %s%s %s (%d of %d bytes)' % (prefix, bar, percents, '%', suffix, iteration, total)),
+ if iteration == total:
+ sys.stdout.write('\n')
+ sys.stdout.flush()