2022-01-28 16:37:42 +05:30
/*
2024-04-23 13:42:43 +05:30
* SPDX-FileCopyrightText: 2017-2024 Espressif Systems (Shanghai) CO LTD
2022-01-28 16:37:42 +05:30
*
* SPDX-License-Identifier: Apache-2.0
*/
2018-07-12 17:45:44 +05:30
# pragma once
# include <esp_http_client.h>
2019-10-14 17:56:21 -03:00
# include <bootloader_common.h>
2022-07-29 16:07:04 +05:30
# include "esp_app_desc.h"
2022-01-28 16:37:42 +05:30
# include <sdkconfig.h>
2022-11-02 14:48:43 +05:30
2022-11-02 11:05:19 +05:30
# include "esp_event.h"
2022-11-02 14:48:43 +05:30
# include "esp_partition.h"
2018-07-12 17:45:44 +05:30
# ifdef __cplusplus
extern " C " {
# endif
2022-11-02 11:05:19 +05:30
ESP_EVENT_DECLARE_BASE ( ESP_HTTPS_OTA_EVENT ) ;
2022-11-02 14:48:43 +05:30
2022-11-02 11:05:19 +05:30
/**
* @brief Events generated by OTA process
*/
typedef enum {
2022-11-02 14:48:43 +05:30
ESP_HTTPS_OTA_START , /*!< OTA started */
ESP_HTTPS_OTA_CONNECTED , /*!< Connected to server */
ESP_HTTPS_OTA_GET_IMG_DESC , /*!< Read app description from image header */
ESP_HTTPS_OTA_VERIFY_CHIP_ID , /*!< Verify chip id of new image */
ESP_HTTPS_OTA_DECRYPT_CB , /*!< Callback to decrypt function */
ESP_HTTPS_OTA_WRITE_FLASH , /*!< Flash write operation */
ESP_HTTPS_OTA_UPDATE_BOOT_PARTITION , /*!< Boot partition update after successful ota update */
ESP_HTTPS_OTA_FINISH , /*!< OTA finished */
ESP_HTTPS_OTA_ABORT , /*!< OTA aborted */
2022-11-02 11:05:19 +05:30
} esp_https_ota_event_t ;
2022-11-02 14:48:43 +05:30
2019-04-03 19:55:27 +05:30
typedef void * esp_https_ota_handle_t ;
2020-08-21 12:40:56 +05:30
typedef esp_err_t ( * http_client_init_cb_t ) ( esp_http_client_handle_t ) ;
2019-04-03 19:55:27 +05:30
2024-04-23 13:42:43 +05:30
# if CONFIG_ESP_HTTPS_OTA_DECRYPT_CB || __DOXYGEN__
/**
* @brief ESP HTTPS OTA decrypt callback args
*/
2022-01-28 16:40:06 +05:30
typedef struct {
const char * data_in ; /*!< Pointer to data to be decrypted */
size_t data_in_len ; /*!< Input data length */
char * data_out ; /*!< Pointer to data decrypted using callback, this will be freed after data is written to flash */
size_t data_out_len ; /*!< Output data length */
} decrypt_cb_arg_t ;
2022-03-10 12:02:42 +00:00
typedef esp_err_t ( * decrypt_cb_t ) ( decrypt_cb_arg_t * args , void * user_ctx ) ;
2024-04-23 13:42:43 +05:30
# endif // CONFIG_ESP_HTTPS_OTA_DECRYPT_CB || __DOXYGEN__
2022-01-28 16:40:06 +05:30
2019-04-03 19:55:27 +05:30
/**
* @brief ESP HTTPS OTA configuration
*/
typedef struct {
const esp_http_client_config_t * http_config ; /*!< ESP HTTP client configuration */
2020-08-21 12:40:56 +05:30
http_client_init_cb_t http_client_init_cb ; /*!< Callback after ESP HTTP client is initialised */
2020-07-21 18:23:28 +05:30
bool bulk_flash_erase ; /*!< Erase entire flash partition during initialization. By default flash partition is erased during write operation and in chunk of 4K sector size */
2021-02-02 13:25:40 +05:30
bool partial_http_download ; /*!< Enable Firmware image to be downloaded over multiple HTTP requests */
int max_http_request_size ; /*!< Maximum request size for partial HTTP download */
2023-12-12 18:44:15 +05:30
uint32_t buffer_caps ; /*!< The memory capability to use when allocating the buffer for OTA update. Default capability is MALLOC_CAP_DEFAULT */
2024-04-23 13:42:43 +05:30
# if CONFIG_ESP_HTTPS_OTA_DECRYPT_CB || __DOXYGEN__
2022-01-28 16:40:06 +05:30
decrypt_cb_t decrypt_cb ; /*!< Callback for external decryption layer */
2022-03-10 12:02:42 +00:00
void * decrypt_user_ctx ; /*!< User context for external decryption layer */
2023-09-06 12:35:47 +05:30
uint16_t enc_img_header_size ; /*!< Header size of pre-encrypted ota image header */
2022-01-28 16:40:06 +05:30
# endif
2019-04-03 19:55:27 +05:30
} esp_https_ota_config_t ;
# define ESP_ERR_HTTPS_OTA_BASE (0x9000)
# define ESP_ERR_HTTPS_OTA_IN_PROGRESS (ESP_ERR_HTTPS_OTA_BASE + 1) /* OTA operation in progress */
2018-07-12 17:45:44 +05:30
/**
* @brief HTTPS OTA Firmware upgrade.
*
2020-11-10 18:40:01 +11:00
* This function allocates HTTPS OTA Firmware upgrade context, establishes HTTPS connection,
* reads image data from HTTP stream and writes it to OTA partition and
2019-04-03 19:55:27 +05:30
* finishes HTTPS OTA Firmware upgrade operation.
* This API supports URL redirection, but if CA cert of URLs differ then it
2022-03-02 10:01:42 +05:30
* should be appended to `cert_pem` member of `ota_config->http_config`.
2020-11-10 18:40:01 +11:00
*
2022-03-02 10:01:42 +05:30
* @param[in] ota_config pointer to esp_https_ota_config_t structure.
2018-07-12 17:45:44 +05:30
*
2019-04-03 19:55:27 +05:30
* @note This API handles the entire OTA operation, so if this API is being used
* then no other APIs from `esp_https_ota` component should be called.
* If more information and control is needed during the HTTPS OTA process,
* then one can use `esp_https_ota_begin` and subsequent APIs. If this API returns
* successfully, esp_restart() must be called to boot from the new firmware image.
2018-07-12 17:45:44 +05:30
*
* @return
* - ESP_OK: OTA data updated, next reboot will use specified partition.
* - ESP_FAIL: For generic failure.
2018-12-31 14:32:35 +05:30
* - ESP_ERR_INVALID_ARG: Invalid argument
2018-07-12 17:45:44 +05:30
* - ESP_ERR_OTA_VALIDATE_FAILED: Invalid app image
* - ESP_ERR_NO_MEM: Cannot allocate memory for OTA operation.
* - ESP_ERR_FLASH_OP_TIMEOUT or ESP_ERR_FLASH_OP_FAIL: Flash write failed.
* - For other return codes, refer OTA documentation in esp-idf's app_update component.
*/
2022-03-02 10:01:42 +05:30
esp_err_t esp_https_ota ( const esp_https_ota_config_t * ota_config ) ;
2018-07-12 17:45:44 +05:30
2019-04-03 19:55:27 +05:30
/**
* @brief Start HTTPS OTA Firmware upgrade
*
* This function initializes ESP HTTPS OTA context and establishes HTTPS connection.
* This function must be invoked first. If this function returns successfully, then `esp_https_ota_perform` should be
* called to continue with the OTA process and there should be a call to `esp_https_ota_finish` on
* completion of OTA operation or on failure in subsequent operations.
* This API supports URL redirection, but if CA cert of URLs differ then it
* should be appended to `cert_pem` member of `http_config`, which is a part of `ota_config`.
2019-05-21 19:42:18 +02:00
* In case of error, this API explicitly sets `handle` to NULL.
2019-04-03 19:55:27 +05:30
*
* @param[in] ota_config pointer to esp_https_ota_config_t structure
* @param[out] handle pointer to an allocated data of type `esp_https_ota_handle_t`
* which will be initialised in this function
*
* @note This API is blocking, so setting `is_async` member of `http_config` structure will
* result in an error.
*
* @return
* - ESP_OK: HTTPS OTA Firmware upgrade context initialised and HTTPS connection established
* - ESP_FAIL: For generic failure.
* - ESP_ERR_INVALID_ARG: Invalid argument (missing/incorrect config, certificate, etc.)
2020-11-10 18:40:01 +11:00
* - For other return codes, refer documentation in app_update component and esp_http_client
2019-04-03 19:55:27 +05:30
* component in esp-idf.
*/
2022-03-02 10:01:42 +05:30
esp_err_t esp_https_ota_begin ( const esp_https_ota_config_t * ota_config , esp_https_ota_handle_t * handle ) ;
2019-04-03 19:55:27 +05:30
/**
2020-11-10 18:40:01 +11:00
* @brief Read image data from HTTP stream and write it to OTA partition
2019-04-03 19:55:27 +05:30
*
2020-11-10 18:40:01 +11:00
* This function reads image data from HTTP stream and writes it to OTA partition. This function
2019-04-03 19:55:27 +05:30
* must be called only if esp_https_ota_begin() returns successfully.
2020-11-10 18:40:01 +11:00
* This function must be called in a loop since it returns after every HTTP read operation thus
2019-04-03 19:55:27 +05:30
* giving you the flexibility to stop OTA operation midway.
2020-11-10 18:40:01 +11:00
*
2019-04-03 19:55:27 +05:30
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - ESP_ERR_HTTPS_OTA_IN_PROGRESS: OTA update is in progress, call this API again to continue.
* - ESP_OK: OTA update was successful
* - ESP_FAIL: OTA update failed
* - ESP_ERR_INVALID_ARG: Invalid argument
2022-01-28 16:37:42 +05:30
* - ESP_ERR_INVALID_VERSION: Invalid chip revision in image header
2019-04-03 19:55:27 +05:30
* - ESP_ERR_OTA_VALIDATE_FAILED: Invalid app image
* - ESP_ERR_NO_MEM: Cannot allocate memory for OTA operation.
* - ESP_ERR_FLASH_OP_TIMEOUT or ESP_ERR_FLASH_OP_FAIL: Flash write failed.
* - For other return codes, refer OTA documentation in esp-idf's app_update component.
*/
esp_err_t esp_https_ota_perform ( esp_https_ota_handle_t https_ota_handle ) ;
2019-08-15 21:10:00 +08:00
/**
* @brief Checks if complete data was received or not
*
* @note This API can be called just before esp_https_ota_finish() to validate if the complete image was indeed received.
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - false
* - true
*/
bool esp_https_ota_is_complete_data_received ( esp_https_ota_handle_t https_ota_handle ) ;
2019-04-03 19:55:27 +05:30
/**
* @brief Clean-up HTTPS OTA Firmware upgrade and close HTTPS connection
*
* This function closes the HTTP connection and frees the ESP HTTPS OTA context.
* This function switches the boot partition to the OTA partition containing the
* new firmware image.
*
* @note If this API returns successfully, esp_restart() must be called to
* boot from the new firmware image
2020-08-14 15:54:15 +05:30
* esp_https_ota_finish should not be called after calling esp_https_ota_abort
2019-04-03 19:55:27 +05:30
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - ESP_OK: Clean-up successful
* - ESP_ERR_INVALID_STATE
* - ESP_ERR_INVALID_ARG: Invalid argument
* - ESP_ERR_OTA_VALIDATE_FAILED: Invalid app image
*/
esp_err_t esp_https_ota_finish ( esp_https_ota_handle_t https_ota_handle ) ;
2020-08-14 15:54:15 +05:30
/**
* @brief Clean-up HTTPS OTA Firmware upgrade and close HTTPS connection
*
* This function closes the HTTP connection and frees the ESP HTTPS OTA context.
*
* @note esp_https_ota_abort should not be called after calling esp_https_ota_finish
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - ESP_OK: Clean-up successful
* - ESP_ERR_INVALID_STATE: Invalid ESP HTTPS OTA state
* - ESP_FAIL: OTA not started
* - ESP_ERR_NOT_FOUND: OTA handle not found
* - ESP_ERR_INVALID_ARG: Invalid argument
*/
esp_err_t esp_https_ota_abort ( esp_https_ota_handle_t https_ota_handle ) ;
2019-04-03 19:55:27 +05:30
/**
* @brief Reads app description from image header. The app description provides information
* like the "Firmware version" of the image.
2020-11-10 18:40:01 +11:00
*
2019-04-03 19:55:27 +05:30
* @note This API can be called only after esp_https_ota_begin() and before esp_https_ota_perform().
* Calling this API is not mandatory.
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
* @param[out] new_app_info pointer to an allocated esp_app_desc_t structure
2020-11-10 18:40:01 +11:00
*
* @return
2019-04-03 19:55:27 +05:30
* - ESP_ERR_INVALID_ARG: Invalid arguments
2022-01-28 16:37:42 +05:30
* - ESP_ERR_INVALID_STATE: Invalid state to call this API. esp_https_ota_begin() not called yet.
2019-04-03 19:55:27 +05:30
* - ESP_FAIL: Failed to read image descriptor
* - ESP_OK: Successfully read image descriptor
*/
esp_err_t esp_https_ota_get_img_desc ( esp_https_ota_handle_t https_ota_handle , esp_app_desc_t * new_app_info ) ;
2020-05-07 22:00:27 +02:00
/**
2019-04-03 19:55:27 +05:30
* @brief This function returns OTA image data read so far.
*
2023-12-12 18:44:15 +05:30
* @note This API should be called only if `esp_https_ota_perform()` has been called at least once or
2019-04-03 19:55:27 +05:30
* if `esp_https_ota_get_img_desc` has been called before.
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - -1 On failure
* - total bytes read so far
*/
int esp_https_ota_get_image_len_read ( esp_https_ota_handle_t https_ota_handle ) ;
2021-04-15 17:24:17 +02:00
2024-08-30 11:29:05 +05:30
/**
* @brief This function returns the HTTP status code of the last HTTP response.
*
* @note This API should be called only after esp_https_ota_begin() has been called.
* This can be used to check the HTTP status code of the OTA download process.
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - -1 On failure
* - HTTP status code
*/
int esp_https_ota_get_status_code ( esp_https_ota_handle_t https_ota_handle ) ;
2021-04-15 17:24:17 +02:00
/**
* @brief This function returns OTA image total size.
*
* @note This API should be called after esp_https_ota_begin() has been already called.
* This can be used to create some sort of progress indication
* (in combination with esp_https_ota_get_image_len_read())
*
* @param[in] https_ota_handle pointer to esp_https_ota_handle_t structure
*
* @return
* - -1 On failure or chunked encoding
* - total bytes of image
*/
int esp_https_ota_get_image_size ( esp_https_ota_handle_t https_ota_handle ) ;
2018-07-12 17:45:44 +05:30
# ifdef __cplusplus
}
# endif