adfuload: utility to upload and exec binary using brom adfu mode of atj213x SoC

Change-Id: If52aa34124be2801c2ac316641ff9aa0bbd837c6
diff --git a/utils/atj2137/adfuload/Makefile b/utils/atj2137/adfuload/Makefile
new file mode 100644
index 0000000..c6a432a
--- /dev/null
+++ b/utils/atj2137/adfuload/Makefile
@@ -0,0 +1,7 @@
+all: adfuload
+
+adfuload: adfuload.c encrypt.c
+	gcc -g -std=c99 -o $@ -W -Wall -I/usr/include/libusb-1.0/ $^ -lusb-1.0
+
+clean:
+	rm -fr *.o adfuload
diff --git a/utils/atj2137/adfuload/adfuload.c b/utils/atj2137/adfuload/adfuload.c
new file mode 100644
index 0000000..5e32a93
--- /dev/null
+++ b/utils/atj2137/adfuload/adfuload.c
@@ -0,0 +1,467 @@
+/***************************************************************************
+ *             __________               __   ___.
+ *   Open      \______   \ ____   ____ |  | _\_ |__   _______  ___
+ *   Source     |       _//  _ \_/ ___\|  |/ /| __ \ /  _ \  \/  /
+ *   Jukebox    |    |   (  <_> )  \___|    < | \_\ (  <_> > <  <
+ *   Firmware   |____|_  /\____/ \___  >__|_ \|___  /\____/__/\_ \
+ *                     \/            \/     \/    \/            \/
+ *
+ * Copyright (C) 2013 by Marcin Bukat
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+ * KIND, either express or implied.
+ *
+ ****************************************************************************/
+
+#include <stdlib.h>
+#include <libusb.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <string.h>
+#include <stdbool.h>
+
+#include "encrypt.h"
+
+#define VERSION "v0.1"
+
+#define RETRY_MAX 5
+#define USB_TIMEOUT 512
+#define VENDORID  0x10d6
+#define PRODUCTID 0xff96
+
+#define OUT_EP  0x01
+#define IN_EP   0x82
+
+#define CBW_SIGNATURE 0x43425355
+#define CSW_SIGNATURE 0x53425355
+
+struct CBWCB_t
+{
+    uint8_t  cbCode;
+    uint8_t  cbLun;
+    uint32_t LBA;
+    uint32_t cbLen;
+    uint8_t  reseved;
+    uint8_t  control;
+} __attribute__((__packed__));
+
+struct CBW_t
+{
+    uint32_t dCBWSignature;
+    uint32_t dCBWTag;
+    uint32_t dCBWDataTransferLength;
+    uint8_t  bmCBWFlags;
+    uint8_t  bCBWLUN;
+    uint8_t  bCBWCBLength;
+    uint8_t  CBWCB[16];
+} __attribute__((__packed__));
+
+struct CSW_t
+{
+    uint32_t dCSWSignature;
+    uint32_t dCSWTag;
+    uint32_t dCSWDataResidue;
+    uint8_t  bCSWStatus;
+} __attribute__((__packed__));
+
+static int send_msc_cmd(libusb_device_handle *hdev, void *cbwcb, uint32_t data_len, uint32_t *reftag)
+{
+    struct CBW_t cbw;
+    int ret, repeat, transferred;
+
+    memset(&cbw, 0, sizeof(cbw));
+    cbw.dCBWSignature = CBW_SIGNATURE;
+    cbw.dCBWTag = 0;
+    cbw.dCBWDataTransferLength = data_len;
+    cbw.bmCBWFlags = 0;
+    cbw.bCBWLUN = 0;
+    cbw.bCBWCBLength = ((((char *)cbwcb)[0] == 0x10) ? 0 : 0x10);
+    memcpy(cbw.CBWCB, cbwcb, sizeof(struct CBWCB_t));
+
+    *reftag = cbw.dCBWTag;
+    do
+    {
+        /* transfer command to the device */
+        ret = libusb_bulk_transfer(hdev, OUT_EP, (unsigned char*)&cbw, 31, &transferred, USB_TIMEOUT);
+        if (ret == LIBUSB_ERROR_PIPE)
+        {
+            libusb_clear_halt(hdev, OUT_EP);
+        }
+        repeat++;
+    } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX));
+
+    if (ret != LIBUSB_SUCCESS)
+    {
+        printf("error: command transfer error\n");
+        return -1;
+    }
+
+    return 0;
+}
+
+static int get_msc_csw(libusb_device_handle *hdev, uint32_t reftag)
+{
+    struct CSW_t csw;
+    int ret, repeat, transferred;
+
+    /* get CSW response from device */
+    repeat = 0;
+    do
+    {
+        ret = libusb_bulk_transfer(hdev, IN_EP, (unsigned char *)&csw, 13, &transferred, USB_TIMEOUT);
+        if (ret == LIBUSB_ERROR_PIPE)
+        {
+            libusb_clear_halt(hdev, IN_EP);
+        }
+        repeat++;
+    } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX));
+
+    if (ret != LIBUSB_SUCCESS)
+    {
+        printf("error reading CSW\n");
+        return -3;
+    }
+
+    if (transferred != 13)
+    {
+        printf("error wrong size of CSW packet\n");
+        return -4;
+    }
+
+    if (csw.dCSWSignature != CSW_SIGNATURE)
+    {
+        printf("error: wrong CSW signature.\n");
+        return -5;
+    }
+    if (csw.dCSWTag != reftag)
+    {
+        printf("error: CSW dCSWTag mismatch. Is 0x%x, expected 0x%x\n", csw.dCSWTag, reftag);
+        return -6;
+    }
+
+    if (csw.bCSWStatus)
+    {
+        /* In case of CSW indicating error dump the content of the packet */
+        printf ("dCSWSignature: 0x%0x\n", csw.dCSWSignature);
+        printf ("dCSWTag: 0x%0x\n", csw.dCSWTag);
+        printf ("dCSWDataResidue: 0x%0x\n", csw.dCSWDataResidue);
+        printf ("bCSWStatus: 0x%0x\n", csw.bCSWStatus);
+    }
+
+    return csw.bCSWStatus;
+}
+
+static void adfu_upload(libusb_device_handle *hdev, unsigned char *buf, int size, uint32_t address)
+{
+    uint8_t cmdbuf[16];
+    uint32_t reftag;
+    int transferred;
+
+    memset(cmdbuf, 0, sizeof(cmdbuf));
+
+    fprintf(stderr,"[info]: loading binary @ 0x%08x size %d bytes\n", address, size);
+
+    cmdbuf[0] = 0x05; /* transfer */
+
+    cmdbuf[1] = address         & 0xff; /* addr LSB */
+    cmdbuf[2] = (address >> 8)  & 0xff;
+    cmdbuf[3] = (address >> 16) & 0xff;
+    cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */
+
+    cmdbuf[5] = size         & 0xff; /* len LSB */
+    cmdbuf[6] = (size >> 8)  & 0xff;
+    cmdbuf[7] = (size >> 16) & 0xff;
+    cmdbuf[8] = (size >> 24) & 0xff; /* len MSB */
+
+    send_msc_cmd(hdev, (void *)cmdbuf, size, &reftag);
+
+    libusb_bulk_transfer(hdev, OUT_EP, buf, size, &transferred, USB_TIMEOUT);
+    fprintf(stderr, "[info]: actual xfered data: %d bytes\n", transferred);
+
+    /* get CSW from device*/
+    fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag));
+}
+
+#if 0
+/* unused, I'll leve it here for reference */
+static void adfu_download(libusb_device_handle *hdev, unsigned char *buf, int size, uint32_t address)
+{
+    uint8_t cmdbuf[16];
+    int transferred, ret, repeat;
+    uint32_t reftag;
+
+    fprintf(stderr, "[info]: downloading %d bytes from 0x%08x\n", size, address); 
+    memset(cmdbuf, 0, sizeof(cmdbuf));
+
+    cmdbuf[0] = 0x05;
+
+    cmdbuf[1] = address         & 0xff; /* addr LSB */
+    cmdbuf[2] = (address >> 8)  & 0xff;
+    cmdbuf[3] = (address >> 16) & 0xff;
+    cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */
+
+    cmdbuf[5] = size         & 0xff; /* len LSB */
+    cmdbuf[6] = (size >> 8)  & 0xff;
+    cmdbuf[7] = (size >> 16) & 0xff;
+    cmdbuf[8] = (size >> 24) & 0xff; /* len MSB */
+
+    cmdbuf[9] = 0x80; /* send data from device */
+
+    send_msc_cmd(hdev, (void *)cmdbuf, size, &reftag);
+
+    memset(buf, 0, sizeof(buf));
+
+    /* get data from device */
+    repeat = 0;
+    do
+    {
+        ret = libusb_bulk_transfer(hdev, IN_EP, buf, size, &transferred, USB_TIMEOUT);
+        if (ret == LIBUSB_ERROR_PIPE)
+        {
+            libusb_clear_halt(hdev, IN_EP);
+        }
+        repeat++;
+    } while ((ret == LIBUSB_ERROR_PIPE) && (repeat < RETRY_MAX));
+
+    fprintf(stderr, "[info]: actual xfered data: %d bytes\n", transferred);
+
+    /* get CSW from device*/
+    fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag));
+}
+#endif
+
+static void adfu_execute(libusb_device_handle *hdev, uint32_t address)
+{
+    uint8_t cmdbuf[16];
+    uint32_t reftag;
+
+    fprintf(stderr, "[info]: jumping to address 0x%08x\n", address);
+    memset(cmdbuf, 0, sizeof(cmdbuf));
+
+    cmdbuf[0] = 0x10; /* execute */
+
+    cmdbuf[1] = address         & 0xff; /* addr LSB */
+    cmdbuf[2] = (address >> 8)  & 0xff;
+    cmdbuf[3] = (address >> 16) & 0xff;
+    cmdbuf[4] = (address >> 24) & 0xff; /* addr MSB */
+
+    send_msc_cmd(hdev, (void *)cmdbuf, 0, &reftag);
+
+    /* get CSW from device*/
+    fprintf(stderr, "[info]: CSW status: %d\n", get_msc_csw(hdev, reftag));
+}
+
+static void usage(char *name)
+{
+    printf("usage: (sudo) %s [-e] -s1 stage1.bin -s2 stage2.bin\n", name);
+    printf("stage1.bin - binary of the stage1 (ADEC_N63.BIN for example)\n");
+    printf("stage2.bin - binary of the custom user code\n");
+    printf("\n");
+    printf("options:\n");
+    printf("-e - encode stage1 binary as needed by brom adfu mode\n");
+}
+
+int main (int argc, char **argv)
+{
+    libusb_device_handle *hdev;
+    int ret = 0;
+    int i = 1;
+    uint8_t *buf;
+    uint32_t filesize, filesize_round;
+    char *s1_filename, *s2_filename;
+    bool encode = false;
+    FILE *fp;
+
+    while (i < argc)
+    {
+        if (strcmp(argv[i],"-e") == 0)
+        {
+            encode = true;
+            i++;
+        }
+        else if (strcmp(argv[i],"-s1") == 0)
+        {
+            i++;
+            if (i == argc)
+            {
+                usage(argv[0]);
+                return -1;
+            }
+            s1_filename = argv[i];
+            i++;
+        }
+        else if (strcmp(argv[i],"-s2") == 0)
+        {
+            i++;
+            if (i == argc)
+            {
+                usage(argv[0]);
+                return -2;
+            }
+            s2_filename = argv[i];
+            i++;
+        }
+        else
+        {
+            usage(argv[0]);
+            return -3;
+        }
+    }
+
+    /* print banner */
+    fprintf(stderr,"adfuload " VERSION "\n");
+    fprintf(stderr,"(C) Marcin Bukat 2013\n");
+    fprintf(stderr,"This is free software; see the source for copying conditions.  There is NO\n");
+    fprintf(stderr,"warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.\n\n");
+
+    /* initialize libusb */
+    libusb_init(NULL);
+
+    hdev = libusb_open_device_with_vid_pid(NULL, VENDORID, PRODUCTID);
+    if (hdev == NULL)
+    {
+        fprintf(stderr, "[error]: can't open device with VID:PID=0x%0x:0x%0x\n", VENDORID, PRODUCTID);
+        libusb_exit(NULL);
+        return -4;
+    }
+
+    ret = libusb_kernel_driver_active(hdev, 0);
+
+    if (ret < 0)
+    {
+        fprintf(stderr, "[error]: checking kernel driver active\n");
+        ret = -5;
+        goto end;
+    }
+    else
+    {
+        if (ret)
+            libusb_detach_kernel_driver(hdev, 0);
+    }
+
+    ret = libusb_set_configuration(hdev, 1);
+    if (ret < 0)
+    {
+        fprintf(stderr, "[error]: could not select configuration (1)\n");
+        ret = -6;
+        goto end;
+    }
+
+    ret = libusb_claim_interface(hdev, 0);
+    if (ret < 0)
+    {
+            fprintf(stderr, "[error]: could not claim interface #0\n");
+            ret = -7;
+            goto end;
+    }
+
+    ret = libusb_set_interface_alt_setting(hdev, 0, 0);
+    if ( ret != LIBUSB_SUCCESS)
+    {
+        fprintf(stderr, "[error]: could not set alt setting for interface #0\n");
+        ret = -8;
+        goto end;
+    }
+
+    fp = fopen(s1_filename, "rb");
+
+    if (fp == NULL)
+    {
+        fprintf(stderr, "[error]: Could not open file \"%s\"\n", s1_filename);
+        ret = -10;
+        goto end;
+    }
+
+    fseek(fp, 0, SEEK_END);
+    filesize = (uint32_t)ftell(fp);
+    fseek(fp, 0, SEEK_SET);
+
+    filesize_round = ( (filesize + 511) / 512 ) * 512;
+
+    buf = malloc(filesize_round);
+
+    if (buf == NULL)
+    {
+        fprintf(stderr, "[error]: Cannot allocate %d bytes of memory\n", filesize_round);
+        ret = -11;
+        goto end_fclose;
+    }
+
+    if (fread(buf, 1, filesize, fp) != filesize)
+    {
+        fprintf(stderr, "[error]: can't read file: %s\n", s1_filename);
+        ret = -12;
+        goto end_free;
+    }
+
+    fclose(fp);
+
+    fprintf(stderr, "[info]: file %s\n", s2_filename);
+
+    if (encode)
+    {
+        fprintf(stderr, "[info]: encrypting binary\n");
+        ret = encrypt(buf, filesize_round);
+
+        if (ret)
+        {
+            fprintf(stderr, "[error]: can't encrypt binary\n");
+            ret = -13;
+            goto end_free;
+        }
+    }
+
+    adfu_upload(hdev, buf, filesize_round, 0xb4040000);
+    adfu_execute(hdev, 0xb4040000);
+    /* Now ADEC_N63.BIN should be operational */
+
+    /* upload custom binary and run it */
+    fp = fopen(s2_filename, "rb");
+
+    if (fp == NULL)
+    {
+        fprintf(stderr, "[error]: could not open file \"%s\"\n", s2_filename);
+        ret = -20;
+        goto end;
+    }
+
+    fseek(fp, 0, SEEK_END);
+    filesize = (uint32_t)ftell(fp);
+    fseek(fp, 0, SEEK_SET);
+
+    buf = realloc(buf, filesize);
+
+    if (buf == NULL)
+    {
+        fprintf(stderr, "[error]: can't allocate %d bytes of memory\n", filesize);
+        ret = -21;
+        goto end_fclose;
+    }
+
+    if (fread(buf, 1, filesize, fp) != filesize)
+    {
+        fprintf(stderr, "[error]: can't read file: %s\n", s2_filename);
+        ret = -22;
+        goto end_free;
+    }
+
+    fprintf(stderr, "[info]: file %s\n", s2_filename);
+    /* upload binary to the begining of DRAM */
+    adfu_upload(hdev, buf, filesize, 0xa0000000);
+    adfu_execute(hdev, 0xa0000000);
+
+end_free:
+    free(buf);
+end_fclose:
+    fclose(fp);
+end:
+    libusb_close(hdev);
+    libusb_exit(NULL);
+
+    return ret;
+}
diff --git a/utils/atj2137/adfuload/encrypt.c b/utils/atj2137/adfuload/encrypt.c
new file mode 100644
index 0000000..fee7a5a
--- /dev/null
+++ b/utils/atj2137/adfuload/encrypt.c
@@ -0,0 +1,96 @@
+/***************************************************************************
+ *             __________               __   ___.
+ *   Open      \______   \ ____   ____ |  | _\_ |__   _______  ___
+ *   Source     |       _//  _ \_/ ___\|  |/ /| __ \ /  _ \  \/  /
+ *   Jukebox    |    |   (  <_> )  \___|    < | \_\ (  <_> > <  <
+ *   Firmware   |____|_  /\____/ \___  >__|_ \|___  /\____/__/\_ \
+ *                     \/            \/     \/    \/            \/
+ *
+ * Copyright (C) 2013 by Amaury Pouly
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+ * KIND, either express or implied.
+ *
+ ****************************************************************************/
+
+const unsigned char xor_key[512] =
+{
+    0x9b, 0x94, 0xf6, 0x9e, 0x2f, 0x0a, 0x40, 0xfd, 0x9a, 0x78, 0x2c, 0xdd, 0x4f, 0x96, 0x5e, 0xdd,
+    0xc9, 0x01, 0xd3, 0x9d, 0x71, 0x8f, 0xda, 0xbb, 0xc1, 0xdf, 0x5f, 0x01, 0xaa, 0x35, 0x6f, 0xdc,
+    0x33, 0x85, 0xf9, 0x10, 0x64, 0xce, 0xd2, 0xab, 0x62, 0xaa, 0xfc, 0x37, 0xdb, 0x22, 0x28, 0x34,
+    0xa4, 0xc6, 0x79, 0xc6, 0xa1, 0xfe, 0x8b, 0xaa, 0xe6, 0x9b, 0xb4, 0x6e, 0x1b, 0xb1, 0x8a, 0xe2,
+    0x25, 0xa9, 0xa5, 0xca, 0x03, 0x92, 0xa6, 0xd5, 0xf5, 0xb8, 0x77, 0xd3, 0xe4, 0x78, 0xd5, 0x22,
+    0xfe, 0x52, 0x0c, 0x69, 0xa1, 0x40, 0x02, 0x89, 0x7a, 0x46, 0x77, 0xd1, 0xee, 0x4b, 0x8b, 0x72,
+    0xb8, 0x27, 0x81, 0x32, 0xd4, 0xfd, 0xc2, 0x64, 0x9c, 0xcb, 0x25, 0x17, 0x32, 0x3f, 0x6d, 0x8e,
+    0x1d, 0xcd, 0x14, 0xf0, 0x37, 0xfe, 0x47, 0x41, 0xc6, 0x0b, 0x31, 0x91, 0xe9, 0xaa, 0x7c, 0x73,
+    0x36, 0x28, 0x15, 0xb1, 0xa1, 0xb8, 0x30, 0x3e, 0x9f, 0x0b, 0x8d, 0x6c, 0x8c, 0x20, 0xf9, 0x5f,
+    0x4a, 0x5e, 0x17, 0xc2, 0x2c, 0xe0, 0x60, 0xb8, 0x12, 0x10, 0x69, 0x16, 0xd5, 0x77, 0x64, 0xcf,
+    0xe5, 0xd3, 0xea, 0xb0, 0x30, 0x6a, 0xf8, 0x4d, 0x46, 0x9f, 0x37, 0x3b, 0xbb, 0xc3, 0x80, 0x7f,
+    0xcd, 0x2d, 0x9f, 0x47, 0x47, 0x8d, 0x57, 0xd8, 0xa6, 0x7d, 0xa7, 0xc8, 0x79, 0x59, 0x4c, 0x6d,
+    0x0e, 0x51, 0x87, 0x95, 0x4a, 0xbc, 0x20, 0x77, 0xd9, 0xaf, 0xab, 0xea, 0x88, 0xcf, 0x0a, 0xd5,
+    0xee, 0x63, 0x33, 0xe7, 0x52, 0xae, 0x34, 0x88, 0xc9, 0x7b, 0x74, 0x0f, 0x9f, 0xf9, 0x3b, 0x35,
+    0xf8, 0xc9, 0x74, 0xc9, 0xb7, 0x56, 0xb2, 0xa6, 0x9f, 0x65, 0x72, 0xe3, 0xb8, 0xed, 0xa0, 0x49,
+    0xf5, 0x28, 0x5c, 0x0a, 0x13, 0xea, 0xfd, 0xaf, 0xc4, 0x32, 0x56, 0x53, 0x0d, 0xfe, 0x39, 0x0f,
+    0xed, 0x64, 0x3a, 0xb5, 0x3f, 0xdf, 0xb5, 0xc1, 0xe1, 0xe7, 0x13, 0x8c, 0x16, 0xc4, 0x48, 0xc3,
+    0x29, 0xa3, 0xa0, 0x18, 0x54, 0xea, 0xbc, 0x37, 0xdf, 0xc9, 0xd7, 0xfc, 0x8c, 0x11, 0x4f, 0xe3,
+    0x33, 0x4a, 0x60, 0xc0, 0xaa, 0x00, 0x32, 0xb0, 0xe7, 0x5d, 0x16, 0x4f, 0x69, 0xfd, 0x0c, 0x2b,
+    0xd4, 0xfd, 0x8a, 0x79, 0xdb, 0x55, 0x78, 0x07, 0x62, 0x68, 0x7f, 0x72, 0xe4, 0xda, 0x83, 0x99,
+    0x13, 0xa2, 0x6e, 0x51, 0xbf, 0x60, 0x30, 0x5b, 0xf9, 0xf0, 0x04, 0x93, 0x78, 0x3f, 0xf4, 0x69,
+    0x3c, 0x5d, 0x9f, 0x95, 0x70, 0xd4, 0x3a, 0x07, 0x95, 0x39, 0xd5, 0x1d, 0xdd, 0x00, 0xdf, 0x19,
+    0xd5, 0x94, 0xed, 0xd2, 0x47, 0xa8, 0xb7, 0xaa, 0x5f, 0xc7, 0x63, 0xbf, 0x0c, 0x33, 0x07, 0x66,
+    0xa9, 0xec, 0x69, 0xd5, 0xdd, 0x0f, 0x09, 0x1f, 0xc0, 0x61, 0x61, 0x66, 0x3f, 0x2c, 0x6b, 0x4b,
+    0xc1, 0x4a, 0x64, 0xaa, 0x0b, 0x7f, 0xd0, 0x85, 0x60, 0x0c, 0xbe, 0x3d, 0xed, 0x80, 0x4d, 0x08,
+    0x65, 0xd2, 0x6f, 0x9f, 0xe9, 0xad, 0xed, 0x37, 0x2a, 0x0b, 0xab, 0x00, 0xd1, 0x05, 0x2e, 0x18,
+    0x1f, 0xe9, 0x5b, 0x41, 0xd0, 0x8e, 0x81, 0xd4, 0x46, 0xe4, 0x9a, 0x74, 0xe3, 0xcf, 0xce, 0x38,
+    0xb7, 0x36, 0x39, 0x5c, 0x5b, 0x57, 0xee, 0x37, 0x1c, 0x5d, 0x3c, 0x6d, 0x5c, 0x34, 0x30, 0x66,
+    0x36, 0x9c, 0x5a, 0xff, 0x61, 0x7c, 0xd4, 0x7f, 0x57, 0x79, 0x81, 0xcc, 0xb6, 0xc8, 0x93, 0xdf,
+    0xe6, 0x40, 0x50, 0x75, 0xfc, 0xb4, 0x15, 0x07, 0xde, 0x7f, 0x9b, 0xfd, 0xa8, 0x60, 0x79, 0x1f,
+    0x4f, 0x89, 0xea, 0x4c, 0x85, 0xf2, 0xd1, 0x6e, 0xdc, 0xf3, 0xfa, 0xad, 0x2d, 0x12, 0xa3, 0xe3,
+    0x3b, 0x1a, 0x3b, 0x50, 0x94, 0x6d, 0x69, 0x90, 0xb8, 0x9a, 0x50, 0xc9, 0x7d, 0x32, 0x12, 0x29,
+};
+
+static void perm_it(unsigned char *data, int length)
+{
+    int i, j;
+    for(i = 0; (i + 12) < length; i += 12)
+    {
+        unsigned char perm[8];
+        perm[0] = data[i + 1];
+        perm[1] = data[i + 7];
+        perm[2] = data[i + 2];
+        perm[3] = data[i + 4];
+        perm[4] = data[i + 0];
+        perm[5] = data[i + 6];
+        perm[6] = data[i + 3];
+        perm[7] = data[i + 5];
+        for(j = 0; j < 8; j++)
+            data[i + j] = perm[j];
+    }
+}
+
+static void xor_it(unsigned char *data, int length)
+{
+    int i, j;
+    for(i = 0; i < length; i += 4)
+    {
+        unsigned char Ekey = xor_key[xor_key[data[i]] + 256];
+        for(j = 1; j < 4; j++)
+            data[i + j] ^= Ekey;
+    }
+}
+
+int encrypt(unsigned char *data, int length)
+{
+     if (length % 512)
+         return -1;
+
+     xor_it(data, length);
+     perm_it(data, length);
+
+     return 0;
+}
diff --git a/utils/atj2137/adfuload/encrypt.h b/utils/atj2137/adfuload/encrypt.h
new file mode 100644
index 0000000..ba64c94
--- /dev/null
+++ b/utils/atj2137/adfuload/encrypt.h
@@ -0,0 +1,21 @@
+/***************************************************************************
+ *             __________               __   ___.
+ *   Open      \______   \ ____   ____ |  | _\_ |__   _______  ___
+ *   Source     |       _//  _ \_/ ___\|  |/ /| __ \ /  _ \  \/  /
+ *   Jukebox    |    |   (  <_> )  \___|    < | \_\ (  <_> > <  <
+ *   Firmware   |____|_  /\____/ \___  >__|_ \|___  /\____/__/\_ \
+ *                     \/            \/     \/    \/            \/
+ *
+ * Copyright (C) 2013 by Amaury Pouly
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+ * KIND, either express or implied.
+ *
+ ****************************************************************************/
+
+int encrypt(unsigned char *data, int length);