yang.li | 5459fc6 | 2022-10-24 17:31:15 +0800 | [diff] [blame^] | 1 | #! /usr/bin/env python3 |
| 2 | # -*- coding: utf-8 -*- |
| 3 | # |
| 4 | # Copyright 2017 Linaro Limited |
| 5 | # Copyright (c) 2018-2019, Arm Limited. |
| 6 | # |
| 7 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | # you may not use this file except in compliance with the License. |
| 9 | # You may obtain a copy of the License at |
| 10 | # |
| 11 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | # |
| 13 | # Unless required by applicable law or agreed to in writing, software |
| 14 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | # See the License for the specific language governing permissions and |
| 17 | # limitations under the License. |
| 18 | |
| 19 | from __future__ import print_function |
| 20 | import os |
| 21 | import re |
| 22 | import argparse |
| 23 | from imgtool_lib import keys |
| 24 | from imgtool_lib import image |
| 25 | from imgtool_lib import version |
| 26 | import sys |
| 27 | |
| 28 | |
| 29 | def find_load_address(args): |
| 30 | load_address_re = re.compile(r"^#define\sIMAGE_LOAD_ADDRESS\s+(0x[0-9a-fA-F]+)") |
| 31 | if args.layout is not None: |
| 32 | if os.path.isabs(args.layout): |
| 33 | configFile = args.layout |
| 34 | else: |
| 35 | scriptsDir = os.path.dirname(os.path.abspath(__file__)) |
| 36 | configFile = os.path.join(scriptsDir, args.layout) |
| 37 | |
| 38 | ramLoadAddress = None |
| 39 | with open(configFile, 'r') as flash_layout_file: |
| 40 | for line in flash_layout_file: |
| 41 | m = load_address_re.match(line) |
| 42 | if m is not None: |
| 43 | ramLoadAddress = int(m.group(1), 0) |
| 44 | print("**[INFO]** Writing load address from the macro in " |
| 45 | "flash_layout.h to the image header.. " |
| 46 | + hex(ramLoadAddress) |
| 47 | + " (dec. " + str(ramLoadAddress) + ")") |
| 48 | break |
| 49 | return ramLoadAddress |
| 50 | else: |
| 51 | return None |
| 52 | |
| 53 | |
| 54 | # Returns the last version number if present, or None if not |
| 55 | def get_last_version(path): |
| 56 | if (os.path.isfile(path) == False): # Version file not present |
| 57 | return None |
| 58 | else: # Version file is present, check it has a valid number inside it |
| 59 | with open(path, "r") as oldFile: |
| 60 | fileContents = oldFile.read() |
| 61 | if version.version_re.match(fileContents): # number is valid |
| 62 | return version.decode_version(fileContents) |
| 63 | else: |
| 64 | return None |
| 65 | |
| 66 | |
| 67 | def next_version_number(args, defaultVersion, path): |
| 68 | newVersion = None |
| 69 | if (version.compare(args.version, defaultVersion) == 0): # Default version |
| 70 | lastVersion = get_last_version(path) |
| 71 | if (lastVersion is not None): |
| 72 | newVersion = version.increment_build_num(lastVersion) |
| 73 | else: |
| 74 | newVersion = version.increment_build_num(defaultVersion) |
| 75 | else: # Version number has been explicitly provided (not using the default) |
| 76 | newVersion = args.version |
| 77 | versionString = "{a}.{b}.{c}+{d}".format( |
| 78 | a=str(newVersion.major), |
| 79 | b=str(newVersion.minor), |
| 80 | c=str(newVersion.revision), |
| 81 | d=str(newVersion.build) |
| 82 | ) |
| 83 | with open(path, "w") as newFile: |
| 84 | newFile.write(versionString) |
| 85 | print("**[INFO]** Image version number set to " + versionString) |
| 86 | return newVersion |
| 87 | |
| 88 | |
| 89 | def gen_rsa2048(args):#PRIVATE |
| 90 | keys.RSAutil.generate().export_private(os.path.join(args.key,"rsa2048-private.pem")) |
| 91 | keys.RSAutil.generate().export_public(os.path.join(args.key,"rsa2048-public.pem")) |
| 92 | |
| 93 | def gen_rsa3072(args): |
| 94 | keys.RSAutil.generate(key_size=3072).export_private(os.path.join(args.key,"rsa3072-private.pem")) |
| 95 | keys.RSAutil.generate(key_size=3072).export_public(os.path.join(args.key, "rsa3072-public.pem")) |
| 96 | |
| 97 | def gen_rsa4096(args): |
| 98 | keys.RSAutil.generate(key_size=4096).export_private(os.path.join(args.key,"rsa4096-private.pem")) |
| 99 | keys.RSAutil.generate(key_size=4096).export_public(os.path.join(args.key, "rsa4096-public.pem")) |
| 100 | |
| 101 | keygens = { |
| 102 | 'rsa-2048': gen_rsa2048, |
| 103 | 'rsa-3072': gen_rsa3072, |
| 104 | 'rsa-4096': gen_rsa4096, } |
| 105 | |
| 106 | |
| 107 | def do_keygen(args): |
| 108 | if args.type not in keygens: |
| 109 | msg = "Unexpected key type: {}".format(args.type) |
| 110 | raise argparse.ArgumentTypeError(msg) |
| 111 | keygens[args.type](args) |
| 112 | |
| 113 | |
| 114 | def do_getpub(args): |
| 115 | key = keys.load(args.key) |
| 116 | if args.lang == 'c': |
| 117 | key.emit_c() |
| 118 | else: |
| 119 | msg = "Unsupported language, valid are: c" |
| 120 | raise argparse.ArgumentTypeError(msg) |
| 121 | |
| 122 | |
| 123 | def do_sign(args): |
| 124 | if args.rsa_pkcs1_15: |
| 125 | keys.sign_rsa_pss = False |
| 126 | |
| 127 | version_num = next_version_number(args, |
| 128 | version.decode_version("0"), |
| 129 | "lastVerNum.txt") |
| 130 | |
| 131 | if args.security_counter is None: |
| 132 | # Security counter has not been explicitly provided, |
| 133 | # generate it from the version number |
| 134 | args.security_counter = ((version_num.major << 24) |
| 135 | + (version_num.minor << 16) |
| 136 | + version_num.revision) |
| 137 | |
| 138 | img = image.Image.load(args.infile, |
| 139 | version=version_num, |
| 140 | header_size=args.header_size, |
| 141 | security_cnt=args.security_counter, |
| 142 | included_header=args.included_header, |
| 143 | pad=args.pad) |
| 144 | key = keys.load_rsa(args.key) if args.key else None |
| 145 | |
| 146 | img.sign(key, find_load_address(args)) # find_load_address(args)) |
| 147 | |
| 148 | if args.pad: |
| 149 | img.pad_to(args.pad, args.align) |
| 150 | |
| 151 | img.save(args.outfile) |
| 152 | |
| 153 | |
| 154 | def do_sign_bl2(args): |
| 155 | if args.rsa_pkcs1_15: |
| 156 | keys.sign_rsa_pss = False |
| 157 | |
| 158 | version_num = next_version_number(args, |
| 159 | version.decode_version("0"), |
| 160 | "lastVerNum.txt") |
| 161 | |
| 162 | if args.security_counter is None: |
| 163 | # Security counter has not been explicitly provided, |
| 164 | # generate it from the version number |
| 165 | args.security_counter = ((version_num.major << 24) |
| 166 | + (version_num.minor << 16) |
| 167 | + version_num.revision) |
| 168 | |
| 169 | img = image.Image.load(args.infile, |
| 170 | version=version_num, |
| 171 | header_size=args.header_size, |
| 172 | security_cnt=args.security_counter, |
| 173 | included_header=args.included_header, |
| 174 | pad=args.pad) |
| 175 | |
| 176 | # key = keys.load_rsa(args.key) if args.key else None |
| 177 | |
| 178 | img.sign_for_bl2(args) |
| 179 | |
| 180 | if args.pad: |
| 181 | img.pad_to(args.pad, args.align) |
| 182 | |
| 183 | img.save(args.outfile) |
| 184 | |
| 185 | |
| 186 | subcmds = { |
| 187 | 'keygen': do_keygen, |
| 188 | 'getpub': do_getpub, |
| 189 | 'sign': do_sign, |
| 190 | 'sign_bl2': do_sign_bl2} |
| 191 | |
| 192 | |
| 193 | def alignment_value(text): |
| 194 | value = int(text) |
| 195 | if value not in [1, 2, 4, 8]: |
| 196 | msg = "{} must be one of 1, 2, 4 or 8".format(value) |
| 197 | raise argparse.ArgumentTypeError(msg) |
| 198 | return value |
| 199 | |
| 200 | |
| 201 | def intparse(text): |
| 202 | """Parse a command line argument as an integer. |
| 203 | |
| 204 | Accepts 0x and other prefixes to allow other bases to be used.""" |
| 205 | return int(text, 0) |
| 206 | |
| 207 | |
| 208 | def args(): |
| 209 | parser = argparse.ArgumentParser() |
| 210 | subs = parser.add_subparsers(help='subcommand help', dest='subcmd') |
| 211 | |
| 212 | keygenp = subs.add_parser('keygen', help='Generate pub/private keypair') |
| 213 | keygenp.add_argument('-k', '--key', metavar='filename', required=True) |
| 214 | keygenp.add_argument('-t', '--type', metavar='type', |
| 215 | choices=keygens.keys(), required=True) |
| 216 | |
| 217 | getpub = subs.add_parser('getpub', help='Get public key from keypair') |
| 218 | getpub.add_argument('-k', '--key', metavar='filename', required=True) |
| 219 | getpub.add_argument('-l', '--lang', metavar='lang', default='c') |
| 220 | ################ sign #################### |
| 221 | sign = subs.add_parser('sign', help='Sign an image with a private key') |
| 222 | sign.add_argument('--layout', required=False,default=None, |
| 223 | help='Location of the memory layout file') |
| 224 | sign.add_argument('-k', '--key', metavar='key_file', required=True) |
| 225 | sign.add_argument("--align", type=alignment_value, required=False) |
| 226 | sign.add_argument("-v", "--version", type=version.decode_version, |
| 227 | default="0.0.0+0") |
| 228 | sign.add_argument("-s", "--security-counter", type=intparse, |
| 229 | help='Specify explicitly the security counter value') |
| 230 | sign.add_argument("-H", "--header-size", type=intparse, required=True) |
| 231 | sign.add_argument("--included-header", default=False, action='store_true', |
| 232 | help='Image has gap for header') |
| 233 | sign.add_argument("--pad", type=intparse, |
| 234 | help='Pad image to this many bytes, adding trailer magic') |
| 235 | sign.add_argument("--rsa-pkcs1-15", |
| 236 | help='Use old PKCS#1 v1.5 signature algorithm', |
| 237 | default=False, action='store_true') |
| 238 | sign.add_argument("infile") |
| 239 | sign.add_argument("outfile") |
| 240 | ################ sign-bl2 #################### |
| 241 | sign = subs.add_parser('sign_bl2', help='Sign an bl2 with a private key') |
| 242 | sign.add_argument('-k', '--key', default=None, metavar='key_file', required=False) |
| 243 | sign.add_argument('-P', '--path-of-key', required=True, help='path of the key') |
| 244 | sign.add_argument("-H", "--header-size", type=intparse, help='sign file header size ', required=True) |
| 245 | sign.add_argument("-K", "--key-type", default=1, type=intparse, help='0: ECC256, 1: RSA') |
| 246 | sign.add_argument("--rsa-pkcs1-15", |
| 247 | help='Use old PKCS#1 v1.5 signature algorithm', |
| 248 | default=False, action='store_true') |
| 249 | sign.add_argument("-v", "--version", type=version.decode_version, |
| 250 | default="0.0.0+0") |
| 251 | sign.add_argument("-s", "--security-counter", type=intparse, |
| 252 | help='Specify explicitly the security counter value') |
| 253 | sign.add_argument("--pad", type=intparse, |
| 254 | help='Pad image to this many bytes, adding trailer magic') |
| 255 | sign.add_argument("--included-header", default=False, action='store_true', |
| 256 | help='Image has gap for header') |
| 257 | sign.add_argument("infile") |
| 258 | sign.add_argument("outfile") |
| 259 | |
| 260 | args = parser.parse_args() |
| 261 | if args.subcmd is None: |
| 262 | print('Must specify a subcommand', file=sys.stderr) |
| 263 | sys.exit(1) |
| 264 | |
| 265 | subcmds[args.subcmd](args) |
| 266 | |
| 267 | |
| 268 | if __name__ == '__main__': |
| 269 | args() |