blob: 1b539c2192a27236bfe55cd424fa7666ad360dd5 [file] [log] [blame]
Tamas Banf70ef8c2017-12-19 15:35:09 +00001#! /usr/bin/env python3
2#
3# Copyright 2017 Linaro Limited
David Vinczedb32b212019-04-16 17:43:57 +02004# Copyright (c) 2018-2019, Arm Limited.
Tamas Banf70ef8c2017-12-19 15:35:09 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17
Gabor Kertesz33e9b232018-09-12 15:38:41 +020018from __future__ import print_function
Oliver Swede21440442018-07-10 09:31:32 +010019import os
Oliver Swede05e5ded2018-07-19 16:40:49 +010020import re
Tamas Banf70ef8c2017-12-19 15:35:09 +000021import argparse
Gabor Kertesz33e9b232018-09-12 15:38:41 +020022from imgtool_lib import keys
23from imgtool_lib import image
24from imgtool_lib import version
Tamas Banf70ef8c2017-12-19 15:35:09 +000025import sys
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020026import macro_parser
Tamas Banf70ef8c2017-12-19 15:35:09 +000027
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020028sign_bin_size_re = re.compile(r"^\s*RE_SIGN_BIN_SIZE\s*=\s*(.*)")
29image_load_address_re = re.compile(r"^\s*RE_IMAGE_LOAD_ADDRESS\s*=\s*(.*)")
Oliver Swede05e5ded2018-07-19 16:40:49 +010030
Oliver Swede21440442018-07-10 09:31:32 +010031# Returns the last version number if present, or None if not
32def get_last_version(path):
33 if (os.path.isfile(path) == False): # Version file not present
34 return None
35 else: # Version file is present, check it has a valid number inside it
36 with open(path, "r") as oldFile:
37 fileContents = oldFile.read()
38 if version.version_re.match(fileContents): # number is valid
39 return version.decode_version(fileContents)
40 else:
41 return None
42
43def next_version_number(args, defaultVersion, path):
44 newVersion = None
David Vinczed8fbe0e2019-08-12 15:58:57 +020045 versionProvided = False
Oliver Swede21440442018-07-10 09:31:32 +010046 if (version.compare(args.version, defaultVersion) == 0): # Default version
47 lastVersion = get_last_version(path)
48 if (lastVersion is not None):
49 newVersion = version.increment_build_num(lastVersion)
50 else:
51 newVersion = version.increment_build_num(defaultVersion)
52 else: # Version number has been explicitly provided (not using the default)
David Vinczed8fbe0e2019-08-12 15:58:57 +020053 versionProvided = True
Oliver Swede21440442018-07-10 09:31:32 +010054 newVersion = args.version
55 versionString = "{a}.{b}.{c}+{d}".format(
56 a=str(newVersion.major),
57 b=str(newVersion.minor),
58 c=str(newVersion.revision),
59 d=str(newVersion.build)
60 )
David Vinczed8fbe0e2019-08-12 15:58:57 +020061 if not versionProvided:
62 with open(path, "w") as newFile:
63 newFile.write(versionString)
Oliver Swede21440442018-07-10 09:31:32 +010064 print("**[INFO]** Image version number set to " + versionString)
65 return newVersion
66
Tamas Banf70ef8c2017-12-19 15:35:09 +000067def gen_rsa2048(args):
Tamas Ban861835c2019-05-13 08:59:38 +010068 keys.RSAutil.generate().export_private(args.key)
69
70def gen_rsa3072(args):
71 keys.RSAutil.generate(key_size=3072).export_private(args.key)
Tamas Banf70ef8c2017-12-19 15:35:09 +000072
73keygens = {
Tamas Ban861835c2019-05-13 08:59:38 +010074 'rsa-2048': gen_rsa2048,
75 'rsa-3072': gen_rsa3072, }
Tamas Banf70ef8c2017-12-19 15:35:09 +000076
77def do_keygen(args):
78 if args.type not in keygens:
79 msg = "Unexpected key type: {}".format(args.type)
80 raise argparse.ArgumentTypeError(msg)
81 keygens[args.type](args)
82
83def do_getpub(args):
84 key = keys.load(args.key)
85 if args.lang == 'c':
86 key.emit_c()
Tamas Banf70ef8c2017-12-19 15:35:09 +000087 else:
Tamas Ban581034a2017-12-19 19:54:37 +000088 msg = "Unsupported language, valid are: c"
Tamas Banf70ef8c2017-12-19 15:35:09 +000089 raise argparse.ArgumentTypeError(msg)
90
91def do_sign(args):
92 if args.rsa_pkcs1_15:
93 keys.sign_rsa_pss = False
David Vinczedb32b212019-04-16 17:43:57 +020094
95 version_num = next_version_number(args,
96 version.decode_version("0"),
97 "lastVerNum.txt")
98
99 if args.security_counter is None:
100 # Security counter has not been explicitly provided,
101 # generate it from the version number
102 args.security_counter = ((version_num.major << 24)
103 + (version_num.minor << 16)
104 + version_num.revision)
105
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200106 pad_size = macro_parser.evaluate_macro(args.layout, sign_bin_size_re, 0, 1)
Oliver Swede21440442018-07-10 09:31:32 +0100107 img = image.Image.load(args.infile,
David Vinczedb32b212019-04-16 17:43:57 +0200108 version=version_num,
109 header_size=args.header_size,
110 security_cnt=args.security_counter,
111 included_header=args.included_header,
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200112 pad=pad_size)
Tamas Ban32d84642019-07-11 08:25:11 +0100113 key = keys.load(args.key, args.public_key_format) if args.key else None
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200114 ram_load_address = macro_parser.evaluate_macro(args.layout, image_load_address_re, 0, 1)
David Vincze9ec0f542019-07-03 18:09:47 +0200115 img.sign(key, ram_load_address, args.dependencies)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000116
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200117 if pad_size:
118 img.pad_to(pad_size, args.align)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000119
120 img.save(args.outfile)
121
122subcmds = {
123 'keygen': do_keygen,
124 'getpub': do_getpub,
125 'sign': do_sign, }
126
David Vincze9ec0f542019-07-03 18:09:47 +0200127
128def get_dependencies(text):
129 if text is not None:
130 versions = []
131 images = re.findall(r"\((\d+)", text)
132 if len(images) == 0:
133 msg = "Image dependency format is invalid: {}".format(text)
134 raise argparse.ArgumentTypeError(msg)
135 raw_versions = re.findall(r",\s*([0-9.+]+)\)", text)
136 if len(images) != len(raw_versions):
137 msg = '''There's a mismatch between the number of dependency images
138 and versions in: {}'''.format(text)
139 raise argparse.ArgumentTypeError(msg)
140 for raw_version in raw_versions:
141 try:
142 versions.append(version.decode_version(raw_version))
143 except ValueError as e:
144 print(e)
145 dependencies = dict()
146 dependencies[image.DEP_IMAGES_KEY] = images
147 dependencies[image.DEP_VERSIONS_KEY] = versions
148 return dependencies
149
150
Tamas Banf70ef8c2017-12-19 15:35:09 +0000151def alignment_value(text):
152 value = int(text)
153 if value not in [1, 2, 4, 8]:
154 msg = "{} must be one of 1, 2, 4 or 8".format(value)
155 raise argparse.ArgumentTypeError(msg)
156 return value
157
158def intparse(text):
159 """Parse a command line argument as an integer.
160
161 Accepts 0x and other prefixes to allow other bases to be used."""
162 return int(text, 0)
163
164def args():
165 parser = argparse.ArgumentParser()
166 subs = parser.add_subparsers(help='subcommand help', dest='subcmd')
167
168 keygenp = subs.add_parser('keygen', help='Generate pub/private keypair')
169 keygenp.add_argument('-k', '--key', metavar='filename', required=True)
170 keygenp.add_argument('-t', '--type', metavar='type',
Oliver Swede21440442018-07-10 09:31:32 +0100171 choices=keygens.keys(), required=True)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000172
173 getpub = subs.add_parser('getpub', help='Get public key from keypair')
174 getpub.add_argument('-k', '--key', metavar='filename', required=True)
175 getpub.add_argument('-l', '--lang', metavar='lang', default='c')
176
177 sign = subs.add_parser('sign', help='Sign an image with a private key')
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200178 sign.add_argument('-l', '--layout', required=True,
179 help='Location of the file that contains preprocessed macros')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000180 sign.add_argument('-k', '--key', metavar='filename')
Tamas Ban32d84642019-07-11 08:25:11 +0100181 sign.add_argument("-K", "--public-key-format",
182 help='In what format to add the public key to the image manifest: full or hash',
183 metavar='pub_key_format', choices=['full', 'hash'], default='hash')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000184 sign.add_argument("--align", type=alignment_value, required=True)
Oliver Swede21440442018-07-10 09:31:32 +0100185 sign.add_argument("-v", "--version", type=version.decode_version,
186 default="0.0.0+0")
David Vincze9ec0f542019-07-03 18:09:47 +0200187 sign.add_argument("-d", "--dependencies", type=get_dependencies,
188 required=False, help='''Add dependence on another image,
189 format: "(<image_ID>,<image_version>), ... "''')
David Vinczedb32b212019-04-16 17:43:57 +0200190 sign.add_argument("-s", "--security-counter", type=intparse,
191 help='Specify explicitly the security counter value')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000192 sign.add_argument("-H", "--header-size", type=intparse, required=True)
193 sign.add_argument("--included-header", default=False, action='store_true',
Oliver Swede21440442018-07-10 09:31:32 +0100194 help='Image has gap for header')
Oliver Swede21440442018-07-10 09:31:32 +0100195 sign.add_argument("--rsa-pkcs1-15",
196 help='Use old PKCS#1 v1.5 signature algorithm',
197 default=False, action='store_true')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000198 sign.add_argument("infile")
199 sign.add_argument("outfile")
200
201 args = parser.parse_args()
202 if args.subcmd is None:
203 print('Must specify a subcommand', file=sys.stderr)
204 sys.exit(1)
205
206 subcmds[args.subcmd](args)
207
208if __name__ == '__main__':
David Vinczedb32b212019-04-16 17:43:57 +0200209 args()