blob: 2d1d97bbb9bbcee42845650fd29b30e9bb13b26a [file] [log] [blame]
Tamas Banf70ef8c2017-12-19 15:35:09 +00001#! /usr/bin/env python3
2#
3# Copyright 2017 Linaro Limited
David Vinczedb32b212019-04-16 17:43:57 +02004# Copyright (c) 2018-2019, Arm Limited.
Tamas Banf70ef8c2017-12-19 15:35:09 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17
Gabor Kertesz33e9b232018-09-12 15:38:41 +020018from __future__ import print_function
Oliver Swede21440442018-07-10 09:31:32 +010019import os
Oliver Swede05e5ded2018-07-19 16:40:49 +010020import re
Tamas Banf70ef8c2017-12-19 15:35:09 +000021import argparse
Gabor Kertesz33e9b232018-09-12 15:38:41 +020022from imgtool_lib import keys
23from imgtool_lib import image
24from imgtool_lib import version
Tamas Banf70ef8c2017-12-19 15:35:09 +000025import sys
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020026import macro_parser
Tamas Banf70ef8c2017-12-19 15:35:09 +000027
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020028sign_bin_size_re = re.compile(r"^\s*RE_SIGN_BIN_SIZE\s*=\s*(.*)")
29image_load_address_re = re.compile(r"^\s*RE_IMAGE_LOAD_ADDRESS\s*=\s*(.*)")
Oliver Swede05e5ded2018-07-19 16:40:49 +010030
Oliver Swede21440442018-07-10 09:31:32 +010031# Returns the last version number if present, or None if not
32def get_last_version(path):
33 if (os.path.isfile(path) == False): # Version file not present
34 return None
35 else: # Version file is present, check it has a valid number inside it
36 with open(path, "r") as oldFile:
37 fileContents = oldFile.read()
38 if version.version_re.match(fileContents): # number is valid
39 return version.decode_version(fileContents)
40 else:
41 return None
42
43def next_version_number(args, defaultVersion, path):
44 newVersion = None
David Vinczed8fbe0e2019-08-12 15:58:57 +020045 versionProvided = False
Oliver Swede21440442018-07-10 09:31:32 +010046 if (version.compare(args.version, defaultVersion) == 0): # Default version
47 lastVersion = get_last_version(path)
48 if (lastVersion is not None):
49 newVersion = version.increment_build_num(lastVersion)
50 else:
51 newVersion = version.increment_build_num(defaultVersion)
52 else: # Version number has been explicitly provided (not using the default)
David Vinczed8fbe0e2019-08-12 15:58:57 +020053 versionProvided = True
Oliver Swede21440442018-07-10 09:31:32 +010054 newVersion = args.version
55 versionString = "{a}.{b}.{c}+{d}".format(
56 a=str(newVersion.major),
57 b=str(newVersion.minor),
58 c=str(newVersion.revision),
59 d=str(newVersion.build)
60 )
David Vinczed8fbe0e2019-08-12 15:58:57 +020061 if not versionProvided:
62 with open(path, "w") as newFile:
63 newFile.write(versionString)
Oliver Swede21440442018-07-10 09:31:32 +010064 print("**[INFO]** Image version number set to " + versionString)
65 return newVersion
66
Tamas Banf70ef8c2017-12-19 15:35:09 +000067def gen_rsa2048(args):
Tamas Ban861835c2019-05-13 08:59:38 +010068 keys.RSAutil.generate().export_private(args.key)
69
70def gen_rsa3072(args):
71 keys.RSAutil.generate(key_size=3072).export_private(args.key)
Tamas Banf70ef8c2017-12-19 15:35:09 +000072
73keygens = {
Tamas Ban861835c2019-05-13 08:59:38 +010074 'rsa-2048': gen_rsa2048,
75 'rsa-3072': gen_rsa3072, }
Tamas Banf70ef8c2017-12-19 15:35:09 +000076
77def do_keygen(args):
78 if args.type not in keygens:
79 msg = "Unexpected key type: {}".format(args.type)
80 raise argparse.ArgumentTypeError(msg)
81 keygens[args.type](args)
82
83def do_getpub(args):
84 key = keys.load(args.key)
85 if args.lang == 'c':
86 key.emit_c()
Tamas Banf70ef8c2017-12-19 15:35:09 +000087 else:
Tamas Ban581034a2017-12-19 19:54:37 +000088 msg = "Unsupported language, valid are: c"
Tamas Banf70ef8c2017-12-19 15:35:09 +000089 raise argparse.ArgumentTypeError(msg)
90
91def do_sign(args):
92 if args.rsa_pkcs1_15:
93 keys.sign_rsa_pss = False
David Vinczedb32b212019-04-16 17:43:57 +020094
95 version_num = next_version_number(args,
96 version.decode_version("0"),
97 "lastVerNum.txt")
98
99 if args.security_counter is None:
100 # Security counter has not been explicitly provided,
101 # generate it from the version number
102 args.security_counter = ((version_num.major << 24)
103 + (version_num.minor << 16)
104 + version_num.revision)
105
David Vincze4b84de52019-09-27 17:40:29 +0200106 if "_s.c" in args.layout:
107 sw_type = "SPE"
108 elif "_ns.c" in args.layout:
109 sw_type = "NSPE"
110 else:
111 sw_type = "NSPE_SPE"
112
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200113 pad_size = macro_parser.evaluate_macro(args.layout, sign_bin_size_re, 0, 1)
Oliver Swede21440442018-07-10 09:31:32 +0100114 img = image.Image.load(args.infile,
David Vinczedb32b212019-04-16 17:43:57 +0200115 version=version_num,
116 header_size=args.header_size,
117 security_cnt=args.security_counter,
118 included_header=args.included_header,
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200119 pad=pad_size)
Tamas Ban32d84642019-07-11 08:25:11 +0100120 key = keys.load(args.key, args.public_key_format) if args.key else None
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200121 ram_load_address = macro_parser.evaluate_macro(args.layout, image_load_address_re, 0, 1)
David Vincze4b84de52019-09-27 17:40:29 +0200122 img.sign(sw_type, key, ram_load_address, args.dependencies)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000123
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200124 if pad_size:
125 img.pad_to(pad_size, args.align)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000126
127 img.save(args.outfile)
128
129subcmds = {
130 'keygen': do_keygen,
131 'getpub': do_getpub,
132 'sign': do_sign, }
133
David Vincze9ec0f542019-07-03 18:09:47 +0200134
135def get_dependencies(text):
136 if text is not None:
137 versions = []
138 images = re.findall(r"\((\d+)", text)
139 if len(images) == 0:
140 msg = "Image dependency format is invalid: {}".format(text)
141 raise argparse.ArgumentTypeError(msg)
142 raw_versions = re.findall(r",\s*([0-9.+]+)\)", text)
143 if len(images) != len(raw_versions):
144 msg = '''There's a mismatch between the number of dependency images
145 and versions in: {}'''.format(text)
146 raise argparse.ArgumentTypeError(msg)
147 for raw_version in raw_versions:
148 try:
149 versions.append(version.decode_version(raw_version))
150 except ValueError as e:
151 print(e)
152 dependencies = dict()
153 dependencies[image.DEP_IMAGES_KEY] = images
154 dependencies[image.DEP_VERSIONS_KEY] = versions
155 return dependencies
156
157
Tamas Banf70ef8c2017-12-19 15:35:09 +0000158def alignment_value(text):
159 value = int(text)
160 if value not in [1, 2, 4, 8]:
161 msg = "{} must be one of 1, 2, 4 or 8".format(value)
162 raise argparse.ArgumentTypeError(msg)
163 return value
164
165def intparse(text):
166 """Parse a command line argument as an integer.
167
168 Accepts 0x and other prefixes to allow other bases to be used."""
169 return int(text, 0)
170
171def args():
172 parser = argparse.ArgumentParser()
173 subs = parser.add_subparsers(help='subcommand help', dest='subcmd')
174
175 keygenp = subs.add_parser('keygen', help='Generate pub/private keypair')
176 keygenp.add_argument('-k', '--key', metavar='filename', required=True)
177 keygenp.add_argument('-t', '--type', metavar='type',
Oliver Swede21440442018-07-10 09:31:32 +0100178 choices=keygens.keys(), required=True)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000179
180 getpub = subs.add_parser('getpub', help='Get public key from keypair')
181 getpub.add_argument('-k', '--key', metavar='filename', required=True)
182 getpub.add_argument('-l', '--lang', metavar='lang', default='c')
183
184 sign = subs.add_parser('sign', help='Sign an image with a private key')
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200185 sign.add_argument('-l', '--layout', required=True,
186 help='Location of the file that contains preprocessed macros')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000187 sign.add_argument('-k', '--key', metavar='filename')
Tamas Ban32d84642019-07-11 08:25:11 +0100188 sign.add_argument("-K", "--public-key-format",
189 help='In what format to add the public key to the image manifest: full or hash',
190 metavar='pub_key_format', choices=['full', 'hash'], default='hash')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000191 sign.add_argument("--align", type=alignment_value, required=True)
Oliver Swede21440442018-07-10 09:31:32 +0100192 sign.add_argument("-v", "--version", type=version.decode_version,
193 default="0.0.0+0")
David Vincze9ec0f542019-07-03 18:09:47 +0200194 sign.add_argument("-d", "--dependencies", type=get_dependencies,
195 required=False, help='''Add dependence on another image,
196 format: "(<image_ID>,<image_version>), ... "''')
David Vinczedb32b212019-04-16 17:43:57 +0200197 sign.add_argument("-s", "--security-counter", type=intparse,
198 help='Specify explicitly the security counter value')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000199 sign.add_argument("-H", "--header-size", type=intparse, required=True)
200 sign.add_argument("--included-header", default=False, action='store_true',
Oliver Swede21440442018-07-10 09:31:32 +0100201 help='Image has gap for header')
Oliver Swede21440442018-07-10 09:31:32 +0100202 sign.add_argument("--rsa-pkcs1-15",
203 help='Use old PKCS#1 v1.5 signature algorithm',
204 default=False, action='store_true')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000205 sign.add_argument("infile")
206 sign.add_argument("outfile")
207
208 args = parser.parse_args()
209 if args.subcmd is None:
210 print('Must specify a subcommand', file=sys.stderr)
211 sys.exit(1)
212
213 subcmds[args.subcmd](args)
214
215if __name__ == '__main__':
David Vinczedb32b212019-04-16 17:43:57 +0200216 args()