blob: b226fafcb4fab04e3c20c1d85cd7a8f39ac1e8b3 [file] [log] [blame]
Tamas Banf70ef8c2017-12-19 15:35:09 +00001#! /usr/bin/env python3
2#
3# Copyright 2017 Linaro Limited
David Vinczedb32b212019-04-16 17:43:57 +02004# Copyright (c) 2018-2019, Arm Limited.
Tamas Banf70ef8c2017-12-19 15:35:09 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17
Gabor Kertesz33e9b232018-09-12 15:38:41 +020018from __future__ import print_function
Oliver Swede21440442018-07-10 09:31:32 +010019import os
Oliver Swede05e5ded2018-07-19 16:40:49 +010020import re
Tamas Banf70ef8c2017-12-19 15:35:09 +000021import argparse
Gabor Kertesz33e9b232018-09-12 15:38:41 +020022from imgtool_lib import keys
23from imgtool_lib import image
24from imgtool_lib import version
Tamas Banf70ef8c2017-12-19 15:35:09 +000025import sys
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020026import macro_parser
Tamas Banf70ef8c2017-12-19 15:35:09 +000027
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +020028sign_bin_size_re = re.compile(r"^\s*RE_SIGN_BIN_SIZE\s*=\s*(.*)")
29image_load_address_re = re.compile(r"^\s*RE_IMAGE_LOAD_ADDRESS\s*=\s*(.*)")
Oliver Swede05e5ded2018-07-19 16:40:49 +010030
Oliver Swede21440442018-07-10 09:31:32 +010031# Returns the last version number if present, or None if not
32def get_last_version(path):
33 if (os.path.isfile(path) == False): # Version file not present
34 return None
35 else: # Version file is present, check it has a valid number inside it
36 with open(path, "r") as oldFile:
37 fileContents = oldFile.read()
38 if version.version_re.match(fileContents): # number is valid
39 return version.decode_version(fileContents)
40 else:
41 return None
42
43def next_version_number(args, defaultVersion, path):
44 newVersion = None
45 if (version.compare(args.version, defaultVersion) == 0): # Default version
46 lastVersion = get_last_version(path)
47 if (lastVersion is not None):
48 newVersion = version.increment_build_num(lastVersion)
49 else:
50 newVersion = version.increment_build_num(defaultVersion)
51 else: # Version number has been explicitly provided (not using the default)
52 newVersion = args.version
53 versionString = "{a}.{b}.{c}+{d}".format(
54 a=str(newVersion.major),
55 b=str(newVersion.minor),
56 c=str(newVersion.revision),
57 d=str(newVersion.build)
58 )
59 with open(path, "w") as newFile:
60 newFile.write(versionString)
61 print("**[INFO]** Image version number set to " + versionString)
62 return newVersion
63
Tamas Banf70ef8c2017-12-19 15:35:09 +000064def gen_rsa2048(args):
Tamas Ban861835c2019-05-13 08:59:38 +010065 keys.RSAutil.generate().export_private(args.key)
66
67def gen_rsa3072(args):
68 keys.RSAutil.generate(key_size=3072).export_private(args.key)
Tamas Banf70ef8c2017-12-19 15:35:09 +000069
70keygens = {
Tamas Ban861835c2019-05-13 08:59:38 +010071 'rsa-2048': gen_rsa2048,
72 'rsa-3072': gen_rsa3072, }
Tamas Banf70ef8c2017-12-19 15:35:09 +000073
74def do_keygen(args):
75 if args.type not in keygens:
76 msg = "Unexpected key type: {}".format(args.type)
77 raise argparse.ArgumentTypeError(msg)
78 keygens[args.type](args)
79
80def do_getpub(args):
81 key = keys.load(args.key)
82 if args.lang == 'c':
83 key.emit_c()
Tamas Banf70ef8c2017-12-19 15:35:09 +000084 else:
Tamas Ban581034a2017-12-19 19:54:37 +000085 msg = "Unsupported language, valid are: c"
Tamas Banf70ef8c2017-12-19 15:35:09 +000086 raise argparse.ArgumentTypeError(msg)
87
88def do_sign(args):
89 if args.rsa_pkcs1_15:
90 keys.sign_rsa_pss = False
David Vinczedb32b212019-04-16 17:43:57 +020091
92 version_num = next_version_number(args,
93 version.decode_version("0"),
94 "lastVerNum.txt")
95
96 if args.security_counter is None:
97 # Security counter has not been explicitly provided,
98 # generate it from the version number
99 args.security_counter = ((version_num.major << 24)
100 + (version_num.minor << 16)
101 + version_num.revision)
102
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200103 pad_size = macro_parser.evaluate_macro(args.layout, sign_bin_size_re, 0, 1)
Oliver Swede21440442018-07-10 09:31:32 +0100104 img = image.Image.load(args.infile,
David Vinczedb32b212019-04-16 17:43:57 +0200105 version=version_num,
106 header_size=args.header_size,
107 security_cnt=args.security_counter,
108 included_header=args.included_header,
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200109 pad=pad_size)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000110 key = keys.load(args.key) if args.key else None
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200111 ram_load_address = macro_parser.evaluate_macro(args.layout, image_load_address_re, 0, 1)
112 img.sign(key, ram_load_address)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000113
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200114 if pad_size:
115 img.pad_to(pad_size, args.align)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000116
117 img.save(args.outfile)
118
119subcmds = {
120 'keygen': do_keygen,
121 'getpub': do_getpub,
122 'sign': do_sign, }
123
124def alignment_value(text):
125 value = int(text)
126 if value not in [1, 2, 4, 8]:
127 msg = "{} must be one of 1, 2, 4 or 8".format(value)
128 raise argparse.ArgumentTypeError(msg)
129 return value
130
131def intparse(text):
132 """Parse a command line argument as an integer.
133
134 Accepts 0x and other prefixes to allow other bases to be used."""
135 return int(text, 0)
136
137def args():
138 parser = argparse.ArgumentParser()
139 subs = parser.add_subparsers(help='subcommand help', dest='subcmd')
140
141 keygenp = subs.add_parser('keygen', help='Generate pub/private keypair')
142 keygenp.add_argument('-k', '--key', metavar='filename', required=True)
143 keygenp.add_argument('-t', '--type', metavar='type',
Oliver Swede21440442018-07-10 09:31:32 +0100144 choices=keygens.keys(), required=True)
Tamas Banf70ef8c2017-12-19 15:35:09 +0000145
146 getpub = subs.add_parser('getpub', help='Get public key from keypair')
147 getpub.add_argument('-k', '--key', metavar='filename', required=True)
148 getpub.add_argument('-l', '--lang', metavar='lang', default='c')
149
150 sign = subs.add_parser('sign', help='Sign an image with a private key')
Sverteczky, Marcell7d069e82019-07-04 18:17:33 +0200151 sign.add_argument('-l', '--layout', required=True,
152 help='Location of the file that contains preprocessed macros')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000153 sign.add_argument('-k', '--key', metavar='filename')
154 sign.add_argument("--align", type=alignment_value, required=True)
Oliver Swede21440442018-07-10 09:31:32 +0100155 sign.add_argument("-v", "--version", type=version.decode_version,
156 default="0.0.0+0")
David Vinczedb32b212019-04-16 17:43:57 +0200157 sign.add_argument("-s", "--security-counter", type=intparse,
158 help='Specify explicitly the security counter value')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000159 sign.add_argument("-H", "--header-size", type=intparse, required=True)
160 sign.add_argument("--included-header", default=False, action='store_true',
Oliver Swede21440442018-07-10 09:31:32 +0100161 help='Image has gap for header')
Oliver Swede21440442018-07-10 09:31:32 +0100162 sign.add_argument("--rsa-pkcs1-15",
163 help='Use old PKCS#1 v1.5 signature algorithm',
164 default=False, action='store_true')
Tamas Banf70ef8c2017-12-19 15:35:09 +0000165 sign.add_argument("infile")
166 sign.add_argument("outfile")
167
168 args = parser.parse_args()
169 if args.subcmd is None:
170 print('Must specify a subcommand', file=sys.stderr)
171 sys.exit(1)
172
173 subcmds[args.subcmd](args)
174
175if __name__ == '__main__':
David Vinczedb32b212019-04-16 17:43:57 +0200176 args()