1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-18 13:38:12 +00:00
trezor-firmware/core/tools/build_vendorheader

54 lines
1.7 KiB
Plaintext
Raw Normal View History

#!/usr/bin/env python3
import json
import click
2018-07-31 09:35:09 +00:00
2023-03-02 15:06:09 +00:00
from trezorlib import firmware, toif
2017-06-13 14:50:03 +00:00
def minimum_header_len(spec):
spec = spec.copy()
spec["header_len"] = 512000
2023-03-02 15:06:09 +00:00
reparsed = firmware.VendorHeader.SUBCON.parse(
firmware.VendorHeader.SUBCON.build(spec)
)
data_length = reparsed._end_offset - reparsed._start_offset
# data length + 65 for signatures, rounded up to nearest multiple of 512
return (data_length + 65 + 511) // 512 * 512
@click.command()
@click.argument("specfile", type=click.File("r"))
@click.argument("image", type=click.File("rb"))
@click.argument("outfile", type=click.File("wb"))
def build_vendorheader(specfile, image, outfile):
spec = json.load(specfile)
spec["pubkeys"] = [bytes.fromhex(k) for k in spec["pubkeys"]]
2023-03-02 15:06:09 +00:00
spec["image"] = toif.ToifStruct.parse(image.read())
spec["sigmask"] = 0
spec["signature"] = b"\x00" * 64
min_length = minimum_header_len(spec)
if "header_len" not in spec:
spec["header_len"] = min_length
elif spec["header_len"] < min_length:
raise click.ClickException(
f"Specified header_len {spec['header_len']} too low. "
f"Minimum allowable value is {min_length}."
)
2023-03-02 15:06:09 +00:00
elif spec["header_len"] == min_length:
click.echo(f"{specfile.name}: Header has correct length.")
else:
click.echo(
f"{specfile.name}: Extending header ({min_length} bytes) to {spec['header_len']} bytes."
)
if spec["header_len"] % 512 != 0:
raise click.ClickException("Invalid header_len: must be a multiple of 512")
2023-03-02 15:06:09 +00:00
outfile.write(firmware.VendorHeader.SUBCON.build(spec))
2017-06-13 14:50:03 +00:00
if __name__ == "__main__":
build_vendorheader()