1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-30 01:58:11 +00:00
trezor-firmware/core/tools/build_vendorheader
2023-04-03 22:01:26 +02:00

54 lines
1.7 KiB
Python
Executable File

#!/usr/bin/env python3
import json
import click
from trezorlib import firmware, toif
def minimum_header_len(spec):
spec = spec.copy()
spec["header_len"] = 512000
reparsed = firmware.VendorHeader.SUBCON.parse(
firmware.VendorHeader.SUBCON.build(spec)
)
data_length = reparsed._end_offset - reparsed._start_offset
# data length + 65 for signatures, rounded up to nearest multiple of 512
return (data_length + 65 + 511) // 512 * 512
@click.command()
@click.argument("specfile", type=click.File("r"))
@click.argument("image", type=click.File("rb"))
@click.argument("outfile", type=click.File("wb"))
def build_vendorheader(specfile, image, outfile):
spec = json.load(specfile)
spec["pubkeys"] = [bytes.fromhex(k) for k in spec["pubkeys"]]
spec["image"] = toif.ToifStruct.parse(image.read())
spec["sigmask"] = 0
spec["signature"] = b"\x00" * 64
min_length = minimum_header_len(spec)
if "header_len" not in spec:
spec["header_len"] = min_length
elif spec["header_len"] < min_length:
raise click.ClickException(
f"Specified header_len {spec['header_len']} too low. "
f"Minimum allowable value is {min_length}."
)
elif spec["header_len"] == min_length:
click.echo(f"{specfile.name}: Header has correct length.")
else:
click.echo(
f"{specfile.name}: Extending header ({min_length} bytes) to {spec['header_len']} bytes."
)
if spec["header_len"] % 512 != 0:
raise click.ClickException("Invalid header_len: must be a multiple of 512")
outfile.write(firmware.VendorHeader.SUBCON.build(spec))
if __name__ == "__main__":
build_vendorheader()