mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-17 21:22:10 +00:00
54 lines
1.7 KiB
Python
Executable File
54 lines
1.7 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
import json
|
|
|
|
import click
|
|
|
|
from trezorlib import firmware, toif
|
|
|
|
|
|
def minimum_header_len(spec):
|
|
spec = spec.copy()
|
|
spec["header_len"] = 512000
|
|
reparsed = firmware.VendorHeader.SUBCON.parse(
|
|
firmware.VendorHeader.SUBCON.build(spec)
|
|
)
|
|
data_length = reparsed._end_offset - reparsed._start_offset
|
|
# data length + 65 for signatures, rounded up to nearest multiple of 512
|
|
return (data_length + 65 + 511) // 512 * 512
|
|
|
|
|
|
@click.command()
|
|
@click.argument("specfile", type=click.File("r"))
|
|
@click.argument("image", type=click.File("rb"))
|
|
@click.argument("outfile", type=click.File("wb"))
|
|
def build_vendorheader(specfile, image, outfile):
|
|
spec = json.load(specfile)
|
|
spec["pubkeys"] = [bytes.fromhex(k) for k in spec["pubkeys"]]
|
|
spec["image"] = toif.ToifStruct.parse(image.read())
|
|
spec["sigmask"] = 0
|
|
spec["signature"] = b"\x00" * 64
|
|
|
|
min_length = minimum_header_len(spec)
|
|
if "header_len" not in spec:
|
|
spec["header_len"] = min_length
|
|
elif spec["header_len"] < min_length:
|
|
raise click.ClickException(
|
|
f"Specified header_len {spec['header_len']} too low. "
|
|
f"Minimum allowable value is {min_length}."
|
|
)
|
|
elif spec["header_len"] == min_length:
|
|
click.echo(f"{specfile.name}: Header has correct length.")
|
|
else:
|
|
click.echo(
|
|
f"{specfile.name}: Extending header ({min_length} bytes) to {spec['header_len']} bytes."
|
|
)
|
|
|
|
if spec["header_len"] % 512 != 0:
|
|
raise click.ClickException("Invalid header_len: must be a multiple of 512")
|
|
|
|
outfile.write(firmware.VendorHeader.SUBCON.build(spec))
|
|
|
|
|
|
if __name__ == "__main__":
|
|
build_vendorheader()
|