blob: 8087447b18e4813b75cfe40971b52bfdff0e7f49 [file] [log] [blame]
Carles Cufi37d052f2018-01-30 16:40:10 +01001# Copyright 2018 Nordic Semiconductor ASA
David Brown1314bf32017-12-20 11:10:55 -07002# Copyright 2017 Linaro Limited
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
David Brown23f91ad2017-05-16 11:38:17 -060016"""
17Image signing and management.
18"""
19
20from . import version as versmod
Carles Cufi37d052f2018-01-30 16:40:10 +010021from intelhex import IntelHex
David Brown23f91ad2017-05-16 11:38:17 -060022import hashlib
23import struct
Carles Cufi37d052f2018-01-30 16:40:10 +010024import os.path
Fabio Utzig06b77b82018-08-23 16:01:16 -030025from cryptography.hazmat.primitives.asymmetric import padding
26from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
27from cryptography.hazmat.backends import default_backend
28from cryptography.hazmat.primitives import hashes
David Brown23f91ad2017-05-16 11:38:17 -060029
David Brown72e7a512017-09-01 11:08:23 -060030IMAGE_MAGIC = 0x96f3b83d
David Brown23f91ad2017-05-16 11:38:17 -060031IMAGE_HEADER_SIZE = 32
Carles Cufi37d052f2018-01-30 16:40:10 +010032BIN_EXT = "bin"
33INTEL_HEX_EXT = "hex"
Fabio Utzig519285f2018-06-04 11:11:53 -030034DEFAULT_MAX_SECTORS = 128
David Brown23f91ad2017-05-16 11:38:17 -060035
36# Image header flags.
37IMAGE_F = {
38 'PIC': 0x0000001,
Fabio Utzig06b77b82018-08-23 16:01:16 -030039 'NON_BOOTABLE': 0x0000010,
40 'ENCRYPTED': 0x0000004,
41}
David Brown23f91ad2017-05-16 11:38:17 -060042
43TLV_VALUES = {
David Brown43cda332017-09-01 09:53:23 -060044 'KEYHASH': 0x01,
David Brown27648b82017-08-31 10:40:29 -060045 'SHA256': 0x10,
46 'RSA2048': 0x20,
47 'ECDSA224': 0x21,
Fabio Utzig06b77b82018-08-23 16:01:16 -030048 'ECDSA256': 0x22,
49 'ENCRSA2048': 0x30,
50 'ENCKW128': 0x31,
51}
David Brown23f91ad2017-05-16 11:38:17 -060052
David Brownf5b33d82017-09-01 10:58:27 -060053TLV_INFO_SIZE = 4
54TLV_INFO_MAGIC = 0x6907
David Brown23f91ad2017-05-16 11:38:17 -060055
David Brown23f91ad2017-05-16 11:38:17 -060056boot_magic = bytes([
57 0x77, 0xc2, 0x95, 0xf3,
58 0x60, 0xd2, 0xef, 0x7f,
59 0x35, 0x52, 0x50, 0x0f,
60 0x2c, 0xb6, 0x79, 0x80, ])
61
Mark Schultea66c6872018-09-26 17:24:40 -070062STRUCT_ENDIAN_DICT = {
63 'little': '<',
64 'big': '>'
65}
66
David Brown23f91ad2017-05-16 11:38:17 -060067class TLV():
Mark Schultea66c6872018-09-26 17:24:40 -070068 def __init__(self, endian):
David Brown23f91ad2017-05-16 11:38:17 -060069 self.buf = bytearray()
Mark Schultea66c6872018-09-26 17:24:40 -070070 self.endian = endian
David Brown23f91ad2017-05-16 11:38:17 -060071
72 def add(self, kind, payload):
73 """Add a TLV record. Kind should be a string found in TLV_VALUES above."""
Mark Schultea66c6872018-09-26 17:24:40 -070074 e = STRUCT_ENDIAN_DICT[self.endian]
75 buf = struct.pack(e + 'BBH', TLV_VALUES[kind], 0, len(payload))
David Brown23f91ad2017-05-16 11:38:17 -060076 self.buf += buf
77 self.buf += payload
78
79 def get(self):
Mark Schultea66c6872018-09-26 17:24:40 -070080 e = STRUCT_ENDIAN_DICT[self.endian]
81 header = struct.pack(e + 'HH', TLV_INFO_MAGIC, TLV_INFO_SIZE + len(self.buf))
David Brownf5b33d82017-09-01 10:58:27 -060082 return header + bytes(self.buf)
David Brown23f91ad2017-05-16 11:38:17 -060083
84class Image():
85 @classmethod
Fabio Utzig44588ef2018-06-12 16:49:00 -070086 def load(cls, path, pad_header=False, **kwargs):
David Brown23f91ad2017-05-16 11:38:17 -060087 """Load an image from a given file"""
Carles Cufi37d052f2018-01-30 16:40:10 +010088 ext = os.path.splitext(path)[1][1:].lower()
89 if ext == INTEL_HEX_EXT:
90 cls = HexImage
91 else:
92 cls = BinImage
93
David Brown23f91ad2017-05-16 11:38:17 -060094 obj = cls(**kwargs)
Carles Cufi37d052f2018-01-30 16:40:10 +010095 obj.payload, obj.base_addr = obj.load(path)
David Brown2c21f712017-06-08 10:03:42 -060096
97 # Add the image header if needed.
Fabio Utzig44588ef2018-06-12 16:49:00 -070098 if pad_header and obj.header_size > 0:
Mark Schulte884be202018-07-09 14:39:53 -070099 if obj.base_addr:
100 # Adjust base_addr for new header
101 obj.base_addr -= obj.header_size
David Brown2c21f712017-06-08 10:03:42 -0600102 obj.payload = (b'\000' * obj.header_size) + obj.payload
103
David Brown23f91ad2017-05-16 11:38:17 -0600104 obj.check()
105 return obj
106
Fabio Utzig263d4392018-06-05 10:37:35 -0300107 def __init__(self, version=None, header_size=IMAGE_HEADER_SIZE, pad=0,
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700108 align=1, slot_size=0, max_sectors=DEFAULT_MAX_SECTORS,
Mark Schultea66c6872018-09-26 17:24:40 -0700109 overwrite_only=False, endian="little"):
David Brown23f91ad2017-05-16 11:38:17 -0600110 self.version = version or versmod.decode_version("0")
111 self.header_size = header_size or IMAGE_HEADER_SIZE
112 self.pad = pad
Fabio Utzig263d4392018-06-05 10:37:35 -0300113 self.align = align
114 self.slot_size = slot_size
115 self.max_sectors = max_sectors
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700116 self.overwrite_only = overwrite_only
Mark Schultea66c6872018-09-26 17:24:40 -0700117 self.endian = endian
David Brown23f91ad2017-05-16 11:38:17 -0600118
119 def __repr__(self):
Fabio Utzig263d4392018-06-05 10:37:35 -0300120 return "<Image version={}, header_size={}, base_addr={}, \
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700121 align={}, slot_size={}, max_sectors={}, overwrite_only={}, \
Mark Schultea66c6872018-09-26 17:24:40 -0700122 endian={} format={}, payloadlen=0x{:x}>".format(
Fabio Utzig263d4392018-06-05 10:37:35 -0300123 self.version,
124 self.header_size,
125 self.base_addr if self.base_addr is not None else "N/A",
126 self.align,
127 self.slot_size,
128 self.max_sectors,
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700129 self.overwrite_only,
Mark Schultea66c6872018-09-26 17:24:40 -0700130 self.endian,
Fabio Utzig263d4392018-06-05 10:37:35 -0300131 self.__class__.__name__,
132 len(self.payload))
David Brown23f91ad2017-05-16 11:38:17 -0600133
David Brown23f91ad2017-05-16 11:38:17 -0600134 def check(self):
135 """Perform some sanity checking of the image."""
136 # If there is a header requested, make sure that the image
137 # starts with all zeros.
138 if self.header_size > 0:
139 if any(v != 0 for v in self.payload[0:self.header_size]):
140 raise Exception("Padding requested, but image does not start with zeros")
Fabio Utzig263d4392018-06-05 10:37:35 -0300141 if self.slot_size > 0:
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700142 tsize = self._trailer_size(self.align, self.max_sectors,
143 self.overwrite_only)
Fabio Utzig263d4392018-06-05 10:37:35 -0300144 padding = self.slot_size - (len(self.payload) + tsize)
145 if padding < 0:
146 msg = "Image size (0x{:x}) + trailer (0x{:x}) exceeds requested size 0x{:x}".format(
147 len(self.payload), tsize, self.slot_size)
148 raise Exception(msg)
David Brown23f91ad2017-05-16 11:38:17 -0600149
Fabio Utzig06b77b82018-08-23 16:01:16 -0300150 def create(self, key, enckey):
151 self.add_header(key, enckey)
David Brown23f91ad2017-05-16 11:38:17 -0600152
Mark Schultea66c6872018-09-26 17:24:40 -0700153 tlv = TLV(self.endian)
David Brown23f91ad2017-05-16 11:38:17 -0600154
155 # Note that ecdsa wants to do the hashing itself, which means
156 # we get to hash it twice.
157 sha = hashlib.sha256()
158 sha.update(self.payload)
159 digest = sha.digest()
160
161 tlv.add('SHA256', digest)
162
David Brown0f0c6a82017-06-08 09:26:24 -0600163 if key is not None:
David Brown43cda332017-09-01 09:53:23 -0600164 pub = key.get_public_bytes()
165 sha = hashlib.sha256()
166 sha.update(pub)
167 pubbytes = sha.digest()
168 tlv.add('KEYHASH', pubbytes)
169
David Brown47b77c52017-11-16 15:10:22 -0700170 sig = key.sign(bytes(self.payload))
David Brown0f0c6a82017-06-08 09:26:24 -0600171 tlv.add(key.sig_tlv(), sig)
David Brown23f91ad2017-05-16 11:38:17 -0600172
Fabio Utzig06b77b82018-08-23 16:01:16 -0300173 if enckey is not None:
174 plainkey = os.urandom(16)
175 cipherkey = enckey._get_public().encrypt(
176 plainkey, padding.OAEP(
177 mgf=padding.MGF1(algorithm=hashes.SHA256()),
178 algorithm=hashes.SHA256(),
179 label=None))
180 tlv.add('ENCRSA2048', cipherkey)
181
182 nonce = bytes([0] * 16)
183 cipher = Cipher(algorithms.AES(plainkey), modes.CTR(nonce),
184 backend=default_backend())
185 encryptor = cipher.encryptor()
186 img = bytes(self.payload[self.header_size:])
187 self.payload[self.header_size:] = encryptor.update(img) + \
188 encryptor.finalize()
189
David Brown23f91ad2017-05-16 11:38:17 -0600190 self.payload += tlv.get()
191
Fabio Utzig06b77b82018-08-23 16:01:16 -0300192 def add_header(self, key, enckey):
David Brown23f91ad2017-05-16 11:38:17 -0600193 """Install the image header.
194
195 The key is needed to know the type of signature, and
196 approximate the size of the signature."""
197
David Brown0f0c6a82017-06-08 09:26:24 -0600198 flags = 0
Fabio Utzig06b77b82018-08-23 16:01:16 -0300199 if enckey is not None:
200 flags |= IMAGE_F['ENCRYPTED']
David Brown23f91ad2017-05-16 11:38:17 -0600201
Mark Schultea66c6872018-09-26 17:24:40 -0700202 e = STRUCT_ENDIAN_DICT[self.endian]
203 fmt = (e +
David Brown23f91ad2017-05-16 11:38:17 -0600204 # type ImageHdr struct {
205 'I' + # Magic uint32
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300206 'I' + # LoadAddr uint32
David Brown23f91ad2017-05-16 11:38:17 -0600207 'H' + # HdrSz uint16
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300208 'H' + # Pad1 uint16
David Brown23f91ad2017-05-16 11:38:17 -0600209 'I' + # ImgSz uint32
210 'I' + # Flags uint32
211 'BBHI' + # Vers ImageVersion
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300212 'I' # Pad2 uint32
David Brown23f91ad2017-05-16 11:38:17 -0600213 ) # }
214 assert struct.calcsize(fmt) == IMAGE_HEADER_SIZE
215 header = struct.pack(fmt,
216 IMAGE_MAGIC,
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300217 0, # LoadAddr
David Brown23f91ad2017-05-16 11:38:17 -0600218 self.header_size,
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300219 0, # Pad1
David Brown23f91ad2017-05-16 11:38:17 -0600220 len(self.payload) - self.header_size, # ImageSz
221 flags, # Flags
222 self.version.major,
223 self.version.minor or 0,
224 self.version.revision or 0,
225 self.version.build or 0,
Fabio Utzigb5b59f12018-05-10 07:27:08 -0300226 0) # Pad2
David Brown23f91ad2017-05-16 11:38:17 -0600227 self.payload = bytearray(self.payload)
228 self.payload[:len(header)] = header
229
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700230 def _trailer_size(self, write_size, max_sectors, overwrite_only):
Fabio Utzig519285f2018-06-04 11:11:53 -0300231 # NOTE: should already be checked by the argument parser
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700232 if overwrite_only:
233 return 8 * 2 + 16
234 else:
235 if write_size not in set([1, 2, 4, 8]):
236 raise Exception("Invalid alignment: {}".format(write_size))
237 m = DEFAULT_MAX_SECTORS if max_sectors is None else max_sectors
238 return m * 3 * write_size + 8 * 2 + 16
Fabio Utzig519285f2018-06-04 11:11:53 -0300239
Fabio Utzig263d4392018-06-05 10:37:35 -0300240 def pad_to(self, size):
David Brown23f91ad2017-05-16 11:38:17 -0600241 """Pad the image to the given size, with the given flash alignment."""
Fabio Utzigdcf0c9b2018-06-11 12:27:49 -0700242 tsize = self._trailer_size(self.align, self.max_sectors,
243 self.overwrite_only)
David Brown23f91ad2017-05-16 11:38:17 -0600244 padding = size - (len(self.payload) + tsize)
Fabio Utzige08f0872017-06-28 18:12:16 -0300245 pbytes = b'\xff' * padding
David Brown23f91ad2017-05-16 11:38:17 -0600246 pbytes += b'\xff' * (tsize - len(boot_magic))
Fabio Utzige08f0872017-06-28 18:12:16 -0300247 pbytes += boot_magic
David Brown23f91ad2017-05-16 11:38:17 -0600248 self.payload += pbytes
Carles Cufi37d052f2018-01-30 16:40:10 +0100249
Fabio Utzig263d4392018-06-05 10:37:35 -0300250
Carles Cufi37d052f2018-01-30 16:40:10 +0100251class HexImage(Image):
252
253 def load(self, path):
254 ih = IntelHex(path)
255 return ih.tobinarray(), ih.minaddr()
256
257 def save(self, path):
258 h = IntelHex()
259 h.frombytes(bytes = self.payload, offset = self.base_addr)
260 h.tofile(path, 'hex')
261
262class BinImage(Image):
263
264 def load(self, path):
265 with open(path, 'rb') as f:
266 return f.read(), None
267
268 def save(self, path):
269 with open(path, 'wb') as f:
270 f.write(self.payload)