blob: 6188e788b20a1973f91eff1730595f32778fcd6b [file] [log] [blame]
Fabio Utzige89841d2018-12-21 11:19:06 -02001#! /usr/bin/env python3
2#
David Vincze71b8f982020-03-17 19:08:12 +01003# Copyright 2017-2020 Linaro Limited
David Vincze1a7a6902020-02-18 15:05:16 +01004# Copyright 2019-2020 Arm Limited
Fabio Utzige89841d2018-12-21 11:19:06 -02005#
David Brown79c4fcf2021-01-26 15:04:05 -07006# SPDX-License-Identifier: Apache-2.0
7#
Fabio Utzige89841d2018-12-21 11:19:06 -02008# Licensed under the Apache License, Version 2.0 (the "License");
9# you may not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS,
16# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19
David Vinczeda8c9192019-03-26 17:17:41 +010020import re
Fabio Utzige89841d2018-12-21 11:19:06 -020021import click
22import getpass
23import imgtool.keys as keys
Fabio Utzig4a5477a2019-05-27 15:45:08 -030024import sys
Fabio Utzig25c6a152019-09-10 12:52:26 -030025from imgtool import image, imgtool_version
Fabio Utzige89841d2018-12-21 11:19:06 -020026from imgtool.version import decode_version
Fabio Utzig4facd1b2020-04-02 13:17:38 -030027from .keys import (
28 RSAUsageError, ECDSAUsageError, Ed25519UsageError, X25519UsageError)
Fabio Utzige89841d2018-12-21 11:19:06 -020029
David Vincze71b8f982020-03-17 19:08:12 +010030MIN_PYTHON_VERSION = (3, 6)
31if sys.version_info < MIN_PYTHON_VERSION:
32 sys.exit("Python %s.%s or newer is required by imgtool."
33 % MIN_PYTHON_VERSION)
34
Fabio Utzige89841d2018-12-21 11:19:06 -020035
36def gen_rsa2048(keyfile, passwd):
Fabio Utzig19fd79a2019-05-08 18:20:39 -030037 keys.RSA.generate().export_private(path=keyfile, passwd=passwd)
38
39
40def gen_rsa3072(keyfile, passwd):
41 keys.RSA.generate(key_size=3072).export_private(path=keyfile,
42 passwd=passwd)
Fabio Utzige89841d2018-12-21 11:19:06 -020043
44
45def gen_ecdsa_p256(keyfile, passwd):
46 keys.ECDSA256P1.generate().export_private(keyfile, passwd=passwd)
47
48
49def gen_ecdsa_p224(keyfile, passwd):
50 print("TODO: p-224 not yet implemented")
51
52
Fabio Utzig8101d1f2019-05-09 15:03:22 -030053def gen_ed25519(keyfile, passwd):
Fabio Utzig4bd4c7c2019-06-27 08:23:21 -030054 keys.Ed25519.generate().export_private(path=keyfile, passwd=passwd)
Fabio Utzig8101d1f2019-05-09 15:03:22 -030055
56
Fabio Utzig4facd1b2020-04-02 13:17:38 -030057def gen_x25519(keyfile, passwd):
58 keys.X25519.generate().export_private(path=keyfile, passwd=passwd)
59
60
Fabio Utzige89841d2018-12-21 11:19:06 -020061valid_langs = ['c', 'rust']
62keygens = {
63 'rsa-2048': gen_rsa2048,
Fabio Utzig19fd79a2019-05-08 18:20:39 -030064 'rsa-3072': gen_rsa3072,
Fabio Utzige89841d2018-12-21 11:19:06 -020065 'ecdsa-p256': gen_ecdsa_p256,
66 'ecdsa-p224': gen_ecdsa_p224,
Fabio Utzig4facd1b2020-04-02 13:17:38 -030067 'ed25519': gen_ed25519,
68 'x25519': gen_x25519,
Fabio Utzige89841d2018-12-21 11:19:06 -020069}
70
71
72def load_key(keyfile):
73 # TODO: better handling of invalid pass-phrase
74 key = keys.load(keyfile)
75 if key is not None:
76 return key
77 passwd = getpass.getpass("Enter key passphrase: ").encode('utf-8')
78 return keys.load(keyfile, passwd)
79
80
81def get_password():
82 while True:
83 passwd = getpass.getpass("Enter key passphrase: ")
84 passwd2 = getpass.getpass("Reenter passphrase: ")
85 if passwd == passwd2:
86 break
87 print("Passwords do not match, try again")
88
89 # Password must be bytes, always use UTF-8 for consistent
90 # encoding.
91 return passwd.encode('utf-8')
92
93
94@click.option('-p', '--password', is_flag=True,
95 help='Prompt for password to protect key')
96@click.option('-t', '--type', metavar='type', required=True,
Fabio Utzig7ca28552019-12-13 11:24:20 -030097 type=click.Choice(keygens.keys()), prompt=True,
98 help='{}'.format('One of: {}'.format(', '.join(keygens.keys()))))
Fabio Utzige89841d2018-12-21 11:19:06 -020099@click.option('-k', '--key', metavar='filename', required=True)
100@click.command(help='Generate pub/private keypair')
101def keygen(type, key, password):
102 password = get_password() if password else None
103 keygens[type](key, password)
104
105
106@click.option('-l', '--lang', metavar='lang', default=valid_langs[0],
107 type=click.Choice(valid_langs))
108@click.option('-k', '--key', metavar='filename', required=True)
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200109@click.command(help='Dump public key from keypair')
Fabio Utzige89841d2018-12-21 11:19:06 -0200110def getpub(key, lang):
111 key = load_key(key)
112 if key is None:
113 print("Invalid passphrase")
114 elif lang == 'c':
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200115 key.emit_c_public()
Fabio Utzige89841d2018-12-21 11:19:06 -0200116 elif lang == 'rust':
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200117 key.emit_rust_public()
Fabio Utzige89841d2018-12-21 11:19:06 -0200118 else:
119 raise ValueError("BUG: should never get here!")
120
121
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200122@click.option('--minimal', default=False, is_flag=True,
123 help='Reduce the size of the dumped private key to include only '
124 'the minimum amount of data required to decrypt. This '
125 'might require changes to the build config. Check the docs!'
126 )
127@click.option('-k', '--key', metavar='filename', required=True)
128@click.command(help='Dump private key from keypair')
129def getpriv(key, minimal):
130 key = load_key(key)
131 if key is None:
132 print("Invalid passphrase")
Fabio Utzig1f508922020-01-15 11:37:51 -0300133 try:
134 key.emit_private(minimal)
Fabio Utzig4facd1b2020-04-02 13:17:38 -0300135 except (RSAUsageError, ECDSAUsageError, Ed25519UsageError,
136 X25519UsageError) as e:
Fabio Utzig1f508922020-01-15 11:37:51 -0300137 raise click.UsageError(e)
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200138
139
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300140@click.argument('imgfile')
141@click.option('-k', '--key', metavar='filename')
142@click.command(help="Check that signed image can be verified by given key")
143def verify(key, imgfile):
144 key = load_key(key) if key else None
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200145 ret, version, digest = image.Image.verify(imgfile, key)
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300146 if ret == image.VerifyResult.OK:
147 print("Image was correctly validated")
Marek Pietae9555102019-08-08 16:08:16 +0200148 print("Image version: {}.{}.{}+{}".format(*version))
Casper Meijn2a01f3f2020-08-22 13:51:40 +0200149 print("Image digest: {}".format(digest.hex()))
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300150 return
151 elif ret == image.VerifyResult.INVALID_MAGIC:
152 print("Invalid image magic; is this an MCUboot image?")
Christian Skubichf13db122019-07-31 11:34:15 +0200153 elif ret == image.VerifyResult.INVALID_TLV_INFO_MAGIC:
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300154 print("Invalid TLV info magic; is this an MCUboot image?")
155 elif ret == image.VerifyResult.INVALID_HASH:
156 print("Image has an invalid sha256 digest")
157 elif ret == image.VerifyResult.INVALID_SIGNATURE:
158 print("No signature found for the given key")
Christian Skubichf13db122019-07-31 11:34:15 +0200159 else:
160 print("Unknown return code: {}".format(ret))
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300161 sys.exit(1)
162
163
Fabio Utzige89841d2018-12-21 11:19:06 -0200164def validate_version(ctx, param, value):
165 try:
166 decode_version(value)
167 return value
168 except ValueError as e:
169 raise click.BadParameter("{}".format(e))
170
171
David Vincze1a7a6902020-02-18 15:05:16 +0100172def validate_security_counter(ctx, param, value):
173 if value is not None:
174 if value.lower() == 'auto':
175 return 'auto'
176 else:
177 try:
178 return int(value, 0)
179 except ValueError:
180 raise click.BadParameter(
181 "{} is not a valid integer. Please use code literals "
182 "prefixed with 0b/0B, 0o/0O, or 0x/0X as necessary."
183 .format(value))
184
185
Fabio Utzige89841d2018-12-21 11:19:06 -0200186def validate_header_size(ctx, param, value):
187 min_hdr_size = image.IMAGE_HEADER_SIZE
188 if value < min_hdr_size:
189 raise click.BadParameter(
190 "Minimum value for -H/--header-size is {}".format(min_hdr_size))
191 return value
192
193
David Vinczeda8c9192019-03-26 17:17:41 +0100194def get_dependencies(ctx, param, value):
195 if value is not None:
196 versions = []
197 images = re.findall(r"\((\d+)", value)
198 if len(images) == 0:
199 raise click.BadParameter(
200 "Image dependency format is invalid: {}".format(value))
201 raw_versions = re.findall(r",\s*([0-9.+]+)\)", value)
202 if len(images) != len(raw_versions):
203 raise click.BadParameter(
204 '''There's a mismatch between the number of dependency images
205 and versions in: {}'''.format(value))
206 for raw_version in raw_versions:
207 try:
208 versions.append(decode_version(raw_version))
209 except ValueError as e:
210 raise click.BadParameter("{}".format(e))
211 dependencies = dict()
212 dependencies[image.DEP_IMAGES_KEY] = images
213 dependencies[image.DEP_VERSIONS_KEY] = versions
214 return dependencies
215
216
Fabio Utzige89841d2018-12-21 11:19:06 -0200217class BasedIntParamType(click.ParamType):
218 name = 'integer'
219
220 def convert(self, value, param, ctx):
221 try:
David Vincze1a7a6902020-02-18 15:05:16 +0100222 return int(value, 0)
Fabio Utzige89841d2018-12-21 11:19:06 -0200223 except ValueError:
David Vincze1a7a6902020-02-18 15:05:16 +0100224 self.fail('%s is not a valid integer. Please use code literals '
225 'prefixed with 0b/0B, 0o/0O, or 0x/0X as necessary.'
226 % value, param, ctx)
Fabio Utzige89841d2018-12-21 11:19:06 -0200227
228
229@click.argument('outfile')
230@click.argument('infile')
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200231@click.option('--custom-tlv', required=False, nargs=2, default=[],
232 multiple=True, metavar='[tag] [value]',
233 help='Custom TLV that will be placed into protected area. '
234 'Add "0x" prefix if the value should be interpreted as an '
235 'integer, otherwise it will be interpreted as a string. '
236 'Specify the option multiple times to add multiple TLVs.')
Fabio Utzig9117fde2019-10-17 11:11:46 -0300237@click.option('-R', '--erased-val', type=click.Choice(['0', '0xff']),
238 required=False,
239 help='The value that is read back from erased flash.')
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300240@click.option('-x', '--hex-addr', type=BasedIntParamType(), required=False,
241 help='Adjust address in hex output file.')
Håkon Øye Amundsendf8c8912019-08-26 12:15:28 +0000242@click.option('-L', '--load-addr', type=BasedIntParamType(), required=False,
David Vincze1e0c5442020-04-07 14:12:33 +0200243 help='Load address for image when it should run from RAM.')
Dominik Ermel50820b12020-12-14 13:16:46 +0000244@click.option('-F', '--rom-fixed', type=BasedIntParamType(), required=False,
245 help='Set flash address the image is built for.')
Fabio Utzig9a492d52020-01-15 11:31:52 -0300246@click.option('--save-enctlv', default=False, is_flag=True,
247 help='When upgrading, save encrypted key TLVs instead of plain '
248 'keys. Enable when BOOT_SWAP_SAVE_ENCTLV config option '
249 'was set.')
Fabio Utzige89841d2018-12-21 11:19:06 -0200250@click.option('-E', '--encrypt', metavar='filename',
David Vinczee574f2d2020-07-10 11:42:03 +0200251 help='Encrypt image using the provided public key. '
Tamas Banfe031092020-09-10 17:32:39 +0200252 '(Not supported in direct-xip or ram-load mode.)')
Fabio Utzige89841d2018-12-21 11:19:06 -0200253@click.option('-e', '--endian', type=click.Choice(['little', 'big']),
254 default='little', help="Select little or big endian")
255@click.option('--overwrite-only', default=False, is_flag=True,
256 help='Use overwrite-only instead of swap upgrades')
David Vincze71b8f982020-03-17 19:08:12 +0100257@click.option('--boot-record', metavar='sw_type', help='Create CBOR encoded '
258 'boot record TLV. The sw_type represents the role of the '
259 'software component (e.g. CoFM for coprocessor firmware). '
260 '[max. 12 characters]')
Fabio Utzige89841d2018-12-21 11:19:06 -0200261@click.option('-M', '--max-sectors', type=int,
Fabio Utzig9a492d52020-01-15 11:31:52 -0300262 help='When padding allow for this amount of sectors (defaults '
263 'to 128)')
Henrik Brix Andersen0ce958e2020-03-11 14:04:11 +0100264@click.option('--confirm', default=False, is_flag=True,
Martí Bolívar009a1502020-09-04 14:23:39 -0700265 help='When padding the image, mark it as confirmed (implies '
266 '--pad)')
Fabio Utzige89841d2018-12-21 11:19:06 -0200267@click.option('--pad', default=False, is_flag=True,
268 help='Pad image to --slot-size bytes, adding trailer magic')
269@click.option('-S', '--slot-size', type=BasedIntParamType(), required=True,
Fabio Utzig826abf42020-07-13 20:56:35 -0300270 help='Size of the slot. If the slots have different sizes, use '
271 'the size of the secondary slot.')
Fabio Utzige89841d2018-12-21 11:19:06 -0200272@click.option('--pad-header', default=False, is_flag=True,
Fabio Utzig9a492d52020-01-15 11:31:52 -0300273 help='Add --header-size zeroed bytes at the beginning of the '
274 'image')
Fabio Utzige89841d2018-12-21 11:19:06 -0200275@click.option('-H', '--header-size', callback=validate_header_size,
276 type=BasedIntParamType(), required=True)
David Brown4878c272020-03-10 16:23:56 -0600277@click.option('--pad-sig', default=False, is_flag=True,
278 help='Add 0-2 bytes of padding to ECDSA signature '
279 '(for mcuboot <1.5)')
David Vinczeda8c9192019-03-26 17:17:41 +0100280@click.option('-d', '--dependencies', callback=get_dependencies,
281 required=False, help='''Add dependence on another image, format:
282 "(<image_ID>,<image_version>), ... "''')
David Vincze1a7a6902020-02-18 15:05:16 +0100283@click.option('-s', '--security-counter', callback=validate_security_counter,
284 help='Specify the value of security counter. Use the `auto` '
285 'keyword to automatically generate it from the image version.')
Fabio Utzige89841d2018-12-21 11:19:06 -0200286@click.option('-v', '--version', callback=validate_version, required=True)
287@click.option('--align', type=click.Choice(['1', '2', '4', '8']),
288 required=True)
David Vinczedde178d2020-03-26 20:06:01 +0100289@click.option('--public-key-format', type=click.Choice(['hash', 'full']),
290 default='hash', help='In what format to add the public key to '
291 'the image manifest: full key or hash of the key.')
Fabio Utzige89841d2018-12-21 11:19:06 -0200292@click.option('-k', '--key', metavar='filename')
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200293@click.command(help='''Create a signed or unsigned image\n
294 INFILE and OUTFILE are parsed as Intel HEX if the params have
Håkon Øye Amundsendf8c8912019-08-26 12:15:28 +0000295 .hex extension, otherwise binary format is used''')
David Vinczedde178d2020-03-26 20:06:01 +0100296def sign(key, public_key_format, align, version, pad_sig, header_size,
297 pad_header, slot_size, pad, confirm, max_sectors, overwrite_only,
298 endian, encrypt, infile, outfile, dependencies, load_addr, hex_addr,
Dominik Ermel50820b12020-12-14 13:16:46 +0000299 erased_val, save_enctlv, security_counter, boot_record, custom_tlv,
300 rom_fixed):
Martí Bolívar009a1502020-09-04 14:23:39 -0700301
302 if confirm:
303 # Confirmed but non-padded images don't make much sense, because
304 # otherwise there's no trailer area for writing the confirmed status.
305 pad = True
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200306 img = image.Image(version=decode_version(version), header_size=header_size,
Henrik Brix Andersen0ce958e2020-03-11 14:04:11 +0100307 pad_header=pad_header, pad=pad, confirm=confirm,
308 align=int(align), slot_size=slot_size,
309 max_sectors=max_sectors, overwrite_only=overwrite_only,
Dominik Ermel50820b12020-12-14 13:16:46 +0000310 endian=endian, load_addr=load_addr, rom_fixed=rom_fixed,
311 erased_val=erased_val, save_enctlv=save_enctlv,
David Vincze1a7a6902020-02-18 15:05:16 +0100312 security_counter=security_counter)
Fabio Utzig7c00acd2019-01-07 09:54:20 -0200313 img.load(infile)
Fabio Utzige89841d2018-12-21 11:19:06 -0200314 key = load_key(key) if key else None
315 enckey = load_key(encrypt) if encrypt else None
Fabio Utzig7a3b2602019-10-22 09:56:44 -0300316 if enckey and key:
317 if ((isinstance(key, keys.ECDSA256P1) and
318 not isinstance(enckey, keys.ECDSA256P1Public))
319 or (isinstance(key, keys.RSA) and
320 not isinstance(enckey, keys.RSAPublic))):
321 # FIXME
Fabio Utzig1f508922020-01-15 11:37:51 -0300322 raise click.UsageError("Signing and encryption must use the same "
323 "type of key")
David Brown4878c272020-03-10 16:23:56 -0600324
325 if pad_sig and hasattr(key, 'pad_sig'):
326 key.pad_sig = True
327
Ihor Slabkyy24d93732020-03-10 15:33:57 +0200328 # Get list of custom protected TLVs from the command-line
329 custom_tlvs = {}
330 for tlv in custom_tlv:
331 tag = int(tlv[0], 0)
332 if tag in custom_tlvs:
333 raise click.UsageError('Custom TLV %s already exists.' % hex(tag))
334 if tag in image.TLV_VALUES.values():
335 raise click.UsageError(
336 'Custom TLV %s conflicts with predefined TLV.' % hex(tag))
337
338 value = tlv[1]
339 if value.startswith('0x'):
340 if len(value[2:]) % 2:
341 raise click.UsageError('Custom TLV length is odd.')
342 custom_tlvs[tag] = bytes.fromhex(value[2:])
343 else:
344 custom_tlvs[tag] = value.encode('utf-8')
345
346 img.create(key, public_key_format, enckey, dependencies, boot_record,
347 custom_tlvs)
Fabio Utzigedbabcf2019-10-11 13:03:37 -0300348 img.save(outfile, hex_addr)
Fabio Utzige89841d2018-12-21 11:19:06 -0200349
350
351class AliasesGroup(click.Group):
352
353 _aliases = {
354 "create": "sign",
355 }
356
357 def list_commands(self, ctx):
358 cmds = [k for k in self.commands]
359 aliases = [k for k in self._aliases]
360 return sorted(cmds + aliases)
361
362 def get_command(self, ctx, cmd_name):
363 rv = click.Group.get_command(self, ctx, cmd_name)
364 if rv is not None:
365 return rv
366 if cmd_name in self._aliases:
367 return click.Group.get_command(self, ctx, self._aliases[cmd_name])
368 return None
369
370
Fabio Utzig25c6a152019-09-10 12:52:26 -0300371@click.command(help='Print imgtool version information')
372def version():
373 print(imgtool_version)
374
375
Fabio Utzige89841d2018-12-21 11:19:06 -0200376@click.command(cls=AliasesGroup,
377 context_settings=dict(help_option_names=['-h', '--help']))
378def imgtool():
379 pass
380
381
382imgtool.add_command(keygen)
383imgtool.add_command(getpub)
Ioannis Konstantelias78e57c72019-11-28 16:06:12 +0200384imgtool.add_command(getpriv)
Fabio Utzig4a5477a2019-05-27 15:45:08 -0300385imgtool.add_command(verify)
Fabio Utzige89841d2018-12-21 11:19:06 -0200386imgtool.add_command(sign)
Fabio Utzig25c6a152019-09-10 12:52:26 -0300387imgtool.add_command(version)
Fabio Utzige89841d2018-12-21 11:19:06 -0200388
389
390if __name__ == '__main__':
391 imgtool()