From 9565ae4cda6199e7de5c0cea6981c77d9b4b1575 Mon Sep 17 00:00:00 2001 From: Conor Patrick Date: Wed, 2 Jan 2019 21:07:56 -0500 Subject: [PATCH] combined merge_hex --- targets/stm32l442/Makefile | 8 ++-- targets/stm32l442/merge_hex.py | 88 ---------------------------------- tools/solotool.py | 68 +++++++++++++++++++++++++- 3 files changed, 71 insertions(+), 93 deletions(-) delete mode 100644 targets/stm32l442/merge_hex.py diff --git a/targets/stm32l442/Makefile b/targets/stm32l442/Makefile index f65e709..23accff 100644 --- a/targets/stm32l442/Makefile +++ b/targets/stm32l442/Makefile @@ -2,6 +2,8 @@ ifndef DEBUG DEBUG=0 endif +merge_hex=python ../../tools/solotool.py mergehex + all: $(MAKE) -f application.mk -j8 solo.hex DEBUG=$(DEBUG) EXTRA_DEFINES='-DFLASH_ROP=1' @@ -30,17 +32,17 @@ clean: $(MAKE) -f bootloader.mk clean flash: solo.hex bootloader.hex - python merge_hex.py solo.hex bootloader.hex all.hex + $(merge_hex) solo.hex bootloader.hex all.hex STM32_Programmer_CLI -c port=SWD -halt -e all --readunprotect STM32_Programmer_CLI -c port=SWD -halt -d all.hex -rst flash_dfu: solo.hex bootloader.hex - python merge_hex.py solo.hex bootloader.hex all.hex + $(merge_hex) solo.hex bootloader.hex all.hex # STM32_Programmer_CLI -c port=usb1 -halt -e all --readunprotect STM32_Programmer_CLI -c port=usb1 -halt -rdu -d all.hex flashboot: solo.hex bootloader.hex - python merge_hex.py solo.hex bootloader.hex all.hex + $(merge_hex) solo.hex bootloader.hex all.hex STM32_Programmer_CLI -c port=SWD -halt -e all --readunprotect STM32_Programmer_CLI -c port=SWD -halt -d bootloader.hex -rst diff --git a/targets/stm32l442/merge_hex.py b/targets/stm32l442/merge_hex.py deleted file mode 100644 index 397a72b..0000000 --- a/targets/stm32l442/merge_hex.py +++ /dev/null @@ -1,88 +0,0 @@ -# -# Copyright (C) 2018 SoloKeys, Inc. -# -# This file is part of Solo. -# -# Solo is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# Solo is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Solo. If not, see -# -# This code is available under licenses for commercial use. -# Please contact SoloKeys for more information. -# - -# Merges bootloader and application into 1 file for ST Solo -# -# Patches settings in flash so bootloader will boot application. - -from intelhex import IntelHex -import sys -from binascii import unhexlify - -if len(sys.argv) < 3: - print('usage: %s [...] [-s ] ') - sys.exit(1) - -def flash_addr(num): - return 0x08000000 + num * 2048 - -args = sys.argv[:] - -# generic / hacker attestation key -secret_attestation_key = "1b2626ecc8f69b0f69e34fb236d76466ba12ac16c3ab5750ba064e8b90e02448" - -# user supplied, optional -for i,x in enumerate(args): - if x == '-s': - secret_attestation_key = args[i+1] - args = args[:i] + args[i+2:] - break - - -# TODO put definitions somewhere else -PAGES = 128 -APPLICATION_END_PAGE = PAGES - 19 -AUTH_WORD_ADDR = (flash_addr(APPLICATION_END_PAGE)-8) -ATTEST_ADDR = (flash_addr(PAGES - 15)) - -first = IntelHex(args[1]) -for i in range(2, len(args)-1): - print('merging %s with ' % (args[1]), args[i]) - first.merge(IntelHex( args[i] ), overlap = 'replace') - -first [ flash_addr(APPLICATION_END_PAGE-1) ] = 0x41 -first [ flash_addr(APPLICATION_END_PAGE-1)+1 ] = 0x41 - -first[AUTH_WORD_ADDR-4] = 0 -first[AUTH_WORD_ADDR-1] = 0 -first[AUTH_WORD_ADDR-2] = 0 -first[AUTH_WORD_ADDR-3] = 0 - -first[AUTH_WORD_ADDR] = 0 -first[AUTH_WORD_ADDR+1] = 0 -first[AUTH_WORD_ADDR+2] = 0 -first[AUTH_WORD_ADDR+3] = 0 - -first[AUTH_WORD_ADDR+4] = 0xff -first[AUTH_WORD_ADDR+5] = 0xff -first[AUTH_WORD_ADDR+6] = 0xff -first[AUTH_WORD_ADDR+7] = 0xff - - -if secret_attestation_key is not None: - key = unhexlify(secret_attestation_key) - - - for i,x in enumerate(key): - first[ATTEST_ADDR + i] = x - -first.tofile(args[len(args)-1], format='hex') diff --git a/tools/solotool.py b/tools/solotool.py index 3a579eb..f02cac7 100644 --- a/tools/solotool.py +++ b/tools/solotool.py @@ -26,7 +26,7 @@ import sys,os,time,struct,argparse import array,struct,socket,json,base64,binascii import tempfile -from binascii import hexlify +from binascii import hexlify,unhexlify from hashlib import sha256 from fido2.hid import CtapHidDevice, CTAPHID @@ -803,12 +803,73 @@ def programmer_main(): else: p.program_file(fw) + +def main_mergehex(): + if len(sys.argv) < 3: + print('usage: %s [...] [-s ] ') + sys.exit(1) + + def flash_addr(num): + return 0x08000000 + num * 2048 + + args = sys.argv[:] + + # generic / hacker attestation key + secret_attestation_key = "1b2626ecc8f69b0f69e34fb236d76466ba12ac16c3ab5750ba064e8b90e02448" + + # user supplied, optional + for i,x in enumerate(args): + if x == '-s': + secret_attestation_key = args[i+1] + args = args[:i] + args[i+2:] + break + + + # TODO put definitions somewhere else + PAGES = 128 + APPLICATION_END_PAGE = PAGES - 19 + AUTH_WORD_ADDR = (flash_addr(APPLICATION_END_PAGE)-8) + ATTEST_ADDR = (flash_addr(PAGES - 15)) + + first = IntelHex(args[1]) + for i in range(2, len(args)-1): + print('merging %s with ' % (args[1]), args[i]) + first.merge(IntelHex( args[i] ), overlap = 'replace') + + first [ flash_addr(APPLICATION_END_PAGE-1) ] = 0x41 + first [ flash_addr(APPLICATION_END_PAGE-1)+1 ] = 0x41 + + first[AUTH_WORD_ADDR-4] = 0 + first[AUTH_WORD_ADDR-1] = 0 + first[AUTH_WORD_ADDR-2] = 0 + first[AUTH_WORD_ADDR-3] = 0 + + first[AUTH_WORD_ADDR] = 0 + first[AUTH_WORD_ADDR+1] = 0 + first[AUTH_WORD_ADDR+2] = 0 + first[AUTH_WORD_ADDR+3] = 0 + + first[AUTH_WORD_ADDR+4] = 0xff + first[AUTH_WORD_ADDR+5] = 0xff + first[AUTH_WORD_ADDR+6] = 0xff + first[AUTH_WORD_ADDR+7] = 0xff + + + if secret_attestation_key is not None: + key = unhexlify(secret_attestation_key) + + + for i,x in enumerate(key): + first[ATTEST_ADDR + i] = x + + first.tofile(args[len(args)-1], format='hex') + if __name__ == '__main__': if len(sys.argv) < 2 or (len(sys.argv) == 2 and asked_for_help()): print('Diverse command line tool for working with Solo') print('usage: %s [options] [-h]' % sys.argv[0]) - print('commands: program, solo, monitor, sign, genkey') + print('commands: program, solo, monitor, sign, genkey, mergehex') print( """ Examples: @@ -820,6 +881,7 @@ Examples: {0} monitor {0} sign {0} genkey [rng-seed-file] + {0} mergehex bootloader.hex solo.hex combined.hex """.format(sys.argv[0])) sys.exit(1) @@ -838,5 +900,7 @@ Examples: sign_main() elif c == 'genkey': genkey_main() + elif c == 'mergehex': + main_mergehex() else: print('invalid command: %s' % c)