[Cryptech-Commits] [user/ft/bootstrap] 02/06: import from local directory

git at cryptech.is git at cryptech.is
Mon Aug 15 13:38:25 UTC 2016


This is an automated email from the git hooks/post-receive script.

fredrik at thulin.net pushed a commit to branch master
in repository user/ft/bootstrap.

commit ad0703886a80ba9e3eec0eb023243f691d53de75
Author: Fredrik Thulin <fredrik at thulin.net>
AuthorDate: Thu Aug 11 10:14:11 2016 +0200

    import from local directory
---
 bin/cryptech_runcmd | 136 ++++++++++++++++++++++++
 bin/cryptech_upload | 294 ++++++++++++++++++++++++++++++++++++++++++++++++++++
 bin/flash-target    |  38 +++++++
 bin/reset           |  31 ++++++
 run.sh              |  39 +++++++
 5 files changed, 538 insertions(+)

diff --git a/bin/cryptech_runcmd b/bin/cryptech_runcmd
new file mode 100755
index 0000000..6407043
--- /dev/null
+++ b/bin/cryptech_runcmd
@@ -0,0 +1,136 @@
+#!/usr/bin/python
+#
+# Copyright (c) 2016, NORDUnet A/S All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions are
+# met:
+# - Redistributions of source code must retain the above copyright notice,
+#   this list of conditions and the following disclaimer.
+#
+# - Redistributions in binary form must reproduce the above copyright
+#   notice, this list of conditions and the following disclaimer in the
+#   documentation and/or other materials provided with the distribution.
+#
+# - Neither the name of the NORDUnet nor the names of its contributors may
+#   be used to endorse or promote products derived from this software
+#   without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+# IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+# PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
+# TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+# PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+# LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+# NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+"""
+Utility to upload new a firmware image or FPGA bitstream
+"""
+import os
+import sys
+import time
+import struct
+import serial
+import argparse
+import getpass
+
+from binascii import crc32
+
+FIRMWARE_CHUNK_SIZE = 4096
+FPGA_CHUNK_SIZE = 4096
+
+default_pins = {'wheel': 'YouReallyNeedToChangeThisPINRightNowWeAreNotKidding',
+                'ct': 'ct',
+                }
+
+def parse_args():
+    """
+    Parse the command line arguments
+    """
+    parser = argparse.ArgumentParser(description = "File uploader",
+                                     add_help = True,
+                                     formatter_class = argparse.ArgumentDefaultsHelpFormatter,
+                                     )
+
+    parser.add_argument('-d', '--device',
+                        dest='device',
+                        default='/dev/ttyUSB0',
+                        help='Name of management port USB serial device',
+                        )
+
+    parser.add_argument("--username",
+                        choices = ("so", "wheel", "ct"),
+                        default = "so",
+                        help = "Username to use when logging into the HSM",
+                        )
+
+    parser.add_argument('commands', metavar='CMD', type=str, nargs='+',
+                        help='commands to execute')
+    return parser.parse_args()
+
+
+def _write(dst, data, debug=False):
+    dst.write(data)
+    if not debug:
+        return
+    if len(data) == 4:
+        print("Wrote 0x{!s}".format(data.encode('hex')))
+    else:
+        print("Wrote {!r}".format(data))
+
+
+def _read(dst, verbose=True):
+    res = ''
+    x = dst.read(1)
+    while not x:
+        x = dst.read(1)
+    while x:
+        res += x
+        x = dst.read(1)
+    #print ("Read {!r}".format(res))
+    if verbose:
+        sys.stdout.write(res)
+    return res
+
+def _execute(dst, cmd):
+    global default_pins
+    _write(dst, '\r')
+    prompt = _read(dst)
+    if prompt.endswith('Username: '):
+        _write(dst, args.username + "\r")
+        prompt = _read(dst)
+        if prompt.endswith('Password: '):
+            pin = default_pins.get(args.username)
+            if not pin:
+                pin = getpass.getpass("{} PIN: ".format(args.username))
+            _write(dst, pin + '\r')
+            prompt = _read(dst)
+    if not prompt.endswith('> '):
+        #sys.stderr.write('Device does not seem to be ready for a file transfer (got {!r})\n'.format(prompt))
+        return prompt
+    _write(dst, cmd + '\r')
+    response = _read(dst)
+    return response
+
+
+def main(args):
+    global pin
+    dst = serial.Serial(args.device, 921600, timeout=2)
+    for this in args.commands:
+        _execute(dst, this)
+    dst.close()
+    return True
+
+if __name__ == '__main__':
+    try:
+        args = parse_args()
+        if main(args):
+            sys.exit(0)
+        sys.exit(1)
+    except KeyboardInterrupt:
+        pass
+
diff --git a/bin/cryptech_upload b/bin/cryptech_upload
new file mode 100755
index 0000000..680a0ac
--- /dev/null
+++ b/bin/cryptech_upload
@@ -0,0 +1,294 @@
+#!/usr/bin/env python
+#
+# Copyright (c) 2016, NORDUnet A/S All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions are
+# met:
+# - Redistributions of source code must retain the above copyright notice,
+#   this list of conditions and the following disclaimer.
+#
+# - Redistributions in binary form must reproduce the above copyright
+#   notice, this list of conditions and the following disclaimer in the
+#   documentation and/or other materials provided with the distribution.
+#
+# - Neither the name of the NORDUnet nor the names of its contributors may
+#   be used to endorse or promote products derived from this software
+#   without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
+# IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+# PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
+# TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+# PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+# LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+# NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+"""
+Utility to upload a new firmware image or FPGA bitstream.
+"""
+
+import os
+import sys
+import time
+import struct
+import serial
+import getpass
+import os.path
+import tarfile
+import argparse
+import platform
+
+from binascii import crc32
+
+FIRMWARE_CHUNK_SIZE = 4096
+FPGA_CHUNK_SIZE = 4096
+
+
+def parse_args():
+    """
+    Parse the command line arguments
+    """
+
+    share_directory = "/usr/share" if platform.system() == "Linux" else "/usr/local/share"
+
+    default_tarball = os.path.join(share_directory, "cryptech-alpha-firmware.tar.gz")
+
+    if not os.path.exists(default_tarball):
+        default_tarball = None
+
+    parser = argparse.ArgumentParser(description = __doc__,
+                                     formatter_class = argparse.ArgumentDefaultsHelpFormatter,
+                                     )
+
+    parser.add_argument("-d", "--device",
+                        default = os.getenv("CRYPTECH_CTY_CLIENT_SERIAL_DEVICE", "/dev/ttyUSB0"),
+                        help = "Name of management port USB serial device",
+                        )
+
+    parser.add_argument("--firmware-tarball",
+                        type = argparse.FileType("rb"),
+                        default = default_tarball,
+                        help = "Location of firmware tarball",
+                        )
+
+    parser.add_argument("--username",
+                        choices = ("so", "wheel"),
+                        default = "so",
+                        help = "Username to use when logging into the HSM",
+                        )
+
+    actions = parser.add_mutually_exclusive_group(required = True)
+    actions.add_argument("--fpga",
+                         action = "store_true",
+                         help = "Upload FPGA bitstream",
+                         )
+    actions.add_argument("--firmware", "--hsm",
+                         action = "store_true",
+                         help = "Upload HSM firmware image",
+                         )
+    actions.add_argument("--bootloader",
+                         action = "store_true",
+                         help = "Upload bootloader image (dangerous!)",
+                         )
+
+    parser.add_argument("--simon-says-whack-my-bootloader",
+                        action = "store_true",
+                        help = "Confirm that you really want to risk bricking the HSM",
+                        )
+
+    parser.add_argument("-i", "--explicit-image",
+                        type = argparse.FileType("rb"),
+                        help = "Explicit source image file for upload, overrides firmware tarball")
+
+    return parser.parse_args()
+
+
+def _write(dst, data):
+    dst.write(data)
+    #if len(data) == 4:
+    #    print("Wrote 0x{!s}".format(data.encode("hex")))
+    #else:
+    #    print("Wrote {!r}".format(data))
+
+
+def _read(dst):
+    res = ""
+    x = dst.read(1)
+    while not x:
+        x = dst.read(1)
+    while x:
+        res += x
+        x = dst.read(1)
+    #print ("Read {!r}".format(res))
+    return res
+
+wheel_pin = 'YouReallyNeedToChangeThisPINRightNowWeAreNotKidding'
+
+def _execute(dst, cmd):
+    global wheel_pin
+    pin = None
+    if args.username == 'wheel':
+        pin = wheel_pin
+    _write(dst, "\r")
+    prompt = _read(dst)
+    if prompt.endswith("Username: "):
+        _write(dst, args.username + "\r")
+        prompt = _read(dst)
+        if prompt.endswith("Password: "):
+            if not pin:
+                pin = getpass.getpass("{} PIN: ".format(args.username))
+            _write(dst, pin + "\r")
+            prompt = _read(dst)
+    if not prompt.endswith(("> ", "# ")):
+        print("Device does not seem to be ready for a file transfer (got {!r})".format(prompt))
+        return prompt
+    _write(dst, cmd + "\r")
+    response = _read(dst)
+    return response
+
+def send_file(src, size, args, dst):
+    if args.fpga:
+        chunk_size = FPGA_CHUNK_SIZE
+        response = _execute(dst, "fpga bitstream upload")
+    elif args.firmware:
+        chunk_size = FIRMWARE_CHUNK_SIZE
+        response = _execute(dst, "firmware upload")
+        if "Rebooting" in response:
+            response = _execute(dst, "firmware upload")
+    elif args.bootloader:
+        chunk_size = FIRMWARE_CHUNK_SIZE
+        response = _execute(dst, "bootloader upload")
+    if "Access denied" in response:
+        print "Access denied"
+        return False
+    if not "OK" in response:
+        print("Device did not accept the upload command (got {!r})".format(response))
+        return False
+
+    crc = 0
+    counter = 0
+    # 1. Write size of file (4 bytes)
+    _write(dst, struct.pack("<I", size))
+    response = _read(dst)
+    if not response.startswith("Send "):
+        print response
+        return False
+
+    # 2. Write file contents while calculating CRC-32
+    while True:
+        data = src.read(chunk_size)
+        if not data:
+            break
+        dst.write(data)
+        print("Wrote {!s} bytes (chunk {!s}/{!s})".format(len(data), counter, int(size / chunk_size)))
+        # read ACK (a counter of number of 4k chunks received)
+        while True:
+            ack_bytes = dst.read(4)
+            if len(ack_bytes) == 4:
+                break
+            print("ERROR: Did not receive an ACK, got {!r}".format(ack_bytes))
+            dst.write("\r")  # eventually get back to the CLI prompt
+        ack = struct.unpack("<I", ack_bytes)[0]
+        if ack != counter + 1:
+            print("ERROR: Did not receive the expected counter as ACK (got {!r}/{!r}, not {!r})".format(ack, ack_bytes, counter))
+            flush = dst.read(100)
+            print("FLUSH data: {!r}".format(flush))
+            return False
+        counter += 1
+
+        crc = crc32(data, crc) & 0xffffffff
+
+    _read(dst)
+
+    # 3. Write CRC-32 (4 bytes)
+    _write(dst, struct.pack("<I", crc))
+    response = _read(dst)
+    print response
+
+    src.close()
+
+    if args.fpga:
+        # tell the fpga to read its new configuration
+        _execute(dst, "fpga reset")
+
+    if args.fpga or args.bootloader:
+        # log out of the CLI
+        # firmware upgrade reboots, doesn't need an exit
+        _execute(dst, "exit")
+
+    return True
+
+
+dire_bootloader_warning = '''
+                            WARNING
+
+Updating the bootloader risks bricking your HSM!  If something goes
+badly wrong here, or you upload a bad bootloader image, you will not
+be able to recover without an ST-LINK programmer.
+
+In most cases a normal "--firmware" upgrade should be all that is
+necessary to bring your HSM up to date, there is seldom any real need
+to update the bootloader.
+
+Do not proceed with this unless you REALLY know what you are doing.
+
+If you got here by accident, ^C now, without answering the PIN prompt.
+'''
+
+
+def main():
+    global args
+    args = parse_args()
+
+    if args.bootloader and not args.simon_says_whack_my_bootloader:
+        sys.exit("You didn't say \"Simon says\"")
+
+    if args.bootloader:
+        print dire_bootloader_warning
+
+    if args.explicit_image is None and args.firmware_tarball is None:
+        sys.exit("No source file specified for upload and firmware tarball not found")
+
+    if args.explicit_image:
+        src = args.explicit_image       # file-like object, thanks to argparse
+        size = os.fstat(src.fileno()).st_size
+        if size == 0:                   # Flashing from stdin won't work, sorry
+            sys.exit("Can't flash from a pipe or zero-length file")
+        print "Uploading from explicitly-specified file {}".format(args.explicit_image.name)
+
+    else:
+        tar = tarfile.open(fileobj = args.firmware_tarball)
+        print "Firmware tarball {} content:".format(args.firmware_tarball.name)
+        tar.list(True)
+        if args.fpga:
+            name = "alpha_fmc.bit"
+        elif args.firmware:
+            name = "hsm.bin"
+        elif args.bootloader:
+            name = "bootloader.bin"
+        else:
+            # Somebody updated other part of this script without updating this part :(
+            sys.exit("Don't know which component to select from firmware tarball, sorry")
+        try:
+            size = tar.getmember(name).size
+        except KeyError:
+            sys.exit("Expected component {} missing from firmware tarball {}".format(name, args.firmware_tarball.name))
+        src = tar.extractfile(name)
+        print "Uploading {} from {}".format(name, args.firmware_tarball.name)
+
+    print "Initializing serial port and synchronizing with HSM, this may take a few seconds"
+    dst  = serial.Serial(args.device, 921600, timeout = 2)
+    send_file(src, size, args, dst)
+    dst.close()
+
+
+if __name__ == "__main__":
+    try:
+        main()
+    except KeyboardInterrupt:
+        pass
diff --git a/bin/flash-target b/bin/flash-target
new file mode 100755
index 0000000..cef709d
--- /dev/null
+++ b/bin/flash-target
@@ -0,0 +1,38 @@
+#!/bin/sh
+
+PROJ="${1?'project'}"
+OPENOCD=openocd
+
+# location of OpenOCD Board .cfg files (only used with 'make flash-target')
+#
+# This path is from Ubuntu 14.04.
+#
+OPENOCD_BOARD_DIR=/usr/share/openocd/scripts/board
+
+# Configuration (cfg) file containing programming directives for OpenOCD
+#
+# If you are using an STLINK v2.0 from an STM32 F4 DISCOVERY board,
+# set this variable to "stm32f4discovery.cfg".
+#
+# If you are using an STLINK v2.1 from an STM32 F4 NUCLEO board,
+# set this variable to "st_nucleo_f401re.cfg".
+#
+# If you are using something else, look for a matching configuration file in
+# the OPENOCD_BOARD_DIR directory.
+#
+OPENOCD_PROC_FILE=stm32f4discovery.cfg
+if [ "x`lsusb -d 0483:374b`" != "x" ]; then
+    for fn in st_nucleo_f4.cfg st_nucleo_f401re.cfg; do
+        if [ -f "$OPENOCD_BOARD_DIR/$fn" ]; then
+	    OPENOCD_PROC_FILE="$fn"
+	fi
+    done
+fi
+
+# This used to be "... verify reset exit", but that fails on Debian Jessie.
+# The Net of a Million Lies claims that the "exit" is unnecessary, so the
+# simplest solution is just to omit it.  Should this turn out to be a mistake,
+# well, we'll have to do something more clever to deal with these silly version
+# skew problems between the several versions of openocd in current use.
+
+$OPENOCD -f $OPENOCD_BOARD_DIR/$OPENOCD_PROC_FILE -c "program $PROJ.elf verify exit" # reset
diff --git a/bin/reset b/bin/reset
new file mode 100755
index 0000000..8190805
--- /dev/null
+++ b/bin/reset
@@ -0,0 +1,31 @@
+#!/bin/sh
+
+OPENOCD=openocd
+
+# location of OpenOCD Board .cfg files (only used with 'make flash-target')
+#
+# This path is from Ubuntu 14.04.
+#
+OPENOCD_BOARD_DIR=/usr/share/openocd/scripts/board
+
+# Configuration (cfg) file containing programming directives for OpenOCD
+#
+# If you are using an STLINK v2.0 from an STM32 F4 DISCOVERY board,
+# set this variable to "stm32f4discovery.cfg".
+#
+# If you are using an STLINK v2.1 from an STM32 F4 NUCLEO board,
+# set this variable to "st_nucleo_f401re.cfg".
+#
+# If you are using something else, look for a matching configuration file in
+# the OPENOCD_BOARD_DIR directory.
+#
+OPENOCD_PROC_FILE=stm32f4discovery.cfg
+if [ "x`lsusb -d 0483:374b`" != "x" ]; then
+    for fn in st_nucleo_f4.cfg st_nucleo_f401re.cfg; do
+        if [ -f "$OPENOCD_BOARD_DIR/$fn" ]; then
+	    OPENOCD_PROC_FILE="$fn"
+	fi
+    done
+fi
+
+$OPENOCD -f $OPENOCD_BOARD_DIR/$OPENOCD_PROC_FILE -c "init" -c "reset run" -c "exit"
diff --git a/run.sh b/run.sh
new file mode 100755
index 0000000..a126811
--- /dev/null
+++ b/run.sh
@@ -0,0 +1,39 @@
+#!/bin/bash
+
+set -e
+
+echo "##########################################"
+echo "# Flashing bootloader"
+echo "##########################################"
+./bin/flash-target bootloader
+
+echo "##########################################"
+echo "# Flashing temporary HSM firmware"
+echo "##########################################"
+./bin/flash-target hsm
+./bin/reset
+sleep 5
+
+echo "##########################################"
+echo "# Uploading bitstream"
+echo "##########################################"
+
+./bin/cryptech_upload --fpga --username wheel
+
+echo "##########################################"
+echo "# Programming AVR"
+echo "##########################################"
+avrdude -c usbtiny -p attiny828 -U flash:w:tamper.hex
+
+echo "##########################################"
+echo "# Flashing official STM32 firmware"
+echo "##########################################"
+./bin/cryptech_upload --firmware --username wheel
+./bin/reset
+sleep 15
+
+echo "##########################################"
+echo "# Checking FPGA"
+echo "##########################################"
+./bin/cryptech_runcmd --username wheel "fpga show cores"
+



More information about the Commits mailing list