1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586 |
- #!/usr/bin/python3
- # SPDX-License-Identifier: GPL-2.0-or-later
- #
- # Copyright (C) 2022 Luiz Angelo Daros de Luca <luizluca@gmail.com>
- #
- # Cameo Image header geneator, used by some D-Link DGS-1210 switches
- # and APRESIA ApresiaLightGS series
- #
- import argparse
- import pathlib
- import socket
- import struct
- MODEL_LEN = 20
- SIGNATURE_LEN = 16
- LINUXLOAD_LEN = 10
- BUFSIZE = 4096
- parser = argparse.ArgumentParser(description='Generate Cameo firmware header.')
- parser.add_argument('source_file', type=argparse.FileType('rb'))
- parser.add_argument('dest_file', type=argparse.FileType('wb'))
- parser.add_argument('model')
- parser.add_argument('signature')
- parser.add_argument('partition', type=int, choices=range(0,10),
- metavar="partition=[0-9]",help="partition id")
- parser.add_argument('customer_signature', type=int, choices=range(0,10),
- metavar="customer_signature=[0-9]",
- help="customer signature")
- parser.add_argument('board_version', type=int, choices=range(0,2**32),
- metavar="board_version=[0-4294967295]",
- help="board version")
- parser.add_argument('linux_loadaddr', nargs='?',
- help="Kernel start address in 0xFFFFFFFF format")
- args = parser.parse_args()
- if len(args.model) > MODEL_LEN:
- raise ValueError(f"Model '{args.model}' is greater than {MODEL_LEN} bytes")
- if len(args.signature) > SIGNATURE_LEN:
- raise ValueError(f"Signature '{args.signature}' is greater than"
- f"{SIGNATURE_LEN} bytes")
- if args.signature == "os":
- if args.linux_loadaddr:
- if len(args.linux_loadaddr) > LINUXLOAD_LEN:
- raise ValueError(f"linux_loadaddr '{args.linux_loadaddr}' is greater"
- f"than {LINUXLOAD_LEN} bytes")
- if (args.linux_loadaddr[0:2] != "0x"):
- raise ValueError(f"linux_loadaddr '{args.linux_loadaddr}' must use"
- f"the 0x789ABCDE format")
- int(args.linux_loadaddr[2:],16)
- else:
- raise ValueError(f"linux_loadaddr is required for signature 'os'")
- else:
- args.linux_loadaddr = ""
- checksum = 0
- size = 0
- while True:
- buf = args.source_file.read(BUFSIZE)
- if not buf:
- break
- checksum = sum(iter(buf),checksum) % (1<<32)
- size += len(buf)
- args.dest_file.write(struct.pack('!I', checksum))
- args.dest_file.write(struct.pack(f'{MODEL_LEN}s',
- args.model.encode("ascii")))
- args.dest_file.write(struct.pack(f'{SIGNATURE_LEN}s',
- args.signature.encode("ascii")))
- args.dest_file.write(struct.pack('!B', args.partition))
- args.dest_file.write(struct.pack('!B', 0x40)) # ??? This header size?
- args.dest_file.write(struct.pack('!B', 0x00)) # ??? Encrypted?
- args.dest_file.write(struct.pack('!B', args.customer_signature))
- args.dest_file.write(struct.pack('!I', args.board_version))
- args.dest_file.write(struct.pack('!I', size))
- args.dest_file.write(struct.pack(f'{LINUXLOAD_LEN}s',
- args.linux_loadaddr.encode("ascii")))
- args.dest_file.write(struct.pack('!2x'))
- args.source_file.seek(0)
- while True:
- buf = args.source_file.read(BUFSIZE)
- if not buf:
- break
- args.dest_file.write(buf)
|