|
| 1 | +#!/bin/bash |
| 2 | + |
| 3 | +if [ -z "${1}" -o -z "${2}" ] |
| 4 | +then |
| 5 | + echo "Usage: ${0} <version/dir> <key_label>" |
| 6 | + exit 1 |
| 7 | +fi |
| 8 | +VER_DIR="${1}" |
| 9 | +KEY_LABEL="${2}" |
| 10 | + |
| 11 | +WORKING_DIR="staging/${VER_DIR}/jade2.0" |
| 12 | + |
| 13 | +# Can log if required |
| 14 | +LOGGING="" |
| 15 | +#LOGGING="--log INFO" |
| 16 | + |
| 17 | +# Can fetch and check the pubkey from Jade - but slower and really no need |
| 18 | +# as we verify the signature with the expected pubkey at the end. |
| 19 | +CHECK_JADE_PUBKEY="" |
| 20 | +JADE_PUBKEY_FILE="jade_signing_key.pub" |
| 21 | +#CHECK_JADE_PUBKEY="--savepubkey ${JADE_PUBKEY_FILE}" |
| 22 | + |
| 23 | +# Standard for Jade fw signing |
| 24 | +KEYLEN=3072 |
| 25 | +INDEX=1784767589 |
| 26 | + |
| 27 | +# Relative paths from where it will be referenced in fw dir |
| 28 | +PUBKEY="../../../scripts/${KEY_LABEL}.pub" |
| 29 | + |
| 30 | +BLEDIR="build_v2_prod" |
| 31 | +NORADIODIR="build_v2_noradio_prod" |
| 32 | + |
| 33 | +FILE_PREFIX="v2_${VER_DIR}" |
| 34 | +SIG_SUFFIX="${KEY_LABEL}.sig" |
| 35 | + |
| 36 | +HASH_OPTS="-sha256 -binary" |
| 37 | +VERIFY_OPTS="-pubin -inkey ${PUBKEY} -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss" |
| 38 | +JADE_SIGN_CMD="python ../../../../jade_bip85_rsa_sign.py ${LOGGING} ${CHECK_JADE_PUBKEY} --keylen ${KEYLEN} --index ${INDEX} --digest-files" |
| 39 | + |
| 40 | +pushd "${WORKING_DIR}" |
| 41 | + |
| 42 | +# Verify bootloaders are same |
| 43 | +sha1=$(sha256sum "${BLEDIR}/bootloader/bootloader.bin" | cut -d\ -f1) |
| 44 | +sha2=$(sha256sum "${NORADIODIR}/bootloader/bootloader.bin" | cut -d\ -f1) |
| 45 | +if [ -z "${sha1}" -o -z "${sha2}" -o "${sha1}" != "${sha2}" ] |
| 46 | +then |
| 47 | + echo "Bootloaders missing or differ!" |
| 48 | + popd |
| 49 | + exit 2 |
| 50 | +fi |
| 51 | + |
| 52 | +# Copy binaries that need signing |
| 53 | +cp "${BLEDIR}/bootloader/bootloader.bin" "${FILE_PREFIX}_ble_bootloader.bin" |
| 54 | +cp "${BLEDIR}/jade.bin" "${FILE_PREFIX}_ble_jade.bin" |
| 55 | +cp "${NORADIODIR}/bootloader/bootloader.bin" "${FILE_PREFIX}_noradio_bootloader.bin" |
| 56 | +cp "${NORADIODIR}/jade.bin" "${FILE_PREFIX}_noradio_jade.bin" |
| 57 | + |
| 58 | +# Hash the bootloaders and fws locally |
| 59 | +HASH_FILES="" |
| 60 | +for build in "ble" "noradio" |
| 61 | +do |
| 62 | + for program in "bootloader" "jade" |
| 63 | + do |
| 64 | + binary="${FILE_PREFIX}_${build}_${program}.bin" |
| 65 | + hash_file="${FILE_PREFIX}_${build}_${program}.hash" |
| 66 | + HASH_FILES="${HASH_FILES} ${hash_file}" |
| 67 | + |
| 68 | + openssl dgst ${HASH_OPTS} -out "${hash_file}" "${binary}" |
| 69 | + done |
| 70 | +done |
| 71 | + |
| 72 | +# Sign the hashes with jade |
| 73 | +echo "Please approve signing on your Jade device" |
| 74 | +${JADE_SIGN_CMD} ${HASH_FILES} |
| 75 | + |
| 76 | +# Check signatures with labeled pubkey, and rename if good |
| 77 | +for build in "ble" "noradio" |
| 78 | +do |
| 79 | + for program in "bootloader" "jade" |
| 80 | + do |
| 81 | + hash_file="${FILE_PREFIX}_${build}_${program}.hash" |
| 82 | + sig_file="${hash_file}.sig" |
| 83 | + openssl pkeyutl -verify ${VERIFY_OPTS} -sigfile "${sig_file}" -in "${hash_file}" |
| 84 | + if [ "${?}" -eq 0 ] |
| 85 | + then |
| 86 | + mv ${sig_file} "${FILE_PREFIX}_${build}_${program}.${SIG_SUFFIX}" |
| 87 | + rm "${hash_file}" |
| 88 | + else |
| 89 | + echo "Signature verification of ${sig_file} over ${hash_file} with ${PUBKEY} failed" |
| 90 | + fi |
| 91 | + done |
| 92 | +done |
| 93 | + |
| 94 | +sha256sum *."${SIG_SUFFIX}" |
| 95 | + |
| 96 | +# Verify jade pubkey matches expected (if feched) |
| 97 | +if [ -n "${CHECK_JADE_PUBKEY}" ] |
| 98 | +then |
| 99 | + sha1=$(sha256sum "${PUBKEY}" | cut -d\ -f1) |
| 100 | + sha2=$(sha256sum "${JADE_PUBKEY_FILE}" | cut -d\ -f1) |
| 101 | + if [ -z "${sha1}" -o -z "${sha2}" -o "${sha1}" != "${sha2}" ] |
| 102 | + then |
| 103 | + echo "Error: Pubkey pem mismatch!" |
| 104 | + fi |
| 105 | +fi |
| 106 | + |
| 107 | +popd |
0 commit comments