#!/usr/bin/python3 # SPDX-License-Identifier: GPL-2.0-or-later # # Copyright (C) 2022 Luiz Angelo Daros de Luca <luizluca@gmail.com> # # Cameo Image header geneator, used by some D-Link DGS-1210 switches # and APRESIA ApresiaLightGS series # import argparse import pathlib import socket import struct MODEL_LEN = 20 SIGNATURE_LEN = 16 LINUXLOAD_LEN = 10 BUFSIZE = 4096 parser = argparse.ArgumentParser(description='Generate Cameo firmware header.') parser.add_argument('source_file', type=argparse.FileType('rb')) parser.add_argument('dest_file', type=argparse.FileType('wb')) parser.add_argument('model') parser.add_argument('signature') parser.add_argument('partition', type=int, choices=range(0,10), metavar="partition=[0-9]",help="partition id") parser.add_argument('customer_signature', type=int, choices=range(0,10), metavar="customer_signature=[0-9]", help="customer signature") parser.add_argument('board_version', type=int, choices=range(0,2**32), metavar="board_version=[0-4294967295]", help="board version") parser.add_argument('linux_loadaddr', nargs='?', help="Kernel start address in 0xFFFFFFFF format") args = parser.parse_args() if len(args.model) > MODEL_LEN: raise ValueError(f"Model '{args.model}' is greater than {MODEL_LEN} bytes") if len(args.signature) > SIGNATURE_LEN: raise ValueError(f"Signature '{args.signature}' is greater than" f"{SIGNATURE_LEN} bytes") if args.signature == "os": if args.linux_loadaddr: if len(args.linux_loadaddr) > LINUXLOAD_LEN: raise ValueError(f"linux_loadaddr '{args.linux_loadaddr}' is greater" f"than {LINUXLOAD_LEN} bytes") if (args.linux_loadaddr[0:2] != "0x"): raise ValueError(f"linux_loadaddr '{args.linux_loadaddr}' must use" f"the 0x789ABCDE format") int(args.linux_loadaddr[2:],16) else: raise ValueError(f"linux_loadaddr is required for signature 'os'") else: args.linux_loadaddr = "" checksum = 0 size = 0 while True: buf = args.source_file.read(BUFSIZE) if not buf: break checksum = sum(iter(buf),checksum) % (1<<32) size += len(buf) args.dest_file.write(struct.pack('!I', checksum)) args.dest_file.write(struct.pack(f'{MODEL_LEN}s', args.model.encode("ascii"))) args.dest_file.write(struct.pack(f'{SIGNATURE_LEN}s', args.signature.encode("ascii"))) args.dest_file.write(struct.pack('!B', args.partition)) args.dest_file.write(struct.pack('!B', 0x40)) # ??? This header size? args.dest_file.write(struct.pack('!B', 0x00)) # ??? Encrypted? args.dest_file.write(struct.pack('!B', args.customer_signature)) args.dest_file.write(struct.pack('!I', args.board_version)) args.dest_file.write(struct.pack('!I', size)) args.dest_file.write(struct.pack(f'{LINUXLOAD_LEN}s', args.linux_loadaddr.encode("ascii"))) args.dest_file.write(struct.pack('!2x')) args.source_file.seek(0) while True: buf = args.source_file.read(BUFSIZE) if not buf: break args.dest_file.write(buf)