GitHub | 您所在的位置:网站首页 › MStar tool 封包 › GitHub |
mstar-bin-tool
Command line tools to pack/unpack MStar bin firmware Currently available tools: unpack.py - unpack MStar bin firmware pack.py - pack MStar bin firmware extract_keys.py - extract AES and RSA-public keys from MBOOT binary secure_partition.py - encrypt image and generate signature file Unpack MStar bin firmware files Usage: unpack.py - MStar bin firmware to unpack - directory to store unpacked stuff. Default value: ./unpacked/ Pack MStar bin firmware Usage: pack.py Example: pack.py configs/letv-x355pro-full.ini - Configuration file. The config file structure will be described later. For now you can take a look at configs/letv-x355pro-full.ini and use it as an example Extract keys from MBOOTThat tool is used to get AES and public RSA keys from the MBOOT. AES keys are needed to encrypt/decrypt boot.img and recovery.img images. aescrypt2 tool is used. Usage: extract_keys.py [] [] [] Defaults: keys 0x168e00 0x450 Example: extract_keys.py ./unpacked/MBOOT.img Example: extract_keys.py ./unpacked/MBOOT.img ./keys 0x169e00 0x450 Encrypt/Decrypt partitionYou can encrypt/decrypt partition with using aescrypt2.exe tool, which is located in bin/win32 folder Default mstar key is hex:0007FF4154534D92FC55AA0FFF0110E0 All mstar default keys are in default_keys folder. (These keys are in public access in github) Last parameter can be hex value or path to AES key. If your vendor is using custom aes keys you can use extract_keys.py to extract them. To encrypt image use: aescrypt2 0 boot.img boot.img.aes hex:0007FF4154534D92FC55AA0FFF0110E0 or aescrypt2 0 boot.img boot.img.aes keys/AESBootKeySo to decrypt image use: aescrypt2 1 boot.img.aes boot.img hex:0007FF4154534D92FC55AA0FFF0110E0 or aescrypt2 1 boot.img boot.img.aes keys/AESBootKey Encrypt partition and generate signatureAll new MStar builds have SECURE_BOOT option enabled. In that case boot.img and recovery.img is encrypted (AES) and signed with RSA priv keys. That script is used to encrypt image and generate sign file. To manually encrypt|decrypt image use aescrypt2 tool from bin folder. AES key can be extracted from MBOOT with extract_keys.py script. Usage: secure_partition.py Example: secure_partition.py ./pack/boot.img ./keys/AESbootKey ./keys/RSAboot_priv.txt ./keys/RSAboot_pub.txt ./pack/boot.img.aes ./pack/bootSign |
CopyRight 2018-2019 实验室设备网 版权所有 |