def _generate_pkcs11_cfg(self, token_driver_home): pkcs11_cfg_template_data = ensure_str(c_misc.load_data_from_file(self.PKCS11_CFG_TEMPLATE)) pkcs11_cfg_data = signerutils.macro_replace(pkcs11_cfg_template_data, "token_driver_home", token_driver_home, isMandatory=True) return c_path.create_tmp_file(data=pkcs11_cfg_data)
def _generate_pkcs11_cfg(self, token_driver_home): pkcs11_cfg_template_data = c_misc.load_data_from_file( self.PKCS11_CFG_TEMPLATE) pkcs11_cfg_data = signerutils.macro_replace(pkcs11_cfg_template_data, "token_driver_home", token_driver_home, isMandatory=True) return utility_functions.store_data_to_temp_file(pkcs11_cfg_data)
def _multirootcert_properties_parse(self, multirootcert_config, config_cert_name, config_key_name): params = {} cert_name = signerutils.macro_replace(config_cert_name, "index", str(multirootcert_config.index), isMandatory=True) key_name = signerutils.macro_replace(config_key_name, "index", str(multirootcert_config.index), isMandatory=True) params['certificate_path'] = signerutils.macro_replace( os.path.join(multirootcert_config.directory, cert_name), "exponent", str(self.signing_attributes.exponent)) params['private_key_path'] = signerutils.macro_replace( os.path.join(multirootcert_config.directory, key_name), "exponent", str(self.signing_attributes.exponent)) return params
def _certificate_properties_parse(self, cert_info): if cert_info.params_list: params = utility_functions.normalize_param_list_into_dict( cert_info.params_list.cert_param) else: params = {} cert_path_exponent_replaced = signerutils.macro_replace( cert_info.preexisting_cert.cert_path, "exponent", str(self.signing_attributes.exponent)) params['certificate_path'] = signerutils.macro_replace( cert_path_exponent_replaced, "key_size", str(self.general_properties.key_size)) private_key_exponent_replaced = signerutils.macro_replace( cert_info.preexisting_cert.private_key_path, "exponent", str(self.signing_attributes.exponent)) params['private_key_path'] = signerutils.macro_replace( private_key_exponent_replaced, "key_size", str(self.general_properties.key_size)) return params
def _execute_postprocess_policy(env, sectools_install_base_dir, install_file_name, sectools_builder_output, msmid_jtagid_dict, install_policies, sec_image_policy, postprocess=POSTPROCESS_INSTALL): rt_list = [] if len(sectools_builder_output) == 0: #Empty list - the target is excluded return rt_list util = BuilderUtil(env) for install_policy in install_policies: install_directory = install_policy.getDirectory(sec_image_policy.id) if install_directory is None: continue install_directory_processed = signerutils.macro_replace( install_directory, "sectools_install_base_dir", sectools_install_base_dir, isMandatory=False) install_directory_processed = os.path.normpath( util.envsubst(install_directory_processed)) if install_file_name is not None: target_file_path = os.path.join(install_directory_processed, install_file_name) else: path, filename = os.path.split(sectools_builder_output[0]) target_file_path = os.path.join(install_directory_processed, filename) if postprocess == POSTPROCESS_INSTALL: rt = util.installas(target_file_path, sectools_builder_output[0]) elif postprocess == POSTPROCESS_PILSPLIT: pil_split_path, ext = os.path.splitext(target_file_path) rt = util.pilsplit(pil_split_path + ".mdt", sectools_builder_output[0]) else: raise RuntimeError( "{0} not supported in _execute_postprocess_policy".format( postprocess)) rt_list.append(rt) return rt_list
def _execute_postprocess_policy(env, sectools_install_base_dir, install_file_name, sectools_builder_output, msmid_jtagid_dict, install_policies, sec_image_policy, postprocess=POSTPROCESS_INSTALL): rt_list=[] if len(sectools_builder_output) == 0: #Empty list - the target is excluded return rt_list util = BuilderUtil(env) for install_policy in install_policies: install_directory = install_policy.getDirectory(sec_image_policy.id) if install_directory is None: continue install_directory_processed = signerutils.macro_replace(install_directory, "sectools_install_base_dir", sectools_install_base_dir, isMandatory=False) install_directory_processed = os.path.normpath( util.envsubst(install_directory_processed)) if install_file_name is not None: target_file_path = os.path.join(install_directory_processed, install_file_name) else: path, filename = os.path.split(sectools_builder_output[0]) target_file_path = os.path.join(install_directory_processed, filename) if postprocess == POSTPROCESS_INSTALL: rt = util.installas(target_file_path, sectools_builder_output[0]) elif postprocess == POSTPROCESS_PILSPLIT: pil_split_path, ext = os.path.splitext(target_file_path) rt = util.pilsplit(pil_split_path + ".mdt", sectools_builder_output[0]) else: raise RuntimeError("{0} not supported in _execute_postprocess_policy".format(postprocess)) rt_list.append(rt) return rt_list
def _execute_install_policy(env, sectools_install_base_dir, install_file_name, sectools_builder_output, alternate_source, msmid_jtagid_dict, install_policies, sec_image_policy_id): rt_list = [] util = BuilderUtil(env) for install_policy in install_policies: install_directory = install_policy.getDirectory(sec_image_policy_id) if install_directory is None: continue install_directory_processed = signerutils.macro_replace( install_directory, "sectools_install_base_dir", sectools_install_base_dir, isMandatory=False) install_directory_processed = os.path.normpath( util.envsubst(install_directory_processed)) if install_file_name is not None: target_file_path = os.path.join(install_directory_processed, install_file_name) else: path, filename = os.path.split(sectools_builder_output[0]) target_file_path = os.path.join(install_directory_processed, filename) if alternate_source is not None: rt = util.installas(target_file_path, alternate_source) else: rt = util.installas(target_file_path, sectools_builder_output[0]) rt_list.append(rt) return rt_list