aboutsummaryrefslogblamecommitdiff
path: root/projects/cli-test/Makefile
blob: e01b2436e3430fa87d23933ad030661693fe3b5e (plain) (tree)
1
2
3
4
5
6
7
8
9

               
        





                          

                     

                      
                    
 
                                         
 
                                                                            


                  
                                        
                                                                 
                                          




                      

                   
TEST = cli-test

OBJS = \
	mgmt-cli.o \
	mgmt-dfu.o \
	mgmt-fpga.o \
	mgmt-keystore.o \
	mgmt-masterkey.o \
	mgmt-misc.o \
	mgmt-show.o \
	mgmt-test.o \
	test-fmc.o \
	test-mkmif.o \
	test_sdram.o

CFLAGS += -I$(LIBCLI_SRC) -I$(LIBHAL_SRC)

LIBS += $(LIBCLI_BLD)/libcli.a $(LIBHAL_BLD)/libhal.a $(LIBTFM_BLD)/libtfm.a

all: $(TEST:=.elf)

%.elf: %.o $(BOARD_OBJS) $(OBJS) $(LIBS)
	$(CC) $(CFLAGS) $^ -o $@ -T$(LDSCRIPT) -g -Wl,-Map=$*.map
	$(OBJCOPY) -O binary $*.elf $*.bin
	$(SIZE) $*.elf

clean:
	rm -f *.o
	rm -f *.elf
	rm -f *.bin
	rm -f *.map
lass="n">parser.add_argument("-d", "--derived-key-length", type = int, default = 64, help = "length of PBKDF2 output (must match libhal)") args = parser.parse_args() def HMAC_SHA256(pin, salt): return HMAC.new(pin, salt, SHA256).digest() def hexify(value): return ", ".join("0x%02x" % ord(v) for v in value) salt = urandom(16) pin = PBKDF2(password = args.pin, salt = salt, dkLen = args.derived_key_length, count = args.iterations, prf = HMAC_SHA256) print '''\ /* * Automatically generated by a script, do not edit. */ static const hal_ks_pin_t hal_last_gasp_pin = {{ {iterations}, {{{pin}}}, {{{salt}}} }};'''.format(iterations = args.iterations, pin = hexify(pin), salt = hexify(salt))