David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 1 | """ |
| 2 | Tests for RSA keys |
| 3 | """ |
| 4 | |
David Brown | 79c4fcf | 2021-01-26 15:04:05 -0700 | [diff] [blame] | 5 | # SPDX-License-Identifier: Apache-2.0 |
| 6 | |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 7 | import io |
| 8 | import os |
| 9 | import sys |
| 10 | import tempfile |
| 11 | import unittest |
| 12 | |
| 13 | from cryptography.exceptions import InvalidSignature |
| 14 | from cryptography.hazmat.primitives.asymmetric.padding import PSS, MGF1 |
| 15 | from cryptography.hazmat.primitives.hashes import SHA256 |
| 16 | |
| 17 | # Setup sys path so 'imgtool' is in it. |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 18 | sys.path.insert(0, os.path.abspath(os.path.join(os.path.dirname(__file__), |
| 19 | '../..'))) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 20 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 21 | from imgtool.keys import load, RSA, RSAUsageError |
| 22 | from imgtool.keys.rsa import RSA_KEY_SIZES |
| 23 | |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 24 | |
| 25 | class KeyGeneration(unittest.TestCase): |
| 26 | |
| 27 | def setUp(self): |
| 28 | self.test_dir = tempfile.TemporaryDirectory() |
| 29 | |
| 30 | def tname(self, base): |
| 31 | return os.path.join(self.test_dir.name, base) |
| 32 | |
| 33 | def tearDown(self): |
| 34 | self.test_dir.cleanup() |
| 35 | |
| 36 | def test_keygen(self): |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 37 | # Try generating a RSA key with non-supported size |
| 38 | with self.assertRaises(RSAUsageError): |
| 39 | RSA.generate(key_size=1024) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 40 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 41 | for key_size in RSA_KEY_SIZES: |
| 42 | name1 = self.tname("keygen.pem") |
| 43 | k = RSA.generate(key_size=key_size) |
| 44 | k.export_private(name1, b'secret') |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 45 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 46 | # Try loading the key without a password. |
| 47 | self.assertIsNone(load(name1)) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 48 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 49 | k2 = load(name1, b'secret') |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 50 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 51 | pubname = self.tname('keygen-pub.pem') |
| 52 | k2.export_public(pubname) |
| 53 | pk2 = load(pubname) |
| 54 | |
| 55 | # We should be able to export the public key from the loaded |
| 56 | # public key, but not the private key. |
| 57 | pk2.export_public(self.tname('keygen-pub2.pem')) |
| 58 | self.assertRaises(RSAUsageError, pk2.export_private, |
| 59 | self.tname('keygen-priv2.pem')) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 60 | |
| 61 | def test_emit(self): |
| 62 | """Basic sanity check on the code emitters.""" |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 63 | for key_size in RSA_KEY_SIZES: |
| 64 | k = RSA.generate(key_size=key_size) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 65 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 66 | ccode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 67 | k.emit_c_public(ccode) |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 68 | self.assertIn("rsa_pub_key", ccode.getvalue()) |
| 69 | self.assertIn("rsa_pub_key_len", ccode.getvalue()) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 70 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 71 | rustcode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 72 | k.emit_rust_public(rustcode) |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 73 | self.assertIn("RSA_PUB_KEY", rustcode.getvalue()) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 74 | |
| 75 | def test_emit_pub(self): |
| 76 | """Basic sanity check on the code emitters, from public key.""" |
| 77 | pubname = self.tname("public.pem") |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 78 | for key_size in RSA_KEY_SIZES: |
| 79 | k = RSA.generate(key_size=key_size) |
| 80 | k.export_public(pubname) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 81 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 82 | k2 = load(pubname) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 83 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 84 | ccode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 85 | k2.emit_c_public(ccode) |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 86 | self.assertIn("rsa_pub_key", ccode.getvalue()) |
| 87 | self.assertIn("rsa_pub_key_len", ccode.getvalue()) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 88 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 89 | rustcode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 90 | k2.emit_rust_public(rustcode) |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 91 | self.assertIn("RSA_PUB_KEY", rustcode.getvalue()) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 92 | |
| 93 | def test_sig(self): |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 94 | for key_size in RSA_KEY_SIZES: |
| 95 | k = RSA.generate(key_size=key_size) |
| 96 | buf = b'This is the message' |
| 97 | sig = k.sign(buf) |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 98 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 99 | # The code doesn't have any verification, so verify this |
| 100 | # manually. |
| 101 | k.key.public_key().verify( |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 102 | signature=sig, |
| 103 | data=buf, |
David Brown | 20462a7 | 2017-11-21 14:28:51 -0700 | [diff] [blame] | 104 | padding=PSS(mgf=MGF1(SHA256()), salt_length=32), |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 105 | algorithm=SHA256()) |
| 106 | |
Fabio Utzig | 19fd79a | 2019-05-08 18:20:39 -0300 | [diff] [blame] | 107 | # Modify the message to make sure the signature fails. |
| 108 | self.assertRaises(InvalidSignature, |
| 109 | k.key.public_key().verify, |
| 110 | signature=sig, |
| 111 | data=b'This is thE message', |
| 112 | padding=PSS(mgf=MGF1(SHA256()), salt_length=32), |
| 113 | algorithm=SHA256()) |
| 114 | |
David Brown | 5e7c6dd | 2017-11-16 14:47:16 -0700 | [diff] [blame] | 115 | |
| 116 | if __name__ == '__main__': |
| 117 | unittest.main() |