Rouven Czerwinski | bbaeed4 | 2019-08-07 20:07:00 +0200 | [diff] [blame] | 1 | #!/usr/bin/env python3 |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 2 | # SPDX-License-Identifier: BSD-2-Clause |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 3 | # |
| 4 | # Copyright (c) 2015, 2017, 2019, Linaro Limited |
| 5 | # |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 6 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 7 | import sys |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 8 | import math |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 9 | |
Jerome Forissier | 4a47792 | 2018-11-14 11:02:49 +0100 | [diff] [blame] | 10 | |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 11 | algo = {'TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256': 0x70414930, |
| 12 | 'TEE_ALG_RSASSA_PKCS1_V1_5_SHA256': 0x70004830} |
| 13 | |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 14 | enc_key_type = {'SHDR_ENC_KEY_DEV_SPECIFIC': 0x0, |
| 15 | 'SHDR_ENC_KEY_CLASS_WIDE': 0x1} |
| 16 | |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 17 | |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 18 | def uuid_parse(s): |
| 19 | from uuid import UUID |
| 20 | return UUID(s) |
| 21 | |
| 22 | |
| 23 | def int_parse(str): |
| 24 | return int(str, 0) |
| 25 | |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 26 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 27 | def get_args(logger): |
| 28 | from argparse import ArgumentParser, RawDescriptionHelpFormatter |
| 29 | import textwrap |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 30 | command_base = ['sign-enc', 'digest', 'stitch'] |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 31 | command_aliases_digest = ['generate-digest'] |
| 32 | command_aliases_stitch = ['stitch-ta'] |
| 33 | command_aliases = command_aliases_digest + command_aliases_stitch |
| 34 | command_choices = command_base + command_aliases |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 35 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 36 | dat = '[' + ', '.join(command_aliases_digest) + ']' |
| 37 | sat = '[' + ', '.join(command_aliases_stitch) + ']' |
| 38 | |
| 39 | parser = ArgumentParser( |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 40 | description='Sign and encrypt (optional) a Trusted Application for' + |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 41 | ' OP-TEE.', |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 42 | usage='\n %(prog)s command [ arguments ]\n\n' |
| 43 | |
| 44 | ' command:\n' + |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 45 | ' sign-enc Generate signed and optionally encrypted loadable' + |
| 46 | ' TA image file.\n' + |
| 47 | ' Takes arguments --uuid, --ta-version, --in, --out,' + |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 48 | ' --key,\n' + |
| 49 | ' --enc-key (optional) and' + |
| 50 | ' --enc-key-type (optional).\n' + |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 51 | ' digest Generate loadable TA binary image digest' + |
| 52 | ' for offline\n' + |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 53 | ' signing. Takes arguments --uuid, --ta-version,' + |
| 54 | ' --in, --key,\n' |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 55 | ' --enc-key (optional), --enc-key-type (optional),' + |
| 56 | ' --algo (optional) and --dig.\n' + |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 57 | ' stitch Generate loadable signed and encrypted TA binary' + |
| 58 | ' image file from\n' + |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 59 | ' TA raw image and its signature. Takes' + |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 60 | ' arguments --uuid, --in, --key, --out,\n' + |
| 61 | ' --enc-key (optional), --enc-key-type (optional),\n' + |
| 62 | ' --algo (optional) and --sig.\n\n' + |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 63 | ' %(prog)s --help show available commands and arguments\n\n', |
| 64 | formatter_class=RawDescriptionHelpFormatter, |
| 65 | epilog=textwrap.dedent('''\ |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 66 | If no command is given, the script will default to "sign-enc". |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 67 | |
| 68 | command aliases: |
| 69 | The command \'digest\' can be aliased by ''' + dat + ''' |
| 70 | The command \'stitch\' can be aliased by ''' + sat + '\n' + ''' |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 71 | example offline signing command using OpenSSL for algorithm |
| 72 | TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256: |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 73 | base64 -d <UUID>.dig | \\ |
| 74 | openssl pkeyutl -sign -inkey <KEYFILE>.pem \\ |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 75 | -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss \\ |
| 76 | -pkeyopt rsa_pss_saltlen:digest \\ |
| 77 | -pkeyopt rsa_mgf1_md:sha256 | \\ |
| 78 | base64 > <UUID>.sig\n |
| 79 | example offline signing command using OpenSSL for algorithm |
| 80 | TEE_ALG_RSASSA_PKCS1_V1_5_SHA256: |
| 81 | base64 -d <UUID>.dig | \\ |
| 82 | openssl pkeyutl -sign -inkey <KEYFILE>.pem \\ |
| 83 | -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pkcs1 | \\ |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 84 | base64 > <UUID>.sig |
| 85 | ''')) |
| 86 | |
| 87 | parser.add_argument( |
| 88 | 'command', choices=command_choices, nargs='?', |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 89 | default='sign-enc', |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 90 | help='Command, one of [' + ', '.join(command_base) + ']') |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 91 | parser.add_argument('--uuid', required=True, |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 92 | type=uuid_parse, help='String UUID of the TA') |
| 93 | parser.add_argument('--key', required=True, |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 94 | help='Name of signing key file (PEM format)') |
| 95 | parser.add_argument('--enc-key', required=False, |
| 96 | help='Encryption key string') |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 97 | parser.add_argument( |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 98 | '--enc-key-type', required=False, default='SHDR_ENC_KEY_DEV_SPECIFIC', |
| 99 | choices=list(enc_key_type.keys()), |
| 100 | help='Encryption key type.\n' + |
| 101 | '(SHDR_ENC_KEY_DEV_SPECIFIC or SHDR_ENC_KEY_CLASS_WIDE).\n' + |
| 102 | 'Defaults to SHDR_ENC_KEY_DEV_SPECIFIC.') |
| 103 | parser.add_argument( |
Etienne Carriere | 4784462 | 2019-08-12 11:33:24 +0200 | [diff] [blame] | 104 | '--ta-version', required=False, type=int_parse, default=0, |
| 105 | help='TA version stored as a 32-bit unsigned integer and used for\n' + |
| 106 | 'rollback protection of TA install in the secure database.\n' + |
| 107 | 'Defaults to 0.') |
| 108 | parser.add_argument( |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 109 | '--sig', required=False, dest='sigf', |
| 110 | help='Name of signature input file, defaults to <UUID>.sig') |
| 111 | parser.add_argument( |
| 112 | '--dig', required=False, dest='digf', |
| 113 | help='Name of digest output file, defaults to <UUID>.dig') |
| 114 | parser.add_argument( |
Etienne Carriere | 9d8dd73 | 2019-08-12 16:15:42 +0200 | [diff] [blame] | 115 | '--in', required=True, dest='inf', |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 116 | help='Name of application input file, defaults to <UUID>.stripped.elf') |
| 117 | parser.add_argument( |
| 118 | '--out', required=False, dest='outf', |
| 119 | help='Name of application output file, defaults to <UUID>.ta') |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 120 | parser.add_argument('--algo', required=False, choices=list(algo.keys()), |
| 121 | default='TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256', |
| 122 | help='The hash and signature algorithm, ' + |
| 123 | 'defaults to TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256. ' + |
| 124 | 'Allowed values are: ' + |
| 125 | ', '.join(list(algo.keys())), metavar='') |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 126 | |
| 127 | parsed = parser.parse_args() |
| 128 | |
| 129 | # Check parameter combinations |
| 130 | |
| 131 | if parsed.digf is None and \ |
| 132 | parsed.outf is not None and \ |
| 133 | parsed.command in ['digest'] + command_aliases_digest: |
| 134 | logger.error('A digest was requested, but argument --out was given.' + |
| 135 | ' Did you mean:\n ' + |
| 136 | parser.prog+' --dig ' + parsed.outf + ' ...') |
| 137 | sys.exit(1) |
| 138 | |
| 139 | if parsed.digf is not None \ |
| 140 | and parsed.outf is not None \ |
| 141 | and parsed.command in ['digest'] + command_aliases_digest: |
| 142 | logger.warn('A digest was requested, but arguments --dig and ' + |
| 143 | '--out were given.\n' + |
| 144 | ' --out will be ignored.') |
| 145 | |
| 146 | # Set defaults for optional arguments. |
| 147 | |
| 148 | if parsed.sigf is None: |
| 149 | parsed.sigf = str(parsed.uuid)+'.sig' |
| 150 | if parsed.digf is None: |
| 151 | parsed.digf = str(parsed.uuid)+'.dig' |
| 152 | if parsed.inf is None: |
| 153 | parsed.inf = str(parsed.uuid)+'.stripped.elf' |
| 154 | if parsed.outf is None: |
| 155 | parsed.outf = str(parsed.uuid)+'.ta' |
| 156 | |
| 157 | return parsed |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 158 | |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 159 | |
| 160 | def main(): |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 161 | from cryptography import exceptions |
| 162 | from cryptography.hazmat.backends import default_backend |
| 163 | from cryptography.hazmat.primitives import serialization |
| 164 | from cryptography.hazmat.primitives import hashes |
| 165 | from cryptography.hazmat.primitives.asymmetric import padding |
| 166 | from cryptography.hazmat.primitives.asymmetric import rsa |
| 167 | from cryptography.hazmat.primitives.asymmetric import utils |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 168 | import base64 |
| 169 | import logging |
| 170 | import os |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 171 | import struct |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 172 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 173 | logging.basicConfig() |
| 174 | logger = logging.getLogger(os.path.basename(__file__)) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 175 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 176 | args = get_args(logger) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 177 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 178 | with open(args.key, 'rb') as f: |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 179 | data = f.read() |
| 180 | |
| 181 | try: |
| 182 | key = serialization.load_pem_private_key(data, password=None, |
| 183 | backend=default_backend()) |
| 184 | except ValueError: |
| 185 | key = serialization.load_pem_public_key(data, |
| 186 | backend=default_backend()) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 187 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 188 | with open(args.inf, 'rb') as f: |
| 189 | img = f.read() |
| 190 | |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 191 | chosen_hash = hashes.SHA256() |
| 192 | h = hashes.Hash(chosen_hash, default_backend()) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 193 | |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 194 | digest_len = chosen_hash.digest_size |
| 195 | sig_len = math.ceil(key.key_size / 8) |
Volodymyr Babchuk | 90ad245 | 2019-08-21 21:00:32 +0300 | [diff] [blame] | 196 | |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 197 | img_size = len(img) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 198 | |
Etienne Carriere | 4784462 | 2019-08-12 11:33:24 +0200 | [diff] [blame] | 199 | hdr_version = args.ta_version # struct shdr_bootstrap_ta::ta_version |
| 200 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 201 | magic = 0x4f545348 # SHDR_MAGIC |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 202 | if args.enc_key: |
| 203 | img_type = 2 # SHDR_ENCRYPTED_TA |
| 204 | else: |
| 205 | img_type = 1 # SHDR_BOOTSTRAP_TA |
Etienne Carriere | 4784462 | 2019-08-12 11:33:24 +0200 | [diff] [blame] | 206 | |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 207 | shdr = struct.pack('<IIIIHH', |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 208 | magic, img_type, img_size, algo[args.algo], |
| 209 | digest_len, sig_len) |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 210 | shdr_uuid = args.uuid.bytes |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 211 | shdr_version = struct.pack('<I', hdr_version) |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 212 | |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 213 | if args.enc_key: |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 214 | from cryptography.hazmat.primitives.ciphers.aead import AESGCM |
| 215 | cipher = AESGCM(bytes.fromhex(args.enc_key)) |
| 216 | # Use 12 bytes for nonce per recommendation |
| 217 | nonce = os.urandom(12) |
| 218 | out = cipher.encrypt(nonce, img, None) |
| 219 | ciphertext = out[:-16] |
| 220 | # Authentication Tag is always the last 16 bytes |
| 221 | tag = out[-16:] |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 222 | |
Donald Chan | c45a84b | 2022-01-01 22:32:45 +0000 | [diff] [blame^] | 223 | enc_algo = 0x40000810 # TEE_ALG_AES_GCM |
| 224 | flags = enc_key_type[args.enc_key_type] |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 225 | ehdr = struct.pack('<IIHH', |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 226 | enc_algo, flags, len(nonce), len(tag)) |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 227 | |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 228 | h.update(shdr) |
| 229 | h.update(shdr_uuid) |
| 230 | h.update(shdr_version) |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 231 | if args.enc_key: |
| 232 | h.update(ehdr) |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 233 | h.update(nonce) |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 234 | h.update(tag) |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 235 | h.update(img) |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 236 | img_digest = h.finalize() |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 237 | |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 238 | def write_image_with_signature(sig): |
| 239 | with open(args.outf, 'wb') as f: |
| 240 | f.write(shdr) |
| 241 | f.write(img_digest) |
| 242 | f.write(sig) |
| 243 | f.write(shdr_uuid) |
| 244 | f.write(shdr_version) |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 245 | if args.enc_key: |
| 246 | f.write(ehdr) |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 247 | f.write(nonce) |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 248 | f.write(tag) |
| 249 | f.write(ciphertext) |
| 250 | else: |
| 251 | f.write(img) |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 252 | |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 253 | def sign_encrypt_ta(): |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 254 | if not isinstance(key, rsa.RSAPrivateKey): |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 255 | logger.error('Provided key cannot be used for signing, ' + |
| 256 | 'please use offline-signing mode.') |
Markus S. Wamser | 6ff2e3f | 2019-08-02 14:48:46 +0200 | [diff] [blame] | 257 | sys.exit(1) |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 258 | else: |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 259 | if args.algo == 'TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256': |
| 260 | sig = key.sign( |
| 261 | img_digest, |
| 262 | padding.PSS( |
| 263 | mgf=padding.MGF1(chosen_hash), |
| 264 | salt_length=digest_len |
| 265 | ), |
| 266 | utils.Prehashed(chosen_hash) |
| 267 | ) |
| 268 | elif args.algo == 'TEE_ALG_RSASSA_PKCS1_V1_5_SHA256': |
| 269 | sig = key.sign( |
| 270 | img_digest, |
| 271 | padding.PKCS1v15(), |
| 272 | utils.Prehashed(chosen_hash) |
| 273 | ) |
| 274 | |
Volodymyr Babchuk | 90ad245 | 2019-08-21 21:00:32 +0300 | [diff] [blame] | 275 | if len(sig) != sig_len: |
| 276 | raise Exception(("Actual signature length is not equal to ", |
| 277 | "the computed one: {} != {}"). |
| 278 | format(len(sig), sig_len)) |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 279 | write_image_with_signature(sig) |
| 280 | logger.info('Successfully signed application.') |
| 281 | |
| 282 | def generate_digest(): |
| 283 | with open(args.digf, 'wb+') as digfile: |
| 284 | digfile.write(base64.b64encode(img_digest)) |
| 285 | |
| 286 | def stitch_ta(): |
| 287 | try: |
| 288 | with open(args.sigf, 'r') as sigfile: |
| 289 | sig = base64.b64decode(sigfile.read()) |
| 290 | except IOError: |
Markus S. Wamser | 6ff2e3f | 2019-08-02 14:48:46 +0200 | [diff] [blame] | 291 | if not os.path.exists(args.digf): |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 292 | generate_digest() |
| 293 | logger.error('No signature file found. Please sign\n %s\n' + |
| 294 | 'offline and place the signature at \n %s\n' + |
| 295 | 'or pass a different location ' + |
| 296 | 'using the --sig argument.\n', |
| 297 | args.digf, args.sigf) |
Markus S. Wamser | 6ff2e3f | 2019-08-02 14:48:46 +0200 | [diff] [blame] | 298 | sys.exit(1) |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 299 | else: |
Mingyuan Xiang | cf3d6ac | 2020-09-17 19:01:02 +0800 | [diff] [blame] | 300 | try: |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 301 | if args.algo == 'TEE_ALG_RSASSA_PKCS1_PSS_MGF1_SHA256': |
| 302 | key.verify( |
| 303 | sig, |
| 304 | img_digest, |
| 305 | padding.PSS( |
| 306 | mgf=padding.MGF1(chosen_hash), |
| 307 | salt_length=digest_len |
| 308 | ), |
| 309 | utils.Prehashed(chosen_hash) |
| 310 | ) |
| 311 | elif args.algo == 'TEE_ALG_RSASSA_PKCS1_V1_5_SHA256': |
| 312 | key.verify( |
| 313 | sig, |
| 314 | img_digest, |
| 315 | padding.PKCS1v15(), |
| 316 | utils.Prehashed(chosen_hash) |
| 317 | ) |
| 318 | except exceptions.InvalidSignature: |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 319 | logger.error('Verification failed, ignoring given signature.') |
Markus S. Wamser | 6ff2e3f | 2019-08-02 14:48:46 +0200 | [diff] [blame] | 320 | sys.exit(1) |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 321 | |
Donald Chan | 169eac1 | 2021-10-24 14:22:54 -0700 | [diff] [blame] | 322 | write_image_with_signature(sig) |
| 323 | logger.info('Successfully applied signature.') |
| 324 | |
Markus S. Wamser | 6ff2e3f | 2019-08-02 14:48:46 +0200 | [diff] [blame] | 325 | # dispatch command |
| 326 | { |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 327 | 'sign-enc': sign_encrypt_ta, |
Markus S. Wamser | 1cdd95a | 2019-04-30 12:03:12 +0200 | [diff] [blame] | 328 | 'digest': generate_digest, |
| 329 | 'generate-digest': generate_digest, |
| 330 | 'stitch': stitch_ta, |
| 331 | 'stitch-ta': stitch_ta |
Sumit Garg | 2de17fd | 2019-10-23 12:47:24 +0530 | [diff] [blame] | 332 | }.get(args.command, 'sign_encrypt_ta')() |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 333 | |
Jens Wiklander | bc42074 | 2015-05-05 14:59:15 +0200 | [diff] [blame] | 334 | |
| 335 | if __name__ == "__main__": |
Jens Wiklander | cd5cf43 | 2017-11-28 16:59:15 +0100 | [diff] [blame] | 336 | main() |