Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 1 | # Copyright (c) 2017,2019 Linaro Limited. |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 2 | # Copyright (c) 2017-2019, Arm Limited. |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | # you may not use this file except in compliance with the License. |
| 6 | # You may obtain a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | # See the License for the specific language governing permissions and |
| 14 | # limitations under the License. |
| 15 | |
| 16 | """ |
| 17 | Cryptographic key management for imgtool. |
| 18 | """ |
| 19 | |
Gabor Kertesz | 33e9b23 | 2018-09-12 15:38:41 +0200 | [diff] [blame] | 20 | from __future__ import print_function |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 21 | from cryptography.hazmat.backends import default_backend |
| 22 | from cryptography.hazmat.primitives import serialization |
| 23 | from cryptography.hazmat.primitives.hashes import SHA256 |
| 24 | from cryptography.hazmat.primitives.asymmetric import rsa |
| 25 | from cryptography.hazmat.primitives.asymmetric.padding import PSS, PKCS1v15 |
| 26 | from cryptography.hazmat.primitives.asymmetric.padding import MGF1 |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 27 | import hashlib |
| 28 | from pyasn1.type import namedtype, univ |
| 29 | from pyasn1.codec.der.encoder import encode |
| 30 | |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 31 | # Sizes that bootutil will recognize |
| 32 | RSA_KEY_SIZES = [2048, 3072] |
| 33 | |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 34 | # Public exponent |
| 35 | PUBLIC_EXPONENT = 65537 |
| 36 | |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 37 | # By default, we use RSA-PSS (PKCS 2.1). That can be overridden on |
| 38 | # the command line to support the older (less secure) PKCS1.5 |
| 39 | sign_rsa_pss = True |
| 40 | |
| 41 | AUTOGEN_MESSAGE = "/* Autogenerated by imgtool.py, do not edit. */" |
| 42 | |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 43 | class RSAUsageError(Exception): |
| 44 | pass |
| 45 | |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 46 | class RSAutil(): |
Tamas Ban | 32d8464 | 2019-07-11 08:25:11 +0100 | [diff] [blame] | 47 | def __init__(self, key, public_key_format='hash'): |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 48 | """Construct an RSA key with the given key data""" |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 49 | self.key = key |
Tamas Ban | 32d8464 | 2019-07-11 08:25:11 +0100 | [diff] [blame] | 50 | self.public_key_format = public_key_format |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 51 | |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 52 | def key_size(self): |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 53 | return self.key.key_size |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 54 | |
Tamas Ban | 32d8464 | 2019-07-11 08:25:11 +0100 | [diff] [blame] | 55 | def get_public_key_format(self): |
| 56 | return self.public_key_format |
| 57 | |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 58 | @staticmethod |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 59 | def generate(key_size=2048): |
| 60 | if key_size not in RSA_KEY_SIZES: |
| 61 | raise RSAUsageError("Key size {} is not supported by MCUboot" |
| 62 | .format(key_size)) |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 63 | return RSAutil(rsa.generate_private_key( |
| 64 | public_exponent=PUBLIC_EXPONENT, |
| 65 | key_size=key_size, |
| 66 | backend=default_backend())) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 67 | |
| 68 | def export_private(self, path): |
| 69 | with open(path, 'wb') as f: |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 70 | f.write(self.key.private_bytes( |
| 71 | encoding=serialization.Encoding.PEM, |
| 72 | format=serialization.PrivateFormat.TraditionalOpenSSL, |
| 73 | encryption_algorithm=serialization.NoEncryption())) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 74 | |
| 75 | def get_public_bytes(self): |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 76 | return self.key.public_key().public_bytes( |
| 77 | encoding=serialization.Encoding.DER, |
| 78 | format=serialization.PublicFormat.PKCS1) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 79 | |
| 80 | def emit_c(self): |
| 81 | print(AUTOGEN_MESSAGE) |
| 82 | print("const unsigned char rsa_pub_key[] = {", end='') |
| 83 | encoded = self.get_public_bytes() |
| 84 | for count, b in enumerate(encoded): |
| 85 | if count % 8 == 0: |
| 86 | print("\n\t", end='') |
| 87 | else: |
| 88 | print(" ", end='') |
| 89 | print("0x{:02x},".format(b), end='') |
| 90 | print("\n};") |
| 91 | print("const unsigned int rsa_pub_key_len = {};".format(len(encoded))) |
| 92 | |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 93 | def sig_type(self): |
| 94 | """Return the type of this signature (as a string)""" |
| 95 | if sign_rsa_pss: |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 96 | return "PKCS1_PSS_RSA{}_SHA256".format(self.key_size()) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 97 | else: |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 98 | return "PKCS15_RSA{}_SHA256".format(self.key_size()) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 99 | |
| 100 | def sig_len(self): |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 101 | return 256 if self.key_size() == 2048 else 384 |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 102 | |
| 103 | def sig_tlv(self): |
Tamas Ban | 861835c | 2019-05-13 08:59:38 +0100 | [diff] [blame] | 104 | return "RSA2048" if self.key_size() == 2048 else "RSA3072" |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 105 | |
| 106 | def sign(self, payload): |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 107 | if sign_rsa_pss: |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 108 | signature = self.key.sign( |
Kevin Townsend | bf5b98c | 2020-06-02 12:23:57 +0200 | [diff] [blame] | 109 | data=bytes(payload), |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 110 | padding=PSS( |
| 111 | mgf=MGF1(SHA256()), |
| 112 | salt_length=32 |
| 113 | ), |
| 114 | algorithm=SHA256() |
| 115 | ) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 116 | else: |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 117 | signature = self.key.sign( |
Kevin Townsend | bf5b98c | 2020-06-02 12:23:57 +0200 | [diff] [blame] | 118 | data=bytes(payload), |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 119 | padding=PKCS1v15(), |
| 120 | algorithm=SHA256() |
| 121 | ) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 122 | assert len(signature) == self.sig_len() |
| 123 | return signature |
| 124 | |
Tamas Ban | 32d8464 | 2019-07-11 08:25:11 +0100 | [diff] [blame] | 125 | def load(path, public_key_format='hash'): |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 126 | with open(path, 'rb') as f: |
| 127 | pem = f.read() |
| 128 | try: |
Kevin Townsend | 0f869bb | 2019-08-01 21:06:48 +0200 | [diff] [blame] | 129 | key = serialization.load_pem_private_key( |
| 130 | pem, |
| 131 | password=None, |
| 132 | backend=default_backend() |
| 133 | ) |
Tamas Ban | 32d8464 | 2019-07-11 08:25:11 +0100 | [diff] [blame] | 134 | return RSAutil(key, public_key_format) |
Tamas Ban | f70ef8c | 2017-12-19 15:35:09 +0000 | [diff] [blame] | 135 | except ValueError: |
Tamas Ban | 581034a | 2017-12-19 19:54:37 +0000 | [diff] [blame] | 136 | raise Exception("Unsupported RSA key file") |