Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 1 | """ |
| 2 | Tests for ECDSA keys |
| 3 | """ |
| 4 | |
David Brown | 79c4fcf | 2021-01-26 15:04:05 -0700 | [diff] [blame] | 5 | # SPDX-License-Identifier: Apache-2.0 |
| 6 | |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 7 | import hashlib |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 8 | import io |
| 9 | import os.path |
| 10 | import sys |
| 11 | import tempfile |
| 12 | import unittest |
| 13 | |
| 14 | from cryptography.exceptions import InvalidSignature |
| 15 | from cryptography.hazmat.primitives.asymmetric import ed25519 |
| 16 | |
| 17 | sys.path.insert(0, os.path.abspath(os.path.join(os.path.dirname(__file__), '../..'))) |
| 18 | |
| 19 | from imgtool.keys import load, Ed25519, Ed25519UsageError |
| 20 | |
| 21 | |
| 22 | class Ed25519KeyGeneration(unittest.TestCase): |
| 23 | |
| 24 | def setUp(self): |
| 25 | self.test_dir = tempfile.TemporaryDirectory() |
| 26 | |
| 27 | def tname(self, base): |
| 28 | return os.path.join(self.test_dir.name, base) |
| 29 | |
| 30 | def tearDown(self): |
| 31 | self.test_dir.cleanup() |
| 32 | |
| 33 | def test_keygen(self): |
| 34 | name1 = self.tname("keygen.pem") |
| 35 | k = Ed25519.generate() |
| 36 | k.export_private(name1, b'secret') |
| 37 | |
| 38 | self.assertIsNone(load(name1)) |
| 39 | |
| 40 | k2 = load(name1, b'secret') |
| 41 | |
| 42 | pubname = self.tname('keygen-pub.pem') |
| 43 | k2.export_public(pubname) |
| 44 | pk2 = load(pubname) |
| 45 | |
| 46 | # We should be able to export the public key from the loaded |
| 47 | # public key, but not the private key. |
| 48 | pk2.export_public(self.tname('keygen-pub2.pem')) |
| 49 | self.assertRaises(Ed25519UsageError, |
| 50 | pk2.export_private, self.tname('keygen-priv2.pem')) |
| 51 | |
| 52 | def test_emit(self): |
| 53 | """Basic sanity check on the code emitters.""" |
| 54 | k = Ed25519.generate() |
| 55 | |
| 56 | ccode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 57 | k.emit_c_public(ccode) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 58 | self.assertIn("ed25519_pub_key", ccode.getvalue()) |
| 59 | self.assertIn("ed25519_pub_key_len", ccode.getvalue()) |
| 60 | |
| 61 | rustcode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 62 | k.emit_rust_public(rustcode) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 63 | self.assertIn("ED25519_PUB_KEY", rustcode.getvalue()) |
| 64 | |
| 65 | def test_emit_pub(self): |
| 66 | """Basic sanity check on the code emitters.""" |
| 67 | pubname = self.tname("public.pem") |
| 68 | k = Ed25519.generate() |
| 69 | k.export_public(pubname) |
| 70 | |
| 71 | k2 = load(pubname) |
| 72 | |
| 73 | ccode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 74 | k2.emit_c_public(ccode) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 75 | self.assertIn("ed25519_pub_key", ccode.getvalue()) |
| 76 | self.assertIn("ed25519_pub_key_len", ccode.getvalue()) |
| 77 | |
| 78 | rustcode = io.StringIO() |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 79 | k2.emit_rust_public(rustcode) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 80 | self.assertIn("ED25519_PUB_KEY", rustcode.getvalue()) |
| 81 | |
| 82 | def test_sig(self): |
| 83 | k = Ed25519.generate() |
| 84 | buf = b'This is the message' |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 85 | sha = hashlib.sha256() |
| 86 | sha.update(buf) |
| 87 | digest = sha.digest() |
| 88 | sig = k.sign_digest(digest) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 89 | |
| 90 | # The code doesn't have any verification, so verify this |
| 91 | # manually. |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 92 | k.key.public_key().verify(signature=sig, data=digest) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 93 | |
| 94 | # Modify the message to make sure the signature fails. |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 95 | sha = hashlib.sha256() |
| 96 | sha.update(b'This is thE message') |
| 97 | new_digest = sha.digest() |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 98 | self.assertRaises(InvalidSignature, |
| 99 | k.key.public_key().verify, |
| 100 | signature=sig, |
Fabio Utzig | 9560d77 | 2020-04-02 13:44:30 -0300 | [diff] [blame] | 101 | data=new_digest) |
Fabio Utzig | 8101d1f | 2019-05-09 15:03:22 -0300 | [diff] [blame] | 102 | |
| 103 | |
| 104 | if __name__ == '__main__': |
| 105 | unittest.main() |