mirror of
				https://github.com/Mbed-TLS/mbedtls.git
				synced 2025-10-30 10:45:34 +03:00 
			
		
		
		
	Change these to point to the new mbedtls_framework module in the framework submodule. Signed-off-by: David Horstmann <david.horstmann@arm.com>
		
			
				
	
	
		
			186 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			6.5 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
| #!/usr/bin/env python3
 | |
| 
 | |
| # Copyright The Mbed TLS Contributors
 | |
| # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 | |
| 
 | |
| """Module generating EC and RSA keys to be used in test_suite_pk instead of
 | |
| generating the required key at run time. This helps speeding up testing."""
 | |
| 
 | |
| from typing import Iterator, List, Tuple
 | |
| import re
 | |
| import argparse
 | |
| import scripts_path # pylint: disable=unused-import
 | |
| from mbedtls_framework.asymmetric_key_data import ASYMMETRIC_KEY_DATA
 | |
| from mbedtls_framework.build_tree import guess_project_root
 | |
| 
 | |
| BYTES_PER_LINE = 16
 | |
| 
 | |
| def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]:
 | |
|     yield 'const unsigned char '
 | |
|     yield array_name
 | |
|     yield '[] = {'
 | |
|     for index in range(0, len(key_data), BYTES_PER_LINE):
 | |
|         yield '\n   '
 | |
|         for b in key_data[index:index + BYTES_PER_LINE]:
 | |
|             yield ' {:#04x},'.format(b)
 | |
|     yield '\n};'
 | |
| 
 | |
| def convert_der_to_c(array_name: str, key_data: bytes) -> str:
 | |
|     return ''.join(c_byte_array_literal_content(array_name, key_data))
 | |
| 
 | |
| def get_key_type(key: str) -> str:
 | |
|     if re.match('PSA_KEY_TYPE_RSA_.*', key):
 | |
|         return "rsa"
 | |
|     elif re.match('PSA_KEY_TYPE_ECC_.*', key):
 | |
|         return "ec"
 | |
|     else:
 | |
|         print("Unhandled key type {}".format(key))
 | |
|         return "unknown"
 | |
| 
 | |
| def get_ec_key_family(key: str) -> str:
 | |
|     match = re.search(r'.*\((.*)\)', key)
 | |
|     if match is None:
 | |
|         raise Exception("Unable to get EC family from {}".format(key))
 | |
|     return match.group(1)
 | |
| 
 | |
| # Legacy EC group ID do not support all the key types that PSA does, so the
 | |
| # following dictionaries are used for:
 | |
| # - getting prefix/suffix for legacy curve names
 | |
| # - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...)
 | |
| EC_NAME_CONVERSION = {
 | |
|     'PSA_ECC_FAMILY_SECP_K1': {
 | |
|         192: ('secp', 'k1'),
 | |
|         224: ('secp', 'k1'),
 | |
|         256: ('secp', 'k1')
 | |
|     },
 | |
|     'PSA_ECC_FAMILY_SECP_R1': {
 | |
|         192: ('secp', 'r1'),
 | |
|         224: ('secp', 'r1'),
 | |
|         256: ('secp', 'r1'),
 | |
|         384: ('secp', 'r1'),
 | |
|         521: ('secp', 'r1')
 | |
|     },
 | |
|     'PSA_ECC_FAMILY_BRAINPOOL_P_R1': {
 | |
|         256: ('bp', 'r1'),
 | |
|         384: ('bp', 'r1'),
 | |
|         512: ('bp', 'r1')
 | |
|     },
 | |
|     'PSA_ECC_FAMILY_MONTGOMERY': {
 | |
|         255: ('curve', '19'),
 | |
|         448: ('curve', '')
 | |
|     }
 | |
| }
 | |
| 
 | |
| def get_ec_curve_name(priv_key: str, bits: int) -> str:
 | |
|     ec_family = get_ec_key_family(priv_key)
 | |
|     try:
 | |
|         prefix = EC_NAME_CONVERSION[ec_family][bits][0]
 | |
|         suffix = EC_NAME_CONVERSION[ec_family][bits][1]
 | |
|     except KeyError:
 | |
|         return ""
 | |
|     return prefix + str(bits) + suffix
 | |
| 
 | |
| def get_look_up_table_entry(key_type: str, group_id_or_keybits: str,
 | |
|                             priv_array_name: str, pub_array_name: str) -> Iterator[str]:
 | |
|     if key_type == "ec":
 | |
|         yield "    {{ {}, 0,\n".format(group_id_or_keybits)
 | |
|     else:
 | |
|         yield "    {{ 0, {},\n".format(group_id_or_keybits)
 | |
|     yield "      {0}, sizeof({0}),\n".format(priv_array_name)
 | |
|     yield "      {0}, sizeof({0}) }},".format(pub_array_name)
 | |
| 
 | |
| 
 | |
| def write_output_file(output_file_name: str, arrays: str, look_up_table: str):
 | |
|     with open(output_file_name, 'wt') as output:
 | |
|         output.write("""\
 | |
| /*********************************************************************************
 | |
|  * This file was automatically generated from tests/scripts/generate_test_keys.py.
 | |
|  * Please do not edit it manually.
 | |
|  *********************************************************************************/
 | |
| """)
 | |
|         output.write(arrays)
 | |
|         output.write("""
 | |
| struct predefined_key_element {{
 | |
|     int group_id;  // EC group ID; 0 for RSA keys
 | |
|     int keybits;  // bits size of RSA key; 0 for EC keys
 | |
|     const unsigned char *priv_key;
 | |
|     size_t priv_key_len;
 | |
|     const unsigned char *pub_key;
 | |
|     size_t pub_key_len;
 | |
| }};
 | |
| 
 | |
| struct predefined_key_element predefined_keys[] = {{
 | |
| {}
 | |
| }};
 | |
| 
 | |
| /* End of generated file */
 | |
| """.format(look_up_table))
 | |
| 
 | |
| def collect_keys() -> Tuple[str, str]:
 | |
|     """"
 | |
|     This function reads key data from ASYMMETRIC_KEY_DATA and, only for the
 | |
|     keys supported in legacy ECP/RSA modules, it returns 2 strings:
 | |
|     - the 1st contains C arrays declaration of these keys and
 | |
|     - the 2nd contains the final look-up table for all these arrays.
 | |
|     """
 | |
|     arrays = []
 | |
|     look_up_table = []
 | |
| 
 | |
|     # Get a list of private keys only in order to get a single item for every
 | |
|     # (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA
 | |
|     # contains also the public counterpart.
 | |
|     priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key]
 | |
|     priv_keys = sorted(priv_keys)
 | |
| 
 | |
|     for priv_key in priv_keys:
 | |
|         key_type = get_key_type(priv_key)
 | |
|         # Ignore keys which are not EC or RSA
 | |
|         if key_type == "unknown":
 | |
|             continue
 | |
| 
 | |
|         pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key)
 | |
| 
 | |
|         for bits in ASYMMETRIC_KEY_DATA[priv_key]:
 | |
|             if key_type == "ec":
 | |
|                 curve = get_ec_curve_name(priv_key, bits)
 | |
|                 # Ignore EC curves unsupported in legacy symbols
 | |
|                 if curve == "":
 | |
|                     continue
 | |
|             # Create output array name
 | |
|             if key_type == "rsa":
 | |
|                 array_name_base = "_".join(["test", key_type, str(bits)])
 | |
|             else:
 | |
|                 array_name_base = "_".join(["test", key_type, curve])
 | |
|             array_name_priv = array_name_base + "_priv"
 | |
|             array_name_pub = array_name_base + "_pub"
 | |
|             # Convert bytearray to C array
 | |
|             c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits])
 | |
|             c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits])
 | |
|             # Write the C array to the output file
 | |
|             arrays.append(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"]))
 | |
|             # Update the lookup table
 | |
|             if key_type == "ec":
 | |
|                 group_id_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper()
 | |
|             else:
 | |
|                 group_id_or_keybits = str(bits)
 | |
|             look_up_table.append(''.join(get_look_up_table_entry(key_type, group_id_or_keybits,
 | |
|                                                                  array_name_priv, array_name_pub)))
 | |
| 
 | |
|     return ''.join(arrays), '\n'.join(look_up_table)
 | |
| 
 | |
| def main() -> None:
 | |
|     default_output_path = guess_project_root() + "/tests/src/test_keys.h"
 | |
| 
 | |
|     argparser = argparse.ArgumentParser()
 | |
|     argparser.add_argument("--output", help="Output file", default=default_output_path)
 | |
|     args = argparser.parse_args()
 | |
| 
 | |
|     output_file = args.output
 | |
| 
 | |
|     arrays, look_up_table = collect_keys()
 | |
| 
 | |
|     write_output_file(output_file, arrays, look_up_table)
 | |
| 
 | |
| if __name__ == '__main__':
 | |
|     main()
 |