mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-03-28 19:21:08 +00:00
New test helper: mbedtls_test_key_consistency_psa_pk
Test that a PK key and a PSA key are consistent, i.e. that they have the same type (or are a key pair and the corresponding public key) and that they have the same public key. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
4da1f01f88
commit
6fe8a06f7e
@ -14,6 +14,10 @@
|
|||||||
|
|
||||||
#include <psa/crypto.h>
|
#include <psa/crypto.h>
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_C)
|
||||||
|
#include <mbedtls/pk.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
/** \def KNOWN_SUPPORTED_HASH_ALG
|
/** \def KNOWN_SUPPORTED_HASH_ALG
|
||||||
*
|
*
|
||||||
* A hash algorithm that is known to be supported.
|
* A hash algorithm that is known to be supported.
|
||||||
@ -237,4 +241,21 @@ psa_key_usage_t mbedtls_test_psa_usage_to_exercise(psa_key_type_t type,
|
|||||||
*/
|
*/
|
||||||
int mbedtls_test_can_exercise_psa_algorithm(psa_algorithm_t alg);
|
int mbedtls_test_can_exercise_psa_algorithm(psa_algorithm_t alg);
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_C)
|
||||||
|
/** PK-PSA key consistency test.
|
||||||
|
*
|
||||||
|
* This function tests that the pk context and the PSA key are
|
||||||
|
* consistent. At a minimum:
|
||||||
|
*
|
||||||
|
* - The two objects must contain keys of the same type,
|
||||||
|
* or a key pair and a public key of the matching type.
|
||||||
|
* - The two objects must have the same public key.
|
||||||
|
*
|
||||||
|
* \retval 0 The key failed the consistency tests.
|
||||||
|
* \retval 1 The key passed the consistency tests.
|
||||||
|
*/
|
||||||
|
int mbedtls_test_key_consistency_psa_pk(mbedtls_svc_key_id_t psa_key,
|
||||||
|
const mbedtls_pk_context *pk);
|
||||||
|
#endif /* MBEDTLS_PK_C */
|
||||||
|
|
||||||
#endif /* PSA_EXERCISE_KEY_H */
|
#endif /* PSA_EXERCISE_KEY_H */
|
||||||
|
@ -20,6 +20,16 @@
|
|||||||
#include <psa_crypto_slot_management.h>
|
#include <psa_crypto_slot_management.h>
|
||||||
#include <test/psa_crypto_helpers.h>
|
#include <test/psa_crypto_helpers.h>
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_C)
|
||||||
|
#include <pk_internal.h>
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_ECP_C)
|
||||||
|
#include <mbedtls/ecp.h>
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_RSA_C)
|
||||||
|
#include <rsa_internal.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
|
#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
|
||||||
static int lifetime_is_dynamic_secure_element(psa_key_lifetime_t lifetime)
|
static int lifetime_is_dynamic_secure_element(psa_key_lifetime_t lifetime)
|
||||||
{
|
{
|
||||||
@ -1054,4 +1064,97 @@ int mbedtls_test_can_exercise_psa_algorithm(psa_algorithm_t alg)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_C)
|
||||||
|
int mbedtls_test_key_consistency_psa_pk(mbedtls_svc_key_id_t psa_key,
|
||||||
|
const mbedtls_pk_context *pk)
|
||||||
|
{
|
||||||
|
psa_key_attributes_t psa_attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
psa_key_attributes_t pk_attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
int ok = 0;
|
||||||
|
|
||||||
|
PSA_ASSERT(psa_get_key_attributes(psa_key, &psa_attributes));
|
||||||
|
psa_key_type_t psa_type = psa_get_key_type(&psa_attributes);
|
||||||
|
mbedtls_pk_type_t pk_type = mbedtls_pk_get_type(pk);
|
||||||
|
|
||||||
|
TEST_ASSERT(PSA_KEY_TYPE_IS_PUBLIC_KEY(psa_type) ||
|
||||||
|
PSA_KEY_TYPE_IS_KEY_PAIR(psa_type));
|
||||||
|
TEST_EQUAL(psa_get_key_bits(&psa_attributes), mbedtls_pk_get_bitlen(pk));
|
||||||
|
|
||||||
|
uint8_t pk_public_buffer[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE];
|
||||||
|
const uint8_t *pk_public = NULL;
|
||||||
|
size_t pk_public_length = 0;
|
||||||
|
|
||||||
|
switch (pk_type) {
|
||||||
|
#if defined(MBEDTLS_RSA_C)
|
||||||
|
case MBEDTLS_PK_RSA:
|
||||||
|
TEST_ASSERT(PSA_KEY_TYPE_IS_RSA(psa_type));
|
||||||
|
const mbedtls_rsa_context *rsa = mbedtls_pk_rsa(*pk);
|
||||||
|
uint8_t *const end = pk_public_buffer + sizeof(pk_public_buffer);
|
||||||
|
uint8_t *cursor = end;
|
||||||
|
TEST_LE_U(1, mbedtls_rsa_write_pubkey(rsa,
|
||||||
|
pk_public_buffer, &cursor));
|
||||||
|
pk_public = cursor;
|
||||||
|
pk_public_length = end - pk_public;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
||||||
|
case MBEDTLS_PK_ECKEY:
|
||||||
|
case MBEDTLS_PK_ECKEY_DH:
|
||||||
|
case MBEDTLS_PK_ECDSA:
|
||||||
|
TEST_ASSERT(PSA_KEY_TYPE_IS_ECC(psa_type));
|
||||||
|
TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(psa_type), pk->ec_family);
|
||||||
|
pk_public = pk->pub_raw;
|
||||||
|
pk_public_length = pk->pub_raw_len;
|
||||||
|
break;
|
||||||
|
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS) && !defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
||||||
|
case MBEDTLS_PK_ECKEY:
|
||||||
|
case MBEDTLS_PK_ECKEY_DH:
|
||||||
|
case MBEDTLS_PK_ECDSA:
|
||||||
|
TEST_ASSERT(PSA_KEY_TYPE_IS_ECC(psa_get_key_type(&psa_attributes)));
|
||||||
|
const mbedtls_ecp_keypair *ec = mbedtls_pk_ec_ro(*pk);
|
||||||
|
TEST_EQUAL(mbedtls_ecp_write_public_key(
|
||||||
|
ec, MBEDTLS_ECP_PF_UNCOMPRESSED, &pk_public_length,
|
||||||
|
pk_public_buffer, sizeof(pk_public_buffer)), 0);
|
||||||
|
pk_public = pk_public_buffer;
|
||||||
|
break;
|
||||||
|
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS && !MBEDTLS_PK_USE_PSA_EC_DATA */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
|
case MBEDTLS_PK_OPAQUE:
|
||||||
|
PSA_ASSERT(psa_get_key_attributes(pk->priv_id, &pk_attributes));
|
||||||
|
psa_key_type_t pk_psa_type = psa_get_key_type(&pk_attributes);
|
||||||
|
TEST_EQUAL(PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(psa_type),
|
||||||
|
PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(pk_psa_type));
|
||||||
|
PSA_ASSERT(psa_export_public_key(psa_key,
|
||||||
|
pk_public_buffer,
|
||||||
|
sizeof(pk_public_buffer),
|
||||||
|
&pk_public_length));
|
||||||
|
pk_public = pk_public_buffer;
|
||||||
|
break;
|
||||||
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
||||||
|
|
||||||
|
default:
|
||||||
|
TEST_FAIL("pk type not supported");
|
||||||
|
}
|
||||||
|
|
||||||
|
uint8_t psa_public[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE];
|
||||||
|
size_t psa_public_length = 0;
|
||||||
|
PSA_ASSERT(psa_export_public_key(psa_key,
|
||||||
|
psa_public, sizeof(psa_public),
|
||||||
|
&psa_public_length));
|
||||||
|
TEST_MEMORY_COMPARE(pk_public, pk_public_length,
|
||||||
|
psa_public, psa_public_length);
|
||||||
|
|
||||||
|
ok = 1;
|
||||||
|
|
||||||
|
exit:
|
||||||
|
psa_reset_key_attributes(&psa_attributes);
|
||||||
|
psa_reset_key_attributes(&pk_attributes);
|
||||||
|
return ok;
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_PK_C */
|
||||||
|
|
||||||
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
||||||
|
Loading…
x
Reference in New Issue
Block a user