mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-03-04 04:13:40 +00:00
pk test suite: rename the parameter named parameter
Signed-off-by: Tomi Fontanilles <129057597+tomi-font@users.noreply.github.com>
This commit is contained in:
parent
573dc23141
commit
9c69348c24
@ -86,23 +86,23 @@ exit:
|
||||
*
|
||||
* \param pk The PK object to fill. It must have been initialized
|
||||
* with mbedtls_pk_setup().
|
||||
* \param parameter - For RSA keys, the key size in bits.
|
||||
* \param curve_or_keybits - For RSA keys, the key size in bits.
|
||||
* - For EC keys, the curve (\c MBEDTLS_ECP_DP_xxx).
|
||||
*
|
||||
* \return The status from the underlying type-specific key
|
||||
* generation function.
|
||||
* \return -1 if the key type is not recognized.
|
||||
*/
|
||||
static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
||||
static int pk_genkey(mbedtls_pk_context *pk, int curve_or_keybits)
|
||||
{
|
||||
((void) pk);
|
||||
(void) parameter;
|
||||
(void) pk;
|
||||
(void) curve_or_keybits;
|
||||
|
||||
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
||||
if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_RSA) {
|
||||
return mbedtls_rsa_gen_key(mbedtls_pk_rsa(*pk),
|
||||
mbedtls_test_rnd_std_rand, NULL,
|
||||
parameter, 3);
|
||||
curve_or_keybits, 3);
|
||||
}
|
||||
#endif
|
||||
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
||||
@ -112,7 +112,7 @@ static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
||||
int ret;
|
||||
|
||||
#if defined(MBEDTLS_ECP_C)
|
||||
ret = mbedtls_ecp_group_load(&mbedtls_pk_ec_rw(*pk)->grp, parameter);
|
||||
ret = mbedtls_ecp_group_load(&mbedtls_pk_ec_rw(*pk)->grp, curve_or_keybits);
|
||||
if (ret != 0) {
|
||||
return ret;
|
||||
}
|
||||
@ -123,7 +123,7 @@ static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
||||
#endif /* MBEDTLS_ECP_C */
|
||||
|
||||
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
||||
ret = pk_genkey_ec(pk, parameter);
|
||||
ret = pk_genkey_ec(pk, curve_or_keybits);
|
||||
if (ret != 0) {
|
||||
return ret;
|
||||
}
|
||||
@ -319,7 +319,7 @@ exit:
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_USE_PSA_CRYPTO */
|
||||
void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
||||
int key_alg2, int parameter, int alg_check, int usage_check,
|
||||
int key_alg2, int curve_or_keybits, int alg_check, int usage_check,
|
||||
int result)
|
||||
{
|
||||
mbedtls_pk_context pk;
|
||||
@ -336,7 +336,7 @@ void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
||||
psa_set_key_enrollment_algorithm(&attributes, key_alg2);
|
||||
}
|
||||
psa_set_key_type(&attributes, key_type);
|
||||
psa_set_key_bits(&attributes, parameter);
|
||||
psa_set_key_bits(&attributes, curve_or_keybits);
|
||||
|
||||
PSA_ASSERT(psa_generate_key(&attributes, &key));
|
||||
|
||||
@ -350,7 +350,7 @@ void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
||||
} else {
|
||||
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
||||
mbedtls_pk_info_from_type(key_type)), 0);
|
||||
TEST_EQUAL(pk_genkey(&pk, parameter), 0);
|
||||
TEST_EQUAL(pk_genkey(&pk, curve_or_keybits), 0);
|
||||
TEST_EQUAL(mbedtls_pk_get_type(&pk), key_type);
|
||||
}
|
||||
|
||||
@ -545,7 +545,7 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void pk_utils(int type, int parameter, int bitlen, int len, char *name)
|
||||
void pk_utils(int type, int curve_or_keybits, int bitlen, int len, char *name)
|
||||
{
|
||||
mbedtls_pk_context pk;
|
||||
|
||||
@ -553,7 +553,7 @@ void pk_utils(int type, int parameter, int bitlen, int len, char *name)
|
||||
USE_PSA_INIT();
|
||||
|
||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
||||
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
||||
TEST_ASSERT(pk_genkey(&pk, curve_or_keybits) == 0);
|
||||
|
||||
TEST_ASSERT((int) mbedtls_pk_get_type(&pk) == type);
|
||||
TEST_ASSERT(mbedtls_pk_can_do(&pk, type));
|
||||
@ -857,7 +857,7 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256 */
|
||||
void pk_sign_verify(int type, int parameter, int sign_ret, int verify_ret)
|
||||
void pk_sign_verify(int type, int curve_or_keybits, int sign_ret, int verify_ret)
|
||||
{
|
||||
mbedtls_pk_context pk;
|
||||
size_t sig_len;
|
||||
@ -883,7 +883,7 @@ void pk_sign_verify(int type, int parameter, int sign_ret, int verify_ret)
|
||||
memset(sig, 0, sizeof(sig));
|
||||
|
||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
||||
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
||||
TEST_ASSERT(pk_genkey(&pk, curve_or_keybits) == 0);
|
||||
|
||||
TEST_ASSERT(mbedtls_pk_sign_restartable(&pk, MBEDTLS_MD_SHA256,
|
||||
hash, hash_len,
|
||||
@ -1304,8 +1304,7 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_TEST_PK_PSA_SIGN */
|
||||
void pk_psa_sign(int parameter_arg,
|
||||
int psa_type_arg, int expected_bits_arg)
|
||||
void pk_psa_sign(int curve_or_keybits, int psa_type, int expected_bits)
|
||||
{
|
||||
mbedtls_pk_context pk;
|
||||
unsigned char hash[32];
|
||||
@ -1318,8 +1317,6 @@ void pk_psa_sign(int parameter_arg,
|
||||
int ret;
|
||||
mbedtls_svc_key_id_t key_id;
|
||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||
psa_key_type_t expected_type = psa_type_arg;
|
||||
size_t expected_bits = expected_bits_arg;
|
||||
|
||||
/*
|
||||
* This tests making signatures with a wrapped PSA key:
|
||||
@ -1333,19 +1330,19 @@ void pk_psa_sign(int parameter_arg,
|
||||
USE_PSA_INIT();
|
||||
|
||||
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
||||
if (PSA_KEY_TYPE_IS_RSA(psa_type_arg)) {
|
||||
if (PSA_KEY_TYPE_IS_RSA(psa_type)) {
|
||||
/* Create legacy RSA public/private key in PK context. */
|
||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||
TEST_ASSERT(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
||||
mbedtls_test_rnd_std_rand, NULL,
|
||||
parameter_arg, 3) == 0);
|
||||
curve_or_keybits, 3) == 0);
|
||||
alg_psa = PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256);
|
||||
} else
|
||||
#endif /* MBEDTLS_RSA_C && MBEDTLS_GENPRIME */
|
||||
#if defined(MBEDTLS_PK_CAN_ECDSA_SIGN)
|
||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type_arg)) {
|
||||
mbedtls_ecp_group_id grpid = parameter_arg;
|
||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type)) {
|
||||
mbedtls_ecp_group_id grpid = curve_or_keybits;
|
||||
|
||||
/* Create legacy EC public/private key in PK context. */
|
||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||
@ -1356,7 +1353,7 @@ void pk_psa_sign(int parameter_arg,
|
||||
} else
|
||||
#endif /* MBEDTLS_PK_CAN_ECDSA_SIGN */
|
||||
{
|
||||
(void) parameter_arg;
|
||||
(void) curve_or_keybits;
|
||||
TEST_ASSUME(!"Opaque PK key not supported in this configuration");
|
||||
}
|
||||
|
||||
@ -1384,8 +1381,8 @@ void pk_psa_sign(int parameter_arg,
|
||||
PSA_ALG_NONE) == 0);
|
||||
|
||||
PSA_ASSERT(psa_get_key_attributes(key_id, &attributes));
|
||||
TEST_EQUAL(psa_get_key_type(&attributes), expected_type);
|
||||
TEST_EQUAL(psa_get_key_bits(&attributes), expected_bits);
|
||||
TEST_EQUAL(psa_get_key_type(&attributes), (psa_key_type_t) psa_type);
|
||||
TEST_EQUAL(psa_get_key_bits(&attributes), (size_t) expected_bits);
|
||||
TEST_EQUAL(psa_get_key_lifetime(&attributes),
|
||||
PSA_KEY_LIFETIME_VOLATILE);
|
||||
|
||||
@ -1396,7 +1393,7 @@ void pk_psa_sign(int parameter_arg,
|
||||
hash, sizeof(hash), sig, sizeof(sig), &sig_len,
|
||||
NULL, NULL) == 0);
|
||||
/* Only opaque EC keys support verification. */
|
||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type_arg)) {
|
||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type)) {
|
||||
TEST_ASSERT(mbedtls_pk_verify(&pk, MBEDTLS_MD_SHA256,
|
||||
hash, sizeof(hash), sig, sig_len) == 0);
|
||||
}
|
||||
@ -1438,7 +1435,7 @@ void pk_psa_sign(int parameter_arg,
|
||||
mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY)), 0);
|
||||
TEST_EQUAL(mbedtls_ecp_group_load(
|
||||
&(mbedtls_pk_ec_rw(pk)->grp),
|
||||
(mbedtls_ecp_group_id) parameter_arg), 0);
|
||||
(mbedtls_ecp_group_id) curve_or_keybits), 0);
|
||||
TEST_EQUAL(mbedtls_ecp_point_read_binary(&(mbedtls_pk_ec_ro(pk)->grp),
|
||||
&(mbedtls_pk_ec_rw(pk)->Q),
|
||||
pkey_legacy_start, klen_legacy), 0);
|
||||
@ -1459,9 +1456,8 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_GENPRIME */
|
||||
void pk_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
||||
void pk_sign_ext(int pk_type, int curve_or_keybits, int key_pk_type, int md_alg)
|
||||
{
|
||||
/* See the description of pk_genkey() for the description of the `parameter` argument. */
|
||||
mbedtls_pk_context pk;
|
||||
size_t sig_len;
|
||||
unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE];
|
||||
@ -1477,7 +1473,7 @@ void pk_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
||||
|
||||
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
||||
mbedtls_pk_info_from_type(pk_type)), 0);
|
||||
TEST_EQUAL(pk_genkey(&pk, parameter), 0);
|
||||
TEST_EQUAL(pk_genkey(&pk, curve_or_keybits), 0);
|
||||
|
||||
TEST_EQUAL(mbedtls_pk_sign_ext(key_pk_type, &pk, md_alg, hash, hash_len,
|
||||
sig, sizeof(sig), &sig_len,
|
||||
@ -1498,9 +1494,8 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_GENPRIME:MBEDTLS_USE_PSA_CRYPTO */
|
||||
void pk_psa_wrap_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
||||
void pk_psa_wrap_sign_ext(int pk_type, int key_bits, int key_pk_type, int md_alg)
|
||||
{
|
||||
/* See the description of mbedtls_rsa_gen_key() for the description of the `parameter` argument. */
|
||||
mbedtls_pk_context pk;
|
||||
size_t sig_len, pkey_len;
|
||||
mbedtls_svc_key_id_t key_id;
|
||||
@ -1524,7 +1519,7 @@ void pk_psa_wrap_sign_ext(int pk_type, int parameter, int key_pk_type, int md_al
|
||||
mbedtls_pk_info_from_type(pk_type)), 0);
|
||||
TEST_EQUAL(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
||||
mbedtls_test_rnd_std_rand, NULL,
|
||||
parameter, 3), 0);
|
||||
key_bits, 3), 0);
|
||||
|
||||
/* Export underlying public key for re-importing in a legacy context. */
|
||||
ret = mbedtls_pk_write_pubkey_der(&pk, pkey, sizeof(pkey));
|
||||
|
Loading…
x
Reference in New Issue
Block a user