#!/usr/bin/env python3 # Copyright The Mbed TLS Contributors # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later """Module generating EC and RSA keys to be used in test_suite_pk instead of generating the required key at run time. This helps speeding up testing.""" from typing import Iterator, List, Tuple import re import argparse import scripts_path # pylint: disable=unused-import from mbedtls_framework.asymmetric_key_data import ASYMMETRIC_KEY_DATA from mbedtls_framework.build_tree import guess_project_root BYTES_PER_LINE = 16 def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]: yield 'const unsigned char ' yield array_name yield '[] = {' for index in range(0, len(key_data), BYTES_PER_LINE): yield '\n ' for b in key_data[index:index + BYTES_PER_LINE]: yield ' {:#04x},'.format(b) yield '\n};' def convert_der_to_c(array_name: str, key_data: bytes) -> str: return ''.join(c_byte_array_literal_content(array_name, key_data)) def get_key_type(key: str) -> str: if re.match('PSA_KEY_TYPE_RSA_.*', key): return "rsa" elif re.match('PSA_KEY_TYPE_ECC_.*', key): return "ec" else: print("Unhandled key type {}".format(key)) return "unknown" def get_ec_key_family(key: str) -> str: match = re.search(r'.*\((.*)\)', key) if match is None: raise Exception("Unable to get EC family from {}".format(key)) return match.group(1) # Legacy EC group ID do not support all the key types that PSA does, so the # following dictionaries are used for: # - getting prefix/suffix for legacy curve names # - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...) EC_NAME_CONVERSION = { 'PSA_ECC_FAMILY_SECP_K1': { 192: ('secp', 'k1'), 224: ('secp', 'k1'), 256: ('secp', 'k1') }, 'PSA_ECC_FAMILY_SECP_R1': { 192: ('secp', 'r1'), 224: ('secp', 'r1'), 256: ('secp', 'r1'), 384: ('secp', 'r1'), 521: ('secp', 'r1') }, 'PSA_ECC_FAMILY_BRAINPOOL_P_R1': { 256: ('bp', 'r1'), 384: ('bp', 'r1'), 512: ('bp', 'r1') }, 'PSA_ECC_FAMILY_MONTGOMERY': { 255: ('curve', '19'), 448: ('curve', '') } } def get_ec_curve_name(priv_key: str, bits: int) -> str: ec_family = get_ec_key_family(priv_key) try: prefix = EC_NAME_CONVERSION[ec_family][bits][0] suffix = EC_NAME_CONVERSION[ec_family][bits][1] except KeyError: return "" return prefix + str(bits) + suffix def get_look_up_table_entry(key_type: str, group_id_or_keybits: str, priv_array_name: str, pub_array_name: str) -> Iterator[str]: if key_type == "ec": yield " {{ {}, 0,\n".format(group_id_or_keybits) else: yield " {{ 0, {},\n".format(group_id_or_keybits) yield " {0}, sizeof({0}),\n".format(priv_array_name) yield " {0}, sizeof({0}) }},".format(pub_array_name) def write_output_file(output_file_name: str, arrays: str, look_up_table: str): with open(output_file_name, 'wt') as output: output.write("""\ /********************************************************************************* * This file was automatically generated from tests/scripts/generate_test_keys.py. * Please do not edit it manually. *********************************************************************************/ """) output.write(arrays) output.write(""" struct predefined_key_element {{ int group_id; // EC group ID; 0 for RSA keys int keybits; // bits size of RSA key; 0 for EC keys const unsigned char *priv_key; size_t priv_key_len; const unsigned char *pub_key; size_t pub_key_len; }}; struct predefined_key_element predefined_keys[] = {{ {} }}; /* End of generated file */ """.format(look_up_table)) def collect_keys() -> Tuple[str, str]: """" This function reads key data from ASYMMETRIC_KEY_DATA and, only for the keys supported in legacy ECP/RSA modules, it returns 2 strings: - the 1st contains C arrays declaration of these keys and - the 2nd contains the final look-up table for all these arrays. """ arrays = [] look_up_table = [] # Get a list of private keys only in order to get a single item for every # (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA # contains also the public counterpart. priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key] priv_keys = sorted(priv_keys) for priv_key in priv_keys: key_type = get_key_type(priv_key) # Ignore keys which are not EC or RSA if key_type == "unknown": continue pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key) for bits in ASYMMETRIC_KEY_DATA[priv_key]: if key_type == "ec": curve = get_ec_curve_name(priv_key, bits) # Ignore EC curves unsupported in legacy symbols if curve == "": continue # Create output array name if key_type == "rsa": array_name_base = "_".join(["test", key_type, str(bits)]) else: array_name_base = "_".join(["test", key_type, curve]) array_name_priv = array_name_base + "_priv" array_name_pub = array_name_base + "_pub" # Convert bytearray to C array c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits]) c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits]) # Write the C array to the output file arrays.append(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"])) # Update the lookup table if key_type == "ec": group_id_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper() else: group_id_or_keybits = str(bits) look_up_table.append(''.join(get_look_up_table_entry(key_type, group_id_or_keybits, array_name_priv, array_name_pub))) return ''.join(arrays), '\n'.join(look_up_table) def main() -> None: default_output_path = guess_project_root() + "/tests/src/test_keys.h" argparser = argparse.ArgumentParser() argparser.add_argument("--output", help="Output file", default=default_output_path) args = argparser.parse_args() output_file = args.output arrays, look_up_table = collect_keys() write_output_file(output_file, arrays, look_up_table) if __name__ == '__main__': main()