mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-01-03 23:43:40 +00:00
cd84bb287b
Change these to point to the new mbedtls_framework module in the framework submodule. Signed-off-by: David Horstmann <david.horstmann@arm.com>
186 lines
6.5 KiB
Python
Executable File
186 lines
6.5 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
|
|
# Copyright The Mbed TLS Contributors
|
|
# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
|
|
|
"""Module generating EC and RSA keys to be used in test_suite_pk instead of
|
|
generating the required key at run time. This helps speeding up testing."""
|
|
|
|
from typing import Iterator, List, Tuple
|
|
import re
|
|
import argparse
|
|
import scripts_path # pylint: disable=unused-import
|
|
from mbedtls_framework.asymmetric_key_data import ASYMMETRIC_KEY_DATA
|
|
from mbedtls_framework.build_tree import guess_project_root
|
|
|
|
BYTES_PER_LINE = 16
|
|
|
|
def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]:
|
|
yield 'const unsigned char '
|
|
yield array_name
|
|
yield '[] = {'
|
|
for index in range(0, len(key_data), BYTES_PER_LINE):
|
|
yield '\n '
|
|
for b in key_data[index:index + BYTES_PER_LINE]:
|
|
yield ' {:#04x},'.format(b)
|
|
yield '\n};'
|
|
|
|
def convert_der_to_c(array_name: str, key_data: bytes) -> str:
|
|
return ''.join(c_byte_array_literal_content(array_name, key_data))
|
|
|
|
def get_key_type(key: str) -> str:
|
|
if re.match('PSA_KEY_TYPE_RSA_.*', key):
|
|
return "rsa"
|
|
elif re.match('PSA_KEY_TYPE_ECC_.*', key):
|
|
return "ec"
|
|
else:
|
|
print("Unhandled key type {}".format(key))
|
|
return "unknown"
|
|
|
|
def get_ec_key_family(key: str) -> str:
|
|
match = re.search(r'.*\((.*)\)', key)
|
|
if match is None:
|
|
raise Exception("Unable to get EC family from {}".format(key))
|
|
return match.group(1)
|
|
|
|
# Legacy EC group ID do not support all the key types that PSA does, so the
|
|
# following dictionaries are used for:
|
|
# - getting prefix/suffix for legacy curve names
|
|
# - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...)
|
|
EC_NAME_CONVERSION = {
|
|
'PSA_ECC_FAMILY_SECP_K1': {
|
|
192: ('secp', 'k1'),
|
|
224: ('secp', 'k1'),
|
|
256: ('secp', 'k1')
|
|
},
|
|
'PSA_ECC_FAMILY_SECP_R1': {
|
|
192: ('secp', 'r1'),
|
|
224: ('secp', 'r1'),
|
|
256: ('secp', 'r1'),
|
|
384: ('secp', 'r1'),
|
|
521: ('secp', 'r1')
|
|
},
|
|
'PSA_ECC_FAMILY_BRAINPOOL_P_R1': {
|
|
256: ('bp', 'r1'),
|
|
384: ('bp', 'r1'),
|
|
512: ('bp', 'r1')
|
|
},
|
|
'PSA_ECC_FAMILY_MONTGOMERY': {
|
|
255: ('curve', '19'),
|
|
448: ('curve', '')
|
|
}
|
|
}
|
|
|
|
def get_ec_curve_name(priv_key: str, bits: int) -> str:
|
|
ec_family = get_ec_key_family(priv_key)
|
|
try:
|
|
prefix = EC_NAME_CONVERSION[ec_family][bits][0]
|
|
suffix = EC_NAME_CONVERSION[ec_family][bits][1]
|
|
except KeyError:
|
|
return ""
|
|
return prefix + str(bits) + suffix
|
|
|
|
def get_look_up_table_entry(key_type: str, group_id_or_keybits: str,
|
|
priv_array_name: str, pub_array_name: str) -> Iterator[str]:
|
|
if key_type == "ec":
|
|
yield " {{ {}, 0,\n".format(group_id_or_keybits)
|
|
else:
|
|
yield " {{ 0, {},\n".format(group_id_or_keybits)
|
|
yield " {0}, sizeof({0}),\n".format(priv_array_name)
|
|
yield " {0}, sizeof({0}) }},".format(pub_array_name)
|
|
|
|
|
|
def write_output_file(output_file_name: str, arrays: str, look_up_table: str):
|
|
with open(output_file_name, 'wt') as output:
|
|
output.write("""\
|
|
/*********************************************************************************
|
|
* This file was automatically generated from tests/scripts/generate_test_keys.py.
|
|
* Please do not edit it manually.
|
|
*********************************************************************************/
|
|
""")
|
|
output.write(arrays)
|
|
output.write("""
|
|
struct predefined_key_element {{
|
|
int group_id; // EC group ID; 0 for RSA keys
|
|
int keybits; // bits size of RSA key; 0 for EC keys
|
|
const unsigned char *priv_key;
|
|
size_t priv_key_len;
|
|
const unsigned char *pub_key;
|
|
size_t pub_key_len;
|
|
}};
|
|
|
|
struct predefined_key_element predefined_keys[] = {{
|
|
{}
|
|
}};
|
|
|
|
/* End of generated file */
|
|
""".format(look_up_table))
|
|
|
|
def collect_keys() -> Tuple[str, str]:
|
|
""""
|
|
This function reads key data from ASYMMETRIC_KEY_DATA and, only for the
|
|
keys supported in legacy ECP/RSA modules, it returns 2 strings:
|
|
- the 1st contains C arrays declaration of these keys and
|
|
- the 2nd contains the final look-up table for all these arrays.
|
|
"""
|
|
arrays = []
|
|
look_up_table = []
|
|
|
|
# Get a list of private keys only in order to get a single item for every
|
|
# (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA
|
|
# contains also the public counterpart.
|
|
priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key]
|
|
priv_keys = sorted(priv_keys)
|
|
|
|
for priv_key in priv_keys:
|
|
key_type = get_key_type(priv_key)
|
|
# Ignore keys which are not EC or RSA
|
|
if key_type == "unknown":
|
|
continue
|
|
|
|
pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key)
|
|
|
|
for bits in ASYMMETRIC_KEY_DATA[priv_key]:
|
|
if key_type == "ec":
|
|
curve = get_ec_curve_name(priv_key, bits)
|
|
# Ignore EC curves unsupported in legacy symbols
|
|
if curve == "":
|
|
continue
|
|
# Create output array name
|
|
if key_type == "rsa":
|
|
array_name_base = "_".join(["test", key_type, str(bits)])
|
|
else:
|
|
array_name_base = "_".join(["test", key_type, curve])
|
|
array_name_priv = array_name_base + "_priv"
|
|
array_name_pub = array_name_base + "_pub"
|
|
# Convert bytearray to C array
|
|
c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits])
|
|
c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits])
|
|
# Write the C array to the output file
|
|
arrays.append(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"]))
|
|
# Update the lookup table
|
|
if key_type == "ec":
|
|
group_id_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper()
|
|
else:
|
|
group_id_or_keybits = str(bits)
|
|
look_up_table.append(''.join(get_look_up_table_entry(key_type, group_id_or_keybits,
|
|
array_name_priv, array_name_pub)))
|
|
|
|
return ''.join(arrays), '\n'.join(look_up_table)
|
|
|
|
def main() -> None:
|
|
default_output_path = guess_project_root() + "/tests/src/test_keys.h"
|
|
|
|
argparser = argparse.ArgumentParser()
|
|
argparser.add_argument("--output", help="Output file", default=default_output_path)
|
|
args = argparser.parse_args()
|
|
|
|
output_file = args.output
|
|
|
|
arrays, look_up_table = collect_keys()
|
|
|
|
write_output_file(output_file, arrays, look_up_table)
|
|
|
|
if __name__ == '__main__':
|
|
main()
|