mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-04 04:20:43 +00:00
This helps removing the previous pylint exception. Also use "with" statement for opening the file in order to ensure that all the content is flushed to the file before exiting. Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
174 lines
6.1 KiB
Python
Executable File
174 lines
6.1 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
|
|
# Copyright The Mbed TLS Contributors
|
|
# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
|
|
|
"""Module generating EC and RSA keys to be used in test_suite_pk instead of
|
|
generating the required key at run time. This helps speeding up testing."""
|
|
|
|
from typing import Iterator, List
|
|
import re
|
|
import argparse
|
|
import scripts_path # pylint: disable=unused-import
|
|
from mbedtls_dev.asymmetric_key_data import ASYMMETRIC_KEY_DATA
|
|
from mbedtls_dev.build_tree import guess_project_root
|
|
|
|
BYTES_PER_LINE = 16
|
|
|
|
def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]:
|
|
yield 'const unsigned char '
|
|
yield array_name
|
|
yield '[] = {'
|
|
for index in range(0, len(key_data), BYTES_PER_LINE):
|
|
yield '\n '
|
|
for b in key_data[index:index + BYTES_PER_LINE]:
|
|
yield ' {:#04x},'.format(b)
|
|
yield '\n};'
|
|
|
|
def convert_der_to_c(array_name: str, key_data: bytes) -> str:
|
|
return ''.join(c_byte_array_literal_content(array_name, key_data))
|
|
|
|
def get_key_type(key: str) -> str:
|
|
if re.match('PSA_KEY_TYPE_RSA_.*', key):
|
|
return "rsa"
|
|
elif re.match('PSA_KEY_TYPE_ECC_.*', key):
|
|
return "ec"
|
|
else:
|
|
print("Unhandled key type {}".format(key))
|
|
return "unknown"
|
|
|
|
def get_ec_key_family(key: str) -> str:
|
|
match = re.search(r'.*\((.*)\)', key)
|
|
if match is None:
|
|
raise Exception("Unable to get EC family from {}".format(key))
|
|
return match.group(1)
|
|
|
|
# Legacy EC group ID do not support all the key types that PSA does, so the
|
|
# following dictionaries are used for:
|
|
# - getting prefix/suffix for legacy curve names
|
|
# - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...)
|
|
EC_NAME_CONVERSION = {
|
|
'PSA_ECC_FAMILY_SECP_K1': {
|
|
192: ('secp', 'k1'),
|
|
224: ('secp', 'k1'),
|
|
256: ('secp', 'k1')
|
|
},
|
|
'PSA_ECC_FAMILY_SECP_R1': {
|
|
192: ('secp', 'r1'),
|
|
224: ('secp', 'r1'),
|
|
256: ('secp', 'r1'),
|
|
384: ('secp', 'r1'),
|
|
521: ('secp', 'r1')
|
|
},
|
|
'PSA_ECC_FAMILY_BRAINPOOL_P_R1': {
|
|
256: ('bp', 'r1'),
|
|
384: ('bp', 'r1'),
|
|
512: ('bp', 'r1')
|
|
},
|
|
'PSA_ECC_FAMILY_MONTGOMERY': {
|
|
255: ('curve', '19'),
|
|
448: ('curve', '')
|
|
}
|
|
}
|
|
|
|
def get_ec_curve_name(priv_key: str, bits: int) -> str:
|
|
ec_family = get_ec_key_family(priv_key)
|
|
try:
|
|
prefix = EC_NAME_CONVERSION[ec_family][bits][0]
|
|
suffix = EC_NAME_CONVERSION[ec_family][bits][1]
|
|
except KeyError:
|
|
return ""
|
|
return prefix + str(bits) + suffix
|
|
|
|
def get_look_up_table_entry(key_type: str, group_id_or_keybits: str,
|
|
priv_array_name: str, pub_array_name: str) -> Iterator[str]:
|
|
if key_type == "ec":
|
|
yield " {{ {}, 0,\n".format(group_id_or_keybits)
|
|
else:
|
|
yield " {{ 0, {},\n".format(group_id_or_keybits)
|
|
yield " {0}, sizeof({0}),\n".format(priv_array_name)
|
|
yield " {0}, sizeof({0}) }},".format(pub_array_name)
|
|
|
|
|
|
def write_output_file(output_file_name: str, arrays: List[str], look_up_table: List[str]):
|
|
with open(output_file_name, 'wt') as output:
|
|
output.write("""
|
|
/*********************************************************************************
|
|
* This file was automatically generated from tests/scripts/generate_test_keys.py.
|
|
* Please do not edit it manually.
|
|
*********************************************************************************/
|
|
""")
|
|
output.write(''.join(arrays))
|
|
output.write("""
|
|
struct predefined_key_element {{
|
|
int group_id; // EC group ID; 0 for RSA keys
|
|
int keybits; // bits size of RSA key; 0 for EC keys
|
|
const unsigned char *priv_key;
|
|
size_t priv_key_len;
|
|
const unsigned char *pub_key;
|
|
size_t pub_key_len;
|
|
}};
|
|
|
|
struct predefined_key_element predefined_keys[] = {{
|
|
{}
|
|
}};
|
|
""".format("\n".join(look_up_table)))
|
|
|
|
|
|
def main() -> None:
|
|
default_output_path = guess_project_root() + "/tests/src/test_keys.h"
|
|
|
|
argparser = argparse.ArgumentParser()
|
|
argparser.add_argument("--output", help="Output file", default=default_output_path)
|
|
args = argparser.parse_args()
|
|
|
|
output_file = args.output
|
|
|
|
arrays = []
|
|
look_up_table = []
|
|
|
|
# Get a list of private keys only in order to get a single item for every
|
|
# (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA
|
|
# contains also the public counterpart.
|
|
priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key]
|
|
priv_keys = sorted(priv_keys)
|
|
|
|
for priv_key in priv_keys:
|
|
key_type = get_key_type(priv_key)
|
|
# Ignore keys which are not EC or RSA
|
|
if key_type == "unknown":
|
|
continue
|
|
|
|
pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key)
|
|
|
|
for bits in ASYMMETRIC_KEY_DATA[priv_key]:
|
|
if key_type == "ec":
|
|
curve = get_ec_curve_name(priv_key, bits)
|
|
# Ignore EC curves unsupported in legacy symbols
|
|
if curve == "":
|
|
continue
|
|
# Create output array name
|
|
if key_type == "rsa":
|
|
array_name_base = "_".join(["test", key_type, str(bits)])
|
|
else:
|
|
array_name_base = "_".join(["test", key_type, curve])
|
|
array_name_priv = array_name_base + "_priv"
|
|
array_name_pub = array_name_base + "_pub"
|
|
# Convert bytearray to C array
|
|
c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits])
|
|
c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits])
|
|
# Write the C array to the output file
|
|
arrays.append(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"]))
|
|
# Update the lookup table
|
|
if key_type == "ec":
|
|
group_id_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper()
|
|
else:
|
|
group_id_or_keybits = str(bits)
|
|
look_up_table.append(''.join(get_look_up_table_entry(key_type, group_id_or_keybits,
|
|
array_name_priv, array_name_pub)))
|
|
|
|
write_output_file(output_file, arrays, look_up_table)
|
|
|
|
if __name__ == '__main__':
|
|
main()
|