|  | #!/usr/bin/env python3 | 
|  |  | 
|  | """Generate psa_constant_names_generated.c | 
|  | which is included by programs/psa/psa_constant_names.c. | 
|  | The code generated by this module is only meant to be used in the context | 
|  | of that program. | 
|  |  | 
|  | An argument passed to this script will modify the output directory where the | 
|  | file is written: | 
|  | * by default (no arguments passed): writes to programs/psa/ | 
|  | * OUTPUT_FILE_DIR passed: writes to OUTPUT_FILE_DIR/ | 
|  | """ | 
|  |  | 
|  | # Copyright The Mbed TLS Contributors | 
|  | # SPDX-License-Identifier: Apache-2.0 | 
|  | # | 
|  | # Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | # not use this file except in compliance with the License. | 
|  | # You may obtain a copy of the License at | 
|  | # | 
|  | # http://www.apache.org/licenses/LICENSE-2.0 | 
|  | # | 
|  | # Unless required by applicable law or agreed to in writing, software | 
|  | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | # See the License for the specific language governing permissions and | 
|  | # limitations under the License. | 
|  |  | 
|  | import os | 
|  | import re | 
|  | import sys | 
|  |  | 
|  | OUTPUT_TEMPLATE = '''\ | 
|  | /* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */ | 
|  |  | 
|  | static const char *psa_strerror(psa_status_t status) | 
|  | { | 
|  | switch (status) { | 
|  | %(status_cases)s | 
|  | default: return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | static const char *psa_ecc_family_name(psa_ecc_family_t curve) | 
|  | { | 
|  | switch (curve) { | 
|  | %(ecc_curve_cases)s | 
|  | default: return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | static const char *psa_dh_family_name(psa_dh_family_t group) | 
|  | { | 
|  | switch (group) { | 
|  | %(dh_group_cases)s | 
|  | default: return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg) | 
|  | { | 
|  | switch (hash_alg) { | 
|  | %(hash_algorithm_cases)s | 
|  | default: return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg) | 
|  | { | 
|  | switch (ka_alg) { | 
|  | %(ka_algorithm_cases)s | 
|  | default: return NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | static int psa_snprint_key_type(char *buffer, size_t buffer_size, | 
|  | psa_key_type_t type) | 
|  | { | 
|  | size_t required_size = 0; | 
|  | switch (type) { | 
|  | %(key_type_cases)s | 
|  | default: | 
|  | %(key_type_code)s{ | 
|  | return snprintf(buffer, buffer_size, | 
|  | "0x%%04x", (unsigned) type); | 
|  | } | 
|  | break; | 
|  | } | 
|  | buffer[0] = 0; | 
|  | return (int) required_size; | 
|  | } | 
|  |  | 
|  | #define NO_LENGTH_MODIFIER 0xfffffffflu | 
|  | static int psa_snprint_algorithm(char *buffer, size_t buffer_size, | 
|  | psa_algorithm_t alg) | 
|  | { | 
|  | size_t required_size = 0; | 
|  | psa_algorithm_t core_alg = alg; | 
|  | unsigned long length_modifier = NO_LENGTH_MODIFIER; | 
|  | if (PSA_ALG_IS_MAC(alg)) { | 
|  | core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0); | 
|  | if (core_alg != alg) { | 
|  | append(&buffer, buffer_size, &required_size, | 
|  | "PSA_ALG_TRUNCATED_MAC(", 22); | 
|  | length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg); | 
|  | } | 
|  | } else if (PSA_ALG_IS_AEAD(alg)) { | 
|  | core_alg = PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(alg); | 
|  | if (core_alg == 0) { | 
|  | /* For unknown AEAD algorithms, there is no "default tag length". */ | 
|  | core_alg = alg; | 
|  | } else if (core_alg != alg) { | 
|  | append(&buffer, buffer_size, &required_size, | 
|  | "PSA_ALG_AEAD_WITH_SHORTENED_TAG(", 32); | 
|  | length_modifier = PSA_AEAD_TAG_LENGTH(alg); | 
|  | } | 
|  | } else if (PSA_ALG_IS_KEY_AGREEMENT(alg) && | 
|  | !PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) { | 
|  | core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg); | 
|  | append(&buffer, buffer_size, &required_size, | 
|  | "PSA_ALG_KEY_AGREEMENT(", 22); | 
|  | append_with_alg(&buffer, buffer_size, &required_size, | 
|  | psa_ka_algorithm_name, | 
|  | PSA_ALG_KEY_AGREEMENT_GET_BASE(alg)); | 
|  | append(&buffer, buffer_size, &required_size, ", ", 2); | 
|  | } | 
|  | switch (core_alg) { | 
|  | %(algorithm_cases)s | 
|  | default: | 
|  | %(algorithm_code)s{ | 
|  | append_integer(&buffer, buffer_size, &required_size, | 
|  | "0x%%08lx", (unsigned long) core_alg); | 
|  | } | 
|  | break; | 
|  | } | 
|  | if (core_alg != alg) { | 
|  | if (length_modifier != NO_LENGTH_MODIFIER) { | 
|  | append(&buffer, buffer_size, &required_size, ", ", 2); | 
|  | append_integer(&buffer, buffer_size, &required_size, | 
|  | "%%lu", length_modifier); | 
|  | } | 
|  | append(&buffer, buffer_size, &required_size, ")", 1); | 
|  | } | 
|  | buffer[0] = 0; | 
|  | return (int) required_size; | 
|  | } | 
|  |  | 
|  | static int psa_snprint_key_usage(char *buffer, size_t buffer_size, | 
|  | psa_key_usage_t usage) | 
|  | { | 
|  | size_t required_size = 0; | 
|  | if (usage == 0) { | 
|  | if (buffer_size > 1) { | 
|  | buffer[0] = '0'; | 
|  | buffer[1] = 0; | 
|  | } else if (buffer_size == 1) { | 
|  | buffer[0] = 0; | 
|  | } | 
|  | return 1; | 
|  | } | 
|  | %(key_usage_code)s | 
|  | if (usage != 0) { | 
|  | if (required_size != 0) { | 
|  | append(&buffer, buffer_size, &required_size, " | ", 3); | 
|  | } | 
|  | append_integer(&buffer, buffer_size, &required_size, | 
|  | "0x%%08lx", (unsigned long) usage); | 
|  | } else { | 
|  | buffer[0] = 0; | 
|  | } | 
|  | return (int) required_size; | 
|  | } | 
|  |  | 
|  | /* End of automatically generated file. */ | 
|  | ''' | 
|  |  | 
|  | KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) { | 
|  | append_with_curve(&buffer, buffer_size, &required_size, | 
|  | "%(builder)s", %(builder_length)s, | 
|  | PSA_KEY_TYPE_ECC_GET_FAMILY(type)); | 
|  | } else ''' | 
|  |  | 
|  | KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) { | 
|  | append_with_group(&buffer, buffer_size, &required_size, | 
|  | "%(builder)s", %(builder_length)s, | 
|  | PSA_KEY_TYPE_DH_GET_FAMILY(type)); | 
|  | } else ''' | 
|  |  | 
|  | ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) { | 
|  | append(&buffer, buffer_size, &required_size, | 
|  | "%(builder)s(", %(builder_length)s + 1); | 
|  | append_with_alg(&buffer, buffer_size, &required_size, | 
|  | psa_hash_algorithm_name, | 
|  | PSA_ALG_GET_HASH(core_alg)); | 
|  | append(&buffer, buffer_size, &required_size, ")", 1); | 
|  | } else ''' | 
|  |  | 
|  | BIT_TEST_TEMPLATE = '''\ | 
|  | if (%(var)s & %(flag)s) { | 
|  | if (required_size != 0) { | 
|  | append(&buffer, buffer_size, &required_size, " | ", 3); | 
|  | } | 
|  | append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d); | 
|  | %(var)s ^= %(flag)s; | 
|  | }\ | 
|  | ''' | 
|  |  | 
|  | class MacroCollector: | 
|  | """Collect PSA crypto macro definitions from C header files. | 
|  |  | 
|  | 1. Call `read_file` on the input header file(s). | 
|  | 2. Call `write_file` to write ``psa_constant_names_generated.c``. | 
|  | """ | 
|  |  | 
|  | def __init__(self): | 
|  | self.statuses = set() | 
|  | self.key_types = set() | 
|  | self.key_types_from_curve = {} | 
|  | self.key_types_from_group = {} | 
|  | self.ecc_curves = set() | 
|  | self.dh_groups = set() | 
|  | self.algorithms = set() | 
|  | self.hash_algorithms = set() | 
|  | self.ka_algorithms = set() | 
|  | self.algorithms_from_hash = {} | 
|  | self.key_usages = set() | 
|  |  | 
|  | # "#define" followed by a macro name with either no parameters | 
|  | # or a single parameter and a non-empty expansion. | 
|  | # Grab the macro name in group 1, the parameter name if any in group 2 | 
|  | # and the expansion in group 3. | 
|  | _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' + | 
|  | r'(?:\s+|\((\w+)\)\s*)' + | 
|  | r'(.+)') | 
|  | _deprecated_definition_re = re.compile(r'\s*MBEDTLS_DEPRECATED') | 
|  |  | 
|  | def read_line(self, line): | 
|  | """Parse a C header line and record the PSA identifier it defines if any. | 
|  | This function analyzes lines that start with "#define PSA_" | 
|  | (up to non-significant whitespace) and skips all non-matching lines. | 
|  | """ | 
|  | # pylint: disable=too-many-branches | 
|  | m = re.match(self._define_directive_re, line) | 
|  | if not m: | 
|  | return | 
|  | name, parameter, expansion = m.groups() | 
|  | expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion) | 
|  | if re.match(self._deprecated_definition_re, expansion): | 
|  | # Skip deprecated values, which are assumed to be | 
|  | # backward compatibility aliases that share | 
|  | # numerical values with non-deprecated values. | 
|  | return | 
|  | if name.endswith('_FLAG') or name.endswith('MASK'): | 
|  | # Macro only to build actual values | 
|  | return | 
|  | elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \ | 
|  | and not parameter: | 
|  | self.statuses.add(name) | 
|  | elif name.startswith('PSA_KEY_TYPE_') and not parameter: | 
|  | self.key_types.add(name) | 
|  | elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve': | 
|  | self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:] | 
|  | elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group': | 
|  | self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:] | 
|  | elif name.startswith('PSA_ECC_FAMILY_') and not parameter: | 
|  | self.ecc_curves.add(name) | 
|  | elif name.startswith('PSA_DH_FAMILY_') and not parameter: | 
|  | self.dh_groups.add(name) | 
|  | elif name.startswith('PSA_ALG_') and not parameter: | 
|  | if name in ['PSA_ALG_ECDSA_BASE', | 
|  | 'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']: | 
|  | # Ad hoc skipping of duplicate names for some numerical values | 
|  | return | 
|  | self.algorithms.add(name) | 
|  | # Ad hoc detection of hash algorithms | 
|  | if re.search(r'0x020000[0-9A-Fa-f]{2}', expansion): | 
|  | self.hash_algorithms.add(name) | 
|  | # Ad hoc detection of key agreement algorithms | 
|  | if re.search(r'0x09[0-9A-Fa-f]{2}0000', expansion): | 
|  | self.ka_algorithms.add(name) | 
|  | elif name.startswith('PSA_ALG_') and parameter == 'hash_alg': | 
|  | if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']: | 
|  | # A naming irregularity | 
|  | tester = name[:8] + 'IS_RANDOMIZED_' + name[8:] | 
|  | else: | 
|  | tester = name[:8] + 'IS_' + name[8:] | 
|  | self.algorithms_from_hash[name] = tester | 
|  | elif name.startswith('PSA_KEY_USAGE_') and not parameter: | 
|  | self.key_usages.add(name) | 
|  | else: | 
|  | # Other macro without parameter | 
|  | return | 
|  |  | 
|  | _nonascii_re = re.compile(rb'[^\x00-\x7f]+') | 
|  | _continued_line_re = re.compile(rb'\\\r?\n\Z') | 
|  | def read_file(self, header_file): | 
|  | for line in header_file: | 
|  | m = re.search(self._continued_line_re, line) | 
|  | while m: | 
|  | cont = next(header_file) | 
|  | line = line[:m.start(0)] + cont | 
|  | m = re.search(self._continued_line_re, line) | 
|  | line = re.sub(self._nonascii_re, rb'', line).decode('ascii') | 
|  | self.read_line(line) | 
|  |  | 
|  | @staticmethod | 
|  | def _make_return_case(name): | 
|  | return 'case %(name)s: return "%(name)s";' % {'name': name} | 
|  |  | 
|  | @staticmethod | 
|  | def _make_append_case(name): | 
|  | template = ('case %(name)s: ' | 
|  | 'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); ' | 
|  | 'break;') | 
|  | return template % {'name': name, 'length': len(name)} | 
|  |  | 
|  | @staticmethod | 
|  | def _make_bit_test(var, flag): | 
|  | return BIT_TEST_TEMPLATE % {'var': var, | 
|  | 'flag': flag, | 
|  | 'length': len(flag)} | 
|  |  | 
|  | def _make_status_cases(self): | 
|  | return '\n    '.join(map(self._make_return_case, | 
|  | sorted(self.statuses))) | 
|  |  | 
|  | def _make_ecc_curve_cases(self): | 
|  | return '\n    '.join(map(self._make_return_case, | 
|  | sorted(self.ecc_curves))) | 
|  |  | 
|  | def _make_dh_group_cases(self): | 
|  | return '\n    '.join(map(self._make_return_case, | 
|  | sorted(self.dh_groups))) | 
|  |  | 
|  | def _make_key_type_cases(self): | 
|  | return '\n    '.join(map(self._make_append_case, | 
|  | sorted(self.key_types))) | 
|  |  | 
|  | @staticmethod | 
|  | def _make_key_type_from_curve_code(builder, tester): | 
|  | return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder, | 
|  | 'builder_length': len(builder), | 
|  | 'tester': tester} | 
|  |  | 
|  | @staticmethod | 
|  | def _make_key_type_from_group_code(builder, tester): | 
|  | return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder, | 
|  | 'builder_length': len(builder), | 
|  | 'tester': tester} | 
|  |  | 
|  | def _make_ecc_key_type_code(self): | 
|  | d = self.key_types_from_curve | 
|  | make = self._make_key_type_from_curve_code | 
|  | return ''.join([make(k, d[k]) for k in sorted(d.keys())]) | 
|  |  | 
|  | def _make_dh_key_type_code(self): | 
|  | d = self.key_types_from_group | 
|  | make = self._make_key_type_from_group_code | 
|  | return ''.join([make(k, d[k]) for k in sorted(d.keys())]) | 
|  |  | 
|  | def _make_hash_algorithm_cases(self): | 
|  | return '\n    '.join(map(self._make_return_case, | 
|  | sorted(self.hash_algorithms))) | 
|  |  | 
|  | def _make_ka_algorithm_cases(self): | 
|  | return '\n    '.join(map(self._make_return_case, | 
|  | sorted(self.ka_algorithms))) | 
|  |  | 
|  | def _make_algorithm_cases(self): | 
|  | return '\n    '.join(map(self._make_append_case, | 
|  | sorted(self.algorithms))) | 
|  |  | 
|  | @staticmethod | 
|  | def _make_algorithm_from_hash_code(builder, tester): | 
|  | return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder, | 
|  | 'builder_length': len(builder), | 
|  | 'tester': tester} | 
|  |  | 
|  | def _make_algorithm_code(self): | 
|  | d = self.algorithms_from_hash | 
|  | make = self._make_algorithm_from_hash_code | 
|  | return ''.join([make(k, d[k]) for k in sorted(d.keys())]) | 
|  |  | 
|  | def _make_key_usage_code(self): | 
|  | return '\n'.join([self._make_bit_test('usage', bit) | 
|  | for bit in sorted(self.key_usages)]) | 
|  |  | 
|  | def write_file(self, output_file): | 
|  | """Generate the pretty-printer function code from the gathered | 
|  | constant definitions. | 
|  | """ | 
|  | data = {} | 
|  | data['status_cases'] = self._make_status_cases() | 
|  | data['ecc_curve_cases'] = self._make_ecc_curve_cases() | 
|  | data['dh_group_cases'] = self._make_dh_group_cases() | 
|  | data['key_type_cases'] = self._make_key_type_cases() | 
|  | data['key_type_code'] = (self._make_ecc_key_type_code() + | 
|  | self._make_dh_key_type_code()) | 
|  | data['hash_algorithm_cases'] = self._make_hash_algorithm_cases() | 
|  | data['ka_algorithm_cases'] = self._make_ka_algorithm_cases() | 
|  | data['algorithm_cases'] = self._make_algorithm_cases() | 
|  | data['algorithm_code'] = self._make_algorithm_code() | 
|  | data['key_usage_code'] = self._make_key_usage_code() | 
|  | output_file.write(OUTPUT_TEMPLATE % data) | 
|  |  | 
|  | def generate_psa_constants(header_file_names, output_file_name): | 
|  | collector = MacroCollector() | 
|  | for header_file_name in header_file_names: | 
|  | with open(header_file_name, 'rb') as header_file: | 
|  | collector.read_file(header_file) | 
|  | temp_file_name = output_file_name + '.tmp' | 
|  | with open(temp_file_name, 'w') as output_file: | 
|  | collector.write_file(output_file) | 
|  | os.replace(temp_file_name, output_file_name) | 
|  |  | 
|  | if __name__ == '__main__': | 
|  | if not os.path.isdir('programs') and os.path.isdir('../programs'): | 
|  | os.chdir('..') | 
|  | # Allow to change the directory where psa_constant_names_generated.c is written to. | 
|  | OUTPUT_FILE_DIR = sys.argv[1] if len(sys.argv) == 2 else "programs/psa" | 
|  | generate_psa_constants(['include/psa/crypto_values.h', | 
|  | 'include/psa/crypto_extra.h'], | 
|  | OUTPUT_FILE_DIR + '/psa_constant_names_generated.c') |