blob: c7600903f193ff4670cce5cb4950f6e00776f942 [file] [log] [blame]
Paul Bakkerc7bb02b2013-09-15 14:54:56 +02001/* BEGIN_HEADER */
Valerio Setti639d5672024-01-17 11:04:56 +01002#include "pk_internal.h"
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00003#include "mbedtls/pem.h"
4#include "mbedtls/oid.h"
Valerio Setti17513412023-04-26 14:48:43 +02005#include "psa/crypto_sizes.h"
Valerio Setti89590952023-04-17 17:34:09 +02006
Valerio Settic9cb5322023-04-18 11:20:36 +02007typedef enum {
8 TEST_PEM,
9 TEST_DER
10} pkwrite_file_format_t;
11
Valerio Setti547b3a42023-04-24 10:24:37 +020012/* Helper function for removing "\r" chars from a buffer. */
Valerio Setti7bacaf82023-04-24 08:52:16 +020013static void fix_new_lines(unsigned char *in_str, size_t *len)
14{
15 size_t chars_left;
16 unsigned int i;
17
18 for (i = 0; (i < *len) && (*len > 0); i++) {
19 if (in_str[i] == '\r') {
20 if (i < (*len - 1)) {
21 chars_left = *len - i - 1;
Valerio Settibf974b92023-04-24 10:26:24 +020022 memmove(&in_str[i], &in_str[i+1], chars_left);
Valerio Setti7bacaf82023-04-24 08:52:16 +020023 } else {
24 in_str[i] = '\0';
25 }
26 *len = *len - 1;
27 }
28 }
29}
30
valeriof6853a82023-05-31 12:00:11 +020031static int pk_write_any_key(mbedtls_pk_context *pk, unsigned char **p,
32 size_t *buf_len, int is_public_key, int is_der)
33{
34 int ret = 0;
35
36 if (is_der) {
37 if (is_public_key) {
38 ret = mbedtls_pk_write_pubkey_der(pk, *p, *buf_len);
39 } else {
40 ret = mbedtls_pk_write_key_der(pk, *p, *buf_len);
41 }
42 if (ret <= 0) {
43 return ret;
44 }
45
46 *p = *p + *buf_len - ret;
47 *buf_len = ret;
48 } else {
49#if defined(MBEDTLS_PEM_WRITE_C)
50 if (is_public_key) {
51 ret = mbedtls_pk_write_pubkey_pem(pk, *p, *buf_len);
52 } else {
53 ret = mbedtls_pk_write_key_pem(pk, *p, *buf_len);
54 }
55 if (ret != 0) {
56 return ret;
57 }
58
59 *buf_len = strlen((char *) *p) + 1; /* +1 takes the string terminator into account */
60#else
61 return MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE;
62#endif
63 }
64
65 return 0;
66}
67
Valerio Settic60bc5e2023-04-17 18:43:06 +020068static void pk_write_check_common(char *key_file, int is_public_key, int is_der)
Valerio Setti89590952023-04-17 17:34:09 +020069{
70 mbedtls_pk_context key;
Gilles Peskine21e46b32023-10-17 16:35:20 +020071 mbedtls_pk_init(&key);
Valerio Setti89590952023-04-17 17:34:09 +020072 unsigned char *buf = NULL;
73 unsigned char *check_buf = NULL;
Valerio Settic60bc5e2023-04-17 18:43:06 +020074 unsigned char *start_buf;
Valerio Setti3401b302023-04-18 10:42:53 +020075 size_t buf_len, check_buf_len;
valeriof6853a82023-05-31 12:00:11 +020076#if defined(MBEDTLS_USE_PSA_CRYPTO)
77 mbedtls_svc_key_id_t opaque_id = MBEDTLS_SVC_KEY_ID_INIT;
78#endif /* MBEDTLS_USE_PSA_CRYPTO */
79
80 USE_PSA_INIT();
Valerio Setti89590952023-04-17 17:34:09 +020081
82 /* Note: if mbedtls_pk_load_file() successfully reads the file, then
83 it also allocates check_buf, which should be freed on exit */
Valerio Setti3401b302023-04-18 10:42:53 +020084 TEST_EQUAL(mbedtls_pk_load_file(key_file, &check_buf, &check_buf_len), 0);
Valerio Setti89590952023-04-17 17:34:09 +020085 TEST_ASSERT(check_buf_len > 0);
86
Valerio Setti7bacaf82023-04-24 08:52:16 +020087 /* Windows' line ending is different from the Linux's one ("\r\n" vs "\n").
88 * Git treats PEM files as text, so when on Windows, it replaces new lines
89 * with "\r\n" on checkout.
90 * Unfortunately mbedtls_pk_load_file() loads files in binary format,
91 * while mbedtls_pk_write_pubkey_pem() goes through the I/O layer which
92 * uses "\n" for newlines in both Windows and Linux.
93 * Here we remove the extra "\r" so that "buf" and "check_buf" can be
94 * easily compared later. */
95 if (!is_der) {
96 fix_new_lines(check_buf, &check_buf_len);
97 }
98 TEST_ASSERT(check_buf_len > 0);
99
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100100 TEST_CALLOC(buf, check_buf_len);
Valerio Setti89590952023-04-17 17:34:09 +0200101
Valerio Setti89590952023-04-17 17:34:09 +0200102 if (is_public_key) {
Valerio Setti3401b302023-04-18 10:42:53 +0200103 TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&key, key_file), 0);
Valerio Setti89590952023-04-17 17:34:09 +0200104 } else {
Valerio Setti3401b302023-04-18 10:42:53 +0200105 TEST_EQUAL(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
Valerio Setti22808952023-04-18 12:57:52 +0200106 mbedtls_test_rnd_std_rand, NULL), 0);
Valerio Setti89590952023-04-17 17:34:09 +0200107 }
Valerio Setti89590952023-04-17 17:34:09 +0200108
valeriof6853a82023-05-31 12:00:11 +0200109 start_buf = buf;
110 buf_len = check_buf_len;
111 TEST_EQUAL(pk_write_any_key(&key, &start_buf, &buf_len, is_public_key,
112 is_der), 0);
Valerio Settic60bc5e2023-04-17 18:43:06 +0200113
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +0100114 TEST_MEMORY_COMPARE(start_buf, buf_len, check_buf, check_buf_len);
Valerio Setti89590952023-04-17 17:34:09 +0200115
valeriof6853a82023-05-31 12:00:11 +0200116#if defined(MBEDTLS_USE_PSA_CRYPTO)
117 /* Verify that pk_write works also for opaque private keys */
118 if (!is_public_key) {
119 memset(buf, 0, check_buf_len);
120 TEST_EQUAL(mbedtls_pk_wrap_as_opaque(&key, &opaque_id,
121 PSA_ALG_NONE,
122 PSA_KEY_USAGE_EXPORT,
123 PSA_ALG_NONE), 0);
124 start_buf = buf;
125 buf_len = check_buf_len;
126 TEST_EQUAL(pk_write_any_key(&key, &start_buf, &buf_len, is_public_key,
127 is_der), 0);
128
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +0100129 TEST_MEMORY_COMPARE(start_buf, buf_len, check_buf, check_buf_len);
valeriof6853a82023-05-31 12:00:11 +0200130 }
131#endif /* MBEDTLS_USE_PSA_CRYPTO */
132
Valerio Setti89590952023-04-17 17:34:09 +0200133exit:
valeriof6853a82023-05-31 12:00:11 +0200134#if defined(MBEDTLS_USE_PSA_CRYPTO)
135 psa_destroy_key(opaque_id);
136#endif /* MBEDTLS_USE_PSA_CRYPTO */
Valerio Setti89590952023-04-17 17:34:09 +0200137 mbedtls_free(buf);
138 mbedtls_free(check_buf);
139 mbedtls_pk_free(&key);
Valerio Setti14bfdbf2023-04-24 13:53:21 +0200140 USE_PSA_DONE();
Valerio Setti89590952023-04-17 17:34:09 +0200141}
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200142/* END_HEADER */
143
144/* BEGIN_DEPENDENCIES
Valerio Settic5d85e52023-07-26 18:12:23 +0200145 * depends_on:MBEDTLS_PK_PARSE_C:MBEDTLS_PK_WRITE_C:MBEDTLS_FS_IO
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200146 * END_DEPENDENCIES
147 */
148
Valerio Setti15cac172023-04-18 11:25:30 +0200149/* BEGIN_CASE */
Valerio Settic60bc5e2023-04-17 18:43:06 +0200150void pk_write_pubkey_check(char *key_file, int is_der)
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200151{
Valerio Settic60bc5e2023-04-17 18:43:06 +0200152 pk_write_check_common(key_file, 1, is_der);
Valerio Setti89590952023-04-17 17:34:09 +0200153 goto exit; /* make the compiler happy */
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200154}
155/* END_CASE */
156
Valerio Setti15cac172023-04-18 11:25:30 +0200157/* BEGIN_CASE */
Valerio Settic60bc5e2023-04-17 18:43:06 +0200158void pk_write_key_check(char *key_file, int is_der)
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200159{
Valerio Settic60bc5e2023-04-17 18:43:06 +0200160 pk_write_check_common(key_file, 0, is_der);
Valerio Setti89590952023-04-17 17:34:09 +0200161 goto exit; /* make the compiler happy */
Paul Bakkerc7bb02b2013-09-15 14:54:56 +0200162}
163/* END_CASE */
Valerio Setti17513412023-04-26 14:48:43 +0200164
165/* BEGIN_CASE */
Valerio Settif5451712023-04-27 10:52:57 +0200166void pk_write_public_from_private(char *priv_key_file, char *pub_key_file)
Valerio Setti17513412023-04-26 14:48:43 +0200167{
Valerio Settif5451712023-04-27 10:52:57 +0200168 mbedtls_pk_context priv_key;
169 uint8_t *derived_key_raw = NULL;
Valerio Setti17513412023-04-26 14:48:43 +0200170 size_t derived_key_len = 0;
Valerio Settif5451712023-04-27 10:52:57 +0200171 uint8_t *pub_key_raw = NULL;
Valerio Setti17513412023-04-26 14:48:43 +0200172 size_t pub_key_len = 0;
173#if defined(MBEDTLS_USE_PSA_CRYPTO)
174 mbedtls_svc_key_id_t opaque_key_id = MBEDTLS_SVC_KEY_ID_INIT;
175#endif /* MBEDTLS_USE_PSA_CRYPTO */
176
177 mbedtls_pk_init(&priv_key);
Valerio Setti17513412023-04-26 14:48:43 +0200178 USE_PSA_INIT();
179
Valerio Setti17513412023-04-26 14:48:43 +0200180 TEST_EQUAL(mbedtls_pk_parse_keyfile(&priv_key, priv_key_file, NULL,
181 mbedtls_test_rnd_std_rand, NULL), 0);
Valerio Settif5451712023-04-27 10:52:57 +0200182 TEST_EQUAL(mbedtls_pk_load_file(pub_key_file, &pub_key_raw,
183 &pub_key_len), 0);
Valerio Setti17513412023-04-26 14:48:43 +0200184
Valerio Settif5451712023-04-27 10:52:57 +0200185 derived_key_len = pub_key_len;
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100186 TEST_CALLOC(derived_key_raw, derived_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200187
Valerio Setti9a855f22023-04-27 12:07:23 +0200188 TEST_EQUAL(mbedtls_pk_write_pubkey_der(&priv_key, derived_key_raw,
189 derived_key_len), pub_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200190
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +0100191 TEST_MEMORY_COMPARE(derived_key_raw, derived_key_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +0100192 pub_key_raw, pub_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200193
194#if defined(MBEDTLS_USE_PSA_CRYPTO)
Tom Cosgrove351a3912023-09-01 09:54:04 +0100195 mbedtls_platform_zeroize(derived_key_raw, derived_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200196
197 TEST_EQUAL(mbedtls_pk_wrap_as_opaque(&priv_key, &opaque_key_id,
198 PSA_ALG_NONE, PSA_KEY_USAGE_EXPORT,
199 PSA_ALG_NONE), 0);
200
Valerio Setti9a855f22023-04-27 12:07:23 +0200201 TEST_EQUAL(mbedtls_pk_write_pubkey_der(&priv_key, derived_key_raw,
202 derived_key_len), pub_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200203
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +0100204 TEST_MEMORY_COMPARE(derived_key_raw, derived_key_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +0100205 pub_key_raw, pub_key_len);
Valerio Setti17513412023-04-26 14:48:43 +0200206#endif /* MBEDTLS_USE_PSA_CRYPTO */
207
208exit:
209#if defined(MBEDTLS_USE_PSA_CRYPTO)
210 psa_destroy_key(opaque_key_id);
211#endif /* MBEDTLS_USE_PSA_CRYPTO */
Valerio Settif5451712023-04-27 10:52:57 +0200212 mbedtls_free(derived_key_raw);
213 mbedtls_free(pub_key_raw);
Valerio Setti17513412023-04-26 14:48:43 +0200214 mbedtls_pk_free(&priv_key);
215 USE_PSA_DONE();
216}
217/* END_CASE */