blob: 1236baa49fe53e37cc90ce887d5241ed26478cc6 [file] [log] [blame]
Valerio Setti7126ba52024-03-29 16:59:40 +01001#!/usr/bin/env python3
2
3# Copyright The Mbed TLS Contributors
4# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
5
6"""Module generating EC and RSA keys to be used in test_suite_pk instead of
7generating the required key at run time. This helps speeding up testing."""
8
9import os
Valerio Setti862d14e2024-04-15 17:58:43 +020010from typing import Iterator
Valerio Setti7031a4e2024-04-16 10:31:15 +020011import re
Valerio Setti8f404602024-04-15 15:09:10 +020012import scripts_path # pylint: disable=unused-import
Valerio Settiee743392024-04-17 15:12:49 +020013from mbedtls_dev.asymmetric_key_data import ASYMMETRIC_KEY_DATA
Valerio Setti7126ba52024-03-29 16:59:40 +010014
Valerio Settiee743392024-04-17 15:12:49 +020015OUTPUT_HEADER_FILE = os.path.dirname(os.path.abspath(__file__)) + "/../src/test_keys.h"
Valerio Setti862d14e2024-04-15 17:58:43 +020016BYTES_PER_LINE = 16
Valerio Setti7126ba52024-03-29 16:59:40 +010017
Valerio Setti862d14e2024-04-15 17:58:43 +020018def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]:
19 yield 'const unsigned char '
20 yield array_name
21 yield '[] = {'
22 for index in range(0, len(key_data), BYTES_PER_LINE):
23 yield '\n '
24 for b in key_data[index:index + BYTES_PER_LINE]:
25 yield ' {:#04x},'.format(b)
26 yield '\n};'
27
Valerio Setti7031a4e2024-04-16 10:31:15 +020028def convert_der_to_c(array_name: str, key_data: bytes) -> str:
Valerio Setti862d14e2024-04-15 17:58:43 +020029 return ''.join(c_byte_array_literal_content(array_name, key_data))
Valerio Setti7126ba52024-03-29 16:59:40 +010030
Valerio Setti7031a4e2024-04-16 10:31:15 +020031def get_key_type(key: str) -> str:
32 if re.match('PSA_KEY_TYPE_RSA_.*', key):
33 return "rsa"
34 elif re.match('PSA_KEY_TYPE_ECC_.*', key):
35 return "ec"
36 else:
37 print("Unhandled key type {}".format(key))
38 return "unknown"
39
40def get_ec_key_family(key: str) -> str:
41 match = re.search(r'.*\((.*)\)', key)
42 if match is None:
43 raise Exception("Unable to get EC family from {}".format(key))
44 return match.group(1)
45
Valerio Setti9aa4fa92024-04-16 10:54:23 +020046# Legacy EC group ID do not support all the key types that PSA does, so the
47# following dictionaries are used for:
48# - getting prefix/suffix for legacy curve names
49# - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...)
50EC_NAME_CONVERSION = {
51 'PSA_ECC_FAMILY_SECP_K1': {
Valerio Settiee743392024-04-17 15:12:49 +020052 192: ('secp', 'k1'),
53 224: ('secp', 'k1'),
54 256: ('secp', 'k1')
Valerio Setti9aa4fa92024-04-16 10:54:23 +020055 },
56 'PSA_ECC_FAMILY_SECP_R1': {
Valerio Settiee743392024-04-17 15:12:49 +020057 192: ('secp', 'r1'),
58 224: ('secp', 'r1'),
59 256: ('secp', 'r1'),
60 384: ('secp', 'r1'),
61 521: ('secp', 'r1')
Valerio Setti9aa4fa92024-04-16 10:54:23 +020062 },
63 'PSA_ECC_FAMILY_BRAINPOOL_P_R1': {
Valerio Settiee743392024-04-17 15:12:49 +020064 256: ('bp', 'r1'),
65 384: ('bp', 'r1'),
66 512: ('bp', 'r1')
Valerio Setti9aa4fa92024-04-16 10:54:23 +020067 },
68 'PSA_ECC_FAMILY_MONTGOMERY': {
Valerio Settiee743392024-04-17 15:12:49 +020069 255: ('curve', '19'),
70 448: ('curve', '')
Valerio Setti9aa4fa92024-04-16 10:54:23 +020071 }
72}
73
74def get_ec_curve_name(priv_key: str, bits: int) -> str:
75 ec_family = get_ec_key_family(priv_key)
76 try:
77 prefix = EC_NAME_CONVERSION[ec_family][bits][0]
78 suffix = EC_NAME_CONVERSION[ec_family][bits][1]
Valerio Settiee743392024-04-17 15:12:49 +020079 except KeyError:
Valerio Setti9aa4fa92024-04-16 10:54:23 +020080 return ""
81 return prefix + str(bits) + suffix
82
83def get_look_up_table_entry(key_type: str, curve_or_keybits: str,
84 priv_array_name: str, pub_array_name: str) -> Iterator[str]:
Valerio Settiee743392024-04-17 15:12:49 +020085 yield " {{ {}, ".format("1" if key_type == "ec" else "0")
Valerio Setti9aa4fa92024-04-16 10:54:23 +020086 yield "{},\n".format(curve_or_keybits)
87 yield " {0}, sizeof({0}),\n".format(priv_array_name)
88 yield " {0}, sizeof({0}) }},".format(pub_array_name)
Valerio Setti7031a4e2024-04-16 10:31:15 +020089
Valerio Setti862d14e2024-04-15 17:58:43 +020090def main() -> None:
Valerio Setti6bda5f52024-04-09 12:28:39 +020091 # Remove output file if already existing.
Valerio Setti7126ba52024-03-29 16:59:40 +010092 if os.path.exists(OUTPUT_HEADER_FILE):
93 os.remove(OUTPUT_HEADER_FILE)
Valerio Setti7126ba52024-03-29 16:59:40 +010094
95 output_file = open(OUTPUT_HEADER_FILE, 'at')
Valerio Setti3e22bf22024-04-03 13:42:20 +020096 output_file.write(
97 "/*********************************************************************************\n" +
98 " * This file was automatically generated from tests/scripts/generate_test_keys.py.\n" +
99 " * Please do not edit it manually.\n" +
Valerio Setti6bda5f52024-04-09 12:28:39 +0200100 " *********************************************************************************/\n"
Valerio Setti3e22bf22024-04-03 13:42:20 +0200101 )
Valerio Setti7126ba52024-03-29 16:59:40 +0100102
Valerio Settiee743392024-04-17 15:12:49 +0200103 look_up_table = []
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200104
105 # Get a list of private keys only in order to get a single item for every
106 # (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA
107 # contains also the public counterpart.
Valerio Settiee743392024-04-17 15:12:49 +0200108 priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key]
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200109
110 for priv_key in priv_keys:
111 key_type = get_key_type(priv_key)
Valerio Setti7031a4e2024-04-16 10:31:15 +0200112 # Ignore keys which are not EC or RSA
113 if key_type == "unknown":
114 continue
Valerio Setti7031a4e2024-04-16 10:31:15 +0200115
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200116 pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key)
117
118 for bits in ASYMMETRIC_KEY_DATA[priv_key]:
119 if key_type == "ec":
120 curve = get_ec_curve_name(priv_key, bits)
121 # Ignore EC curves unsupported in legacy symbols
122 if curve == "":
123 continue
Valerio Setti7031a4e2024-04-16 10:31:15 +0200124 # Create output array name
125 if key_type == "rsa":
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200126 array_name_base = "_".join(["test", key_type, str(bits)])
Valerio Setti7031a4e2024-04-16 10:31:15 +0200127 else:
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200128 array_name_base = "_".join(["test", key_type, curve])
129 array_name_priv = array_name_base + "_priv"
130 array_name_pub = array_name_base + "_pub"
Valerio Setti7031a4e2024-04-16 10:31:15 +0200131 # Convert bytearray to C array
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200132 c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits])
133 c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits])
Valerio Setti7031a4e2024-04-16 10:31:15 +0200134 # Write the C array to the output file
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200135 output_file.write(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"]))
136 # Update the lookup table
137 if key_type == "ec":
138 curve_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper()
139 else:
140 curve_or_keybits = str(bits)
Valerio Settiee743392024-04-17 15:12:49 +0200141 look_up_table.append(''.join(get_look_up_table_entry(key_type, curve_or_keybits,
142 array_name_priv, array_name_pub)))
Valerio Setti9aa4fa92024-04-16 10:54:23 +0200143 # Write the lookup table: the struct containing pointers to all the arrays we created above.
144 output_file.write("""
145struct predefined_key_element {
146 int is_ec; // 1 for EC keys; 0 for RSA
147 int curve_or_keybits;
148 const unsigned char *priv_key;
149 size_t priv_key_len;
150 const unsigned char *pub_key;
151 size_t pub_key_len;
152};
153
Valerio Settiee743392024-04-17 15:12:49 +0200154struct predefined_key_element predefined_keys[] = {
155""")
156 output_file.write("\n".join(look_up_table))
157 output_file.write("\n};\n")
Valerio Setti7126ba52024-03-29 16:59:40 +0100158
159if __name__ == '__main__':
Valerio Setti862d14e2024-04-15 17:58:43 +0200160 main()