blob: 0aaa7104e4c716852dda277089f8713ffd1dd920 [file] [log] [blame]
Gilles Peskine8519dc92024-01-04 16:38:17 +01001#!/usr/bin/env python3
2"""Generate wrapper functions for PSA function calls.
3"""
4
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
7
Gilles Peskine7c7b7d52024-01-04 17:28:59 +01008### WARNING: the code in this file has not been extensively reviewed yet.
9### We do not think it is harmful, but it may be below our normal standards
10### for robustness and maintainability.
11
Gilles Peskine8519dc92024-01-04 16:38:17 +010012import argparse
Gilles Peskinec8b22d02023-12-06 19:32:52 +010013import itertools
Gilles Peskine8519dc92024-01-04 16:38:17 +010014import os
Gilles Peskinec8b22d02023-12-06 19:32:52 +010015from typing import Iterator, List, Optional, Tuple
Gilles Peskine8519dc92024-01-04 16:38:17 +010016
17import scripts_path #pylint: disable=unused-import
18from mbedtls_dev import build_tree
19from mbedtls_dev import c_parsing_helper
20from mbedtls_dev import c_wrapper_generator
21from mbedtls_dev import typing_util
22
23
Gilles Peskinec8b22d02023-12-06 19:32:52 +010024class BufferParameter:
25 """Description of an input or output buffer parameter sequence to a PSA function."""
26 #pylint: disable=too-few-public-methods
27
28 def __init__(self, i: int, is_output: bool,
29 buffer_name: str, size_name: str) -> None:
30 """Initialize the parameter information.
31
32 i is the index of the function argument that is the pointer to the buffer.
33 The size is argument i+1. For a variable-size output, the actual length
34 goes in argument i+2.
35
36 buffer_name and size_names are the names of arguments i and i+1.
37 This class does not yet help with the output length.
38 """
39 self.index = i
40 self.buffer_name = buffer_name
41 self.size_name = size_name
42 self.is_output = is_output
43
44
Gilles Peskine8519dc92024-01-04 16:38:17 +010045class PSAWrapperGenerator(c_wrapper_generator.Base):
46 """Generate a C source file containing wrapper functions for PSA Crypto API calls."""
47
Gilles Peskinea980aa02024-01-04 20:51:38 +010048 _CPP_GUARDS = ('defined(MBEDTLS_PSA_CRYPTO_C) && ' +
49 'defined(MBEDTLS_TEST_HOOKS) && \\\n ' +
50 '!defined(RECORD_PSA_STATUS_COVERAGE_LOG)')
Gilles Peskine8519dc92024-01-04 16:38:17 +010051 _WRAPPER_NAME_PREFIX = 'mbedtls_test_wrap_'
52 _WRAPPER_NAME_SUFFIX = ''
53
54 def gather_data(self) -> None:
55 root_dir = build_tree.guess_mbedtls_root()
56 for header_name in ['crypto.h', 'crypto_extra.h']:
57 header_path = os.path.join(root_dir, 'include', 'psa', header_name)
58 c_parsing_helper.read_function_declarations(self.functions, header_path)
59
60 _SKIP_FUNCTIONS = frozenset([
61 'mbedtls_psa_external_get_random', # not a library function
Gilles Peskine17a14f12024-01-04 16:41:30 +010062 'psa_aead_abort', # not implemented yet
63 'psa_aead_decrypt_setup', # not implemented yet
64 'psa_aead_encrypt_setup', # not implemented yet
65 'psa_aead_finish', # not implemented yet
66 'psa_aead_generate_nonce', # not implemented yet
67 'psa_aead_set_lengths', # not implemented yet
68 'psa_aead_set_nonce', # not implemented yet
69 'psa_aead_update', # not implemented yet
70 'psa_aead_update_ad', # not implemented yet
71 'psa_aead_verify', # not implemented yet
Gilles Peskine8519dc92024-01-04 16:38:17 +010072 'psa_get_key_domain_parameters', # client-side function
73 'psa_get_key_slot_number', # client-side function
Gilles Peskine8519dc92024-01-04 16:38:17 +010074 'psa_set_key_domain_parameters', # client-side function
75 ])
76
77 def _skip_function(self, function: c_wrapper_generator.FunctionInfo) -> bool:
78 if function.return_type != 'psa_status_t':
79 return True
80 if function.name in self._SKIP_FUNCTIONS:
81 return True
82 return False
83
84 # PAKE stuff: not implemented yet
85 _PAKE_STUFF = frozenset([
86 'psa_crypto_driver_pake_inputs_t *',
87 'psa_pake_cipher_suite_t *',
88 ])
89
90 def _return_variable_name(self,
91 function: c_wrapper_generator.FunctionInfo) -> str:
92 """The name of the variable that will contain the return value."""
93 if function.return_type == 'psa_status_t':
94 return 'status'
95 return super()._return_variable_name(function)
96
97 _FUNCTION_GUARDS = c_wrapper_generator.Base._FUNCTION_GUARDS.copy() \
98 #pylint: disable=protected-access
99 _FUNCTION_GUARDS.update({
100 'mbedtls_psa_register_se_key': 'defined(MBEDTLS_PSA_CRYPTO_SE_C)',
101 'mbedtls_psa_inject_entropy': 'defined(MBEDTLS_PSA_INJECT_ENTROPY)',
102 'mbedtls_psa_external_get_random': 'defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)',
103 'mbedtls_psa_platform_get_builtin_key': 'defined(MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS)',
104 })
105
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100106 @staticmethod
107 def _detect_buffer_parameters(arguments: List[c_parsing_helper.ArgumentInfo],
108 argument_names: List[str]) -> Iterator[BufferParameter]:
109 """Detect function arguments that are buffers (pointer, size [,length])."""
110 types = ['' if arg.suffix else arg.type for arg in arguments]
111 # pairs = list of (type_of_arg_N, type_of_arg_N+1)
112 # where each type_of_arg_X is the empty string if the type is an array
113 # or there is no argument X.
114 pairs = enumerate(itertools.zip_longest(types, types[1:], fillvalue=''))
115 for i, t01 in pairs:
116 if (t01[0] == 'const uint8_t *' or t01[0] == 'uint8_t *') and \
117 t01[1] == 'size_t':
118 yield BufferParameter(i, not t01[0].startswith('const '),
119 argument_names[i], argument_names[i+1])
120
121 @staticmethod
122 def _write_poison_buffer_parameter(out: typing_util.Writable,
123 param: BufferParameter,
124 poison: bool) -> None:
125 """Write poisoning or unpoisoning code for a buffer parameter.
126
127 Write poisoning code if poison is true, unpoisoning code otherwise.
128 """
129 out.write(' MBEDTLS_TEST_MEMORY_{}({}, {});\n'.format(
130 'POISON' if poison else 'UNPOISON',
131 param.buffer_name, param.size_name
132 ))
133
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100134 def _write_poison_buffer_parameters(self, out: typing_util.Writable,
135 buffer_parameters: List[BufferParameter],
136 poison: bool) -> None:
137 """Write poisoning or unpoisoning code for the buffer parameters.
138
139 Write poisoning code if poison is true, unpoisoning code otherwise.
140 """
141 if not buffer_parameters:
142 return
143 out.write('#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)\n')
144 for param in buffer_parameters:
145 self._write_poison_buffer_parameter(out, param, poison)
146 out.write('#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */\n')
147
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100148 @staticmethod
149 def _parameter_should_be_copied(function_name: str,
150 _buffer_name: Optional[str]) -> bool:
151 """Whether the specified buffer argument to a PSA function should be copied.
152 """
David Horstmann436b2ef2024-01-22 14:36:01 +0000153 if function_name.startswith('psa_aead'):
154 return True
Ryan Everett810421c2024-01-25 12:09:09 +0000155 if function_name == 'psa_cipher_encrypt':
156 return True
Ryan Everett6c9e69d2024-02-09 16:23:25 +0000157 if function_name in ('psa_key_derivation_output_bytes',
158 'psa_key_derivation_input_bytes'):
159 return True
Ryan Everettc8b6c052024-01-25 15:20:09 +0000160 if function_name in ('psa_import_key',
161 'psa_export_key',
162 'psa_export_public_key'):
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100163 return True
Thomas Daubneyc63e31a2024-01-30 13:33:14 +0000164 if function_name in ('psa_sign_message',
165 'psa_verify_message',
166 'psa_sign_hash',
167 'psa_verify_hash'):
168 return True
Thomas Daubneyebf93292024-01-25 17:09:10 +0000169 if function_name in ('psa_hash_update',
170 'psa_hash_finish',
171 'psa_hash_verify',
172 'psa_hash_compute',
173 'psa_hash_compare'):
David Horstmann4e821502024-02-06 15:44:08 +0000174
175 if function_name == 'psa_generate_random':
Thomas Daubneyebf93292024-01-25 17:09:10 +0000176 return True
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100177 return False
178
179 def _write_function_call(self, out: typing_util.Writable,
180 function: c_wrapper_generator.FunctionInfo,
181 argument_names: List[str]) -> None:
182 buffer_parameters = list(
183 param
184 for param in self._detect_buffer_parameters(function.arguments,
185 argument_names)
186 if self._parameter_should_be_copied(function.name,
187 function.arguments[param.index].name))
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100188 self._write_poison_buffer_parameters(out, buffer_parameters, True)
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100189 super()._write_function_call(out, function, argument_names)
Gilles Peskineb3d457c2024-01-04 20:33:29 +0100190 self._write_poison_buffer_parameters(out, buffer_parameters, False)
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100191
Gilles Peskine8519dc92024-01-04 16:38:17 +0100192 def _write_prologue(self, out: typing_util.Writable, header: bool) -> None:
193 super()._write_prologue(out, header)
194 out.write("""
195#if {}
196
197#include <psa/crypto.h>
198
Gilles Peskinec8b22d02023-12-06 19:32:52 +0100199#include <test/memory.h>
Gilles Peskine8519dc92024-01-04 16:38:17 +0100200#include <test/psa_crypto_helpers.h>
201#include <test/psa_test_wrappers.h>
202"""
203 .format(self._CPP_GUARDS))
204
205 def _write_epilogue(self, out: typing_util.Writable, header: bool) -> None:
206 out.write("""
207#endif /* {} */
208"""
209 .format(self._CPP_GUARDS))
210 super()._write_epilogue(out, header)
211
212
213class PSALoggingWrapperGenerator(PSAWrapperGenerator, c_wrapper_generator.Logging):
214 """Generate a C source file containing wrapper functions that log PSA Crypto API calls."""
215
216 def __init__(self, stream: str) -> None:
217 super().__init__()
218 self.set_stream(stream)
219
220 _PRINTF_TYPE_CAST = c_wrapper_generator.Logging._PRINTF_TYPE_CAST.copy()
221 _PRINTF_TYPE_CAST.update({
222 'mbedtls_svc_key_id_t': 'unsigned',
223 'psa_algorithm_t': 'unsigned',
224 'psa_drv_slot_number_t': 'unsigned long long',
225 'psa_key_derivation_step_t': 'int',
226 'psa_key_id_t': 'unsigned',
227 'psa_key_slot_number_t': 'unsigned long long',
228 'psa_key_lifetime_t': 'unsigned',
229 'psa_key_type_t': 'unsigned',
230 'psa_key_usage_flags_t': 'unsigned',
231 'psa_pake_role_t': 'int',
232 'psa_pake_step_t': 'int',
233 'psa_status_t': 'int',
234 })
235
236 def _printf_parameters(self, typ: str, var: str) -> Tuple[str, List[str]]:
237 if typ.startswith('const '):
238 typ = typ[6:]
239 if typ == 'uint8_t *':
240 # Skip buffers
241 return '', []
242 if typ.endswith('operation_t *'):
243 return '', []
244 if typ in self._PAKE_STUFF:
245 return '', []
246 if typ == 'psa_key_attributes_t *':
247 return (var + '={id=%u, lifetime=0x%08x, type=0x%08x, bits=%u, alg=%08x, usage=%08x}',
248 ['(unsigned) psa_get_key_{}({})'.format(field, var)
249 for field in ['id', 'lifetime', 'type', 'bits', 'algorithm', 'usage_flags']])
250 return super()._printf_parameters(typ, var)
251
252
253DEFAULT_C_OUTPUT_FILE_NAME = 'tests/src/psa_test_wrappers.c'
254DEFAULT_H_OUTPUT_FILE_NAME = 'tests/include/test/psa_test_wrappers.h'
255
256def main() -> None:
257 parser = argparse.ArgumentParser(description=globals()['__doc__'])
258 parser.add_argument('--log',
259 help='Stream to log to (default: no logging code)')
260 parser.add_argument('--output-c',
261 metavar='FILENAME',
262 default=DEFAULT_C_OUTPUT_FILE_NAME,
263 help=('Output .c file path (default: {}; skip .c output if empty)'
264 .format(DEFAULT_C_OUTPUT_FILE_NAME)))
265 parser.add_argument('--output-h',
266 metavar='FILENAME',
267 default=DEFAULT_H_OUTPUT_FILE_NAME,
268 help=('Output .h file path (default: {}; skip .h output if empty)'
269 .format(DEFAULT_H_OUTPUT_FILE_NAME)))
270 options = parser.parse_args()
271 if options.log:
272 generator = PSALoggingWrapperGenerator(options.log) #type: PSAWrapperGenerator
273 else:
274 generator = PSAWrapperGenerator()
275 generator.gather_data()
276 if options.output_h:
277 generator.write_h_file(options.output_h)
278 if options.output_c:
279 generator.write_c_file(options.output_c)
280
281if __name__ == '__main__':
282 main()