blob: 9def42a862dbb729ba8fe2c036c9cb74fc160cc8 [file] [log] [blame]
Gilles Peskine0bbad742019-05-27 18:24:31 +02001#!/usr/bin/env python3
Gilles Peskine9d4d7502019-05-27 18:25:46 +02002
3"""Generate programs/psa/psa_constant_names_generated.c
4which is included by programs/psa/psa_constant_names.c.
5The code generated by this module is only meant to be used in the context
6of that program.
7"""
8
Gilles Peskine029b5d62018-07-16 23:13:37 +02009import os
10import re
Gilles Peskine029b5d62018-07-16 23:13:37 +020011
Gilles Peskine42a0a0a2019-05-27 18:29:47 +020012OUTPUT_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +020013/* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */
14
15static const char *psa_strerror(psa_status_t status)
16{
17 switch (status) {
18 %(status_cases)s
19 default: return NULL;
20 }
21}
22
23static const char *psa_ecc_curve_name(psa_ecc_curve_t curve)
24{
25 switch (curve) {
26 %(ecc_curve_cases)s
27 default: return NULL;
28 }
29}
30
Gilles Peskinedcaefae2019-05-16 12:55:35 +020031static const char *psa_dh_group_name(psa_dh_group_t group)
32{
33 switch (group) {
34 %(dh_group_cases)s
35 default: return NULL;
36 }
37}
38
Gilles Peskine029b5d62018-07-16 23:13:37 +020039static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
40{
41 switch (hash_alg) {
42 %(hash_algorithm_cases)s
43 default: return NULL;
44 }
45}
46
Gilles Peskine882e57e2019-04-12 00:12:07 +020047static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg)
48{
49 switch (ka_alg) {
50 %(ka_algorithm_cases)s
51 default: return NULL;
52 }
53}
54
Gilles Peskine029b5d62018-07-16 23:13:37 +020055static int psa_snprint_key_type(char *buffer, size_t buffer_size,
56 psa_key_type_t type)
57{
58 size_t required_size = 0;
59 switch (type) {
60 %(key_type_cases)s
61 default:
62 %(key_type_code)s{
63 return snprintf(buffer, buffer_size,
64 "0x%%08lx", (unsigned long) type);
65 }
66 break;
67 }
68 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +010069 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +020070}
71
Gilles Peskine882e57e2019-04-12 00:12:07 +020072#define NO_LENGTH_MODIFIER 0xfffffffflu
Gilles Peskine029b5d62018-07-16 23:13:37 +020073static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
74 psa_algorithm_t alg)
75{
76 size_t required_size = 0;
Gilles Peskine498c2a12018-08-20 15:07:20 +020077 psa_algorithm_t core_alg = alg;
Gilles Peskine882e57e2019-04-12 00:12:07 +020078 unsigned long length_modifier = NO_LENGTH_MODIFIER;
Gilles Peskine498c2a12018-08-20 15:07:20 +020079 if (PSA_ALG_IS_MAC(alg)) {
80 core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0);
81 if (core_alg != alg) {
82 append(&buffer, buffer_size, &required_size,
83 "PSA_ALG_TRUNCATED_MAC(", 22);
84 length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg);
85 }
86 } else if (PSA_ALG_IS_AEAD(alg)) {
87 core_alg = PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH(alg);
Gilles Peskine182c2e92018-10-19 11:33:51 +020088 if (core_alg == 0) {
Darryl Greendf723062019-02-06 15:36:00 +000089 /* For unknown AEAD algorithms, there is no "default tag length". */
Gilles Peskine182c2e92018-10-19 11:33:51 +020090 core_alg = alg;
91 } else if (core_alg != alg) {
Gilles Peskine498c2a12018-08-20 15:07:20 +020092 append(&buffer, buffer_size, &required_size,
93 "PSA_ALG_AEAD_WITH_TAG_LENGTH(", 29);
94 length_modifier = PSA_AEAD_TAG_LENGTH(alg);
95 }
Gilles Peskine882e57e2019-04-12 00:12:07 +020096 } else if (PSA_ALG_IS_KEY_AGREEMENT(alg) &&
97 !PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
98 core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
99 append(&buffer, buffer_size, &required_size,
100 "PSA_ALG_KEY_AGREEMENT(", 22);
101 append_with_alg(&buffer, buffer_size, &required_size,
102 psa_ka_algorithm_name,
103 PSA_ALG_KEY_AGREEMENT_GET_BASE(alg));
104 append(&buffer, buffer_size, &required_size, ", ", 2);
Gilles Peskine498c2a12018-08-20 15:07:20 +0200105 }
106 switch (core_alg) {
Gilles Peskine029b5d62018-07-16 23:13:37 +0200107 %(algorithm_cases)s
108 default:
109 %(algorithm_code)s{
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200110 append_integer(&buffer, buffer_size, &required_size,
Gilles Peskine182c2e92018-10-19 11:33:51 +0200111 "0x%%08lx", (unsigned long) core_alg);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200112 }
113 break;
114 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200115 if (core_alg != alg) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200116 if (length_modifier != NO_LENGTH_MODIFIER) {
117 append(&buffer, buffer_size, &required_size, ", ", 2);
118 append_integer(&buffer, buffer_size, &required_size,
119 "%%lu", length_modifier);
120 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200121 append(&buffer, buffer_size, &required_size, ")", 1);
122 }
Gilles Peskine029b5d62018-07-16 23:13:37 +0200123 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +0100124 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200125}
126
127static int psa_snprint_key_usage(char *buffer, size_t buffer_size,
128 psa_key_usage_t usage)
129{
130 size_t required_size = 0;
131 if (usage == 0) {
132 if (buffer_size > 1) {
133 buffer[0] = '0';
134 buffer[1] = 0;
135 } else if (buffer_size == 1) {
136 buffer[0] = 0;
137 }
138 return 1;
139 }
140%(key_usage_code)s
141 if (usage != 0) {
142 if (required_size != 0) {
143 append(&buffer, buffer_size, &required_size, " | ", 3);
144 }
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200145 append_integer(&buffer, buffer_size, &required_size,
146 "0x%%08lx", (unsigned long) usage);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200147 } else {
148 buffer[0] = 0;
149 }
Darryl Green18246962018-10-17 15:01:45 +0100150 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200151}
152
153/* End of automatically generated file. */
154'''
155
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200156KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200157 append_with_curve(&buffer, buffer_size, &required_size,
158 "%(builder)s", %(builder_length)s,
159 PSA_KEY_TYPE_GET_CURVE(type));
160 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200161
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200162KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200163 append_with_group(&buffer, buffer_size, &required_size,
164 "%(builder)s", %(builder_length)s,
165 PSA_KEY_TYPE_GET_GROUP(type));
166 } else '''
167
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200168ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200169 append(&buffer, buffer_size, &required_size,
170 "%(builder)s(", %(builder_length)s + 1);
171 append_with_alg(&buffer, buffer_size, &required_size,
172 psa_hash_algorithm_name,
173 PSA_ALG_GET_HASH(core_alg));
174 append(&buffer, buffer_size, &required_size, ")", 1);
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200175 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200176
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200177BIT_TEST_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +0200178 if (%(var)s & %(flag)s) {
179 if (required_size != 0) {
180 append(&buffer, buffer_size, &required_size, " | ", 3);
181 }
182 append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d);
183 %(var)s ^= %(flag)s;
184 }\
185'''
186
187class MacroCollector:
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200188 """Collect PSA crypto macro definitions from C header files.
189
1901. Call `read_file` on the input header file(s).
1912. Call `write_file` to write ``psa_constant_names_generated.c``.
192"""
193
Gilles Peskine029b5d62018-07-16 23:13:37 +0200194 def __init__(self):
195 self.statuses = set()
196 self.key_types = set()
197 self.key_types_from_curve = {}
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200198 self.key_types_from_group = {}
Gilles Peskine029b5d62018-07-16 23:13:37 +0200199 self.ecc_curves = set()
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200200 self.dh_groups = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200201 self.algorithms = set()
202 self.hash_algorithms = set()
Gilles Peskine882e57e2019-04-12 00:12:07 +0200203 self.ka_algorithms = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200204 self.algorithms_from_hash = {}
205 self.key_usages = set()
206
207 # "#define" followed by a macro name with either no parameters
208 # or a single parameter. Grab the macro name in group 1, the
209 # parameter name if any in group 2 and the definition in group 3.
210 definition_re = re.compile(r'\s*#\s*define\s+(\w+)(?:\s+|\((\w+)\)\s*)(.+)(?:/[*/])?')
211
212 def read_line(self, line):
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200213 """Parse a C header line and record the PSA identifier it defines if any.
214 This function analyzes lines that start with "#define PSA_"
215 (up to non-significant whitespace) and skips all non-matching lines."""
216 # pylint: disable=too-many-branches
Gilles Peskine029b5d62018-07-16 23:13:37 +0200217 m = re.match(self.definition_re, line)
218 if not m:
219 return
220 name, parameter, definition = m.groups()
221 if name.endswith('_FLAG') or name.endswith('MASK'):
222 # Macro only to build actual values
223 return
224 elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \
225 and not parameter:
Gilles Peskine54f54452019-05-27 18:31:59 +0200226 if name in ['PSA_ERROR_UNKNOWN_ERROR',
Jaeden Amero5e6d24c2019-02-21 10:41:29 +0000227 'PSA_ERROR_OCCUPIED_SLOT',
228 'PSA_ERROR_EMPTY_SLOT',
229 'PSA_ERROR_INSUFFICIENT_CAPACITY',
Gilles Peskine54f54452019-05-27 18:31:59 +0200230 ]:
Jaeden Amero5e6d24c2019-02-21 10:41:29 +0000231 # Ad hoc skipping of deprecated error codes, which share
232 # numerical values with non-deprecated error codes
233 return
234
Gilles Peskine029b5d62018-07-16 23:13:37 +0200235 self.statuses.add(name)
236 elif name.startswith('PSA_KEY_TYPE_') and not parameter:
237 self.key_types.add(name)
238 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve':
239 self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:]
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200240 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group':
241 self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:]
Gilles Peskine029b5d62018-07-16 23:13:37 +0200242 elif name.startswith('PSA_ECC_CURVE_') and not parameter:
243 self.ecc_curves.add(name)
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200244 elif name.startswith('PSA_DH_GROUP_') and not parameter:
245 self.dh_groups.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200246 elif name.startswith('PSA_ALG_') and not parameter:
Gilles Peskinedaea26f2018-08-21 14:02:45 +0200247 if name in ['PSA_ALG_ECDSA_BASE',
Gilles Peskine029b5d62018-07-16 23:13:37 +0200248 'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']:
249 # Ad hoc skipping of duplicate names for some numerical values
250 return
251 self.algorithms.add(name)
252 # Ad hoc detection of hash algorithms
253 if re.search(r'0x010000[0-9A-Fa-f]{2}', definition):
254 self.hash_algorithms.add(name)
Gilles Peskine882e57e2019-04-12 00:12:07 +0200255 # Ad hoc detection of key agreement algorithms
256 if re.search(r'0x30[0-9A-Fa-f]{2}0000', definition):
257 self.ka_algorithms.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200258 elif name.startswith('PSA_ALG_') and parameter == 'hash_alg':
259 if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']:
260 # A naming irregularity
261 tester = name[:8] + 'IS_RANDOMIZED_' + name[8:]
262 else:
263 tester = name[:8] + 'IS_' + name[8:]
264 self.algorithms_from_hash[name] = tester
265 elif name.startswith('PSA_KEY_USAGE_') and not parameter:
266 self.key_usages.add(name)
267 else:
268 # Other macro without parameter
269 return
270
271 def read_file(self, header_file):
272 for line in header_file:
273 self.read_line(line)
274
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200275 @staticmethod
276 def _make_return_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200277 return 'case %(name)s: return "%(name)s";' % {'name': name}
278
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200279 @staticmethod
280 def _make_append_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200281 template = ('case %(name)s: '
282 'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); '
283 'break;')
284 return template % {'name': name, 'length': len(name)}
285
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200286 @staticmethod
287 def _make_bit_test(var, flag):
288 return BIT_TEST_TEMPLATE % {'var': var,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200289 'flag': flag,
290 'length': len(flag)}
291
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200292 def _make_status_cases(self):
293 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200294 sorted(self.statuses)))
295
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200296 def _make_ecc_curve_cases(self):
297 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200298 sorted(self.ecc_curves)))
299
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200300 def _make_dh_group_cases(self):
301 return '\n '.join(map(self._make_return_case,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200302 sorted(self.dh_groups)))
303
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200304 def _make_key_type_cases(self):
305 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200306 sorted(self.key_types)))
307
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200308 @staticmethod
309 def _make_key_type_from_curve_code(builder, tester):
310 return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200311 'builder_length': len(builder),
312 'tester': tester}
313
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200314 @staticmethod
315 def _make_key_type_from_group_code(builder, tester):
316 return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200317 'builder_length': len(builder),
318 'tester': tester}
319
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200320 def _make_ecc_key_type_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200321 d = self.key_types_from_curve
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200322 make = self._make_key_type_from_curve_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200323 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200324
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200325 def _make_dh_key_type_code(self):
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200326 d = self.key_types_from_group
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200327 make = self._make_key_type_from_group_code
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200328 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
329
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200330 def _make_hash_algorithm_cases(self):
331 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200332 sorted(self.hash_algorithms)))
333
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200334 def _make_ka_algorithm_cases(self):
335 return '\n '.join(map(self._make_return_case,
Gilles Peskine882e57e2019-04-12 00:12:07 +0200336 sorted(self.ka_algorithms)))
337
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200338 def _make_algorithm_cases(self):
339 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200340 sorted(self.algorithms)))
341
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200342 @staticmethod
343 def _make_algorithm_from_hash_code(builder, tester):
344 return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200345 'builder_length': len(builder),
346 'tester': tester}
347
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200348 def _make_algorithm_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200349 d = self.algorithms_from_hash
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200350 make = self._make_algorithm_from_hash_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200351 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200352
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200353 def _make_key_usage_code(self):
354 return '\n'.join([self._make_bit_test('usage', bit)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200355 for bit in sorted(self.key_usages)])
356
357 def write_file(self, output_file):
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200358 """Generate the pretty-printer function code from the gathered
359 constant definitions."""
Gilles Peskine029b5d62018-07-16 23:13:37 +0200360 data = {}
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200361 data['status_cases'] = self._make_status_cases()
362 data['ecc_curve_cases'] = self._make_ecc_curve_cases()
363 data['dh_group_cases'] = self._make_dh_group_cases()
364 data['key_type_cases'] = self._make_key_type_cases()
365 data['key_type_code'] = (self._make_ecc_key_type_code() +
366 self._make_dh_key_type_code())
367 data['hash_algorithm_cases'] = self._make_hash_algorithm_cases()
368 data['ka_algorithm_cases'] = self._make_ka_algorithm_cases()
369 data['algorithm_cases'] = self._make_algorithm_cases()
370 data['algorithm_code'] = self._make_algorithm_code()
371 data['key_usage_code'] = self._make_key_usage_code()
372 output_file.write(OUTPUT_TEMPLATE % data)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200373
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100374def generate_psa_constants(header_file_names, output_file_name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200375 collector = MacroCollector()
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100376 for header_file_name in header_file_names:
377 with open(header_file_name) as header_file:
378 collector.read_file(header_file)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200379 temp_file_name = output_file_name + '.tmp'
380 with open(temp_file_name, 'w') as output_file:
381 collector.write_file(output_file)
382 os.rename(temp_file_name, output_file_name)
383
384if __name__ == '__main__':
385 if not os.path.isdir('programs') and os.path.isdir('../programs'):
386 os.chdir('..')
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100387 generate_psa_constants(['include/psa/crypto_values.h',
388 'include/psa/crypto_extra.h'],
Gilles Peskine029b5d62018-07-16 23:13:37 +0200389 'programs/psa/psa_constant_names_generated.c')