blob: 9e2c8988530a04eaff7b31d32919216eed826c17 [file] [log] [blame]
Steven Cooreman2a1664c2020-07-20 15:33:08 +02001/*
Steven Cooreman04524762020-10-13 17:43:44 +02002 * Test driver for generating and verifying keys.
Steven Cooreman2a1664c2020-07-20 15:33:08 +02003 */
Steven Cooreman2c7b2f82020-09-02 13:43:46 +02004/* Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00005 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Steven Cooreman2a1664c2020-07-20 15:33:08 +02006 */
7
Steven Cooremanc4813a62020-10-23 11:45:43 +02008#ifndef PSA_CRYPTO_TEST_DRIVERS_KEY_MANAGEMENT_H
9#define PSA_CRYPTO_TEST_DRIVERS_KEY_MANAGEMENT_H
Steven Cooreman2a1664c2020-07-20 15:33:08 +020010
Bence Szépkútic662b362021-05-27 11:25:03 +020011#include "mbedtls/build_info.h"
Steven Cooreman2a1664c2020-07-20 15:33:08 +020012
Steven Cooremanf1720ea2020-07-24 18:41:58 +020013#if defined(PSA_CRYPTO_DRIVER_TEST)
Steven Cooreman2a1664c2020-07-20 15:33:08 +020014#include <psa/crypto_driver_common.h>
15
Steven Cooremanf9a55ff2021-02-19 18:04:59 +010016#define PSA_CRYPTO_TEST_DRIVER_BUILTIN_AES_KEY_SLOT 0
17#define PSA_CRYPTO_TEST_DRIVER_BUILTIN_ECDSA_KEY_SLOT 1
Steven Cooreman437fcfc2021-02-22 12:44:15 +010018
Steven Cooreman831c6952020-09-07 12:58:16 +020019typedef struct {
20 /* If non-null, on success, copy this to the output. */
21 void *forced_output;
22 size_t forced_output_length;
23 /* If not PSA_SUCCESS, return this error code instead of processing the
24 * function call. */
25 psa_status_t forced_status;
Steven Cooremanc4813a62020-10-23 11:45:43 +020026 /* Count the amount of times one of the key management driver functions
27 * is called. */
Steven Cooreman831c6952020-09-07 12:58:16 +020028 unsigned long hits;
Andrzej Kurekba4cade2022-02-03 10:27:01 -050029 /* Location of the last key management driver called to import a key. */
30 psa_key_location_t location;
Ronald Cron7f13fa22021-04-13 12:41:34 +020031} mbedtls_test_driver_key_management_hooks_t;
Steven Cooreman2a1664c2020-07-20 15:33:08 +020032
Andrzej Kurek333e0fa2022-02-03 09:42:47 -050033/* The location is initialized to the invalid value 0x800000. Invalid in the
34 * sense that no PSA specification will assign a meaning to this location
35 * (stated first in version 1.0.1 of the specification) and that it is not
36 * used as a location of an opaque test drivers. */
Andrzej Kurekdc137252021-12-07 19:06:51 +010037#define MBEDTLS_TEST_DRIVER_KEY_MANAGEMENT_INIT { NULL, 0, PSA_SUCCESS, 0, 0x800000 }
Ronald Cron7f13fa22021-04-13 12:41:34 +020038static inline mbedtls_test_driver_key_management_hooks_t
Gilles Peskine449bd832023-01-11 14:50:10 +010039mbedtls_test_driver_key_management_hooks_init(void)
Steven Cooreman831c6952020-09-07 12:58:16 +020040{
Ronald Cron7f13fa22021-04-13 12:41:34 +020041 const mbedtls_test_driver_key_management_hooks_t
42 v = MBEDTLS_TEST_DRIVER_KEY_MANAGEMENT_INIT;
Gilles Peskine449bd832023-01-11 14:50:10 +010043 return v;
Steven Cooreman831c6952020-09-07 12:58:16 +020044}
45
Archana4d7ae1d2021-07-07 02:50:22 +053046/*
47 * In order to convert the plain text keys to Opaque, the size of the key is
Archana449608b2021-09-08 15:36:05 +053048 * padded up by PSA_CRYPTO_TEST_DRIVER_OPAQUE_PAD_PREFIX_SIZE in addition to
49 * xor mangling the key. The pad prefix needs to be accounted for while
50 * sizing for the key.
Archana4d7ae1d2021-07-07 02:50:22 +053051 */
52#define PSA_CRYPTO_TEST_DRIVER_OPAQUE_PAD_PREFIX 0xBEEFED00U
Archana449608b2021-09-08 15:36:05 +053053#define PSA_CRYPTO_TEST_DRIVER_OPAQUE_PAD_PREFIX_SIZE sizeof( \
Gilles Peskine449bd832023-01-11 14:50:10 +010054 PSA_CRYPTO_TEST_DRIVER_OPAQUE_PAD_PREFIX)
Archana4d7ae1d2021-07-07 02:50:22 +053055
56size_t mbedtls_test_opaque_size_function(
57 const psa_key_type_t key_type,
Gilles Peskine449bd832023-01-11 14:50:10 +010058 const size_t key_bits);
Archana4d7ae1d2021-07-07 02:50:22 +053059
Ronald Cron7f13fa22021-04-13 12:41:34 +020060extern mbedtls_test_driver_key_management_hooks_t
61 mbedtls_test_driver_key_management_hooks;
Steven Cooreman2a1664c2020-07-20 15:33:08 +020062
Gilles Peskine449bd832023-01-11 14:50:10 +010063psa_status_t mbedtls_test_transparent_init(void);
64void mbedtls_test_transparent_free(void);
65psa_status_t mbedtls_test_opaque_init(void);
66void mbedtls_test_opaque_free(void);
Ronald Cron9ba76912021-04-10 16:57:30 +020067
Ronald Cron7f13fa22021-04-13 12:41:34 +020068psa_status_t mbedtls_test_transparent_generate_key(
Steven Cooreman2a1664c2020-07-20 15:33:08 +020069 const psa_key_attributes_t *attributes,
Gilles Peskine449bd832023-01-11 14:50:10 +010070 uint8_t *key, size_t key_size, size_t *key_length);
Steven Cooreman2a1664c2020-07-20 15:33:08 +020071
Ronald Cron7f13fa22021-04-13 12:41:34 +020072psa_status_t mbedtls_test_opaque_generate_key(
Steven Cooreman2a1664c2020-07-20 15:33:08 +020073 const psa_key_attributes_t *attributes,
Gilles Peskine449bd832023-01-11 14:50:10 +010074 uint8_t *key, size_t key_size, size_t *key_length);
Steven Cooreman2a1664c2020-07-20 15:33:08 +020075
Ronald Cron7f13fa22021-04-13 12:41:34 +020076psa_status_t mbedtls_test_opaque_export_key(
Ronald Cron67227982020-11-26 15:16:05 +010077 const psa_key_attributes_t *attributes,
78 const uint8_t *key, size_t key_length,
Gilles Peskine449bd832023-01-11 14:50:10 +010079 uint8_t *data, size_t data_size, size_t *data_length);
Ronald Cron67227982020-11-26 15:16:05 +010080
Ronald Cron7f13fa22021-04-13 12:41:34 +020081psa_status_t mbedtls_test_transparent_export_public_key(
Steven Cooremanb9b84422020-10-14 14:39:20 +020082 const psa_key_attributes_t *attributes,
83 const uint8_t *key, size_t key_length,
Gilles Peskine449bd832023-01-11 14:50:10 +010084 uint8_t *data, size_t data_size, size_t *data_length);
Steven Cooremanb9b84422020-10-14 14:39:20 +020085
Ronald Cron7f13fa22021-04-13 12:41:34 +020086psa_status_t mbedtls_test_opaque_export_public_key(
Steven Cooremanb9b84422020-10-14 14:39:20 +020087 const psa_key_attributes_t *attributes,
88 const uint8_t *key, size_t key_length,
Gilles Peskine449bd832023-01-11 14:50:10 +010089 uint8_t *data, size_t data_size, size_t *data_length);
Steven Cooreman04524762020-10-13 17:43:44 +020090
Ronald Cron7f13fa22021-04-13 12:41:34 +020091psa_status_t mbedtls_test_transparent_import_key(
Ronald Cron83282872020-11-22 14:02:39 +010092 const psa_key_attributes_t *attributes,
93 const uint8_t *data,
94 size_t data_length,
95 uint8_t *key_buffer,
96 size_t key_buffer_size,
97 size_t *key_buffer_length,
98 size_t *bits);
99
Archana4d7ae1d2021-07-07 02:50:22 +0530100psa_status_t mbedtls_test_opaque_import_key(
101 const psa_key_attributes_t *attributes,
102 const uint8_t *data,
103 size_t data_length,
104 uint8_t *key_buffer,
105 size_t key_buffer_size,
106 size_t *key_buffer_length,
107 size_t *bits);
108
Ronald Cron7f13fa22021-04-13 12:41:34 +0200109psa_status_t mbedtls_test_opaque_get_builtin_key(
Steven Cooremanf9a55ff2021-02-19 18:04:59 +0100110 psa_drv_slot_number_t slot_number,
111 psa_key_attributes_t *attributes,
Gilles Peskine449bd832023-01-11 14:50:10 +0100112 uint8_t *key_buffer, size_t key_buffer_size, size_t *key_buffer_length);
Steven Cooremanf9a55ff2021-02-19 18:04:59 +0100113
Archana8a180362021-07-05 02:18:48 +0530114psa_status_t mbedtls_test_opaque_copy_key(
115 psa_key_attributes_t *attributes,
116 const uint8_t *source_key,
Archana9d17bf42021-09-10 06:22:44 +0530117 size_t source_key_length,
Archana8a180362021-07-05 02:18:48 +0530118 uint8_t *target_key_buffer,
Archana449608b2021-09-08 15:36:05 +0530119 size_t target_key_buffer_size,
120 size_t *target_key_buffer_length);
Archana8a180362021-07-05 02:18:48 +0530121
Steven Cooremanf1720ea2020-07-24 18:41:58 +0200122#endif /* PSA_CRYPTO_DRIVER_TEST */
Steven Cooremanc4813a62020-10-23 11:45:43 +0200123#endif /* PSA_CRYPTO_TEST_DRIVERS_KEY_MANAGEMENT_H */