Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 1 | #!/usr/bin/env python3 |
| 2 | |
| 3 | # Copyright The Mbed TLS Contributors |
| 4 | # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
| 5 | |
| 6 | """Module generating EC and RSA keys to be used in test_suite_pk instead of |
| 7 | generating the required key at run time. This helps speeding up testing.""" |
| 8 | |
| 9 | import os |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 10 | from typing import Iterator |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 11 | import re |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 12 | import argparse |
Valerio Setti | 8f40460 | 2024-04-15 15:09:10 +0200 | [diff] [blame] | 13 | import scripts_path # pylint: disable=unused-import |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 14 | from mbedtls_dev.asymmetric_key_data import ASYMMETRIC_KEY_DATA |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 15 | |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 16 | OUTPUT_HEADER_FILE = os.path.dirname(os.path.abspath(__file__)) + "/../src/test_keys.h" |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 17 | BYTES_PER_LINE = 16 |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 18 | |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 19 | def c_byte_array_literal_content(array_name: str, key_data: bytes) -> Iterator[str]: |
| 20 | yield 'const unsigned char ' |
| 21 | yield array_name |
| 22 | yield '[] = {' |
| 23 | for index in range(0, len(key_data), BYTES_PER_LINE): |
| 24 | yield '\n ' |
| 25 | for b in key_data[index:index + BYTES_PER_LINE]: |
| 26 | yield ' {:#04x},'.format(b) |
| 27 | yield '\n};' |
| 28 | |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 29 | def convert_der_to_c(array_name: str, key_data: bytes) -> str: |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 30 | return ''.join(c_byte_array_literal_content(array_name, key_data)) |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 31 | |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 32 | def get_key_type(key: str) -> str: |
| 33 | if re.match('PSA_KEY_TYPE_RSA_.*', key): |
| 34 | return "rsa" |
| 35 | elif re.match('PSA_KEY_TYPE_ECC_.*', key): |
| 36 | return "ec" |
| 37 | else: |
| 38 | print("Unhandled key type {}".format(key)) |
| 39 | return "unknown" |
| 40 | |
| 41 | def get_ec_key_family(key: str) -> str: |
| 42 | match = re.search(r'.*\((.*)\)', key) |
| 43 | if match is None: |
| 44 | raise Exception("Unable to get EC family from {}".format(key)) |
| 45 | return match.group(1) |
| 46 | |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 47 | # Legacy EC group ID do not support all the key types that PSA does, so the |
| 48 | # following dictionaries are used for: |
| 49 | # - getting prefix/suffix for legacy curve names |
| 50 | # - understand if the curve is supported in legacy symbols (MBEDTLS_ECP_DP_...) |
| 51 | EC_NAME_CONVERSION = { |
| 52 | 'PSA_ECC_FAMILY_SECP_K1': { |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 53 | 192: ('secp', 'k1'), |
| 54 | 224: ('secp', 'k1'), |
| 55 | 256: ('secp', 'k1') |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 56 | }, |
| 57 | 'PSA_ECC_FAMILY_SECP_R1': { |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 58 | 192: ('secp', 'r1'), |
| 59 | 224: ('secp', 'r1'), |
| 60 | 256: ('secp', 'r1'), |
| 61 | 384: ('secp', 'r1'), |
| 62 | 521: ('secp', 'r1') |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 63 | }, |
| 64 | 'PSA_ECC_FAMILY_BRAINPOOL_P_R1': { |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 65 | 256: ('bp', 'r1'), |
| 66 | 384: ('bp', 'r1'), |
| 67 | 512: ('bp', 'r1') |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 68 | }, |
| 69 | 'PSA_ECC_FAMILY_MONTGOMERY': { |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 70 | 255: ('curve', '19'), |
| 71 | 448: ('curve', '') |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 72 | } |
| 73 | } |
| 74 | |
| 75 | def get_ec_curve_name(priv_key: str, bits: int) -> str: |
| 76 | ec_family = get_ec_key_family(priv_key) |
| 77 | try: |
| 78 | prefix = EC_NAME_CONVERSION[ec_family][bits][0] |
| 79 | suffix = EC_NAME_CONVERSION[ec_family][bits][1] |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 80 | except KeyError: |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 81 | return "" |
| 82 | return prefix + str(bits) + suffix |
| 83 | |
Valerio Setti | 3618821 | 2024-04-17 16:12:12 +0200 | [diff] [blame] | 84 | def get_look_up_table_entry(key_type: str, group_id_or_keybits: str, |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 85 | priv_array_name: str, pub_array_name: str) -> Iterator[str]: |
Valerio Setti | 3618821 | 2024-04-17 16:12:12 +0200 | [diff] [blame] | 86 | if key_type == "ec": |
| 87 | yield " {{ {}, 0,\n".format(group_id_or_keybits) |
| 88 | else: |
| 89 | yield " {{ 0, {},\n".format(group_id_or_keybits) |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 90 | yield " {0}, sizeof({0}),\n".format(priv_array_name) |
| 91 | yield " {0}, sizeof({0}) }},".format(pub_array_name) |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 92 | |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 93 | def main() -> None: |
Valerio Setti | 52516a6 | 2024-04-11 11:41:24 +0200 | [diff] [blame] | 94 | current_path = os.path.dirname(os.path.realpath(__file__)) |
| 95 | default_output_path = current_path + "/../src/test_keys.h" |
| 96 | |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 97 | argparser = argparse.ArgumentParser() |
Valerio Setti | 52516a6 | 2024-04-11 11:41:24 +0200 | [diff] [blame] | 98 | argparser.add_argument("--output", help="Output file", default=default_output_path) |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 99 | args = argparser.parse_args() |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 100 | |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 101 | output_file = args.output |
Valerio Setti | 96daf67 | 2024-04-11 11:50:46 +0200 | [diff] [blame^] | 102 | # If the output file already exists, then we can quit (successfully) |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 103 | if os.path.exists(output_file): |
Valerio Setti | 96daf67 | 2024-04-11 11:50:46 +0200 | [diff] [blame^] | 104 | return |
Valerio Setti | 270dcd1 | 2024-04-08 13:44:41 +0200 | [diff] [blame] | 105 | |
| 106 | output_file = open(output_file, 'at') |
Valerio Setti | 3e22bf2 | 2024-04-03 13:42:20 +0200 | [diff] [blame] | 107 | output_file.write( |
| 108 | "/*********************************************************************************\n" + |
| 109 | " * This file was automatically generated from tests/scripts/generate_test_keys.py.\n" + |
| 110 | " * Please do not edit it manually.\n" + |
Valerio Setti | 6bda5f5 | 2024-04-09 12:28:39 +0200 | [diff] [blame] | 111 | " *********************************************************************************/\n" |
Valerio Setti | 3e22bf2 | 2024-04-03 13:42:20 +0200 | [diff] [blame] | 112 | ) |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 113 | |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 114 | look_up_table = [] |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 115 | |
| 116 | # Get a list of private keys only in order to get a single item for every |
| 117 | # (key type, key bits) pair. We know that ASYMMETRIC_KEY_DATA |
| 118 | # contains also the public counterpart. |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 119 | priv_keys = [key for key in ASYMMETRIC_KEY_DATA if '_KEY_PAIR' in key] |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 120 | |
| 121 | for priv_key in priv_keys: |
| 122 | key_type = get_key_type(priv_key) |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 123 | # Ignore keys which are not EC or RSA |
| 124 | if key_type == "unknown": |
| 125 | continue |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 126 | |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 127 | pub_key = re.sub('_KEY_PAIR', '_PUBLIC_KEY', priv_key) |
| 128 | |
| 129 | for bits in ASYMMETRIC_KEY_DATA[priv_key]: |
| 130 | if key_type == "ec": |
| 131 | curve = get_ec_curve_name(priv_key, bits) |
| 132 | # Ignore EC curves unsupported in legacy symbols |
| 133 | if curve == "": |
| 134 | continue |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 135 | # Create output array name |
| 136 | if key_type == "rsa": |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 137 | array_name_base = "_".join(["test", key_type, str(bits)]) |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 138 | else: |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 139 | array_name_base = "_".join(["test", key_type, curve]) |
| 140 | array_name_priv = array_name_base + "_priv" |
| 141 | array_name_pub = array_name_base + "_pub" |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 142 | # Convert bytearray to C array |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 143 | c_array_priv = convert_der_to_c(array_name_priv, ASYMMETRIC_KEY_DATA[priv_key][bits]) |
| 144 | c_array_pub = convert_der_to_c(array_name_pub, ASYMMETRIC_KEY_DATA[pub_key][bits]) |
Valerio Setti | 7031a4e | 2024-04-16 10:31:15 +0200 | [diff] [blame] | 145 | # Write the C array to the output file |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 146 | output_file.write(''.join(["\n", c_array_priv, "\n", c_array_pub, "\n"])) |
| 147 | # Update the lookup table |
| 148 | if key_type == "ec": |
Valerio Setti | 3618821 | 2024-04-17 16:12:12 +0200 | [diff] [blame] | 149 | group_id_or_keybits = "MBEDTLS_ECP_DP_" + curve.upper() |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 150 | else: |
Valerio Setti | 3618821 | 2024-04-17 16:12:12 +0200 | [diff] [blame] | 151 | group_id_or_keybits = str(bits) |
| 152 | look_up_table.append(''.join(get_look_up_table_entry(key_type, group_id_or_keybits, |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 153 | array_name_priv, array_name_pub))) |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 154 | # Write the lookup table: the struct containing pointers to all the arrays we created above. |
| 155 | output_file.write(""" |
| 156 | struct predefined_key_element { |
Valerio Setti | 3618821 | 2024-04-17 16:12:12 +0200 | [diff] [blame] | 157 | int group_id; // EC group ID; 0 for RSA keys |
| 158 | int keybits; // bits size of RSA key; 0 for EC keys |
Valerio Setti | 9aa4fa9 | 2024-04-16 10:54:23 +0200 | [diff] [blame] | 159 | const unsigned char *priv_key; |
| 160 | size_t priv_key_len; |
| 161 | const unsigned char *pub_key; |
| 162 | size_t pub_key_len; |
| 163 | }; |
| 164 | |
Valerio Setti | ee74339 | 2024-04-17 15:12:49 +0200 | [diff] [blame] | 165 | struct predefined_key_element predefined_keys[] = { |
| 166 | """) |
| 167 | output_file.write("\n".join(look_up_table)) |
| 168 | output_file.write("\n};\n") |
Valerio Setti | 7126ba5 | 2024-03-29 16:59:40 +0100 | [diff] [blame] | 169 | |
| 170 | if __name__ == '__main__': |
Valerio Setti | 862d14e | 2024-04-15 17:58:43 +0200 | [diff] [blame] | 171 | main() |