blob: c84b83857b1e0c8c36f60540810caa8e11166048 [file] [log] [blame]
Gilles Peskine0bbad742019-05-27 18:24:31 +02001#!/usr/bin/env python3
Gilles Peskine9d4d7502019-05-27 18:25:46 +02002
Hugues de Valon600cf9d2020-05-29 10:29:49 +01003"""Generate psa_constant_names_generated.c
Gilles Peskine9d4d7502019-05-27 18:25:46 +02004which is included by programs/psa/psa_constant_names.c.
5The code generated by this module is only meant to be used in the context
6of that program.
Hugues de Valon600cf9d2020-05-29 10:29:49 +01007
8An argument passed to this script will modify the output directory where the
9file is written:
10* by default (no arguments passed): writes to programs/psa/
11* OUTPUT_FILE_DIR passed: writes to OUTPUT_FILE_DIR/
Gilles Peskine9d4d7502019-05-27 18:25:46 +020012"""
13
Bence Szépkúti700ee442020-05-26 00:33:31 +020014# Copyright (C) 2018-2020, Arm Limited, All Rights Reserved
Bence Szépkútic7da1fe2020-05-26 01:54:15 +020015# SPDX-License-Identifier: Apache-2.0
16#
17# Licensed under the Apache License, Version 2.0 (the "License"); you may
18# not use this file except in compliance with the License.
19# You may obtain a copy of the License at
20#
21# http://www.apache.org/licenses/LICENSE-2.0
22#
23# Unless required by applicable law or agreed to in writing, software
24# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26# See the License for the specific language governing permissions and
27# limitations under the License.
Bence Szépkúti700ee442020-05-26 00:33:31 +020028#
29# This file is part of Mbed TLS (https://tls.mbed.org)
30
Gilles Peskine029b5d62018-07-16 23:13:37 +020031import os
32import re
Hugues de Valon235c72d2020-05-28 08:42:01 +010033import sys
Gilles Peskine029b5d62018-07-16 23:13:37 +020034
Gilles Peskine42a0a0a2019-05-27 18:29:47 +020035OUTPUT_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +020036/* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */
37
38static const char *psa_strerror(psa_status_t status)
39{
40 switch (status) {
41 %(status_cases)s
42 default: return NULL;
43 }
44}
45
Paul Elliott8ff510a2020-06-02 17:19:28 +010046static const char *psa_ecc_family_name(psa_ecc_family_t curve)
Gilles Peskine029b5d62018-07-16 23:13:37 +020047{
48 switch (curve) {
49 %(ecc_curve_cases)s
50 default: return NULL;
51 }
52}
53
Paul Elliott75e27032020-06-03 15:17:39 +010054static const char *psa_dh_family_name(psa_dh_family_t group)
Gilles Peskinedcaefae2019-05-16 12:55:35 +020055{
56 switch (group) {
57 %(dh_group_cases)s
58 default: return NULL;
59 }
60}
61
Gilles Peskine029b5d62018-07-16 23:13:37 +020062static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
63{
64 switch (hash_alg) {
65 %(hash_algorithm_cases)s
66 default: return NULL;
67 }
68}
69
Gilles Peskine882e57e2019-04-12 00:12:07 +020070static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg)
71{
72 switch (ka_alg) {
73 %(ka_algorithm_cases)s
74 default: return NULL;
75 }
76}
77
Gilles Peskine029b5d62018-07-16 23:13:37 +020078static int psa_snprint_key_type(char *buffer, size_t buffer_size,
79 psa_key_type_t type)
80{
81 size_t required_size = 0;
82 switch (type) {
83 %(key_type_cases)s
84 default:
85 %(key_type_code)s{
86 return snprintf(buffer, buffer_size,
Gilles Peskinef65ed6f2019-12-04 17:18:41 +010087 "0x%%04x", (unsigned) type);
Gilles Peskine029b5d62018-07-16 23:13:37 +020088 }
89 break;
90 }
91 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +010092 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +020093}
94
Gilles Peskine882e57e2019-04-12 00:12:07 +020095#define NO_LENGTH_MODIFIER 0xfffffffflu
Gilles Peskine029b5d62018-07-16 23:13:37 +020096static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
97 psa_algorithm_t alg)
98{
99 size_t required_size = 0;
Gilles Peskine498c2a12018-08-20 15:07:20 +0200100 psa_algorithm_t core_alg = alg;
Gilles Peskine882e57e2019-04-12 00:12:07 +0200101 unsigned long length_modifier = NO_LENGTH_MODIFIER;
Gilles Peskine498c2a12018-08-20 15:07:20 +0200102 if (PSA_ALG_IS_MAC(alg)) {
103 core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0);
104 if (core_alg != alg) {
105 append(&buffer, buffer_size, &required_size,
106 "PSA_ALG_TRUNCATED_MAC(", 22);
107 length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg);
108 }
109 } else if (PSA_ALG_IS_AEAD(alg)) {
110 core_alg = PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH(alg);
Gilles Peskine182c2e92018-10-19 11:33:51 +0200111 if (core_alg == 0) {
Darryl Greendf723062019-02-06 15:36:00 +0000112 /* For unknown AEAD algorithms, there is no "default tag length". */
Gilles Peskine182c2e92018-10-19 11:33:51 +0200113 core_alg = alg;
114 } else if (core_alg != alg) {
Gilles Peskine498c2a12018-08-20 15:07:20 +0200115 append(&buffer, buffer_size, &required_size,
116 "PSA_ALG_AEAD_WITH_TAG_LENGTH(", 29);
117 length_modifier = PSA_AEAD_TAG_LENGTH(alg);
118 }
Gilles Peskine882e57e2019-04-12 00:12:07 +0200119 } else if (PSA_ALG_IS_KEY_AGREEMENT(alg) &&
120 !PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
121 core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
122 append(&buffer, buffer_size, &required_size,
123 "PSA_ALG_KEY_AGREEMENT(", 22);
124 append_with_alg(&buffer, buffer_size, &required_size,
125 psa_ka_algorithm_name,
126 PSA_ALG_KEY_AGREEMENT_GET_BASE(alg));
127 append(&buffer, buffer_size, &required_size, ", ", 2);
Gilles Peskine498c2a12018-08-20 15:07:20 +0200128 }
129 switch (core_alg) {
Gilles Peskine029b5d62018-07-16 23:13:37 +0200130 %(algorithm_cases)s
131 default:
132 %(algorithm_code)s{
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200133 append_integer(&buffer, buffer_size, &required_size,
Gilles Peskine182c2e92018-10-19 11:33:51 +0200134 "0x%%08lx", (unsigned long) core_alg);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200135 }
136 break;
137 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200138 if (core_alg != alg) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200139 if (length_modifier != NO_LENGTH_MODIFIER) {
140 append(&buffer, buffer_size, &required_size, ", ", 2);
141 append_integer(&buffer, buffer_size, &required_size,
142 "%%lu", length_modifier);
143 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200144 append(&buffer, buffer_size, &required_size, ")", 1);
145 }
Gilles Peskine029b5d62018-07-16 23:13:37 +0200146 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +0100147 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200148}
149
150static int psa_snprint_key_usage(char *buffer, size_t buffer_size,
151 psa_key_usage_t usage)
152{
153 size_t required_size = 0;
154 if (usage == 0) {
155 if (buffer_size > 1) {
156 buffer[0] = '0';
157 buffer[1] = 0;
158 } else if (buffer_size == 1) {
159 buffer[0] = 0;
160 }
161 return 1;
162 }
163%(key_usage_code)s
164 if (usage != 0) {
165 if (required_size != 0) {
166 append(&buffer, buffer_size, &required_size, " | ", 3);
167 }
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200168 append_integer(&buffer, buffer_size, &required_size,
169 "0x%%08lx", (unsigned long) usage);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200170 } else {
171 buffer[0] = 0;
172 }
Darryl Green18246962018-10-17 15:01:45 +0100173 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200174}
175
176/* End of automatically generated file. */
177'''
178
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200179KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200180 append_with_curve(&buffer, buffer_size, &required_size,
181 "%(builder)s", %(builder_length)s,
Paul Elliott8ff510a2020-06-02 17:19:28 +0100182 PSA_KEY_TYPE_ECC_GET_FAMILY(type));
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200183 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200184
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200185KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200186 append_with_group(&buffer, buffer_size, &required_size,
187 "%(builder)s", %(builder_length)s,
Paul Elliott75e27032020-06-03 15:17:39 +0100188 PSA_KEY_TYPE_DH_GET_FAMILY(type));
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200189 } else '''
190
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200191ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200192 append(&buffer, buffer_size, &required_size,
193 "%(builder)s(", %(builder_length)s + 1);
194 append_with_alg(&buffer, buffer_size, &required_size,
195 psa_hash_algorithm_name,
196 PSA_ALG_GET_HASH(core_alg));
197 append(&buffer, buffer_size, &required_size, ")", 1);
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200198 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200199
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200200BIT_TEST_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +0200201 if (%(var)s & %(flag)s) {
202 if (required_size != 0) {
203 append(&buffer, buffer_size, &required_size, " | ", 3);
204 }
205 append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d);
206 %(var)s ^= %(flag)s;
207 }\
208'''
209
210class MacroCollector:
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200211 """Collect PSA crypto macro definitions from C header files.
212
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200213 1. Call `read_file` on the input header file(s).
214 2. Call `write_file` to write ``psa_constant_names_generated.c``.
215 """
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200216
Gilles Peskine029b5d62018-07-16 23:13:37 +0200217 def __init__(self):
218 self.statuses = set()
219 self.key_types = set()
220 self.key_types_from_curve = {}
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200221 self.key_types_from_group = {}
Gilles Peskine029b5d62018-07-16 23:13:37 +0200222 self.ecc_curves = set()
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200223 self.dh_groups = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200224 self.algorithms = set()
225 self.hash_algorithms = set()
Gilles Peskine882e57e2019-04-12 00:12:07 +0200226 self.ka_algorithms = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200227 self.algorithms_from_hash = {}
228 self.key_usages = set()
229
230 # "#define" followed by a macro name with either no parameters
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200231 # or a single parameter and a non-empty expansion.
232 # Grab the macro name in group 1, the parameter name if any in group 2
233 # and the expansion in group 3.
234 _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' +
235 r'(?:\s+|\((\w+)\)\s*)' +
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200236 r'(.+)')
Gilles Peskine33b84f42019-05-17 12:05:59 +0200237 _deprecated_definition_re = re.compile(r'\s*MBEDTLS_DEPRECATED')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200238
239 def read_line(self, line):
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200240 """Parse a C header line and record the PSA identifier it defines if any.
241 This function analyzes lines that start with "#define PSA_"
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200242 (up to non-significant whitespace) and skips all non-matching lines.
243 """
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200244 # pylint: disable=too-many-branches
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200245 m = re.match(self._define_directive_re, line)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200246 if not m:
247 return
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200248 name, parameter, expansion = m.groups()
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200249 expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion)
Gilles Peskine33b84f42019-05-17 12:05:59 +0200250 if re.match(self._deprecated_definition_re, expansion):
251 # Skip deprecated values, which are assumed to be
252 # backward compatibility aliases that share
253 # numerical values with non-deprecated values.
254 return
Gilles Peskine029b5d62018-07-16 23:13:37 +0200255 if name.endswith('_FLAG') or name.endswith('MASK'):
256 # Macro only to build actual values
257 return
258 elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \
259 and not parameter:
260 self.statuses.add(name)
261 elif name.startswith('PSA_KEY_TYPE_') and not parameter:
262 self.key_types.add(name)
263 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve':
264 self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:]
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200265 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group':
266 self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:]
Paul Elliott8ff510a2020-06-02 17:19:28 +0100267 elif name.startswith('PSA_ECC_FAMILY_') and not parameter:
Gilles Peskine029b5d62018-07-16 23:13:37 +0200268 self.ecc_curves.add(name)
Paul Elliott75e27032020-06-03 15:17:39 +0100269 elif name.startswith('PSA_DH_FAMILY_') and not parameter:
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200270 self.dh_groups.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200271 elif name.startswith('PSA_ALG_') and not parameter:
Gilles Peskinedaea26f2018-08-21 14:02:45 +0200272 if name in ['PSA_ALG_ECDSA_BASE',
Gilles Peskine029b5d62018-07-16 23:13:37 +0200273 'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']:
274 # Ad hoc skipping of duplicate names for some numerical values
275 return
276 self.algorithms.add(name)
277 # Ad hoc detection of hash algorithms
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200278 if re.search(r'0x010000[0-9A-Fa-f]{2}', expansion):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200279 self.hash_algorithms.add(name)
Gilles Peskine882e57e2019-04-12 00:12:07 +0200280 # Ad hoc detection of key agreement algorithms
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200281 if re.search(r'0x30[0-9A-Fa-f]{2}0000', expansion):
Gilles Peskine882e57e2019-04-12 00:12:07 +0200282 self.ka_algorithms.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200283 elif name.startswith('PSA_ALG_') and parameter == 'hash_alg':
284 if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']:
285 # A naming irregularity
286 tester = name[:8] + 'IS_RANDOMIZED_' + name[8:]
287 else:
288 tester = name[:8] + 'IS_' + name[8:]
289 self.algorithms_from_hash[name] = tester
290 elif name.startswith('PSA_KEY_USAGE_') and not parameter:
291 self.key_usages.add(name)
292 else:
293 # Other macro without parameter
294 return
295
Gilles Peskine49af2d32019-12-06 19:20:13 +0100296 _nonascii_re = re.compile(rb'[^\x00-\x7f]+')
297 _continued_line_re = re.compile(rb'\\\r?\n\Z')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200298 def read_file(self, header_file):
299 for line in header_file:
Gilles Peskine49af2d32019-12-06 19:20:13 +0100300 m = re.search(self._continued_line_re, line)
301 while m:
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200302 cont = next(header_file)
Gilles Peskine49af2d32019-12-06 19:20:13 +0100303 line = line[:m.start(0)] + cont
304 m = re.search(self._continued_line_re, line)
305 line = re.sub(self._nonascii_re, rb'', line).decode('ascii')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200306 self.read_line(line)
307
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200308 @staticmethod
309 def _make_return_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200310 return 'case %(name)s: return "%(name)s";' % {'name': name}
311
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200312 @staticmethod
313 def _make_append_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200314 template = ('case %(name)s: '
315 'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); '
316 'break;')
317 return template % {'name': name, 'length': len(name)}
318
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200319 @staticmethod
320 def _make_bit_test(var, flag):
321 return BIT_TEST_TEMPLATE % {'var': var,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200322 'flag': flag,
323 'length': len(flag)}
324
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200325 def _make_status_cases(self):
326 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200327 sorted(self.statuses)))
328
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200329 def _make_ecc_curve_cases(self):
330 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200331 sorted(self.ecc_curves)))
332
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200333 def _make_dh_group_cases(self):
334 return '\n '.join(map(self._make_return_case,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200335 sorted(self.dh_groups)))
336
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200337 def _make_key_type_cases(self):
338 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200339 sorted(self.key_types)))
340
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200341 @staticmethod
342 def _make_key_type_from_curve_code(builder, tester):
343 return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200344 'builder_length': len(builder),
345 'tester': tester}
346
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200347 @staticmethod
348 def _make_key_type_from_group_code(builder, tester):
349 return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200350 'builder_length': len(builder),
351 'tester': tester}
352
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200353 def _make_ecc_key_type_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200354 d = self.key_types_from_curve
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200355 make = self._make_key_type_from_curve_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200356 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200357
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200358 def _make_dh_key_type_code(self):
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200359 d = self.key_types_from_group
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200360 make = self._make_key_type_from_group_code
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200361 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
362
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200363 def _make_hash_algorithm_cases(self):
364 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200365 sorted(self.hash_algorithms)))
366
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200367 def _make_ka_algorithm_cases(self):
368 return '\n '.join(map(self._make_return_case,
Gilles Peskine882e57e2019-04-12 00:12:07 +0200369 sorted(self.ka_algorithms)))
370
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200371 def _make_algorithm_cases(self):
372 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200373 sorted(self.algorithms)))
374
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200375 @staticmethod
376 def _make_algorithm_from_hash_code(builder, tester):
377 return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200378 'builder_length': len(builder),
379 'tester': tester}
380
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200381 def _make_algorithm_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200382 d = self.algorithms_from_hash
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200383 make = self._make_algorithm_from_hash_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200384 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200385
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200386 def _make_key_usage_code(self):
387 return '\n'.join([self._make_bit_test('usage', bit)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200388 for bit in sorted(self.key_usages)])
389
390 def write_file(self, output_file):
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200391 """Generate the pretty-printer function code from the gathered
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200392 constant definitions.
393 """
Gilles Peskine029b5d62018-07-16 23:13:37 +0200394 data = {}
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200395 data['status_cases'] = self._make_status_cases()
396 data['ecc_curve_cases'] = self._make_ecc_curve_cases()
397 data['dh_group_cases'] = self._make_dh_group_cases()
398 data['key_type_cases'] = self._make_key_type_cases()
399 data['key_type_code'] = (self._make_ecc_key_type_code() +
400 self._make_dh_key_type_code())
401 data['hash_algorithm_cases'] = self._make_hash_algorithm_cases()
402 data['ka_algorithm_cases'] = self._make_ka_algorithm_cases()
403 data['algorithm_cases'] = self._make_algorithm_cases()
404 data['algorithm_code'] = self._make_algorithm_code()
405 data['key_usage_code'] = self._make_key_usage_code()
406 output_file.write(OUTPUT_TEMPLATE % data)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200407
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100408def generate_psa_constants(header_file_names, output_file_name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200409 collector = MacroCollector()
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100410 for header_file_name in header_file_names:
Gilles Peskine49af2d32019-12-06 19:20:13 +0100411 with open(header_file_name, 'rb') as header_file:
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100412 collector.read_file(header_file)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200413 temp_file_name = output_file_name + '.tmp'
414 with open(temp_file_name, 'w') as output_file:
415 collector.write_file(output_file)
416 os.rename(temp_file_name, output_file_name)
417
418if __name__ == '__main__':
419 if not os.path.isdir('programs') and os.path.isdir('../programs'):
420 os.chdir('..')
Hugues de Valon235c72d2020-05-28 08:42:01 +0100421 # Allow to change the directory where psa_constant_names_generated.c is written to.
422 OUTPUT_FILE_DIR = sys.argv[1] if len(sys.argv) == 2 else "programs/psa"
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100423 generate_psa_constants(['include/psa/crypto_values.h',
424 'include/psa/crypto_extra.h'],
Hugues de Valon235c72d2020-05-28 08:42:01 +0100425 OUTPUT_FILE_DIR + '/psa_constant_names_generated.c')