mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-23 03:35:39 +01:00
a294551446
This should be everything that's needed for the stable storage format. Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
424 lines
16 KiB
Python
Executable File
424 lines
16 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
|
|
"""Generate psa_constant_names_generated.c
|
|
which is included by programs/psa/psa_constant_names.c.
|
|
The code generated by this module is only meant to be used in the context
|
|
of that program.
|
|
|
|
An argument passed to this script will modify the output directory where the
|
|
file is written:
|
|
* by default (no arguments passed): writes to programs/psa/
|
|
* OUTPUT_FILE_DIR passed: writes to OUTPUT_FILE_DIR/
|
|
"""
|
|
|
|
# Copyright The Mbed TLS Contributors
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import os
|
|
import re
|
|
import sys
|
|
|
|
OUTPUT_TEMPLATE = '''\
|
|
/* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */
|
|
|
|
static const char *psa_strerror(psa_status_t status)
|
|
{
|
|
switch (status) {
|
|
%(status_cases)s
|
|
default: return NULL;
|
|
}
|
|
}
|
|
|
|
static const char *psa_ecc_family_name(psa_ecc_family_t curve)
|
|
{
|
|
switch (curve) {
|
|
%(ecc_curve_cases)s
|
|
default: return NULL;
|
|
}
|
|
}
|
|
|
|
static const char *psa_dh_family_name(psa_dh_family_t group)
|
|
{
|
|
switch (group) {
|
|
%(dh_group_cases)s
|
|
default: return NULL;
|
|
}
|
|
}
|
|
|
|
static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
|
|
{
|
|
switch (hash_alg) {
|
|
%(hash_algorithm_cases)s
|
|
default: return NULL;
|
|
}
|
|
}
|
|
|
|
static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg)
|
|
{
|
|
switch (ka_alg) {
|
|
%(ka_algorithm_cases)s
|
|
default: return NULL;
|
|
}
|
|
}
|
|
|
|
static int psa_snprint_key_type(char *buffer, size_t buffer_size,
|
|
psa_key_type_t type)
|
|
{
|
|
size_t required_size = 0;
|
|
switch (type) {
|
|
%(key_type_cases)s
|
|
default:
|
|
%(key_type_code)s{
|
|
return snprintf(buffer, buffer_size,
|
|
"0x%%04x", (unsigned) type);
|
|
}
|
|
break;
|
|
}
|
|
buffer[0] = 0;
|
|
return (int) required_size;
|
|
}
|
|
|
|
#define NO_LENGTH_MODIFIER 0xfffffffflu
|
|
static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
|
|
psa_algorithm_t alg)
|
|
{
|
|
size_t required_size = 0;
|
|
psa_algorithm_t core_alg = alg;
|
|
unsigned long length_modifier = NO_LENGTH_MODIFIER;
|
|
if (PSA_ALG_IS_MAC(alg)) {
|
|
core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0);
|
|
if (core_alg != alg) {
|
|
append(&buffer, buffer_size, &required_size,
|
|
"PSA_ALG_TRUNCATED_MAC(", 22);
|
|
length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg);
|
|
}
|
|
} else if (PSA_ALG_IS_AEAD(alg)) {
|
|
core_alg = PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH(alg);
|
|
if (core_alg == 0) {
|
|
/* For unknown AEAD algorithms, there is no "default tag length". */
|
|
core_alg = alg;
|
|
} else if (core_alg != alg) {
|
|
append(&buffer, buffer_size, &required_size,
|
|
"PSA_ALG_AEAD_WITH_TAG_LENGTH(", 29);
|
|
length_modifier = PSA_AEAD_TAG_LENGTH(alg);
|
|
}
|
|
} else if (PSA_ALG_IS_KEY_AGREEMENT(alg) &&
|
|
!PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
|
|
core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
|
|
append(&buffer, buffer_size, &required_size,
|
|
"PSA_ALG_KEY_AGREEMENT(", 22);
|
|
append_with_alg(&buffer, buffer_size, &required_size,
|
|
psa_ka_algorithm_name,
|
|
PSA_ALG_KEY_AGREEMENT_GET_BASE(alg));
|
|
append(&buffer, buffer_size, &required_size, ", ", 2);
|
|
}
|
|
switch (core_alg) {
|
|
%(algorithm_cases)s
|
|
default:
|
|
%(algorithm_code)s{
|
|
append_integer(&buffer, buffer_size, &required_size,
|
|
"0x%%08lx", (unsigned long) core_alg);
|
|
}
|
|
break;
|
|
}
|
|
if (core_alg != alg) {
|
|
if (length_modifier != NO_LENGTH_MODIFIER) {
|
|
append(&buffer, buffer_size, &required_size, ", ", 2);
|
|
append_integer(&buffer, buffer_size, &required_size,
|
|
"%%lu", length_modifier);
|
|
}
|
|
append(&buffer, buffer_size, &required_size, ")", 1);
|
|
}
|
|
buffer[0] = 0;
|
|
return (int) required_size;
|
|
}
|
|
|
|
static int psa_snprint_key_usage(char *buffer, size_t buffer_size,
|
|
psa_key_usage_t usage)
|
|
{
|
|
size_t required_size = 0;
|
|
if (usage == 0) {
|
|
if (buffer_size > 1) {
|
|
buffer[0] = '0';
|
|
buffer[1] = 0;
|
|
} else if (buffer_size == 1) {
|
|
buffer[0] = 0;
|
|
}
|
|
return 1;
|
|
}
|
|
%(key_usage_code)s
|
|
if (usage != 0) {
|
|
if (required_size != 0) {
|
|
append(&buffer, buffer_size, &required_size, " | ", 3);
|
|
}
|
|
append_integer(&buffer, buffer_size, &required_size,
|
|
"0x%%08lx", (unsigned long) usage);
|
|
} else {
|
|
buffer[0] = 0;
|
|
}
|
|
return (int) required_size;
|
|
}
|
|
|
|
/* End of automatically generated file. */
|
|
'''
|
|
|
|
KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) {
|
|
append_with_curve(&buffer, buffer_size, &required_size,
|
|
"%(builder)s", %(builder_length)s,
|
|
PSA_KEY_TYPE_ECC_GET_FAMILY(type));
|
|
} else '''
|
|
|
|
KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) {
|
|
append_with_group(&buffer, buffer_size, &required_size,
|
|
"%(builder)s", %(builder_length)s,
|
|
PSA_KEY_TYPE_DH_GET_FAMILY(type));
|
|
} else '''
|
|
|
|
ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) {
|
|
append(&buffer, buffer_size, &required_size,
|
|
"%(builder)s(", %(builder_length)s + 1);
|
|
append_with_alg(&buffer, buffer_size, &required_size,
|
|
psa_hash_algorithm_name,
|
|
PSA_ALG_GET_HASH(core_alg));
|
|
append(&buffer, buffer_size, &required_size, ")", 1);
|
|
} else '''
|
|
|
|
BIT_TEST_TEMPLATE = '''\
|
|
if (%(var)s & %(flag)s) {
|
|
if (required_size != 0) {
|
|
append(&buffer, buffer_size, &required_size, " | ", 3);
|
|
}
|
|
append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d);
|
|
%(var)s ^= %(flag)s;
|
|
}\
|
|
'''
|
|
|
|
class MacroCollector:
|
|
"""Collect PSA crypto macro definitions from C header files.
|
|
|
|
1. Call `read_file` on the input header file(s).
|
|
2. Call `write_file` to write ``psa_constant_names_generated.c``.
|
|
"""
|
|
|
|
def __init__(self):
|
|
self.statuses = set()
|
|
self.key_types = set()
|
|
self.key_types_from_curve = {}
|
|
self.key_types_from_group = {}
|
|
self.ecc_curves = set()
|
|
self.dh_groups = set()
|
|
self.algorithms = set()
|
|
self.hash_algorithms = set()
|
|
self.ka_algorithms = set()
|
|
self.algorithms_from_hash = {}
|
|
self.key_usages = set()
|
|
|
|
# "#define" followed by a macro name with either no parameters
|
|
# or a single parameter and a non-empty expansion.
|
|
# Grab the macro name in group 1, the parameter name if any in group 2
|
|
# and the expansion in group 3.
|
|
_define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' +
|
|
r'(?:\s+|\((\w+)\)\s*)' +
|
|
r'(.+)')
|
|
_deprecated_definition_re = re.compile(r'\s*MBEDTLS_DEPRECATED')
|
|
|
|
def read_line(self, line):
|
|
"""Parse a C header line and record the PSA identifier it defines if any.
|
|
This function analyzes lines that start with "#define PSA_"
|
|
(up to non-significant whitespace) and skips all non-matching lines.
|
|
"""
|
|
# pylint: disable=too-many-branches
|
|
m = re.match(self._define_directive_re, line)
|
|
if not m:
|
|
return
|
|
name, parameter, expansion = m.groups()
|
|
expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion)
|
|
if re.match(self._deprecated_definition_re, expansion):
|
|
# Skip deprecated values, which are assumed to be
|
|
# backward compatibility aliases that share
|
|
# numerical values with non-deprecated values.
|
|
return
|
|
if name.endswith('_FLAG') or name.endswith('MASK'):
|
|
# Macro only to build actual values
|
|
return
|
|
elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \
|
|
and not parameter:
|
|
self.statuses.add(name)
|
|
elif name.startswith('PSA_KEY_TYPE_') and not parameter:
|
|
self.key_types.add(name)
|
|
elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve':
|
|
self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:]
|
|
elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group':
|
|
self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:]
|
|
elif name.startswith('PSA_ECC_FAMILY_') and not parameter:
|
|
self.ecc_curves.add(name)
|
|
elif name.startswith('PSA_DH_FAMILY_') and not parameter:
|
|
self.dh_groups.add(name)
|
|
elif name.startswith('PSA_ALG_') and not parameter:
|
|
if name in ['PSA_ALG_ECDSA_BASE',
|
|
'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']:
|
|
# Ad hoc skipping of duplicate names for some numerical values
|
|
return
|
|
self.algorithms.add(name)
|
|
# Ad hoc detection of hash algorithms
|
|
if re.search(r'0x020000[0-9A-Fa-f]{2}', expansion):
|
|
self.hash_algorithms.add(name)
|
|
# Ad hoc detection of key agreement algorithms
|
|
if re.search(r'0x09[0-9A-Fa-f]{2}0000', expansion):
|
|
self.ka_algorithms.add(name)
|
|
elif name.startswith('PSA_ALG_') and parameter == 'hash_alg':
|
|
if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']:
|
|
# A naming irregularity
|
|
tester = name[:8] + 'IS_RANDOMIZED_' + name[8:]
|
|
else:
|
|
tester = name[:8] + 'IS_' + name[8:]
|
|
self.algorithms_from_hash[name] = tester
|
|
elif name.startswith('PSA_KEY_USAGE_') and not parameter:
|
|
self.key_usages.add(name)
|
|
else:
|
|
# Other macro without parameter
|
|
return
|
|
|
|
_nonascii_re = re.compile(rb'[^\x00-\x7f]+')
|
|
_continued_line_re = re.compile(rb'\\\r?\n\Z')
|
|
def read_file(self, header_file):
|
|
for line in header_file:
|
|
m = re.search(self._continued_line_re, line)
|
|
while m:
|
|
cont = next(header_file)
|
|
line = line[:m.start(0)] + cont
|
|
m = re.search(self._continued_line_re, line)
|
|
line = re.sub(self._nonascii_re, rb'', line).decode('ascii')
|
|
self.read_line(line)
|
|
|
|
@staticmethod
|
|
def _make_return_case(name):
|
|
return 'case %(name)s: return "%(name)s";' % {'name': name}
|
|
|
|
@staticmethod
|
|
def _make_append_case(name):
|
|
template = ('case %(name)s: '
|
|
'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); '
|
|
'break;')
|
|
return template % {'name': name, 'length': len(name)}
|
|
|
|
@staticmethod
|
|
def _make_bit_test(var, flag):
|
|
return BIT_TEST_TEMPLATE % {'var': var,
|
|
'flag': flag,
|
|
'length': len(flag)}
|
|
|
|
def _make_status_cases(self):
|
|
return '\n '.join(map(self._make_return_case,
|
|
sorted(self.statuses)))
|
|
|
|
def _make_ecc_curve_cases(self):
|
|
return '\n '.join(map(self._make_return_case,
|
|
sorted(self.ecc_curves)))
|
|
|
|
def _make_dh_group_cases(self):
|
|
return '\n '.join(map(self._make_return_case,
|
|
sorted(self.dh_groups)))
|
|
|
|
def _make_key_type_cases(self):
|
|
return '\n '.join(map(self._make_append_case,
|
|
sorted(self.key_types)))
|
|
|
|
@staticmethod
|
|
def _make_key_type_from_curve_code(builder, tester):
|
|
return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder,
|
|
'builder_length': len(builder),
|
|
'tester': tester}
|
|
|
|
@staticmethod
|
|
def _make_key_type_from_group_code(builder, tester):
|
|
return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder,
|
|
'builder_length': len(builder),
|
|
'tester': tester}
|
|
|
|
def _make_ecc_key_type_code(self):
|
|
d = self.key_types_from_curve
|
|
make = self._make_key_type_from_curve_code
|
|
return ''.join([make(k, d[k]) for k in sorted(d.keys())])
|
|
|
|
def _make_dh_key_type_code(self):
|
|
d = self.key_types_from_group
|
|
make = self._make_key_type_from_group_code
|
|
return ''.join([make(k, d[k]) for k in sorted(d.keys())])
|
|
|
|
def _make_hash_algorithm_cases(self):
|
|
return '\n '.join(map(self._make_return_case,
|
|
sorted(self.hash_algorithms)))
|
|
|
|
def _make_ka_algorithm_cases(self):
|
|
return '\n '.join(map(self._make_return_case,
|
|
sorted(self.ka_algorithms)))
|
|
|
|
def _make_algorithm_cases(self):
|
|
return '\n '.join(map(self._make_append_case,
|
|
sorted(self.algorithms)))
|
|
|
|
@staticmethod
|
|
def _make_algorithm_from_hash_code(builder, tester):
|
|
return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder,
|
|
'builder_length': len(builder),
|
|
'tester': tester}
|
|
|
|
def _make_algorithm_code(self):
|
|
d = self.algorithms_from_hash
|
|
make = self._make_algorithm_from_hash_code
|
|
return ''.join([make(k, d[k]) for k in sorted(d.keys())])
|
|
|
|
def _make_key_usage_code(self):
|
|
return '\n'.join([self._make_bit_test('usage', bit)
|
|
for bit in sorted(self.key_usages)])
|
|
|
|
def write_file(self, output_file):
|
|
"""Generate the pretty-printer function code from the gathered
|
|
constant definitions.
|
|
"""
|
|
data = {}
|
|
data['status_cases'] = self._make_status_cases()
|
|
data['ecc_curve_cases'] = self._make_ecc_curve_cases()
|
|
data['dh_group_cases'] = self._make_dh_group_cases()
|
|
data['key_type_cases'] = self._make_key_type_cases()
|
|
data['key_type_code'] = (self._make_ecc_key_type_code() +
|
|
self._make_dh_key_type_code())
|
|
data['hash_algorithm_cases'] = self._make_hash_algorithm_cases()
|
|
data['ka_algorithm_cases'] = self._make_ka_algorithm_cases()
|
|
data['algorithm_cases'] = self._make_algorithm_cases()
|
|
data['algorithm_code'] = self._make_algorithm_code()
|
|
data['key_usage_code'] = self._make_key_usage_code()
|
|
output_file.write(OUTPUT_TEMPLATE % data)
|
|
|
|
def generate_psa_constants(header_file_names, output_file_name):
|
|
collector = MacroCollector()
|
|
for header_file_name in header_file_names:
|
|
with open(header_file_name, 'rb') as header_file:
|
|
collector.read_file(header_file)
|
|
temp_file_name = output_file_name + '.tmp'
|
|
with open(temp_file_name, 'w') as output_file:
|
|
collector.write_file(output_file)
|
|
os.replace(temp_file_name, output_file_name)
|
|
|
|
if __name__ == '__main__':
|
|
if not os.path.isdir('programs') and os.path.isdir('../programs'):
|
|
os.chdir('..')
|
|
# Allow to change the directory where psa_constant_names_generated.c is written to.
|
|
OUTPUT_FILE_DIR = sys.argv[1] if len(sys.argv) == 2 else "programs/psa"
|
|
generate_psa_constants(['include/psa/crypto_values.h',
|
|
'include/psa/crypto_extra.h'],
|
|
OUTPUT_FILE_DIR + '/psa_constant_names_generated.c')
|