Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 1 | /* BEGIN_HEADER */ |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 2 | #include "mbedtls/pk.h" |
| 3 | #include "mbedtls/pem.h" |
| 4 | #include "mbedtls/oid.h" |
Valerio Setti | 7406e96 | 2023-04-26 14:48:43 +0200 | [diff] [blame] | 5 | #include "psa/crypto_sizes.h" |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 6 | |
| 7 | typedef enum { |
| 8 | TEST_PEM, |
| 9 | TEST_DER |
| 10 | } pkwrite_file_format_t; |
| 11 | |
Valerio Setti | 755582b | 2023-04-24 10:24:37 +0200 | [diff] [blame] | 12 | /* Helper function for removing "\r" chars from a buffer. */ |
Valerio Setti | 3b608de | 2023-04-24 08:52:16 +0200 | [diff] [blame] | 13 | static void fix_new_lines(unsigned char *in_str, size_t *len) |
| 14 | { |
| 15 | size_t chars_left; |
| 16 | unsigned int i; |
| 17 | |
| 18 | for (i = 0; (i < *len) && (*len > 0); i++) { |
| 19 | if (in_str[i] == '\r') { |
| 20 | if (i < (*len - 1)) { |
| 21 | chars_left = *len - i - 1; |
Valerio Setti | a4d460c | 2023-04-24 10:26:24 +0200 | [diff] [blame] | 22 | memmove(&in_str[i], &in_str[i+1], chars_left); |
Valerio Setti | 3b608de | 2023-04-24 08:52:16 +0200 | [diff] [blame] | 23 | } else { |
| 24 | in_str[i] = '\0'; |
| 25 | } |
| 26 | *len = *len - 1; |
| 27 | } |
| 28 | } |
| 29 | } |
| 30 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 31 | static void pk_write_check_common(char *key_file, int is_public_key, int is_der) |
| 32 | { |
| 33 | mbedtls_pk_context key; |
| 34 | unsigned char *buf = NULL; |
| 35 | unsigned char *check_buf = NULL; |
| 36 | unsigned char *start_buf; |
| 37 | size_t buf_len, check_buf_len; |
| 38 | int ret; |
| 39 | |
Valerio Setti | d64e249 | 2023-04-24 13:53:21 +0200 | [diff] [blame] | 40 | mbedtls_pk_init(&key); |
| 41 | USE_PSA_INIT(); |
| 42 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 43 | /* Note: if mbedtls_pk_load_file() successfully reads the file, then |
| 44 | it also allocates check_buf, which should be freed on exit */ |
| 45 | TEST_EQUAL(mbedtls_pk_load_file(key_file, &check_buf, &check_buf_len), 0); |
| 46 | TEST_ASSERT(check_buf_len > 0); |
| 47 | |
Valerio Setti | 3b608de | 2023-04-24 08:52:16 +0200 | [diff] [blame] | 48 | /* Windows' line ending is different from the Linux's one ("\r\n" vs "\n"). |
| 49 | * Git treats PEM files as text, so when on Windows, it replaces new lines |
| 50 | * with "\r\n" on checkout. |
| 51 | * Unfortunately mbedtls_pk_load_file() loads files in binary format, |
| 52 | * while mbedtls_pk_write_pubkey_pem() goes through the I/O layer which |
| 53 | * uses "\n" for newlines in both Windows and Linux. |
| 54 | * Here we remove the extra "\r" so that "buf" and "check_buf" can be |
| 55 | * easily compared later. */ |
| 56 | if (!is_der) { |
| 57 | fix_new_lines(check_buf, &check_buf_len); |
| 58 | } |
| 59 | TEST_ASSERT(check_buf_len > 0); |
| 60 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 61 | ASSERT_ALLOC(buf, check_buf_len); |
| 62 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 63 | if (is_public_key) { |
| 64 | TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&key, key_file), 0); |
| 65 | if (is_der) { |
| 66 | ret = mbedtls_pk_write_pubkey_der(&key, buf, check_buf_len); |
| 67 | } else { |
| 68 | #if defined(MBEDTLS_PEM_WRITE_C) |
| 69 | ret = mbedtls_pk_write_pubkey_pem(&key, buf, check_buf_len); |
| 70 | #else |
| 71 | ret = MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE; |
| 72 | #endif |
| 73 | } |
| 74 | } else { |
| 75 | TEST_EQUAL(mbedtls_pk_parse_keyfile(&key, key_file, NULL), 0); |
| 76 | if (is_der) { |
| 77 | ret = mbedtls_pk_write_key_der(&key, buf, check_buf_len); |
| 78 | } else { |
| 79 | #if defined(MBEDTLS_PEM_WRITE_C) |
| 80 | ret = mbedtls_pk_write_key_pem(&key, buf, check_buf_len); |
| 81 | #else |
| 82 | ret = MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE; |
| 83 | #endif |
| 84 | } |
| 85 | } |
| 86 | |
| 87 | if (is_der) { |
| 88 | TEST_LE_U(1, ret); |
| 89 | buf_len = ret; |
| 90 | start_buf = buf + check_buf_len - buf_len; |
| 91 | } else { |
| 92 | TEST_EQUAL(ret, 0); |
| 93 | buf_len = strlen((char *) buf) + 1; /* +1 takes the string terminator into account */ |
| 94 | start_buf = buf; |
| 95 | } |
| 96 | |
| 97 | ASSERT_COMPARE(start_buf, buf_len, check_buf, check_buf_len); |
| 98 | |
| 99 | exit: |
| 100 | mbedtls_free(buf); |
| 101 | mbedtls_free(check_buf); |
| 102 | mbedtls_pk_free(&key); |
Valerio Setti | d64e249 | 2023-04-24 13:53:21 +0200 | [diff] [blame] | 103 | USE_PSA_DONE(); |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 104 | } |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 105 | /* END_HEADER */ |
| 106 | |
| 107 | /* BEGIN_DEPENDENCIES |
Hanno Becker | 19d858e | 2018-10-16 13:46:25 +0100 | [diff] [blame] | 108 | * depends_on:MBEDTLS_PK_PARSE_C:MBEDTLS_PK_WRITE_C:MBEDTLS_BIGNUM_C:MBEDTLS_FS_IO |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 109 | * END_DEPENDENCIES |
| 110 | */ |
| 111 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 112 | /* BEGIN_CASE */ |
| 113 | void pk_write_pubkey_check(char *key_file, int is_der) |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 114 | { |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 115 | pk_write_check_common(key_file, 1, is_der); |
| 116 | goto exit; /* make the compiler happy */ |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 117 | } |
| 118 | /* END_CASE */ |
| 119 | |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 120 | /* BEGIN_CASE */ |
| 121 | void pk_write_key_check(char *key_file, int is_der) |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 122 | { |
Valerio Setti | f1477da | 2023-04-18 16:37:30 +0200 | [diff] [blame] | 123 | pk_write_check_common(key_file, 0, is_der); |
| 124 | goto exit; /* make the compiler happy */ |
Paul Bakker | c7bb02b | 2013-09-15 14:54:56 +0200 | [diff] [blame] | 125 | } |
| 126 | /* END_CASE */ |
Valerio Setti | 7406e96 | 2023-04-26 14:48:43 +0200 | [diff] [blame] | 127 | |
| 128 | /* BEGIN_CASE */ |
Valerio Setti | 39a6694 | 2023-04-27 10:06:45 +0200 | [diff] [blame^] | 129 | void pk_write_public_from_private(char *priv_key_file, |
Valerio Setti | 7406e96 | 2023-04-26 14:48:43 +0200 | [diff] [blame] | 130 | char *pub_key_file) |
| 131 | { |
| 132 | mbedtls_pk_context priv_key, pub_key; |
| 133 | uint8_t derived_key_raw[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE]; |
| 134 | uint8_t *derived_key_start; |
| 135 | size_t derived_key_len = 0; |
| 136 | uint8_t pub_key_raw[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE]; |
| 137 | uint8_t *pub_key_start; |
| 138 | size_t pub_key_len = 0; |
| 139 | #if defined(MBEDTLS_USE_PSA_CRYPTO) |
| 140 | mbedtls_svc_key_id_t opaque_key_id = MBEDTLS_SVC_KEY_ID_INIT; |
| 141 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 142 | |
| 143 | mbedtls_pk_init(&priv_key); |
| 144 | mbedtls_pk_init(&pub_key); |
| 145 | USE_PSA_INIT(); |
| 146 | |
| 147 | memset(derived_key_raw, 0, sizeof(derived_key_raw)); |
| 148 | memset(pub_key_raw, 0, sizeof(pub_key_raw)); |
| 149 | |
| 150 | TEST_EQUAL(mbedtls_pk_parse_keyfile(&priv_key, priv_key_file, NULL, |
| 151 | mbedtls_test_rnd_std_rand, NULL), 0); |
| 152 | TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&pub_key, pub_key_file), 0); |
| 153 | |
| 154 | /* mbedtls_pk_write_pubkey() writes data backward in the provided buffer, |
| 155 | * i.e. derived_key_raw, so we place derived_key_start at the end of it |
| 156 | * and it will be updated accordingly on return. |
| 157 | * The same holds for pub_key_raw and pub_key_start below.*/ |
| 158 | derived_key_start = derived_key_raw + sizeof(derived_key_raw); |
| 159 | TEST_LE_U(1, mbedtls_pk_write_pubkey(&derived_key_start, |
| 160 | derived_key_raw, &priv_key)); |
| 161 | derived_key_len = sizeof(derived_key_raw) - |
| 162 | (derived_key_start - derived_key_raw); |
| 163 | |
| 164 | |
| 165 | pub_key_start = pub_key_raw + sizeof(pub_key_raw); |
| 166 | TEST_LE_U(1, mbedtls_pk_write_pubkey(&pub_key_start, |
| 167 | pub_key_raw, &pub_key)); |
| 168 | pub_key_len = sizeof(pub_key_raw) - |
| 169 | (pub_key_start - pub_key_raw); |
| 170 | |
| 171 | ASSERT_COMPARE(derived_key_start, derived_key_len, |
| 172 | pub_key_start, pub_key_len); |
| 173 | |
| 174 | #if defined(MBEDTLS_USE_PSA_CRYPTO) |
| 175 | mbedtls_platform_zeroize(derived_key_raw, sizeof(derived_key_raw)); |
| 176 | derived_key_len = 0; |
| 177 | |
| 178 | TEST_EQUAL(mbedtls_pk_wrap_as_opaque(&priv_key, &opaque_key_id, |
| 179 | PSA_ALG_NONE, PSA_KEY_USAGE_EXPORT, |
| 180 | PSA_ALG_NONE), 0); |
| 181 | |
| 182 | derived_key_start = derived_key_raw + sizeof(derived_key_raw); |
| 183 | TEST_LE_U(1, mbedtls_pk_write_pubkey(&derived_key_start, |
| 184 | derived_key_raw, &priv_key)); |
| 185 | derived_key_len = sizeof(derived_key_raw) - |
| 186 | (derived_key_start - derived_key_raw); |
| 187 | |
| 188 | ASSERT_COMPARE(derived_key_start, derived_key_len, |
| 189 | pub_key_start, pub_key_len); |
| 190 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 191 | |
| 192 | exit: |
| 193 | #if defined(MBEDTLS_USE_PSA_CRYPTO) |
| 194 | psa_destroy_key(opaque_key_id); |
| 195 | #endif /* MBEDTLS_USE_PSA_CRYPTO */ |
| 196 | mbedtls_pk_free(&pub_key); |
| 197 | mbedtls_pk_free(&priv_key); |
| 198 | USE_PSA_DONE(); |
| 199 | } |
| 200 | /* END_CASE */ |