Tomás González | 734d22c | 2023-10-30 15:15:45 +0000 | [diff] [blame] | 1 | """Collect information about PSA cryptographic mechanisms. |
| 2 | """ |
| 3 | |
| 4 | # Copyright The Mbed TLS Contributors |
Tomás González | 5fae560 | 2023-11-13 11:45:12 +0000 | [diff] [blame] | 5 | # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
| 6 | |
Tomás González | 734d22c | 2023-10-30 15:15:45 +0000 | [diff] [blame] | 7 | |
| 8 | import re |
Gilles Peskine | 519762b | 2024-04-10 20:41:51 +0200 | [diff] [blame^] | 9 | from typing import Dict, FrozenSet, Iterator, List, Optional, Set |
Tomás González | 734d22c | 2023-10-30 15:15:45 +0000 | [diff] [blame] | 10 | |
| 11 | from . import macro_collector |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 12 | from . import test_case |
Tomás González | 734d22c | 2023-10-30 15:15:45 +0000 | [diff] [blame] | 13 | |
| 14 | |
| 15 | def psa_want_symbol(name: str) -> str: |
| 16 | """Return the PSA_WANT_xxx symbol associated with a PSA crypto feature.""" |
| 17 | if name.startswith('PSA_'): |
| 18 | return name[:4] + 'WANT_' + name[4:] |
| 19 | else: |
| 20 | raise ValueError('Unable to determine the PSA_WANT_ symbol for ' + name) |
| 21 | |
| 22 | def finish_family_dependency(dep: str, bits: int) -> str: |
| 23 | """Finish dep if it's a family dependency symbol prefix. |
| 24 | A family dependency symbol prefix is a PSA_WANT_ symbol that needs to be |
| 25 | qualified by the key size. If dep is such a symbol, finish it by adjusting |
| 26 | the prefix and appending the key size. Other symbols are left unchanged. |
| 27 | """ |
| 28 | return re.sub(r'_FAMILY_(.*)', r'_\1_' + str(bits), dep) |
| 29 | |
| 30 | def finish_family_dependencies(dependencies: List[str], bits: int) -> List[str]: |
| 31 | """Finish any family dependency symbol prefixes. |
| 32 | Apply `finish_family_dependency` to each element of `dependencies`. |
| 33 | """ |
| 34 | return [finish_family_dependency(dep, bits) for dep in dependencies] |
| 35 | |
| 36 | SYMBOLS_WITHOUT_DEPENDENCY = frozenset([ |
| 37 | 'PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG', # modifier, only in policies |
| 38 | 'PSA_ALG_AEAD_WITH_SHORTENED_TAG', # modifier |
| 39 | 'PSA_ALG_ANY_HASH', # only in policies |
| 40 | 'PSA_ALG_AT_LEAST_THIS_LENGTH_MAC', # modifier, only in policies |
| 41 | 'PSA_ALG_KEY_AGREEMENT', # chaining |
| 42 | 'PSA_ALG_TRUNCATED_MAC', # modifier |
| 43 | ]) |
| 44 | |
| 45 | def automatic_dependencies(*expressions: str) -> List[str]: |
| 46 | """Infer dependencies of a test case by looking for PSA_xxx symbols. |
| 47 | The arguments are strings which should be C expressions. Do not use |
| 48 | string literals or comments as this function is not smart enough to |
| 49 | skip them. |
| 50 | """ |
| 51 | used = set() |
| 52 | for expr in expressions: |
| 53 | used.update(re.findall(r'PSA_(?:ALG|ECC_FAMILY|KEY_TYPE)_\w+', expr)) |
| 54 | used.difference_update(SYMBOLS_WITHOUT_DEPENDENCY) |
| 55 | return sorted(psa_want_symbol(name) for name in used) |
| 56 | |
Tomás González | 734d22c | 2023-10-30 15:15:45 +0000 | [diff] [blame] | 57 | |
| 58 | class Information: |
| 59 | """Gather information about PSA constructors.""" |
| 60 | |
| 61 | def __init__(self) -> None: |
| 62 | self.constructors = self.read_psa_interface() |
| 63 | |
| 64 | @staticmethod |
| 65 | def remove_unwanted_macros( |
| 66 | constructors: macro_collector.PSAMacroEnumerator |
| 67 | ) -> None: |
| 68 | # Mbed TLS doesn't support finite-field DH yet and will not support |
| 69 | # finite-field DSA. Don't attempt to generate any related test case. |
| 70 | constructors.key_types.discard('PSA_KEY_TYPE_DH_KEY_PAIR') |
| 71 | constructors.key_types.discard('PSA_KEY_TYPE_DH_PUBLIC_KEY') |
| 72 | constructors.key_types.discard('PSA_KEY_TYPE_DSA_KEY_PAIR') |
| 73 | constructors.key_types.discard('PSA_KEY_TYPE_DSA_PUBLIC_KEY') |
| 74 | |
| 75 | def read_psa_interface(self) -> macro_collector.PSAMacroEnumerator: |
| 76 | """Return the list of known key types, algorithms, etc.""" |
| 77 | constructors = macro_collector.InputsForTest() |
| 78 | header_file_names = ['include/psa/crypto_values.h', |
| 79 | 'include/psa/crypto_extra.h'] |
| 80 | test_suites = ['tests/suites/test_suite_psa_crypto_metadata.data'] |
| 81 | for header_file_name in header_file_names: |
| 82 | constructors.parse_header(header_file_name) |
| 83 | for test_cases in test_suites: |
| 84 | constructors.parse_test_cases(test_cases) |
| 85 | self.remove_unwanted_macros(constructors) |
| 86 | constructors.gather_arguments() |
| 87 | return constructors |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 88 | |
| 89 | |
| 90 | class TestCase(test_case.TestCase): |
Gilles Peskine | 764c2d3 | 2024-04-10 18:12:02 +0200 | [diff] [blame] | 91 | """A PSA test case with automatically inferred dependencies. |
| 92 | |
| 93 | For mechanisms like ECC curves where the support status includes |
| 94 | the key bit-size, this class assumes that only one bit-size is |
| 95 | involved in a given test case. |
| 96 | """ |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 97 | |
Gilles Peskine | 519762b | 2024-04-10 20:41:51 +0200 | [diff] [blame^] | 98 | # Use a class variable to cache the set of implemented dependencies. |
| 99 | # Call read_implemented_dependencies() to fill the cache. |
| 100 | _implemented_dependencies = None #type: Optional[FrozenSet[str]] |
| 101 | |
| 102 | DEPENDENCY_SYMBOL_RE = re.compile(r'\bPSA_WANT_\w+\b') |
| 103 | @classmethod |
| 104 | def _yield_implemented_dependencies(cls) -> Iterator[str]: |
| 105 | for filename in ['include/psa/crypto_config.h', |
| 106 | 'include/mbedtls/config_psa.h']: |
| 107 | with open(filename) as inp: |
| 108 | content = inp.read() |
| 109 | yield from cls.DEPENDENCY_SYMBOL_RE.findall(content) |
| 110 | |
| 111 | @classmethod |
| 112 | def read_implemented_dependencies(cls) -> FrozenSet[str]: |
| 113 | if cls._implemented_dependencies is None: |
| 114 | cls._implemented_dependencies = \ |
| 115 | frozenset(cls._yield_implemented_dependencies()) |
| 116 | # Redundant return to reassure pylint (mypy is fine without it). |
| 117 | # Known issue: https://github.com/pylint-dev/pylint/issues/3045 |
| 118 | return cls._implemented_dependencies |
| 119 | return cls._implemented_dependencies |
| 120 | |
| 121 | # We skip test cases for which the dependency symbols are not defined. |
| 122 | # We assume that this means that a required mechanism is not implemented. |
| 123 | # Note that if we erroneously skip generating test cases for |
| 124 | # mechanisms that are not implemented, this should be caught |
| 125 | # by the NOT_SUPPORTED test cases generated by generate_psa_tests.py |
| 126 | # in test_suite_psa_crypto_not_supported and test_suite_psa_crypto_op_fail: |
| 127 | # those emit negative tests, which will not be skipped here. |
| 128 | def detect_not_implemented_dependencies(self) -> None: |
| 129 | """Detect dependencies that are not implemented.""" |
| 130 | all_implemented_dependencies = self.read_implemented_dependencies() |
| 131 | not_implemented = set() |
| 132 | for dep in self.dependencies: |
| 133 | if (dep.startswith('PSA_WANT') and |
| 134 | dep not in all_implemented_dependencies): |
| 135 | not_implemented.add('DEPENDENCY_NOT_IMPLEMENTED_YET_' + dep) |
| 136 | self.dependencies = sorted(not_implemented) + self.dependencies |
| 137 | self.dependencies.sort() |
| 138 | |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 139 | def __init__(self) -> None: |
| 140 | super().__init__() |
| 141 | self.key_bits = None #type: Optional[int] |
Gilles Peskine | 1ae57ec | 2024-04-10 17:16:16 +0200 | [diff] [blame] | 142 | self.negated_dependencies = set() #type: Set[str] |
| 143 | |
| 144 | def assumes_not_supported(self, name: str) -> None: |
| 145 | """Negate the given mechanism for automatic dependency generation. |
| 146 | |
| 147 | Call this function before set_arguments() for a test case that should |
| 148 | run if the given mechanism is not supported. |
| 149 | |
Gilles Peskine | 764c2d3 | 2024-04-10 18:12:02 +0200 | [diff] [blame] | 150 | A mechanism is either a PSA_XXX symbol (e.g. PSA_KEY_TYPE_AES, |
| 151 | PSA_ALG_HMAC, etc.) or a PSA_WANT_XXX symbol. |
Gilles Peskine | 1ae57ec | 2024-04-10 17:16:16 +0200 | [diff] [blame] | 152 | """ |
Gilles Peskine | 764c2d3 | 2024-04-10 18:12:02 +0200 | [diff] [blame] | 153 | symbol = name |
| 154 | if not symbol.startswith('PSA_WANT_'): |
| 155 | symbol = psa_want_symbol(name) |
| 156 | self.negated_dependencies.add(symbol) |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 157 | |
| 158 | def set_key_bits(self, key_bits: Optional[int]) -> None: |
| 159 | """Use the given key size for automatic dependency generation. |
| 160 | |
| 161 | Call this function before set_arguments() if relevant. |
| 162 | |
| 163 | This is only relevant for ECC and DH keys. For other key types, |
| 164 | this information is ignored. |
| 165 | """ |
| 166 | self.key_bits = key_bits |
| 167 | |
| 168 | def set_arguments(self, arguments: List[str]) -> None: |
| 169 | """Set test case arguments and automatically infer dependencies.""" |
| 170 | super().set_arguments(arguments) |
| 171 | dependencies = automatic_dependencies(*arguments) |
Gilles Peskine | 1ae57ec | 2024-04-10 17:16:16 +0200 | [diff] [blame] | 172 | for i in range(len(dependencies)): #pylint: disable=consider-using-enumerate |
| 173 | if dependencies[i] in self.negated_dependencies: |
| 174 | dependencies[i] = '!' + dependencies[i] |
Gilles Peskine | c7b58d5 | 2024-04-10 15:55:39 +0200 | [diff] [blame] | 175 | if self.key_bits is not None: |
| 176 | dependencies = finish_family_dependencies(dependencies, self.key_bits) |
Gilles Peskine | 519762b | 2024-04-10 20:41:51 +0200 | [diff] [blame^] | 177 | self.dependencies += sorted(dependencies) |
| 178 | self.detect_not_implemented_dependencies() |