blob: 64b3c9dfacdde25b0a49bf6ffc83ac94bec9e89d [file] [log] [blame]
Gilles Peskine0bbad742019-05-27 18:24:31 +02001#!/usr/bin/env python3
Gilles Peskine9d4d7502019-05-27 18:25:46 +02002
Hugues de Valon600cf9d2020-05-29 10:29:49 +01003"""Generate psa_constant_names_generated.c
Gilles Peskine9d4d7502019-05-27 18:25:46 +02004which is included by programs/psa/psa_constant_names.c.
5The code generated by this module is only meant to be used in the context
6of that program.
Hugues de Valon600cf9d2020-05-29 10:29:49 +01007
8An argument passed to this script will modify the output directory where the
9file is written:
10* by default (no arguments passed): writes to programs/psa/
11* OUTPUT_FILE_DIR passed: writes to OUTPUT_FILE_DIR/
Gilles Peskine9d4d7502019-05-27 18:25:46 +020012"""
13
Bence Szépkúti1e148272020-08-07 13:07:28 +020014# Copyright The Mbed TLS Contributors
Bence Szépkútic7da1fe2020-05-26 01:54:15 +020015# SPDX-License-Identifier: Apache-2.0
16#
17# Licensed under the Apache License, Version 2.0 (the "License"); you may
18# not use this file except in compliance with the License.
19# You may obtain a copy of the License at
20#
21# http://www.apache.org/licenses/LICENSE-2.0
22#
23# Unless required by applicable law or agreed to in writing, software
24# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26# See the License for the specific language governing permissions and
27# limitations under the License.
Bence Szépkúti700ee442020-05-26 00:33:31 +020028
Gilles Peskine029b5d62018-07-16 23:13:37 +020029import os
30import re
Hugues de Valon235c72d2020-05-28 08:42:01 +010031import sys
Gilles Peskine029b5d62018-07-16 23:13:37 +020032
Gilles Peskine42a0a0a2019-05-27 18:29:47 +020033OUTPUT_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +020034/* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */
35
36static const char *psa_strerror(psa_status_t status)
37{
38 switch (status) {
39 %(status_cases)s
40 default: return NULL;
41 }
42}
43
Paul Elliott8ff510a2020-06-02 17:19:28 +010044static const char *psa_ecc_family_name(psa_ecc_family_t curve)
Gilles Peskine029b5d62018-07-16 23:13:37 +020045{
46 switch (curve) {
47 %(ecc_curve_cases)s
48 default: return NULL;
49 }
50}
51
Paul Elliott75e27032020-06-03 15:17:39 +010052static const char *psa_dh_family_name(psa_dh_family_t group)
Gilles Peskinedcaefae2019-05-16 12:55:35 +020053{
54 switch (group) {
55 %(dh_group_cases)s
56 default: return NULL;
57 }
58}
59
Gilles Peskine029b5d62018-07-16 23:13:37 +020060static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
61{
62 switch (hash_alg) {
63 %(hash_algorithm_cases)s
64 default: return NULL;
65 }
66}
67
Gilles Peskine882e57e2019-04-12 00:12:07 +020068static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg)
69{
70 switch (ka_alg) {
71 %(ka_algorithm_cases)s
72 default: return NULL;
73 }
74}
75
Gilles Peskine029b5d62018-07-16 23:13:37 +020076static int psa_snprint_key_type(char *buffer, size_t buffer_size,
77 psa_key_type_t type)
78{
79 size_t required_size = 0;
80 switch (type) {
81 %(key_type_cases)s
82 default:
83 %(key_type_code)s{
84 return snprintf(buffer, buffer_size,
Gilles Peskinef65ed6f2019-12-04 17:18:41 +010085 "0x%%04x", (unsigned) type);
Gilles Peskine029b5d62018-07-16 23:13:37 +020086 }
87 break;
88 }
89 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +010090 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +020091}
92
Gilles Peskine882e57e2019-04-12 00:12:07 +020093#define NO_LENGTH_MODIFIER 0xfffffffflu
Gilles Peskine029b5d62018-07-16 23:13:37 +020094static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
95 psa_algorithm_t alg)
96{
97 size_t required_size = 0;
Gilles Peskine498c2a12018-08-20 15:07:20 +020098 psa_algorithm_t core_alg = alg;
Gilles Peskine882e57e2019-04-12 00:12:07 +020099 unsigned long length_modifier = NO_LENGTH_MODIFIER;
Gilles Peskine498c2a12018-08-20 15:07:20 +0200100 if (PSA_ALG_IS_MAC(alg)) {
101 core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0);
102 if (core_alg != alg) {
103 append(&buffer, buffer_size, &required_size,
104 "PSA_ALG_TRUNCATED_MAC(", 22);
105 length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg);
106 }
107 } else if (PSA_ALG_IS_AEAD(alg)) {
Bence Szépkútia63b20d2020-12-16 11:36:46 +0100108 core_alg = PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(alg);
Gilles Peskine182c2e92018-10-19 11:33:51 +0200109 if (core_alg == 0) {
Darryl Greendf723062019-02-06 15:36:00 +0000110 /* For unknown AEAD algorithms, there is no "default tag length". */
Gilles Peskine182c2e92018-10-19 11:33:51 +0200111 core_alg = alg;
112 } else if (core_alg != alg) {
Gilles Peskine498c2a12018-08-20 15:07:20 +0200113 append(&buffer, buffer_size, &required_size,
Bence Szépkútia63b20d2020-12-16 11:36:46 +0100114 "PSA_ALG_AEAD_WITH_SHORTENED_TAG(", 32);
Gilles Peskine498c2a12018-08-20 15:07:20 +0200115 length_modifier = PSA_AEAD_TAG_LENGTH(alg);
116 }
Gilles Peskine882e57e2019-04-12 00:12:07 +0200117 } else if (PSA_ALG_IS_KEY_AGREEMENT(alg) &&
118 !PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
119 core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
120 append(&buffer, buffer_size, &required_size,
121 "PSA_ALG_KEY_AGREEMENT(", 22);
122 append_with_alg(&buffer, buffer_size, &required_size,
123 psa_ka_algorithm_name,
124 PSA_ALG_KEY_AGREEMENT_GET_BASE(alg));
125 append(&buffer, buffer_size, &required_size, ", ", 2);
Gilles Peskine498c2a12018-08-20 15:07:20 +0200126 }
127 switch (core_alg) {
Gilles Peskine029b5d62018-07-16 23:13:37 +0200128 %(algorithm_cases)s
129 default:
130 %(algorithm_code)s{
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200131 append_integer(&buffer, buffer_size, &required_size,
Gilles Peskine182c2e92018-10-19 11:33:51 +0200132 "0x%%08lx", (unsigned long) core_alg);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200133 }
134 break;
135 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200136 if (core_alg != alg) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200137 if (length_modifier != NO_LENGTH_MODIFIER) {
138 append(&buffer, buffer_size, &required_size, ", ", 2);
139 append_integer(&buffer, buffer_size, &required_size,
140 "%%lu", length_modifier);
141 }
Gilles Peskine498c2a12018-08-20 15:07:20 +0200142 append(&buffer, buffer_size, &required_size, ")", 1);
143 }
Gilles Peskine029b5d62018-07-16 23:13:37 +0200144 buffer[0] = 0;
Darryl Green18246962018-10-17 15:01:45 +0100145 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200146}
147
148static int psa_snprint_key_usage(char *buffer, size_t buffer_size,
149 psa_key_usage_t usage)
150{
151 size_t required_size = 0;
152 if (usage == 0) {
153 if (buffer_size > 1) {
154 buffer[0] = '0';
155 buffer[1] = 0;
156 } else if (buffer_size == 1) {
157 buffer[0] = 0;
158 }
159 return 1;
160 }
161%(key_usage_code)s
162 if (usage != 0) {
163 if (required_size != 0) {
164 append(&buffer, buffer_size, &required_size, " | ", 3);
165 }
Gilles Peskine0deaf3d2018-08-20 15:06:39 +0200166 append_integer(&buffer, buffer_size, &required_size,
167 "0x%%08lx", (unsigned long) usage);
Gilles Peskine029b5d62018-07-16 23:13:37 +0200168 } else {
169 buffer[0] = 0;
170 }
Darryl Green18246962018-10-17 15:01:45 +0100171 return (int) required_size;
Gilles Peskine029b5d62018-07-16 23:13:37 +0200172}
173
174/* End of automatically generated file. */
175'''
176
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200177KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200178 append_with_curve(&buffer, buffer_size, &required_size,
179 "%(builder)s", %(builder_length)s,
Paul Elliott8ff510a2020-06-02 17:19:28 +0100180 PSA_KEY_TYPE_ECC_GET_FAMILY(type));
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200181 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200182
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200183KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) {
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200184 append_with_group(&buffer, buffer_size, &required_size,
185 "%(builder)s", %(builder_length)s,
Paul Elliott75e27032020-06-03 15:17:39 +0100186 PSA_KEY_TYPE_DH_GET_FAMILY(type));
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200187 } else '''
188
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200189ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) {
Gilles Peskine882e57e2019-04-12 00:12:07 +0200190 append(&buffer, buffer_size, &required_size,
191 "%(builder)s(", %(builder_length)s + 1);
192 append_with_alg(&buffer, buffer_size, &required_size,
193 psa_hash_algorithm_name,
194 PSA_ALG_GET_HASH(core_alg));
195 append(&buffer, buffer_size, &required_size, ")", 1);
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200196 } else '''
Gilles Peskine029b5d62018-07-16 23:13:37 +0200197
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200198BIT_TEST_TEMPLATE = '''\
Gilles Peskine029b5d62018-07-16 23:13:37 +0200199 if (%(var)s & %(flag)s) {
200 if (required_size != 0) {
201 append(&buffer, buffer_size, &required_size, " | ", 3);
202 }
203 append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d);
204 %(var)s ^= %(flag)s;
205 }\
206'''
207
Gilles Peskine7bb85c22021-01-25 21:36:53 +0100208class PSAMacroCollector:
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200209 """Collect PSA crypto macro definitions from C header files.
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200210 """
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200211
Gilles Peskine029b5d62018-07-16 23:13:37 +0200212 def __init__(self):
213 self.statuses = set()
214 self.key_types = set()
215 self.key_types_from_curve = {}
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200216 self.key_types_from_group = {}
Gilles Peskine029b5d62018-07-16 23:13:37 +0200217 self.ecc_curves = set()
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200218 self.dh_groups = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200219 self.algorithms = set()
220 self.hash_algorithms = set()
Gilles Peskine882e57e2019-04-12 00:12:07 +0200221 self.ka_algorithms = set()
Gilles Peskine029b5d62018-07-16 23:13:37 +0200222 self.algorithms_from_hash = {}
223 self.key_usages = set()
224
225 # "#define" followed by a macro name with either no parameters
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200226 # or a single parameter and a non-empty expansion.
227 # Grab the macro name in group 1, the parameter name if any in group 2
228 # and the expansion in group 3.
229 _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' +
230 r'(?:\s+|\((\w+)\)\s*)' +
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200231 r'(.+)')
Gilles Peskine33b84f42019-05-17 12:05:59 +0200232 _deprecated_definition_re = re.compile(r'\s*MBEDTLS_DEPRECATED')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200233
234 def read_line(self, line):
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200235 """Parse a C header line and record the PSA identifier it defines if any.
236 This function analyzes lines that start with "#define PSA_"
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200237 (up to non-significant whitespace) and skips all non-matching lines.
238 """
Gilles Peskine9d4d7502019-05-27 18:25:46 +0200239 # pylint: disable=too-many-branches
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200240 m = re.match(self._define_directive_re, line)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200241 if not m:
242 return
Gilles Peskine5c196fb2019-05-17 12:04:41 +0200243 name, parameter, expansion = m.groups()
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200244 expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion)
Gilles Peskine33b84f42019-05-17 12:05:59 +0200245 if re.match(self._deprecated_definition_re, expansion):
246 # Skip deprecated values, which are assumed to be
247 # backward compatibility aliases that share
248 # numerical values with non-deprecated values.
249 return
Gilles Peskine029b5d62018-07-16 23:13:37 +0200250 if name.endswith('_FLAG') or name.endswith('MASK'):
251 # Macro only to build actual values
252 return
253 elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \
254 and not parameter:
255 self.statuses.add(name)
256 elif name.startswith('PSA_KEY_TYPE_') and not parameter:
257 self.key_types.add(name)
258 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve':
259 self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:]
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200260 elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group':
261 self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:]
Paul Elliott8ff510a2020-06-02 17:19:28 +0100262 elif name.startswith('PSA_ECC_FAMILY_') and not parameter:
Gilles Peskine029b5d62018-07-16 23:13:37 +0200263 self.ecc_curves.add(name)
Paul Elliott75e27032020-06-03 15:17:39 +0100264 elif name.startswith('PSA_DH_FAMILY_') and not parameter:
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200265 self.dh_groups.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200266 elif name.startswith('PSA_ALG_') and not parameter:
Gilles Peskinedaea26f2018-08-21 14:02:45 +0200267 if name in ['PSA_ALG_ECDSA_BASE',
Gilles Peskine029b5d62018-07-16 23:13:37 +0200268 'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']:
269 # Ad hoc skipping of duplicate names for some numerical values
270 return
271 self.algorithms.add(name)
272 # Ad hoc detection of hash algorithms
Bence Szépkútia2945512020-12-03 21:40:17 +0100273 if re.search(r'0x020000[0-9A-Fa-f]{2}', expansion):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200274 self.hash_algorithms.add(name)
Gilles Peskine882e57e2019-04-12 00:12:07 +0200275 # Ad hoc detection of key agreement algorithms
Bence Szépkútia2945512020-12-03 21:40:17 +0100276 if re.search(r'0x09[0-9A-Fa-f]{2}0000', expansion):
Gilles Peskine882e57e2019-04-12 00:12:07 +0200277 self.ka_algorithms.add(name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200278 elif name.startswith('PSA_ALG_') and parameter == 'hash_alg':
279 if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']:
280 # A naming irregularity
281 tester = name[:8] + 'IS_RANDOMIZED_' + name[8:]
282 else:
283 tester = name[:8] + 'IS_' + name[8:]
284 self.algorithms_from_hash[name] = tester
285 elif name.startswith('PSA_KEY_USAGE_') and not parameter:
286 self.key_usages.add(name)
287 else:
288 # Other macro without parameter
289 return
290
Gilles Peskine49af2d32019-12-06 19:20:13 +0100291 _nonascii_re = re.compile(rb'[^\x00-\x7f]+')
292 _continued_line_re = re.compile(rb'\\\r?\n\Z')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200293 def read_file(self, header_file):
294 for line in header_file:
Gilles Peskine49af2d32019-12-06 19:20:13 +0100295 m = re.search(self._continued_line_re, line)
296 while m:
Gilles Peskinef30d4d92019-05-17 12:05:19 +0200297 cont = next(header_file)
Gilles Peskine49af2d32019-12-06 19:20:13 +0100298 line = line[:m.start(0)] + cont
299 m = re.search(self._continued_line_re, line)
300 line = re.sub(self._nonascii_re, rb'', line).decode('ascii')
Gilles Peskine029b5d62018-07-16 23:13:37 +0200301 self.read_line(line)
302
Gilles Peskine7bb85c22021-01-25 21:36:53 +0100303class CaseBuilder(PSAMacroCollector):
304 """Collect PSA crypto macro definitions and write value recognition functions.
305
306 1. Call `read_file` on the input header file(s).
307 2. Call `write_file` to write ``psa_constant_names_generated.c``.
308 """
309
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200310 @staticmethod
311 def _make_return_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200312 return 'case %(name)s: return "%(name)s";' % {'name': name}
313
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200314 @staticmethod
315 def _make_append_case(name):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200316 template = ('case %(name)s: '
317 'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); '
318 'break;')
319 return template % {'name': name, 'length': len(name)}
320
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200321 @staticmethod
322 def _make_bit_test(var, flag):
323 return BIT_TEST_TEMPLATE % {'var': var,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200324 'flag': flag,
325 'length': len(flag)}
326
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200327 def _make_status_cases(self):
328 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200329 sorted(self.statuses)))
330
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200331 def _make_ecc_curve_cases(self):
332 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200333 sorted(self.ecc_curves)))
334
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200335 def _make_dh_group_cases(self):
336 return '\n '.join(map(self._make_return_case,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200337 sorted(self.dh_groups)))
338
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200339 def _make_key_type_cases(self):
340 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200341 sorted(self.key_types)))
342
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200343 @staticmethod
344 def _make_key_type_from_curve_code(builder, tester):
345 return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200346 'builder_length': len(builder),
347 'tester': tester}
348
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200349 @staticmethod
350 def _make_key_type_from_group_code(builder, tester):
351 return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder,
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200352 'builder_length': len(builder),
353 'tester': tester}
354
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200355 def _make_ecc_key_type_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200356 d = self.key_types_from_curve
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200357 make = self._make_key_type_from_curve_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200358 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200359
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200360 def _make_dh_key_type_code(self):
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200361 d = self.key_types_from_group
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200362 make = self._make_key_type_from_group_code
Gilles Peskinedcaefae2019-05-16 12:55:35 +0200363 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
364
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200365 def _make_hash_algorithm_cases(self):
366 return '\n '.join(map(self._make_return_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200367 sorted(self.hash_algorithms)))
368
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200369 def _make_ka_algorithm_cases(self):
370 return '\n '.join(map(self._make_return_case,
Gilles Peskine882e57e2019-04-12 00:12:07 +0200371 sorted(self.ka_algorithms)))
372
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200373 def _make_algorithm_cases(self):
374 return '\n '.join(map(self._make_append_case,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200375 sorted(self.algorithms)))
376
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200377 @staticmethod
378 def _make_algorithm_from_hash_code(builder, tester):
379 return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder,
Gilles Peskine029b5d62018-07-16 23:13:37 +0200380 'builder_length': len(builder),
381 'tester': tester}
382
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200383 def _make_algorithm_code(self):
Gilles Peskine029b5d62018-07-16 23:13:37 +0200384 d = self.algorithms_from_hash
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200385 make = self._make_algorithm_from_hash_code
Gilles Peskineddeb55a2018-08-02 15:08:07 +0200386 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Gilles Peskine029b5d62018-07-16 23:13:37 +0200387
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200388 def _make_key_usage_code(self):
389 return '\n'.join([self._make_bit_test('usage', bit)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200390 for bit in sorted(self.key_usages)])
391
392 def write_file(self, output_file):
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200393 """Generate the pretty-printer function code from the gathered
Gilles Peskinea3b93ff2019-06-03 11:23:56 +0200394 constant definitions.
395 """
Gilles Peskine029b5d62018-07-16 23:13:37 +0200396 data = {}
Gilles Peskine42a0a0a2019-05-27 18:29:47 +0200397 data['status_cases'] = self._make_status_cases()
398 data['ecc_curve_cases'] = self._make_ecc_curve_cases()
399 data['dh_group_cases'] = self._make_dh_group_cases()
400 data['key_type_cases'] = self._make_key_type_cases()
401 data['key_type_code'] = (self._make_ecc_key_type_code() +
402 self._make_dh_key_type_code())
403 data['hash_algorithm_cases'] = self._make_hash_algorithm_cases()
404 data['ka_algorithm_cases'] = self._make_ka_algorithm_cases()
405 data['algorithm_cases'] = self._make_algorithm_cases()
406 data['algorithm_code'] = self._make_algorithm_code()
407 data['key_usage_code'] = self._make_key_usage_code()
408 output_file.write(OUTPUT_TEMPLATE % data)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200409
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100410def generate_psa_constants(header_file_names, output_file_name):
Gilles Peskine7bb85c22021-01-25 21:36:53 +0100411 collector = CaseBuilder()
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100412 for header_file_name in header_file_names:
Gilles Peskine49af2d32019-12-06 19:20:13 +0100413 with open(header_file_name, 'rb') as header_file:
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100414 collector.read_file(header_file)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200415 temp_file_name = output_file_name + '.tmp'
416 with open(temp_file_name, 'w') as output_file:
417 collector.write_file(output_file)
Cameron Nemoe18d09d2020-09-22 10:37:26 -0700418 os.replace(temp_file_name, output_file_name)
Gilles Peskine029b5d62018-07-16 23:13:37 +0200419
420if __name__ == '__main__':
421 if not os.path.isdir('programs') and os.path.isdir('../programs'):
422 os.chdir('..')
Hugues de Valon235c72d2020-05-28 08:42:01 +0100423 # Allow to change the directory where psa_constant_names_generated.c is written to.
424 OUTPUT_FILE_DIR = sys.argv[1] if len(sys.argv) == 2 else "programs/psa"
Gilles Peskine6d194bd2019-01-04 19:44:59 +0100425 generate_psa_constants(['include/psa/crypto_values.h',
426 'include/psa/crypto_extra.h'],
Hugues de Valon235c72d2020-05-28 08:42:01 +0100427 OUTPUT_FILE_DIR + '/psa_constant_names_generated.c')