mirror of
https://github.com/cuberite/polarssl.git
synced 2025-10-02 10:00:47 -04:00
pk test suite: rename the parameter named parameter
Signed-off-by: Tomi Fontanilles <129057597+tomi-font@users.noreply.github.com>
This commit is contained in:
parent
573dc23141
commit
9c69348c24
@ -86,23 +86,23 @@ exit:
|
|||||||
*
|
*
|
||||||
* \param pk The PK object to fill. It must have been initialized
|
* \param pk The PK object to fill. It must have been initialized
|
||||||
* with mbedtls_pk_setup().
|
* with mbedtls_pk_setup().
|
||||||
* \param parameter - For RSA keys, the key size in bits.
|
* \param curve_or_keybits - For RSA keys, the key size in bits.
|
||||||
* - For EC keys, the curve (\c MBEDTLS_ECP_DP_xxx).
|
* - For EC keys, the curve (\c MBEDTLS_ECP_DP_xxx).
|
||||||
*
|
*
|
||||||
* \return The status from the underlying type-specific key
|
* \return The status from the underlying type-specific key
|
||||||
* generation function.
|
* generation function.
|
||||||
* \return -1 if the key type is not recognized.
|
* \return -1 if the key type is not recognized.
|
||||||
*/
|
*/
|
||||||
static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
static int pk_genkey(mbedtls_pk_context *pk, int curve_or_keybits)
|
||||||
{
|
{
|
||||||
((void) pk);
|
(void) pk;
|
||||||
(void) parameter;
|
(void) curve_or_keybits;
|
||||||
|
|
||||||
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
||||||
if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_RSA) {
|
if (mbedtls_pk_get_type(pk) == MBEDTLS_PK_RSA) {
|
||||||
return mbedtls_rsa_gen_key(mbedtls_pk_rsa(*pk),
|
return mbedtls_rsa_gen_key(mbedtls_pk_rsa(*pk),
|
||||||
mbedtls_test_rnd_std_rand, NULL,
|
mbedtls_test_rnd_std_rand, NULL,
|
||||||
parameter, 3);
|
curve_or_keybits, 3);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
||||||
@ -112,7 +112,7 @@ static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
|||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_C)
|
#if defined(MBEDTLS_ECP_C)
|
||||||
ret = mbedtls_ecp_group_load(&mbedtls_pk_ec_rw(*pk)->grp, parameter);
|
ret = mbedtls_ecp_group_load(&mbedtls_pk_ec_rw(*pk)->grp, curve_or_keybits);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -123,7 +123,7 @@ static int pk_genkey(mbedtls_pk_context *pk, int parameter)
|
|||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
||||||
ret = pk_genkey_ec(pk, parameter);
|
ret = pk_genkey_ec(pk, curve_or_keybits);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -319,7 +319,7 @@ exit:
|
|||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_USE_PSA_CRYPTO */
|
/* BEGIN_CASE depends_on:MBEDTLS_USE_PSA_CRYPTO */
|
||||||
void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
||||||
int key_alg2, int parameter, int alg_check, int usage_check,
|
int key_alg2, int curve_or_keybits, int alg_check, int usage_check,
|
||||||
int result)
|
int result)
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
@ -336,7 +336,7 @@ void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
|||||||
psa_set_key_enrollment_algorithm(&attributes, key_alg2);
|
psa_set_key_enrollment_algorithm(&attributes, key_alg2);
|
||||||
}
|
}
|
||||||
psa_set_key_type(&attributes, key_type);
|
psa_set_key_type(&attributes, key_type);
|
||||||
psa_set_key_bits(&attributes, parameter);
|
psa_set_key_bits(&attributes, curve_or_keybits);
|
||||||
|
|
||||||
PSA_ASSERT(psa_generate_key(&attributes, &key));
|
PSA_ASSERT(psa_generate_key(&attributes, &key));
|
||||||
|
|
||||||
@ -350,7 +350,7 @@ void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
|
|||||||
} else {
|
} else {
|
||||||
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(key_type)), 0);
|
mbedtls_pk_info_from_type(key_type)), 0);
|
||||||
TEST_EQUAL(pk_genkey(&pk, parameter), 0);
|
TEST_EQUAL(pk_genkey(&pk, curve_or_keybits), 0);
|
||||||
TEST_EQUAL(mbedtls_pk_get_type(&pk), key_type);
|
TEST_EQUAL(mbedtls_pk_get_type(&pk), key_type);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -545,7 +545,7 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void pk_utils(int type, int parameter, int bitlen, int len, char *name)
|
void pk_utils(int type, int curve_or_keybits, int bitlen, int len, char *name)
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
|
|
||||||
@ -553,7 +553,7 @@ void pk_utils(int type, int parameter, int bitlen, int len, char *name)
|
|||||||
USE_PSA_INIT();
|
USE_PSA_INIT();
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
||||||
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
TEST_ASSERT(pk_genkey(&pk, curve_or_keybits) == 0);
|
||||||
|
|
||||||
TEST_ASSERT((int) mbedtls_pk_get_type(&pk) == type);
|
TEST_ASSERT((int) mbedtls_pk_get_type(&pk) == type);
|
||||||
TEST_ASSERT(mbedtls_pk_can_do(&pk, type));
|
TEST_ASSERT(mbedtls_pk_can_do(&pk, type));
|
||||||
@ -857,7 +857,7 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256 */
|
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256 */
|
||||||
void pk_sign_verify(int type, int parameter, int sign_ret, int verify_ret)
|
void pk_sign_verify(int type, int curve_or_keybits, int sign_ret, int verify_ret)
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t sig_len;
|
size_t sig_len;
|
||||||
@ -883,7 +883,7 @@ void pk_sign_verify(int type, int parameter, int sign_ret, int verify_ret)
|
|||||||
memset(sig, 0, sizeof(sig));
|
memset(sig, 0, sizeof(sig));
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
TEST_ASSERT(mbedtls_pk_setup(&pk, mbedtls_pk_info_from_type(type)) == 0);
|
||||||
TEST_ASSERT(pk_genkey(&pk, parameter) == 0);
|
TEST_ASSERT(pk_genkey(&pk, curve_or_keybits) == 0);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_pk_sign_restartable(&pk, MBEDTLS_MD_SHA256,
|
TEST_ASSERT(mbedtls_pk_sign_restartable(&pk, MBEDTLS_MD_SHA256,
|
||||||
hash, hash_len,
|
hash, hash_len,
|
||||||
@ -1304,8 +1304,7 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_TEST_PK_PSA_SIGN */
|
/* BEGIN_CASE depends_on:MBEDTLS_MD_CAN_SHA256:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_TEST_PK_PSA_SIGN */
|
||||||
void pk_psa_sign(int parameter_arg,
|
void pk_psa_sign(int curve_or_keybits, int psa_type, int expected_bits)
|
||||||
int psa_type_arg, int expected_bits_arg)
|
|
||||||
{
|
{
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
unsigned char hash[32];
|
unsigned char hash[32];
|
||||||
@ -1318,8 +1317,6 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
int ret;
|
int ret;
|
||||||
mbedtls_svc_key_id_t key_id;
|
mbedtls_svc_key_id_t key_id;
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
psa_key_type_t expected_type = psa_type_arg;
|
|
||||||
size_t expected_bits = expected_bits_arg;
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* This tests making signatures with a wrapped PSA key:
|
* This tests making signatures with a wrapped PSA key:
|
||||||
@ -1333,19 +1330,19 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
USE_PSA_INIT();
|
USE_PSA_INIT();
|
||||||
|
|
||||||
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
#if defined(MBEDTLS_RSA_C) && defined(MBEDTLS_GENPRIME)
|
||||||
if (PSA_KEY_TYPE_IS_RSA(psa_type_arg)) {
|
if (PSA_KEY_TYPE_IS_RSA(psa_type)) {
|
||||||
/* Create legacy RSA public/private key in PK context. */
|
/* Create legacy RSA public/private key in PK context. */
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
mbedtls_pk_info_from_type(MBEDTLS_PK_RSA)) == 0);
|
||||||
TEST_ASSERT(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
TEST_ASSERT(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
||||||
mbedtls_test_rnd_std_rand, NULL,
|
mbedtls_test_rnd_std_rand, NULL,
|
||||||
parameter_arg, 3) == 0);
|
curve_or_keybits, 3) == 0);
|
||||||
alg_psa = PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256);
|
alg_psa = PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256);
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_RSA_C && MBEDTLS_GENPRIME */
|
#endif /* MBEDTLS_RSA_C && MBEDTLS_GENPRIME */
|
||||||
#if defined(MBEDTLS_PK_CAN_ECDSA_SIGN)
|
#if defined(MBEDTLS_PK_CAN_ECDSA_SIGN)
|
||||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type_arg)) {
|
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type)) {
|
||||||
mbedtls_ecp_group_id grpid = parameter_arg;
|
mbedtls_ecp_group_id grpid = curve_or_keybits;
|
||||||
|
|
||||||
/* Create legacy EC public/private key in PK context. */
|
/* Create legacy EC public/private key in PK context. */
|
||||||
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
TEST_ASSERT(mbedtls_pk_setup(&pk,
|
||||||
@ -1356,7 +1353,7 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_PK_CAN_ECDSA_SIGN */
|
#endif /* MBEDTLS_PK_CAN_ECDSA_SIGN */
|
||||||
{
|
{
|
||||||
(void) parameter_arg;
|
(void) curve_or_keybits;
|
||||||
TEST_ASSUME(!"Opaque PK key not supported in this configuration");
|
TEST_ASSUME(!"Opaque PK key not supported in this configuration");
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1384,8 +1381,8 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
PSA_ALG_NONE) == 0);
|
PSA_ALG_NONE) == 0);
|
||||||
|
|
||||||
PSA_ASSERT(psa_get_key_attributes(key_id, &attributes));
|
PSA_ASSERT(psa_get_key_attributes(key_id, &attributes));
|
||||||
TEST_EQUAL(psa_get_key_type(&attributes), expected_type);
|
TEST_EQUAL(psa_get_key_type(&attributes), (psa_key_type_t) psa_type);
|
||||||
TEST_EQUAL(psa_get_key_bits(&attributes), expected_bits);
|
TEST_EQUAL(psa_get_key_bits(&attributes), (size_t) expected_bits);
|
||||||
TEST_EQUAL(psa_get_key_lifetime(&attributes),
|
TEST_EQUAL(psa_get_key_lifetime(&attributes),
|
||||||
PSA_KEY_LIFETIME_VOLATILE);
|
PSA_KEY_LIFETIME_VOLATILE);
|
||||||
|
|
||||||
@ -1396,7 +1393,7 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
hash, sizeof(hash), sig, sizeof(sig), &sig_len,
|
hash, sizeof(hash), sig, sizeof(sig), &sig_len,
|
||||||
NULL, NULL) == 0);
|
NULL, NULL) == 0);
|
||||||
/* Only opaque EC keys support verification. */
|
/* Only opaque EC keys support verification. */
|
||||||
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type_arg)) {
|
if (PSA_KEY_TYPE_IS_ECC_KEY_PAIR(psa_type)) {
|
||||||
TEST_ASSERT(mbedtls_pk_verify(&pk, MBEDTLS_MD_SHA256,
|
TEST_ASSERT(mbedtls_pk_verify(&pk, MBEDTLS_MD_SHA256,
|
||||||
hash, sizeof(hash), sig, sig_len) == 0);
|
hash, sizeof(hash), sig, sig_len) == 0);
|
||||||
}
|
}
|
||||||
@ -1438,7 +1435,7 @@ void pk_psa_sign(int parameter_arg,
|
|||||||
mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY)), 0);
|
mbedtls_pk_info_from_type(MBEDTLS_PK_ECKEY)), 0);
|
||||||
TEST_EQUAL(mbedtls_ecp_group_load(
|
TEST_EQUAL(mbedtls_ecp_group_load(
|
||||||
&(mbedtls_pk_ec_rw(pk)->grp),
|
&(mbedtls_pk_ec_rw(pk)->grp),
|
||||||
(mbedtls_ecp_group_id) parameter_arg), 0);
|
(mbedtls_ecp_group_id) curve_or_keybits), 0);
|
||||||
TEST_EQUAL(mbedtls_ecp_point_read_binary(&(mbedtls_pk_ec_ro(pk)->grp),
|
TEST_EQUAL(mbedtls_ecp_point_read_binary(&(mbedtls_pk_ec_ro(pk)->grp),
|
||||||
&(mbedtls_pk_ec_rw(pk)->Q),
|
&(mbedtls_pk_ec_rw(pk)->Q),
|
||||||
pkey_legacy_start, klen_legacy), 0);
|
pkey_legacy_start, klen_legacy), 0);
|
||||||
@ -1459,9 +1456,8 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_GENPRIME */
|
/* BEGIN_CASE depends_on:MBEDTLS_GENPRIME */
|
||||||
void pk_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
void pk_sign_ext(int pk_type, int curve_or_keybits, int key_pk_type, int md_alg)
|
||||||
{
|
{
|
||||||
/* See the description of pk_genkey() for the description of the `parameter` argument. */
|
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t sig_len;
|
size_t sig_len;
|
||||||
unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE];
|
unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE];
|
||||||
@ -1477,7 +1473,7 @@ void pk_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
|||||||
|
|
||||||
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
TEST_EQUAL(mbedtls_pk_setup(&pk,
|
||||||
mbedtls_pk_info_from_type(pk_type)), 0);
|
mbedtls_pk_info_from_type(pk_type)), 0);
|
||||||
TEST_EQUAL(pk_genkey(&pk, parameter), 0);
|
TEST_EQUAL(pk_genkey(&pk, curve_or_keybits), 0);
|
||||||
|
|
||||||
TEST_EQUAL(mbedtls_pk_sign_ext(key_pk_type, &pk, md_alg, hash, hash_len,
|
TEST_EQUAL(mbedtls_pk_sign_ext(key_pk_type, &pk, md_alg, hash, hash_len,
|
||||||
sig, sizeof(sig), &sig_len,
|
sig, sizeof(sig), &sig_len,
|
||||||
@ -1498,9 +1494,8 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_GENPRIME:MBEDTLS_USE_PSA_CRYPTO */
|
/* BEGIN_CASE depends_on:MBEDTLS_RSA_C:MBEDTLS_GENPRIME:MBEDTLS_USE_PSA_CRYPTO */
|
||||||
void pk_psa_wrap_sign_ext(int pk_type, int parameter, int key_pk_type, int md_alg)
|
void pk_psa_wrap_sign_ext(int pk_type, int key_bits, int key_pk_type, int md_alg)
|
||||||
{
|
{
|
||||||
/* See the description of mbedtls_rsa_gen_key() for the description of the `parameter` argument. */
|
|
||||||
mbedtls_pk_context pk;
|
mbedtls_pk_context pk;
|
||||||
size_t sig_len, pkey_len;
|
size_t sig_len, pkey_len;
|
||||||
mbedtls_svc_key_id_t key_id;
|
mbedtls_svc_key_id_t key_id;
|
||||||
@ -1524,7 +1519,7 @@ void pk_psa_wrap_sign_ext(int pk_type, int parameter, int key_pk_type, int md_al
|
|||||||
mbedtls_pk_info_from_type(pk_type)), 0);
|
mbedtls_pk_info_from_type(pk_type)), 0);
|
||||||
TEST_EQUAL(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
TEST_EQUAL(mbedtls_rsa_gen_key(mbedtls_pk_rsa(pk),
|
||||||
mbedtls_test_rnd_std_rand, NULL,
|
mbedtls_test_rnd_std_rand, NULL,
|
||||||
parameter, 3), 0);
|
key_bits, 3), 0);
|
||||||
|
|
||||||
/* Export underlying public key for re-importing in a legacy context. */
|
/* Export underlying public key for re-importing in a legacy context. */
|
||||||
ret = mbedtls_pk_write_pubkey_der(&pk, pkey, sizeof(pkey));
|
ret = mbedtls_pk_write_pubkey_der(&pk, pkey, sizeof(pkey));
|
||||||
|
Loading…
x
Reference in New Issue
Block a user