mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-10-31 03:30:35 -04:00 
			
		
		
		
	 e18d09de37
			
		
	
	
		e18d09de37
		
	
	
	
	
		
			
			Python should not be required for the build when the no_test target is used. This commit adds the generated file to the source tree and the check-generated-files script, and removes the generation from (c)make. Fixes #3524 Signed-off-by: Cameron Nemo <cnemo@tutanota.com>
		
			
				
	
	
		
			424 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			424 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
| #!/usr/bin/env python3
 | |
| 
 | |
| """Generate psa_constant_names_generated.c
 | |
| which is included by programs/psa/psa_constant_names.c.
 | |
| The code generated by this module is only meant to be used in the context
 | |
| of that program.
 | |
| 
 | |
| An argument passed to this script will modify the output directory where the
 | |
| file is written:
 | |
| * by default (no arguments passed): writes to programs/psa/
 | |
| * OUTPUT_FILE_DIR passed: writes to OUTPUT_FILE_DIR/
 | |
| """
 | |
| 
 | |
| # Copyright The Mbed TLS Contributors
 | |
| # SPDX-License-Identifier: Apache-2.0
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License"); you may
 | |
| # not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| # http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | |
| # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| 
 | |
| import os
 | |
| import re
 | |
| import sys
 | |
| 
 | |
| OUTPUT_TEMPLATE = '''\
 | |
| /* Automatically generated by generate_psa_constant.py. DO NOT EDIT. */
 | |
| 
 | |
| static const char *psa_strerror(psa_status_t status)
 | |
| {
 | |
|     switch (status) {
 | |
|     %(status_cases)s
 | |
|     default: return NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static const char *psa_ecc_family_name(psa_ecc_family_t curve)
 | |
| {
 | |
|     switch (curve) {
 | |
|     %(ecc_curve_cases)s
 | |
|     default: return NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static const char *psa_dh_family_name(psa_dh_family_t group)
 | |
| {
 | |
|     switch (group) {
 | |
|     %(dh_group_cases)s
 | |
|     default: return NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static const char *psa_hash_algorithm_name(psa_algorithm_t hash_alg)
 | |
| {
 | |
|     switch (hash_alg) {
 | |
|     %(hash_algorithm_cases)s
 | |
|     default: return NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static const char *psa_ka_algorithm_name(psa_algorithm_t ka_alg)
 | |
| {
 | |
|     switch (ka_alg) {
 | |
|     %(ka_algorithm_cases)s
 | |
|     default: return NULL;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static int psa_snprint_key_type(char *buffer, size_t buffer_size,
 | |
|                                 psa_key_type_t type)
 | |
| {
 | |
|     size_t required_size = 0;
 | |
|     switch (type) {
 | |
|     %(key_type_cases)s
 | |
|     default:
 | |
|         %(key_type_code)s{
 | |
|             return snprintf(buffer, buffer_size,
 | |
|                             "0x%%04x", (unsigned) type);
 | |
|         }
 | |
|         break;
 | |
|     }
 | |
|     buffer[0] = 0;
 | |
|     return (int) required_size;
 | |
| }
 | |
| 
 | |
| #define NO_LENGTH_MODIFIER 0xfffffffflu
 | |
| static int psa_snprint_algorithm(char *buffer, size_t buffer_size,
 | |
|                                  psa_algorithm_t alg)
 | |
| {
 | |
|     size_t required_size = 0;
 | |
|     psa_algorithm_t core_alg = alg;
 | |
|     unsigned long length_modifier = NO_LENGTH_MODIFIER;
 | |
|     if (PSA_ALG_IS_MAC(alg)) {
 | |
|         core_alg = PSA_ALG_TRUNCATED_MAC(alg, 0);
 | |
|         if (core_alg != alg) {
 | |
|             append(&buffer, buffer_size, &required_size,
 | |
|                    "PSA_ALG_TRUNCATED_MAC(", 22);
 | |
|             length_modifier = PSA_MAC_TRUNCATED_LENGTH(alg);
 | |
|         }
 | |
|     } else if (PSA_ALG_IS_AEAD(alg)) {
 | |
|         core_alg = PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH(alg);
 | |
|         if (core_alg == 0) {
 | |
|             /* For unknown AEAD algorithms, there is no "default tag length". */
 | |
|             core_alg = alg;
 | |
|         } else if (core_alg != alg) {
 | |
|             append(&buffer, buffer_size, &required_size,
 | |
|                    "PSA_ALG_AEAD_WITH_TAG_LENGTH(", 29);
 | |
|             length_modifier = PSA_AEAD_TAG_LENGTH(alg);
 | |
|         }
 | |
|     } else if (PSA_ALG_IS_KEY_AGREEMENT(alg) &&
 | |
|                !PSA_ALG_IS_RAW_KEY_AGREEMENT(alg)) {
 | |
|         core_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
 | |
|         append(&buffer, buffer_size, &required_size,
 | |
|                "PSA_ALG_KEY_AGREEMENT(", 22);
 | |
|         append_with_alg(&buffer, buffer_size, &required_size,
 | |
|                         psa_ka_algorithm_name,
 | |
|                         PSA_ALG_KEY_AGREEMENT_GET_BASE(alg));
 | |
|         append(&buffer, buffer_size, &required_size, ", ", 2);
 | |
|     }
 | |
|     switch (core_alg) {
 | |
|     %(algorithm_cases)s
 | |
|     default:
 | |
|         %(algorithm_code)s{
 | |
|             append_integer(&buffer, buffer_size, &required_size,
 | |
|                            "0x%%08lx", (unsigned long) core_alg);
 | |
|         }
 | |
|         break;
 | |
|     }
 | |
|     if (core_alg != alg) {
 | |
|         if (length_modifier != NO_LENGTH_MODIFIER) {
 | |
|             append(&buffer, buffer_size, &required_size, ", ", 2);
 | |
|             append_integer(&buffer, buffer_size, &required_size,
 | |
|                            "%%lu", length_modifier);
 | |
|         }
 | |
|         append(&buffer, buffer_size, &required_size, ")", 1);
 | |
|     }
 | |
|     buffer[0] = 0;
 | |
|     return (int) required_size;
 | |
| }
 | |
| 
 | |
| static int psa_snprint_key_usage(char *buffer, size_t buffer_size,
 | |
|                                  psa_key_usage_t usage)
 | |
| {
 | |
|     size_t required_size = 0;
 | |
|     if (usage == 0) {
 | |
|         if (buffer_size > 1) {
 | |
|             buffer[0] = '0';
 | |
|             buffer[1] = 0;
 | |
|         } else if (buffer_size == 1) {
 | |
|             buffer[0] = 0;
 | |
|         }
 | |
|         return 1;
 | |
|     }
 | |
| %(key_usage_code)s
 | |
|     if (usage != 0) {
 | |
|         if (required_size != 0) {
 | |
|             append(&buffer, buffer_size, &required_size, " | ", 3);
 | |
|         }
 | |
|         append_integer(&buffer, buffer_size, &required_size,
 | |
|                        "0x%%08lx", (unsigned long) usage);
 | |
|     } else {
 | |
|         buffer[0] = 0;
 | |
|     }
 | |
|     return (int) required_size;
 | |
| }
 | |
| 
 | |
| /* End of automatically generated file. */
 | |
| '''
 | |
| 
 | |
| KEY_TYPE_FROM_CURVE_TEMPLATE = '''if (%(tester)s(type)) {
 | |
|             append_with_curve(&buffer, buffer_size, &required_size,
 | |
|                               "%(builder)s", %(builder_length)s,
 | |
|                               PSA_KEY_TYPE_ECC_GET_FAMILY(type));
 | |
|         } else '''
 | |
| 
 | |
| KEY_TYPE_FROM_GROUP_TEMPLATE = '''if (%(tester)s(type)) {
 | |
|             append_with_group(&buffer, buffer_size, &required_size,
 | |
|                               "%(builder)s", %(builder_length)s,
 | |
|                               PSA_KEY_TYPE_DH_GET_FAMILY(type));
 | |
|         } else '''
 | |
| 
 | |
| ALGORITHM_FROM_HASH_TEMPLATE = '''if (%(tester)s(core_alg)) {
 | |
|             append(&buffer, buffer_size, &required_size,
 | |
|                    "%(builder)s(", %(builder_length)s + 1);
 | |
|             append_with_alg(&buffer, buffer_size, &required_size,
 | |
|                             psa_hash_algorithm_name,
 | |
|                             PSA_ALG_GET_HASH(core_alg));
 | |
|             append(&buffer, buffer_size, &required_size, ")", 1);
 | |
|         } else '''
 | |
| 
 | |
| BIT_TEST_TEMPLATE = '''\
 | |
|     if (%(var)s & %(flag)s) {
 | |
|         if (required_size != 0) {
 | |
|             append(&buffer, buffer_size, &required_size, " | ", 3);
 | |
|         }
 | |
|         append(&buffer, buffer_size, &required_size, "%(flag)s", %(length)d);
 | |
|         %(var)s ^= %(flag)s;
 | |
|     }\
 | |
| '''
 | |
| 
 | |
| class MacroCollector:
 | |
|     """Collect PSA crypto macro definitions from C header files.
 | |
| 
 | |
|     1. Call `read_file` on the input header file(s).
 | |
|     2. Call `write_file` to write ``psa_constant_names_generated.c``.
 | |
|     """
 | |
| 
 | |
|     def __init__(self):
 | |
|         self.statuses = set()
 | |
|         self.key_types = set()
 | |
|         self.key_types_from_curve = {}
 | |
|         self.key_types_from_group = {}
 | |
|         self.ecc_curves = set()
 | |
|         self.dh_groups = set()
 | |
|         self.algorithms = set()
 | |
|         self.hash_algorithms = set()
 | |
|         self.ka_algorithms = set()
 | |
|         self.algorithms_from_hash = {}
 | |
|         self.key_usages = set()
 | |
| 
 | |
|     # "#define" followed by a macro name with either no parameters
 | |
|     # or a single parameter and a non-empty expansion.
 | |
|     # Grab the macro name in group 1, the parameter name if any in group 2
 | |
|     # and the expansion in group 3.
 | |
|     _define_directive_re = re.compile(r'\s*#\s*define\s+(\w+)' +
 | |
|                                       r'(?:\s+|\((\w+)\)\s*)' +
 | |
|                                       r'(.+)')
 | |
|     _deprecated_definition_re = re.compile(r'\s*MBEDTLS_DEPRECATED')
 | |
| 
 | |
|     def read_line(self, line):
 | |
|         """Parse a C header line and record the PSA identifier it defines if any.
 | |
|         This function analyzes lines that start with "#define PSA_"
 | |
|         (up to non-significant whitespace) and skips all non-matching lines.
 | |
|         """
 | |
|         # pylint: disable=too-many-branches
 | |
|         m = re.match(self._define_directive_re, line)
 | |
|         if not m:
 | |
|             return
 | |
|         name, parameter, expansion = m.groups()
 | |
|         expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion)
 | |
|         if re.match(self._deprecated_definition_re, expansion):
 | |
|             # Skip deprecated values, which are assumed to be
 | |
|             # backward compatibility aliases that share
 | |
|             # numerical values with non-deprecated values.
 | |
|             return
 | |
|         if name.endswith('_FLAG') or name.endswith('MASK'):
 | |
|             # Macro only to build actual values
 | |
|             return
 | |
|         elif (name.startswith('PSA_ERROR_') or name == 'PSA_SUCCESS') \
 | |
|            and not parameter:
 | |
|             self.statuses.add(name)
 | |
|         elif name.startswith('PSA_KEY_TYPE_') and not parameter:
 | |
|             self.key_types.add(name)
 | |
|         elif name.startswith('PSA_KEY_TYPE_') and parameter == 'curve':
 | |
|             self.key_types_from_curve[name] = name[:13] + 'IS_' + name[13:]
 | |
|         elif name.startswith('PSA_KEY_TYPE_') and parameter == 'group':
 | |
|             self.key_types_from_group[name] = name[:13] + 'IS_' + name[13:]
 | |
|         elif name.startswith('PSA_ECC_FAMILY_') and not parameter:
 | |
|             self.ecc_curves.add(name)
 | |
|         elif name.startswith('PSA_DH_FAMILY_') and not parameter:
 | |
|             self.dh_groups.add(name)
 | |
|         elif name.startswith('PSA_ALG_') and not parameter:
 | |
|             if name in ['PSA_ALG_ECDSA_BASE',
 | |
|                         'PSA_ALG_RSA_PKCS1V15_SIGN_BASE']:
 | |
|                 # Ad hoc skipping of duplicate names for some numerical values
 | |
|                 return
 | |
|             self.algorithms.add(name)
 | |
|             # Ad hoc detection of hash algorithms
 | |
|             if re.search(r'0x010000[0-9A-Fa-f]{2}', expansion):
 | |
|                 self.hash_algorithms.add(name)
 | |
|             # Ad hoc detection of key agreement algorithms
 | |
|             if re.search(r'0x30[0-9A-Fa-f]{2}0000', expansion):
 | |
|                 self.ka_algorithms.add(name)
 | |
|         elif name.startswith('PSA_ALG_') and parameter == 'hash_alg':
 | |
|             if name in ['PSA_ALG_DSA', 'PSA_ALG_ECDSA']:
 | |
|                 # A naming irregularity
 | |
|                 tester = name[:8] + 'IS_RANDOMIZED_' + name[8:]
 | |
|             else:
 | |
|                 tester = name[:8] + 'IS_' + name[8:]
 | |
|             self.algorithms_from_hash[name] = tester
 | |
|         elif name.startswith('PSA_KEY_USAGE_') and not parameter:
 | |
|             self.key_usages.add(name)
 | |
|         else:
 | |
|             # Other macro without parameter
 | |
|             return
 | |
| 
 | |
|     _nonascii_re = re.compile(rb'[^\x00-\x7f]+')
 | |
|     _continued_line_re = re.compile(rb'\\\r?\n\Z')
 | |
|     def read_file(self, header_file):
 | |
|         for line in header_file:
 | |
|             m = re.search(self._continued_line_re, line)
 | |
|             while m:
 | |
|                 cont = next(header_file)
 | |
|                 line = line[:m.start(0)] + cont
 | |
|                 m = re.search(self._continued_line_re, line)
 | |
|             line = re.sub(self._nonascii_re, rb'', line).decode('ascii')
 | |
|             self.read_line(line)
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_return_case(name):
 | |
|         return 'case %(name)s: return "%(name)s";' % {'name': name}
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_append_case(name):
 | |
|         template = ('case %(name)s: '
 | |
|                     'append(&buffer, buffer_size, &required_size, "%(name)s", %(length)d); '
 | |
|                     'break;')
 | |
|         return template % {'name': name, 'length': len(name)}
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_bit_test(var, flag):
 | |
|         return BIT_TEST_TEMPLATE % {'var': var,
 | |
|                                     'flag': flag,
 | |
|                                     'length': len(flag)}
 | |
| 
 | |
|     def _make_status_cases(self):
 | |
|         return '\n    '.join(map(self._make_return_case,
 | |
|                                  sorted(self.statuses)))
 | |
| 
 | |
|     def _make_ecc_curve_cases(self):
 | |
|         return '\n    '.join(map(self._make_return_case,
 | |
|                                  sorted(self.ecc_curves)))
 | |
| 
 | |
|     def _make_dh_group_cases(self):
 | |
|         return '\n    '.join(map(self._make_return_case,
 | |
|                                  sorted(self.dh_groups)))
 | |
| 
 | |
|     def _make_key_type_cases(self):
 | |
|         return '\n    '.join(map(self._make_append_case,
 | |
|                                  sorted(self.key_types)))
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_key_type_from_curve_code(builder, tester):
 | |
|         return KEY_TYPE_FROM_CURVE_TEMPLATE % {'builder': builder,
 | |
|                                                'builder_length': len(builder),
 | |
|                                                'tester': tester}
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_key_type_from_group_code(builder, tester):
 | |
|         return KEY_TYPE_FROM_GROUP_TEMPLATE % {'builder': builder,
 | |
|                                                'builder_length': len(builder),
 | |
|                                                'tester': tester}
 | |
| 
 | |
|     def _make_ecc_key_type_code(self):
 | |
|         d = self.key_types_from_curve
 | |
|         make = self._make_key_type_from_curve_code
 | |
|         return ''.join([make(k, d[k]) for k in sorted(d.keys())])
 | |
| 
 | |
|     def _make_dh_key_type_code(self):
 | |
|         d = self.key_types_from_group
 | |
|         make = self._make_key_type_from_group_code
 | |
|         return ''.join([make(k, d[k]) for k in sorted(d.keys())])
 | |
| 
 | |
|     def _make_hash_algorithm_cases(self):
 | |
|         return '\n    '.join(map(self._make_return_case,
 | |
|                                  sorted(self.hash_algorithms)))
 | |
| 
 | |
|     def _make_ka_algorithm_cases(self):
 | |
|         return '\n    '.join(map(self._make_return_case,
 | |
|                                  sorted(self.ka_algorithms)))
 | |
| 
 | |
|     def _make_algorithm_cases(self):
 | |
|         return '\n    '.join(map(self._make_append_case,
 | |
|                                  sorted(self.algorithms)))
 | |
| 
 | |
|     @staticmethod
 | |
|     def _make_algorithm_from_hash_code(builder, tester):
 | |
|         return ALGORITHM_FROM_HASH_TEMPLATE % {'builder': builder,
 | |
|                                                'builder_length': len(builder),
 | |
|                                                'tester': tester}
 | |
| 
 | |
|     def _make_algorithm_code(self):
 | |
|         d = self.algorithms_from_hash
 | |
|         make = self._make_algorithm_from_hash_code
 | |
|         return ''.join([make(k, d[k]) for k in sorted(d.keys())])
 | |
| 
 | |
|     def _make_key_usage_code(self):
 | |
|         return '\n'.join([self._make_bit_test('usage', bit)
 | |
|                           for bit in sorted(self.key_usages)])
 | |
| 
 | |
|     def write_file(self, output_file):
 | |
|         """Generate the pretty-printer function code from the gathered
 | |
|         constant definitions.
 | |
|         """
 | |
|         data = {}
 | |
|         data['status_cases'] = self._make_status_cases()
 | |
|         data['ecc_curve_cases'] = self._make_ecc_curve_cases()
 | |
|         data['dh_group_cases'] = self._make_dh_group_cases()
 | |
|         data['key_type_cases'] = self._make_key_type_cases()
 | |
|         data['key_type_code'] = (self._make_ecc_key_type_code() +
 | |
|                                  self._make_dh_key_type_code())
 | |
|         data['hash_algorithm_cases'] = self._make_hash_algorithm_cases()
 | |
|         data['ka_algorithm_cases'] = self._make_ka_algorithm_cases()
 | |
|         data['algorithm_cases'] = self._make_algorithm_cases()
 | |
|         data['algorithm_code'] = self._make_algorithm_code()
 | |
|         data['key_usage_code'] = self._make_key_usage_code()
 | |
|         output_file.write(OUTPUT_TEMPLATE % data)
 | |
| 
 | |
| def generate_psa_constants(header_file_names, output_file_name):
 | |
|     collector = MacroCollector()
 | |
|     for header_file_name in header_file_names:
 | |
|         with open(header_file_name, 'rb') as header_file:
 | |
|             collector.read_file(header_file)
 | |
|     temp_file_name = output_file_name + '.tmp'
 | |
|     with open(temp_file_name, 'w') as output_file:
 | |
|         collector.write_file(output_file)
 | |
|     os.replace(temp_file_name, output_file_name)
 | |
| 
 | |
| if __name__ == '__main__':
 | |
|     if not os.path.isdir('programs') and os.path.isdir('../programs'):
 | |
|         os.chdir('..')
 | |
|     # Allow to change the directory where psa_constant_names_generated.c is written to.
 | |
|     OUTPUT_FILE_DIR = sys.argv[1] if len(sys.argv) == 2 else "programs/psa"
 | |
|     generate_psa_constants(['include/psa/crypto_values.h',
 | |
|                             'include/psa/crypto_extra.h'],
 | |
|                            OUTPUT_FILE_DIR + '/psa_constant_names_generated.c')
 |