2018-11-16 22:24:38 +01:00
|
|
|
/* BEGIN_HEADER */
|
2019-09-09 18:22:50 +02:00
|
|
|
|
|
|
|
/* This test file is specific to the ITS implementation in PSA Crypto
|
|
|
|
* on top of stdio. It expects to know what the stdio name of a file is
|
|
|
|
* based on its keystore name.
|
2022-06-20 19:10:35 +02:00
|
|
|
*
|
|
|
|
* Note that if you need to make a change that affects how files are
|
|
|
|
* stored, this may indicate that the key store is changing in a
|
|
|
|
* backward-incompatible way! Think carefully about backward compatibility
|
|
|
|
* before changing how test data is constructed or validated.
|
2019-09-09 18:22:50 +02:00
|
|
|
*/
|
|
|
|
|
2023-08-30 16:34:34 +02:00
|
|
|
#include "psa_crypto_its.h"
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2020-05-27 09:22:32 +02:00
|
|
|
#include "test/psa_helpers.h"
|
2019-05-23 20:25:48 +02:00
|
|
|
|
2018-11-16 22:24:38 +01:00
|
|
|
/* Internal definitions of the implementation, copied for the sake of
|
|
|
|
* some of the tests and of the cleanup code. */
|
|
|
|
#define PSA_ITS_STORAGE_PREFIX ""
|
2019-02-24 12:26:08 +01:00
|
|
|
#define PSA_ITS_STORAGE_FILENAME_PATTERN "%08lx%08lx"
|
|
|
|
#define PSA_ITS_STORAGE_SUFFIX ".psa_its"
|
2018-11-16 22:24:38 +01:00
|
|
|
#define PSA_ITS_STORAGE_FILENAME_LENGTH \
|
2023-01-11 14:50:10 +01:00
|
|
|
(sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \
|
|
|
|
16 + /*UID (64-bit number in hex)*/ \
|
|
|
|
16 + /*UID (64-bit number in hex)*/ \
|
|
|
|
sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \
|
|
|
|
1 /*terminating null byte*/)
|
2019-02-24 12:26:08 +01:00
|
|
|
#define PSA_ITS_STORAGE_TEMP \
|
|
|
|
PSA_ITS_STORAGE_PREFIX "tempfile" PSA_ITS_STORAGE_SUFFIX
|
2023-01-11 14:50:10 +01:00
|
|
|
static void psa_its_fill_filename(psa_storage_uid_t uid, char *filename)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
/* Break up the UID into two 32-bit pieces so as not to rely on
|
|
|
|
* long long support in snprintf. */
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(filename, PSA_ITS_STORAGE_FILENAME_LENGTH,
|
|
|
|
"%s" PSA_ITS_STORAGE_FILENAME_PATTERN "%s",
|
|
|
|
PSA_ITS_STORAGE_PREFIX,
|
|
|
|
(unsigned long) (uid >> 32),
|
|
|
|
(unsigned long) (uid & 0xffffffff),
|
|
|
|
PSA_ITS_STORAGE_SUFFIX);
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Maximum uid used by the test, recorded so that cleanup() can delete
|
2019-02-24 12:26:08 +01:00
|
|
|
* all files. 0xffffffffffffffff is always cleaned up, so it does not
|
|
|
|
* need to and should not be taken into account for uid_max. */
|
|
|
|
static psa_storage_uid_t uid_max = 0;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
static void cleanup(void)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2020-08-25 22:50:18 +02:00
|
|
|
/* Call remove() on all the files that a test might have created.
|
|
|
|
* We ignore the error if the file exists but remove() fails because
|
|
|
|
* it can't be checked portably (except by attempting to open the file
|
|
|
|
* first, which is needlessly slow and complicated here). A failure of
|
|
|
|
* remove() on an existing file is very unlikely anyway and would not
|
|
|
|
* have significant consequences other than perhaps failing the next
|
|
|
|
* test case. */
|
2018-11-16 22:24:38 +01:00
|
|
|
char filename[PSA_ITS_STORAGE_FILENAME_LENGTH];
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid;
|
2023-01-11 14:50:10 +01:00
|
|
|
for (uid = 0; uid < uid_max; uid++) {
|
|
|
|
psa_its_fill_filename(uid, filename);
|
|
|
|
(void) remove(filename);
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
2023-01-11 14:50:10 +01:00
|
|
|
psa_its_fill_filename((psa_storage_uid_t) (-1), filename);
|
|
|
|
(void) remove(filename);
|
|
|
|
(void) remove(PSA_ITS_STORAGE_TEMP);
|
2018-11-16 22:24:38 +01:00
|
|
|
uid_max = 0;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
static psa_status_t psa_its_set_wrap(psa_storage_uid_t uid,
|
|
|
|
uint32_t data_length,
|
|
|
|
const void *p_data,
|
|
|
|
psa_storage_create_flags_t create_flags)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
if (uid_max != (psa_storage_uid_t) (-1) && uid_max < uid) {
|
2018-11-16 22:24:38 +01:00
|
|
|
uid_max = uid;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
return psa_its_set(uid, data_length, p_data, create_flags);
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* END_HEADER */
|
|
|
|
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
|
|
* depends_on:MBEDTLS_PSA_ITS_FILE_C
|
|
|
|
* END_DEPENDENCIES
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void set_get_remove(int uid_arg, int flags_arg, data_t *data)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid = uid_arg;
|
2018-11-16 22:24:38 +01:00
|
|
|
uint32_t flags = flags_arg;
|
2019-02-24 12:26:08 +01:00
|
|
|
struct psa_storage_info_t info;
|
2018-11-16 22:24:38 +01:00
|
|
|
unsigned char *buffer = NULL;
|
2019-07-10 17:34:21 +02:00
|
|
|
size_t ret_len = 0;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-07-21 12:31:13 +02:00
|
|
|
TEST_CALLOC(buffer, data->len);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_get_info(uid, &info));
|
|
|
|
TEST_ASSERT(info.size == data->len);
|
|
|
|
TEST_ASSERT(info.flags == flags);
|
|
|
|
PSA_ASSERT(psa_its_get(uid, 0, data->len, buffer, &ret_len));
|
2023-07-21 12:40:20 +02:00
|
|
|
TEST_MEMORY_COMPARE(data->x, data->len, buffer, ret_len);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_free(buffer);
|
|
|
|
cleanup();
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void set_overwrite(int uid_arg,
|
|
|
|
int flags1_arg, data_t *data1,
|
|
|
|
int flags2_arg, data_t *data2)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid = uid_arg;
|
2018-11-16 22:24:38 +01:00
|
|
|
uint32_t flags1 = flags1_arg;
|
|
|
|
uint32_t flags2 = flags2_arg;
|
2019-02-24 12:26:08 +01:00
|
|
|
struct psa_storage_info_t info;
|
2018-11-16 22:24:38 +01:00
|
|
|
unsigned char *buffer = NULL;
|
2019-07-10 17:34:21 +02:00
|
|
|
size_t ret_len = 0;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-07-21 12:31:13 +02:00
|
|
|
TEST_CALLOC(buffer, MAX(data1->len, data2->len));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, data1->len, data1->x, flags1));
|
|
|
|
PSA_ASSERT(psa_its_get_info(uid, &info));
|
|
|
|
TEST_ASSERT(info.size == data1->len);
|
|
|
|
TEST_ASSERT(info.flags == flags1);
|
|
|
|
PSA_ASSERT(psa_its_get(uid, 0, data1->len, buffer, &ret_len));
|
2023-07-21 12:40:20 +02:00
|
|
|
TEST_MEMORY_COMPARE(data1->x, data1->len, buffer, ret_len);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, data2->len, data2->x, flags2));
|
|
|
|
PSA_ASSERT(psa_its_get_info(uid, &info));
|
|
|
|
TEST_ASSERT(info.size == data2->len);
|
|
|
|
TEST_ASSERT(info.flags == flags2);
|
2019-07-10 17:34:21 +02:00
|
|
|
ret_len = 0;
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_get(uid, 0, data2->len, buffer, &ret_len));
|
2023-07-21 12:40:20 +02:00
|
|
|
TEST_MEMORY_COMPARE(data2->x, data2->len, buffer, ret_len);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_free(buffer);
|
|
|
|
cleanup();
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void set_multiple(int first_id, int count)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid0 = first_id;
|
|
|
|
psa_storage_uid_t uid;
|
2018-11-16 22:24:38 +01:00
|
|
|
char stored[40];
|
|
|
|
char retrieved[40];
|
2019-07-10 17:34:21 +02:00
|
|
|
size_t ret_len = 0;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(stored, '.', sizeof(stored));
|
|
|
|
for (uid = uid0; uid < uid0 + count; uid++) {
|
|
|
|
mbedtls_snprintf(stored, sizeof(stored),
|
|
|
|
"Content of file 0x%08lx", (unsigned long) uid);
|
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, sizeof(stored), stored, 0));
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
for (uid = uid0; uid < uid0 + count; uid++) {
|
|
|
|
mbedtls_snprintf(stored, sizeof(stored),
|
|
|
|
"Content of file 0x%08lx", (unsigned long) uid);
|
|
|
|
PSA_ASSERT(psa_its_get(uid, 0, sizeof(stored), retrieved, &ret_len));
|
2023-07-21 12:40:20 +02:00
|
|
|
TEST_MEMORY_COMPARE(retrieved, ret_len,
|
2023-07-27 15:17:27 +02:00
|
|
|
stored, sizeof(stored));
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
|
|
|
TEST_ASSERT(psa_its_get(uid, 0, 0, NULL, NULL) ==
|
|
|
|
PSA_ERROR_DOES_NOT_EXIST);
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
cleanup();
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void nonexistent(int uid_arg, int create_and_remove)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid = uid_arg;
|
|
|
|
struct psa_storage_info_t info;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (create_and_remove) {
|
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, 0, NULL, 0));
|
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
TEST_ASSERT(psa_its_remove(uid) == PSA_ERROR_DOES_NOT_EXIST);
|
|
|
|
TEST_ASSERT(psa_its_get_info(uid, &info) ==
|
|
|
|
PSA_ERROR_DOES_NOT_EXIST);
|
|
|
|
TEST_ASSERT(psa_its_get(uid, 0, 0, NULL, NULL) ==
|
|
|
|
PSA_ERROR_DOES_NOT_EXIST);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
cleanup();
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void get_at(int uid_arg, data_t *data,
|
|
|
|
int offset, int length_arg,
|
|
|
|
int expected_status)
|
2018-11-16 22:24:38 +01:00
|
|
|
{
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_storage_uid_t uid = uid_arg;
|
2018-11-16 22:24:38 +01:00
|
|
|
unsigned char *buffer = NULL;
|
2019-02-24 12:26:08 +01:00
|
|
|
psa_status_t status;
|
2018-11-16 22:24:38 +01:00
|
|
|
size_t length = length_arg >= 0 ? length_arg : 0;
|
|
|
|
unsigned char *trailer;
|
|
|
|
size_t i;
|
2019-07-10 17:34:21 +02:00
|
|
|
size_t ret_len = 0;
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-07-21 12:31:13 +02:00
|
|
|
TEST_CALLOC(buffer, length + 16);
|
2018-11-16 22:24:38 +01:00
|
|
|
trailer = buffer + length;
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(trailer, '-', 16);
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
status = psa_its_get(uid, offset, length_arg, buffer, &ret_len);
|
|
|
|
TEST_ASSERT(status == (psa_status_t) expected_status);
|
|
|
|
if (status == PSA_SUCCESS) {
|
2023-07-21 12:40:20 +02:00
|
|
|
TEST_MEMORY_COMPARE(data->x + offset, (size_t) length_arg,
|
2023-07-27 15:17:27 +02:00
|
|
|
buffer, ret_len);
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
TEST_ASSERT(trailer[i] == '-');
|
|
|
|
}
|
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
2018-11-16 22:24:38 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_free(buffer);
|
|
|
|
cleanup();
|
2018-11-16 22:24:38 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
2020-11-09 17:50:02 +01:00
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void get_fail(int uid_arg, data_t *data,
|
|
|
|
int overwrite_magic, int cut_header,
|
|
|
|
int expected_status)
|
2020-11-09 17:50:02 +01:00
|
|
|
{
|
|
|
|
psa_storage_uid_t uid = uid_arg;
|
|
|
|
unsigned char *buffer = NULL;
|
|
|
|
psa_status_t status;
|
|
|
|
size_t n;
|
|
|
|
size_t ret_len = 0;
|
|
|
|
char filename[PSA_ITS_STORAGE_FILENAME_LENGTH];
|
|
|
|
FILE *stream = NULL;
|
|
|
|
char bad_char = 'X';
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0));
|
2020-11-09 17:50:02 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
psa_its_fill_filename(uid, filename);
|
|
|
|
stream = fopen(filename, "rb+");
|
|
|
|
TEST_ASSERT(NULL != stream);
|
|
|
|
if (0 != overwrite_magic) {
|
2020-11-09 17:50:02 +01:00
|
|
|
/* Overwrite the 1st byte of the file, the ITS magic number */
|
2023-01-11 14:50:10 +01:00
|
|
|
TEST_ASSERT(fseek(stream, 0, SEEK_SET) == 0);
|
|
|
|
n = fwrite(&bad_char, 1, 1, stream);
|
|
|
|
TEST_ASSERT(1 == n);
|
2020-11-09 17:50:02 +01:00
|
|
|
}
|
2023-01-11 14:50:10 +01:00
|
|
|
if (0 != cut_header) {
|
2020-11-09 17:50:02 +01:00
|
|
|
/* Reopen file and truncate it to 0 byte by specifying the 'w' flag */
|
2023-01-11 14:50:10 +01:00
|
|
|
stream = freopen(filename, "wb", stream);
|
|
|
|
TEST_ASSERT(NULL != stream);
|
2020-11-09 17:50:02 +01:00
|
|
|
}
|
2023-01-11 14:50:10 +01:00
|
|
|
fclose(stream);
|
2020-11-09 17:50:02 +01:00
|
|
|
stream = NULL;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
status = psa_its_get(uid, 0, 0, buffer, &ret_len);
|
|
|
|
TEST_ASSERT(status == (psa_status_t) expected_status);
|
|
|
|
TEST_ASSERT(0 == ret_len);
|
|
|
|
PSA_ASSERT(psa_its_remove(uid));
|
2020-11-09 17:50:02 +01:00
|
|
|
|
|
|
|
/* Check if the file is really deleted. */
|
2023-01-11 14:50:10 +01:00
|
|
|
stream = fopen(filename, "rb");
|
|
|
|
TEST_ASSERT(NULL == stream);
|
2020-11-09 17:50:02 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
if (stream != NULL) {
|
|
|
|
fclose(stream);
|
|
|
|
}
|
2020-11-09 17:50:02 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_free(buffer);
|
|
|
|
cleanup();
|
2020-11-09 17:50:02 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|
2022-02-08 13:57:10 +01:00
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
2023-01-11 14:50:10 +01:00
|
|
|
void set_fail(int uid_arg, data_t *data,
|
|
|
|
int expected_status)
|
2022-02-08 13:57:10 +01:00
|
|
|
{
|
|
|
|
psa_storage_uid_t uid = uid_arg;
|
2023-01-11 14:50:10 +01:00
|
|
|
TEST_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0) ==
|
|
|
|
(psa_status_t) expected_status);
|
2022-02-08 13:57:10 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
exit:
|
|
|
|
cleanup();
|
2022-02-08 13:57:10 +01:00
|
|
|
}
|
|
|
|
/* END_CASE */
|