mbedtls/tests/suites/test_suite_psa_crypto_metadata.function
Przemek Stekiel 84f4ff1dd3 Minor adaptations after ffdh was enabled for tls1.3
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
2023-07-05 09:12:08 +02:00

737 lines
31 KiB
C

/* BEGIN_HEADER */
/* Test macros that provide metadata about algorithms and key types.
* This test suite only contains tests that don't require executing
* code. Other test suites validate macros that require creating a key
* and using it. */
#if defined(MBEDTLS_PSA_CRYPTO_SPM)
#include "spm/psa_defs.h"
#endif
#include "psa/crypto.h"
#include "psa_crypto_invasive.h"
/* Flags for algorithm classification macros. There is a flag for every
* algorithm classification macro PSA_ALG_IS_xxx except for the
* category test macros, which are hard-coded in each
* category-specific function. The name of the flag is the name of the
* classification macro without the PSA_ prefix. */
#define ALG_IS_VENDOR_DEFINED (1u << 0)
#define ALG_IS_HMAC (1u << 1)
#define ALG_IS_BLOCK_CIPHER_MAC (1u << 2)
#define ALG_IS_STREAM_CIPHER (1u << 3)
#define ALG_IS_RSA_PKCS1V15_SIGN (1u << 4)
#define ALG_IS_RSA_PSS (1u << 5)
#define ALG_IS_RSA_PSS_ANY_SALT (1u << 6)
#define ALG_IS_RSA_PSS_STANDARD_SALT (1u << 7)
#define ALG_IS_DSA (1u << 8)
#define ALG_DSA_IS_DETERMINISTIC (1u << 9)
#define ALG_IS_DETERMINISTIC_DSA (1u << 10)
#define ALG_IS_RANDOMIZED_DSA (1u << 11)
#define ALG_IS_ECDSA (1u << 12)
#define ALG_ECDSA_IS_DETERMINISTIC (1u << 13)
#define ALG_IS_DETERMINISTIC_ECDSA (1u << 14)
#define ALG_IS_RANDOMIZED_ECDSA (1u << 15)
#define ALG_IS_HASH_EDDSA (1u << 16)
#define ALG_IS_SIGN_HASH (1u << 17)
#define ALG_IS_HASH_AND_SIGN (1u << 18)
#define ALG_IS_RSA_OAEP (1u << 19)
#define ALG_IS_HKDF (1u << 20)
#define ALG_IS_HKDF_EXTRACT (1u << 21)
#define ALG_IS_HKDF_EXPAND (1u << 22)
#define ALG_IS_FFDH (1u << 23)
#define ALG_IS_ECDH (1u << 24)
#define ALG_IS_WILDCARD (1u << 25)
#define ALG_IS_RAW_KEY_AGREEMENT (1u << 26)
#define ALG_IS_AEAD_ON_BLOCK_CIPHER (1u << 27)
#define ALG_IS_TLS12_PRF (1u << 28)
#define ALG_IS_TLS12_PSK_TO_MS (1u << 29)
#define ALG_FLAG_MASK_PLUS_ONE (1u << 30) /* must be last! */
/* Flags for key type classification macros. There is a flag for every
* key type classification macro PSA_KEY_TYPE_IS_xxx except for some that
* are tested as derived from other macros. The name of the flag is
* the name of the classification macro without the PSA_ prefix. */
#define KEY_TYPE_IS_VENDOR_DEFINED (1u << 0)
#define KEY_TYPE_IS_UNSTRUCTURED (1u << 1)
#define KEY_TYPE_IS_PUBLIC_KEY (1u << 2)
#define KEY_TYPE_IS_KEY_PAIR (1u << 3)
#define KEY_TYPE_IS_RSA (1u << 4)
#define KEY_TYPE_IS_DSA (1u << 5)
#define KEY_TYPE_IS_ECC (1u << 6)
#define KEY_TYPE_IS_DH (1u << 7)
#define KEY_TYPE_FLAG_MASK_PLUS_ONE (1u << 8) /* must be last! */
/* Flags for lifetime classification macros. There is a flag for every
* lifetime classification macro PSA_KEY_LIFETIME_IS_xxx. The name of the
* flag is the name of the classification macro without the PSA_ prefix. */
#define KEY_LIFETIME_IS_VOLATILE (1u << 0)
#define KEY_LIFETIME_IS_READ_ONLY (1u << 1)
#define KEY_LIFETIME_FLAG_MASK_PLUS_ONE (1u << 2) /* must be last! */
/* Check that in the value of flags, the bit flag (which should be a macro
* expanding to a number of the form 1 << k) is set if and only if
* PSA_##flag(alg) is true.
*
* Only perform this check if cond is true. Typically cond is 1, but it can
* be different if the value of the flag bit is only specified under specific
* conditions.
*
* Unconditionally mask flag into the ambient variable
* classification_flags_tested.
*/
#define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \
do \
{ \
if (cond) \
{ \
if ((flags) & (flag)) \
TEST_ASSERT(PSA_##flag(alg)); \
else \
TEST_ASSERT(!PSA_##flag(alg)); \
} \
classification_flags_tested |= (flag); \
} \
while (0)
/* Check the parity of value.
*
* There are several numerical encodings for which the PSA Cryptography API
* specification deliberately defines encodings that all have the same
* parity. This way, a data glitch that flips one bit in the data cannot
* possibly turn a valid encoding into another valid encoding. Here in
* the tests, we check that the values (including Mbed TLS vendor-specific
* values) have the expected parity.
*
* The expected parity is even so that 0 is considered a valid encoding.
*
* Return a nonzero value if value has even parity and 0 otherwise. */
int has_even_parity(uint32_t value)
{
value ^= value >> 16;
value ^= value >> 8;
value ^= value >> 4;
return 0x9669 & 1 << (value & 0xf);
}
#define TEST_PARITY(value) \
TEST_ASSERT(has_even_parity(value))
void algorithm_classification(psa_algorithm_t alg, unsigned flags)
{
unsigned classification_flags_tested = 0;
TEST_CLASSIFICATION_MACRO(1, ALG_IS_VENDOR_DEFINED, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_BLOCK_CIPHER_MAC, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_STREAM_CIPHER, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PKCS1V15_SIGN, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS_ANY_SALT, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS_STANDARD_SALT, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_DSA, alg, flags);
TEST_CLASSIFICATION_MACRO(PSA_ALG_IS_DSA(alg),
ALG_DSA_IS_DETERMINISTIC, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_DETERMINISTIC_DSA, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RANDOMIZED_DSA, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_ECDSA, alg, flags);
TEST_CLASSIFICATION_MACRO(PSA_ALG_IS_ECDSA(alg),
ALG_ECDSA_IS_DETERMINISTIC, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_DETERMINISTIC_ECDSA, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RANDOMIZED_ECDSA, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HASH_EDDSA, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_SIGN_HASH, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HASH_AND_SIGN, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_OAEP, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HKDF, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HKDF_EXTRACT, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_HKDF_EXPAND, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_WILDCARD, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_ECDH, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_FFDH, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_RAW_KEY_AGREEMENT, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_AEAD_ON_BLOCK_CIPHER, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_TLS12_PRF, alg, flags);
TEST_CLASSIFICATION_MACRO(1, ALG_IS_TLS12_PSK_TO_MS, alg, flags);
TEST_EQUAL(classification_flags_tested, ALG_FLAG_MASK_PLUS_ONE - 1);
exit:;
}
void key_type_classification(psa_key_type_t type, unsigned flags)
{
unsigned classification_flags_tested = 0;
/* Macros tested based on the test case parameter */
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_VENDOR_DEFINED, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_UNSTRUCTURED, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_PUBLIC_KEY, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_KEY_PAIR, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_RSA, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_DSA, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_ECC, type, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_TYPE_IS_DH, type, flags);
TEST_EQUAL(classification_flags_tested, KEY_TYPE_FLAG_MASK_PLUS_ONE - 1);
/* Macros with derived semantics */
TEST_EQUAL(PSA_KEY_TYPE_IS_ASYMMETRIC(type),
(PSA_KEY_TYPE_IS_PUBLIC_KEY(type) ||
PSA_KEY_TYPE_IS_KEY_PAIR(type)));
TEST_EQUAL(PSA_KEY_TYPE_IS_ECC_KEY_PAIR(type),
(PSA_KEY_TYPE_IS_ECC(type) &&
PSA_KEY_TYPE_IS_KEY_PAIR(type)));
TEST_EQUAL(PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY(type),
(PSA_KEY_TYPE_IS_ECC(type) &&
PSA_KEY_TYPE_IS_PUBLIC_KEY(type)));
TEST_EQUAL(PSA_KEY_TYPE_IS_DH_KEY_PAIR(type),
(PSA_KEY_TYPE_IS_DH(type) &&
PSA_KEY_TYPE_IS_KEY_PAIR(type)));
TEST_EQUAL(PSA_KEY_TYPE_IS_DH_PUBLIC_KEY(type),
(PSA_KEY_TYPE_IS_DH(type) &&
PSA_KEY_TYPE_IS_PUBLIC_KEY(type)));
TEST_PARITY(type);
exit:;
}
void mac_algorithm_core(psa_algorithm_t alg, int classification_flags,
psa_key_type_t key_type, size_t key_bits,
size_t length)
{
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
/* Length */
TEST_EQUAL(length, PSA_MAC_LENGTH(key_type, key_bits, alg));
#if defined(MBEDTLS_TEST_HOOKS) && defined(MBEDTLS_PSA_CRYPTO_C)
PSA_ASSERT(psa_mac_key_can_do(alg, key_type));
#endif
exit:;
}
void aead_algorithm_core(psa_algorithm_t alg, int classification_flags,
psa_key_type_t key_type, size_t key_bits,
size_t tag_length)
{
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
/* Tag length */
TEST_EQUAL(tag_length, PSA_AEAD_TAG_LENGTH(key_type, key_bits, alg));
exit:;
}
/* END_HEADER */
/* BEGIN_DEPENDENCIES
* depends_on:MBEDTLS_PSA_CRYPTO_CLIENT
* END_DEPENDENCIES
*/
/* BEGIN_CASE */
void hash_algorithm(int alg_arg, int length_arg)
{
psa_algorithm_t alg = alg_arg;
size_t length = length_arg;
psa_algorithm_t hmac_alg = PSA_ALG_HMAC(alg);
psa_algorithm_t rsa_pkcs1v15_sign_alg = PSA_ALG_RSA_PKCS1V15_SIGN(alg);
psa_algorithm_t rsa_pss_alg = PSA_ALG_RSA_PSS(alg);
psa_algorithm_t dsa_alg = PSA_ALG_DSA(alg);
psa_algorithm_t deterministic_dsa_alg = PSA_ALG_DETERMINISTIC_DSA(alg);
psa_algorithm_t ecdsa_alg = PSA_ALG_ECDSA(alg);
psa_algorithm_t deterministic_ecdsa_alg = PSA_ALG_DETERMINISTIC_ECDSA(alg);
psa_algorithm_t rsa_oaep_alg = PSA_ALG_RSA_OAEP(alg);
psa_algorithm_t hkdf_alg = PSA_ALG_HKDF(alg);
/* Algorithm classification */
TEST_ASSERT(PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, 0);
/* Dependent algorithms */
TEST_EQUAL(PSA_ALG_HMAC_GET_HASH(hmac_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(rsa_pkcs1v15_sign_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(rsa_pss_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(dsa_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(deterministic_dsa_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(ecdsa_alg), alg);
TEST_EQUAL(PSA_ALG_SIGN_GET_HASH(deterministic_ecdsa_alg), alg);
TEST_EQUAL(PSA_ALG_RSA_OAEP_GET_HASH(rsa_oaep_alg), alg);
TEST_EQUAL(PSA_ALG_HKDF_GET_HASH(hkdf_alg), alg);
/* Hash length */
TEST_EQUAL(length, PSA_HASH_LENGTH(alg));
TEST_ASSERT(length <= PSA_HASH_MAX_SIZE);
}
/* END_CASE */
/* BEGIN_CASE */
void mac_algorithm(int alg_arg, int classification_flags,
int length_arg,
int key_type_arg, int key_bits_arg)
{
psa_algorithm_t alg = alg_arg;
size_t length = length_arg;
size_t n;
size_t key_type = key_type_arg;
size_t key_bits = key_bits_arg;
mac_algorithm_core(alg, classification_flags,
key_type, key_bits, length);
TEST_EQUAL(PSA_ALG_FULL_LENGTH_MAC(alg), alg);
TEST_ASSERT(length <= PSA_MAC_MAX_SIZE);
/* Truncated versions */
for (n = 1; n <= length; n++) {
psa_algorithm_t truncated_alg = PSA_ALG_TRUNCATED_MAC(alg, n);
mac_algorithm_core(truncated_alg, classification_flags,
key_type, key_bits, n);
TEST_EQUAL(PSA_ALG_FULL_LENGTH_MAC(truncated_alg), alg);
/* Check that calling PSA_ALG_TRUNCATED_MAC twice gives the length
* of the outer truncation (even if the outer length is smaller than
* the inner length). */
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(truncated_alg, 1),
PSA_ALG_TRUNCATED_MAC(alg, 1));
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(truncated_alg, length - 1),
PSA_ALG_TRUNCATED_MAC(alg, length - 1));
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(truncated_alg, length),
PSA_ALG_TRUNCATED_MAC(alg, length));
/* Check that calling PSA_ALG_TRUNCATED_MAC on an algorithm
* earlier constructed with PSA_ALG_AT_LEAST_THIS_LENGTH_MAC gives the
* length of the outer truncation (even if the outer length is smaller
* than the inner length). */
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(truncated_alg, n), 1),
PSA_ALG_TRUNCATED_MAC(alg, 1));
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(truncated_alg, n), length - 1),
PSA_ALG_TRUNCATED_MAC(alg, length - 1));
TEST_EQUAL(PSA_ALG_TRUNCATED_MAC(
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(truncated_alg, n), length),
PSA_ALG_TRUNCATED_MAC(alg, length));
}
/* At-leat-this-length versions */
for (n = 1; n <= length; n++) {
psa_algorithm_t policy_alg = PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, n);
mac_algorithm_core(policy_alg, classification_flags | ALG_IS_WILDCARD,
key_type, key_bits, n);
TEST_EQUAL(PSA_ALG_FULL_LENGTH_MAC(policy_alg), alg);
/* Check that calling PSA_ALG_AT_LEAST_THIS_LENGTH_MAC twice gives the
* length of the outer truncation (even if the outer length is smaller
* than the inner length). */
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(policy_alg, 1),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, 1));
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(policy_alg, length - 1),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, length - 1));
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(policy_alg, length),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, length));
/* Check that calling PSA_ALG_AT_LEAST_THIS_LENGTH_MAC on an algorithm
* earlier constructed with PSA_ALG_TRUNCATED_MAC gives the length of
* the outer truncation (even if the outer length is smaller than the
* inner length). */
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(
PSA_ALG_TRUNCATED_MAC(policy_alg, n), 1),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, 1));
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(
PSA_ALG_TRUNCATED_MAC(policy_alg, n), length - 1),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, length - 1));
TEST_EQUAL(PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(
PSA_ALG_TRUNCATED_MAC(policy_alg, n), length),
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC(alg, length));
}
}
/* END_CASE */
/* BEGIN_CASE */
void hmac_algorithm(int alg_arg,
int length_arg,
int block_size_arg)
{
psa_algorithm_t alg = alg_arg;
psa_algorithm_t hash_alg = PSA_ALG_HMAC_GET_HASH(alg);
size_t block_size = block_size_arg;
size_t length = length_arg;
size_t n;
TEST_ASSERT(PSA_ALG_IS_HASH(hash_alg));
TEST_EQUAL(PSA_ALG_HMAC(hash_alg), alg);
TEST_ASSERT(block_size == PSA_HASH_BLOCK_LENGTH(alg));
TEST_ASSERT(block_size <= PSA_HMAC_MAX_HASH_BLOCK_SIZE);
test_mac_algorithm(alg_arg, ALG_IS_HMAC, length,
PSA_KEY_TYPE_HMAC, PSA_BYTES_TO_BITS(length));
for (n = 1; n <= length; n++) {
psa_algorithm_t truncated_alg = PSA_ALG_TRUNCATED_MAC(alg, n);
TEST_EQUAL(PSA_ALG_HMAC_GET_HASH(truncated_alg), hash_alg);
}
}
/* END_CASE */
/* BEGIN_CASE */
void cipher_algorithm(int alg_arg, int classification_flags)
{
psa_algorithm_t alg = alg_arg;
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
}
/* END_CASE */
/* BEGIN_CASE */
void aead_algorithm(int alg_arg, int classification_flags,
int tag_length_arg,
int key_type_arg, int key_bits_arg)
{
psa_algorithm_t alg = alg_arg;
size_t tag_length = tag_length_arg;
size_t n;
psa_key_type_t key_type = key_type_arg;
size_t key_bits = key_bits_arg;
aead_algorithm_core(alg, classification_flags,
key_type, key_bits, tag_length);
/* Truncated versions */
for (n = 1; n <= tag_length; n++) {
psa_algorithm_t truncated_alg = PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, n);
aead_algorithm_core(truncated_alg, classification_flags,
key_type, key_bits, n);
TEST_EQUAL(PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(truncated_alg),
alg);
/* Check that calling PSA_ALG_AEAD_WITH_SHORTENED_TAG twice gives
* the length of the outer truncation (even if the outer length is
* smaller than the inner length). */
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(truncated_alg, 1),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(truncated_alg, tag_length - 1),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, tag_length - 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(truncated_alg, tag_length),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, tag_length));
/* Check that calling PSA_ALG_AEAD_WITH_SHORTENED_TAG on an algorithm
* earlier constructed with PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG
* gives the length of the outer truncation (even if the outer length is
* smaller than the inner length). */
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(truncated_alg, n), 1),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(truncated_alg,
n), tag_length - 1),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, tag_length - 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_SHORTENED_TAG(
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(truncated_alg, n), tag_length),
PSA_ALG_AEAD_WITH_SHORTENED_TAG(alg, tag_length));
}
/* At-leat-this-length versions */
for (n = 1; n <= tag_length; n++) {
psa_algorithm_t policy_alg = PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, n);
aead_algorithm_core(policy_alg, classification_flags | ALG_IS_WILDCARD,
key_type, key_bits, n);
TEST_EQUAL(PSA_ALG_AEAD_WITH_DEFAULT_LENGTH_TAG(policy_alg),
alg);
/* Check that calling PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG twice
* gives the length of the outer truncation (even if the outer length is
* smaller than the inner length). */
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(policy_alg, 1),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(policy_alg, tag_length - 1),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, tag_length - 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(policy_alg, tag_length),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, tag_length));
/* Check that calling PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG on an
* algorithm earlier constructed with PSA_ALG_AEAD_WITH_SHORTENED_TAG
* gives the length of the outer truncation (even if the outer length is
* smaller than the inner length). */
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(
PSA_ALG_AEAD_WITH_SHORTENED_TAG(policy_alg, n), 1),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(
PSA_ALG_AEAD_WITH_SHORTENED_TAG(policy_alg, n), tag_length - 1),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, tag_length - 1));
TEST_EQUAL(PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(
PSA_ALG_AEAD_WITH_SHORTENED_TAG(policy_alg, n), tag_length),
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(alg, tag_length));
}
}
/* END_CASE */
/* BEGIN_CASE */
void asymmetric_signature_algorithm(int alg_arg, int classification_flags)
{
psa_algorithm_t alg = alg_arg;
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
}
/* END_CASE */
/* BEGIN_CASE */
void asymmetric_signature_wildcard(int alg_arg, int classification_flags)
{
classification_flags |= ALG_IS_WILDCARD;
classification_flags |= ALG_IS_SIGN_HASH;
classification_flags |= ALG_IS_HASH_AND_SIGN;
test_asymmetric_signature_algorithm(alg_arg, classification_flags);
/* Any failure of this test function comes from
* asymmetric_signature_algorithm. Pacify -Werror=unused-label. */
goto exit;
}
/* END_CASE */
/* BEGIN_CASE */
void asymmetric_encryption_algorithm(int alg_arg, int classification_flags)
{
psa_algorithm_t alg = alg_arg;
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
}
/* END_CASE */
/* BEGIN_CASE */
void key_derivation_algorithm(int alg_arg, int classification_flags)
{
psa_algorithm_t alg = alg_arg;
psa_algorithm_t ecdh_alg = PSA_ALG_KEY_AGREEMENT(PSA_ALG_ECDH, alg);
psa_algorithm_t ffdh_alg = PSA_ALG_KEY_AGREEMENT(PSA_ALG_FFDH, alg);
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
/* Check combinations with key agreements */
TEST_ASSERT(PSA_ALG_IS_KEY_AGREEMENT(ecdh_alg));
TEST_ASSERT(PSA_ALG_IS_KEY_AGREEMENT(ffdh_alg));
TEST_EQUAL(PSA_ALG_KEY_AGREEMENT_GET_KDF(ecdh_alg), alg);
TEST_EQUAL(PSA_ALG_KEY_AGREEMENT_GET_KDF(ffdh_alg), alg);
}
/* END_CASE */
/* BEGIN_CASE */
void key_agreement_algorithm(int alg_arg, int classification_flags,
int ka_alg_arg, int kdf_alg_arg)
{
psa_algorithm_t alg = alg_arg;
psa_algorithm_t actual_ka_alg = PSA_ALG_KEY_AGREEMENT_GET_BASE(alg);
psa_algorithm_t expected_ka_alg = ka_alg_arg;
psa_algorithm_t actual_kdf_alg = PSA_ALG_KEY_AGREEMENT_GET_KDF(alg);
psa_algorithm_t expected_kdf_alg = kdf_alg_arg;
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(!PSA_ALG_IS_PAKE(alg));
algorithm_classification(alg, classification_flags);
/* Shared secret derivation properties */
TEST_EQUAL(actual_ka_alg, expected_ka_alg);
TEST_EQUAL(actual_kdf_alg, expected_kdf_alg);
}
/* END_CASE */
/* BEGIN_CASE */
void pake_algorithm(int alg_arg)
{
psa_algorithm_t alg = alg_arg;
/* Algorithm classification */
TEST_ASSERT(!PSA_ALG_IS_HASH(alg));
TEST_ASSERT(!PSA_ALG_IS_MAC(alg));
TEST_ASSERT(!PSA_ALG_IS_CIPHER(alg));
TEST_ASSERT(!PSA_ALG_IS_AEAD(alg));
TEST_ASSERT(!PSA_ALG_IS_SIGN(alg));
TEST_ASSERT(!PSA_ALG_IS_ASYMMETRIC_ENCRYPTION(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_AGREEMENT(alg));
TEST_ASSERT(!PSA_ALG_IS_KEY_DERIVATION(alg));
TEST_ASSERT(PSA_ALG_IS_PAKE(alg));
}
/* END_CASE */
/* BEGIN_CASE */
void key_type(int type_arg, int classification_flags)
{
psa_key_type_t type = type_arg;
key_type_classification(type, classification_flags);
/* For asymmetric types, check the corresponding pair/public type */
if (classification_flags & KEY_TYPE_IS_PUBLIC_KEY) {
psa_key_type_t pair_type = PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(type);
TEST_EQUAL(PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(pair_type), type);
key_type_classification(pair_type,
(classification_flags
& ~KEY_TYPE_IS_PUBLIC_KEY)
| KEY_TYPE_IS_KEY_PAIR);
TEST_EQUAL(PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type), type);
}
if (classification_flags & KEY_TYPE_IS_KEY_PAIR) {
psa_key_type_t public_type = PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(type);
TEST_EQUAL(PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(public_type), type);
key_type_classification(public_type,
(classification_flags
& ~KEY_TYPE_IS_KEY_PAIR)
| KEY_TYPE_IS_PUBLIC_KEY);
TEST_EQUAL(PSA_KEY_TYPE_KEY_PAIR_OF_PUBLIC_KEY(type), type);
}
}
/* END_CASE */
/* BEGIN_CASE */
void block_cipher_key_type(int type_arg, int block_size_arg)
{
psa_key_type_t type = type_arg;
size_t block_size = block_size_arg;
test_key_type(type_arg, KEY_TYPE_IS_UNSTRUCTURED);
TEST_EQUAL(type & PSA_KEY_TYPE_CATEGORY_MASK,
PSA_KEY_TYPE_CATEGORY_SYMMETRIC);
TEST_EQUAL(PSA_BLOCK_CIPHER_BLOCK_LENGTH(type), block_size);
/* Check that the block size is a power of 2. This is required, at least,
for PSA_ROUND_UP_TO_MULTIPLE(block_size, length) in crypto_sizes.h. */
TEST_ASSERT(((block_size - 1) & block_size) == 0);
}
/* END_CASE */
/* BEGIN_CASE */
void stream_cipher_key_type(int type_arg)
{
psa_key_type_t type = type_arg;
test_key_type(type_arg, KEY_TYPE_IS_UNSTRUCTURED);
TEST_EQUAL(type & PSA_KEY_TYPE_CATEGORY_MASK,
PSA_KEY_TYPE_CATEGORY_SYMMETRIC);
TEST_EQUAL(PSA_BLOCK_CIPHER_BLOCK_LENGTH(type), 1);
}
/* END_CASE */
/* BEGIN_CASE depends_on:PSA_KEY_TYPE_ECC_PUBLIC_KEY:PSA_KEY_TYPE_ECC_KEY_PAIR */
void ecc_key_family(int curve_arg)
{
psa_ecc_family_t curve = curve_arg;
psa_key_type_t public_type = PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve);
psa_key_type_t pair_type = PSA_KEY_TYPE_ECC_KEY_PAIR(curve);
TEST_PARITY(curve);
test_key_type(public_type, KEY_TYPE_IS_ECC | KEY_TYPE_IS_PUBLIC_KEY);
test_key_type(pair_type, KEY_TYPE_IS_ECC | KEY_TYPE_IS_KEY_PAIR);
TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(public_type), curve);
TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(pair_type), curve);
}
/* END_CASE */
/* BEGIN_CASE depends_on:PSA_KEY_TYPE_DH_PUBLIC_KEY:PSA_KEY_TYPE_DH_KEY_PAIR */
void dh_key_family(int group_arg)
{
psa_dh_family_t group = group_arg;
psa_key_type_t public_type = PSA_KEY_TYPE_DH_PUBLIC_KEY(group);
psa_key_type_t pair_type = PSA_KEY_TYPE_DH_KEY_PAIR(group);
TEST_PARITY(group);
test_key_type(public_type, KEY_TYPE_IS_DH | KEY_TYPE_IS_PUBLIC_KEY);
test_key_type(pair_type, KEY_TYPE_IS_DH | KEY_TYPE_IS_KEY_PAIR);
TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(public_type), group);
TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(pair_type), group);
}
/* END_CASE */
/* BEGIN_CASE */
void lifetime(int lifetime_arg, int classification_flags,
int persistence_arg, int location_arg)
{
psa_key_lifetime_t lifetime = lifetime_arg;
psa_key_persistence_t persistence = persistence_arg;
psa_key_location_t location = location_arg;
unsigned flags = classification_flags;
unsigned classification_flags_tested = 0;
TEST_CLASSIFICATION_MACRO(1, KEY_LIFETIME_IS_VOLATILE, lifetime, flags);
TEST_CLASSIFICATION_MACRO(1, KEY_LIFETIME_IS_READ_ONLY, lifetime, flags);
TEST_EQUAL(classification_flags_tested,
KEY_LIFETIME_FLAG_MASK_PLUS_ONE - 1);
TEST_EQUAL(PSA_KEY_LIFETIME_GET_PERSISTENCE(lifetime), persistence);
TEST_EQUAL(PSA_KEY_LIFETIME_GET_LOCATION(lifetime), location);
}
/* END_CASE */