mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-05-11 21:42:11 +00:00
Merge pull request #104 from gilles-peskine-arm/psa-global_key_id
Make key ids global and define their range
This commit is contained in:
commit
99e8d26a75
|
@ -512,9 +512,10 @@ void psa_reset_key_attributes(psa_key_attributes_t *attributes);
|
||||||
*
|
*
|
||||||
* Open a handle to a key which was previously created with psa_create_key().
|
* Open a handle to a key which was previously created with psa_create_key().
|
||||||
*
|
*
|
||||||
* \param lifetime The lifetime of the key. This designates a storage
|
* Implementations may provide additional keys that can be opened with
|
||||||
* area where the key material is stored. This must not
|
* psa_open_key(). Such keys have a key identifier in the vendor range,
|
||||||
* be #PSA_KEY_LIFETIME_VOLATILE.
|
* as documented in the description of #psa_key_id_t.
|
||||||
|
*
|
||||||
* \param id The persistent identifier of the key.
|
* \param id The persistent identifier of the key.
|
||||||
* \param[out] handle On success, a handle to a key slot which contains
|
* \param[out] handle On success, a handle to a key slot which contains
|
||||||
* the data and metadata loaded from the specified
|
* the data and metadata loaded from the specified
|
||||||
|
@ -526,19 +527,16 @@ void psa_reset_key_attributes(psa_key_attributes_t *attributes);
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
* \retval #PSA_ERROR_DOES_NOT_EXIST
|
* \retval #PSA_ERROR_DOES_NOT_EXIST
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
* \p lifetime is invalid, for example #PSA_KEY_LIFETIME_VOLATILE.
|
* \p id is invalid.
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
|
||||||
* \p id is invalid for the specified lifetime.
|
|
||||||
* \retval #PSA_ERROR_NOT_SUPPORTED
|
|
||||||
* \p lifetime is not supported.
|
|
||||||
* \retval #PSA_ERROR_NOT_PERMITTED
|
* \retval #PSA_ERROR_NOT_PERMITTED
|
||||||
* The specified key exists, but the application does not have the
|
* The specified key exists, but the application does not have the
|
||||||
* permission to access it. Note that this specification does not
|
* permission to access it. Note that this specification does not
|
||||||
* define any way to create such a key, but it may be possible
|
* define any way to create such a key, but it may be possible
|
||||||
* through implementation-specific means.
|
* through implementation-specific means.
|
||||||
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
*/
|
*/
|
||||||
psa_status_t psa_open_key(psa_key_lifetime_t lifetime,
|
psa_status_t psa_open_key(psa_key_id_t id,
|
||||||
psa_key_id_t id,
|
|
||||||
psa_key_handle_t *handle);
|
psa_key_handle_t *handle);
|
||||||
|
|
||||||
/** Close a key handle.
|
/** Close a key handle.
|
||||||
|
|
|
@ -85,10 +85,30 @@ typedef uint32_t psa_algorithm_t;
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/** Encoding of key lifetimes.
|
/** Encoding of key lifetimes.
|
||||||
|
*
|
||||||
|
* The lifetime of a key indicates where it is stored and what system actions
|
||||||
|
* may create and destroy it.
|
||||||
|
*
|
||||||
|
* Keys with the lifetime #PSA_KEY_LIFETIME_VOLATILE are automatically
|
||||||
|
* destroyed when the application terminates or on a power reset.
|
||||||
|
*
|
||||||
|
* Keys with a lifetime other than #PSA_KEY_LIFETIME_VOLATILE are said
|
||||||
|
* to be _persistent_.
|
||||||
|
* Persistent keys are preserved if the application or the system restarts.
|
||||||
|
* Persistent keys have a key identifier of type #psa_key_id_t.
|
||||||
|
* The application can call psa_open_key() to open a persistent key that
|
||||||
|
* it created previously.
|
||||||
*/
|
*/
|
||||||
typedef uint32_t psa_key_lifetime_t;
|
typedef uint32_t psa_key_lifetime_t;
|
||||||
|
|
||||||
/** Encoding of identifiers of persistent keys.
|
/** Encoding of identifiers of persistent keys.
|
||||||
|
*
|
||||||
|
* - Applications may freely choose key identifiers in the range
|
||||||
|
* #PSA_KEY_ID_USER_MIN to #PSA_KEY_ID_USER_MAX.
|
||||||
|
* - Implementations may define additional key identifiers in the range
|
||||||
|
* #PSA_KEY_ID_VENDOR_MIN to #PSA_KEY_ID_VENDOR_MAX.
|
||||||
|
* - 0 is reserved as an invalid key identifier.
|
||||||
|
* - Key identifiers outside these ranges are reserved for future use.
|
||||||
*/
|
*/
|
||||||
/* Implementation-specific quirk: The Mbed Crypto library can be built as
|
/* Implementation-specific quirk: The Mbed Crypto library can be built as
|
||||||
* part of a multi-client service that exposes the PSA Crypto API in each
|
* part of a multi-client service that exposes the PSA Crypto API in each
|
||||||
|
|
|
@ -1488,6 +1488,19 @@
|
||||||
*/
|
*/
|
||||||
#define PSA_KEY_LIFETIME_PERSISTENT ((psa_key_lifetime_t)0x00000001)
|
#define PSA_KEY_LIFETIME_PERSISTENT ((psa_key_lifetime_t)0x00000001)
|
||||||
|
|
||||||
|
/** The minimum value for a key identifier chosen by the application.
|
||||||
|
*/
|
||||||
|
#define PSA_KEY_ID_USER_MIN ((psa_key_id_t)0x00000001)
|
||||||
|
/** The maximum value for a key identifier chosen by the application.
|
||||||
|
*/
|
||||||
|
#define PSA_KEY_ID_USER_MAX ((psa_key_id_t)0x3fffffff)
|
||||||
|
/** The minimum value for a key identifier chosen by the implementation.
|
||||||
|
*/
|
||||||
|
#define PSA_KEY_ID_VENDOR_MIN ((psa_key_id_t)0x40000000)
|
||||||
|
/** The maximum value for a key identifier chosen by the implementation.
|
||||||
|
*/
|
||||||
|
#define PSA_KEY_ID_VENDOR_MAX ((psa_key_id_t)0x7fffffff)
|
||||||
|
|
||||||
/**@}*/
|
/**@}*/
|
||||||
|
|
||||||
/** \defgroup policy Key policies
|
/** \defgroup policy Key policies
|
||||||
|
|
|
@ -1425,7 +1425,7 @@ static psa_status_t psa_start_key_creation(
|
||||||
if( attributes->lifetime != PSA_KEY_LIFETIME_VOLATILE )
|
if( attributes->lifetime != PSA_KEY_LIFETIME_VOLATILE )
|
||||||
{
|
{
|
||||||
status = psa_validate_persistent_key_parameters( attributes->lifetime,
|
status = psa_validate_persistent_key_parameters( attributes->lifetime,
|
||||||
attributes->id );
|
attributes->id, 1 );
|
||||||
if( status != PSA_SUCCESS )
|
if( status != PSA_SUCCESS )
|
||||||
return( status );
|
return( status );
|
||||||
slot->persistent_storage_id = attributes->id;
|
slot->persistent_storage_id = attributes->id;
|
||||||
|
|
|
@ -176,21 +176,23 @@ exit:
|
||||||
* is provided.
|
* is provided.
|
||||||
*
|
*
|
||||||
* \param file_id The key identifier to check.
|
* \param file_id The key identifier to check.
|
||||||
|
* \param vendor_ok Nonzero to allow key ids in the vendor range.
|
||||||
|
* 0 to allow only key ids in the application range.
|
||||||
*
|
*
|
||||||
* \return 1 if \p file_id is acceptable, otherwise 0.
|
* \return 1 if \p file_id is acceptable, otherwise 0.
|
||||||
*/
|
*/
|
||||||
static int psa_is_key_id_valid( psa_key_file_id_t file_id )
|
static int psa_is_key_id_valid( psa_key_file_id_t file_id,
|
||||||
|
int vendor_ok )
|
||||||
{
|
{
|
||||||
psa_app_key_id_t key_id = PSA_KEY_FILE_GET_KEY_ID( file_id );
|
psa_app_key_id_t key_id = PSA_KEY_FILE_GET_KEY_ID( file_id );
|
||||||
/* Reject id=0 because by general library conventions, 0 is an invalid
|
if( PSA_KEY_ID_USER_MIN <= key_id && key_id <= PSA_KEY_ID_USER_MAX )
|
||||||
* value wherever possible. */
|
return( 1 );
|
||||||
if( key_id == 0 )
|
else if( vendor_ok &&
|
||||||
|
PSA_KEY_ID_VENDOR_MIN <= key_id &&
|
||||||
|
key_id <= PSA_KEY_ID_VENDOR_MAX )
|
||||||
|
return( 1 );
|
||||||
|
else
|
||||||
return( 0 );
|
return( 0 );
|
||||||
/* Reject high values because the file names are reserved for the
|
|
||||||
* library's internal use. */
|
|
||||||
if( key_id > PSA_MAX_PERSISTENT_KEY_IDENTIFIER )
|
|
||||||
return( 0 );
|
|
||||||
return( 1 );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Declare a slot as persistent and load it from storage.
|
/** Declare a slot as persistent and load it from storage.
|
||||||
|
@ -231,18 +233,20 @@ static psa_status_t psa_internal_make_key_persistent( psa_key_handle_t handle,
|
||||||
|
|
||||||
psa_status_t psa_validate_persistent_key_parameters(
|
psa_status_t psa_validate_persistent_key_parameters(
|
||||||
psa_key_lifetime_t lifetime,
|
psa_key_lifetime_t lifetime,
|
||||||
psa_key_file_id_t id )
|
psa_key_file_id_t id,
|
||||||
|
int creating )
|
||||||
{
|
{
|
||||||
if( lifetime != PSA_KEY_LIFETIME_PERSISTENT )
|
if( lifetime != PSA_KEY_LIFETIME_PERSISTENT )
|
||||||
return( PSA_ERROR_INVALID_ARGUMENT );
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
|
|
||||||
#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C)
|
#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C)
|
||||||
if( ! psa_is_key_id_valid( id ) )
|
if( ! psa_is_key_id_valid( id, ! creating ) )
|
||||||
return( PSA_ERROR_INVALID_ARGUMENT );
|
return( PSA_ERROR_INVALID_ARGUMENT );
|
||||||
return( PSA_SUCCESS );
|
return( PSA_SUCCESS );
|
||||||
|
|
||||||
#else /* MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
#else /* MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
||||||
(void) id;
|
(void) id;
|
||||||
|
(void) creating;
|
||||||
return( PSA_ERROR_NOT_SUPPORTED );
|
return( PSA_ERROR_NOT_SUPPORTED );
|
||||||
#endif /* !MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
#endif /* !MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
||||||
}
|
}
|
||||||
|
@ -250,13 +254,15 @@ psa_status_t psa_validate_persistent_key_parameters(
|
||||||
static psa_status_t persistent_key_setup( psa_key_lifetime_t lifetime,
|
static psa_status_t persistent_key_setup( psa_key_lifetime_t lifetime,
|
||||||
psa_key_file_id_t id,
|
psa_key_file_id_t id,
|
||||||
psa_key_handle_t *handle,
|
psa_key_handle_t *handle,
|
||||||
psa_status_t wanted_load_status )
|
int creating )
|
||||||
{
|
{
|
||||||
psa_status_t status;
|
psa_status_t status;
|
||||||
|
psa_status_t wanted_load_status =
|
||||||
|
( creating ? PSA_ERROR_DOES_NOT_EXIST : PSA_SUCCESS );
|
||||||
|
|
||||||
*handle = 0;
|
*handle = 0;
|
||||||
|
|
||||||
status = psa_validate_persistent_key_parameters( lifetime, id );
|
status = psa_validate_persistent_key_parameters( lifetime, id, creating );
|
||||||
if( status != PSA_SUCCESS )
|
if( status != PSA_SUCCESS )
|
||||||
return( status );
|
return( status );
|
||||||
|
|
||||||
|
@ -278,11 +284,10 @@ static psa_status_t persistent_key_setup( psa_key_lifetime_t lifetime,
|
||||||
#endif /* !defined(MBEDTLS_PSA_CRYPTO_STORAGE_C) */
|
#endif /* !defined(MBEDTLS_PSA_CRYPTO_STORAGE_C) */
|
||||||
}
|
}
|
||||||
|
|
||||||
psa_status_t psa_open_key( psa_key_lifetime_t lifetime,
|
psa_status_t psa_open_key( psa_key_file_id_t id, psa_key_handle_t *handle )
|
||||||
psa_key_file_id_t id,
|
|
||||||
psa_key_handle_t *handle )
|
|
||||||
{
|
{
|
||||||
return( persistent_key_setup( lifetime, id, handle, PSA_SUCCESS ) );
|
return( persistent_key_setup( PSA_KEY_LIFETIME_PERSISTENT,
|
||||||
|
id, handle, 0 ) );
|
||||||
}
|
}
|
||||||
|
|
||||||
psa_status_t psa_create_key( psa_key_lifetime_t lifetime,
|
psa_status_t psa_create_key( psa_key_lifetime_t lifetime,
|
||||||
|
@ -291,8 +296,7 @@ psa_status_t psa_create_key( psa_key_lifetime_t lifetime,
|
||||||
{
|
{
|
||||||
psa_status_t status;
|
psa_status_t status;
|
||||||
|
|
||||||
status = persistent_key_setup( lifetime, id, handle,
|
status = persistent_key_setup( lifetime, id, handle, 1 );
|
||||||
PSA_ERROR_DOES_NOT_EXIST );
|
|
||||||
switch( status )
|
switch( status )
|
||||||
{
|
{
|
||||||
case PSA_SUCCESS: return( PSA_ERROR_ALREADY_EXISTS );
|
case PSA_SUCCESS: return( PSA_ERROR_ALREADY_EXISTS );
|
||||||
|
|
|
@ -64,6 +64,8 @@ void psa_wipe_all_key_slots( void );
|
||||||
*
|
*
|
||||||
* \param lifetime The lifetime to test.
|
* \param lifetime The lifetime to test.
|
||||||
* \param id The key id to test.
|
* \param id The key id to test.
|
||||||
|
* \param creating 0 if attempting to open an existing key.
|
||||||
|
* Nonzero if attempting to create a key.
|
||||||
*
|
*
|
||||||
* \retval PSA_SUCCESS
|
* \retval PSA_SUCCESS
|
||||||
* The given parameters are valid.
|
* The given parameters are valid.
|
||||||
|
@ -74,7 +76,8 @@ void psa_wipe_all_key_slots( void );
|
||||||
*/
|
*/
|
||||||
psa_status_t psa_validate_persistent_key_parameters(
|
psa_status_t psa_validate_persistent_key_parameters(
|
||||||
psa_key_lifetime_t lifetime,
|
psa_key_lifetime_t lifetime,
|
||||||
psa_key_file_id_t id );
|
psa_key_file_id_t id,
|
||||||
|
int creating );
|
||||||
|
|
||||||
|
|
||||||
#endif /* PSA_CRYPTO_SLOT_MANAGEMENT_H */
|
#endif /* PSA_CRYPTO_SLOT_MANAGEMENT_H */
|
||||||
|
|
|
@ -59,7 +59,7 @@ extern "C" {
|
||||||
* This limitation will probably become moot when we implement client
|
* This limitation will probably become moot when we implement client
|
||||||
* separation for key storage.
|
* separation for key storage.
|
||||||
*/
|
*/
|
||||||
#define PSA_MAX_PERSISTENT_KEY_IDENTIFIER 0xfffeffff
|
#define PSA_MAX_PERSISTENT_KEY_IDENTIFIER PSA_KEY_ID_VENDOR_MAX
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Checks if persistent data is stored for the given key slot number
|
* \brief Checks if persistent data is stored for the given key slot number
|
||||||
|
|
|
@ -4942,8 +4942,7 @@ void persistent_key_load_key_from_storage( data_t *data,
|
||||||
PSA_ASSERT( psa_crypto_init() );
|
PSA_ASSERT( psa_crypto_init() );
|
||||||
|
|
||||||
/* Check key slot still contains key data */
|
/* Check key slot still contains key data */
|
||||||
PSA_ASSERT( psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id,
|
PSA_ASSERT( psa_open_key( key_id, &handle ) );
|
||||||
&handle ) );
|
|
||||||
PSA_ASSERT( psa_get_key_attributes( handle, &attributes ) );
|
PSA_ASSERT( psa_get_key_attributes( handle, &attributes ) );
|
||||||
TEST_EQUAL( psa_get_key_id( &attributes ), key_id );
|
TEST_EQUAL( psa_get_key_id( &attributes ), key_id );
|
||||||
TEST_EQUAL( psa_get_key_lifetime( &attributes ),
|
TEST_EQUAL( psa_get_key_lifetime( &attributes ),
|
||||||
|
@ -4978,7 +4977,7 @@ exit:
|
||||||
/* In case there was a test failure after creating the persistent key
|
/* In case there was a test failure after creating the persistent key
|
||||||
* but while it was not open, try to re-open the persistent key
|
* but while it was not open, try to re-open the persistent key
|
||||||
* to delete it. */
|
* to delete it. */
|
||||||
psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id, &handle );
|
psa_open_key( key_id, &handle );
|
||||||
}
|
}
|
||||||
psa_destroy_key( handle );
|
psa_destroy_key( handle );
|
||||||
mbedtls_psa_crypto_free();
|
mbedtls_psa_crypto_free();
|
||||||
|
|
|
@ -133,8 +133,7 @@ void persistent_key_destroy( int key_id_arg, int restart,
|
||||||
psa_close_key( handle );
|
psa_close_key( handle );
|
||||||
mbedtls_psa_crypto_free();
|
mbedtls_psa_crypto_free();
|
||||||
PSA_ASSERT( psa_crypto_init() );
|
PSA_ASSERT( psa_crypto_init() );
|
||||||
PSA_ASSERT( psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id,
|
PSA_ASSERT( psa_open_key( key_id, &handle ) );
|
||||||
&handle ) );
|
|
||||||
}
|
}
|
||||||
TEST_EQUAL( psa_is_key_present_in_storage( key_id ), 1 );
|
TEST_EQUAL( psa_is_key_present_in_storage( key_id ), 1 );
|
||||||
|
|
||||||
|
@ -143,8 +142,7 @@ void persistent_key_destroy( int key_id_arg, int restart,
|
||||||
|
|
||||||
/* Check key slot storage is removed */
|
/* Check key slot storage is removed */
|
||||||
TEST_EQUAL( psa_is_key_present_in_storage( key_id ), 0 );
|
TEST_EQUAL( psa_is_key_present_in_storage( key_id ), 0 );
|
||||||
TEST_EQUAL( psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id, &handle ),
|
TEST_EQUAL( psa_open_key( key_id, &handle ), PSA_ERROR_DOES_NOT_EXIST );
|
||||||
PSA_ERROR_DOES_NOT_EXIST );
|
|
||||||
TEST_EQUAL( handle, 0 );
|
TEST_EQUAL( handle, 0 );
|
||||||
|
|
||||||
/* Shutdown and restart */
|
/* Shutdown and restart */
|
||||||
|
@ -190,8 +188,7 @@ void persistent_key_import( int key_id_arg, int type_arg, data_t *data,
|
||||||
psa_close_key( handle );
|
psa_close_key( handle );
|
||||||
mbedtls_psa_crypto_free();
|
mbedtls_psa_crypto_free();
|
||||||
PSA_ASSERT( psa_crypto_init() );
|
PSA_ASSERT( psa_crypto_init() );
|
||||||
PSA_ASSERT( psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id,
|
PSA_ASSERT( psa_open_key( key_id, &handle ) );
|
||||||
&handle ) );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
psa_reset_key_attributes( &attributes );
|
psa_reset_key_attributes( &attributes );
|
||||||
|
@ -240,8 +237,7 @@ void import_export_persistent_key( data_t *data, int type_arg,
|
||||||
psa_close_key( handle );
|
psa_close_key( handle );
|
||||||
mbedtls_psa_crypto_free();
|
mbedtls_psa_crypto_free();
|
||||||
PSA_ASSERT( psa_crypto_init() );
|
PSA_ASSERT( psa_crypto_init() );
|
||||||
PSA_ASSERT( psa_open_key( PSA_KEY_LIFETIME_PERSISTENT, key_id,
|
PSA_ASSERT( psa_open_key( key_id, &handle ) );
|
||||||
&handle ) );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Test the key information */
|
/* Test the key information */
|
||||||
|
|
|
@ -7,14 +7,23 @@ transient_slot_lifecycle:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789ab
|
||||||
Transient slot, check after restart
|
Transient slot, check after restart
|
||||||
transient_slot_lifecycle:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
transient_slot_lifecycle:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
Persistent slot, check after closing
|
Persistent slot, check after closing, id=min
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_CLOSE
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MIN:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_CLOSE
|
||||||
|
|
||||||
Persistent slot, check after destroying
|
Persistent slot, check after destroying, id=min
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_DESTROY
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MIN:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_DESTROY
|
||||||
|
|
||||||
Persistent slot, check after restart
|
Persistent slot, check after restart, id=min
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MIN:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
|
Persistent slot, check after closing, id=max
|
||||||
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MAX:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_CLOSE
|
||||||
|
|
||||||
|
Persistent slot, check after destroying, id=max
|
||||||
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MAX:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_DESTROY
|
||||||
|
|
||||||
|
Persistent slot, check after restart, id=max
|
||||||
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MAX:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
Attempt to overwrite: close before
|
Attempt to overwrite: close before
|
||||||
create_existent:PSA_KEY_LIFETIME_PERSISTENT:1:CLOSE_BEFORE
|
create_existent:PSA_KEY_LIFETIME_PERSISTENT:1:CLOSE_BEFORE
|
||||||
|
@ -27,21 +36,23 @@ create_existent:PSA_KEY_LIFETIME_PERSISTENT:1:KEEP_OPEN
|
||||||
|
|
||||||
Open failure: invalid identifier (0)
|
Open failure: invalid identifier (0)
|
||||||
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
open_fail:PSA_KEY_LIFETIME_PERSISTENT:0:PSA_ERROR_INVALID_ARGUMENT
|
open_fail:0:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
Open failure: invalid identifier (random seed UID)
|
Open failure: invalid identifier (random seed UID)
|
||||||
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
open_fail:PSA_KEY_LIFETIME_PERSISTENT:PSA_CRYPTO_ITS_RANDOM_SEED_UID:PSA_ERROR_INVALID_ARGUMENT
|
open_fail:PSA_CRYPTO_ITS_RANDOM_SEED_UID:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
Open failure: invalid identifier (reserved range)
|
||||||
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
|
open_fail:PSA_KEY_ID_VENDOR_MAX + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
Open failure: invalid identifier (implementation range)
|
||||||
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
|
open_fail:PSA_KEY_ID_USER_MAX + 1:PSA_ERROR_DOES_NOT_EXIST
|
||||||
|
|
||||||
Open failure: non-existent identifier
|
Open failure: non-existent identifier
|
||||||
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
open_fail:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_ERROR_DOES_NOT_EXIST
|
open_fail:1:PSA_ERROR_DOES_NOT_EXIST
|
||||||
|
|
||||||
Open failure: volatile lifetime
|
|
||||||
open_fail:PSA_KEY_LIFETIME_VOLATILE:1:PSA_ERROR_INVALID_ARGUMENT
|
|
||||||
|
|
||||||
Open failure: invalid lifetime
|
|
||||||
open_fail:0x7fffffff:0:PSA_ERROR_INVALID_ARGUMENT
|
|
||||||
|
|
||||||
Create failure: invalid lifetime
|
Create failure: invalid lifetime
|
||||||
create_fail:0x7fffffff:0:PSA_ERROR_INVALID_ARGUMENT
|
create_fail:0x7fffffff:0:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
@ -54,9 +65,17 @@ Create failure: invalid key id (random seed UID)
|
||||||
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
create_fail:PSA_KEY_LIFETIME_PERSISTENT:PSA_CRYPTO_ITS_RANDOM_SEED_UID:PSA_ERROR_INVALID_ARGUMENT
|
create_fail:PSA_KEY_LIFETIME_PERSISTENT:PSA_CRYPTO_ITS_RANDOM_SEED_UID:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
Create failure: invalid key id (reserved range)
|
||||||
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
|
create_fail:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_VENDOR_MAX + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
Create failure: invalid key id (implementation range)
|
||||||
|
depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
|
create_fail:PSA_KEY_LIFETIME_PERSISTENT:PSA_KEY_ID_USER_MAX + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
Open not supported
|
Open not supported
|
||||||
depends_on:!MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:!MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
open_fail:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_ERROR_NOT_SUPPORTED
|
open_fail:1:PSA_ERROR_NOT_SUPPORTED
|
||||||
|
|
||||||
Create not supported
|
Create not supported
|
||||||
depends_on:!MBEDTLS_PSA_CRYPTO_STORAGE_C
|
depends_on:!MBEDTLS_PSA_CRYPTO_STORAGE_C
|
||||||
|
|
|
@ -23,31 +23,47 @@ typedef enum
|
||||||
} reopen_policy_t;
|
} reopen_policy_t;
|
||||||
|
|
||||||
/* All test functions that create persistent keys must call
|
/* All test functions that create persistent keys must call
|
||||||
* `TEST_MAX_KEY_ID( key_id )` before creating a persistent key with this
|
* `TEST_USES_KEY_ID( key_id )` before creating a persistent key with this
|
||||||
* identifier, and must call psa_purge_key_storage() in their cleanup
|
* identifier, and must call psa_purge_key_storage() in their cleanup
|
||||||
* code. */
|
* code. */
|
||||||
|
|
||||||
#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C)
|
#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C)
|
||||||
/* There is no API to purge all keys. For this test suite, require that
|
static psa_key_id_t key_ids_used_in_test[9];
|
||||||
* all key IDs be less than a certain maximum, or a well-known value
|
static size_t num_key_ids_used;
|
||||||
* which corresponds to a file that does not contain a key. */
|
|
||||||
#define MAX_KEY_ID_FOR_TEST 32
|
/* Record a key id as potentially used in a test case. */
|
||||||
#define KEY_ID_IS_WELL_KNOWN( key_id ) \
|
static int test_uses_key_id( psa_key_id_t key_id )
|
||||||
( ( key_id ) == PSA_CRYPTO_ITS_RANDOM_SEED_UID )
|
|
||||||
#define TEST_MAX_KEY_ID( key_id ) \
|
|
||||||
TEST_ASSERT( ( key_id ) <= MAX_KEY_ID_FOR_TEST || \
|
|
||||||
KEY_ID_IS_WELL_KNOWN( key_id ) )
|
|
||||||
void psa_purge_key_storage( void )
|
|
||||||
{
|
{
|
||||||
psa_key_id_t i;
|
size_t i;
|
||||||
/* The tests may have potentially created key ids from 1 to
|
if( key_id > PSA_MAX_PERSISTENT_KEY_IDENTIFIER )
|
||||||
* MAX_KEY_ID_FOR_TEST. In addition, run the destroy function on key id
|
{
|
||||||
* 0, which file-based storage uses as a temporary file. */
|
/* Don't touch key id values that designate non-key files. */
|
||||||
for( i = 0; i <= MAX_KEY_ID_FOR_TEST; i++ )
|
return( 1 );
|
||||||
psa_destroy_persistent_key( i );
|
}
|
||||||
|
for( i = 0; i < num_key_ids_used ; i++ )
|
||||||
|
{
|
||||||
|
if( key_id == key_ids_used_in_test[i] )
|
||||||
|
return( 1 );
|
||||||
|
}
|
||||||
|
if( num_key_ids_used == ARRAY_LENGTH( key_ids_used_in_test ) )
|
||||||
|
return( 0 );
|
||||||
|
key_ids_used_in_test[num_key_ids_used] = key_id;
|
||||||
|
++num_key_ids_used;
|
||||||
|
return( 1 );
|
||||||
|
}
|
||||||
|
#define TEST_USES_KEY_ID( key_id ) \
|
||||||
|
TEST_ASSERT( test_uses_key_id( key_id ) )
|
||||||
|
|
||||||
|
/* Destroy all key ids that may have been created by the current test case. */
|
||||||
|
static void psa_purge_key_storage( void )
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
for( i = 0; i < num_key_ids_used; i++ )
|
||||||
|
psa_destroy_persistent_key( key_ids_used_in_test[i] );
|
||||||
|
num_key_ids_used = 0;
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
#define TEST_MAX_KEY_ID( key_id ) ( (void) ( key_id ) )
|
#define TEST_USES_KEY_ID( key_id ) ( (void) ( key_id ) )
|
||||||
#endif /* MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
#endif /* MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
||||||
|
|
||||||
/* END_HEADER */
|
/* END_HEADER */
|
||||||
|
@ -122,7 +138,7 @@ void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
psa_key_handle_t handle = 0;
|
psa_key_handle_t handle = 0;
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
|
||||||
TEST_MAX_KEY_ID( id );
|
TEST_USES_KEY_ID( id );
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
|
@ -139,7 +155,7 @@ void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
|
|
||||||
/* Close the key and reopen it. */
|
/* Close the key and reopen it. */
|
||||||
PSA_ASSERT( psa_close_key( handle ) );
|
PSA_ASSERT( psa_close_key( handle ) );
|
||||||
PSA_ASSERT( psa_open_key( lifetime, id, &handle ) );
|
PSA_ASSERT( psa_open_key( id, &handle ) );
|
||||||
PSA_ASSERT( psa_get_key_information( handle, &read_type, NULL ) );
|
PSA_ASSERT( psa_get_key_information( handle, &read_type, NULL ) );
|
||||||
TEST_EQUAL( read_type, type );
|
TEST_EQUAL( read_type, type );
|
||||||
|
|
||||||
|
@ -168,12 +184,12 @@ void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
{
|
{
|
||||||
case CLOSE_BY_CLOSE:
|
case CLOSE_BY_CLOSE:
|
||||||
case CLOSE_BY_SHUTDOWN:
|
case CLOSE_BY_SHUTDOWN:
|
||||||
PSA_ASSERT( psa_open_key( lifetime, id, &handle ) );
|
PSA_ASSERT( psa_open_key( id, &handle ) );
|
||||||
PSA_ASSERT( psa_get_key_information( handle, &read_type, NULL ) );
|
PSA_ASSERT( psa_get_key_information( handle, &read_type, NULL ) );
|
||||||
TEST_EQUAL( read_type, type );
|
TEST_EQUAL( read_type, type );
|
||||||
break;
|
break;
|
||||||
case CLOSE_BY_DESTROY:
|
case CLOSE_BY_DESTROY:
|
||||||
TEST_EQUAL( psa_open_key( lifetime, id, &handle ),
|
TEST_EQUAL( psa_open_key( id, &handle ),
|
||||||
PSA_ERROR_DOES_NOT_EXIST );
|
PSA_ERROR_DOES_NOT_EXIST );
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -200,7 +216,7 @@ void create_existent( int lifetime_arg, int id_arg,
|
||||||
size_t reexported_length;
|
size_t reexported_length;
|
||||||
reopen_policy_t reopen_policy = reopen_policy_arg;
|
reopen_policy_t reopen_policy = reopen_policy_arg;
|
||||||
|
|
||||||
TEST_MAX_KEY_ID( id );
|
TEST_USES_KEY_ID( id );
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
|
@ -225,7 +241,7 @@ void create_existent( int lifetime_arg, int id_arg,
|
||||||
if( reopen_policy == CLOSE_AFTER )
|
if( reopen_policy == CLOSE_AFTER )
|
||||||
PSA_ASSERT( psa_close_key( handle1 ) );
|
PSA_ASSERT( psa_close_key( handle1 ) );
|
||||||
if( reopen_policy == CLOSE_BEFORE || reopen_policy == CLOSE_AFTER )
|
if( reopen_policy == CLOSE_BEFORE || reopen_policy == CLOSE_AFTER )
|
||||||
PSA_ASSERT( psa_open_key( lifetime, id, &handle1 ) );
|
PSA_ASSERT( psa_open_key( id, &handle1 ) );
|
||||||
|
|
||||||
/* Check that the original key hasn't changed. */
|
/* Check that the original key hasn't changed. */
|
||||||
psa_reset_key_attributes( &attributes );
|
psa_reset_key_attributes( &attributes );
|
||||||
|
@ -250,17 +266,16 @@ exit:
|
||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void open_fail( int lifetime_arg, int id_arg,
|
void open_fail( int id_arg,
|
||||||
int expected_status_arg )
|
int expected_status_arg )
|
||||||
{
|
{
|
||||||
psa_key_lifetime_t lifetime = lifetime_arg;
|
|
||||||
psa_key_id_t id = id_arg;
|
psa_key_id_t id = id_arg;
|
||||||
psa_status_t expected_status = expected_status_arg;
|
psa_status_t expected_status = expected_status_arg;
|
||||||
psa_key_handle_t handle = 0xdead;
|
psa_key_handle_t handle = 0xdead;
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
TEST_EQUAL( psa_open_key( lifetime, id, &handle ), expected_status );
|
TEST_EQUAL( psa_open_key( id, &handle ), expected_status );
|
||||||
TEST_EQUAL( handle, 0 );
|
TEST_EQUAL( handle, 0 );
|
||||||
|
|
||||||
exit:
|
exit:
|
||||||
|
@ -279,7 +294,7 @@ void create_fail( int lifetime_arg, int id_arg,
|
||||||
psa_key_handle_t handle = 0xdead;
|
psa_key_handle_t handle = 0xdead;
|
||||||
uint8_t material[1] = {'k'};
|
uint8_t material[1] = {'k'};
|
||||||
|
|
||||||
TEST_MAX_KEY_ID( id );
|
TEST_USES_KEY_ID( id );
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
|
@ -323,8 +338,8 @@ void copy_across_lifetimes( int source_lifetime_arg, int source_id_arg,
|
||||||
psa_algorithm_t expected_alg = expected_alg_arg;
|
psa_algorithm_t expected_alg = expected_alg_arg;
|
||||||
uint8_t *export_buffer = NULL;
|
uint8_t *export_buffer = NULL;
|
||||||
|
|
||||||
TEST_MAX_KEY_ID( source_id );
|
TEST_USES_KEY_ID( source_id );
|
||||||
TEST_MAX_KEY_ID( target_id );
|
TEST_USES_KEY_ID( target_id );
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
|
@ -361,8 +376,7 @@ void copy_across_lifetimes( int source_lifetime_arg, int source_id_arg,
|
||||||
{
|
{
|
||||||
mbedtls_psa_crypto_free( );
|
mbedtls_psa_crypto_free( );
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
PSA_ASSERT( psa_open_key( target_lifetime, target_id,
|
PSA_ASSERT( psa_open_key( target_id, &target_handle ) );
|
||||||
&target_handle ) );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Test that the target slot has the expected content. */
|
/* Test that the target slot has the expected content. */
|
||||||
|
@ -428,8 +442,8 @@ void copy_to_occupied( int source_lifetime_arg, int source_id_arg,
|
||||||
psa_key_attributes_t attributes1 = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes1 = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
psa_key_attributes_t attributes2 = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes2 = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
|
||||||
TEST_MAX_KEY_ID( source_id );
|
TEST_USES_KEY_ID( source_id );
|
||||||
TEST_MAX_KEY_ID( target_id );
|
TEST_USES_KEY_ID( target_id );
|
||||||
|
|
||||||
PSA_ASSERT( psa_crypto_init( ) );
|
PSA_ASSERT( psa_crypto_init( ) );
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue