aboutsummaryrefslogtreecommitdiff
path: root/tests/src/drivers/test_driver_key_agreement.c
blob: 594fcd51d4652f159568ff528334539404672ed7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
/*
 * Test driver for key agreement functions.
 */
/*  Copyright The Mbed TLS Contributors
 *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 */

#include <test/helpers.h>

#if defined(PSA_CRYPTO_DRIVER_TEST)

#include "psa/crypto.h"
#include "psa_crypto_core.h"
#include "psa_crypto_ecp.h"
#include "psa_crypto_ffdh.h"

#include "test/drivers/key_agreement.h"
#include "test/drivers/test_driver.h"

#include <string.h>

#if defined(MBEDTLS_TEST_LIBTESTDRIVER1)
#include "libtestdriver1/tf-psa-crypto/include/psa/crypto.h"
#include "libtestdriver1/library/psa_crypto_ecp.h"
#include "libtestdriver1/library/psa_crypto_ffdh.h"
#endif

mbedtls_test_driver_key_agreement_hooks_t
    mbedtls_test_driver_key_agreement_hooks = MBEDTLS_TEST_DRIVER_KEY_AGREEMENT_INIT;

psa_status_t mbedtls_test_transparent_key_agreement(
    const psa_key_attributes_t *attributes,
    const uint8_t *key_buffer,
    size_t key_buffer_size,
    psa_algorithm_t alg,
    const uint8_t *peer_key,
    size_t peer_key_length,
    uint8_t *shared_secret,
    size_t shared_secret_size,
    size_t *shared_secret_length)
{
    mbedtls_test_driver_key_agreement_hooks.hits++;

    if (mbedtls_test_driver_key_agreement_hooks.forced_status != PSA_SUCCESS) {
        return mbedtls_test_driver_key_agreement_hooks.forced_status;
    }

    if (mbedtls_test_driver_key_agreement_hooks.forced_output != NULL) {
        if (mbedtls_test_driver_key_agreement_hooks.forced_output_length > shared_secret_size) {
            return PSA_ERROR_BUFFER_TOO_SMALL;
        }

        memcpy(shared_secret, mbedtls_test_driver_key_agreement_hooks.forced_output,
               mbedtls_test_driver_key_agreement_hooks.forced_output_length);
        *shared_secret_length = mbedtls_test_driver_key_agreement_hooks.forced_output_length;

        return PSA_SUCCESS;
    }

    if (PSA_ALG_IS_ECDH(alg)) {
#if (defined(MBEDTLS_TEST_LIBTESTDRIVER1) && \
        defined(LIBTESTDRIVER1_MBEDTLS_PSA_BUILTIN_ALG_ECDH))
        return libtestdriver1_mbedtls_psa_key_agreement_ecdh(
            (const libtestdriver1_psa_key_attributes_t *) attributes,
            key_buffer, key_buffer_size,
            alg, peer_key, peer_key_length,
            shared_secret, shared_secret_size,
            shared_secret_length);
#elif defined(MBEDTLS_PSA_BUILTIN_ALG_ECDH)
        return mbedtls_psa_key_agreement_ecdh(
            attributes,
            key_buffer, key_buffer_size,
            alg, peer_key, peer_key_length,
            shared_secret, shared_secret_size,
            shared_secret_length);
#else
        (void) attributes;
        (void) key_buffer;
        (void) key_buffer_size;
        (void) peer_key;
        (void) peer_key_length;
        (void) shared_secret;
        (void) shared_secret_size;
        (void) shared_secret_length;
        return PSA_ERROR_NOT_SUPPORTED;
#endif
    }
    if (PSA_ALG_IS_FFDH(alg)) {
#if (defined(MBEDTLS_TEST_LIBTESTDRIVER1) && \
        defined(LIBTESTDRIVER1_MBEDTLS_PSA_BUILTIN_ALG_FFDH))
        return libtestdriver1_mbedtls_psa_ffdh_key_agreement(
            (const libtestdriver1_psa_key_attributes_t *) attributes,
            peer_key, peer_key_length,
            key_buffer, key_buffer_size,
            shared_secret, shared_secret_size,
            shared_secret_length);
#elif defined(MBEDTLS_PSA_BUILTIN_ALG_FFDH)
        return mbedtls_psa_ffdh_key_agreement(
            attributes,
            peer_key,
            peer_key_length,
            key_buffer,
            key_buffer_size,
            shared_secret,
            shared_secret_size,
            shared_secret_length);
#else
        (void) attributes;
        (void) key_buffer;
        (void) key_buffer_size;
        (void) peer_key;
        (void) peer_key_length;
        (void) shared_secret;
        (void) shared_secret_size;
        (void) shared_secret_length;
        return PSA_ERROR_NOT_SUPPORTED;
#endif
    } else {
        return PSA_ERROR_INVALID_ARGUMENT;
    }

}

psa_status_t mbedtls_test_opaque_key_agreement(
    const psa_key_attributes_t *attributes,
    const uint8_t *key_buffer,
    size_t key_buffer_size,
    psa_algorithm_t alg,
    const uint8_t *peer_key,
    size_t peer_key_length,
    uint8_t *shared_secret,
    size_t shared_secret_size,
    size_t *shared_secret_length)
{
    (void) attributes;
    (void) key_buffer;
    (void) key_buffer_size;
    (void) alg;
    (void) peer_key;
    (void) peer_key_length;
    (void) shared_secret;
    (void) shared_secret_size;
    (void) shared_secret_length;
    return PSA_ERROR_NOT_SUPPORTED;
}

#endif /* PSA_CRYPTO_DRIVER_TEST */