-
Notifications
You must be signed in to change notification settings - Fork 2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
tests/sys/psa_crypto_se_ecdsa: Remove symlinks
- Loading branch information
1 parent
666305e
commit 2b9e942
Showing
4 changed files
with
160 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -8,5 +8,4 @@ BOARD_INSUFFICIENT_MEMORY := \ | |
atmega8 \ | ||
nucleo-l011k4 \ | ||
samd10-xmini \ | ||
stm32f030f4-demo \ | ||
# |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,102 @@ | ||
/* | ||
* Copyright (C) 2022 HAW Hamburg | ||
* | ||
* This file is subject to the terms and conditions of the GNU Lesser | ||
* General Public License v2.1. See the file LICENSE in the top level | ||
* directory for more details. | ||
*/ | ||
|
||
/** | ||
* @ingroup examples | ||
* @{ | ||
* | ||
* @brief Example functions for ECDSA with PSA Crypto | ||
* | ||
* @author Lena Boeckmann <[email protected]> | ||
* | ||
* @} | ||
*/ | ||
|
||
#include <stdio.h> | ||
#include <stdint.h> | ||
|
||
#include "psa/crypto.h" | ||
|
||
#define ECDSA_MESSAGE_SIZE (127) | ||
|
||
#define ECC_KEY_SIZE (256) | ||
#define ECC_KEY_TYPE (PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1)) | ||
#define ECC_ALG_HASH (PSA_ALG_SHA_256) | ||
#define ECC_ALG (PSA_ALG_ECDSA(ECC_ALG_HASH)) | ||
|
||
/** | ||
* @brief Example function to perform an ECDSA operation with a NIST P256 curve | ||
* with the PSA Crypto API. | ||
* | ||
* @return psa_status_t | ||
*/ | ||
psa_status_t example_ecdsa_p256(void) | ||
{ | ||
psa_key_id_t privkey_id; | ||
psa_key_attributes_t privkey_attr = psa_key_attributes_init(); | ||
psa_key_id_t pubkey_id; | ||
psa_key_attributes_t pubkey_attr = psa_key_attributes_init(); | ||
|
||
psa_key_usage_t usage = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_VERIFY_HASH; | ||
|
||
uint8_t public_key[PSA_EXPORT_PUBLIC_KEY_OUTPUT_SIZE(ECC_KEY_TYPE, ECC_KEY_SIZE)] = { 0 }; | ||
size_t pubkey_length; | ||
uint8_t signature[PSA_SIGN_OUTPUT_SIZE(ECC_KEY_TYPE, ECC_KEY_SIZE, ECC_ALG)]; | ||
size_t sig_length; | ||
uint8_t msg[ECDSA_MESSAGE_SIZE] = { 0x0b }; | ||
uint8_t hash[PSA_HASH_LENGTH(ECC_ALG_HASH)]; | ||
size_t hash_length; | ||
|
||
psa_set_key_algorithm(&privkey_attr, ECC_ALG); | ||
psa_set_key_usage_flags(&privkey_attr, usage); | ||
psa_set_key_type(&privkey_attr, ECC_KEY_TYPE); | ||
psa_set_key_bits(&privkey_attr, ECC_KEY_SIZE); | ||
|
||
psa_key_lifetime_t lifetime = PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION( | ||
PSA_KEY_LIFETIME_VOLATILE, PSA_ATCA_LOCATION_DEV0); | ||
psa_set_key_lifetime(&privkey_attr, lifetime); | ||
|
||
psa_status_t status = PSA_ERROR_DOES_NOT_EXIST; | ||
|
||
status = psa_generate_key(&privkey_attr, &privkey_id); | ||
if (status != PSA_SUCCESS) { | ||
return status; | ||
} | ||
|
||
status = psa_export_public_key(privkey_id, public_key, sizeof(public_key), &pubkey_length); | ||
if (status != PSA_SUCCESS) { | ||
return status; | ||
} | ||
|
||
status = psa_hash_compute(ECC_ALG_HASH, msg, sizeof(msg), hash, sizeof(hash), &hash_length); | ||
if (status != PSA_SUCCESS) { | ||
return status; | ||
} | ||
|
||
/* Currently there is no support for message signature and verification on secure elements */ | ||
psa_set_key_lifetime(&pubkey_attr, lifetime); | ||
psa_set_key_usage_flags(&pubkey_attr, PSA_KEY_USAGE_VERIFY_HASH); | ||
psa_set_key_algorithm(&pubkey_attr, ECC_ALG); | ||
psa_set_key_bits(&pubkey_attr, PSA_BYTES_TO_BITS(pubkey_length)); | ||
psa_set_key_type(&pubkey_attr, PSA_KEY_TYPE_ECC_PUBLIC_KEY(PSA_ECC_FAMILY_SECP_R1)); | ||
|
||
status = psa_import_key(&pubkey_attr, public_key, pubkey_length, &pubkey_id); | ||
if (status != PSA_SUCCESS) { | ||
return status; | ||
} | ||
|
||
status = psa_sign_hash(privkey_id, ECC_ALG, hash, sizeof(hash), signature, sizeof(signature), | ||
&sig_length); | ||
if (status != PSA_SUCCESS) { | ||
return status; | ||
} | ||
|
||
/* Currently there is only support for hash signature and verification on secure elements, | ||
so we can't verify the message, but only the hash */ | ||
return psa_verify_hash(pubkey_id, ECC_ALG, hash, sizeof(hash), signature, sig_length); | ||
} |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
/* | ||
* Copyright (C) 2022 HAW Hamburg | ||
* | ||
* This file is subject to the terms and conditions of the GNU Lesser | ||
* General Public License v2.1. See the file LICENSE in the top level | ||
* directory for more details. | ||
*/ | ||
|
||
/** | ||
* @ingroup examples | ||
* @{ | ||
* | ||
* @brief Example application for PSA Crypto | ||
* | ||
* @author Lena Boeckmann <[email protected]> | ||
* | ||
* @} | ||
*/ | ||
|
||
#include <stdio.h> | ||
#include "psa/crypto.h" | ||
#include "ztimer.h" | ||
|
||
extern psa_status_t example_ecdsa_p256(void); | ||
|
||
int main(void) | ||
{ | ||
bool failed = false; | ||
psa_status_t status; | ||
|
||
psa_crypto_init(); | ||
|
||
ztimer_acquire(ZTIMER_USEC); | ||
ztimer_now_t start = ztimer_now(ZTIMER_USEC); | ||
|
||
/* Needed in case only hashes are tested */ | ||
(void)status; | ||
(void)start; | ||
|
||
start = ztimer_now(ZTIMER_USEC); | ||
status = example_ecdsa_p256(); | ||
printf("ECDSA took %d us\n", (int)(ztimer_now(ZTIMER_USEC) - start)); | ||
if (status != PSA_SUCCESS) { | ||
failed = true; | ||
printf("ECDSA failed: %s\n", psa_status_to_humanly_readable(status)); | ||
} | ||
|
||
ztimer_release(ZTIMER_USEC); | ||
|
||
if (failed) { | ||
puts("Tests failed..."); | ||
} | ||
else { | ||
puts("All Done"); | ||
} | ||
return 0; | ||
} |