
Having a list of every ciphersuite suggests that it should be maintained with any new ciphersuites that are added in the future. This in turn almost defeats the purpose of having translation functions to begin with Instead, the unit test now only test a much smaller subset of ciphersuite names that exercise each stage in the OpenSSL and GnuTLS translate functions. In the future, if a new cipersuite is added that requires an extra stage in translation, then that cipher can be added to the test suite, otherwise it should not be necessary. Signed-off-by: Joe Subbiani <joe.subbiani@arm.com>
150 lines
4.8 KiB
Python
Executable file
150 lines
4.8 KiB
Python
Executable file
#!/usr/bin/env python3
|
|
|
|
# translate_ciphers.py
|
|
#
|
|
# Copyright The Mbed TLS Contributors
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
"""
|
|
Translate ciphersuite names in Mbed TLS format to OpenSSL and GNUTLS
|
|
standards.
|
|
|
|
To test the translation functions run:
|
|
python3 -m unittest translate_cipher.py
|
|
"""
|
|
|
|
import re
|
|
import argparse
|
|
import unittest
|
|
|
|
class TestTranslateCiphers(unittest.TestCase):
|
|
"""
|
|
Ensure translate_ciphers.py translates and formats ciphersuite names
|
|
correctly
|
|
"""
|
|
def test_translate_all_cipher_names(self):
|
|
"""
|
|
Translate MbedTLS ciphersuite names to their OpenSSL and
|
|
GnuTLS counterpart. Use only a small subset of ciphers
|
|
that exercise each step of the translate functions
|
|
"""
|
|
ciphers = [
|
|
("TLS-ECDHE-ECDSA-WITH-NULL-SHA",
|
|
"+ECDHE-ECDSA:+NULL:+SHA1",
|
|
"ECDHE-ECDSA-NULL-SHA"),
|
|
("TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256",
|
|
"+ECDHE-ECDSA:+AES-128-GCM:+AEAD",
|
|
"ECDHE-ECDSA-AES128-GCM-SHA256"),
|
|
("TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA",
|
|
"+DHE-RSA:+3DES-CBC:+SHA1",
|
|
"EDH-RSA-DES-CBC3-SHA"),
|
|
("TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
|
|
None,
|
|
"ECDHE-ECDSA-CHACHA20-POLY1305"),
|
|
("TLS-ECDHE-ECDSA-WITH-AES-128-CCM",
|
|
"+ECDHE-ECDSA:+AES-128-CCM:+AEAD",
|
|
None),
|
|
]
|
|
|
|
for m, g_exp, o_exp in ciphers:
|
|
|
|
if g_exp is not None:
|
|
g = translate_gnutls(m)
|
|
self.assertEqual(g, g_exp)
|
|
|
|
if o_exp is not None:
|
|
o = translate_ossl(m)
|
|
self.assertEqual(o, o_exp)
|
|
|
|
def translate_gnutls(m_cipher):
|
|
"""
|
|
Translate m_cipher from Mbed TLS ciphersuite naming convention
|
|
and return the GnuTLS naming convention
|
|
"""
|
|
|
|
m_cipher = re.sub(r'\ATLS-', '+', m_cipher)
|
|
m_cipher = m_cipher.replace("-WITH-", ":+")
|
|
m_cipher = m_cipher.replace("-EDE", "")
|
|
|
|
# SHA in Mbed TLS == SHA1 GnuTLS,
|
|
# if the last 3 chars are SHA append 1
|
|
if m_cipher[-3:] == "SHA":
|
|
m_cipher = m_cipher+"1"
|
|
|
|
# CCM or CCM-8 should be followed by ":+AEAD"
|
|
# Replace "GCM:+SHAxyz" with "GCM:+AEAD"
|
|
if "CCM" in m_cipher or "GCM" in m_cipher:
|
|
m_cipher = re.sub(r"GCM-SHA\d\d\d", "GCM", m_cipher)
|
|
m_cipher = m_cipher+":+AEAD"
|
|
|
|
# Replace the last "-" with ":+"
|
|
else:
|
|
index = m_cipher.rindex("-")
|
|
m_cipher = m_cipher[:index] + ":+" + m_cipher[index+1:]
|
|
|
|
return m_cipher
|
|
|
|
def translate_ossl(m_cipher):
|
|
"""
|
|
Translate m_cipher from Mbed TLS ciphersuite naming convention
|
|
and return the OpenSSL naming convention
|
|
"""
|
|
|
|
m_cipher = re.sub(r'^TLS-', '', m_cipher)
|
|
m_cipher = m_cipher.replace("-WITH", "")
|
|
|
|
# Remove the "-" from "ABC-xyz"
|
|
m_cipher = m_cipher.replace("AES-", "AES")
|
|
m_cipher = m_cipher.replace("CAMELLIA-", "CAMELLIA")
|
|
m_cipher = m_cipher.replace("ARIA-", "ARIA")
|
|
|
|
# Remove "RSA" if it is at the beginning
|
|
m_cipher = re.sub(r'^RSA-', r'', m_cipher)
|
|
|
|
# For all circumstances outside of PSK
|
|
if "PSK" not in m_cipher:
|
|
m_cipher = m_cipher.replace("-EDE", "")
|
|
m_cipher = m_cipher.replace("3DES-CBC", "DES-CBC3")
|
|
|
|
# Remove "CBC" if it is not prefixed by DES
|
|
m_cipher = re.sub(r'(?<!DES-)CBC-', r'', m_cipher)
|
|
|
|
# ECDHE-RSA-ARIA does not exist in OpenSSL
|
|
m_cipher = m_cipher.replace("ECDHE-RSA-ARIA", "ECDHE-ARIA")
|
|
|
|
# POLY1305 should not be followed by anything
|
|
if "POLY1305" in m_cipher:
|
|
index = m_cipher.rindex("POLY1305")
|
|
m_cipher = m_cipher[:index+8]
|
|
|
|
# If DES is being used, Replace DHE with EDH
|
|
if "DES" in m_cipher and "DHE" in m_cipher and "ECDHE" not in m_cipher:
|
|
m_cipher = m_cipher.replace("DHE", "EDH")
|
|
|
|
return m_cipher
|
|
|
|
def format_ciphersuite_names(mode, names):
|
|
t = {"g": translate_gnutls, "o": translate_ossl}[mode]
|
|
return " ".join(t(c) for c in names)
|
|
|
|
def main(target, names):
|
|
print(format_ciphersuite_names(target, names))
|
|
|
|
if __name__ == "__main__":
|
|
PARSER = argparse.ArgumentParser()
|
|
PARSER.add_argument('target', metavar='TARGET', choices=['o', 'g'])
|
|
PARSER.add_argument('names', metavar='NAMES', nargs='+')
|
|
ARGS = PARSER.parse_args()
|
|
main(ARGS.target, ARGS.names)
|