edhoc 1.0.1 → 1.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/binding.gyp +64 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +34 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +97 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +37 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +34 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +35 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +38 -0
- package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +170 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +74 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +74 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +62 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +62 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +141 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +141 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +61 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +61 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +112 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +112 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +59 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +93 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +93 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +193 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +194 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +189 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +189 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +88 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +88 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +63 -0
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +63 -0
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +126 -0
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +49 -0
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +323 -0
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +84 -0
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +171 -0
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +53 -0
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +330 -0
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +98 -0
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +226 -0
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +81 -0
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +230 -0
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +54 -0
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +46 -0
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +110 -0
- package/external/libedhoc/externals/compact25519/src/compact_wipe.c +12 -0
- package/external/libedhoc/externals/compact25519/src/compact_wipe.h +14 -0
- package/external/libedhoc/externals/compact25519/src/compact_x25519.c +68 -0
- package/external/libedhoc/externals/compact25519/src/compact_x25519.h +101 -0
- package/external/libedhoc/externals/compact25519/test/pcg_random.h +25 -0
- package/external/libedhoc/externals/compact25519/test/run-all.c +178 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +21 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +234 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +124 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +280 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +29 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +204 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +16 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +46 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +34 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +57 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +102 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +61 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +5 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +21 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +36 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +31 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +190 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +760 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +50 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +102 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +413 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +100 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +805 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +186 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +1514 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +135 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +312 -0
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +219 -0
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +92 -0
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +83 -0
- package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +73 -0
- package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +106 -0
- package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +77 -0
- package/external/libedhoc/externals/mbedtls/configs/config-thread.h +76 -0
- package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +25 -0
- package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +136 -0
- package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +609 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +54 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +30 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +19 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +27 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +37 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +32 -0
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +31 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +627 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +341 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +641 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +389 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +82 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +1084 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +146 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +303 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +518 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +202 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +342 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +1206 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +1183 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +246 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +46 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +183 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +877 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +334 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +142 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +76 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +25 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +55 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +36 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +564 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +308 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +385 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +972 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +441 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +671 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +298 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +1362 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +273 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +201 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +370 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +124 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +434 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +440 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +4116 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +640 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +190 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +142 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +299 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +166 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +722 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +160 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +1091 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +186 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +197 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +241 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +485 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +79 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +201 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +168 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +20 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +104 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +136 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +1143 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +219 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +198 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +172 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +208 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +5369 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +187 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +616 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +106 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +181 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +105 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +94 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +78 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +550 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +184 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +1196 -0
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +319 -0
- package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +20 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +4685 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +21 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +91 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +45 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +210 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +118 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +114 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +153 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +153 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +44 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +151 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +52 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +105 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +2064 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +88 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +92 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +1383 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +1282 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +460 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +453 -0
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +2756 -0
- package/external/libedhoc/externals/mbedtls/library/aes.c +2315 -0
- package/external/libedhoc/externals/mbedtls/library/aesce.c +503 -0
- package/external/libedhoc/externals/mbedtls/library/aesce.h +121 -0
- package/external/libedhoc/externals/mbedtls/library/aesni.c +802 -0
- package/external/libedhoc/externals/mbedtls/library/aesni.h +158 -0
- package/external/libedhoc/externals/mbedtls/library/alignment.h +509 -0
- package/external/libedhoc/externals/mbedtls/library/aria.c +991 -0
- package/external/libedhoc/externals/mbedtls/library/asn1parse.c +467 -0
- package/external/libedhoc/externals/mbedtls/library/asn1write.c +436 -0
- package/external/libedhoc/externals/mbedtls/library/base64.c +299 -0
- package/external/libedhoc/externals/mbedtls/library/base64_internal.h +45 -0
- package/external/libedhoc/externals/mbedtls/library/bignum.c +2806 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_core.c +894 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_core.h +763 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +394 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +452 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +276 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +416 -0
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +34 -0
- package/external/libedhoc/externals/mbedtls/library/bn_mul.h +1094 -0
- package/external/libedhoc/externals/mbedtls/library/camellia.c +1044 -0
- package/external/libedhoc/externals/mbedtls/library/ccm.c +712 -0
- package/external/libedhoc/externals/mbedtls/library/chacha20.c +497 -0
- package/external/libedhoc/externals/mbedtls/library/chachapoly.c +478 -0
- package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +141 -0
- package/external/libedhoc/externals/mbedtls/library/cipher.c +1664 -0
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +2422 -0
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +132 -0
- package/external/libedhoc/externals/mbedtls/library/cmac.c +1067 -0
- package/external/libedhoc/externals/mbedtls/library/common.h +325 -0
- package/external/libedhoc/externals/mbedtls/library/constant_time.c +261 -0
- package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +554 -0
- package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +579 -0
- package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +881 -0
- package/external/libedhoc/externals/mbedtls/library/debug.c +465 -0
- package/external/libedhoc/externals/mbedtls/library/des.c +1042 -0
- package/external/libedhoc/externals/mbedtls/library/dhm.c +712 -0
- package/external/libedhoc/externals/mbedtls/library/ecdh.c +685 -0
- package/external/libedhoc/externals/mbedtls/library/ecdsa.c +867 -0
- package/external/libedhoc/externals/mbedtls/library/ecjpake.c +1216 -0
- package/external/libedhoc/externals/mbedtls/library/ecp.c +3631 -0
- package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +5467 -0
- package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +6043 -0
- package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +287 -0
- package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +325 -0
- package/external/libedhoc/externals/mbedtls/library/entropy.c +676 -0
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +229 -0
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +64 -0
- package/external/libedhoc/externals/mbedtls/library/error.c +878 -0
- package/external/libedhoc/externals/mbedtls/library/gcm.c +1168 -0
- package/external/libedhoc/externals/mbedtls/library/hkdf.c +161 -0
- package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +633 -0
- package/external/libedhoc/externals/mbedtls/library/lmots.c +821 -0
- package/external/libedhoc/externals/mbedtls/library/lmots.h +311 -0
- package/external/libedhoc/externals/mbedtls/library/lms.c +779 -0
- package/external/libedhoc/externals/mbedtls/library/md.c +1108 -0
- package/external/libedhoc/externals/mbedtls/library/md5.c +426 -0
- package/external/libedhoc/externals/mbedtls/library/md_psa.h +63 -0
- package/external/libedhoc/externals/mbedtls/library/md_wrap.h +46 -0
- package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +745 -0
- package/external/libedhoc/externals/mbedtls/library/mps_common.h +181 -0
- package/external/libedhoc/externals/mbedtls/library/mps_error.h +89 -0
- package/external/libedhoc/externals/mbedtls/library/mps_reader.c +538 -0
- package/external/libedhoc/externals/mbedtls/library/mps_reader.h +366 -0
- package/external/libedhoc/externals/mbedtls/library/mps_trace.c +112 -0
- package/external/libedhoc/externals/mbedtls/library/mps_trace.h +154 -0
- package/external/libedhoc/externals/mbedtls/library/net_sockets.c +696 -0
- package/external/libedhoc/externals/mbedtls/library/nist_kw.c +725 -0
- package/external/libedhoc/externals/mbedtls/library/oid.c +1154 -0
- package/external/libedhoc/externals/mbedtls/library/padlock.c +155 -0
- package/external/libedhoc/externals/mbedtls/library/padlock.h +111 -0
- package/external/libedhoc/externals/mbedtls/library/pem.c +520 -0
- package/external/libedhoc/externals/mbedtls/library/pk.c +970 -0
- package/external/libedhoc/externals/mbedtls/library/pk_internal.h +118 -0
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +1834 -0
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +156 -0
- package/external/libedhoc/externals/mbedtls/library/pkcs12.c +447 -0
- package/external/libedhoc/externals/mbedtls/library/pkcs5.c +496 -0
- package/external/libedhoc/externals/mbedtls/library/pkcs7.c +773 -0
- package/external/libedhoc/externals/mbedtls/library/pkparse.c +1845 -0
- package/external/libedhoc/externals/mbedtls/library/pkwrite.c +836 -0
- package/external/libedhoc/externals/mbedtls/library/pkwrite.h +112 -0
- package/external/libedhoc/externals/mbedtls/library/platform.c +402 -0
- package/external/libedhoc/externals/mbedtls/library/platform_util.c +285 -0
- package/external/libedhoc/externals/mbedtls/library/poly1305.c +492 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +8432 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +653 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +499 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +590 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +293 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +67 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +838 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +52 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +2871 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +256 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +31 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +561 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +267 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +295 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +132 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +470 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +211 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +70 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +131 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +496 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +264 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +571 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +159 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +192 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +727 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +317 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +373 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +185 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +559 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +213 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +481 -0
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +384 -0
- package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +259 -0
- package/external/libedhoc/externals/mbedtls/library/psa_util.c +160 -0
- package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +96 -0
- package/external/libedhoc/externals/mbedtls/library/ripemd160.c +490 -0
- package/external/libedhoc/externals/mbedtls/library/rsa.c +2640 -0
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +447 -0
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +208 -0
- package/external/libedhoc/externals/mbedtls/library/sha1.c +480 -0
- package/external/libedhoc/externals/mbedtls/library/sha256.c +946 -0
- package/external/libedhoc/externals/mbedtls/library/sha3.c +626 -0
- package/external/libedhoc/externals/mbedtls/library/sha512.c +1111 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +410 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +2050 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_client.c +1017 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_client.h +22 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +380 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +78 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +234 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +2847 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +6155 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +540 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +9577 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +3607 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +4403 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +3046 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +1740 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +23 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +1897 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +651 -0
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +3146 -0
- package/external/libedhoc/externals/mbedtls/library/threading.c +181 -0
- package/external/libedhoc/externals/mbedtls/library/timing.c +154 -0
- package/external/libedhoc/externals/mbedtls/library/version.c +32 -0
- package/external/libedhoc/externals/mbedtls/library/version_features.c +826 -0
- package/external/libedhoc/externals/mbedtls/library/x509.c +1776 -0
- package/external/libedhoc/externals/mbedtls/library/x509_create.c +557 -0
- package/external/libedhoc/externals/mbedtls/library/x509_crl.c +712 -0
- package/external/libedhoc/externals/mbedtls/library/x509_crt.c +3292 -0
- package/external/libedhoc/externals/mbedtls/library/x509_csr.c +574 -0
- package/external/libedhoc/externals/mbedtls/library/x509write.c +174 -0
- package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +681 -0
- package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +331 -0
- package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +573 -0
- package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +259 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +105 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +25 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +195 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +138 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +183 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +20 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +106 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +86 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +218 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +41 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +41 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +41 -0
- package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +69 -0
- package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +209 -0
- package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +45 -0
- package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +136 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +274 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +161 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +296 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +189 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +217 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +419 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +316 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +435 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +84 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +153 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +154 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +155 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +128 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +172 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +149 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +141 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +155 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +161 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +131 -0
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +136 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +281 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +321 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +159 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +691 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +310 -0
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +474 -0
- package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +75 -0
- package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +107 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +342 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +408 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +274 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +288 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +3118 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +1009 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +381 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +804 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +489 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +362 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +4268 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +375 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +601 -0
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +306 -0
- package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +1284 -0
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +27 -0
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +28 -0
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +28 -0
- package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +92 -0
- package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +66 -0
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +5137 -0
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +34 -0
- package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +29 -0
- package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +583 -0
- package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +967 -0
- package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +72 -0
- package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +265 -0
- package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +61 -0
- package/external/libedhoc/externals/mbedtls/programs/wince_main.c +31 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +456 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +509 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +1012 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +132 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +165 -0
- package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +132 -0
- package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +31 -0
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +89 -0
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +22 -0
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +17 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +23 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +18 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +15 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +22 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +15 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +22 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +15 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +16 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +14 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +19 -0
- package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +7 -0
- package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +6 -0
- package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +131 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +26 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +38 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +106 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +234 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +71 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +121 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +67 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +130 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +44 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +430 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +64 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +62 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +123 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +125 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +75 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +112 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +32 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +40 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +268 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +250 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +398 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +223 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +24 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +91 -0
- package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +628 -0
- package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +62 -0
- package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +145 -0
- package/external/libedhoc/externals/mbedtls/tests/src/certs.c +480 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +199 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +78 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +462 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +151 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +424 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +147 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +783 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +422 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +202 -0
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +405 -0
- package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +45 -0
- package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +353 -0
- package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +196 -0
- package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +989 -0
- package/external/libedhoc/externals/mbedtls/tests/src/random.c +136 -0
- package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +1226 -0
- package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +2292 -0
- package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +210 -0
- package/external/libedhoc/externals/zcbor/include/zcbor_common.h +422 -0
- package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +69 -0
- package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +358 -0
- package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +296 -0
- package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +94 -0
- package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +41 -0
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +39 -0
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +39 -0
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +47 -0
- package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +128 -0
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +69 -0
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +70 -0
- package/external/libedhoc/externals/zcbor/src/zcbor_common.c +257 -0
- package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +1107 -0
- package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +722 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +368 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +189 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +529 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +2010 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +134 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +863 -0
- package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +364 -0
- package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +453 -0
- package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +123 -0
- package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +1527 -0
- package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +66 -0
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +136 -0
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +12 -0
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +60 -0
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +5 -0
- package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +1044 -0
- package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +202 -0
- package/external/libedhoc/include/edhoc.h +393 -0
- package/external/libedhoc/include/edhoc_context.h +318 -0
- package/external/libedhoc/include/edhoc_credentials.h +217 -0
- package/external/libedhoc/include/edhoc_crypto.h +331 -0
- package/external/libedhoc/include/edhoc_ead.h +99 -0
- package/external/libedhoc/include/edhoc_macros.h +51 -0
- package/external/libedhoc/include/edhoc_values.h +181 -0
- package/external/libedhoc/library/edhoc.c +219 -0
- package/external/libedhoc/library/edhoc_exporter.c +543 -0
- package/external/libedhoc/library/edhoc_message_1.c +439 -0
- package/external/libedhoc/library/edhoc_message_2.c +2994 -0
- package/external/libedhoc/library/edhoc_message_3.c +2658 -0
- package/external/libedhoc/library/edhoc_message_4.c +826 -0
- package/external/libedhoc/library/edhoc_message_error.c +238 -0
- package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +37 -0
- package/external/libedhoc/tests/include/cipher_suites/cipher_suite_0.h +134 -0
- package/external/libedhoc/tests/include/cipher_suites/cipher_suite_2.h +140 -0
- package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +48 -0
- package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +48 -0
- package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +60 -0
- package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +208 -0
- package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +59 -0
- package/external/libedhoc/tests/include/edhoc_trace_1/test_vector_1.h +738 -0
- package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +60 -0
- package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +199 -0
- package/external/libedhoc/tests/include/edhoc_trace_2/test_vector_2.h +525 -0
- package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +48 -0
- package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +92 -0
- package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +96 -0
- package/external/libedhoc/tests/include/x509_chain_cs_0/test_vector_x5chain_cs_0.h +140 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +58 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +56 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +57 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2/test_vector_x5chain_cs_2.h +169 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +59 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +57 -0
- package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h +163 -0
- package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +60 -0
- package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +57 -0
- package/external/libedhoc/tests/include/x509_hash_cs_2/test_vector_x5t_cs_2.h +181 -0
- package/external/libedhoc/tests/src/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c +544 -0
- package/external/libedhoc/tests/src/cipher_suites/cipher_suite_0.c +447 -0
- package/external/libedhoc/tests/src/cipher_suites/cipher_suite_2.c +600 -0
- package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +475 -0
- package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +473 -0
- package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +252 -0
- package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +1829 -0
- package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +1247 -0
- package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +170 -0
- package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +1783 -0
- package/external/libedhoc/tests/src/error_message/test_edhoc_error_message.c +226 -0
- package/external/libedhoc/tests/src/tests.c +228 -0
- package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +332 -0
- package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +936 -0
- package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +166 -0
- package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +587 -0
- package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +917 -0
- package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +186 -0
- package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +743 -0
- package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +261 -0
- package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +854 -0
- package/include/EdhocComposeAsyncWorker.h +61 -0
- package/include/EdhocCredentialManager.h +100 -0
- package/include/EdhocCryptoManager.h +504 -0
- package/include/EdhocEadManager.h +151 -0
- package/include/EdhocExportAsyncWorker.h +71 -0
- package/include/EdhocProcessAsyncWorker.h +76 -0
- package/include/LibEDHOC.h +304 -0
- package/include/Suites.h +27 -0
- package/include/UserContext.h +79 -0
- package/include/Utils.h +110 -0
- package/package.json +1 -1
- package/prebuilds/win32-ia32/edhoc.node +0 -0
- package/prebuilds/win32-x64/edhoc.node +0 -0
- package/src/EdhocComposeAsyncWorker.cpp +88 -0
- package/src/EdhocCredentialManager.cpp +360 -0
- package/src/EdhocCryptoManager.cpp +967 -0
- package/src/EdhocEadManager.cpp +156 -0
- package/src/EdhocExportAsyncWorker.cpp +82 -0
- package/src/EdhocProcessAsyncWorker.cpp +74 -0
- package/src/LibEDHOC.cpp +369 -0
- package/src/Suites.cpp +153 -0
- package/src/Utils.cpp +115 -0
|
@@ -0,0 +1,2658 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* \file edhoc_message_3.c
|
|
3
|
+
* \author Kamil Kielbasa
|
|
4
|
+
* \brief EDHOC message 3.
|
|
5
|
+
* \version 0.4
|
|
6
|
+
* \date 2024-01-01
|
|
7
|
+
*
|
|
8
|
+
* \copyright Copyright (c) 2024
|
|
9
|
+
*
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
/* Include files ----------------------------------------------------------- */
|
|
13
|
+
|
|
14
|
+
/* EDHOC header: */
|
|
15
|
+
#define EDHOC_ALLOW_PRIVATE_ACCESS
|
|
16
|
+
#include "edhoc.h"
|
|
17
|
+
|
|
18
|
+
/* Standard library headers: */
|
|
19
|
+
#include <stdint.h>
|
|
20
|
+
#include <stddef.h>
|
|
21
|
+
#include <string.h>
|
|
22
|
+
#include <stdbool.h>
|
|
23
|
+
|
|
24
|
+
#ifdef __clang__
|
|
25
|
+
#pragma clang diagnostic push
|
|
26
|
+
#pragma clang diagnostic ignored "-Wshadow"
|
|
27
|
+
#pragma clang diagnostic ignored "-Wreserved-identifier"
|
|
28
|
+
#pragma clang diagnostic ignored "-Wpadded"
|
|
29
|
+
#pragma clang diagnostic ignored "-Wdocumentation"
|
|
30
|
+
#endif
|
|
31
|
+
|
|
32
|
+
/* CBOR headers: */
|
|
33
|
+
#include <zcbor_common.h>
|
|
34
|
+
#include <backend_cbor_message_3_encode.h>
|
|
35
|
+
#include <backend_cbor_message_3_decode.h>
|
|
36
|
+
#include <backend_cbor_bstr_type_encode.h>
|
|
37
|
+
#include <backend_cbor_bstr_type_decode.h>
|
|
38
|
+
#include <backend_cbor_int_type_encode.h>
|
|
39
|
+
#include <backend_cbor_int_type_decode.h>
|
|
40
|
+
#include <backend_cbor_id_cred_x_encode.h>
|
|
41
|
+
#include <backend_cbor_id_cred_x_decode.h>
|
|
42
|
+
#include <backend_cbor_sig_structure_encode.h>
|
|
43
|
+
#include <backend_cbor_info_encode.h>
|
|
44
|
+
#include <backend_cbor_plaintext_3_decode.h>
|
|
45
|
+
#include <backend_cbor_enc_structure_encode.h>
|
|
46
|
+
#include <backend_cbor_enc_structure_decode.h>
|
|
47
|
+
#include <backend_cbor_ead_encode.h>
|
|
48
|
+
|
|
49
|
+
#ifdef __clang__
|
|
50
|
+
#pragma clang diagnostic pop
|
|
51
|
+
#endif
|
|
52
|
+
|
|
53
|
+
/* Module defines ---------------------------------------------------------- */
|
|
54
|
+
/* Module types and type definitiones -------------------------------------- */
|
|
55
|
+
|
|
56
|
+
/**
|
|
57
|
+
* \brief Helper structure for CBOR encoded elements for context_3.
|
|
58
|
+
*/
|
|
59
|
+
struct cbor_items {
|
|
60
|
+
bool id_cred_i_is_cob; // cob = cbor one byte
|
|
61
|
+
int32_t id_cred_i_cob_val; // cob = cbor one byte
|
|
62
|
+
uint8_t *id_cred_i;
|
|
63
|
+
size_t id_cred_i_len;
|
|
64
|
+
|
|
65
|
+
bool id_cred_i_is_comp_enc; // cob = cbor one byte
|
|
66
|
+
enum edhoc_encode_type id_cred_i_enc_type;
|
|
67
|
+
int32_t id_cred_i_int;
|
|
68
|
+
uint8_t id_cred_i_bstr[EDHOC_CRED_KEY_ID_LEN + 1];
|
|
69
|
+
size_t id_cred_i_bstr_len;
|
|
70
|
+
|
|
71
|
+
uint8_t *th_3;
|
|
72
|
+
size_t th_3_len;
|
|
73
|
+
|
|
74
|
+
uint8_t *cred_i;
|
|
75
|
+
size_t cred_i_len;
|
|
76
|
+
|
|
77
|
+
bool is_ead_3;
|
|
78
|
+
uint8_t *ead_3;
|
|
79
|
+
size_t ead_3_len;
|
|
80
|
+
|
|
81
|
+
size_t buf_len;
|
|
82
|
+
uint8_t buf[];
|
|
83
|
+
};
|
|
84
|
+
|
|
85
|
+
/**
|
|
86
|
+
* \brief Helper structure for parsed PLAINTEXT_3.
|
|
87
|
+
*/
|
|
88
|
+
struct plaintext {
|
|
89
|
+
struct edhoc_auth_creds auth_creds;
|
|
90
|
+
|
|
91
|
+
const uint8_t *sign_or_mac;
|
|
92
|
+
size_t sign_or_mac_len;
|
|
93
|
+
|
|
94
|
+
const uint8_t *ead;
|
|
95
|
+
size_t ead_len;
|
|
96
|
+
};
|
|
97
|
+
|
|
98
|
+
/**
|
|
99
|
+
* \brief Processing side.
|
|
100
|
+
*/
|
|
101
|
+
enum edhoc_role {
|
|
102
|
+
initiator,
|
|
103
|
+
responder,
|
|
104
|
+
};
|
|
105
|
+
|
|
106
|
+
/* Module interface variables and constants -------------------------------- */
|
|
107
|
+
/* Static variables and constants ------------------------------------------ */
|
|
108
|
+
/* Static function declarations -------------------------------------------- */
|
|
109
|
+
|
|
110
|
+
/**
|
|
111
|
+
* \brief CBOR integer memory requirements.
|
|
112
|
+
*
|
|
113
|
+
* \param val Raw integer value.
|
|
114
|
+
*
|
|
115
|
+
* \return Number of bytes.
|
|
116
|
+
*/
|
|
117
|
+
static inline size_t cbor_int_mem_req(int32_t val);
|
|
118
|
+
|
|
119
|
+
/**
|
|
120
|
+
* \brief CBOR text stream overhead.
|
|
121
|
+
*
|
|
122
|
+
* \param len Length of buffer to CBOR as tstr.
|
|
123
|
+
*
|
|
124
|
+
* \return Number of bytes.
|
|
125
|
+
*/
|
|
126
|
+
static inline size_t cbor_tstr_overhead(size_t len);
|
|
127
|
+
|
|
128
|
+
/**
|
|
129
|
+
* \brief CBOR byte stream overhead.
|
|
130
|
+
*
|
|
131
|
+
* \param len Length of buffer to CBOR as bstr.
|
|
132
|
+
*
|
|
133
|
+
* \return Number of bytes.
|
|
134
|
+
*/
|
|
135
|
+
static inline size_t cbor_bstr_overhead(size_t len);
|
|
136
|
+
|
|
137
|
+
/**
|
|
138
|
+
* \brief CBOR map overhead.
|
|
139
|
+
*
|
|
140
|
+
* \param items Number of items for map.
|
|
141
|
+
*
|
|
142
|
+
* \return Number of bytes.
|
|
143
|
+
*/
|
|
144
|
+
static inline size_t cbor_map_overhead(size_t items);
|
|
145
|
+
|
|
146
|
+
/**
|
|
147
|
+
* \brief CBOR array overhead.
|
|
148
|
+
*
|
|
149
|
+
* \param items Number of items for array.
|
|
150
|
+
*
|
|
151
|
+
* \return Number of bytes.
|
|
152
|
+
*/
|
|
153
|
+
static inline size_t cbor_array_overhead(size_t items);
|
|
154
|
+
|
|
155
|
+
/**
|
|
156
|
+
* \brief Check if integer might be encoded as CBOR one byte.
|
|
157
|
+
*
|
|
158
|
+
* \param val Value for cbor encoding.
|
|
159
|
+
*
|
|
160
|
+
* \retval True if might be encoded as one byte cbor integer,
|
|
161
|
+
* otherwise false.
|
|
162
|
+
*/
|
|
163
|
+
static inline bool is_cbor_one_byte_int(int32_t val);
|
|
164
|
+
|
|
165
|
+
/**
|
|
166
|
+
* \brief Compute memory required for input (context_3) for for MAC_3.
|
|
167
|
+
*
|
|
168
|
+
* \param[in] ctx EDHOC context.
|
|
169
|
+
* \param[in] auth_creds Authentication credentials.
|
|
170
|
+
* \param[out] context_3_len On success, length of context_3.
|
|
171
|
+
*
|
|
172
|
+
* \retval EDHOC_SUCCESS on success, otherwise failure.
|
|
173
|
+
*/
|
|
174
|
+
static int comp_mac_3_input_len(const struct edhoc_context *ctx,
|
|
175
|
+
const struct edhoc_auth_creds *auth_creds,
|
|
176
|
+
size_t *context_3_len);
|
|
177
|
+
|
|
178
|
+
/**
|
|
179
|
+
* \brief Compute psuedo random key (PRK_4e3m).
|
|
180
|
+
*
|
|
181
|
+
* \param[in] role EDHOC role.
|
|
182
|
+
* \param[in,out] ctx EDHOC context.
|
|
183
|
+
* \param[in] auth_cred Authentication credentials.
|
|
184
|
+
* \param[in] pub_key Peer public static DH key.
|
|
185
|
+
* \param pub_key_len Size of the \p pub_key buffer in bytes.
|
|
186
|
+
*
|
|
187
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
188
|
+
*/
|
|
189
|
+
static int comp_prk_4e3m(enum edhoc_role role, struct edhoc_context *ctx,
|
|
190
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
191
|
+
const uint8_t *pub_key, size_t pub_key_len);
|
|
192
|
+
|
|
193
|
+
/**
|
|
194
|
+
* \brief Generate context_3.
|
|
195
|
+
*
|
|
196
|
+
* \param[in] ctx EDHOC context.
|
|
197
|
+
* \param[in] auth_creds Authentication credentials.
|
|
198
|
+
* \param[out] cbor_items Buffer where the generated context_3 is to be written.
|
|
199
|
+
*
|
|
200
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
201
|
+
*/
|
|
202
|
+
static int gen_mac_3_context(const struct edhoc_context *ctx,
|
|
203
|
+
const struct edhoc_auth_creds *auth_creds,
|
|
204
|
+
struct cbor_items *cbor_items);
|
|
205
|
+
|
|
206
|
+
/**
|
|
207
|
+
* \brief Compute memory required for MAC_3.
|
|
208
|
+
*
|
|
209
|
+
* \param role EDHOC role.
|
|
210
|
+
* \param[in] ctx EDHOC context.
|
|
211
|
+
* \param[out] mac_3_len On success, length of MAC_3.
|
|
212
|
+
*
|
|
213
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
214
|
+
*/
|
|
215
|
+
static int comp_mac_3_len(enum edhoc_role role, const struct edhoc_context *ctx,
|
|
216
|
+
size_t *mac_3_len);
|
|
217
|
+
|
|
218
|
+
/**
|
|
219
|
+
* \brief Compute MAC_3.
|
|
220
|
+
*
|
|
221
|
+
* \param[in] ctx EDHOC context.
|
|
222
|
+
* \param[in] cbor_items Buffer containing the context_3.
|
|
223
|
+
* \param[out] mac_3 Buffer where the generated MAC_3 is to be written.
|
|
224
|
+
* \param mac_3_len Size of the \p mac_3 buffer in bytes.
|
|
225
|
+
*
|
|
226
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
227
|
+
*/
|
|
228
|
+
static int comp_mac_3(const struct edhoc_context *ctx,
|
|
229
|
+
const struct cbor_items *cbor_items, uint8_t *mac_3,
|
|
230
|
+
size_t mac_3_len);
|
|
231
|
+
|
|
232
|
+
/**
|
|
233
|
+
* \brief Compute memory required Signature_or_MAC_3.
|
|
234
|
+
*
|
|
235
|
+
* \param role EDHOC role.
|
|
236
|
+
* \param[in] ctx EDHOC context.
|
|
237
|
+
* \param[out] sign_or_mac_3_len On success, length of Signature_or_MAC_3.
|
|
238
|
+
*
|
|
239
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
240
|
+
*/
|
|
241
|
+
static int comp_sign_or_mac_3_len(enum edhoc_role role,
|
|
242
|
+
const struct edhoc_context *ctx,
|
|
243
|
+
size_t *sign_or_mac_3_len);
|
|
244
|
+
|
|
245
|
+
/**
|
|
246
|
+
* \brief Compute Signature_or_MAC_3.
|
|
247
|
+
*
|
|
248
|
+
* \param[in] ctx EDHOC context.
|
|
249
|
+
* \param[in] auth_creds Authentication credentials.
|
|
250
|
+
* \param[in] cbor_items Buffer containing the context_3.
|
|
251
|
+
* \param[in] mac_3 Buffer containing the MAC_3.
|
|
252
|
+
* \param mac_3_len Size of the \p mac_3 buffer in bytes.
|
|
253
|
+
* \param[out] sign Buffer where the generated signature is to be written.
|
|
254
|
+
* \param sign_len Size of the \p sign buffer in bytes.
|
|
255
|
+
*
|
|
256
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
257
|
+
*/
|
|
258
|
+
static int comp_sign_or_mac_3(const struct edhoc_context *ctx,
|
|
259
|
+
const struct edhoc_auth_creds *auth_creds,
|
|
260
|
+
const struct cbor_items *cbor_items,
|
|
261
|
+
const uint8_t *mac_3, size_t mac_3_len,
|
|
262
|
+
uint8_t *sign, size_t sign_len);
|
|
263
|
+
|
|
264
|
+
/**
|
|
265
|
+
* \brief Compute memory required for PLAINTEXT_3.
|
|
266
|
+
*
|
|
267
|
+
* \param[in] ctx EDHOC context.
|
|
268
|
+
* \param[in] cbor_items Buffer containing the context_3.
|
|
269
|
+
* \param sign_len Size of the signature buffer in bytes.
|
|
270
|
+
* \param[out] plaintext_3_len On success, length of PLAINTEXT_3.
|
|
271
|
+
*
|
|
272
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
273
|
+
*/
|
|
274
|
+
static int comp_plaintext_3_len(const struct edhoc_context *ctx,
|
|
275
|
+
const struct cbor_items *cbor_items,
|
|
276
|
+
size_t sign_len, size_t *plaintext_3_len);
|
|
277
|
+
|
|
278
|
+
/**
|
|
279
|
+
* \brief Prepare PLAINTEXT_3.
|
|
280
|
+
*
|
|
281
|
+
* \param[in] cbor_items Buffer containing the context_2.
|
|
282
|
+
* \param[in] sign Buffer containing the signature.
|
|
283
|
+
* \param sign_len Size of the \p sign buffer in bytes.
|
|
284
|
+
* \param[out] ptxt Buffer where the generated plaintext is to be written.
|
|
285
|
+
* \param ptxt_size Size of the \p ptxt buffer in bytes.
|
|
286
|
+
* \param[out] ptxt_len On success, the number of bytes that make up the PLAINTEXT_2.
|
|
287
|
+
*
|
|
288
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
289
|
+
*/
|
|
290
|
+
static int prepare_plaintext_3(const struct cbor_items *cbor_items,
|
|
291
|
+
const uint8_t *sign, size_t sign_len,
|
|
292
|
+
uint8_t *ptxt, size_t ptxt_size,
|
|
293
|
+
size_t *ptxt_len);
|
|
294
|
+
|
|
295
|
+
/**
|
|
296
|
+
* \brief Compute required length in bytes for AAD_3.
|
|
297
|
+
*
|
|
298
|
+
* \param[in] ctx EDHOC context.
|
|
299
|
+
* \param[out] aad_3_len On success, length of AAD_3.
|
|
300
|
+
*
|
|
301
|
+
* \retval EDHOC_SUCCESS on success, otherwise failure.s
|
|
302
|
+
*/
|
|
303
|
+
static int32_t comp_aad_3_len(const struct edhoc_context *ctx,
|
|
304
|
+
size_t *aad_3_len);
|
|
305
|
+
|
|
306
|
+
/**
|
|
307
|
+
* \brief Compute K_3, IV_3 and AAD_3.
|
|
308
|
+
*
|
|
309
|
+
* \param[in] ctx EDHOC context.
|
|
310
|
+
* \param[out] key Buffer where the generated K_3 is to be written.
|
|
311
|
+
* \param key_len Size of the \p key buffer in bytes.
|
|
312
|
+
* \param[out] iv Buffer where the generated IV_3 is to be written.
|
|
313
|
+
* \param iv_len Size of the \p iv buffer in bytes.
|
|
314
|
+
* \param[out] aad Buffer where the generated AAD_3 is to be written.
|
|
315
|
+
* \param aad_len Size of the \p aad buffer in bytes.
|
|
316
|
+
*
|
|
317
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
318
|
+
*/
|
|
319
|
+
static int comp_key_iv_aad(const struct edhoc_context *ctx, uint8_t *key,
|
|
320
|
+
size_t key_len, uint8_t *iv, size_t iv_len,
|
|
321
|
+
uint8_t *aad, size_t aad_len);
|
|
322
|
+
|
|
323
|
+
/**
|
|
324
|
+
* \brief Compute CIPHERTEXT_3.
|
|
325
|
+
*
|
|
326
|
+
* \param[in] ctx EDHOC context.
|
|
327
|
+
* \param[in] key Buffer containing the K_3.
|
|
328
|
+
* \param key_len Size of the \p key buffer in bytes.
|
|
329
|
+
* \param[in] iv Buffer containing the IV_3.
|
|
330
|
+
* \param iv_len Size of the \p iv buffer in bytes.
|
|
331
|
+
* \param[in] aad Buffer containing the AAD_3.
|
|
332
|
+
* \param aad_len Size of the \p aad buffer in bytes.
|
|
333
|
+
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
334
|
+
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
335
|
+
* \param[out] ctxt Buffer where the generated ciphertext is to be written.
|
|
336
|
+
* \param ctxt_size Size of the \p ctxt buffer in bytes.
|
|
337
|
+
* \param[out] ctxt_len On success, the number of bytes that make up the CIPHERTEXT_3.
|
|
338
|
+
*
|
|
339
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
340
|
+
*/
|
|
341
|
+
static int comp_ciphertext(const struct edhoc_context *ctx, const uint8_t *key,
|
|
342
|
+
size_t key_len, const uint8_t *iv, size_t iv_len,
|
|
343
|
+
const uint8_t *aad, size_t aad_len,
|
|
344
|
+
const uint8_t *ptxt, size_t ptxt_len, uint8_t *ctxt,
|
|
345
|
+
size_t ctxt_size, size_t *ctxt_len);
|
|
346
|
+
|
|
347
|
+
/**
|
|
348
|
+
* \brief Compute transcript hash 4.
|
|
349
|
+
*
|
|
350
|
+
* \param[in,out] ctx EDHOC context.
|
|
351
|
+
* \param[in] cbor_items Structure containing the context_3.
|
|
352
|
+
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
353
|
+
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
354
|
+
*
|
|
355
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
356
|
+
*/
|
|
357
|
+
static int comp_th_4(struct edhoc_context *ctx,
|
|
358
|
+
const struct cbor_items *cbor_items, const uint8_t *ptxt,
|
|
359
|
+
size_t ptxt_len);
|
|
360
|
+
|
|
361
|
+
/**
|
|
362
|
+
* \brief Generate edhoc message 3.
|
|
363
|
+
*
|
|
364
|
+
* \param[in] ctxt Buffer continas the ciphertext.
|
|
365
|
+
* \param ctxt_len Size of the \p ctxt buffer in bytes.
|
|
366
|
+
* \param[out] msg_3 Buffer where the generated message 3 is to be written.
|
|
367
|
+
* \param msg_3_size Size of the \p msg_3 buffer in bytes.
|
|
368
|
+
* \param[out] msg_3_len On success, the number of bytes that make up the message 3.
|
|
369
|
+
*
|
|
370
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
371
|
+
*/
|
|
372
|
+
static int gen_msg_3(const uint8_t *ctxt, size_t ctxt_len, uint8_t *msg_3,
|
|
373
|
+
size_t msg_3_size, size_t *msg_3_len);
|
|
374
|
+
|
|
375
|
+
/**
|
|
376
|
+
* \brief CBOR decode message 3 and save address and length for CIPHERTEXT_3.
|
|
377
|
+
*
|
|
378
|
+
* \param[in] msg_3 Buffer containing the message 3.
|
|
379
|
+
* \param msg_3_len Size of the \p msg_3 buffer in bytes.
|
|
380
|
+
* \param[out] ctxt_3 Pointer to buffer containing the CIPHERTEXT_3.
|
|
381
|
+
* \param[out] ctxt_3_len Size of the \p ctxt_3 buffer in bytes.
|
|
382
|
+
*
|
|
383
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
384
|
+
*/
|
|
385
|
+
static int parse_msg_3(const uint8_t *msg_3, size_t msg_3_len,
|
|
386
|
+
const uint8_t **ctxt_3, size_t *ctxt_3_len);
|
|
387
|
+
|
|
388
|
+
/**
|
|
389
|
+
* \brief Decrypt CIPHERTEXT_3.
|
|
390
|
+
*
|
|
391
|
+
* \param[in] ctx EDHOC context.
|
|
392
|
+
* \param[in] key Buffer containing the K_3.
|
|
393
|
+
* \param key_len Size of the \p key buffer in bytes.
|
|
394
|
+
* \param[in] iv Buffer containing the IV_3.
|
|
395
|
+
* \param iv_len Size of the \p iv buffer in bytes.
|
|
396
|
+
* \param[in] aad Buffer containing the AAD_3.
|
|
397
|
+
* \param aad_len Size of the \p aad buffer in bytes.
|
|
398
|
+
* \param[in] ctxt Pointer to buffer containing the CIPHERTEXT_3.
|
|
399
|
+
* \param ctxt_len Size of the \p ctxt buffer in bytes.
|
|
400
|
+
* \param[out] ptxt Buffer where the decrypted PLAINTEXT_3 is to be written.
|
|
401
|
+
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
402
|
+
*
|
|
403
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
404
|
+
*/
|
|
405
|
+
static int decrypt_ciphertext(const struct edhoc_context *ctx,
|
|
406
|
+
const uint8_t *key, size_t key_len,
|
|
407
|
+
const uint8_t *iv, size_t iv_len,
|
|
408
|
+
const uint8_t *aad, size_t aad_len,
|
|
409
|
+
const uint8_t *ctxt, size_t ctxt_len,
|
|
410
|
+
uint8_t *ptxt, size_t ptxt_len);
|
|
411
|
+
|
|
412
|
+
/**
|
|
413
|
+
* \brief Parsed cborised PLAINTEXT_3 for separate buffers.
|
|
414
|
+
*
|
|
415
|
+
* \param[in] ctx EDHOC context.
|
|
416
|
+
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
417
|
+
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
418
|
+
* \param[out] parsed_ptxt Structure where parsed PLAINTEXT_3 is to be written.
|
|
419
|
+
*
|
|
420
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
421
|
+
*/
|
|
422
|
+
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
423
|
+
size_t ptxt_len, struct plaintext *parsed_ptxt);
|
|
424
|
+
|
|
425
|
+
/**
|
|
426
|
+
* \brief Verify Signature_or_MAC_3.
|
|
427
|
+
*
|
|
428
|
+
* \param[in] ctx EDHOC context.
|
|
429
|
+
* \param[in] cbor_items Structure containing the context_3.
|
|
430
|
+
* \param[in] parsed_ptxt Structure containing the parsed PLAINTEXT_3.
|
|
431
|
+
* \param[in] pub_key Buffer containing the public key from peer credentials.
|
|
432
|
+
* \param pub_key_len Size of the \p pub_key buffer in bytes.
|
|
433
|
+
* \param[in] mac_3 Buffer containing the MAC_3.
|
|
434
|
+
* \param mac_3_len Size of the \p mac_3 buffer in bytes.
|
|
435
|
+
*
|
|
436
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
437
|
+
*/
|
|
438
|
+
static int verify_sign_or_mac_3(const struct edhoc_context *ctx,
|
|
439
|
+
const struct cbor_items *cbor_items,
|
|
440
|
+
const struct plaintext *parsed_ptxt,
|
|
441
|
+
const uint8_t *pub_key, size_t pub_key_len,
|
|
442
|
+
const uint8_t *mac_3, size_t mac_3_len);
|
|
443
|
+
|
|
444
|
+
/**
|
|
445
|
+
* \brief Perform compact encoding described in:
|
|
446
|
+
* - RFC 9528: 3.5.3.2. Compact Encoding of ID_CRED Fields for 'kid'.
|
|
447
|
+
*
|
|
448
|
+
* \param[in] auth_cred Authentication credentials.
|
|
449
|
+
* \param[in,out] cbor_items Structure containing the context_2.
|
|
450
|
+
*
|
|
451
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
452
|
+
*/
|
|
453
|
+
static int kid_compact_encoding(const struct edhoc_auth_creds *auth_cred,
|
|
454
|
+
struct cbor_items *cbor_items);
|
|
455
|
+
|
|
456
|
+
/**
|
|
457
|
+
* \brief Compute SALT_4e3m.
|
|
458
|
+
*
|
|
459
|
+
* \param[in] ctx EDHOC context.
|
|
460
|
+
* \param[out] salt Buffer where the generated salt is to be written.
|
|
461
|
+
* \param salt_len Size of the \p salt buffer in bytes.
|
|
462
|
+
*
|
|
463
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
464
|
+
*/
|
|
465
|
+
static int comp_salt_4e3m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
466
|
+
size_t salt_len);
|
|
467
|
+
|
|
468
|
+
/**
|
|
469
|
+
* \brief Compute G_IY for PRK_4e3m.
|
|
470
|
+
*
|
|
471
|
+
* \param role EDHOC role.
|
|
472
|
+
* \param[in,out] ctx EDHOC context.
|
|
473
|
+
* \param[in] auth_cred Authentication credentials.
|
|
474
|
+
* \param[in] pub_key Peer public key.
|
|
475
|
+
* \param pub_key_len Peer public key length.
|
|
476
|
+
* \param[out] giy Buffer where the generated G_IY is to be written.
|
|
477
|
+
* \param giy_len Size of the \p giy buffer in bytes.
|
|
478
|
+
*
|
|
479
|
+
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
480
|
+
*/
|
|
481
|
+
static int comp_giy(enum edhoc_role role, struct edhoc_context *ctx,
|
|
482
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
483
|
+
const uint8_t *pub_key, size_t pub_key_len, uint8_t *giy,
|
|
484
|
+
size_t giy_len);
|
|
485
|
+
|
|
486
|
+
/* Static function definitions --------------------------------------------- */
|
|
487
|
+
|
|
488
|
+
static inline size_t cbor_int_mem_req(int32_t val)
|
|
489
|
+
{
|
|
490
|
+
if (val >= ONE_BYTE_CBOR_INT_MIN_VALUE &&
|
|
491
|
+
val <= ONE_BYTE_CBOR_INT_MAX_VALUE) {
|
|
492
|
+
return 1;
|
|
493
|
+
} else if (val >= -(UINT8_MAX + 1) && val <= UINT8_MAX) {
|
|
494
|
+
return 2;
|
|
495
|
+
} else if (val >= -(UINT16_MAX + 1) && val <= UINT16_MAX) {
|
|
496
|
+
return 3;
|
|
497
|
+
} else {
|
|
498
|
+
return 4;
|
|
499
|
+
}
|
|
500
|
+
}
|
|
501
|
+
|
|
502
|
+
static inline size_t cbor_tstr_overhead(size_t len)
|
|
503
|
+
{
|
|
504
|
+
if (len <= 23) {
|
|
505
|
+
return 1;
|
|
506
|
+
} else if (len <= UINT8_MAX) {
|
|
507
|
+
return 2;
|
|
508
|
+
} else if (len <= UINT16_MAX) {
|
|
509
|
+
return 3;
|
|
510
|
+
} else if (len <= UINT32_MAX) {
|
|
511
|
+
return 4;
|
|
512
|
+
} else {
|
|
513
|
+
return 5;
|
|
514
|
+
}
|
|
515
|
+
}
|
|
516
|
+
|
|
517
|
+
static inline size_t cbor_bstr_overhead(size_t len)
|
|
518
|
+
{
|
|
519
|
+
if (len <= 23) {
|
|
520
|
+
return 1;
|
|
521
|
+
} else if (len <= UINT8_MAX) {
|
|
522
|
+
return 2;
|
|
523
|
+
} else if (len <= UINT16_MAX) {
|
|
524
|
+
return 3;
|
|
525
|
+
} else if (len <= UINT32_MAX) {
|
|
526
|
+
return 4;
|
|
527
|
+
} else {
|
|
528
|
+
return 5;
|
|
529
|
+
}
|
|
530
|
+
}
|
|
531
|
+
|
|
532
|
+
static inline size_t cbor_map_overhead(size_t items)
|
|
533
|
+
{
|
|
534
|
+
(void)items;
|
|
535
|
+
|
|
536
|
+
return 3;
|
|
537
|
+
}
|
|
538
|
+
|
|
539
|
+
static inline size_t cbor_array_overhead(size_t items)
|
|
540
|
+
{
|
|
541
|
+
if (items < 24)
|
|
542
|
+
return 1;
|
|
543
|
+
if (items < 256)
|
|
544
|
+
return 2;
|
|
545
|
+
if (items < 65535)
|
|
546
|
+
return 3;
|
|
547
|
+
|
|
548
|
+
return 4;
|
|
549
|
+
}
|
|
550
|
+
|
|
551
|
+
static inline bool is_cbor_one_byte_int(int32_t val)
|
|
552
|
+
{
|
|
553
|
+
return (ONE_BYTE_CBOR_INT_MIN_VALUE < val &&
|
|
554
|
+
ONE_BYTE_CBOR_INT_MAX_VALUE > val);
|
|
555
|
+
}
|
|
556
|
+
|
|
557
|
+
static int comp_mac_3_input_len(const struct edhoc_context *ctx,
|
|
558
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
559
|
+
size_t *context_3_len)
|
|
560
|
+
{
|
|
561
|
+
if (NULL == ctx || NULL == auth_cred || NULL == context_3_len)
|
|
562
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
563
|
+
|
|
564
|
+
const size_t nr_of_items = 1;
|
|
565
|
+
size_t len = 0;
|
|
566
|
+
|
|
567
|
+
/* ID_CRED_I. */
|
|
568
|
+
switch (auth_cred->label) {
|
|
569
|
+
case EDHOC_COSE_HEADER_KID:
|
|
570
|
+
len += cbor_map_overhead(nr_of_items);
|
|
571
|
+
|
|
572
|
+
switch (auth_cred->key_id.encode_type) {
|
|
573
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
574
|
+
len += cbor_int_mem_req(auth_cred->key_id.key_id_int);
|
|
575
|
+
break;
|
|
576
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
577
|
+
len += auth_cred->key_id.key_id_bstr_length;
|
|
578
|
+
len += cbor_bstr_overhead(
|
|
579
|
+
auth_cred->key_id.key_id_bstr_length);
|
|
580
|
+
break;
|
|
581
|
+
default:
|
|
582
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
583
|
+
}
|
|
584
|
+
|
|
585
|
+
break;
|
|
586
|
+
|
|
587
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
588
|
+
if (1 == auth_cred->x509_chain.nr_of_certs) {
|
|
589
|
+
len += cbor_map_overhead(nr_of_items);
|
|
590
|
+
len += auth_cred->x509_chain.cert_len[0];
|
|
591
|
+
len += cbor_bstr_overhead(
|
|
592
|
+
auth_cred->x509_chain.cert_len[0]);
|
|
593
|
+
} else {
|
|
594
|
+
for (size_t i = 0;
|
|
595
|
+
i < auth_cred->x509_chain.nr_of_certs; ++i) {
|
|
596
|
+
len += cbor_map_overhead(nr_of_items);
|
|
597
|
+
len += auth_cred->x509_chain.cert_len[i];
|
|
598
|
+
len += cbor_bstr_overhead(
|
|
599
|
+
auth_cred->x509_chain.cert_len[i]);
|
|
600
|
+
}
|
|
601
|
+
}
|
|
602
|
+
|
|
603
|
+
break;
|
|
604
|
+
}
|
|
605
|
+
|
|
606
|
+
case EDHOC_COSE_HEADER_X509_HASH:
|
|
607
|
+
len += cbor_map_overhead(nr_of_items);
|
|
608
|
+
len += cbor_array_overhead(nr_of_items);
|
|
609
|
+
|
|
610
|
+
switch (auth_cred->x509_hash.encode_type) {
|
|
611
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
612
|
+
len += cbor_int_mem_req(auth_cred->x509_hash.alg_int);
|
|
613
|
+
break;
|
|
614
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
615
|
+
len += auth_cred->x509_hash.alg_bstr_length;
|
|
616
|
+
len += cbor_bstr_overhead(
|
|
617
|
+
auth_cred->x509_hash.alg_bstr_length);
|
|
618
|
+
break;
|
|
619
|
+
default:
|
|
620
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
621
|
+
}
|
|
622
|
+
|
|
623
|
+
len += auth_cred->x509_hash.cert_fp_len;
|
|
624
|
+
len += cbor_bstr_overhead(auth_cred->x509_hash.cert_fp_len);
|
|
625
|
+
break;
|
|
626
|
+
|
|
627
|
+
default:
|
|
628
|
+
return EDHOC_ERROR_NOT_SUPPORTED;
|
|
629
|
+
}
|
|
630
|
+
|
|
631
|
+
/* TH_3. */
|
|
632
|
+
len += ctx->th_len;
|
|
633
|
+
len += cbor_bstr_overhead(ctx->th_len);
|
|
634
|
+
|
|
635
|
+
/* CRED_I. */
|
|
636
|
+
switch (auth_cred->label) {
|
|
637
|
+
case EDHOC_COSE_HEADER_KID:
|
|
638
|
+
len += auth_cred->key_id.cred_len;
|
|
639
|
+
len += cbor_bstr_overhead(auth_cred->key_id.cred_len);
|
|
640
|
+
break;
|
|
641
|
+
|
|
642
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
643
|
+
const size_t end_entity_idx =
|
|
644
|
+
auth_cred->x509_chain.nr_of_certs - 1;
|
|
645
|
+
len += auth_cred->x509_chain.cert_len[end_entity_idx];
|
|
646
|
+
len += cbor_bstr_overhead(
|
|
647
|
+
auth_cred->x509_chain.cert_len[end_entity_idx]);
|
|
648
|
+
break;
|
|
649
|
+
}
|
|
650
|
+
|
|
651
|
+
case EDHOC_COSE_HEADER_X509_HASH:
|
|
652
|
+
len += auth_cred->x509_hash.cert_len;
|
|
653
|
+
len += cbor_bstr_overhead(auth_cred->x509_hash.cert_len);
|
|
654
|
+
break;
|
|
655
|
+
|
|
656
|
+
default:
|
|
657
|
+
return EDHOC_ERROR_NOT_SUPPORTED;
|
|
658
|
+
}
|
|
659
|
+
|
|
660
|
+
/* EAD_3. */
|
|
661
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
662
|
+
len += cbor_int_mem_req(ctx->ead_token[i].label);
|
|
663
|
+
len += ctx->ead_token[i].value_len;
|
|
664
|
+
len += cbor_bstr_overhead(ctx->ead_token[i].value_len);
|
|
665
|
+
}
|
|
666
|
+
|
|
667
|
+
*context_3_len = len;
|
|
668
|
+
return EDHOC_SUCCESS;
|
|
669
|
+
}
|
|
670
|
+
|
|
671
|
+
static int comp_prk_4e3m(enum edhoc_role role, struct edhoc_context *ctx,
|
|
672
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
673
|
+
const uint8_t *pub_key, size_t pub_key_len)
|
|
674
|
+
{
|
|
675
|
+
if (NULL == ctx)
|
|
676
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
677
|
+
|
|
678
|
+
if (EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
679
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
680
|
+
|
|
681
|
+
if (initiator == role) {
|
|
682
|
+
switch (ctx->method) {
|
|
683
|
+
case EDHOC_METHOD_0:
|
|
684
|
+
case EDHOC_METHOD_1:
|
|
685
|
+
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
686
|
+
return EDHOC_SUCCESS;
|
|
687
|
+
|
|
688
|
+
case EDHOC_METHOD_2:
|
|
689
|
+
case EDHOC_METHOD_3: {
|
|
690
|
+
const size_t hash_len =
|
|
691
|
+
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
692
|
+
|
|
693
|
+
ALLOCATE_ARRAY(uint8_t, salt_4e3m, hash_len);
|
|
694
|
+
memset(salt_4e3m, 0, ALLOCATE_ARRAY_SIZEOF(salt_4e3m));
|
|
695
|
+
|
|
696
|
+
int ret = comp_salt_4e3m(ctx, salt_4e3m,
|
|
697
|
+
ARRAY_SIZE_VLA(salt_4e3m));
|
|
698
|
+
|
|
699
|
+
if (EDHOC_SUCCESS != ret)
|
|
700
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
701
|
+
|
|
702
|
+
if (NULL != ctx->logger)
|
|
703
|
+
ctx->logger(ctx->user_ctx, "SALT_4e3m",
|
|
704
|
+
salt_4e3m, ARRAY_SIZE_VLA(salt_4e3m));
|
|
705
|
+
|
|
706
|
+
const size_t ecc_key_len =
|
|
707
|
+
ctx->csuite[ctx->chosen_csuite_idx]
|
|
708
|
+
.ecc_key_length;
|
|
709
|
+
|
|
710
|
+
ALLOCATE_ARRAY(uint8_t, giy, ecc_key_len);
|
|
711
|
+
memset(giy, 0, ALLOCATE_ARRAY_SIZEOF(giy));
|
|
712
|
+
|
|
713
|
+
ret = comp_giy(role, ctx, auth_cred, pub_key,
|
|
714
|
+
pub_key_len, giy, ARRAY_SIZE_VLA(giy));
|
|
715
|
+
|
|
716
|
+
if (EDHOC_SUCCESS != ret)
|
|
717
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
718
|
+
|
|
719
|
+
if (NULL != ctx->logger)
|
|
720
|
+
ctx->logger(ctx->user_ctx, "G_IY", giy,
|
|
721
|
+
ARRAY_SIZE_VLA(giy));
|
|
722
|
+
|
|
723
|
+
ctx->prk_len =
|
|
724
|
+
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
725
|
+
|
|
726
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
727
|
+
ret = ctx->keys.generate_key(ctx->user_ctx,
|
|
728
|
+
EDHOC_KT_EXTRACT, giy,
|
|
729
|
+
ARRAY_SIZE_VLA(giy), key_id);
|
|
730
|
+
memset(giy, 0, sizeof(giy));
|
|
731
|
+
|
|
732
|
+
if (EDHOC_SUCCESS != ret)
|
|
733
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
734
|
+
|
|
735
|
+
size_t out_len = 0;
|
|
736
|
+
ret = ctx->crypto.extract(ctx->user_ctx, key_id,
|
|
737
|
+
salt_4e3m,
|
|
738
|
+
ARRAY_SIZE_VLA(salt_4e3m),
|
|
739
|
+
ctx->prk, ctx->prk_len,
|
|
740
|
+
&out_len);
|
|
741
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
742
|
+
|
|
743
|
+
if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
|
|
744
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
745
|
+
|
|
746
|
+
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
747
|
+
return EDHOC_SUCCESS;
|
|
748
|
+
}
|
|
749
|
+
default:
|
|
750
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
751
|
+
}
|
|
752
|
+
}
|
|
753
|
+
|
|
754
|
+
if (responder == role) {
|
|
755
|
+
switch (ctx->method) {
|
|
756
|
+
case EDHOC_METHOD_0:
|
|
757
|
+
case EDHOC_METHOD_1:
|
|
758
|
+
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
759
|
+
return EDHOC_SUCCESS;
|
|
760
|
+
|
|
761
|
+
case EDHOC_METHOD_2:
|
|
762
|
+
case EDHOC_METHOD_3: {
|
|
763
|
+
const size_t hash_len =
|
|
764
|
+
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
765
|
+
|
|
766
|
+
ALLOCATE_ARRAY(uint8_t, salt_4e3m, hash_len);
|
|
767
|
+
memset(salt_4e3m, 0, ALLOCATE_ARRAY_SIZEOF(salt_4e3m));
|
|
768
|
+
|
|
769
|
+
int ret = comp_salt_4e3m(ctx, salt_4e3m,
|
|
770
|
+
ARRAY_SIZE_VLA(salt_4e3m));
|
|
771
|
+
|
|
772
|
+
if (EDHOC_SUCCESS != ret)
|
|
773
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
774
|
+
|
|
775
|
+
if (NULL != ctx->logger)
|
|
776
|
+
ctx->logger(ctx->user_ctx, "SALT_4e3m",
|
|
777
|
+
salt_4e3m, ARRAY_SIZE_VLA(salt_4e3m));
|
|
778
|
+
|
|
779
|
+
const size_t ecc_key_len =
|
|
780
|
+
ctx->csuite[ctx->chosen_csuite_idx]
|
|
781
|
+
.ecc_key_length;
|
|
782
|
+
|
|
783
|
+
ALLOCATE_ARRAY(uint8_t, giy, ecc_key_len);
|
|
784
|
+
memset(giy, 0, ALLOCATE_ARRAY_SIZEOF(giy));
|
|
785
|
+
|
|
786
|
+
ret = comp_giy(role, ctx, auth_cred, pub_key,
|
|
787
|
+
pub_key_len, giy, ARRAY_SIZE_VLA(giy));
|
|
788
|
+
|
|
789
|
+
if (EDHOC_SUCCESS != ret)
|
|
790
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
791
|
+
|
|
792
|
+
if (NULL != ctx->logger)
|
|
793
|
+
ctx->logger(ctx->user_ctx, "G_IY", giy,
|
|
794
|
+
ARRAY_SIZE_VLA(giy));
|
|
795
|
+
|
|
796
|
+
ctx->prk_len =
|
|
797
|
+
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
798
|
+
|
|
799
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
800
|
+
ret = ctx->keys.generate_key(ctx->user_ctx,
|
|
801
|
+
EDHOC_KT_EXTRACT, giy,
|
|
802
|
+
ARRAY_SIZE_VLA(giy), key_id);
|
|
803
|
+
memset(giy, 0, ALLOCATE_ARRAY_SIZEOF(giy));
|
|
804
|
+
|
|
805
|
+
if (EDHOC_SUCCESS != ret)
|
|
806
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
807
|
+
|
|
808
|
+
size_t out_len = 0;
|
|
809
|
+
ret = ctx->crypto.extract(ctx->user_ctx, key_id,
|
|
810
|
+
salt_4e3m,
|
|
811
|
+
ARRAY_SIZE_VLA(salt_4e3m),
|
|
812
|
+
ctx->prk, ctx->prk_len,
|
|
813
|
+
&out_len);
|
|
814
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
815
|
+
|
|
816
|
+
if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
|
|
817
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
818
|
+
|
|
819
|
+
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
820
|
+
return EDHOC_SUCCESS;
|
|
821
|
+
}
|
|
822
|
+
default:
|
|
823
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
824
|
+
}
|
|
825
|
+
}
|
|
826
|
+
|
|
827
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
828
|
+
}
|
|
829
|
+
|
|
830
|
+
static int gen_mac_3_context(const struct edhoc_context *ctx,
|
|
831
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
832
|
+
struct cbor_items *cbor_items)
|
|
833
|
+
{
|
|
834
|
+
if (NULL == ctx || NULL == auth_cred || NULL == cbor_items)
|
|
835
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
836
|
+
|
|
837
|
+
if (EDHOC_TH_STATE_3 != ctx->th_state)
|
|
838
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
839
|
+
|
|
840
|
+
const size_t nr_of_items = 1;
|
|
841
|
+
|
|
842
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
843
|
+
size_t len = 0;
|
|
844
|
+
|
|
845
|
+
/* ID_CRED_R length. */
|
|
846
|
+
cbor_items->id_cred_i = &cbor_items->buf[0];
|
|
847
|
+
|
|
848
|
+
switch (auth_cred->label) {
|
|
849
|
+
case EDHOC_COSE_HEADER_KID:
|
|
850
|
+
len += cbor_map_overhead(nr_of_items);
|
|
851
|
+
switch (auth_cred->key_id.encode_type) {
|
|
852
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
853
|
+
len += cbor_int_mem_req(auth_cred->key_id.key_id_int);
|
|
854
|
+
break;
|
|
855
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
856
|
+
len += auth_cred->key_id.key_id_bstr_length;
|
|
857
|
+
len += cbor_bstr_overhead(
|
|
858
|
+
auth_cred->key_id.key_id_bstr_length);
|
|
859
|
+
break;
|
|
860
|
+
default:
|
|
861
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
862
|
+
}
|
|
863
|
+
if (is_cbor_one_byte_int(auth_cred->key_id.key_id_int))
|
|
864
|
+
cbor_items->id_cred_i_is_cob = true;
|
|
865
|
+
|
|
866
|
+
break;
|
|
867
|
+
|
|
868
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
869
|
+
len += cbor_map_overhead(nr_of_items);
|
|
870
|
+
|
|
871
|
+
for (size_t i = 0; i < auth_cred->x509_chain.nr_of_certs; ++i) {
|
|
872
|
+
len += auth_cred->x509_chain.cert_len[i];
|
|
873
|
+
len += cbor_bstr_overhead(
|
|
874
|
+
auth_cred->x509_chain.cert_len[i]);
|
|
875
|
+
}
|
|
876
|
+
|
|
877
|
+
if (1 < auth_cred->x509_chain.nr_of_certs)
|
|
878
|
+
len += cbor_array_overhead(
|
|
879
|
+
auth_cred->x509_chain.nr_of_certs);
|
|
880
|
+
|
|
881
|
+
break;
|
|
882
|
+
}
|
|
883
|
+
|
|
884
|
+
case EDHOC_COSE_HEADER_X509_HASH:
|
|
885
|
+
len += cbor_map_overhead(nr_of_items);
|
|
886
|
+
len += cbor_array_overhead(nr_of_items);
|
|
887
|
+
|
|
888
|
+
switch (auth_cred->x509_hash.encode_type) {
|
|
889
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
890
|
+
len += cbor_int_mem_req(auth_cred->x509_hash.alg_int);
|
|
891
|
+
break;
|
|
892
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
893
|
+
len += auth_cred->x509_hash.alg_bstr_length;
|
|
894
|
+
len += cbor_bstr_overhead(
|
|
895
|
+
auth_cred->x509_hash.alg_bstr_length);
|
|
896
|
+
break;
|
|
897
|
+
default:
|
|
898
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
899
|
+
}
|
|
900
|
+
|
|
901
|
+
len += auth_cred->x509_hash.cert_fp_len + 1;
|
|
902
|
+
len += cbor_bstr_overhead(auth_cred->x509_hash.cert_fp_len);
|
|
903
|
+
break;
|
|
904
|
+
|
|
905
|
+
default:
|
|
906
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
907
|
+
}
|
|
908
|
+
|
|
909
|
+
cbor_items->id_cred_i_len = len;
|
|
910
|
+
|
|
911
|
+
/* Cborise ID_CRED_R. */
|
|
912
|
+
struct id_cred_x cbor_id_cred_i = { 0 };
|
|
913
|
+
|
|
914
|
+
switch (auth_cred->label) {
|
|
915
|
+
case EDHOC_COSE_HEADER_KID: {
|
|
916
|
+
cbor_id_cred_i._id_cred_x_kid_present = true;
|
|
917
|
+
|
|
918
|
+
switch (auth_cred->key_id.encode_type) {
|
|
919
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
920
|
+
cbor_id_cred_i._id_cred_x_kid._id_cred_x_kid_choice =
|
|
921
|
+
_id_cred_x_kid_int;
|
|
922
|
+
cbor_id_cred_i._id_cred_x_kid._id_cred_x_kid_int =
|
|
923
|
+
auth_cred->key_id.key_id_int;
|
|
924
|
+
break;
|
|
925
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
926
|
+
cbor_id_cred_i._id_cred_x_kid._id_cred_x_kid_choice =
|
|
927
|
+
_id_cred_x_kid_bstr;
|
|
928
|
+
cbor_id_cred_i._id_cred_x_kid._id_cred_x_kid_bstr.value =
|
|
929
|
+
auth_cred->key_id.key_id_bstr;
|
|
930
|
+
cbor_id_cred_i._id_cred_x_kid._id_cred_x_kid_bstr.len =
|
|
931
|
+
auth_cred->key_id.key_id_bstr_length;
|
|
932
|
+
break;
|
|
933
|
+
default:
|
|
934
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
935
|
+
}
|
|
936
|
+
|
|
937
|
+
break;
|
|
938
|
+
}
|
|
939
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
940
|
+
cbor_id_cred_i._id_cred_x_x5chain_present = true;
|
|
941
|
+
|
|
942
|
+
struct COSE_X509_ *cose_x509 =
|
|
943
|
+
&cbor_id_cred_i._id_cred_x_x5chain._id_cred_x_x5chain;
|
|
944
|
+
|
|
945
|
+
if (1 == auth_cred->x509_chain.nr_of_certs) {
|
|
946
|
+
cose_x509->_COSE_X509_choice = _COSE_X509_bstr;
|
|
947
|
+
cose_x509->_COSE_X509_bstr.value =
|
|
948
|
+
auth_cred->x509_chain.cert[0];
|
|
949
|
+
cose_x509->_COSE_X509_bstr.len =
|
|
950
|
+
auth_cred->x509_chain.cert_len[0];
|
|
951
|
+
} else {
|
|
952
|
+
cose_x509->_COSE_X509_choice = _COSE_X509__certs;
|
|
953
|
+
cose_x509->_COSE_X509__certs_certs_count =
|
|
954
|
+
auth_cred->x509_chain.nr_of_certs;
|
|
955
|
+
|
|
956
|
+
for (size_t i = 0;
|
|
957
|
+
i < auth_cred->x509_chain.nr_of_certs; ++i) {
|
|
958
|
+
cose_x509->_COSE_X509__certs_certs[i].value =
|
|
959
|
+
auth_cred->x509_chain.cert[i];
|
|
960
|
+
cose_x509->_COSE_X509__certs_certs[i].len =
|
|
961
|
+
auth_cred->x509_chain.cert_len[i];
|
|
962
|
+
}
|
|
963
|
+
}
|
|
964
|
+
|
|
965
|
+
break;
|
|
966
|
+
}
|
|
967
|
+
case EDHOC_COSE_HEADER_X509_HASH: {
|
|
968
|
+
cbor_id_cred_i._id_cred_x_x5t_present = true;
|
|
969
|
+
|
|
970
|
+
struct COSE_CertHash *cose_x509 =
|
|
971
|
+
&cbor_id_cred_i._id_cred_x_x5t._id_cred_x_x5t;
|
|
972
|
+
|
|
973
|
+
cose_x509->_COSE_CertHash_hashValue.value =
|
|
974
|
+
auth_cred->x509_hash.cert_fp;
|
|
975
|
+
cose_x509->_COSE_CertHash_hashValue.len =
|
|
976
|
+
auth_cred->x509_hash.cert_fp_len;
|
|
977
|
+
|
|
978
|
+
switch (auth_cred->x509_hash.encode_type) {
|
|
979
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
980
|
+
cose_x509->_COSE_CertHash_hashAlg_choice =
|
|
981
|
+
_COSE_CertHash_hashAlg_int;
|
|
982
|
+
cose_x509->_COSE_CertHash_hashAlg_int =
|
|
983
|
+
auth_cred->x509_hash.alg_int;
|
|
984
|
+
break;
|
|
985
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
986
|
+
cose_x509->_COSE_CertHash_hashAlg_choice =
|
|
987
|
+
_COSE_CertHash_hashAlg_tstr;
|
|
988
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr.value =
|
|
989
|
+
auth_cred->x509_hash.alg_bstr;
|
|
990
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr.len =
|
|
991
|
+
auth_cred->x509_hash.alg_bstr_length;
|
|
992
|
+
break;
|
|
993
|
+
default:
|
|
994
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
995
|
+
}
|
|
996
|
+
|
|
997
|
+
break;
|
|
998
|
+
}
|
|
999
|
+
|
|
1000
|
+
default:
|
|
1001
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1002
|
+
}
|
|
1003
|
+
|
|
1004
|
+
len = 0;
|
|
1005
|
+
ret = cbor_encode_id_cred_x(cbor_items->id_cred_i,
|
|
1006
|
+
cbor_items->id_cred_i_len, &cbor_id_cred_i,
|
|
1007
|
+
&len);
|
|
1008
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1009
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1010
|
+
|
|
1011
|
+
cbor_items->id_cred_i_len = len;
|
|
1012
|
+
|
|
1013
|
+
/* Check compact encoding of ID_CRED_I. */
|
|
1014
|
+
if (EDHOC_COSE_HEADER_KID == auth_cred->label) {
|
|
1015
|
+
ret = kid_compact_encoding(auth_cred, cbor_items);
|
|
1016
|
+
|
|
1017
|
+
if (EDHOC_SUCCESS != ret)
|
|
1018
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1019
|
+
}
|
|
1020
|
+
|
|
1021
|
+
/* TH_3 length. */
|
|
1022
|
+
len = ctx->th_len;
|
|
1023
|
+
cbor_items->th_3 = &cbor_items->id_cred_i[cbor_items->id_cred_i_len];
|
|
1024
|
+
cbor_items->th_3_len = cbor_bstr_overhead(len) + len;
|
|
1025
|
+
|
|
1026
|
+
/* Cborise TH_3. */
|
|
1027
|
+
const struct zcbor_string cbor_th_3 = {
|
|
1028
|
+
.value = ctx->th,
|
|
1029
|
+
.len = ctx->th_len,
|
|
1030
|
+
};
|
|
1031
|
+
|
|
1032
|
+
len = 0;
|
|
1033
|
+
ret = cbor_encode_byte_string_type_bstr_type(
|
|
1034
|
+
cbor_items->th_3, cbor_items->th_3_len, &cbor_th_3, &len);
|
|
1035
|
+
|
|
1036
|
+
if (ZCBOR_SUCCESS != ret || cbor_items->th_3_len != len)
|
|
1037
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1038
|
+
|
|
1039
|
+
/* CRED_R length. */
|
|
1040
|
+
cbor_items->cred_i = &cbor_items->th_3[cbor_items->th_3_len];
|
|
1041
|
+
len = 0;
|
|
1042
|
+
|
|
1043
|
+
switch (auth_cred->label) {
|
|
1044
|
+
case EDHOC_COSE_HEADER_KID:
|
|
1045
|
+
len += auth_cred->key_id.cred_len;
|
|
1046
|
+
len += cbor_bstr_overhead(auth_cred->key_id.cred_len);
|
|
1047
|
+
break;
|
|
1048
|
+
|
|
1049
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
1050
|
+
const size_t end_entity_idx =
|
|
1051
|
+
auth_cred->x509_chain.nr_of_certs - 1;
|
|
1052
|
+
len += auth_cred->x509_chain.cert_len[end_entity_idx];
|
|
1053
|
+
len += cbor_bstr_overhead(
|
|
1054
|
+
auth_cred->x509_chain.cert_len[end_entity_idx]);
|
|
1055
|
+
break;
|
|
1056
|
+
}
|
|
1057
|
+
|
|
1058
|
+
case EDHOC_COSE_HEADER_X509_HASH:
|
|
1059
|
+
len += auth_cred->x509_hash.cert_len;
|
|
1060
|
+
len += cbor_bstr_overhead(auth_cred->x509_hash.cert_len);
|
|
1061
|
+
break;
|
|
1062
|
+
|
|
1063
|
+
default:
|
|
1064
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1065
|
+
}
|
|
1066
|
+
|
|
1067
|
+
cbor_items->cred_i_len = len;
|
|
1068
|
+
|
|
1069
|
+
/* Cborise CRED_R. */
|
|
1070
|
+
struct zcbor_string cbor_cred_i = { 0 };
|
|
1071
|
+
|
|
1072
|
+
switch (auth_cred->label) {
|
|
1073
|
+
case EDHOC_COSE_HEADER_KID:
|
|
1074
|
+
cbor_cred_i.value = auth_cred->key_id.cred;
|
|
1075
|
+
cbor_cred_i.len = auth_cred->key_id.cred_len;
|
|
1076
|
+
break;
|
|
1077
|
+
|
|
1078
|
+
case EDHOC_COSE_HEADER_X509_CHAIN: {
|
|
1079
|
+
const size_t end_entity_idx =
|
|
1080
|
+
auth_cred->x509_chain.nr_of_certs - 1;
|
|
1081
|
+
cbor_cred_i.value = auth_cred->x509_chain.cert[end_entity_idx];
|
|
1082
|
+
cbor_cred_i.len =
|
|
1083
|
+
auth_cred->x509_chain.cert_len[end_entity_idx];
|
|
1084
|
+
break;
|
|
1085
|
+
}
|
|
1086
|
+
|
|
1087
|
+
case EDHOC_COSE_HEADER_X509_HASH:
|
|
1088
|
+
cbor_cred_i.value = auth_cred->x509_hash.cert;
|
|
1089
|
+
cbor_cred_i.len = auth_cred->x509_hash.cert_len;
|
|
1090
|
+
break;
|
|
1091
|
+
|
|
1092
|
+
default:
|
|
1093
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1094
|
+
}
|
|
1095
|
+
|
|
1096
|
+
if (EDHOC_COSE_HEADER_KID == auth_cred->label &&
|
|
1097
|
+
true == auth_cred->key_id.cred_is_cbor) {
|
|
1098
|
+
memcpy(cbor_items->cred_i, auth_cred->key_id.cred,
|
|
1099
|
+
auth_cred->key_id.cred_len);
|
|
1100
|
+
cbor_items->cred_i_len = auth_cred->key_id.cred_len;
|
|
1101
|
+
} else {
|
|
1102
|
+
len = 0;
|
|
1103
|
+
ret = cbor_encode_byte_string_type_bstr_type(
|
|
1104
|
+
cbor_items->cred_i, cbor_items->cred_i_len,
|
|
1105
|
+
&cbor_cred_i, &len);
|
|
1106
|
+
|
|
1107
|
+
if (ZCBOR_SUCCESS != ret || cbor_items->cred_i_len != len)
|
|
1108
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1109
|
+
}
|
|
1110
|
+
|
|
1111
|
+
/* EAD_3 length. */
|
|
1112
|
+
if (0 != ctx->nr_of_ead_tokens) {
|
|
1113
|
+
len = 0;
|
|
1114
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1115
|
+
len += cbor_int_mem_req(ctx->ead_token[i].label);
|
|
1116
|
+
len += 1; // cbor boolean
|
|
1117
|
+
len += ctx->ead_token[i].value_len;
|
|
1118
|
+
len += cbor_bstr_overhead(ctx->ead_token[i].value_len);
|
|
1119
|
+
}
|
|
1120
|
+
|
|
1121
|
+
cbor_items->is_ead_3 = true;
|
|
1122
|
+
cbor_items->ead_3 = &cbor_items->cred_i[cbor_items->cred_i_len];
|
|
1123
|
+
cbor_items->ead_3_len = len;
|
|
1124
|
+
} else {
|
|
1125
|
+
cbor_items->is_ead_3 = false;
|
|
1126
|
+
cbor_items->ead_3 = NULL;
|
|
1127
|
+
cbor_items->ead_3_len = 0;
|
|
1128
|
+
}
|
|
1129
|
+
|
|
1130
|
+
/* Cborise EAD_3 if present. */
|
|
1131
|
+
if (true == cbor_items->is_ead_3) {
|
|
1132
|
+
struct ead_ ead_tokens = { ._ead_count =
|
|
1133
|
+
ctx->nr_of_ead_tokens };
|
|
1134
|
+
|
|
1135
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1136
|
+
ead_tokens._ead[i]._ead_label = ctx->ead_token[i].label;
|
|
1137
|
+
ead_tokens._ead[i]._ead_value_present =
|
|
1138
|
+
(NULL != ctx->ead_token[i].value);
|
|
1139
|
+
ead_tokens._ead[i]._ead_value.value =
|
|
1140
|
+
ctx->ead_token[i].value;
|
|
1141
|
+
ead_tokens._ead[i]._ead_value.len =
|
|
1142
|
+
ctx->ead_token[i].value_len;
|
|
1143
|
+
}
|
|
1144
|
+
|
|
1145
|
+
len = 0;
|
|
1146
|
+
ret = cbor_encode_ead(cbor_items->ead_3, cbor_items->ead_3_len,
|
|
1147
|
+
&ead_tokens, &len);
|
|
1148
|
+
|
|
1149
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1150
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1151
|
+
|
|
1152
|
+
cbor_items->ead_3_len = len;
|
|
1153
|
+
}
|
|
1154
|
+
|
|
1155
|
+
const size_t encoded_bytes =
|
|
1156
|
+
cbor_items->id_cred_i_len + cbor_items->th_3_len +
|
|
1157
|
+
cbor_items->cred_i_len + cbor_items->ead_3_len;
|
|
1158
|
+
|
|
1159
|
+
if (encoded_bytes > cbor_items->buf_len)
|
|
1160
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1161
|
+
|
|
1162
|
+
cbor_items->buf_len = encoded_bytes;
|
|
1163
|
+
return EDHOC_SUCCESS;
|
|
1164
|
+
}
|
|
1165
|
+
|
|
1166
|
+
static int comp_mac_3_len(enum edhoc_role role, const struct edhoc_context *ctx,
|
|
1167
|
+
size_t *mac_3_len)
|
|
1168
|
+
{
|
|
1169
|
+
if (NULL == ctx || NULL == mac_3_len)
|
|
1170
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1171
|
+
|
|
1172
|
+
const struct edhoc_cipher_suite csuite =
|
|
1173
|
+
ctx->csuite[ctx->chosen_csuite_idx];
|
|
1174
|
+
|
|
1175
|
+
if (role == initiator) {
|
|
1176
|
+
switch (ctx->method) {
|
|
1177
|
+
case EDHOC_METHOD_0:
|
|
1178
|
+
case EDHOC_METHOD_1:
|
|
1179
|
+
*mac_3_len = csuite.hash_length;
|
|
1180
|
+
return EDHOC_SUCCESS;
|
|
1181
|
+
|
|
1182
|
+
case EDHOC_METHOD_2:
|
|
1183
|
+
case EDHOC_METHOD_3:
|
|
1184
|
+
*mac_3_len = csuite.mac_length;
|
|
1185
|
+
return EDHOC_SUCCESS;
|
|
1186
|
+
}
|
|
1187
|
+
}
|
|
1188
|
+
|
|
1189
|
+
if (role == responder) {
|
|
1190
|
+
switch (ctx->method) {
|
|
1191
|
+
case EDHOC_METHOD_0:
|
|
1192
|
+
case EDHOC_METHOD_1:
|
|
1193
|
+
*mac_3_len = csuite.hash_length;
|
|
1194
|
+
return EDHOC_SUCCESS;
|
|
1195
|
+
|
|
1196
|
+
case EDHOC_METHOD_2:
|
|
1197
|
+
case EDHOC_METHOD_3:
|
|
1198
|
+
*mac_3_len = csuite.mac_length;
|
|
1199
|
+
return EDHOC_SUCCESS;
|
|
1200
|
+
}
|
|
1201
|
+
}
|
|
1202
|
+
|
|
1203
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
1204
|
+
}
|
|
1205
|
+
|
|
1206
|
+
static int comp_mac_3(const struct edhoc_context *ctx,
|
|
1207
|
+
const struct cbor_items *cbor_items, uint8_t *mac_3,
|
|
1208
|
+
size_t mac_3_len)
|
|
1209
|
+
{
|
|
1210
|
+
if (NULL == ctx || NULL == cbor_items || NULL == mac_3 ||
|
|
1211
|
+
0 == mac_3_len)
|
|
1212
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1213
|
+
|
|
1214
|
+
if (EDHOC_PRK_STATE_4E3M != ctx->prk_state)
|
|
1215
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
1216
|
+
|
|
1217
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1218
|
+
|
|
1219
|
+
struct info input_info = {
|
|
1220
|
+
._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_MAC_3,
|
|
1221
|
+
._info_context.value = cbor_items->buf,
|
|
1222
|
+
._info_context.len = cbor_items->buf_len,
|
|
1223
|
+
._info_length = (uint32_t)mac_3_len,
|
|
1224
|
+
};
|
|
1225
|
+
|
|
1226
|
+
/* Calculate struct info cbor overhead. */
|
|
1227
|
+
size_t len = 0;
|
|
1228
|
+
len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_MAC_3);
|
|
1229
|
+
len += cbor_items->buf_len + cbor_bstr_overhead(cbor_items->buf_len);
|
|
1230
|
+
len += cbor_int_mem_req((int32_t)mac_3_len);
|
|
1231
|
+
|
|
1232
|
+
ALLOCATE_ARRAY(uint8_t, info, len);
|
|
1233
|
+
memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
|
|
1234
|
+
|
|
1235
|
+
len = 0;
|
|
1236
|
+
ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
|
|
1237
|
+
|
|
1238
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1239
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1240
|
+
|
|
1241
|
+
if (NULL != ctx->logger)
|
|
1242
|
+
ctx->logger(ctx->user_ctx, "MAC_3 info", info, len);
|
|
1243
|
+
|
|
1244
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
1245
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
1246
|
+
ctx->prk_len, key_id);
|
|
1247
|
+
|
|
1248
|
+
if (EDHOC_SUCCESS != ret)
|
|
1249
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1250
|
+
|
|
1251
|
+
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, mac_3,
|
|
1252
|
+
mac_3_len);
|
|
1253
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1254
|
+
memset(key_id, 0, sizeof(key_id));
|
|
1255
|
+
|
|
1256
|
+
if (EDHOC_SUCCESS != ret)
|
|
1257
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1258
|
+
|
|
1259
|
+
return EDHOC_SUCCESS;
|
|
1260
|
+
}
|
|
1261
|
+
|
|
1262
|
+
static int comp_sign_or_mac_3_len(enum edhoc_role role,
|
|
1263
|
+
const struct edhoc_context *ctx,
|
|
1264
|
+
size_t *sign_or_mac_3_len)
|
|
1265
|
+
{
|
|
1266
|
+
if (NULL == ctx || NULL == sign_or_mac_3_len)
|
|
1267
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1268
|
+
|
|
1269
|
+
const struct edhoc_cipher_suite csuite =
|
|
1270
|
+
ctx->csuite[ctx->chosen_csuite_idx];
|
|
1271
|
+
|
|
1272
|
+
if (role == initiator) {
|
|
1273
|
+
switch (ctx->method) {
|
|
1274
|
+
case EDHOC_METHOD_0:
|
|
1275
|
+
case EDHOC_METHOD_1:
|
|
1276
|
+
*sign_or_mac_3_len = csuite.ecc_sign_length;
|
|
1277
|
+
return EDHOC_SUCCESS;
|
|
1278
|
+
|
|
1279
|
+
case EDHOC_METHOD_2:
|
|
1280
|
+
case EDHOC_METHOD_3:
|
|
1281
|
+
*sign_or_mac_3_len = csuite.mac_length;
|
|
1282
|
+
return EDHOC_SUCCESS;
|
|
1283
|
+
}
|
|
1284
|
+
}
|
|
1285
|
+
|
|
1286
|
+
if (role == responder) {
|
|
1287
|
+
switch (ctx->method) {
|
|
1288
|
+
case EDHOC_METHOD_0:
|
|
1289
|
+
case EDHOC_METHOD_1:
|
|
1290
|
+
*sign_or_mac_3_len = csuite.ecc_sign_length;
|
|
1291
|
+
return EDHOC_SUCCESS;
|
|
1292
|
+
|
|
1293
|
+
case EDHOC_METHOD_2:
|
|
1294
|
+
case EDHOC_METHOD_3:
|
|
1295
|
+
*sign_or_mac_3_len = csuite.mac_length;
|
|
1296
|
+
return EDHOC_SUCCESS;
|
|
1297
|
+
}
|
|
1298
|
+
}
|
|
1299
|
+
|
|
1300
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1301
|
+
}
|
|
1302
|
+
|
|
1303
|
+
static int comp_sign_or_mac_3(const struct edhoc_context *ctx,
|
|
1304
|
+
const struct edhoc_auth_creds *auth_creds,
|
|
1305
|
+
const struct cbor_items *cbor_items,
|
|
1306
|
+
const uint8_t *mac_3, size_t mac_3_len,
|
|
1307
|
+
uint8_t *sign, size_t sign_len)
|
|
1308
|
+
{
|
|
1309
|
+
if (NULL == ctx || NULL == auth_creds || NULL == cbor_items ||
|
|
1310
|
+
NULL == mac_3 || 0 == mac_3_len || NULL == sign || 0 == sign_len)
|
|
1311
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1312
|
+
|
|
1313
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1314
|
+
|
|
1315
|
+
switch (ctx->method) {
|
|
1316
|
+
case EDHOC_METHOD_0:
|
|
1317
|
+
case EDHOC_METHOD_1: {
|
|
1318
|
+
const struct sig_structure cose_sign_1 = {
|
|
1319
|
+
._sig_structure_protected.value = cbor_items->id_cred_i,
|
|
1320
|
+
._sig_structure_protected.len =
|
|
1321
|
+
cbor_items->id_cred_i_len,
|
|
1322
|
+
._sig_structure_external_aad.value = cbor_items->th_3,
|
|
1323
|
+
._sig_structure_external_aad.len =
|
|
1324
|
+
cbor_items->th_3_len + cbor_items->cred_i_len +
|
|
1325
|
+
cbor_items->ead_3_len,
|
|
1326
|
+
._sig_structure_payload.value = mac_3,
|
|
1327
|
+
._sig_structure_payload.len = mac_3_len,
|
|
1328
|
+
};
|
|
1329
|
+
|
|
1330
|
+
size_t len = 0;
|
|
1331
|
+
len += sizeof("Signature1") +
|
|
1332
|
+
cbor_tstr_overhead(sizeof("Signature1"));
|
|
1333
|
+
len += cbor_items->id_cred_i_len +
|
|
1334
|
+
cbor_bstr_overhead(cbor_items->id_cred_i_len);
|
|
1335
|
+
len += cbor_items->th_3_len + cbor_items->cred_i_len +
|
|
1336
|
+
cbor_items->ead_3_len +
|
|
1337
|
+
cbor_bstr_overhead(cbor_items->th_3_len +
|
|
1338
|
+
cbor_items->cred_i_len +
|
|
1339
|
+
cbor_items->ead_3_len);
|
|
1340
|
+
len += mac_3_len + cbor_bstr_overhead(mac_3_len);
|
|
1341
|
+
|
|
1342
|
+
ALLOCATE_ARRAY(uint8_t, cose_sign_1_buf, len);
|
|
1343
|
+
memset(cose_sign_1_buf, 0, ALLOCATE_ARRAY_SIZEOF(cose_sign_1_buf));
|
|
1344
|
+
|
|
1345
|
+
len = 0;
|
|
1346
|
+
ret = cbor_encode_sig_structure(cose_sign_1_buf,
|
|
1347
|
+
ARRAY_SIZE_VLA(cose_sign_1_buf),
|
|
1348
|
+
&cose_sign_1, &len);
|
|
1349
|
+
|
|
1350
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1351
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1352
|
+
|
|
1353
|
+
const size_t cose_sign_1_buf_len = len;
|
|
1354
|
+
|
|
1355
|
+
len = 0;
|
|
1356
|
+
ret = ctx->crypto.signature(
|
|
1357
|
+
ctx->user_ctx, auth_creds->priv_key_id, cose_sign_1_buf,
|
|
1358
|
+
cose_sign_1_buf_len, sign, sign_len, &len);
|
|
1359
|
+
|
|
1360
|
+
if (EDHOC_SUCCESS != ret || sign_len != len)
|
|
1361
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1362
|
+
|
|
1363
|
+
return EDHOC_SUCCESS;
|
|
1364
|
+
}
|
|
1365
|
+
|
|
1366
|
+
case EDHOC_METHOD_2:
|
|
1367
|
+
case EDHOC_METHOD_3:
|
|
1368
|
+
memcpy(sign, mac_3, mac_3_len);
|
|
1369
|
+
return EDHOC_SUCCESS;
|
|
1370
|
+
}
|
|
1371
|
+
|
|
1372
|
+
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
|
|
1373
|
+
}
|
|
1374
|
+
|
|
1375
|
+
static int comp_plaintext_3_len(const struct edhoc_context *ctx,
|
|
1376
|
+
const struct cbor_items *cbor_items,
|
|
1377
|
+
size_t sign_len, size_t *plaintext_3_len)
|
|
1378
|
+
{
|
|
1379
|
+
if (NULL == ctx || NULL == cbor_items || 0 == sign_len ||
|
|
1380
|
+
NULL == plaintext_3_len)
|
|
1381
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1382
|
+
|
|
1383
|
+
size_t len = 0;
|
|
1384
|
+
|
|
1385
|
+
switch (ctx->cid.encode_type) {
|
|
1386
|
+
case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
|
|
1387
|
+
len += cbor_int_mem_req(ctx->cid.int_value);
|
|
1388
|
+
break;
|
|
1389
|
+
case EDHOC_CID_TYPE_BYTE_STRING:
|
|
1390
|
+
len += ctx->cid.bstr_length;
|
|
1391
|
+
len += cbor_bstr_overhead(ctx->cid.bstr_length);
|
|
1392
|
+
break;
|
|
1393
|
+
}
|
|
1394
|
+
|
|
1395
|
+
if (true == cbor_items->id_cred_i_is_comp_enc) {
|
|
1396
|
+
switch (cbor_items->id_cred_i_enc_type) {
|
|
1397
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
1398
|
+
len += cbor_int_mem_req(cbor_items->id_cred_i_int);
|
|
1399
|
+
break;
|
|
1400
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
1401
|
+
len += cbor_items->id_cred_i_bstr_len;
|
|
1402
|
+
len += cbor_bstr_overhead(
|
|
1403
|
+
cbor_items->id_cred_i_bstr_len);
|
|
1404
|
+
break;
|
|
1405
|
+
}
|
|
1406
|
+
} else {
|
|
1407
|
+
len += cbor_items->id_cred_i_len;
|
|
1408
|
+
}
|
|
1409
|
+
|
|
1410
|
+
len += sign_len;
|
|
1411
|
+
len += cbor_bstr_overhead(sign_len);
|
|
1412
|
+
len += cbor_items->ead_3_len;
|
|
1413
|
+
|
|
1414
|
+
*plaintext_3_len = len;
|
|
1415
|
+
return EDHOC_SUCCESS;
|
|
1416
|
+
}
|
|
1417
|
+
|
|
1418
|
+
static int prepare_plaintext_3(const struct cbor_items *cbor_items,
|
|
1419
|
+
const uint8_t *sign, size_t sign_len,
|
|
1420
|
+
uint8_t *ptxt, size_t ptxt_size,
|
|
1421
|
+
size_t *ptxt_len)
|
|
1422
|
+
{
|
|
1423
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1424
|
+
|
|
1425
|
+
size_t offset = 0;
|
|
1426
|
+
|
|
1427
|
+
/* ID_CRED_I. */
|
|
1428
|
+
if (cbor_items->id_cred_i_is_comp_enc) {
|
|
1429
|
+
switch (cbor_items->id_cred_i_enc_type) {
|
|
1430
|
+
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
1431
|
+
memcpy(&ptxt[offset], &cbor_items->id_cred_i_int, 1);
|
|
1432
|
+
offset += 1;
|
|
1433
|
+
break;
|
|
1434
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
1435
|
+
memcpy(&ptxt[offset], &cbor_items->id_cred_i_bstr,
|
|
1436
|
+
cbor_items->id_cred_i_bstr_len);
|
|
1437
|
+
offset += cbor_items->id_cred_i_bstr_len;
|
|
1438
|
+
break;
|
|
1439
|
+
default:
|
|
1440
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1441
|
+
}
|
|
1442
|
+
} else {
|
|
1443
|
+
memcpy(&ptxt[offset], cbor_items->id_cred_i,
|
|
1444
|
+
cbor_items->id_cred_i_len);
|
|
1445
|
+
offset += cbor_items->id_cred_i_len;
|
|
1446
|
+
}
|
|
1447
|
+
const struct zcbor_string cbor_sign_or_mac_3 = {
|
|
1448
|
+
.value = sign,
|
|
1449
|
+
.len = sign_len,
|
|
1450
|
+
};
|
|
1451
|
+
|
|
1452
|
+
size_t len = 0;
|
|
1453
|
+
ret = cbor_encode_byte_string_type_bstr_type(
|
|
1454
|
+
&ptxt[offset], sign_len + cbor_bstr_overhead(sign_len) + 1,
|
|
1455
|
+
&cbor_sign_or_mac_3, &len);
|
|
1456
|
+
|
|
1457
|
+
if (ZCBOR_SUCCESS != ret ||
|
|
1458
|
+
(sign_len + cbor_bstr_overhead(sign_len)) != len)
|
|
1459
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1460
|
+
|
|
1461
|
+
offset += len;
|
|
1462
|
+
|
|
1463
|
+
/* EAD_3 if present. */
|
|
1464
|
+
if (cbor_items->is_ead_3) {
|
|
1465
|
+
memcpy(&ptxt[offset], cbor_items->ead_3, cbor_items->ead_3_len);
|
|
1466
|
+
offset += cbor_items->ead_3_len;
|
|
1467
|
+
}
|
|
1468
|
+
|
|
1469
|
+
if (offset > ptxt_size)
|
|
1470
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1471
|
+
|
|
1472
|
+
*ptxt_len = offset;
|
|
1473
|
+
|
|
1474
|
+
return EDHOC_SUCCESS;
|
|
1475
|
+
}
|
|
1476
|
+
|
|
1477
|
+
static int comp_aad_3_len(const struct edhoc_context *ctx, size_t *aad_3_len)
|
|
1478
|
+
{
|
|
1479
|
+
if (NULL == ctx || NULL == aad_3_len)
|
|
1480
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1481
|
+
|
|
1482
|
+
size_t len = 0;
|
|
1483
|
+
|
|
1484
|
+
len += sizeof("Encrypt0") + cbor_tstr_overhead(sizeof("Encrypt0"));
|
|
1485
|
+
len += 0 + cbor_bstr_overhead(0);
|
|
1486
|
+
len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
|
|
1487
|
+
|
|
1488
|
+
*aad_3_len = len;
|
|
1489
|
+
return EDHOC_SUCCESS;
|
|
1490
|
+
}
|
|
1491
|
+
|
|
1492
|
+
static int comp_key_iv_aad(const struct edhoc_context *ctx, uint8_t *key,
|
|
1493
|
+
size_t key_len, uint8_t *iv, size_t iv_len,
|
|
1494
|
+
uint8_t *aad, size_t aad_len)
|
|
1495
|
+
{
|
|
1496
|
+
if (NULL == ctx || NULL == key || 0 == key_len || NULL == iv ||
|
|
1497
|
+
0 == iv_len || NULL == aad || 0 == aad_len)
|
|
1498
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1499
|
+
|
|
1500
|
+
if (EDHOC_TH_STATE_3 != ctx->th_state)
|
|
1501
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
1502
|
+
|
|
1503
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1504
|
+
|
|
1505
|
+
const struct edhoc_cipher_suite csuite =
|
|
1506
|
+
ctx->csuite[ctx->chosen_csuite_idx];
|
|
1507
|
+
|
|
1508
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
1509
|
+
struct info input_info = { 0 };
|
|
1510
|
+
|
|
1511
|
+
/* Calculate struct info cbor overhead. */
|
|
1512
|
+
size_t len = 0;
|
|
1513
|
+
len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_IV_3);
|
|
1514
|
+
len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
|
|
1515
|
+
len += cbor_int_mem_req((int32_t)csuite.aead_key_length);
|
|
1516
|
+
|
|
1517
|
+
ALLOCATE_ARRAY(uint8_t, info, len);
|
|
1518
|
+
memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
|
|
1519
|
+
|
|
1520
|
+
/* Generate K_3. */
|
|
1521
|
+
input_info = (struct info){
|
|
1522
|
+
._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_K_3,
|
|
1523
|
+
._info_context.value = ctx->th,
|
|
1524
|
+
._info_context.len = ctx->th_len,
|
|
1525
|
+
._info_length = (uint32_t)csuite.aead_key_length,
|
|
1526
|
+
};
|
|
1527
|
+
|
|
1528
|
+
memset(info, 0, sizeof(info));
|
|
1529
|
+
len = 0;
|
|
1530
|
+
ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
|
|
1531
|
+
|
|
1532
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1533
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1534
|
+
|
|
1535
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
1536
|
+
ctx->prk_len, key_id);
|
|
1537
|
+
|
|
1538
|
+
if (EDHOC_SUCCESS != ret)
|
|
1539
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1540
|
+
|
|
1541
|
+
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, key,
|
|
1542
|
+
key_len);
|
|
1543
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1544
|
+
memset(key_id, 0, sizeof(key_id));
|
|
1545
|
+
|
|
1546
|
+
if (EDHOC_SUCCESS != ret)
|
|
1547
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1548
|
+
|
|
1549
|
+
/* Generate IV_3. */
|
|
1550
|
+
input_info = (struct info){
|
|
1551
|
+
._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_IV_3,
|
|
1552
|
+
._info_context.value = ctx->th,
|
|
1553
|
+
._info_context.len = ctx->th_len,
|
|
1554
|
+
._info_length = (uint32_t)csuite.aead_iv_length,
|
|
1555
|
+
};
|
|
1556
|
+
|
|
1557
|
+
memset(info, 0, sizeof(info));
|
|
1558
|
+
len = 0;
|
|
1559
|
+
ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
|
|
1560
|
+
|
|
1561
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1562
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1563
|
+
|
|
1564
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
1565
|
+
ctx->prk_len, key_id);
|
|
1566
|
+
|
|
1567
|
+
if (EDHOC_SUCCESS != ret)
|
|
1568
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1569
|
+
|
|
1570
|
+
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, iv, iv_len);
|
|
1571
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1572
|
+
memset(key_id, 0, sizeof(key_id));
|
|
1573
|
+
|
|
1574
|
+
if (EDHOC_SUCCESS != ret)
|
|
1575
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1576
|
+
|
|
1577
|
+
/* Generate AAD_3. */
|
|
1578
|
+
struct enc_structure cose_enc_0 = {
|
|
1579
|
+
._enc_structure_protected.value = NULL,
|
|
1580
|
+
._enc_structure_protected.len = 0,
|
|
1581
|
+
._enc_structure_external_aad.value = ctx->th,
|
|
1582
|
+
._enc_structure_external_aad.len = ctx->th_len,
|
|
1583
|
+
};
|
|
1584
|
+
|
|
1585
|
+
len = 0;
|
|
1586
|
+
ret = cbor_encode_enc_structure(aad, aad_len, &cose_enc_0, &len);
|
|
1587
|
+
|
|
1588
|
+
if (EDHOC_SUCCESS != ret)
|
|
1589
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1590
|
+
|
|
1591
|
+
return EDHOC_SUCCESS;
|
|
1592
|
+
}
|
|
1593
|
+
|
|
1594
|
+
static int comp_ciphertext(const struct edhoc_context *ctx, const uint8_t *key,
|
|
1595
|
+
size_t key_len, const uint8_t *iv, size_t iv_len,
|
|
1596
|
+
const uint8_t *aad, size_t aad_len,
|
|
1597
|
+
const uint8_t *ptxt, size_t ptxt_len, uint8_t *ctxt,
|
|
1598
|
+
size_t ctxt_size, size_t *ctxt_len)
|
|
1599
|
+
{
|
|
1600
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1601
|
+
|
|
1602
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
1603
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_ENCRYPT, key,
|
|
1604
|
+
key_len, key_id);
|
|
1605
|
+
|
|
1606
|
+
if (EDHOC_SUCCESS != ret)
|
|
1607
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1608
|
+
|
|
1609
|
+
ret = ctx->crypto.encrypt(ctx->user_ctx, key_id, iv, iv_len, aad,
|
|
1610
|
+
aad_len, ptxt, ptxt_len, ctxt, ctxt_size,
|
|
1611
|
+
ctxt_len);
|
|
1612
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1613
|
+
memset(key_id, 0, sizeof(key_id));
|
|
1614
|
+
|
|
1615
|
+
if (EDHOC_SUCCESS != ret)
|
|
1616
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1617
|
+
|
|
1618
|
+
return EDHOC_SUCCESS;
|
|
1619
|
+
}
|
|
1620
|
+
|
|
1621
|
+
static int comp_th_4(struct edhoc_context *ctx,
|
|
1622
|
+
const struct cbor_items *cbor_items, const uint8_t *ptxt,
|
|
1623
|
+
size_t ptxt_len)
|
|
1624
|
+
{
|
|
1625
|
+
if (NULL == ctx || NULL == cbor_items || NULL == ptxt || 0 == ptxt_len)
|
|
1626
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1627
|
+
|
|
1628
|
+
if (EDHOC_TH_STATE_3 != ctx->th_state)
|
|
1629
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
1630
|
+
|
|
1631
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1632
|
+
size_t len = 0;
|
|
1633
|
+
size_t offset = 0;
|
|
1634
|
+
|
|
1635
|
+
/* Calculate required buffer length for TH_4. */
|
|
1636
|
+
len = 0;
|
|
1637
|
+
len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
|
|
1638
|
+
len += ptxt_len;
|
|
1639
|
+
len += cbor_items->cred_i_len;
|
|
1640
|
+
|
|
1641
|
+
ALLOCATE_ARRAY(uint8_t, th_4, len);
|
|
1642
|
+
memset(th_4, 0, ALLOCATE_ARRAY_SIZEOF(th_4));
|
|
1643
|
+
|
|
1644
|
+
/* TH_3. */
|
|
1645
|
+
const struct zcbor_string cbor_th_3 = {
|
|
1646
|
+
.value = ctx->th,
|
|
1647
|
+
.len = ctx->th_len,
|
|
1648
|
+
};
|
|
1649
|
+
|
|
1650
|
+
len = 0;
|
|
1651
|
+
ret = cbor_encode_byte_string_type_bstr_type(
|
|
1652
|
+
&th_4[offset], ARRAY_SIZE_VLA(th_4), &cbor_th_3, &len);
|
|
1653
|
+
|
|
1654
|
+
if (EDHOC_SUCCESS != ret)
|
|
1655
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1656
|
+
|
|
1657
|
+
offset += len;
|
|
1658
|
+
|
|
1659
|
+
/* PLAINTEXT_3. */
|
|
1660
|
+
memcpy(&th_4[offset], ptxt, ptxt_len);
|
|
1661
|
+
offset += ptxt_len;
|
|
1662
|
+
|
|
1663
|
+
/* CRED_I. */
|
|
1664
|
+
memcpy(&th_4[offset], cbor_items->cred_i, cbor_items->cred_i_len);
|
|
1665
|
+
offset += cbor_items->cred_i_len;
|
|
1666
|
+
|
|
1667
|
+
if (ARRAY_SIZE_VLA(th_4) < offset)
|
|
1668
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1669
|
+
|
|
1670
|
+
/* Calculate TH_4. */
|
|
1671
|
+
ctx->th_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
1672
|
+
|
|
1673
|
+
size_t hash_length = 0;
|
|
1674
|
+
ret = ctx->crypto.hash(ctx->user_ctx, th_4, ARRAY_SIZE_VLA(th_4), ctx->th,
|
|
1675
|
+
ctx->th_len, &hash_length);
|
|
1676
|
+
|
|
1677
|
+
if (EDHOC_SUCCESS != ret || ctx->th_len != hash_length)
|
|
1678
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1679
|
+
|
|
1680
|
+
ctx->th_state = EDHOC_TH_STATE_4;
|
|
1681
|
+
return EDHOC_SUCCESS;
|
|
1682
|
+
}
|
|
1683
|
+
|
|
1684
|
+
static int gen_msg_3(const uint8_t *ctxt, size_t ctxt_len, uint8_t *msg_3,
|
|
1685
|
+
size_t msg_3_size, size_t *msg_3_len)
|
|
1686
|
+
{
|
|
1687
|
+
if (NULL == ctxt || 0 == ctxt_len || NULL == msg_3 || 0 == msg_3_size ||
|
|
1688
|
+
NULL == msg_3_len)
|
|
1689
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1690
|
+
|
|
1691
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1692
|
+
|
|
1693
|
+
const struct zcbor_string input_bstr = {
|
|
1694
|
+
.value = ctxt,
|
|
1695
|
+
.len = ctxt_len,
|
|
1696
|
+
};
|
|
1697
|
+
|
|
1698
|
+
ret = cbor_encode_message_3_CIPHERTEXT_3(msg_3, msg_3_size + 1,
|
|
1699
|
+
&input_bstr, msg_3_len);
|
|
1700
|
+
|
|
1701
|
+
if (EDHOC_SUCCESS != ret)
|
|
1702
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1703
|
+
|
|
1704
|
+
return EDHOC_SUCCESS;
|
|
1705
|
+
}
|
|
1706
|
+
|
|
1707
|
+
static int parse_msg_3(const uint8_t *msg_3, size_t msg_3_len,
|
|
1708
|
+
const uint8_t **ctxt_3, size_t *ctxt_3_len)
|
|
1709
|
+
{
|
|
1710
|
+
if (NULL == msg_3 || 0 == msg_3_len || NULL == ctxt_3 ||
|
|
1711
|
+
NULL == ctxt_3_len)
|
|
1712
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1713
|
+
|
|
1714
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1715
|
+
|
|
1716
|
+
size_t len = 0;
|
|
1717
|
+
struct zcbor_string dec_msg_3 = { 0 };
|
|
1718
|
+
ret = cbor_decode_message_3_CIPHERTEXT_3(msg_3, msg_3_len, &dec_msg_3,
|
|
1719
|
+
&len);
|
|
1720
|
+
|
|
1721
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1722
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1723
|
+
|
|
1724
|
+
*ctxt_3 = dec_msg_3.value;
|
|
1725
|
+
*ctxt_3_len = dec_msg_3.len;
|
|
1726
|
+
|
|
1727
|
+
return EDHOC_SUCCESS;
|
|
1728
|
+
}
|
|
1729
|
+
|
|
1730
|
+
static int decrypt_ciphertext(const struct edhoc_context *ctx,
|
|
1731
|
+
const uint8_t *key, size_t key_len,
|
|
1732
|
+
const uint8_t *iv, size_t iv_len,
|
|
1733
|
+
const uint8_t *aad, size_t aad_len,
|
|
1734
|
+
const uint8_t *ctxt, size_t ctxt_len,
|
|
1735
|
+
uint8_t *ptxt, size_t ptxt_len)
|
|
1736
|
+
{
|
|
1737
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1738
|
+
|
|
1739
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
1740
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_DECRYPT, key,
|
|
1741
|
+
key_len, key_id);
|
|
1742
|
+
|
|
1743
|
+
if (EDHOC_SUCCESS != ret)
|
|
1744
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1745
|
+
|
|
1746
|
+
size_t len = 0;
|
|
1747
|
+
ret = ctx->crypto.decrypt(ctx->user_ctx, key_id, iv, iv_len, aad,
|
|
1748
|
+
aad_len, ctxt, ctxt_len, ptxt, ptxt_len,
|
|
1749
|
+
&len);
|
|
1750
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1751
|
+
memset(key_id, 0, sizeof(key_id));
|
|
1752
|
+
|
|
1753
|
+
if (EDHOC_SUCCESS != ret || ptxt_len != len)
|
|
1754
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1755
|
+
|
|
1756
|
+
return EDHOC_SUCCESS;
|
|
1757
|
+
}
|
|
1758
|
+
|
|
1759
|
+
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
1760
|
+
size_t ptxt_len, struct plaintext *parsed_ptxt)
|
|
1761
|
+
{
|
|
1762
|
+
if (NULL == ctx || NULL == ptxt || 0 == ptxt_len || NULL == parsed_ptxt)
|
|
1763
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1764
|
+
|
|
1765
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1766
|
+
size_t len = 0;
|
|
1767
|
+
|
|
1768
|
+
struct plaintext_3 cbor_ptxt_3 = { 0 };
|
|
1769
|
+
ret = cbor_decode_plaintext_3(ptxt, ptxt_len, &cbor_ptxt_3, &len);
|
|
1770
|
+
|
|
1771
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1772
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1773
|
+
|
|
1774
|
+
/* ID_CRED_I */
|
|
1775
|
+
switch (cbor_ptxt_3._plaintext_3_ID_CRED_I_choice) {
|
|
1776
|
+
case _plaintext_3_ID_CRED_I_int: {
|
|
1777
|
+
parsed_ptxt->auth_creds.label = EDHOC_COSE_HEADER_KID;
|
|
1778
|
+
parsed_ptxt->auth_creds.key_id.encode_type =
|
|
1779
|
+
EDHOC_ENCODE_TYPE_INTEGER;
|
|
1780
|
+
parsed_ptxt->auth_creds.key_id.key_id_int =
|
|
1781
|
+
cbor_ptxt_3._plaintext_3_ID_CRED_I_int;
|
|
1782
|
+
break;
|
|
1783
|
+
}
|
|
1784
|
+
|
|
1785
|
+
case _plaintext_3_ID_CRED_I_bstr:
|
|
1786
|
+
parsed_ptxt->auth_creds.label = EDHOC_COSE_HEADER_KID;
|
|
1787
|
+
parsed_ptxt->auth_creds.key_id.encode_type =
|
|
1788
|
+
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
1789
|
+
parsed_ptxt->auth_creds.key_id.key_id_bstr_length =
|
|
1790
|
+
cbor_ptxt_3._plaintext_3_ID_CRED_I_bstr.len;
|
|
1791
|
+
memcpy(parsed_ptxt->auth_creds.key_id.key_id_bstr,
|
|
1792
|
+
cbor_ptxt_3._plaintext_3_ID_CRED_I_bstr.value,
|
|
1793
|
+
cbor_ptxt_3._plaintext_3_ID_CRED_I_bstr.len);
|
|
1794
|
+
break;
|
|
1795
|
+
|
|
1796
|
+
case _plaintext_3_ID_CRED_I__map: {
|
|
1797
|
+
const struct map *cbor_map =
|
|
1798
|
+
&cbor_ptxt_3._plaintext_3_ID_CRED_I__map;
|
|
1799
|
+
|
|
1800
|
+
if (cbor_map->_map_x5chain_present) {
|
|
1801
|
+
const struct COSE_X509_ *cose_x509 =
|
|
1802
|
+
&cbor_map->_map_x5chain._map_x5chain;
|
|
1803
|
+
|
|
1804
|
+
parsed_ptxt->auth_creds.label =
|
|
1805
|
+
EDHOC_COSE_HEADER_X509_CHAIN;
|
|
1806
|
+
|
|
1807
|
+
switch (cose_x509->_COSE_X509_choice) {
|
|
1808
|
+
case _COSE_X509_bstr:
|
|
1809
|
+
parsed_ptxt->auth_creds.x509_chain.nr_of_certs =
|
|
1810
|
+
1;
|
|
1811
|
+
parsed_ptxt->auth_creds.x509_chain.cert[0] =
|
|
1812
|
+
cose_x509->_COSE_X509_bstr.value;
|
|
1813
|
+
parsed_ptxt->auth_creds.x509_chain.cert_len[0] =
|
|
1814
|
+
cose_x509->_COSE_X509_bstr.len;
|
|
1815
|
+
break;
|
|
1816
|
+
|
|
1817
|
+
case _COSE_X509__certs: {
|
|
1818
|
+
parsed_ptxt->auth_creds.x509_chain.nr_of_certs =
|
|
1819
|
+
cose_x509->_COSE_X509__certs_certs_count;
|
|
1820
|
+
|
|
1821
|
+
if (ARRAY_SIZE(parsed_ptxt->auth_creds
|
|
1822
|
+
.x509_chain.cert) <
|
|
1823
|
+
cose_x509->_COSE_X509__certs_certs_count)
|
|
1824
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1825
|
+
|
|
1826
|
+
for (size_t i = 0;
|
|
1827
|
+
i <
|
|
1828
|
+
cose_x509->_COSE_X509__certs_certs_count;
|
|
1829
|
+
++i) {
|
|
1830
|
+
parsed_ptxt->auth_creds.x509_chain
|
|
1831
|
+
.cert[i] =
|
|
1832
|
+
cose_x509
|
|
1833
|
+
->_COSE_X509__certs_certs
|
|
1834
|
+
[i]
|
|
1835
|
+
.value;
|
|
1836
|
+
parsed_ptxt->auth_creds.x509_chain
|
|
1837
|
+
.cert_len[i] =
|
|
1838
|
+
cose_x509
|
|
1839
|
+
->_COSE_X509__certs_certs
|
|
1840
|
+
[i]
|
|
1841
|
+
.len;
|
|
1842
|
+
}
|
|
1843
|
+
|
|
1844
|
+
break;
|
|
1845
|
+
}
|
|
1846
|
+
}
|
|
1847
|
+
|
|
1848
|
+
break;
|
|
1849
|
+
}
|
|
1850
|
+
|
|
1851
|
+
if (cbor_map->_map_x5t_present) {
|
|
1852
|
+
parsed_ptxt->auth_creds.label =
|
|
1853
|
+
EDHOC_COSE_HEADER_X509_HASH;
|
|
1854
|
+
|
|
1855
|
+
const struct COSE_CertHash *cose_x509 =
|
|
1856
|
+
&cbor_map->_map_x5t._map_x5t;
|
|
1857
|
+
|
|
1858
|
+
parsed_ptxt->auth_creds.x509_hash.cert_fp =
|
|
1859
|
+
cose_x509->_COSE_CertHash_hashValue.value;
|
|
1860
|
+
parsed_ptxt->auth_creds.x509_hash.cert_fp_len =
|
|
1861
|
+
cose_x509->_COSE_CertHash_hashValue.len;
|
|
1862
|
+
|
|
1863
|
+
switch (cose_x509->_COSE_CertHash_hashAlg_choice) {
|
|
1864
|
+
case _COSE_CertHash_hashAlg_int:
|
|
1865
|
+
parsed_ptxt->auth_creds.x509_hash.encode_type =
|
|
1866
|
+
EDHOC_ENCODE_TYPE_INTEGER;
|
|
1867
|
+
parsed_ptxt->auth_creds.x509_hash.alg_int =
|
|
1868
|
+
cose_x509->_COSE_CertHash_hashAlg_int;
|
|
1869
|
+
break;
|
|
1870
|
+
case _COSE_CertHash_hashAlg_tstr:
|
|
1871
|
+
if (ARRAY_SIZE(parsed_ptxt->auth_creds.x509_hash
|
|
1872
|
+
.alg_bstr) <
|
|
1873
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr.len)
|
|
1874
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1875
|
+
|
|
1876
|
+
parsed_ptxt->auth_creds.x509_hash.encode_type =
|
|
1877
|
+
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
1878
|
+
parsed_ptxt->auth_creds.x509_hash
|
|
1879
|
+
.alg_bstr_length =
|
|
1880
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr
|
|
1881
|
+
.len;
|
|
1882
|
+
memcpy(parsed_ptxt->auth_creds.x509_hash
|
|
1883
|
+
.alg_bstr,
|
|
1884
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr
|
|
1885
|
+
.value,
|
|
1886
|
+
cose_x509->_COSE_CertHash_hashAlg_tstr
|
|
1887
|
+
.len);
|
|
1888
|
+
break;
|
|
1889
|
+
default:
|
|
1890
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1891
|
+
}
|
|
1892
|
+
|
|
1893
|
+
break;
|
|
1894
|
+
}
|
|
1895
|
+
}
|
|
1896
|
+
}
|
|
1897
|
+
|
|
1898
|
+
/* Sign_or_MAC_3 */
|
|
1899
|
+
parsed_ptxt->sign_or_mac =
|
|
1900
|
+
cbor_ptxt_3._plaintext_3_Signature_or_MAC_3.value;
|
|
1901
|
+
parsed_ptxt->sign_or_mac_len =
|
|
1902
|
+
cbor_ptxt_3._plaintext_3_Signature_or_MAC_3.len;
|
|
1903
|
+
|
|
1904
|
+
/* EAD_3 if present */
|
|
1905
|
+
if (cbor_ptxt_3._plaintext_3_EAD_3_present) {
|
|
1906
|
+
ctx->nr_of_ead_tokens =
|
|
1907
|
+
cbor_ptxt_3._plaintext_3_EAD_3._ead_x_count;
|
|
1908
|
+
|
|
1909
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1910
|
+
ctx->ead_token[i].label =
|
|
1911
|
+
cbor_ptxt_3._plaintext_3_EAD_3._ead_x[i]
|
|
1912
|
+
._ead_x_ead_label;
|
|
1913
|
+
ctx->ead_token[i].value =
|
|
1914
|
+
cbor_ptxt_3._plaintext_3_EAD_3._ead_x[i]
|
|
1915
|
+
._ead_x_ead_value.value;
|
|
1916
|
+
ctx->ead_token[i].value_len =
|
|
1917
|
+
cbor_ptxt_3._plaintext_3_EAD_3._ead_x[i]
|
|
1918
|
+
._ead_x_ead_value.len;
|
|
1919
|
+
}
|
|
1920
|
+
}
|
|
1921
|
+
|
|
1922
|
+
return EDHOC_SUCCESS;
|
|
1923
|
+
}
|
|
1924
|
+
|
|
1925
|
+
static int verify_sign_or_mac_3(const struct edhoc_context *ctx,
|
|
1926
|
+
const struct cbor_items *cbor_items,
|
|
1927
|
+
const struct plaintext *parsed_ptxt,
|
|
1928
|
+
const uint8_t *pub_key, size_t pub_key_len,
|
|
1929
|
+
const uint8_t *mac_3, size_t mac_3_len)
|
|
1930
|
+
{
|
|
1931
|
+
if (NULL == ctx || NULL == cbor_items || NULL == parsed_ptxt ||
|
|
1932
|
+
NULL == pub_key || 0 == pub_key_len || NULL == mac_3 ||
|
|
1933
|
+
0 == mac_3_len)
|
|
1934
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1935
|
+
|
|
1936
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1937
|
+
|
|
1938
|
+
switch (ctx->method) {
|
|
1939
|
+
case EDHOC_METHOD_0:
|
|
1940
|
+
case EDHOC_METHOD_1: {
|
|
1941
|
+
size_t len = 0;
|
|
1942
|
+
|
|
1943
|
+
const struct sig_structure cose_sign_1 = {
|
|
1944
|
+
._sig_structure_protected.value = cbor_items->id_cred_i,
|
|
1945
|
+
._sig_structure_protected.len =
|
|
1946
|
+
cbor_items->id_cred_i_len,
|
|
1947
|
+
._sig_structure_external_aad.value = cbor_items->th_3,
|
|
1948
|
+
._sig_structure_external_aad.len =
|
|
1949
|
+
cbor_items->th_3_len + cbor_items->cred_i_len +
|
|
1950
|
+
cbor_items->ead_3_len,
|
|
1951
|
+
._sig_structure_payload.value = mac_3,
|
|
1952
|
+
._sig_structure_payload.len = mac_3_len,
|
|
1953
|
+
};
|
|
1954
|
+
|
|
1955
|
+
len = 0;
|
|
1956
|
+
len += sizeof("Signature1") +
|
|
1957
|
+
cbor_tstr_overhead(sizeof("Signature1"));
|
|
1958
|
+
len += cbor_items->id_cred_i_len +
|
|
1959
|
+
cbor_bstr_overhead(cbor_items->id_cred_i_len);
|
|
1960
|
+
len += cbor_items->th_3_len + cbor_items->cred_i_len +
|
|
1961
|
+
cbor_items->ead_3_len +
|
|
1962
|
+
cbor_bstr_overhead(cbor_items->th_3_len +
|
|
1963
|
+
cbor_items->cred_i_len +
|
|
1964
|
+
cbor_items->ead_3_len);
|
|
1965
|
+
len += mac_3_len + cbor_bstr_overhead(mac_3_len);
|
|
1966
|
+
|
|
1967
|
+
ALLOCATE_ARRAY(uint8_t, cose_sign_1_buf, len);
|
|
1968
|
+
memset(cose_sign_1_buf, 0, ALLOCATE_ARRAY_SIZEOF(cose_sign_1_buf));
|
|
1969
|
+
|
|
1970
|
+
len = 0;
|
|
1971
|
+
ret = cbor_encode_sig_structure(cose_sign_1_buf,
|
|
1972
|
+
ARRAY_SIZE_VLA(cose_sign_1_buf),
|
|
1973
|
+
&cose_sign_1, &len);
|
|
1974
|
+
|
|
1975
|
+
if (ZCBOR_SUCCESS != ret)
|
|
1976
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1977
|
+
|
|
1978
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
1979
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_VERIFY,
|
|
1980
|
+
pub_key, pub_key_len, key_id);
|
|
1981
|
+
|
|
1982
|
+
if (EDHOC_SUCCESS != ret)
|
|
1983
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1984
|
+
|
|
1985
|
+
ret = ctx->crypto.verify(ctx->user_ctx, key_id, cose_sign_1_buf,
|
|
1986
|
+
len, parsed_ptxt->sign_or_mac,
|
|
1987
|
+
parsed_ptxt->sign_or_mac_len);
|
|
1988
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1989
|
+
|
|
1990
|
+
if (EDHOC_SUCCESS != ret)
|
|
1991
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1992
|
+
|
|
1993
|
+
return EDHOC_SUCCESS;
|
|
1994
|
+
}
|
|
1995
|
+
|
|
1996
|
+
case EDHOC_METHOD_2:
|
|
1997
|
+
case EDHOC_METHOD_3: {
|
|
1998
|
+
if (mac_3_len != parsed_ptxt->sign_or_mac_len ||
|
|
1999
|
+
0 != memcmp(parsed_ptxt->sign_or_mac, mac_3, mac_3_len))
|
|
2000
|
+
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
|
|
2001
|
+
|
|
2002
|
+
return EDHOC_SUCCESS;
|
|
2003
|
+
}
|
|
2004
|
+
default:
|
|
2005
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
2006
|
+
}
|
|
2007
|
+
}
|
|
2008
|
+
|
|
2009
|
+
static int kid_compact_encoding(const struct edhoc_auth_creds *auth_cred,
|
|
2010
|
+
struct cbor_items *cbor_items)
|
|
2011
|
+
{
|
|
2012
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
2013
|
+
size_t len = 0;
|
|
2014
|
+
|
|
2015
|
+
cbor_items->id_cred_i_is_comp_enc = true;
|
|
2016
|
+
|
|
2017
|
+
switch (auth_cred->key_id.encode_type) {
|
|
2018
|
+
case EDHOC_ENCODE_TYPE_INTEGER: {
|
|
2019
|
+
cbor_items->id_cred_i_enc_type = EDHOC_ENCODE_TYPE_INTEGER;
|
|
2020
|
+
if (true == auth_cred->key_id.cred_is_cbor) {
|
|
2021
|
+
cbor_items->id_cred_i_int =
|
|
2022
|
+
auth_cred->key_id.key_id_int;
|
|
2023
|
+
} else {
|
|
2024
|
+
len = 0;
|
|
2025
|
+
ret = cbor_encode_integer_type_int_type(
|
|
2026
|
+
(uint8_t *)&cbor_items->id_cred_i_int,
|
|
2027
|
+
sizeof(cbor_items->id_cred_i_int),
|
|
2028
|
+
&auth_cred->key_id.key_id_int, &len);
|
|
2029
|
+
|
|
2030
|
+
if (ZCBOR_SUCCESS != ret)
|
|
2031
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2032
|
+
}
|
|
2033
|
+
break;
|
|
2034
|
+
}
|
|
2035
|
+
|
|
2036
|
+
case EDHOC_ENCODE_TYPE_BYTE_STRING: {
|
|
2037
|
+
cbor_items->id_cred_i_enc_type = EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
2038
|
+
|
|
2039
|
+
if (true == auth_cred->key_id.cred_is_cbor) {
|
|
2040
|
+
if (1 == auth_cred->key_id.key_id_bstr_length) {
|
|
2041
|
+
int32_t val = auth_cred->key_id.key_id_bstr[0];
|
|
2042
|
+
int32_t result = 0;
|
|
2043
|
+
|
|
2044
|
+
len = 0;
|
|
2045
|
+
ret = cbor_decode_integer_type_int_type(
|
|
2046
|
+
(uint8_t *)&val, sizeof(val), &result,
|
|
2047
|
+
&len);
|
|
2048
|
+
|
|
2049
|
+
if (ZCBOR_SUCCESS != ret)
|
|
2050
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2051
|
+
|
|
2052
|
+
if (true == is_cbor_one_byte_int(result)) {
|
|
2053
|
+
cbor_items->id_cred_i_int = val;
|
|
2054
|
+
cbor_items->id_cred_i_enc_type =
|
|
2055
|
+
EDHOC_ENCODE_TYPE_INTEGER;
|
|
2056
|
+
break;
|
|
2057
|
+
}
|
|
2058
|
+
}
|
|
2059
|
+
|
|
2060
|
+
cbor_items->id_cred_i_bstr_len =
|
|
2061
|
+
auth_cred->key_id.key_id_bstr_length;
|
|
2062
|
+
memcpy(cbor_items->id_cred_i_bstr,
|
|
2063
|
+
auth_cred->key_id.key_id_bstr,
|
|
2064
|
+
auth_cred->key_id.key_id_bstr_length);
|
|
2065
|
+
} else {
|
|
2066
|
+
const struct zcbor_string input = {
|
|
2067
|
+
.value = auth_cred->key_id.key_id_bstr,
|
|
2068
|
+
.len = auth_cred->key_id.key_id_bstr_length,
|
|
2069
|
+
};
|
|
2070
|
+
|
|
2071
|
+
ret = cbor_encode_byte_string_type_bstr_type(
|
|
2072
|
+
cbor_items->id_cred_i_bstr,
|
|
2073
|
+
ARRAY_SIZE(cbor_items->id_cred_i_bstr) - 1,
|
|
2074
|
+
&input, &cbor_items->id_cred_i_bstr_len);
|
|
2075
|
+
|
|
2076
|
+
if (ZCBOR_SUCCESS != ret)
|
|
2077
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2078
|
+
}
|
|
2079
|
+
break;
|
|
2080
|
+
}
|
|
2081
|
+
default:
|
|
2082
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
2083
|
+
}
|
|
2084
|
+
|
|
2085
|
+
return EDHOC_SUCCESS;
|
|
2086
|
+
}
|
|
2087
|
+
|
|
2088
|
+
static int comp_salt_4e3m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
2089
|
+
size_t salt_len)
|
|
2090
|
+
{
|
|
2091
|
+
if (NULL == ctx || NULL == salt || 0 == salt_len)
|
|
2092
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
2093
|
+
|
|
2094
|
+
if (EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
2095
|
+
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
2096
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
2097
|
+
|
|
2098
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
2099
|
+
const size_t hash_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
2100
|
+
|
|
2101
|
+
const struct info input_info = {
|
|
2102
|
+
._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_4E3M,
|
|
2103
|
+
._info_context.value = ctx->th,
|
|
2104
|
+
._info_context.len = ctx->th_len,
|
|
2105
|
+
._info_length = (uint32_t)hash_len,
|
|
2106
|
+
};
|
|
2107
|
+
|
|
2108
|
+
size_t len = 0;
|
|
2109
|
+
len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_4E3M);
|
|
2110
|
+
len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
|
|
2111
|
+
len += cbor_int_mem_req((int32_t)hash_len);
|
|
2112
|
+
|
|
2113
|
+
ALLOCATE_ARRAY(uint8_t, info, len);
|
|
2114
|
+
memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
|
|
2115
|
+
|
|
2116
|
+
len = 0;
|
|
2117
|
+
ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
|
|
2118
|
+
|
|
2119
|
+
if (ZCBOR_SUCCESS != ret || ARRAY_SIZE_VLA(info) != len)
|
|
2120
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2121
|
+
|
|
2122
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
2123
|
+
ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
2124
|
+
ctx->prk_len, key_id);
|
|
2125
|
+
|
|
2126
|
+
if (EDHOC_SUCCESS != ret)
|
|
2127
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2128
|
+
|
|
2129
|
+
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, ARRAY_SIZE_VLA(info),
|
|
2130
|
+
salt, salt_len);
|
|
2131
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
2132
|
+
|
|
2133
|
+
if (EDHOC_SUCCESS != ret)
|
|
2134
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2135
|
+
|
|
2136
|
+
return EDHOC_SUCCESS;
|
|
2137
|
+
}
|
|
2138
|
+
|
|
2139
|
+
static int comp_giy(enum edhoc_role role, struct edhoc_context *ctx,
|
|
2140
|
+
const struct edhoc_auth_creds *auth_cred,
|
|
2141
|
+
const uint8_t *pub_key, size_t pub_key_len, uint8_t *giy,
|
|
2142
|
+
size_t giy_len)
|
|
2143
|
+
{
|
|
2144
|
+
if (NULL == ctx || NULL == auth_cred || NULL == giy || 0 == giy_len)
|
|
2145
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
2146
|
+
|
|
2147
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
2148
|
+
|
|
2149
|
+
switch (role) {
|
|
2150
|
+
case initiator: {
|
|
2151
|
+
size_t secret_len = 0;
|
|
2152
|
+
ret = ctx->crypto.key_agreement(ctx->user_ctx,
|
|
2153
|
+
auth_cred->priv_key_id,
|
|
2154
|
+
ctx->dh_peer_pub_key,
|
|
2155
|
+
ctx->dh_peer_pub_key_len, giy,
|
|
2156
|
+
giy_len, &secret_len);
|
|
2157
|
+
|
|
2158
|
+
if (EDHOC_SUCCESS != ret || secret_len != giy_len)
|
|
2159
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2160
|
+
|
|
2161
|
+
return EDHOC_SUCCESS;
|
|
2162
|
+
}
|
|
2163
|
+
|
|
2164
|
+
case responder: {
|
|
2165
|
+
uint8_t key_id[EDHOC_KID_LEN] = { 0 };
|
|
2166
|
+
ret = ctx->keys.generate_key(ctx->user_ctx,
|
|
2167
|
+
EDHOC_KT_KEY_AGREEMENT,
|
|
2168
|
+
ctx->dh_priv_key,
|
|
2169
|
+
ctx->dh_priv_key_len, key_id);
|
|
2170
|
+
ctx->dh_priv_key_len = 0;
|
|
2171
|
+
memset(ctx->dh_priv_key, 0, ARRAY_SIZE(ctx->dh_priv_key));
|
|
2172
|
+
|
|
2173
|
+
if (EDHOC_SUCCESS != ret)
|
|
2174
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2175
|
+
|
|
2176
|
+
size_t secret_len = 0;
|
|
2177
|
+
ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id, pub_key,
|
|
2178
|
+
pub_key_len, giy, giy_len,
|
|
2179
|
+
&secret_len);
|
|
2180
|
+
|
|
2181
|
+
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
2182
|
+
memset(key_id, 0, sizeof(key_id));
|
|
2183
|
+
|
|
2184
|
+
if (EDHOC_SUCCESS != ret || secret_len != giy_len)
|
|
2185
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2186
|
+
|
|
2187
|
+
return EDHOC_SUCCESS;
|
|
2188
|
+
}
|
|
2189
|
+
|
|
2190
|
+
default:
|
|
2191
|
+
return EDHOC_ERROR_NOT_PERMITTED;
|
|
2192
|
+
}
|
|
2193
|
+
|
|
2194
|
+
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
2195
|
+
}
|
|
2196
|
+
|
|
2197
|
+
/* Module interface function definitions ----------------------------------- */
|
|
2198
|
+
|
|
2199
|
+
/**
|
|
2200
|
+
* Steps for composition of message 3:
|
|
2201
|
+
* 1. Choose most preferred cipher suite.
|
|
2202
|
+
* 2. Compose EAD_3 if present.
|
|
2203
|
+
* 3. Fetch authentication credentials.
|
|
2204
|
+
* 4. Compute K_3, IV_3 and AAD_3.
|
|
2205
|
+
* 5. Compute PRK_4e3m.
|
|
2206
|
+
* 6a. Compute required buffer length for context_3.
|
|
2207
|
+
* 6b. Cborise items required by context_3.
|
|
2208
|
+
* 6c. Compute Message Authentication Code (MAC_3).
|
|
2209
|
+
* 7. Compute signature if needed (Signature_or_MAC_3).
|
|
2210
|
+
* 8. Prepare plaintext (PLAINTEXT_3).
|
|
2211
|
+
* 9. Compute ciphertext.
|
|
2212
|
+
* 10. Compute transcript hash 4.
|
|
2213
|
+
* 11. Generate edhoc message 3.
|
|
2214
|
+
* 12. Clean-up EAD tokens.
|
|
2215
|
+
*/
|
|
2216
|
+
int edhoc_message_3_compose(struct edhoc_context *ctx, uint8_t *msg_3,
|
|
2217
|
+
size_t msg_3_size, size_t *msg_3_len)
|
|
2218
|
+
{
|
|
2219
|
+
if (NULL == ctx || NULL == msg_3 || 0 == msg_3_size ||
|
|
2220
|
+
NULL == msg_3_len)
|
|
2221
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
2222
|
+
|
|
2223
|
+
if (EDHOC_SM_VERIFIED_M2 != ctx->status ||
|
|
2224
|
+
EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
2225
|
+
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
2226
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
2227
|
+
|
|
2228
|
+
ctx->status = EDHOC_SM_ABORTED;
|
|
2229
|
+
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
2230
|
+
|
|
2231
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
2232
|
+
|
|
2233
|
+
/* 1. Choose most preferred cipher suite. */
|
|
2234
|
+
const struct edhoc_cipher_suite csuite =
|
|
2235
|
+
ctx->csuite[ctx->chosen_csuite_idx];
|
|
2236
|
+
|
|
2237
|
+
/* 2. Compose EAD_3 if present. */
|
|
2238
|
+
if (NULL != ctx->ead.compose && 0 != ARRAY_SIZE(ctx->ead_token) - 1) {
|
|
2239
|
+
ret = ctx->ead.compose(ctx->user_ctx, EDHOC_MSG_3,
|
|
2240
|
+
ctx->ead_token,
|
|
2241
|
+
ARRAY_SIZE(ctx->ead_token) - 1,
|
|
2242
|
+
&ctx->nr_of_ead_tokens);
|
|
2243
|
+
|
|
2244
|
+
if (EDHOC_SUCCESS != ret ||
|
|
2245
|
+
ARRAY_SIZE(ctx->ead_token) - 1 < ctx->nr_of_ead_tokens)
|
|
2246
|
+
return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
|
|
2247
|
+
|
|
2248
|
+
if (NULL != ctx->logger) {
|
|
2249
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
2250
|
+
ctx->logger(ctx->user_ctx,
|
|
2251
|
+
"EAD_3 compose label",
|
|
2252
|
+
(const uint8_t *)&ctx->ead_token[i]
|
|
2253
|
+
.label,
|
|
2254
|
+
sizeof(ctx->ead_token[i].label));
|
|
2255
|
+
|
|
2256
|
+
if (0 != ctx->ead_token[i].value_len)
|
|
2257
|
+
ctx->logger(
|
|
2258
|
+
ctx->user_ctx,
|
|
2259
|
+
"EAD_3 compose value",
|
|
2260
|
+
ctx->ead_token[i].value,
|
|
2261
|
+
ctx->ead_token[i].value_len);
|
|
2262
|
+
}
|
|
2263
|
+
}
|
|
2264
|
+
}
|
|
2265
|
+
|
|
2266
|
+
/* 3. Fetch authentication credentials. */
|
|
2267
|
+
struct edhoc_auth_creds auth_creds = { 0 };
|
|
2268
|
+
ret = ctx->cred.fetch(ctx->user_ctx, &auth_creds);
|
|
2269
|
+
|
|
2270
|
+
if (EDHOC_SUCCESS != ret)
|
|
2271
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
2272
|
+
|
|
2273
|
+
/* 4. Compute K_3, IV_3 and AAD_3. */
|
|
2274
|
+
ALLOCATE_ARRAY(uint8_t, key, csuite.aead_key_length);
|
|
2275
|
+
memset(key, 0, ALLOCATE_ARRAY_SIZEOF(key));
|
|
2276
|
+
|
|
2277
|
+
ALLOCATE_ARRAY(uint8_t, iv, csuite.aead_iv_length);
|
|
2278
|
+
memset(iv, 0, ALLOCATE_ARRAY_SIZEOF(iv));
|
|
2279
|
+
|
|
2280
|
+
size_t aad_len = 0;
|
|
2281
|
+
ret = comp_aad_3_len(ctx, &aad_len);
|
|
2282
|
+
|
|
2283
|
+
if (EDHOC_SUCCESS != ret)
|
|
2284
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
2285
|
+
|
|
2286
|
+
ALLOCATE_ARRAY(uint8_t, aad, aad_len);
|
|
2287
|
+
memset(aad, 0, ALLOCATE_ARRAY_SIZEOF(aad));
|
|
2288
|
+
|
|
2289
|
+
ret = comp_key_iv_aad(ctx, key, ARRAY_SIZE_VLA(key), iv, ARRAY_SIZE_VLA(iv),
|
|
2290
|
+
aad, ARRAY_SIZE_VLA(aad));
|
|
2291
|
+
|
|
2292
|
+
if (EDHOC_SUCCESS != ret)
|
|
2293
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2294
|
+
|
|
2295
|
+
if (NULL != ctx->logger) {
|
|
2296
|
+
ctx->logger(ctx->user_ctx, "K_3", key, ARRAY_SIZE_VLA(key));
|
|
2297
|
+
ctx->logger(ctx->user_ctx, "IV_3", iv, ARRAY_SIZE_VLA(iv));
|
|
2298
|
+
ctx->logger(ctx->user_ctx, "AAD_3", aad, ARRAY_SIZE_VLA(aad));
|
|
2299
|
+
}
|
|
2300
|
+
|
|
2301
|
+
/* 5. Compute PRK_4e3m. */
|
|
2302
|
+
ret = comp_prk_4e3m(initiator, ctx, &auth_creds, NULL, 0);
|
|
2303
|
+
|
|
2304
|
+
if (EDHOC_SUCCESS != ret)
|
|
2305
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2306
|
+
|
|
2307
|
+
if (NULL != ctx->logger)
|
|
2308
|
+
ctx->logger(ctx->user_ctx, "PRK_4e3m", ctx->prk, ctx->prk_len);
|
|
2309
|
+
|
|
2310
|
+
/* 6a. Compute required buffer length for context_3. */
|
|
2311
|
+
size_t context_3_len = 0;
|
|
2312
|
+
ret = comp_mac_3_input_len(ctx, &auth_creds, &context_3_len);
|
|
2313
|
+
|
|
2314
|
+
if (EDHOC_SUCCESS != ret)
|
|
2315
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2316
|
+
|
|
2317
|
+
ALLOCATE_ARRAY(uint8_t, mac_3_content, sizeof(struct cbor_items) + context_3_len);
|
|
2318
|
+
memset(mac_3_content, 0, ALLOCATE_ARRAY_SIZEOF(mac_3_content));
|
|
2319
|
+
|
|
2320
|
+
struct cbor_items *cbor_items = (struct cbor_items *)mac_3_content;
|
|
2321
|
+
cbor_items->buf_len = context_3_len;
|
|
2322
|
+
|
|
2323
|
+
/* 6b. Cborise items required by context_3. */
|
|
2324
|
+
ret = gen_mac_3_context(ctx, &auth_creds, cbor_items);
|
|
2325
|
+
|
|
2326
|
+
if (EDHOC_SUCCESS != ret)
|
|
2327
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2328
|
+
|
|
2329
|
+
if (NULL != ctx->logger) {
|
|
2330
|
+
ctx->logger(ctx->user_ctx, "ID_CRED_I", cbor_items->id_cred_i,
|
|
2331
|
+
cbor_items->id_cred_i_len);
|
|
2332
|
+
ctx->logger(ctx->user_ctx, "TH_3", cbor_items->th_3,
|
|
2333
|
+
cbor_items->th_3_len);
|
|
2334
|
+
ctx->logger(ctx->user_ctx, "CRED_I", cbor_items->cred_i,
|
|
2335
|
+
cbor_items->cred_i_len);
|
|
2336
|
+
ctx->logger(ctx->user_ctx, "context_3", cbor_items->buf,
|
|
2337
|
+
cbor_items->buf_len);
|
|
2338
|
+
}
|
|
2339
|
+
|
|
2340
|
+
/* 6c. Compute Message Authentication Code (MAC_3). */
|
|
2341
|
+
size_t mac_3_len = 0;
|
|
2342
|
+
ret = comp_mac_3_len(initiator, ctx, &mac_3_len);
|
|
2343
|
+
|
|
2344
|
+
if (EDHOC_SUCCESS != ret)
|
|
2345
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2346
|
+
|
|
2347
|
+
ALLOCATE_ARRAY(uint8_t, mac_3, mac_3_len);
|
|
2348
|
+
memset(mac_3, 0, ALLOCATE_ARRAY_SIZEOF(mac_3));
|
|
2349
|
+
|
|
2350
|
+
ret = comp_mac_3(ctx, cbor_items, mac_3, ARRAY_SIZE_VLA(mac_3));
|
|
2351
|
+
|
|
2352
|
+
if (EDHOC_SUCCESS != ret)
|
|
2353
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2354
|
+
|
|
2355
|
+
if (NULL != ctx->logger)
|
|
2356
|
+
ctx->logger(ctx->user_ctx, "MAC_3", mac_3, ARRAY_SIZE_VLA(mac_3));
|
|
2357
|
+
|
|
2358
|
+
/* 7. Compute signature if needed (Signature_or_MAC_3). */
|
|
2359
|
+
size_t sign_or_mac_len = 0;
|
|
2360
|
+
ret = comp_sign_or_mac_3_len(responder, ctx, &sign_or_mac_len);
|
|
2361
|
+
|
|
2362
|
+
if (EDHOC_SUCCESS != ret)
|
|
2363
|
+
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_3;
|
|
2364
|
+
|
|
2365
|
+
ALLOCATE_ARRAY(uint8_t, sign, sign_or_mac_len);
|
|
2366
|
+
memset(sign, 0, ALLOCATE_ARRAY_SIZEOF(sign));
|
|
2367
|
+
|
|
2368
|
+
ret = comp_sign_or_mac_3(ctx, &auth_creds, cbor_items, mac_3,
|
|
2369
|
+
ARRAY_SIZE_VLA(mac_3), sign, ARRAY_SIZE_VLA(sign));
|
|
2370
|
+
|
|
2371
|
+
if (EDHOC_SUCCESS != ret)
|
|
2372
|
+
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_3;
|
|
2373
|
+
|
|
2374
|
+
if (NULL != ctx->logger)
|
|
2375
|
+
ctx->logger(ctx->user_ctx, "Signature_or_MAC_3", sign,
|
|
2376
|
+
ARRAY_SIZE_VLA(sign));
|
|
2377
|
+
|
|
2378
|
+
/* 8. Prepare plaintext (PLAINTEXT_3). */
|
|
2379
|
+
size_t plaintext_len = 0;
|
|
2380
|
+
ret = comp_plaintext_3_len(ctx, cbor_items, ARRAY_SIZE_VLA(sign),
|
|
2381
|
+
&plaintext_len);
|
|
2382
|
+
|
|
2383
|
+
if (EDHOC_SUCCESS != ret)
|
|
2384
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
2385
|
+
|
|
2386
|
+
ALLOCATE_ARRAY(uint8_t, plaintext, plaintext_len);
|
|
2387
|
+
memset(plaintext, 0, ALLOCATE_ARRAY_SIZEOF(plaintext));
|
|
2388
|
+
|
|
2389
|
+
plaintext_len = 0;
|
|
2390
|
+
ret = prepare_plaintext_3(cbor_items, sign, ARRAY_SIZE_VLA(sign), plaintext,
|
|
2391
|
+
ARRAY_SIZE_VLA(plaintext), &plaintext_len);
|
|
2392
|
+
|
|
2393
|
+
if (EDHOC_SUCCESS != ret)
|
|
2394
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2395
|
+
|
|
2396
|
+
if (NULL != ctx->logger)
|
|
2397
|
+
ctx->logger(ctx->user_ctx, "PLAINTEXT_3", plaintext,
|
|
2398
|
+
plaintext_len);
|
|
2399
|
+
|
|
2400
|
+
/* 9. Compute ciphertext. */
|
|
2401
|
+
size_t ciphertext_len = 0;
|
|
2402
|
+
ALLOCATE_ARRAY(uint8_t, ciphertext, plaintext_len + csuite.aead_tag_length);
|
|
2403
|
+
memset(ciphertext, 0, ALLOCATE_ARRAY_SIZEOF(ciphertext));
|
|
2404
|
+
|
|
2405
|
+
ret = comp_ciphertext(ctx, key, ARRAY_SIZE_VLA(key), iv, ARRAY_SIZE_VLA(iv),
|
|
2406
|
+
aad, ARRAY_SIZE_VLA(aad), plaintext, plaintext_len,
|
|
2407
|
+
ciphertext, ARRAY_SIZE_VLA(ciphertext),
|
|
2408
|
+
&ciphertext_len);
|
|
2409
|
+
|
|
2410
|
+
if (EDHOC_SUCCESS != ret)
|
|
2411
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2412
|
+
|
|
2413
|
+
if (NULL != ctx->logger)
|
|
2414
|
+
ctx->logger(ctx->user_ctx, "CIPHERTEXT_3", ciphertext,
|
|
2415
|
+
ciphertext_len);
|
|
2416
|
+
|
|
2417
|
+
/* 10. Compute transcript hash 4. */
|
|
2418
|
+
ret = comp_th_4(ctx, cbor_items, plaintext, plaintext_len);
|
|
2419
|
+
|
|
2420
|
+
if (EDHOC_SUCCESS != ret)
|
|
2421
|
+
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
2422
|
+
|
|
2423
|
+
if (NULL != ctx->logger)
|
|
2424
|
+
ctx->logger(ctx->user_ctx, "TH_4", ctx->th, ctx->th_len);
|
|
2425
|
+
|
|
2426
|
+
/* 11. Generate edhoc message 3. */
|
|
2427
|
+
ret = gen_msg_3(ciphertext, ciphertext_len, msg_3, msg_3_size,
|
|
2428
|
+
msg_3_len);
|
|
2429
|
+
|
|
2430
|
+
if (EDHOC_SUCCESS != ret)
|
|
2431
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2432
|
+
|
|
2433
|
+
if (NULL != ctx->logger)
|
|
2434
|
+
ctx->logger(ctx->user_ctx, "message_3", msg_3, *msg_3_len);
|
|
2435
|
+
|
|
2436
|
+
/* 12. Clean-up EAD tokens. */
|
|
2437
|
+
ctx->nr_of_ead_tokens = 0;
|
|
2438
|
+
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
2439
|
+
|
|
2440
|
+
ctx->is_oscore_export_allowed = true;
|
|
2441
|
+
ctx->status = EDHOC_SM_COMPLETED;
|
|
2442
|
+
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
2443
|
+
return EDHOC_SUCCESS;
|
|
2444
|
+
}
|
|
2445
|
+
|
|
2446
|
+
/**
|
|
2447
|
+
* Steps for processing of message 3:
|
|
2448
|
+
* 1. Choose most preferred cipher suite.
|
|
2449
|
+
* 2. CBOR decode message 3.
|
|
2450
|
+
* 3. Compute K_3, IV_3 and AAD_3.
|
|
2451
|
+
* 4. Decrypt ciphertext.
|
|
2452
|
+
* 5. Parse CBOR plaintext (PLAINTEXT_3).
|
|
2453
|
+
* 6. Process EAD_3 if present.
|
|
2454
|
+
* 7. Verify if credentials from peer are trusted.
|
|
2455
|
+
* 8. Compute PRK_4e3m.
|
|
2456
|
+
* 9a. Compute required buffer length for context_3.
|
|
2457
|
+
* 9b. Cborise items required by context_3.
|
|
2458
|
+
* 9c. Compute Message Authentication Code (MAC_3).
|
|
2459
|
+
* 10. Verify Signature_or_MAC_3.
|
|
2460
|
+
* 11. Compute transcript hash 4.
|
|
2461
|
+
* 12. Clean-up EAD tokens.
|
|
2462
|
+
*/
|
|
2463
|
+
int edhoc_message_3_process(struct edhoc_context *ctx, const uint8_t *msg_3,
|
|
2464
|
+
size_t msg_3_len)
|
|
2465
|
+
{
|
|
2466
|
+
if (NULL == ctx || NULL == msg_3 || 0 == msg_3_len)
|
|
2467
|
+
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
2468
|
+
|
|
2469
|
+
if (EDHOC_SM_WAIT_M3 != ctx->status ||
|
|
2470
|
+
EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
2471
|
+
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
2472
|
+
return EDHOC_ERROR_BAD_STATE;
|
|
2473
|
+
|
|
2474
|
+
ctx->status = EDHOC_SM_ABORTED;
|
|
2475
|
+
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
2476
|
+
|
|
2477
|
+
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
2478
|
+
|
|
2479
|
+
/* 1. Choose most preferred cipher suite. */
|
|
2480
|
+
const struct edhoc_cipher_suite csuite =
|
|
2481
|
+
ctx->csuite[ctx->chosen_csuite_idx];
|
|
2482
|
+
|
|
2483
|
+
/* 2. CBOR decode message 3. */
|
|
2484
|
+
const uint8_t *ctxt = NULL;
|
|
2485
|
+
size_t ctxt_len = 0;
|
|
2486
|
+
|
|
2487
|
+
ret = parse_msg_3(msg_3, msg_3_len, &ctxt, &ctxt_len);
|
|
2488
|
+
|
|
2489
|
+
if (EDHOC_SUCCESS != ret)
|
|
2490
|
+
return EDHOC_ERROR_MSG_3_PROCESS_FAILURE;
|
|
2491
|
+
|
|
2492
|
+
/* 3. Compute K_3, IV_3 and AAD_3. */
|
|
2493
|
+
ALLOCATE_ARRAY(uint8_t, key, csuite.aead_key_length);
|
|
2494
|
+
memset(key, 0, ALLOCATE_ARRAY_SIZEOF(key));
|
|
2495
|
+
|
|
2496
|
+
ALLOCATE_ARRAY(uint8_t, iv, csuite.aead_iv_length);
|
|
2497
|
+
memset(iv, 0, ALLOCATE_ARRAY_SIZEOF(iv));
|
|
2498
|
+
|
|
2499
|
+
size_t aad_len = 0;
|
|
2500
|
+
ret = comp_aad_3_len(ctx, &aad_len);
|
|
2501
|
+
|
|
2502
|
+
if (EDHOC_SUCCESS != ret)
|
|
2503
|
+
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
2504
|
+
|
|
2505
|
+
ALLOCATE_ARRAY(uint8_t, aad, aad_len);
|
|
2506
|
+
memset(aad, 0, ALLOCATE_ARRAY_SIZEOF(aad));
|
|
2507
|
+
|
|
2508
|
+
ret = comp_key_iv_aad(ctx, key, ARRAY_SIZE_VLA(key), iv, ARRAY_SIZE_VLA(iv),
|
|
2509
|
+
aad, ARRAY_SIZE_VLA(aad));
|
|
2510
|
+
|
|
2511
|
+
if (EDHOC_SUCCESS != ret)
|
|
2512
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2513
|
+
|
|
2514
|
+
if (NULL != ctx->logger) {
|
|
2515
|
+
ctx->logger(ctx->user_ctx, "K_3", key, ARRAY_SIZE_VLA(key));
|
|
2516
|
+
ctx->logger(ctx->user_ctx, "IV_3", iv, ARRAY_SIZE_VLA(iv));
|
|
2517
|
+
ctx->logger(ctx->user_ctx, "AAD_3", aad, ARRAY_SIZE_VLA(aad));
|
|
2518
|
+
}
|
|
2519
|
+
|
|
2520
|
+
/* 4. Decrypt ciphertext. */
|
|
2521
|
+
ALLOCATE_ARRAY(uint8_t, ptxt, ctxt_len - csuite.aead_tag_length);
|
|
2522
|
+
memset(ptxt, 0, ALLOCATE_ARRAY_SIZEOF(ptxt));
|
|
2523
|
+
|
|
2524
|
+
ret = decrypt_ciphertext(ctx, key, ARRAY_SIZE_VLA(key), iv, ARRAY_SIZE_VLA(iv),
|
|
2525
|
+
aad, ARRAY_SIZE_VLA(aad), ctxt, ctxt_len, ptxt,
|
|
2526
|
+
ARRAY_SIZE_VLA(ptxt));
|
|
2527
|
+
|
|
2528
|
+
if (EDHOC_SUCCESS != ret)
|
|
2529
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2530
|
+
|
|
2531
|
+
if (NULL != ctx->logger)
|
|
2532
|
+
ctx->logger(ctx->user_ctx, "PLAINTEXT_3", ptxt,
|
|
2533
|
+
ARRAY_SIZE_VLA(ptxt));
|
|
2534
|
+
|
|
2535
|
+
/* 5. Parse CBOR plaintext (PLAINTEXT_3). */
|
|
2536
|
+
struct plaintext parsed_ptxt = { 0 };
|
|
2537
|
+
ret = parse_plaintext(ctx, ptxt, ARRAY_SIZE_VLA(ptxt), &parsed_ptxt);
|
|
2538
|
+
|
|
2539
|
+
if (EDHOC_SUCCESS != ret)
|
|
2540
|
+
return EDHOC_ERROR_CBOR_FAILURE;
|
|
2541
|
+
|
|
2542
|
+
/* 6. Process EAD_3 if present. */
|
|
2543
|
+
if (NULL != ctx->ead.process && 0 != ARRAY_SIZE(ctx->ead_token) - 1 &&
|
|
2544
|
+
0 != ctx->nr_of_ead_tokens) {
|
|
2545
|
+
ret = ctx->ead.process(ctx->user_ctx, EDHOC_MSG_3,
|
|
2546
|
+
ctx->ead_token, ctx->nr_of_ead_tokens);
|
|
2547
|
+
|
|
2548
|
+
if (EDHOC_SUCCESS != ret)
|
|
2549
|
+
return EDHOC_ERROR_EAD_PROCESS_FAILURE;
|
|
2550
|
+
|
|
2551
|
+
if (NULL != ctx->logger) {
|
|
2552
|
+
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
2553
|
+
ctx->logger(ctx->user_ctx,
|
|
2554
|
+
"EAD_3 process label",
|
|
2555
|
+
(const uint8_t *)&ctx->ead_token[i]
|
|
2556
|
+
.label,
|
|
2557
|
+
sizeof(ctx->ead_token[i].label));
|
|
2558
|
+
|
|
2559
|
+
if (0 != ctx->ead_token[i].value_len)
|
|
2560
|
+
ctx->logger(
|
|
2561
|
+
ctx->user_ctx,
|
|
2562
|
+
"EAD_3 process value",
|
|
2563
|
+
ctx->ead_token[i].value,
|
|
2564
|
+
ctx->ead_token[i].value_len);
|
|
2565
|
+
}
|
|
2566
|
+
}
|
|
2567
|
+
}
|
|
2568
|
+
|
|
2569
|
+
/* 7. Verify if credentials from peer are trusted. */
|
|
2570
|
+
const uint8_t *pub_key = NULL;
|
|
2571
|
+
size_t pub_key_len = 0;
|
|
2572
|
+
ret = ctx->cred.verify(ctx->user_ctx, &parsed_ptxt.auth_creds, &pub_key,
|
|
2573
|
+
&pub_key_len);
|
|
2574
|
+
|
|
2575
|
+
if (EDHOC_SUCCESS != ret) {
|
|
2576
|
+
ctx->error_code =
|
|
2577
|
+
EDHOC_ERROR_CODE_UNKNOWN_CREDENTIAL_REFERENCED;
|
|
2578
|
+
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
2579
|
+
}
|
|
2580
|
+
|
|
2581
|
+
/* 8. Compute PRK_4e3m. */
|
|
2582
|
+
ret = comp_prk_4e3m(responder, ctx, &parsed_ptxt.auth_creds, pub_key,
|
|
2583
|
+
pub_key_len);
|
|
2584
|
+
|
|
2585
|
+
if (EDHOC_SUCCESS != ret)
|
|
2586
|
+
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
2587
|
+
|
|
2588
|
+
/* 9a. Compute required buffer length for context_3. */
|
|
2589
|
+
size_t context_3_len = 0;
|
|
2590
|
+
ret = comp_mac_3_input_len(ctx, &parsed_ptxt.auth_creds,
|
|
2591
|
+
&context_3_len);
|
|
2592
|
+
|
|
2593
|
+
if (EDHOC_SUCCESS != ret)
|
|
2594
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2595
|
+
|
|
2596
|
+
ALLOCATE_ARRAY(uint8_t, mac_3_content, sizeof(struct cbor_items) + context_3_len);
|
|
2597
|
+
memset(mac_3_content, 0, ALLOCATE_ARRAY_SIZEOF(mac_3_content));
|
|
2598
|
+
|
|
2599
|
+
struct cbor_items *cbor_items = (struct cbor_items *)mac_3_content;
|
|
2600
|
+
cbor_items->buf_len = context_3_len;
|
|
2601
|
+
|
|
2602
|
+
/* 9b. Cborise items required by context_3. */
|
|
2603
|
+
ret = gen_mac_3_context(ctx, &parsed_ptxt.auth_creds, cbor_items);
|
|
2604
|
+
|
|
2605
|
+
if (EDHOC_SUCCESS != ret)
|
|
2606
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2607
|
+
|
|
2608
|
+
if (NULL != ctx->logger) {
|
|
2609
|
+
ctx->logger(ctx->user_ctx, "ID_CRED_I", cbor_items->id_cred_i,
|
|
2610
|
+
cbor_items->id_cred_i_len);
|
|
2611
|
+
ctx->logger(ctx->user_ctx, "TH_3", cbor_items->th_3,
|
|
2612
|
+
cbor_items->th_3_len);
|
|
2613
|
+
ctx->logger(ctx->user_ctx, "CRED_I", cbor_items->cred_i,
|
|
2614
|
+
cbor_items->cred_i_len);
|
|
2615
|
+
ctx->logger(ctx->user_ctx, "context_3", cbor_items->buf,
|
|
2616
|
+
cbor_items->buf_len);
|
|
2617
|
+
}
|
|
2618
|
+
|
|
2619
|
+
/* 9c. Compute Message Authentication Code (MAC_3). */
|
|
2620
|
+
size_t mac_3_len = 0;
|
|
2621
|
+
ret = comp_mac_3_len(initiator, ctx, &mac_3_len);
|
|
2622
|
+
|
|
2623
|
+
if (EDHOC_SUCCESS != ret)
|
|
2624
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2625
|
+
|
|
2626
|
+
ALLOCATE_ARRAY(uint8_t, mac_3, mac_3_len);
|
|
2627
|
+
memset(mac_3, 0, ALLOCATE_ARRAY_SIZEOF(mac_3));
|
|
2628
|
+
|
|
2629
|
+
ret = comp_mac_3(ctx, cbor_items, mac_3, ARRAY_SIZE_VLA(mac_3));
|
|
2630
|
+
|
|
2631
|
+
if (EDHOC_SUCCESS != ret)
|
|
2632
|
+
return EDHOC_ERROR_INVALID_MAC_3;
|
|
2633
|
+
|
|
2634
|
+
if (NULL != ctx->logger)
|
|
2635
|
+
ctx->logger(ctx->user_ctx, "MAC_3", mac_3, ARRAY_SIZE_VLA(mac_3));
|
|
2636
|
+
|
|
2637
|
+
/* 10. Verify Signature_or_MAC_3. */
|
|
2638
|
+
ret = verify_sign_or_mac_3(ctx, cbor_items, &parsed_ptxt, pub_key,
|
|
2639
|
+
pub_key_len, mac_3, ARRAY_SIZE_VLA(mac_3));
|
|
2640
|
+
|
|
2641
|
+
if (EDHOC_SUCCESS != ret)
|
|
2642
|
+
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_3;
|
|
2643
|
+
|
|
2644
|
+
/* 11. Compute transcript hash 4. */
|
|
2645
|
+
ret = comp_th_4(ctx, cbor_items, ptxt, ARRAY_SIZE_VLA(ptxt));
|
|
2646
|
+
|
|
2647
|
+
if (EDHOC_SUCCESS != ret)
|
|
2648
|
+
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
2649
|
+
|
|
2650
|
+
/* 12. Clean-up EAD tokens. */
|
|
2651
|
+
ctx->nr_of_ead_tokens = 0;
|
|
2652
|
+
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
2653
|
+
|
|
2654
|
+
ctx->is_oscore_export_allowed = true;
|
|
2655
|
+
ctx->status = EDHOC_SM_COMPLETED;
|
|
2656
|
+
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
2657
|
+
return EDHOC_SUCCESS;
|
|
2658
|
+
}
|