edhoc 1.0.1 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (659) hide show
  1. package/binding.gyp +64 -0
  2. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +35 -0
  3. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +35 -0
  4. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +34 -0
  5. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +35 -0
  6. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +35 -0
  7. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +97 -0
  8. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +35 -0
  9. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +35 -0
  10. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +37 -0
  11. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +35 -0
  12. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +35 -0
  13. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +35 -0
  14. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +35 -0
  15. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +35 -0
  16. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +35 -0
  17. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +34 -0
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +35 -0
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +35 -0
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +35 -0
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +35 -0
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +35 -0
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +35 -0
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +35 -0
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +35 -0
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +35 -0
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +35 -0
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +35 -0
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +35 -0
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +35 -0
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +35 -0
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +35 -0
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +35 -0
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +35 -0
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +35 -0
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +38 -0
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +170 -0
  38. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +59 -0
  39. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +59 -0
  40. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +74 -0
  41. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +74 -0
  42. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +62 -0
  43. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +62 -0
  44. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +141 -0
  45. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +141 -0
  46. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +61 -0
  47. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +61 -0
  48. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +59 -0
  49. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +59 -0
  50. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +112 -0
  51. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +112 -0
  52. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +59 -0
  53. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +59 -0
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +59 -0
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +59 -0
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +59 -0
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +59 -0
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +93 -0
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +93 -0
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +193 -0
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +194 -0
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +189 -0
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +189 -0
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +88 -0
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +88 -0
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +63 -0
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +63 -0
  68. package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +126 -0
  69. package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +49 -0
  70. package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +323 -0
  71. package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +84 -0
  72. package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +171 -0
  73. package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +53 -0
  74. package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +330 -0
  75. package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +98 -0
  76. package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +226 -0
  77. package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +81 -0
  78. package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +230 -0
  79. package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +54 -0
  80. package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +46 -0
  81. package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +110 -0
  82. package/external/libedhoc/externals/compact25519/src/compact_wipe.c +12 -0
  83. package/external/libedhoc/externals/compact25519/src/compact_wipe.h +14 -0
  84. package/external/libedhoc/externals/compact25519/src/compact_x25519.c +68 -0
  85. package/external/libedhoc/externals/compact25519/src/compact_x25519.h +101 -0
  86. package/external/libedhoc/externals/compact25519/test/pcg_random.h +25 -0
  87. package/external/libedhoc/externals/compact25519/test/run-all.c +178 -0
  88. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +21 -0
  89. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +234 -0
  90. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +124 -0
  91. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +280 -0
  92. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +29 -0
  93. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +204 -0
  94. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +16 -0
  95. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +46 -0
  96. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +34 -0
  97. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +57 -0
  98. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +102 -0
  99. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +61 -0
  100. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +5 -0
  101. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +21 -0
  102. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +36 -0
  103. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +31 -0
  104. package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +190 -0
  105. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +760 -0
  106. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +50 -0
  107. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +102 -0
  108. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +413 -0
  109. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +100 -0
  110. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +805 -0
  111. package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +186 -0
  112. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +1514 -0
  113. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +135 -0
  114. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +312 -0
  115. package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +219 -0
  116. package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +92 -0
  117. package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +83 -0
  118. package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +73 -0
  119. package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +106 -0
  120. package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +77 -0
  121. package/external/libedhoc/externals/mbedtls/configs/config-thread.h +76 -0
  122. package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +25 -0
  123. package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +136 -0
  124. package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +609 -0
  125. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +54 -0
  126. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +30 -0
  127. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +19 -0
  128. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +27 -0
  129. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +37 -0
  130. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +32 -0
  131. package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +31 -0
  132. package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +627 -0
  133. package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +341 -0
  134. package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +641 -0
  135. package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +389 -0
  136. package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +82 -0
  137. package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +1084 -0
  138. package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +146 -0
  139. package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +303 -0
  140. package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +518 -0
  141. package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +202 -0
  142. package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +342 -0
  143. package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +1206 -0
  144. package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +1183 -0
  145. package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +246 -0
  146. package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +46 -0
  147. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +183 -0
  148. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +877 -0
  149. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +334 -0
  150. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +142 -0
  151. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +76 -0
  152. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +25 -0
  153. package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +55 -0
  154. package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +36 -0
  155. package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +564 -0
  156. package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +308 -0
  157. package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +385 -0
  158. package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +972 -0
  159. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +441 -0
  160. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +671 -0
  161. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +298 -0
  162. package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +1362 -0
  163. package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +273 -0
  164. package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +201 -0
  165. package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +370 -0
  166. package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +124 -0
  167. package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +434 -0
  168. package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +440 -0
  169. package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +4116 -0
  170. package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +640 -0
  171. package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +190 -0
  172. package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +142 -0
  173. package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +299 -0
  174. package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +166 -0
  175. package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +722 -0
  176. package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +160 -0
  177. package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +1091 -0
  178. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +186 -0
  179. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +197 -0
  180. package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +241 -0
  181. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +485 -0
  182. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +79 -0
  183. package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +201 -0
  184. package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +168 -0
  185. package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +20 -0
  186. package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +104 -0
  187. package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +136 -0
  188. package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +1143 -0
  189. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +219 -0
  190. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +198 -0
  191. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +172 -0
  192. package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +208 -0
  193. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +5369 -0
  194. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +187 -0
  195. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +616 -0
  196. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +106 -0
  197. package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +181 -0
  198. package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +105 -0
  199. package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +94 -0
  200. package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +78 -0
  201. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +550 -0
  202. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +184 -0
  203. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +1196 -0
  204. package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +319 -0
  205. package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +20 -0
  206. package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +4685 -0
  207. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +21 -0
  208. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +91 -0
  209. package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +45 -0
  210. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +210 -0
  211. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +118 -0
  212. package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +114 -0
  213. package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +153 -0
  214. package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +153 -0
  215. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +44 -0
  216. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +151 -0
  217. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +52 -0
  218. package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +105 -0
  219. package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +2064 -0
  220. package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +88 -0
  221. package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +92 -0
  222. package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +1383 -0
  223. package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +1282 -0
  224. package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +460 -0
  225. package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +453 -0
  226. package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +2756 -0
  227. package/external/libedhoc/externals/mbedtls/library/aes.c +2315 -0
  228. package/external/libedhoc/externals/mbedtls/library/aesce.c +503 -0
  229. package/external/libedhoc/externals/mbedtls/library/aesce.h +121 -0
  230. package/external/libedhoc/externals/mbedtls/library/aesni.c +802 -0
  231. package/external/libedhoc/externals/mbedtls/library/aesni.h +158 -0
  232. package/external/libedhoc/externals/mbedtls/library/alignment.h +509 -0
  233. package/external/libedhoc/externals/mbedtls/library/aria.c +991 -0
  234. package/external/libedhoc/externals/mbedtls/library/asn1parse.c +467 -0
  235. package/external/libedhoc/externals/mbedtls/library/asn1write.c +436 -0
  236. package/external/libedhoc/externals/mbedtls/library/base64.c +299 -0
  237. package/external/libedhoc/externals/mbedtls/library/base64_internal.h +45 -0
  238. package/external/libedhoc/externals/mbedtls/library/bignum.c +2806 -0
  239. package/external/libedhoc/externals/mbedtls/library/bignum_core.c +894 -0
  240. package/external/libedhoc/externals/mbedtls/library/bignum_core.h +763 -0
  241. package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +394 -0
  242. package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +452 -0
  243. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +276 -0
  244. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +416 -0
  245. package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +34 -0
  246. package/external/libedhoc/externals/mbedtls/library/bn_mul.h +1094 -0
  247. package/external/libedhoc/externals/mbedtls/library/camellia.c +1044 -0
  248. package/external/libedhoc/externals/mbedtls/library/ccm.c +712 -0
  249. package/external/libedhoc/externals/mbedtls/library/chacha20.c +497 -0
  250. package/external/libedhoc/externals/mbedtls/library/chachapoly.c +478 -0
  251. package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +141 -0
  252. package/external/libedhoc/externals/mbedtls/library/cipher.c +1664 -0
  253. package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +2422 -0
  254. package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +132 -0
  255. package/external/libedhoc/externals/mbedtls/library/cmac.c +1067 -0
  256. package/external/libedhoc/externals/mbedtls/library/common.h +325 -0
  257. package/external/libedhoc/externals/mbedtls/library/constant_time.c +261 -0
  258. package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +554 -0
  259. package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +579 -0
  260. package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +881 -0
  261. package/external/libedhoc/externals/mbedtls/library/debug.c +465 -0
  262. package/external/libedhoc/externals/mbedtls/library/des.c +1042 -0
  263. package/external/libedhoc/externals/mbedtls/library/dhm.c +712 -0
  264. package/external/libedhoc/externals/mbedtls/library/ecdh.c +685 -0
  265. package/external/libedhoc/externals/mbedtls/library/ecdsa.c +867 -0
  266. package/external/libedhoc/externals/mbedtls/library/ecjpake.c +1216 -0
  267. package/external/libedhoc/externals/mbedtls/library/ecp.c +3631 -0
  268. package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +5467 -0
  269. package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +6043 -0
  270. package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +287 -0
  271. package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +325 -0
  272. package/external/libedhoc/externals/mbedtls/library/entropy.c +676 -0
  273. package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +229 -0
  274. package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +64 -0
  275. package/external/libedhoc/externals/mbedtls/library/error.c +878 -0
  276. package/external/libedhoc/externals/mbedtls/library/gcm.c +1168 -0
  277. package/external/libedhoc/externals/mbedtls/library/hkdf.c +161 -0
  278. package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +633 -0
  279. package/external/libedhoc/externals/mbedtls/library/lmots.c +821 -0
  280. package/external/libedhoc/externals/mbedtls/library/lmots.h +311 -0
  281. package/external/libedhoc/externals/mbedtls/library/lms.c +779 -0
  282. package/external/libedhoc/externals/mbedtls/library/md.c +1108 -0
  283. package/external/libedhoc/externals/mbedtls/library/md5.c +426 -0
  284. package/external/libedhoc/externals/mbedtls/library/md_psa.h +63 -0
  285. package/external/libedhoc/externals/mbedtls/library/md_wrap.h +46 -0
  286. package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +745 -0
  287. package/external/libedhoc/externals/mbedtls/library/mps_common.h +181 -0
  288. package/external/libedhoc/externals/mbedtls/library/mps_error.h +89 -0
  289. package/external/libedhoc/externals/mbedtls/library/mps_reader.c +538 -0
  290. package/external/libedhoc/externals/mbedtls/library/mps_reader.h +366 -0
  291. package/external/libedhoc/externals/mbedtls/library/mps_trace.c +112 -0
  292. package/external/libedhoc/externals/mbedtls/library/mps_trace.h +154 -0
  293. package/external/libedhoc/externals/mbedtls/library/net_sockets.c +696 -0
  294. package/external/libedhoc/externals/mbedtls/library/nist_kw.c +725 -0
  295. package/external/libedhoc/externals/mbedtls/library/oid.c +1154 -0
  296. package/external/libedhoc/externals/mbedtls/library/padlock.c +155 -0
  297. package/external/libedhoc/externals/mbedtls/library/padlock.h +111 -0
  298. package/external/libedhoc/externals/mbedtls/library/pem.c +520 -0
  299. package/external/libedhoc/externals/mbedtls/library/pk.c +970 -0
  300. package/external/libedhoc/externals/mbedtls/library/pk_internal.h +118 -0
  301. package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +1834 -0
  302. package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +156 -0
  303. package/external/libedhoc/externals/mbedtls/library/pkcs12.c +447 -0
  304. package/external/libedhoc/externals/mbedtls/library/pkcs5.c +496 -0
  305. package/external/libedhoc/externals/mbedtls/library/pkcs7.c +773 -0
  306. package/external/libedhoc/externals/mbedtls/library/pkparse.c +1845 -0
  307. package/external/libedhoc/externals/mbedtls/library/pkwrite.c +836 -0
  308. package/external/libedhoc/externals/mbedtls/library/pkwrite.h +112 -0
  309. package/external/libedhoc/externals/mbedtls/library/platform.c +402 -0
  310. package/external/libedhoc/externals/mbedtls/library/platform_util.c +285 -0
  311. package/external/libedhoc/externals/mbedtls/library/poly1305.c +492 -0
  312. package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +8432 -0
  313. package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +653 -0
  314. package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +499 -0
  315. package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +590 -0
  316. package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +293 -0
  317. package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +67 -0
  318. package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +838 -0
  319. package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +52 -0
  320. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +2871 -0
  321. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +256 -0
  322. package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +31 -0
  323. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +561 -0
  324. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +267 -0
  325. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +295 -0
  326. package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +132 -0
  327. package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +470 -0
  328. package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +211 -0
  329. package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +70 -0
  330. package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +131 -0
  331. package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +496 -0
  332. package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +264 -0
  333. package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +571 -0
  334. package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +159 -0
  335. package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +192 -0
  336. package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +727 -0
  337. package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +317 -0
  338. package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +373 -0
  339. package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +185 -0
  340. package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +559 -0
  341. package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +213 -0
  342. package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +481 -0
  343. package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +384 -0
  344. package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +259 -0
  345. package/external/libedhoc/externals/mbedtls/library/psa_util.c +160 -0
  346. package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +96 -0
  347. package/external/libedhoc/externals/mbedtls/library/ripemd160.c +490 -0
  348. package/external/libedhoc/externals/mbedtls/library/rsa.c +2640 -0
  349. package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +447 -0
  350. package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +208 -0
  351. package/external/libedhoc/externals/mbedtls/library/sha1.c +480 -0
  352. package/external/libedhoc/externals/mbedtls/library/sha256.c +946 -0
  353. package/external/libedhoc/externals/mbedtls/library/sha3.c +626 -0
  354. package/external/libedhoc/externals/mbedtls/library/sha512.c +1111 -0
  355. package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +410 -0
  356. package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +2050 -0
  357. package/external/libedhoc/externals/mbedtls/library/ssl_client.c +1017 -0
  358. package/external/libedhoc/externals/mbedtls/library/ssl_client.h +22 -0
  359. package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +380 -0
  360. package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +78 -0
  361. package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +234 -0
  362. package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +2847 -0
  363. package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +6155 -0
  364. package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +540 -0
  365. package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +9577 -0
  366. package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +3607 -0
  367. package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +4403 -0
  368. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +3046 -0
  369. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +1740 -0
  370. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +23 -0
  371. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +1897 -0
  372. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +651 -0
  373. package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +3146 -0
  374. package/external/libedhoc/externals/mbedtls/library/threading.c +181 -0
  375. package/external/libedhoc/externals/mbedtls/library/timing.c +154 -0
  376. package/external/libedhoc/externals/mbedtls/library/version.c +32 -0
  377. package/external/libedhoc/externals/mbedtls/library/version_features.c +826 -0
  378. package/external/libedhoc/externals/mbedtls/library/x509.c +1776 -0
  379. package/external/libedhoc/externals/mbedtls/library/x509_create.c +557 -0
  380. package/external/libedhoc/externals/mbedtls/library/x509_crl.c +712 -0
  381. package/external/libedhoc/externals/mbedtls/library/x509_crt.c +3292 -0
  382. package/external/libedhoc/externals/mbedtls/library/x509_csr.c +574 -0
  383. package/external/libedhoc/externals/mbedtls/library/x509write.c +174 -0
  384. package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +681 -0
  385. package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +331 -0
  386. package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +573 -0
  387. package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +259 -0
  388. package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +105 -0
  389. package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +25 -0
  390. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +195 -0
  391. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +138 -0
  392. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +183 -0
  393. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +20 -0
  394. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +106 -0
  395. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +86 -0
  396. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +218 -0
  397. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +41 -0
  398. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +41 -0
  399. package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +41 -0
  400. package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +69 -0
  401. package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +209 -0
  402. package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +45 -0
  403. package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +136 -0
  404. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +274 -0
  405. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +161 -0
  406. package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +296 -0
  407. package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +189 -0
  408. package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +217 -0
  409. package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +419 -0
  410. package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +316 -0
  411. package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +435 -0
  412. package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +84 -0
  413. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +153 -0
  414. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +154 -0
  415. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +155 -0
  416. package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +128 -0
  417. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +172 -0
  418. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +149 -0
  419. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +141 -0
  420. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +155 -0
  421. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +161 -0
  422. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +131 -0
  423. package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +136 -0
  424. package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +281 -0
  425. package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +321 -0
  426. package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +159 -0
  427. package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +691 -0
  428. package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +310 -0
  429. package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +474 -0
  430. package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +75 -0
  431. package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +107 -0
  432. package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +342 -0
  433. package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +408 -0
  434. package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +274 -0
  435. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +288 -0
  436. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +3118 -0
  437. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +1009 -0
  438. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +381 -0
  439. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +804 -0
  440. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +489 -0
  441. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +362 -0
  442. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +4268 -0
  443. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +375 -0
  444. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +601 -0
  445. package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +306 -0
  446. package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +1284 -0
  447. package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +27 -0
  448. package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +28 -0
  449. package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +28 -0
  450. package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +92 -0
  451. package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +66 -0
  452. package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +5137 -0
  453. package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +34 -0
  454. package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +29 -0
  455. package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +583 -0
  456. package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +967 -0
  457. package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +72 -0
  458. package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +265 -0
  459. package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +61 -0
  460. package/external/libedhoc/externals/mbedtls/programs/wince_main.c +31 -0
  461. package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +456 -0
  462. package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +509 -0
  463. package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +1012 -0
  464. package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +132 -0
  465. package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +165 -0
  466. package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +132 -0
  467. package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +31 -0
  468. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +89 -0
  469. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +22 -0
  470. package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +17 -0
  471. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +23 -0
  472. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +16 -0
  473. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +16 -0
  474. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +16 -0
  475. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +16 -0
  476. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +18 -0
  477. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +15 -0
  478. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +22 -0
  479. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +16 -0
  480. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +15 -0
  481. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +22 -0
  482. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +16 -0
  483. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +16 -0
  484. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +15 -0
  485. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +16 -0
  486. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +16 -0
  487. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +16 -0
  488. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +16 -0
  489. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +16 -0
  490. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +16 -0
  491. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +16 -0
  492. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +14 -0
  493. package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +19 -0
  494. package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +7 -0
  495. package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +6 -0
  496. package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +131 -0
  497. package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +26 -0
  498. package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +38 -0
  499. package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +106 -0
  500. package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +234 -0
  501. package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +71 -0
  502. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +121 -0
  503. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +67 -0
  504. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +130 -0
  505. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +44 -0
  506. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +430 -0
  507. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +64 -0
  508. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +62 -0
  509. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +123 -0
  510. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +125 -0
  511. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +75 -0
  512. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +112 -0
  513. package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +32 -0
  514. package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +40 -0
  515. package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +268 -0
  516. package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +250 -0
  517. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +398 -0
  518. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +223 -0
  519. package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +24 -0
  520. package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +91 -0
  521. package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +628 -0
  522. package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +62 -0
  523. package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +145 -0
  524. package/external/libedhoc/externals/mbedtls/tests/src/certs.c +480 -0
  525. package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +199 -0
  526. package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +78 -0
  527. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +462 -0
  528. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +151 -0
  529. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +424 -0
  530. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +147 -0
  531. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +783 -0
  532. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +422 -0
  533. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +202 -0
  534. package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +405 -0
  535. package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +45 -0
  536. package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +353 -0
  537. package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +196 -0
  538. package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +989 -0
  539. package/external/libedhoc/externals/mbedtls/tests/src/random.c +136 -0
  540. package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +1226 -0
  541. package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +2292 -0
  542. package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +210 -0
  543. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +422 -0
  544. package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +69 -0
  545. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +358 -0
  546. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +296 -0
  547. package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +94 -0
  548. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +41 -0
  549. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +39 -0
  550. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +39 -0
  551. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +47 -0
  552. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +128 -0
  553. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +69 -0
  554. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +70 -0
  555. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +257 -0
  556. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +1107 -0
  557. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +722 -0
  558. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +368 -0
  559. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +189 -0
  560. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +529 -0
  561. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +2010 -0
  562. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +134 -0
  563. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +863 -0
  564. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +364 -0
  565. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +453 -0
  566. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +123 -0
  567. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +1527 -0
  568. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +66 -0
  569. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +136 -0
  570. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +12 -0
  571. package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +60 -0
  572. package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +5 -0
  573. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +1044 -0
  574. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +202 -0
  575. package/external/libedhoc/include/edhoc.h +393 -0
  576. package/external/libedhoc/include/edhoc_context.h +318 -0
  577. package/external/libedhoc/include/edhoc_credentials.h +217 -0
  578. package/external/libedhoc/include/edhoc_crypto.h +331 -0
  579. package/external/libedhoc/include/edhoc_ead.h +99 -0
  580. package/external/libedhoc/include/edhoc_macros.h +51 -0
  581. package/external/libedhoc/include/edhoc_values.h +181 -0
  582. package/external/libedhoc/library/edhoc.c +219 -0
  583. package/external/libedhoc/library/edhoc_exporter.c +543 -0
  584. package/external/libedhoc/library/edhoc_message_1.c +439 -0
  585. package/external/libedhoc/library/edhoc_message_2.c +2994 -0
  586. package/external/libedhoc/library/edhoc_message_3.c +2658 -0
  587. package/external/libedhoc/library/edhoc_message_4.c +826 -0
  588. package/external/libedhoc/library/edhoc_message_error.c +238 -0
  589. package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +37 -0
  590. package/external/libedhoc/tests/include/cipher_suites/cipher_suite_0.h +134 -0
  591. package/external/libedhoc/tests/include/cipher_suites/cipher_suite_2.h +140 -0
  592. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +48 -0
  593. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +48 -0
  594. package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +60 -0
  595. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +208 -0
  596. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +59 -0
  597. package/external/libedhoc/tests/include/edhoc_trace_1/test_vector_1.h +738 -0
  598. package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +60 -0
  599. package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +199 -0
  600. package/external/libedhoc/tests/include/edhoc_trace_2/test_vector_2.h +525 -0
  601. package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +48 -0
  602. package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +92 -0
  603. package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +96 -0
  604. package/external/libedhoc/tests/include/x509_chain_cs_0/test_vector_x5chain_cs_0.h +140 -0
  605. package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +58 -0
  606. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +56 -0
  607. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +57 -0
  608. package/external/libedhoc/tests/include/x509_chain_cs_2/test_vector_x5chain_cs_2.h +169 -0
  609. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +59 -0
  610. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +57 -0
  611. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h +163 -0
  612. package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +60 -0
  613. package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +57 -0
  614. package/external/libedhoc/tests/include/x509_hash_cs_2/test_vector_x5t_cs_2.h +181 -0
  615. package/external/libedhoc/tests/src/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c +544 -0
  616. package/external/libedhoc/tests/src/cipher_suites/cipher_suite_0.c +447 -0
  617. package/external/libedhoc/tests/src/cipher_suites/cipher_suite_2.c +600 -0
  618. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +475 -0
  619. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +473 -0
  620. package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +252 -0
  621. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +1829 -0
  622. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +1247 -0
  623. package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +170 -0
  624. package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +1783 -0
  625. package/external/libedhoc/tests/src/error_message/test_edhoc_error_message.c +226 -0
  626. package/external/libedhoc/tests/src/tests.c +228 -0
  627. package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +332 -0
  628. package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +936 -0
  629. package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +166 -0
  630. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +587 -0
  631. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +917 -0
  632. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +186 -0
  633. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +743 -0
  634. package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +261 -0
  635. package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +854 -0
  636. package/include/EdhocComposeAsyncWorker.h +61 -0
  637. package/include/EdhocCredentialManager.h +100 -0
  638. package/include/EdhocCryptoManager.h +504 -0
  639. package/include/EdhocEadManager.h +151 -0
  640. package/include/EdhocExportAsyncWorker.h +71 -0
  641. package/include/EdhocProcessAsyncWorker.h +76 -0
  642. package/include/LibEDHOC.h +304 -0
  643. package/include/Suites.h +27 -0
  644. package/include/UserContext.h +79 -0
  645. package/include/Utils.h +110 -0
  646. package/package.json +1 -1
  647. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  648. package/prebuilds/win32-ia32/edhoc.node +0 -0
  649. package/prebuilds/win32-x64/edhoc.node +0 -0
  650. package/src/EdhocComposeAsyncWorker.cpp +88 -0
  651. package/src/EdhocCredentialManager.cpp +360 -0
  652. package/src/EdhocCryptoManager.cpp +967 -0
  653. package/src/EdhocEadManager.cpp +156 -0
  654. package/src/EdhocExportAsyncWorker.cpp +82 -0
  655. package/src/EdhocProcessAsyncWorker.cpp +74 -0
  656. package/src/LibEDHOC.cpp +369 -0
  657. package/src/Suites.cpp +153 -0
  658. package/src/Utils.cpp +115 -0
  659. /package/prebuilds/{darwin-x64+arm64 → darwin-x64}/edhoc.node +0 -0
@@ -0,0 +1,2994 @@
1
+ /**
2
+ * \file edhoc_message_2.c
3
+ * \author Kamil Kielbasa
4
+ * \brief EDHOC message 2.
5
+ * \version 0.4
6
+ * \date 2024-01-01
7
+ *
8
+ * \copyright Copyright (c) 2024
9
+ *
10
+ */
11
+
12
+ /* Include files ----------------------------------------------------------- */
13
+
14
+ /* EDHOC header: */
15
+ #define EDHOC_ALLOW_PRIVATE_ACCESS
16
+ #include "edhoc.h"
17
+
18
+ /* Standard library headers: */
19
+ #include <stdint.h>
20
+ #include <stddef.h>
21
+ #include <string.h>
22
+ #include <stdbool.h>
23
+
24
+ #ifdef __clang__
25
+ #pragma clang diagnostic push
26
+ #pragma clang diagnostic ignored "-Wshadow"
27
+ #pragma clang diagnostic ignored "-Wreserved-identifier"
28
+ #pragma clang diagnostic ignored "-Wpadded"
29
+ #pragma clang diagnostic ignored "-Wdocumentation"
30
+ #endif
31
+
32
+ /* CBOR headers: */
33
+ #include <zcbor_common.h>
34
+ #include <backend_cbor_message_2_encode.h>
35
+ #include <backend_cbor_message_2_decode.h>
36
+ #include <backend_cbor_bstr_type_encode.h>
37
+ #include <backend_cbor_bstr_type_decode.h>
38
+ #include <backend_cbor_int_type_encode.h>
39
+ #include <backend_cbor_int_type_decode.h>
40
+ #include <backend_cbor_id_cred_x_encode.h>
41
+ #include <backend_cbor_id_cred_x_decode.h>
42
+ #include <backend_cbor_sig_structure_encode.h>
43
+ #include <backend_cbor_info_encode.h>
44
+ #include <backend_cbor_plaintext_2_decode.h>
45
+ #include <backend_cbor_ead_encode.h>
46
+
47
+ #ifdef __clang__
48
+ #pragma clang diagnostic pop
49
+ #endif
50
+
51
+ /* Module defines ---------------------------------------------------------- */
52
+ /* Module types and type definitiones -------------------------------------- */
53
+
54
+ /**
55
+ * \brief Helper structure for CBOR encoding.
56
+ */
57
+ struct cbor_items {
58
+ uint8_t *conn_id;
59
+ size_t conn_id_len;
60
+
61
+ uint8_t *id_cred_r;
62
+ size_t id_cred_r_len;
63
+
64
+ bool id_cred_r_is_comp_enc; // cob = cbor one byte
65
+ enum edhoc_encode_type id_cred_r_enc_type;
66
+ int32_t id_cred_r_int;
67
+ uint8_t id_cred_r_bstr[EDHOC_CRED_KEY_ID_LEN + 1];
68
+ size_t id_cred_r_bstr_len;
69
+
70
+ uint8_t *th_2;
71
+ size_t th_2_len;
72
+
73
+ uint8_t *cred_r;
74
+ size_t cred_r_len;
75
+
76
+ bool is_ead_2;
77
+ uint8_t *ead_2;
78
+ size_t ead_2_len;
79
+
80
+ size_t buf_len;
81
+ uint8_t buf[];
82
+ };
83
+
84
+ /**
85
+ * \brief Helper structure for parsed PLAINTEXT_2.
86
+ */
87
+ struct plaintext {
88
+ struct edhoc_auth_creds auth_cred;
89
+
90
+ const uint8_t *sign_or_mac;
91
+ size_t sign_or_mac_len;
92
+
93
+ const uint8_t *ead;
94
+ size_t ead_len;
95
+ };
96
+
97
+ /**
98
+ * \brief Processing side.
99
+ */
100
+ enum edhoc_role {
101
+ initiator,
102
+ responder,
103
+ };
104
+
105
+ /* Module interface variables and constants -------------------------------- */
106
+ /* Static variables and constants ------------------------------------------ */
107
+ /* Static function declarations -------------------------------------------- */
108
+
109
+ /**
110
+ * \brief CBOR integer memory requirements.
111
+ *
112
+ * \param val Raw integer value.
113
+ *
114
+ * \return Number of bytes.
115
+ */
116
+ static inline size_t cbor_int_mem_req(int32_t val);
117
+
118
+ /**
119
+ * \brief CBOR text stream overhead.
120
+ *
121
+ * \param len Length of buffer to CBOR as tstr.
122
+ *
123
+ * \return Number of bytes.
124
+ */
125
+ static inline size_t cbor_tstr_overhead(size_t len);
126
+
127
+ /**
128
+ * \brief CBOR byte stream overhead.
129
+ *
130
+ * \param len Length of buffer to CBOR as bstr.
131
+ *
132
+ * \return Number of bytes.
133
+ */
134
+ static inline size_t cbor_bstr_overhead(size_t len);
135
+
136
+ /**
137
+ * \brief CBOR map overhead.
138
+ *
139
+ * \param items Number of items for map.
140
+ *
141
+ * \return Number of bytes.
142
+ */
143
+ static inline size_t cbor_map_overhead(size_t items);
144
+
145
+ /**
146
+ * \brief CBOR array overhead.
147
+ *
148
+ * \param items Number of items for array.
149
+ *
150
+ * \return Number of bytes.
151
+ */
152
+ static inline size_t cbor_array_overhead(size_t items);
153
+
154
+ /**
155
+ * \brief Check if integer might be encoded as CBOR one byte.
156
+ *
157
+ * \param val Value for cbor encoding.
158
+ *
159
+ * \retval True if might be encoded as one byte cbor integer,
160
+ * otherwise false.
161
+ */
162
+ static inline bool is_cbor_one_byte_int(int32_t val);
163
+
164
+ /**
165
+ * \brief Generate ECDH key pair (G_X, X).
166
+ *
167
+ * \param[in,out] ctx EDHOC context.
168
+ *
169
+ * \return EDHOC_SUCCESS on success, otherwise failure.
170
+ */
171
+ static int gen_dh_keys(struct edhoc_context *ctx);
172
+
173
+ /**
174
+ * \brief Compute ECDH shared secret (G_XY).
175
+ *
176
+ * \param[in,out] ctx EDHOC context.
177
+ *
178
+ * \return EDHOC_SUCCESS on success, otherwise failure.
179
+ */
180
+ static int comp_dh_secret(struct edhoc_context *ctx);
181
+
182
+ /**
183
+ * \brief Compute transcript hash 2 (TH_2).
184
+ *
185
+ * \param[in,out] ctx EDHOC context.
186
+ * \param role EDHOC role.
187
+ *
188
+ * \return EDHOC_SUCCESS on success, otherwise failure.
189
+ */
190
+ static int comp_th_2(struct edhoc_context *ctx, enum edhoc_role role);
191
+
192
+ /**
193
+ * \brief Compute psuedo random key (PRK_2e).
194
+ *
195
+ * \param[in,out] ctx EDHOC context.
196
+ *
197
+ * \return EDHOC_SUCCESS on success, otherwise failure.
198
+ */
199
+ static int comp_prk_2e(struct edhoc_context *ctx);
200
+
201
+ /**
202
+ * \brief Compute psuedo random key (PRK_3e2m).
203
+ *
204
+ * \param[in] role EDHOC role.
205
+ * \param[in,out] ctx EDHOC context.
206
+ * \param[in] auth_cred Authentication credentials.
207
+ * \param[in] pub_key Peer public static DH key.
208
+ * \param pub_key_len Size of the \p pub_key buffer in bytes.
209
+ *
210
+ * \return EDHOC_SUCCESS on success, otherwise failure.
211
+ */
212
+ static int comp_prk_3e2m(enum edhoc_role role, struct edhoc_context *ctx,
213
+ const struct edhoc_auth_creds *auth_cred,
214
+ const uint8_t *pub_key, size_t pub_key_len);
215
+
216
+ /**
217
+ * \brief Compute memory required for input (context_2) for for MAC_2.
218
+ *
219
+ * \param[in] ctx EDHOC context.
220
+ * \param[in] auth_cred Authentication credentials.
221
+ * \param role EDHOC role.
222
+ * \param[out] context_2_len On success, length of context_2 for MAC_2.
223
+ *
224
+ * \return EDHOC_SUCCESS on success, otherwise failure.
225
+ */
226
+ static int comp_mac_2_input_len(const struct edhoc_context *ctx,
227
+ const struct edhoc_auth_creds *auth_cred,
228
+ enum edhoc_role role, size_t *context_2_len);
229
+
230
+ /**
231
+ * \brief Generate context_2.
232
+ *
233
+ * \param[in] ctx EDHOC context.
234
+ * \param[in] auth_cred Authentication credentials.
235
+ * \param role EDHOC role.
236
+ * \param[out] cbor_items Buffer where the generated context_2 is to be written.
237
+ *
238
+ * \return EDHOC_SUCCESS on success, otherwise failure.
239
+ */
240
+ static int gen_mac_2_context(const struct edhoc_context *ctx,
241
+ const struct edhoc_auth_creds *auth_cred,
242
+ enum edhoc_role role,
243
+ struct cbor_items *cbor_items);
244
+
245
+ /**
246
+ * \brief Get required MAC_2 length.
247
+ *
248
+ * \param role EDHOC role.
249
+ * \param[in] ctx EDHOC context.
250
+ * \param[out] mac_2_len On success, length of MAC_2.
251
+ *
252
+ * \return EDHOC_SUCCESS on success, otherwise failure.
253
+ */
254
+ static int get_mac_2_len(enum edhoc_role role, const struct edhoc_context *ctx,
255
+ size_t *mac_2_len);
256
+
257
+ /**
258
+ * \brief Compute MAC_2.
259
+ *
260
+ * \param[in] ctx EDHOC context.
261
+ * \param[in] cbor_items Buffer containing the context_2.
262
+ * \param[out] mac_2 Buffer where the generated MAC_2 is to be written.
263
+ * \param mac_2_len Size of the \p mac_2 buffer in bytes.
264
+ *
265
+ * \return EDHOC_SUCCESS on success, otherwise failure.
266
+ */
267
+ static int comp_mac_2(const struct edhoc_context *ctx,
268
+ const struct cbor_items *cbor_items, uint8_t *mac_2,
269
+ size_t mac_2_len);
270
+
271
+ /**
272
+ * \brief Compute required length for Signature_or_MAC_2.
273
+ *
274
+ * \param role EDHOC role.
275
+ * \param[in] ctx EDHOC context.
276
+ * \param[out] sign_or_mac_2_len On success, length of Signature_or_MAC_2.
277
+ *
278
+ * \return EDHOC_SUCCESS on success, otherwise failure.
279
+ */
280
+ static int comp_sign_or_mac_2_len(enum edhoc_role role,
281
+ const struct edhoc_context *ctx,
282
+ size_t *sign_or_mac_2_len);
283
+
284
+ /**
285
+ * \brief Compute Signature_or_MAC_2.
286
+ *
287
+ * \param[in] ctx EDHOC context.
288
+ * \param[in] auth_cred Authentication credentials.
289
+ * \param[in] cbor_items Buffer containing the context_2.
290
+ * \param[in] mac_2 Buffer containing the MAC_2.
291
+ * \param mac_2_len Size of the \p mac_2 buffer in bytes.
292
+ * \param[out] sign Buffer where the generated signature is to be written.
293
+ * \param sign_len Size of the \p sign buffer in bytes.
294
+ *
295
+ * \return EDHOC_SUCCESS on success, otherwise failure.
296
+ */
297
+ static int comp_sign_or_mac_2(const struct edhoc_context *ctx,
298
+ const struct edhoc_auth_creds *auth_cred,
299
+ const struct cbor_items *cbor_items,
300
+ const uint8_t *mac_2, size_t mac_2_len,
301
+ uint8_t *sign, size_t sign_len);
302
+
303
+ /**
304
+ * \brief Compute required PLAINTEXT_2 length.
305
+ *
306
+ * \param[in] ctx EDHOC context.
307
+ * \param[in] cbor_items Buffer containing the context_2.
308
+ * \param sign_len Size of the signature buffer in bytes.
309
+ * \param[out] plaintext_2_len On success, length of PLAINTEXT_2.
310
+ *
311
+ * \return EDHOC_SUCCESS on success, otherwise failure.
312
+ */
313
+ static int comp_plaintext_2_len(const struct edhoc_context *ctx,
314
+ const struct cbor_items *cbor_items,
315
+ size_t sign_len, size_t *plaintext_2_len);
316
+
317
+ /**
318
+ * \brief Prepare PLAINTEXT_2.
319
+ *
320
+ * \param[in] ctx EDHOC context.
321
+ * \param[in] cbor_items Buffer containing the context_2.
322
+ * \param[in] sign Buffer containing the signature.
323
+ * \param sign_len Size of the \p sign buffer in bytes.
324
+ * \param[out] ptxt Buffer where the generated plaintext is to be written.
325
+ * \param ptxt_size Size of the \p ptxt buffer in bytes.
326
+ * \param[out] ptxt_len On success, the number of bytes that make up the PLAINTEXT_2.
327
+ *
328
+ * \return EDHOC_SUCCESS on success, otherwise failure.
329
+ */
330
+ static int prepare_plaintext_2(const struct edhoc_context *ctx,
331
+ const struct cbor_items *cbor_items,
332
+ const uint8_t *sign, size_t sign_len,
333
+ uint8_t *ptxt, size_t ptxt_size,
334
+ size_t *ptxt_len);
335
+
336
+ /**
337
+ * \brief Compute KEYSTREAM_2.
338
+ *
339
+ * \param[in] ctx EDHOC context.
340
+ * \param[in] prk_2e Buffer containing the PRK_2e.
341
+ * \param prk_2e_len Size of the \p prk_2e buffer in bytes.
342
+ * \param[out] keystream Buffer where the generated keystream is to be written.
343
+ * \param keystream_len Size of the \p keystream buffer in bytes.
344
+ *
345
+ * \return EDHOC_SUCCESS on success, otherwise failure.
346
+ */
347
+ static int comp_keystream(const struct edhoc_context *ctx,
348
+ const uint8_t *prk_2e, size_t prk_2e_len,
349
+ uint8_t *keystream, size_t keystream_len);
350
+
351
+ /**
352
+ * \brief Compute CIPHERTEXT_2.
353
+ *
354
+ * \param[out] dst Memory location to XOR to.
355
+ * \param[in] src Memory location to XOR from.
356
+ * \param count Number of bytes to XOR.
357
+ */
358
+ static void xor_arrays(uint8_t *restrict dst, const uint8_t *restrict src,
359
+ size_t count);
360
+
361
+ /**
362
+ * \brief Prepare MESSAGE_2.
363
+ *
364
+ * \param[in] ctx EDHOC context.
365
+ * \param[in] ciphertext Buffer containing the CIPHERTEXT_2.
366
+ * \param ciphertext_len Size of the \p ciphertext buffer in bytes.
367
+ * \param[out] msg_2 Buffer where the generated message 2 is to be written.
368
+ * \param msg_2_size Size of the \p msg_2 buffer in bytes.
369
+ * \param[out] msg_2_len On success, the number of bytes that make up the message 2.
370
+ *
371
+ * \return EDHOC_SUCCESS on success, otherwise failure.
372
+ */
373
+ static int prepare_message_2(const struct edhoc_context *ctx,
374
+ const uint8_t *ciphertext, size_t ciphertext_len,
375
+ uint8_t *msg_2, size_t msg_2_size,
376
+ size_t *msg_2_len);
377
+
378
+ /**
379
+ * \brief Compute from cborised message 2 length of ciphertext 2.
380
+ *
381
+ * \param[in] ctx EDHOC context.
382
+ * \param[in] msg_2 Buffer containing the message 2.
383
+ * \param msg_2_len Size of the \p msg_2 buffer in bytes.
384
+ * \param[out] len Length of ciphertext 2 in bytes.
385
+ *
386
+ * \return EDHOC_SUCCESS on success, otherwise failure.
387
+ */
388
+ static int comp_ciphertext_2_len(const struct edhoc_context *ctx,
389
+ const uint8_t *msg_2, size_t msg_2_len,
390
+ size_t *len);
391
+
392
+ /**
393
+ * \brief Decode message 2 and save into context and buffer.
394
+ *
395
+ * \param[in] ctx EDHOC context.
396
+ * \param[in] msg_2 Buffer containing the message 2.
397
+ * \param msg_2_len Size of the \p msg_2 buffer in bytes.
398
+ * \param[in] ctxt_2 Buffer containing the CIPHERTEXT_2.
399
+ * \param ctxt_2_len Size of the \p ctxt_2 buffer in bytes.
400
+ *
401
+ * \return EDHOC_SUCCESS on success, otherwise failure.
402
+ */
403
+ static int parse_msg_2(struct edhoc_context *ctx, const uint8_t *msg_2,
404
+ size_t msg_2_len, uint8_t *ctxt_2, size_t ctxt_2_len);
405
+
406
+ /**
407
+ * \brief Parsed cborised PLAINTEXT_2 for separate buffers.
408
+ *
409
+ * \param[in] ctx EDHOC context.
410
+ * \param[in] ptxt Buffer containing the PLAINTEXT_2.
411
+ * \param ptxt_len Size of the \p plaintext buffer in bytes.
412
+ * \param[out] parsed_ptxt Structure where parsed PLAINTEXT_2 is to be written.
413
+ *
414
+ * \return EDHOC_SUCCESS on success, otherwise failure.
415
+ */
416
+ static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
417
+ size_t ptxt_len, struct plaintext *parsed_ptxt);
418
+
419
+ /**
420
+ * \brief Verify Signature_or_MAC_2.
421
+ *
422
+ * \param[in] ctx EDHOC context.
423
+ * \param[in] cbor_items Structure containing the context_2.
424
+ * \param[in] parsed_ptxt Structure containing the parsed PLAINTEXT_2.
425
+ * \param[in] pub_key Buffer containing the public key from peer credentials.
426
+ * \param pub_key_len Size of the \p pub_key buffer in bytes.
427
+ * \param[in] mac_2 Buffer containing the MAC_2.
428
+ * \param mac_2_len Size of the \p mac_2 buffer in bytes.
429
+ *
430
+ * \return EDHOC_SUCCESS on success, otherwise failure.
431
+ */
432
+ static int verify_sign_or_mac_2(const struct edhoc_context *ctx,
433
+ const struct cbor_items *cbor_items,
434
+ const struct plaintext *parsed_ptxt,
435
+ const uint8_t *pub_key, size_t pub_key_len,
436
+ const uint8_t *mac_2, size_t mac_2_len);
437
+
438
+ /**
439
+ * \brief Compute transcript hash 3.
440
+ *
441
+ * \param[in,out] ctx EDHOC context.
442
+ * \param[in] cbor_items Structure containing the context_2.
443
+ * \param[in] ptxt Buffer containing the PLAINTEXT_2.
444
+ * \param ptxt_len Size of the \p ptxt buffer in bytes.
445
+ *
446
+ * \return EDHOC_SUCCESS on success, otherwise failure.
447
+ */
448
+ static int comp_th_3(struct edhoc_context *ctx,
449
+ const struct cbor_items *cbor_items, const uint8_t *ptxt,
450
+ size_t ptxt_len);
451
+
452
+ /**
453
+ * \brief Perform compact encoding described in:
454
+ * - RFC 9528: 3.5.3.2. Compact Encoding of ID_CRED Fields for 'kid'.
455
+ *
456
+ * \param[in] auth_cred Authentication credentials.
457
+ * \param[in,out] cbor_items Structure containing the context_2.
458
+ *
459
+ * \return EDHOC_SUCCESS on success, otherwise failure.
460
+ */
461
+ static int kid_compact_encoding(const struct edhoc_auth_creds *auth_cred,
462
+ struct cbor_items *cbor_items);
463
+
464
+ /**
465
+ * \brief Compute SALT_3e2m.
466
+ *
467
+ * \param[in] ctx EDHOC context.
468
+ * \param[out] salt Buffer where the generated salt is to be written.
469
+ * \param salt_len Size of the \p salt buffer in bytes.
470
+ *
471
+ * \return EDHOC_SUCCESS on success, otherwise failure.
472
+ */
473
+ static int comp_salt_3e2m(const struct edhoc_context *ctx, uint8_t *salt,
474
+ size_t salt_len);
475
+
476
+ /**
477
+ * \brief Compute G_RX for PRK_3e2m.
478
+ *
479
+ * \param role EDHOC role.
480
+ * \param[in,out] ctx EDHOC context.
481
+ * \param[in] auth_cred Authentication credentials.
482
+ * \param[in] pub_key Peer public key.
483
+ * \param pub_key_len Peer public key length.
484
+ * \param[out] grx Buffer where the generated G_RX is to be written.
485
+ * \param grx_len Size of the \p grx buffer in bytes.
486
+ *
487
+ * \return EDHOC_SUCCESS on success, otherwise failure.
488
+ */
489
+ static int comp_grx(enum edhoc_role role, struct edhoc_context *ctx,
490
+ const struct edhoc_auth_creds *auth_cred,
491
+ const uint8_t *pub_key, size_t pub_key_len, uint8_t *grx,
492
+ size_t grx_len);
493
+
494
+ /* Static function definitions --------------------------------------------- */
495
+
496
+ static inline size_t cbor_int_mem_req(int32_t val)
497
+ {
498
+ if (val >= ONE_BYTE_CBOR_INT_MIN_VALUE &&
499
+ val <= ONE_BYTE_CBOR_INT_MAX_VALUE) {
500
+ return 1;
501
+ } else if (val >= -(UINT8_MAX + 1) && val <= UINT8_MAX) {
502
+ return 2;
503
+ } else if (val >= -(UINT16_MAX + 1) && val <= UINT16_MAX) {
504
+ return 3;
505
+ } else {
506
+ return 4;
507
+ }
508
+ }
509
+
510
+ static inline size_t cbor_tstr_overhead(size_t len)
511
+ {
512
+ if (len <= 23) {
513
+ return 1;
514
+ } else if (len <= UINT8_MAX) {
515
+ return 2;
516
+ } else if (len <= UINT16_MAX) {
517
+ return 3;
518
+ } else if (len <= UINT32_MAX) {
519
+ return 4;
520
+ } else {
521
+ return 5;
522
+ }
523
+ }
524
+
525
+ static inline size_t cbor_bstr_overhead(size_t len)
526
+ {
527
+ if (len <= 23) {
528
+ return 1;
529
+ } else if (len <= UINT8_MAX) {
530
+ return 2;
531
+ } else if (len <= UINT16_MAX) {
532
+ return 3;
533
+ } else if (len <= UINT32_MAX) {
534
+ return 4;
535
+ } else {
536
+ return 5;
537
+ }
538
+ }
539
+
540
+ static inline size_t cbor_map_overhead(size_t items)
541
+ {
542
+ (void)items;
543
+
544
+ return 3;
545
+ }
546
+
547
+ static inline size_t cbor_array_overhead(size_t items)
548
+ {
549
+ if (items < 24)
550
+ return 1;
551
+ if (items < 256)
552
+ return 2;
553
+ if (items < 65535)
554
+ return 3;
555
+
556
+ return 4;
557
+ }
558
+
559
+ static inline bool is_cbor_one_byte_int(int32_t val)
560
+ {
561
+ return 1 == cbor_int_mem_req(val);
562
+ }
563
+
564
+ static int gen_dh_keys(struct edhoc_context *ctx)
565
+ {
566
+ if (NULL == ctx)
567
+ return EDHOC_ERROR_INVALID_ARGUMENT;
568
+
569
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
570
+
571
+ /* Generate ephemeral key pair. */
572
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
573
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_MAKE_KEY_PAIR,
574
+ NULL, 0, key_id);
575
+
576
+ if (EDHOC_SUCCESS != ret)
577
+ return EDHOC_ERROR_CRYPTO_FAILURE;
578
+
579
+ /* Choose most preferred cipher suite. */
580
+ const struct edhoc_cipher_suite csuite =
581
+ ctx->csuite[ctx->chosen_csuite_idx];
582
+
583
+ ctx->dh_pub_key_len = csuite.ecc_key_length;
584
+ ctx->dh_priv_key_len = csuite.ecc_key_length;
585
+
586
+ size_t pub_key_len = 0;
587
+ size_t priv_key_len = 0;
588
+ ret = ctx->crypto.make_key_pair(ctx->user_ctx, key_id, ctx->dh_priv_key,
589
+ ctx->dh_priv_key_len, &priv_key_len,
590
+ ctx->dh_pub_key, ctx->dh_pub_key_len,
591
+ &pub_key_len);
592
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
593
+
594
+ if (EDHOC_SUCCESS != ret || csuite.ecc_key_length != priv_key_len ||
595
+ csuite.ecc_key_length != pub_key_len)
596
+ return EDHOC_ERROR_CRYPTO_FAILURE;
597
+
598
+ return EDHOC_SUCCESS;
599
+ }
600
+
601
+ static int comp_dh_secret(struct edhoc_context *ctx)
602
+ {
603
+ if (NULL == ctx)
604
+ return EDHOC_ERROR_INVALID_ARGUMENT;
605
+
606
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
607
+
608
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
609
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_KEY_AGREEMENT,
610
+ ctx->dh_priv_key, ctx->dh_priv_key_len,
611
+ key_id);
612
+ if (EDHOC_SUCCESS != ret)
613
+ return EDHOC_ERROR_CRYPTO_FAILURE;
614
+
615
+ const struct edhoc_cipher_suite csuite =
616
+ ctx->csuite[ctx->chosen_csuite_idx];
617
+ ctx->dh_secret_len = csuite.ecc_key_length;
618
+
619
+ size_t secret_len = 0;
620
+ ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id,
621
+ ctx->dh_peer_pub_key,
622
+ ctx->dh_peer_pub_key_len,
623
+ ctx->dh_secret, ctx->dh_secret_len,
624
+ &secret_len);
625
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
626
+
627
+ if (EDHOC_SUCCESS != ret || secret_len != csuite.ecc_key_length)
628
+ return EDHOC_ERROR_CRYPTO_FAILURE;
629
+
630
+ return EDHOC_SUCCESS;
631
+ }
632
+
633
+ static int comp_th_2(struct edhoc_context *ctx, enum edhoc_role role)
634
+ {
635
+ if (NULL == ctx)
636
+ return EDHOC_ERROR_INVALID_ARGUMENT;
637
+
638
+ if (EDHOC_TH_STATE_1 != ctx->th_state)
639
+ return EDHOC_ERROR_BAD_STATE;
640
+
641
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
642
+
643
+ const struct edhoc_cipher_suite csuite =
644
+ ctx->csuite[ctx->chosen_csuite_idx];
645
+
646
+ /* Calculate required sizes for CBOR TH_2 = H(G_Y, H(message_1)). */
647
+ size_t g_y_len = 0;
648
+ g_y_len += csuite.ecc_key_length;
649
+ g_y_len += cbor_bstr_overhead(csuite.ecc_key_length);
650
+
651
+ size_t hash_len = 0;
652
+ hash_len += csuite.hash_length;
653
+ hash_len += cbor_bstr_overhead(csuite.hash_length);
654
+
655
+ ALLOCATE_ARRAY(uint8_t, th_2, g_y_len + hash_len);
656
+ memset(th_2, 0, ALLOCATE_ARRAY_SIZEOF(th_2));
657
+
658
+ size_t offset = 0;
659
+ size_t len_out = 0;
660
+ struct zcbor_string cbor_bstr = { 0 };
661
+
662
+ /* Cborise G_Y. */
663
+ switch (role) {
664
+ case initiator:
665
+ cbor_bstr.value = ctx->dh_peer_pub_key;
666
+ cbor_bstr.len = ctx->dh_peer_pub_key_len;
667
+ break;
668
+ case responder:
669
+ cbor_bstr.value = ctx->dh_pub_key;
670
+ cbor_bstr.len = ctx->dh_pub_key_len;
671
+ break;
672
+ }
673
+
674
+ len_out = 0;
675
+ ret = cbor_encode_byte_string_type_bstr_type(th_2, g_y_len, &cbor_bstr,
676
+ &len_out);
677
+
678
+ if (ZCBOR_SUCCESS != ret || g_y_len != len_out)
679
+ return EDHOC_ERROR_CBOR_FAILURE;
680
+
681
+ offset += len_out;
682
+
683
+ /* Cborise H(message_1). */
684
+ cbor_bstr.value = ctx->th;
685
+ cbor_bstr.len = ctx->th_len;
686
+
687
+ len_out = 0;
688
+ ret = cbor_encode_byte_string_type_bstr_type(&th_2[offset], hash_len,
689
+ &cbor_bstr, &len_out);
690
+
691
+ if (ZCBOR_SUCCESS != ret || hash_len != len_out)
692
+ return EDHOC_ERROR_CBOR_FAILURE;
693
+
694
+ offset += len_out;
695
+
696
+ if (ARRAY_SIZE_VLA(th_2) < offset)
697
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
698
+
699
+ /* Calculate TH_2. */
700
+ ctx->th_len = csuite.hash_length;
701
+
702
+ size_t hash_length = 0;
703
+ ret = ctx->crypto.hash(ctx->user_ctx, th_2, ARRAY_SIZE_VLA(th_2), ctx->th,
704
+ ctx->th_len, &hash_length);
705
+
706
+ if (EDHOC_SUCCESS != ret || csuite.hash_length != hash_length)
707
+ return EDHOC_ERROR_CRYPTO_FAILURE;
708
+
709
+ ctx->th_state = EDHOC_TH_STATE_2;
710
+ return EDHOC_SUCCESS;
711
+ }
712
+
713
+ static int comp_prk_2e(struct edhoc_context *ctx)
714
+ {
715
+ if (NULL == ctx)
716
+ return EDHOC_ERROR_INVALID_ARGUMENT;
717
+
718
+ if (EDHOC_TH_STATE_2 != ctx->th_state ||
719
+ EDHOC_PRK_STATE_INVALID != ctx->prk_state)
720
+ return EDHOC_ERROR_BAD_STATE;
721
+
722
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
723
+
724
+ ctx->prk_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
725
+
726
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
727
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXTRACT,
728
+ ctx->dh_secret, ctx->dh_secret_len,
729
+ key_id);
730
+
731
+ if (EDHOC_SUCCESS != ret)
732
+ return EDHOC_ERROR_CRYPTO_FAILURE;
733
+
734
+ size_t out_len = 0;
735
+ ret = ctx->crypto.extract(ctx->user_ctx, key_id, ctx->th, ctx->th_len,
736
+ ctx->prk, ctx->prk_len, &out_len);
737
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
738
+
739
+ if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
740
+ return EDHOC_ERROR_CRYPTO_FAILURE;
741
+
742
+ ctx->prk_state = EDHOC_PRK_STATE_2E;
743
+ return EDHOC_SUCCESS;
744
+ }
745
+
746
+ static int comp_prk_3e2m(enum edhoc_role role, struct edhoc_context *ctx,
747
+ const struct edhoc_auth_creds *auth_cred,
748
+ const uint8_t *pub_key, size_t pub_key_len)
749
+ {
750
+ if (NULL == ctx)
751
+ return EDHOC_ERROR_INVALID_ARGUMENT;
752
+
753
+ if (EDHOC_PRK_STATE_2E != ctx->prk_state)
754
+ return EDHOC_ERROR_BAD_STATE;
755
+
756
+ if (initiator == role) {
757
+ switch (ctx->method) {
758
+ case EDHOC_METHOD_0:
759
+ case EDHOC_METHOD_2:
760
+ ctx->prk_state = EDHOC_PRK_STATE_3E2M;
761
+ return EDHOC_SUCCESS;
762
+
763
+ case EDHOC_METHOD_1:
764
+ case EDHOC_METHOD_3: {
765
+ const size_t hash_len =
766
+ ctx->csuite[ctx->chosen_csuite_idx].hash_length;
767
+
768
+ ALLOCATE_ARRAY(uint8_t, salt_3e2m, hash_len);
769
+ memset(salt_3e2m, 0, ALLOCATE_ARRAY_SIZEOF(salt_3e2m));
770
+
771
+ int ret = comp_salt_3e2m(ctx, salt_3e2m,
772
+ ARRAY_SIZE_VLA(salt_3e2m));
773
+
774
+ if (EDHOC_SUCCESS != ret)
775
+ return EDHOC_ERROR_CRYPTO_FAILURE;
776
+
777
+ if (NULL != ctx->logger)
778
+ ctx->logger(ctx->user_ctx, "SALT_3e2m",
779
+ salt_3e2m, ARRAY_SIZE_VLA(salt_3e2m));
780
+
781
+ const size_t ecc_key_len =
782
+ ctx->csuite[ctx->chosen_csuite_idx]
783
+ .ecc_key_length;
784
+
785
+ ALLOCATE_ARRAY(uint8_t, grx, ecc_key_len);
786
+ memset(grx, 0, ALLOCATE_ARRAY_SIZEOF(grx));
787
+
788
+ ret = comp_grx(role, ctx, auth_cred, pub_key,
789
+ pub_key_len, grx, ARRAY_SIZE_VLA(grx));
790
+
791
+ if (EDHOC_SUCCESS != ret)
792
+ return EDHOC_ERROR_CRYPTO_FAILURE;
793
+
794
+ if (NULL != ctx->logger)
795
+ ctx->logger(ctx->user_ctx, "G_RX", grx,
796
+ ARRAY_SIZE_VLA(grx));
797
+
798
+ ctx->prk_len =
799
+ ctx->csuite[ctx->chosen_csuite_idx].hash_length;
800
+
801
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
802
+ ret = ctx->keys.generate_key(ctx->user_ctx,
803
+ EDHOC_KT_EXTRACT, grx,
804
+ ARRAY_SIZE_VLA(grx), key_id);
805
+ memset(grx, 0, sizeof(grx));
806
+
807
+ if (EDHOC_SUCCESS != ret)
808
+ return EDHOC_ERROR_CRYPTO_FAILURE;
809
+
810
+ size_t out_len = 0;
811
+ ret = ctx->crypto.extract(ctx->user_ctx, key_id,
812
+ salt_3e2m,
813
+ ARRAY_SIZE_VLA(salt_3e2m),
814
+ ctx->prk, ctx->prk_len,
815
+ &out_len);
816
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
817
+
818
+ if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
819
+ return EDHOC_ERROR_CRYPTO_FAILURE;
820
+
821
+ ctx->prk_state = EDHOC_PRK_STATE_3E2M;
822
+ return EDHOC_SUCCESS;
823
+ }
824
+
825
+ default:
826
+ return EDHOC_ERROR_NOT_PERMITTED;
827
+ }
828
+ }
829
+
830
+ if (responder == role) {
831
+ switch (ctx->method) {
832
+ case EDHOC_METHOD_0:
833
+ case EDHOC_METHOD_2:
834
+ ctx->prk_state = EDHOC_PRK_STATE_3E2M;
835
+ return EDHOC_SUCCESS;
836
+
837
+ case EDHOC_METHOD_1:
838
+ case EDHOC_METHOD_3: {
839
+ const size_t hash_len =
840
+ ctx->csuite[ctx->chosen_csuite_idx].hash_length;
841
+
842
+ ALLOCATE_ARRAY(uint8_t, salt_3e2m, hash_len);
843
+ memset(salt_3e2m, 0, ALLOCATE_ARRAY_SIZEOF(salt_3e2m));
844
+
845
+ int ret = comp_salt_3e2m(ctx, salt_3e2m,
846
+ ARRAY_SIZE_VLA(salt_3e2m));
847
+
848
+ if (EDHOC_SUCCESS != ret)
849
+ return EDHOC_ERROR_CRYPTO_FAILURE;
850
+
851
+ if (NULL != ctx->logger)
852
+ ctx->logger(ctx->user_ctx, "SALT_3e2m",
853
+ salt_3e2m, ARRAY_SIZE_VLA(salt_3e2m));
854
+
855
+ const size_t ecc_key_len =
856
+ ctx->csuite[ctx->chosen_csuite_idx]
857
+ .ecc_key_length;
858
+
859
+ ALLOCATE_ARRAY(uint8_t, grx, ecc_key_len);
860
+ memset(grx, 0, ALLOCATE_ARRAY_SIZEOF(grx));
861
+
862
+ ret = comp_grx(role, ctx, auth_cred, pub_key,
863
+ pub_key_len, grx, ARRAY_SIZE_VLA(grx));
864
+
865
+ if (EDHOC_SUCCESS != ret)
866
+ return EDHOC_ERROR_CRYPTO_FAILURE;
867
+
868
+ if (NULL != ctx->logger)
869
+ ctx->logger(ctx->user_ctx, "G_RX", grx,
870
+ ARRAY_SIZE_VLA(grx));
871
+
872
+ ctx->prk_len =
873
+ ctx->csuite[ctx->chosen_csuite_idx].hash_length;
874
+
875
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
876
+ ret = ctx->keys.generate_key(ctx->user_ctx,
877
+ EDHOC_KT_EXTRACT, grx,
878
+ ARRAY_SIZE_VLA(grx), key_id);
879
+ memset(grx, 0, ALLOCATE_ARRAY_SIZEOF(grx));
880
+
881
+ if (EDHOC_SUCCESS != ret)
882
+ return EDHOC_ERROR_CRYPTO_FAILURE;
883
+
884
+ size_t out_len = 0;
885
+ ret = ctx->crypto.extract(ctx->user_ctx, key_id,
886
+ salt_3e2m,
887
+ ARRAY_SIZE_VLA(salt_3e2m),
888
+ ctx->prk, ctx->prk_len,
889
+ &out_len);
890
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
891
+
892
+ if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
893
+ return EDHOC_ERROR_CRYPTO_FAILURE;
894
+
895
+ ctx->prk_state = EDHOC_PRK_STATE_3E2M;
896
+ return EDHOC_SUCCESS;
897
+ }
898
+
899
+ default:
900
+ return EDHOC_ERROR_NOT_PERMITTED;
901
+ }
902
+ }
903
+
904
+ return EDHOC_ERROR_NOT_PERMITTED;
905
+ }
906
+
907
+ static int comp_mac_2_input_len(const struct edhoc_context *ctx,
908
+ const struct edhoc_auth_creds *auth_cred,
909
+ enum edhoc_role role, size_t *context_2_len)
910
+ {
911
+ if (NULL == ctx || NULL == auth_cred || NULL == context_2_len)
912
+ return EDHOC_ERROR_INVALID_ARGUMENT;
913
+
914
+ const size_t nr_of_items = 1;
915
+ size_t len = 0;
916
+
917
+ /* C_R. */
918
+ const struct edhoc_connection_id *cid = NULL;
919
+
920
+ switch (role) {
921
+ case initiator:
922
+ cid = &ctx->peer_cid;
923
+ break;
924
+ case responder:
925
+ cid = &ctx->cid;
926
+ break;
927
+ default:
928
+ return EDHOC_ERROR_NOT_PERMITTED;
929
+ }
930
+
931
+ switch (cid->encode_type) {
932
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
933
+ len = sizeof(cid->int_value);
934
+ break;
935
+ case EDHOC_CID_TYPE_BYTE_STRING:
936
+ len += cid->bstr_length;
937
+ len += cbor_bstr_overhead(cid->bstr_length);
938
+ break;
939
+ default:
940
+ return EDHOC_ERROR_NOT_PERMITTED;
941
+ }
942
+
943
+ /* ID_CRED_R. */
944
+ switch (auth_cred->label) {
945
+ case EDHOC_COSE_HEADER_KID:
946
+ len += cbor_map_overhead(nr_of_items);
947
+
948
+ switch (auth_cred->key_id.encode_type) {
949
+ case EDHOC_ENCODE_TYPE_INTEGER:
950
+ len += cbor_int_mem_req(auth_cred->key_id.key_id_int);
951
+ break;
952
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
953
+ len += auth_cred->key_id.key_id_bstr_length;
954
+ len += cbor_bstr_overhead(
955
+ auth_cred->key_id.key_id_bstr_length);
956
+ break;
957
+ default:
958
+ return EDHOC_ERROR_NOT_PERMITTED;
959
+ }
960
+ break;
961
+
962
+ case EDHOC_COSE_HEADER_X509_CHAIN:
963
+ len += cbor_map_overhead(nr_of_items);
964
+ for (size_t i = 0; i < auth_cred->x509_chain.nr_of_certs; ++i) {
965
+ len += auth_cred->x509_chain.cert_len[i];
966
+ len += cbor_bstr_overhead(
967
+ auth_cred->x509_chain.cert_len[i]);
968
+ }
969
+
970
+ if (auth_cred->x509_chain.nr_of_certs > 1)
971
+ len += cbor_array_overhead(
972
+ auth_cred->x509_chain.nr_of_certs);
973
+
974
+ break;
975
+
976
+ case EDHOC_COSE_HEADER_X509_HASH:
977
+ len += cbor_map_overhead(nr_of_items);
978
+ len += cbor_array_overhead(nr_of_items);
979
+
980
+ switch (auth_cred->x509_hash.encode_type) {
981
+ case EDHOC_ENCODE_TYPE_INTEGER:
982
+ len += cbor_int_mem_req(auth_cred->x509_hash.alg_int);
983
+ break;
984
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
985
+ len += auth_cred->x509_hash.alg_bstr_length;
986
+ len += cbor_bstr_overhead(
987
+ auth_cred->x509_hash.alg_bstr_length);
988
+ break;
989
+ default:
990
+ return EDHOC_ERROR_NOT_PERMITTED;
991
+ }
992
+
993
+ len += auth_cred->x509_hash.cert_fp_len;
994
+ len += cbor_bstr_overhead(auth_cred->x509_hash.cert_fp_len);
995
+ break;
996
+
997
+ default:
998
+ return EDHOC_ERROR_NOT_SUPPORTED;
999
+ }
1000
+
1001
+ /* TH_2. */
1002
+ len += ctx->th_len;
1003
+ len += cbor_bstr_overhead(ctx->th_len);
1004
+
1005
+ /* CRED_R. */
1006
+ switch (auth_cred->label) {
1007
+ case EDHOC_COSE_HEADER_KID:
1008
+ len += auth_cred->key_id.cred_len;
1009
+ len += cbor_bstr_overhead(auth_cred->key_id.cred_len);
1010
+ break;
1011
+
1012
+ case EDHOC_COSE_HEADER_X509_CHAIN: {
1013
+ const size_t end_entity_idx =
1014
+ auth_cred->x509_chain.nr_of_certs - 1;
1015
+ len += auth_cred->x509_chain.cert_len[end_entity_idx];
1016
+ len += cbor_bstr_overhead(
1017
+ auth_cred->x509_chain.cert_len[end_entity_idx]);
1018
+ break;
1019
+ }
1020
+
1021
+ case EDHOC_COSE_HEADER_X509_HASH:
1022
+ len += auth_cred->x509_hash.cert_len;
1023
+ len += cbor_bstr_overhead(auth_cred->x509_hash.cert_len);
1024
+ break;
1025
+
1026
+ default:
1027
+ return EDHOC_ERROR_NOT_SUPPORTED;
1028
+ }
1029
+
1030
+ /* EAD_2. */
1031
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
1032
+ len += cbor_int_mem_req(ctx->ead_token[i].label);
1033
+ len += ctx->ead_token[i].value_len;
1034
+ len += cbor_bstr_overhead(ctx->ead_token[i].value_len);
1035
+ }
1036
+
1037
+ *context_2_len = len;
1038
+
1039
+ return EDHOC_SUCCESS;
1040
+ }
1041
+
1042
+ static int gen_mac_2_context(const struct edhoc_context *ctx,
1043
+ const struct edhoc_auth_creds *auth_cred,
1044
+ enum edhoc_role role,
1045
+ struct cbor_items *cbor_items)
1046
+ {
1047
+ if (NULL == ctx || NULL == auth_cred || NULL == cbor_items)
1048
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1049
+
1050
+ if (EDHOC_TH_STATE_2 != ctx->th_state)
1051
+ return EDHOC_ERROR_BAD_STATE;
1052
+
1053
+ const size_t nr_of_items = 1;
1054
+
1055
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1056
+ size_t len = 0;
1057
+
1058
+ cbor_items->conn_id = &cbor_items->buf[0];
1059
+
1060
+ /* C_R length. */
1061
+ const struct edhoc_connection_id *cid = NULL;
1062
+
1063
+ switch (role) {
1064
+ case initiator:
1065
+ cid = &ctx->peer_cid;
1066
+ break;
1067
+ case responder:
1068
+ cid = &ctx->cid;
1069
+ break;
1070
+ default:
1071
+ return EDHOC_ERROR_NOT_PERMITTED;
1072
+ }
1073
+
1074
+ switch (cid->encode_type) {
1075
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
1076
+ len = sizeof(cid->int_value);
1077
+ break;
1078
+ case EDHOC_CID_TYPE_BYTE_STRING:
1079
+ len += cid->bstr_length + 1;
1080
+ len += cbor_bstr_overhead(cid->bstr_length);
1081
+ break;
1082
+ default:
1083
+ return EDHOC_ERROR_NOT_PERMITTED;
1084
+ }
1085
+
1086
+ cbor_items->conn_id_len = len;
1087
+
1088
+ /* Cborise C_R. */
1089
+ switch (cid->encode_type) {
1090
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER: {
1091
+ const int32_t value = cid->int_value;
1092
+ len = 0;
1093
+ ret = cbor_encode_integer_type_int_type(cbor_items->conn_id,
1094
+ cbor_items->conn_id_len,
1095
+ &value, &len);
1096
+ break;
1097
+ }
1098
+ case EDHOC_CID_TYPE_BYTE_STRING: {
1099
+ const struct zcbor_string cbor_bstr = {
1100
+ .value = cid->bstr_value,
1101
+ .len = cid->bstr_length,
1102
+ };
1103
+ len = 0;
1104
+ ret = cbor_encode_byte_string_type_bstr_type(
1105
+ cbor_items->conn_id, cbor_items->conn_id_len,
1106
+ &cbor_bstr, &len);
1107
+ break;
1108
+ }
1109
+ default:
1110
+ return EDHOC_ERROR_NOT_PERMITTED;
1111
+ }
1112
+
1113
+ if (ZCBOR_SUCCESS != ret)
1114
+ return EDHOC_ERROR_CBOR_FAILURE;
1115
+
1116
+ cbor_items->conn_id_len = len;
1117
+
1118
+ /* ID_CRED_R length. */
1119
+ len = cbor_items->conn_id_len;
1120
+ cbor_items->id_cred_r = &cbor_items->buf[cbor_items->conn_id_len];
1121
+
1122
+ switch (auth_cred->label) {
1123
+ case EDHOC_COSE_HEADER_KID:
1124
+ len += cbor_map_overhead(nr_of_items);
1125
+
1126
+ switch (auth_cred->key_id.encode_type) {
1127
+ case EDHOC_ENCODE_TYPE_INTEGER:
1128
+ len += cbor_int_mem_req(auth_cred->key_id.key_id_int);
1129
+ break;
1130
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1131
+ len += auth_cred->key_id.key_id_bstr_length;
1132
+ len += cbor_bstr_overhead(
1133
+ auth_cred->key_id.key_id_bstr_length);
1134
+ break;
1135
+ default:
1136
+ return EDHOC_ERROR_NOT_PERMITTED;
1137
+ }
1138
+ break;
1139
+
1140
+ case EDHOC_COSE_HEADER_X509_CHAIN:
1141
+ len += cbor_map_overhead(nr_of_items);
1142
+
1143
+ for (size_t i = 0; i < auth_cred->x509_chain.nr_of_certs; ++i) {
1144
+ len += auth_cred->x509_chain.cert_len[i];
1145
+ len += cbor_bstr_overhead(
1146
+ auth_cred->x509_chain.cert_len[i]);
1147
+ }
1148
+
1149
+ if (1 < auth_cred->x509_chain.nr_of_certs)
1150
+ len += cbor_array_overhead(
1151
+ auth_cred->x509_chain.nr_of_certs);
1152
+
1153
+ break;
1154
+
1155
+ case EDHOC_COSE_HEADER_X509_HASH:
1156
+ len += cbor_map_overhead(nr_of_items);
1157
+ len += cbor_array_overhead(nr_of_items);
1158
+
1159
+ switch (auth_cred->x509_hash.encode_type) {
1160
+ case EDHOC_ENCODE_TYPE_INTEGER:
1161
+ len += cbor_int_mem_req(auth_cred->x509_hash.alg_int);
1162
+ break;
1163
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1164
+ len += auth_cred->x509_hash.alg_bstr_length;
1165
+ len += cbor_bstr_overhead(
1166
+ auth_cred->x509_hash.alg_bstr_length);
1167
+ break;
1168
+ default:
1169
+ return EDHOC_ERROR_NOT_PERMITTED;
1170
+ }
1171
+
1172
+ len += auth_cred->x509_hash.cert_fp_len;
1173
+ len += cbor_bstr_overhead(auth_cred->x509_hash.cert_fp_len);
1174
+ break;
1175
+
1176
+ default:
1177
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
1178
+ }
1179
+
1180
+ cbor_items->id_cred_r_len = len;
1181
+
1182
+ /* Cborise ID_CRED_R. */
1183
+ struct id_cred_x cbor_id_cred_r = { 0 };
1184
+
1185
+ switch (auth_cred->label) {
1186
+ case EDHOC_COSE_HEADER_KID:
1187
+ cbor_id_cred_r._id_cred_x_kid_present = true;
1188
+
1189
+ switch (auth_cred->key_id.encode_type) {
1190
+ case EDHOC_ENCODE_TYPE_INTEGER:
1191
+ cbor_id_cred_r._id_cred_x_kid._id_cred_x_kid_choice =
1192
+ _id_cred_x_kid_int;
1193
+ cbor_id_cred_r._id_cred_x_kid._id_cred_x_kid_int =
1194
+ auth_cred->key_id.key_id_int;
1195
+ break;
1196
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1197
+ cbor_id_cred_r._id_cred_x_kid._id_cred_x_kid_choice =
1198
+ _id_cred_x_kid_bstr;
1199
+ cbor_id_cred_r._id_cred_x_kid._id_cred_x_kid_bstr.value =
1200
+ auth_cred->key_id.key_id_bstr;
1201
+ cbor_id_cred_r._id_cred_x_kid._id_cred_x_kid_bstr.len =
1202
+ auth_cred->key_id.key_id_bstr_length;
1203
+ break;
1204
+ default:
1205
+ return EDHOC_ERROR_NOT_PERMITTED;
1206
+ }
1207
+
1208
+ break;
1209
+
1210
+ case EDHOC_COSE_HEADER_X509_CHAIN: {
1211
+ if (0 == auth_cred->x509_chain.nr_of_certs)
1212
+ return EDHOC_ERROR_BAD_STATE;
1213
+
1214
+ cbor_id_cred_r._id_cred_x_x5chain_present = true;
1215
+
1216
+ struct COSE_X509_ *cose_x509 =
1217
+ &cbor_id_cred_r._id_cred_x_x5chain._id_cred_x_x5chain;
1218
+
1219
+ if (1 == auth_cred->x509_chain.nr_of_certs) {
1220
+ cose_x509->_COSE_X509_choice = _COSE_X509_bstr;
1221
+ cose_x509->_COSE_X509_bstr.value =
1222
+ auth_cred->x509_chain.cert[0];
1223
+ cose_x509->_COSE_X509_bstr.len =
1224
+ auth_cred->x509_chain.cert_len[0];
1225
+ } else {
1226
+ if (ARRAY_SIZE(cose_x509->_COSE_X509__certs_certs) <
1227
+ auth_cred->x509_chain.nr_of_certs)
1228
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1229
+
1230
+ cose_x509->_COSE_X509_choice = _COSE_X509__certs;
1231
+ cose_x509->_COSE_X509__certs_certs_count =
1232
+ auth_cred->x509_chain.nr_of_certs;
1233
+
1234
+ for (size_t i = 0;
1235
+ i < auth_cred->x509_chain.nr_of_certs; ++i) {
1236
+ cose_x509->_COSE_X509__certs_certs[i].value =
1237
+ auth_cred->x509_chain.cert[i];
1238
+ cose_x509->_COSE_X509__certs_certs[i].len =
1239
+ auth_cred->x509_chain.cert_len[i];
1240
+ }
1241
+ }
1242
+ break;
1243
+ }
1244
+
1245
+ case EDHOC_COSE_HEADER_X509_HASH: {
1246
+ cbor_id_cred_r._id_cred_x_x5t_present = true;
1247
+
1248
+ struct COSE_CertHash *cose_x509 =
1249
+ &cbor_id_cred_r._id_cred_x_x5t._id_cred_x_x5t;
1250
+
1251
+ cose_x509->_COSE_CertHash_hashValue.value =
1252
+ auth_cred->x509_hash.cert_fp;
1253
+ cose_x509->_COSE_CertHash_hashValue.len =
1254
+ auth_cred->x509_hash.cert_fp_len;
1255
+
1256
+ switch (auth_cred->x509_hash.encode_type) {
1257
+ case EDHOC_ENCODE_TYPE_INTEGER:
1258
+ cose_x509->_COSE_CertHash_hashAlg_choice =
1259
+ _COSE_CertHash_hashAlg_int;
1260
+ cose_x509->_COSE_CertHash_hashAlg_int =
1261
+ auth_cred->x509_hash.alg_int;
1262
+ break;
1263
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1264
+ cose_x509->_COSE_CertHash_hashAlg_choice =
1265
+ _COSE_CertHash_hashAlg_tstr;
1266
+ cose_x509->_COSE_CertHash_hashAlg_tstr.value =
1267
+ auth_cred->x509_hash.alg_bstr;
1268
+ cose_x509->_COSE_CertHash_hashAlg_tstr.len =
1269
+ auth_cred->x509_hash.alg_bstr_length;
1270
+ break;
1271
+ default:
1272
+ return EDHOC_ERROR_NOT_PERMITTED;
1273
+ }
1274
+ break;
1275
+ }
1276
+ default:
1277
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
1278
+ }
1279
+
1280
+ len = 0;
1281
+ ret = cbor_encode_id_cred_x(cbor_items->id_cred_r,
1282
+ cbor_items->id_cred_r_len, &cbor_id_cred_r,
1283
+ &len);
1284
+ if (ZCBOR_SUCCESS != ret)
1285
+ return EDHOC_ERROR_CBOR_FAILURE;
1286
+
1287
+ cbor_items->id_cred_r_len = len;
1288
+
1289
+ /* Check compact encoding of ID_CRED_R. */
1290
+ if (EDHOC_COSE_HEADER_KID == auth_cred->label) {
1291
+ ret = kid_compact_encoding(auth_cred, cbor_items);
1292
+
1293
+ if (EDHOC_SUCCESS != ret)
1294
+ return EDHOC_ERROR_CBOR_FAILURE;
1295
+ }
1296
+
1297
+ /* TH_2 length. */
1298
+ len = ctx->th_len;
1299
+ cbor_items->th_2 = &cbor_items->id_cred_r[cbor_items->id_cred_r_len];
1300
+ cbor_items->th_2_len = cbor_bstr_overhead(len) + len;
1301
+
1302
+ /* Cborise TH_2. */
1303
+ const struct zcbor_string cbor_th_2 = {
1304
+ .value = ctx->th,
1305
+ .len = ctx->th_len,
1306
+ };
1307
+
1308
+ len = 0;
1309
+ ret = cbor_encode_byte_string_type_bstr_type(
1310
+ cbor_items->th_2, cbor_items->th_2_len, &cbor_th_2, &len);
1311
+
1312
+ if (ZCBOR_SUCCESS != ret || cbor_items->th_2_len != len)
1313
+ return EDHOC_ERROR_CBOR_FAILURE;
1314
+
1315
+ /* CRED_R length. */
1316
+ cbor_items->cred_r = &cbor_items->th_2[cbor_items->th_2_len];
1317
+ len = 0;
1318
+
1319
+ switch (auth_cred->label) {
1320
+ case EDHOC_COSE_HEADER_KID:
1321
+ len += auth_cred->key_id.cred_len;
1322
+ len += cbor_bstr_overhead(auth_cred->key_id.cred_len);
1323
+ break;
1324
+
1325
+ case EDHOC_COSE_HEADER_X509_CHAIN: {
1326
+ const size_t end_entity_idx =
1327
+ auth_cred->x509_chain.nr_of_certs - 1;
1328
+ len += auth_cred->x509_chain.cert_len[end_entity_idx];
1329
+ len += cbor_bstr_overhead(
1330
+ auth_cred->x509_chain.cert_len[end_entity_idx]);
1331
+ break;
1332
+ }
1333
+
1334
+ case EDHOC_COSE_HEADER_X509_HASH:
1335
+ len += auth_cred->x509_hash.cert_len;
1336
+ len += cbor_bstr_overhead(auth_cred->x509_hash.cert_len);
1337
+ break;
1338
+
1339
+ default:
1340
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
1341
+ }
1342
+
1343
+ cbor_items->cred_r_len = len;
1344
+
1345
+ /* Cborise CRED_R. */
1346
+ struct zcbor_string cbor_cred_r = { 0 };
1347
+
1348
+ switch (auth_cred->label) {
1349
+ case EDHOC_COSE_HEADER_KID:
1350
+ cbor_cred_r.value = auth_cred->key_id.cred;
1351
+ cbor_cred_r.len = auth_cred->key_id.cred_len;
1352
+ break;
1353
+
1354
+ case EDHOC_COSE_HEADER_X509_CHAIN: {
1355
+ const size_t end_entity_idx =
1356
+ auth_cred->x509_chain.nr_of_certs - 1;
1357
+ cbor_cred_r.value = auth_cred->x509_chain.cert[end_entity_idx];
1358
+ cbor_cred_r.len =
1359
+ auth_cred->x509_chain.cert_len[end_entity_idx];
1360
+ break;
1361
+ }
1362
+
1363
+ case EDHOC_COSE_HEADER_X509_HASH:
1364
+ cbor_cred_r.value = auth_cred->x509_hash.cert;
1365
+ cbor_cred_r.len = auth_cred->x509_hash.cert_len;
1366
+ break;
1367
+
1368
+ default:
1369
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
1370
+ }
1371
+
1372
+ if (EDHOC_COSE_HEADER_KID == auth_cred->label &&
1373
+ true == auth_cred->key_id.cred_is_cbor) {
1374
+ memcpy(cbor_items->cred_r, auth_cred->key_id.cred,
1375
+ auth_cred->key_id.cred_len);
1376
+ cbor_items->cred_r_len = auth_cred->key_id.cred_len;
1377
+ } else {
1378
+ len = 0;
1379
+ ret = cbor_encode_byte_string_type_bstr_type(
1380
+ cbor_items->cred_r, cbor_items->cred_r_len,
1381
+ &cbor_cred_r, &len);
1382
+
1383
+ if (ZCBOR_SUCCESS != ret || cbor_items->cred_r_len != len)
1384
+ return EDHOC_ERROR_CBOR_FAILURE;
1385
+ }
1386
+
1387
+ /* EAD_2 length. */
1388
+ if (0 != ctx->nr_of_ead_tokens) {
1389
+ len = 0;
1390
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
1391
+ len += cbor_int_mem_req(ctx->ead_token[i].label);
1392
+ len += 1; // cbor boolean
1393
+ len += ctx->ead_token[i].value_len;
1394
+ len += cbor_bstr_overhead(ctx->ead_token[i].value_len);
1395
+ }
1396
+
1397
+ cbor_items->is_ead_2 = true;
1398
+ cbor_items->ead_2 = &cbor_items->cred_r[cbor_items->cred_r_len];
1399
+ cbor_items->ead_2_len = len;
1400
+ } else {
1401
+ cbor_items->is_ead_2 = false;
1402
+ cbor_items->ead_2 = NULL;
1403
+ cbor_items->ead_2_len = 0;
1404
+ }
1405
+
1406
+ /* Cborise EAD_2 if present. */
1407
+ if (cbor_items->is_ead_2) {
1408
+ struct ead_ ead_tokens = { ._ead_count =
1409
+ ctx->nr_of_ead_tokens };
1410
+
1411
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
1412
+ ead_tokens._ead[i]._ead_label = ctx->ead_token[i].label;
1413
+ ead_tokens._ead[i]._ead_value_present =
1414
+ (NULL != ctx->ead_token[i].value);
1415
+ ead_tokens._ead[i]._ead_value.value =
1416
+ ctx->ead_token[i].value;
1417
+ ead_tokens._ead[i]._ead_value.len =
1418
+ ctx->ead_token[i].value_len;
1419
+ }
1420
+
1421
+ len = 0;
1422
+ ret = cbor_encode_ead(cbor_items->ead_2, cbor_items->ead_2_len,
1423
+ &ead_tokens, &len);
1424
+
1425
+ if (ZCBOR_SUCCESS != ret)
1426
+ return EDHOC_ERROR_CBOR_FAILURE;
1427
+
1428
+ cbor_items->ead_2_len = len;
1429
+ }
1430
+
1431
+ const size_t encoded_bytes =
1432
+ cbor_items->conn_id_len + cbor_items->id_cred_r_len +
1433
+ cbor_items->th_2_len + cbor_items->cred_r_len +
1434
+ cbor_items->ead_2_len;
1435
+
1436
+ if (encoded_bytes > cbor_items->buf_len)
1437
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1438
+
1439
+ cbor_items->buf_len = encoded_bytes;
1440
+ return EDHOC_SUCCESS;
1441
+ }
1442
+
1443
+ static int get_mac_2_len(enum edhoc_role role, const struct edhoc_context *ctx,
1444
+ size_t *mac_2_len)
1445
+ {
1446
+ if (NULL == ctx || NULL == mac_2_len)
1447
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1448
+
1449
+ const struct edhoc_cipher_suite csuite =
1450
+ ctx->csuite[ctx->chosen_csuite_idx];
1451
+
1452
+ if (role == initiator) {
1453
+ switch (ctx->method) {
1454
+ case EDHOC_METHOD_0:
1455
+ case EDHOC_METHOD_2:
1456
+ *mac_2_len = csuite.hash_length;
1457
+ return EDHOC_SUCCESS;
1458
+
1459
+ case EDHOC_METHOD_1:
1460
+ case EDHOC_METHOD_3:
1461
+ *mac_2_len = csuite.mac_length;
1462
+ return EDHOC_SUCCESS;
1463
+ }
1464
+ }
1465
+
1466
+ if (role == responder) {
1467
+ switch (ctx->method) {
1468
+ case EDHOC_METHOD_0:
1469
+ case EDHOC_METHOD_2:
1470
+ *mac_2_len = csuite.hash_length;
1471
+ return EDHOC_SUCCESS;
1472
+
1473
+ case EDHOC_METHOD_1:
1474
+ case EDHOC_METHOD_3:
1475
+ *mac_2_len = csuite.mac_length;
1476
+ return EDHOC_SUCCESS;
1477
+ }
1478
+ }
1479
+
1480
+ return EDHOC_ERROR_NOT_PERMITTED;
1481
+ }
1482
+
1483
+ static int comp_mac_2(const struct edhoc_context *ctx,
1484
+ const struct cbor_items *cbor_items, uint8_t *mac_2,
1485
+ size_t mac_2_len)
1486
+ {
1487
+ if (NULL == ctx || NULL == cbor_items || NULL == mac_2 ||
1488
+ 0 == mac_2_len)
1489
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1490
+
1491
+ if (EDHOC_PRK_STATE_3E2M != ctx->prk_state)
1492
+ return EDHOC_ERROR_BAD_STATE;
1493
+
1494
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1495
+
1496
+ struct info input_info = {
1497
+ ._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_MAC_2,
1498
+ ._info_context.value = cbor_items->buf,
1499
+ ._info_context.len = cbor_items->buf_len,
1500
+ ._info_length = (uint32_t)mac_2_len,
1501
+ };
1502
+
1503
+ /* Calculate struct info cbor overhead. */
1504
+ size_t len = 0;
1505
+ len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_MAC_2);
1506
+ len += cbor_items->buf_len + cbor_bstr_overhead(cbor_items->buf_len);
1507
+ len += cbor_int_mem_req((int32_t)mac_2_len);
1508
+
1509
+ ALLOCATE_ARRAY(uint8_t, info, len);
1510
+ memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
1511
+
1512
+ len = 0;
1513
+ ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
1514
+
1515
+ if (ZCBOR_SUCCESS != ret)
1516
+ return EDHOC_ERROR_CBOR_FAILURE;
1517
+
1518
+ if (NULL != ctx->logger)
1519
+ ctx->logger(ctx->user_ctx, "MAC_2 info", info, len);
1520
+
1521
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
1522
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
1523
+ ctx->prk_len, key_id);
1524
+
1525
+ if (EDHOC_SUCCESS != ret)
1526
+ return EDHOC_ERROR_CRYPTO_FAILURE;
1527
+
1528
+ ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, mac_2,
1529
+ mac_2_len);
1530
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
1531
+ memset(key_id, 0, sizeof(key_id));
1532
+
1533
+ if (EDHOC_SUCCESS != ret)
1534
+ return EDHOC_ERROR_CRYPTO_FAILURE;
1535
+
1536
+ return EDHOC_SUCCESS;
1537
+ }
1538
+
1539
+ static int comp_sign_or_mac_2_len(enum edhoc_role role,
1540
+ const struct edhoc_context *ctx,
1541
+ size_t *sign_or_mac_2_len)
1542
+ {
1543
+ if (NULL == ctx || NULL == sign_or_mac_2_len)
1544
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1545
+
1546
+ const struct edhoc_cipher_suite csuite =
1547
+ ctx->csuite[ctx->chosen_csuite_idx];
1548
+
1549
+ if (role == initiator) {
1550
+ switch (ctx->method) {
1551
+ case EDHOC_METHOD_0:
1552
+ case EDHOC_METHOD_2:
1553
+ *sign_or_mac_2_len = csuite.ecc_sign_length;
1554
+ return EDHOC_SUCCESS;
1555
+
1556
+ case EDHOC_METHOD_1:
1557
+ case EDHOC_METHOD_3:
1558
+ *sign_or_mac_2_len = csuite.mac_length;
1559
+ return EDHOC_SUCCESS;
1560
+ }
1561
+ }
1562
+
1563
+ if (role == responder) {
1564
+ switch (ctx->method) {
1565
+ case EDHOC_METHOD_0:
1566
+ case EDHOC_METHOD_2:
1567
+ *sign_or_mac_2_len = csuite.ecc_sign_length;
1568
+ return EDHOC_SUCCESS;
1569
+
1570
+ case EDHOC_METHOD_1:
1571
+ case EDHOC_METHOD_3:
1572
+ *sign_or_mac_2_len = csuite.mac_length;
1573
+ return EDHOC_SUCCESS;
1574
+ }
1575
+ }
1576
+
1577
+ return EDHOC_ERROR_NOT_PERMITTED;
1578
+ }
1579
+
1580
+ static int comp_sign_or_mac_2(const struct edhoc_context *ctx,
1581
+ const struct edhoc_auth_creds *auth_cred,
1582
+ const struct cbor_items *cbor_items,
1583
+ const uint8_t *mac_2, size_t mac_2_len,
1584
+ uint8_t *sign, size_t sign_len)
1585
+ {
1586
+ if (NULL == ctx || NULL == auth_cred || NULL == cbor_items ||
1587
+ NULL == mac_2 || 0 == mac_2_len || NULL == sign || 0 == sign_len)
1588
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1589
+
1590
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1591
+
1592
+ switch (ctx->method) {
1593
+ case EDHOC_METHOD_0:
1594
+ case EDHOC_METHOD_2: {
1595
+ const struct sig_structure cose_sign_1 = {
1596
+ ._sig_structure_protected.value = cbor_items->id_cred_r,
1597
+ ._sig_structure_protected.len =
1598
+ cbor_items->id_cred_r_len,
1599
+ ._sig_structure_external_aad.value = cbor_items->th_2,
1600
+ ._sig_structure_external_aad.len =
1601
+ cbor_items->th_2_len + cbor_items->cred_r_len +
1602
+ cbor_items->ead_2_len,
1603
+ ._sig_structure_payload.value = mac_2,
1604
+ ._sig_structure_payload.len = mac_2_len,
1605
+ };
1606
+
1607
+ size_t len = 0;
1608
+ len += sizeof("Signature1") +
1609
+ cbor_tstr_overhead(sizeof("Signature1"));
1610
+ len += cbor_items->id_cred_r_len +
1611
+ cbor_bstr_overhead(cbor_items->id_cred_r_len);
1612
+ len += cbor_items->th_2_len + cbor_items->cred_r_len +
1613
+ cbor_items->ead_2_len +
1614
+ cbor_bstr_overhead(cbor_items->th_2_len +
1615
+ cbor_items->cred_r_len +
1616
+ cbor_items->ead_2_len);
1617
+ len += mac_2_len + cbor_int_mem_req((int32_t)mac_2_len);
1618
+
1619
+ ALLOCATE_ARRAY(uint8_t, cose_sign_1_buf, len);
1620
+ memset(cose_sign_1_buf, 0, ALLOCATE_ARRAY_SIZEOF(cose_sign_1_buf));
1621
+
1622
+ len = 0;
1623
+ ret = cbor_encode_sig_structure(cose_sign_1_buf,
1624
+ ARRAY_SIZE_VLA(cose_sign_1_buf),
1625
+ &cose_sign_1, &len);
1626
+ const size_t cose_sign_1_buf_len = len;
1627
+
1628
+ if (ZCBOR_SUCCESS != ret)
1629
+ return EDHOC_ERROR_CBOR_FAILURE;
1630
+
1631
+ len = 0;
1632
+ ret = ctx->crypto.signature(
1633
+ ctx->user_ctx, auth_cred->priv_key_id, cose_sign_1_buf,
1634
+ cose_sign_1_buf_len, sign, sign_len, &len);
1635
+
1636
+ if (EDHOC_SUCCESS != ret || sign_len != len)
1637
+ return EDHOC_ERROR_CRYPTO_FAILURE;
1638
+
1639
+ return EDHOC_SUCCESS;
1640
+ }
1641
+
1642
+ case EDHOC_METHOD_1:
1643
+ case EDHOC_METHOD_3:
1644
+ memcpy(sign, mac_2, mac_2_len);
1645
+ return EDHOC_SUCCESS;
1646
+ }
1647
+
1648
+ return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
1649
+ }
1650
+
1651
+ static int comp_plaintext_2_len(const struct edhoc_context *ctx,
1652
+ const struct cbor_items *cbor_items,
1653
+ size_t sign_len, size_t *plaintext_2_len)
1654
+ {
1655
+ if (NULL == ctx || NULL == cbor_items || 0 == sign_len ||
1656
+ NULL == plaintext_2_len)
1657
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1658
+
1659
+ size_t len = 0;
1660
+
1661
+ switch (ctx->cid.encode_type) {
1662
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
1663
+ len += cbor_int_mem_req(ctx->cid.int_value);
1664
+ break;
1665
+ case EDHOC_CID_TYPE_BYTE_STRING:
1666
+ len += ctx->cid.bstr_length;
1667
+ len += cbor_bstr_overhead(ctx->cid.bstr_length);
1668
+ break;
1669
+ }
1670
+
1671
+ if (true == cbor_items->id_cred_r_is_comp_enc) {
1672
+ switch (cbor_items->id_cred_r_enc_type) {
1673
+ case EDHOC_ENCODE_TYPE_INTEGER:
1674
+ len += cbor_int_mem_req(cbor_items->id_cred_r_int);
1675
+ break;
1676
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1677
+ len += cbor_items->id_cred_r_bstr_len;
1678
+ len += cbor_bstr_overhead(
1679
+ cbor_items->id_cred_r_bstr_len);
1680
+ break;
1681
+ }
1682
+ } else {
1683
+ len += cbor_items->id_cred_r_len;
1684
+ }
1685
+
1686
+ len += sign_len;
1687
+ len += cbor_bstr_overhead(sign_len);
1688
+ len += cbor_items->ead_2_len;
1689
+
1690
+ *plaintext_2_len = len;
1691
+ return EDHOC_SUCCESS;
1692
+ }
1693
+
1694
+ static int prepare_plaintext_2(const struct edhoc_context *ctx,
1695
+ const struct cbor_items *cbor_items,
1696
+ const uint8_t *sign, size_t sign_len,
1697
+ uint8_t *ptxt, size_t ptxt_size,
1698
+ size_t *ptxt_len)
1699
+ {
1700
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1701
+
1702
+ size_t offset = 0;
1703
+
1704
+ switch (ctx->cid.encode_type) {
1705
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER: {
1706
+ size_t len = 0;
1707
+ const int32_t value = ctx->cid.int_value;
1708
+ ret = cbor_encode_integer_type_int_type(
1709
+ ptxt, ptxt_size - offset, &value, &len);
1710
+
1711
+ if (ZCBOR_SUCCESS != ret)
1712
+ return EDHOC_ERROR_CBOR_FAILURE;
1713
+
1714
+ offset += len;
1715
+ break;
1716
+ }
1717
+ case EDHOC_CID_TYPE_BYTE_STRING: {
1718
+ size_t len = 0;
1719
+ const struct zcbor_string input = {
1720
+ .value = ctx->cid.bstr_value,
1721
+ .len = ctx->cid.bstr_length,
1722
+ };
1723
+ ret = cbor_encode_byte_string_type_bstr_type(
1724
+ ptxt, ptxt_size - offset, &input, &len);
1725
+
1726
+ if (ZCBOR_SUCCESS != ret)
1727
+ return EDHOC_ERROR_CBOR_FAILURE;
1728
+
1729
+ offset += len;
1730
+ break;
1731
+ }
1732
+ default:
1733
+ return EDHOC_ERROR_NOT_PERMITTED;
1734
+ }
1735
+
1736
+ if (cbor_items->id_cred_r_is_comp_enc) {
1737
+ switch (cbor_items->id_cred_r_enc_type) {
1738
+ case EDHOC_ENCODE_TYPE_INTEGER:
1739
+ memcpy(&ptxt[offset], &cbor_items->id_cred_r_int, 1);
1740
+ offset += 1;
1741
+ break;
1742
+ case EDHOC_ENCODE_TYPE_BYTE_STRING:
1743
+ memcpy(&ptxt[offset], &cbor_items->id_cred_r_bstr,
1744
+ cbor_items->id_cred_r_bstr_len);
1745
+ offset += cbor_items->id_cred_r_bstr_len;
1746
+ break;
1747
+ default:
1748
+ return EDHOC_ERROR_NOT_PERMITTED;
1749
+ }
1750
+ } else {
1751
+ memcpy(&ptxt[offset], cbor_items->id_cred_r,
1752
+ cbor_items->id_cred_r_len);
1753
+ offset += cbor_items->id_cred_r_len;
1754
+ }
1755
+
1756
+ const struct zcbor_string cbor_sign_or_mac_2 = {
1757
+ .value = sign,
1758
+ .len = sign_len,
1759
+ };
1760
+
1761
+ size_t len = 0;
1762
+ ret = cbor_encode_byte_string_type_bstr_type(
1763
+ &ptxt[offset], sign_len + cbor_bstr_overhead(sign_len) + 1,
1764
+ &cbor_sign_or_mac_2, &len);
1765
+
1766
+ if (ZCBOR_SUCCESS != ret ||
1767
+ (sign_len + cbor_bstr_overhead(sign_len)) != len)
1768
+ return EDHOC_ERROR_CBOR_FAILURE;
1769
+
1770
+ offset += len;
1771
+
1772
+ if (cbor_items->is_ead_2) {
1773
+ memcpy(&ptxt[offset], cbor_items->ead_2, cbor_items->ead_2_len);
1774
+ offset += cbor_items->ead_2_len;
1775
+ }
1776
+
1777
+ if (offset > ptxt_size)
1778
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1779
+
1780
+ *ptxt_len = offset;
1781
+
1782
+ return EDHOC_SUCCESS;
1783
+ }
1784
+
1785
+ static int comp_keystream(const struct edhoc_context *ctx,
1786
+ const uint8_t *prk_2e, size_t prk_2e_len,
1787
+ uint8_t *keystream, size_t keystream_len)
1788
+ {
1789
+ if (NULL == ctx || NULL == prk_2e || 0 == prk_2e_len ||
1790
+ NULL == keystream || 0 == keystream_len)
1791
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1792
+
1793
+ if (EDHOC_TH_STATE_2 != ctx->th_state)
1794
+ return EDHOC_ERROR_BAD_STATE;
1795
+
1796
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1797
+
1798
+ const struct info input_info = {
1799
+ ._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_KEYSTERAM_2,
1800
+ ._info_context.value = ctx->th,
1801
+ ._info_context.len = ctx->th_len,
1802
+ ._info_length = (uint32_t)keystream_len,
1803
+ };
1804
+
1805
+ size_t len = 0;
1806
+ len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_KEYSTERAM_2);
1807
+ len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
1808
+ len += cbor_int_mem_req((int32_t)keystream_len);
1809
+
1810
+ ALLOCATE_ARRAY(uint8_t, info, len);
1811
+ memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
1812
+
1813
+ len = 0;
1814
+ ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
1815
+
1816
+ if (ZCBOR_SUCCESS != ret || ARRAY_SIZE_VLA(info) != len)
1817
+ return EDHOC_ERROR_CBOR_FAILURE;
1818
+
1819
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
1820
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, prk_2e,
1821
+ prk_2e_len, key_id);
1822
+
1823
+ if (EDHOC_SUCCESS != ret)
1824
+ return EDHOC_ERROR_CRYPTO_FAILURE;
1825
+
1826
+ ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, ARRAY_SIZE_VLA(info),
1827
+ keystream, keystream_len);
1828
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
1829
+
1830
+ if (EDHOC_SUCCESS != ret)
1831
+ return EDHOC_ERROR_CRYPTO_FAILURE;
1832
+
1833
+ return EDHOC_SUCCESS;
1834
+ }
1835
+
1836
+ static void xor_arrays(uint8_t *dst, const uint8_t *src, size_t count)
1837
+ {
1838
+ for (size_t i = 0; i < count; ++i)
1839
+ dst[i] ^= src[i];
1840
+ }
1841
+
1842
+ static int prepare_message_2(const struct edhoc_context *ctx,
1843
+ const uint8_t *ctxt, size_t ctxt_len,
1844
+ uint8_t *msg_2, size_t msg_2_size,
1845
+ size_t *msg_2_len)
1846
+ {
1847
+ if (NULL == ctx || NULL == ctxt || 0 == ctxt_len || NULL == msg_2 ||
1848
+ 0 == msg_2_size || NULL == msg_2_len)
1849
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1850
+
1851
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1852
+ size_t offset = 0;
1853
+
1854
+ size_t len = 0;
1855
+ len += ctx->dh_pub_key_len;
1856
+ len += ctxt_len;
1857
+
1858
+ ALLOCATE_ARRAY(uint8_t, buffer, len);
1859
+ memset(buffer, 0, ALLOCATE_ARRAY_SIZEOF(buffer));
1860
+
1861
+ memcpy(&buffer[offset], ctx->dh_pub_key, ctx->dh_pub_key_len);
1862
+ offset += ctx->dh_pub_key_len;
1863
+
1864
+ memcpy(&buffer[offset], ctxt, ctxt_len);
1865
+ offset += ctxt_len;
1866
+
1867
+ if (ARRAY_SIZE_VLA(buffer) < offset)
1868
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1869
+
1870
+ const struct zcbor_string cbor_msg_2 = {
1871
+ .value = buffer,
1872
+ .len = ARRAY_SIZE_VLA(buffer),
1873
+ };
1874
+
1875
+ ret = cbor_encode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_size,
1876
+ &cbor_msg_2, msg_2_len);
1877
+
1878
+ if (ZCBOR_SUCCESS != ret)
1879
+ return EDHOC_ERROR_CBOR_FAILURE;
1880
+
1881
+ return EDHOC_SUCCESS;
1882
+ }
1883
+
1884
+ static int comp_ciphertext_2_len(const struct edhoc_context *ctx,
1885
+ const uint8_t *msg_2, size_t msg_2_len,
1886
+ size_t *ctxt_len)
1887
+ {
1888
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1889
+ size_t len = 0;
1890
+
1891
+ struct zcbor_string dec_msg_2 = { 0 };
1892
+ ret = cbor_decode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_len,
1893
+ &dec_msg_2, &len);
1894
+
1895
+ if (EDHOC_SUCCESS != ret)
1896
+ return EDHOC_ERROR_CBOR_FAILURE;
1897
+
1898
+ if (len > msg_2_len)
1899
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1900
+
1901
+ len = dec_msg_2.len;
1902
+ len -= ctx->csuite[ctx->chosen_csuite_idx].ecc_key_length;
1903
+
1904
+ *ctxt_len = len;
1905
+ return EDHOC_SUCCESS;
1906
+ }
1907
+
1908
+ static int parse_msg_2(struct edhoc_context *ctx, const uint8_t *msg_2,
1909
+ size_t msg_2_len, uint8_t *ctxt_2, size_t ctxt_2_len)
1910
+ {
1911
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1912
+ size_t len = 0;
1913
+
1914
+ struct zcbor_string dec_msg_2 = { 0 };
1915
+ ret = cbor_decode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_len,
1916
+ &dec_msg_2, &len);
1917
+
1918
+ if (EDHOC_SUCCESS != ret)
1919
+ return EDHOC_ERROR_CBOR_FAILURE;
1920
+
1921
+ if (len > msg_2_len)
1922
+ return EDHOC_ERROR_MSG_2_PROCESS_FAILURE;
1923
+
1924
+ /* Get Diffie-Hellmann peer public key (G_Y). */
1925
+ const struct edhoc_cipher_suite csuite =
1926
+ ctx->csuite[ctx->chosen_csuite_idx];
1927
+ ctx->dh_peer_pub_key_len = csuite.ecc_key_length;
1928
+ memcpy(ctx->dh_peer_pub_key, dec_msg_2.value, ctx->dh_peer_pub_key_len);
1929
+
1930
+ /* Get CIPHERTEXT_2. */
1931
+ const size_t offset = ctx->dh_peer_pub_key_len;
1932
+ memcpy(ctxt_2, &dec_msg_2.value[offset], ctxt_2_len);
1933
+
1934
+ return EDHOC_SUCCESS;
1935
+ }
1936
+
1937
+ static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
1938
+ size_t ptxt_len, struct plaintext *parsed_ptxt)
1939
+ {
1940
+ if (NULL == ctx || NULL == ptxt || 0 == ptxt_len || NULL == parsed_ptxt)
1941
+ return EDHOC_ERROR_INVALID_ARGUMENT;
1942
+
1943
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
1944
+ size_t len = 0;
1945
+
1946
+ struct plaintext_2 cbor_ptxt_2 = { 0 };
1947
+ ret = cbor_decode_plaintext_2(ptxt, ptxt_len, &cbor_ptxt_2, &len);
1948
+
1949
+ if (ZCBOR_SUCCESS != ret)
1950
+ return EDHOC_ERROR_CBOR_FAILURE;
1951
+
1952
+ /* C_R */
1953
+ switch (cbor_ptxt_2._plaintext_2_C_R_choice) {
1954
+ case _plaintext_2_C_R_int:
1955
+ if (ONE_BYTE_CBOR_INT_MIN_VALUE >
1956
+ (int8_t)cbor_ptxt_2._plaintext_2_C_R_int ||
1957
+ ONE_BYTE_CBOR_INT_MAX_VALUE <
1958
+ (int8_t)cbor_ptxt_2._plaintext_2_C_R_int)
1959
+ return EDHOC_ERROR_NOT_PERMITTED;
1960
+
1961
+ ctx->peer_cid.encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER;
1962
+ ctx->peer_cid.int_value =
1963
+ (int8_t)cbor_ptxt_2._plaintext_2_C_R_int;
1964
+ break;
1965
+
1966
+ case _plaintext_2_C_R_bstr:
1967
+ if (ARRAY_SIZE(ctx->peer_cid.bstr_value) <
1968
+ cbor_ptxt_2._plaintext_2_C_R_bstr.len)
1969
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
1970
+
1971
+ ctx->peer_cid.encode_type = EDHOC_CID_TYPE_BYTE_STRING;
1972
+ ctx->peer_cid.bstr_length =
1973
+ cbor_ptxt_2._plaintext_2_C_R_bstr.len;
1974
+ memcpy(ctx->peer_cid.bstr_value,
1975
+ cbor_ptxt_2._plaintext_2_C_R_bstr.value,
1976
+ cbor_ptxt_2._plaintext_2_C_R_bstr.len);
1977
+ break;
1978
+
1979
+ default:
1980
+ return EDHOC_ERROR_NOT_PERMITTED;
1981
+ }
1982
+
1983
+ /* ID_CRED_R */
1984
+ switch (cbor_ptxt_2._plaintext_2_ID_CRED_R_choice) {
1985
+ case _plaintext_2_ID_CRED_R_int:
1986
+ parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
1987
+ parsed_ptxt->auth_cred.key_id.encode_type =
1988
+ EDHOC_ENCODE_TYPE_INTEGER;
1989
+ parsed_ptxt->auth_cred.key_id.key_id_int =
1990
+ cbor_ptxt_2._plaintext_2_ID_CRED_R_int;
1991
+ break;
1992
+
1993
+ case _plaintext_2_ID_CRED_R_bstr:
1994
+ parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
1995
+ parsed_ptxt->auth_cred.key_id.encode_type =
1996
+ EDHOC_ENCODE_TYPE_BYTE_STRING;
1997
+ parsed_ptxt->auth_cred.key_id.key_id_bstr_length =
1998
+ cbor_ptxt_2._plaintext_2_ID_CRED_R_bstr.len;
1999
+ memcpy(parsed_ptxt->auth_cred.key_id.key_id_bstr,
2000
+ cbor_ptxt_2._plaintext_2_ID_CRED_R_bstr.value,
2001
+ cbor_ptxt_2._plaintext_2_ID_CRED_R_bstr.len);
2002
+ break;
2003
+
2004
+ case _plaintext_2_ID_CRED_R__map: {
2005
+ const struct map *cbor_map =
2006
+ &cbor_ptxt_2._plaintext_2_ID_CRED_R__map;
2007
+
2008
+ if (cbor_map->_map_x5chain_present) {
2009
+ parsed_ptxt->auth_cred.label =
2010
+ EDHOC_COSE_HEADER_X509_CHAIN;
2011
+
2012
+ const struct COSE_X509_ *cose_x509 =
2013
+ &cbor_map->_map_x5chain._map_x5chain;
2014
+
2015
+ switch (cose_x509->_COSE_X509_choice) {
2016
+ case _COSE_X509_bstr:
2017
+ parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
2018
+ 1;
2019
+ parsed_ptxt->auth_cred.x509_chain.cert[0] =
2020
+ cose_x509->_COSE_X509_bstr.value;
2021
+ parsed_ptxt->auth_cred.x509_chain.cert_len[0] =
2022
+ cose_x509->_COSE_X509_bstr.len;
2023
+ break;
2024
+ case _COSE_X509__certs: {
2025
+ if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_chain
2026
+ .cert) <
2027
+ cose_x509->_COSE_X509__certs_certs_count)
2028
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
2029
+
2030
+ parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
2031
+ cose_x509->_COSE_X509__certs_certs_count;
2032
+
2033
+ for (size_t i = 0;
2034
+ i <
2035
+ cose_x509->_COSE_X509__certs_certs_count;
2036
+ ++i) {
2037
+ parsed_ptxt->auth_cred.x509_chain
2038
+ .cert[i] =
2039
+ cose_x509
2040
+ ->_COSE_X509__certs_certs
2041
+ [i]
2042
+ .value;
2043
+ parsed_ptxt->auth_cred.x509_chain
2044
+ .cert_len[i] =
2045
+ cose_x509
2046
+ ->_COSE_X509__certs_certs
2047
+ [i]
2048
+ .len;
2049
+ }
2050
+ break;
2051
+ }
2052
+
2053
+ default:
2054
+ return EDHOC_ERROR_NOT_PERMITTED;
2055
+ }
2056
+ }
2057
+
2058
+ if (cbor_map->_map_x5t_present) {
2059
+ parsed_ptxt->auth_cred.label =
2060
+ EDHOC_COSE_HEADER_X509_HASH;
2061
+
2062
+ const struct COSE_CertHash *cose_x509 =
2063
+ &cbor_map->_map_x5t._map_x5t;
2064
+
2065
+ parsed_ptxt->auth_cred.x509_hash.cert_fp =
2066
+ cose_x509->_COSE_CertHash_hashValue.value;
2067
+ parsed_ptxt->auth_cred.x509_hash.cert_fp_len =
2068
+ cose_x509->_COSE_CertHash_hashValue.len;
2069
+
2070
+ switch (cose_x509->_COSE_CertHash_hashAlg_choice) {
2071
+ case _COSE_CertHash_hashAlg_int:
2072
+ parsed_ptxt->auth_cred.x509_hash.encode_type =
2073
+ EDHOC_ENCODE_TYPE_INTEGER;
2074
+ parsed_ptxt->auth_cred.x509_hash.alg_int =
2075
+ cose_x509->_COSE_CertHash_hashAlg_int;
2076
+ break;
2077
+ case _COSE_CertHash_hashAlg_tstr:
2078
+ if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_hash
2079
+ .alg_bstr) <
2080
+ cose_x509->_COSE_CertHash_hashAlg_tstr.len)
2081
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
2082
+
2083
+ parsed_ptxt->auth_cred.x509_hash.encode_type =
2084
+ EDHOC_ENCODE_TYPE_BYTE_STRING;
2085
+ parsed_ptxt->auth_cred.x509_hash
2086
+ .alg_bstr_length =
2087
+ cose_x509->_COSE_CertHash_hashAlg_tstr
2088
+ .len;
2089
+ memcpy(parsed_ptxt->auth_cred.x509_hash.alg_bstr,
2090
+ cose_x509->_COSE_CertHash_hashAlg_tstr
2091
+ .value,
2092
+ cose_x509->_COSE_CertHash_hashAlg_tstr
2093
+ .len);
2094
+ break;
2095
+ default:
2096
+ return EDHOC_ERROR_NOT_PERMITTED;
2097
+ }
2098
+
2099
+ break;
2100
+ }
2101
+ }
2102
+ }
2103
+
2104
+ /* Sign_or_MAC_2 */
2105
+ parsed_ptxt->sign_or_mac =
2106
+ cbor_ptxt_2._plaintext_2_Signature_or_MAC_2.value;
2107
+ parsed_ptxt->sign_or_mac_len =
2108
+ cbor_ptxt_2._plaintext_2_Signature_or_MAC_2.len;
2109
+
2110
+ /* EAD_2 if present */
2111
+ if (cbor_ptxt_2._plaintext_2_EAD_2_present) {
2112
+ ctx->nr_of_ead_tokens =
2113
+ cbor_ptxt_2._plaintext_2_EAD_2._ead_x_count;
2114
+
2115
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
2116
+ ctx->ead_token[i].label =
2117
+ cbor_ptxt_2._plaintext_2_EAD_2._ead_x[i]
2118
+ ._ead_x_ead_label;
2119
+ ctx->ead_token[i].value =
2120
+ cbor_ptxt_2._plaintext_2_EAD_2._ead_x[i]
2121
+ ._ead_x_ead_value.value;
2122
+ ctx->ead_token[i].value_len =
2123
+ cbor_ptxt_2._plaintext_2_EAD_2._ead_x[i]
2124
+ ._ead_x_ead_value.len;
2125
+ }
2126
+ }
2127
+
2128
+ return EDHOC_SUCCESS;
2129
+ }
2130
+
2131
+ static int verify_sign_or_mac_2(const struct edhoc_context *ctx,
2132
+ const struct cbor_items *cbor_items,
2133
+ const struct plaintext *parsed_ptxt,
2134
+ const uint8_t *pub_key, size_t pub_key_len,
2135
+ const uint8_t *mac_2, size_t mac_2_len)
2136
+ {
2137
+ if (NULL == ctx || NULL == cbor_items || NULL == parsed_ptxt ||
2138
+ NULL == pub_key || 0 == pub_key_len || NULL == mac_2 ||
2139
+ 0 == mac_2_len)
2140
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2141
+
2142
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2143
+
2144
+ switch (ctx->method) {
2145
+ case EDHOC_METHOD_0:
2146
+ case EDHOC_METHOD_2: {
2147
+ size_t len = 0;
2148
+
2149
+ const struct sig_structure cose_sign_1 = {
2150
+ ._sig_structure_protected.value = cbor_items->id_cred_r,
2151
+ ._sig_structure_protected.len =
2152
+ cbor_items->id_cred_r_len,
2153
+ ._sig_structure_external_aad.value = cbor_items->th_2,
2154
+ ._sig_structure_external_aad.len =
2155
+ cbor_items->th_2_len + cbor_items->cred_r_len +
2156
+ cbor_items->ead_2_len,
2157
+ ._sig_structure_payload.value = mac_2,
2158
+ ._sig_structure_payload.len = mac_2_len,
2159
+ };
2160
+
2161
+ len = 0;
2162
+ len += sizeof("Signature1") +
2163
+ cbor_tstr_overhead(sizeof("Signature1"));
2164
+ len += cbor_items->id_cred_r_len +
2165
+ cbor_bstr_overhead(cbor_items->id_cred_r_len);
2166
+ len += cbor_items->th_2_len + cbor_items->cred_r_len +
2167
+ cbor_items->ead_2_len +
2168
+ cbor_bstr_overhead(cbor_items->th_2_len +
2169
+ cbor_items->cred_r_len +
2170
+ cbor_items->ead_2_len);
2171
+ len += mac_2_len + cbor_bstr_overhead(mac_2_len);
2172
+
2173
+ ALLOCATE_ARRAY(uint8_t, cose_sign_1_buf, len);
2174
+ memset(cose_sign_1_buf, 0, ALLOCATE_ARRAY_SIZEOF(cose_sign_1_buf));
2175
+
2176
+ len = 0;
2177
+ ret = cbor_encode_sig_structure(cose_sign_1_buf,
2178
+ ARRAY_SIZE_VLA(cose_sign_1_buf),
2179
+ &cose_sign_1, &len);
2180
+
2181
+ if (ZCBOR_SUCCESS != ret)
2182
+ return EDHOC_ERROR_CBOR_FAILURE;
2183
+
2184
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
2185
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_VERIFY,
2186
+ pub_key, pub_key_len, key_id);
2187
+
2188
+ if (EDHOC_SUCCESS != ret)
2189
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2190
+
2191
+ ret = ctx->crypto.verify(ctx->user_ctx, key_id, cose_sign_1_buf,
2192
+ len, parsed_ptxt->sign_or_mac,
2193
+ parsed_ptxt->sign_or_mac_len);
2194
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
2195
+
2196
+ if (EDHOC_SUCCESS != ret)
2197
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2198
+
2199
+ return EDHOC_SUCCESS;
2200
+ }
2201
+
2202
+ case EDHOC_METHOD_1:
2203
+ case EDHOC_METHOD_3: {
2204
+ if (mac_2_len != parsed_ptxt->sign_or_mac_len ||
2205
+ 0 != memcmp(parsed_ptxt->sign_or_mac, mac_2, mac_2_len))
2206
+ return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
2207
+
2208
+ return EDHOC_SUCCESS;
2209
+ }
2210
+
2211
+ default:
2212
+ return EDHOC_ERROR_NOT_PERMITTED;
2213
+ }
2214
+ }
2215
+
2216
+ static int comp_th_3(struct edhoc_context *ctx,
2217
+ const struct cbor_items *cbor_items, const uint8_t *ptxt,
2218
+ size_t ptxt_len)
2219
+ {
2220
+ if (NULL == ctx || NULL == cbor_items || NULL == ptxt || 0 == ptxt_len)
2221
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2222
+
2223
+ if (EDHOC_TH_STATE_2 != ctx->th_state)
2224
+ return EDHOC_ERROR_BAD_STATE;
2225
+
2226
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2227
+
2228
+ size_t len = 0;
2229
+ len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
2230
+ len += ptxt_len;
2231
+ len += cbor_items->cred_r_len;
2232
+
2233
+ ALLOCATE_ARRAY(uint8_t, th_3, len);
2234
+ memset(th_3, 0, ALLOCATE_ARRAY_SIZEOF(th_3));
2235
+
2236
+ size_t offset = 0;
2237
+ struct zcbor_string bstr = (struct zcbor_string){
2238
+ .value = ctx->th,
2239
+ .len = ctx->th_len,
2240
+ };
2241
+
2242
+ len = 0;
2243
+ ret = cbor_encode_byte_string_type_bstr_type(
2244
+ &th_3[offset], ARRAY_SIZE_VLA(th_3), &bstr, &len);
2245
+ offset += len;
2246
+
2247
+ if (EDHOC_SUCCESS != ret)
2248
+ return EDHOC_ERROR_CBOR_FAILURE;
2249
+
2250
+ memcpy(&th_3[offset], ptxt, ptxt_len);
2251
+ offset += ptxt_len;
2252
+
2253
+ memcpy(&th_3[offset], cbor_items->cred_r, cbor_items->cred_r_len);
2254
+ offset += cbor_items->cred_r_len;
2255
+
2256
+ if (ARRAY_SIZE_VLA(th_3) < offset)
2257
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
2258
+
2259
+ /* Calculate TH_3. */
2260
+ ctx->th_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
2261
+
2262
+ size_t hash_len = 0;
2263
+ ret = ctx->crypto.hash(ctx->user_ctx, th_3, ARRAY_SIZE_VLA(th_3), ctx->th,
2264
+ ctx->th_len, &hash_len);
2265
+
2266
+ if (EDHOC_SUCCESS != ret)
2267
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2268
+
2269
+ ctx->th_state = EDHOC_TH_STATE_3;
2270
+ return EDHOC_SUCCESS;
2271
+ }
2272
+
2273
+ static int kid_compact_encoding(const struct edhoc_auth_creds *auth_cred,
2274
+ struct cbor_items *cbor_items)
2275
+ {
2276
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2277
+ size_t len = 0;
2278
+
2279
+ cbor_items->id_cred_r_is_comp_enc = true;
2280
+
2281
+ switch (auth_cred->key_id.encode_type) {
2282
+ case EDHOC_ENCODE_TYPE_INTEGER: {
2283
+ cbor_items->id_cred_r_enc_type = EDHOC_ENCODE_TYPE_INTEGER;
2284
+ if (true == auth_cred->key_id.cred_is_cbor) {
2285
+ cbor_items->id_cred_r_int =
2286
+ auth_cred->key_id.key_id_int;
2287
+ } else {
2288
+ len = 0;
2289
+ ret = cbor_encode_integer_type_int_type(
2290
+ (uint8_t *)&cbor_items->id_cred_r_int,
2291
+ sizeof(cbor_items->id_cred_r_int),
2292
+ &auth_cred->key_id.key_id_int, &len);
2293
+
2294
+ if (ZCBOR_SUCCESS != ret)
2295
+ return EDHOC_ERROR_CBOR_FAILURE;
2296
+ }
2297
+ break;
2298
+ }
2299
+
2300
+ case EDHOC_ENCODE_TYPE_BYTE_STRING: {
2301
+ cbor_items->id_cred_r_enc_type = EDHOC_ENCODE_TYPE_BYTE_STRING;
2302
+
2303
+ if (true == auth_cred->key_id.cred_is_cbor) {
2304
+ if (1 == auth_cred->key_id.key_id_bstr_length) {
2305
+ int32_t val = auth_cred->key_id.key_id_bstr[0];
2306
+ int32_t result = 0;
2307
+
2308
+ len = 0;
2309
+ ret = cbor_decode_integer_type_int_type(
2310
+ (uint8_t *)&val, sizeof(val), &result,
2311
+ &len);
2312
+
2313
+ if (ZCBOR_SUCCESS != ret)
2314
+ return EDHOC_ERROR_CBOR_FAILURE;
2315
+
2316
+ if (true == is_cbor_one_byte_int(result)) {
2317
+ cbor_items->id_cred_r_int = val;
2318
+ cbor_items->id_cred_r_enc_type =
2319
+ EDHOC_ENCODE_TYPE_INTEGER;
2320
+ break;
2321
+ }
2322
+ }
2323
+
2324
+ cbor_items->id_cred_r_bstr_len =
2325
+ auth_cred->key_id.key_id_bstr_length;
2326
+ memcpy(cbor_items->id_cred_r_bstr,
2327
+ auth_cred->key_id.key_id_bstr,
2328
+ auth_cred->key_id.key_id_bstr_length);
2329
+ } else {
2330
+ const struct zcbor_string input = {
2331
+ .value = auth_cred->key_id.key_id_bstr,
2332
+ .len = auth_cred->key_id.key_id_bstr_length,
2333
+ };
2334
+
2335
+ ret = cbor_encode_byte_string_type_bstr_type(
2336
+ cbor_items->id_cred_r_bstr,
2337
+ ARRAY_SIZE(cbor_items->id_cred_r_bstr) - 1,
2338
+ &input, &cbor_items->id_cred_r_bstr_len);
2339
+
2340
+ if (ZCBOR_SUCCESS != ret)
2341
+ return EDHOC_ERROR_CBOR_FAILURE;
2342
+ }
2343
+ break;
2344
+ }
2345
+ default:
2346
+ return EDHOC_ERROR_NOT_PERMITTED;
2347
+ }
2348
+
2349
+ return EDHOC_SUCCESS;
2350
+ }
2351
+
2352
+ static int comp_salt_3e2m(const struct edhoc_context *ctx, uint8_t *salt,
2353
+ size_t salt_len)
2354
+ {
2355
+ if (NULL == ctx || NULL == salt || 0 == salt_len)
2356
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2357
+
2358
+ if (EDHOC_TH_STATE_2 != ctx->th_state ||
2359
+ EDHOC_PRK_STATE_2E != ctx->prk_state)
2360
+ return EDHOC_ERROR_BAD_STATE;
2361
+
2362
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2363
+ const size_t hash_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
2364
+
2365
+ const struct info input_info = {
2366
+ ._info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_3E2M,
2367
+ ._info_context.value = ctx->th,
2368
+ ._info_context.len = ctx->th_len,
2369
+ ._info_length = (uint32_t)hash_len,
2370
+ };
2371
+
2372
+ size_t len = 0;
2373
+ len += cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_3E2M);
2374
+ len += ctx->th_len + cbor_bstr_overhead(ctx->th_len);
2375
+ len += cbor_int_mem_req((int32_t)hash_len);
2376
+
2377
+ ALLOCATE_ARRAY(uint8_t, info, len);
2378
+ memset(info, 0, ALLOCATE_ARRAY_SIZEOF(info));
2379
+
2380
+ len = 0;
2381
+ ret = cbor_encode_info(info, ARRAY_SIZE_VLA(info), &input_info, &len);
2382
+
2383
+ if (ZCBOR_SUCCESS != ret || ARRAY_SIZE_VLA(info) != len)
2384
+ return EDHOC_ERROR_CBOR_FAILURE;
2385
+
2386
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
2387
+ ret = ctx->keys.generate_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
2388
+ ctx->prk_len, key_id);
2389
+
2390
+ if (EDHOC_SUCCESS != ret)
2391
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2392
+
2393
+ ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, ARRAY_SIZE_VLA(info),
2394
+ salt, salt_len);
2395
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
2396
+
2397
+ if (EDHOC_SUCCESS != ret)
2398
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2399
+
2400
+ return EDHOC_SUCCESS;
2401
+ }
2402
+
2403
+ static int comp_grx(enum edhoc_role role, struct edhoc_context *ctx,
2404
+ const struct edhoc_auth_creds *auth_cred,
2405
+ const uint8_t *pub_key, size_t pub_key_len, uint8_t *grx,
2406
+ size_t grx_len)
2407
+ {
2408
+ if (NULL == ctx || NULL == auth_cred || NULL == grx || 0 == grx_len)
2409
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2410
+
2411
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2412
+
2413
+ switch (role) {
2414
+ case initiator: {
2415
+ uint8_t key_id[EDHOC_KID_LEN] = { 0 };
2416
+ ret = ctx->keys.generate_key(ctx->user_ctx,
2417
+ EDHOC_KT_KEY_AGREEMENT,
2418
+ ctx->dh_priv_key,
2419
+ ctx->dh_priv_key_len, key_id);
2420
+ ctx->dh_priv_key_len = 0;
2421
+ memset(ctx->dh_priv_key, 0, ARRAY_SIZE(ctx->dh_priv_key));
2422
+
2423
+ if (EDHOC_SUCCESS != ret)
2424
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2425
+
2426
+ size_t secret_len = 0;
2427
+ ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id, pub_key,
2428
+ pub_key_len, grx, grx_len,
2429
+ &secret_len);
2430
+
2431
+ ctx->keys.destroy_key(ctx->user_ctx, key_id);
2432
+ memset(key_id, 0, sizeof(key_id));
2433
+
2434
+ if (EDHOC_SUCCESS != ret || secret_len != grx_len)
2435
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2436
+
2437
+ return EDHOC_SUCCESS;
2438
+ }
2439
+
2440
+ case responder: {
2441
+ size_t secret_len = 0;
2442
+ ret = ctx->crypto.key_agreement(ctx->user_ctx,
2443
+ auth_cred->priv_key_id,
2444
+ ctx->dh_peer_pub_key,
2445
+ ctx->dh_peer_pub_key_len, grx,
2446
+ grx_len, &secret_len);
2447
+
2448
+ if (EDHOC_SUCCESS != ret || secret_len != grx_len)
2449
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2450
+
2451
+ return EDHOC_SUCCESS;
2452
+ }
2453
+
2454
+ default:
2455
+ return EDHOC_ERROR_NOT_PERMITTED;
2456
+ }
2457
+
2458
+ return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
2459
+ }
2460
+
2461
+ /* Module interface function definitions ----------------------------------- */
2462
+
2463
+ /**
2464
+ * Steps for composition of message 2:
2465
+ * 1. Generate ephemeral Diffie-Hellmann key pair.
2466
+ * 2. Compute Diffie-Hellmann shared secret.
2467
+ * 3. Compute Transcript Hash 2 (TH_2).
2468
+ * 4a. Compute Pseudo Random Key 2 (PRK_2e).
2469
+ * 4b. Copy of Pseudo Random Key 2 for keystream (step 12).
2470
+ * 5. Fetch authentication credentials.
2471
+ * 6. Compose EAD_2 if present.
2472
+ * 7. Compute psuedo random key (PRK_3e2m).
2473
+ * 8a. Compute required buffer length for context_2.
2474
+ * 8b. Cborise items required by context_2.
2475
+ * 8c. Compute Message Authentication Code (MAC_2).
2476
+ * 9. Compute signature if needed (Signature_or_MAC_2).
2477
+ * 10. Prepare plaintext (PLAINTEXT_2).
2478
+ * 11. Compute key stream (KEYSTREAM_2).
2479
+ * 12. Compute Transcript Hash 3 (TH_3).
2480
+ * 13. Compute ciphertext (CIPHERTEXT_2).
2481
+ * 14. Cborise items for message 2.
2482
+ * 15. Clean-up EAD tokens.
2483
+ */
2484
+ int edhoc_message_2_compose(struct edhoc_context *ctx, uint8_t *msg_2,
2485
+ size_t msg_2_size, size_t *msg_2_len)
2486
+ {
2487
+ if (NULL == ctx || msg_2 == NULL || 0 == msg_2_size ||
2488
+ NULL == msg_2_len)
2489
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2490
+
2491
+ if (EDHOC_SM_RECEIVED_M1 != ctx->status ||
2492
+ EDHOC_TH_STATE_1 != ctx->th_state ||
2493
+ EDHOC_PRK_STATE_INVALID != ctx->prk_state)
2494
+ return EDHOC_ERROR_MSG_2_PROCESS_FAILURE;
2495
+
2496
+ ctx->status = EDHOC_SM_ABORTED;
2497
+ ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
2498
+
2499
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2500
+
2501
+ /* 1. Generate ephemeral Diffie-Hellmann key pair. */
2502
+ ret = gen_dh_keys(ctx);
2503
+
2504
+ if (EDHOC_SUCCESS != ret)
2505
+ return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
2506
+
2507
+ if (NULL != ctx->logger) {
2508
+ ctx->logger(ctx->user_ctx, "G_Y", ctx->dh_pub_key,
2509
+ ctx->dh_pub_key_len);
2510
+ ctx->logger(ctx->user_ctx, "Y", ctx->dh_priv_key,
2511
+ ctx->dh_priv_key_len);
2512
+ }
2513
+
2514
+ /* 2. Compute Diffie-Hellmann shared secret. */
2515
+ ret = comp_dh_secret(ctx);
2516
+
2517
+ if (EDHOC_SUCCESS != ret)
2518
+ return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
2519
+
2520
+ if (NULL != ctx->logger)
2521
+ ctx->logger(ctx->user_ctx, "G_XY", ctx->dh_secret,
2522
+ ctx->dh_secret_len);
2523
+
2524
+ /* 3. Compute Transcript Hash 2 (TH_2). */
2525
+ ret = comp_th_2(ctx, responder);
2526
+
2527
+ if (EDHOC_SUCCESS != ret)
2528
+ return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
2529
+
2530
+ if (NULL != ctx->logger)
2531
+ ctx->logger(ctx->user_ctx, "TH_2", ctx->th, ctx->th_len);
2532
+
2533
+ /* 4a. Compute Pseudo Random Key 2 (PRK_2e). */
2534
+ ret = comp_prk_2e(ctx);
2535
+
2536
+ if (EDHOC_SUCCESS != ret)
2537
+ return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
2538
+
2539
+ if (NULL != ctx->logger)
2540
+ ctx->logger(ctx->user_ctx, "PRK_2e", ctx->prk, ctx->prk_len);
2541
+
2542
+ /* 4b. Copy of Pseudo Random Key 2 for keystream (step 12). */
2543
+ ALLOCATE_ARRAY(uint8_t, prk_2e, ctx->prk_len);
2544
+ memcpy(prk_2e, ctx->prk, ALLOCATE_ARRAY_SIZEOF(prk_2e));
2545
+
2546
+ /* 5. Fetch authentication credentials. */
2547
+ struct edhoc_auth_creds auth_cred = { 0 };
2548
+ ret = ctx->cred.fetch(ctx->user_ctx, &auth_cred);
2549
+
2550
+ if (EDHOC_SUCCESS != ret)
2551
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
2552
+
2553
+ /* 6. Compose EAD_2 if present. */
2554
+ if (NULL != ctx->ead.compose && 0 != ARRAY_SIZE(ctx->ead_token) - 1) {
2555
+ ret = ctx->ead.compose(ctx->user_ctx, EDHOC_MSG_2,
2556
+ ctx->ead_token,
2557
+ ARRAY_SIZE(ctx->ead_token) - 1,
2558
+ &ctx->nr_of_ead_tokens);
2559
+
2560
+ if (EDHOC_SUCCESS != ret ||
2561
+ ARRAY_SIZE(ctx->ead_token) - 1 < ctx->nr_of_ead_tokens)
2562
+ return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
2563
+
2564
+ if (NULL != ctx->logger) {
2565
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
2566
+ ctx->logger(ctx->user_ctx,
2567
+ "EAD_2 compose label",
2568
+ (const uint8_t *)&ctx->ead_token[i]
2569
+ .label,
2570
+ sizeof(ctx->ead_token[i].label));
2571
+
2572
+ if (0 != ctx->ead_token[i].value_len)
2573
+ ctx->logger(
2574
+ ctx->user_ctx,
2575
+ "EAD_2 compose value",
2576
+ ctx->ead_token[i].value,
2577
+ ctx->ead_token[i].value_len);
2578
+ }
2579
+ }
2580
+ }
2581
+
2582
+ /* 7. Compute psuedo random key (PRK_3e2m). */
2583
+ ret = comp_prk_3e2m(responder, ctx, &auth_cred, NULL, 0);
2584
+
2585
+ if (EDHOC_SUCCESS != ret)
2586
+ return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
2587
+
2588
+ if (NULL != ctx->logger)
2589
+ ctx->logger(ctx->user_ctx, "PRK_3e2m", ctx->prk, ctx->prk_len);
2590
+
2591
+ /* 8a. Compute required buffer length for context_2. */
2592
+ size_t context_2_len = 0;
2593
+ ret = comp_mac_2_input_len(ctx, &auth_cred, responder, &context_2_len);
2594
+
2595
+ if (EDHOC_SUCCESS != ret)
2596
+ return EDHOC_ERROR_INVALID_MAC_2;
2597
+
2598
+ ALLOCATE_ARRAY(uint8_t, mac_2_content, sizeof(struct cbor_items) + context_2_len);
2599
+ memset(mac_2_content, 0, ALLOCATE_ARRAY_SIZEOF(mac_2_content));
2600
+
2601
+ struct cbor_items *cbor_items = (struct cbor_items *)mac_2_content;
2602
+ cbor_items->buf_len = context_2_len;
2603
+
2604
+ /* 8b. Cborise items required by context_2. */
2605
+ ret = gen_mac_2_context(ctx, &auth_cred, responder, cbor_items);
2606
+
2607
+ if (EDHOC_SUCCESS != ret)
2608
+ return EDHOC_ERROR_INVALID_MAC_2;
2609
+
2610
+ if (NULL != ctx->logger) {
2611
+ ctx->logger(ctx->user_ctx, "C_R", cbor_items->conn_id,
2612
+ cbor_items->conn_id_len);
2613
+ ctx->logger(ctx->user_ctx, "ID_CRED_R", cbor_items->id_cred_r,
2614
+ cbor_items->id_cred_r_len);
2615
+ ctx->logger(ctx->user_ctx, "TH_2", cbor_items->th_2,
2616
+ cbor_items->th_2_len);
2617
+ ctx->logger(ctx->user_ctx, "CRED_R", cbor_items->cred_r,
2618
+ cbor_items->cred_r_len);
2619
+ ctx->logger(ctx->user_ctx, "context_2", cbor_items->buf,
2620
+ cbor_items->buf_len);
2621
+ }
2622
+
2623
+ /* 8c. Compute Message Authentication Code (MAC_2). */
2624
+ size_t mac_2_len = 0;
2625
+ ret = get_mac_2_len(responder, ctx, &mac_2_len);
2626
+
2627
+ if (EDHOC_SUCCESS != ret)
2628
+ return EDHOC_ERROR_INVALID_MAC_2;
2629
+
2630
+ ALLOCATE_ARRAY(uint8_t, mac_2, mac_2_len);
2631
+ memset(mac_2, 0, ALLOCATE_ARRAY_SIZEOF(mac_2));
2632
+
2633
+ ret = comp_mac_2(ctx, cbor_items, mac_2, ARRAY_SIZE_VLA(mac_2));
2634
+
2635
+ if (EDHOC_SUCCESS != ret)
2636
+ return EDHOC_ERROR_INVALID_MAC_2;
2637
+
2638
+ if (NULL != ctx->logger)
2639
+ ctx->logger(ctx->user_ctx, "MAC_2", mac_2, ARRAY_SIZE_VLA(mac_2));
2640
+
2641
+ /* 9. Compute signature if needed (Signature_or_MAC_2). */
2642
+ size_t sign_or_mac_len = 0;
2643
+ ret = comp_sign_or_mac_2_len(responder, ctx, &sign_or_mac_len);
2644
+
2645
+ if (EDHOC_SUCCESS != ret)
2646
+ return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
2647
+
2648
+ ALLOCATE_ARRAY(uint8_t, sign_or_mac, sign_or_mac_len);
2649
+ memset(sign_or_mac, 0, sizeof(sign_or_mac));
2650
+
2651
+ ret = comp_sign_or_mac_2(ctx, &auth_cred, cbor_items, mac_2,
2652
+ ARRAY_SIZE_VLA(mac_2), sign_or_mac,
2653
+ ARRAY_SIZE_VLA(sign_or_mac));
2654
+ if (EDHOC_SUCCESS != ret)
2655
+ return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
2656
+
2657
+ if (NULL != ctx->logger)
2658
+ ctx->logger(ctx->user_ctx, "Signature_or_MAC_2", sign_or_mac,
2659
+ ARRAY_SIZE_VLA(sign_or_mac));
2660
+
2661
+ /* 10. Prepare plaintext (PLAINTEXT_2). */
2662
+ size_t plaintext_len = 0;
2663
+ ret = comp_plaintext_2_len(ctx, cbor_items, ARRAY_SIZE_VLA(sign_or_mac),
2664
+ &plaintext_len);
2665
+
2666
+ if (EDHOC_SUCCESS != ret)
2667
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
2668
+
2669
+ ALLOCATE_ARRAY(uint8_t, plaintext, plaintext_len);
2670
+ memset(plaintext, 0, ALLOCATE_ARRAY_SIZEOF(plaintext));
2671
+
2672
+ plaintext_len = 0;
2673
+ ret = prepare_plaintext_2(ctx, cbor_items, sign_or_mac,
2674
+ ARRAY_SIZE_VLA(sign_or_mac), plaintext,
2675
+ ARRAY_SIZE_VLA(plaintext), &plaintext_len);
2676
+
2677
+ if (EDHOC_SUCCESS != ret)
2678
+ return EDHOC_ERROR_CBOR_FAILURE;
2679
+
2680
+ if (NULL != ctx->logger)
2681
+ ctx->logger(ctx->user_ctx, "PLAINTEXT_2", plaintext,
2682
+ plaintext_len);
2683
+
2684
+ /* 11. Compute key stream (KEYSTREAM_2). */
2685
+ ALLOCATE_ARRAY(uint8_t, keystream, plaintext_len);
2686
+ memset(keystream, 0, ALLOCATE_ARRAY_SIZEOF(keystream));
2687
+
2688
+ ret = comp_keystream(ctx, prk_2e, ARRAY_SIZE_VLA(prk_2e), keystream,
2689
+ ARRAY_SIZE_VLA(keystream));
2690
+ memset(prk_2e, 0, ALLOCATE_ARRAY_SIZEOF(prk_2e));
2691
+
2692
+ if (EDHOC_SUCCESS != ret)
2693
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2694
+
2695
+ if (NULL != ctx->logger)
2696
+ ctx->logger(ctx->user_ctx, "KEYSTREAM_2", keystream,
2697
+ ARRAY_SIZE_VLA(keystream));
2698
+
2699
+ /* 12. Compute Transcript Hash 3 (TH_3). */
2700
+ ret = comp_th_3(ctx, cbor_items, plaintext, plaintext_len);
2701
+
2702
+ if (EDHOC_SUCCESS != ret)
2703
+ return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
2704
+
2705
+ if (NULL != ctx->logger)
2706
+ ctx->logger(ctx->user_ctx, "TH_3", ctx->th, ctx->th_len);
2707
+
2708
+ /* 13. Compute ciphertext (CIPHERTEXT_2). */
2709
+ xor_arrays(plaintext, keystream, plaintext_len);
2710
+ const uint8_t *ciphertext = plaintext;
2711
+ const size_t ciphertext_len = plaintext_len;
2712
+
2713
+ if (NULL != ctx->logger)
2714
+ ctx->logger(ctx->user_ctx, "CIPHERTEXT_2", ciphertext,
2715
+ ciphertext_len);
2716
+
2717
+ /* 14. Cborise items for message 2. */
2718
+ ret = prepare_message_2(ctx, ciphertext, ciphertext_len, msg_2,
2719
+ msg_2_size, msg_2_len);
2720
+
2721
+ if (EDHOC_SUCCESS != ret)
2722
+ return EDHOC_ERROR_CBOR_FAILURE;
2723
+
2724
+ if (NULL != ctx->logger)
2725
+ ctx->logger(ctx->user_ctx, "message_2", msg_2, *msg_2_len);
2726
+
2727
+ /* 15. Clean-up EAD tokens. */
2728
+ ctx->nr_of_ead_tokens = 0;
2729
+ memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
2730
+
2731
+ ctx->status = EDHOC_SM_WAIT_M3;
2732
+ ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
2733
+ return EDHOC_SUCCESS;
2734
+ }
2735
+
2736
+ /**
2737
+ * Steps for processing of message 2:
2738
+ * 1. Compute required length for ciphertext.
2739
+ * 2. Decode cborised message 2.
2740
+ * 3. Compute Diffie-Hellmann shared secret (G_XY).
2741
+ * 4. Compute Transcript Hash 2 (TH_2).
2742
+ * 5. Compute Pseudo Random Key 2 (PRK_2e).
2743
+ * 6. Compute key stream (KEYSTREAM_2).
2744
+ * 7. Compute plaintext (PLAINTEXT_2).
2745
+ * 8. Parse plaintext (PLAINTEXT_2).
2746
+ * 9. Process EAD if present.
2747
+ * 10. Verify if credentials from peer are trusted.
2748
+ * 11. Compute psuedo random key (PRK_3e2m).
2749
+ * 12. Compute required buffer length for context_2.
2750
+ * 13. Cborise items required by context_2.
2751
+ * 14. Compute Message Authentication Code (MAC_2).
2752
+ * 15. Verify Signature_or_MAC_2.
2753
+ * 16. Compute Transcript Hash 3 (TH_3).
2754
+ * 17. Clean-up EAD tokens.
2755
+ */
2756
+ int edhoc_message_2_process(struct edhoc_context *ctx, const uint8_t *msg_2,
2757
+ size_t msg_2_len)
2758
+ {
2759
+ if (NULL == ctx || NULL == msg_2 || 0 == msg_2_len)
2760
+ return EDHOC_ERROR_INVALID_ARGUMENT;
2761
+
2762
+ if (EDHOC_SM_WAIT_M2 != ctx->status ||
2763
+ EDHOC_TH_STATE_1 != ctx->th_state ||
2764
+ EDHOC_PRK_STATE_INVALID != ctx->prk_state)
2765
+ return EDHOC_ERROR_MSG_2_PROCESS_FAILURE;
2766
+
2767
+ ctx->status = EDHOC_SM_ABORTED;
2768
+ ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
2769
+
2770
+ int ret = EDHOC_ERROR_GENERIC_ERROR;
2771
+ size_t len = 0;
2772
+
2773
+ /* 1. Compute required length for ciphertext. */
2774
+ ret = comp_ciphertext_2_len(ctx, msg_2, msg_2_len, &len);
2775
+
2776
+ if (EDHOC_SUCCESS != ret)
2777
+ return EDHOC_ERROR_BUFFER_TOO_SMALL;
2778
+
2779
+ ALLOCATE_ARRAY(uint8_t, ciphertext_2, len);
2780
+ memset(ciphertext_2, 0, ALLOCATE_ARRAY_SIZEOF(ciphertext_2));
2781
+
2782
+ /* 2. Decode cborised message 2. */
2783
+ ret = parse_msg_2(ctx, msg_2, msg_2_len, ciphertext_2,
2784
+ ARRAY_SIZE_VLA(ciphertext_2));
2785
+
2786
+ if (EDHOC_SUCCESS != ret)
2787
+ return EDHOC_ERROR_CBOR_FAILURE;
2788
+
2789
+ if (NULL != ctx->logger)
2790
+ ctx->logger(ctx->user_ctx, "CIPHERTEXT_2", ciphertext_2,
2791
+ ARRAY_SIZE_VLA(ciphertext_2));
2792
+
2793
+ /* 3. Compute Diffie-Hellmann shared secret (G_XY). */
2794
+ ret = comp_dh_secret(ctx);
2795
+
2796
+ if (EDHOC_SUCCESS != ret)
2797
+ return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
2798
+
2799
+ if (NULL != ctx->logger)
2800
+ ctx->logger(ctx->user_ctx, "G_XY", ctx->dh_secret,
2801
+ ctx->dh_secret_len);
2802
+
2803
+ /* 4. Compute Transcript Hash 2 (TH_2). */
2804
+ ret = comp_th_2(ctx, initiator);
2805
+
2806
+ if (EDHOC_SUCCESS != ret)
2807
+ return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
2808
+
2809
+ if (NULL != ctx->logger)
2810
+ ctx->logger(ctx->user_ctx, "TH_2", ctx->th, ctx->th_len);
2811
+
2812
+ /* 5. Compute Pseudo Random Key 2 (PRK_2e). */
2813
+ ret = comp_prk_2e(ctx);
2814
+
2815
+ if (EDHOC_SUCCESS != ret)
2816
+ return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
2817
+
2818
+ if (NULL != ctx->logger)
2819
+ ctx->logger(ctx->user_ctx, "PRK_2e", ctx->prk, ctx->prk_len);
2820
+
2821
+ /* 6. Compute key stream (KEYSTREAM_2). */
2822
+ ALLOCATE_ARRAY(uint8_t, keystream, ARRAY_SIZE_VLA(ciphertext_2));
2823
+ memset(keystream, 0, ALLOCATE_ARRAY_SIZEOF(keystream));
2824
+
2825
+ ret = comp_keystream(ctx, ctx->prk, ctx->prk_len, keystream,
2826
+ ARRAY_SIZE_VLA(keystream));
2827
+
2828
+ if (EDHOC_SUCCESS != ret)
2829
+ return EDHOC_ERROR_CRYPTO_FAILURE;
2830
+
2831
+ if (NULL != ctx->logger)
2832
+ ctx->logger(ctx->user_ctx, "KEYSTREAM", keystream,
2833
+ ARRAY_SIZE_VLA(keystream));
2834
+
2835
+ /* 7. Compute plaintext (PLAINTEXT_2). */
2836
+ xor_arrays(ciphertext_2, keystream, ARRAY_SIZE_VLA(ciphertext_2));
2837
+ const uint8_t *plaintext = ciphertext_2;
2838
+ const size_t plaintext_len = ARRAY_SIZE_VLA(ciphertext_2);
2839
+
2840
+ if (NULL != ctx->logger)
2841
+ ctx->logger(ctx->user_ctx, "PLAINTEXT_2", plaintext,
2842
+ plaintext_len);
2843
+
2844
+ /* 8. Parse plaintext (PLAINTEXT_2). */
2845
+ struct plaintext parsed_ptxt = { 0 };
2846
+ ret = parse_plaintext(ctx, plaintext, plaintext_len, &parsed_ptxt);
2847
+
2848
+ if (EDHOC_SUCCESS != ret)
2849
+ return EDHOC_ERROR_CBOR_FAILURE;
2850
+
2851
+ if (NULL != ctx->logger) {
2852
+ switch (ctx->peer_cid.encode_type) {
2853
+ case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
2854
+ ctx->logger(ctx->user_ctx, "C_R",
2855
+ (const uint8_t *)&ctx->peer_cid.int_value,
2856
+ sizeof(ctx->peer_cid.int_value));
2857
+ break;
2858
+ case EDHOC_CID_TYPE_BYTE_STRING:
2859
+ ctx->logger(ctx->user_ctx, "C_R",
2860
+ ctx->peer_cid.bstr_value,
2861
+ ctx->peer_cid.bstr_length);
2862
+ break;
2863
+
2864
+ default:
2865
+ return EDHOC_ERROR_NOT_PERMITTED;
2866
+ }
2867
+ }
2868
+
2869
+ /* 9. Process EAD if present. */
2870
+ if (NULL != ctx->ead.process && 0 != ARRAY_SIZE(ctx->ead_token) - 1 &&
2871
+ 0 != ctx->nr_of_ead_tokens) {
2872
+ ret = ctx->ead.process(ctx->user_ctx, EDHOC_MSG_2,
2873
+ ctx->ead_token, ctx->nr_of_ead_tokens);
2874
+
2875
+ if (EDHOC_SUCCESS != ret)
2876
+ return EDHOC_ERROR_EAD_PROCESS_FAILURE;
2877
+
2878
+ if (NULL != ctx->logger) {
2879
+ for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
2880
+ ctx->logger(ctx->user_ctx,
2881
+ "EAD_2 process label",
2882
+ (const uint8_t *)&ctx->ead_token[i]
2883
+ .label,
2884
+ sizeof(ctx->ead_token[i].label));
2885
+
2886
+ if (0 != ctx->ead_token[i].value_len)
2887
+ ctx->logger(
2888
+ ctx->user_ctx,
2889
+ "EAD_2 process value",
2890
+ ctx->ead_token[i].value,
2891
+ ctx->ead_token[i].value_len);
2892
+ }
2893
+ }
2894
+ }
2895
+
2896
+ /* 10. Verify if credentials from peer are trusted. */
2897
+ const uint8_t *pub_key = NULL;
2898
+ size_t pub_key_len = 0;
2899
+
2900
+ ret = ctx->cred.verify(ctx->user_ctx, &parsed_ptxt.auth_cred, &pub_key,
2901
+ &pub_key_len);
2902
+
2903
+ if (EDHOC_SUCCESS != ret) {
2904
+ ctx->error_code =
2905
+ EDHOC_ERROR_CODE_UNKNOWN_CREDENTIAL_REFERENCED;
2906
+ return EDHOC_ERROR_CREDENTIALS_FAILURE;
2907
+ }
2908
+
2909
+ /* 11. Compute psuedo random key (PRK_3e2m). */
2910
+ ret = comp_prk_3e2m(initiator, ctx, &parsed_ptxt.auth_cred, pub_key,
2911
+ pub_key_len);
2912
+
2913
+ if (EDHOC_SUCCESS != ret)
2914
+ return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
2915
+
2916
+ if (NULL != ctx->logger)
2917
+ ctx->logger(ctx->user_ctx, "PRK_3e2m", ctx->prk, ctx->prk_len);
2918
+
2919
+ /* 12. Compute required buffer length for context_2. */
2920
+ size_t context_2_len = 0;
2921
+ ret = comp_mac_2_input_len(ctx, &parsed_ptxt.auth_cred, initiator,
2922
+ &context_2_len);
2923
+
2924
+ if (EDHOC_SUCCESS != ret)
2925
+ return EDHOC_ERROR_INVALID_MAC_2;
2926
+
2927
+ ALLOCATE_ARRAY(uint8_t, mac_2_content, sizeof(struct cbor_items) + context_2_len);
2928
+ memset(mac_2_content, 0, ALLOCATE_ARRAY_SIZEOF(mac_2_content));
2929
+
2930
+ struct cbor_items *cbor_items = (struct cbor_items *)mac_2_content;
2931
+ cbor_items->buf_len = context_2_len;
2932
+
2933
+ /* 13. Cborise items required by context_2. */
2934
+ ret = gen_mac_2_context(ctx, &parsed_ptxt.auth_cred, initiator,
2935
+ cbor_items);
2936
+
2937
+ if (EDHOC_SUCCESS != ret)
2938
+ return EDHOC_ERROR_INVALID_MAC_2;
2939
+
2940
+ if (NULL != ctx->logger) {
2941
+ ctx->logger(ctx->user_ctx, "C_R", cbor_items->conn_id,
2942
+ cbor_items->conn_id_len);
2943
+ ctx->logger(ctx->user_ctx, "ID_CRED_R", cbor_items->id_cred_r,
2944
+ cbor_items->id_cred_r_len);
2945
+ ctx->logger(ctx->user_ctx, "TH_2", cbor_items->th_2,
2946
+ cbor_items->th_2_len);
2947
+ ctx->logger(ctx->user_ctx, "CRED_R", cbor_items->cred_r,
2948
+ cbor_items->cred_r_len);
2949
+ ctx->logger(ctx->user_ctx, "context_2", cbor_items->buf,
2950
+ cbor_items->buf_len);
2951
+ }
2952
+
2953
+ /* 14. Compute Message Authentication Code (MAC_2). */
2954
+ size_t mac_2_len = 0;
2955
+ ret = get_mac_2_len(initiator, ctx, &mac_2_len);
2956
+
2957
+ if (EDHOC_SUCCESS != ret)
2958
+ return EDHOC_ERROR_INVALID_MAC_2;
2959
+
2960
+ ALLOCATE_ARRAY(uint8_t, mac_2, mac_2_len);
2961
+ memset(mac_2, 0, ALLOCATE_ARRAY_SIZEOF(mac_2));
2962
+
2963
+ ret = comp_mac_2(ctx, cbor_items, mac_2, ARRAY_SIZE_VLA(mac_2));
2964
+
2965
+ if (EDHOC_SUCCESS != ret)
2966
+ return EDHOC_ERROR_INVALID_MAC_2;
2967
+
2968
+ if (NULL != ctx->logger)
2969
+ ctx->logger(ctx->user_ctx, "MAC_2", mac_2, ARRAY_SIZE_VLA(mac_2));
2970
+
2971
+ /* 15. Verify Signature_or_MAC_2. */
2972
+ ret = verify_sign_or_mac_2(ctx, cbor_items, &parsed_ptxt, pub_key,
2973
+ pub_key_len, mac_2, ARRAY_SIZE_VLA(mac_2));
2974
+
2975
+ if (EDHOC_SUCCESS != ret)
2976
+ return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
2977
+
2978
+ /* 16. Compute Transcript Hash 3 (TH_3). */
2979
+ ret = comp_th_3(ctx, cbor_items, plaintext, plaintext_len);
2980
+
2981
+ if (EDHOC_SUCCESS != ret)
2982
+ return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
2983
+
2984
+ if (NULL != ctx->logger)
2985
+ ctx->logger(ctx->user_ctx, "TH_3", ctx->th, ctx->th_len);
2986
+
2987
+ /* 17. Clean-up EAD tokens. */
2988
+ ctx->nr_of_ead_tokens = 0;
2989
+ memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
2990
+
2991
+ ctx->status = EDHOC_SM_VERIFIED_M2;
2992
+ ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
2993
+ return EDHOC_SUCCESS;
2994
+ }