edhoc 1.0.4 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (314) hide show
  1. package/README.md +170 -0
  2. package/binding.gyp +13 -11
  3. package/dist/bindings.d.ts +5 -0
  4. package/dist/bindings.d.ts.map +1 -0
  5. package/dist/bindings.js +10 -0
  6. package/dist/crypto.d.ts +29 -0
  7. package/dist/crypto.d.ts.map +1 -0
  8. package/dist/crypto.js +205 -0
  9. package/dist/edhoc.d.ts +368 -0
  10. package/dist/edhoc.d.ts.map +1 -0
  11. package/dist/edhoc.js +76 -0
  12. package/dist/index.d.ts +4 -0
  13. package/dist/index.d.ts.map +1 -0
  14. package/dist/index.js +19 -0
  15. package/dist/x509credentials.d.ts +20 -0
  16. package/dist/x509credentials.d.ts.map +1 -0
  17. package/dist/x509credentials.js +140 -0
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +1 -1
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +1 -1
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +1 -1
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +2 -2
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +2 -2
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +48 -43
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +1 -1
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +1 -1
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +3 -3
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +1 -1
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +1 -1
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +1 -1
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +1 -1
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +1 -1
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +1 -1
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +1 -1
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +1 -1
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +1 -1
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +1 -1
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +1 -1
  38. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +1 -1
  39. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +1 -1
  40. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +1 -1
  41. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +1 -1
  42. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +1 -1
  43. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +1 -1
  44. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +1 -1
  45. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +1 -1
  46. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +1 -1
  47. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +1 -1
  48. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +3 -3
  49. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +3 -3
  50. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +1 -1
  51. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +1 -1
  52. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +4 -4
  53. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +93 -83
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +11 -20
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +11 -20
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +27 -32
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +27 -32
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +14 -23
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +14 -23
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +63 -52
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +62 -51
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +14 -23
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +14 -23
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +11 -20
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +11 -20
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +54 -51
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +54 -51
  68. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +11 -20
  69. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +11 -20
  70. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +11 -20
  71. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +11 -20
  72. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +11 -20
  73. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +11 -20
  74. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +36 -37
  75. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +36 -37
  76. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +103 -80
  77. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +102 -79
  78. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +99 -76
  79. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +98 -75
  80. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +40 -41
  81. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +40 -41
  82. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +15 -24
  83. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +15 -24
  84. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +31 -0
  85. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +10 -0
  86. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +18 -0
  87. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +9 -0
  88. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +69 -0
  89. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +38 -0
  90. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +53 -0
  91. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +57 -0
  92. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +31 -0
  93. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +10 -0
  94. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +18 -0
  95. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +9 -0
  96. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +71 -0
  97. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +40 -0
  98. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +16 -0
  99. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +18 -0
  100. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +19 -0
  101. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +17 -0
  102. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +19 -0
  103. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +31 -0
  104. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +10 -0
  105. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +18 -0
  106. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +9 -0
  107. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +69 -0
  108. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +38 -0
  109. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +31 -0
  110. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +10 -0
  111. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +18 -0
  112. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +9 -0
  113. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +70 -0
  114. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +42 -0
  115. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +53 -0
  116. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +57 -0
  117. package/external/libedhoc/externals/Unity/examples/unity_config.h +251 -0
  118. package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +44 -0
  119. package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +129 -0
  120. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +310 -0
  121. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +95 -0
  122. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +51 -0
  123. package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +20 -0
  124. package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +40 -0
  125. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +246 -0
  126. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +33 -0
  127. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +203 -0
  128. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +61 -0
  129. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +326 -0
  130. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +50 -0
  131. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +57 -0
  132. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +17 -0
  133. package/external/libedhoc/externals/Unity/src/unity.c +2501 -0
  134. package/external/libedhoc/externals/Unity/src/unity.h +698 -0
  135. package/external/libedhoc/externals/Unity/src/unity_internals.h +1183 -0
  136. package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +61 -0
  137. package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +57 -0
  138. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +55 -0
  139. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +15 -0
  140. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +80 -0
  141. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +76 -0
  142. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +75 -0
  143. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +13 -0
  144. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +89 -0
  145. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +89 -0
  146. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +77 -0
  147. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +89 -0
  148. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +89 -0
  149. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +90 -0
  150. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +67 -0
  151. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +70 -0
  152. package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +58 -0
  153. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +67 -0
  154. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +70 -0
  155. package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +71 -0
  156. package/external/libedhoc/externals/Unity/test/testdata/CException.h +18 -0
  157. package/external/libedhoc/externals/Unity/test/testdata/Defs.h +16 -0
  158. package/external/libedhoc/externals/Unity/test/testdata/cmock.h +21 -0
  159. package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +20 -0
  160. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +204 -0
  161. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +73 -0
  162. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +200 -0
  163. package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +151 -0
  164. package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +2941 -0
  165. package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +375 -0
  166. package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +1285 -0
  167. package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +1395 -0
  168. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +2863 -0
  169. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +783 -0
  170. package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +82 -0
  171. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +309 -0
  172. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +28 -0
  173. package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +330 -0
  174. package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +21 -0
  175. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +147 -60
  176. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +291 -202
  177. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +100 -156
  178. package/external/libedhoc/externals/zcbor/include/zcbor_print.h +165 -0
  179. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +1 -1
  180. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +1 -1
  181. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +1 -1
  182. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +4 -4
  183. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +4 -4
  184. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +15 -24
  185. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +14 -23
  186. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +202 -29
  187. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +633 -173
  188. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +71 -184
  189. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +152 -153
  190. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +64 -64
  191. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +15 -16
  192. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +228 -84
  193. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +9 -9
  194. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -1
  195. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +172 -173
  196. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +73 -73
  197. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +1 -2
  198. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +83 -56
  199. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +15 -16
  200. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +12 -0
  201. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +69 -69
  202. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +448 -55
  203. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +49 -48
  204. package/external/libedhoc/include/edhoc.h +348 -54
  205. package/external/libedhoc/include/edhoc_common.h +289 -0
  206. package/external/libedhoc/include/edhoc_context.h +60 -35
  207. package/external/libedhoc/include/edhoc_credentials.h +55 -7
  208. package/external/libedhoc/include/edhoc_crypto.h +10 -10
  209. package/external/libedhoc/include/edhoc_ead.h +13 -10
  210. package/external/libedhoc/include/edhoc_macros.h +20 -11
  211. package/external/libedhoc/include/edhoc_values.h +2 -2
  212. package/external/libedhoc/library/edhoc.c +70 -36
  213. package/external/libedhoc/library/edhoc_common.c +1314 -0
  214. package/external/libedhoc/library/edhoc_exporter.c +45 -46
  215. package/external/libedhoc/library/edhoc_message_1.c +107 -72
  216. package/external/libedhoc/library/edhoc_message_2.c +396 -1693
  217. package/external/libedhoc/library/edhoc_message_3.c +465 -1656
  218. package/external/libedhoc/library/edhoc_message_4.c +93 -91
  219. package/external/libedhoc/library/edhoc_message_error.c +41 -41
  220. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_0.h → cipher_suite_0.h} +131 -134
  221. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_2.h → cipher_suite_2.h} +139 -140
  222. package/external/libedhoc/tests/include/{edhoc_trace_1/test_vector_1.h → test_vector_rfc9529_chapter_2.h} +786 -738
  223. package/external/libedhoc/tests/include/{edhoc_trace_2/test_vector_2.h → test_vector_rfc9529_chapter_3.h} +14 -10
  224. package/external/libedhoc/tests/include/{x509_chain_cs_0/test_vector_x5chain_cs_0.h → test_vector_x5chain_sign_keys_suite_0.h} +137 -140
  225. package/external/libedhoc/tests/include/{x509_chain_cs_2/test_vector_x5chain_cs_2.h → test_vector_x5chain_sign_keys_suite_2.h} +7 -8
  226. package/external/libedhoc/tests/include/{x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h → test_vector_x5chain_static_dh_keys_suite_2.h} +7 -8
  227. package/external/libedhoc/tests/include/{x509_hash_cs_2/test_vector_x5t_cs_2.h → test_vector_x5t_sign_keys_suite_2.h} +6 -7
  228. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_0.c → cipher_suite_0.c} +445 -447
  229. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_2.c → cipher_suite_2.c} +600 -600
  230. package/external/libedhoc/tests/src/module_test_api.c +430 -0
  231. package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +395 -0
  232. package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +392 -0
  233. package/external/libedhoc/tests/src/{error_message/test_edhoc_error_message.c → module_test_error_message.c} +94 -69
  234. package/external/libedhoc/tests/src/module_test_main.c +49 -0
  235. package/external/libedhoc/tests/src/{cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c → module_test_rfc9528_suites_negotiation.c} +224 -227
  236. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +2681 -0
  237. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +1635 -0
  238. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +1135 -0
  239. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +1249 -0
  240. package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +798 -0
  241. package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +956 -0
  242. package/include/EdhocComposeAsyncWorker.h +8 -6
  243. package/include/EdhocCredentialManager.h +16 -11
  244. package/include/EdhocCryptoManager.h +28 -21
  245. package/include/EdhocEadManager.h +3 -6
  246. package/include/{EdhocExportAsyncWorker.h → EdhocExportOscoreAsyncWorker.h} +20 -17
  247. package/include/EdhocKeyExporterAsyncWorker.h +76 -0
  248. package/include/EdhocKeyUpdateAsyncWorker.h +72 -0
  249. package/include/EdhocProcessAsyncWorker.h +14 -10
  250. package/include/LibEDHOC.h +44 -20
  251. package/include/UserContext.h +7 -9
  252. package/include/Utils.h +31 -27
  253. package/package.json +14 -3
  254. package/prebuilds/android-arm/edhoc.armv7.node +0 -0
  255. package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
  256. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  257. package/prebuilds/darwin-x64/edhoc.node +0 -0
  258. package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
  259. package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
  260. package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
  261. package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
  262. package/prebuilds/linux-x64/edhoc.musl.node +0 -0
  263. package/prebuilds/win32-ia32/edhoc.node +0 -0
  264. package/prebuilds/win32-x64/edhoc.node +0 -0
  265. package/src/EdhocComposeAsyncWorker.cpp +18 -35
  266. package/src/EdhocCredentialManager.cpp +160 -187
  267. package/src/EdhocCryptoManager.cpp +386 -586
  268. package/src/EdhocEadManager.cpp +10 -18
  269. package/src/EdhocExportOscoreAsyncWorker.cpp +77 -0
  270. package/src/EdhocKeyExporterAsyncWorker.cpp +49 -0
  271. package/src/EdhocKeyUpdateAsyncWorker.cpp +41 -0
  272. package/src/EdhocProcessAsyncWorker.cpp +72 -19
  273. package/src/LibEDHOC.cpp +213 -174
  274. package/src/Suites.cpp +39 -72
  275. package/src/Utils.cpp +32 -56
  276. package/test/basic.test.ts +64 -0
  277. package/test/vectors.test.ts +111 -0
  278. package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +0 -69
  279. package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +0 -37
  280. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +0 -48
  281. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +0 -48
  282. package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +0 -60
  283. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +0 -208
  284. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +0 -59
  285. package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +0 -60
  286. package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +0 -199
  287. package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +0 -48
  288. package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +0 -92
  289. package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +0 -96
  290. package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +0 -58
  291. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +0 -56
  292. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +0 -57
  293. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +0 -59
  294. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +0 -57
  295. package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +0 -60
  296. package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +0 -57
  297. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +0 -475
  298. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +0 -473
  299. package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +0 -252
  300. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +0 -1829
  301. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +0 -1247
  302. package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +0 -170
  303. package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +0 -1783
  304. package/external/libedhoc/tests/src/tests.c +0 -228
  305. package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +0 -332
  306. package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +0 -936
  307. package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +0 -166
  308. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +0 -587
  309. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +0 -917
  310. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +0 -186
  311. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +0 -743
  312. package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +0 -261
  313. package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +0 -854
  314. package/src/EdhocExportAsyncWorker.cpp +0 -82
@@ -1,1247 +0,0 @@
1
- /**
2
- * \file test_edhoc_handshake_ead_1.c
3
- * \author Kamil Kielbasa
4
- * \brief Unit tests for EDHOC EAD handshake.
5
- * \version 0.4
6
- * \date 2024-01-01
7
- *
8
- * \copyright Copyright (c) 2024
9
- *
10
- */
11
-
12
- /* Include files ----------------------------------------------------------- */
13
-
14
- /* Internal test headers: */
15
- #include "edhoc_trace_1/test_edhoc_handshake_ead_1.h"
16
- #include "edhoc_trace_1/test_vector_1.h"
17
- #include "edhoc_trace_1/authentication_credentials_1.h"
18
- #include "cipher_suites/cipher_suite_0.h"
19
-
20
- /* Standard library headers: */
21
- #include <stdio.h>
22
- #include <string.h>
23
- #include <assert.h>
24
-
25
- /* EDHOC header: */
26
- #define EDHOC_ALLOW_PRIVATE_ACCESS
27
- #include "edhoc.h"
28
-
29
- /* Module defines ---------------------------------------------------------- */
30
- #define EAD_TOKEN_BUFFER_LEN (300)
31
- #define MAX_NR_OF_EAD_TOKENS (3)
32
-
33
- #define DH_KEY_AGREEMENT_LENGTH (32)
34
-
35
- /* Module types and type definitiones -------------------------------------- */
36
-
37
- struct ead_token_buf {
38
- int32_t label;
39
- uint8_t value[EAD_TOKEN_BUFFER_LEN];
40
- size_t value_len;
41
- };
42
-
43
- struct ead_context {
44
- enum edhoc_message msg;
45
- size_t recv_tokens;
46
- struct ead_token_buf token[MAX_NR_OF_EAD_TOKENS];
47
- };
48
-
49
- /* Module interface variables and constants -------------------------------- */
50
- /* Static variables and constants ------------------------------------------ */
51
-
52
- static const struct edhoc_cipher_suite edhoc_cipher_suite_0 = {
53
- .value = 0,
54
- .aead_key_length = 16,
55
- .aead_tag_length = 8,
56
- .aead_iv_length = 13,
57
- .hash_length = 32,
58
- .mac_length = 32,
59
- .ecc_key_length = 32,
60
- .ecc_sign_length = 64,
61
- };
62
-
63
- static const struct edhoc_keys edhoc_keys = {
64
- .generate_key = cipher_suite_0_key_generate,
65
- .destroy_key = cipher_suite_0_key_destroy,
66
- };
67
-
68
- static const struct edhoc_crypto edhoc_crypto = {
69
- .make_key_pair = cipher_suite_0_make_key_pair,
70
- .key_agreement = cipher_suite_0_key_agreement,
71
- .signature = cipher_suite_0_signature,
72
- .verify = cipher_suite_0_verify,
73
- .extract = cipher_suite_0_extract,
74
- .expand = cipher_suite_0_expand,
75
- .encrypt = cipher_suite_0_encrypt,
76
- .decrypt = cipher_suite_0_decrypt,
77
- .hash = cipher_suite_0_hash,
78
- };
79
-
80
- static const struct edhoc_credentials edhoc_auth_cred_mocked_resp = {
81
- .fetch = auth_cred_fetch_resp,
82
- .verify = auth_cred_verify_resp,
83
- };
84
-
85
- static const struct edhoc_credentials edhoc_auth_cred_mocked_init = {
86
- .fetch = auth_cred_fetch_init,
87
- .verify = auth_cred_verify_init,
88
- };
89
-
90
- static const uint8_t ead_val_msg_1[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 };
91
- static const uint8_t ead_val_msg_2[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05,
92
- 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
93
- 0x0c, 0x0d, 0x0e, 0x0f };
94
- static const uint8_t ead_val_msg_3[] = {
95
- 0x55, 0x9a, 0xea, 0xd0, 0x82, 0x64, 0xd5, 0x79, 0x5d, 0x39, 0x09, 0x71,
96
- 0x8c, 0xdd, 0x05, 0xab, 0xd4, 0x95, 0x72, 0xe8, 0x4f, 0xe5, 0x55, 0x90,
97
- 0xee, 0xf3, 0x1a, 0x88, 0xa0, 0x8f, 0xdf, 0xfd, 0x3c, 0xb2, 0x5f, 0x25,
98
- 0xfa, 0xac, 0xd5, 0x7a, 0x90, 0x43, 0x4f, 0x64, 0xd0, 0x36, 0x2f, 0x2a,
99
- 0x2d, 0x2d, 0x0a, 0x90, 0xcf, 0x1a, 0x5a, 0x4c, 0x5d, 0xb0, 0x2d, 0x56,
100
- 0xec, 0xc4, 0xc5, 0xbf, 0x34, 0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18,
101
- 0x58, 0x65, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9,
102
- 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
103
- 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
104
- };
105
-
106
- static const uint8_t ead_val_msg_4[] = { 0xff, 0xee, 0xdd, 0xcc,
107
- 0xbb, 0xaa, 0x00 };
108
-
109
- static const struct edhoc_ead_token ead_single_token_msg_1 = {
110
- .label = 0,
111
- .value = ead_val_msg_1,
112
- .value_len = ARRAY_SIZE(ead_val_msg_1),
113
- };
114
-
115
- static const struct edhoc_ead_token ead_single_token_msg_2 = {
116
- .label = 24,
117
- .value = ead_val_msg_2,
118
- .value_len = ARRAY_SIZE(ead_val_msg_2),
119
- };
120
-
121
- static const struct edhoc_ead_token ead_single_token_msg_3 = {
122
- .label = 65535,
123
- .value = ead_val_msg_3,
124
- .value_len = ARRAY_SIZE(ead_val_msg_3),
125
- };
126
-
127
- static const struct edhoc_ead_token ead_single_token_msg_4 = {
128
- .label = -830,
129
- .value = ead_val_msg_4,
130
- .value_len = ARRAY_SIZE(ead_val_msg_4),
131
- };
132
-
133
- static const struct edhoc_ead_token ead_multiple_tokens_msg_1[] = {
134
- ead_single_token_msg_1,
135
- ead_single_token_msg_2,
136
- ead_single_token_msg_3,
137
- };
138
-
139
- static const struct edhoc_ead_token ead_multiple_tokens_msg_2[] = {
140
- ead_single_token_msg_3,
141
- ead_single_token_msg_1,
142
- };
143
-
144
- static const struct edhoc_ead_token ead_multiple_tokens_msg_3[] = {
145
- ead_single_token_msg_3,
146
- ead_single_token_msg_2,
147
- ead_single_token_msg_1,
148
- };
149
-
150
- static const struct edhoc_ead_token ead_multiple_tokens_msg_4[] = {
151
- ead_single_token_msg_1,
152
- ead_single_token_msg_4,
153
- ead_single_token_msg_3,
154
- };
155
-
156
- /* Static function declarations -------------------------------------------- */
157
-
158
- static inline void print_array(void *user_context, const char *name,
159
- const uint8_t *buffer, size_t buffer_length);
160
-
161
- static int ead_compose_single_token(void *user_context,
162
- enum edhoc_message message,
163
- struct edhoc_ead_token *ead_token,
164
- size_t ead_token_size,
165
- size_t *ead_token_len);
166
-
167
- static int ead_process_single_token(void *user_context,
168
- enum edhoc_message message,
169
- const struct edhoc_ead_token *ead_token,
170
- size_t ead_token_size);
171
-
172
- static int ead_compose_multiple_tokens(void *user_context,
173
- enum edhoc_message message,
174
- struct edhoc_ead_token *ead_token,
175
- size_t ead_token_size,
176
- size_t *ead_token_len);
177
-
178
- static int ead_process_multiple_tokens(void *user_context,
179
- enum edhoc_message message,
180
- const struct edhoc_ead_token *ead_token,
181
- size_t ead_token_size);
182
-
183
- static const struct edhoc_ead edhoc_ead_single_token = {
184
- .compose = ead_compose_single_token,
185
- .process = ead_process_single_token,
186
- };
187
-
188
- static const struct edhoc_ead edhoc_ead_multiple_tokens = {
189
- .compose = ead_compose_multiple_tokens,
190
- .process = ead_process_multiple_tokens,
191
- };
192
-
193
- /* Static function definitions --------------------------------------------- */
194
-
195
- static inline void print_array(void *user_context, const char *name,
196
- const uint8_t *buffer, size_t buffer_length)
197
- {
198
- (void)user_context;
199
-
200
- printf("%s:\tLEN( %zu )\n", name, buffer_length);
201
-
202
- for (size_t i = 0; i < buffer_length; ++i) {
203
- if (0 == i % 16 && i > 0) {
204
- printf("\n");
205
- }
206
-
207
- printf("%02x ", buffer[i]);
208
- }
209
-
210
- printf("\n\n");
211
- }
212
-
213
- static int ead_compose_single_token(void *user_ctx, enum edhoc_message msg,
214
- struct edhoc_ead_token *ead_token,
215
- size_t ead_token_size,
216
- size_t *ead_token_len)
217
- {
218
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size ||
219
- NULL == ead_token_len)
220
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
221
-
222
- const struct edhoc_ead_token *token = NULL;
223
-
224
- switch (msg) {
225
- case EDHOC_MSG_1:
226
- token = &ead_single_token_msg_1;
227
- break;
228
- case EDHOC_MSG_2:
229
- token = &ead_single_token_msg_2;
230
- break;
231
- case EDHOC_MSG_3:
232
- token = &ead_single_token_msg_3;
233
- break;
234
- case EDHOC_MSG_4:
235
- token = &ead_single_token_msg_4;
236
- break;
237
- default:
238
- return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
239
- }
240
-
241
- ead_token[0] = *token;
242
- *ead_token_len = 1;
243
-
244
- struct ead_context *ead_ctx = user_ctx;
245
-
246
- ead_ctx->msg = msg;
247
- ead_ctx->recv_tokens = 1;
248
-
249
- for (size_t i = 0; i < ead_ctx->recv_tokens; ++i) {
250
- ead_ctx->token[i].label = ead_token[i].label;
251
- ead_ctx->token[i].value_len = ead_token[i].value_len;
252
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
253
- ead_token[i].value_len);
254
- }
255
-
256
- return EDHOC_SUCCESS;
257
- }
258
-
259
- static int ead_process_single_token(void *user_ctx, enum edhoc_message msg,
260
- const struct edhoc_ead_token *ead_token,
261
- size_t ead_token_size)
262
- {
263
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size)
264
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
265
-
266
- struct ead_context *ead_ctx = user_ctx;
267
-
268
- ead_ctx->msg = msg;
269
- ead_ctx->recv_tokens = ead_token_size;
270
-
271
- for (size_t i = 0; i < ead_token_size; ++i) {
272
- ead_ctx->token[i].label = ead_token[i].label;
273
- ead_ctx->token[i].value_len = ead_token[i].value_len;
274
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
275
- ead_token[i].value_len);
276
- }
277
-
278
- return EDHOC_SUCCESS;
279
- }
280
-
281
- static int ead_compose_multiple_tokens(void *user_ctx, enum edhoc_message msg,
282
- struct edhoc_ead_token *ead_token,
283
- size_t ead_token_size,
284
- size_t *ead_token_len)
285
- {
286
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size ||
287
- NULL == ead_token_len)
288
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
289
-
290
- size_t len = 0;
291
- const struct edhoc_ead_token *token = NULL;
292
-
293
- switch (msg) {
294
- case EDHOC_MSG_1:
295
- token = ead_multiple_tokens_msg_1;
296
- len = ARRAY_SIZE(ead_multiple_tokens_msg_1);
297
- break;
298
- case EDHOC_MSG_2:
299
- token = ead_multiple_tokens_msg_2;
300
- len = ARRAY_SIZE(ead_multiple_tokens_msg_2);
301
- break;
302
- case EDHOC_MSG_3:
303
- token = ead_multiple_tokens_msg_3;
304
- len = ARRAY_SIZE(ead_multiple_tokens_msg_3);
305
- break;
306
- case EDHOC_MSG_4:
307
- token = ead_multiple_tokens_msg_4;
308
- len = ARRAY_SIZE(ead_multiple_tokens_msg_4);
309
- break;
310
- default:
311
- return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
312
- }
313
-
314
- *ead_token_len = len;
315
-
316
- for (size_t i = 0; i < len; ++i)
317
- ead_token[i] = token[i];
318
-
319
- struct ead_context *ead_ctx = user_ctx;
320
-
321
- ead_ctx->msg = msg;
322
- ead_ctx->recv_tokens = len;
323
-
324
- for (size_t i = 0; i < ead_ctx->recv_tokens; ++i) {
325
- ead_ctx->token[i].label = ead_token[i].label;
326
- ead_ctx->token[i].value_len = ead_token[i].value_len;
327
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
328
- ead_token[i].value_len);
329
- }
330
-
331
- return EDHOC_SUCCESS;
332
- }
333
-
334
- static int ead_process_multiple_tokens(void *user_ctx, enum edhoc_message msg,
335
- const struct edhoc_ead_token *ead_token,
336
- size_t ead_token_size)
337
- {
338
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size)
339
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
340
-
341
- struct ead_context *ead_ctx = user_ctx;
342
-
343
- ead_ctx->msg = msg;
344
- ead_ctx->recv_tokens = ead_token_size;
345
-
346
- for (size_t i = 0; i < ead_token_size; ++i) {
347
- ead_ctx->token[i].label = ead_token[i].label;
348
- ead_ctx->token[i].value_len = ead_token[i].value_len;
349
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
350
- ead_token[i].value_len);
351
- }
352
-
353
- return EDHOC_SUCCESS;
354
- }
355
-
356
- /* Module interface function definitions ----------------------------------- */
357
-
358
- void test_edhoc_handshake_1_e2e_single_ead_token(void)
359
- {
360
- int ret = EDHOC_ERROR_GENERIC_ERROR;
361
- enum edhoc_error_code error_code_recv =
362
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
363
-
364
- /**
365
- * \brief Setup initiator context.
366
- */
367
- struct edhoc_context init_ctx = { 0 };
368
- struct ead_context init_ead_ctx = { 0 };
369
- struct edhoc_connection_id init_cid = {
370
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
371
- .int_value = (int8_t)C_I[0],
372
- };
373
-
374
- ret = edhoc_context_init(&init_ctx);
375
- assert(EDHOC_SUCCESS == ret);
376
- init_ctx.logger = print_array;
377
-
378
- ret = edhoc_set_method(&init_ctx, METHOD);
379
- assert(EDHOC_SUCCESS == ret);
380
-
381
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
382
- assert(EDHOC_SUCCESS == ret);
383
-
384
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
385
- assert(EDHOC_SUCCESS == ret);
386
-
387
- ret = edhoc_set_user_context(&init_ctx, &init_ead_ctx);
388
- assert(EDHOC_SUCCESS == ret);
389
-
390
- ret = edhoc_bind_ead(&init_ctx, edhoc_ead_single_token);
391
- assert(EDHOC_SUCCESS == ret);
392
-
393
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
394
- assert(EDHOC_SUCCESS == ret);
395
-
396
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto);
397
- assert(EDHOC_SUCCESS == ret);
398
-
399
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
400
- assert(EDHOC_SUCCESS == ret);
401
-
402
- /**
403
- * \brief Setup responder context.
404
- */
405
- struct edhoc_context resp_ctx = { 0 };
406
- struct ead_context resp_ead_ctx = { 0 };
407
- struct edhoc_connection_id resp_cid = {
408
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
409
- .bstr_length = ARRAY_SIZE(C_R),
410
- };
411
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
412
-
413
- ret = edhoc_context_init(&resp_ctx);
414
- assert(EDHOC_SUCCESS == ret);
415
- resp_ctx.logger = print_array;
416
-
417
- ret = edhoc_set_method(&resp_ctx, METHOD);
418
- assert(EDHOC_SUCCESS == ret);
419
-
420
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
421
- assert(EDHOC_SUCCESS == ret);
422
-
423
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
424
- assert(EDHOC_SUCCESS == ret);
425
-
426
- ret = edhoc_set_user_context(&resp_ctx, &resp_ead_ctx);
427
- assert(EDHOC_SUCCESS == ret);
428
-
429
- ret = edhoc_bind_ead(&resp_ctx, edhoc_ead_single_token);
430
- assert(EDHOC_SUCCESS == ret);
431
-
432
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
433
- assert(EDHOC_SUCCESS == ret);
434
-
435
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto);
436
- assert(EDHOC_SUCCESS == ret);
437
-
438
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
439
- assert(EDHOC_SUCCESS == ret);
440
-
441
- /**
442
- * \brief One buffer for whole EDHOC handshake.
443
- */
444
- uint8_t buffer[500] = { 0 };
445
-
446
- /**
447
- * \brief Zeros EAD context's.
448
- */
449
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
450
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
451
-
452
- /**
453
- * \brief EDHOC message 1 compose.
454
- */
455
- memset(buffer, 0, sizeof(buffer));
456
- size_t msg_1_len = 0;
457
- uint8_t *msg_1 = buffer;
458
-
459
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
460
- &msg_1_len);
461
-
462
- assert(EDHOC_SUCCESS == ret);
463
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
464
- assert(false == init_ctx.is_oscore_export_allowed);
465
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
466
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
467
-
468
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
469
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
470
- assert(EDHOC_SUCCESS == ret);
471
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
472
-
473
- /* Verify EAD_1 compose. */
474
- assert(EDHOC_MSG_1 == init_ead_ctx.msg);
475
- assert(1 == init_ead_ctx.recv_tokens);
476
- assert(ead_single_token_msg_1.label == init_ead_ctx.token[0].label);
477
- assert(ead_single_token_msg_1.value_len ==
478
- init_ead_ctx.token[0].value_len);
479
- assert(0 == memcmp(ead_single_token_msg_1.value,
480
- init_ead_ctx.token[0].value,
481
- init_ead_ctx.token[0].value_len));
482
-
483
- /**
484
- * \brief EDHOC message 1 process.
485
- */
486
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
487
-
488
- assert(EDHOC_SUCCESS == ret);
489
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
490
- assert(false == resp_ctx.is_oscore_export_allowed);
491
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
492
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
493
-
494
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
495
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
496
- assert(EDHOC_SUCCESS == ret);
497
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
498
-
499
- /* Verify EAD_1 process. */
500
- assert(EDHOC_MSG_1 == resp_ead_ctx.msg);
501
- assert(1 == resp_ead_ctx.recv_tokens);
502
- assert(ead_single_token_msg_1.label == resp_ead_ctx.token[0].label);
503
- assert(ead_single_token_msg_1.value_len ==
504
- resp_ead_ctx.token[0].value_len);
505
- assert(0 == memcmp(ead_single_token_msg_1.value,
506
- resp_ead_ctx.token[0].value,
507
- resp_ead_ctx.token[0].value_len));
508
-
509
- /**
510
- * \brief Zeros EAD context's.
511
- */
512
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
513
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
514
-
515
- /**
516
- * \brief EDHOC message 2 compose.
517
- */
518
- memset(buffer, 0, sizeof(buffer));
519
- size_t msg_2_len = 0;
520
- uint8_t *msg_2 = buffer;
521
-
522
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
523
- &msg_2_len);
524
-
525
- assert(EDHOC_SUCCESS == ret);
526
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
527
- assert(false == resp_ctx.is_oscore_export_allowed);
528
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
529
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
530
-
531
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
532
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
533
- assert(EDHOC_SUCCESS == ret);
534
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
535
-
536
- /* Verify EAD_2 compose. */
537
- assert(EDHOC_MSG_2 == resp_ead_ctx.msg);
538
- assert(1 == resp_ead_ctx.recv_tokens);
539
- assert(ead_single_token_msg_2.label == resp_ead_ctx.token[0].label);
540
- assert(ead_single_token_msg_2.value_len ==
541
- resp_ead_ctx.token[0].value_len);
542
- assert(0 == memcmp(ead_single_token_msg_2.value,
543
- resp_ead_ctx.token[0].value,
544
- resp_ead_ctx.token[0].value_len));
545
-
546
- /**
547
- * \brief EDHOC message 2 process.
548
- */
549
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
550
-
551
- assert(EDHOC_SUCCESS == ret);
552
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
553
- assert(false == init_ctx.is_oscore_export_allowed);
554
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
555
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
556
-
557
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
558
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
559
- assert(EDHOC_SUCCESS == ret);
560
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
561
-
562
- /* Verify EAD_2 process. */
563
- assert(EDHOC_MSG_2 == init_ead_ctx.msg);
564
- assert(1 == init_ead_ctx.recv_tokens);
565
- assert(ead_single_token_msg_2.label == init_ead_ctx.token[0].label);
566
- assert(ead_single_token_msg_2.value_len ==
567
- init_ead_ctx.token[0].value_len);
568
- assert(0 == memcmp(ead_single_token_msg_2.value,
569
- init_ead_ctx.token[0].value,
570
- init_ead_ctx.token[0].value_len));
571
-
572
- /**
573
- * \brief Verify ephemeral DH key agreement.
574
- */
575
- assert(DH_KEY_AGREEMENT_LENGTH == init_ctx.dh_secret_len);
576
- assert(DH_KEY_AGREEMENT_LENGTH == resp_ctx.dh_secret_len);
577
- assert(init_ctx.dh_secret_len == resp_ctx.dh_secret_len);
578
- assert(0 == memcmp(init_ctx.dh_secret, resp_ctx.dh_secret,
579
- DH_KEY_AGREEMENT_LENGTH));
580
-
581
- /**
582
- * \brief Zeros EAD context's.
583
- */
584
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
585
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
586
-
587
- /**
588
- * \brief EDHOC message 3 compose.
589
- */
590
- memset(buffer, 0, sizeof(buffer));
591
- size_t msg_3_len = 0;
592
- uint8_t *msg_3 = buffer;
593
-
594
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
595
- &msg_3_len);
596
-
597
- assert(EDHOC_SUCCESS == ret);
598
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
599
- assert(true == init_ctx.is_oscore_export_allowed);
600
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
601
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
602
-
603
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
604
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
605
- assert(EDHOC_SUCCESS == ret);
606
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
607
-
608
- /* Verify EAD_3 compose. */
609
- assert(EDHOC_MSG_3 == init_ead_ctx.msg);
610
- assert(1 == init_ead_ctx.recv_tokens);
611
- assert(ead_single_token_msg_3.label == init_ead_ctx.token[0].label);
612
- assert(ead_single_token_msg_3.value_len ==
613
- init_ead_ctx.token[0].value_len);
614
- assert(0 == memcmp(ead_single_token_msg_3.value,
615
- init_ead_ctx.token[0].value,
616
- init_ead_ctx.token[0].value_len));
617
-
618
- /**
619
- * \brief EDHOC message 3 process.
620
- */
621
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
622
-
623
- assert(EDHOC_SUCCESS == ret);
624
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
625
- assert(true == resp_ctx.is_oscore_export_allowed);
626
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
627
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
628
-
629
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
630
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
631
- assert(EDHOC_SUCCESS == ret);
632
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
633
-
634
- /* Verify EAD_3 process. */
635
- assert(EDHOC_MSG_3 == resp_ead_ctx.msg);
636
- assert(1 == resp_ead_ctx.recv_tokens);
637
- assert(ead_single_token_msg_3.label == resp_ead_ctx.token[0].label);
638
- assert(ead_single_token_msg_3.value_len ==
639
- resp_ead_ctx.token[0].value_len);
640
- assert(0 == memcmp(ead_single_token_msg_3.value,
641
- resp_ead_ctx.token[0].value,
642
- resp_ead_ctx.token[0].value_len));
643
-
644
- /**
645
- * \brief Zeros EAD context's.
646
- */
647
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
648
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
649
-
650
- /**
651
- * \brief EDHOC message 4 compose.
652
- */
653
- memset(buffer, 0, sizeof(buffer));
654
- size_t msg_4_len = 0;
655
- uint8_t *msg_4 = buffer;
656
-
657
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
658
- &msg_4_len);
659
-
660
- assert(EDHOC_SUCCESS == ret);
661
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
662
- assert(true == resp_ctx.is_oscore_export_allowed);
663
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
664
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
665
-
666
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
667
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
668
- assert(EDHOC_SUCCESS == ret);
669
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
670
-
671
- /* Verify EAD_4 compose. */
672
- assert(EDHOC_MSG_4 == resp_ead_ctx.msg);
673
- assert(1 == resp_ead_ctx.recv_tokens);
674
- assert(ead_single_token_msg_4.label == resp_ead_ctx.token[0].label);
675
- assert(ead_single_token_msg_4.value_len ==
676
- resp_ead_ctx.token[0].value_len);
677
- assert(0 == memcmp(ead_single_token_msg_4.value,
678
- resp_ead_ctx.token[0].value,
679
- resp_ead_ctx.token[0].value_len));
680
-
681
- /**
682
- * \brief EDHOC message 4 process.
683
- */
684
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
685
-
686
- assert(EDHOC_SUCCESS == ret);
687
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
688
- assert(true == init_ctx.is_oscore_export_allowed);
689
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
690
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
691
-
692
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
693
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
694
- assert(EDHOC_SUCCESS == ret);
695
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
696
-
697
- /* Verify EAD_4 process. */
698
- assert(EDHOC_MSG_4 == init_ead_ctx.msg);
699
- assert(1 == init_ead_ctx.recv_tokens);
700
-
701
- assert(ead_single_token_msg_4.label == init_ead_ctx.token[0].label);
702
- assert(ead_single_token_msg_4.value_len ==
703
- init_ead_ctx.token[0].value_len);
704
- assert(0 == memcmp(ead_single_token_msg_4.value,
705
- init_ead_ctx.token[0].value,
706
- init_ead_ctx.token[0].value_len));
707
-
708
- /**
709
- * \brief Initiator - derive OSCORE secret & salt.
710
- */
711
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
712
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
713
- size_t init_sender_id_len = 0;
714
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
715
- size_t init_recipient_id_len = 0;
716
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
717
-
718
- ret = edhoc_export_oscore_session(
719
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
720
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
721
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
722
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
723
- &init_recipient_id_len);
724
-
725
- assert(EDHOC_SUCCESS == ret);
726
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
727
- assert(false == init_ctx.is_oscore_export_allowed);
728
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
729
-
730
- /**
731
- * \brief Responder - derive OSCORE secret & salt.
732
- */
733
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
734
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
735
- size_t resp_sender_id_len = 0;
736
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
737
- size_t resp_recipient_id_len = 0;
738
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
739
-
740
- ret = edhoc_export_oscore_session(
741
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
742
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
743
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
744
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
745
- &resp_recipient_id_len);
746
-
747
- assert(EDHOC_SUCCESS == ret);
748
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
749
- assert(false == resp_ctx.is_oscore_export_allowed);
750
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
751
-
752
- /**
753
- * \brief Verify OSCORE master secret:
754
- */
755
- assert(0 == memcmp(init_master_secret, resp_master_secret,
756
- sizeof(resp_master_secret)));
757
-
758
- /**
759
- * \brief Verify OSCORE master salt:
760
- */
761
- assert(0 == memcmp(init_master_salt, resp_master_salt,
762
- sizeof(resp_master_salt)));
763
-
764
- /**
765
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
766
- */
767
- assert(init_sender_id_len == resp_recipient_id_len);
768
- assert(0 ==
769
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
770
- assert(init_recipient_id_len == resp_sender_id_len);
771
- assert(0 ==
772
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
773
-
774
- /**
775
- * \brief Clean up of EDHOC context's.
776
- */
777
- ret = edhoc_context_deinit(&init_ctx);
778
- assert(EDHOC_SUCCESS == ret);
779
-
780
- ret = edhoc_context_deinit(&resp_ctx);
781
- assert(EDHOC_SUCCESS == ret);
782
- }
783
-
784
- void test_edhoc_handshake_1_e2e_multiple_ead_tokens(void)
785
- {
786
- int ret = EDHOC_ERROR_GENERIC_ERROR;
787
- enum edhoc_error_code error_code_recv =
788
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
789
-
790
- /**
791
- * \brief Setup initiator context.
792
- */
793
- struct edhoc_context init_ctx = { 0 };
794
- struct ead_context init_ead_ctx = { 0 };
795
- struct edhoc_connection_id init_cid = {
796
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
797
- .int_value = (int8_t)C_I[0],
798
- };
799
-
800
- ret = edhoc_context_init(&init_ctx);
801
- assert(EDHOC_SUCCESS == ret);
802
- init_ctx.logger = print_array;
803
-
804
- ret = edhoc_set_method(&init_ctx, METHOD);
805
- assert(EDHOC_SUCCESS == ret);
806
-
807
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
808
- assert(EDHOC_SUCCESS == ret);
809
-
810
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
811
- assert(EDHOC_SUCCESS == ret);
812
-
813
- ret = edhoc_set_user_context(&init_ctx, &init_ead_ctx);
814
- assert(EDHOC_SUCCESS == ret);
815
-
816
- ret = edhoc_bind_ead(&init_ctx, edhoc_ead_multiple_tokens);
817
- assert(EDHOC_SUCCESS == ret);
818
-
819
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
820
- assert(EDHOC_SUCCESS == ret);
821
-
822
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto);
823
- assert(EDHOC_SUCCESS == ret);
824
-
825
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
826
- assert(EDHOC_SUCCESS == ret);
827
-
828
- /**
829
- * \brief Setup responder context.
830
- */
831
- struct edhoc_context resp_ctx = { 0 };
832
- struct ead_context resp_ead_ctx = { 0 };
833
- struct edhoc_connection_id resp_cid = {
834
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
835
- .bstr_length = ARRAY_SIZE(C_R),
836
- };
837
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
838
-
839
- ret = edhoc_context_init(&resp_ctx);
840
- assert(EDHOC_SUCCESS == ret);
841
- resp_ctx.logger = print_array;
842
-
843
- ret = edhoc_set_method(&resp_ctx, METHOD);
844
- assert(EDHOC_SUCCESS == ret);
845
-
846
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
847
- assert(EDHOC_SUCCESS == ret);
848
-
849
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
850
- assert(EDHOC_SUCCESS == ret);
851
-
852
- ret = edhoc_set_user_context(&resp_ctx, &resp_ead_ctx);
853
- assert(EDHOC_SUCCESS == ret);
854
-
855
- ret = edhoc_bind_ead(&resp_ctx, edhoc_ead_multiple_tokens);
856
- assert(EDHOC_SUCCESS == ret);
857
-
858
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
859
- assert(EDHOC_SUCCESS == ret);
860
-
861
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto);
862
- assert(EDHOC_SUCCESS == ret);
863
-
864
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
865
- assert(EDHOC_SUCCESS == ret);
866
-
867
- /**
868
- * \brief One buffer for whole EDHOC handshake.
869
- */
870
- uint8_t buffer[1000] = { 0 };
871
-
872
- /**
873
- * \brief Zeros EAD context's.
874
- */
875
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
876
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
877
-
878
- /**
879
- * \brief EDHOC message 1 compose.
880
- */
881
- memset(buffer, 0, sizeof(buffer));
882
- size_t msg_1_len = 0;
883
- uint8_t *msg_1 = buffer;
884
-
885
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
886
- &msg_1_len);
887
-
888
- assert(EDHOC_SUCCESS == ret);
889
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
890
- assert(false == init_ctx.is_oscore_export_allowed);
891
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
892
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
893
-
894
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
895
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
896
- assert(EDHOC_SUCCESS == ret);
897
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
898
-
899
- /* Verify EAD_1 compose. */
900
- assert(EDHOC_MSG_1 == init_ead_ctx.msg);
901
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_1) ==
902
- init_ead_ctx.recv_tokens);
903
-
904
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
905
- assert(ead_multiple_tokens_msg_1[i].label ==
906
- init_ead_ctx.token[i].label);
907
- assert(ead_multiple_tokens_msg_1[i].value_len ==
908
- init_ead_ctx.token[i].value_len);
909
- assert(0 == memcmp(ead_multiple_tokens_msg_1[i].value,
910
- init_ead_ctx.token[i].value,
911
- init_ead_ctx.token[i].value_len));
912
- }
913
-
914
- /**
915
- * \brief EDHOC message 1 process.
916
- */
917
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
918
-
919
- assert(EDHOC_SUCCESS == ret);
920
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
921
- assert(false == resp_ctx.is_oscore_export_allowed);
922
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
923
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
924
-
925
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
926
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
927
- assert(EDHOC_SUCCESS == ret);
928
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
929
-
930
- /* Verify EAD_1 process. */
931
- assert(EDHOC_MSG_1 == resp_ead_ctx.msg);
932
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_1) ==
933
- resp_ead_ctx.recv_tokens);
934
-
935
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
936
- assert(ead_multiple_tokens_msg_1[i].label ==
937
- resp_ead_ctx.token[i].label);
938
- assert(ead_multiple_tokens_msg_1[i].value_len ==
939
- resp_ead_ctx.token[i].value_len);
940
- assert(0 == memcmp(ead_multiple_tokens_msg_1[i].value,
941
- resp_ead_ctx.token[i].value,
942
- resp_ead_ctx.token[i].value_len));
943
- }
944
-
945
- /**
946
- * \brief Zeros EAD context's.
947
- */
948
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
949
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
950
-
951
- /**
952
- * \brief EDHOC message 2 compose.
953
- */
954
- memset(buffer, 0, sizeof(buffer));
955
- size_t msg_2_len = 0;
956
- uint8_t *msg_2 = buffer;
957
-
958
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
959
- &msg_2_len);
960
-
961
- assert(EDHOC_SUCCESS == ret);
962
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
963
- assert(false == resp_ctx.is_oscore_export_allowed);
964
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
965
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
966
-
967
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
968
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
969
- assert(EDHOC_SUCCESS == ret);
970
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
971
-
972
- /* Verify EAD_2 compose. */
973
- assert(EDHOC_MSG_2 == resp_ead_ctx.msg);
974
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_2) ==
975
- resp_ead_ctx.recv_tokens);
976
-
977
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
978
- assert(ead_multiple_tokens_msg_2[i].label ==
979
- resp_ead_ctx.token[i].label);
980
- assert(ead_multiple_tokens_msg_2[i].value_len ==
981
- resp_ead_ctx.token[i].value_len);
982
- assert(0 == memcmp(ead_multiple_tokens_msg_2[i].value,
983
- resp_ead_ctx.token[i].value,
984
- resp_ead_ctx.token[i].value_len));
985
- }
986
-
987
- /**
988
- * \brief EDHOC message 2 process.
989
- */
990
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
991
-
992
- assert(EDHOC_SUCCESS == ret);
993
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
994
- assert(false == init_ctx.is_oscore_export_allowed);
995
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
996
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
997
-
998
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
999
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1000
- assert(EDHOC_SUCCESS == ret);
1001
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1002
-
1003
- /* Verify EAD_2 process. */
1004
- assert(EDHOC_MSG_2 == init_ead_ctx.msg);
1005
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_2) ==
1006
- init_ead_ctx.recv_tokens);
1007
-
1008
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
1009
- assert(ead_multiple_tokens_msg_2[i].label ==
1010
- init_ead_ctx.token[i].label);
1011
- assert(ead_multiple_tokens_msg_2[i].value_len ==
1012
- init_ead_ctx.token[i].value_len);
1013
- assert(0 == memcmp(ead_multiple_tokens_msg_2[i].value,
1014
- init_ead_ctx.token[i].value,
1015
- init_ead_ctx.token[i].value_len));
1016
- }
1017
-
1018
- /**
1019
- * \brief Verify ephemeral DH key agreement.
1020
- */
1021
- assert(DH_KEY_AGREEMENT_LENGTH == init_ctx.dh_secret_len);
1022
- assert(DH_KEY_AGREEMENT_LENGTH == resp_ctx.dh_secret_len);
1023
- assert(init_ctx.dh_secret_len == resp_ctx.dh_secret_len);
1024
- assert(0 == memcmp(init_ctx.dh_secret, resp_ctx.dh_secret,
1025
- DH_KEY_AGREEMENT_LENGTH));
1026
-
1027
- /**
1028
- * \brief Zeros EAD context's.
1029
- */
1030
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
1031
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
1032
-
1033
- /**
1034
- * \brief EDHOC message 3 compose.
1035
- */
1036
- memset(buffer, 0, sizeof(buffer));
1037
- size_t msg_3_len = 0;
1038
- uint8_t *msg_3 = buffer;
1039
-
1040
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
1041
- &msg_3_len);
1042
-
1043
- assert(EDHOC_SUCCESS == ret);
1044
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
1045
- assert(true == init_ctx.is_oscore_export_allowed);
1046
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1047
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1048
-
1049
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1050
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1051
- assert(EDHOC_SUCCESS == ret);
1052
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1053
-
1054
- /* Verify EAD_3 compose. */
1055
- assert(EDHOC_MSG_3 == init_ead_ctx.msg);
1056
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_3) ==
1057
- init_ead_ctx.recv_tokens);
1058
-
1059
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
1060
- assert(ead_multiple_tokens_msg_3[i].label ==
1061
- init_ead_ctx.token[i].label);
1062
- assert(ead_multiple_tokens_msg_3[i].value_len ==
1063
- init_ead_ctx.token[i].value_len);
1064
- assert(0 == memcmp(ead_multiple_tokens_msg_3[i].value,
1065
- init_ead_ctx.token[i].value,
1066
- init_ead_ctx.token[i].value_len));
1067
- }
1068
-
1069
- /**
1070
- * \brief EDHOC message 3 process.
1071
- */
1072
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
1073
-
1074
- assert(EDHOC_SUCCESS == ret);
1075
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
1076
- assert(true == resp_ctx.is_oscore_export_allowed);
1077
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1078
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1079
-
1080
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1081
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1082
- assert(EDHOC_SUCCESS == ret);
1083
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1084
-
1085
- /* Verify EAD_3 process. */
1086
- assert(EDHOC_MSG_3 == resp_ead_ctx.msg);
1087
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_3) ==
1088
- resp_ead_ctx.recv_tokens);
1089
-
1090
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
1091
- assert(ead_multiple_tokens_msg_3[i].label ==
1092
- resp_ead_ctx.token[i].label);
1093
- assert(ead_multiple_tokens_msg_3[i].value_len ==
1094
- resp_ead_ctx.token[i].value_len);
1095
- assert(0 == memcmp(ead_multiple_tokens_msg_3[i].value,
1096
- resp_ead_ctx.token[i].value,
1097
- resp_ead_ctx.token[i].value_len));
1098
- }
1099
-
1100
- /**
1101
- * \brief Zeros EAD context's.
1102
- */
1103
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
1104
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
1105
-
1106
- /**
1107
- * \brief EDHOC message 4 compose.
1108
- */
1109
- memset(buffer, 0, sizeof(buffer));
1110
- size_t msg_4_len = 0;
1111
- uint8_t *msg_4 = buffer;
1112
-
1113
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
1114
- &msg_4_len);
1115
-
1116
- assert(EDHOC_SUCCESS == ret);
1117
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1118
- assert(true == resp_ctx.is_oscore_export_allowed);
1119
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1120
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1121
-
1122
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1123
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1124
- assert(EDHOC_SUCCESS == ret);
1125
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1126
-
1127
- /* Verify EAD_4 compose. */
1128
- assert(EDHOC_MSG_4 == resp_ead_ctx.msg);
1129
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_4) ==
1130
- resp_ead_ctx.recv_tokens);
1131
-
1132
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
1133
- assert(ead_multiple_tokens_msg_4[i].label ==
1134
- resp_ead_ctx.token[i].label);
1135
- assert(ead_multiple_tokens_msg_4[i].value_len ==
1136
- resp_ead_ctx.token[i].value_len);
1137
- assert(0 == memcmp(ead_multiple_tokens_msg_4[i].value,
1138
- resp_ead_ctx.token[i].value,
1139
- resp_ead_ctx.token[i].value_len));
1140
- }
1141
-
1142
- /**
1143
- * \brief EDHOC message 4 process.
1144
- */
1145
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
1146
-
1147
- assert(EDHOC_SUCCESS == ret);
1148
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1149
- assert(true == init_ctx.is_oscore_export_allowed);
1150
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1151
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1152
-
1153
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1154
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1155
- assert(EDHOC_SUCCESS == ret);
1156
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1157
-
1158
- /* Verify EAD_4 process. */
1159
- assert(EDHOC_MSG_4 == init_ead_ctx.msg);
1160
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_4) ==
1161
- init_ead_ctx.recv_tokens);
1162
-
1163
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
1164
- assert(ead_multiple_tokens_msg_4[i].label ==
1165
- init_ead_ctx.token[i].label);
1166
- assert(ead_multiple_tokens_msg_4[i].value_len ==
1167
- init_ead_ctx.token[i].value_len);
1168
- assert(0 == memcmp(ead_multiple_tokens_msg_4[i].value,
1169
- init_ead_ctx.token[i].value,
1170
- init_ead_ctx.token[i].value_len));
1171
- }
1172
-
1173
- /**
1174
- * \brief Initiator - derive OSCORE secret & salt.
1175
- */
1176
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1177
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1178
- size_t init_sender_id_len = 0;
1179
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
1180
- size_t init_recipient_id_len = 0;
1181
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
1182
-
1183
- ret = edhoc_export_oscore_session(
1184
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1185
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1186
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1187
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1188
- &init_recipient_id_len);
1189
-
1190
- assert(EDHOC_SUCCESS == ret);
1191
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1192
- assert(false == init_ctx.is_oscore_export_allowed);
1193
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1194
-
1195
- /**
1196
- * \brief Responder - derive OSCORE secret & salt.
1197
- */
1198
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1199
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1200
- size_t resp_sender_id_len = 0;
1201
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
1202
- size_t resp_recipient_id_len = 0;
1203
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
1204
-
1205
- ret = edhoc_export_oscore_session(
1206
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1207
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1208
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1209
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1210
- &resp_recipient_id_len);
1211
-
1212
- assert(EDHOC_SUCCESS == ret);
1213
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1214
- assert(false == resp_ctx.is_oscore_export_allowed);
1215
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1216
-
1217
- /**
1218
- * \brief Verify OSCORE master secret:
1219
- */
1220
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1221
- sizeof(resp_master_secret)));
1222
-
1223
- /**
1224
- * \brief Verify OSCORE master salt:
1225
- */
1226
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1227
- sizeof(resp_master_salt)));
1228
-
1229
- /**
1230
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1231
- */
1232
- assert(init_sender_id_len == resp_recipient_id_len);
1233
- assert(0 ==
1234
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1235
- assert(init_recipient_id_len == resp_sender_id_len);
1236
- assert(0 ==
1237
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1238
-
1239
- /**
1240
- * \brief Clean up of EDHOC context's.
1241
- */
1242
- ret = edhoc_context_deinit(&init_ctx);
1243
- assert(EDHOC_SUCCESS == ret);
1244
-
1245
- ret = edhoc_context_deinit(&resp_ctx);
1246
- assert(EDHOC_SUCCESS == ret);
1247
- }