edhoc 1.0.4 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (314) hide show
  1. package/README.md +170 -0
  2. package/binding.gyp +13 -11
  3. package/dist/bindings.d.ts +5 -0
  4. package/dist/bindings.d.ts.map +1 -0
  5. package/dist/bindings.js +10 -0
  6. package/dist/crypto.d.ts +29 -0
  7. package/dist/crypto.d.ts.map +1 -0
  8. package/dist/crypto.js +205 -0
  9. package/dist/edhoc.d.ts +368 -0
  10. package/dist/edhoc.d.ts.map +1 -0
  11. package/dist/edhoc.js +76 -0
  12. package/dist/index.d.ts +4 -0
  13. package/dist/index.d.ts.map +1 -0
  14. package/dist/index.js +19 -0
  15. package/dist/x509credentials.d.ts +20 -0
  16. package/dist/x509credentials.d.ts.map +1 -0
  17. package/dist/x509credentials.js +140 -0
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +1 -1
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +1 -1
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +1 -1
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +2 -2
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +2 -2
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +48 -43
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +1 -1
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +1 -1
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +3 -3
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +1 -1
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +1 -1
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +1 -1
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +1 -1
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +1 -1
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +1 -1
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +1 -1
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +1 -1
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +1 -1
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +1 -1
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +1 -1
  38. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +1 -1
  39. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +1 -1
  40. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +1 -1
  41. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +1 -1
  42. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +1 -1
  43. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +1 -1
  44. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +1 -1
  45. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +1 -1
  46. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +1 -1
  47. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +1 -1
  48. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +3 -3
  49. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +3 -3
  50. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +1 -1
  51. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +1 -1
  52. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +4 -4
  53. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +93 -83
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +11 -20
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +11 -20
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +27 -32
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +27 -32
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +14 -23
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +14 -23
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +63 -52
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +62 -51
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +14 -23
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +14 -23
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +11 -20
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +11 -20
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +54 -51
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +54 -51
  68. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +11 -20
  69. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +11 -20
  70. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +11 -20
  71. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +11 -20
  72. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +11 -20
  73. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +11 -20
  74. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +36 -37
  75. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +36 -37
  76. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +103 -80
  77. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +102 -79
  78. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +99 -76
  79. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +98 -75
  80. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +40 -41
  81. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +40 -41
  82. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +15 -24
  83. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +15 -24
  84. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +31 -0
  85. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +10 -0
  86. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +18 -0
  87. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +9 -0
  88. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +69 -0
  89. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +38 -0
  90. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +53 -0
  91. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +57 -0
  92. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +31 -0
  93. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +10 -0
  94. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +18 -0
  95. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +9 -0
  96. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +71 -0
  97. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +40 -0
  98. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +16 -0
  99. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +18 -0
  100. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +19 -0
  101. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +17 -0
  102. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +19 -0
  103. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +31 -0
  104. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +10 -0
  105. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +18 -0
  106. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +9 -0
  107. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +69 -0
  108. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +38 -0
  109. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +31 -0
  110. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +10 -0
  111. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +18 -0
  112. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +9 -0
  113. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +70 -0
  114. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +42 -0
  115. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +53 -0
  116. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +57 -0
  117. package/external/libedhoc/externals/Unity/examples/unity_config.h +251 -0
  118. package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +44 -0
  119. package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +129 -0
  120. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +310 -0
  121. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +95 -0
  122. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +51 -0
  123. package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +20 -0
  124. package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +40 -0
  125. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +246 -0
  126. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +33 -0
  127. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +203 -0
  128. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +61 -0
  129. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +326 -0
  130. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +50 -0
  131. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +57 -0
  132. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +17 -0
  133. package/external/libedhoc/externals/Unity/src/unity.c +2501 -0
  134. package/external/libedhoc/externals/Unity/src/unity.h +698 -0
  135. package/external/libedhoc/externals/Unity/src/unity_internals.h +1183 -0
  136. package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +61 -0
  137. package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +57 -0
  138. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +55 -0
  139. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +15 -0
  140. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +80 -0
  141. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +76 -0
  142. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +75 -0
  143. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +13 -0
  144. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +89 -0
  145. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +89 -0
  146. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +77 -0
  147. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +89 -0
  148. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +89 -0
  149. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +90 -0
  150. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +67 -0
  151. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +70 -0
  152. package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +58 -0
  153. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +67 -0
  154. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +70 -0
  155. package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +71 -0
  156. package/external/libedhoc/externals/Unity/test/testdata/CException.h +18 -0
  157. package/external/libedhoc/externals/Unity/test/testdata/Defs.h +16 -0
  158. package/external/libedhoc/externals/Unity/test/testdata/cmock.h +21 -0
  159. package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +20 -0
  160. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +204 -0
  161. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +73 -0
  162. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +200 -0
  163. package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +151 -0
  164. package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +2941 -0
  165. package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +375 -0
  166. package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +1285 -0
  167. package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +1395 -0
  168. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +2863 -0
  169. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +783 -0
  170. package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +82 -0
  171. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +309 -0
  172. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +28 -0
  173. package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +330 -0
  174. package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +21 -0
  175. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +147 -60
  176. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +291 -202
  177. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +100 -156
  178. package/external/libedhoc/externals/zcbor/include/zcbor_print.h +165 -0
  179. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +1 -1
  180. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +1 -1
  181. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +1 -1
  182. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +4 -4
  183. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +4 -4
  184. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +15 -24
  185. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +14 -23
  186. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +202 -29
  187. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +633 -173
  188. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +71 -184
  189. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +152 -153
  190. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +64 -64
  191. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +15 -16
  192. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +228 -84
  193. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +9 -9
  194. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -1
  195. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +172 -173
  196. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +73 -73
  197. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +1 -2
  198. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +83 -56
  199. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +15 -16
  200. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +12 -0
  201. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +69 -69
  202. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +448 -55
  203. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +49 -48
  204. package/external/libedhoc/include/edhoc.h +348 -54
  205. package/external/libedhoc/include/edhoc_common.h +289 -0
  206. package/external/libedhoc/include/edhoc_context.h +60 -35
  207. package/external/libedhoc/include/edhoc_credentials.h +55 -7
  208. package/external/libedhoc/include/edhoc_crypto.h +10 -10
  209. package/external/libedhoc/include/edhoc_ead.h +13 -10
  210. package/external/libedhoc/include/edhoc_macros.h +20 -11
  211. package/external/libedhoc/include/edhoc_values.h +2 -2
  212. package/external/libedhoc/library/edhoc.c +70 -36
  213. package/external/libedhoc/library/edhoc_common.c +1314 -0
  214. package/external/libedhoc/library/edhoc_exporter.c +45 -46
  215. package/external/libedhoc/library/edhoc_message_1.c +107 -72
  216. package/external/libedhoc/library/edhoc_message_2.c +396 -1693
  217. package/external/libedhoc/library/edhoc_message_3.c +465 -1656
  218. package/external/libedhoc/library/edhoc_message_4.c +93 -91
  219. package/external/libedhoc/library/edhoc_message_error.c +41 -41
  220. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_0.h → cipher_suite_0.h} +131 -134
  221. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_2.h → cipher_suite_2.h} +139 -140
  222. package/external/libedhoc/tests/include/{edhoc_trace_1/test_vector_1.h → test_vector_rfc9529_chapter_2.h} +786 -738
  223. package/external/libedhoc/tests/include/{edhoc_trace_2/test_vector_2.h → test_vector_rfc9529_chapter_3.h} +14 -10
  224. package/external/libedhoc/tests/include/{x509_chain_cs_0/test_vector_x5chain_cs_0.h → test_vector_x5chain_sign_keys_suite_0.h} +137 -140
  225. package/external/libedhoc/tests/include/{x509_chain_cs_2/test_vector_x5chain_cs_2.h → test_vector_x5chain_sign_keys_suite_2.h} +7 -8
  226. package/external/libedhoc/tests/include/{x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h → test_vector_x5chain_static_dh_keys_suite_2.h} +7 -8
  227. package/external/libedhoc/tests/include/{x509_hash_cs_2/test_vector_x5t_cs_2.h → test_vector_x5t_sign_keys_suite_2.h} +6 -7
  228. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_0.c → cipher_suite_0.c} +445 -447
  229. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_2.c → cipher_suite_2.c} +600 -600
  230. package/external/libedhoc/tests/src/module_test_api.c +430 -0
  231. package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +395 -0
  232. package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +392 -0
  233. package/external/libedhoc/tests/src/{error_message/test_edhoc_error_message.c → module_test_error_message.c} +94 -69
  234. package/external/libedhoc/tests/src/module_test_main.c +49 -0
  235. package/external/libedhoc/tests/src/{cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c → module_test_rfc9528_suites_negotiation.c} +224 -227
  236. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +2681 -0
  237. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +1635 -0
  238. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +1135 -0
  239. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +1249 -0
  240. package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +798 -0
  241. package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +956 -0
  242. package/include/EdhocComposeAsyncWorker.h +8 -6
  243. package/include/EdhocCredentialManager.h +16 -11
  244. package/include/EdhocCryptoManager.h +28 -21
  245. package/include/EdhocEadManager.h +3 -6
  246. package/include/{EdhocExportAsyncWorker.h → EdhocExportOscoreAsyncWorker.h} +20 -17
  247. package/include/EdhocKeyExporterAsyncWorker.h +76 -0
  248. package/include/EdhocKeyUpdateAsyncWorker.h +72 -0
  249. package/include/EdhocProcessAsyncWorker.h +14 -10
  250. package/include/LibEDHOC.h +44 -20
  251. package/include/UserContext.h +7 -9
  252. package/include/Utils.h +31 -27
  253. package/package.json +14 -3
  254. package/prebuilds/android-arm/edhoc.armv7.node +0 -0
  255. package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
  256. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  257. package/prebuilds/darwin-x64/edhoc.node +0 -0
  258. package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
  259. package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
  260. package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
  261. package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
  262. package/prebuilds/linux-x64/edhoc.musl.node +0 -0
  263. package/prebuilds/win32-ia32/edhoc.node +0 -0
  264. package/prebuilds/win32-x64/edhoc.node +0 -0
  265. package/src/EdhocComposeAsyncWorker.cpp +18 -35
  266. package/src/EdhocCredentialManager.cpp +160 -187
  267. package/src/EdhocCryptoManager.cpp +386 -586
  268. package/src/EdhocEadManager.cpp +10 -18
  269. package/src/EdhocExportOscoreAsyncWorker.cpp +77 -0
  270. package/src/EdhocKeyExporterAsyncWorker.cpp +49 -0
  271. package/src/EdhocKeyUpdateAsyncWorker.cpp +41 -0
  272. package/src/EdhocProcessAsyncWorker.cpp +72 -19
  273. package/src/LibEDHOC.cpp +213 -174
  274. package/src/Suites.cpp +39 -72
  275. package/src/Utils.cpp +32 -56
  276. package/test/basic.test.ts +64 -0
  277. package/test/vectors.test.ts +111 -0
  278. package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +0 -69
  279. package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +0 -37
  280. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +0 -48
  281. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +0 -48
  282. package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +0 -60
  283. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +0 -208
  284. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +0 -59
  285. package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +0 -60
  286. package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +0 -199
  287. package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +0 -48
  288. package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +0 -92
  289. package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +0 -96
  290. package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +0 -58
  291. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +0 -56
  292. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +0 -57
  293. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +0 -59
  294. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +0 -57
  295. package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +0 -60
  296. package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +0 -57
  297. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +0 -475
  298. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +0 -473
  299. package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +0 -252
  300. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +0 -1829
  301. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +0 -1247
  302. package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +0 -170
  303. package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +0 -1783
  304. package/external/libedhoc/tests/src/tests.c +0 -228
  305. package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +0 -332
  306. package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +0 -936
  307. package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +0 -166
  308. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +0 -587
  309. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +0 -917
  310. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +0 -186
  311. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +0 -743
  312. package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +0 -261
  313. package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +0 -854
  314. package/src/EdhocExportAsyncWorker.cpp +0 -82
@@ -1,1783 +0,0 @@
1
- /**
2
- * \file test_edhoc_handshake_2.c
3
- * \author Kamil Kielbasa
4
- * \brief Unit tests for EDHOC handshake.
5
- * \version 0.4
6
- * \date 2024-01-01
7
- *
8
- * \copyright Copyright (c) 2024
9
- *
10
- */
11
-
12
- /* Include files ----------------------------------------------------------- */
13
-
14
- /* Internal test headers: */
15
- #include "edhoc_trace_2/test_edhoc_handshake_2.h"
16
- #include "edhoc_trace_2/test_vector_2.h"
17
- #include "edhoc_trace_2/authentication_credentials_2.h"
18
- #include "cipher_suites/cipher_suite_2.h"
19
-
20
- /* Standard library headers: */
21
- #include <stdio.h>
22
- #include <string.h>
23
- #include <stdint.h>
24
- #include <stddef.h>
25
- #include <assert.h>
26
- #include <stdbool.h>
27
-
28
- /* EDHOC header: */
29
- #define EDHOC_ALLOW_PRIVATE_ACCESS
30
- #include "edhoc.h"
31
-
32
- /* Module defines ---------------------------------------------------------- */
33
- #define DH_KEY_AGREEMENT_LENGTH (32)
34
-
35
- /* Module types and type definitiones -------------------------------------- */
36
- /* Module interface variables and constants -------------------------------- */
37
- /* Static function declarations -------------------------------------------- */
38
-
39
- /**
40
- * \brief Mocked EDHOC crypto function ECDH make key pair for initiator.
41
- */
42
- static int cipher_suite_2_make_key_pair_init(
43
- void *user_context, const void *key_id, uint8_t *private_key,
44
- size_t private_key_size, size_t *private_key_length,
45
- uint8_t *public_key, size_t public_key_size, size_t *public_key_length);
46
-
47
- /**
48
- * \brief Mocked EDHOC crypto function ECDH make key pair for responder.
49
- */
50
- static int cipher_suite_2_make_key_pair_resp(
51
- void *user_context, const void *key_id, uint8_t *private_key,
52
- size_t private_key_size, size_t *private_key_length,
53
- uint8_t *public_key, size_t public_key_size, size_t *public_key_length);
54
-
55
- /**
56
- * \brief Helper function for printing arrays.
57
- */
58
- static inline void print_array(void *user_context, const char *name,
59
- const uint8_t *buffer, size_t buffer_length);
60
-
61
- /* Static variables and constants ------------------------------------------ */
62
-
63
- static const struct edhoc_cipher_suite edhoc_cipher_suites_init[] = {
64
- {
65
- .value = 6,
66
- .aead_key_length = 16,
67
- .aead_tag_length = 8,
68
- .aead_iv_length = 13,
69
- .hash_length = 32,
70
- .mac_length = 8,
71
- .ecc_key_length = 32,
72
- .ecc_sign_length = 64,
73
- },
74
- {
75
- .value = 2,
76
- .aead_key_length = 16,
77
- .aead_tag_length = 8,
78
- .aead_iv_length = 13,
79
- .hash_length = 32,
80
- .mac_length = 8,
81
- .ecc_key_length = 32,
82
- .ecc_sign_length = 64,
83
- },
84
- };
85
-
86
- static const struct edhoc_cipher_suite edhoc_cipher_suites_resp[] = {
87
- {
88
- .value = 2,
89
- .aead_key_length = 16,
90
- .aead_tag_length = 8,
91
- .aead_iv_length = 13,
92
- .hash_length = 32,
93
- .mac_length = 8,
94
- .ecc_key_length = 32,
95
- .ecc_sign_length = 64,
96
- },
97
- };
98
-
99
- static const struct edhoc_keys edhoc_keys = {
100
- .generate_key = cipher_suite_2_key_generate,
101
- .destroy_key = cipher_suite_2_key_destroy,
102
- };
103
-
104
- static const struct edhoc_crypto edhoc_crypto_mocked_init = {
105
- .make_key_pair = cipher_suite_2_make_key_pair_init,
106
- .key_agreement = cipher_suite_2_key_agreement,
107
- .signature = cipher_suite_2_signature,
108
- .verify = cipher_suite_2_verify,
109
- .extract = cipher_suite_2_extract,
110
- .expand = cipher_suite_2_expand,
111
- .encrypt = cipher_suite_2_encrypt,
112
- .decrypt = cipher_suite_2_decrypt,
113
- .hash = cipher_suite_2_hash,
114
- };
115
-
116
- static const struct edhoc_crypto edhoc_crypto_mocked_resp = {
117
- .make_key_pair = cipher_suite_2_make_key_pair_resp,
118
- .key_agreement = cipher_suite_2_key_agreement,
119
- .signature = cipher_suite_2_signature,
120
- .verify = cipher_suite_2_verify,
121
- .extract = cipher_suite_2_extract,
122
- .expand = cipher_suite_2_expand,
123
- .encrypt = cipher_suite_2_encrypt,
124
- .decrypt = cipher_suite_2_decrypt,
125
- .hash = cipher_suite_2_hash,
126
- };
127
-
128
- static const struct edhoc_crypto edhoc_crypto = {
129
- .make_key_pair = cipher_suite_2_make_key_pair,
130
- .key_agreement = cipher_suite_2_key_agreement,
131
- .signature = cipher_suite_2_signature,
132
- .verify = cipher_suite_2_verify,
133
- .extract = cipher_suite_2_extract,
134
- .expand = cipher_suite_2_expand,
135
- .encrypt = cipher_suite_2_encrypt,
136
- .decrypt = cipher_suite_2_decrypt,
137
- .hash = cipher_suite_2_hash,
138
- };
139
-
140
- static const struct edhoc_credentials edhoc_auth_cred_mocked_init = {
141
- .fetch = auth_cred_fetch_init_2,
142
- .verify = auth_cred_verify_init_2,
143
- };
144
-
145
- static const struct edhoc_credentials edhoc_auth_cred_mocked_resp = {
146
- .fetch = auth_cred_fetch_resp_2,
147
- .verify = auth_cred_verify_resp_2,
148
- };
149
-
150
- /* Static function definitions --------------------------------------------- */
151
-
152
- static int
153
- cipher_suite_2_make_key_pair_init(void *user_ctx, const void *kid,
154
- uint8_t *priv_key, size_t priv_key_size,
155
- size_t *priv_key_len, uint8_t *pub_key,
156
- size_t pub_key_size, size_t *pub_key_len)
157
- {
158
- (void)user_ctx;
159
-
160
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
161
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
162
- NULL == pub_key_len)
163
- return EDHOC_ERROR_INVALID_ARGUMENT;
164
-
165
- *priv_key_len = ARRAY_SIZE(X);
166
- memcpy(priv_key, X, ARRAY_SIZE(X));
167
-
168
- *pub_key_len = ARRAY_SIZE(G_X);
169
- memcpy(pub_key, G_X, ARRAY_SIZE(G_X));
170
-
171
- return EDHOC_SUCCESS;
172
- }
173
-
174
- static int
175
- cipher_suite_2_make_key_pair_resp(void *user_ctx, const void *kid,
176
- uint8_t *priv_key, size_t priv_key_size,
177
- size_t *priv_key_len, uint8_t *pub_key,
178
- size_t pub_key_size, size_t *pub_key_len)
179
- {
180
- (void)user_ctx;
181
-
182
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
183
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
184
- NULL == pub_key_len)
185
- return EDHOC_ERROR_INVALID_ARGUMENT;
186
-
187
- *priv_key_len = ARRAY_SIZE(Y);
188
- memcpy(priv_key, Y, ARRAY_SIZE(Y));
189
-
190
- *pub_key_len = ARRAY_SIZE(G_X);
191
- memcpy(pub_key, G_Y, ARRAY_SIZE(G_Y));
192
-
193
- return EDHOC_SUCCESS;
194
- }
195
-
196
- static inline void print_array(void *user_context, const char *name,
197
- const uint8_t *buffer, size_t buffer_length)
198
- {
199
- (void)user_context;
200
-
201
- printf("%s:\tLEN( %zu )\n", name, buffer_length);
202
-
203
- for (size_t i = 0; i < buffer_length; ++i) {
204
- if (0 == i % 16 && i > 0) {
205
- printf("\n");
206
- }
207
-
208
- printf("%02x ", buffer[i]);
209
- }
210
-
211
- printf("\n\n");
212
- }
213
-
214
- /* Module interface function definitions ----------------------------------- */
215
-
216
- void test_edhoc_handshake_2_message_1_compose(void)
217
- {
218
- int ret = EDHOC_ERROR_GENERIC_ERROR;
219
-
220
- struct edhoc_context init_ctx = { 0 };
221
- struct edhoc_connection_id init_cid = {
222
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
223
- .int_value = (int8_t)C_I[0],
224
- };
225
-
226
- /**
227
- * \brief Setup initiator context.
228
- */
229
- ret = edhoc_context_init(&init_ctx);
230
- assert(EDHOC_SUCCESS == ret);
231
- init_ctx.logger = print_array;
232
-
233
- ret = edhoc_set_method(&init_ctx, METHOD);
234
- assert(EDHOC_SUCCESS == ret);
235
-
236
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
237
- ARRAY_SIZE(edhoc_cipher_suites_init));
238
- assert(EDHOC_SUCCESS == ret);
239
-
240
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
241
- assert(EDHOC_SUCCESS == ret);
242
-
243
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
244
- assert(EDHOC_SUCCESS == ret);
245
-
246
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
247
- assert(EDHOC_SUCCESS == ret);
248
-
249
- /**
250
- * \brief EDHOC message 1 compose.
251
- */
252
- size_t msg_1_len = 0;
253
- uint8_t msg_1[ARRAY_SIZE(message_1)] = { 0 };
254
-
255
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(msg_1),
256
- &msg_1_len);
257
-
258
- assert(EDHOC_SUCCESS == ret);
259
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
260
- assert(false == init_ctx.is_oscore_export_allowed);
261
-
262
- enum edhoc_error_code error_code_recv =
263
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
264
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
265
- assert(EDHOC_SUCCESS == ret);
266
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
267
-
268
- assert(ARRAY_SIZE(message_1) == msg_1_len);
269
- assert(0 == memcmp(message_1, msg_1, msg_1_len));
270
-
271
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
272
- assert(ARRAY_SIZE(H_message_1) == init_ctx.th_len);
273
- assert(0 == memcmp(H_message_1, init_ctx.th, init_ctx.th_len));
274
-
275
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
276
- assert(0 == init_ctx.prk_len);
277
-
278
- assert(ARRAY_SIZE(X) == init_ctx.dh_priv_key_len);
279
- assert(0 == memcmp(X, init_ctx.dh_priv_key, init_ctx.dh_priv_key_len));
280
-
281
- ret = edhoc_context_deinit(&init_ctx);
282
- assert(EDHOC_SUCCESS == ret);
283
- }
284
-
285
- void test_edhoc_handshake_2_message_1_process(void)
286
- {
287
- int ret = EDHOC_ERROR_GENERIC_ERROR;
288
-
289
- struct edhoc_context resp_ctx = { 0 };
290
- struct edhoc_connection_id resp_cid = {
291
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
292
- .bstr_length = ARRAY_SIZE(C_R),
293
- };
294
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
295
-
296
- /**
297
- * \brief Setup responder context.
298
- */
299
- ret = edhoc_context_init(&resp_ctx);
300
- assert(EDHOC_SUCCESS == ret);
301
- resp_ctx.logger = print_array;
302
-
303
- ret = edhoc_set_method(&resp_ctx, METHOD);
304
- assert(EDHOC_SUCCESS == ret);
305
-
306
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
307
- ARRAY_SIZE(edhoc_cipher_suites_resp));
308
- assert(EDHOC_SUCCESS == ret);
309
-
310
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
311
- assert(EDHOC_SUCCESS == ret);
312
-
313
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
314
- assert(EDHOC_SUCCESS == ret);
315
-
316
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
317
- assert(EDHOC_SUCCESS == ret);
318
-
319
- /**
320
- * \brief EDHOC message 1 process.
321
- */
322
- ret = edhoc_message_1_process(&resp_ctx, message_1,
323
- ARRAY_SIZE(message_1));
324
-
325
- assert(EDHOC_SUCCESS == ret);
326
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
327
- assert(false == resp_ctx.is_oscore_export_allowed);
328
-
329
- enum edhoc_error_code error_code_recv =
330
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
331
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
332
- assert(EDHOC_SUCCESS == ret);
333
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
334
-
335
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
336
- assert(ARRAY_SIZE(H_message_1) == resp_ctx.th_len);
337
- assert(0 == memcmp(H_message_1, resp_ctx.th, resp_ctx.th_len));
338
-
339
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
340
- assert(0 == resp_ctx.prk_len);
341
-
342
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
343
- resp_ctx.peer_cid.encode_type);
344
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
345
-
346
- assert(ARRAY_SIZE(G_X) == resp_ctx.dh_peer_pub_key_len);
347
- assert(0 == memcmp(G_X, resp_ctx.dh_peer_pub_key,
348
- resp_ctx.dh_peer_pub_key_len));
349
-
350
- ret = edhoc_context_deinit(&resp_ctx);
351
- assert(EDHOC_SUCCESS == ret);
352
- }
353
-
354
- void test_edhoc_handshake_2_message_2_compose(void)
355
- {
356
- int ret = EDHOC_ERROR_GENERIC_ERROR;
357
-
358
- struct edhoc_context resp_ctx = { 0 };
359
- struct edhoc_connection_id resp_cid = {
360
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
361
- .int_value = (int8_t)C_R[0],
362
- };
363
-
364
- /**
365
- * \brief Setup responder context.
366
- */
367
- ret = edhoc_context_init(&resp_ctx);
368
- assert(EDHOC_SUCCESS == ret);
369
- resp_ctx.logger = print_array;
370
-
371
- ret = edhoc_set_method(&resp_ctx, METHOD);
372
- assert(EDHOC_SUCCESS == ret);
373
-
374
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
375
- ARRAY_SIZE(edhoc_cipher_suites_resp));
376
- assert(EDHOC_SUCCESS == ret);
377
-
378
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
379
- assert(EDHOC_SUCCESS == ret);
380
-
381
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
382
- assert(EDHOC_SUCCESS == ret);
383
-
384
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
385
- assert(EDHOC_SUCCESS == ret);
386
-
387
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
388
- assert(EDHOC_SUCCESS == ret);
389
-
390
- /**
391
- * \brief Required injections.
392
- */
393
- resp_ctx.status = EDHOC_SM_RECEIVED_M1;
394
-
395
- resp_ctx.th_state = EDHOC_TH_STATE_1;
396
- resp_ctx.th_len = ARRAY_SIZE(H_message_1);
397
- memcpy(resp_ctx.th, H_message_1, sizeof(H_message_1));
398
-
399
- resp_ctx.dh_peer_pub_key_len = ARRAY_SIZE(G_X);
400
- memcpy(resp_ctx.dh_peer_pub_key, G_X, ARRAY_SIZE(G_X));
401
-
402
- resp_ctx.peer_cid.encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER;
403
- resp_ctx.peer_cid.int_value = (int8_t)C_I[0];
404
-
405
- /**
406
- * \brief EDHOC message 2 compose.
407
- */
408
- size_t msg_2_len = 0;
409
- uint8_t msg_2[ARRAY_SIZE(message_2)] = { 0 };
410
-
411
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(msg_2),
412
- &msg_2_len);
413
-
414
- assert(EDHOC_SUCCESS == ret);
415
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
416
- assert(false == resp_ctx.is_oscore_export_allowed);
417
-
418
- enum edhoc_error_code error_code_recv =
419
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
420
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
421
- assert(EDHOC_SUCCESS == ret);
422
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
423
-
424
- assert(ARRAY_SIZE(message_2) == msg_2_len);
425
- assert(0 == memcmp(msg_2, message_2, msg_2_len));
426
-
427
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
428
- assert(ARRAY_SIZE(TH_3) == resp_ctx.th_len);
429
- assert(0 == memcmp(resp_ctx.th, TH_3, resp_ctx.th_len));
430
-
431
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
432
- assert(ARRAY_SIZE(PRK_3e2m) == resp_ctx.prk_len);
433
- assert(0 == memcmp(PRK_3e2m, resp_ctx.prk, resp_ctx.prk_len));
434
-
435
- assert(ARRAY_SIZE(G_XY) == resp_ctx.dh_secret_len);
436
- assert(0 == memcmp(G_XY, resp_ctx.dh_secret, resp_ctx.dh_secret_len));
437
-
438
- ret = edhoc_context_deinit(&resp_ctx);
439
- assert(EDHOC_SUCCESS == ret);
440
- }
441
-
442
- void test_edhoc_handshake_2_message_2_process(void)
443
- {
444
- int ret = EDHOC_ERROR_GENERIC_ERROR;
445
-
446
- struct edhoc_context init_ctx = { 0 };
447
- struct edhoc_connection_id init_cid = {
448
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
449
- .int_value = (int8_t)C_I[0],
450
- };
451
-
452
- /**
453
- * \brief Setup initiator context.
454
- */
455
- ret = edhoc_context_init(&init_ctx);
456
- assert(EDHOC_SUCCESS == ret);
457
- init_ctx.logger = print_array;
458
-
459
- ret = edhoc_set_method(&init_ctx, METHOD);
460
- assert(EDHOC_SUCCESS == ret);
461
-
462
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
463
- ARRAY_SIZE(edhoc_cipher_suites_init));
464
- assert(EDHOC_SUCCESS == ret);
465
-
466
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
467
- assert(EDHOC_SUCCESS == ret);
468
-
469
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
470
- assert(EDHOC_SUCCESS == ret);
471
-
472
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
473
- assert(EDHOC_SUCCESS == ret);
474
-
475
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
476
- assert(EDHOC_SUCCESS == ret);
477
-
478
- /**
479
- * \brief Required incjections.
480
- */
481
- init_ctx.status = EDHOC_SM_WAIT_M2;
482
-
483
- init_ctx.th_state = EDHOC_TH_STATE_1;
484
- init_ctx.th_len = ARRAY_SIZE(H_message_1);
485
- memcpy(init_ctx.th, H_message_1, ARRAY_SIZE(H_message_1));
486
-
487
- init_ctx.dh_priv_key_len = ARRAY_SIZE(X);
488
- memcpy(init_ctx.dh_priv_key, X, ARRAY_SIZE(X));
489
-
490
- /**
491
- * \brief EDHOC message 2 process.
492
- */
493
- ret = edhoc_message_2_process(&init_ctx, message_2,
494
- ARRAY_SIZE(message_2));
495
-
496
- assert(EDHOC_SUCCESS == ret);
497
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
498
- assert(false == init_ctx.is_oscore_export_allowed);
499
-
500
- enum edhoc_error_code error_code_recv =
501
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
502
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
503
- assert(EDHOC_SUCCESS == ret);
504
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
505
-
506
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
507
- assert(ARRAY_SIZE(TH_3) == init_ctx.th_len);
508
- assert(0 == memcmp(init_ctx.th, TH_3, init_ctx.th_len));
509
-
510
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
511
- assert(ARRAY_SIZE(PRK_3e2m) == init_ctx.prk_len);
512
- assert(0 == memcmp(PRK_3e2m, init_ctx.prk, init_ctx.prk_len));
513
-
514
- assert(ARRAY_SIZE(G_XY) == init_ctx.dh_secret_len);
515
- assert(0 ==
516
- memcmp(init_ctx.dh_secret, G_XY, sizeof(init_ctx.dh_secret)));
517
-
518
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
519
- init_ctx.peer_cid.encode_type);
520
- assert((int8_t)C_R[0] == init_ctx.peer_cid.int_value);
521
-
522
- ret = edhoc_context_deinit(&init_ctx);
523
- assert(EDHOC_SUCCESS == ret);
524
- }
525
-
526
- void test_edhoc_handshake_2_message_3_compose(void)
527
- {
528
- int ret = EDHOC_ERROR_GENERIC_ERROR;
529
-
530
- struct edhoc_context init_ctx = { 0 };
531
- struct edhoc_connection_id init_cid = {
532
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
533
- .int_value = (int8_t)C_I[0],
534
- };
535
-
536
- /**
537
- * \brief Setup initiator context.
538
- */
539
- ret = edhoc_context_init(&init_ctx);
540
- assert(EDHOC_SUCCESS == ret);
541
- init_ctx.logger = print_array;
542
-
543
- ret = edhoc_set_method(&init_ctx, METHOD);
544
- assert(EDHOC_SUCCESS == ret);
545
-
546
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
547
- ARRAY_SIZE(edhoc_cipher_suites_init));
548
- assert(EDHOC_SUCCESS == ret);
549
-
550
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
551
- assert(EDHOC_SUCCESS == ret);
552
-
553
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
554
- assert(EDHOC_SUCCESS == ret);
555
-
556
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
557
- assert(EDHOC_SUCCESS == ret);
558
-
559
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
560
- assert(EDHOC_SUCCESS == ret);
561
-
562
- /**
563
- * \brief Required incjections.
564
- */
565
- init_ctx.status = EDHOC_SM_VERIFIED_M2;
566
-
567
- init_ctx.th_state = EDHOC_TH_STATE_3;
568
- init_ctx.th_len = ARRAY_SIZE(TH_3);
569
- memcpy(init_ctx.th, TH_3, ARRAY_SIZE(TH_3));
570
-
571
- init_ctx.prk_state = EDHOC_PRK_STATE_3E2M;
572
- init_ctx.prk_len = ARRAY_SIZE(PRK_3e2m);
573
- memcpy(init_ctx.prk, PRK_3e2m, ARRAY_SIZE(PRK_3e2m));
574
-
575
- init_ctx.dh_peer_pub_key_len = ARRAY_SIZE(G_Y);
576
- memcpy(init_ctx.dh_peer_pub_key, G_Y, ARRAY_SIZE(G_Y));
577
-
578
- init_ctx.dh_secret_len = ARRAY_SIZE(G_XY);
579
- memcpy(init_ctx.dh_secret, G_XY, ARRAY_SIZE(G_XY));
580
-
581
- /**
582
- * \brief EDHOC message 3 compose.
583
- */
584
- size_t msg_3_len = 0;
585
- uint8_t msg_3[ARRAY_SIZE(message_3)] = { 0 };
586
-
587
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(msg_3),
588
- &msg_3_len);
589
-
590
- assert(EDHOC_SUCCESS == ret);
591
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
592
- assert(true == init_ctx.is_oscore_export_allowed);
593
-
594
- enum edhoc_error_code error_code_recv =
595
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
596
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
597
- assert(EDHOC_SUCCESS == ret);
598
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
599
-
600
- assert(ARRAY_SIZE(message_3) == msg_3_len);
601
- assert(0 == memcmp(message_3, msg_3, msg_3_len));
602
-
603
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
604
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
605
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
606
-
607
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
608
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
609
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
610
-
611
- ret = edhoc_context_deinit(&init_ctx);
612
- assert(EDHOC_SUCCESS == ret);
613
- }
614
-
615
- void test_edhoc_handshake_2_message_3_process(void)
616
- {
617
- int ret = EDHOC_ERROR_GENERIC_ERROR;
618
- struct edhoc_context resp_ctx = { 0 };
619
- struct edhoc_connection_id resp_cid = {
620
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
621
- .int_value = (int8_t)C_R[0],
622
- };
623
-
624
- /**
625
- * \brief Setup responder context.
626
- */
627
- ret = edhoc_context_init(&resp_ctx);
628
- assert(EDHOC_SUCCESS == ret);
629
- resp_ctx.logger = print_array;
630
-
631
- ret = edhoc_set_method(&resp_ctx, METHOD);
632
- assert(EDHOC_SUCCESS == ret);
633
-
634
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
635
- ARRAY_SIZE(edhoc_cipher_suites_resp));
636
- assert(EDHOC_SUCCESS == ret);
637
-
638
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
639
- assert(EDHOC_SUCCESS == ret);
640
-
641
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
642
- assert(EDHOC_SUCCESS == ret);
643
-
644
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
645
- assert(EDHOC_SUCCESS == ret);
646
-
647
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
648
- assert(EDHOC_SUCCESS == ret);
649
-
650
- /**
651
- * \brief Required incjections.
652
- */
653
- resp_ctx.status = EDHOC_SM_WAIT_M3;
654
-
655
- resp_ctx.th_state = EDHOC_TH_STATE_3;
656
- resp_ctx.th_len = ARRAY_SIZE(TH_3);
657
- memcpy(resp_ctx.th, TH_3, ARRAY_SIZE(TH_3));
658
-
659
- resp_ctx.prk_state = EDHOC_PRK_STATE_3E2M;
660
- resp_ctx.prk_len = ARRAY_SIZE(PRK_3e2m);
661
- memcpy(resp_ctx.prk, PRK_3e2m, ARRAY_SIZE(PRK_3e2m));
662
-
663
- resp_ctx.dh_priv_key_len = ARRAY_SIZE(Y);
664
- memcpy(resp_ctx.dh_priv_key, Y, ARRAY_SIZE(Y));
665
-
666
- resp_ctx.dh_secret_len = ARRAY_SIZE(G_XY);
667
- memcpy(resp_ctx.dh_secret, G_XY, ARRAY_SIZE(G_XY));
668
-
669
- /**
670
- * \brief EDHOC message 3 process.
671
- */
672
- ret = edhoc_message_3_process(&resp_ctx, message_3,
673
- ARRAY_SIZE(message_3));
674
-
675
- assert(EDHOC_SUCCESS == ret);
676
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
677
- assert(true == resp_ctx.is_oscore_export_allowed);
678
-
679
- enum edhoc_error_code error_code_recv =
680
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
681
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
682
- assert(EDHOC_SUCCESS == ret);
683
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
684
-
685
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
686
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
687
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
688
-
689
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
690
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
691
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
692
-
693
- ret = edhoc_context_deinit(&resp_ctx);
694
- assert(EDHOC_SUCCESS == ret);
695
- }
696
-
697
- void test_edhoc_handshake_2_message_4_compose(void)
698
- {
699
- int ret = EDHOC_ERROR_GENERIC_ERROR;
700
-
701
- struct edhoc_context resp_ctx = { 0 };
702
- struct edhoc_connection_id resp_cid = {
703
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
704
- .int_value = (int8_t)C_R[0],
705
- };
706
-
707
- /**
708
- * \brief Setup responder context.
709
- */
710
- ret = edhoc_context_init(&resp_ctx);
711
- assert(EDHOC_SUCCESS == ret);
712
- resp_ctx.logger = print_array;
713
-
714
- ret = edhoc_set_method(&resp_ctx, METHOD);
715
- assert(EDHOC_SUCCESS == ret);
716
-
717
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
718
- ARRAY_SIZE(edhoc_cipher_suites_resp));
719
- assert(EDHOC_SUCCESS == ret);
720
-
721
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
722
- assert(EDHOC_SUCCESS == ret);
723
-
724
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
725
- assert(EDHOC_SUCCESS == ret);
726
-
727
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
728
- assert(EDHOC_SUCCESS == ret);
729
-
730
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
731
- assert(EDHOC_SUCCESS == ret);
732
-
733
- /**
734
- * \brief Required incjections.
735
- */
736
- resp_ctx.status = EDHOC_SM_COMPLETED;
737
- resp_ctx.is_oscore_export_allowed = true;
738
-
739
- resp_ctx.th_state = EDHOC_TH_STATE_4;
740
- resp_ctx.th_len = ARRAY_SIZE(TH_4);
741
- memcpy(resp_ctx.th, TH_4, ARRAY_SIZE(TH_4));
742
-
743
- resp_ctx.prk_state = EDHOC_PRK_STATE_4E3M;
744
- resp_ctx.prk_len = ARRAY_SIZE(PRK_4e3m);
745
- memcpy(resp_ctx.prk, PRK_4e3m, ARRAY_SIZE(PRK_4e3m));
746
-
747
- /**
748
- * \brief EDHOC message 4 compose.
749
- */
750
- size_t msg_4_len = 0;
751
- uint8_t msg_4[ARRAY_SIZE(message_4) + 1] = { 0 };
752
-
753
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(msg_4),
754
- &msg_4_len);
755
-
756
- assert(EDHOC_SUCCESS == ret);
757
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
758
- assert(true == resp_ctx.is_oscore_export_allowed);
759
-
760
- enum edhoc_error_code error_code_recv =
761
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
762
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
763
- assert(EDHOC_SUCCESS == ret);
764
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
765
-
766
- assert(ARRAY_SIZE(message_4) == msg_4_len);
767
- assert(0 == memcmp(message_4, msg_4, msg_4_len));
768
-
769
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
770
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
771
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
772
-
773
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
774
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
775
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
776
-
777
- ret = edhoc_context_deinit(&resp_ctx);
778
- assert(EDHOC_SUCCESS == ret);
779
- }
780
-
781
- void test_edhoc_handshake_2_message_4_process(void)
782
- {
783
- int ret = EDHOC_ERROR_GENERIC_ERROR;
784
- struct edhoc_context init_ctx = { 0 };
785
- struct edhoc_connection_id init_cid = {
786
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
787
- .int_value = (int8_t)C_I[0],
788
- };
789
-
790
- /**
791
- * \brief Setup initiator context.
792
- */
793
- ret = edhoc_context_init(&init_ctx);
794
- assert(EDHOC_SUCCESS == ret);
795
- init_ctx.logger = print_array;
796
-
797
- ret = edhoc_set_method(&init_ctx, METHOD);
798
- assert(EDHOC_SUCCESS == ret);
799
-
800
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
801
- ARRAY_SIZE(edhoc_cipher_suites_init));
802
- assert(EDHOC_SUCCESS == ret);
803
-
804
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
805
- assert(EDHOC_SUCCESS == ret);
806
-
807
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
808
- assert(EDHOC_SUCCESS == ret);
809
-
810
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
811
- assert(EDHOC_SUCCESS == ret);
812
-
813
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
814
- assert(EDHOC_SUCCESS == ret);
815
-
816
- /**
817
- * \brief Required incjections.
818
- */
819
- init_ctx.status = EDHOC_SM_COMPLETED;
820
- init_ctx.is_oscore_export_allowed = true;
821
-
822
- init_ctx.th_state = EDHOC_TH_STATE_4;
823
- init_ctx.th_len = ARRAY_SIZE(TH_4);
824
- memcpy(init_ctx.th, TH_4, ARRAY_SIZE(TH_4));
825
-
826
- init_ctx.prk_state = EDHOC_PRK_STATE_4E3M;
827
- init_ctx.prk_len = ARRAY_SIZE(PRK_4e3m);
828
- memcpy(init_ctx.prk, PRK_4e3m, ARRAY_SIZE(PRK_4e3m));
829
-
830
- /**
831
- * \brief EDHOC message 4 process.
832
- */
833
- ret = edhoc_message_4_process(&init_ctx, message_4,
834
- ARRAY_SIZE(message_4));
835
-
836
- assert(EDHOC_SUCCESS == ret);
837
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
838
- assert(true == init_ctx.is_oscore_export_allowed);
839
-
840
- enum edhoc_error_code error_code_recv =
841
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
842
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
843
- assert(EDHOC_SUCCESS == ret);
844
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
845
-
846
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
847
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
848
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
849
-
850
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
851
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
852
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
853
-
854
- ret = edhoc_context_deinit(&init_ctx);
855
- assert(EDHOC_SUCCESS == ret);
856
- }
857
-
858
- void test_edhoc_handshake_2_e2e(void)
859
- {
860
- int ret = EDHOC_ERROR_GENERIC_ERROR;
861
- enum edhoc_error_code error_code_recv =
862
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
863
-
864
- /**
865
- * \brief Setup initiator context.
866
- */
867
- struct edhoc_context init_ctx = { 0 };
868
- struct edhoc_connection_id init_cid = {
869
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
870
- .int_value = (int8_t)C_I[0],
871
- };
872
-
873
- ret = edhoc_context_init(&init_ctx);
874
- assert(EDHOC_SUCCESS == ret);
875
- init_ctx.logger = print_array;
876
-
877
- ret = edhoc_set_method(&init_ctx, METHOD);
878
- assert(EDHOC_SUCCESS == ret);
879
-
880
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
881
- ARRAY_SIZE(edhoc_cipher_suites_init));
882
- assert(EDHOC_SUCCESS == ret);
883
-
884
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
885
- assert(EDHOC_SUCCESS == ret);
886
-
887
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
888
- assert(EDHOC_SUCCESS == ret);
889
-
890
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
891
- assert(EDHOC_SUCCESS == ret);
892
-
893
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
894
- assert(EDHOC_SUCCESS == ret);
895
-
896
- /**
897
- * \brief Setup responder context.
898
- */
899
- struct edhoc_context resp_ctx = { 0 };
900
- struct edhoc_connection_id resp_cid = {
901
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
902
- .int_value = (int8_t)C_R[0],
903
- };
904
-
905
- ret = edhoc_context_init(&resp_ctx);
906
- assert(EDHOC_SUCCESS == ret);
907
- resp_ctx.logger = print_array;
908
-
909
- ret = edhoc_set_method(&resp_ctx, METHOD);
910
- assert(EDHOC_SUCCESS == ret);
911
-
912
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
913
- ARRAY_SIZE(edhoc_cipher_suites_resp));
914
- assert(EDHOC_SUCCESS == ret);
915
-
916
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
917
- assert(EDHOC_SUCCESS == ret);
918
-
919
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
920
- assert(EDHOC_SUCCESS == ret);
921
-
922
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
923
- assert(EDHOC_SUCCESS == ret);
924
-
925
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
926
- assert(EDHOC_SUCCESS == ret);
927
-
928
- /**
929
- * \brief One buffer for whole EDHOC handshake.
930
- */
931
- uint8_t buffer[200] = { 0 };
932
-
933
- /**
934
- * \brief EDHOC message 1 compose.
935
- */
936
- memset(buffer, 0, sizeof(buffer));
937
- size_t msg_1_len = 0;
938
- uint8_t *msg_1 = buffer;
939
-
940
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
941
- &msg_1_len);
942
-
943
- assert(EDHOC_SUCCESS == ret);
944
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
945
- assert(false == init_ctx.is_oscore_export_allowed);
946
-
947
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
948
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
949
- assert(EDHOC_SUCCESS == ret);
950
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
951
-
952
- assert(ARRAY_SIZE(message_1) == msg_1_len);
953
- assert(0 == memcmp(message_1, msg_1, msg_1_len));
954
-
955
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
956
- assert(0 == init_ctx.prk_len);
957
-
958
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
959
- assert(ARRAY_SIZE(H_message_1) == init_ctx.th_len);
960
- assert(0 == memcmp(H_message_1, init_ctx.th, init_ctx.th_len));
961
-
962
- assert(ARRAY_SIZE(X) == init_ctx.dh_priv_key_len);
963
- assert(0 == memcmp(X, init_ctx.dh_priv_key, init_ctx.dh_priv_key_len));
964
-
965
- /**
966
- * \brief EDHOC message 1 process.
967
- */
968
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
969
-
970
- assert(EDHOC_SUCCESS == ret);
971
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
972
- assert(false == resp_ctx.is_oscore_export_allowed);
973
-
974
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
975
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
976
- assert(EDHOC_SUCCESS == ret);
977
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
978
-
979
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
980
- assert(ARRAY_SIZE(H_message_1) == resp_ctx.th_len);
981
- assert(0 == memcmp(H_message_1, resp_ctx.th, resp_ctx.th_len));
982
-
983
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
984
- assert(0 == resp_ctx.prk_len);
985
-
986
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
987
- resp_ctx.peer_cid.encode_type);
988
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
989
-
990
- assert(ARRAY_SIZE(G_X) == resp_ctx.dh_peer_pub_key_len);
991
- assert(0 == memcmp(G_X, resp_ctx.dh_peer_pub_key,
992
- resp_ctx.dh_peer_pub_key_len));
993
-
994
- /**
995
- * \brief EDHOC message 2 compose.
996
- */
997
- memset(buffer, 0, sizeof(buffer));
998
- size_t msg_2_len = 0;
999
- uint8_t *msg_2 = buffer;
1000
-
1001
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
1002
- &msg_2_len);
1003
-
1004
- assert(EDHOC_SUCCESS == ret);
1005
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
1006
- assert(false == resp_ctx.is_oscore_export_allowed);
1007
-
1008
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1009
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1010
- assert(EDHOC_SUCCESS == ret);
1011
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1012
-
1013
- assert(ARRAY_SIZE(message_2) == msg_2_len);
1014
- assert(0 == memcmp(message_2, msg_2, msg_2_len));
1015
-
1016
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
1017
- assert(ARRAY_SIZE(TH_3) == resp_ctx.th_len);
1018
- assert(0 == memcmp(TH_3, resp_ctx.th, resp_ctx.th_len));
1019
-
1020
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
1021
- assert(ARRAY_SIZE(PRK_3e2m) == resp_ctx.prk_len);
1022
- assert(0 == memcmp(PRK_3e2m, resp_ctx.prk, resp_ctx.prk_len));
1023
-
1024
- assert(ARRAY_SIZE(G_XY) == resp_ctx.dh_secret_len);
1025
- assert(0 == memcmp(G_XY, resp_ctx.dh_secret, resp_ctx.dh_secret_len));
1026
-
1027
- /**
1028
- * \brief EDHOC message 2 process.
1029
- */
1030
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
1031
-
1032
- assert(EDHOC_SUCCESS == ret);
1033
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
1034
-
1035
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1036
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1037
- assert(EDHOC_SUCCESS == ret);
1038
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1039
-
1040
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
1041
- assert(ARRAY_SIZE(TH_3) == init_ctx.th_len);
1042
- assert(0 == memcmp(TH_3, init_ctx.th, init_ctx.th_len));
1043
- assert(false == init_ctx.is_oscore_export_allowed);
1044
-
1045
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
1046
- assert(ARRAY_SIZE(PRK_3e2m) == init_ctx.prk_len);
1047
- assert(0 == memcmp(PRK_3e2m, init_ctx.prk, init_ctx.prk_len));
1048
-
1049
- assert(ARRAY_SIZE(G_XY) == init_ctx.dh_secret_len);
1050
- assert(0 == memcmp(G_XY, init_ctx.dh_secret, init_ctx.dh_secret_len));
1051
-
1052
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
1053
- init_ctx.peer_cid.encode_type);
1054
- assert((int8_t)C_R[0] == init_ctx.peer_cid.int_value);
1055
-
1056
- /**
1057
- * \brief EDHOC message 3 compose.
1058
- */
1059
- memset(buffer, 0, sizeof(buffer));
1060
- size_t msg_3_len = 0;
1061
- uint8_t *msg_3 = buffer;
1062
-
1063
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
1064
- &msg_3_len);
1065
-
1066
- assert(EDHOC_SUCCESS == ret);
1067
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
1068
- assert(true == init_ctx.is_oscore_export_allowed);
1069
-
1070
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1071
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1072
- assert(EDHOC_SUCCESS == ret);
1073
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1074
-
1075
- assert(ARRAY_SIZE(message_3) == msg_3_len);
1076
- assert(0 == memcmp(message_3, msg_3, msg_3_len));
1077
-
1078
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1079
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
1080
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
1081
-
1082
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1083
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
1084
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
1085
-
1086
- /**
1087
- * \brief EDHOC message 3 process.
1088
- */
1089
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
1090
-
1091
- assert(EDHOC_SUCCESS == ret);
1092
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
1093
- assert(true == resp_ctx.is_oscore_export_allowed);
1094
-
1095
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1096
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1097
- assert(EDHOC_SUCCESS == ret);
1098
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1099
-
1100
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1101
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
1102
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
1103
-
1104
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1105
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
1106
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
1107
-
1108
- /**
1109
- * \brief EDHOC message 4 compose.
1110
- */
1111
- memset(buffer, 0, sizeof(buffer));
1112
- size_t msg_4_len = 0;
1113
- uint8_t *msg_4 = buffer;
1114
-
1115
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
1116
- &msg_4_len);
1117
-
1118
- assert(EDHOC_SUCCESS == ret);
1119
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1120
- assert(true == resp_ctx.is_oscore_export_allowed);
1121
-
1122
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1123
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1124
- assert(EDHOC_SUCCESS == ret);
1125
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1126
-
1127
- assert(ARRAY_SIZE(message_4) == msg_4_len);
1128
- assert(0 == memcmp(message_4, msg_4, msg_4_len));
1129
-
1130
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1131
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
1132
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
1133
-
1134
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1135
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
1136
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
1137
-
1138
- /**
1139
- * \brief EDHOC message 4 process.
1140
- */
1141
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
1142
-
1143
- assert(EDHOC_SUCCESS == ret);
1144
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1145
- assert(true == init_ctx.is_oscore_export_allowed);
1146
-
1147
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1148
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1149
- assert(EDHOC_SUCCESS == ret);
1150
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1151
-
1152
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1153
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
1154
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
1155
-
1156
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1157
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
1158
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
1159
-
1160
- /**
1161
- * \brief Initiator - derive OSCORE secret & salt.
1162
- */
1163
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1164
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1165
- size_t init_sender_id_len = 0;
1166
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
1167
- size_t init_recipient_id_len = 0;
1168
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
1169
-
1170
- ret = edhoc_export_oscore_session(
1171
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1172
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1173
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1174
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1175
- &init_recipient_id_len);
1176
-
1177
- assert(EDHOC_SUCCESS == ret);
1178
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1179
- assert(false == init_ctx.is_oscore_export_allowed);
1180
-
1181
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1182
- assert(ARRAY_SIZE(PRK_out) == init_ctx.prk_len);
1183
- assert(0 == memcmp(PRK_out, init_ctx.prk, init_ctx.prk_len));
1184
-
1185
- /**
1186
- * \brief Responder - derive OSCORE secret & salt.
1187
- */
1188
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1189
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1190
- size_t resp_sender_id_len = 0;
1191
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
1192
- size_t resp_recipient_id_len = 0;
1193
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
1194
-
1195
- ret = edhoc_export_oscore_session(
1196
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1197
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1198
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1199
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1200
- &resp_recipient_id_len);
1201
-
1202
- assert(EDHOC_SUCCESS == ret);
1203
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1204
- assert(false == resp_ctx.is_oscore_export_allowed);
1205
-
1206
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1207
- assert(ARRAY_SIZE(PRK_out) == resp_ctx.prk_len);
1208
- assert(0 == memcmp(PRK_out, resp_ctx.prk, resp_ctx.prk_len));
1209
-
1210
- /**
1211
- * \brief Verify OSCORE master secret.
1212
- */
1213
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1214
- sizeof(resp_master_secret)));
1215
- assert(0 == memcmp(OSCORE_Master_Secret, init_master_secret,
1216
- sizeof(init_master_secret)));
1217
- assert(0 == memcmp(OSCORE_Master_Secret, resp_master_secret,
1218
- sizeof(resp_master_secret)));
1219
-
1220
- /**
1221
- * \brief Verify OSCORE master salt.
1222
- */
1223
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1224
- sizeof(resp_master_salt)));
1225
- assert(0 == memcmp(OSCORE_Master_Salt, init_master_salt,
1226
- sizeof(init_master_salt)));
1227
- assert(0 == memcmp(OSCORE_Master_Salt, resp_master_salt,
1228
- sizeof(resp_master_salt)));
1229
-
1230
- /**
1231
- * \brief Verify OSCORE sender and recipient identifiers shared by initiator.
1232
- */
1233
- assert(ARRAY_SIZE(C_I) == init_recipient_id_len);
1234
- assert(0 == memcmp(C_I, init_recipient_id, init_recipient_id_len));
1235
- assert(ARRAY_SIZE(C_I) == resp_sender_id_len);
1236
- assert(0 == memcmp(C_I, resp_sender_id, resp_sender_id_len));
1237
-
1238
- /**
1239
- * \brief Verify OSCORE sender and recipient identifiers shared by responder.
1240
- */
1241
- assert(ARRAY_SIZE(C_R) == init_sender_id_len);
1242
- assert(0 == memcmp(C_R, init_sender_id, init_sender_id_len));
1243
- assert(ARRAY_SIZE(C_R) == resp_recipient_id_len);
1244
- assert(0 == memcmp(C_R, resp_recipient_id, resp_recipient_id_len));
1245
-
1246
- /**
1247
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1248
- */
1249
- assert(init_sender_id_len == resp_recipient_id_len);
1250
- assert(0 ==
1251
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1252
- assert(init_recipient_id_len == resp_sender_id_len);
1253
- assert(0 ==
1254
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1255
-
1256
- /**
1257
- * \brief Initiator - perform EDHOC key update.
1258
- */
1259
- ret = edhoc_export_key_update(&init_ctx, keyUpdate_context,
1260
- ARRAY_SIZE(keyUpdate_context));
1261
-
1262
- assert(EDHOC_SUCCESS == ret);
1263
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1264
- assert(true == init_ctx.is_oscore_export_allowed);
1265
-
1266
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1267
- assert(ARRAY_SIZE(keyUpdate_PRK_out) == init_ctx.prk_len);
1268
- assert(0 == memcmp(keyUpdate_PRK_out, init_ctx.prk, init_ctx.prk_len));
1269
-
1270
- /**
1271
- * \brief Responder - perform EDHOC key update.
1272
- */
1273
- ret = edhoc_export_key_update(&resp_ctx, keyUpdate_context,
1274
- ARRAY_SIZE(keyUpdate_context));
1275
-
1276
- assert(EDHOC_SUCCESS == ret);
1277
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1278
- assert(true == resp_ctx.is_oscore_export_allowed);
1279
-
1280
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1281
- assert(ARRAY_SIZE(keyUpdate_PRK_out) == resp_ctx.prk_len);
1282
- assert(0 == memcmp(keyUpdate_PRK_out, resp_ctx.prk, resp_ctx.prk_len));
1283
-
1284
- /**
1285
- * \brief Initiator - derive OSCORE secret & salt.
1286
- */
1287
- memset(init_master_secret, 0, sizeof(init_master_secret));
1288
- memset(init_master_salt, 0, sizeof(init_master_salt));
1289
- init_sender_id_len = 0;
1290
- memset(init_sender_id, 0, sizeof(init_sender_id));
1291
- init_recipient_id_len = 0;
1292
- memset(init_recipient_id, 0, sizeof(init_recipient_id));
1293
-
1294
- ret = edhoc_export_oscore_session(
1295
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1296
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1297
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1298
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1299
- &init_recipient_id_len);
1300
-
1301
- assert(EDHOC_SUCCESS == ret);
1302
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1303
- assert(false == init_ctx.is_oscore_export_allowed);
1304
-
1305
- /**
1306
- * \brief Responder - derive OSCORE secret & salt.
1307
- */
1308
- memset(resp_master_secret, 0, sizeof(resp_master_secret));
1309
- memset(resp_master_salt, 0, sizeof(resp_master_salt));
1310
- resp_sender_id_len = 0;
1311
- memset(resp_sender_id, 0, sizeof(resp_sender_id));
1312
- resp_recipient_id_len = 0;
1313
- memset(resp_recipient_id, 0, sizeof(resp_recipient_id));
1314
-
1315
- ret = edhoc_export_oscore_session(
1316
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1317
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1318
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1319
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1320
- &resp_recipient_id_len);
1321
-
1322
- assert(EDHOC_SUCCESS == ret);
1323
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1324
- assert(false == resp_ctx.is_oscore_export_allowed);
1325
-
1326
- /**
1327
- * \brief Verify OSCORE master secret.
1328
- */
1329
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1330
- sizeof(resp_master_secret)));
1331
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Secret, init_master_secret,
1332
- sizeof(init_master_secret)));
1333
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Secret, resp_master_secret,
1334
- sizeof(resp_master_secret)));
1335
-
1336
- /**
1337
- * \brief Verify OSCORE master salt.
1338
- */
1339
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1340
- sizeof(resp_master_salt)));
1341
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Salt, init_master_salt,
1342
- sizeof(init_master_salt)));
1343
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Salt, resp_master_salt,
1344
- sizeof(resp_master_salt)));
1345
-
1346
- /**
1347
- * \brief Verify OSCORE sender and recipient identifiers shared by initiator.
1348
- */
1349
- assert(ARRAY_SIZE(C_I) == init_recipient_id_len);
1350
- assert(0 == memcmp(C_I, init_recipient_id, init_recipient_id_len));
1351
- assert(ARRAY_SIZE(C_I) == resp_sender_id_len);
1352
- assert(0 == memcmp(C_I, resp_sender_id, resp_sender_id_len));
1353
-
1354
- /**
1355
- * \brief Verify OSCORE sender and recipient identifiers shared by responder.
1356
- */
1357
- assert(ARRAY_SIZE(C_R) == init_sender_id_len);
1358
- assert(0 == memcmp(C_R, init_sender_id, init_sender_id_len));
1359
- assert(ARRAY_SIZE(C_R) == resp_recipient_id_len);
1360
- assert(0 == memcmp(C_R, resp_recipient_id, resp_recipient_id_len));
1361
-
1362
- /**
1363
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1364
- */
1365
- assert(init_sender_id_len == resp_recipient_id_len);
1366
- assert(0 ==
1367
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1368
- assert(init_recipient_id_len == resp_sender_id_len);
1369
- assert(0 ==
1370
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1371
-
1372
- /**
1373
- * \brief Clean up of EDHOC context's.
1374
- */
1375
- ret = edhoc_context_deinit(&init_ctx);
1376
- assert(EDHOC_SUCCESS == ret);
1377
-
1378
- ret = edhoc_context_deinit(&resp_ctx);
1379
- assert(EDHOC_SUCCESS == ret);
1380
- }
1381
-
1382
- void test_edhoc_handshake_2_e2e_real_crypto(void)
1383
- {
1384
- int ret = EDHOC_ERROR_GENERIC_ERROR;
1385
- enum edhoc_error_code error_code_recv =
1386
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1387
-
1388
- /**
1389
- * \brief Setup initiator context.
1390
- */
1391
- struct edhoc_context init_ctx = { 0 };
1392
- struct edhoc_connection_id init_cid = {
1393
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
1394
- .int_value = (int8_t)C_I[0],
1395
- };
1396
-
1397
- ret = edhoc_context_init(&init_ctx);
1398
- assert(EDHOC_SUCCESS == ret);
1399
- init_ctx.logger = print_array;
1400
-
1401
- ret = edhoc_set_method(&init_ctx, METHOD);
1402
- assert(EDHOC_SUCCESS == ret);
1403
-
1404
- ret = edhoc_set_cipher_suites(&init_ctx, edhoc_cipher_suites_init,
1405
- ARRAY_SIZE(edhoc_cipher_suites_init));
1406
- assert(EDHOC_SUCCESS == ret);
1407
-
1408
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
1409
- assert(EDHOC_SUCCESS == ret);
1410
-
1411
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
1412
- assert(EDHOC_SUCCESS == ret);
1413
-
1414
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto);
1415
- assert(EDHOC_SUCCESS == ret);
1416
-
1417
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
1418
- assert(EDHOC_SUCCESS == ret);
1419
-
1420
- /**
1421
- * \brief Setup responder context.
1422
- */
1423
- struct edhoc_context resp_ctx = { 0 };
1424
- struct edhoc_connection_id resp_cid = {
1425
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
1426
- .int_value = (int8_t)C_R[0],
1427
- };
1428
-
1429
- ret = edhoc_context_init(&resp_ctx);
1430
- assert(EDHOC_SUCCESS == ret);
1431
- resp_ctx.logger = print_array;
1432
-
1433
- ret = edhoc_set_method(&resp_ctx, METHOD);
1434
- assert(EDHOC_SUCCESS == ret);
1435
-
1436
- ret = edhoc_set_cipher_suites(&resp_ctx, edhoc_cipher_suites_resp,
1437
- ARRAY_SIZE(edhoc_cipher_suites_resp));
1438
- assert(EDHOC_SUCCESS == ret);
1439
-
1440
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
1441
- assert(EDHOC_SUCCESS == ret);
1442
-
1443
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
1444
- assert(EDHOC_SUCCESS == ret);
1445
-
1446
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto);
1447
- assert(EDHOC_SUCCESS == ret);
1448
-
1449
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
1450
- assert(EDHOC_SUCCESS == ret);
1451
-
1452
- /**
1453
- * \brief One buffer for whole EDHOC handshake.
1454
- */
1455
- uint8_t buffer[200] = { 0 };
1456
-
1457
- /**
1458
- * \brief EDHOC message 1 compose.
1459
- */
1460
- memset(buffer, 0, sizeof(buffer));
1461
- size_t msg_1_len = 0;
1462
- uint8_t *msg_1 = buffer;
1463
-
1464
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
1465
- &msg_1_len);
1466
- assert(EDHOC_SUCCESS == ret);
1467
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
1468
- assert(false == init_ctx.is_oscore_export_allowed);
1469
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
1470
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
1471
-
1472
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1473
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1474
- assert(EDHOC_SUCCESS == ret);
1475
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1476
-
1477
- /**
1478
- * \brief EDHOC message 1 process.
1479
- */
1480
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
1481
- assert(EDHOC_SUCCESS == ret);
1482
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
1483
- assert(false == resp_ctx.is_oscore_export_allowed);
1484
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
1485
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
1486
-
1487
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1488
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1489
- assert(EDHOC_SUCCESS == ret);
1490
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1491
-
1492
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
1493
- resp_ctx.peer_cid.encode_type);
1494
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
1495
-
1496
- /**
1497
- * \brief EDHOC message 2 compose.
1498
- */
1499
- memset(buffer, 0, sizeof(buffer));
1500
- size_t msg_2_len = 0;
1501
- uint8_t *msg_2 = buffer;
1502
-
1503
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
1504
- &msg_2_len);
1505
- assert(EDHOC_SUCCESS == ret);
1506
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
1507
- assert(false == resp_ctx.is_oscore_export_allowed);
1508
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
1509
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
1510
-
1511
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1512
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1513
- assert(EDHOC_SUCCESS == ret);
1514
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1515
-
1516
- /**
1517
- * \brief EDHOC message 2 process.
1518
- */
1519
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
1520
-
1521
- assert(EDHOC_SUCCESS == ret);
1522
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
1523
- assert(false == init_ctx.is_oscore_export_allowed);
1524
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
1525
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
1526
-
1527
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1528
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1529
- assert(EDHOC_SUCCESS == ret);
1530
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1531
-
1532
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
1533
- init_ctx.peer_cid.encode_type);
1534
- assert((int8_t)C_R[0] == init_ctx.peer_cid.int_value);
1535
-
1536
- /**
1537
- * \brief Verify ephemeral DH key agreement.
1538
- */
1539
- assert(DH_KEY_AGREEMENT_LENGTH == init_ctx.dh_secret_len);
1540
- assert(DH_KEY_AGREEMENT_LENGTH == resp_ctx.dh_secret_len);
1541
- assert(init_ctx.dh_secret_len == resp_ctx.dh_secret_len);
1542
- assert(0 == memcmp(init_ctx.dh_secret, resp_ctx.dh_secret,
1543
- DH_KEY_AGREEMENT_LENGTH));
1544
-
1545
- /**
1546
- * \brief EDHOC message 3 compose.
1547
- */
1548
- memset(buffer, 0, sizeof(buffer));
1549
- size_t msg_3_len = 0;
1550
- uint8_t *msg_3 = buffer;
1551
-
1552
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
1553
- &msg_3_len);
1554
-
1555
- assert(EDHOC_SUCCESS == ret);
1556
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
1557
- assert(true == init_ctx.is_oscore_export_allowed);
1558
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1559
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1560
-
1561
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1562
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1563
- assert(EDHOC_SUCCESS == ret);
1564
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1565
-
1566
- /**
1567
- * \brief EDHOC message 3 process.
1568
- */
1569
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
1570
-
1571
- assert(EDHOC_SUCCESS == ret);
1572
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
1573
- assert(true == resp_ctx.is_oscore_export_allowed);
1574
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1575
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1576
-
1577
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1578
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1579
- assert(EDHOC_SUCCESS == ret);
1580
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1581
-
1582
- /**
1583
- * \brief EDHOC message 4 compose.
1584
- */
1585
- memset(buffer, 0, sizeof(buffer));
1586
- size_t msg_4_len = 0;
1587
- uint8_t *msg_4 = buffer;
1588
-
1589
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
1590
- &msg_4_len);
1591
-
1592
- assert(EDHOC_SUCCESS == ret);
1593
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1594
- assert(true == resp_ctx.is_oscore_export_allowed);
1595
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1596
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1597
-
1598
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1599
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1600
- assert(EDHOC_SUCCESS == ret);
1601
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1602
-
1603
- /**
1604
- * \brief EDHOC message 3 process.
1605
- */
1606
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
1607
-
1608
- assert(EDHOC_SUCCESS == ret);
1609
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1610
- assert(true == init_ctx.is_oscore_export_allowed);
1611
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1612
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1613
-
1614
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1615
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1616
- assert(EDHOC_SUCCESS == ret);
1617
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1618
-
1619
- /**
1620
- * \brief Initiator - derive OSCORE secret & salt.
1621
- */
1622
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1623
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1624
- size_t init_sender_id_len = 0;
1625
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
1626
- size_t init_recipient_id_len = 0;
1627
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
1628
-
1629
- ret = edhoc_export_oscore_session(
1630
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1631
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1632
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1633
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1634
- &init_recipient_id_len);
1635
- assert(EDHOC_SUCCESS == ret);
1636
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1637
- assert(false == init_ctx.is_oscore_export_allowed);
1638
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1639
-
1640
- /**
1641
- * \brief Responder - derive OSCORE secret & salt.
1642
- */
1643
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1644
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1645
- size_t resp_sender_id_len = 0;
1646
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
1647
- size_t resp_recipient_id_len = 0;
1648
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
1649
-
1650
- ret = edhoc_export_oscore_session(
1651
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1652
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1653
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1654
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1655
- &resp_recipient_id_len);
1656
- assert(EDHOC_SUCCESS == ret);
1657
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1658
- assert(false == resp_ctx.is_oscore_export_allowed);
1659
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1660
-
1661
- /**
1662
- * \brief Verify OSCORE master secret:
1663
- */
1664
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1665
- sizeof(resp_master_secret)));
1666
-
1667
- /**
1668
- * \brief Verify OSCORE master salt:
1669
- */
1670
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1671
- sizeof(resp_master_salt)));
1672
-
1673
- /**
1674
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1675
- */
1676
- assert(init_sender_id_len == resp_recipient_id_len);
1677
- assert(0 ==
1678
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1679
- assert(init_recipient_id_len == resp_sender_id_len);
1680
- assert(0 ==
1681
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1682
-
1683
- /**
1684
- * \brief Initiator - perform EDHOC key update.
1685
- */
1686
- ret = edhoc_export_key_update(&init_ctx, keyUpdate_context,
1687
- ARRAY_SIZE(keyUpdate_context));
1688
- assert(EDHOC_SUCCESS == ret);
1689
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1690
- assert(true == init_ctx.is_oscore_export_allowed);
1691
-
1692
- /**
1693
- * \brief Responder - perform EDHOC key update.
1694
- */
1695
- ret = edhoc_export_key_update(&resp_ctx, keyUpdate_context,
1696
- ARRAY_SIZE(keyUpdate_context));
1697
- assert(EDHOC_SUCCESS == ret);
1698
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1699
- assert(true == resp_ctx.is_oscore_export_allowed);
1700
-
1701
- /**
1702
- * \brief Verify new PRK_out.
1703
- */
1704
- assert(init_ctx.prk_state == resp_ctx.prk_state);
1705
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1706
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1707
-
1708
- assert(init_ctx.prk_len == resp_ctx.prk_len);
1709
- assert(0 == memcmp(init_ctx.prk, resp_ctx.prk, resp_ctx.prk_len));
1710
-
1711
- /**
1712
- * \brief Initiator - derive OSCORE secret & salt.
1713
- */
1714
- memset(init_master_secret, 0, sizeof(init_master_secret));
1715
- memset(init_master_salt, 0, sizeof(init_master_salt));
1716
- init_sender_id_len = 0;
1717
- memset(init_sender_id, 0, sizeof(init_sender_id));
1718
- init_recipient_id_len = 0;
1719
- memset(init_recipient_id, 0, sizeof(init_recipient_id));
1720
-
1721
- ret = edhoc_export_oscore_session(
1722
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1723
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1724
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1725
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1726
- &init_recipient_id_len);
1727
- assert(EDHOC_SUCCESS == ret);
1728
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1729
- assert(false == init_ctx.is_oscore_export_allowed);
1730
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1731
-
1732
- /**
1733
- * \brief Responder - derive OSCORE secret & salt.
1734
- */
1735
- memset(resp_master_secret, 0, sizeof(resp_master_secret));
1736
- memset(resp_master_salt, 0, sizeof(resp_master_salt));
1737
- resp_sender_id_len = 0;
1738
- memset(resp_sender_id, 0, sizeof(resp_sender_id));
1739
- resp_recipient_id_len = 0;
1740
- memset(resp_recipient_id, 0, sizeof(resp_recipient_id));
1741
-
1742
- ret = edhoc_export_oscore_session(
1743
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1744
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1745
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1746
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1747
- &resp_recipient_id_len);
1748
- assert(EDHOC_SUCCESS == ret);
1749
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1750
- assert(false == resp_ctx.is_oscore_export_allowed);
1751
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1752
-
1753
- /**
1754
- * \brief Verify OSCORE master secret:
1755
- */
1756
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1757
- sizeof(resp_master_secret)));
1758
-
1759
- /**
1760
- * \brief Verify OSCORE master salt:
1761
- */
1762
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1763
- sizeof(resp_master_salt)));
1764
-
1765
- /**
1766
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1767
- */
1768
- assert(init_sender_id_len == resp_recipient_id_len);
1769
- assert(0 ==
1770
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1771
- assert(init_recipient_id_len == resp_sender_id_len);
1772
- assert(0 ==
1773
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1774
-
1775
- /**
1776
- * \brief Clean up of EDHOC context's.
1777
- */
1778
- ret = edhoc_context_deinit(&init_ctx);
1779
- assert(EDHOC_SUCCESS == ret);
1780
-
1781
- ret = edhoc_context_deinit(&resp_ctx);
1782
- assert(EDHOC_SUCCESS == ret);
1783
- }