edhoc 1.0.5 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/README.md +170 -0
  2. package/binding.gyp +13 -11
  3. package/dist/crypto.d.ts +9 -2
  4. package/dist/crypto.d.ts.map +1 -1
  5. package/dist/crypto.js +112 -84
  6. package/dist/edhoc.d.ts +31 -9
  7. package/dist/edhoc.d.ts.map +1 -1
  8. package/dist/index.d.ts +1 -1
  9. package/dist/index.d.ts.map +1 -1
  10. package/dist/index.js +1 -1
  11. package/dist/x509credentials.d.ts +20 -0
  12. package/dist/x509credentials.d.ts.map +1 -0
  13. package/dist/x509credentials.js +140 -0
  14. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +1 -1
  15. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +1 -1
  16. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +1 -1
  17. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +2 -2
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +2 -2
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +48 -43
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +1 -1
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +1 -1
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +3 -3
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +1 -1
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +1 -1
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +1 -1
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +1 -1
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +1 -1
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +1 -1
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +1 -1
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +1 -1
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +1 -1
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +1 -1
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +1 -1
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +1 -1
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +1 -1
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +1 -1
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +1 -1
  38. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +1 -1
  39. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +1 -1
  40. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +1 -1
  41. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +1 -1
  42. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +1 -1
  43. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +1 -1
  44. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +3 -3
  45. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +3 -3
  46. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +1 -1
  47. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +1 -1
  48. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +4 -4
  49. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +93 -83
  50. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +11 -20
  51. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +11 -20
  52. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +27 -32
  53. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +27 -32
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +14 -23
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +14 -23
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +63 -52
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +62 -51
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +14 -23
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +14 -23
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +11 -20
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +11 -20
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +54 -51
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +54 -51
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +11 -20
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +11 -20
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +11 -20
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +11 -20
  68. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +11 -20
  69. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +11 -20
  70. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +36 -37
  71. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +36 -37
  72. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +103 -80
  73. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +102 -79
  74. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +99 -76
  75. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +98 -75
  76. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +40 -41
  77. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +40 -41
  78. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +15 -24
  79. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +15 -24
  80. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +31 -0
  81. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +10 -0
  82. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +18 -0
  83. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +9 -0
  84. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +69 -0
  85. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +38 -0
  86. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +53 -0
  87. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +57 -0
  88. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +31 -0
  89. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +10 -0
  90. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +18 -0
  91. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +9 -0
  92. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +71 -0
  93. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +40 -0
  94. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +16 -0
  95. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +18 -0
  96. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +19 -0
  97. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +17 -0
  98. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +19 -0
  99. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +31 -0
  100. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +10 -0
  101. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +18 -0
  102. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +9 -0
  103. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +69 -0
  104. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +38 -0
  105. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +31 -0
  106. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +10 -0
  107. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +18 -0
  108. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +9 -0
  109. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +70 -0
  110. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +42 -0
  111. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +53 -0
  112. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +57 -0
  113. package/external/libedhoc/externals/Unity/examples/unity_config.h +251 -0
  114. package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +44 -0
  115. package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +129 -0
  116. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +310 -0
  117. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +95 -0
  118. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +51 -0
  119. package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +20 -0
  120. package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +40 -0
  121. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +246 -0
  122. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +33 -0
  123. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +203 -0
  124. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +61 -0
  125. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +326 -0
  126. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +50 -0
  127. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +57 -0
  128. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +17 -0
  129. package/external/libedhoc/externals/Unity/src/unity.c +2501 -0
  130. package/external/libedhoc/externals/Unity/src/unity.h +698 -0
  131. package/external/libedhoc/externals/Unity/src/unity_internals.h +1183 -0
  132. package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +61 -0
  133. package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +57 -0
  134. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +55 -0
  135. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +15 -0
  136. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +80 -0
  137. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +76 -0
  138. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +75 -0
  139. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +13 -0
  140. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +89 -0
  141. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +89 -0
  142. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +77 -0
  143. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +89 -0
  144. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +89 -0
  145. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +90 -0
  146. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +67 -0
  147. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +70 -0
  148. package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +58 -0
  149. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +67 -0
  150. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +70 -0
  151. package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +71 -0
  152. package/external/libedhoc/externals/Unity/test/testdata/CException.h +18 -0
  153. package/external/libedhoc/externals/Unity/test/testdata/Defs.h +16 -0
  154. package/external/libedhoc/externals/Unity/test/testdata/cmock.h +21 -0
  155. package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +20 -0
  156. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +204 -0
  157. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +73 -0
  158. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +200 -0
  159. package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +151 -0
  160. package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +2941 -0
  161. package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +375 -0
  162. package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +1285 -0
  163. package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +1395 -0
  164. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +2863 -0
  165. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +783 -0
  166. package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +82 -0
  167. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +309 -0
  168. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +28 -0
  169. package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +330 -0
  170. package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +21 -0
  171. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +147 -60
  172. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +291 -202
  173. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +100 -156
  174. package/external/libedhoc/externals/zcbor/include/zcbor_print.h +165 -0
  175. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +1 -1
  176. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +1 -1
  177. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +1 -1
  178. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +4 -4
  179. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +4 -4
  180. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +15 -24
  181. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +14 -23
  182. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +202 -29
  183. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +633 -173
  184. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +71 -184
  185. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +152 -153
  186. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +64 -64
  187. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +15 -16
  188. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +228 -84
  189. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +9 -9
  190. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -1
  191. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +172 -173
  192. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +73 -73
  193. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +1 -2
  194. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +83 -56
  195. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +15 -16
  196. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +12 -0
  197. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +69 -69
  198. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +448 -55
  199. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +49 -48
  200. package/external/libedhoc/include/edhoc.h +348 -54
  201. package/external/libedhoc/include/edhoc_common.h +289 -0
  202. package/external/libedhoc/include/edhoc_context.h +60 -35
  203. package/external/libedhoc/include/edhoc_credentials.h +55 -7
  204. package/external/libedhoc/include/edhoc_crypto.h +10 -10
  205. package/external/libedhoc/include/edhoc_ead.h +13 -10
  206. package/external/libedhoc/include/edhoc_macros.h +20 -11
  207. package/external/libedhoc/include/edhoc_values.h +2 -2
  208. package/external/libedhoc/library/edhoc.c +70 -36
  209. package/external/libedhoc/library/edhoc_common.c +1314 -0
  210. package/external/libedhoc/library/edhoc_exporter.c +45 -46
  211. package/external/libedhoc/library/edhoc_message_1.c +107 -72
  212. package/external/libedhoc/library/edhoc_message_2.c +396 -1693
  213. package/external/libedhoc/library/edhoc_message_3.c +465 -1656
  214. package/external/libedhoc/library/edhoc_message_4.c +93 -91
  215. package/external/libedhoc/library/edhoc_message_error.c +41 -41
  216. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_0.h → cipher_suite_0.h} +131 -134
  217. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_2.h → cipher_suite_2.h} +139 -140
  218. package/external/libedhoc/tests/include/{edhoc_trace_1/test_vector_1.h → test_vector_rfc9529_chapter_2.h} +786 -738
  219. package/external/libedhoc/tests/include/{edhoc_trace_2/test_vector_2.h → test_vector_rfc9529_chapter_3.h} +14 -10
  220. package/external/libedhoc/tests/include/{x509_chain_cs_0/test_vector_x5chain_cs_0.h → test_vector_x5chain_sign_keys_suite_0.h} +137 -140
  221. package/external/libedhoc/tests/include/{x509_chain_cs_2/test_vector_x5chain_cs_2.h → test_vector_x5chain_sign_keys_suite_2.h} +7 -8
  222. package/external/libedhoc/tests/include/{x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h → test_vector_x5chain_static_dh_keys_suite_2.h} +7 -8
  223. package/external/libedhoc/tests/include/{x509_hash_cs_2/test_vector_x5t_cs_2.h → test_vector_x5t_sign_keys_suite_2.h} +6 -7
  224. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_0.c → cipher_suite_0.c} +445 -447
  225. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_2.c → cipher_suite_2.c} +600 -600
  226. package/external/libedhoc/tests/src/module_test_api.c +430 -0
  227. package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +395 -0
  228. package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +392 -0
  229. package/external/libedhoc/tests/src/{error_message/test_edhoc_error_message.c → module_test_error_message.c} +94 -69
  230. package/external/libedhoc/tests/src/module_test_main.c +49 -0
  231. package/external/libedhoc/tests/src/{cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c → module_test_rfc9528_suites_negotiation.c} +224 -227
  232. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +2681 -0
  233. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +1635 -0
  234. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +1135 -0
  235. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +1249 -0
  236. package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +798 -0
  237. package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +956 -0
  238. package/include/EdhocComposeAsyncWorker.h +8 -6
  239. package/include/EdhocCredentialManager.h +16 -11
  240. package/include/EdhocCryptoManager.h +28 -21
  241. package/include/EdhocEadManager.h +3 -6
  242. package/include/{EdhocExportAsyncWorker.h → EdhocExportOscoreAsyncWorker.h} +20 -17
  243. package/include/EdhocKeyExporterAsyncWorker.h +76 -0
  244. package/include/EdhocKeyUpdateAsyncWorker.h +72 -0
  245. package/include/EdhocProcessAsyncWorker.h +14 -10
  246. package/include/LibEDHOC.h +44 -20
  247. package/include/UserContext.h +7 -9
  248. package/include/Utils.h +31 -27
  249. package/package.json +14 -3
  250. package/prebuilds/android-arm/edhoc.armv7.node +0 -0
  251. package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
  252. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  253. package/prebuilds/darwin-x64/edhoc.node +0 -0
  254. package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
  255. package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
  256. package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
  257. package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
  258. package/prebuilds/linux-x64/edhoc.musl.node +0 -0
  259. package/prebuilds/win32-ia32/edhoc.node +0 -0
  260. package/prebuilds/win32-x64/edhoc.node +0 -0
  261. package/src/EdhocComposeAsyncWorker.cpp +18 -35
  262. package/src/EdhocCredentialManager.cpp +160 -187
  263. package/src/EdhocCryptoManager.cpp +386 -586
  264. package/src/EdhocEadManager.cpp +10 -18
  265. package/src/EdhocExportOscoreAsyncWorker.cpp +77 -0
  266. package/src/EdhocKeyExporterAsyncWorker.cpp +49 -0
  267. package/src/EdhocKeyUpdateAsyncWorker.cpp +41 -0
  268. package/src/EdhocProcessAsyncWorker.cpp +72 -19
  269. package/src/LibEDHOC.cpp +213 -174
  270. package/src/Suites.cpp +39 -72
  271. package/src/Utils.cpp +32 -56
  272. package/test/basic.test.ts +64 -0
  273. package/test/vectors.test.ts +111 -0
  274. package/dist/credentials.d.ts +0 -16
  275. package/dist/credentials.d.ts.map +0 -1
  276. package/dist/credentials.js +0 -84
  277. package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +0 -69
  278. package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +0 -37
  279. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +0 -48
  280. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +0 -48
  281. package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +0 -60
  282. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +0 -208
  283. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +0 -59
  284. package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +0 -60
  285. package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +0 -199
  286. package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +0 -48
  287. package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +0 -92
  288. package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +0 -96
  289. package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +0 -58
  290. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +0 -56
  291. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +0 -57
  292. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +0 -59
  293. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +0 -57
  294. package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +0 -60
  295. package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +0 -57
  296. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +0 -475
  297. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +0 -473
  298. package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +0 -252
  299. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +0 -1829
  300. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +0 -1247
  301. package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +0 -170
  302. package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +0 -1783
  303. package/external/libedhoc/tests/src/tests.c +0 -228
  304. package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +0 -332
  305. package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +0 -936
  306. package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +0 -166
  307. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +0 -587
  308. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +0 -917
  309. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +0 -186
  310. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +0 -743
  311. package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +0 -261
  312. package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +0 -854
  313. package/src/EdhocExportAsyncWorker.cpp +0 -82
@@ -1,917 +0,0 @@
1
- /**
2
- * \file test_edhoc_handshake_x5chain_cs_2_ead.c
3
- * \author Kamil Kielbasa
4
- * \brief EDHOC handshake unit test for X.509 chain authentication method
5
- * for cipher suite 2 with multiple EAD tokens.
6
- * \version 0.4
7
- * \date 2024-01-01
8
- *
9
- * \copyright Copyright (c) 2024
10
- *
11
- */
12
-
13
- /* Include files ----------------------------------------------------------- */
14
-
15
- /* Internal test headers: */
16
- #include "x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h"
17
- #include "x509_chain_cs_2/test_vector_x5chain_cs_2.h"
18
- #include "x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h"
19
- #include "cipher_suites/cipher_suite_2.h"
20
-
21
- /* Standard library headers: */
22
- #include <stdio.h>
23
- #include <string.h>
24
- #include <stdint.h>
25
- #include <stddef.h>
26
- #include <assert.h>
27
- #include <stdbool.h>
28
-
29
- /* EDHOC header: */
30
- #define EDHOC_ALLOW_PRIVATE_ACCESS
31
- #include "edhoc.h"
32
-
33
- /* PSA crypto header: */
34
- #include <psa/crypto.h>
35
-
36
- /* Module defines ---------------------------------------------------------- */
37
- #define OSCORE_MASTER_SECRET_LENGTH (16)
38
- #define OSCORE_MASTER_SALT_LENGTH (8)
39
- #define DH_KEY_AGREEMENT_LENGTH (32)
40
- #define ENTROPY_LENGTH (16)
41
- #define EAD_TOKEN_BUFFER_LEN (300)
42
- #define MAX_NR_OF_EAD_TOKENS (3)
43
-
44
- /* Module types and type definitiones -------------------------------------- */
45
-
46
- struct ead_token_buf {
47
- int32_t label;
48
- uint8_t value[EAD_TOKEN_BUFFER_LEN];
49
- size_t value_len;
50
- };
51
-
52
- struct ead_context {
53
- enum edhoc_message msg;
54
- size_t recv_tokens;
55
- struct ead_token_buf token[MAX_NR_OF_EAD_TOKENS];
56
- };
57
-
58
- /* Module interface variables and constants -------------------------------- */
59
- /* Static function declarations -------------------------------------------- */
60
-
61
- /**
62
- * \brief Helper function for printing arrays.
63
- */
64
- static inline void print_array(void *user_context, const char *name,
65
- const uint8_t *buffer, size_t buffer_length);
66
-
67
- /* Static variables and constants ------------------------------------------ */
68
-
69
- static const struct edhoc_cipher_suite edhoc_cipher_suite_2 = {
70
- .value = 2,
71
- .aead_key_length = 16,
72
- .aead_tag_length = 8,
73
- .aead_iv_length = 13,
74
- .hash_length = 32,
75
- .mac_length = 32,
76
- .ecc_key_length = 32,
77
- .ecc_sign_length = 64,
78
- };
79
-
80
- static const struct edhoc_keys edhoc_keys = {
81
- .generate_key = cipher_suite_2_key_generate,
82
- .destroy_key = cipher_suite_2_key_destroy,
83
- };
84
-
85
- static int
86
- cipher_suite_2_make_key_pair_init(void *user_ctx, const void *kid,
87
- uint8_t *priv_key, size_t priv_key_size,
88
- size_t *priv_key_len, uint8_t *pub_key,
89
- size_t pub_key_size, size_t *pub_key_len);
90
-
91
- static int
92
- cipher_suite_2_make_key_pair_resp(void *user_ctx, const void *kid,
93
- uint8_t *priv_key, size_t priv_key_size,
94
- size_t *priv_key_len, uint8_t *pub_key,
95
- size_t pub_key_size, size_t *pub_key_len);
96
-
97
- static const struct edhoc_crypto edhoc_crypto_mocked_resp = {
98
- .make_key_pair = cipher_suite_2_make_key_pair_resp,
99
- .key_agreement = cipher_suite_2_key_agreement,
100
- .signature = cipher_suite_2_signature,
101
- .verify = cipher_suite_2_verify,
102
- .extract = cipher_suite_2_extract,
103
- .expand = cipher_suite_2_expand,
104
- .encrypt = cipher_suite_2_encrypt,
105
- .decrypt = cipher_suite_2_decrypt,
106
- .hash = cipher_suite_2_hash,
107
- };
108
-
109
- static const struct edhoc_crypto edhoc_crypto_mocked_init = {
110
- .make_key_pair = cipher_suite_2_make_key_pair_init,
111
- .key_agreement = cipher_suite_2_key_agreement,
112
- .signature = cipher_suite_2_signature,
113
- .verify = cipher_suite_2_verify,
114
- .extract = cipher_suite_2_extract,
115
- .expand = cipher_suite_2_expand,
116
- .encrypt = cipher_suite_2_encrypt,
117
- .decrypt = cipher_suite_2_decrypt,
118
- .hash = cipher_suite_2_hash,
119
- };
120
-
121
- static const struct edhoc_credentials edhoc_auth_cred_single_cert_mocked_init = {
122
- .fetch = auth_cred_fetch_init_x5chain_cs_2_single_cert,
123
- .verify = auth_cred_verify_init_x5chain_cs_2_single_cert,
124
- };
125
-
126
- static const struct edhoc_credentials edhoc_auth_cred_single_cert_mocked_resp = {
127
- .fetch = auth_cred_fetch_resp_x5chain_cs_2_single_cert,
128
- .verify = auth_cred_verify_resp_x5chain_cs_2_single_cert,
129
- };
130
-
131
- static const uint8_t ead_val_msg_1[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 };
132
- static const uint8_t ead_val_msg_2[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05,
133
- 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
134
- 0x0c, 0x0d, 0x0e, 0x0f };
135
- static const uint8_t ead_val_msg_3[] = {
136
- 0x55, 0x9a, 0xea, 0xd0, 0x82, 0x64, 0xd5, 0x79, 0x5d, 0x39, 0x09, 0x71,
137
- 0x8c, 0xdd, 0x05, 0xab, 0xd4, 0x95, 0x72, 0xe8, 0x4f, 0xe5, 0x55, 0x90,
138
- 0xee, 0xf3, 0x1a, 0x88, 0xa0, 0x8f, 0xdf, 0xfd, 0x3c, 0xb2, 0x5f, 0x25,
139
- 0xfa, 0xac, 0xd5, 0x7a, 0x90, 0x43, 0x4f, 0x64, 0xd0, 0x36, 0x2f, 0x2a,
140
- 0x2d, 0x2d, 0x0a, 0x90, 0xcf, 0x1a, 0x5a, 0x4c, 0x5d, 0xb0, 0x2d, 0x56,
141
- 0xec, 0xc4, 0xc5, 0xbf, 0x34, 0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18,
142
- 0x58, 0x65, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9,
143
- 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
144
- 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
145
- };
146
-
147
- static const uint8_t ead_val_msg_4[] = { 0xff, 0xee, 0xdd, 0xcc,
148
- 0xbb, 0xaa, 0x00 };
149
-
150
- static const struct edhoc_ead_token ead_single_token_msg_1 = {
151
- .label = 0,
152
- .value = ead_val_msg_1,
153
- .value_len = ARRAY_SIZE(ead_val_msg_1),
154
- };
155
-
156
- static const struct edhoc_ead_token ead_single_token_msg_2 = {
157
- .label = 24,
158
- .value = ead_val_msg_2,
159
- .value_len = ARRAY_SIZE(ead_val_msg_2),
160
- };
161
-
162
- static const struct edhoc_ead_token ead_single_token_msg_3 = {
163
- .label = 65535,
164
- .value = ead_val_msg_3,
165
- .value_len = ARRAY_SIZE(ead_val_msg_3),
166
- };
167
-
168
- static const struct edhoc_ead_token ead_single_token_msg_4 = {
169
- .label = -830,
170
- .value = ead_val_msg_4,
171
- .value_len = ARRAY_SIZE(ead_val_msg_4),
172
- };
173
-
174
- static const struct edhoc_ead_token ead_multiple_tokens_msg_1[] = {
175
- ead_single_token_msg_1,
176
- ead_single_token_msg_2,
177
- ead_single_token_msg_3,
178
- };
179
-
180
- static const struct edhoc_ead_token ead_multiple_tokens_msg_2[] = {
181
- ead_single_token_msg_3,
182
- ead_single_token_msg_1,
183
- };
184
-
185
- static const struct edhoc_ead_token ead_multiple_tokens_msg_3[] = {
186
- ead_single_token_msg_3,
187
- ead_single_token_msg_2,
188
- ead_single_token_msg_1,
189
- };
190
-
191
- static const struct edhoc_ead_token ead_multiple_tokens_msg_4[] = {
192
- ead_single_token_msg_1,
193
- ead_single_token_msg_4,
194
- ead_single_token_msg_3,
195
- };
196
-
197
- static int ead_compose_multiple_tokens(void *user_context,
198
- enum edhoc_message message,
199
- struct edhoc_ead_token *ead_token,
200
- size_t ead_token_size,
201
- size_t *ead_token_len);
202
-
203
- static int ead_process_multiple_tokens(void *user_context,
204
- enum edhoc_message message,
205
- const struct edhoc_ead_token *ead_token,
206
- size_t ead_token_size);
207
-
208
- static const struct edhoc_ead edhoc_ead_multiple_tokens = {
209
- .compose = ead_compose_multiple_tokens,
210
- .process = ead_process_multiple_tokens,
211
- };
212
-
213
- /* Static function definitions --------------------------------------------- */
214
-
215
- static inline void print_array(void *user_context, const char *name,
216
- const uint8_t *buffer, size_t buffer_length)
217
- {
218
- (void)user_context;
219
-
220
- printf("%s:\tLEN( %zu )\n", name, buffer_length);
221
-
222
- for (size_t i = 0; i < buffer_length; ++i) {
223
- if (0 == i % 16 && i > 0) {
224
- printf("\n");
225
- }
226
-
227
- printf("%02x ", buffer[i]);
228
- }
229
-
230
- printf("\n\n");
231
- }
232
-
233
- static int
234
- cipher_suite_2_make_key_pair_init(void *user_ctx, const void *kid,
235
- uint8_t *priv_key, size_t priv_key_size,
236
- size_t *priv_key_len, uint8_t *pub_key,
237
- size_t pub_key_size, size_t *pub_key_len)
238
- {
239
- (void)user_ctx;
240
-
241
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
242
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
243
- NULL == pub_key_len)
244
- return EDHOC_ERROR_INVALID_ARGUMENT;
245
-
246
- *priv_key_len = ARRAY_SIZE(X);
247
- memcpy(priv_key, X, ARRAY_SIZE(X));
248
-
249
- *pub_key_len = ARRAY_SIZE(G_X);
250
- memcpy(pub_key, G_X, ARRAY_SIZE(G_X));
251
-
252
- return EDHOC_SUCCESS;
253
- }
254
-
255
- static int
256
- cipher_suite_2_make_key_pair_resp(void *user_ctx, const void *kid,
257
- uint8_t *priv_key, size_t priv_key_size,
258
- size_t *priv_key_len, uint8_t *pub_key,
259
- size_t pub_key_size, size_t *pub_key_len)
260
- {
261
- (void)user_ctx;
262
-
263
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
264
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
265
- NULL == pub_key_len)
266
- return EDHOC_ERROR_INVALID_ARGUMENT;
267
-
268
- *priv_key_len = ARRAY_SIZE(Y);
269
- memcpy(priv_key, Y, ARRAY_SIZE(Y));
270
-
271
- *pub_key_len = ARRAY_SIZE(G_X);
272
- memcpy(pub_key, G_Y, ARRAY_SIZE(G_Y));
273
-
274
- return EDHOC_SUCCESS;
275
- }
276
-
277
- static int ead_compose_multiple_tokens(void *user_ctx, enum edhoc_message msg,
278
- struct edhoc_ead_token *ead_token,
279
- size_t ead_token_size,
280
- size_t *ead_token_len)
281
- {
282
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size ||
283
- NULL == ead_token_len)
284
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
285
-
286
- size_t len = 0;
287
- const struct edhoc_ead_token *token = NULL;
288
-
289
- switch (msg) {
290
- case EDHOC_MSG_1:
291
- token = ead_multiple_tokens_msg_1;
292
- len = ARRAY_SIZE(ead_multiple_tokens_msg_1);
293
- break;
294
- case EDHOC_MSG_2:
295
- token = ead_multiple_tokens_msg_2;
296
- len = ARRAY_SIZE(ead_multiple_tokens_msg_2);
297
- break;
298
- case EDHOC_MSG_3:
299
- token = ead_multiple_tokens_msg_3;
300
- len = ARRAY_SIZE(ead_multiple_tokens_msg_3);
301
- break;
302
- case EDHOC_MSG_4:
303
- token = ead_multiple_tokens_msg_4;
304
- len = ARRAY_SIZE(ead_multiple_tokens_msg_4);
305
- break;
306
- default:
307
- return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
308
- }
309
-
310
- *ead_token_len = len;
311
-
312
- for (size_t i = 0; i < len; ++i)
313
- ead_token[i] = token[i];
314
-
315
- struct ead_context *ead_ctx = user_ctx;
316
-
317
- ead_ctx->msg = msg;
318
- ead_ctx->recv_tokens = len;
319
-
320
- for (size_t i = 0; i < ead_ctx->recv_tokens; ++i) {
321
- ead_ctx->token[i].label = ead_token[i].label;
322
- ead_ctx->token[i].value_len = ead_token[i].value_len;
323
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
324
- ead_token[i].value_len);
325
- }
326
-
327
- return EDHOC_SUCCESS;
328
- }
329
-
330
- static int ead_process_multiple_tokens(void *user_ctx, enum edhoc_message msg,
331
- const struct edhoc_ead_token *ead_token,
332
- size_t ead_token_size)
333
- {
334
- if (NULL == user_ctx || NULL == ead_token || 0 == ead_token_size)
335
- return EDHOC_ERROR_EAD_PROCESS_FAILURE;
336
-
337
- struct ead_context *ead_ctx = user_ctx;
338
-
339
- ead_ctx->msg = msg;
340
- ead_ctx->recv_tokens = ead_token_size;
341
-
342
- for (size_t i = 0; i < ead_token_size; ++i) {
343
- ead_ctx->token[i].label = ead_token[i].label;
344
- ead_ctx->token[i].value_len = ead_token[i].value_len;
345
- memcpy(ead_ctx->token[i].value, ead_token[i].value,
346
- ead_token[i].value_len);
347
- }
348
-
349
- return EDHOC_SUCCESS;
350
- }
351
-
352
- /* Module interface function definitions ----------------------------------- */
353
-
354
- void test_edhoc_handshake_x5chain_cs_2_single_cert_e2e_multiple_ead_tokens(void)
355
- {
356
- int ret = EDHOC_ERROR_GENERIC_ERROR;
357
- enum edhoc_error_code error_code_recv =
358
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
359
-
360
- /**
361
- * \brief Setup initiator context.
362
- */
363
- struct edhoc_context init_ctx = { 0 };
364
- struct ead_context init_ead_ctx = { 0 };
365
- struct edhoc_connection_id init_cid = {
366
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
367
- .int_value = (int8_t)C_I[0],
368
- };
369
-
370
- ret = edhoc_context_init(&init_ctx);
371
- assert(EDHOC_SUCCESS == ret);
372
- init_ctx.logger = print_array;
373
-
374
- ret = edhoc_set_method(&init_ctx, METHOD);
375
- assert(EDHOC_SUCCESS == ret);
376
-
377
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_2, 1);
378
- assert(EDHOC_SUCCESS == ret);
379
-
380
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
381
- assert(EDHOC_SUCCESS == ret);
382
-
383
- ret = edhoc_set_user_context(&init_ctx, &init_ead_ctx);
384
- assert(EDHOC_SUCCESS == ret);
385
-
386
- ret = edhoc_bind_ead(&init_ctx, edhoc_ead_multiple_tokens);
387
- assert(EDHOC_SUCCESS == ret);
388
-
389
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
390
- assert(EDHOC_SUCCESS == ret);
391
-
392
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
393
- assert(EDHOC_SUCCESS == ret);
394
-
395
- ret = edhoc_bind_credentials(&init_ctx,
396
- edhoc_auth_cred_single_cert_mocked_init);
397
- assert(EDHOC_SUCCESS == ret);
398
-
399
- /**
400
- * \brief Setup responder context.
401
- */
402
- struct edhoc_context resp_ctx = { 0 };
403
- struct ead_context resp_ead_ctx = { 0 };
404
- struct edhoc_connection_id resp_cid = {
405
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
406
- .bstr_length = ARRAY_SIZE(C_R),
407
- };
408
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
409
-
410
- ret = edhoc_context_init(&resp_ctx);
411
- assert(EDHOC_SUCCESS == ret);
412
- resp_ctx.logger = print_array;
413
-
414
- ret = edhoc_set_method(&resp_ctx, METHOD);
415
- assert(EDHOC_SUCCESS == ret);
416
-
417
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_2, 1);
418
- assert(EDHOC_SUCCESS == ret);
419
-
420
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
421
- assert(EDHOC_SUCCESS == ret);
422
-
423
- ret = edhoc_set_user_context(&resp_ctx, &resp_ead_ctx);
424
- assert(EDHOC_SUCCESS == ret);
425
-
426
- ret = edhoc_bind_ead(&resp_ctx, edhoc_ead_multiple_tokens);
427
- assert(EDHOC_SUCCESS == ret);
428
-
429
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
430
- assert(EDHOC_SUCCESS == ret);
431
-
432
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
433
- assert(EDHOC_SUCCESS == ret);
434
-
435
- ret = edhoc_bind_credentials(&resp_ctx,
436
- edhoc_auth_cred_single_cert_mocked_resp);
437
- assert(EDHOC_SUCCESS == ret);
438
-
439
- /**
440
- * \brief One buffer for whole EDHOC handshake.
441
- */
442
- uint8_t buffer[1000] = { 0 };
443
-
444
- /**
445
- * \brief EDHOC message 1 compose.
446
- */
447
- memset(buffer, 0, sizeof(buffer));
448
- size_t msg_1_len = 0;
449
- uint8_t *msg_1 = buffer;
450
-
451
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
452
- &msg_1_len);
453
- assert(EDHOC_SUCCESS == ret);
454
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
455
- assert(false == init_ctx.is_oscore_export_allowed);
456
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
457
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
458
-
459
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
460
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
461
- assert(EDHOC_SUCCESS == ret);
462
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
463
-
464
- /* Verify EAD_1 compose. */
465
- assert(EDHOC_MSG_1 == init_ead_ctx.msg);
466
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_1) ==
467
- init_ead_ctx.recv_tokens);
468
-
469
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
470
- assert(ead_multiple_tokens_msg_1[i].label ==
471
- init_ead_ctx.token[i].label);
472
- assert(ead_multiple_tokens_msg_1[i].value_len ==
473
- init_ead_ctx.token[i].value_len);
474
- assert(0 == memcmp(ead_multiple_tokens_msg_1[i].value,
475
- init_ead_ctx.token[i].value,
476
- init_ead_ctx.token[i].value_len));
477
- }
478
-
479
- /**
480
- * \brief EDHOC message 1 process.
481
- */
482
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
483
- assert(EDHOC_SUCCESS == ret);
484
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
485
- assert(false == resp_ctx.is_oscore_export_allowed);
486
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
487
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
488
-
489
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
490
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
491
- assert(EDHOC_SUCCESS == ret);
492
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
493
-
494
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
495
- resp_ctx.peer_cid.encode_type);
496
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
497
-
498
- /* Verify EAD_1 process. */
499
- assert(EDHOC_MSG_1 == resp_ead_ctx.msg);
500
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_1) ==
501
- resp_ead_ctx.recv_tokens);
502
-
503
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
504
- assert(ead_multiple_tokens_msg_1[i].label ==
505
- resp_ead_ctx.token[i].label);
506
- assert(ead_multiple_tokens_msg_1[i].value_len ==
507
- resp_ead_ctx.token[i].value_len);
508
- assert(0 == memcmp(ead_multiple_tokens_msg_1[i].value,
509
- resp_ead_ctx.token[i].value,
510
- resp_ead_ctx.token[i].value_len));
511
- }
512
-
513
- /**
514
- * \brief Zeros EAD context's.
515
- */
516
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
517
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
518
-
519
- /**
520
- * \brief EDHOC message 2 compose.
521
- */
522
- memset(buffer, 0, sizeof(buffer));
523
- size_t msg_2_len = 0;
524
- uint8_t *msg_2 = buffer;
525
-
526
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
527
- &msg_2_len);
528
- assert(EDHOC_SUCCESS == ret);
529
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
530
- assert(false == resp_ctx.is_oscore_export_allowed);
531
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
532
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
533
-
534
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
535
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
536
- assert(EDHOC_SUCCESS == ret);
537
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
538
-
539
- /* Verify EAD_2 compose. */
540
- assert(EDHOC_MSG_2 == resp_ead_ctx.msg);
541
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_2) ==
542
- resp_ead_ctx.recv_tokens);
543
-
544
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
545
- assert(ead_multiple_tokens_msg_2[i].label ==
546
- resp_ead_ctx.token[i].label);
547
- assert(ead_multiple_tokens_msg_2[i].value_len ==
548
- resp_ead_ctx.token[i].value_len);
549
- assert(0 == memcmp(ead_multiple_tokens_msg_2[i].value,
550
- resp_ead_ctx.token[i].value,
551
- resp_ead_ctx.token[i].value_len));
552
- }
553
-
554
- /**
555
- * \brief EDHOC message 2 process.
556
- */
557
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
558
-
559
- assert(EDHOC_SUCCESS == ret);
560
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
561
- assert(false == init_ctx.is_oscore_export_allowed);
562
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
563
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
564
-
565
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
566
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
567
- assert(EDHOC_SUCCESS == ret);
568
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
569
-
570
- assert(EDHOC_CID_TYPE_BYTE_STRING == init_ctx.peer_cid.encode_type);
571
- assert(ARRAY_SIZE(C_R) == init_ctx.peer_cid.bstr_length);
572
- assert(0 == memcmp(C_R, init_ctx.peer_cid.bstr_value,
573
- init_ctx.peer_cid.bstr_length));
574
-
575
- /* Verify EAD_2 process. */
576
- assert(EDHOC_MSG_2 == init_ead_ctx.msg);
577
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_2) ==
578
- init_ead_ctx.recv_tokens);
579
-
580
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
581
- assert(ead_multiple_tokens_msg_2[i].label ==
582
- init_ead_ctx.token[i].label);
583
- assert(ead_multiple_tokens_msg_2[i].value_len ==
584
- init_ead_ctx.token[i].value_len);
585
- assert(0 == memcmp(ead_multiple_tokens_msg_2[i].value,
586
- init_ead_ctx.token[i].value,
587
- init_ead_ctx.token[i].value_len));
588
- }
589
-
590
- /**
591
- * \brief Verify ephemeral DH key agreement.
592
- */
593
- assert(DH_KEY_AGREEMENT_LENGTH == init_ctx.dh_secret_len);
594
- assert(DH_KEY_AGREEMENT_LENGTH == resp_ctx.dh_secret_len);
595
- assert(init_ctx.dh_secret_len == resp_ctx.dh_secret_len);
596
- assert(0 == memcmp(init_ctx.dh_secret, resp_ctx.dh_secret,
597
- DH_KEY_AGREEMENT_LENGTH));
598
-
599
- /**
600
- * \brief Zeros EAD context's.
601
- */
602
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
603
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
604
-
605
- /**
606
- * \brief EDHOC message 3 compose.
607
- */
608
- memset(buffer, 0, sizeof(buffer));
609
- size_t msg_3_len = 0;
610
- uint8_t *msg_3 = buffer;
611
-
612
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
613
- &msg_3_len);
614
-
615
- assert(EDHOC_SUCCESS == ret);
616
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
617
- assert(true == init_ctx.is_oscore_export_allowed);
618
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
619
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
620
-
621
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
622
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
623
- assert(EDHOC_SUCCESS == ret);
624
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
625
-
626
- /* Verify EAD_3 compose. */
627
- assert(EDHOC_MSG_3 == init_ead_ctx.msg);
628
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_3) ==
629
- init_ead_ctx.recv_tokens);
630
-
631
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
632
- assert(ead_multiple_tokens_msg_3[i].label ==
633
- init_ead_ctx.token[i].label);
634
- assert(ead_multiple_tokens_msg_3[i].value_len ==
635
- init_ead_ctx.token[i].value_len);
636
- assert(0 == memcmp(ead_multiple_tokens_msg_3[i].value,
637
- init_ead_ctx.token[i].value,
638
- init_ead_ctx.token[i].value_len));
639
- }
640
-
641
- /**
642
- * \brief EDHOC message 3 process.
643
- */
644
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
645
-
646
- assert(EDHOC_SUCCESS == ret);
647
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
648
- assert(true == resp_ctx.is_oscore_export_allowed);
649
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
650
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
651
-
652
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
653
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
654
- assert(EDHOC_SUCCESS == ret);
655
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
656
-
657
- /* Verify EAD_3 process. */
658
- assert(EDHOC_MSG_3 == resp_ead_ctx.msg);
659
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_3) ==
660
- resp_ead_ctx.recv_tokens);
661
-
662
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
663
- assert(ead_multiple_tokens_msg_3[i].label ==
664
- resp_ead_ctx.token[i].label);
665
- assert(ead_multiple_tokens_msg_3[i].value_len ==
666
- resp_ead_ctx.token[i].value_len);
667
- assert(0 == memcmp(ead_multiple_tokens_msg_3[i].value,
668
- resp_ead_ctx.token[i].value,
669
- resp_ead_ctx.token[i].value_len));
670
- }
671
-
672
- /**
673
- * \brief Zeros EAD context's.
674
- */
675
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
676
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
677
-
678
- /**
679
- * \brief EDHOC message 4 compose.
680
- */
681
- memset(buffer, 0, sizeof(buffer));
682
- size_t msg_4_len = 0;
683
- uint8_t *msg_4 = buffer;
684
-
685
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
686
- &msg_4_len);
687
-
688
- assert(EDHOC_SUCCESS == ret);
689
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
690
- assert(true == resp_ctx.is_oscore_export_allowed);
691
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
692
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
693
-
694
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
695
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
696
- assert(EDHOC_SUCCESS == ret);
697
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
698
-
699
- /* Verify EAD_4 compose. */
700
- assert(EDHOC_MSG_4 == resp_ead_ctx.msg);
701
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_4) ==
702
- resp_ead_ctx.recv_tokens);
703
-
704
- for (size_t i = 0; i < resp_ead_ctx.recv_tokens; ++i) {
705
- assert(ead_multiple_tokens_msg_4[i].label ==
706
- resp_ead_ctx.token[i].label);
707
- assert(ead_multiple_tokens_msg_4[i].value_len ==
708
- resp_ead_ctx.token[i].value_len);
709
- assert(0 == memcmp(ead_multiple_tokens_msg_4[i].value,
710
- resp_ead_ctx.token[i].value,
711
- resp_ead_ctx.token[i].value_len));
712
- }
713
-
714
- /**
715
- * \brief EDHOC message 4 process.
716
- */
717
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
718
-
719
- assert(EDHOC_SUCCESS == ret);
720
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
721
- assert(true == init_ctx.is_oscore_export_allowed);
722
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
723
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
724
-
725
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
726
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
727
- assert(EDHOC_SUCCESS == ret);
728
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
729
-
730
- /* Verify EAD_4 process. */
731
- assert(EDHOC_MSG_4 == init_ead_ctx.msg);
732
- assert(ARRAY_SIZE(ead_multiple_tokens_msg_4) ==
733
- init_ead_ctx.recv_tokens);
734
-
735
- for (size_t i = 0; i < init_ead_ctx.recv_tokens; ++i) {
736
- assert(ead_multiple_tokens_msg_4[i].label ==
737
- init_ead_ctx.token[i].label);
738
- assert(ead_multiple_tokens_msg_4[i].value_len ==
739
- init_ead_ctx.token[i].value_len);
740
- assert(0 == memcmp(ead_multiple_tokens_msg_4[i].value,
741
- init_ead_ctx.token[i].value,
742
- init_ead_ctx.token[i].value_len));
743
- }
744
-
745
- /**
746
- * \brief Zeros EAD context's.
747
- */
748
- memset(&init_ead_ctx, 0, sizeof(init_ead_ctx));
749
- memset(&resp_ead_ctx, 0, sizeof(resp_ead_ctx));
750
-
751
- /**
752
- * \brief Initiator - derive OSCORE secret & salt.
753
- */
754
- uint8_t init_master_secret[OSCORE_MASTER_SECRET_LENGTH] = { 0 };
755
- uint8_t init_master_salt[OSCORE_MASTER_SALT_LENGTH] = { 0 };
756
- size_t init_sender_id_len = 0;
757
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
758
- size_t init_recipient_id_len = 0;
759
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
760
-
761
- ret = edhoc_export_oscore_session(
762
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
763
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
764
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
765
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
766
- &init_recipient_id_len);
767
- assert(EDHOC_SUCCESS == ret);
768
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
769
- assert(false == init_ctx.is_oscore_export_allowed);
770
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
771
-
772
- /**
773
- * \brief Responder - derive OSCORE secret & salt.
774
- */
775
- uint8_t resp_master_secret[OSCORE_MASTER_SECRET_LENGTH] = { 0 };
776
- uint8_t resp_master_salt[OSCORE_MASTER_SALT_LENGTH] = { 0 };
777
- size_t resp_sender_id_len = 0;
778
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
779
- size_t resp_recipient_id_len = 0;
780
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
781
-
782
- ret = edhoc_export_oscore_session(
783
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
784
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
785
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
786
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
787
- &resp_recipient_id_len);
788
- assert(EDHOC_SUCCESS == ret);
789
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
790
- assert(false == resp_ctx.is_oscore_export_allowed);
791
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
792
-
793
- /**
794
- * \brief Verify OSCORE master secret:
795
- */
796
- assert(0 == memcmp(init_master_secret, resp_master_secret,
797
- sizeof(resp_master_secret)));
798
-
799
- /**
800
- * \brief Verify OSCORE master salt:
801
- */
802
- assert(0 == memcmp(init_master_salt, resp_master_salt,
803
- sizeof(resp_master_salt)));
804
-
805
- /**
806
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
807
- */
808
- assert(init_sender_id_len == resp_recipient_id_len);
809
- assert(0 ==
810
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
811
- assert(init_recipient_id_len == resp_sender_id_len);
812
- assert(0 ==
813
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
814
-
815
- uint8_t entropy[ENTROPY_LENGTH] = { 0 };
816
- ret = psa_generate_random(entropy, sizeof(entropy));
817
- assert(PSA_SUCCESS == ret);
818
-
819
- /**
820
- * \brief Initiator - perform EDHOC key update.
821
- */
822
- ret = edhoc_export_key_update(&init_ctx, entropy, ARRAY_SIZE(entropy));
823
- assert(EDHOC_SUCCESS == ret);
824
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
825
- assert(true == init_ctx.is_oscore_export_allowed);
826
-
827
- /**
828
- * \brief Responder - perform EDHOC key update.
829
- */
830
- ret = edhoc_export_key_update(&resp_ctx, entropy, ARRAY_SIZE(entropy));
831
- assert(EDHOC_SUCCESS == ret);
832
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
833
- assert(true == resp_ctx.is_oscore_export_allowed);
834
-
835
- /**
836
- * \brief Verify new PRK_out.
837
- */
838
- assert(init_ctx.prk_state == resp_ctx.prk_state);
839
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
840
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
841
-
842
- assert(init_ctx.prk_len == resp_ctx.prk_len);
843
- assert(0 == memcmp(init_ctx.prk, resp_ctx.prk, resp_ctx.prk_len));
844
-
845
- /**
846
- * \brief Initiator - derive OSCORE secret & salt.
847
- */
848
- memset(init_master_secret, 0, sizeof(init_master_secret));
849
- memset(init_master_salt, 0, sizeof(init_master_salt));
850
- init_sender_id_len = 0;
851
- memset(init_sender_id, 0, sizeof(init_sender_id));
852
- init_recipient_id_len = 0;
853
- memset(init_recipient_id, 0, sizeof(init_recipient_id));
854
-
855
- ret = edhoc_export_oscore_session(
856
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
857
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
858
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
859
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
860
- &init_recipient_id_len);
861
- assert(EDHOC_SUCCESS == ret);
862
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
863
- assert(false == init_ctx.is_oscore_export_allowed);
864
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
865
-
866
- /**
867
- * \brief Responder - derive OSCORE secret & salt.
868
- */
869
- memset(resp_master_secret, 0, sizeof(resp_master_secret));
870
- memset(resp_master_salt, 0, sizeof(resp_master_salt));
871
- resp_sender_id_len = 0;
872
- memset(resp_sender_id, 0, sizeof(resp_sender_id));
873
- resp_recipient_id_len = 0;
874
- memset(resp_recipient_id, 0, sizeof(resp_recipient_id));
875
-
876
- ret = edhoc_export_oscore_session(
877
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
878
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
879
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
880
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
881
- &resp_recipient_id_len);
882
- assert(EDHOC_SUCCESS == ret);
883
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
884
- assert(false == resp_ctx.is_oscore_export_allowed);
885
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
886
-
887
- /**
888
- * \brief Verify OSCORE master secret:
889
- */
890
- assert(0 == memcmp(init_master_secret, resp_master_secret,
891
- sizeof(resp_master_secret)));
892
-
893
- /**
894
- * \brief Verify OSCORE master salt:
895
- */
896
- assert(0 == memcmp(init_master_salt, resp_master_salt,
897
- sizeof(resp_master_salt)));
898
-
899
- /**
900
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
901
- */
902
- assert(init_sender_id_len == resp_recipient_id_len);
903
- assert(0 ==
904
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
905
- assert(init_recipient_id_len == resp_sender_id_len);
906
- assert(0 ==
907
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
908
-
909
- /**
910
- * \brief Clean up of EDHOC context's.
911
- */
912
- ret = edhoc_context_deinit(&init_ctx);
913
- assert(EDHOC_SUCCESS == ret);
914
-
915
- ret = edhoc_context_deinit(&resp_ctx);
916
- assert(EDHOC_SUCCESS == ret);
917
- }