edhoc 1.0.5 → 1.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/README.md +170 -0
  2. package/binding.gyp +13 -11
  3. package/dist/crypto.d.ts +9 -2
  4. package/dist/crypto.d.ts.map +1 -1
  5. package/dist/crypto.js +112 -84
  6. package/dist/edhoc.d.ts +31 -9
  7. package/dist/edhoc.d.ts.map +1 -1
  8. package/dist/index.d.ts +1 -1
  9. package/dist/index.d.ts.map +1 -1
  10. package/dist/index.js +1 -1
  11. package/dist/x509credentials.d.ts +20 -0
  12. package/dist/x509credentials.d.ts.map +1 -0
  13. package/dist/x509credentials.js +140 -0
  14. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +1 -1
  15. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +1 -1
  16. package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +1 -1
  17. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +2 -2
  18. package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +2 -2
  19. package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +48 -43
  20. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +1 -1
  21. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +1 -1
  22. package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +3 -3
  23. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +1 -1
  24. package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +1 -1
  25. package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +1 -1
  26. package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +1 -1
  27. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +1 -1
  28. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +1 -1
  29. package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +1 -1
  30. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +1 -1
  31. package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +1 -1
  32. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +1 -1
  33. package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +1 -1
  34. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +1 -1
  35. package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +1 -1
  36. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +1 -1
  37. package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +1 -1
  38. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +1 -1
  39. package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +1 -1
  40. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +1 -1
  41. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +1 -1
  42. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +1 -1
  43. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +1 -1
  44. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +3 -3
  45. package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +3 -3
  46. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +1 -1
  47. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +1 -1
  48. package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +4 -4
  49. package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +93 -83
  50. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +11 -20
  51. package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +11 -20
  52. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +27 -32
  53. package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +27 -32
  54. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +14 -23
  55. package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +14 -23
  56. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +63 -52
  57. package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +62 -51
  58. package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +14 -23
  59. package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +14 -23
  60. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +11 -20
  61. package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +11 -20
  62. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +54 -51
  63. package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +54 -51
  64. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +11 -20
  65. package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +11 -20
  66. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +11 -20
  67. package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +11 -20
  68. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +11 -20
  69. package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +11 -20
  70. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +36 -37
  71. package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +36 -37
  72. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +103 -80
  73. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +102 -79
  74. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +99 -76
  75. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +98 -75
  76. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +40 -41
  77. package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +40 -41
  78. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +15 -24
  79. package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +15 -24
  80. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +31 -0
  81. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +10 -0
  82. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +18 -0
  83. package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +9 -0
  84. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +69 -0
  85. package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +38 -0
  86. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +53 -0
  87. package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +57 -0
  88. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +31 -0
  89. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +10 -0
  90. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +18 -0
  91. package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +9 -0
  92. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +71 -0
  93. package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +40 -0
  94. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +16 -0
  95. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +18 -0
  96. package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +19 -0
  97. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +17 -0
  98. package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +19 -0
  99. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +31 -0
  100. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +10 -0
  101. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +18 -0
  102. package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +9 -0
  103. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +69 -0
  104. package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +38 -0
  105. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +31 -0
  106. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +10 -0
  107. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +18 -0
  108. package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +9 -0
  109. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +70 -0
  110. package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +42 -0
  111. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +53 -0
  112. package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +57 -0
  113. package/external/libedhoc/externals/Unity/examples/unity_config.h +251 -0
  114. package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +44 -0
  115. package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +129 -0
  116. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +310 -0
  117. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +95 -0
  118. package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +51 -0
  119. package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +20 -0
  120. package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +40 -0
  121. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +246 -0
  122. package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +33 -0
  123. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +203 -0
  124. package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +61 -0
  125. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +326 -0
  126. package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +50 -0
  127. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +57 -0
  128. package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +17 -0
  129. package/external/libedhoc/externals/Unity/src/unity.c +2501 -0
  130. package/external/libedhoc/externals/Unity/src/unity.h +698 -0
  131. package/external/libedhoc/externals/Unity/src/unity_internals.h +1183 -0
  132. package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +61 -0
  133. package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +57 -0
  134. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +55 -0
  135. package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +15 -0
  136. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +80 -0
  137. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +76 -0
  138. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +75 -0
  139. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +13 -0
  140. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +89 -0
  141. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +89 -0
  142. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +77 -0
  143. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +89 -0
  144. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +89 -0
  145. package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +90 -0
  146. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +67 -0
  147. package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +70 -0
  148. package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +58 -0
  149. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +67 -0
  150. package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +70 -0
  151. package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +71 -0
  152. package/external/libedhoc/externals/Unity/test/testdata/CException.h +18 -0
  153. package/external/libedhoc/externals/Unity/test/testdata/Defs.h +16 -0
  154. package/external/libedhoc/externals/Unity/test/testdata/cmock.h +21 -0
  155. package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +20 -0
  156. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +204 -0
  157. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +73 -0
  158. package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +200 -0
  159. package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +151 -0
  160. package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +2941 -0
  161. package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +375 -0
  162. package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +1285 -0
  163. package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +1395 -0
  164. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +2863 -0
  165. package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +783 -0
  166. package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +82 -0
  167. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +309 -0
  168. package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +28 -0
  169. package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +330 -0
  170. package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +21 -0
  171. package/external/libedhoc/externals/zcbor/include/zcbor_common.h +147 -60
  172. package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +291 -202
  173. package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +100 -156
  174. package/external/libedhoc/externals/zcbor/include/zcbor_print.h +165 -0
  175. package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +1 -1
  176. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +1 -1
  177. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +1 -1
  178. package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +4 -4
  179. package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +4 -4
  180. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +15 -24
  181. package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +14 -23
  182. package/external/libedhoc/externals/zcbor/src/zcbor_common.c +202 -29
  183. package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +633 -173
  184. package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +71 -184
  185. package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +152 -153
  186. package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +64 -64
  187. package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +15 -16
  188. package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +228 -84
  189. package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +9 -9
  190. package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -1
  191. package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +172 -173
  192. package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +73 -73
  193. package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +1 -2
  194. package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +83 -56
  195. package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +15 -16
  196. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +12 -0
  197. package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +69 -69
  198. package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +448 -55
  199. package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +49 -48
  200. package/external/libedhoc/include/edhoc.h +348 -54
  201. package/external/libedhoc/include/edhoc_common.h +289 -0
  202. package/external/libedhoc/include/edhoc_context.h +60 -35
  203. package/external/libedhoc/include/edhoc_credentials.h +55 -7
  204. package/external/libedhoc/include/edhoc_crypto.h +10 -10
  205. package/external/libedhoc/include/edhoc_ead.h +13 -10
  206. package/external/libedhoc/include/edhoc_macros.h +20 -11
  207. package/external/libedhoc/include/edhoc_values.h +2 -2
  208. package/external/libedhoc/library/edhoc.c +70 -36
  209. package/external/libedhoc/library/edhoc_common.c +1314 -0
  210. package/external/libedhoc/library/edhoc_exporter.c +45 -46
  211. package/external/libedhoc/library/edhoc_message_1.c +107 -72
  212. package/external/libedhoc/library/edhoc_message_2.c +396 -1693
  213. package/external/libedhoc/library/edhoc_message_3.c +465 -1656
  214. package/external/libedhoc/library/edhoc_message_4.c +93 -91
  215. package/external/libedhoc/library/edhoc_message_error.c +41 -41
  216. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_0.h → cipher_suite_0.h} +131 -134
  217. package/external/libedhoc/tests/include/{cipher_suites/cipher_suite_2.h → cipher_suite_2.h} +139 -140
  218. package/external/libedhoc/tests/include/{edhoc_trace_1/test_vector_1.h → test_vector_rfc9529_chapter_2.h} +786 -738
  219. package/external/libedhoc/tests/include/{edhoc_trace_2/test_vector_2.h → test_vector_rfc9529_chapter_3.h} +14 -10
  220. package/external/libedhoc/tests/include/{x509_chain_cs_0/test_vector_x5chain_cs_0.h → test_vector_x5chain_sign_keys_suite_0.h} +137 -140
  221. package/external/libedhoc/tests/include/{x509_chain_cs_2/test_vector_x5chain_cs_2.h → test_vector_x5chain_sign_keys_suite_2.h} +7 -8
  222. package/external/libedhoc/tests/include/{x509_chain_cs_2_static_dh/test_vector_x5chain_cs_2_static_dh.h → test_vector_x5chain_static_dh_keys_suite_2.h} +7 -8
  223. package/external/libedhoc/tests/include/{x509_hash_cs_2/test_vector_x5t_cs_2.h → test_vector_x5t_sign_keys_suite_2.h} +6 -7
  224. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_0.c → cipher_suite_0.c} +445 -447
  225. package/external/libedhoc/tests/src/{cipher_suites/cipher_suite_2.c → cipher_suite_2.c} +600 -600
  226. package/external/libedhoc/tests/src/module_test_api.c +430 -0
  227. package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +395 -0
  228. package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +392 -0
  229. package/external/libedhoc/tests/src/{error_message/test_edhoc_error_message.c → module_test_error_message.c} +94 -69
  230. package/external/libedhoc/tests/src/module_test_main.c +49 -0
  231. package/external/libedhoc/tests/src/{cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.c → module_test_rfc9528_suites_negotiation.c} +224 -227
  232. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +2681 -0
  233. package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +1635 -0
  234. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +1135 -0
  235. package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +1249 -0
  236. package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +798 -0
  237. package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +956 -0
  238. package/include/EdhocComposeAsyncWorker.h +8 -6
  239. package/include/EdhocCredentialManager.h +16 -11
  240. package/include/EdhocCryptoManager.h +28 -21
  241. package/include/EdhocEadManager.h +3 -6
  242. package/include/{EdhocExportAsyncWorker.h → EdhocExportOscoreAsyncWorker.h} +20 -17
  243. package/include/EdhocKeyExporterAsyncWorker.h +76 -0
  244. package/include/EdhocKeyUpdateAsyncWorker.h +72 -0
  245. package/include/EdhocProcessAsyncWorker.h +14 -10
  246. package/include/LibEDHOC.h +44 -20
  247. package/include/UserContext.h +7 -9
  248. package/include/Utils.h +31 -27
  249. package/package.json +14 -3
  250. package/prebuilds/android-arm/edhoc.armv7.node +0 -0
  251. package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
  252. package/prebuilds/darwin-arm64/edhoc.node +0 -0
  253. package/prebuilds/darwin-x64/edhoc.node +0 -0
  254. package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
  255. package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
  256. package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
  257. package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
  258. package/prebuilds/linux-x64/edhoc.musl.node +0 -0
  259. package/prebuilds/win32-ia32/edhoc.node +0 -0
  260. package/prebuilds/win32-x64/edhoc.node +0 -0
  261. package/src/EdhocComposeAsyncWorker.cpp +18 -35
  262. package/src/EdhocCredentialManager.cpp +160 -187
  263. package/src/EdhocCryptoManager.cpp +386 -586
  264. package/src/EdhocEadManager.cpp +10 -18
  265. package/src/EdhocExportOscoreAsyncWorker.cpp +77 -0
  266. package/src/EdhocKeyExporterAsyncWorker.cpp +49 -0
  267. package/src/EdhocKeyUpdateAsyncWorker.cpp +41 -0
  268. package/src/EdhocProcessAsyncWorker.cpp +72 -19
  269. package/src/LibEDHOC.cpp +213 -174
  270. package/src/Suites.cpp +39 -72
  271. package/src/Utils.cpp +32 -56
  272. package/test/basic.test.ts +64 -0
  273. package/test/vectors.test.ts +111 -0
  274. package/dist/credentials.d.ts +0 -16
  275. package/dist/credentials.d.ts.map +0 -1
  276. package/dist/credentials.js +0 -84
  277. package/external/libedhoc/externals/zcbor/include/zcbor_debug.h +0 -69
  278. package/external/libedhoc/tests/include/cipher_suite_negotiation/test_edhoc_cipher_suite_negotiation.h +0 -37
  279. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_0.h +0 -48
  280. package/external/libedhoc/tests/include/cipher_suites/test_cipher_suite_2.h +0 -48
  281. package/external/libedhoc/tests/include/edhoc_trace_1/authentication_credentials_1.h +0 -60
  282. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_1.h +0 -208
  283. package/external/libedhoc/tests/include/edhoc_trace_1/test_edhoc_handshake_ead_1.h +0 -59
  284. package/external/libedhoc/tests/include/edhoc_trace_2/authentication_credentials_2.h +0 -60
  285. package/external/libedhoc/tests/include/edhoc_trace_2/test_edhoc_handshake_2.h +0 -199
  286. package/external/libedhoc/tests/include/error_message/test_edhoc_error_message.h +0 -48
  287. package/external/libedhoc/tests/include/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.h +0 -92
  288. package/external/libedhoc/tests/include/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.h +0 -96
  289. package/external/libedhoc/tests/include/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.h +0 -58
  290. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.h +0 -56
  291. package/external/libedhoc/tests/include/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.h +0 -57
  292. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.h +0 -59
  293. package/external/libedhoc/tests/include/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.h +0 -57
  294. package/external/libedhoc/tests/include/x509_hash_cs_2/authentication_credentials_x5t_cs_2.h +0 -60
  295. package/external/libedhoc/tests/include/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.h +0 -57
  296. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_0.c +0 -475
  297. package/external/libedhoc/tests/src/cipher_suites/test_cipher_suite_2.c +0 -473
  298. package/external/libedhoc/tests/src/edhoc_trace_1/authentication_credentials_1.c +0 -252
  299. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_1.c +0 -1829
  300. package/external/libedhoc/tests/src/edhoc_trace_1/test_edhoc_handshake_ead_1.c +0 -1247
  301. package/external/libedhoc/tests/src/edhoc_trace_2/authentication_credentials_2.c +0 -170
  302. package/external/libedhoc/tests/src/edhoc_trace_2/test_edhoc_handshake_2.c +0 -1783
  303. package/external/libedhoc/tests/src/tests.c +0 -228
  304. package/external/libedhoc/tests/src/x509_chain_cs_0/authentication_credentials_x5chain_cs_0.c +0 -332
  305. package/external/libedhoc/tests/src/x509_chain_cs_0/test_edhoc_handshake_x5chain_cs_0.c +0 -936
  306. package/external/libedhoc/tests/src/x509_chain_cs_2/authentication_credentials_x5chain_cs_2.c +0 -166
  307. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2.c +0 -587
  308. package/external/libedhoc/tests/src/x509_chain_cs_2/test_edhoc_handshake_x5chain_cs_2_ead.c +0 -917
  309. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/authentication_credentials_x5chain_cs_2_static_dh.c +0 -186
  310. package/external/libedhoc/tests/src/x509_chain_cs_2_static_dh/test_edhoc_handshake_x5chain_cs_2_static_dh_ead.c +0 -743
  311. package/external/libedhoc/tests/src/x509_hash_cs_2/authentication_credentials_x5t_cs_2.c +0 -261
  312. package/external/libedhoc/tests/src/x509_hash_cs_2/test_edhoc_handshake_x5t_cs_2_ead.c +0 -854
  313. package/src/EdhocExportAsyncWorker.cpp +0 -82
@@ -1,1829 +0,0 @@
1
- /**
2
- * \file test_edhoc_handshake_1.c
3
- * \author Kamil Kielbasa
4
- * \brief Unit tests for EDHOC handshake.
5
- * \version 0.4
6
- * \date 2024-01-01
7
- *
8
- * \copyright Copyright (c) 2024
9
- *
10
- */
11
-
12
- /* Include files ----------------------------------------------------------- */
13
-
14
- /* Internal test headers: */
15
- #include "edhoc_trace_1/test_edhoc_handshake_1.h"
16
- #include "edhoc_trace_1/test_vector_1.h"
17
- #include "edhoc_trace_1/authentication_credentials_1.h"
18
- #include "cipher_suites/cipher_suite_0.h"
19
-
20
- /* Standard library headers: */
21
- #include <stdio.h>
22
- #include <string.h>
23
- #include <stdint.h>
24
- #include <stddef.h>
25
- #include <assert.h>
26
- #include <stdbool.h>
27
-
28
- /* EDHOC header: */
29
- #define EDHOC_ALLOW_PRIVATE_ACCESS
30
- #include "edhoc.h"
31
-
32
- /* Module defines ---------------------------------------------------------- */
33
- #define DH_KEY_AGREEMENT_LENGTH (32)
34
-
35
- /* Module types and type definitiones -------------------------------------- */
36
- /* Module interface variables and constants -------------------------------- */
37
- /* Static function declarations -------------------------------------------- */
38
-
39
- /**
40
- * \brief Mocked EDHOC crypto function ECDH make key pair for initiator.
41
- */
42
- static int cipher_suite_0_make_key_pair_init(
43
- void *user_context, const void *key_id, uint8_t *private_key,
44
- size_t private_key_size, size_t *private_key_length,
45
- uint8_t *public_key, size_t public_key_size, size_t *public_key_length);
46
-
47
- /**
48
- * \brief Mocked EDHOC crypto function ECDH make key pair for responder.
49
- */
50
- static int cipher_suite_0_make_key_pair_resp(
51
- void *user_context, const void *key_id, uint8_t *private_key,
52
- size_t private_key_size, size_t *private_key_length,
53
- uint8_t *public_key, size_t public_key_size, size_t *public_key_length);
54
-
55
- /**
56
- * \brief Helper function for printing arrays.
57
- */
58
- static inline void print_array(void *user_context, const char *name,
59
- const uint8_t *buffer, size_t buffer_length);
60
-
61
- /* Static variables and constants ------------------------------------------ */
62
-
63
- static const struct edhoc_cipher_suite edhoc_cipher_suite_0 = {
64
- .value = 0,
65
- .aead_key_length = 16,
66
- .aead_tag_length = 8,
67
- .aead_iv_length = 13,
68
- .hash_length = 32,
69
- .mac_length = 32,
70
- .ecc_key_length = 32,
71
- .ecc_sign_length = 64,
72
- };
73
-
74
- static const struct edhoc_keys edhoc_keys = {
75
- .generate_key = cipher_suite_0_key_generate,
76
- .destroy_key = cipher_suite_0_key_destroy,
77
- };
78
-
79
- static const struct edhoc_crypto edhoc_crypto_mocked_init = {
80
- .make_key_pair = cipher_suite_0_make_key_pair_init,
81
- .key_agreement = cipher_suite_0_key_agreement,
82
- .signature = cipher_suite_0_signature,
83
- .verify = cipher_suite_0_verify,
84
- .extract = cipher_suite_0_extract,
85
- .expand = cipher_suite_0_expand,
86
- .encrypt = cipher_suite_0_encrypt,
87
- .decrypt = cipher_suite_0_decrypt,
88
- .hash = cipher_suite_0_hash,
89
- };
90
-
91
- static const struct edhoc_crypto edhoc_crypto_mocked_resp = {
92
- .make_key_pair = cipher_suite_0_make_key_pair_resp,
93
- .key_agreement = cipher_suite_0_key_agreement,
94
- .signature = cipher_suite_0_signature,
95
- .verify = cipher_suite_0_verify,
96
- .extract = cipher_suite_0_extract,
97
- .expand = cipher_suite_0_expand,
98
- .encrypt = cipher_suite_0_encrypt,
99
- .decrypt = cipher_suite_0_decrypt,
100
- .hash = cipher_suite_0_hash,
101
- };
102
-
103
- static const struct edhoc_crypto edhoc_crypto = {
104
- .make_key_pair = cipher_suite_0_make_key_pair,
105
- .key_agreement = cipher_suite_0_key_agreement,
106
- .signature = cipher_suite_0_signature,
107
- .verify = cipher_suite_0_verify,
108
- .extract = cipher_suite_0_extract,
109
- .expand = cipher_suite_0_expand,
110
- .encrypt = cipher_suite_0_encrypt,
111
- .decrypt = cipher_suite_0_decrypt,
112
- .hash = cipher_suite_0_hash,
113
- };
114
-
115
- static const struct edhoc_credentials edhoc_auth_cred_mocked_resp = {
116
- .fetch = auth_cred_fetch_resp,
117
- .verify = auth_cred_verify_resp,
118
- };
119
-
120
- static const struct edhoc_credentials edhoc_auth_cred_mocked_init = {
121
- .fetch = auth_cred_fetch_init,
122
- .verify = auth_cred_verify_init,
123
- };
124
-
125
- /* Static function definitions --------------------------------------------- */
126
-
127
- static int
128
- cipher_suite_0_make_key_pair_init(void *user_ctx, const void *kid,
129
- uint8_t *priv_key, size_t priv_key_size,
130
- size_t *priv_key_len, uint8_t *pub_key,
131
- size_t pub_key_size, size_t *pub_key_len)
132
- {
133
- (void)user_ctx;
134
-
135
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
136
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
137
- NULL == pub_key_len)
138
- return EDHOC_ERROR_INVALID_ARGUMENT;
139
-
140
- *priv_key_len = ARRAY_SIZE(X);
141
- memcpy(priv_key, X, ARRAY_SIZE(X));
142
-
143
- *pub_key_len = ARRAY_SIZE(G_X);
144
- memcpy(pub_key, G_X, ARRAY_SIZE(G_X));
145
-
146
- return EDHOC_SUCCESS;
147
- }
148
-
149
- static int
150
- cipher_suite_0_make_key_pair_resp(void *user_ctx, const void *kid,
151
- uint8_t *priv_key, size_t priv_key_size,
152
- size_t *priv_key_len, uint8_t *pub_key,
153
- size_t pub_key_size, size_t *pub_key_len)
154
- {
155
- (void)user_ctx;
156
-
157
- if (NULL == kid || NULL == priv_key || 0 == priv_key_size ||
158
- NULL == priv_key_len || NULL == pub_key || 0 == pub_key_size ||
159
- NULL == pub_key_len)
160
- return EDHOC_ERROR_INVALID_ARGUMENT;
161
-
162
- *priv_key_len = ARRAY_SIZE(Y);
163
- memcpy(priv_key, Y, ARRAY_SIZE(Y));
164
-
165
- *pub_key_len = ARRAY_SIZE(G_X);
166
- memcpy(pub_key, G_Y, ARRAY_SIZE(G_Y));
167
-
168
- return EDHOC_SUCCESS;
169
- }
170
-
171
- static inline void print_array(void *user_context, const char *name,
172
- const uint8_t *buffer, size_t buffer_length)
173
- {
174
- (void)user_context;
175
-
176
- printf("%s:\tLEN( %zu )\n", name, buffer_length);
177
-
178
- for (size_t i = 0; i < buffer_length; ++i) {
179
- if (0 == i % 16 && i > 0) {
180
- printf("\n");
181
- }
182
-
183
- printf("%02x ", buffer[i]);
184
- }
185
-
186
- printf("\n\n");
187
- }
188
-
189
- /* Module interface function definitions ----------------------------------- */
190
-
191
- void test_edhoc_handshake_1_message_1_compose(void)
192
- {
193
- int ret = EDHOC_ERROR_GENERIC_ERROR;
194
- struct edhoc_context init_ctx = { 0 };
195
- struct edhoc_connection_id init_cid = {
196
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
197
- .int_value = (int8_t)C_I[0],
198
- };
199
-
200
- /**
201
- * \brief Setup initiator context.
202
- */
203
- ret = edhoc_context_init(&init_ctx);
204
- assert(EDHOC_SUCCESS == ret);
205
- init_ctx.logger = print_array;
206
-
207
- ret = edhoc_set_method(&init_ctx, METHOD);
208
- assert(EDHOC_SUCCESS == ret);
209
-
210
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
211
- assert(EDHOC_SUCCESS == ret);
212
-
213
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
214
- assert(EDHOC_SUCCESS == ret);
215
-
216
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
217
- assert(EDHOC_SUCCESS == ret);
218
-
219
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
220
- assert(EDHOC_SUCCESS == ret);
221
-
222
- /**
223
- * \brief EDHOC message 1 compose.
224
- */
225
- size_t msg_1_len = 0;
226
- uint8_t msg_1[ARRAY_SIZE(message_1)] = { 0 };
227
-
228
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(msg_1),
229
- &msg_1_len);
230
-
231
- assert(EDHOC_SUCCESS == ret);
232
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
233
- assert(false == init_ctx.is_oscore_export_allowed);
234
-
235
- enum edhoc_error_code error_code_recv =
236
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
237
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
238
- assert(EDHOC_SUCCESS == ret);
239
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
240
-
241
- assert(ARRAY_SIZE(message_1) == msg_1_len);
242
- assert(0 == memcmp(message_1, msg_1, msg_1_len));
243
-
244
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
245
- assert(ARRAY_SIZE(H_message_1) == init_ctx.th_len);
246
- assert(0 == memcmp(H_message_1, init_ctx.th, init_ctx.th_len));
247
-
248
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
249
- assert(0 == init_ctx.prk_len);
250
-
251
- assert(ARRAY_SIZE(X) == init_ctx.dh_priv_key_len);
252
- assert(0 == memcmp(X, init_ctx.dh_priv_key, init_ctx.dh_priv_key_len));
253
-
254
- ret = edhoc_context_deinit(&init_ctx);
255
- assert(EDHOC_SUCCESS == ret);
256
- }
257
-
258
- void test_edhoc_handshake_1_message_1_process(void)
259
- {
260
- int ret = EDHOC_ERROR_GENERIC_ERROR;
261
- struct edhoc_context resp_ctx = { 0 };
262
- struct edhoc_connection_id resp_cid = {
263
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
264
- .bstr_length = ARRAY_SIZE(C_R),
265
- };
266
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
267
-
268
- /**
269
- * \brief Setup responder context.
270
- */
271
- ret = edhoc_context_init(&resp_ctx);
272
- assert(EDHOC_SUCCESS == ret);
273
- resp_ctx.logger = print_array;
274
-
275
- ret = edhoc_set_method(&resp_ctx, METHOD);
276
- assert(EDHOC_SUCCESS == ret);
277
-
278
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
279
- assert(EDHOC_SUCCESS == ret);
280
-
281
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
282
- assert(EDHOC_SUCCESS == ret);
283
-
284
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
285
- assert(EDHOC_SUCCESS == ret);
286
-
287
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
288
- assert(EDHOC_SUCCESS == ret);
289
-
290
- /**
291
- * \brief EDHOC message 1 process.
292
- */
293
- ret = edhoc_message_1_process(&resp_ctx, message_1,
294
- ARRAY_SIZE(message_1));
295
-
296
- assert(EDHOC_SUCCESS == ret);
297
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
298
- assert(false == resp_ctx.is_oscore_export_allowed);
299
-
300
- enum edhoc_error_code error_code_recv =
301
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
302
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
303
- assert(EDHOC_SUCCESS == ret);
304
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
305
-
306
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
307
- assert(ARRAY_SIZE(H_message_1) == resp_ctx.th_len);
308
- assert(0 == memcmp(H_message_1, resp_ctx.th, resp_ctx.th_len));
309
-
310
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
311
- assert(0 == resp_ctx.prk_len);
312
-
313
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
314
- resp_ctx.peer_cid.encode_type);
315
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
316
-
317
- assert(ARRAY_SIZE(G_X) == resp_ctx.dh_peer_pub_key_len);
318
- assert(0 == memcmp(G_X, resp_ctx.dh_peer_pub_key,
319
- resp_ctx.dh_peer_pub_key_len));
320
-
321
- ret = edhoc_context_deinit(&resp_ctx);
322
- assert(EDHOC_SUCCESS == ret);
323
- }
324
-
325
- void test_edhoc_handshake_1_message_2_compose(void)
326
- {
327
- int ret = EDHOC_ERROR_GENERIC_ERROR;
328
- struct edhoc_context resp_ctx = { 0 };
329
- struct edhoc_connection_id resp_cid = {
330
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
331
- .bstr_length = ARRAY_SIZE(C_R),
332
- };
333
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
334
- /**
335
- * \brief Setup responder context.
336
- */
337
- ret = edhoc_context_init(&resp_ctx);
338
- assert(EDHOC_SUCCESS == ret);
339
- resp_ctx.logger = print_array;
340
-
341
- ret = edhoc_set_method(&resp_ctx, METHOD);
342
- assert(EDHOC_SUCCESS == ret);
343
-
344
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
345
- assert(EDHOC_SUCCESS == ret);
346
-
347
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
348
- assert(EDHOC_SUCCESS == ret);
349
-
350
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
351
- assert(EDHOC_SUCCESS == ret);
352
-
353
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
354
- assert(EDHOC_SUCCESS == ret);
355
-
356
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
357
- assert(EDHOC_SUCCESS == ret);
358
-
359
- /**
360
- * \brief Required injections.
361
- */
362
- resp_ctx.status = EDHOC_SM_RECEIVED_M1;
363
-
364
- resp_ctx.th_state = EDHOC_TH_STATE_1;
365
- resp_ctx.th_len = ARRAY_SIZE(H_message_1);
366
- memcpy(resp_ctx.th, H_message_1, sizeof(H_message_1));
367
-
368
- resp_ctx.dh_peer_pub_key_len = ARRAY_SIZE(G_X);
369
- memcpy(resp_ctx.dh_peer_pub_key, G_X, ARRAY_SIZE(G_X));
370
-
371
- resp_ctx.peer_cid.encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER;
372
- resp_ctx.peer_cid.int_value = (int8_t)C_I[0];
373
-
374
- /**
375
- * \brief EDHOC message 2 compose.
376
- */
377
- size_t msg_2_len = 0;
378
- uint8_t msg_2[ARRAY_SIZE(message_2)] = { 0 };
379
-
380
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(msg_2),
381
- &msg_2_len);
382
-
383
- assert(EDHOC_SUCCESS == ret);
384
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
385
- assert(false == resp_ctx.is_oscore_export_allowed);
386
-
387
- enum edhoc_error_code error_code_recv =
388
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
389
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
390
- assert(EDHOC_SUCCESS == ret);
391
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
392
-
393
- assert(ARRAY_SIZE(message_2) == msg_2_len);
394
- assert(0 == memcmp(msg_2, message_2, msg_2_len));
395
-
396
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
397
- assert(ARRAY_SIZE(TH_3) == resp_ctx.th_len);
398
- assert(0 == memcmp(resp_ctx.th, TH_3, resp_ctx.th_len));
399
-
400
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
401
- assert(ARRAY_SIZE(PRK_3e2m) == resp_ctx.prk_len);
402
- assert(0 == memcmp(PRK_3e2m, resp_ctx.prk, resp_ctx.prk_len));
403
-
404
- assert(ARRAY_SIZE(G_XY) == resp_ctx.dh_secret_len);
405
- assert(0 == memcmp(G_XY, resp_ctx.dh_secret, resp_ctx.dh_secret_len));
406
-
407
- ret = edhoc_context_deinit(&resp_ctx);
408
- assert(EDHOC_SUCCESS == ret);
409
- }
410
-
411
- void test_edhoc_handshake_1_message_2_process(void)
412
- {
413
- int ret = EDHOC_ERROR_GENERIC_ERROR;
414
- struct edhoc_context init_ctx = { 0 };
415
- struct edhoc_connection_id init_cid = {
416
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
417
- .int_value = (int8_t)C_I[0],
418
- };
419
-
420
- /**
421
- * \brief Setup initiator context.
422
- */
423
- ret = edhoc_context_init(&init_ctx);
424
- assert(EDHOC_SUCCESS == ret);
425
- init_ctx.logger = print_array;
426
-
427
- ret = edhoc_set_method(&init_ctx, METHOD);
428
- assert(EDHOC_SUCCESS == ret);
429
-
430
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
431
- assert(EDHOC_SUCCESS == ret);
432
-
433
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
434
- assert(EDHOC_SUCCESS == ret);
435
-
436
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
437
- assert(EDHOC_SUCCESS == ret);
438
-
439
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
440
- assert(EDHOC_SUCCESS == ret);
441
-
442
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
443
- assert(EDHOC_SUCCESS == ret);
444
-
445
- /**
446
- * \brief Required incjections.
447
- */
448
- init_ctx.status = EDHOC_SM_WAIT_M2;
449
-
450
- init_ctx.th_state = EDHOC_TH_STATE_1;
451
- init_ctx.th_len = ARRAY_SIZE(H_message_1);
452
- memcpy(init_ctx.th, H_message_1, ARRAY_SIZE(H_message_1));
453
-
454
- init_ctx.dh_priv_key_len = ARRAY_SIZE(X);
455
- memcpy(init_ctx.dh_priv_key, X, ARRAY_SIZE(X));
456
-
457
- /**
458
- * \brief EDHOC message 2 process.
459
- */
460
- ret = edhoc_message_2_process(&init_ctx, message_2,
461
- ARRAY_SIZE(message_2));
462
-
463
- assert(EDHOC_SUCCESS == ret);
464
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
465
- assert(false == init_ctx.is_oscore_export_allowed);
466
-
467
- enum edhoc_error_code error_code_recv =
468
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
469
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
470
- assert(EDHOC_SUCCESS == ret);
471
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
472
-
473
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
474
- assert(ARRAY_SIZE(TH_3) == init_ctx.th_len);
475
- assert(0 == memcmp(init_ctx.th, TH_3, init_ctx.th_len));
476
-
477
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
478
- assert(ARRAY_SIZE(PRK_3e2m) == init_ctx.prk_len);
479
- assert(0 == memcmp(PRK_3e2m, init_ctx.prk, init_ctx.prk_len));
480
-
481
- assert(ARRAY_SIZE(G_XY) == init_ctx.dh_secret_len);
482
- assert(0 ==
483
- memcmp(init_ctx.dh_secret, G_XY, sizeof(init_ctx.dh_secret)));
484
-
485
- assert(EDHOC_CID_TYPE_BYTE_STRING == init_ctx.peer_cid.encode_type);
486
- assert(ARRAY_SIZE(C_R) == init_ctx.peer_cid.bstr_length);
487
- assert(0 == memcmp(C_R, init_ctx.peer_cid.bstr_value,
488
- init_ctx.peer_cid.bstr_length));
489
-
490
- ret = edhoc_context_deinit(&init_ctx);
491
- assert(EDHOC_SUCCESS == ret);
492
- }
493
-
494
- void test_edhoc_handshake_1_message_3_compose(void)
495
- {
496
- int ret = EDHOC_ERROR_GENERIC_ERROR;
497
- struct edhoc_context init_ctx = { 0 };
498
- struct edhoc_connection_id init_cid = {
499
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
500
- .int_value = (int8_t)C_I[0],
501
- };
502
-
503
- /**
504
- * \brief Setup initiator context.
505
- */
506
- ret = edhoc_context_init(&init_ctx);
507
- assert(EDHOC_SUCCESS == ret);
508
- init_ctx.logger = print_array;
509
-
510
- ret = edhoc_set_method(&init_ctx, METHOD);
511
- assert(EDHOC_SUCCESS == ret);
512
-
513
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
514
- assert(EDHOC_SUCCESS == ret);
515
-
516
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
517
- assert(EDHOC_SUCCESS == ret);
518
-
519
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
520
- assert(EDHOC_SUCCESS == ret);
521
-
522
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
523
- assert(EDHOC_SUCCESS == ret);
524
-
525
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
526
- assert(EDHOC_SUCCESS == ret);
527
-
528
- /**
529
- * \brief Required incjections.
530
- */
531
- init_ctx.status = EDHOC_SM_VERIFIED_M2;
532
-
533
- init_ctx.th_state = EDHOC_TH_STATE_3;
534
- init_ctx.th_len = ARRAY_SIZE(TH_3);
535
- memcpy(init_ctx.th, TH_3, ARRAY_SIZE(TH_3));
536
-
537
- init_ctx.prk_state = EDHOC_PRK_STATE_3E2M;
538
- init_ctx.prk_len = ARRAY_SIZE(PRK_3e2m);
539
- memcpy(init_ctx.prk, PRK_3e2m, ARRAY_SIZE(PRK_3e2m));
540
-
541
- init_ctx.dh_secret_len = ARRAY_SIZE(G_XY);
542
- memcpy(init_ctx.dh_secret, G_XY, ARRAY_SIZE(G_XY));
543
-
544
- /**
545
- * \brief EDHOC message 3 compose.
546
- */
547
- size_t msg_3_len = 0;
548
- uint8_t msg_3[ARRAY_SIZE(message_3)] = { 0 };
549
-
550
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(msg_3),
551
- &msg_3_len);
552
-
553
- assert(EDHOC_SUCCESS == ret);
554
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
555
- assert(true == init_ctx.is_oscore_export_allowed);
556
-
557
- enum edhoc_error_code error_code_recv =
558
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
559
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
560
- assert(EDHOC_SUCCESS == ret);
561
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
562
-
563
- assert(ARRAY_SIZE(message_3) == msg_3_len);
564
- assert(0 == memcmp(message_3, msg_3, msg_3_len));
565
-
566
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
567
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
568
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
569
-
570
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
571
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
572
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
573
-
574
- ret = edhoc_context_deinit(&init_ctx);
575
- assert(EDHOC_SUCCESS == ret);
576
- }
577
-
578
- void test_edhoc_handshake_1_message_3_process(void)
579
- {
580
- int ret = EDHOC_ERROR_GENERIC_ERROR;
581
- struct edhoc_context resp_ctx = { 0 };
582
- struct edhoc_connection_id resp_cid = {
583
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
584
- .bstr_length = ARRAY_SIZE(C_R),
585
- };
586
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
587
-
588
- /**
589
- * \brief Setup responder context.
590
- */
591
- ret = edhoc_context_init(&resp_ctx);
592
- assert(EDHOC_SUCCESS == ret);
593
- resp_ctx.logger = print_array;
594
-
595
- ret = edhoc_set_method(&resp_ctx, METHOD);
596
- assert(EDHOC_SUCCESS == ret);
597
-
598
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
599
- assert(EDHOC_SUCCESS == ret);
600
-
601
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
602
- assert(EDHOC_SUCCESS == ret);
603
-
604
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
605
- assert(EDHOC_SUCCESS == ret);
606
-
607
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
608
- assert(EDHOC_SUCCESS == ret);
609
-
610
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
611
- assert(EDHOC_SUCCESS == ret);
612
-
613
- /**
614
- * \brief Required incjections.
615
- */
616
- resp_ctx.status = EDHOC_SM_WAIT_M3;
617
-
618
- resp_ctx.th_state = EDHOC_TH_STATE_3;
619
- resp_ctx.th_len = ARRAY_SIZE(TH_3);
620
- memcpy(resp_ctx.th, TH_3, ARRAY_SIZE(TH_3));
621
-
622
- resp_ctx.prk_state = EDHOC_PRK_STATE_3E2M;
623
- resp_ctx.prk_len = ARRAY_SIZE(PRK_3e2m);
624
- memcpy(resp_ctx.prk, PRK_3e2m, ARRAY_SIZE(PRK_3e2m));
625
-
626
- resp_ctx.dh_secret_len = ARRAY_SIZE(G_XY);
627
- memcpy(resp_ctx.dh_secret, G_XY, ARRAY_SIZE(G_XY));
628
-
629
- /**
630
- * \brief EDHOC message 3 process.
631
- */
632
- ret = edhoc_message_3_process(&resp_ctx, message_3,
633
- ARRAY_SIZE(message_3));
634
-
635
- assert(EDHOC_SUCCESS == ret);
636
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
637
- assert(true == resp_ctx.is_oscore_export_allowed);
638
-
639
- enum edhoc_error_code error_code_recv =
640
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
641
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
642
- assert(EDHOC_SUCCESS == ret);
643
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
644
-
645
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
646
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
647
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
648
-
649
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
650
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
651
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
652
-
653
- ret = edhoc_context_deinit(&resp_ctx);
654
- assert(EDHOC_SUCCESS == ret);
655
- }
656
-
657
- void test_edhoc_handshake_1_message_4_compose(void)
658
- {
659
- int ret = EDHOC_ERROR_GENERIC_ERROR;
660
- struct edhoc_context resp_ctx = { 0 };
661
- struct edhoc_connection_id resp_cid = {
662
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
663
- .bstr_length = ARRAY_SIZE(C_R),
664
- };
665
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
666
-
667
- /**
668
- * \brief Setup responder context.
669
- */
670
- ret = edhoc_context_init(&resp_ctx);
671
- assert(EDHOC_SUCCESS == ret);
672
- resp_ctx.logger = print_array;
673
-
674
- ret = edhoc_set_method(&resp_ctx, METHOD);
675
- assert(EDHOC_SUCCESS == ret);
676
-
677
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
678
- assert(EDHOC_SUCCESS == ret);
679
-
680
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
681
- assert(EDHOC_SUCCESS == ret);
682
-
683
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
684
- assert(EDHOC_SUCCESS == ret);
685
-
686
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
687
- assert(EDHOC_SUCCESS == ret);
688
-
689
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
690
- assert(EDHOC_SUCCESS == ret);
691
-
692
- /**
693
- * \brief Required incjections.
694
- */
695
- resp_ctx.status = EDHOC_SM_COMPLETED;
696
- resp_ctx.is_oscore_export_allowed = true;
697
-
698
- resp_ctx.th_state = EDHOC_TH_STATE_4;
699
- resp_ctx.th_len = ARRAY_SIZE(TH_4);
700
- memcpy(resp_ctx.th, TH_4, ARRAY_SIZE(TH_4));
701
-
702
- resp_ctx.prk_state = EDHOC_PRK_STATE_4E3M;
703
- resp_ctx.prk_len = ARRAY_SIZE(PRK_4e3m);
704
- memcpy(resp_ctx.prk, PRK_4e3m, ARRAY_SIZE(PRK_4e3m));
705
-
706
- /**
707
- * \brief EDHOC message 4 compose.
708
- */
709
- size_t msg_4_len = 0;
710
- uint8_t msg_4[ARRAY_SIZE(message_4) + 1] = { 0 };
711
-
712
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(msg_4),
713
- &msg_4_len);
714
-
715
- assert(EDHOC_SUCCESS == ret);
716
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
717
- assert(true == resp_ctx.is_oscore_export_allowed);
718
-
719
- enum edhoc_error_code error_code_recv =
720
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
721
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
722
- assert(EDHOC_SUCCESS == ret);
723
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
724
-
725
- assert(ARRAY_SIZE(message_4) == msg_4_len);
726
- assert(0 == memcmp(message_4, msg_4, msg_4_len));
727
-
728
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
729
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
730
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
731
-
732
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
733
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
734
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
735
-
736
- ret = edhoc_context_deinit(&resp_ctx);
737
- assert(EDHOC_SUCCESS == ret);
738
- }
739
-
740
- void test_edhoc_handshake_1_message_4_process(void)
741
- {
742
- int ret = EDHOC_ERROR_GENERIC_ERROR;
743
- struct edhoc_context init_ctx = { 0 };
744
- struct edhoc_connection_id init_cid = {
745
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
746
- .int_value = (int8_t)C_I[0],
747
- };
748
-
749
- /**
750
- * \brief Setup initiator context.
751
- */
752
- ret = edhoc_context_init(&init_ctx);
753
- assert(EDHOC_SUCCESS == ret);
754
- init_ctx.logger = print_array;
755
-
756
- ret = edhoc_set_method(&init_ctx, METHOD);
757
- assert(EDHOC_SUCCESS == ret);
758
-
759
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
760
- assert(EDHOC_SUCCESS == ret);
761
-
762
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
763
- assert(EDHOC_SUCCESS == ret);
764
-
765
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
766
- assert(EDHOC_SUCCESS == ret);
767
-
768
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
769
- assert(EDHOC_SUCCESS == ret);
770
-
771
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
772
- assert(EDHOC_SUCCESS == ret);
773
-
774
- /**
775
- * \brief Required incjections.
776
- */
777
- init_ctx.status = EDHOC_SM_COMPLETED;
778
- init_ctx.is_oscore_export_allowed = true;
779
-
780
- init_ctx.th_state = EDHOC_TH_STATE_4;
781
- init_ctx.th_len = ARRAY_SIZE(TH_4);
782
- memcpy(init_ctx.th, TH_4, ARRAY_SIZE(TH_4));
783
-
784
- init_ctx.prk_state = EDHOC_PRK_STATE_4E3M;
785
- init_ctx.prk_len = ARRAY_SIZE(PRK_4e3m);
786
- memcpy(init_ctx.prk, PRK_4e3m, ARRAY_SIZE(PRK_4e3m));
787
-
788
- /**
789
- * \brief EDHOC message 4 process.
790
- */
791
- ret = edhoc_message_4_process(&init_ctx, message_4,
792
- ARRAY_SIZE(message_4));
793
-
794
- assert(EDHOC_SUCCESS == ret);
795
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
796
- assert(true == init_ctx.is_oscore_export_allowed);
797
-
798
- enum edhoc_error_code error_code_recv =
799
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
800
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
801
- assert(EDHOC_SUCCESS == ret);
802
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
803
-
804
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
805
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
806
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
807
-
808
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
809
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
810
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
811
-
812
- ret = edhoc_context_deinit(&init_ctx);
813
- assert(EDHOC_SUCCESS == ret);
814
- }
815
-
816
- void test_edhoc_handshake_1_e2e(void)
817
- {
818
- int ret = EDHOC_ERROR_GENERIC_ERROR;
819
- enum edhoc_error_code error_code_recv =
820
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
821
-
822
- /**
823
- * \brief Setup initiator context.
824
- */
825
- struct edhoc_context init_ctx = { 0 };
826
- struct edhoc_connection_id init_cid = {
827
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
828
- .int_value = (int8_t)C_I[0],
829
- };
830
-
831
- ret = edhoc_context_init(&init_ctx);
832
- assert(EDHOC_SUCCESS == ret);
833
- init_ctx.logger = print_array;
834
-
835
- ret = edhoc_set_method(&init_ctx, METHOD);
836
- assert(EDHOC_SUCCESS == ret);
837
-
838
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
839
- assert(EDHOC_SUCCESS == ret);
840
-
841
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
842
- assert(EDHOC_SUCCESS == ret);
843
-
844
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
845
- assert(EDHOC_SUCCESS == ret);
846
-
847
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto_mocked_init);
848
- assert(EDHOC_SUCCESS == ret);
849
-
850
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
851
- assert(EDHOC_SUCCESS == ret);
852
-
853
- /**
854
- * \brief Setup responder context.
855
- */
856
- struct edhoc_context resp_ctx = { 0 };
857
- struct edhoc_connection_id resp_cid = {
858
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
859
- .bstr_length = ARRAY_SIZE(C_R),
860
- };
861
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
862
-
863
- ret = edhoc_context_init(&resp_ctx);
864
- assert(EDHOC_SUCCESS == ret);
865
- resp_ctx.logger = print_array;
866
-
867
- ret = edhoc_set_method(&resp_ctx, METHOD);
868
- assert(EDHOC_SUCCESS == ret);
869
-
870
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
871
- assert(EDHOC_SUCCESS == ret);
872
-
873
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
874
- assert(EDHOC_SUCCESS == ret);
875
-
876
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
877
- assert(EDHOC_SUCCESS == ret);
878
-
879
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto_mocked_resp);
880
- assert(EDHOC_SUCCESS == ret);
881
-
882
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
883
- assert(EDHOC_SUCCESS == ret);
884
-
885
- /**
886
- * \brief One buffer for whole EDHOC handshake.
887
- */
888
- uint8_t buffer[200] = { 0 };
889
-
890
- /**
891
- * \brief EDHOC message 1 compose.
892
- */
893
- memset(buffer, 0, sizeof(buffer));
894
- size_t msg_1_len = 0;
895
- uint8_t *msg_1 = buffer;
896
-
897
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
898
- &msg_1_len);
899
-
900
- assert(EDHOC_SUCCESS == ret);
901
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
902
- assert(false == init_ctx.is_oscore_export_allowed);
903
-
904
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
905
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
906
- assert(EDHOC_SUCCESS == ret);
907
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
908
-
909
- assert(ARRAY_SIZE(message_1) == msg_1_len);
910
- assert(0 == memcmp(message_1, msg_1, msg_1_len));
911
-
912
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
913
- assert(0 == init_ctx.prk_len);
914
-
915
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
916
- assert(ARRAY_SIZE(H_message_1) == init_ctx.th_len);
917
- assert(0 == memcmp(H_message_1, init_ctx.th, init_ctx.th_len));
918
-
919
- assert(ARRAY_SIZE(X) == init_ctx.dh_priv_key_len);
920
- assert(0 == memcmp(X, init_ctx.dh_priv_key, init_ctx.dh_priv_key_len));
921
-
922
- /**
923
- * \brief EDHOC message 1 process.
924
- */
925
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
926
-
927
- assert(EDHOC_SUCCESS == ret);
928
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
929
- assert(false == resp_ctx.is_oscore_export_allowed);
930
-
931
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
932
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
933
- assert(EDHOC_SUCCESS == ret);
934
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
935
-
936
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
937
- assert(ARRAY_SIZE(H_message_1) == resp_ctx.th_len);
938
- assert(0 == memcmp(H_message_1, resp_ctx.th, resp_ctx.th_len));
939
-
940
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
941
- assert(0 == resp_ctx.prk_len);
942
-
943
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
944
- resp_ctx.peer_cid.encode_type);
945
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
946
-
947
- assert(ARRAY_SIZE(G_X) == resp_ctx.dh_peer_pub_key_len);
948
- assert(0 == memcmp(G_X, resp_ctx.dh_peer_pub_key,
949
- resp_ctx.dh_peer_pub_key_len));
950
-
951
- /**
952
- * \brief EDHOC message 2 compose.
953
- */
954
- memset(buffer, 0, sizeof(buffer));
955
- size_t msg_2_len = 0;
956
- uint8_t *msg_2 = buffer;
957
-
958
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
959
- &msg_2_len);
960
-
961
- assert(EDHOC_SUCCESS == ret);
962
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
963
- assert(false == resp_ctx.is_oscore_export_allowed);
964
-
965
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
966
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
967
- assert(EDHOC_SUCCESS == ret);
968
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
969
-
970
- assert(ARRAY_SIZE(message_2) == msg_2_len);
971
- assert(0 == memcmp(message_2, msg_2, msg_2_len));
972
-
973
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
974
- assert(ARRAY_SIZE(TH_3) == resp_ctx.th_len);
975
- assert(0 == memcmp(TH_3, resp_ctx.th, resp_ctx.th_len));
976
-
977
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
978
- assert(ARRAY_SIZE(PRK_3e2m) == resp_ctx.prk_len);
979
- assert(0 == memcmp(PRK_3e2m, resp_ctx.prk, resp_ctx.prk_len));
980
-
981
- assert(ARRAY_SIZE(G_XY) == resp_ctx.dh_secret_len);
982
- assert(0 == memcmp(G_XY, resp_ctx.dh_secret, resp_ctx.dh_secret_len));
983
-
984
- /**
985
- * \brief EDHOC message 2 process.
986
- */
987
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
988
-
989
- assert(EDHOC_SUCCESS == ret);
990
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
991
-
992
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
993
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
994
- assert(EDHOC_SUCCESS == ret);
995
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
996
-
997
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
998
- assert(ARRAY_SIZE(TH_3) == init_ctx.th_len);
999
- assert(0 == memcmp(TH_3, init_ctx.th, init_ctx.th_len));
1000
- assert(false == init_ctx.is_oscore_export_allowed);
1001
-
1002
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
1003
- assert(ARRAY_SIZE(PRK_3e2m) == init_ctx.prk_len);
1004
- assert(0 == memcmp(PRK_3e2m, init_ctx.prk, init_ctx.prk_len));
1005
-
1006
- assert(ARRAY_SIZE(G_XY) == init_ctx.dh_secret_len);
1007
- assert(0 == memcmp(G_XY, init_ctx.dh_secret, init_ctx.dh_secret_len));
1008
-
1009
- assert(EDHOC_CID_TYPE_BYTE_STRING == init_ctx.peer_cid.encode_type);
1010
- assert(ARRAY_SIZE(C_R) == init_ctx.peer_cid.bstr_length);
1011
- assert(0 == memcmp(C_R, init_ctx.peer_cid.bstr_value,
1012
- init_ctx.peer_cid.bstr_length));
1013
-
1014
- /**
1015
- * \brief EDHOC message 3 compose.
1016
- */
1017
- memset(buffer, 0, sizeof(buffer));
1018
- size_t msg_3_len = 0;
1019
- uint8_t *msg_3 = buffer;
1020
-
1021
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
1022
- &msg_3_len);
1023
-
1024
- assert(EDHOC_SUCCESS == ret);
1025
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
1026
- assert(true == init_ctx.is_oscore_export_allowed);
1027
-
1028
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1029
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1030
- assert(EDHOC_SUCCESS == ret);
1031
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1032
-
1033
- assert(ARRAY_SIZE(message_3) == msg_3_len);
1034
- assert(0 == memcmp(message_3, msg_3, msg_3_len));
1035
-
1036
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1037
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
1038
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
1039
-
1040
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1041
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
1042
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
1043
-
1044
- /**
1045
- * \brief EDHOC message 3 process.
1046
- */
1047
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
1048
-
1049
- assert(EDHOC_SUCCESS == ret);
1050
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
1051
- assert(true == resp_ctx.is_oscore_export_allowed);
1052
-
1053
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1054
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1055
- assert(EDHOC_SUCCESS == ret);
1056
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1057
-
1058
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1059
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
1060
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
1061
-
1062
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1063
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
1064
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
1065
-
1066
- /**
1067
- * \brief EDHOC message 4 compose.
1068
- */
1069
- memset(buffer, 0, sizeof(buffer));
1070
- size_t msg_4_len = 0;
1071
- uint8_t *msg_4 = buffer;
1072
-
1073
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
1074
- &msg_4_len);
1075
-
1076
- assert(EDHOC_SUCCESS == ret);
1077
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1078
- assert(true == resp_ctx.is_oscore_export_allowed);
1079
-
1080
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1081
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1082
- assert(EDHOC_SUCCESS == ret);
1083
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1084
-
1085
- assert(ARRAY_SIZE(message_4) == msg_4_len);
1086
- assert(0 == memcmp(message_4, msg_4, msg_4_len));
1087
-
1088
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1089
- assert(ARRAY_SIZE(TH_4) == resp_ctx.th_len);
1090
- assert(0 == memcmp(TH_4, resp_ctx.th, resp_ctx.th_len));
1091
-
1092
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1093
- assert(ARRAY_SIZE(PRK_4e3m) == resp_ctx.prk_len);
1094
- assert(0 == memcmp(PRK_4e3m, resp_ctx.prk, resp_ctx.prk_len));
1095
-
1096
- /**
1097
- * \brief EDHOC message 4 process.
1098
- */
1099
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
1100
-
1101
- assert(EDHOC_SUCCESS == ret);
1102
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1103
- assert(true == init_ctx.is_oscore_export_allowed);
1104
-
1105
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1106
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1107
- assert(EDHOC_SUCCESS == ret);
1108
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1109
-
1110
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1111
- assert(ARRAY_SIZE(TH_4) == init_ctx.th_len);
1112
- assert(0 == memcmp(TH_4, init_ctx.th, init_ctx.th_len));
1113
-
1114
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1115
- assert(ARRAY_SIZE(PRK_4e3m) == init_ctx.prk_len);
1116
- assert(0 == memcmp(PRK_4e3m, init_ctx.prk, init_ctx.prk_len));
1117
-
1118
- /**
1119
- * \brief Initiator - derive OSCORE secret & salt.
1120
- */
1121
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1122
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1123
- size_t init_sender_id_len = 0;
1124
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
1125
- size_t init_recipient_id_len = 0;
1126
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
1127
-
1128
- ret = edhoc_export_oscore_session(
1129
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1130
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1131
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1132
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1133
- &init_recipient_id_len);
1134
-
1135
- assert(EDHOC_SUCCESS == ret);
1136
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1137
- assert(false == init_ctx.is_oscore_export_allowed);
1138
-
1139
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1140
- assert(ARRAY_SIZE(PRK_out) == init_ctx.prk_len);
1141
- assert(0 == memcmp(PRK_out, init_ctx.prk, init_ctx.prk_len));
1142
-
1143
- /**
1144
- * \brief Responder - derive OSCORE secret & salt.
1145
- */
1146
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1147
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1148
- size_t resp_sender_id_len = 0;
1149
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
1150
- size_t resp_recipient_id_len = 0;
1151
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
1152
-
1153
- ret = edhoc_export_oscore_session(
1154
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1155
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1156
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1157
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1158
- &resp_recipient_id_len);
1159
-
1160
- assert(EDHOC_SUCCESS == ret);
1161
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1162
- assert(false == resp_ctx.is_oscore_export_allowed);
1163
-
1164
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1165
- assert(ARRAY_SIZE(PRK_out) == resp_ctx.prk_len);
1166
- assert(0 == memcmp(PRK_out, resp_ctx.prk, resp_ctx.prk_len));
1167
-
1168
- /**
1169
- * \brief Verify OSCORE master secret.
1170
- */
1171
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1172
- sizeof(resp_master_secret)));
1173
- assert(0 == memcmp(OSCORE_Master_Secret, init_master_secret,
1174
- sizeof(init_master_secret)));
1175
- assert(0 == memcmp(OSCORE_Master_Secret, resp_master_secret,
1176
- sizeof(resp_master_secret)));
1177
-
1178
- /**
1179
- * \brief Verify OSCORE master salt.
1180
- */
1181
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1182
- sizeof(resp_master_salt)));
1183
- assert(0 == memcmp(OSCORE_Master_Salt, init_master_salt,
1184
- sizeof(init_master_salt)));
1185
- assert(0 == memcmp(OSCORE_Master_Salt, resp_master_salt,
1186
- sizeof(resp_master_salt)));
1187
-
1188
- /**
1189
- * \brief Verify OSCORE sender and recipient identifiers shared by initiator.
1190
- */
1191
- assert(ARRAY_SIZE(C_I) == init_recipient_id_len);
1192
- assert(0 == memcmp(C_I, init_recipient_id, init_recipient_id_len));
1193
- assert(ARRAY_SIZE(C_I) == resp_sender_id_len);
1194
- assert(0 == memcmp(C_I, resp_sender_id, resp_sender_id_len));
1195
-
1196
- /**
1197
- * \brief Verify OSCORE sender and recipient identifiers shared by responder.
1198
- */
1199
- assert(ARRAY_SIZE(C_R) == init_sender_id_len);
1200
- assert(0 == memcmp(C_R, init_sender_id, init_sender_id_len));
1201
- assert(ARRAY_SIZE(C_R) == resp_recipient_id_len);
1202
- assert(0 == memcmp(C_R, resp_recipient_id, resp_recipient_id_len));
1203
-
1204
- /**
1205
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1206
- */
1207
- assert(init_sender_id_len == resp_recipient_id_len);
1208
- assert(0 ==
1209
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1210
- assert(init_recipient_id_len == resp_sender_id_len);
1211
- assert(0 ==
1212
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1213
-
1214
- /**
1215
- * \brief Initiator - perform EDHOC key update.
1216
- */
1217
- ret = edhoc_export_key_update(&init_ctx, keyUpdate_context,
1218
- ARRAY_SIZE(keyUpdate_context));
1219
-
1220
- assert(EDHOC_SUCCESS == ret);
1221
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1222
- assert(true == init_ctx.is_oscore_export_allowed);
1223
-
1224
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1225
- assert(ARRAY_SIZE(keyUpdate_PRK_out) == init_ctx.prk_len);
1226
- assert(0 == memcmp(keyUpdate_PRK_out, init_ctx.prk, init_ctx.prk_len));
1227
-
1228
- /**
1229
- * \brief Responder - perform EDHOC key update.
1230
- */
1231
- ret = edhoc_export_key_update(&resp_ctx, keyUpdate_context,
1232
- ARRAY_SIZE(keyUpdate_context));
1233
-
1234
- assert(EDHOC_SUCCESS == ret);
1235
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1236
- assert(true == resp_ctx.is_oscore_export_allowed);
1237
-
1238
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1239
- assert(ARRAY_SIZE(keyUpdate_PRK_out) == resp_ctx.prk_len);
1240
- assert(0 == memcmp(keyUpdate_PRK_out, resp_ctx.prk, resp_ctx.prk_len));
1241
-
1242
- /**
1243
- * \brief Initiator - derive OSCORE secret & salt.
1244
- */
1245
- memset(init_master_secret, 0, sizeof(init_master_secret));
1246
- memset(init_master_salt, 0, sizeof(init_master_salt));
1247
- init_sender_id_len = 0;
1248
- memset(init_sender_id, 0, sizeof(init_sender_id));
1249
- init_recipient_id_len = 0;
1250
- memset(init_recipient_id, 0, sizeof(init_recipient_id));
1251
-
1252
- ret = edhoc_export_oscore_session(
1253
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1254
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1255
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1256
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1257
- &init_recipient_id_len);
1258
-
1259
- assert(EDHOC_SUCCESS == ret);
1260
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1261
- assert(false == init_ctx.is_oscore_export_allowed);
1262
-
1263
- /**
1264
- * \brief Responder - derive OSCORE secret & salt.
1265
- */
1266
- memset(resp_master_secret, 0, sizeof(resp_master_secret));
1267
- memset(resp_master_salt, 0, sizeof(resp_master_salt));
1268
- resp_sender_id_len = 0;
1269
- memset(resp_sender_id, 0, sizeof(resp_sender_id));
1270
- resp_recipient_id_len = 0;
1271
- memset(resp_recipient_id, 0, sizeof(resp_recipient_id));
1272
-
1273
- ret = edhoc_export_oscore_session(
1274
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1275
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1276
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1277
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1278
- &resp_recipient_id_len);
1279
-
1280
- assert(EDHOC_SUCCESS == ret);
1281
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1282
- assert(false == resp_ctx.is_oscore_export_allowed);
1283
-
1284
- /**
1285
- * \brief Verify OSCORE master secret.
1286
- */
1287
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1288
- sizeof(resp_master_secret)));
1289
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Secret, init_master_secret,
1290
- sizeof(init_master_secret)));
1291
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Secret, resp_master_secret,
1292
- sizeof(resp_master_secret)));
1293
-
1294
- /**
1295
- * \brief Verify OSCORE master salt.
1296
- */
1297
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1298
- sizeof(resp_master_salt)));
1299
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Salt, init_master_salt,
1300
- sizeof(init_master_salt)));
1301
- assert(0 == memcmp(keyUpdate_OSCORE_Master_Salt, resp_master_salt,
1302
- sizeof(resp_master_salt)));
1303
-
1304
- /**
1305
- * \brief Verify OSCORE sender and recipient identifiers shared by initiator.
1306
- */
1307
- assert(ARRAY_SIZE(C_I) == init_recipient_id_len);
1308
- assert(0 == memcmp(C_I, init_recipient_id, init_recipient_id_len));
1309
- assert(ARRAY_SIZE(C_I) == resp_sender_id_len);
1310
- assert(0 == memcmp(C_I, resp_sender_id, resp_sender_id_len));
1311
-
1312
- /**
1313
- * \brief Verify OSCORE sender and recipient identifiers shared by responder.
1314
- */
1315
- assert(ARRAY_SIZE(C_R) == init_sender_id_len);
1316
- assert(0 == memcmp(C_R, init_sender_id, init_sender_id_len));
1317
- assert(ARRAY_SIZE(C_R) == resp_recipient_id_len);
1318
- assert(0 == memcmp(C_R, resp_recipient_id, resp_recipient_id_len));
1319
-
1320
- /**
1321
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1322
- */
1323
- assert(init_sender_id_len == resp_recipient_id_len);
1324
- assert(0 ==
1325
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1326
- assert(init_recipient_id_len == resp_sender_id_len);
1327
- assert(0 ==
1328
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1329
-
1330
- /**
1331
- * \brief Clean up of EDHOC context's.
1332
- */
1333
- ret = edhoc_context_deinit(&init_ctx);
1334
- assert(EDHOC_SUCCESS == ret);
1335
-
1336
- ret = edhoc_context_deinit(&resp_ctx);
1337
- assert(EDHOC_SUCCESS == ret);
1338
- }
1339
-
1340
- void test_edhoc_handshake_1_e2e_real_crypto(void)
1341
- {
1342
- int ret = EDHOC_ERROR_GENERIC_ERROR;
1343
- enum edhoc_error_code error_code_recv =
1344
- EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1345
-
1346
- /**
1347
- * \brief Setup initiator context.
1348
- */
1349
- struct edhoc_context init_ctx = { 0 };
1350
- struct edhoc_connection_id init_cid = {
1351
- .encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER,
1352
- .int_value = (int8_t)C_I[0],
1353
- };
1354
-
1355
- ret = edhoc_context_init(&init_ctx);
1356
- assert(EDHOC_SUCCESS == ret);
1357
- init_ctx.logger = print_array;
1358
-
1359
- ret = edhoc_set_method(&init_ctx, METHOD);
1360
- assert(EDHOC_SUCCESS == ret);
1361
-
1362
- ret = edhoc_set_cipher_suites(&init_ctx, &edhoc_cipher_suite_0, 1);
1363
- assert(EDHOC_SUCCESS == ret);
1364
-
1365
- ret = edhoc_set_connection_id(&init_ctx, init_cid);
1366
- assert(EDHOC_SUCCESS == ret);
1367
-
1368
- ret = edhoc_bind_keys(&init_ctx, edhoc_keys);
1369
- assert(EDHOC_SUCCESS == ret);
1370
-
1371
- ret = edhoc_bind_crypto(&init_ctx, edhoc_crypto);
1372
- assert(EDHOC_SUCCESS == ret);
1373
-
1374
- ret = edhoc_bind_credentials(&init_ctx, edhoc_auth_cred_mocked_init);
1375
- assert(EDHOC_SUCCESS == ret);
1376
-
1377
- /**
1378
- * \brief Setup responder context.
1379
- */
1380
- struct edhoc_context resp_ctx = { 0 };
1381
- struct edhoc_connection_id resp_cid = {
1382
- .encode_type = EDHOC_CID_TYPE_BYTE_STRING,
1383
- .bstr_length = ARRAY_SIZE(C_R),
1384
- };
1385
- memcpy(resp_cid.bstr_value, C_R, ARRAY_SIZE(C_R));
1386
-
1387
- ret = edhoc_context_init(&resp_ctx);
1388
- assert(EDHOC_SUCCESS == ret);
1389
- resp_ctx.logger = print_array;
1390
-
1391
- ret = edhoc_set_method(&resp_ctx, METHOD);
1392
- assert(EDHOC_SUCCESS == ret);
1393
-
1394
- ret = edhoc_set_cipher_suites(&resp_ctx, &edhoc_cipher_suite_0, 1);
1395
- assert(EDHOC_SUCCESS == ret);
1396
-
1397
- ret = edhoc_set_connection_id(&resp_ctx, resp_cid);
1398
- assert(EDHOC_SUCCESS == ret);
1399
-
1400
- ret = edhoc_bind_keys(&resp_ctx, edhoc_keys);
1401
- assert(EDHOC_SUCCESS == ret);
1402
-
1403
- ret = edhoc_bind_crypto(&resp_ctx, edhoc_crypto);
1404
- assert(EDHOC_SUCCESS == ret);
1405
-
1406
- ret = edhoc_bind_credentials(&resp_ctx, edhoc_auth_cred_mocked_resp);
1407
- assert(EDHOC_SUCCESS == ret);
1408
-
1409
- /**
1410
- * \brief One buffer for whole EDHOC handshake.
1411
- */
1412
- uint8_t buffer[200] = { 0 };
1413
-
1414
- /**
1415
- * \brief EDHOC message 1 compose.
1416
- */
1417
- memset(buffer, 0, sizeof(buffer));
1418
- size_t msg_1_len = 0;
1419
- uint8_t *msg_1 = buffer;
1420
-
1421
- ret = edhoc_message_1_compose(&init_ctx, msg_1, ARRAY_SIZE(buffer),
1422
- &msg_1_len);
1423
- assert(EDHOC_SUCCESS == ret);
1424
- assert(EDHOC_SM_WAIT_M2 == init_ctx.status);
1425
- assert(false == init_ctx.is_oscore_export_allowed);
1426
- assert(EDHOC_PRK_STATE_INVALID == init_ctx.prk_state);
1427
- assert(EDHOC_TH_STATE_1 == init_ctx.th_state);
1428
-
1429
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1430
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1431
- assert(EDHOC_SUCCESS == ret);
1432
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1433
-
1434
- /**
1435
- * \brief EDHOC message 1 process.
1436
- */
1437
- ret = edhoc_message_1_process(&resp_ctx, msg_1, msg_1_len);
1438
- assert(EDHOC_SUCCESS == ret);
1439
- assert(EDHOC_SM_RECEIVED_M1 == resp_ctx.status);
1440
- assert(false == resp_ctx.is_oscore_export_allowed);
1441
- assert(EDHOC_TH_STATE_1 == resp_ctx.th_state);
1442
- assert(EDHOC_PRK_STATE_INVALID == resp_ctx.prk_state);
1443
-
1444
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1445
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1446
- assert(EDHOC_SUCCESS == ret);
1447
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1448
-
1449
- assert(EDHOC_CID_TYPE_ONE_BYTE_INTEGER ==
1450
- resp_ctx.peer_cid.encode_type);
1451
- assert((int8_t)C_I[0] == resp_ctx.peer_cid.int_value);
1452
-
1453
- /**
1454
- * \brief EDHOC message 2 compose.
1455
- */
1456
- memset(buffer, 0, sizeof(buffer));
1457
- size_t msg_2_len = 0;
1458
- uint8_t *msg_2 = buffer;
1459
-
1460
- ret = edhoc_message_2_compose(&resp_ctx, msg_2, ARRAY_SIZE(buffer),
1461
- &msg_2_len);
1462
- assert(EDHOC_SUCCESS == ret);
1463
- assert(EDHOC_SM_WAIT_M3 == resp_ctx.status);
1464
- assert(false == resp_ctx.is_oscore_export_allowed);
1465
- assert(EDHOC_TH_STATE_3 == resp_ctx.th_state);
1466
- assert(EDHOC_PRK_STATE_3E2M == resp_ctx.prk_state);
1467
-
1468
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1469
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1470
- assert(EDHOC_SUCCESS == ret);
1471
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1472
-
1473
- /**
1474
- * \brief EDHOC message 2 process.
1475
- */
1476
- ret = edhoc_message_2_process(&init_ctx, msg_2, msg_2_len);
1477
-
1478
- assert(EDHOC_SUCCESS == ret);
1479
- assert(EDHOC_SM_VERIFIED_M2 == init_ctx.status);
1480
- assert(false == init_ctx.is_oscore_export_allowed);
1481
- assert(EDHOC_TH_STATE_3 == init_ctx.th_state);
1482
- assert(EDHOC_PRK_STATE_3E2M == init_ctx.prk_state);
1483
-
1484
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1485
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1486
- assert(EDHOC_SUCCESS == ret);
1487
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1488
-
1489
- assert(EDHOC_CID_TYPE_BYTE_STRING == init_ctx.peer_cid.encode_type);
1490
- assert(ARRAY_SIZE(C_R) == init_ctx.peer_cid.bstr_length);
1491
- assert(0 == memcmp(C_R, init_ctx.peer_cid.bstr_value,
1492
- init_ctx.peer_cid.bstr_length));
1493
-
1494
- /**
1495
- * \brief Verify ephemeral DH key agreement.
1496
- */
1497
- assert(DH_KEY_AGREEMENT_LENGTH == init_ctx.dh_secret_len);
1498
- assert(DH_KEY_AGREEMENT_LENGTH == resp_ctx.dh_secret_len);
1499
- assert(init_ctx.dh_secret_len == resp_ctx.dh_secret_len);
1500
- assert(0 == memcmp(init_ctx.dh_secret, resp_ctx.dh_secret,
1501
- DH_KEY_AGREEMENT_LENGTH));
1502
-
1503
- /**
1504
- * \brief EDHOC message 3 compose.
1505
- */
1506
- memset(buffer, 0, sizeof(buffer));
1507
- size_t msg_3_len = 0;
1508
- uint8_t *msg_3 = buffer;
1509
-
1510
- ret = edhoc_message_3_compose(&init_ctx, msg_3, ARRAY_SIZE(buffer),
1511
- &msg_3_len);
1512
-
1513
- assert(EDHOC_SUCCESS == ret);
1514
- assert(EDHOC_SM_COMPLETED == init_ctx.status);
1515
- assert(true == init_ctx.is_oscore_export_allowed);
1516
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1517
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1518
-
1519
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1520
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1521
- assert(EDHOC_SUCCESS == ret);
1522
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1523
-
1524
- /**
1525
- * \brief EDHOC message 3 process.
1526
- */
1527
- ret = edhoc_message_3_process(&resp_ctx, msg_3, msg_3_len);
1528
-
1529
- assert(EDHOC_SUCCESS == ret);
1530
- assert(EDHOC_SM_COMPLETED == resp_ctx.status);
1531
- assert(true == resp_ctx.is_oscore_export_allowed);
1532
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1533
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1534
-
1535
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1536
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1537
- assert(EDHOC_SUCCESS == ret);
1538
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1539
-
1540
- /**
1541
- * \brief EDHOC message 4 compose.
1542
- */
1543
- memset(buffer, 0, sizeof(buffer));
1544
- size_t msg_4_len = 0;
1545
- uint8_t *msg_4 = buffer;
1546
-
1547
- ret = edhoc_message_4_compose(&resp_ctx, msg_4, ARRAY_SIZE(buffer),
1548
- &msg_4_len);
1549
-
1550
- assert(EDHOC_SUCCESS == ret);
1551
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1552
- assert(true == resp_ctx.is_oscore_export_allowed);
1553
- assert(EDHOC_TH_STATE_4 == resp_ctx.th_state);
1554
- assert(EDHOC_PRK_STATE_4E3M == resp_ctx.prk_state);
1555
-
1556
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1557
- ret = edhoc_error_get_code(&resp_ctx, &error_code_recv);
1558
- assert(EDHOC_SUCCESS == ret);
1559
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1560
-
1561
- /**
1562
- * \brief EDHOC message 3 process.
1563
- */
1564
- ret = edhoc_message_4_process(&init_ctx, msg_4, msg_4_len);
1565
-
1566
- assert(EDHOC_SUCCESS == ret);
1567
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1568
- assert(true == init_ctx.is_oscore_export_allowed);
1569
- assert(EDHOC_TH_STATE_4 == init_ctx.th_state);
1570
- assert(EDHOC_PRK_STATE_4E3M == init_ctx.prk_state);
1571
-
1572
- error_code_recv = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
1573
- ret = edhoc_error_get_code(&init_ctx, &error_code_recv);
1574
- assert(EDHOC_SUCCESS == ret);
1575
- assert(EDHOC_ERROR_CODE_SUCCESS == error_code_recv);
1576
-
1577
- /**
1578
- * \brief Initiator - derive OSCORE secret & salt.
1579
- */
1580
- uint8_t init_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1581
- uint8_t init_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1582
- size_t init_sender_id_len = 0;
1583
- uint8_t init_sender_id[ARRAY_SIZE(C_R)] = { 0 };
1584
- size_t init_recipient_id_len = 0;
1585
- uint8_t init_recipient_id[ARRAY_SIZE(C_I)] = { 0 };
1586
-
1587
- ret = edhoc_export_oscore_session(
1588
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1589
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1590
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1591
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1592
- &init_recipient_id_len);
1593
- assert(EDHOC_SUCCESS == ret);
1594
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1595
- assert(false == init_ctx.is_oscore_export_allowed);
1596
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1597
-
1598
- /**
1599
- * \brief Responder - derive OSCORE secret & salt.
1600
- */
1601
- uint8_t resp_master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1602
- uint8_t resp_master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1603
- size_t resp_sender_id_len = 0;
1604
- uint8_t resp_sender_id[ARRAY_SIZE(C_I)] = { 0 };
1605
- size_t resp_recipient_id_len = 0;
1606
- uint8_t resp_recipient_id[ARRAY_SIZE(C_R)] = { 0 };
1607
-
1608
- ret = edhoc_export_oscore_session(
1609
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1610
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1611
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1612
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1613
- &resp_recipient_id_len);
1614
- assert(EDHOC_SUCCESS == ret);
1615
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1616
- assert(false == resp_ctx.is_oscore_export_allowed);
1617
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1618
-
1619
- /**
1620
- * \brief Verify OSCORE master secret:
1621
- */
1622
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1623
- sizeof(resp_master_secret)));
1624
-
1625
- /**
1626
- * \brief Verify OSCORE master salt:
1627
- */
1628
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1629
- sizeof(resp_master_salt)));
1630
-
1631
- /**
1632
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1633
- */
1634
- assert(init_sender_id_len == resp_recipient_id_len);
1635
- assert(0 ==
1636
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1637
- assert(init_recipient_id_len == resp_sender_id_len);
1638
- assert(0 ==
1639
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1640
-
1641
- /**
1642
- * \brief Initiator - perform EDHOC key update.
1643
- */
1644
- ret = edhoc_export_key_update(&init_ctx, keyUpdate_context,
1645
- ARRAY_SIZE(keyUpdate_context));
1646
- assert(EDHOC_SUCCESS == ret);
1647
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1648
- assert(true == init_ctx.is_oscore_export_allowed);
1649
-
1650
- /**
1651
- * \brief Responder - perform EDHOC key update.
1652
- */
1653
- ret = edhoc_export_key_update(&resp_ctx, keyUpdate_context,
1654
- ARRAY_SIZE(keyUpdate_context));
1655
- assert(EDHOC_SUCCESS == ret);
1656
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1657
- assert(true == resp_ctx.is_oscore_export_allowed);
1658
-
1659
- /**
1660
- * \brief Verify new PRK_out.
1661
- */
1662
- assert(init_ctx.prk_state == resp_ctx.prk_state);
1663
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1664
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1665
-
1666
- assert(init_ctx.prk_len == resp_ctx.prk_len);
1667
- assert(0 == memcmp(init_ctx.prk, resp_ctx.prk, resp_ctx.prk_len));
1668
-
1669
- /**
1670
- * \brief Initiator - derive OSCORE secret & salt.
1671
- */
1672
- memset(init_master_secret, 0, sizeof(init_master_secret));
1673
- memset(init_master_salt, 0, sizeof(init_master_salt));
1674
- init_sender_id_len = 0;
1675
- memset(init_sender_id, 0, sizeof(init_sender_id));
1676
- init_recipient_id_len = 0;
1677
- memset(init_recipient_id, 0, sizeof(init_recipient_id));
1678
-
1679
- ret = edhoc_export_oscore_session(
1680
- &init_ctx, init_master_secret, ARRAY_SIZE(init_master_secret),
1681
- init_master_salt, ARRAY_SIZE(init_master_salt), init_sender_id,
1682
- ARRAY_SIZE(init_sender_id), &init_sender_id_len,
1683
- init_recipient_id, ARRAY_SIZE(init_recipient_id),
1684
- &init_recipient_id_len);
1685
- assert(EDHOC_SUCCESS == ret);
1686
- assert(EDHOC_SM_PERSISTED == init_ctx.status);
1687
- assert(false == init_ctx.is_oscore_export_allowed);
1688
- assert(EDHOC_PRK_STATE_OUT == init_ctx.prk_state);
1689
-
1690
- /**
1691
- * \brief Responder - derive OSCORE secret & salt.
1692
- */
1693
- memset(resp_master_secret, 0, sizeof(resp_master_secret));
1694
- memset(resp_master_salt, 0, sizeof(resp_master_salt));
1695
- resp_sender_id_len = 0;
1696
- memset(resp_sender_id, 0, sizeof(resp_sender_id));
1697
- resp_recipient_id_len = 0;
1698
- memset(resp_recipient_id, 0, sizeof(resp_recipient_id));
1699
-
1700
- ret = edhoc_export_oscore_session(
1701
- &resp_ctx, resp_master_secret, ARRAY_SIZE(resp_master_secret),
1702
- resp_master_salt, ARRAY_SIZE(resp_master_salt), resp_sender_id,
1703
- ARRAY_SIZE(resp_sender_id), &resp_sender_id_len,
1704
- resp_recipient_id, ARRAY_SIZE(resp_recipient_id),
1705
- &resp_recipient_id_len);
1706
- assert(EDHOC_SUCCESS == ret);
1707
- assert(EDHOC_SM_PERSISTED == resp_ctx.status);
1708
- assert(false == resp_ctx.is_oscore_export_allowed);
1709
- assert(EDHOC_PRK_STATE_OUT == resp_ctx.prk_state);
1710
-
1711
- /**
1712
- * \brief Verify OSCORE master secret:
1713
- */
1714
- assert(0 == memcmp(init_master_secret, resp_master_secret,
1715
- sizeof(resp_master_secret)));
1716
-
1717
- /**
1718
- * \brief Verify OSCORE master salt:
1719
- */
1720
- assert(0 == memcmp(init_master_salt, resp_master_salt,
1721
- sizeof(resp_master_salt)));
1722
-
1723
- /**
1724
- * \brief Verify OSCORE sender and recipient identifiers (cross check).
1725
- */
1726
- assert(init_sender_id_len == resp_recipient_id_len);
1727
- assert(0 ==
1728
- memcmp(init_sender_id, resp_recipient_id, init_sender_id_len));
1729
- assert(init_recipient_id_len == resp_sender_id_len);
1730
- assert(0 ==
1731
- memcmp(init_recipient_id, resp_sender_id, resp_sender_id_len));
1732
-
1733
- /**
1734
- * \brief Clean up of EDHOC context's.
1735
- */
1736
- ret = edhoc_context_deinit(&init_ctx);
1737
- assert(EDHOC_SUCCESS == ret);
1738
-
1739
- ret = edhoc_context_deinit(&resp_ctx);
1740
- assert(EDHOC_SUCCESS == ret);
1741
- }
1742
-
1743
- void test_edhoc_trace_1_prk_exporter(void)
1744
- {
1745
- int ret = EDHOC_ERROR_GENERIC_ERROR;
1746
-
1747
- /**
1748
- * \brief Setup EDHOC context.
1749
- */
1750
- struct edhoc_context ctx = { 0 };
1751
-
1752
- ret = edhoc_context_init(&ctx);
1753
- assert(EDHOC_SUCCESS == ret);
1754
- ctx.logger = print_array;
1755
-
1756
- ret = edhoc_set_cipher_suites(&ctx, &edhoc_cipher_suite_0, 1);
1757
- assert(EDHOC_SUCCESS == ret);
1758
-
1759
- ret = edhoc_bind_keys(&ctx, edhoc_keys);
1760
- assert(EDHOC_SUCCESS == ret);
1761
-
1762
- ret = edhoc_bind_crypto(&ctx, edhoc_crypto);
1763
- assert(EDHOC_SUCCESS == ret);
1764
-
1765
- /**
1766
- * \brief Required injections for EDHOC context.
1767
- */
1768
- ctx.status = EDHOC_SM_COMPLETED;
1769
-
1770
- ctx.th_state = EDHOC_TH_STATE_4;
1771
- ctx.th_len = ARRAY_SIZE(TH_4);
1772
- memcpy(ctx.th, TH_4, ARRAY_SIZE(TH_4));
1773
-
1774
- ctx.prk_state = EDHOC_PRK_STATE_4E3M;
1775
- ctx.prk_len = ARRAY_SIZE(PRK_4e3m);
1776
- memcpy(ctx.prk, PRK_4e3m, ARRAY_SIZE(PRK_4e3m));
1777
-
1778
- /**
1779
- * \brief Export OSCORE Master Secret.
1780
- */
1781
- uint8_t master_secret[ARRAY_SIZE(OSCORE_Master_Secret)] = { 0 };
1782
-
1783
- ret = edhoc_export_prk_exporter(&ctx,
1784
- OSCORE_EXTRACT_LABEL_MASTER_SECRET,
1785
- master_secret,
1786
- ARRAY_SIZE(master_secret));
1787
- assert(EDHOC_SUCCESS == ret);
1788
- assert(0 == memcmp(OSCORE_Master_Secret, master_secret,
1789
- ARRAY_SIZE(OSCORE_Master_Secret)));
1790
-
1791
- /**
1792
- * \brief Export OSCORE Master Salt.
1793
- */
1794
- uint8_t master_salt[ARRAY_SIZE(OSCORE_Master_Salt)] = { 0 };
1795
-
1796
- ret = edhoc_export_prk_exporter(&ctx, OSCORE_EXTRACT_LABEL_MASTER_SALT,
1797
- master_salt, ARRAY_SIZE(master_salt));
1798
- assert(EDHOC_SUCCESS == ret);
1799
- assert(0 == memcmp(OSCORE_Master_Salt, master_salt,
1800
- ARRAY_SIZE(OSCORE_Master_Salt)));
1801
-
1802
- /**
1803
- * \brief Export private usage secrets (label: minimum, middle, maximum).
1804
- */
1805
- uint8_t secret_1[13] = { 0 };
1806
- uint8_t secret_2[32] = { 0 };
1807
- uint8_t secret_3[64] = { 0 };
1808
-
1809
- ret = edhoc_export_prk_exporter(
1810
- &ctx, EDHOC_PRK_EXPORTER_PRIVATE_LABEL_MINIMUM, secret_1,
1811
- ARRAY_SIZE(secret_1));
1812
- assert(EDHOC_SUCCESS == ret);
1813
-
1814
- print_array(NULL, "Secret 1", secret_1, ARRAY_SIZE(secret_1));
1815
-
1816
- ret = edhoc_export_prk_exporter(
1817
- &ctx, EDHOC_PRK_EXPORTER_PRIVATE_LABEL_MAXIMUM, secret_2,
1818
- ARRAY_SIZE(secret_2));
1819
- assert(EDHOC_SUCCESS == ret);
1820
-
1821
- print_array(NULL, "Secret 2", secret_2, ARRAY_SIZE(secret_2));
1822
-
1823
- const size_t label = 45737;
1824
- ret = edhoc_export_prk_exporter(&ctx, label, secret_3,
1825
- ARRAY_SIZE(secret_3));
1826
- assert(EDHOC_SUCCESS == ret);
1827
-
1828
- print_array(NULL, "Secret 3", secret_3, ARRAY_SIZE(secret_3));
1829
- }