edhoc 1.3.3 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.clang-format +79 -0
- package/README.md +6 -5
- package/dist/cbor-utils.d.ts +30 -0
- package/dist/cbor-utils.d.ts.map +1 -0
- package/dist/cbor-utils.js +179 -0
- package/dist/cipher-suites.d.ts +13 -0
- package/dist/cipher-suites.d.ts.map +1 -0
- package/dist/cipher-suites.js +22 -0
- package/dist/edhoc.d.ts +85 -277
- package/dist/edhoc.d.ts.map +1 -1
- package/dist/edhoc.js +562 -34
- package/package.json +5 -19
- package/.gitmodules +0 -3
- package/binding.gyp +0 -66
- package/dist/bindings.d.ts +0 -5
- package/dist/bindings.d.ts.map +0 -1
- package/dist/bindings.js +0 -10
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +0 -102
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +0 -37
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +0 -38
- package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +0 -180
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +0 -216
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +0 -217
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +0 -54
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +0 -54
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +0 -71
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +0 -40
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +0 -16
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +0 -17
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +0 -70
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +0 -42
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/unity_config.h +0 -251
- package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +0 -44
- package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +0 -129
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +0 -310
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +0 -95
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +0 -51
- package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +0 -20
- package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +0 -40
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +0 -246
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +0 -33
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +0 -203
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +0 -61
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +0 -326
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +0 -50
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +0 -57
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +0 -17
- package/external/libedhoc/externals/Unity/src/unity.c +0 -2501
- package/external/libedhoc/externals/Unity/src/unity.h +0 -698
- package/external/libedhoc/externals/Unity/src/unity_internals.h +0 -1183
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +0 -61
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +0 -57
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +0 -55
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +0 -15
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +0 -80
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +0 -76
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +0 -75
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +0 -13
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +0 -77
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +0 -90
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +0 -58
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +0 -71
- package/external/libedhoc/externals/Unity/test/testdata/CException.h +0 -18
- package/external/libedhoc/externals/Unity/test/testdata/Defs.h +0 -16
- package/external/libedhoc/externals/Unity/test/testdata/cmock.h +0 -21
- package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +0 -20
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +0 -204
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +0 -73
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +0 -200
- package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +0 -151
- package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +0 -2941
- package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +0 -375
- package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +0 -1285
- package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +0 -1395
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +0 -2863
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +0 -783
- package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +0 -82
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +0 -309
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +0 -28
- package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +0 -330
- package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +0 -21
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +0 -126
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +0 -49
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +0 -323
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +0 -84
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +0 -171
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +0 -53
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +0 -330
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +0 -98
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +0 -226
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +0 -81
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +0 -230
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +0 -54
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +0 -46
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +0 -110
- package/external/libedhoc/externals/compact25519/src/compact_wipe.c +0 -12
- package/external/libedhoc/externals/compact25519/src/compact_wipe.h +0 -14
- package/external/libedhoc/externals/compact25519/src/compact_x25519.c +0 -68
- package/external/libedhoc/externals/compact25519/src/compact_x25519.h +0 -101
- package/external/libedhoc/externals/compact25519/test/pcg_random.h +0 -25
- package/external/libedhoc/externals/compact25519/test/run-all.c +0 -178
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +0 -234
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +0 -124
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +0 -280
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +0 -29
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +0 -204
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +0 -16
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +0 -46
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +0 -34
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +0 -57
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +0 -61
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +0 -5
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +0 -36
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +0 -31
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +0 -190
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +0 -760
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +0 -50
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +0 -413
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +0 -100
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +0 -805
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +0 -186
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +0 -1514
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +0 -135
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +0 -312
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +0 -219
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +0 -92
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +0 -83
- package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +0 -73
- package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +0 -106
- package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +0 -77
- package/external/libedhoc/externals/mbedtls/configs/config-thread.h +0 -76
- package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +0 -25
- package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +0 -136
- package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +0 -609
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +0 -54
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +0 -30
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +0 -19
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +0 -27
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +0 -37
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +0 -32
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +0 -31
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +0 -627
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +0 -341
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +0 -641
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +0 -389
- package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +0 -82
- package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +0 -1084
- package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +0 -146
- package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +0 -303
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +0 -518
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +0 -202
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +0 -342
- package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +0 -1206
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +0 -1183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +0 -246
- package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +0 -46
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +0 -183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +0 -877
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +0 -334
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +0 -76
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +0 -25
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +0 -55
- package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +0 -36
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +0 -564
- package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +0 -308
- package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +0 -385
- package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +0 -972
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +0 -441
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +0 -671
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +0 -298
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +0 -1362
- package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +0 -273
- package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +0 -370
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +0 -124
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +0 -434
- package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +0 -440
- package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +0 -4116
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +0 -640
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +0 -190
- package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +0 -299
- package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +0 -166
- package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +0 -722
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +0 -160
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +0 -1091
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +0 -186
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +0 -197
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +0 -241
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +0 -485
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +0 -79
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +0 -168
- package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +0 -104
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +0 -136
- package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +0 -1143
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +0 -219
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +0 -198
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +0 -172
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +0 -208
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +0 -5369
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +0 -187
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +0 -616
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +0 -106
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +0 -181
- package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +0 -94
- package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +0 -78
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +0 -550
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +0 -184
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +0 -1196
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +0 -319
- package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +0 -4685
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +0 -21
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +0 -91
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +0 -45
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +0 -210
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +0 -118
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +0 -114
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +0 -44
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +0 -151
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +0 -52
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +0 -2064
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +0 -88
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +0 -92
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +0 -1383
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +0 -1282
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +0 -460
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +0 -453
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +0 -2756
- package/external/libedhoc/externals/mbedtls/library/aes.c +0 -2315
- package/external/libedhoc/externals/mbedtls/library/aesce.c +0 -503
- package/external/libedhoc/externals/mbedtls/library/aesce.h +0 -121
- package/external/libedhoc/externals/mbedtls/library/aesni.c +0 -802
- package/external/libedhoc/externals/mbedtls/library/aesni.h +0 -158
- package/external/libedhoc/externals/mbedtls/library/alignment.h +0 -509
- package/external/libedhoc/externals/mbedtls/library/aria.c +0 -991
- package/external/libedhoc/externals/mbedtls/library/asn1parse.c +0 -467
- package/external/libedhoc/externals/mbedtls/library/asn1write.c +0 -436
- package/external/libedhoc/externals/mbedtls/library/base64.c +0 -299
- package/external/libedhoc/externals/mbedtls/library/base64_internal.h +0 -45
- package/external/libedhoc/externals/mbedtls/library/bignum.c +0 -2806
- package/external/libedhoc/externals/mbedtls/library/bignum_core.c +0 -894
- package/external/libedhoc/externals/mbedtls/library/bignum_core.h +0 -763
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +0 -394
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +0 -452
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +0 -276
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +0 -416
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +0 -34
- package/external/libedhoc/externals/mbedtls/library/bn_mul.h +0 -1094
- package/external/libedhoc/externals/mbedtls/library/camellia.c +0 -1044
- package/external/libedhoc/externals/mbedtls/library/ccm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/chacha20.c +0 -497
- package/external/libedhoc/externals/mbedtls/library/chachapoly.c +0 -478
- package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +0 -141
- package/external/libedhoc/externals/mbedtls/library/cipher.c +0 -1664
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +0 -2422
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/cmac.c +0 -1067
- package/external/libedhoc/externals/mbedtls/library/common.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/constant_time.c +0 -261
- package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +0 -554
- package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +0 -579
- package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +0 -881
- package/external/libedhoc/externals/mbedtls/library/debug.c +0 -465
- package/external/libedhoc/externals/mbedtls/library/des.c +0 -1042
- package/external/libedhoc/externals/mbedtls/library/dhm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/ecdh.c +0 -685
- package/external/libedhoc/externals/mbedtls/library/ecdsa.c +0 -867
- package/external/libedhoc/externals/mbedtls/library/ecjpake.c +0 -1216
- package/external/libedhoc/externals/mbedtls/library/ecp.c +0 -3631
- package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +0 -5467
- package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +0 -6043
- package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +0 -287
- package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/entropy.c +0 -676
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +0 -229
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +0 -64
- package/external/libedhoc/externals/mbedtls/library/error.c +0 -878
- package/external/libedhoc/externals/mbedtls/library/gcm.c +0 -1168
- package/external/libedhoc/externals/mbedtls/library/hkdf.c +0 -161
- package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +0 -633
- package/external/libedhoc/externals/mbedtls/library/lmots.c +0 -821
- package/external/libedhoc/externals/mbedtls/library/lmots.h +0 -311
- package/external/libedhoc/externals/mbedtls/library/lms.c +0 -779
- package/external/libedhoc/externals/mbedtls/library/md.c +0 -1108
- package/external/libedhoc/externals/mbedtls/library/md5.c +0 -426
- package/external/libedhoc/externals/mbedtls/library/md_psa.h +0 -63
- package/external/libedhoc/externals/mbedtls/library/md_wrap.h +0 -46
- package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +0 -745
- package/external/libedhoc/externals/mbedtls/library/mps_common.h +0 -181
- package/external/libedhoc/externals/mbedtls/library/mps_error.h +0 -89
- package/external/libedhoc/externals/mbedtls/library/mps_reader.c +0 -538
- package/external/libedhoc/externals/mbedtls/library/mps_reader.h +0 -366
- package/external/libedhoc/externals/mbedtls/library/mps_trace.c +0 -112
- package/external/libedhoc/externals/mbedtls/library/mps_trace.h +0 -154
- package/external/libedhoc/externals/mbedtls/library/net_sockets.c +0 -696
- package/external/libedhoc/externals/mbedtls/library/nist_kw.c +0 -725
- package/external/libedhoc/externals/mbedtls/library/oid.c +0 -1154
- package/external/libedhoc/externals/mbedtls/library/padlock.c +0 -155
- package/external/libedhoc/externals/mbedtls/library/padlock.h +0 -111
- package/external/libedhoc/externals/mbedtls/library/pem.c +0 -520
- package/external/libedhoc/externals/mbedtls/library/pk.c +0 -970
- package/external/libedhoc/externals/mbedtls/library/pk_internal.h +0 -118
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +0 -1834
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +0 -156
- package/external/libedhoc/externals/mbedtls/library/pkcs12.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/pkcs5.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/pkcs7.c +0 -773
- package/external/libedhoc/externals/mbedtls/library/pkparse.c +0 -1845
- package/external/libedhoc/externals/mbedtls/library/pkwrite.c +0 -836
- package/external/libedhoc/externals/mbedtls/library/pkwrite.h +0 -112
- package/external/libedhoc/externals/mbedtls/library/platform.c +0 -402
- package/external/libedhoc/externals/mbedtls/library/platform_util.c +0 -285
- package/external/libedhoc/externals/mbedtls/library/poly1305.c +0 -492
- package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +0 -8432
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +0 -653
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +0 -499
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +0 -590
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +0 -293
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +0 -67
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +0 -838
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +0 -52
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +0 -2871
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +0 -256
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +0 -31
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +0 -561
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +0 -267
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +0 -295
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +0 -470
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +0 -211
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +0 -70
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +0 -131
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +0 -264
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +0 -571
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +0 -159
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +0 -192
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +0 -727
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +0 -317
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +0 -373
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +0 -185
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +0 -559
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +0 -213
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +0 -481
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +0 -384
- package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +0 -259
- package/external/libedhoc/externals/mbedtls/library/psa_util.c +0 -160
- package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +0 -96
- package/external/libedhoc/externals/mbedtls/library/ripemd160.c +0 -490
- package/external/libedhoc/externals/mbedtls/library/rsa.c +0 -2640
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +0 -208
- package/external/libedhoc/externals/mbedtls/library/sha1.c +0 -480
- package/external/libedhoc/externals/mbedtls/library/sha256.c +0 -946
- package/external/libedhoc/externals/mbedtls/library/sha3.c +0 -626
- package/external/libedhoc/externals/mbedtls/library/sha512.c +0 -1111
- package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +0 -410
- package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +0 -2050
- package/external/libedhoc/externals/mbedtls/library/ssl_client.c +0 -1017
- package/external/libedhoc/externals/mbedtls/library/ssl_client.h +0 -22
- package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +0 -380
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +0 -78
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +0 -234
- package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +0 -2847
- package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +0 -6155
- package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +0 -540
- package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +0 -9577
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +0 -3607
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +0 -4403
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +0 -3046
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +0 -1740
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +0 -23
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +0 -1897
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +0 -651
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +0 -3146
- package/external/libedhoc/externals/mbedtls/library/threading.c +0 -181
- package/external/libedhoc/externals/mbedtls/library/timing.c +0 -154
- package/external/libedhoc/externals/mbedtls/library/version.c +0 -32
- package/external/libedhoc/externals/mbedtls/library/version_features.c +0 -826
- package/external/libedhoc/externals/mbedtls/library/x509.c +0 -1776
- package/external/libedhoc/externals/mbedtls/library/x509_create.c +0 -557
- package/external/libedhoc/externals/mbedtls/library/x509_crl.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/x509_crt.c +0 -3292
- package/external/libedhoc/externals/mbedtls/library/x509_csr.c +0 -574
- package/external/libedhoc/externals/mbedtls/library/x509write.c +0 -174
- package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +0 -681
- package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +0 -331
- package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +0 -573
- package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +0 -259
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +0 -105
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +0 -25
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +0 -195
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +0 -138
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +0 -183
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +0 -20
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +0 -106
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +0 -86
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +0 -218
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +0 -69
- package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +0 -209
- package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +0 -45
- package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +0 -296
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +0 -189
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +0 -217
- package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +0 -419
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +0 -316
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +0 -435
- package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +0 -84
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +0 -153
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +0 -154
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +0 -128
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +0 -172
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +0 -149
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +0 -141
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +0 -131
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +0 -281
- package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +0 -321
- package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +0 -159
- package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +0 -691
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +0 -310
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +0 -474
- package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +0 -75
- package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +0 -107
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +0 -342
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +0 -408
- package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +0 -288
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +0 -3118
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +0 -1009
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +0 -381
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +0 -804
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +0 -489
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +0 -362
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +0 -4268
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +0 -375
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +0 -601
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +0 -306
- package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +0 -1284
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +0 -27
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +0 -92
- package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +0 -66
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +0 -5137
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +0 -34
- package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +0 -29
- package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +0 -583
- package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +0 -967
- package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +0 -72
- package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +0 -265
- package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +0 -61
- package/external/libedhoc/externals/mbedtls/programs/wince_main.c +0 -31
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +0 -456
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +0 -509
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +0 -1012
- package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +0 -165
- package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +0 -31
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +0 -89
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +0 -17
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +0 -23
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +0 -18
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +0 -14
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +0 -19
- package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +0 -7
- package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +0 -6
- package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +0 -131
- package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +0 -26
- package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +0 -38
- package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +0 -106
- package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +0 -234
- package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +0 -71
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +0 -121
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +0 -67
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +0 -130
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +0 -44
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +0 -430
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +0 -64
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +0 -62
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +0 -123
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +0 -125
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +0 -75
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +0 -112
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +0 -32
- package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +0 -40
- package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +0 -268
- package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +0 -250
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +0 -398
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +0 -223
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +0 -24
- package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +0 -91
- package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +0 -628
- package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +0 -62
- package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +0 -145
- package/external/libedhoc/externals/mbedtls/tests/src/certs.c +0 -480
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +0 -199
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +0 -78
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +0 -462
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +0 -151
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +0 -424
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +0 -147
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +0 -783
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +0 -422
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +0 -202
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +0 -405
- package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +0 -45
- package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +0 -353
- package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +0 -196
- package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +0 -989
- package/external/libedhoc/externals/mbedtls/tests/src/random.c +0 -136
- package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +0 -1226
- package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +0 -2292
- package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +0 -210
- package/external/libedhoc/externals/zcbor/include/zcbor_common.h +0 -509
- package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +0 -447
- package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +0 -240
- package/external/libedhoc/externals/zcbor/include/zcbor_print.h +0 -165
- package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +0 -94
- package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +0 -41
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +0 -47
- package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +0 -128
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +0 -60
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +0 -61
- package/external/libedhoc/externals/zcbor/src/zcbor_common.c +0 -430
- package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +0 -1567
- package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +0 -609
- package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +0 -367
- package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +0 -189
- package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +0 -528
- package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +0 -2154
- package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +0 -134
- package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -862
- package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +0 -363
- package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +0 -453
- package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +0 -122
- package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +0 -1554
- package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +0 -65
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +0 -136
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +0 -60
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +0 -5
- package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +0 -1437
- package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +0 -203
- package/external/libedhoc/include/edhoc.h +0 -687
- package/external/libedhoc/include/edhoc_common.h +0 -289
- package/external/libedhoc/include/edhoc_context.h +0 -343
- package/external/libedhoc/include/edhoc_credentials.h +0 -265
- package/external/libedhoc/include/edhoc_crypto.h +0 -331
- package/external/libedhoc/include/edhoc_ead.h +0 -102
- package/external/libedhoc/include/edhoc_macros.h +0 -60
- package/external/libedhoc/include/edhoc_values.h +0 -181
- package/external/libedhoc/library/edhoc.c +0 -253
- package/external/libedhoc/library/edhoc_common.c +0 -1314
- package/external/libedhoc/library/edhoc_exporter.c +0 -542
- package/external/libedhoc/library/edhoc_message_1.c +0 -474
- package/external/libedhoc/library/edhoc_message_2.c +0 -1697
- package/external/libedhoc/library/edhoc_message_3.c +0 -1467
- package/external/libedhoc/library/edhoc_message_4.c +0 -828
- package/external/libedhoc/library/edhoc_message_error.c +0 -238
- package/external/libedhoc/tests/include/cipher_suite_0.h +0 -131
- package/external/libedhoc/tests/include/cipher_suite_2.h +0 -139
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_2.h +0 -786
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_3.h +0 -529
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_0.h +0 -137
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_2.h +0 -168
- package/external/libedhoc/tests/include/test_vector_x5chain_static_dh_keys_suite_2.h +0 -162
- package/external/libedhoc/tests/include/test_vector_x5t_sign_keys_suite_2.h +0 -180
- package/external/libedhoc/tests/src/cipher_suite_0.c +0 -445
- package/external/libedhoc/tests/src/cipher_suite_2.c +0 -600
- package/external/libedhoc/tests/src/module_test_api.c +0 -430
- package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +0 -395
- package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +0 -392
- package/external/libedhoc/tests/src/module_test_error_message.c +0 -251
- package/external/libedhoc/tests/src/module_test_main.c +0 -49
- package/external/libedhoc/tests/src/module_test_rfc9528_suites_negotiation.c +0 -541
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +0 -2681
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +0 -1635
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +0 -1135
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +0 -1249
- package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +0 -798
- package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +0 -956
- package/include/Binding.h +0 -348
- package/include/EdhocComposeAsyncWorker.h +0 -49
- package/include/EdhocCredentialManager.h +0 -89
- package/include/EdhocCryptoManager.h +0 -495
- package/include/EdhocEadManager.h +0 -147
- package/include/EdhocExportOscoreAsyncWorker.h +0 -57
- package/include/EdhocKeyExporterAsyncWorker.h +0 -56
- package/include/EdhocKeyUpdateAsyncWorker.h +0 -55
- package/include/EdhocProcessAsyncWorker.h +0 -55
- package/include/RunningContext.h +0 -102
- package/include/Suites.h +0 -27
- package/include/Utils.h +0 -71
- package/patches/prebuildify-cross+5.1.0.dev.patch +0 -26
- package/patches/prebuildify-cross+5.1.1.dev.patch +0 -26
- package/prebuilds/android-arm/edhoc.armv7.node +0 -0
- package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/darwin-arm64/edhoc.node +0 -0
- package/prebuilds/darwin-x64/edhoc.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
- package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
- package/prebuilds/linux-x64/edhoc.musl.node +0 -0
- package/prebuilds/win32-ia32/edhoc.node +0 -0
- package/prebuilds/win32-x64/edhoc.node +0 -0
- package/src/Binding.cpp +0 -434
- package/src/EdhocComposeAsyncWorker.cpp +0 -60
- package/src/EdhocCredentialManager.cpp +0 -314
- package/src/EdhocCryptoManager.cpp +0 -593
- package/src/EdhocEadManager.cpp +0 -148
- package/src/EdhocExportOscoreAsyncWorker.cpp +0 -67
- package/src/EdhocKeyExporterAsyncWorker.cpp +0 -39
- package/src/EdhocKeyUpdateAsyncWorker.cpp +0 -31
- package/src/EdhocProcessAsyncWorker.cpp +0 -120
- package/src/RunningContext.cpp +0 -95
- package/src/Suites.cpp +0 -120
- package/src/Utils.cpp +0 -54
- package/test/basic.test.ts +0 -118
- package/test/vectors.test.ts +0 -111
|
@@ -1,1697 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* \file edhoc_message_2.c
|
|
3
|
-
* \author Kamil Kielbasa
|
|
4
|
-
* \brief EDHOC message 2.
|
|
5
|
-
* \version 0.6
|
|
6
|
-
* \date 2024-08-05
|
|
7
|
-
*
|
|
8
|
-
* \copyright Copyright (c) 2024
|
|
9
|
-
*
|
|
10
|
-
*/
|
|
11
|
-
|
|
12
|
-
/* Include files ----------------------------------------------------------- */
|
|
13
|
-
|
|
14
|
-
/* EDHOC header: */
|
|
15
|
-
#define EDHOC_ALLOW_PRIVATE_ACCESS
|
|
16
|
-
#include "edhoc.h"
|
|
17
|
-
#include "edhoc_common.h"
|
|
18
|
-
|
|
19
|
-
/* Standard library headers: */
|
|
20
|
-
#include <stdint.h>
|
|
21
|
-
#include <stddef.h>
|
|
22
|
-
#include <string.h>
|
|
23
|
-
#include <stdbool.h>
|
|
24
|
-
|
|
25
|
-
#ifdef __clang__
|
|
26
|
-
#pragma clang diagnostic push
|
|
27
|
-
#pragma clang diagnostic ignored "-Wshadow"
|
|
28
|
-
#pragma clang diagnostic ignored "-Wreserved-identifier"
|
|
29
|
-
#pragma clang diagnostic ignored "-Wpadded"
|
|
30
|
-
#pragma clang diagnostic ignored "-Wdocumentation"
|
|
31
|
-
#endif
|
|
32
|
-
|
|
33
|
-
/* CBOR headers: */
|
|
34
|
-
#include <zcbor_common.h>
|
|
35
|
-
#include <backend_cbor_message_2_encode.h>
|
|
36
|
-
#include <backend_cbor_message_2_decode.h>
|
|
37
|
-
#include <backend_cbor_bstr_type_encode.h>
|
|
38
|
-
#include <backend_cbor_bstr_type_decode.h>
|
|
39
|
-
#include <backend_cbor_int_type_encode.h>
|
|
40
|
-
#include <backend_cbor_int_type_decode.h>
|
|
41
|
-
#include <backend_cbor_id_cred_x_encode.h>
|
|
42
|
-
#include <backend_cbor_id_cred_x_decode.h>
|
|
43
|
-
#include <backend_cbor_sig_structure_encode.h>
|
|
44
|
-
#include <backend_cbor_info_encode.h>
|
|
45
|
-
#include <backend_cbor_plaintext_2_decode.h>
|
|
46
|
-
#include <backend_cbor_ead_encode.h>
|
|
47
|
-
|
|
48
|
-
#ifdef __clang__
|
|
49
|
-
#pragma clang diagnostic pop
|
|
50
|
-
#endif
|
|
51
|
-
|
|
52
|
-
/* Module defines ---------------------------------------------------------- */
|
|
53
|
-
/* Module types and type definitiones -------------------------------------- */
|
|
54
|
-
/* Module interface variables and constants -------------------------------- */
|
|
55
|
-
/* Static variables and constants ------------------------------------------ */
|
|
56
|
-
/* Static function declarations -------------------------------------------- */
|
|
57
|
-
|
|
58
|
-
/**
|
|
59
|
-
* \brief Generate ECDH key pair (G_X, X).
|
|
60
|
-
*
|
|
61
|
-
* \param[in,out] ctx EDHOC context.
|
|
62
|
-
*
|
|
63
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
64
|
-
*/
|
|
65
|
-
static int gen_dh_keys(struct edhoc_context *ctx);
|
|
66
|
-
|
|
67
|
-
/**
|
|
68
|
-
* \brief Compute ECDH shared secret (G_XY).
|
|
69
|
-
*
|
|
70
|
-
* \param[in,out] ctx EDHOC context.
|
|
71
|
-
*
|
|
72
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
73
|
-
*/
|
|
74
|
-
static int comp_dh_secret(struct edhoc_context *ctx);
|
|
75
|
-
|
|
76
|
-
/**
|
|
77
|
-
* \brief Compute transcript hash 2 (TH_2).
|
|
78
|
-
*
|
|
79
|
-
* \param[in,out] ctx EDHOC context.
|
|
80
|
-
*
|
|
81
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
82
|
-
*/
|
|
83
|
-
static int comp_th_2(struct edhoc_context *ctx);
|
|
84
|
-
|
|
85
|
-
/**
|
|
86
|
-
* \brief Compute psuedo random key (PRK_2e).
|
|
87
|
-
*
|
|
88
|
-
* \param[in,out] ctx EDHOC context.
|
|
89
|
-
*
|
|
90
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
91
|
-
*/
|
|
92
|
-
static int comp_prk_2e(struct edhoc_context *ctx);
|
|
93
|
-
|
|
94
|
-
/**
|
|
95
|
-
* \brief Compute psuedo random key (PRK_3e2m).
|
|
96
|
-
*
|
|
97
|
-
* \param[in,out] ctx EDHOC context.
|
|
98
|
-
* \param[in] auth_cred Authentication credentials.
|
|
99
|
-
* \param[in] pub_key Peer public static DH key.
|
|
100
|
-
* \param pub_key_len Size of the \p pub_key buffer in bytes.
|
|
101
|
-
*
|
|
102
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
103
|
-
*/
|
|
104
|
-
static int comp_prk_3e2m(struct edhoc_context *ctx,
|
|
105
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
106
|
-
const uint8_t *pub_key, size_t pub_key_len);
|
|
107
|
-
|
|
108
|
-
/**
|
|
109
|
-
* \brief Compute required PLAINTEXT_2 length.
|
|
110
|
-
*
|
|
111
|
-
* \param[in] ctx EDHOC context.
|
|
112
|
-
* \param[in] mac_ctx MAC_2 context.
|
|
113
|
-
* \param sign_len Size of the signature buffer in bytes.
|
|
114
|
-
* \param[out] plaintext_2_len On success, length of PLAINTEXT_2.
|
|
115
|
-
*
|
|
116
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
117
|
-
*/
|
|
118
|
-
static int comp_plaintext_2_len(const struct edhoc_context *ctx,
|
|
119
|
-
const struct mac_context *mac_ctx,
|
|
120
|
-
size_t sign_len, size_t *plaintext_2_len);
|
|
121
|
-
|
|
122
|
-
/**
|
|
123
|
-
* \brief Prepare PLAINTEXT_2.
|
|
124
|
-
*
|
|
125
|
-
* \param[in] ctx EDHOC context.
|
|
126
|
-
* \param[in] mac_ctx Buffer containing the context_2.
|
|
127
|
-
* \param[in] sign Buffer containing the signature.
|
|
128
|
-
* \param sign_len Size of the \p sign buffer in bytes.
|
|
129
|
-
* \param[out] ptxt Buffer where the generated plaintext is to be written.
|
|
130
|
-
* \param ptxt_size Size of the \p ptxt buffer in bytes.
|
|
131
|
-
* \param[out] ptxt_len On success, the number of bytes that make up the PLAINTEXT_2.
|
|
132
|
-
*
|
|
133
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
134
|
-
*/
|
|
135
|
-
static int prepare_plaintext_2(const struct edhoc_context *ctx,
|
|
136
|
-
const struct mac_context *mac_ctx,
|
|
137
|
-
const uint8_t *sign, size_t sign_len,
|
|
138
|
-
uint8_t *ptxt, size_t ptxt_size,
|
|
139
|
-
size_t *ptxt_len);
|
|
140
|
-
|
|
141
|
-
/**
|
|
142
|
-
* \brief Compute KEYSTREAM_2.
|
|
143
|
-
*
|
|
144
|
-
* \param[in] ctx EDHOC context.
|
|
145
|
-
* \param[in] prk_2e Buffer containing the PRK_2e.
|
|
146
|
-
* \param prk_2e_len Size of the \p prk_2e buffer in bytes.
|
|
147
|
-
* \param[out] keystream Buffer where the generated keystream is to be written.
|
|
148
|
-
* \param keystream_len Size of the \p keystream buffer in bytes.
|
|
149
|
-
*
|
|
150
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
151
|
-
*/
|
|
152
|
-
static int comp_keystream(const struct edhoc_context *ctx,
|
|
153
|
-
const uint8_t *prk_2e, size_t prk_2e_len,
|
|
154
|
-
uint8_t *keystream, size_t keystream_len);
|
|
155
|
-
|
|
156
|
-
/**
|
|
157
|
-
* \brief Compute CIPHERTEXT_2.
|
|
158
|
-
*
|
|
159
|
-
* \param[out] dst Memory location to XOR to.
|
|
160
|
-
* \param[in] src Memory location to XOR from.
|
|
161
|
-
* \param count Number of bytes to XOR.
|
|
162
|
-
*/
|
|
163
|
-
static void xor_arrays(uint8_t *restrict dst, const uint8_t *restrict src,
|
|
164
|
-
size_t count);
|
|
165
|
-
|
|
166
|
-
/**
|
|
167
|
-
* \brief Prepare MESSAGE_2.
|
|
168
|
-
*
|
|
169
|
-
* \param[in] ctx EDHOC context.
|
|
170
|
-
* \param[in] ciphertext Buffer containing the CIPHERTEXT_2.
|
|
171
|
-
* \param ciphertext_len Size of the \p ciphertext buffer in bytes.
|
|
172
|
-
* \param[out] msg_2 Buffer where the generated message 2 is to be written.
|
|
173
|
-
* \param msg_2_size Size of the \p msg_2 buffer in bytes.
|
|
174
|
-
* \param[out] msg_2_len On success, the number of bytes that make up the message 2.
|
|
175
|
-
*
|
|
176
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
177
|
-
*/
|
|
178
|
-
static int prepare_message_2(const struct edhoc_context *ctx,
|
|
179
|
-
const uint8_t *ciphertext, size_t ciphertext_len,
|
|
180
|
-
uint8_t *msg_2, size_t msg_2_size,
|
|
181
|
-
size_t *msg_2_len);
|
|
182
|
-
|
|
183
|
-
/**
|
|
184
|
-
* \brief Compute from cborised message 2 length of ciphertext 2.
|
|
185
|
-
*
|
|
186
|
-
* \param[in] ctx EDHOC context.
|
|
187
|
-
* \param[in] msg_2 Buffer containing the message 2.
|
|
188
|
-
* \param msg_2_len Size of the \p msg_2 buffer in bytes.
|
|
189
|
-
* \param[out] len Length of ciphertext 2 in bytes.
|
|
190
|
-
*
|
|
191
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
192
|
-
*/
|
|
193
|
-
static int comp_ciphertext_2_len(const struct edhoc_context *ctx,
|
|
194
|
-
const uint8_t *msg_2, size_t msg_2_len,
|
|
195
|
-
size_t *len);
|
|
196
|
-
|
|
197
|
-
/**
|
|
198
|
-
* \brief Decode message 2 and save into context and buffer.
|
|
199
|
-
*
|
|
200
|
-
* \param[in] ctx EDHOC context.
|
|
201
|
-
* \param[in] msg_2 Buffer containing the message 2.
|
|
202
|
-
* \param msg_2_len Size of the \p msg_2 buffer in bytes.
|
|
203
|
-
* \param[in] ctxt_2 Buffer containing the CIPHERTEXT_2.
|
|
204
|
-
* \param ctxt_2_len Size of the \p ctxt_2 buffer in bytes.
|
|
205
|
-
*
|
|
206
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
207
|
-
*/
|
|
208
|
-
static int parse_msg_2(struct edhoc_context *ctx, const uint8_t *msg_2,
|
|
209
|
-
size_t msg_2_len, uint8_t *ctxt_2, size_t ctxt_2_len);
|
|
210
|
-
|
|
211
|
-
/**
|
|
212
|
-
* \brief Parsed cborised PLAINTEXT_2 for separate buffers.
|
|
213
|
-
*
|
|
214
|
-
* \param[in] ctx EDHOC context.
|
|
215
|
-
* \param[in] ptxt Buffer containing the PLAINTEXT_2.
|
|
216
|
-
* \param ptxt_len Size of the \p plaintext buffer in bytes.
|
|
217
|
-
* \param[out] parsed_ptxt Structure where parsed PLAINTEXT_2 is to be written.
|
|
218
|
-
*
|
|
219
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
220
|
-
*/
|
|
221
|
-
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
222
|
-
size_t ptxt_len, struct plaintext *parsed_ptxt);
|
|
223
|
-
|
|
224
|
-
/**
|
|
225
|
-
* \brief Compute transcript hash 3.
|
|
226
|
-
*
|
|
227
|
-
* \param[in,out] ctx EDHOC context.
|
|
228
|
-
* \param[in] mac_ctx MAC context.
|
|
229
|
-
* \param[in] ptxt Buffer containing the PLAINTEXT_2.
|
|
230
|
-
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
231
|
-
*
|
|
232
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
233
|
-
*/
|
|
234
|
-
static int comp_th_3(struct edhoc_context *ctx,
|
|
235
|
-
const struct mac_context *mac_ctx, const uint8_t *ptxt,
|
|
236
|
-
size_t ptxt_len);
|
|
237
|
-
|
|
238
|
-
/**
|
|
239
|
-
* \brief Compute SALT_3e2m.
|
|
240
|
-
*
|
|
241
|
-
* \param[in] ctx EDHOC context.
|
|
242
|
-
* \param[out] salt Buffer where the generated salt is to be written.
|
|
243
|
-
* \param salt_len Size of the \p salt buffer in bytes.
|
|
244
|
-
*
|
|
245
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
246
|
-
*/
|
|
247
|
-
static int comp_salt_3e2m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
248
|
-
size_t salt_len);
|
|
249
|
-
|
|
250
|
-
/**
|
|
251
|
-
* \brief Compute G_RX for PRK_3e2m.
|
|
252
|
-
*
|
|
253
|
-
* \param[in,out] ctx EDHOC context.
|
|
254
|
-
* \param[in] auth_cred Authentication credentials.
|
|
255
|
-
* \param[in] pub_key Peer public key.
|
|
256
|
-
* \param pub_key_len Peer public key length.
|
|
257
|
-
* \param[out] grx Buffer where the generated G_RX is to be written.
|
|
258
|
-
* \param grx_len Size of the \p grx buffer in bytes.
|
|
259
|
-
*
|
|
260
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
261
|
-
*/
|
|
262
|
-
static int comp_grx(struct edhoc_context *ctx,
|
|
263
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
264
|
-
const uint8_t *pub_key, size_t pub_key_len, uint8_t *grx,
|
|
265
|
-
size_t grx_len);
|
|
266
|
-
|
|
267
|
-
/* Static function definitions --------------------------------------------- */
|
|
268
|
-
|
|
269
|
-
static int gen_dh_keys(struct edhoc_context *ctx)
|
|
270
|
-
{
|
|
271
|
-
if (NULL == ctx)
|
|
272
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
273
|
-
|
|
274
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
275
|
-
|
|
276
|
-
/* Generate ephemeral key pair. */
|
|
277
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
278
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_MAKE_KEY_PAIR, NULL,
|
|
279
|
-
0, key_id);
|
|
280
|
-
|
|
281
|
-
if (EDHOC_SUCCESS != ret)
|
|
282
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
283
|
-
|
|
284
|
-
/* Choose most preferred cipher suite. */
|
|
285
|
-
const struct edhoc_cipher_suite csuite =
|
|
286
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
287
|
-
|
|
288
|
-
ctx->dh_pub_key_len = csuite.ecc_key_length;
|
|
289
|
-
ctx->dh_priv_key_len = csuite.ecc_key_length;
|
|
290
|
-
|
|
291
|
-
size_t pub_key_len = 0;
|
|
292
|
-
size_t priv_key_len = 0;
|
|
293
|
-
ret = ctx->crypto.make_key_pair(ctx->user_ctx, key_id, ctx->dh_priv_key,
|
|
294
|
-
ctx->dh_priv_key_len, &priv_key_len,
|
|
295
|
-
ctx->dh_pub_key, ctx->dh_pub_key_len,
|
|
296
|
-
&pub_key_len);
|
|
297
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
298
|
-
|
|
299
|
-
if (EDHOC_SUCCESS != ret || csuite.ecc_key_length != priv_key_len ||
|
|
300
|
-
csuite.ecc_key_length != pub_key_len)
|
|
301
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
302
|
-
|
|
303
|
-
return EDHOC_SUCCESS;
|
|
304
|
-
}
|
|
305
|
-
|
|
306
|
-
static int comp_dh_secret(struct edhoc_context *ctx)
|
|
307
|
-
{
|
|
308
|
-
if (NULL == ctx)
|
|
309
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
310
|
-
|
|
311
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
312
|
-
|
|
313
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
314
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_KEY_AGREEMENT,
|
|
315
|
-
ctx->dh_priv_key, ctx->dh_priv_key_len,
|
|
316
|
-
key_id);
|
|
317
|
-
if (EDHOC_SUCCESS != ret)
|
|
318
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
319
|
-
|
|
320
|
-
const struct edhoc_cipher_suite csuite =
|
|
321
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
322
|
-
ctx->dh_secret_len = csuite.ecc_key_length;
|
|
323
|
-
|
|
324
|
-
size_t secret_len = 0;
|
|
325
|
-
ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id,
|
|
326
|
-
ctx->dh_peer_pub_key,
|
|
327
|
-
ctx->dh_peer_pub_key_len,
|
|
328
|
-
ctx->dh_secret, ctx->dh_secret_len,
|
|
329
|
-
&secret_len);
|
|
330
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
331
|
-
|
|
332
|
-
if (EDHOC_SUCCESS != ret || secret_len != csuite.ecc_key_length)
|
|
333
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
334
|
-
|
|
335
|
-
return EDHOC_SUCCESS;
|
|
336
|
-
}
|
|
337
|
-
|
|
338
|
-
static int comp_th_2(struct edhoc_context *ctx)
|
|
339
|
-
{
|
|
340
|
-
if (NULL == ctx)
|
|
341
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
342
|
-
|
|
343
|
-
if (EDHOC_TH_STATE_1 != ctx->th_state)
|
|
344
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
345
|
-
|
|
346
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
347
|
-
|
|
348
|
-
const struct edhoc_cipher_suite csuite =
|
|
349
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
350
|
-
|
|
351
|
-
/* Calculate required sizes for CBOR TH_2 = H(G_Y, H(message_1)). */
|
|
352
|
-
size_t g_y_len = 0;
|
|
353
|
-
g_y_len += csuite.ecc_key_length;
|
|
354
|
-
g_y_len += edhoc_cbor_bstr_oh(csuite.ecc_key_length);
|
|
355
|
-
|
|
356
|
-
size_t hash_len = 0;
|
|
357
|
-
hash_len += csuite.hash_length;
|
|
358
|
-
hash_len += edhoc_cbor_bstr_oh(csuite.hash_length);
|
|
359
|
-
|
|
360
|
-
VLA_ALLOC(uint8_t, th_2, g_y_len + hash_len);
|
|
361
|
-
memset(th_2, 0, VLA_SIZEOF(th_2));
|
|
362
|
-
|
|
363
|
-
size_t offset = 0;
|
|
364
|
-
size_t len_out = 0;
|
|
365
|
-
struct zcbor_string cbor_bstr = { 0 };
|
|
366
|
-
|
|
367
|
-
/* Cborise G_Y. */
|
|
368
|
-
switch (ctx->role) {
|
|
369
|
-
case EDHOC_INITIATOR:
|
|
370
|
-
cbor_bstr.value = ctx->dh_peer_pub_key;
|
|
371
|
-
cbor_bstr.len = ctx->dh_peer_pub_key_len;
|
|
372
|
-
break;
|
|
373
|
-
case EDHOC_RESPONDER:
|
|
374
|
-
cbor_bstr.value = ctx->dh_pub_key;
|
|
375
|
-
cbor_bstr.len = ctx->dh_pub_key_len;
|
|
376
|
-
break;
|
|
377
|
-
default:
|
|
378
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
379
|
-
}
|
|
380
|
-
|
|
381
|
-
len_out = 0;
|
|
382
|
-
ret = cbor_encode_byte_string_type_bstr_type(th_2, g_y_len, &cbor_bstr,
|
|
383
|
-
&len_out);
|
|
384
|
-
|
|
385
|
-
if (ZCBOR_SUCCESS != ret || g_y_len != len_out)
|
|
386
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
387
|
-
|
|
388
|
-
offset += len_out;
|
|
389
|
-
|
|
390
|
-
/* Cborise H(message_1). */
|
|
391
|
-
cbor_bstr.value = ctx->th;
|
|
392
|
-
cbor_bstr.len = ctx->th_len;
|
|
393
|
-
|
|
394
|
-
len_out = 0;
|
|
395
|
-
ret = cbor_encode_byte_string_type_bstr_type(&th_2[offset], hash_len,
|
|
396
|
-
&cbor_bstr, &len_out);
|
|
397
|
-
|
|
398
|
-
if (ZCBOR_SUCCESS != ret || hash_len != len_out)
|
|
399
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
400
|
-
|
|
401
|
-
offset += len_out;
|
|
402
|
-
|
|
403
|
-
if (VLA_SIZE(th_2) < offset)
|
|
404
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
405
|
-
|
|
406
|
-
/* Calculate TH_2. */
|
|
407
|
-
ctx->th_len = csuite.hash_length;
|
|
408
|
-
|
|
409
|
-
size_t hash_length = 0;
|
|
410
|
-
ret = ctx->crypto.hash(ctx->user_ctx, th_2, VLA_SIZE(th_2), ctx->th,
|
|
411
|
-
ctx->th_len, &hash_length);
|
|
412
|
-
|
|
413
|
-
if (EDHOC_SUCCESS != ret || csuite.hash_length != hash_length)
|
|
414
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
415
|
-
|
|
416
|
-
ctx->th_state = EDHOC_TH_STATE_2;
|
|
417
|
-
return EDHOC_SUCCESS;
|
|
418
|
-
}
|
|
419
|
-
|
|
420
|
-
static int comp_prk_2e(struct edhoc_context *ctx)
|
|
421
|
-
{
|
|
422
|
-
if (NULL == ctx)
|
|
423
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
424
|
-
|
|
425
|
-
if (EDHOC_TH_STATE_2 != ctx->th_state ||
|
|
426
|
-
EDHOC_PRK_STATE_INVALID != ctx->prk_state)
|
|
427
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
428
|
-
|
|
429
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
430
|
-
|
|
431
|
-
ctx->prk_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
432
|
-
|
|
433
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
434
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXTRACT,
|
|
435
|
-
ctx->dh_secret, ctx->dh_secret_len, key_id);
|
|
436
|
-
|
|
437
|
-
if (EDHOC_SUCCESS != ret)
|
|
438
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
439
|
-
|
|
440
|
-
size_t out_len = 0;
|
|
441
|
-
ret = ctx->crypto.extract(ctx->user_ctx, key_id, ctx->th, ctx->th_len,
|
|
442
|
-
ctx->prk, ctx->prk_len, &out_len);
|
|
443
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
444
|
-
|
|
445
|
-
if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
|
|
446
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
447
|
-
|
|
448
|
-
ctx->prk_state = EDHOC_PRK_STATE_2E;
|
|
449
|
-
return EDHOC_SUCCESS;
|
|
450
|
-
}
|
|
451
|
-
|
|
452
|
-
static int comp_prk_3e2m(struct edhoc_context *ctx,
|
|
453
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
454
|
-
const uint8_t *pub_key, size_t pub_key_len)
|
|
455
|
-
{
|
|
456
|
-
if (NULL == ctx)
|
|
457
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
458
|
-
|
|
459
|
-
if (EDHOC_PRK_STATE_2E != ctx->prk_state)
|
|
460
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
461
|
-
|
|
462
|
-
switch (ctx->chosen_method) {
|
|
463
|
-
case EDHOC_METHOD_0:
|
|
464
|
-
case EDHOC_METHOD_2:
|
|
465
|
-
ctx->prk_state = EDHOC_PRK_STATE_3E2M;
|
|
466
|
-
return EDHOC_SUCCESS;
|
|
467
|
-
|
|
468
|
-
case EDHOC_METHOD_1:
|
|
469
|
-
case EDHOC_METHOD_3: {
|
|
470
|
-
const size_t hash_len =
|
|
471
|
-
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
472
|
-
|
|
473
|
-
VLA_ALLOC(uint8_t, salt_3e2m, hash_len);
|
|
474
|
-
memset(salt_3e2m, 0, VLA_SIZEOF(salt_3e2m));
|
|
475
|
-
|
|
476
|
-
int ret = comp_salt_3e2m(ctx, salt_3e2m, VLA_SIZE(salt_3e2m));
|
|
477
|
-
|
|
478
|
-
if (EDHOC_SUCCESS != ret)
|
|
479
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
480
|
-
|
|
481
|
-
if (NULL != ctx->logger)
|
|
482
|
-
ctx->logger(ctx->user_ctx, "SALT_3e2m", salt_3e2m,
|
|
483
|
-
VLA_SIZE(salt_3e2m));
|
|
484
|
-
|
|
485
|
-
const size_t ecc_key_len =
|
|
486
|
-
ctx->csuite[ctx->chosen_csuite_idx].ecc_key_length;
|
|
487
|
-
|
|
488
|
-
VLA_ALLOC(uint8_t, grx, ecc_key_len);
|
|
489
|
-
memset(grx, 0, VLA_SIZEOF(grx));
|
|
490
|
-
|
|
491
|
-
ret = comp_grx(ctx, auth_cred, pub_key, pub_key_len, grx,
|
|
492
|
-
VLA_SIZE(grx));
|
|
493
|
-
|
|
494
|
-
if (EDHOC_SUCCESS != ret)
|
|
495
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
496
|
-
|
|
497
|
-
if (NULL != ctx->logger)
|
|
498
|
-
ctx->logger(ctx->user_ctx, "G_RX", grx, VLA_SIZE(grx));
|
|
499
|
-
|
|
500
|
-
ctx->prk_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
501
|
-
|
|
502
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
503
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXTRACT, grx,
|
|
504
|
-
VLA_SIZE(grx), key_id);
|
|
505
|
-
memset(grx, 0, VLA_SIZEOF(grx));
|
|
506
|
-
|
|
507
|
-
if (EDHOC_SUCCESS != ret)
|
|
508
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
509
|
-
|
|
510
|
-
size_t out_len = 0;
|
|
511
|
-
ret = ctx->crypto.extract(ctx->user_ctx, key_id, salt_3e2m,
|
|
512
|
-
VLA_SIZE(salt_3e2m), ctx->prk,
|
|
513
|
-
ctx->prk_len, &out_len);
|
|
514
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
515
|
-
|
|
516
|
-
if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
|
|
517
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
518
|
-
|
|
519
|
-
ctx->prk_state = EDHOC_PRK_STATE_3E2M;
|
|
520
|
-
return EDHOC_SUCCESS;
|
|
521
|
-
}
|
|
522
|
-
|
|
523
|
-
case EDHOC_METHOD_MAX:
|
|
524
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
525
|
-
}
|
|
526
|
-
|
|
527
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
528
|
-
}
|
|
529
|
-
|
|
530
|
-
static int comp_plaintext_2_len(const struct edhoc_context *ctx,
|
|
531
|
-
const struct mac_context *mac_ctx,
|
|
532
|
-
size_t sign_len, size_t *plaintext_2_len)
|
|
533
|
-
{
|
|
534
|
-
if (NULL == ctx || NULL == mac_ctx || 0 == sign_len ||
|
|
535
|
-
NULL == plaintext_2_len)
|
|
536
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
537
|
-
|
|
538
|
-
size_t len = 0;
|
|
539
|
-
|
|
540
|
-
switch (ctx->cid.encode_type) {
|
|
541
|
-
case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
|
|
542
|
-
len += edhoc_cbor_int_mem_req(ctx->cid.int_value);
|
|
543
|
-
break;
|
|
544
|
-
case EDHOC_CID_TYPE_BYTE_STRING:
|
|
545
|
-
len += ctx->cid.bstr_length;
|
|
546
|
-
len += edhoc_cbor_bstr_oh(ctx->cid.bstr_length);
|
|
547
|
-
break;
|
|
548
|
-
}
|
|
549
|
-
|
|
550
|
-
if (true == mac_ctx->id_cred_is_comp_enc) {
|
|
551
|
-
switch (mac_ctx->id_cred_enc_type) {
|
|
552
|
-
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
553
|
-
len += edhoc_cbor_int_mem_req(mac_ctx->id_cred_int);
|
|
554
|
-
break;
|
|
555
|
-
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
556
|
-
len += mac_ctx->id_cred_bstr_len;
|
|
557
|
-
len += edhoc_cbor_bstr_oh(mac_ctx->id_cred_bstr_len);
|
|
558
|
-
break;
|
|
559
|
-
}
|
|
560
|
-
} else {
|
|
561
|
-
len += mac_ctx->id_cred_len;
|
|
562
|
-
}
|
|
563
|
-
|
|
564
|
-
len += sign_len;
|
|
565
|
-
len += edhoc_cbor_bstr_oh(sign_len);
|
|
566
|
-
len += mac_ctx->ead_len;
|
|
567
|
-
|
|
568
|
-
*plaintext_2_len = len;
|
|
569
|
-
return EDHOC_SUCCESS;
|
|
570
|
-
}
|
|
571
|
-
|
|
572
|
-
static int prepare_plaintext_2(const struct edhoc_context *ctx,
|
|
573
|
-
const struct mac_context *mac_ctx,
|
|
574
|
-
const uint8_t *sign, size_t sign_len,
|
|
575
|
-
uint8_t *ptxt, size_t ptxt_size,
|
|
576
|
-
size_t *ptxt_len)
|
|
577
|
-
{
|
|
578
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
579
|
-
|
|
580
|
-
size_t offset = 0;
|
|
581
|
-
|
|
582
|
-
switch (ctx->cid.encode_type) {
|
|
583
|
-
case EDHOC_CID_TYPE_ONE_BYTE_INTEGER: {
|
|
584
|
-
size_t len = 0;
|
|
585
|
-
const int32_t value = ctx->cid.int_value;
|
|
586
|
-
ret = cbor_encode_integer_type_int_type(
|
|
587
|
-
ptxt, ptxt_size - offset, &value, &len);
|
|
588
|
-
|
|
589
|
-
if (ZCBOR_SUCCESS != ret)
|
|
590
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
591
|
-
|
|
592
|
-
offset += len;
|
|
593
|
-
break;
|
|
594
|
-
}
|
|
595
|
-
case EDHOC_CID_TYPE_BYTE_STRING: {
|
|
596
|
-
size_t len = 0;
|
|
597
|
-
const struct zcbor_string input = {
|
|
598
|
-
.value = ctx->cid.bstr_value,
|
|
599
|
-
.len = ctx->cid.bstr_length,
|
|
600
|
-
};
|
|
601
|
-
ret = cbor_encode_byte_string_type_bstr_type(
|
|
602
|
-
ptxt, ptxt_size - offset, &input, &len);
|
|
603
|
-
|
|
604
|
-
if (ZCBOR_SUCCESS != ret)
|
|
605
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
606
|
-
|
|
607
|
-
offset += len;
|
|
608
|
-
break;
|
|
609
|
-
}
|
|
610
|
-
default:
|
|
611
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
612
|
-
}
|
|
613
|
-
|
|
614
|
-
if (mac_ctx->id_cred_is_comp_enc) {
|
|
615
|
-
switch (mac_ctx->id_cred_enc_type) {
|
|
616
|
-
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
617
|
-
memcpy(&ptxt[offset], &mac_ctx->id_cred_int, 1);
|
|
618
|
-
offset += 1;
|
|
619
|
-
break;
|
|
620
|
-
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
621
|
-
memcpy(&ptxt[offset], &mac_ctx->id_cred_bstr,
|
|
622
|
-
mac_ctx->id_cred_bstr_len);
|
|
623
|
-
offset += mac_ctx->id_cred_bstr_len;
|
|
624
|
-
break;
|
|
625
|
-
default:
|
|
626
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
627
|
-
}
|
|
628
|
-
} else {
|
|
629
|
-
memcpy(&ptxt[offset], mac_ctx->id_cred, mac_ctx->id_cred_len);
|
|
630
|
-
offset += mac_ctx->id_cred_len;
|
|
631
|
-
}
|
|
632
|
-
|
|
633
|
-
const struct zcbor_string cbor_sign_or_mac_2 = {
|
|
634
|
-
.value = sign,
|
|
635
|
-
.len = sign_len,
|
|
636
|
-
};
|
|
637
|
-
|
|
638
|
-
size_t len = 0;
|
|
639
|
-
ret = cbor_encode_byte_string_type_bstr_type(
|
|
640
|
-
&ptxt[offset], sign_len + edhoc_cbor_bstr_oh(sign_len) + 1,
|
|
641
|
-
&cbor_sign_or_mac_2, &len);
|
|
642
|
-
|
|
643
|
-
if (ZCBOR_SUCCESS != ret)
|
|
644
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
645
|
-
|
|
646
|
-
offset += len;
|
|
647
|
-
|
|
648
|
-
if (mac_ctx->is_ead) {
|
|
649
|
-
memcpy(&ptxt[offset], mac_ctx->ead, mac_ctx->ead_len);
|
|
650
|
-
offset += mac_ctx->ead_len;
|
|
651
|
-
}
|
|
652
|
-
|
|
653
|
-
if (offset > ptxt_size)
|
|
654
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
655
|
-
|
|
656
|
-
*ptxt_len = offset;
|
|
657
|
-
|
|
658
|
-
return EDHOC_SUCCESS;
|
|
659
|
-
}
|
|
660
|
-
|
|
661
|
-
static int comp_keystream(const struct edhoc_context *ctx,
|
|
662
|
-
const uint8_t *prk_2e, size_t prk_2e_len,
|
|
663
|
-
uint8_t *keystream, size_t keystream_len)
|
|
664
|
-
{
|
|
665
|
-
if (NULL == ctx || NULL == prk_2e || 0 == prk_2e_len ||
|
|
666
|
-
NULL == keystream || 0 == keystream_len)
|
|
667
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
668
|
-
|
|
669
|
-
if (EDHOC_TH_STATE_2 != ctx->th_state)
|
|
670
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
671
|
-
|
|
672
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
673
|
-
|
|
674
|
-
const struct info input_info = {
|
|
675
|
-
.info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_KEYSTERAM_2,
|
|
676
|
-
.info_context.value = ctx->th,
|
|
677
|
-
.info_context.len = ctx->th_len,
|
|
678
|
-
.info_length = (uint32_t)keystream_len,
|
|
679
|
-
};
|
|
680
|
-
|
|
681
|
-
size_t len = 0;
|
|
682
|
-
len += edhoc_cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_KEYSTERAM_2);
|
|
683
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
684
|
-
len += edhoc_cbor_int_mem_req((int32_t)keystream_len);
|
|
685
|
-
|
|
686
|
-
VLA_ALLOC(uint8_t, info, len);
|
|
687
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
688
|
-
|
|
689
|
-
len = 0;
|
|
690
|
-
ret = cbor_encode_info(info, VLA_SIZE(info), &input_info, &len);
|
|
691
|
-
|
|
692
|
-
if (ZCBOR_SUCCESS != ret || VLA_SIZE(info) != len)
|
|
693
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
694
|
-
|
|
695
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
696
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXPAND, prk_2e,
|
|
697
|
-
prk_2e_len, key_id);
|
|
698
|
-
|
|
699
|
-
if (EDHOC_SUCCESS != ret)
|
|
700
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
701
|
-
|
|
702
|
-
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, VLA_SIZE(info),
|
|
703
|
-
keystream, keystream_len);
|
|
704
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
705
|
-
|
|
706
|
-
if (EDHOC_SUCCESS != ret)
|
|
707
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
708
|
-
|
|
709
|
-
return EDHOC_SUCCESS;
|
|
710
|
-
}
|
|
711
|
-
|
|
712
|
-
static void xor_arrays(uint8_t *dst, const uint8_t *src, size_t count)
|
|
713
|
-
{
|
|
714
|
-
for (size_t i = 0; i < count; ++i)
|
|
715
|
-
dst[i] ^= src[i];
|
|
716
|
-
}
|
|
717
|
-
|
|
718
|
-
static int prepare_message_2(const struct edhoc_context *ctx,
|
|
719
|
-
const uint8_t *ctxt, size_t ctxt_len,
|
|
720
|
-
uint8_t *msg_2, size_t msg_2_size,
|
|
721
|
-
size_t *msg_2_len)
|
|
722
|
-
{
|
|
723
|
-
if (NULL == ctx || NULL == ctxt || 0 == ctxt_len || NULL == msg_2 ||
|
|
724
|
-
0 == msg_2_size || NULL == msg_2_len)
|
|
725
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
726
|
-
|
|
727
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
728
|
-
size_t offset = 0;
|
|
729
|
-
|
|
730
|
-
size_t len = 0;
|
|
731
|
-
len += ctx->dh_pub_key_len;
|
|
732
|
-
len += ctxt_len;
|
|
733
|
-
|
|
734
|
-
VLA_ALLOC(uint8_t, buffer, len);
|
|
735
|
-
memset(buffer, 0, VLA_SIZEOF(buffer));
|
|
736
|
-
|
|
737
|
-
memcpy(&buffer[offset], ctx->dh_pub_key, ctx->dh_pub_key_len);
|
|
738
|
-
offset += ctx->dh_pub_key_len;
|
|
739
|
-
|
|
740
|
-
memcpy(&buffer[offset], ctxt, ctxt_len);
|
|
741
|
-
offset += ctxt_len;
|
|
742
|
-
|
|
743
|
-
if (VLA_SIZE(buffer) < offset)
|
|
744
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
745
|
-
|
|
746
|
-
const struct zcbor_string cbor_msg_2 = {
|
|
747
|
-
.value = buffer,
|
|
748
|
-
.len = VLA_SIZE(buffer),
|
|
749
|
-
};
|
|
750
|
-
|
|
751
|
-
ret = cbor_encode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_size,
|
|
752
|
-
&cbor_msg_2, msg_2_len);
|
|
753
|
-
|
|
754
|
-
if (ZCBOR_SUCCESS != ret)
|
|
755
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
756
|
-
|
|
757
|
-
return EDHOC_SUCCESS;
|
|
758
|
-
}
|
|
759
|
-
|
|
760
|
-
static int comp_ciphertext_2_len(const struct edhoc_context *ctx,
|
|
761
|
-
const uint8_t *msg_2, size_t msg_2_len,
|
|
762
|
-
size_t *ctxt_len)
|
|
763
|
-
{
|
|
764
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
765
|
-
size_t len = 0;
|
|
766
|
-
|
|
767
|
-
struct zcbor_string dec_msg_2 = { 0 };
|
|
768
|
-
ret = cbor_decode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_len,
|
|
769
|
-
&dec_msg_2, &len);
|
|
770
|
-
|
|
771
|
-
if (EDHOC_SUCCESS != ret)
|
|
772
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
773
|
-
|
|
774
|
-
if (len > msg_2_len)
|
|
775
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
776
|
-
|
|
777
|
-
len = dec_msg_2.len;
|
|
778
|
-
len -= ctx->csuite[ctx->chosen_csuite_idx].ecc_key_length;
|
|
779
|
-
|
|
780
|
-
*ctxt_len = len;
|
|
781
|
-
return EDHOC_SUCCESS;
|
|
782
|
-
}
|
|
783
|
-
|
|
784
|
-
static int parse_msg_2(struct edhoc_context *ctx, const uint8_t *msg_2,
|
|
785
|
-
size_t msg_2_len, uint8_t *ctxt_2, size_t ctxt_2_len)
|
|
786
|
-
{
|
|
787
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
788
|
-
size_t len = 0;
|
|
789
|
-
|
|
790
|
-
struct zcbor_string dec_msg_2 = { 0 };
|
|
791
|
-
ret = cbor_decode_message_2_G_Y_CIPHERTEXT_2(msg_2, msg_2_len,
|
|
792
|
-
&dec_msg_2, &len);
|
|
793
|
-
|
|
794
|
-
if (EDHOC_SUCCESS != ret)
|
|
795
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
796
|
-
|
|
797
|
-
if (len > msg_2_len)
|
|
798
|
-
return EDHOC_ERROR_MSG_2_PROCESS_FAILURE;
|
|
799
|
-
|
|
800
|
-
/* Get Diffie-Hellmann peer public key (G_Y). */
|
|
801
|
-
const struct edhoc_cipher_suite csuite =
|
|
802
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
803
|
-
ctx->dh_peer_pub_key_len = csuite.ecc_key_length;
|
|
804
|
-
memcpy(ctx->dh_peer_pub_key, dec_msg_2.value, ctx->dh_peer_pub_key_len);
|
|
805
|
-
|
|
806
|
-
/* Get CIPHERTEXT_2. */
|
|
807
|
-
const size_t offset = ctx->dh_peer_pub_key_len;
|
|
808
|
-
memcpy(ctxt_2, &dec_msg_2.value[offset], ctxt_2_len);
|
|
809
|
-
|
|
810
|
-
return EDHOC_SUCCESS;
|
|
811
|
-
}
|
|
812
|
-
|
|
813
|
-
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
814
|
-
size_t ptxt_len, struct plaintext *parsed_ptxt)
|
|
815
|
-
{
|
|
816
|
-
if (NULL == ctx || NULL == ptxt || 0 == ptxt_len || NULL == parsed_ptxt)
|
|
817
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
818
|
-
|
|
819
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
820
|
-
size_t len = 0;
|
|
821
|
-
|
|
822
|
-
struct plaintext_2 cbor_ptxt_2 = { 0 };
|
|
823
|
-
ret = cbor_decode_plaintext_2(ptxt, ptxt_len, &cbor_ptxt_2, &len);
|
|
824
|
-
|
|
825
|
-
if (ZCBOR_SUCCESS != ret)
|
|
826
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
827
|
-
|
|
828
|
-
/* C_R */
|
|
829
|
-
switch (cbor_ptxt_2.plaintext_2_C_R_choice) {
|
|
830
|
-
case plaintext_2_C_R_int_c:
|
|
831
|
-
if (ONE_BYTE_CBOR_INT_MIN_VALUE >
|
|
832
|
-
(int8_t)cbor_ptxt_2.plaintext_2_C_R_int ||
|
|
833
|
-
ONE_BYTE_CBOR_INT_MAX_VALUE <
|
|
834
|
-
(int8_t)cbor_ptxt_2.plaintext_2_C_R_int)
|
|
835
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
836
|
-
|
|
837
|
-
ctx->peer_cid.encode_type = EDHOC_CID_TYPE_ONE_BYTE_INTEGER;
|
|
838
|
-
ctx->peer_cid.int_value =
|
|
839
|
-
(int8_t)cbor_ptxt_2.plaintext_2_C_R_int;
|
|
840
|
-
break;
|
|
841
|
-
|
|
842
|
-
case plaintext_2_C_R_bstr_c:
|
|
843
|
-
if (ARRAY_SIZE(ctx->peer_cid.bstr_value) <
|
|
844
|
-
cbor_ptxt_2.plaintext_2_C_R_bstr.len)
|
|
845
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
846
|
-
|
|
847
|
-
ctx->peer_cid.encode_type = EDHOC_CID_TYPE_BYTE_STRING;
|
|
848
|
-
ctx->peer_cid.bstr_length =
|
|
849
|
-
cbor_ptxt_2.plaintext_2_C_R_bstr.len;
|
|
850
|
-
memcpy(ctx->peer_cid.bstr_value,
|
|
851
|
-
cbor_ptxt_2.plaintext_2_C_R_bstr.value,
|
|
852
|
-
cbor_ptxt_2.plaintext_2_C_R_bstr.len);
|
|
853
|
-
break;
|
|
854
|
-
|
|
855
|
-
default:
|
|
856
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
857
|
-
}
|
|
858
|
-
|
|
859
|
-
/* ID_CRED_R */
|
|
860
|
-
switch (cbor_ptxt_2.plaintext_2_ID_CRED_R_choice) {
|
|
861
|
-
case plaintext_2_ID_CRED_R_int_c:
|
|
862
|
-
parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
|
|
863
|
-
parsed_ptxt->auth_cred.key_id.encode_type =
|
|
864
|
-
EDHOC_ENCODE_TYPE_INTEGER;
|
|
865
|
-
parsed_ptxt->auth_cred.key_id.key_id_int =
|
|
866
|
-
cbor_ptxt_2.plaintext_2_ID_CRED_R_int;
|
|
867
|
-
break;
|
|
868
|
-
|
|
869
|
-
case plaintext_2_ID_CRED_R_bstr_c:
|
|
870
|
-
parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
|
|
871
|
-
parsed_ptxt->auth_cred.key_id.encode_type =
|
|
872
|
-
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
873
|
-
parsed_ptxt->auth_cred.key_id.key_id_bstr_length =
|
|
874
|
-
cbor_ptxt_2.plaintext_2_ID_CRED_R_bstr.len;
|
|
875
|
-
memcpy(parsed_ptxt->auth_cred.key_id.key_id_bstr,
|
|
876
|
-
cbor_ptxt_2.plaintext_2_ID_CRED_R_bstr.value,
|
|
877
|
-
cbor_ptxt_2.plaintext_2_ID_CRED_R_bstr.len);
|
|
878
|
-
break;
|
|
879
|
-
|
|
880
|
-
case plaintext_2_ID_CRED_R_map_m_c: {
|
|
881
|
-
const struct map *cbor_map =
|
|
882
|
-
&cbor_ptxt_2.plaintext_2_ID_CRED_R_map_m;
|
|
883
|
-
|
|
884
|
-
if (cbor_map->map_x5chain_present) {
|
|
885
|
-
parsed_ptxt->auth_cred.label =
|
|
886
|
-
EDHOC_COSE_HEADER_X509_CHAIN;
|
|
887
|
-
|
|
888
|
-
const struct COSE_X509_r *cose_x509 =
|
|
889
|
-
&cbor_map->map_x5chain.map_x5chain;
|
|
890
|
-
|
|
891
|
-
switch (cose_x509->COSE_X509_choice) {
|
|
892
|
-
case COSE_X509_bstr_c:
|
|
893
|
-
parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
|
|
894
|
-
1;
|
|
895
|
-
parsed_ptxt->auth_cred.x509_chain.cert[0] =
|
|
896
|
-
cose_x509->COSE_X509_bstr.value;
|
|
897
|
-
parsed_ptxt->auth_cred.x509_chain.cert_len[0] =
|
|
898
|
-
cose_x509->COSE_X509_bstr.len;
|
|
899
|
-
break;
|
|
900
|
-
case COSE_X509_certs_l_c: {
|
|
901
|
-
if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_chain
|
|
902
|
-
.cert) <
|
|
903
|
-
cose_x509->COSE_X509_certs_l_certs_count)
|
|
904
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
905
|
-
|
|
906
|
-
parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
|
|
907
|
-
cose_x509->COSE_X509_certs_l_certs_count;
|
|
908
|
-
|
|
909
|
-
for (size_t i = 0;
|
|
910
|
-
i <
|
|
911
|
-
cose_x509->COSE_X509_certs_l_certs_count;
|
|
912
|
-
++i) {
|
|
913
|
-
parsed_ptxt->auth_cred.x509_chain
|
|
914
|
-
.cert[i] =
|
|
915
|
-
cose_x509
|
|
916
|
-
->COSE_X509_certs_l_certs
|
|
917
|
-
[i]
|
|
918
|
-
.value;
|
|
919
|
-
parsed_ptxt->auth_cred.x509_chain
|
|
920
|
-
.cert_len[i] =
|
|
921
|
-
cose_x509
|
|
922
|
-
->COSE_X509_certs_l_certs
|
|
923
|
-
[i]
|
|
924
|
-
.len;
|
|
925
|
-
}
|
|
926
|
-
break;
|
|
927
|
-
}
|
|
928
|
-
|
|
929
|
-
default:
|
|
930
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
931
|
-
}
|
|
932
|
-
}
|
|
933
|
-
|
|
934
|
-
if (cbor_map->map_x5t_present) {
|
|
935
|
-
parsed_ptxt->auth_cred.label =
|
|
936
|
-
EDHOC_COSE_HEADER_X509_HASH;
|
|
937
|
-
|
|
938
|
-
const struct COSE_CertHash *cose_x509 =
|
|
939
|
-
&cbor_map->map_x5t.map_x5t;
|
|
940
|
-
|
|
941
|
-
parsed_ptxt->auth_cred.x509_hash.cert_fp =
|
|
942
|
-
cose_x509->COSE_CertHash_hashValue.value;
|
|
943
|
-
parsed_ptxt->auth_cred.x509_hash.cert_fp_len =
|
|
944
|
-
cose_x509->COSE_CertHash_hashValue.len;
|
|
945
|
-
|
|
946
|
-
switch (cose_x509->COSE_CertHash_hashAlg_choice) {
|
|
947
|
-
case COSE_CertHash_hashAlg_int_c:
|
|
948
|
-
parsed_ptxt->auth_cred.x509_hash.encode_type =
|
|
949
|
-
EDHOC_ENCODE_TYPE_INTEGER;
|
|
950
|
-
parsed_ptxt->auth_cred.x509_hash.alg_int =
|
|
951
|
-
cose_x509->COSE_CertHash_hashAlg_int;
|
|
952
|
-
break;
|
|
953
|
-
case COSE_CertHash_hashAlg_tstr_c:
|
|
954
|
-
if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_hash
|
|
955
|
-
.alg_bstr) <
|
|
956
|
-
cose_x509->COSE_CertHash_hashAlg_tstr.len)
|
|
957
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
958
|
-
|
|
959
|
-
parsed_ptxt->auth_cred.x509_hash.encode_type =
|
|
960
|
-
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
961
|
-
parsed_ptxt->auth_cred.x509_hash
|
|
962
|
-
.alg_bstr_length =
|
|
963
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
964
|
-
.len;
|
|
965
|
-
memcpy(parsed_ptxt->auth_cred.x509_hash.alg_bstr,
|
|
966
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
967
|
-
.value,
|
|
968
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
969
|
-
.len);
|
|
970
|
-
break;
|
|
971
|
-
default:
|
|
972
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
973
|
-
}
|
|
974
|
-
|
|
975
|
-
break;
|
|
976
|
-
}
|
|
977
|
-
}
|
|
978
|
-
}
|
|
979
|
-
|
|
980
|
-
/* Sign_or_MAC_2 */
|
|
981
|
-
parsed_ptxt->sign_or_mac =
|
|
982
|
-
cbor_ptxt_2.plaintext_2_Signature_or_MAC_2.value;
|
|
983
|
-
parsed_ptxt->sign_or_mac_len =
|
|
984
|
-
cbor_ptxt_2.plaintext_2_Signature_or_MAC_2.len;
|
|
985
|
-
|
|
986
|
-
/* EAD_2 if present */
|
|
987
|
-
if (cbor_ptxt_2.plaintext_2_EAD_2_m_present) {
|
|
988
|
-
ctx->nr_of_ead_tokens =
|
|
989
|
-
cbor_ptxt_2.plaintext_2_EAD_2_m.EAD_2_count;
|
|
990
|
-
|
|
991
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
992
|
-
ctx->ead_token[i].label =
|
|
993
|
-
cbor_ptxt_2.plaintext_2_EAD_2_m.EAD_2[i]
|
|
994
|
-
.ead_y_ead_label;
|
|
995
|
-
ctx->ead_token[i].value =
|
|
996
|
-
cbor_ptxt_2.plaintext_2_EAD_2_m.EAD_2[i]
|
|
997
|
-
.ead_y_ead_value.value;
|
|
998
|
-
ctx->ead_token[i].value_len =
|
|
999
|
-
cbor_ptxt_2.plaintext_2_EAD_2_m.EAD_2[i]
|
|
1000
|
-
.ead_y_ead_value.len;
|
|
1001
|
-
}
|
|
1002
|
-
}
|
|
1003
|
-
|
|
1004
|
-
return EDHOC_SUCCESS;
|
|
1005
|
-
}
|
|
1006
|
-
|
|
1007
|
-
static int comp_th_3(struct edhoc_context *ctx,
|
|
1008
|
-
const struct mac_context *mac_ctx, const uint8_t *ptxt,
|
|
1009
|
-
size_t ptxt_len)
|
|
1010
|
-
{
|
|
1011
|
-
if (NULL == ctx || NULL == mac_ctx || NULL == ptxt || 0 == ptxt_len)
|
|
1012
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1013
|
-
|
|
1014
|
-
if (EDHOC_TH_STATE_2 != ctx->th_state)
|
|
1015
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1016
|
-
|
|
1017
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1018
|
-
|
|
1019
|
-
size_t len = 0;
|
|
1020
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
1021
|
-
len += ptxt_len;
|
|
1022
|
-
len += mac_ctx->cred_len;
|
|
1023
|
-
|
|
1024
|
-
VLA_ALLOC(uint8_t, th_3, len);
|
|
1025
|
-
memset(th_3, 0, VLA_SIZEOF(th_3));
|
|
1026
|
-
|
|
1027
|
-
size_t offset = 0;
|
|
1028
|
-
struct zcbor_string bstr = (struct zcbor_string){
|
|
1029
|
-
.value = ctx->th,
|
|
1030
|
-
.len = ctx->th_len,
|
|
1031
|
-
};
|
|
1032
|
-
|
|
1033
|
-
len = 0;
|
|
1034
|
-
ret = cbor_encode_byte_string_type_bstr_type(
|
|
1035
|
-
&th_3[offset], VLA_SIZE(th_3), &bstr, &len);
|
|
1036
|
-
offset += len;
|
|
1037
|
-
|
|
1038
|
-
if (EDHOC_SUCCESS != ret)
|
|
1039
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1040
|
-
|
|
1041
|
-
memcpy(&th_3[offset], ptxt, ptxt_len);
|
|
1042
|
-
offset += ptxt_len;
|
|
1043
|
-
|
|
1044
|
-
memcpy(&th_3[offset], mac_ctx->cred, mac_ctx->cred_len);
|
|
1045
|
-
offset += mac_ctx->cred_len;
|
|
1046
|
-
|
|
1047
|
-
if (VLA_SIZE(th_3) < offset)
|
|
1048
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1049
|
-
|
|
1050
|
-
/* Calculate TH_3. */
|
|
1051
|
-
ctx->th_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
1052
|
-
|
|
1053
|
-
size_t hash_len = 0;
|
|
1054
|
-
ret = ctx->crypto.hash(ctx->user_ctx, th_3, VLA_SIZE(th_3), ctx->th,
|
|
1055
|
-
ctx->th_len, &hash_len);
|
|
1056
|
-
|
|
1057
|
-
if (EDHOC_SUCCESS != ret)
|
|
1058
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1059
|
-
|
|
1060
|
-
ctx->th_state = EDHOC_TH_STATE_3;
|
|
1061
|
-
return EDHOC_SUCCESS;
|
|
1062
|
-
}
|
|
1063
|
-
|
|
1064
|
-
static int comp_salt_3e2m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
1065
|
-
size_t salt_len)
|
|
1066
|
-
{
|
|
1067
|
-
if (NULL == ctx || NULL == salt || 0 == salt_len)
|
|
1068
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1069
|
-
|
|
1070
|
-
if (EDHOC_TH_STATE_2 != ctx->th_state ||
|
|
1071
|
-
EDHOC_PRK_STATE_2E != ctx->prk_state)
|
|
1072
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1073
|
-
|
|
1074
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1075
|
-
const size_t hash_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
1076
|
-
|
|
1077
|
-
const struct info input_info = {
|
|
1078
|
-
.info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_3E2M,
|
|
1079
|
-
.info_context.value = ctx->th,
|
|
1080
|
-
.info_context.len = ctx->th_len,
|
|
1081
|
-
.info_length = (uint32_t)hash_len,
|
|
1082
|
-
};
|
|
1083
|
-
|
|
1084
|
-
size_t len = 0;
|
|
1085
|
-
len += edhoc_cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_3E2M);
|
|
1086
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
1087
|
-
len += edhoc_cbor_int_mem_req((int32_t)hash_len);
|
|
1088
|
-
|
|
1089
|
-
VLA_ALLOC(uint8_t, info, len);
|
|
1090
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
1091
|
-
|
|
1092
|
-
len = 0;
|
|
1093
|
-
ret = cbor_encode_info(info, VLA_SIZE(info), &input_info, &len);
|
|
1094
|
-
|
|
1095
|
-
if (ZCBOR_SUCCESS != ret || VLA_SIZE(info) != len)
|
|
1096
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1097
|
-
|
|
1098
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
1099
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
1100
|
-
ctx->prk_len, key_id);
|
|
1101
|
-
|
|
1102
|
-
if (EDHOC_SUCCESS != ret)
|
|
1103
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1104
|
-
|
|
1105
|
-
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, VLA_SIZE(info),
|
|
1106
|
-
salt, salt_len);
|
|
1107
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1108
|
-
|
|
1109
|
-
if (EDHOC_SUCCESS != ret)
|
|
1110
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1111
|
-
|
|
1112
|
-
return EDHOC_SUCCESS;
|
|
1113
|
-
}
|
|
1114
|
-
|
|
1115
|
-
static int comp_grx(struct edhoc_context *ctx,
|
|
1116
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
1117
|
-
const uint8_t *pub_key, size_t pub_key_len, uint8_t *grx,
|
|
1118
|
-
size_t grx_len)
|
|
1119
|
-
{
|
|
1120
|
-
if (NULL == ctx || NULL == auth_cred || NULL == grx || 0 == grx_len)
|
|
1121
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1122
|
-
|
|
1123
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1124
|
-
|
|
1125
|
-
switch (ctx->role) {
|
|
1126
|
-
case EDHOC_INITIATOR: {
|
|
1127
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
1128
|
-
ret = ctx->keys.import_key(ctx->user_ctx,
|
|
1129
|
-
EDHOC_KT_KEY_AGREEMENT,
|
|
1130
|
-
ctx->dh_priv_key,
|
|
1131
|
-
ctx->dh_priv_key_len, key_id);
|
|
1132
|
-
ctx->dh_priv_key_len = 0;
|
|
1133
|
-
memset(ctx->dh_priv_key, 0, ARRAY_SIZE(ctx->dh_priv_key));
|
|
1134
|
-
|
|
1135
|
-
if (EDHOC_SUCCESS != ret)
|
|
1136
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1137
|
-
|
|
1138
|
-
size_t secret_len = 0;
|
|
1139
|
-
ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id, pub_key,
|
|
1140
|
-
pub_key_len, grx, grx_len,
|
|
1141
|
-
&secret_len);
|
|
1142
|
-
|
|
1143
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
1144
|
-
memset(key_id, 0, sizeof(key_id));
|
|
1145
|
-
|
|
1146
|
-
if (EDHOC_SUCCESS != ret || secret_len != grx_len)
|
|
1147
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1148
|
-
|
|
1149
|
-
return EDHOC_SUCCESS;
|
|
1150
|
-
}
|
|
1151
|
-
|
|
1152
|
-
case EDHOC_RESPONDER: {
|
|
1153
|
-
size_t secret_len = 0;
|
|
1154
|
-
ret = ctx->crypto.key_agreement(ctx->user_ctx,
|
|
1155
|
-
auth_cred->priv_key_id,
|
|
1156
|
-
ctx->dh_peer_pub_key,
|
|
1157
|
-
ctx->dh_peer_pub_key_len, grx,
|
|
1158
|
-
grx_len, &secret_len);
|
|
1159
|
-
|
|
1160
|
-
if (EDHOC_SUCCESS != ret || secret_len != grx_len)
|
|
1161
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1162
|
-
|
|
1163
|
-
return EDHOC_SUCCESS;
|
|
1164
|
-
}
|
|
1165
|
-
|
|
1166
|
-
default:
|
|
1167
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1168
|
-
}
|
|
1169
|
-
|
|
1170
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1171
|
-
}
|
|
1172
|
-
|
|
1173
|
-
/* Module interface function definitions ----------------------------------- */
|
|
1174
|
-
|
|
1175
|
-
/**
|
|
1176
|
-
* Steps for composition of message 2:
|
|
1177
|
-
* 1. Generate ephemeral Diffie-Hellmann key pair.
|
|
1178
|
-
* 2. Compute Diffie-Hellmann shared secret.
|
|
1179
|
-
* 3. Compute Transcript Hash 2 (TH_2).
|
|
1180
|
-
* 4a. Compute Pseudo Random Key 2 (PRK_2e).
|
|
1181
|
-
* 4b. Copy of Pseudo Random Key 2 for keystream (step 12).
|
|
1182
|
-
* 5. Fetch authentication credentials.
|
|
1183
|
-
* 6. Compose EAD_2 if present.
|
|
1184
|
-
* 7. Compute psuedo random key (PRK_3e2m).
|
|
1185
|
-
* 8a. Compute required buffer length for context_2.
|
|
1186
|
-
* 8b. Cborise items required by context_2.
|
|
1187
|
-
* 8c. Compute Message Authentication Code (MAC_2).
|
|
1188
|
-
* 9. Compute signature if needed (Signature_or_MAC_2).
|
|
1189
|
-
* 10. Prepare plaintext (PLAINTEXT_2).
|
|
1190
|
-
* 11. Compute key stream (KEYSTREAM_2).
|
|
1191
|
-
* 12. Compute Transcript Hash 3 (TH_3).
|
|
1192
|
-
* 13. Compute ciphertext (CIPHERTEXT_2).
|
|
1193
|
-
* 14. Cborise items for message 2.
|
|
1194
|
-
* 15. Clean-up EAD tokens.
|
|
1195
|
-
*/
|
|
1196
|
-
int edhoc_message_2_compose(struct edhoc_context *ctx, uint8_t *msg_2,
|
|
1197
|
-
size_t msg_2_size, size_t *msg_2_len)
|
|
1198
|
-
{
|
|
1199
|
-
if (NULL == ctx || msg_2 == NULL || 0 == msg_2_size ||
|
|
1200
|
-
NULL == msg_2_len)
|
|
1201
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1202
|
-
|
|
1203
|
-
if (EDHOC_SM_RECEIVED_M1 != ctx->status ||
|
|
1204
|
-
EDHOC_TH_STATE_1 != ctx->th_state ||
|
|
1205
|
-
EDHOC_PRK_STATE_INVALID != ctx->prk_state)
|
|
1206
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1207
|
-
|
|
1208
|
-
ctx->status = EDHOC_SM_ABORTED;
|
|
1209
|
-
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
1210
|
-
ctx->message = EDHOC_MSG_2;
|
|
1211
|
-
ctx->role = EDHOC_RESPONDER;
|
|
1212
|
-
|
|
1213
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1214
|
-
|
|
1215
|
-
/* 1. Generate ephemeral Diffie-Hellmann key pair. */
|
|
1216
|
-
ret = gen_dh_keys(ctx);
|
|
1217
|
-
|
|
1218
|
-
if (EDHOC_SUCCESS != ret)
|
|
1219
|
-
return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
|
|
1220
|
-
|
|
1221
|
-
if (NULL != ctx->logger) {
|
|
1222
|
-
ctx->logger(ctx->user_ctx, "G_Y", ctx->dh_pub_key,
|
|
1223
|
-
ctx->dh_pub_key_len);
|
|
1224
|
-
ctx->logger(ctx->user_ctx, "Y", ctx->dh_priv_key,
|
|
1225
|
-
ctx->dh_priv_key_len);
|
|
1226
|
-
}
|
|
1227
|
-
|
|
1228
|
-
/* 2. Compute Diffie-Hellmann shared secret. */
|
|
1229
|
-
ret = comp_dh_secret(ctx);
|
|
1230
|
-
|
|
1231
|
-
if (EDHOC_SUCCESS != ret)
|
|
1232
|
-
return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
|
|
1233
|
-
|
|
1234
|
-
if (NULL != ctx->logger)
|
|
1235
|
-
ctx->logger(ctx->user_ctx, "G_XY", ctx->dh_secret,
|
|
1236
|
-
ctx->dh_secret_len);
|
|
1237
|
-
|
|
1238
|
-
/* 3. Compute Transcript Hash 2 (TH_2). */
|
|
1239
|
-
ret = comp_th_2(ctx);
|
|
1240
|
-
|
|
1241
|
-
if (EDHOC_SUCCESS != ret)
|
|
1242
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1243
|
-
|
|
1244
|
-
if (NULL != ctx->logger)
|
|
1245
|
-
ctx->logger(ctx->user_ctx, "TH_2", ctx->th, ctx->th_len);
|
|
1246
|
-
|
|
1247
|
-
/* 4a. Compute Pseudo Random Key 2 (PRK_2e). */
|
|
1248
|
-
ret = comp_prk_2e(ctx);
|
|
1249
|
-
|
|
1250
|
-
if (EDHOC_SUCCESS != ret)
|
|
1251
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1252
|
-
|
|
1253
|
-
if (NULL != ctx->logger)
|
|
1254
|
-
ctx->logger(ctx->user_ctx, "PRK_2e", ctx->prk, ctx->prk_len);
|
|
1255
|
-
|
|
1256
|
-
/* 4b. Copy of Pseudo Random Key 2 for keystream (step 11). */
|
|
1257
|
-
VLA_ALLOC(uint8_t, prk_2e, ctx->prk_len);
|
|
1258
|
-
memcpy(prk_2e, ctx->prk, VLA_SIZEOF(prk_2e));
|
|
1259
|
-
|
|
1260
|
-
/* 5. Fetch authentication credentials. */
|
|
1261
|
-
struct edhoc_auth_creds auth_cred = { 0 };
|
|
1262
|
-
ret = ctx->cred.fetch(ctx->user_ctx, &auth_cred);
|
|
1263
|
-
|
|
1264
|
-
if (EDHOC_SUCCESS != ret)
|
|
1265
|
-
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1266
|
-
|
|
1267
|
-
/* 6. Compose EAD_2 if present. */
|
|
1268
|
-
if (NULL != ctx->ead.compose && 0 != ARRAY_SIZE(ctx->ead_token) - 1) {
|
|
1269
|
-
ret = ctx->ead.compose(ctx->user_ctx, ctx->message,
|
|
1270
|
-
ctx->ead_token,
|
|
1271
|
-
ARRAY_SIZE(ctx->ead_token) - 1,
|
|
1272
|
-
&ctx->nr_of_ead_tokens);
|
|
1273
|
-
|
|
1274
|
-
if (EDHOC_SUCCESS != ret ||
|
|
1275
|
-
ARRAY_SIZE(ctx->ead_token) - 1 < ctx->nr_of_ead_tokens)
|
|
1276
|
-
return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
|
|
1277
|
-
|
|
1278
|
-
if (NULL != ctx->logger) {
|
|
1279
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1280
|
-
ctx->logger(ctx->user_ctx,
|
|
1281
|
-
"EAD_2 compose label",
|
|
1282
|
-
(const uint8_t *)&ctx->ead_token[i]
|
|
1283
|
-
.label,
|
|
1284
|
-
sizeof(ctx->ead_token[i].label));
|
|
1285
|
-
|
|
1286
|
-
if (0 != ctx->ead_token[i].value_len)
|
|
1287
|
-
ctx->logger(
|
|
1288
|
-
ctx->user_ctx,
|
|
1289
|
-
"EAD_2 compose value",
|
|
1290
|
-
ctx->ead_token[i].value,
|
|
1291
|
-
ctx->ead_token[i].value_len);
|
|
1292
|
-
}
|
|
1293
|
-
}
|
|
1294
|
-
}
|
|
1295
|
-
|
|
1296
|
-
/* 7. Compute psuedo random key (PRK_3e2m). */
|
|
1297
|
-
ret = comp_prk_3e2m(ctx, &auth_cred, NULL, 0);
|
|
1298
|
-
|
|
1299
|
-
if (EDHOC_SUCCESS != ret)
|
|
1300
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1301
|
-
|
|
1302
|
-
if (NULL != ctx->logger)
|
|
1303
|
-
ctx->logger(ctx->user_ctx, "PRK_3e2m", ctx->prk, ctx->prk_len);
|
|
1304
|
-
|
|
1305
|
-
/* 8a. Compute required buffer length for context_2. */
|
|
1306
|
-
size_t mac_ctx_len = 0;
|
|
1307
|
-
ret = edhoc_comp_mac_context_length(ctx, &auth_cred, &mac_ctx_len);
|
|
1308
|
-
|
|
1309
|
-
if (EDHOC_SUCCESS != ret)
|
|
1310
|
-
return ret;
|
|
1311
|
-
|
|
1312
|
-
/* 8b. Cborise items required by context_2. */
|
|
1313
|
-
VLA_ALLOC(uint8_t, mac_ctx_buf,
|
|
1314
|
-
sizeof(struct mac_context) + mac_ctx_len);
|
|
1315
|
-
memset(mac_ctx_buf, 0, VLA_SIZEOF(mac_ctx_buf));
|
|
1316
|
-
|
|
1317
|
-
struct mac_context *mac_ctx = (void *)mac_ctx_buf;
|
|
1318
|
-
mac_ctx->buf_len = mac_ctx_len;
|
|
1319
|
-
|
|
1320
|
-
ret = edhoc_comp_mac_context(ctx, &auth_cred, mac_ctx);
|
|
1321
|
-
if (EDHOC_SUCCESS != ret)
|
|
1322
|
-
return ret;
|
|
1323
|
-
|
|
1324
|
-
if (NULL != ctx->logger) {
|
|
1325
|
-
ctx->logger(ctx->user_ctx, "C_R", mac_ctx->conn_id,
|
|
1326
|
-
mac_ctx->conn_id_len);
|
|
1327
|
-
ctx->logger(ctx->user_ctx, "ID_CRED_R", mac_ctx->id_cred,
|
|
1328
|
-
mac_ctx->id_cred_len);
|
|
1329
|
-
ctx->logger(ctx->user_ctx, "TH_2", mac_ctx->th,
|
|
1330
|
-
mac_ctx->th_len);
|
|
1331
|
-
ctx->logger(ctx->user_ctx, "CRED_R", mac_ctx->cred,
|
|
1332
|
-
mac_ctx->cred_len);
|
|
1333
|
-
ctx->logger(ctx->user_ctx, "context_2", mac_ctx->buf,
|
|
1334
|
-
mac_ctx->buf_len);
|
|
1335
|
-
}
|
|
1336
|
-
|
|
1337
|
-
/* 8c. Compute Message Authentication Code (MAC_2). */
|
|
1338
|
-
size_t mac_length = 0;
|
|
1339
|
-
ret = edhoc_comp_mac_length(ctx, &mac_length);
|
|
1340
|
-
if (EDHOC_SUCCESS != ret)
|
|
1341
|
-
return ret;
|
|
1342
|
-
|
|
1343
|
-
VLA_ALLOC(uint8_t, mac_buf, mac_length);
|
|
1344
|
-
memset(mac_buf, 0, VLA_SIZEOF(mac_buf));
|
|
1345
|
-
ret = edhoc_comp_mac(ctx, mac_ctx, mac_buf, mac_length);
|
|
1346
|
-
if (EDHOC_SUCCESS != ret)
|
|
1347
|
-
return ret;
|
|
1348
|
-
|
|
1349
|
-
/* 9. Compute signature if needed (Signature_or_MAC_2). */
|
|
1350
|
-
size_t sign_or_mac_length = 0;
|
|
1351
|
-
ret = edhoc_comp_sign_or_mac_length(ctx, &sign_or_mac_length);
|
|
1352
|
-
if (EDHOC_SUCCESS != ret)
|
|
1353
|
-
return ret;
|
|
1354
|
-
|
|
1355
|
-
size_t signature_length = 0;
|
|
1356
|
-
VLA_ALLOC(uint8_t, signature, sign_or_mac_length);
|
|
1357
|
-
memset(signature, 0, VLA_SIZEOF(signature));
|
|
1358
|
-
ret = edhoc_comp_sign_or_mac(ctx, &auth_cred, mac_ctx, mac_buf,
|
|
1359
|
-
mac_length, signature, VLA_SIZE(signature),
|
|
1360
|
-
&signature_length);
|
|
1361
|
-
if (EDHOC_SUCCESS != ret)
|
|
1362
|
-
return ret;
|
|
1363
|
-
|
|
1364
|
-
if (NULL != ctx->logger)
|
|
1365
|
-
ctx->logger(ctx->user_ctx, "Signature_or_MAC_2", signature,
|
|
1366
|
-
signature_length);
|
|
1367
|
-
|
|
1368
|
-
/* 10. Prepare plaintext (PLAINTEXT_2). */
|
|
1369
|
-
size_t plaintext_len = 0;
|
|
1370
|
-
ret = comp_plaintext_2_len(ctx, mac_ctx, signature_length,
|
|
1371
|
-
&plaintext_len);
|
|
1372
|
-
|
|
1373
|
-
if (EDHOC_SUCCESS != ret)
|
|
1374
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1375
|
-
|
|
1376
|
-
VLA_ALLOC(uint8_t, plaintext, plaintext_len);
|
|
1377
|
-
memset(plaintext, 0, VLA_SIZEOF(plaintext));
|
|
1378
|
-
|
|
1379
|
-
plaintext_len = 0;
|
|
1380
|
-
ret = prepare_plaintext_2(ctx, mac_ctx, signature, signature_length,
|
|
1381
|
-
plaintext, VLA_SIZE(plaintext),
|
|
1382
|
-
&plaintext_len);
|
|
1383
|
-
|
|
1384
|
-
if (EDHOC_SUCCESS != ret)
|
|
1385
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1386
|
-
|
|
1387
|
-
if (NULL != ctx->logger)
|
|
1388
|
-
ctx->logger(ctx->user_ctx, "PLAINTEXT_2", plaintext,
|
|
1389
|
-
plaintext_len);
|
|
1390
|
-
|
|
1391
|
-
/* 11. Compute key stream (KEYSTREAM_2). */
|
|
1392
|
-
VLA_ALLOC(uint8_t, keystream, plaintext_len);
|
|
1393
|
-
memset(keystream, 0, VLA_SIZEOF(keystream));
|
|
1394
|
-
|
|
1395
|
-
ret = comp_keystream(ctx, prk_2e, VLA_SIZE(prk_2e), keystream,
|
|
1396
|
-
VLA_SIZE(keystream));
|
|
1397
|
-
memset(prk_2e, 0, VLA_SIZEOF(prk_2e));
|
|
1398
|
-
|
|
1399
|
-
if (EDHOC_SUCCESS != ret)
|
|
1400
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1401
|
-
|
|
1402
|
-
if (NULL != ctx->logger)
|
|
1403
|
-
ctx->logger(ctx->user_ctx, "KEYSTREAM_2", keystream,
|
|
1404
|
-
VLA_SIZE(keystream));
|
|
1405
|
-
|
|
1406
|
-
/* 12. Compute Transcript Hash 3 (TH_3). */
|
|
1407
|
-
ret = comp_th_3(ctx, mac_ctx, plaintext, plaintext_len);
|
|
1408
|
-
|
|
1409
|
-
if (EDHOC_SUCCESS != ret)
|
|
1410
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1411
|
-
|
|
1412
|
-
if (NULL != ctx->logger)
|
|
1413
|
-
ctx->logger(ctx->user_ctx, "TH_3", ctx->th, ctx->th_len);
|
|
1414
|
-
|
|
1415
|
-
/* 13. Compute ciphertext (CIPHERTEXT_2). */
|
|
1416
|
-
xor_arrays(plaintext, keystream, plaintext_len);
|
|
1417
|
-
const uint8_t *ciphertext = plaintext;
|
|
1418
|
-
const size_t ciphertext_len = plaintext_len;
|
|
1419
|
-
|
|
1420
|
-
if (NULL != ctx->logger)
|
|
1421
|
-
ctx->logger(ctx->user_ctx, "CIPHERTEXT_2", ciphertext,
|
|
1422
|
-
ciphertext_len);
|
|
1423
|
-
|
|
1424
|
-
/* 14. Cborise items for message 2. */
|
|
1425
|
-
ret = prepare_message_2(ctx, ciphertext, ciphertext_len, msg_2,
|
|
1426
|
-
msg_2_size, msg_2_len);
|
|
1427
|
-
|
|
1428
|
-
if (EDHOC_SUCCESS != ret)
|
|
1429
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1430
|
-
|
|
1431
|
-
if (NULL != ctx->logger)
|
|
1432
|
-
ctx->logger(ctx->user_ctx, "message_2", msg_2, *msg_2_len);
|
|
1433
|
-
|
|
1434
|
-
/* 15. Clean-up EAD tokens. */
|
|
1435
|
-
ctx->nr_of_ead_tokens = 0;
|
|
1436
|
-
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
1437
|
-
|
|
1438
|
-
ctx->status = EDHOC_SM_WAIT_M3;
|
|
1439
|
-
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
1440
|
-
return EDHOC_SUCCESS;
|
|
1441
|
-
}
|
|
1442
|
-
|
|
1443
|
-
/**
|
|
1444
|
-
* Steps for processing of message 2:
|
|
1445
|
-
* 1. Compute required length for ciphertext.
|
|
1446
|
-
* 2. Decode cborised message 2.
|
|
1447
|
-
* 3. Compute Diffie-Hellmann shared secret (G_XY).
|
|
1448
|
-
* 4. Compute Transcript Hash 2 (TH_2).
|
|
1449
|
-
* 5. Compute Pseudo Random Key 2 (PRK_2e).
|
|
1450
|
-
* 6. Compute key stream (KEYSTREAM_2).
|
|
1451
|
-
* 7. Compute plaintext (PLAINTEXT_2).
|
|
1452
|
-
* 8. Parse plaintext (PLAINTEXT_2).
|
|
1453
|
-
* 9. Process EAD if present.
|
|
1454
|
-
* 10. Verify if credentials from peer are trusted.
|
|
1455
|
-
* 11. Compute psuedo random key (PRK_3e2m).
|
|
1456
|
-
* 12. Compute required buffer length for context_2.
|
|
1457
|
-
* 13. Cborise items required by context_2.
|
|
1458
|
-
* 14. Compute Message Authentication Code (MAC_2).
|
|
1459
|
-
* 15. Verify Signature_or_MAC_2.
|
|
1460
|
-
* 16. Compute Transcript Hash 3 (TH_3).
|
|
1461
|
-
* 17. Clean-up EAD tokens.
|
|
1462
|
-
*/
|
|
1463
|
-
int edhoc_message_2_process(struct edhoc_context *ctx, const uint8_t *msg_2,
|
|
1464
|
-
size_t msg_2_len)
|
|
1465
|
-
{
|
|
1466
|
-
if (NULL == ctx || NULL == msg_2 || 0 == msg_2_len)
|
|
1467
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1468
|
-
|
|
1469
|
-
if (EDHOC_SM_WAIT_M2 != ctx->status ||
|
|
1470
|
-
EDHOC_TH_STATE_1 != ctx->th_state ||
|
|
1471
|
-
EDHOC_PRK_STATE_INVALID != ctx->prk_state)
|
|
1472
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1473
|
-
|
|
1474
|
-
ctx->status = EDHOC_SM_ABORTED;
|
|
1475
|
-
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
1476
|
-
ctx->message = EDHOC_MSG_2;
|
|
1477
|
-
ctx->role = EDHOC_INITIATOR;
|
|
1478
|
-
|
|
1479
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1480
|
-
size_t len = 0;
|
|
1481
|
-
|
|
1482
|
-
/* 1. Compute required length for ciphertext. */
|
|
1483
|
-
ret = comp_ciphertext_2_len(ctx, msg_2, msg_2_len, &len);
|
|
1484
|
-
|
|
1485
|
-
if (EDHOC_SUCCESS != ret)
|
|
1486
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1487
|
-
|
|
1488
|
-
VLA_ALLOC(uint8_t, ciphertext_2, len);
|
|
1489
|
-
memset(ciphertext_2, 0, VLA_SIZEOF(ciphertext_2));
|
|
1490
|
-
|
|
1491
|
-
/* 2. Decode cborised message 2. */
|
|
1492
|
-
ret = parse_msg_2(ctx, msg_2, msg_2_len, ciphertext_2,
|
|
1493
|
-
VLA_SIZE(ciphertext_2));
|
|
1494
|
-
|
|
1495
|
-
if (EDHOC_SUCCESS != ret)
|
|
1496
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1497
|
-
|
|
1498
|
-
if (NULL != ctx->logger)
|
|
1499
|
-
ctx->logger(ctx->user_ctx, "CIPHERTEXT_2", ciphertext_2,
|
|
1500
|
-
VLA_SIZE(ciphertext_2));
|
|
1501
|
-
|
|
1502
|
-
/* 3. Compute Diffie-Hellmann shared secret (G_XY). */
|
|
1503
|
-
ret = comp_dh_secret(ctx);
|
|
1504
|
-
|
|
1505
|
-
if (EDHOC_SUCCESS != ret)
|
|
1506
|
-
return EDHOC_ERROR_EPHEMERAL_DIFFIE_HELLMAN_FAILURE;
|
|
1507
|
-
|
|
1508
|
-
if (NULL != ctx->logger)
|
|
1509
|
-
ctx->logger(ctx->user_ctx, "G_XY", ctx->dh_secret,
|
|
1510
|
-
ctx->dh_secret_len);
|
|
1511
|
-
|
|
1512
|
-
/* 4. Compute Transcript Hash 2 (TH_2). */
|
|
1513
|
-
ret = comp_th_2(ctx);
|
|
1514
|
-
|
|
1515
|
-
if (EDHOC_SUCCESS != ret)
|
|
1516
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1517
|
-
|
|
1518
|
-
if (NULL != ctx->logger)
|
|
1519
|
-
ctx->logger(ctx->user_ctx, "TH_2", ctx->th, ctx->th_len);
|
|
1520
|
-
|
|
1521
|
-
/* 5. Compute Pseudo Random Key 2 (PRK_2e). */
|
|
1522
|
-
ret = comp_prk_2e(ctx);
|
|
1523
|
-
|
|
1524
|
-
if (EDHOC_SUCCESS != ret)
|
|
1525
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1526
|
-
|
|
1527
|
-
if (NULL != ctx->logger)
|
|
1528
|
-
ctx->logger(ctx->user_ctx, "PRK_2e", ctx->prk, ctx->prk_len);
|
|
1529
|
-
|
|
1530
|
-
/* 6. Compute key stream (KEYSTREAM_2). */
|
|
1531
|
-
VLA_ALLOC(uint8_t, keystream, VLA_SIZE(ciphertext_2));
|
|
1532
|
-
memset(keystream, 0, VLA_SIZEOF(keystream));
|
|
1533
|
-
|
|
1534
|
-
ret = comp_keystream(ctx, ctx->prk, ctx->prk_len, keystream,
|
|
1535
|
-
VLA_SIZE(keystream));
|
|
1536
|
-
|
|
1537
|
-
if (EDHOC_SUCCESS != ret)
|
|
1538
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1539
|
-
|
|
1540
|
-
if (NULL != ctx->logger)
|
|
1541
|
-
ctx->logger(ctx->user_ctx, "KEYSTREAM", keystream,
|
|
1542
|
-
VLA_SIZE(keystream));
|
|
1543
|
-
|
|
1544
|
-
/* 7. Compute plaintext (PLAINTEXT_2). */
|
|
1545
|
-
xor_arrays(ciphertext_2, keystream, VLA_SIZE(ciphertext_2));
|
|
1546
|
-
const uint8_t *plaintext = ciphertext_2;
|
|
1547
|
-
const size_t plaintext_len = VLA_SIZE(ciphertext_2);
|
|
1548
|
-
|
|
1549
|
-
if (NULL != ctx->logger)
|
|
1550
|
-
ctx->logger(ctx->user_ctx, "PLAINTEXT_2", plaintext,
|
|
1551
|
-
plaintext_len);
|
|
1552
|
-
|
|
1553
|
-
/* 8. Parse plaintext (PLAINTEXT_2). */
|
|
1554
|
-
struct plaintext parsed_ptxt = { 0 };
|
|
1555
|
-
ret = parse_plaintext(ctx, plaintext, plaintext_len, &parsed_ptxt);
|
|
1556
|
-
|
|
1557
|
-
if (EDHOC_SUCCESS != ret)
|
|
1558
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1559
|
-
|
|
1560
|
-
if (NULL != ctx->logger) {
|
|
1561
|
-
switch (ctx->peer_cid.encode_type) {
|
|
1562
|
-
case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
|
|
1563
|
-
ctx->logger(ctx->user_ctx, "C_R",
|
|
1564
|
-
(const uint8_t *)&ctx->peer_cid.int_value,
|
|
1565
|
-
sizeof(ctx->peer_cid.int_value));
|
|
1566
|
-
break;
|
|
1567
|
-
case EDHOC_CID_TYPE_BYTE_STRING:
|
|
1568
|
-
ctx->logger(ctx->user_ctx, "C_R",
|
|
1569
|
-
ctx->peer_cid.bstr_value,
|
|
1570
|
-
ctx->peer_cid.bstr_length);
|
|
1571
|
-
break;
|
|
1572
|
-
|
|
1573
|
-
default:
|
|
1574
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1575
|
-
}
|
|
1576
|
-
}
|
|
1577
|
-
|
|
1578
|
-
/* 9. Process EAD if present. */
|
|
1579
|
-
if (NULL != ctx->ead.process && 0 != ARRAY_SIZE(ctx->ead_token) - 1 &&
|
|
1580
|
-
0 != ctx->nr_of_ead_tokens) {
|
|
1581
|
-
ret = ctx->ead.process(ctx->user_ctx, ctx->message,
|
|
1582
|
-
ctx->ead_token, ctx->nr_of_ead_tokens);
|
|
1583
|
-
|
|
1584
|
-
if (EDHOC_SUCCESS != ret)
|
|
1585
|
-
return EDHOC_ERROR_EAD_PROCESS_FAILURE;
|
|
1586
|
-
|
|
1587
|
-
if (NULL != ctx->logger) {
|
|
1588
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1589
|
-
ctx->logger(ctx->user_ctx,
|
|
1590
|
-
"EAD_2 process label",
|
|
1591
|
-
(const uint8_t *)&ctx->ead_token[i]
|
|
1592
|
-
.label,
|
|
1593
|
-
sizeof(ctx->ead_token[i].label));
|
|
1594
|
-
|
|
1595
|
-
if (0 != ctx->ead_token[i].value_len)
|
|
1596
|
-
ctx->logger(
|
|
1597
|
-
ctx->user_ctx,
|
|
1598
|
-
"EAD_2 process value",
|
|
1599
|
-
ctx->ead_token[i].value,
|
|
1600
|
-
ctx->ead_token[i].value_len);
|
|
1601
|
-
}
|
|
1602
|
-
}
|
|
1603
|
-
}
|
|
1604
|
-
|
|
1605
|
-
/* 10. Verify if credentials from peer are trusted. */
|
|
1606
|
-
const uint8_t *pub_key = NULL;
|
|
1607
|
-
size_t pub_key_len = 0;
|
|
1608
|
-
|
|
1609
|
-
ret = ctx->cred.verify(ctx->user_ctx, &parsed_ptxt.auth_cred, &pub_key,
|
|
1610
|
-
&pub_key_len);
|
|
1611
|
-
|
|
1612
|
-
if (EDHOC_SUCCESS != ret) {
|
|
1613
|
-
ctx->error_code =
|
|
1614
|
-
EDHOC_ERROR_CODE_UNKNOWN_CREDENTIAL_REFERENCED;
|
|
1615
|
-
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1616
|
-
}
|
|
1617
|
-
|
|
1618
|
-
/* 11. Compute psuedo random key (PRK_3e2m). */
|
|
1619
|
-
ret = comp_prk_3e2m(ctx, &parsed_ptxt.auth_cred, pub_key, pub_key_len);
|
|
1620
|
-
|
|
1621
|
-
if (EDHOC_SUCCESS != ret)
|
|
1622
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1623
|
-
|
|
1624
|
-
if (NULL != ctx->logger)
|
|
1625
|
-
ctx->logger(ctx->user_ctx, "PRK_3e2m", ctx->prk, ctx->prk_len);
|
|
1626
|
-
|
|
1627
|
-
/* 12. Compute required buffer length for context_2. */
|
|
1628
|
-
size_t mac_context_len = 0;
|
|
1629
|
-
ret = edhoc_comp_mac_context_length(ctx, &parsed_ptxt.auth_cred,
|
|
1630
|
-
&mac_context_len);
|
|
1631
|
-
|
|
1632
|
-
if (EDHOC_SUCCESS != ret)
|
|
1633
|
-
return EDHOC_ERROR_INVALID_MAC_2;
|
|
1634
|
-
|
|
1635
|
-
/* 13. Cborise items required by context_2. */
|
|
1636
|
-
VLA_ALLOC(uint8_t, mac_ctx_buf,
|
|
1637
|
-
sizeof(struct mac_context) + mac_context_len);
|
|
1638
|
-
memset(mac_ctx_buf, 0, VLA_SIZEOF(mac_ctx_buf));
|
|
1639
|
-
|
|
1640
|
-
struct mac_context *mac_ctx = (void *)mac_ctx_buf;
|
|
1641
|
-
mac_ctx->buf_len = mac_context_len;
|
|
1642
|
-
|
|
1643
|
-
ret = edhoc_comp_mac_context(ctx, &parsed_ptxt.auth_cred, mac_ctx);
|
|
1644
|
-
if (EDHOC_SUCCESS != ret)
|
|
1645
|
-
return ret;
|
|
1646
|
-
|
|
1647
|
-
if (NULL != ctx->logger) {
|
|
1648
|
-
ctx->logger(ctx->user_ctx, "C_R", mac_ctx->conn_id,
|
|
1649
|
-
mac_ctx->conn_id_len);
|
|
1650
|
-
ctx->logger(ctx->user_ctx, "ID_CRED_R", mac_ctx->id_cred,
|
|
1651
|
-
mac_ctx->id_cred_len);
|
|
1652
|
-
ctx->logger(ctx->user_ctx, "TH_2", mac_ctx->th,
|
|
1653
|
-
mac_ctx->th_len);
|
|
1654
|
-
ctx->logger(ctx->user_ctx, "CRED_R", mac_ctx->cred,
|
|
1655
|
-
mac_ctx->cred_len);
|
|
1656
|
-
ctx->logger(ctx->user_ctx, "context_2", mac_ctx->buf,
|
|
1657
|
-
mac_ctx->buf_len);
|
|
1658
|
-
}
|
|
1659
|
-
|
|
1660
|
-
/* 14. Compute Message Authentication Code (MAC_2). */
|
|
1661
|
-
size_t mac_length = 0;
|
|
1662
|
-
ret = edhoc_comp_mac_length(ctx, &mac_length);
|
|
1663
|
-
if (EDHOC_SUCCESS != ret)
|
|
1664
|
-
return ret;
|
|
1665
|
-
|
|
1666
|
-
VLA_ALLOC(uint8_t, mac_buf, mac_length);
|
|
1667
|
-
memset(mac_buf, 0, VLA_SIZEOF(mac_buf));
|
|
1668
|
-
ret = edhoc_comp_mac(ctx, mac_ctx, mac_buf, mac_length);
|
|
1669
|
-
if (EDHOC_SUCCESS != ret)
|
|
1670
|
-
return ret;
|
|
1671
|
-
|
|
1672
|
-
/* 15. Verify Signature_or_MAC_2. */
|
|
1673
|
-
ret = edhoc_verify_sign_or_mac(ctx, mac_ctx, pub_key, pub_key_len,
|
|
1674
|
-
parsed_ptxt.sign_or_mac,
|
|
1675
|
-
parsed_ptxt.sign_or_mac_len, mac_buf,
|
|
1676
|
-
mac_length);
|
|
1677
|
-
|
|
1678
|
-
if (EDHOC_SUCCESS != ret)
|
|
1679
|
-
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
|
|
1680
|
-
|
|
1681
|
-
/* 16. Compute Transcript Hash 3 (TH_3). */
|
|
1682
|
-
ret = comp_th_3(ctx, mac_ctx, plaintext, plaintext_len);
|
|
1683
|
-
|
|
1684
|
-
if (EDHOC_SUCCESS != ret)
|
|
1685
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1686
|
-
|
|
1687
|
-
if (NULL != ctx->logger)
|
|
1688
|
-
ctx->logger(ctx->user_ctx, "TH_3", ctx->th, ctx->th_len);
|
|
1689
|
-
|
|
1690
|
-
/* 17. Clean-up EAD tokens. */
|
|
1691
|
-
ctx->nr_of_ead_tokens = 0;
|
|
1692
|
-
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
1693
|
-
|
|
1694
|
-
ctx->status = EDHOC_SM_VERIFIED_M2;
|
|
1695
|
-
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
1696
|
-
return EDHOC_SUCCESS;
|
|
1697
|
-
}
|