edhoc 1.3.3 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.clang-format +79 -0
- package/README.md +6 -5
- package/dist/cbor-utils.d.ts +30 -0
- package/dist/cbor-utils.d.ts.map +1 -0
- package/dist/cbor-utils.js +179 -0
- package/dist/cipher-suites.d.ts +13 -0
- package/dist/cipher-suites.d.ts.map +1 -0
- package/dist/cipher-suites.js +22 -0
- package/dist/edhoc.d.ts +85 -277
- package/dist/edhoc.d.ts.map +1 -1
- package/dist/edhoc.js +562 -34
- package/package.json +5 -19
- package/.gitmodules +0 -3
- package/binding.gyp +0 -66
- package/dist/bindings.d.ts +0 -5
- package/dist/bindings.d.ts.map +0 -1
- package/dist/bindings.js +0 -10
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_bstr_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_ead_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_edhoc_types.h +0 -102
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_enc_structure_types.h +0 -37
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_id_cred_x_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_info_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_int_type_types.h +0 -34
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_1_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_message_error_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_2_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_3_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_plaintext_4_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_decode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_encode.h +0 -35
- package/external/libedhoc/backends/cbor/include/backend_cbor_sig_structure_types.h +0 -38
- package/external/libedhoc/backends/cbor/include/backend_cbor_x509_types.h +0 -180
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_bstr_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_decode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_ead_encode.c +0 -69
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_decode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_enc_structure_encode.c +0 -53
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_decode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_id_cred_x_encode.c +0 -152
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_decode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_info_encode.c +0 -52
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_int_type_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_decode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_1_encode.c +0 -115
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_2_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_3_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_decode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_4_encode.c +0 -50
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_decode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_message_error_encode.c +0 -92
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_decode.c +0 -216
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_2_encode.c +0 -217
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_decode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_3_encode.c +0 -212
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_decode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_plaintext_4_encode.c +0 -87
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_decode.c +0 -54
- package/external/libedhoc/backends/cbor/src/backend_cbor_sig_structure_encode.c +0 -54
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_1/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_1/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_1/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode.c +0 -71
- package/external/libedhoc/externals/Unity/examples/example_2/test/TestProductionCode2.c +0 -40
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode2_Runner.c +0 -16
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/TestProductionCode_Runner.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_2/test/test_runners/all_tests.c +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.c +0 -17
- package/external/libedhoc/externals/Unity/examples/example_3/helper/UnityHelper.h +0 -19
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_3/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode.c +0 -69
- package/external/libedhoc/externals/Unity/examples/example_3/test/TestProductionCode2.c +0 -38
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.c +0 -31
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode.h +0 -10
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.c +0 -18
- package/external/libedhoc/externals/Unity/examples/example_4/src/ProductionCode2.h +0 -9
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode.c +0 -70
- package/external/libedhoc/externals/Unity/examples/example_4/test/TestProductionCode2.c +0 -42
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode2_Runner.c +0 -53
- package/external/libedhoc/externals/Unity/examples/example_4/test/test_runners/TestProductionCode_Runner.c +0 -57
- package/external/libedhoc/externals/Unity/examples/unity_config.h +0 -251
- package/external/libedhoc/externals/Unity/extras/bdd/src/unity_bdd.h +0 -44
- package/external/libedhoc/externals/Unity/extras/bdd/test/test_bdd.c +0 -129
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.c +0 -310
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture.h +0 -95
- package/external/libedhoc/externals/Unity/extras/fixture/src/unity_fixture_internals.h +0 -51
- package/external/libedhoc/externals/Unity/extras/fixture/test/main/AllTests.c +0 -20
- package/external/libedhoc/externals/Unity/extras/fixture/test/template_fixture_tests.c +0 -40
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_Test.c +0 -246
- package/external/libedhoc/externals/Unity/extras/fixture/test/unity_fixture_TestRunner.c +0 -33
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.c +0 -203
- package/external/libedhoc/externals/Unity/extras/memory/src/unity_memory.h +0 -61
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_Test.c +0 -326
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_memory_TestRunner.c +0 -50
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.c +0 -57
- package/external/libedhoc/externals/Unity/extras/memory/test/unity_output_Spy.h +0 -17
- package/external/libedhoc/externals/Unity/src/unity.c +0 -2501
- package/external/libedhoc/externals/Unity/src/unity.h +0 -698
- package/external/libedhoc/externals/Unity/src/unity_internals.h +0 -1183
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_cmd.c +0 -61
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_def.c +0 -57
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.c +0 -55
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_head1.h +0 -15
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_cmd.c +0 -80
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_def.c +0 -76
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.c +0 -75
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_head1.h +0 -13
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_new2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_param.c +0 -77
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run1.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_run2.c +0 -89
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_mock_yaml.c +0 -90
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_new2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_param.c +0 -58
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run1.c +0 -67
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_run2.c +0 -70
- package/external/libedhoc/externals/Unity/test/expectdata/testsample_yaml.c +0 -71
- package/external/libedhoc/externals/Unity/test/testdata/CException.h +0 -18
- package/external/libedhoc/externals/Unity/test/testdata/Defs.h +0 -16
- package/external/libedhoc/externals/Unity/test/testdata/cmock.h +0 -21
- package/external/libedhoc/externals/Unity/test/testdata/mockMock.h +0 -20
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGenerator.c +0 -204
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorSmall.c +0 -73
- package/external/libedhoc/externals/Unity/test/testdata/testRunnerGeneratorWithMocks.c +0 -200
- package/external/libedhoc/externals/Unity/test/tests/self_assessment_utils.h +0 -151
- package/external/libedhoc/externals/Unity/test/tests/test_unity_arrays.c +0 -2941
- package/external/libedhoc/externals/Unity/test/tests/test_unity_core.c +0 -375
- package/external/libedhoc/externals/Unity/test/tests/test_unity_doubles.c +0 -1285
- package/external/libedhoc/externals/Unity/test/tests/test_unity_floats.c +0 -1395
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers.c +0 -2863
- package/external/libedhoc/externals/Unity/test/tests/test_unity_integers_64.c +0 -783
- package/external/libedhoc/externals/Unity/test/tests/test_unity_memory.c +0 -82
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterized.c +0 -309
- package/external/libedhoc/externals/Unity/test/tests/test_unity_parameterizedDemo.c +0 -28
- package/external/libedhoc/externals/Unity/test/tests/test_unity_strings.c +0 -330
- package/external/libedhoc/externals/Unity/test/tests/types_for_test.h +0 -21
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.c +0 -126
- package/external/libedhoc/externals/compact25519/src/c25519/c25519.h +0 -49
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.c +0 -323
- package/external/libedhoc/externals/compact25519/src/c25519/ed25519.h +0 -84
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.c +0 -171
- package/external/libedhoc/externals/compact25519/src/c25519/edsign.h +0 -53
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.c +0 -330
- package/external/libedhoc/externals/compact25519/src/c25519/f25519.h +0 -98
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.c +0 -226
- package/external/libedhoc/externals/compact25519/src/c25519/fprime.h +0 -81
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.c +0 -230
- package/external/libedhoc/externals/compact25519/src/c25519/sha512.h +0 -54
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.c +0 -46
- package/external/libedhoc/externals/compact25519/src/compact_ed25519.h +0 -110
- package/external/libedhoc/externals/compact25519/src/compact_wipe.c +0 -12
- package/external/libedhoc/externals/compact25519/src/compact_wipe.h +0 -14
- package/external/libedhoc/externals/compact25519/src/compact_x25519.c +0 -68
- package/external/libedhoc/externals/compact25519/src/compact_x25519.h +0 -101
- package/external/libedhoc/externals/compact25519/test/pcg_random.h +0 -25
- package/external/libedhoc/externals/compact25519/test/run-all.c +0 -178
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/everest.h +0 -234
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt128.h +0 -124
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.h +0 -280
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlib.h +0 -29
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/c_endianness.h +0 -204
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/builtin.h +0 -16
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/callconv.h +0 -46
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/compat.h +0 -34
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/debug.h +0 -57
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/target.h +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/types.h +0 -61
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/kremlin/internal/wasmsupport.h +0 -5
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/Hacl_Curve25519.h +0 -21
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/inttypes.h +0 -36
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/vs2013/stdbool.h +0 -31
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/include/everest/x25519.h +0 -190
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519.c +0 -760
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/Hacl_Curve25519_joined.c +0 -50
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/everest.c +0 -102
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt128_extracted.c +0 -413
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/kremlib/FStar_UInt64_FStar_UInt32_FStar_UInt16_FStar_UInt8.c +0 -100
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/legacy/Hacl_Curve25519.c +0 -805
- package/external/libedhoc/externals/mbedtls/3rdparty/everest/library/x25519.c +0 -186
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.c +0 -1514
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m/p256-m.h +0 -135
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.c +0 -312
- package/external/libedhoc/externals/mbedtls/3rdparty/p256-m/p256-m_driver_entrypoints.h +0 -219
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-dtls1_2.h +0 -92
- package/external/libedhoc/externals/mbedtls/configs/config-ccm-psk-tls1_2.h +0 -83
- package/external/libedhoc/externals/mbedtls/configs/config-no-entropy.h +0 -73
- package/external/libedhoc/externals/mbedtls/configs/config-suite-b.h +0 -106
- package/external/libedhoc/externals/mbedtls/configs/config-symmetric-only.h +0 -77
- package/external/libedhoc/externals/mbedtls/configs/config-thread.h +0 -76
- package/external/libedhoc/externals/mbedtls/configs/crypto-config-ccm-aes-sha256.h +0 -25
- package/external/libedhoc/externals/mbedtls/configs/crypto_config_profile_medium.h +0 -136
- package/external/libedhoc/externals/mbedtls/configs/tfm_mbedcrypto_config_profile_medium.h +0 -609
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_encdec.h +0 -54
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_hashing.h +0 -30
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_mainpage.h +0 -19
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_rng.h +0 -27
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_ssltls.h +0 -37
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_tcpip.h +0 -32
- package/external/libedhoc/externals/mbedtls/doxygen/input/doc_x509.h +0 -31
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aes.h +0 -627
- package/external/libedhoc/externals/mbedtls/include/mbedtls/aria.h +0 -341
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1.h +0 -641
- package/external/libedhoc/externals/mbedtls/include/mbedtls/asn1write.h +0 -389
- package/external/libedhoc/externals/mbedtls/include/mbedtls/base64.h +0 -82
- package/external/libedhoc/externals/mbedtls/include/mbedtls/bignum.h +0 -1084
- package/external/libedhoc/externals/mbedtls/include/mbedtls/build_info.h +0 -146
- package/external/libedhoc/externals/mbedtls/include/mbedtls/camellia.h +0 -303
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ccm.h +0 -518
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chacha20.h +0 -202
- package/external/libedhoc/externals/mbedtls/include/mbedtls/chachapoly.h +0 -342
- package/external/libedhoc/externals/mbedtls/include/mbedtls/check_config.h +0 -1206
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cipher.h +0 -1183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/cmac.h +0 -246
- package/external/libedhoc/externals/mbedtls/include/mbedtls/compat-2.x.h +0 -46
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_crypto.h +0 -183
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_legacy_from_psa.h +0 -877
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_from_legacy.h +0 -334
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_psa_superset_legacy.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_ssl.h +0 -76
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_adjust_x509.h +0 -25
- package/external/libedhoc/externals/mbedtls/include/mbedtls/config_psa.h +0 -55
- package/external/libedhoc/externals/mbedtls/include/mbedtls/constant_time.h +0 -36
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ctr_drbg.h +0 -564
- package/external/libedhoc/externals/mbedtls/include/mbedtls/debug.h +0 -308
- package/external/libedhoc/externals/mbedtls/include/mbedtls/des.h +0 -385
- package/external/libedhoc/externals/mbedtls/include/mbedtls/dhm.h +0 -972
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdh.h +0 -441
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecdsa.h +0 -671
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecjpake.h +0 -298
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ecp.h +0 -1362
- package/external/libedhoc/externals/mbedtls/include/mbedtls/entropy.h +0 -273
- package/external/libedhoc/externals/mbedtls/include/mbedtls/error.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/gcm.h +0 -370
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hkdf.h +0 -124
- package/external/libedhoc/externals/mbedtls/include/mbedtls/hmac_drbg.h +0 -434
- package/external/libedhoc/externals/mbedtls/include/mbedtls/lms.h +0 -440
- package/external/libedhoc/externals/mbedtls/include/mbedtls/mbedtls_config.h +0 -4116
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md.h +0 -640
- package/external/libedhoc/externals/mbedtls/include/mbedtls/md5.h +0 -190
- package/external/libedhoc/externals/mbedtls/include/mbedtls/memory_buffer_alloc.h +0 -142
- package/external/libedhoc/externals/mbedtls/include/mbedtls/net_sockets.h +0 -299
- package/external/libedhoc/externals/mbedtls/include/mbedtls/nist_kw.h +0 -166
- package/external/libedhoc/externals/mbedtls/include/mbedtls/oid.h +0 -722
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pem.h +0 -160
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pk.h +0 -1091
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs12.h +0 -186
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs5.h +0 -197
- package/external/libedhoc/externals/mbedtls/include/mbedtls/pkcs7.h +0 -241
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform.h +0 -485
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_time.h +0 -79
- package/external/libedhoc/externals/mbedtls/include/mbedtls/platform_util.h +0 -201
- package/external/libedhoc/externals/mbedtls/include/mbedtls/poly1305.h +0 -168
- package/external/libedhoc/externals/mbedtls/include/mbedtls/private_access.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/mbedtls/psa_util.h +0 -104
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ripemd160.h +0 -136
- package/external/libedhoc/externals/mbedtls/include/mbedtls/rsa.h +0 -1143
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha1.h +0 -219
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha256.h +0 -198
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha3.h +0 -172
- package/external/libedhoc/externals/mbedtls/include/mbedtls/sha512.h +0 -208
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl.h +0 -5369
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cache.h +0 -187
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ciphersuites.h +0 -616
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_cookie.h +0 -106
- package/external/libedhoc/externals/mbedtls/include/mbedtls/ssl_ticket.h +0 -181
- package/external/libedhoc/externals/mbedtls/include/mbedtls/threading.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/mbedtls/timing.h +0 -94
- package/external/libedhoc/externals/mbedtls/include/mbedtls/version.h +0 -78
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509.h +0 -550
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crl.h +0 -184
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_crt.h +0 -1196
- package/external/libedhoc/externals/mbedtls/include/mbedtls/x509_csr.h +0 -319
- package/external/libedhoc/externals/mbedtls/include/psa/build_info.h +0 -20
- package/external/libedhoc/externals/mbedtls/include/psa/crypto.h +0 -4685
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_auto_enabled.h +0 -21
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_key_pair_types.h +0 -91
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_adjust_config_synonyms.h +0 -45
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_composites.h +0 -210
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_key_derivation.h +0 -118
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_builtin_primitives.h +0 -114
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_compat.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_config.h +0 -153
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_common.h +0 -44
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_composites.h +0 -151
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_key_derivation.h +0 -52
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_driver_contexts_primitives.h +0 -105
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_extra.h +0 -2064
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_legacy.h +0 -88
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_platform.h +0 -92
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_se_driver.h +0 -1383
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_sizes.h +0 -1282
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_struct.h +0 -460
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_types.h +0 -453
- package/external/libedhoc/externals/mbedtls/include/psa/crypto_values.h +0 -2756
- package/external/libedhoc/externals/mbedtls/library/aes.c +0 -2315
- package/external/libedhoc/externals/mbedtls/library/aesce.c +0 -503
- package/external/libedhoc/externals/mbedtls/library/aesce.h +0 -121
- package/external/libedhoc/externals/mbedtls/library/aesni.c +0 -802
- package/external/libedhoc/externals/mbedtls/library/aesni.h +0 -158
- package/external/libedhoc/externals/mbedtls/library/alignment.h +0 -509
- package/external/libedhoc/externals/mbedtls/library/aria.c +0 -991
- package/external/libedhoc/externals/mbedtls/library/asn1parse.c +0 -467
- package/external/libedhoc/externals/mbedtls/library/asn1write.c +0 -436
- package/external/libedhoc/externals/mbedtls/library/base64.c +0 -299
- package/external/libedhoc/externals/mbedtls/library/base64_internal.h +0 -45
- package/external/libedhoc/externals/mbedtls/library/bignum.c +0 -2806
- package/external/libedhoc/externals/mbedtls/library/bignum_core.c +0 -894
- package/external/libedhoc/externals/mbedtls/library/bignum_core.h +0 -763
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.c +0 -394
- package/external/libedhoc/externals/mbedtls/library/bignum_mod.h +0 -452
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.c +0 -276
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw.h +0 -416
- package/external/libedhoc/externals/mbedtls/library/bignum_mod_raw_invasive.h +0 -34
- package/external/libedhoc/externals/mbedtls/library/bn_mul.h +0 -1094
- package/external/libedhoc/externals/mbedtls/library/camellia.c +0 -1044
- package/external/libedhoc/externals/mbedtls/library/ccm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/chacha20.c +0 -497
- package/external/libedhoc/externals/mbedtls/library/chachapoly.c +0 -478
- package/external/libedhoc/externals/mbedtls/library/check_crypto_config.h +0 -141
- package/external/libedhoc/externals/mbedtls/library/cipher.c +0 -1664
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.c +0 -2422
- package/external/libedhoc/externals/mbedtls/library/cipher_wrap.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/cmac.c +0 -1067
- package/external/libedhoc/externals/mbedtls/library/common.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/constant_time.c +0 -261
- package/external/libedhoc/externals/mbedtls/library/constant_time_impl.h +0 -554
- package/external/libedhoc/externals/mbedtls/library/constant_time_internal.h +0 -579
- package/external/libedhoc/externals/mbedtls/library/ctr_drbg.c +0 -881
- package/external/libedhoc/externals/mbedtls/library/debug.c +0 -465
- package/external/libedhoc/externals/mbedtls/library/des.c +0 -1042
- package/external/libedhoc/externals/mbedtls/library/dhm.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/ecdh.c +0 -685
- package/external/libedhoc/externals/mbedtls/library/ecdsa.c +0 -867
- package/external/libedhoc/externals/mbedtls/library/ecjpake.c +0 -1216
- package/external/libedhoc/externals/mbedtls/library/ecp.c +0 -3631
- package/external/libedhoc/externals/mbedtls/library/ecp_curves.c +0 -5467
- package/external/libedhoc/externals/mbedtls/library/ecp_curves_new.c +0 -6043
- package/external/libedhoc/externals/mbedtls/library/ecp_internal_alt.h +0 -287
- package/external/libedhoc/externals/mbedtls/library/ecp_invasive.h +0 -325
- package/external/libedhoc/externals/mbedtls/library/entropy.c +0 -676
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.c +0 -229
- package/external/libedhoc/externals/mbedtls/library/entropy_poll.h +0 -64
- package/external/libedhoc/externals/mbedtls/library/error.c +0 -878
- package/external/libedhoc/externals/mbedtls/library/gcm.c +0 -1168
- package/external/libedhoc/externals/mbedtls/library/hkdf.c +0 -161
- package/external/libedhoc/externals/mbedtls/library/hmac_drbg.c +0 -633
- package/external/libedhoc/externals/mbedtls/library/lmots.c +0 -821
- package/external/libedhoc/externals/mbedtls/library/lmots.h +0 -311
- package/external/libedhoc/externals/mbedtls/library/lms.c +0 -779
- package/external/libedhoc/externals/mbedtls/library/md.c +0 -1108
- package/external/libedhoc/externals/mbedtls/library/md5.c +0 -426
- package/external/libedhoc/externals/mbedtls/library/md_psa.h +0 -63
- package/external/libedhoc/externals/mbedtls/library/md_wrap.h +0 -46
- package/external/libedhoc/externals/mbedtls/library/memory_buffer_alloc.c +0 -745
- package/external/libedhoc/externals/mbedtls/library/mps_common.h +0 -181
- package/external/libedhoc/externals/mbedtls/library/mps_error.h +0 -89
- package/external/libedhoc/externals/mbedtls/library/mps_reader.c +0 -538
- package/external/libedhoc/externals/mbedtls/library/mps_reader.h +0 -366
- package/external/libedhoc/externals/mbedtls/library/mps_trace.c +0 -112
- package/external/libedhoc/externals/mbedtls/library/mps_trace.h +0 -154
- package/external/libedhoc/externals/mbedtls/library/net_sockets.c +0 -696
- package/external/libedhoc/externals/mbedtls/library/nist_kw.c +0 -725
- package/external/libedhoc/externals/mbedtls/library/oid.c +0 -1154
- package/external/libedhoc/externals/mbedtls/library/padlock.c +0 -155
- package/external/libedhoc/externals/mbedtls/library/padlock.h +0 -111
- package/external/libedhoc/externals/mbedtls/library/pem.c +0 -520
- package/external/libedhoc/externals/mbedtls/library/pk.c +0 -970
- package/external/libedhoc/externals/mbedtls/library/pk_internal.h +0 -118
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.c +0 -1834
- package/external/libedhoc/externals/mbedtls/library/pk_wrap.h +0 -156
- package/external/libedhoc/externals/mbedtls/library/pkcs12.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/pkcs5.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/pkcs7.c +0 -773
- package/external/libedhoc/externals/mbedtls/library/pkparse.c +0 -1845
- package/external/libedhoc/externals/mbedtls/library/pkwrite.c +0 -836
- package/external/libedhoc/externals/mbedtls/library/pkwrite.h +0 -112
- package/external/libedhoc/externals/mbedtls/library/platform.c +0 -402
- package/external/libedhoc/externals/mbedtls/library/platform_util.c +0 -285
- package/external/libedhoc/externals/mbedtls/library/poly1305.c +0 -492
- package/external/libedhoc/externals/mbedtls/library/psa_crypto.c +0 -8432
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.c +0 -653
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_aead.h +0 -499
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.c +0 -590
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_cipher.h +0 -293
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_client.c +0 -67
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core.h +0 -838
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_core_common.h +0 -52
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers.h +0 -2871
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.c +0 -256
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_driver_wrappers_no_static.h +0 -31
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.c +0 -561
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ecp.h +0 -267
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.c +0 -295
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_ffdh.h +0 -132
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.c +0 -470
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_hash.h +0 -211
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_invasive.h +0 -70
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_its.h +0 -131
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.c +0 -496
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_mac.h +0 -264
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.c +0 -571
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_pake.h +0 -159
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_random_impl.h +0 -192
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.c +0 -727
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_rsa.h +0 -317
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.c +0 -373
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_se.h +0 -185
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.c +0 -559
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_slot_management.h +0 -213
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.c +0 -481
- package/external/libedhoc/externals/mbedtls/library/psa_crypto_storage.h +0 -384
- package/external/libedhoc/externals/mbedtls/library/psa_its_file.c +0 -259
- package/external/libedhoc/externals/mbedtls/library/psa_util.c +0 -160
- package/external/libedhoc/externals/mbedtls/library/psa_util_internal.h +0 -96
- package/external/libedhoc/externals/mbedtls/library/ripemd160.c +0 -490
- package/external/libedhoc/externals/mbedtls/library/rsa.c +0 -2640
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.c +0 -447
- package/external/libedhoc/externals/mbedtls/library/rsa_alt_helpers.h +0 -208
- package/external/libedhoc/externals/mbedtls/library/sha1.c +0 -480
- package/external/libedhoc/externals/mbedtls/library/sha256.c +0 -946
- package/external/libedhoc/externals/mbedtls/library/sha3.c +0 -626
- package/external/libedhoc/externals/mbedtls/library/sha512.c +0 -1111
- package/external/libedhoc/externals/mbedtls/library/ssl_cache.c +0 -410
- package/external/libedhoc/externals/mbedtls/library/ssl_ciphersuites.c +0 -2050
- package/external/libedhoc/externals/mbedtls/library/ssl_client.c +0 -1017
- package/external/libedhoc/externals/mbedtls/library/ssl_client.h +0 -22
- package/external/libedhoc/externals/mbedtls/library/ssl_cookie.c +0 -380
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers.h +0 -78
- package/external/libedhoc/externals/mbedtls/library/ssl_debug_helpers_generated.c +0 -234
- package/external/libedhoc/externals/mbedtls/library/ssl_misc.h +0 -2847
- package/external/libedhoc/externals/mbedtls/library/ssl_msg.c +0 -6155
- package/external/libedhoc/externals/mbedtls/library/ssl_ticket.c +0 -540
- package/external/libedhoc/externals/mbedtls/library/ssl_tls.c +0 -9577
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_client.c +0 -3607
- package/external/libedhoc/externals/mbedtls/library/ssl_tls12_server.c +0 -4403
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_client.c +0 -3046
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_generic.c +0 -1740
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_invasive.h +0 -23
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.c +0 -1897
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_keys.h +0 -651
- package/external/libedhoc/externals/mbedtls/library/ssl_tls13_server.c +0 -3146
- package/external/libedhoc/externals/mbedtls/library/threading.c +0 -181
- package/external/libedhoc/externals/mbedtls/library/timing.c +0 -154
- package/external/libedhoc/externals/mbedtls/library/version.c +0 -32
- package/external/libedhoc/externals/mbedtls/library/version_features.c +0 -826
- package/external/libedhoc/externals/mbedtls/library/x509.c +0 -1776
- package/external/libedhoc/externals/mbedtls/library/x509_create.c +0 -557
- package/external/libedhoc/externals/mbedtls/library/x509_crl.c +0 -712
- package/external/libedhoc/externals/mbedtls/library/x509_crt.c +0 -3292
- package/external/libedhoc/externals/mbedtls/library/x509_csr.c +0 -574
- package/external/libedhoc/externals/mbedtls/library/x509write.c +0 -174
- package/external/libedhoc/externals/mbedtls/library/x509write_crt.c +0 -681
- package/external/libedhoc/externals/mbedtls/library/x509write_csr.c +0 -331
- package/external/libedhoc/externals/mbedtls/programs/aes/crypt_and_hash.c +0 -573
- package/external/libedhoc/externals/mbedtls/programs/cipher/cipher_aead_demo.c +0 -259
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.c +0 -105
- package/external/libedhoc/externals/mbedtls/programs/fuzz/common.h +0 -25
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_client.c +0 -195
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsclient.c +0 -138
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_dtlsserver.c +0 -183
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pkcs7.c +0 -20
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_privkey.c +0 -106
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_pubkey.c +0 -86
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_server.c +0 -218
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crl.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509crt.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/fuzz_x509csr.c +0 -41
- package/external/libedhoc/externals/mbedtls/programs/fuzz/onefile.c +0 -69
- package/external/libedhoc/externals/mbedtls/programs/hash/generic_sum.c +0 -209
- package/external/libedhoc/externals/mbedtls/programs/hash/hello.c +0 -45
- package/external/libedhoc/externals/mbedtls/programs/hash/md_hmac_demo.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_genprime.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/dh_server.c +0 -296
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdh_curve25519.c +0 -189
- package/external/libedhoc/externals/mbedtls/programs/pkey/ecdsa.c +0 -217
- package/external/libedhoc/externals/mbedtls/programs/pkey/gen_key.c +0 -419
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app.c +0 -316
- package/external/libedhoc/externals/mbedtls/programs/pkey/key_app_writer.c +0 -435
- package/external/libedhoc/externals/mbedtls/programs/pkey/mpi_demo.c +0 -84
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_decrypt.c +0 -153
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_encrypt.c +0 -154
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/pk_verify.c +0 -128
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_decrypt.c +0 -172
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_encrypt.c +0 -149
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_genkey.c +0 -141
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign.c +0 -155
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_sign_pss.c +0 -161
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify.c +0 -131
- package/external/libedhoc/externals/mbedtls/programs/pkey/rsa_verify_pss.c +0 -136
- package/external/libedhoc/externals/mbedtls/programs/psa/aead_demo.c +0 -281
- package/external/libedhoc/externals/mbedtls/programs/psa/crypto_examples.c +0 -321
- package/external/libedhoc/externals/mbedtls/programs/psa/hmac_demo.c +0 -159
- package/external/libedhoc/externals/mbedtls/programs/psa/key_ladder_demo.c +0 -691
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names.c +0 -310
- package/external/libedhoc/externals/mbedtls/programs/psa/psa_constant_names_generated.c +0 -474
- package/external/libedhoc/externals/mbedtls/programs/random/gen_entropy.c +0 -75
- package/external/libedhoc/externals/mbedtls/programs/random/gen_random_ctr_drbg.c +0 -107
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_client.c +0 -342
- package/external/libedhoc/externals/mbedtls/programs/ssl/dtls_server.c +0 -408
- package/external/libedhoc/externals/mbedtls/programs/ssl/mini_client.c +0 -274
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client1.c +0 -288
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_client2.c +0 -3118
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_context_info.c +0 -1009
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_fork_server.c +0 -381
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_mail_client.c +0 -804
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_pthread_server.c +0 -489
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server.c +0 -362
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_server2.c +0 -4268
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_common_source.c +0 -375
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.c +0 -601
- package/external/libedhoc/externals/mbedtls/programs/ssl/ssl_test_lib.h +0 -306
- package/external/libedhoc/externals/mbedtls/programs/test/benchmark.c +0 -1284
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package/cmake_package.c +0 -27
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_package_install/cmake_package_install.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/cmake_subproject/cmake_subproject.c +0 -28
- package/external/libedhoc/externals/mbedtls/programs/test/dlopen.c +0 -92
- package/external/libedhoc/externals/mbedtls/programs/test/query_compile_time_config.c +0 -66
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.c +0 -5137
- package/external/libedhoc/externals/mbedtls/programs/test/query_config.h +0 -34
- package/external/libedhoc/externals/mbedtls/programs/test/query_included_headers.c +0 -29
- package/external/libedhoc/externals/mbedtls/programs/test/selftest.c +0 -583
- package/external/libedhoc/externals/mbedtls/programs/test/udp_proxy.c +0 -967
- package/external/libedhoc/externals/mbedtls/programs/test/zeroize.c +0 -72
- package/external/libedhoc/externals/mbedtls/programs/util/pem2der.c +0 -265
- package/external/libedhoc/externals/mbedtls/programs/util/strerror.c +0 -61
- package/external/libedhoc/externals/mbedtls/programs/wince_main.c +0 -31
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_app.c +0 -456
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_req.c +0 -509
- package/external/libedhoc/externals/mbedtls/programs/x509/cert_write.c +0 -1012
- package/external/libedhoc/externals/mbedtls/programs/x509/crl_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/programs/x509/load_roots.c +0 -165
- package/external/libedhoc/externals/mbedtls/programs/x509/req_app.c +0 -132
- package/external/libedhoc/externals/mbedtls/tests/configs/tls13-only.h +0 -31
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-for-test.h +0 -89
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-malloc-0-null.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/configs/user-config-zeroize-memset.h +0 -17
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aes_alt.h +0 -23
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/aria_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/camellia_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ccm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chacha20_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/chachapoly_alt.h +0 -18
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/cmac_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/des_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/dhm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecjpake_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ecp_alt.h +0 -22
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/gcm_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/md5_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/nist_kw_alt.h +0 -15
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/platform_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/poly1305_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/ripemd160_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/rsa_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha1_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha256_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/sha512_alt.h +0 -16
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/threading_alt.h +0 -14
- package/external/libedhoc/externals/mbedtls/tests/include/alt-dummy/timing_alt.h +0 -19
- package/external/libedhoc/externals/mbedtls/tests/include/alt-extra/psa/crypto.h +0 -7
- package/external/libedhoc/externals/mbedtls/tests/include/baremetal-override/time.h +0 -6
- package/external/libedhoc/externals/mbedtls/tests/include/spe/crypto_spe.h +0 -131
- package/external/libedhoc/externals/mbedtls/tests/include/test/arguments.h +0 -26
- package/external/libedhoc/externals/mbedtls/tests/include/test/asn1_helpers.h +0 -38
- package/external/libedhoc/externals/mbedtls/tests/include/test/bignum_helpers.h +0 -106
- package/external/libedhoc/externals/mbedtls/tests/include/test/certs.h +0 -234
- package/external/libedhoc/externals/mbedtls/tests/include/test/constant_flow.h +0 -71
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/aead.h +0 -121
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/asymmetric_encryption.h +0 -67
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/cipher.h +0 -130
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/config_test_driver.h +0 -44
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/crypto_config_test_driver_extension.h +0 -430
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/hash.h +0 -64
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_agreement.h +0 -62
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/key_management.h +0 -123
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/mac.h +0 -125
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/pake.h +0 -75
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/signature.h +0 -112
- package/external/libedhoc/externals/mbedtls/tests/include/test/drivers/test_driver.h +0 -32
- package/external/libedhoc/externals/mbedtls/tests/include/test/fake_external_rng_for_test.h +0 -40
- package/external/libedhoc/externals/mbedtls/tests/include/test/helpers.h +0 -268
- package/external/libedhoc/externals/mbedtls/tests/include/test/macros.h +0 -250
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_crypto_helpers.h +0 -398
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_exercise_key.h +0 -223
- package/external/libedhoc/externals/mbedtls/tests/include/test/psa_helpers.h +0 -24
- package/external/libedhoc/externals/mbedtls/tests/include/test/random.h +0 -91
- package/external/libedhoc/externals/mbedtls/tests/include/test/ssl_helpers.h +0 -628
- package/external/libedhoc/externals/mbedtls/tests/src/asn1_helpers.c +0 -62
- package/external/libedhoc/externals/mbedtls/tests/src/bignum_helpers.c +0 -145
- package/external/libedhoc/externals/mbedtls/tests/src/certs.c +0 -480
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/hash.c +0 -199
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/platform_builtin_keys.c +0 -78
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_aead.c +0 -462
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_asymmetric_encryption.c +0 -151
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_cipher.c +0 -424
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_agreement.c +0 -147
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_key_management.c +0 -783
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_mac.c +0 -422
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_pake.c +0 -202
- package/external/libedhoc/externals/mbedtls/tests/src/drivers/test_driver_signature.c +0 -405
- package/external/libedhoc/externals/mbedtls/tests/src/fake_external_rng_for_test.c +0 -45
- package/external/libedhoc/externals/mbedtls/tests/src/helpers.c +0 -353
- package/external/libedhoc/externals/mbedtls/tests/src/psa_crypto_helpers.c +0 -196
- package/external/libedhoc/externals/mbedtls/tests/src/psa_exercise_key.c +0 -989
- package/external/libedhoc/externals/mbedtls/tests/src/random.c +0 -136
- package/external/libedhoc/externals/mbedtls/tests/src/test_certs.h +0 -1226
- package/external/libedhoc/externals/mbedtls/tests/src/test_helpers/ssl_helpers.c +0 -2292
- package/external/libedhoc/externals/mbedtls/tests/src/threading_helpers.c +0 -210
- package/external/libedhoc/externals/zcbor/include/zcbor_common.h +0 -509
- package/external/libedhoc/externals/zcbor/include/zcbor_decode.h +0 -447
- package/external/libedhoc/externals/zcbor/include/zcbor_encode.h +0 -240
- package/external/libedhoc/externals/zcbor/include/zcbor_print.h +0 -165
- package/external/libedhoc/externals/zcbor/include/zcbor_tags.h +0 -94
- package/external/libedhoc/externals/zcbor/samples/hello_world/src/main.c +0 -41
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_decode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_encode.h +0 -39
- package/external/libedhoc/externals/zcbor/samples/pet/include/pet_types.h +0 -47
- package/external/libedhoc/externals/zcbor/samples/pet/src/main.c +0 -128
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_decode.c +0 -60
- package/external/libedhoc/externals/zcbor/samples/pet/src/pet_encode.c +0 -61
- package/external/libedhoc/externals/zcbor/src/zcbor_common.c +0 -430
- package/external/libedhoc/externals/zcbor/src/zcbor_decode.c +0 -1567
- package/external/libedhoc/externals/zcbor/src/zcbor_encode.c +0 -609
- package/external/libedhoc/externals/zcbor/tests/decode/test1_suit_old_formats/src/main.c +0 -367
- package/external/libedhoc/externals/zcbor/tests/decode/test2_suit/src/main.c +0 -189
- package/external/libedhoc/externals/zcbor/tests/decode/test3_simple/src/main.c +0 -528
- package/external/libedhoc/externals/zcbor/tests/decode/test5_corner_cases/src/main.c +0 -2154
- package/external/libedhoc/externals/zcbor/tests/decode/test7_suit9_simple/src/main.c +0 -134
- package/external/libedhoc/externals/zcbor/tests/decode/test8_suit12/src/main.c +0 -862
- package/external/libedhoc/externals/zcbor/tests/decode/test9_manifest14/src/main.c +0 -363
- package/external/libedhoc/externals/zcbor/tests/encode/test1_suit/src/main.c +0 -453
- package/external/libedhoc/externals/zcbor/tests/encode/test2_simple/src/main.c +0 -122
- package/external/libedhoc/externals/zcbor/tests/encode/test3_corner_cases/src/main.c +0 -1554
- package/external/libedhoc/externals/zcbor/tests/encode/test4_senml/src/main.c +0 -65
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_everything.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_manifest12.c +0 -136
- package/external/libedhoc/externals/zcbor/tests/fuzz/fuzz_pet.c +0 -12
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.c +0 -60
- package/external/libedhoc/externals/zcbor/tests/fuzz/main_entry.h +0 -5
- package/external/libedhoc/externals/zcbor/tests/unit/test1_unit_tests/src/main.c +0 -1437
- package/external/libedhoc/externals/zcbor/tests/unit/test3_float16/src/main.c +0 -203
- package/external/libedhoc/include/edhoc.h +0 -687
- package/external/libedhoc/include/edhoc_common.h +0 -289
- package/external/libedhoc/include/edhoc_context.h +0 -343
- package/external/libedhoc/include/edhoc_credentials.h +0 -265
- package/external/libedhoc/include/edhoc_crypto.h +0 -331
- package/external/libedhoc/include/edhoc_ead.h +0 -102
- package/external/libedhoc/include/edhoc_macros.h +0 -60
- package/external/libedhoc/include/edhoc_values.h +0 -181
- package/external/libedhoc/library/edhoc.c +0 -253
- package/external/libedhoc/library/edhoc_common.c +0 -1314
- package/external/libedhoc/library/edhoc_exporter.c +0 -542
- package/external/libedhoc/library/edhoc_message_1.c +0 -474
- package/external/libedhoc/library/edhoc_message_2.c +0 -1697
- package/external/libedhoc/library/edhoc_message_3.c +0 -1467
- package/external/libedhoc/library/edhoc_message_4.c +0 -828
- package/external/libedhoc/library/edhoc_message_error.c +0 -238
- package/external/libedhoc/tests/include/cipher_suite_0.h +0 -131
- package/external/libedhoc/tests/include/cipher_suite_2.h +0 -139
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_2.h +0 -786
- package/external/libedhoc/tests/include/test_vector_rfc9529_chapter_3.h +0 -529
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_0.h +0 -137
- package/external/libedhoc/tests/include/test_vector_x5chain_sign_keys_suite_2.h +0 -168
- package/external/libedhoc/tests/include/test_vector_x5chain_static_dh_keys_suite_2.h +0 -162
- package/external/libedhoc/tests/include/test_vector_x5t_sign_keys_suite_2.h +0 -180
- package/external/libedhoc/tests/src/cipher_suite_0.c +0 -445
- package/external/libedhoc/tests/src/cipher_suite_2.c +0 -600
- package/external/libedhoc/tests/src/module_test_api.c +0 -430
- package/external/libedhoc/tests/src/module_test_cipher_suite_0.c +0 -395
- package/external/libedhoc/tests/src/module_test_cipher_suite_2.c +0 -392
- package/external/libedhoc/tests/src/module_test_error_message.c +0 -251
- package/external/libedhoc/tests/src/module_test_main.c +0 -49
- package/external/libedhoc/tests/src/module_test_rfc9528_suites_negotiation.c +0 -541
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_2.c +0 -2681
- package/external/libedhoc/tests/src/module_test_rfc9529_chapter_3.c +0 -1635
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_0.c +0 -1135
- package/external/libedhoc/tests/src/module_test_x5chain_sign_keys_suite_2.c +0 -1249
- package/external/libedhoc/tests/src/module_test_x5chain_static_dh_keys_suite_2.c +0 -798
- package/external/libedhoc/tests/src/module_test_x5t_sign_keys_suite_2.c +0 -956
- package/include/Binding.h +0 -348
- package/include/EdhocComposeAsyncWorker.h +0 -49
- package/include/EdhocCredentialManager.h +0 -89
- package/include/EdhocCryptoManager.h +0 -495
- package/include/EdhocEadManager.h +0 -147
- package/include/EdhocExportOscoreAsyncWorker.h +0 -57
- package/include/EdhocKeyExporterAsyncWorker.h +0 -56
- package/include/EdhocKeyUpdateAsyncWorker.h +0 -55
- package/include/EdhocProcessAsyncWorker.h +0 -55
- package/include/RunningContext.h +0 -102
- package/include/Suites.h +0 -27
- package/include/Utils.h +0 -71
- package/patches/prebuildify-cross+5.1.0.dev.patch +0 -26
- package/patches/prebuildify-cross+5.1.1.dev.patch +0 -26
- package/prebuilds/android-arm/edhoc.armv7.node +0 -0
- package/prebuilds/android-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/darwin-arm64/edhoc.node +0 -0
- package/prebuilds/darwin-x64/edhoc.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv6.node +0 -0
- package/prebuilds/linux-arm/edhoc.armv7.node +0 -0
- package/prebuilds/linux-arm64/edhoc.armv8.node +0 -0
- package/prebuilds/linux-x64/edhoc.glibc.node +0 -0
- package/prebuilds/linux-x64/edhoc.musl.node +0 -0
- package/prebuilds/win32-ia32/edhoc.node +0 -0
- package/prebuilds/win32-x64/edhoc.node +0 -0
- package/src/Binding.cpp +0 -434
- package/src/EdhocComposeAsyncWorker.cpp +0 -60
- package/src/EdhocCredentialManager.cpp +0 -314
- package/src/EdhocCryptoManager.cpp +0 -593
- package/src/EdhocEadManager.cpp +0 -148
- package/src/EdhocExportOscoreAsyncWorker.cpp +0 -67
- package/src/EdhocKeyExporterAsyncWorker.cpp +0 -39
- package/src/EdhocKeyUpdateAsyncWorker.cpp +0 -31
- package/src/EdhocProcessAsyncWorker.cpp +0 -120
- package/src/RunningContext.cpp +0 -95
- package/src/Suites.cpp +0 -120
- package/src/Utils.cpp +0 -54
- package/test/basic.test.ts +0 -118
- package/test/vectors.test.ts +0 -111
|
@@ -1,1467 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* \file edhoc_message_3.c
|
|
3
|
-
* \author Kamil Kielbasa
|
|
4
|
-
* \brief EDHOC message 3.
|
|
5
|
-
* \version 0.6
|
|
6
|
-
* \date 2024-08-05
|
|
7
|
-
*
|
|
8
|
-
* \copyright Copyright (c) 2024
|
|
9
|
-
*
|
|
10
|
-
*/
|
|
11
|
-
|
|
12
|
-
/* Include files ----------------------------------------------------------- */
|
|
13
|
-
|
|
14
|
-
/* EDHOC header: */
|
|
15
|
-
#define EDHOC_ALLOW_PRIVATE_ACCESS
|
|
16
|
-
#include "edhoc.h"
|
|
17
|
-
#include "edhoc_common.h"
|
|
18
|
-
|
|
19
|
-
/* Standard library headers: */
|
|
20
|
-
#include <stdint.h>
|
|
21
|
-
#include <stddef.h>
|
|
22
|
-
#include <string.h>
|
|
23
|
-
#include <stdbool.h>
|
|
24
|
-
|
|
25
|
-
#ifdef __clang__
|
|
26
|
-
#pragma clang diagnostic push
|
|
27
|
-
#pragma clang diagnostic ignored "-Wshadow"
|
|
28
|
-
#pragma clang diagnostic ignored "-Wreserved-identifier"
|
|
29
|
-
#pragma clang diagnostic ignored "-Wpadded"
|
|
30
|
-
#pragma clang diagnostic ignored "-Wdocumentation"
|
|
31
|
-
#endif
|
|
32
|
-
|
|
33
|
-
/* CBOR headers: */
|
|
34
|
-
#include <zcbor_common.h>
|
|
35
|
-
#include <backend_cbor_message_3_encode.h>
|
|
36
|
-
#include <backend_cbor_message_3_decode.h>
|
|
37
|
-
#include <backend_cbor_bstr_type_encode.h>
|
|
38
|
-
#include <backend_cbor_bstr_type_decode.h>
|
|
39
|
-
#include <backend_cbor_int_type_encode.h>
|
|
40
|
-
#include <backend_cbor_int_type_decode.h>
|
|
41
|
-
#include <backend_cbor_id_cred_x_encode.h>
|
|
42
|
-
#include <backend_cbor_id_cred_x_decode.h>
|
|
43
|
-
#include <backend_cbor_sig_structure_encode.h>
|
|
44
|
-
#include <backend_cbor_info_encode.h>
|
|
45
|
-
#include <backend_cbor_plaintext_3_decode.h>
|
|
46
|
-
#include <backend_cbor_enc_structure_encode.h>
|
|
47
|
-
#include <backend_cbor_enc_structure_decode.h>
|
|
48
|
-
#include <backend_cbor_ead_encode.h>
|
|
49
|
-
|
|
50
|
-
#ifdef __clang__
|
|
51
|
-
#pragma clang diagnostic pop
|
|
52
|
-
#endif
|
|
53
|
-
|
|
54
|
-
/* Module defines ---------------------------------------------------------- */
|
|
55
|
-
/* Module types and type definitiones -------------------------------------- */
|
|
56
|
-
/* Module interface variables and constants -------------------------------- */
|
|
57
|
-
/* Static variables and constants ------------------------------------------ */
|
|
58
|
-
/* Static function declarations -------------------------------------------- */
|
|
59
|
-
|
|
60
|
-
/**
|
|
61
|
-
* \brief Compute psuedo random key (PRK_4e3m).
|
|
62
|
-
*
|
|
63
|
-
* \param[in,out] ctx EDHOC context.
|
|
64
|
-
* \param[in] auth_cred Authentication credentials.
|
|
65
|
-
* \param[in] pub_key Peer public static DH key.
|
|
66
|
-
* \param pub_key_len Size of the \p pub_key buffer in bytes.
|
|
67
|
-
*
|
|
68
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
69
|
-
*/
|
|
70
|
-
static int comp_prk_4e3m(struct edhoc_context *ctx,
|
|
71
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
72
|
-
const uint8_t *pub_key, size_t pub_key_len);
|
|
73
|
-
|
|
74
|
-
/**
|
|
75
|
-
* \brief Compute memory required for PLAINTEXT_3.
|
|
76
|
-
*
|
|
77
|
-
* \param[in] ctx EDHOC context.
|
|
78
|
-
* \param[in] mac_ctx MAC context.
|
|
79
|
-
* \param sign_len Size of the signature buffer in bytes.
|
|
80
|
-
* \param[out] plaintext_3_len On success, length of PLAINTEXT_3.
|
|
81
|
-
*
|
|
82
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
83
|
-
*/
|
|
84
|
-
static int comp_plaintext_3_len(const struct edhoc_context *ctx,
|
|
85
|
-
const struct mac_context *mac_ctx,
|
|
86
|
-
size_t sign_len, size_t *plaintext_3_len);
|
|
87
|
-
|
|
88
|
-
/**
|
|
89
|
-
* \brief Prepare PLAINTEXT_3.
|
|
90
|
-
*
|
|
91
|
-
* \param[in] mac_ctx MAC context.
|
|
92
|
-
* \param[in] sign Buffer containing the signature.
|
|
93
|
-
* \param sign_len Size of the \p sign buffer in bytes.
|
|
94
|
-
* \param[out] ptxt Buffer where the generated plaintext is to be written.
|
|
95
|
-
* \param ptxt_size Size of the \p ptxt buffer in bytes.
|
|
96
|
-
* \param[out] ptxt_len On success, the number of bytes that make up the PLAINTEXT_2.
|
|
97
|
-
*
|
|
98
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
99
|
-
*/
|
|
100
|
-
static int prepare_plaintext_3(const struct mac_context *mac_ctx,
|
|
101
|
-
const uint8_t *sign, size_t sign_len,
|
|
102
|
-
uint8_t *ptxt, size_t ptxt_size,
|
|
103
|
-
size_t *ptxt_len);
|
|
104
|
-
|
|
105
|
-
/**
|
|
106
|
-
* \brief Compute required length in bytes for AAD_3.
|
|
107
|
-
*
|
|
108
|
-
* \param[in] ctx EDHOC context.
|
|
109
|
-
* \param[out] aad_3_len On success, length of AAD_3.
|
|
110
|
-
*
|
|
111
|
-
* \retval EDHOC_SUCCESS on success, otherwise failure.s
|
|
112
|
-
*/
|
|
113
|
-
static int32_t comp_aad_3_len(const struct edhoc_context *ctx,
|
|
114
|
-
size_t *aad_3_len);
|
|
115
|
-
|
|
116
|
-
/**
|
|
117
|
-
* \brief Compute K_3, IV_3 and AAD_3.
|
|
118
|
-
*
|
|
119
|
-
* \param[in] ctx EDHOC context.
|
|
120
|
-
* \param[out] key Buffer where the generated K_3 is to be written.
|
|
121
|
-
* \param key_len Size of the \p key buffer in bytes.
|
|
122
|
-
* \param[out] iv Buffer where the generated IV_3 is to be written.
|
|
123
|
-
* \param iv_len Size of the \p iv buffer in bytes.
|
|
124
|
-
* \param[out] aad Buffer where the generated AAD_3 is to be written.
|
|
125
|
-
* \param aad_len Size of the \p aad buffer in bytes.
|
|
126
|
-
*
|
|
127
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
128
|
-
*/
|
|
129
|
-
static int comp_key_iv_aad(const struct edhoc_context *ctx, uint8_t *key,
|
|
130
|
-
size_t key_len, uint8_t *iv, size_t iv_len,
|
|
131
|
-
uint8_t *aad, size_t aad_len);
|
|
132
|
-
|
|
133
|
-
/**
|
|
134
|
-
* \brief Compute CIPHERTEXT_3.
|
|
135
|
-
*
|
|
136
|
-
* \param[in] ctx EDHOC context.
|
|
137
|
-
* \param[in] key Buffer containing the K_3.
|
|
138
|
-
* \param key_len Size of the \p key buffer in bytes.
|
|
139
|
-
* \param[in] iv Buffer containing the IV_3.
|
|
140
|
-
* \param iv_len Size of the \p iv buffer in bytes.
|
|
141
|
-
* \param[in] aad Buffer containing the AAD_3.
|
|
142
|
-
* \param aad_len Size of the \p aad buffer in bytes.
|
|
143
|
-
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
144
|
-
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
145
|
-
* \param[out] ctxt Buffer where the generated ciphertext is to be written.
|
|
146
|
-
* \param ctxt_size Size of the \p ctxt buffer in bytes.
|
|
147
|
-
* \param[out] ctxt_len On success, the number of bytes that make up the CIPHERTEXT_3.
|
|
148
|
-
*
|
|
149
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
150
|
-
*/
|
|
151
|
-
static int comp_ciphertext(const struct edhoc_context *ctx, const uint8_t *key,
|
|
152
|
-
size_t key_len, const uint8_t *iv, size_t iv_len,
|
|
153
|
-
const uint8_t *aad, size_t aad_len,
|
|
154
|
-
const uint8_t *ptxt, size_t ptxt_len, uint8_t *ctxt,
|
|
155
|
-
size_t ctxt_size, size_t *ctxt_len);
|
|
156
|
-
|
|
157
|
-
/**
|
|
158
|
-
* \brief Compute transcript hash 4.
|
|
159
|
-
*
|
|
160
|
-
* \param[in,out] ctx EDHOC context.
|
|
161
|
-
* \param[in] mac_ctx MAC context.
|
|
162
|
-
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
163
|
-
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
164
|
-
*
|
|
165
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
166
|
-
*/
|
|
167
|
-
static int comp_th_4(struct edhoc_context *ctx,
|
|
168
|
-
const struct mac_context *mac_ctx, const uint8_t *ptxt,
|
|
169
|
-
size_t ptxt_len);
|
|
170
|
-
|
|
171
|
-
/**
|
|
172
|
-
* \brief Generate edhoc message 3.
|
|
173
|
-
*
|
|
174
|
-
* \param[in] ctxt Buffer continas the ciphertext.
|
|
175
|
-
* \param ctxt_len Size of the \p ctxt buffer in bytes.
|
|
176
|
-
* \param[out] msg_3 Buffer where the generated message 3 is to be written.
|
|
177
|
-
* \param msg_3_size Size of the \p msg_3 buffer in bytes.
|
|
178
|
-
* \param[out] msg_3_len On success, the number of bytes that make up the message 3.
|
|
179
|
-
*
|
|
180
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
181
|
-
*/
|
|
182
|
-
static int gen_msg_3(const uint8_t *ctxt, size_t ctxt_len, uint8_t *msg_3,
|
|
183
|
-
size_t msg_3_size, size_t *msg_3_len);
|
|
184
|
-
|
|
185
|
-
/**
|
|
186
|
-
* \brief CBOR decode message 3 and save address and length for CIPHERTEXT_3.
|
|
187
|
-
*
|
|
188
|
-
* \param[in] msg_3 Buffer containing the message 3.
|
|
189
|
-
* \param msg_3_len Size of the \p msg_3 buffer in bytes.
|
|
190
|
-
* \param[out] ctxt_3 Pointer to buffer containing the CIPHERTEXT_3.
|
|
191
|
-
* \param[out] ctxt_3_len Size of the \p ctxt_3 buffer in bytes.
|
|
192
|
-
*
|
|
193
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
194
|
-
*/
|
|
195
|
-
static int parse_msg_3(const uint8_t *msg_3, size_t msg_3_len,
|
|
196
|
-
const uint8_t **ctxt_3, size_t *ctxt_3_len);
|
|
197
|
-
|
|
198
|
-
/**
|
|
199
|
-
* \brief Decrypt CIPHERTEXT_3.
|
|
200
|
-
*
|
|
201
|
-
* \param[in] ctx EDHOC context.
|
|
202
|
-
* \param[in] key Buffer containing the K_3.
|
|
203
|
-
* \param key_len Size of the \p key buffer in bytes.
|
|
204
|
-
* \param[in] iv Buffer containing the IV_3.
|
|
205
|
-
* \param iv_len Size of the \p iv buffer in bytes.
|
|
206
|
-
* \param[in] aad Buffer containing the AAD_3.
|
|
207
|
-
* \param aad_len Size of the \p aad buffer in bytes.
|
|
208
|
-
* \param[in] ctxt Pointer to buffer containing the CIPHERTEXT_3.
|
|
209
|
-
* \param ctxt_len Size of the \p ctxt buffer in bytes.
|
|
210
|
-
* \param[out] ptxt Buffer where the decrypted PLAINTEXT_3 is to be written.
|
|
211
|
-
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
212
|
-
*
|
|
213
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
214
|
-
*/
|
|
215
|
-
static int decrypt_ciphertext(const struct edhoc_context *ctx,
|
|
216
|
-
const uint8_t *key, size_t key_len,
|
|
217
|
-
const uint8_t *iv, size_t iv_len,
|
|
218
|
-
const uint8_t *aad, size_t aad_len,
|
|
219
|
-
const uint8_t *ctxt, size_t ctxt_len,
|
|
220
|
-
uint8_t *ptxt, size_t ptxt_len);
|
|
221
|
-
|
|
222
|
-
/**
|
|
223
|
-
* \brief Parsed cborised PLAINTEXT_3 for separate buffers.
|
|
224
|
-
*
|
|
225
|
-
* \param[in] ctx EDHOC context.
|
|
226
|
-
* \param[in] ptxt Buffer containing the PLAINTEXT_3.
|
|
227
|
-
* \param ptxt_len Size of the \p ptxt buffer in bytes.
|
|
228
|
-
* \param[out] parsed_ptxt Structure where parsed PLAINTEXT_3 is to be written.
|
|
229
|
-
*
|
|
230
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
231
|
-
*/
|
|
232
|
-
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
233
|
-
size_t ptxt_len, struct plaintext *parsed_ptxt);
|
|
234
|
-
|
|
235
|
-
/**
|
|
236
|
-
* \brief Compute SALT_4e3m.
|
|
237
|
-
*
|
|
238
|
-
* \param[in] ctx EDHOC context.
|
|
239
|
-
* \param[out] salt Buffer where the generated salt is to be written.
|
|
240
|
-
* \param salt_len Size of the \p salt buffer in bytes.
|
|
241
|
-
*
|
|
242
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
243
|
-
*/
|
|
244
|
-
static int comp_salt_4e3m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
245
|
-
size_t salt_len);
|
|
246
|
-
|
|
247
|
-
/**
|
|
248
|
-
* \brief Compute G_IY for PRK_4e3m.
|
|
249
|
-
*
|
|
250
|
-
* \param[in,out] ctx EDHOC context.
|
|
251
|
-
* \param[in] auth_cred Authentication credentials.
|
|
252
|
-
* \param[in] pub_key Peer public key.
|
|
253
|
-
* \param pub_key_len Peer public key length.
|
|
254
|
-
* \param[out] giy Buffer where the generated G_IY is to be written.
|
|
255
|
-
* \param giy_len Size of the \p giy buffer in bytes.
|
|
256
|
-
*
|
|
257
|
-
* \return EDHOC_SUCCESS on success, otherwise failure.
|
|
258
|
-
*/
|
|
259
|
-
static int comp_giy(struct edhoc_context *ctx,
|
|
260
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
261
|
-
const uint8_t *pub_key, size_t pub_key_len, uint8_t *giy,
|
|
262
|
-
size_t giy_len);
|
|
263
|
-
|
|
264
|
-
/* Static function definitions --------------------------------------------- */
|
|
265
|
-
|
|
266
|
-
static int comp_prk_4e3m(struct edhoc_context *ctx,
|
|
267
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
268
|
-
const uint8_t *pub_key, size_t pub_key_len)
|
|
269
|
-
{
|
|
270
|
-
if (NULL == ctx || NULL == auth_cred)
|
|
271
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
272
|
-
|
|
273
|
-
if (EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
274
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
275
|
-
|
|
276
|
-
switch (ctx->chosen_method) {
|
|
277
|
-
case EDHOC_METHOD_0:
|
|
278
|
-
case EDHOC_METHOD_1:
|
|
279
|
-
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
280
|
-
return EDHOC_SUCCESS;
|
|
281
|
-
|
|
282
|
-
case EDHOC_METHOD_2:
|
|
283
|
-
case EDHOC_METHOD_3: {
|
|
284
|
-
const size_t hash_len =
|
|
285
|
-
ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
286
|
-
|
|
287
|
-
VLA_ALLOC(uint8_t, salt_4e3m, hash_len);
|
|
288
|
-
memset(salt_4e3m, 0, VLA_SIZEOF(salt_4e3m));
|
|
289
|
-
|
|
290
|
-
int ret = comp_salt_4e3m(ctx, salt_4e3m, VLA_SIZE(salt_4e3m));
|
|
291
|
-
|
|
292
|
-
if (EDHOC_SUCCESS != ret)
|
|
293
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
294
|
-
|
|
295
|
-
if (NULL != ctx->logger)
|
|
296
|
-
ctx->logger(ctx->user_ctx, "SALT_4e3m", salt_4e3m,
|
|
297
|
-
VLA_SIZE(salt_4e3m));
|
|
298
|
-
|
|
299
|
-
const size_t ecc_key_len =
|
|
300
|
-
ctx->csuite[ctx->chosen_csuite_idx].ecc_key_length;
|
|
301
|
-
|
|
302
|
-
VLA_ALLOC(uint8_t, giy, ecc_key_len);
|
|
303
|
-
memset(giy, 0, VLA_SIZEOF(giy));
|
|
304
|
-
|
|
305
|
-
ret = comp_giy(ctx, auth_cred, pub_key, pub_key_len, giy,
|
|
306
|
-
VLA_SIZE(giy));
|
|
307
|
-
|
|
308
|
-
if (EDHOC_SUCCESS != ret)
|
|
309
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
310
|
-
|
|
311
|
-
if (NULL != ctx->logger)
|
|
312
|
-
ctx->logger(ctx->user_ctx, "G_IY", giy, VLA_SIZE(giy));
|
|
313
|
-
|
|
314
|
-
ctx->prk_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
315
|
-
|
|
316
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
317
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXTRACT, giy,
|
|
318
|
-
VLA_SIZE(giy), key_id);
|
|
319
|
-
memset(giy, 0, VLA_SIZEOF(giy));
|
|
320
|
-
|
|
321
|
-
if (EDHOC_SUCCESS != ret)
|
|
322
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
323
|
-
|
|
324
|
-
size_t out_len = 0;
|
|
325
|
-
ret = ctx->crypto.extract(ctx->user_ctx, key_id, salt_4e3m,
|
|
326
|
-
VLA_SIZE(salt_4e3m), ctx->prk,
|
|
327
|
-
ctx->prk_len, &out_len);
|
|
328
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
329
|
-
|
|
330
|
-
if (EDHOC_SUCCESS != ret || ctx->prk_len != out_len)
|
|
331
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
332
|
-
|
|
333
|
-
ctx->prk_state = EDHOC_PRK_STATE_4E3M;
|
|
334
|
-
return EDHOC_SUCCESS;
|
|
335
|
-
}
|
|
336
|
-
case EDHOC_METHOD_MAX:
|
|
337
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
338
|
-
}
|
|
339
|
-
|
|
340
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
341
|
-
}
|
|
342
|
-
|
|
343
|
-
static int comp_plaintext_3_len(const struct edhoc_context *ctx,
|
|
344
|
-
const struct mac_context *mac_ctx,
|
|
345
|
-
size_t sign_len, size_t *plaintext_3_len)
|
|
346
|
-
{
|
|
347
|
-
if (NULL == ctx || NULL == mac_ctx || 0 == sign_len ||
|
|
348
|
-
NULL == plaintext_3_len)
|
|
349
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
350
|
-
|
|
351
|
-
size_t len = 0;
|
|
352
|
-
|
|
353
|
-
switch (ctx->cid.encode_type) {
|
|
354
|
-
case EDHOC_CID_TYPE_ONE_BYTE_INTEGER:
|
|
355
|
-
len += edhoc_cbor_int_mem_req(ctx->cid.int_value);
|
|
356
|
-
break;
|
|
357
|
-
case EDHOC_CID_TYPE_BYTE_STRING:
|
|
358
|
-
len += ctx->cid.bstr_length;
|
|
359
|
-
len += edhoc_cbor_bstr_oh(ctx->cid.bstr_length);
|
|
360
|
-
break;
|
|
361
|
-
}
|
|
362
|
-
|
|
363
|
-
if (true == mac_ctx->id_cred_is_comp_enc) {
|
|
364
|
-
switch (mac_ctx->id_cred_enc_type) {
|
|
365
|
-
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
366
|
-
len += edhoc_cbor_int_mem_req(mac_ctx->id_cred_int);
|
|
367
|
-
break;
|
|
368
|
-
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
369
|
-
len += mac_ctx->id_cred_bstr_len;
|
|
370
|
-
len += edhoc_cbor_bstr_oh(mac_ctx->id_cred_bstr_len);
|
|
371
|
-
break;
|
|
372
|
-
}
|
|
373
|
-
} else {
|
|
374
|
-
len += mac_ctx->id_cred_len;
|
|
375
|
-
}
|
|
376
|
-
|
|
377
|
-
len += sign_len;
|
|
378
|
-
len += edhoc_cbor_bstr_oh(sign_len);
|
|
379
|
-
len += mac_ctx->ead_len;
|
|
380
|
-
|
|
381
|
-
*plaintext_3_len = len;
|
|
382
|
-
return EDHOC_SUCCESS;
|
|
383
|
-
}
|
|
384
|
-
|
|
385
|
-
static int prepare_plaintext_3(const struct mac_context *mac_ctx,
|
|
386
|
-
const uint8_t *sign, size_t sign_len,
|
|
387
|
-
uint8_t *ptxt, size_t ptxt_size,
|
|
388
|
-
size_t *ptxt_len)
|
|
389
|
-
{
|
|
390
|
-
if (NULL == mac_ctx || NULL == sign || 0 == sign_len || NULL == ptxt ||
|
|
391
|
-
0 == ptxt_size || NULL == ptxt_len)
|
|
392
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
393
|
-
|
|
394
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
395
|
-
|
|
396
|
-
size_t offset = 0;
|
|
397
|
-
|
|
398
|
-
/* ID_CRED_I. */
|
|
399
|
-
if (mac_ctx->id_cred_is_comp_enc) {
|
|
400
|
-
switch (mac_ctx->id_cred_enc_type) {
|
|
401
|
-
case EDHOC_ENCODE_TYPE_INTEGER:
|
|
402
|
-
memcpy(&ptxt[offset], &mac_ctx->id_cred_int, 1);
|
|
403
|
-
offset += 1;
|
|
404
|
-
break;
|
|
405
|
-
case EDHOC_ENCODE_TYPE_BYTE_STRING:
|
|
406
|
-
memcpy(&ptxt[offset], &mac_ctx->id_cred_bstr,
|
|
407
|
-
mac_ctx->id_cred_bstr_len);
|
|
408
|
-
offset += mac_ctx->id_cred_bstr_len;
|
|
409
|
-
break;
|
|
410
|
-
default:
|
|
411
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
412
|
-
}
|
|
413
|
-
} else {
|
|
414
|
-
memcpy(&ptxt[offset], mac_ctx->id_cred, mac_ctx->id_cred_len);
|
|
415
|
-
offset += mac_ctx->id_cred_len;
|
|
416
|
-
}
|
|
417
|
-
const struct zcbor_string cbor_sign_or_mac_3 = {
|
|
418
|
-
.value = sign,
|
|
419
|
-
.len = sign_len,
|
|
420
|
-
};
|
|
421
|
-
|
|
422
|
-
size_t len = 0;
|
|
423
|
-
ret = cbor_encode_byte_string_type_bstr_type(
|
|
424
|
-
&ptxt[offset], sign_len + edhoc_cbor_bstr_oh(sign_len),
|
|
425
|
-
&cbor_sign_or_mac_3, &len);
|
|
426
|
-
|
|
427
|
-
if (ZCBOR_SUCCESS != ret)
|
|
428
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
429
|
-
|
|
430
|
-
offset += len;
|
|
431
|
-
|
|
432
|
-
/* EAD_3 if present. */
|
|
433
|
-
if (mac_ctx->is_ead) {
|
|
434
|
-
memcpy(&ptxt[offset], mac_ctx->ead, mac_ctx->ead_len);
|
|
435
|
-
offset += mac_ctx->ead_len;
|
|
436
|
-
}
|
|
437
|
-
|
|
438
|
-
if (offset > ptxt_size)
|
|
439
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
440
|
-
|
|
441
|
-
*ptxt_len = offset;
|
|
442
|
-
|
|
443
|
-
return EDHOC_SUCCESS;
|
|
444
|
-
}
|
|
445
|
-
|
|
446
|
-
static int comp_aad_3_len(const struct edhoc_context *ctx, size_t *aad_3_len)
|
|
447
|
-
{
|
|
448
|
-
if (NULL == ctx || NULL == aad_3_len)
|
|
449
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
450
|
-
|
|
451
|
-
size_t len = 0;
|
|
452
|
-
|
|
453
|
-
len += sizeof("Encrypt0") + edhoc_cbor_tstr_oh(sizeof("Encrypt0"));
|
|
454
|
-
len += 1; /* One byte for cbor bstr with 0 value. */
|
|
455
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
456
|
-
|
|
457
|
-
*aad_3_len = len;
|
|
458
|
-
return EDHOC_SUCCESS;
|
|
459
|
-
}
|
|
460
|
-
|
|
461
|
-
static int comp_key_iv_aad(const struct edhoc_context *ctx, uint8_t *key,
|
|
462
|
-
size_t key_len, uint8_t *iv, size_t iv_len,
|
|
463
|
-
uint8_t *aad, size_t aad_len)
|
|
464
|
-
{
|
|
465
|
-
if (NULL == ctx || NULL == key || 0 == key_len || NULL == iv ||
|
|
466
|
-
0 == iv_len || NULL == aad || 0 == aad_len)
|
|
467
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
468
|
-
|
|
469
|
-
if (EDHOC_TH_STATE_3 != ctx->th_state)
|
|
470
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
471
|
-
|
|
472
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
473
|
-
|
|
474
|
-
const struct edhoc_cipher_suite csuite =
|
|
475
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
476
|
-
|
|
477
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
478
|
-
struct info input_info = { 0 };
|
|
479
|
-
|
|
480
|
-
/* Calculate struct info cbor overhead. */
|
|
481
|
-
size_t len = 0;
|
|
482
|
-
len += edhoc_cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_IV_3);
|
|
483
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
484
|
-
len += edhoc_cbor_int_mem_req((int32_t)csuite.aead_key_length);
|
|
485
|
-
|
|
486
|
-
VLA_ALLOC(uint8_t, info, len);
|
|
487
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
488
|
-
|
|
489
|
-
/* Generate K_3. */
|
|
490
|
-
input_info = (struct info){
|
|
491
|
-
.info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_K_3,
|
|
492
|
-
.info_context.value = ctx->th,
|
|
493
|
-
.info_context.len = ctx->th_len,
|
|
494
|
-
.info_length = (uint32_t)csuite.aead_key_length,
|
|
495
|
-
};
|
|
496
|
-
|
|
497
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
498
|
-
len = 0;
|
|
499
|
-
ret = cbor_encode_info(info, VLA_SIZE(info), &input_info, &len);
|
|
500
|
-
|
|
501
|
-
if (ZCBOR_SUCCESS != ret)
|
|
502
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
503
|
-
|
|
504
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
505
|
-
ctx->prk_len, key_id);
|
|
506
|
-
|
|
507
|
-
if (EDHOC_SUCCESS != ret)
|
|
508
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
509
|
-
|
|
510
|
-
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, key,
|
|
511
|
-
key_len);
|
|
512
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
513
|
-
memset(key_id, 0, sizeof(key_id));
|
|
514
|
-
|
|
515
|
-
if (EDHOC_SUCCESS != ret)
|
|
516
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
517
|
-
|
|
518
|
-
/* Generate IV_3. */
|
|
519
|
-
input_info = (struct info){
|
|
520
|
-
.info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_IV_3,
|
|
521
|
-
.info_context.value = ctx->th,
|
|
522
|
-
.info_context.len = ctx->th_len,
|
|
523
|
-
.info_length = (uint32_t)csuite.aead_iv_length,
|
|
524
|
-
};
|
|
525
|
-
|
|
526
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
527
|
-
len = 0;
|
|
528
|
-
ret = cbor_encode_info(info, VLA_SIZE(info), &input_info, &len);
|
|
529
|
-
|
|
530
|
-
if (ZCBOR_SUCCESS != ret)
|
|
531
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
532
|
-
|
|
533
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
534
|
-
ctx->prk_len, key_id);
|
|
535
|
-
|
|
536
|
-
if (EDHOC_SUCCESS != ret)
|
|
537
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
538
|
-
|
|
539
|
-
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, len, iv, iv_len);
|
|
540
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
541
|
-
memset(key_id, 0, sizeof(key_id));
|
|
542
|
-
|
|
543
|
-
if (EDHOC_SUCCESS != ret)
|
|
544
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
545
|
-
|
|
546
|
-
/* Generate AAD_3. */
|
|
547
|
-
struct enc_structure cose_enc_0 = {
|
|
548
|
-
.enc_structure_protected.value = NULL,
|
|
549
|
-
.enc_structure_protected.len = 0,
|
|
550
|
-
.enc_structure_external_aad.value = ctx->th,
|
|
551
|
-
.enc_structure_external_aad.len = ctx->th_len,
|
|
552
|
-
};
|
|
553
|
-
|
|
554
|
-
len = 0;
|
|
555
|
-
ret = cbor_encode_enc_structure(aad, aad_len, &cose_enc_0, &len);
|
|
556
|
-
|
|
557
|
-
if (EDHOC_SUCCESS != ret)
|
|
558
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
559
|
-
|
|
560
|
-
return EDHOC_SUCCESS;
|
|
561
|
-
}
|
|
562
|
-
|
|
563
|
-
static int comp_ciphertext(const struct edhoc_context *ctx, const uint8_t *key,
|
|
564
|
-
size_t key_len, const uint8_t *iv, size_t iv_len,
|
|
565
|
-
const uint8_t *aad, size_t aad_len,
|
|
566
|
-
const uint8_t *ptxt, size_t ptxt_len, uint8_t *ctxt,
|
|
567
|
-
size_t ctxt_size, size_t *ctxt_len)
|
|
568
|
-
{
|
|
569
|
-
if (NULL == ctx || NULL == key || 0 == key_len || NULL == iv ||
|
|
570
|
-
0 == iv_len || NULL == aad || 0 == aad_len || NULL == ptxt ||
|
|
571
|
-
0 == ptxt_len || NULL == ctxt || 0 == ctxt_size || NULL == ctxt_len)
|
|
572
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
573
|
-
|
|
574
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
575
|
-
|
|
576
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
577
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_ENCRYPT, key,
|
|
578
|
-
key_len, key_id);
|
|
579
|
-
|
|
580
|
-
if (EDHOC_SUCCESS != ret)
|
|
581
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
582
|
-
|
|
583
|
-
ret = ctx->crypto.encrypt(ctx->user_ctx, key_id, iv, iv_len, aad,
|
|
584
|
-
aad_len, ptxt, ptxt_len, ctxt, ctxt_size,
|
|
585
|
-
ctxt_len);
|
|
586
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
587
|
-
memset(key_id, 0, sizeof(key_id));
|
|
588
|
-
|
|
589
|
-
if (EDHOC_SUCCESS != ret)
|
|
590
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
591
|
-
|
|
592
|
-
return EDHOC_SUCCESS;
|
|
593
|
-
}
|
|
594
|
-
|
|
595
|
-
static int comp_th_4(struct edhoc_context *ctx,
|
|
596
|
-
const struct mac_context *mac_ctx, const uint8_t *ptxt,
|
|
597
|
-
size_t ptxt_len)
|
|
598
|
-
{
|
|
599
|
-
if (NULL == ctx || NULL == mac_ctx || NULL == ptxt || 0 == ptxt_len)
|
|
600
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
601
|
-
|
|
602
|
-
if (EDHOC_TH_STATE_3 != ctx->th_state)
|
|
603
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
604
|
-
|
|
605
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
606
|
-
size_t len = 0;
|
|
607
|
-
size_t offset = 0;
|
|
608
|
-
|
|
609
|
-
/* Calculate required buffer length for TH_4. */
|
|
610
|
-
len = 0;
|
|
611
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
612
|
-
len += ptxt_len;
|
|
613
|
-
len += mac_ctx->cred_len;
|
|
614
|
-
|
|
615
|
-
VLA_ALLOC(uint8_t, th_4, len);
|
|
616
|
-
memset(th_4, 0, VLA_SIZEOF(th_4));
|
|
617
|
-
|
|
618
|
-
/* TH_3. */
|
|
619
|
-
const struct zcbor_string cbor_th_3 = {
|
|
620
|
-
.value = ctx->th,
|
|
621
|
-
.len = ctx->th_len,
|
|
622
|
-
};
|
|
623
|
-
|
|
624
|
-
len = 0;
|
|
625
|
-
ret = cbor_encode_byte_string_type_bstr_type(
|
|
626
|
-
&th_4[offset], VLA_SIZE(th_4), &cbor_th_3, &len);
|
|
627
|
-
|
|
628
|
-
if (EDHOC_SUCCESS != ret)
|
|
629
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
630
|
-
|
|
631
|
-
offset += len;
|
|
632
|
-
|
|
633
|
-
/* PLAINTEXT_3. */
|
|
634
|
-
memcpy(&th_4[offset], ptxt, ptxt_len);
|
|
635
|
-
offset += ptxt_len;
|
|
636
|
-
|
|
637
|
-
/* CRED_I. */
|
|
638
|
-
memcpy(&th_4[offset], mac_ctx->cred, mac_ctx->cred_len);
|
|
639
|
-
offset += mac_ctx->cred_len;
|
|
640
|
-
|
|
641
|
-
if (VLA_SIZE(th_4) < offset)
|
|
642
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
643
|
-
|
|
644
|
-
/* Calculate TH_4. */
|
|
645
|
-
ctx->th_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
646
|
-
|
|
647
|
-
size_t hash_length = 0;
|
|
648
|
-
ret = ctx->crypto.hash(ctx->user_ctx, th_4, VLA_SIZE(th_4), ctx->th,
|
|
649
|
-
ctx->th_len, &hash_length);
|
|
650
|
-
|
|
651
|
-
if (EDHOC_SUCCESS != ret || ctx->th_len != hash_length)
|
|
652
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
653
|
-
|
|
654
|
-
ctx->th_state = EDHOC_TH_STATE_4;
|
|
655
|
-
return EDHOC_SUCCESS;
|
|
656
|
-
}
|
|
657
|
-
|
|
658
|
-
static int gen_msg_3(const uint8_t *ctxt, size_t ctxt_len, uint8_t *msg_3,
|
|
659
|
-
size_t msg_3_size, size_t *msg_3_len)
|
|
660
|
-
{
|
|
661
|
-
if (NULL == ctxt || 0 == ctxt_len || NULL == msg_3 || 0 == msg_3_size ||
|
|
662
|
-
NULL == msg_3_len)
|
|
663
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
664
|
-
|
|
665
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
666
|
-
|
|
667
|
-
const struct zcbor_string input_bstr = {
|
|
668
|
-
.value = ctxt,
|
|
669
|
-
.len = ctxt_len,
|
|
670
|
-
};
|
|
671
|
-
|
|
672
|
-
ret = cbor_encode_message_3_CIPHERTEXT_3(msg_3, msg_3_size + 1,
|
|
673
|
-
&input_bstr, msg_3_len);
|
|
674
|
-
|
|
675
|
-
if (EDHOC_SUCCESS != ret)
|
|
676
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
677
|
-
|
|
678
|
-
return EDHOC_SUCCESS;
|
|
679
|
-
}
|
|
680
|
-
|
|
681
|
-
static int parse_msg_3(const uint8_t *msg_3, size_t msg_3_len,
|
|
682
|
-
const uint8_t **ctxt_3, size_t *ctxt_3_len)
|
|
683
|
-
{
|
|
684
|
-
if (NULL == msg_3 || 0 == msg_3_len || NULL == ctxt_3 ||
|
|
685
|
-
NULL == ctxt_3_len)
|
|
686
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
687
|
-
|
|
688
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
689
|
-
|
|
690
|
-
size_t len = 0;
|
|
691
|
-
struct zcbor_string dec_msg_3 = { 0 };
|
|
692
|
-
ret = cbor_decode_message_3_CIPHERTEXT_3(msg_3, msg_3_len, &dec_msg_3,
|
|
693
|
-
&len);
|
|
694
|
-
|
|
695
|
-
if (ZCBOR_SUCCESS != ret)
|
|
696
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
697
|
-
|
|
698
|
-
*ctxt_3 = dec_msg_3.value;
|
|
699
|
-
*ctxt_3_len = dec_msg_3.len;
|
|
700
|
-
|
|
701
|
-
return EDHOC_SUCCESS;
|
|
702
|
-
}
|
|
703
|
-
|
|
704
|
-
static int decrypt_ciphertext(const struct edhoc_context *ctx,
|
|
705
|
-
const uint8_t *key, size_t key_len,
|
|
706
|
-
const uint8_t *iv, size_t iv_len,
|
|
707
|
-
const uint8_t *aad, size_t aad_len,
|
|
708
|
-
const uint8_t *ctxt, size_t ctxt_len,
|
|
709
|
-
uint8_t *ptxt, size_t ptxt_len)
|
|
710
|
-
{
|
|
711
|
-
if (NULL == ctx || NULL == key || 0 == key_len || NULL == iv ||
|
|
712
|
-
0 == iv_len || NULL == aad || 0 == aad_len || 0 == ctxt_len ||
|
|
713
|
-
NULL == ptxt || 0 == ptxt_len)
|
|
714
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
715
|
-
|
|
716
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
717
|
-
|
|
718
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
719
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_DECRYPT, key,
|
|
720
|
-
key_len, key_id);
|
|
721
|
-
|
|
722
|
-
if (EDHOC_SUCCESS != ret)
|
|
723
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
724
|
-
|
|
725
|
-
size_t len = 0;
|
|
726
|
-
ret = ctx->crypto.decrypt(ctx->user_ctx, key_id, iv, iv_len, aad,
|
|
727
|
-
aad_len, ctxt, ctxt_len, ptxt, ptxt_len,
|
|
728
|
-
&len);
|
|
729
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
730
|
-
memset(key_id, 0, sizeof(key_id));
|
|
731
|
-
|
|
732
|
-
if (EDHOC_SUCCESS != ret || ptxt_len != len)
|
|
733
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
734
|
-
|
|
735
|
-
return EDHOC_SUCCESS;
|
|
736
|
-
}
|
|
737
|
-
|
|
738
|
-
static int parse_plaintext(struct edhoc_context *ctx, const uint8_t *ptxt,
|
|
739
|
-
size_t ptxt_len, struct plaintext *parsed_ptxt)
|
|
740
|
-
{
|
|
741
|
-
if (NULL == ctx || NULL == ptxt || 0 == ptxt_len || NULL == parsed_ptxt)
|
|
742
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
743
|
-
|
|
744
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
745
|
-
size_t len = 0;
|
|
746
|
-
|
|
747
|
-
struct plaintext_3 cbor_ptxt_3 = { 0 };
|
|
748
|
-
ret = cbor_decode_plaintext_3(ptxt, ptxt_len, &cbor_ptxt_3, &len);
|
|
749
|
-
|
|
750
|
-
if (ZCBOR_SUCCESS != ret)
|
|
751
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
752
|
-
|
|
753
|
-
/* ID_CRED_I */
|
|
754
|
-
switch (cbor_ptxt_3.plaintext_3_ID_CRED_I_choice) {
|
|
755
|
-
case plaintext_3_ID_CRED_I_int_c: {
|
|
756
|
-
parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
|
|
757
|
-
parsed_ptxt->auth_cred.key_id.encode_type =
|
|
758
|
-
EDHOC_ENCODE_TYPE_INTEGER;
|
|
759
|
-
parsed_ptxt->auth_cred.key_id.key_id_int =
|
|
760
|
-
cbor_ptxt_3.plaintext_3_ID_CRED_I_int;
|
|
761
|
-
break;
|
|
762
|
-
}
|
|
763
|
-
|
|
764
|
-
case plaintext_3_ID_CRED_I_bstr_c:
|
|
765
|
-
parsed_ptxt->auth_cred.label = EDHOC_COSE_HEADER_KID;
|
|
766
|
-
parsed_ptxt->auth_cred.key_id.encode_type =
|
|
767
|
-
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
768
|
-
parsed_ptxt->auth_cred.key_id.key_id_bstr_length =
|
|
769
|
-
cbor_ptxt_3.plaintext_3_ID_CRED_I_bstr.len;
|
|
770
|
-
memcpy(parsed_ptxt->auth_cred.key_id.key_id_bstr,
|
|
771
|
-
cbor_ptxt_3.plaintext_3_ID_CRED_I_bstr.value,
|
|
772
|
-
cbor_ptxt_3.plaintext_3_ID_CRED_I_bstr.len);
|
|
773
|
-
break;
|
|
774
|
-
|
|
775
|
-
case plaintext_3_ID_CRED_I_map_m_c: {
|
|
776
|
-
const struct map *cbor_map =
|
|
777
|
-
&cbor_ptxt_3.plaintext_3_ID_CRED_I_map_m;
|
|
778
|
-
|
|
779
|
-
if (cbor_map->map_x5chain_present) {
|
|
780
|
-
const struct COSE_X509_r *cose_x509 =
|
|
781
|
-
&cbor_map->map_x5chain.map_x5chain;
|
|
782
|
-
|
|
783
|
-
parsed_ptxt->auth_cred.label =
|
|
784
|
-
EDHOC_COSE_HEADER_X509_CHAIN;
|
|
785
|
-
|
|
786
|
-
switch (cose_x509->COSE_X509_choice) {
|
|
787
|
-
case COSE_X509_bstr_c:
|
|
788
|
-
parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
|
|
789
|
-
1;
|
|
790
|
-
parsed_ptxt->auth_cred.x509_chain.cert[0] =
|
|
791
|
-
cose_x509->COSE_X509_bstr.value;
|
|
792
|
-
parsed_ptxt->auth_cred.x509_chain.cert_len[0] =
|
|
793
|
-
cose_x509->COSE_X509_bstr.len;
|
|
794
|
-
break;
|
|
795
|
-
|
|
796
|
-
case COSE_X509_certs_l_c: {
|
|
797
|
-
parsed_ptxt->auth_cred.x509_chain.nr_of_certs =
|
|
798
|
-
cose_x509->COSE_X509_certs_l_certs_count;
|
|
799
|
-
|
|
800
|
-
if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_chain
|
|
801
|
-
.cert) <
|
|
802
|
-
cose_x509->COSE_X509_certs_l_certs_count)
|
|
803
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
804
|
-
|
|
805
|
-
for (size_t i = 0;
|
|
806
|
-
i <
|
|
807
|
-
cose_x509->COSE_X509_certs_l_certs_count;
|
|
808
|
-
++i) {
|
|
809
|
-
parsed_ptxt->auth_cred.x509_chain
|
|
810
|
-
.cert[i] =
|
|
811
|
-
cose_x509
|
|
812
|
-
->COSE_X509_certs_l_certs
|
|
813
|
-
[i]
|
|
814
|
-
.value;
|
|
815
|
-
parsed_ptxt->auth_cred.x509_chain
|
|
816
|
-
.cert_len[i] =
|
|
817
|
-
cose_x509
|
|
818
|
-
->COSE_X509_certs_l_certs
|
|
819
|
-
[i]
|
|
820
|
-
.len;
|
|
821
|
-
}
|
|
822
|
-
|
|
823
|
-
break;
|
|
824
|
-
}
|
|
825
|
-
}
|
|
826
|
-
|
|
827
|
-
break;
|
|
828
|
-
}
|
|
829
|
-
|
|
830
|
-
if (cbor_map->map_x5t_present) {
|
|
831
|
-
parsed_ptxt->auth_cred.label =
|
|
832
|
-
EDHOC_COSE_HEADER_X509_HASH;
|
|
833
|
-
|
|
834
|
-
const struct COSE_CertHash *cose_x509 =
|
|
835
|
-
&cbor_map->map_x5t.map_x5t;
|
|
836
|
-
|
|
837
|
-
parsed_ptxt->auth_cred.x509_hash.cert_fp =
|
|
838
|
-
cose_x509->COSE_CertHash_hashValue.value;
|
|
839
|
-
parsed_ptxt->auth_cred.x509_hash.cert_fp_len =
|
|
840
|
-
cose_x509->COSE_CertHash_hashValue.len;
|
|
841
|
-
|
|
842
|
-
switch (cose_x509->COSE_CertHash_hashAlg_choice) {
|
|
843
|
-
case COSE_CertHash_hashAlg_int_c:
|
|
844
|
-
parsed_ptxt->auth_cred.x509_hash.encode_type =
|
|
845
|
-
EDHOC_ENCODE_TYPE_INTEGER;
|
|
846
|
-
parsed_ptxt->auth_cred.x509_hash.alg_int =
|
|
847
|
-
cose_x509->COSE_CertHash_hashAlg_int;
|
|
848
|
-
break;
|
|
849
|
-
case COSE_CertHash_hashAlg_tstr_c:
|
|
850
|
-
if (ARRAY_SIZE(parsed_ptxt->auth_cred.x509_hash
|
|
851
|
-
.alg_bstr) <
|
|
852
|
-
cose_x509->COSE_CertHash_hashAlg_tstr.len)
|
|
853
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
854
|
-
|
|
855
|
-
parsed_ptxt->auth_cred.x509_hash.encode_type =
|
|
856
|
-
EDHOC_ENCODE_TYPE_BYTE_STRING;
|
|
857
|
-
parsed_ptxt->auth_cred.x509_hash
|
|
858
|
-
.alg_bstr_length =
|
|
859
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
860
|
-
.len;
|
|
861
|
-
memcpy(parsed_ptxt->auth_cred.x509_hash.alg_bstr,
|
|
862
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
863
|
-
.value,
|
|
864
|
-
cose_x509->COSE_CertHash_hashAlg_tstr
|
|
865
|
-
.len);
|
|
866
|
-
break;
|
|
867
|
-
default:
|
|
868
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
869
|
-
}
|
|
870
|
-
|
|
871
|
-
break;
|
|
872
|
-
}
|
|
873
|
-
}
|
|
874
|
-
}
|
|
875
|
-
|
|
876
|
-
/* Sign_or_MAC_3 */
|
|
877
|
-
parsed_ptxt->sign_or_mac =
|
|
878
|
-
cbor_ptxt_3.plaintext_3_Signature_or_MAC_3.value;
|
|
879
|
-
parsed_ptxt->sign_or_mac_len =
|
|
880
|
-
cbor_ptxt_3.plaintext_3_Signature_or_MAC_3.len;
|
|
881
|
-
|
|
882
|
-
/* EAD_3 if present */
|
|
883
|
-
if (cbor_ptxt_3.plaintext_3_EAD_3_m_present) {
|
|
884
|
-
ctx->nr_of_ead_tokens =
|
|
885
|
-
cbor_ptxt_3.plaintext_3_EAD_3_m.EAD_3_count;
|
|
886
|
-
|
|
887
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
888
|
-
ctx->ead_token[i].label =
|
|
889
|
-
cbor_ptxt_3.plaintext_3_EAD_3_m.EAD_3[i]
|
|
890
|
-
.ead_y_ead_label;
|
|
891
|
-
ctx->ead_token[i].value =
|
|
892
|
-
cbor_ptxt_3.plaintext_3_EAD_3_m.EAD_3[i]
|
|
893
|
-
.ead_y_ead_value.value;
|
|
894
|
-
ctx->ead_token[i].value_len =
|
|
895
|
-
cbor_ptxt_3.plaintext_3_EAD_3_m.EAD_3[i]
|
|
896
|
-
.ead_y_ead_value.len;
|
|
897
|
-
}
|
|
898
|
-
}
|
|
899
|
-
|
|
900
|
-
return EDHOC_SUCCESS;
|
|
901
|
-
}
|
|
902
|
-
|
|
903
|
-
static int comp_salt_4e3m(const struct edhoc_context *ctx, uint8_t *salt,
|
|
904
|
-
size_t salt_len)
|
|
905
|
-
{
|
|
906
|
-
if (NULL == ctx || NULL == salt || 0 == salt_len)
|
|
907
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
908
|
-
|
|
909
|
-
if (EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
910
|
-
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
911
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
912
|
-
|
|
913
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
914
|
-
const size_t hash_len = ctx->csuite[ctx->chosen_csuite_idx].hash_length;
|
|
915
|
-
|
|
916
|
-
const struct info input_info = {
|
|
917
|
-
.info_label = EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_4E3M,
|
|
918
|
-
.info_context.value = ctx->th,
|
|
919
|
-
.info_context.len = ctx->th_len,
|
|
920
|
-
.info_length = (uint32_t)hash_len,
|
|
921
|
-
};
|
|
922
|
-
|
|
923
|
-
size_t len = 0;
|
|
924
|
-
len += edhoc_cbor_int_mem_req(EDHOC_EXTRACT_PRK_INFO_LABEL_SALT_4E3M);
|
|
925
|
-
len += ctx->th_len + edhoc_cbor_bstr_oh(ctx->th_len);
|
|
926
|
-
len += edhoc_cbor_int_mem_req((int32_t)hash_len);
|
|
927
|
-
|
|
928
|
-
VLA_ALLOC(uint8_t, info, len);
|
|
929
|
-
memset(info, 0, VLA_SIZEOF(info));
|
|
930
|
-
|
|
931
|
-
len = 0;
|
|
932
|
-
ret = cbor_encode_info(info, VLA_SIZE(info), &input_info, &len);
|
|
933
|
-
|
|
934
|
-
if (ZCBOR_SUCCESS != ret || VLA_SIZE(info) != len)
|
|
935
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
936
|
-
|
|
937
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
938
|
-
ret = ctx->keys.import_key(ctx->user_ctx, EDHOC_KT_EXPAND, ctx->prk,
|
|
939
|
-
ctx->prk_len, key_id);
|
|
940
|
-
|
|
941
|
-
if (EDHOC_SUCCESS != ret)
|
|
942
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
943
|
-
|
|
944
|
-
ret = ctx->crypto.expand(ctx->user_ctx, key_id, info, VLA_SIZE(info),
|
|
945
|
-
salt, salt_len);
|
|
946
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
947
|
-
|
|
948
|
-
if (EDHOC_SUCCESS != ret)
|
|
949
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
950
|
-
|
|
951
|
-
return EDHOC_SUCCESS;
|
|
952
|
-
}
|
|
953
|
-
|
|
954
|
-
static int comp_giy(struct edhoc_context *ctx,
|
|
955
|
-
const struct edhoc_auth_creds *auth_cred,
|
|
956
|
-
const uint8_t *pub_key, size_t pub_key_len, uint8_t *giy,
|
|
957
|
-
size_t giy_len)
|
|
958
|
-
{
|
|
959
|
-
if (NULL == ctx || NULL == auth_cred || NULL == giy || 0 == giy_len)
|
|
960
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
961
|
-
|
|
962
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
963
|
-
|
|
964
|
-
switch (ctx->role) {
|
|
965
|
-
case EDHOC_INITIATOR: {
|
|
966
|
-
size_t secret_len = 0;
|
|
967
|
-
ret = ctx->crypto.key_agreement(ctx->user_ctx,
|
|
968
|
-
auth_cred->priv_key_id,
|
|
969
|
-
ctx->dh_peer_pub_key,
|
|
970
|
-
ctx->dh_peer_pub_key_len, giy,
|
|
971
|
-
giy_len, &secret_len);
|
|
972
|
-
|
|
973
|
-
if (EDHOC_SUCCESS != ret || secret_len != giy_len)
|
|
974
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
975
|
-
|
|
976
|
-
return EDHOC_SUCCESS;
|
|
977
|
-
}
|
|
978
|
-
|
|
979
|
-
case EDHOC_RESPONDER: {
|
|
980
|
-
uint8_t key_id[CONFIG_LIBEDHOC_KEY_ID_LEN] = { 0 };
|
|
981
|
-
ret = ctx->keys.import_key(ctx->user_ctx,
|
|
982
|
-
EDHOC_KT_KEY_AGREEMENT,
|
|
983
|
-
ctx->dh_priv_key,
|
|
984
|
-
ctx->dh_priv_key_len, key_id);
|
|
985
|
-
ctx->dh_priv_key_len = 0;
|
|
986
|
-
memset(ctx->dh_priv_key, 0, ARRAY_SIZE(ctx->dh_priv_key));
|
|
987
|
-
|
|
988
|
-
if (EDHOC_SUCCESS != ret)
|
|
989
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
990
|
-
|
|
991
|
-
size_t secret_len = 0;
|
|
992
|
-
ret = ctx->crypto.key_agreement(ctx->user_ctx, key_id, pub_key,
|
|
993
|
-
pub_key_len, giy, giy_len,
|
|
994
|
-
&secret_len);
|
|
995
|
-
|
|
996
|
-
ctx->keys.destroy_key(ctx->user_ctx, key_id);
|
|
997
|
-
memset(key_id, 0, sizeof(key_id));
|
|
998
|
-
|
|
999
|
-
if (EDHOC_SUCCESS != ret || secret_len != giy_len)
|
|
1000
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1001
|
-
|
|
1002
|
-
return EDHOC_SUCCESS;
|
|
1003
|
-
}
|
|
1004
|
-
|
|
1005
|
-
default:
|
|
1006
|
-
return EDHOC_ERROR_NOT_PERMITTED;
|
|
1007
|
-
}
|
|
1008
|
-
|
|
1009
|
-
return EDHOC_ERROR_PSEUDORANDOM_KEY_FAILURE;
|
|
1010
|
-
}
|
|
1011
|
-
|
|
1012
|
-
/* Module interface function definitions ----------------------------------- */
|
|
1013
|
-
|
|
1014
|
-
/**
|
|
1015
|
-
* Steps for composition of message 3:
|
|
1016
|
-
* 1. Choose most preferred cipher suite.
|
|
1017
|
-
* 2. Compose EAD_3 if present.
|
|
1018
|
-
* 3. Fetch authentication credentials.
|
|
1019
|
-
* 4. Compute K_3, IV_3 and AAD_3.
|
|
1020
|
-
* 5. Compute PRK_4e3m.
|
|
1021
|
-
* 6a. Compute required buffer length for context_3.
|
|
1022
|
-
* 6b. Cborise items required by context_3.
|
|
1023
|
-
* 6c. Compute Message Authentication Code (MAC_3).
|
|
1024
|
-
* 7. Compute signature if needed (Signature_or_MAC_3).
|
|
1025
|
-
* 8. Prepare plaintext (PLAINTEXT_3).
|
|
1026
|
-
* 9. Compute ciphertext.
|
|
1027
|
-
* 10. Compute transcript hash 4.
|
|
1028
|
-
* 11. Generate edhoc message 3.
|
|
1029
|
-
* 12. Clean-up EAD tokens.
|
|
1030
|
-
*/
|
|
1031
|
-
int edhoc_message_3_compose(struct edhoc_context *ctx, uint8_t *msg_3,
|
|
1032
|
-
size_t msg_3_size, size_t *msg_3_len)
|
|
1033
|
-
{
|
|
1034
|
-
if (NULL == ctx || NULL == msg_3 || 0 == msg_3_size ||
|
|
1035
|
-
NULL == msg_3_len)
|
|
1036
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1037
|
-
|
|
1038
|
-
if (EDHOC_SM_VERIFIED_M2 != ctx->status ||
|
|
1039
|
-
EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
1040
|
-
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
1041
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1042
|
-
|
|
1043
|
-
ctx->status = EDHOC_SM_ABORTED;
|
|
1044
|
-
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
1045
|
-
ctx->message = EDHOC_MSG_3;
|
|
1046
|
-
ctx->role = EDHOC_INITIATOR;
|
|
1047
|
-
|
|
1048
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1049
|
-
|
|
1050
|
-
/* 1. Choose most preferred cipher suite. */
|
|
1051
|
-
const struct edhoc_cipher_suite csuite =
|
|
1052
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
1053
|
-
|
|
1054
|
-
/* 2. Compose EAD_3 if present. */
|
|
1055
|
-
if (NULL != ctx->ead.compose && 0 != ARRAY_SIZE(ctx->ead_token) - 1) {
|
|
1056
|
-
ret = ctx->ead.compose(ctx->user_ctx, ctx->message,
|
|
1057
|
-
ctx->ead_token,
|
|
1058
|
-
ARRAY_SIZE(ctx->ead_token) - 1,
|
|
1059
|
-
&ctx->nr_of_ead_tokens);
|
|
1060
|
-
|
|
1061
|
-
if (EDHOC_SUCCESS != ret ||
|
|
1062
|
-
ARRAY_SIZE(ctx->ead_token) - 1 < ctx->nr_of_ead_tokens)
|
|
1063
|
-
return EDHOC_ERROR_EAD_COMPOSE_FAILURE;
|
|
1064
|
-
|
|
1065
|
-
if (NULL != ctx->logger) {
|
|
1066
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1067
|
-
ctx->logger(ctx->user_ctx,
|
|
1068
|
-
"EAD_3 compose label",
|
|
1069
|
-
(const uint8_t *)&ctx->ead_token[i]
|
|
1070
|
-
.label,
|
|
1071
|
-
sizeof(ctx->ead_token[i].label));
|
|
1072
|
-
|
|
1073
|
-
if (0 != ctx->ead_token[i].value_len)
|
|
1074
|
-
ctx->logger(
|
|
1075
|
-
ctx->user_ctx,
|
|
1076
|
-
"EAD_3 compose value",
|
|
1077
|
-
ctx->ead_token[i].value,
|
|
1078
|
-
ctx->ead_token[i].value_len);
|
|
1079
|
-
}
|
|
1080
|
-
}
|
|
1081
|
-
}
|
|
1082
|
-
|
|
1083
|
-
/* 3. Fetch authentication credentials. */
|
|
1084
|
-
struct edhoc_auth_creds auth_creds = { 0 };
|
|
1085
|
-
ret = ctx->cred.fetch(ctx->user_ctx, &auth_creds);
|
|
1086
|
-
|
|
1087
|
-
if (EDHOC_SUCCESS != ret)
|
|
1088
|
-
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1089
|
-
|
|
1090
|
-
/* 4. Compute K_3, IV_3 and AAD_3. */
|
|
1091
|
-
VLA_ALLOC(uint8_t, key, csuite.aead_key_length);
|
|
1092
|
-
memset(key, 0, VLA_SIZEOF(key));
|
|
1093
|
-
|
|
1094
|
-
VLA_ALLOC(uint8_t, iv, csuite.aead_iv_length);
|
|
1095
|
-
memset(iv, 0, VLA_SIZEOF(iv));
|
|
1096
|
-
|
|
1097
|
-
size_t aad_len = 0;
|
|
1098
|
-
ret = comp_aad_3_len(ctx, &aad_len);
|
|
1099
|
-
|
|
1100
|
-
if (EDHOC_SUCCESS != ret)
|
|
1101
|
-
return ret;
|
|
1102
|
-
|
|
1103
|
-
VLA_ALLOC(uint8_t, aad, aad_len);
|
|
1104
|
-
memset(aad, 0, VLA_SIZEOF(aad));
|
|
1105
|
-
|
|
1106
|
-
ret = comp_key_iv_aad(ctx, key, VLA_SIZE(key), iv, VLA_SIZE(iv), aad,
|
|
1107
|
-
VLA_SIZE(aad));
|
|
1108
|
-
|
|
1109
|
-
if (EDHOC_SUCCESS != ret)
|
|
1110
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1111
|
-
|
|
1112
|
-
if (NULL != ctx->logger) {
|
|
1113
|
-
ctx->logger(ctx->user_ctx, "K_3", key, VLA_SIZE(key));
|
|
1114
|
-
ctx->logger(ctx->user_ctx, "IV_3", iv, VLA_SIZE(iv));
|
|
1115
|
-
ctx->logger(ctx->user_ctx, "AAD_3", aad, VLA_SIZE(aad));
|
|
1116
|
-
}
|
|
1117
|
-
|
|
1118
|
-
/* 5. Compute PRK_4e3m. */
|
|
1119
|
-
ret = comp_prk_4e3m(ctx, &auth_creds, NULL, 0);
|
|
1120
|
-
|
|
1121
|
-
if (EDHOC_SUCCESS != ret)
|
|
1122
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1123
|
-
|
|
1124
|
-
if (NULL != ctx->logger)
|
|
1125
|
-
ctx->logger(ctx->user_ctx, "PRK_4e3m", ctx->prk, ctx->prk_len);
|
|
1126
|
-
|
|
1127
|
-
size_t mac_context_length = 0;
|
|
1128
|
-
ret = edhoc_comp_mac_context_length(ctx, &auth_creds,
|
|
1129
|
-
&mac_context_length);
|
|
1130
|
-
|
|
1131
|
-
if (EDHOC_SUCCESS != ret)
|
|
1132
|
-
return ret;
|
|
1133
|
-
|
|
1134
|
-
/* 6b. Cborise items required by context_3. */
|
|
1135
|
-
VLA_ALLOC(uint8_t, mac_3_context_buf,
|
|
1136
|
-
sizeof(struct mac_context) + mac_context_length);
|
|
1137
|
-
memset(mac_3_context_buf, 0, VLA_SIZEOF(mac_3_context_buf));
|
|
1138
|
-
|
|
1139
|
-
struct mac_context *mac_context = (void *)mac_3_context_buf;
|
|
1140
|
-
mac_context->buf_len = mac_context_length;
|
|
1141
|
-
|
|
1142
|
-
ret = edhoc_comp_mac_context(ctx, &auth_creds, mac_context);
|
|
1143
|
-
if (EDHOC_SUCCESS != ret)
|
|
1144
|
-
return ret;
|
|
1145
|
-
|
|
1146
|
-
if (NULL != ctx->logger) {
|
|
1147
|
-
ctx->logger(ctx->user_ctx, "ID_CRED_I", mac_context->id_cred,
|
|
1148
|
-
mac_context->id_cred_len);
|
|
1149
|
-
ctx->logger(ctx->user_ctx, "TH_3", mac_context->th,
|
|
1150
|
-
mac_context->th_len);
|
|
1151
|
-
ctx->logger(ctx->user_ctx, "CRED_I", mac_context->cred,
|
|
1152
|
-
mac_context->cred_len);
|
|
1153
|
-
ctx->logger(ctx->user_ctx, "context_3", mac_context->buf,
|
|
1154
|
-
mac_context->buf_len);
|
|
1155
|
-
}
|
|
1156
|
-
|
|
1157
|
-
/* 6c. Compute Message Authentication Code (MAC_3). */
|
|
1158
|
-
size_t mac_length = 0;
|
|
1159
|
-
ret = edhoc_comp_mac_length(ctx, &mac_length);
|
|
1160
|
-
if (EDHOC_SUCCESS != ret)
|
|
1161
|
-
return EDHOC_ERROR_INVALID_MAC_3;
|
|
1162
|
-
|
|
1163
|
-
VLA_ALLOC(uint8_t, mac_buf, mac_length);
|
|
1164
|
-
memset(mac_buf, 0, VLA_SIZEOF(mac_buf));
|
|
1165
|
-
ret = edhoc_comp_mac(ctx, mac_context, mac_buf, mac_length);
|
|
1166
|
-
if (EDHOC_SUCCESS != ret)
|
|
1167
|
-
return EDHOC_ERROR_INVALID_MAC_3;
|
|
1168
|
-
|
|
1169
|
-
/* 7. Compute signature if needed (Signature_or_MAC_3). */
|
|
1170
|
-
size_t sign_or_mac_length = 0;
|
|
1171
|
-
ret = edhoc_comp_sign_or_mac_length(ctx, &sign_or_mac_length);
|
|
1172
|
-
if (EDHOC_SUCCESS != ret)
|
|
1173
|
-
return ret;
|
|
1174
|
-
|
|
1175
|
-
size_t signature_length = 0;
|
|
1176
|
-
VLA_ALLOC(uint8_t, signature, sign_or_mac_length);
|
|
1177
|
-
memset(signature, 0, VLA_SIZEOF(signature));
|
|
1178
|
-
ret = edhoc_comp_sign_or_mac(ctx, &auth_creds, mac_context, mac_buf,
|
|
1179
|
-
mac_length, signature, VLA_SIZE(signature),
|
|
1180
|
-
&signature_length);
|
|
1181
|
-
if (EDHOC_SUCCESS != ret)
|
|
1182
|
-
return ret;
|
|
1183
|
-
|
|
1184
|
-
if (NULL != ctx->logger)
|
|
1185
|
-
ctx->logger(ctx->user_ctx, "Signature_or_MAC_3", signature,
|
|
1186
|
-
signature_length);
|
|
1187
|
-
|
|
1188
|
-
/* 8. Prepare plaintext (PLAINTEXT_3). */
|
|
1189
|
-
size_t plaintext_len = 0;
|
|
1190
|
-
ret = comp_plaintext_3_len(ctx, mac_context, signature_length,
|
|
1191
|
-
&plaintext_len);
|
|
1192
|
-
|
|
1193
|
-
if (EDHOC_SUCCESS != ret)
|
|
1194
|
-
return ret;
|
|
1195
|
-
|
|
1196
|
-
VLA_ALLOC(uint8_t, plaintext, plaintext_len);
|
|
1197
|
-
memset(plaintext, 0, VLA_SIZEOF(plaintext));
|
|
1198
|
-
|
|
1199
|
-
plaintext_len = 0;
|
|
1200
|
-
ret = prepare_plaintext_3(mac_context, signature, signature_length,
|
|
1201
|
-
plaintext, VLA_SIZE(plaintext),
|
|
1202
|
-
&plaintext_len);
|
|
1203
|
-
|
|
1204
|
-
if (EDHOC_SUCCESS != ret)
|
|
1205
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1206
|
-
|
|
1207
|
-
if (NULL != ctx->logger)
|
|
1208
|
-
ctx->logger(ctx->user_ctx, "PLAINTEXT_3", plaintext,
|
|
1209
|
-
plaintext_len);
|
|
1210
|
-
|
|
1211
|
-
/* 9. Compute ciphertext. */
|
|
1212
|
-
size_t ciphertext_len = 0;
|
|
1213
|
-
VLA_ALLOC(uint8_t, ciphertext, plaintext_len + csuite.aead_tag_length);
|
|
1214
|
-
memset(ciphertext, 0, VLA_SIZEOF(ciphertext));
|
|
1215
|
-
|
|
1216
|
-
ret = comp_ciphertext(ctx, key, VLA_SIZE(key), iv, VLA_SIZE(iv), aad,
|
|
1217
|
-
VLA_SIZE(aad), plaintext, plaintext_len,
|
|
1218
|
-
ciphertext, VLA_SIZE(ciphertext),
|
|
1219
|
-
&ciphertext_len);
|
|
1220
|
-
|
|
1221
|
-
if (EDHOC_SUCCESS != ret)
|
|
1222
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1223
|
-
|
|
1224
|
-
if (NULL != ctx->logger)
|
|
1225
|
-
ctx->logger(ctx->user_ctx, "CIPHERTEXT_3", ciphertext,
|
|
1226
|
-
ciphertext_len);
|
|
1227
|
-
|
|
1228
|
-
/* 10. Compute transcript hash 4. */
|
|
1229
|
-
ret = comp_th_4(ctx, mac_context, plaintext, plaintext_len);
|
|
1230
|
-
|
|
1231
|
-
if (EDHOC_SUCCESS != ret)
|
|
1232
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1233
|
-
|
|
1234
|
-
if (NULL != ctx->logger)
|
|
1235
|
-
ctx->logger(ctx->user_ctx, "TH_4", ctx->th, ctx->th_len);
|
|
1236
|
-
|
|
1237
|
-
/* 11. Generate edhoc message 3. */
|
|
1238
|
-
ret = gen_msg_3(ciphertext, ciphertext_len, msg_3, msg_3_size,
|
|
1239
|
-
msg_3_len);
|
|
1240
|
-
|
|
1241
|
-
if (EDHOC_SUCCESS != ret)
|
|
1242
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1243
|
-
|
|
1244
|
-
if (NULL != ctx->logger)
|
|
1245
|
-
ctx->logger(ctx->user_ctx, "message_3", msg_3, *msg_3_len);
|
|
1246
|
-
|
|
1247
|
-
/* 12. Clean-up EAD tokens. */
|
|
1248
|
-
ctx->nr_of_ead_tokens = 0;
|
|
1249
|
-
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
1250
|
-
|
|
1251
|
-
ctx->is_oscore_export_allowed = true;
|
|
1252
|
-
ctx->status = EDHOC_SM_COMPLETED;
|
|
1253
|
-
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
1254
|
-
return EDHOC_SUCCESS;
|
|
1255
|
-
}
|
|
1256
|
-
|
|
1257
|
-
/**
|
|
1258
|
-
* Steps for processing of message 3:
|
|
1259
|
-
* 1. Choose most preferred cipher suite.
|
|
1260
|
-
* 2. CBOR decode message 3.
|
|
1261
|
-
* 3. Compute K_3, IV_3 and AAD_3.
|
|
1262
|
-
* 4. Decrypt ciphertext.
|
|
1263
|
-
* 5. Parse CBOR plaintext (PLAINTEXT_3).
|
|
1264
|
-
* 6. Process EAD_3 if present.
|
|
1265
|
-
* 7. Verify if credentials from peer are trusted.
|
|
1266
|
-
* 8. Compute PRK_4e3m.
|
|
1267
|
-
* 9a. Compute required buffer length for context_3.
|
|
1268
|
-
* 9b. Cborise items required by context_3.
|
|
1269
|
-
* 9c. Compute Message Authentication Code (MAC_3).
|
|
1270
|
-
* 10. Verify Signature_or_MAC_3.
|
|
1271
|
-
* 11. Compute transcript hash 4.
|
|
1272
|
-
* 12. Clean-up EAD tokens.
|
|
1273
|
-
*/
|
|
1274
|
-
int edhoc_message_3_process(struct edhoc_context *ctx, const uint8_t *msg_3,
|
|
1275
|
-
size_t msg_3_len)
|
|
1276
|
-
{
|
|
1277
|
-
if (NULL == ctx || NULL == msg_3 || 0 == msg_3_len)
|
|
1278
|
-
return EDHOC_ERROR_INVALID_ARGUMENT;
|
|
1279
|
-
|
|
1280
|
-
if (EDHOC_SM_WAIT_M3 != ctx->status ||
|
|
1281
|
-
EDHOC_TH_STATE_3 != ctx->th_state ||
|
|
1282
|
-
EDHOC_PRK_STATE_3E2M != ctx->prk_state)
|
|
1283
|
-
return EDHOC_ERROR_BAD_STATE;
|
|
1284
|
-
|
|
1285
|
-
ctx->status = EDHOC_SM_ABORTED;
|
|
1286
|
-
ctx->error_code = EDHOC_ERROR_CODE_UNSPECIFIED_ERROR;
|
|
1287
|
-
ctx->message = EDHOC_MSG_3;
|
|
1288
|
-
ctx->role = EDHOC_RESPONDER;
|
|
1289
|
-
|
|
1290
|
-
int ret = EDHOC_ERROR_GENERIC_ERROR;
|
|
1291
|
-
|
|
1292
|
-
/* 1. Choose most preferred cipher suite. */
|
|
1293
|
-
const struct edhoc_cipher_suite csuite =
|
|
1294
|
-
ctx->csuite[ctx->chosen_csuite_idx];
|
|
1295
|
-
|
|
1296
|
-
/* 2. CBOR decode message 3. */
|
|
1297
|
-
const uint8_t *ctxt = NULL;
|
|
1298
|
-
size_t ctxt_len = 0;
|
|
1299
|
-
|
|
1300
|
-
ret = parse_msg_3(msg_3, msg_3_len, &ctxt, &ctxt_len);
|
|
1301
|
-
|
|
1302
|
-
if (EDHOC_SUCCESS != ret)
|
|
1303
|
-
return EDHOC_ERROR_MSG_3_PROCESS_FAILURE;
|
|
1304
|
-
|
|
1305
|
-
/* 3. Compute K_3, IV_3 and AAD_3. */
|
|
1306
|
-
VLA_ALLOC(uint8_t, key, csuite.aead_key_length);
|
|
1307
|
-
memset(key, 0, VLA_SIZEOF(key));
|
|
1308
|
-
|
|
1309
|
-
VLA_ALLOC(uint8_t, iv, csuite.aead_iv_length);
|
|
1310
|
-
memset(iv, 0, VLA_SIZEOF(iv));
|
|
1311
|
-
|
|
1312
|
-
size_t aad_len = 0;
|
|
1313
|
-
ret = comp_aad_3_len(ctx, &aad_len);
|
|
1314
|
-
|
|
1315
|
-
if (EDHOC_SUCCESS != ret)
|
|
1316
|
-
return EDHOC_ERROR_BUFFER_TOO_SMALL;
|
|
1317
|
-
|
|
1318
|
-
VLA_ALLOC(uint8_t, aad, aad_len);
|
|
1319
|
-
memset(aad, 0, VLA_SIZEOF(aad));
|
|
1320
|
-
|
|
1321
|
-
ret = comp_key_iv_aad(ctx, key, VLA_SIZE(key), iv, VLA_SIZE(iv), aad,
|
|
1322
|
-
VLA_SIZE(aad));
|
|
1323
|
-
|
|
1324
|
-
if (EDHOC_SUCCESS != ret)
|
|
1325
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1326
|
-
|
|
1327
|
-
if (NULL != ctx->logger) {
|
|
1328
|
-
ctx->logger(ctx->user_ctx, "K_3", key, VLA_SIZE(key));
|
|
1329
|
-
ctx->logger(ctx->user_ctx, "IV_3", iv, VLA_SIZE(iv));
|
|
1330
|
-
ctx->logger(ctx->user_ctx, "AAD_3", aad, VLA_SIZE(aad));
|
|
1331
|
-
}
|
|
1332
|
-
|
|
1333
|
-
/* 4. Decrypt ciphertext. */
|
|
1334
|
-
VLA_ALLOC(uint8_t, ptxt, ctxt_len - csuite.aead_tag_length);
|
|
1335
|
-
memset(ptxt, 0, VLA_SIZEOF(ptxt));
|
|
1336
|
-
|
|
1337
|
-
ret = decrypt_ciphertext(ctx, key, VLA_SIZE(key), iv, VLA_SIZE(iv), aad,
|
|
1338
|
-
VLA_SIZE(aad), ctxt, ctxt_len, ptxt,
|
|
1339
|
-
VLA_SIZE(ptxt));
|
|
1340
|
-
|
|
1341
|
-
if (EDHOC_SUCCESS != ret)
|
|
1342
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1343
|
-
|
|
1344
|
-
if (NULL != ctx->logger)
|
|
1345
|
-
ctx->logger(ctx->user_ctx, "PLAINTEXT_3", ptxt, VLA_SIZE(ptxt));
|
|
1346
|
-
|
|
1347
|
-
/* 5. Parse CBOR plaintext (PLAINTEXT_3). */
|
|
1348
|
-
struct plaintext parsed_ptxt = { 0 };
|
|
1349
|
-
ret = parse_plaintext(ctx, ptxt, VLA_SIZE(ptxt), &parsed_ptxt);
|
|
1350
|
-
|
|
1351
|
-
if (EDHOC_SUCCESS != ret)
|
|
1352
|
-
return EDHOC_ERROR_CBOR_FAILURE;
|
|
1353
|
-
|
|
1354
|
-
/* 6. Process EAD_3 if present. */
|
|
1355
|
-
if (NULL != ctx->ead.process && 0 != ARRAY_SIZE(ctx->ead_token) - 1 &&
|
|
1356
|
-
0 != ctx->nr_of_ead_tokens) {
|
|
1357
|
-
ret = ctx->ead.process(ctx->user_ctx, ctx->message,
|
|
1358
|
-
ctx->ead_token, ctx->nr_of_ead_tokens);
|
|
1359
|
-
|
|
1360
|
-
if (EDHOC_SUCCESS != ret)
|
|
1361
|
-
return EDHOC_ERROR_EAD_PROCESS_FAILURE;
|
|
1362
|
-
|
|
1363
|
-
if (NULL != ctx->logger) {
|
|
1364
|
-
for (size_t i = 0; i < ctx->nr_of_ead_tokens; ++i) {
|
|
1365
|
-
ctx->logger(ctx->user_ctx,
|
|
1366
|
-
"EAD_3 process label",
|
|
1367
|
-
(const uint8_t *)&ctx->ead_token[i]
|
|
1368
|
-
.label,
|
|
1369
|
-
sizeof(ctx->ead_token[i].label));
|
|
1370
|
-
|
|
1371
|
-
if (0 != ctx->ead_token[i].value_len)
|
|
1372
|
-
ctx->logger(
|
|
1373
|
-
ctx->user_ctx,
|
|
1374
|
-
"EAD_3 process value",
|
|
1375
|
-
ctx->ead_token[i].value,
|
|
1376
|
-
ctx->ead_token[i].value_len);
|
|
1377
|
-
}
|
|
1378
|
-
}
|
|
1379
|
-
}
|
|
1380
|
-
|
|
1381
|
-
/* 7. Verify if credentials from peer are trusted. */
|
|
1382
|
-
const uint8_t *pub_key = NULL;
|
|
1383
|
-
size_t pub_key_len = 0;
|
|
1384
|
-
ret = ctx->cred.verify(ctx->user_ctx, &parsed_ptxt.auth_cred, &pub_key,
|
|
1385
|
-
&pub_key_len);
|
|
1386
|
-
|
|
1387
|
-
if (EDHOC_SUCCESS != ret) {
|
|
1388
|
-
ctx->error_code =
|
|
1389
|
-
EDHOC_ERROR_CODE_UNKNOWN_CREDENTIAL_REFERENCED;
|
|
1390
|
-
return EDHOC_ERROR_CREDENTIALS_FAILURE;
|
|
1391
|
-
}
|
|
1392
|
-
|
|
1393
|
-
/* 8. Compute PRK_4e3m. */
|
|
1394
|
-
ret = comp_prk_4e3m(ctx, &parsed_ptxt.auth_cred, pub_key, pub_key_len);
|
|
1395
|
-
|
|
1396
|
-
if (EDHOC_SUCCESS != ret)
|
|
1397
|
-
return EDHOC_ERROR_CRYPTO_FAILURE;
|
|
1398
|
-
|
|
1399
|
-
/* 9a. Compute required buffer length for context_3. */
|
|
1400
|
-
size_t mac_context_len = 0;
|
|
1401
|
-
ret = edhoc_comp_mac_context_length(ctx, &parsed_ptxt.auth_cred,
|
|
1402
|
-
&mac_context_len);
|
|
1403
|
-
|
|
1404
|
-
if (EDHOC_SUCCESS != ret)
|
|
1405
|
-
return EDHOC_ERROR_INVALID_MAC_3;
|
|
1406
|
-
|
|
1407
|
-
/* 9b. Cborise items required by context_3. */
|
|
1408
|
-
VLA_ALLOC(uint8_t, mac_3_context_buf,
|
|
1409
|
-
sizeof(struct mac_context) + mac_context_len);
|
|
1410
|
-
memset(mac_3_context_buf, 0, VLA_SIZEOF(mac_3_context_buf));
|
|
1411
|
-
|
|
1412
|
-
struct mac_context *mac_context = (void *)mac_3_context_buf;
|
|
1413
|
-
mac_context->buf_len = mac_context_len;
|
|
1414
|
-
|
|
1415
|
-
ret = edhoc_comp_mac_context(ctx, &parsed_ptxt.auth_cred, mac_context);
|
|
1416
|
-
if (EDHOC_SUCCESS != ret)
|
|
1417
|
-
return ret;
|
|
1418
|
-
|
|
1419
|
-
if (NULL != ctx->logger) {
|
|
1420
|
-
ctx->logger(ctx->user_ctx, "C_I", mac_context->conn_id,
|
|
1421
|
-
mac_context->conn_id_len);
|
|
1422
|
-
ctx->logger(ctx->user_ctx, "ID_CRED_I", mac_context->id_cred,
|
|
1423
|
-
mac_context->id_cred_len);
|
|
1424
|
-
ctx->logger(ctx->user_ctx, "TH_3", mac_context->th,
|
|
1425
|
-
mac_context->th_len);
|
|
1426
|
-
ctx->logger(ctx->user_ctx, "CRED_I", mac_context->cred,
|
|
1427
|
-
mac_context->cred_len);
|
|
1428
|
-
ctx->logger(ctx->user_ctx, "context_3", mac_context->buf,
|
|
1429
|
-
mac_context->buf_len);
|
|
1430
|
-
}
|
|
1431
|
-
|
|
1432
|
-
/* 9c. Compute Message Authentication Code (MAC_3). */
|
|
1433
|
-
size_t mac_length = 0;
|
|
1434
|
-
ret = edhoc_comp_mac_length(ctx, &mac_length);
|
|
1435
|
-
if (EDHOC_SUCCESS != ret)
|
|
1436
|
-
return EDHOC_ERROR_INVALID_MAC_3;
|
|
1437
|
-
|
|
1438
|
-
VLA_ALLOC(uint8_t, mac_buf, mac_length);
|
|
1439
|
-
memset(mac_buf, 0, VLA_SIZEOF(mac_buf));
|
|
1440
|
-
ret = edhoc_comp_mac(ctx, mac_context, mac_buf, mac_length);
|
|
1441
|
-
if (EDHOC_SUCCESS != ret)
|
|
1442
|
-
return EDHOC_ERROR_INVALID_MAC_3;
|
|
1443
|
-
|
|
1444
|
-
/* 10. Verify Signature_or_MAC_3. */
|
|
1445
|
-
ret = edhoc_verify_sign_or_mac(ctx, mac_context, pub_key, pub_key_len,
|
|
1446
|
-
parsed_ptxt.sign_or_mac,
|
|
1447
|
-
parsed_ptxt.sign_or_mac_len, mac_buf,
|
|
1448
|
-
mac_length);
|
|
1449
|
-
|
|
1450
|
-
if (EDHOC_SUCCESS != ret)
|
|
1451
|
-
return EDHOC_ERROR_INVALID_SIGN_OR_MAC_2;
|
|
1452
|
-
|
|
1453
|
-
/* 11. Compute transcript hash 4. */
|
|
1454
|
-
ret = comp_th_4(ctx, mac_context, ptxt, VLA_SIZE(ptxt));
|
|
1455
|
-
|
|
1456
|
-
if (EDHOC_SUCCESS != ret)
|
|
1457
|
-
return EDHOC_ERROR_TRANSCRIPT_HASH_FAILURE;
|
|
1458
|
-
|
|
1459
|
-
/* 12. Clean-up EAD tokens. */
|
|
1460
|
-
ctx->nr_of_ead_tokens = 0;
|
|
1461
|
-
memset(ctx->ead_token, 0, sizeof(ctx->ead_token));
|
|
1462
|
-
|
|
1463
|
-
ctx->is_oscore_export_allowed = true;
|
|
1464
|
-
ctx->status = EDHOC_SM_COMPLETED;
|
|
1465
|
-
ctx->error_code = EDHOC_ERROR_CODE_SUCCESS;
|
|
1466
|
-
return EDHOC_SUCCESS;
|
|
1467
|
-
}
|