The WDCInterface is is a drop-in replacement for an EthernetInterface class that allows the user to connect to the Internet with a Wistron NeWeb Corporation (WNC) M14A2A Series data module using the standard network Socket API's. This interface class is used in the AT&T Cellular IoT Starter Kit which is sold by Avnet (http://cloudconnectkits.org/product/att-cellular-iot-starter-kit).

Dependencies:   WncControllerK64F

Dependents:   WNCProximityMqtt Pubnub_ATT_IoT_SK_WNC_sync BluemixDemo BluemixQS ... more

See the WNCInterface README in the Wiki tab for detailed information on this library.

Committer:
JMF
Date:
Fri Mar 24 22:26:23 2017 +0000
Revision:
29:b278b745fb4f
Parent:
12:0071cb144c7a
updated Class name of TCPSocketConnection to WncTCPSocketConnection;

Who changed what in which revision?

UserRevisionLine numberNew contents of line
JMF 12:0071cb144c7a 1 /*
JMF 12:0071cb144c7a 2 * Elliptic curve J-PAKE
JMF 12:0071cb144c7a 3 *
JMF 12:0071cb144c7a 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
JMF 12:0071cb144c7a 5 * SPDX-License-Identifier: Apache-2.0
JMF 12:0071cb144c7a 6 *
JMF 12:0071cb144c7a 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
JMF 12:0071cb144c7a 8 * not use this file except in compliance with the License.
JMF 12:0071cb144c7a 9 * You may obtain a copy of the License at
JMF 12:0071cb144c7a 10 *
JMF 12:0071cb144c7a 11 * http://www.apache.org/licenses/LICENSE-2.0
JMF 12:0071cb144c7a 12 *
JMF 12:0071cb144c7a 13 * Unless required by applicable law or agreed to in writing, software
JMF 12:0071cb144c7a 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
JMF 12:0071cb144c7a 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
JMF 12:0071cb144c7a 16 * See the License for the specific language governing permissions and
JMF 12:0071cb144c7a 17 * limitations under the License.
JMF 12:0071cb144c7a 18 *
JMF 12:0071cb144c7a 19 * This file is part of mbed TLS (https://tls.mbed.org)
JMF 12:0071cb144c7a 20 */
JMF 12:0071cb144c7a 21
JMF 12:0071cb144c7a 22 /*
JMF 12:0071cb144c7a 23 * References in the code are to the Thread v1.0 Specification,
JMF 12:0071cb144c7a 24 * available to members of the Thread Group http://threadgroup.org/
JMF 12:0071cb144c7a 25 */
JMF 12:0071cb144c7a 26
JMF 12:0071cb144c7a 27 #if !defined(MBEDTLS_CONFIG_FILE)
JMF 12:0071cb144c7a 28 #include "mbedtls/config.h"
JMF 12:0071cb144c7a 29 #else
JMF 12:0071cb144c7a 30 #include MBEDTLS_CONFIG_FILE
JMF 12:0071cb144c7a 31 #endif
JMF 12:0071cb144c7a 32
JMF 12:0071cb144c7a 33 #if defined(MBEDTLS_ECJPAKE_C)
JMF 12:0071cb144c7a 34
JMF 12:0071cb144c7a 35 #include "mbedtls/ecjpake.h"
JMF 12:0071cb144c7a 36
JMF 12:0071cb144c7a 37 #include <string.h>
JMF 12:0071cb144c7a 38
JMF 12:0071cb144c7a 39 /*
JMF 12:0071cb144c7a 40 * Convert a mbedtls_ecjpake_role to identifier string
JMF 12:0071cb144c7a 41 */
JMF 12:0071cb144c7a 42 static const char * const ecjpake_id[] = {
JMF 12:0071cb144c7a 43 "client",
JMF 12:0071cb144c7a 44 "server"
JMF 12:0071cb144c7a 45 };
JMF 12:0071cb144c7a 46
JMF 12:0071cb144c7a 47 #define ID_MINE ( ecjpake_id[ ctx->role ] )
JMF 12:0071cb144c7a 48 #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] )
JMF 12:0071cb144c7a 49
JMF 12:0071cb144c7a 50 /*
JMF 12:0071cb144c7a 51 * Initialize context
JMF 12:0071cb144c7a 52 */
JMF 12:0071cb144c7a 53 void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx )
JMF 12:0071cb144c7a 54 {
JMF 12:0071cb144c7a 55 if( ctx == NULL )
JMF 12:0071cb144c7a 56 return;
JMF 12:0071cb144c7a 57
JMF 12:0071cb144c7a 58 ctx->md_info = NULL;
JMF 12:0071cb144c7a 59 mbedtls_ecp_group_init( &ctx->grp );
JMF 12:0071cb144c7a 60 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
JMF 12:0071cb144c7a 61
JMF 12:0071cb144c7a 62 mbedtls_ecp_point_init( &ctx->Xm1 );
JMF 12:0071cb144c7a 63 mbedtls_ecp_point_init( &ctx->Xm2 );
JMF 12:0071cb144c7a 64 mbedtls_ecp_point_init( &ctx->Xp1 );
JMF 12:0071cb144c7a 65 mbedtls_ecp_point_init( &ctx->Xp2 );
JMF 12:0071cb144c7a 66 mbedtls_ecp_point_init( &ctx->Xp );
JMF 12:0071cb144c7a 67
JMF 12:0071cb144c7a 68 mbedtls_mpi_init( &ctx->xm1 );
JMF 12:0071cb144c7a 69 mbedtls_mpi_init( &ctx->xm2 );
JMF 12:0071cb144c7a 70 mbedtls_mpi_init( &ctx->s );
JMF 12:0071cb144c7a 71 }
JMF 12:0071cb144c7a 72
JMF 12:0071cb144c7a 73 /*
JMF 12:0071cb144c7a 74 * Free context
JMF 12:0071cb144c7a 75 */
JMF 12:0071cb144c7a 76 void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx )
JMF 12:0071cb144c7a 77 {
JMF 12:0071cb144c7a 78 if( ctx == NULL )
JMF 12:0071cb144c7a 79 return;
JMF 12:0071cb144c7a 80
JMF 12:0071cb144c7a 81 ctx->md_info = NULL;
JMF 12:0071cb144c7a 82 mbedtls_ecp_group_free( &ctx->grp );
JMF 12:0071cb144c7a 83
JMF 12:0071cb144c7a 84 mbedtls_ecp_point_free( &ctx->Xm1 );
JMF 12:0071cb144c7a 85 mbedtls_ecp_point_free( &ctx->Xm2 );
JMF 12:0071cb144c7a 86 mbedtls_ecp_point_free( &ctx->Xp1 );
JMF 12:0071cb144c7a 87 mbedtls_ecp_point_free( &ctx->Xp2 );
JMF 12:0071cb144c7a 88 mbedtls_ecp_point_free( &ctx->Xp );
JMF 12:0071cb144c7a 89
JMF 12:0071cb144c7a 90 mbedtls_mpi_free( &ctx->xm1 );
JMF 12:0071cb144c7a 91 mbedtls_mpi_free( &ctx->xm2 );
JMF 12:0071cb144c7a 92 mbedtls_mpi_free( &ctx->s );
JMF 12:0071cb144c7a 93 }
JMF 12:0071cb144c7a 94
JMF 12:0071cb144c7a 95 /*
JMF 12:0071cb144c7a 96 * Setup context
JMF 12:0071cb144c7a 97 */
JMF 12:0071cb144c7a 98 int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 99 mbedtls_ecjpake_role role,
JMF 12:0071cb144c7a 100 mbedtls_md_type_t hash,
JMF 12:0071cb144c7a 101 mbedtls_ecp_group_id curve,
JMF 12:0071cb144c7a 102 const unsigned char *secret,
JMF 12:0071cb144c7a 103 size_t len )
JMF 12:0071cb144c7a 104 {
JMF 12:0071cb144c7a 105 int ret;
JMF 12:0071cb144c7a 106
JMF 12:0071cb144c7a 107 ctx->role = role;
JMF 12:0071cb144c7a 108
JMF 12:0071cb144c7a 109 if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL )
JMF 12:0071cb144c7a 110 return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE );
JMF 12:0071cb144c7a 111
JMF 12:0071cb144c7a 112 MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) );
JMF 12:0071cb144c7a 113
JMF 12:0071cb144c7a 114 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) );
JMF 12:0071cb144c7a 115
JMF 12:0071cb144c7a 116 cleanup:
JMF 12:0071cb144c7a 117 if( ret != 0 )
JMF 12:0071cb144c7a 118 mbedtls_ecjpake_free( ctx );
JMF 12:0071cb144c7a 119
JMF 12:0071cb144c7a 120 return( ret );
JMF 12:0071cb144c7a 121 }
JMF 12:0071cb144c7a 122
JMF 12:0071cb144c7a 123 /*
JMF 12:0071cb144c7a 124 * Check if context is ready for use
JMF 12:0071cb144c7a 125 */
JMF 12:0071cb144c7a 126 int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx )
JMF 12:0071cb144c7a 127 {
JMF 12:0071cb144c7a 128 if( ctx->md_info == NULL ||
JMF 12:0071cb144c7a 129 ctx->grp.id == MBEDTLS_ECP_DP_NONE ||
JMF 12:0071cb144c7a 130 ctx->s.p == NULL )
JMF 12:0071cb144c7a 131 {
JMF 12:0071cb144c7a 132 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
JMF 12:0071cb144c7a 133 }
JMF 12:0071cb144c7a 134
JMF 12:0071cb144c7a 135 return( 0 );
JMF 12:0071cb144c7a 136 }
JMF 12:0071cb144c7a 137
JMF 12:0071cb144c7a 138 /*
JMF 12:0071cb144c7a 139 * Write a point plus its length to a buffer
JMF 12:0071cb144c7a 140 */
JMF 12:0071cb144c7a 141 static int ecjpake_write_len_point( unsigned char **p,
JMF 12:0071cb144c7a 142 const unsigned char *end,
JMF 12:0071cb144c7a 143 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 144 const int pf,
JMF 12:0071cb144c7a 145 const mbedtls_ecp_point *P )
JMF 12:0071cb144c7a 146 {
JMF 12:0071cb144c7a 147 int ret;
JMF 12:0071cb144c7a 148 size_t len;
JMF 12:0071cb144c7a 149
JMF 12:0071cb144c7a 150 /* Need at least 4 for length plus 1 for point */
JMF 12:0071cb144c7a 151 if( end < *p || end - *p < 5 )
JMF 12:0071cb144c7a 152 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 153
JMF 12:0071cb144c7a 154 ret = mbedtls_ecp_point_write_binary( grp, P, pf,
JMF 12:0071cb144c7a 155 &len, *p + 4, end - ( *p + 4 ) );
JMF 12:0071cb144c7a 156 if( ret != 0 )
JMF 12:0071cb144c7a 157 return( ret );
JMF 12:0071cb144c7a 158
JMF 12:0071cb144c7a 159 (*p)[0] = (unsigned char)( ( len >> 24 ) & 0xFF );
JMF 12:0071cb144c7a 160 (*p)[1] = (unsigned char)( ( len >> 16 ) & 0xFF );
JMF 12:0071cb144c7a 161 (*p)[2] = (unsigned char)( ( len >> 8 ) & 0xFF );
JMF 12:0071cb144c7a 162 (*p)[3] = (unsigned char)( ( len ) & 0xFF );
JMF 12:0071cb144c7a 163
JMF 12:0071cb144c7a 164 *p += 4 + len;
JMF 12:0071cb144c7a 165
JMF 12:0071cb144c7a 166 return( 0 );
JMF 12:0071cb144c7a 167 }
JMF 12:0071cb144c7a 168
JMF 12:0071cb144c7a 169 /*
JMF 12:0071cb144c7a 170 * Size of the temporary buffer for ecjpake_hash:
JMF 12:0071cb144c7a 171 * 3 EC points plus their length, plus ID and its length (4 + 6 bytes)
JMF 12:0071cb144c7a 172 */
JMF 12:0071cb144c7a 173 #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 )
JMF 12:0071cb144c7a 174
JMF 12:0071cb144c7a 175 /*
JMF 12:0071cb144c7a 176 * Compute hash for ZKP (7.4.2.2.2.1)
JMF 12:0071cb144c7a 177 */
JMF 12:0071cb144c7a 178 static int ecjpake_hash( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 179 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 180 const int pf,
JMF 12:0071cb144c7a 181 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 182 const mbedtls_ecp_point *V,
JMF 12:0071cb144c7a 183 const mbedtls_ecp_point *X,
JMF 12:0071cb144c7a 184 const char *id,
JMF 12:0071cb144c7a 185 mbedtls_mpi *h )
JMF 12:0071cb144c7a 186 {
JMF 12:0071cb144c7a 187 int ret;
JMF 12:0071cb144c7a 188 unsigned char buf[ECJPAKE_HASH_BUF_LEN];
JMF 12:0071cb144c7a 189 unsigned char *p = buf;
JMF 12:0071cb144c7a 190 const unsigned char *end = buf + sizeof( buf );
JMF 12:0071cb144c7a 191 const size_t id_len = strlen( id );
JMF 12:0071cb144c7a 192 unsigned char hash[MBEDTLS_MD_MAX_SIZE];
JMF 12:0071cb144c7a 193
JMF 12:0071cb144c7a 194 /* Write things to temporary buffer */
JMF 12:0071cb144c7a 195 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) );
JMF 12:0071cb144c7a 196 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) );
JMF 12:0071cb144c7a 197 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) );
JMF 12:0071cb144c7a 198
JMF 12:0071cb144c7a 199 if( end - p < 4 )
JMF 12:0071cb144c7a 200 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 201
JMF 12:0071cb144c7a 202 *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF );
JMF 12:0071cb144c7a 203 *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF );
JMF 12:0071cb144c7a 204 *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF );
JMF 12:0071cb144c7a 205 *p++ = (unsigned char)( ( id_len ) & 0xFF );
JMF 12:0071cb144c7a 206
JMF 12:0071cb144c7a 207 if( end < p || (size_t)( end - p ) < id_len )
JMF 12:0071cb144c7a 208 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 209
JMF 12:0071cb144c7a 210 memcpy( p, id, id_len );
JMF 12:0071cb144c7a 211 p += id_len;
JMF 12:0071cb144c7a 212
JMF 12:0071cb144c7a 213 /* Compute hash */
JMF 12:0071cb144c7a 214 mbedtls_md( md_info, buf, p - buf, hash );
JMF 12:0071cb144c7a 215
JMF 12:0071cb144c7a 216 /* Turn it into an integer mod n */
JMF 12:0071cb144c7a 217 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash,
JMF 12:0071cb144c7a 218 mbedtls_md_get_size( md_info ) ) );
JMF 12:0071cb144c7a 219 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) );
JMF 12:0071cb144c7a 220
JMF 12:0071cb144c7a 221 cleanup:
JMF 12:0071cb144c7a 222 return( ret );
JMF 12:0071cb144c7a 223 }
JMF 12:0071cb144c7a 224
JMF 12:0071cb144c7a 225 /*
JMF 12:0071cb144c7a 226 * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3)
JMF 12:0071cb144c7a 227 */
JMF 12:0071cb144c7a 228 static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 229 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 230 const int pf,
JMF 12:0071cb144c7a 231 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 232 const mbedtls_ecp_point *X,
JMF 12:0071cb144c7a 233 const char *id,
JMF 12:0071cb144c7a 234 const unsigned char **p,
JMF 12:0071cb144c7a 235 const unsigned char *end )
JMF 12:0071cb144c7a 236 {
JMF 12:0071cb144c7a 237 int ret;
JMF 12:0071cb144c7a 238 mbedtls_ecp_point V, VV;
JMF 12:0071cb144c7a 239 mbedtls_mpi r, h;
JMF 12:0071cb144c7a 240 size_t r_len;
JMF 12:0071cb144c7a 241
JMF 12:0071cb144c7a 242 mbedtls_ecp_point_init( &V );
JMF 12:0071cb144c7a 243 mbedtls_ecp_point_init( &VV );
JMF 12:0071cb144c7a 244 mbedtls_mpi_init( &r );
JMF 12:0071cb144c7a 245 mbedtls_mpi_init( &h );
JMF 12:0071cb144c7a 246
JMF 12:0071cb144c7a 247 /*
JMF 12:0071cb144c7a 248 * struct {
JMF 12:0071cb144c7a 249 * ECPoint V;
JMF 12:0071cb144c7a 250 * opaque r<1..2^8-1>;
JMF 12:0071cb144c7a 251 * } ECSchnorrZKP;
JMF 12:0071cb144c7a 252 */
JMF 12:0071cb144c7a 253 if( end < *p )
JMF 12:0071cb144c7a 254 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
JMF 12:0071cb144c7a 255
JMF 12:0071cb144c7a 256 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) );
JMF 12:0071cb144c7a 257
JMF 12:0071cb144c7a 258 if( end < *p || (size_t)( end - *p ) < 1 )
JMF 12:0071cb144c7a 259 {
JMF 12:0071cb144c7a 260 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
JMF 12:0071cb144c7a 261 goto cleanup;
JMF 12:0071cb144c7a 262 }
JMF 12:0071cb144c7a 263
JMF 12:0071cb144c7a 264 r_len = *(*p)++;
JMF 12:0071cb144c7a 265
JMF 12:0071cb144c7a 266 if( end < *p || (size_t)( end - *p ) < r_len )
JMF 12:0071cb144c7a 267 {
JMF 12:0071cb144c7a 268 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
JMF 12:0071cb144c7a 269 goto cleanup;
JMF 12:0071cb144c7a 270 }
JMF 12:0071cb144c7a 271
JMF 12:0071cb144c7a 272 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) );
JMF 12:0071cb144c7a 273 *p += r_len;
JMF 12:0071cb144c7a 274
JMF 12:0071cb144c7a 275 /*
JMF 12:0071cb144c7a 276 * Verification
JMF 12:0071cb144c7a 277 */
JMF 12:0071cb144c7a 278 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
JMF 12:0071cb144c7a 279 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp,
JMF 12:0071cb144c7a 280 &VV, &h, X, &r, G ) );
JMF 12:0071cb144c7a 281
JMF 12:0071cb144c7a 282 if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 )
JMF 12:0071cb144c7a 283 {
JMF 12:0071cb144c7a 284 ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
JMF 12:0071cb144c7a 285 goto cleanup;
JMF 12:0071cb144c7a 286 }
JMF 12:0071cb144c7a 287
JMF 12:0071cb144c7a 288 cleanup:
JMF 12:0071cb144c7a 289 mbedtls_ecp_point_free( &V );
JMF 12:0071cb144c7a 290 mbedtls_ecp_point_free( &VV );
JMF 12:0071cb144c7a 291 mbedtls_mpi_free( &r );
JMF 12:0071cb144c7a 292 mbedtls_mpi_free( &h );
JMF 12:0071cb144c7a 293
JMF 12:0071cb144c7a 294 return( ret );
JMF 12:0071cb144c7a 295 }
JMF 12:0071cb144c7a 296
JMF 12:0071cb144c7a 297 /*
JMF 12:0071cb144c7a 298 * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2)
JMF 12:0071cb144c7a 299 */
JMF 12:0071cb144c7a 300 static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 301 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 302 const int pf,
JMF 12:0071cb144c7a 303 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 304 const mbedtls_mpi *x,
JMF 12:0071cb144c7a 305 const mbedtls_ecp_point *X,
JMF 12:0071cb144c7a 306 const char *id,
JMF 12:0071cb144c7a 307 unsigned char **p,
JMF 12:0071cb144c7a 308 const unsigned char *end,
JMF 12:0071cb144c7a 309 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 310 void *p_rng )
JMF 12:0071cb144c7a 311 {
JMF 12:0071cb144c7a 312 int ret;
JMF 12:0071cb144c7a 313 mbedtls_ecp_point V;
JMF 12:0071cb144c7a 314 mbedtls_mpi v;
JMF 12:0071cb144c7a 315 mbedtls_mpi h; /* later recycled to hold r */
JMF 12:0071cb144c7a 316 size_t len;
JMF 12:0071cb144c7a 317
JMF 12:0071cb144c7a 318 if( end < *p )
JMF 12:0071cb144c7a 319 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 320
JMF 12:0071cb144c7a 321 mbedtls_ecp_point_init( &V );
JMF 12:0071cb144c7a 322 mbedtls_mpi_init( &v );
JMF 12:0071cb144c7a 323 mbedtls_mpi_init( &h );
JMF 12:0071cb144c7a 324
JMF 12:0071cb144c7a 325 /* Compute signature */
JMF 12:0071cb144c7a 326 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp,
JMF 12:0071cb144c7a 327 G, &v, &V, f_rng, p_rng ) );
JMF 12:0071cb144c7a 328 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
JMF 12:0071cb144c7a 329 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */
JMF 12:0071cb144c7a 330 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */
JMF 12:0071cb144c7a 331 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */
JMF 12:0071cb144c7a 332
JMF 12:0071cb144c7a 333 /* Write it out */
JMF 12:0071cb144c7a 334 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V,
JMF 12:0071cb144c7a 335 pf, &len, *p, end - *p ) );
JMF 12:0071cb144c7a 336 *p += len;
JMF 12:0071cb144c7a 337
JMF 12:0071cb144c7a 338 len = mbedtls_mpi_size( &h ); /* actually r */
JMF 12:0071cb144c7a 339 if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 )
JMF 12:0071cb144c7a 340 {
JMF 12:0071cb144c7a 341 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
JMF 12:0071cb144c7a 342 goto cleanup;
JMF 12:0071cb144c7a 343 }
JMF 12:0071cb144c7a 344
JMF 12:0071cb144c7a 345 *(*p)++ = (unsigned char)( len & 0xFF );
JMF 12:0071cb144c7a 346 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */
JMF 12:0071cb144c7a 347 *p += len;
JMF 12:0071cb144c7a 348
JMF 12:0071cb144c7a 349 cleanup:
JMF 12:0071cb144c7a 350 mbedtls_ecp_point_free( &V );
JMF 12:0071cb144c7a 351 mbedtls_mpi_free( &v );
JMF 12:0071cb144c7a 352 mbedtls_mpi_free( &h );
JMF 12:0071cb144c7a 353
JMF 12:0071cb144c7a 354 return( ret );
JMF 12:0071cb144c7a 355 }
JMF 12:0071cb144c7a 356
JMF 12:0071cb144c7a 357 /*
JMF 12:0071cb144c7a 358 * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof
JMF 12:0071cb144c7a 359 * Output: verified public key X
JMF 12:0071cb144c7a 360 */
JMF 12:0071cb144c7a 361 static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 362 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 363 const int pf,
JMF 12:0071cb144c7a 364 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 365 mbedtls_ecp_point *X,
JMF 12:0071cb144c7a 366 const char *id,
JMF 12:0071cb144c7a 367 const unsigned char **p,
JMF 12:0071cb144c7a 368 const unsigned char *end )
JMF 12:0071cb144c7a 369 {
JMF 12:0071cb144c7a 370 int ret;
JMF 12:0071cb144c7a 371
JMF 12:0071cb144c7a 372 if( end < *p )
JMF 12:0071cb144c7a 373 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
JMF 12:0071cb144c7a 374
JMF 12:0071cb144c7a 375 /*
JMF 12:0071cb144c7a 376 * struct {
JMF 12:0071cb144c7a 377 * ECPoint X;
JMF 12:0071cb144c7a 378 * ECSchnorrZKP zkp;
JMF 12:0071cb144c7a 379 * } ECJPAKEKeyKP;
JMF 12:0071cb144c7a 380 */
JMF 12:0071cb144c7a 381 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) );
JMF 12:0071cb144c7a 382 if( mbedtls_ecp_is_zero( X ) )
JMF 12:0071cb144c7a 383 {
JMF 12:0071cb144c7a 384 ret = MBEDTLS_ERR_ECP_INVALID_KEY;
JMF 12:0071cb144c7a 385 goto cleanup;
JMF 12:0071cb144c7a 386 }
JMF 12:0071cb144c7a 387
JMF 12:0071cb144c7a 388 MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) );
JMF 12:0071cb144c7a 389
JMF 12:0071cb144c7a 390 cleanup:
JMF 12:0071cb144c7a 391 return( ret );
JMF 12:0071cb144c7a 392 }
JMF 12:0071cb144c7a 393
JMF 12:0071cb144c7a 394 /*
JMF 12:0071cb144c7a 395 * Generate an ECJPAKEKeyKP
JMF 12:0071cb144c7a 396 * Output: the serialized structure, plus private/public key pair
JMF 12:0071cb144c7a 397 */
JMF 12:0071cb144c7a 398 static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 399 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 400 const int pf,
JMF 12:0071cb144c7a 401 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 402 mbedtls_mpi *x,
JMF 12:0071cb144c7a 403 mbedtls_ecp_point *X,
JMF 12:0071cb144c7a 404 const char *id,
JMF 12:0071cb144c7a 405 unsigned char **p,
JMF 12:0071cb144c7a 406 const unsigned char *end,
JMF 12:0071cb144c7a 407 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 408 void *p_rng )
JMF 12:0071cb144c7a 409 {
JMF 12:0071cb144c7a 410 int ret;
JMF 12:0071cb144c7a 411 size_t len;
JMF 12:0071cb144c7a 412
JMF 12:0071cb144c7a 413 if( end < *p )
JMF 12:0071cb144c7a 414 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 415
JMF 12:0071cb144c7a 416 /* Generate key (7.4.2.3.1) and write it out */
JMF 12:0071cb144c7a 417 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X,
JMF 12:0071cb144c7a 418 f_rng, p_rng ) );
JMF 12:0071cb144c7a 419 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X,
JMF 12:0071cb144c7a 420 pf, &len, *p, end - *p ) );
JMF 12:0071cb144c7a 421 *p += len;
JMF 12:0071cb144c7a 422
JMF 12:0071cb144c7a 423 /* Generate and write proof */
JMF 12:0071cb144c7a 424 MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id,
JMF 12:0071cb144c7a 425 p, end, f_rng, p_rng ) );
JMF 12:0071cb144c7a 426
JMF 12:0071cb144c7a 427 cleanup:
JMF 12:0071cb144c7a 428 return( ret );
JMF 12:0071cb144c7a 429 }
JMF 12:0071cb144c7a 430
JMF 12:0071cb144c7a 431 /*
JMF 12:0071cb144c7a 432 * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs
JMF 12:0071cb144c7a 433 * Ouputs: verified peer public keys Xa, Xb
JMF 12:0071cb144c7a 434 */
JMF 12:0071cb144c7a 435 static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 436 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 437 const int pf,
JMF 12:0071cb144c7a 438 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 439 mbedtls_ecp_point *Xa,
JMF 12:0071cb144c7a 440 mbedtls_ecp_point *Xb,
JMF 12:0071cb144c7a 441 const char *id,
JMF 12:0071cb144c7a 442 const unsigned char *buf,
JMF 12:0071cb144c7a 443 size_t len )
JMF 12:0071cb144c7a 444 {
JMF 12:0071cb144c7a 445 int ret;
JMF 12:0071cb144c7a 446 const unsigned char *p = buf;
JMF 12:0071cb144c7a 447 const unsigned char *end = buf + len;
JMF 12:0071cb144c7a 448
JMF 12:0071cb144c7a 449 /*
JMF 12:0071cb144c7a 450 * struct {
JMF 12:0071cb144c7a 451 * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2];
JMF 12:0071cb144c7a 452 * } ECJPAKEKeyKPPairList;
JMF 12:0071cb144c7a 453 */
JMF 12:0071cb144c7a 454 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) );
JMF 12:0071cb144c7a 455 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) );
JMF 12:0071cb144c7a 456
JMF 12:0071cb144c7a 457 if( p != end )
JMF 12:0071cb144c7a 458 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
JMF 12:0071cb144c7a 459
JMF 12:0071cb144c7a 460 cleanup:
JMF 12:0071cb144c7a 461 return( ret );
JMF 12:0071cb144c7a 462 }
JMF 12:0071cb144c7a 463
JMF 12:0071cb144c7a 464 /*
JMF 12:0071cb144c7a 465 * Generate a ECJPAKEKeyKPPairList
JMF 12:0071cb144c7a 466 * Outputs: the serialized structure, plus two private/public key pairs
JMF 12:0071cb144c7a 467 */
JMF 12:0071cb144c7a 468 static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info,
JMF 12:0071cb144c7a 469 const mbedtls_ecp_group *grp,
JMF 12:0071cb144c7a 470 const int pf,
JMF 12:0071cb144c7a 471 const mbedtls_ecp_point *G,
JMF 12:0071cb144c7a 472 mbedtls_mpi *xm1,
JMF 12:0071cb144c7a 473 mbedtls_ecp_point *Xa,
JMF 12:0071cb144c7a 474 mbedtls_mpi *xm2,
JMF 12:0071cb144c7a 475 mbedtls_ecp_point *Xb,
JMF 12:0071cb144c7a 476 const char *id,
JMF 12:0071cb144c7a 477 unsigned char *buf,
JMF 12:0071cb144c7a 478 size_t len,
JMF 12:0071cb144c7a 479 size_t *olen,
JMF 12:0071cb144c7a 480 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 481 void *p_rng )
JMF 12:0071cb144c7a 482 {
JMF 12:0071cb144c7a 483 int ret;
JMF 12:0071cb144c7a 484 unsigned char *p = buf;
JMF 12:0071cb144c7a 485 const unsigned char *end = buf + len;
JMF 12:0071cb144c7a 486
JMF 12:0071cb144c7a 487 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id,
JMF 12:0071cb144c7a 488 &p, end, f_rng, p_rng ) );
JMF 12:0071cb144c7a 489 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id,
JMF 12:0071cb144c7a 490 &p, end, f_rng, p_rng ) );
JMF 12:0071cb144c7a 491
JMF 12:0071cb144c7a 492 *olen = p - buf;
JMF 12:0071cb144c7a 493
JMF 12:0071cb144c7a 494 cleanup:
JMF 12:0071cb144c7a 495 return( ret );
JMF 12:0071cb144c7a 496 }
JMF 12:0071cb144c7a 497
JMF 12:0071cb144c7a 498 /*
JMF 12:0071cb144c7a 499 * Read and process the first round message
JMF 12:0071cb144c7a 500 */
JMF 12:0071cb144c7a 501 int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 502 const unsigned char *buf,
JMF 12:0071cb144c7a 503 size_t len )
JMF 12:0071cb144c7a 504 {
JMF 12:0071cb144c7a 505 return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format,
JMF 12:0071cb144c7a 506 &ctx->grp.G,
JMF 12:0071cb144c7a 507 &ctx->Xp1, &ctx->Xp2, ID_PEER,
JMF 12:0071cb144c7a 508 buf, len ) );
JMF 12:0071cb144c7a 509 }
JMF 12:0071cb144c7a 510
JMF 12:0071cb144c7a 511 /*
JMF 12:0071cb144c7a 512 * Generate and write the first round message
JMF 12:0071cb144c7a 513 */
JMF 12:0071cb144c7a 514 int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 515 unsigned char *buf, size_t len, size_t *olen,
JMF 12:0071cb144c7a 516 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 517 void *p_rng )
JMF 12:0071cb144c7a 518 {
JMF 12:0071cb144c7a 519 return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format,
JMF 12:0071cb144c7a 520 &ctx->grp.G,
JMF 12:0071cb144c7a 521 &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2,
JMF 12:0071cb144c7a 522 ID_MINE, buf, len, olen, f_rng, p_rng ) );
JMF 12:0071cb144c7a 523 }
JMF 12:0071cb144c7a 524
JMF 12:0071cb144c7a 525 /*
JMF 12:0071cb144c7a 526 * Compute the sum of three points R = A + B + C
JMF 12:0071cb144c7a 527 */
JMF 12:0071cb144c7a 528 static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R,
JMF 12:0071cb144c7a 529 const mbedtls_ecp_point *A,
JMF 12:0071cb144c7a 530 const mbedtls_ecp_point *B,
JMF 12:0071cb144c7a 531 const mbedtls_ecp_point *C )
JMF 12:0071cb144c7a 532 {
JMF 12:0071cb144c7a 533 int ret;
JMF 12:0071cb144c7a 534 mbedtls_mpi one;
JMF 12:0071cb144c7a 535
JMF 12:0071cb144c7a 536 mbedtls_mpi_init( &one );
JMF 12:0071cb144c7a 537
JMF 12:0071cb144c7a 538 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
JMF 12:0071cb144c7a 539 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) );
JMF 12:0071cb144c7a 540 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) );
JMF 12:0071cb144c7a 541
JMF 12:0071cb144c7a 542 cleanup:
JMF 12:0071cb144c7a 543 mbedtls_mpi_free( &one );
JMF 12:0071cb144c7a 544
JMF 12:0071cb144c7a 545 return( ret );
JMF 12:0071cb144c7a 546 }
JMF 12:0071cb144c7a 547
JMF 12:0071cb144c7a 548 /*
JMF 12:0071cb144c7a 549 * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6)
JMF 12:0071cb144c7a 550 */
JMF 12:0071cb144c7a 551 int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 552 const unsigned char *buf,
JMF 12:0071cb144c7a 553 size_t len )
JMF 12:0071cb144c7a 554 {
JMF 12:0071cb144c7a 555 int ret;
JMF 12:0071cb144c7a 556 const unsigned char *p = buf;
JMF 12:0071cb144c7a 557 const unsigned char *end = buf + len;
JMF 12:0071cb144c7a 558 mbedtls_ecp_group grp;
JMF 12:0071cb144c7a 559 mbedtls_ecp_point G; /* C: GB, S: GA */
JMF 12:0071cb144c7a 560
JMF 12:0071cb144c7a 561 mbedtls_ecp_group_init( &grp );
JMF 12:0071cb144c7a 562 mbedtls_ecp_point_init( &G );
JMF 12:0071cb144c7a 563
JMF 12:0071cb144c7a 564 /*
JMF 12:0071cb144c7a 565 * Server: GA = X3 + X4 + X1 (7.4.2.6.1)
JMF 12:0071cb144c7a 566 * Client: GB = X1 + X2 + X3 (7.4.2.5.1)
JMF 12:0071cb144c7a 567 * Unified: G = Xm1 + Xm2 + Xp1
JMF 12:0071cb144c7a 568 * We need that before parsing in order to check Xp as we read it
JMF 12:0071cb144c7a 569 */
JMF 12:0071cb144c7a 570 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
JMF 12:0071cb144c7a 571 &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) );
JMF 12:0071cb144c7a 572
JMF 12:0071cb144c7a 573 /*
JMF 12:0071cb144c7a 574 * struct {
JMF 12:0071cb144c7a 575 * ECParameters curve_params; // only client reading server msg
JMF 12:0071cb144c7a 576 * ECJPAKEKeyKP ecjpake_key_kp;
JMF 12:0071cb144c7a 577 * } Client/ServerECJPAKEParams;
JMF 12:0071cb144c7a 578 */
JMF 12:0071cb144c7a 579 if( ctx->role == MBEDTLS_ECJPAKE_CLIENT )
JMF 12:0071cb144c7a 580 {
JMF 12:0071cb144c7a 581 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) );
JMF 12:0071cb144c7a 582 if( grp.id != ctx->grp.id )
JMF 12:0071cb144c7a 583 {
JMF 12:0071cb144c7a 584 ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
JMF 12:0071cb144c7a 585 goto cleanup;
JMF 12:0071cb144c7a 586 }
JMF 12:0071cb144c7a 587 }
JMF 12:0071cb144c7a 588
JMF 12:0071cb144c7a 589 MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp,
JMF 12:0071cb144c7a 590 ctx->point_format,
JMF 12:0071cb144c7a 591 &G, &ctx->Xp, ID_PEER, &p, end ) );
JMF 12:0071cb144c7a 592
JMF 12:0071cb144c7a 593 if( p != end )
JMF 12:0071cb144c7a 594 {
JMF 12:0071cb144c7a 595 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
JMF 12:0071cb144c7a 596 goto cleanup;
JMF 12:0071cb144c7a 597 }
JMF 12:0071cb144c7a 598
JMF 12:0071cb144c7a 599 cleanup:
JMF 12:0071cb144c7a 600 mbedtls_ecp_group_free( &grp );
JMF 12:0071cb144c7a 601 mbedtls_ecp_point_free( &G );
JMF 12:0071cb144c7a 602
JMF 12:0071cb144c7a 603 return( ret );
JMF 12:0071cb144c7a 604 }
JMF 12:0071cb144c7a 605
JMF 12:0071cb144c7a 606 /*
JMF 12:0071cb144c7a 607 * Compute R = +/- X * S mod N, taking care not to leak S
JMF 12:0071cb144c7a 608 */
JMF 12:0071cb144c7a 609 static int ecjpake_mul_secret( mbedtls_mpi *R, int sign,
JMF 12:0071cb144c7a 610 const mbedtls_mpi *X,
JMF 12:0071cb144c7a 611 const mbedtls_mpi *S,
JMF 12:0071cb144c7a 612 const mbedtls_mpi *N,
JMF 12:0071cb144c7a 613 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 614 void *p_rng )
JMF 12:0071cb144c7a 615 {
JMF 12:0071cb144c7a 616 int ret;
JMF 12:0071cb144c7a 617 mbedtls_mpi b; /* Blinding value, then s + N * blinding */
JMF 12:0071cb144c7a 618
JMF 12:0071cb144c7a 619 mbedtls_mpi_init( &b );
JMF 12:0071cb144c7a 620
JMF 12:0071cb144c7a 621 /* b = s + rnd-128-bit * N */
JMF 12:0071cb144c7a 622 MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) );
JMF 12:0071cb144c7a 623 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) );
JMF 12:0071cb144c7a 624 MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) );
JMF 12:0071cb144c7a 625
JMF 12:0071cb144c7a 626 /* R = sign * X * b mod N */
JMF 12:0071cb144c7a 627 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) );
JMF 12:0071cb144c7a 628 R->s *= sign;
JMF 12:0071cb144c7a 629 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) );
JMF 12:0071cb144c7a 630
JMF 12:0071cb144c7a 631 cleanup:
JMF 12:0071cb144c7a 632 mbedtls_mpi_free( &b );
JMF 12:0071cb144c7a 633
JMF 12:0071cb144c7a 634 return( ret );
JMF 12:0071cb144c7a 635 }
JMF 12:0071cb144c7a 636
JMF 12:0071cb144c7a 637 /*
JMF 12:0071cb144c7a 638 * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6)
JMF 12:0071cb144c7a 639 */
JMF 12:0071cb144c7a 640 int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 641 unsigned char *buf, size_t len, size_t *olen,
JMF 12:0071cb144c7a 642 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 643 void *p_rng )
JMF 12:0071cb144c7a 644 {
JMF 12:0071cb144c7a 645 int ret;
JMF 12:0071cb144c7a 646 mbedtls_ecp_point G; /* C: GA, S: GB */
JMF 12:0071cb144c7a 647 mbedtls_ecp_point Xm; /* C: Xc, S: Xs */
JMF 12:0071cb144c7a 648 mbedtls_mpi xm; /* C: xc, S: xs */
JMF 12:0071cb144c7a 649 unsigned char *p = buf;
JMF 12:0071cb144c7a 650 const unsigned char *end = buf + len;
JMF 12:0071cb144c7a 651 size_t ec_len;
JMF 12:0071cb144c7a 652
JMF 12:0071cb144c7a 653 mbedtls_ecp_point_init( &G );
JMF 12:0071cb144c7a 654 mbedtls_ecp_point_init( &Xm );
JMF 12:0071cb144c7a 655 mbedtls_mpi_init( &xm );
JMF 12:0071cb144c7a 656
JMF 12:0071cb144c7a 657 /*
JMF 12:0071cb144c7a 658 * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1)
JMF 12:0071cb144c7a 659 *
JMF 12:0071cb144c7a 660 * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA
JMF 12:0071cb144c7a 661 * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB
JMF 12:0071cb144c7a 662 * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G
JMF 12:0071cb144c7a 663 */
JMF 12:0071cb144c7a 664 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
JMF 12:0071cb144c7a 665 &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) );
JMF 12:0071cb144c7a 666 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s,
JMF 12:0071cb144c7a 667 &ctx->grp.N, f_rng, p_rng ) );
JMF 12:0071cb144c7a 668 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) );
JMF 12:0071cb144c7a 669
JMF 12:0071cb144c7a 670 /*
JMF 12:0071cb144c7a 671 * Now write things out
JMF 12:0071cb144c7a 672 *
JMF 12:0071cb144c7a 673 * struct {
JMF 12:0071cb144c7a 674 * ECParameters curve_params; // only server writing its message
JMF 12:0071cb144c7a 675 * ECJPAKEKeyKP ecjpake_key_kp;
JMF 12:0071cb144c7a 676 * } Client/ServerECJPAKEParams;
JMF 12:0071cb144c7a 677 */
JMF 12:0071cb144c7a 678 if( ctx->role == MBEDTLS_ECJPAKE_SERVER )
JMF 12:0071cb144c7a 679 {
JMF 12:0071cb144c7a 680 if( end < p )
JMF 12:0071cb144c7a 681 {
JMF 12:0071cb144c7a 682 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
JMF 12:0071cb144c7a 683 goto cleanup;
JMF 12:0071cb144c7a 684 }
JMF 12:0071cb144c7a 685 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len,
JMF 12:0071cb144c7a 686 p, end - p ) );
JMF 12:0071cb144c7a 687 p += ec_len;
JMF 12:0071cb144c7a 688 }
JMF 12:0071cb144c7a 689
JMF 12:0071cb144c7a 690 if( end < p )
JMF 12:0071cb144c7a 691 {
JMF 12:0071cb144c7a 692 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
JMF 12:0071cb144c7a 693 goto cleanup;
JMF 12:0071cb144c7a 694 }
JMF 12:0071cb144c7a 695 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm,
JMF 12:0071cb144c7a 696 ctx->point_format, &ec_len, p, end - p ) );
JMF 12:0071cb144c7a 697 p += ec_len;
JMF 12:0071cb144c7a 698
JMF 12:0071cb144c7a 699 MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp,
JMF 12:0071cb144c7a 700 ctx->point_format,
JMF 12:0071cb144c7a 701 &G, &xm, &Xm, ID_MINE,
JMF 12:0071cb144c7a 702 &p, end, f_rng, p_rng ) );
JMF 12:0071cb144c7a 703
JMF 12:0071cb144c7a 704 *olen = p - buf;
JMF 12:0071cb144c7a 705
JMF 12:0071cb144c7a 706 cleanup:
JMF 12:0071cb144c7a 707 mbedtls_ecp_point_free( &G );
JMF 12:0071cb144c7a 708 mbedtls_ecp_point_free( &Xm );
JMF 12:0071cb144c7a 709 mbedtls_mpi_free( &xm );
JMF 12:0071cb144c7a 710
JMF 12:0071cb144c7a 711 return( ret );
JMF 12:0071cb144c7a 712 }
JMF 12:0071cb144c7a 713
JMF 12:0071cb144c7a 714 /*
JMF 12:0071cb144c7a 715 * Derive PMS (7.4.2.7 / 7.4.2.8)
JMF 12:0071cb144c7a 716 */
JMF 12:0071cb144c7a 717 int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 718 unsigned char *buf, size_t len, size_t *olen,
JMF 12:0071cb144c7a 719 int (*f_rng)(void *, unsigned char *, size_t),
JMF 12:0071cb144c7a 720 void *p_rng )
JMF 12:0071cb144c7a 721 {
JMF 12:0071cb144c7a 722 int ret;
JMF 12:0071cb144c7a 723 mbedtls_ecp_point K;
JMF 12:0071cb144c7a 724 mbedtls_mpi m_xm2_s, one;
JMF 12:0071cb144c7a 725 unsigned char kx[MBEDTLS_ECP_MAX_BYTES];
JMF 12:0071cb144c7a 726 size_t x_bytes;
JMF 12:0071cb144c7a 727
JMF 12:0071cb144c7a 728 *olen = mbedtls_md_get_size( ctx->md_info );
JMF 12:0071cb144c7a 729 if( len < *olen )
JMF 12:0071cb144c7a 730 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
JMF 12:0071cb144c7a 731
JMF 12:0071cb144c7a 732 mbedtls_ecp_point_init( &K );
JMF 12:0071cb144c7a 733 mbedtls_mpi_init( &m_xm2_s );
JMF 12:0071cb144c7a 734 mbedtls_mpi_init( &one );
JMF 12:0071cb144c7a 735
JMF 12:0071cb144c7a 736 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
JMF 12:0071cb144c7a 737
JMF 12:0071cb144c7a 738 /*
JMF 12:0071cb144c7a 739 * Client: K = ( Xs - X4 * x2 * s ) * x2
JMF 12:0071cb144c7a 740 * Server: K = ( Xc - X2 * x4 * s ) * x4
JMF 12:0071cb144c7a 741 * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2
JMF 12:0071cb144c7a 742 */
JMF 12:0071cb144c7a 743 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s,
JMF 12:0071cb144c7a 744 &ctx->grp.N, f_rng, p_rng ) );
JMF 12:0071cb144c7a 745 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K,
JMF 12:0071cb144c7a 746 &one, &ctx->Xp,
JMF 12:0071cb144c7a 747 &m_xm2_s, &ctx->Xp2 ) );
JMF 12:0071cb144c7a 748 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K,
JMF 12:0071cb144c7a 749 f_rng, p_rng ) );
JMF 12:0071cb144c7a 750
JMF 12:0071cb144c7a 751 /* PMS = SHA-256( K.X ) */
JMF 12:0071cb144c7a 752 x_bytes = ( ctx->grp.pbits + 7 ) / 8;
JMF 12:0071cb144c7a 753 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) );
JMF 12:0071cb144c7a 754 MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) );
JMF 12:0071cb144c7a 755
JMF 12:0071cb144c7a 756 cleanup:
JMF 12:0071cb144c7a 757 mbedtls_ecp_point_free( &K );
JMF 12:0071cb144c7a 758 mbedtls_mpi_free( &m_xm2_s );
JMF 12:0071cb144c7a 759 mbedtls_mpi_free( &one );
JMF 12:0071cb144c7a 760
JMF 12:0071cb144c7a 761 return( ret );
JMF 12:0071cb144c7a 762 }
JMF 12:0071cb144c7a 763
JMF 12:0071cb144c7a 764 #undef ID_MINE
JMF 12:0071cb144c7a 765 #undef ID_PEER
JMF 12:0071cb144c7a 766
JMF 12:0071cb144c7a 767
JMF 12:0071cb144c7a 768 #if defined(MBEDTLS_SELF_TEST)
JMF 12:0071cb144c7a 769
JMF 12:0071cb144c7a 770 #if defined(MBEDTLS_PLATFORM_C)
JMF 12:0071cb144c7a 771 #include "mbedtls/platform.h"
JMF 12:0071cb144c7a 772 #else
JMF 12:0071cb144c7a 773 #include <stdio.h>
JMF 12:0071cb144c7a 774 #define mbedtls_printf pc.printf
JMF 12:0071cb144c7a 775 #endif
JMF 12:0071cb144c7a 776
JMF 12:0071cb144c7a 777 #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \
JMF 12:0071cb144c7a 778 !defined(MBEDTLS_SHA256_C)
JMF 12:0071cb144c7a 779 int mbedtls_ecjpake_self_test( int verbose )
JMF 12:0071cb144c7a 780 {
JMF 12:0071cb144c7a 781 (void) verbose;
JMF 12:0071cb144c7a 782 return( 0 );
JMF 12:0071cb144c7a 783 }
JMF 12:0071cb144c7a 784 #else
JMF 12:0071cb144c7a 785
JMF 12:0071cb144c7a 786 static const unsigned char ecjpake_test_password[] = {
JMF 12:0071cb144c7a 787 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74,
JMF 12:0071cb144c7a 788 0x65, 0x73, 0x74
JMF 12:0071cb144c7a 789 };
JMF 12:0071cb144c7a 790
JMF 12:0071cb144c7a 791 static const unsigned char ecjpake_test_x1[] = {
JMF 12:0071cb144c7a 792 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c,
JMF 12:0071cb144c7a 793 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
JMF 12:0071cb144c7a 794 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21
JMF 12:0071cb144c7a 795 };
JMF 12:0071cb144c7a 796
JMF 12:0071cb144c7a 797 static const unsigned char ecjpake_test_x2[] = {
JMF 12:0071cb144c7a 798 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
JMF 12:0071cb144c7a 799 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
JMF 12:0071cb144c7a 800 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
JMF 12:0071cb144c7a 801 };
JMF 12:0071cb144c7a 802
JMF 12:0071cb144c7a 803 static const unsigned char ecjpake_test_x3[] = {
JMF 12:0071cb144c7a 804 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
JMF 12:0071cb144c7a 805 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
JMF 12:0071cb144c7a 806 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
JMF 12:0071cb144c7a 807 };
JMF 12:0071cb144c7a 808
JMF 12:0071cb144c7a 809 static const unsigned char ecjpake_test_x4[] = {
JMF 12:0071cb144c7a 810 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc,
JMF 12:0071cb144c7a 811 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8,
JMF 12:0071cb144c7a 812 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1
JMF 12:0071cb144c7a 813 };
JMF 12:0071cb144c7a 814
JMF 12:0071cb144c7a 815 static const unsigned char ecjpake_test_cli_one[] = {
JMF 12:0071cb144c7a 816 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19,
JMF 12:0071cb144c7a 817 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44,
JMF 12:0071cb144c7a 818 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad,
JMF 12:0071cb144c7a 819 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62,
JMF 12:0071cb144c7a 820 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9,
JMF 12:0071cb144c7a 821 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d,
JMF 12:0071cb144c7a 822 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e,
JMF 12:0071cb144c7a 823 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e,
JMF 12:0071cb144c7a 824 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73,
JMF 12:0071cb144c7a 825 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22,
JMF 12:0071cb144c7a 826 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce,
JMF 12:0071cb144c7a 827 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00,
JMF 12:0071cb144c7a 828 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b,
JMF 12:0071cb144c7a 829 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e,
JMF 12:0071cb144c7a 830 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62,
JMF 12:0071cb144c7a 831 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5,
JMF 12:0071cb144c7a 832 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb,
JMF 12:0071cb144c7a 833 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35,
JMF 12:0071cb144c7a 834 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0,
JMF 12:0071cb144c7a 835 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb,
JMF 12:0071cb144c7a 836 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47,
JMF 12:0071cb144c7a 837 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39,
JMF 12:0071cb144c7a 838 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97,
JMF 12:0071cb144c7a 839 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40,
JMF 12:0071cb144c7a 840 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d,
JMF 12:0071cb144c7a 841 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa,
JMF 12:0071cb144c7a 842 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d,
JMF 12:0071cb144c7a 843 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0
JMF 12:0071cb144c7a 844 };
JMF 12:0071cb144c7a 845
JMF 12:0071cb144c7a 846 static const unsigned char ecjpake_test_srv_one[] = {
JMF 12:0071cb144c7a 847 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb,
JMF 12:0071cb144c7a 848 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18,
JMF 12:0071cb144c7a 849 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47,
JMF 12:0071cb144c7a 850 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f,
JMF 12:0071cb144c7a 851 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7,
JMF 12:0071cb144c7a 852 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d,
JMF 12:0071cb144c7a 853 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64,
JMF 12:0071cb144c7a 854 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36,
JMF 12:0071cb144c7a 855 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2,
JMF 12:0071cb144c7a 856 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec,
JMF 12:0071cb144c7a 857 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16,
JMF 12:0071cb144c7a 858 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96,
JMF 12:0071cb144c7a 859 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3,
JMF 12:0071cb144c7a 860 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19,
JMF 12:0071cb144c7a 861 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f,
JMF 12:0071cb144c7a 862 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8,
JMF 12:0071cb144c7a 863 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7,
JMF 12:0071cb144c7a 864 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea,
JMF 12:0071cb144c7a 865 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5,
JMF 12:0071cb144c7a 866 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6,
JMF 12:0071cb144c7a 867 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31,
JMF 12:0071cb144c7a 868 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d,
JMF 12:0071cb144c7a 869 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8,
JMF 12:0071cb144c7a 870 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee,
JMF 12:0071cb144c7a 871 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84,
JMF 12:0071cb144c7a 872 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f,
JMF 12:0071cb144c7a 873 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80,
JMF 12:0071cb144c7a 874 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12
JMF 12:0071cb144c7a 875 };
JMF 12:0071cb144c7a 876
JMF 12:0071cb144c7a 877 static const unsigned char ecjpake_test_srv_two[] = {
JMF 12:0071cb144c7a 878 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23,
JMF 12:0071cb144c7a 879 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c,
JMF 12:0071cb144c7a 880 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f,
JMF 12:0071cb144c7a 881 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca,
JMF 12:0071cb144c7a 882 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26,
JMF 12:0071cb144c7a 883 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55,
JMF 12:0071cb144c7a 884 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38,
JMF 12:0071cb144c7a 885 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6,
JMF 12:0071cb144c7a 886 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9,
JMF 12:0071cb144c7a 887 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4,
JMF 12:0071cb144c7a 888 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2,
JMF 12:0071cb144c7a 889 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8,
JMF 12:0071cb144c7a 890 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd,
JMF 12:0071cb144c7a 891 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c
JMF 12:0071cb144c7a 892 };
JMF 12:0071cb144c7a 893
JMF 12:0071cb144c7a 894 static const unsigned char ecjpake_test_cli_two[] = {
JMF 12:0071cb144c7a 895 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46,
JMF 12:0071cb144c7a 896 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb,
JMF 12:0071cb144c7a 897 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72,
JMF 12:0071cb144c7a 898 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce,
JMF 12:0071cb144c7a 899 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98,
JMF 12:0071cb144c7a 900 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31,
JMF 12:0071cb144c7a 901 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15,
JMF 12:0071cb144c7a 902 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36,
JMF 12:0071cb144c7a 903 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8,
JMF 12:0071cb144c7a 904 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45,
JMF 12:0071cb144c7a 905 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d,
JMF 12:0071cb144c7a 906 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58,
JMF 12:0071cb144c7a 907 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82,
JMF 12:0071cb144c7a 908 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c
JMF 12:0071cb144c7a 909 };
JMF 12:0071cb144c7a 910
JMF 12:0071cb144c7a 911 static const unsigned char ecjpake_test_pms[] = {
JMF 12:0071cb144c7a 912 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7,
JMF 12:0071cb144c7a 913 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9,
JMF 12:0071cb144c7a 914 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51
JMF 12:0071cb144c7a 915 };
JMF 12:0071cb144c7a 916
JMF 12:0071cb144c7a 917 /* Load my private keys and generate the correponding public keys */
JMF 12:0071cb144c7a 918 static int ecjpake_test_load( mbedtls_ecjpake_context *ctx,
JMF 12:0071cb144c7a 919 const unsigned char *xm1, size_t len1,
JMF 12:0071cb144c7a 920 const unsigned char *xm2, size_t len2 )
JMF 12:0071cb144c7a 921 {
JMF 12:0071cb144c7a 922 int ret;
JMF 12:0071cb144c7a 923
JMF 12:0071cb144c7a 924 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) );
JMF 12:0071cb144c7a 925 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) );
JMF 12:0071cb144c7a 926 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1,
JMF 12:0071cb144c7a 927 &ctx->grp.G, NULL, NULL ) );
JMF 12:0071cb144c7a 928 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2,
JMF 12:0071cb144c7a 929 &ctx->grp.G, NULL, NULL ) );
JMF 12:0071cb144c7a 930
JMF 12:0071cb144c7a 931 cleanup:
JMF 12:0071cb144c7a 932 return( ret );
JMF 12:0071cb144c7a 933 }
JMF 12:0071cb144c7a 934
JMF 12:0071cb144c7a 935 /* For tests we don't need a secure RNG;
JMF 12:0071cb144c7a 936 * use the LGC from Numerical Recipes for simplicity */
JMF 12:0071cb144c7a 937 static int ecjpake_lgc( void *p, unsigned char *out, size_t len )
JMF 12:0071cb144c7a 938 {
JMF 12:0071cb144c7a 939 static uint32_t x = 42;
JMF 12:0071cb144c7a 940 (void) p;
JMF 12:0071cb144c7a 941
JMF 12:0071cb144c7a 942 while( len > 0 )
JMF 12:0071cb144c7a 943 {
JMF 12:0071cb144c7a 944 size_t use_len = len > 4 ? 4 : len;
JMF 12:0071cb144c7a 945 x = 1664525 * x + 1013904223;
JMF 12:0071cb144c7a 946 memcpy( out, &x, use_len );
JMF 12:0071cb144c7a 947 out += use_len;
JMF 12:0071cb144c7a 948 len -= use_len;
JMF 12:0071cb144c7a 949 }
JMF 12:0071cb144c7a 950
JMF 12:0071cb144c7a 951 return( 0 );
JMF 12:0071cb144c7a 952 }
JMF 12:0071cb144c7a 953
JMF 12:0071cb144c7a 954 #define TEST_ASSERT( x ) \
JMF 12:0071cb144c7a 955 do { \
JMF 12:0071cb144c7a 956 if( x ) \
JMF 12:0071cb144c7a 957 ret = 0; \
JMF 12:0071cb144c7a 958 else \
JMF 12:0071cb144c7a 959 { \
JMF 12:0071cb144c7a 960 ret = 1; \
JMF 12:0071cb144c7a 961 goto cleanup; \
JMF 12:0071cb144c7a 962 } \
JMF 12:0071cb144c7a 963 } while( 0 )
JMF 12:0071cb144c7a 964
JMF 12:0071cb144c7a 965 /*
JMF 12:0071cb144c7a 966 * Checkup routine
JMF 12:0071cb144c7a 967 */
JMF 12:0071cb144c7a 968 int mbedtls_ecjpake_self_test( int verbose )
JMF 12:0071cb144c7a 969 {
JMF 12:0071cb144c7a 970 int ret;
JMF 12:0071cb144c7a 971 mbedtls_ecjpake_context cli;
JMF 12:0071cb144c7a 972 mbedtls_ecjpake_context srv;
JMF 12:0071cb144c7a 973 unsigned char buf[512], pms[32];
JMF 12:0071cb144c7a 974 size_t len, pmslen;
JMF 12:0071cb144c7a 975
JMF 12:0071cb144c7a 976 mbedtls_ecjpake_init( &cli );
JMF 12:0071cb144c7a 977 mbedtls_ecjpake_init( &srv );
JMF 12:0071cb144c7a 978
JMF 12:0071cb144c7a 979 if( verbose != 0 )
JMF 12:0071cb144c7a 980 mbedtls_printf( " ECJPAKE test #0 (setup): " );
JMF 12:0071cb144c7a 981
JMF 12:0071cb144c7a 982 TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT,
JMF 12:0071cb144c7a 983 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
JMF 12:0071cb144c7a 984 ecjpake_test_password,
JMF 12:0071cb144c7a 985 sizeof( ecjpake_test_password ) ) == 0 );
JMF 12:0071cb144c7a 986
JMF 12:0071cb144c7a 987 TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER,
JMF 12:0071cb144c7a 988 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
JMF 12:0071cb144c7a 989 ecjpake_test_password,
JMF 12:0071cb144c7a 990 sizeof( ecjpake_test_password ) ) == 0 );
JMF 12:0071cb144c7a 991
JMF 12:0071cb144c7a 992 if( verbose != 0 )
JMF 12:0071cb144c7a 993 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 994
JMF 12:0071cb144c7a 995 if( verbose != 0 )
JMF 12:0071cb144c7a 996 mbedtls_printf( " ECJPAKE test #1 (random handshake): " );
JMF 12:0071cb144c7a 997
JMF 12:0071cb144c7a 998 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli,
JMF 12:0071cb144c7a 999 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1000
JMF 12:0071cb144c7a 1001 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 );
JMF 12:0071cb144c7a 1002
JMF 12:0071cb144c7a 1003 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv,
JMF 12:0071cb144c7a 1004 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1005
JMF 12:0071cb144c7a 1006 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 );
JMF 12:0071cb144c7a 1007
JMF 12:0071cb144c7a 1008 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv,
JMF 12:0071cb144c7a 1009 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1010
JMF 12:0071cb144c7a 1011 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 );
JMF 12:0071cb144c7a 1012
JMF 12:0071cb144c7a 1013 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
JMF 12:0071cb144c7a 1014 pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1015
JMF 12:0071cb144c7a 1016 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli,
JMF 12:0071cb144c7a 1017 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1018
JMF 12:0071cb144c7a 1019 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 );
JMF 12:0071cb144c7a 1020
JMF 12:0071cb144c7a 1021 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
JMF 12:0071cb144c7a 1022 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1023
JMF 12:0071cb144c7a 1024 TEST_ASSERT( len == pmslen );
JMF 12:0071cb144c7a 1025 TEST_ASSERT( memcmp( buf, pms, len ) == 0 );
JMF 12:0071cb144c7a 1026
JMF 12:0071cb144c7a 1027 if( verbose != 0 )
JMF 12:0071cb144c7a 1028 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 1029
JMF 12:0071cb144c7a 1030 if( verbose != 0 )
JMF 12:0071cb144c7a 1031 mbedtls_printf( " ECJPAKE test #2 (reference handshake): " );
JMF 12:0071cb144c7a 1032
JMF 12:0071cb144c7a 1033 /* Simulate generation of round one */
JMF 12:0071cb144c7a 1034 MBEDTLS_MPI_CHK( ecjpake_test_load( &cli,
JMF 12:0071cb144c7a 1035 ecjpake_test_x1, sizeof( ecjpake_test_x1 ),
JMF 12:0071cb144c7a 1036 ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) );
JMF 12:0071cb144c7a 1037
JMF 12:0071cb144c7a 1038 MBEDTLS_MPI_CHK( ecjpake_test_load( &srv,
JMF 12:0071cb144c7a 1039 ecjpake_test_x3, sizeof( ecjpake_test_x3 ),
JMF 12:0071cb144c7a 1040 ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) );
JMF 12:0071cb144c7a 1041
JMF 12:0071cb144c7a 1042 /* Read round one */
JMF 12:0071cb144c7a 1043 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv,
JMF 12:0071cb144c7a 1044 ecjpake_test_cli_one,
JMF 12:0071cb144c7a 1045 sizeof( ecjpake_test_cli_one ) ) == 0 );
JMF 12:0071cb144c7a 1046
JMF 12:0071cb144c7a 1047 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli,
JMF 12:0071cb144c7a 1048 ecjpake_test_srv_one,
JMF 12:0071cb144c7a 1049 sizeof( ecjpake_test_srv_one ) ) == 0 );
JMF 12:0071cb144c7a 1050
JMF 12:0071cb144c7a 1051 /* Skip generation of round two, read round two */
JMF 12:0071cb144c7a 1052 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli,
JMF 12:0071cb144c7a 1053 ecjpake_test_srv_two,
JMF 12:0071cb144c7a 1054 sizeof( ecjpake_test_srv_two ) ) == 0 );
JMF 12:0071cb144c7a 1055
JMF 12:0071cb144c7a 1056 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv,
JMF 12:0071cb144c7a 1057 ecjpake_test_cli_two,
JMF 12:0071cb144c7a 1058 sizeof( ecjpake_test_cli_two ) ) == 0 );
JMF 12:0071cb144c7a 1059
JMF 12:0071cb144c7a 1060 /* Server derives PMS */
JMF 12:0071cb144c7a 1061 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
JMF 12:0071cb144c7a 1062 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1063
JMF 12:0071cb144c7a 1064 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
JMF 12:0071cb144c7a 1065 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
JMF 12:0071cb144c7a 1066
JMF 12:0071cb144c7a 1067 memset( buf, 0, len ); /* Avoid interferences with next step */
JMF 12:0071cb144c7a 1068
JMF 12:0071cb144c7a 1069 /* Client derives PMS */
JMF 12:0071cb144c7a 1070 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
JMF 12:0071cb144c7a 1071 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
JMF 12:0071cb144c7a 1072
JMF 12:0071cb144c7a 1073 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
JMF 12:0071cb144c7a 1074 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
JMF 12:0071cb144c7a 1075
JMF 12:0071cb144c7a 1076 if( verbose != 0 )
JMF 12:0071cb144c7a 1077 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 1078
JMF 12:0071cb144c7a 1079 cleanup:
JMF 12:0071cb144c7a 1080 mbedtls_ecjpake_free( &cli );
JMF 12:0071cb144c7a 1081 mbedtls_ecjpake_free( &srv );
JMF 12:0071cb144c7a 1082
JMF 12:0071cb144c7a 1083 if( ret != 0 )
JMF 12:0071cb144c7a 1084 {
JMF 12:0071cb144c7a 1085 if( verbose != 0 )
JMF 12:0071cb144c7a 1086 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 1087
JMF 12:0071cb144c7a 1088 ret = 1;
JMF 12:0071cb144c7a 1089 }
JMF 12:0071cb144c7a 1090
JMF 12:0071cb144c7a 1091 if( verbose != 0 )
JMF 12:0071cb144c7a 1092 mbedtls_printf( "\n" );
JMF 12:0071cb144c7a 1093
JMF 12:0071cb144c7a 1094 return( ret );
JMF 12:0071cb144c7a 1095 }
JMF 12:0071cb144c7a 1096
JMF 12:0071cb144c7a 1097 #undef TEST_ASSERT
JMF 12:0071cb144c7a 1098
JMF 12:0071cb144c7a 1099 #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */
JMF 12:0071cb144c7a 1100
JMF 12:0071cb144c7a 1101 #endif /* MBEDTLS_SELF_TEST */
JMF 12:0071cb144c7a 1102
JMF 12:0071cb144c7a 1103 #endif /* MBEDTLS_ECJPAKE_C */