mbed-os

Dependents:   cobaLCDJoyMotor_Thread odometry_omni_3roda_v3 odometry_omni_3roda_v1 odometry_omni_3roda_v2 ... more

Committer:
be_bryan
Date:
Mon Dec 11 17:54:04 2017 +0000
Revision:
0:b74591d5ab33
motor ++

Who changed what in which revision?

UserRevisionLine numberNew contents of line
be_bryan 0:b74591d5ab33 1 /*
be_bryan 0:b74591d5ab33 2 * Elliptic curve J-PAKE
be_bryan 0:b74591d5ab33 3 *
be_bryan 0:b74591d5ab33 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
be_bryan 0:b74591d5ab33 5 * SPDX-License-Identifier: Apache-2.0
be_bryan 0:b74591d5ab33 6 *
be_bryan 0:b74591d5ab33 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
be_bryan 0:b74591d5ab33 8 * not use this file except in compliance with the License.
be_bryan 0:b74591d5ab33 9 * You may obtain a copy of the License at
be_bryan 0:b74591d5ab33 10 *
be_bryan 0:b74591d5ab33 11 * http://www.apache.org/licenses/LICENSE-2.0
be_bryan 0:b74591d5ab33 12 *
be_bryan 0:b74591d5ab33 13 * Unless required by applicable law or agreed to in writing, software
be_bryan 0:b74591d5ab33 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
be_bryan 0:b74591d5ab33 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
be_bryan 0:b74591d5ab33 16 * See the License for the specific language governing permissions and
be_bryan 0:b74591d5ab33 17 * limitations under the License.
be_bryan 0:b74591d5ab33 18 *
be_bryan 0:b74591d5ab33 19 * This file is part of mbed TLS (https://tls.mbed.org)
be_bryan 0:b74591d5ab33 20 */
be_bryan 0:b74591d5ab33 21
be_bryan 0:b74591d5ab33 22 /*
be_bryan 0:b74591d5ab33 23 * References in the code are to the Thread v1.0 Specification,
be_bryan 0:b74591d5ab33 24 * available to members of the Thread Group http://threadgroup.org/
be_bryan 0:b74591d5ab33 25 */
be_bryan 0:b74591d5ab33 26
be_bryan 0:b74591d5ab33 27 #if !defined(MBEDTLS_CONFIG_FILE)
be_bryan 0:b74591d5ab33 28 #include "mbedtls/config.h"
be_bryan 0:b74591d5ab33 29 #else
be_bryan 0:b74591d5ab33 30 #include MBEDTLS_CONFIG_FILE
be_bryan 0:b74591d5ab33 31 #endif
be_bryan 0:b74591d5ab33 32
be_bryan 0:b74591d5ab33 33 #if defined(MBEDTLS_ECJPAKE_C)
be_bryan 0:b74591d5ab33 34
be_bryan 0:b74591d5ab33 35 #include "mbedtls/ecjpake.h"
be_bryan 0:b74591d5ab33 36
be_bryan 0:b74591d5ab33 37 #include <string.h>
be_bryan 0:b74591d5ab33 38
be_bryan 0:b74591d5ab33 39 /*
be_bryan 0:b74591d5ab33 40 * Convert a mbedtls_ecjpake_role to identifier string
be_bryan 0:b74591d5ab33 41 */
be_bryan 0:b74591d5ab33 42 static const char * const ecjpake_id[] = {
be_bryan 0:b74591d5ab33 43 "client",
be_bryan 0:b74591d5ab33 44 "server"
be_bryan 0:b74591d5ab33 45 };
be_bryan 0:b74591d5ab33 46
be_bryan 0:b74591d5ab33 47 #define ID_MINE ( ecjpake_id[ ctx->role ] )
be_bryan 0:b74591d5ab33 48 #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] )
be_bryan 0:b74591d5ab33 49
be_bryan 0:b74591d5ab33 50 /*
be_bryan 0:b74591d5ab33 51 * Initialize context
be_bryan 0:b74591d5ab33 52 */
be_bryan 0:b74591d5ab33 53 void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx )
be_bryan 0:b74591d5ab33 54 {
be_bryan 0:b74591d5ab33 55 if( ctx == NULL )
be_bryan 0:b74591d5ab33 56 return;
be_bryan 0:b74591d5ab33 57
be_bryan 0:b74591d5ab33 58 ctx->md_info = NULL;
be_bryan 0:b74591d5ab33 59 mbedtls_ecp_group_init( &ctx->grp );
be_bryan 0:b74591d5ab33 60 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
be_bryan 0:b74591d5ab33 61
be_bryan 0:b74591d5ab33 62 mbedtls_ecp_point_init( &ctx->Xm1 );
be_bryan 0:b74591d5ab33 63 mbedtls_ecp_point_init( &ctx->Xm2 );
be_bryan 0:b74591d5ab33 64 mbedtls_ecp_point_init( &ctx->Xp1 );
be_bryan 0:b74591d5ab33 65 mbedtls_ecp_point_init( &ctx->Xp2 );
be_bryan 0:b74591d5ab33 66 mbedtls_ecp_point_init( &ctx->Xp );
be_bryan 0:b74591d5ab33 67
be_bryan 0:b74591d5ab33 68 mbedtls_mpi_init( &ctx->xm1 );
be_bryan 0:b74591d5ab33 69 mbedtls_mpi_init( &ctx->xm2 );
be_bryan 0:b74591d5ab33 70 mbedtls_mpi_init( &ctx->s );
be_bryan 0:b74591d5ab33 71 }
be_bryan 0:b74591d5ab33 72
be_bryan 0:b74591d5ab33 73 /*
be_bryan 0:b74591d5ab33 74 * Free context
be_bryan 0:b74591d5ab33 75 */
be_bryan 0:b74591d5ab33 76 void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx )
be_bryan 0:b74591d5ab33 77 {
be_bryan 0:b74591d5ab33 78 if( ctx == NULL )
be_bryan 0:b74591d5ab33 79 return;
be_bryan 0:b74591d5ab33 80
be_bryan 0:b74591d5ab33 81 ctx->md_info = NULL;
be_bryan 0:b74591d5ab33 82 mbedtls_ecp_group_free( &ctx->grp );
be_bryan 0:b74591d5ab33 83
be_bryan 0:b74591d5ab33 84 mbedtls_ecp_point_free( &ctx->Xm1 );
be_bryan 0:b74591d5ab33 85 mbedtls_ecp_point_free( &ctx->Xm2 );
be_bryan 0:b74591d5ab33 86 mbedtls_ecp_point_free( &ctx->Xp1 );
be_bryan 0:b74591d5ab33 87 mbedtls_ecp_point_free( &ctx->Xp2 );
be_bryan 0:b74591d5ab33 88 mbedtls_ecp_point_free( &ctx->Xp );
be_bryan 0:b74591d5ab33 89
be_bryan 0:b74591d5ab33 90 mbedtls_mpi_free( &ctx->xm1 );
be_bryan 0:b74591d5ab33 91 mbedtls_mpi_free( &ctx->xm2 );
be_bryan 0:b74591d5ab33 92 mbedtls_mpi_free( &ctx->s );
be_bryan 0:b74591d5ab33 93 }
be_bryan 0:b74591d5ab33 94
be_bryan 0:b74591d5ab33 95 /*
be_bryan 0:b74591d5ab33 96 * Setup context
be_bryan 0:b74591d5ab33 97 */
be_bryan 0:b74591d5ab33 98 int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 99 mbedtls_ecjpake_role role,
be_bryan 0:b74591d5ab33 100 mbedtls_md_type_t hash,
be_bryan 0:b74591d5ab33 101 mbedtls_ecp_group_id curve,
be_bryan 0:b74591d5ab33 102 const unsigned char *secret,
be_bryan 0:b74591d5ab33 103 size_t len )
be_bryan 0:b74591d5ab33 104 {
be_bryan 0:b74591d5ab33 105 int ret;
be_bryan 0:b74591d5ab33 106
be_bryan 0:b74591d5ab33 107 ctx->role = role;
be_bryan 0:b74591d5ab33 108
be_bryan 0:b74591d5ab33 109 if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL )
be_bryan 0:b74591d5ab33 110 return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE );
be_bryan 0:b74591d5ab33 111
be_bryan 0:b74591d5ab33 112 MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) );
be_bryan 0:b74591d5ab33 113
be_bryan 0:b74591d5ab33 114 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) );
be_bryan 0:b74591d5ab33 115
be_bryan 0:b74591d5ab33 116 cleanup:
be_bryan 0:b74591d5ab33 117 if( ret != 0 )
be_bryan 0:b74591d5ab33 118 mbedtls_ecjpake_free( ctx );
be_bryan 0:b74591d5ab33 119
be_bryan 0:b74591d5ab33 120 return( ret );
be_bryan 0:b74591d5ab33 121 }
be_bryan 0:b74591d5ab33 122
be_bryan 0:b74591d5ab33 123 /*
be_bryan 0:b74591d5ab33 124 * Check if context is ready for use
be_bryan 0:b74591d5ab33 125 */
be_bryan 0:b74591d5ab33 126 int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx )
be_bryan 0:b74591d5ab33 127 {
be_bryan 0:b74591d5ab33 128 if( ctx->md_info == NULL ||
be_bryan 0:b74591d5ab33 129 ctx->grp.id == MBEDTLS_ECP_DP_NONE ||
be_bryan 0:b74591d5ab33 130 ctx->s.p == NULL )
be_bryan 0:b74591d5ab33 131 {
be_bryan 0:b74591d5ab33 132 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 133 }
be_bryan 0:b74591d5ab33 134
be_bryan 0:b74591d5ab33 135 return( 0 );
be_bryan 0:b74591d5ab33 136 }
be_bryan 0:b74591d5ab33 137
be_bryan 0:b74591d5ab33 138 /*
be_bryan 0:b74591d5ab33 139 * Write a point plus its length to a buffer
be_bryan 0:b74591d5ab33 140 */
be_bryan 0:b74591d5ab33 141 static int ecjpake_write_len_point( unsigned char **p,
be_bryan 0:b74591d5ab33 142 const unsigned char *end,
be_bryan 0:b74591d5ab33 143 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 144 const int pf,
be_bryan 0:b74591d5ab33 145 const mbedtls_ecp_point *P )
be_bryan 0:b74591d5ab33 146 {
be_bryan 0:b74591d5ab33 147 int ret;
be_bryan 0:b74591d5ab33 148 size_t len;
be_bryan 0:b74591d5ab33 149
be_bryan 0:b74591d5ab33 150 /* Need at least 4 for length plus 1 for point */
be_bryan 0:b74591d5ab33 151 if( end < *p || end - *p < 5 )
be_bryan 0:b74591d5ab33 152 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 153
be_bryan 0:b74591d5ab33 154 ret = mbedtls_ecp_point_write_binary( grp, P, pf,
be_bryan 0:b74591d5ab33 155 &len, *p + 4, end - ( *p + 4 ) );
be_bryan 0:b74591d5ab33 156 if( ret != 0 )
be_bryan 0:b74591d5ab33 157 return( ret );
be_bryan 0:b74591d5ab33 158
be_bryan 0:b74591d5ab33 159 (*p)[0] = (unsigned char)( ( len >> 24 ) & 0xFF );
be_bryan 0:b74591d5ab33 160 (*p)[1] = (unsigned char)( ( len >> 16 ) & 0xFF );
be_bryan 0:b74591d5ab33 161 (*p)[2] = (unsigned char)( ( len >> 8 ) & 0xFF );
be_bryan 0:b74591d5ab33 162 (*p)[3] = (unsigned char)( ( len ) & 0xFF );
be_bryan 0:b74591d5ab33 163
be_bryan 0:b74591d5ab33 164 *p += 4 + len;
be_bryan 0:b74591d5ab33 165
be_bryan 0:b74591d5ab33 166 return( 0 );
be_bryan 0:b74591d5ab33 167 }
be_bryan 0:b74591d5ab33 168
be_bryan 0:b74591d5ab33 169 /*
be_bryan 0:b74591d5ab33 170 * Size of the temporary buffer for ecjpake_hash:
be_bryan 0:b74591d5ab33 171 * 3 EC points plus their length, plus ID and its length (4 + 6 bytes)
be_bryan 0:b74591d5ab33 172 */
be_bryan 0:b74591d5ab33 173 #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 )
be_bryan 0:b74591d5ab33 174
be_bryan 0:b74591d5ab33 175 /*
be_bryan 0:b74591d5ab33 176 * Compute hash for ZKP (7.4.2.2.2.1)
be_bryan 0:b74591d5ab33 177 */
be_bryan 0:b74591d5ab33 178 static int ecjpake_hash( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 179 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 180 const int pf,
be_bryan 0:b74591d5ab33 181 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 182 const mbedtls_ecp_point *V,
be_bryan 0:b74591d5ab33 183 const mbedtls_ecp_point *X,
be_bryan 0:b74591d5ab33 184 const char *id,
be_bryan 0:b74591d5ab33 185 mbedtls_mpi *h )
be_bryan 0:b74591d5ab33 186 {
be_bryan 0:b74591d5ab33 187 int ret;
be_bryan 0:b74591d5ab33 188 unsigned char buf[ECJPAKE_HASH_BUF_LEN];
be_bryan 0:b74591d5ab33 189 unsigned char *p = buf;
be_bryan 0:b74591d5ab33 190 const unsigned char *end = buf + sizeof( buf );
be_bryan 0:b74591d5ab33 191 const size_t id_len = strlen( id );
be_bryan 0:b74591d5ab33 192 unsigned char hash[MBEDTLS_MD_MAX_SIZE];
be_bryan 0:b74591d5ab33 193
be_bryan 0:b74591d5ab33 194 /* Write things to temporary buffer */
be_bryan 0:b74591d5ab33 195 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) );
be_bryan 0:b74591d5ab33 196 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) );
be_bryan 0:b74591d5ab33 197 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) );
be_bryan 0:b74591d5ab33 198
be_bryan 0:b74591d5ab33 199 if( end - p < 4 )
be_bryan 0:b74591d5ab33 200 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 201
be_bryan 0:b74591d5ab33 202 *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF );
be_bryan 0:b74591d5ab33 203 *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF );
be_bryan 0:b74591d5ab33 204 *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF );
be_bryan 0:b74591d5ab33 205 *p++ = (unsigned char)( ( id_len ) & 0xFF );
be_bryan 0:b74591d5ab33 206
be_bryan 0:b74591d5ab33 207 if( end < p || (size_t)( end - p ) < id_len )
be_bryan 0:b74591d5ab33 208 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 209
be_bryan 0:b74591d5ab33 210 memcpy( p, id, id_len );
be_bryan 0:b74591d5ab33 211 p += id_len;
be_bryan 0:b74591d5ab33 212
be_bryan 0:b74591d5ab33 213 /* Compute hash */
be_bryan 0:b74591d5ab33 214 mbedtls_md( md_info, buf, p - buf, hash );
be_bryan 0:b74591d5ab33 215
be_bryan 0:b74591d5ab33 216 /* Turn it into an integer mod n */
be_bryan 0:b74591d5ab33 217 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash,
be_bryan 0:b74591d5ab33 218 mbedtls_md_get_size( md_info ) ) );
be_bryan 0:b74591d5ab33 219 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) );
be_bryan 0:b74591d5ab33 220
be_bryan 0:b74591d5ab33 221 cleanup:
be_bryan 0:b74591d5ab33 222 return( ret );
be_bryan 0:b74591d5ab33 223 }
be_bryan 0:b74591d5ab33 224
be_bryan 0:b74591d5ab33 225 /*
be_bryan 0:b74591d5ab33 226 * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3)
be_bryan 0:b74591d5ab33 227 */
be_bryan 0:b74591d5ab33 228 static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 229 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 230 const int pf,
be_bryan 0:b74591d5ab33 231 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 232 const mbedtls_ecp_point *X,
be_bryan 0:b74591d5ab33 233 const char *id,
be_bryan 0:b74591d5ab33 234 const unsigned char **p,
be_bryan 0:b74591d5ab33 235 const unsigned char *end )
be_bryan 0:b74591d5ab33 236 {
be_bryan 0:b74591d5ab33 237 int ret;
be_bryan 0:b74591d5ab33 238 mbedtls_ecp_point V, VV;
be_bryan 0:b74591d5ab33 239 mbedtls_mpi r, h;
be_bryan 0:b74591d5ab33 240 size_t r_len;
be_bryan 0:b74591d5ab33 241
be_bryan 0:b74591d5ab33 242 mbedtls_ecp_point_init( &V );
be_bryan 0:b74591d5ab33 243 mbedtls_ecp_point_init( &VV );
be_bryan 0:b74591d5ab33 244 mbedtls_mpi_init( &r );
be_bryan 0:b74591d5ab33 245 mbedtls_mpi_init( &h );
be_bryan 0:b74591d5ab33 246
be_bryan 0:b74591d5ab33 247 /*
be_bryan 0:b74591d5ab33 248 * struct {
be_bryan 0:b74591d5ab33 249 * ECPoint V;
be_bryan 0:b74591d5ab33 250 * opaque r<1..2^8-1>;
be_bryan 0:b74591d5ab33 251 * } ECSchnorrZKP;
be_bryan 0:b74591d5ab33 252 */
be_bryan 0:b74591d5ab33 253 if( end < *p )
be_bryan 0:b74591d5ab33 254 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 255
be_bryan 0:b74591d5ab33 256 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) );
be_bryan 0:b74591d5ab33 257
be_bryan 0:b74591d5ab33 258 if( end < *p || (size_t)( end - *p ) < 1 )
be_bryan 0:b74591d5ab33 259 {
be_bryan 0:b74591d5ab33 260 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
be_bryan 0:b74591d5ab33 261 goto cleanup;
be_bryan 0:b74591d5ab33 262 }
be_bryan 0:b74591d5ab33 263
be_bryan 0:b74591d5ab33 264 r_len = *(*p)++;
be_bryan 0:b74591d5ab33 265
be_bryan 0:b74591d5ab33 266 if( end < *p || (size_t)( end - *p ) < r_len )
be_bryan 0:b74591d5ab33 267 {
be_bryan 0:b74591d5ab33 268 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
be_bryan 0:b74591d5ab33 269 goto cleanup;
be_bryan 0:b74591d5ab33 270 }
be_bryan 0:b74591d5ab33 271
be_bryan 0:b74591d5ab33 272 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) );
be_bryan 0:b74591d5ab33 273 *p += r_len;
be_bryan 0:b74591d5ab33 274
be_bryan 0:b74591d5ab33 275 /*
be_bryan 0:b74591d5ab33 276 * Verification
be_bryan 0:b74591d5ab33 277 */
be_bryan 0:b74591d5ab33 278 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
be_bryan 0:b74591d5ab33 279 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp,
be_bryan 0:b74591d5ab33 280 &VV, &h, X, &r, G ) );
be_bryan 0:b74591d5ab33 281
be_bryan 0:b74591d5ab33 282 if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 )
be_bryan 0:b74591d5ab33 283 {
be_bryan 0:b74591d5ab33 284 ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
be_bryan 0:b74591d5ab33 285 goto cleanup;
be_bryan 0:b74591d5ab33 286 }
be_bryan 0:b74591d5ab33 287
be_bryan 0:b74591d5ab33 288 cleanup:
be_bryan 0:b74591d5ab33 289 mbedtls_ecp_point_free( &V );
be_bryan 0:b74591d5ab33 290 mbedtls_ecp_point_free( &VV );
be_bryan 0:b74591d5ab33 291 mbedtls_mpi_free( &r );
be_bryan 0:b74591d5ab33 292 mbedtls_mpi_free( &h );
be_bryan 0:b74591d5ab33 293
be_bryan 0:b74591d5ab33 294 return( ret );
be_bryan 0:b74591d5ab33 295 }
be_bryan 0:b74591d5ab33 296
be_bryan 0:b74591d5ab33 297 /*
be_bryan 0:b74591d5ab33 298 * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2)
be_bryan 0:b74591d5ab33 299 */
be_bryan 0:b74591d5ab33 300 static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 301 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 302 const int pf,
be_bryan 0:b74591d5ab33 303 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 304 const mbedtls_mpi *x,
be_bryan 0:b74591d5ab33 305 const mbedtls_ecp_point *X,
be_bryan 0:b74591d5ab33 306 const char *id,
be_bryan 0:b74591d5ab33 307 unsigned char **p,
be_bryan 0:b74591d5ab33 308 const unsigned char *end,
be_bryan 0:b74591d5ab33 309 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 310 void *p_rng )
be_bryan 0:b74591d5ab33 311 {
be_bryan 0:b74591d5ab33 312 int ret;
be_bryan 0:b74591d5ab33 313 mbedtls_ecp_point V;
be_bryan 0:b74591d5ab33 314 mbedtls_mpi v;
be_bryan 0:b74591d5ab33 315 mbedtls_mpi h; /* later recycled to hold r */
be_bryan 0:b74591d5ab33 316 size_t len;
be_bryan 0:b74591d5ab33 317
be_bryan 0:b74591d5ab33 318 if( end < *p )
be_bryan 0:b74591d5ab33 319 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 320
be_bryan 0:b74591d5ab33 321 mbedtls_ecp_point_init( &V );
be_bryan 0:b74591d5ab33 322 mbedtls_mpi_init( &v );
be_bryan 0:b74591d5ab33 323 mbedtls_mpi_init( &h );
be_bryan 0:b74591d5ab33 324
be_bryan 0:b74591d5ab33 325 /* Compute signature */
be_bryan 0:b74591d5ab33 326 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp,
be_bryan 0:b74591d5ab33 327 G, &v, &V, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 328 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
be_bryan 0:b74591d5ab33 329 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */
be_bryan 0:b74591d5ab33 330 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */
be_bryan 0:b74591d5ab33 331 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */
be_bryan 0:b74591d5ab33 332
be_bryan 0:b74591d5ab33 333 /* Write it out */
be_bryan 0:b74591d5ab33 334 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V,
be_bryan 0:b74591d5ab33 335 pf, &len, *p, end - *p ) );
be_bryan 0:b74591d5ab33 336 *p += len;
be_bryan 0:b74591d5ab33 337
be_bryan 0:b74591d5ab33 338 len = mbedtls_mpi_size( &h ); /* actually r */
be_bryan 0:b74591d5ab33 339 if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 )
be_bryan 0:b74591d5ab33 340 {
be_bryan 0:b74591d5ab33 341 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
be_bryan 0:b74591d5ab33 342 goto cleanup;
be_bryan 0:b74591d5ab33 343 }
be_bryan 0:b74591d5ab33 344
be_bryan 0:b74591d5ab33 345 *(*p)++ = (unsigned char)( len & 0xFF );
be_bryan 0:b74591d5ab33 346 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */
be_bryan 0:b74591d5ab33 347 *p += len;
be_bryan 0:b74591d5ab33 348
be_bryan 0:b74591d5ab33 349 cleanup:
be_bryan 0:b74591d5ab33 350 mbedtls_ecp_point_free( &V );
be_bryan 0:b74591d5ab33 351 mbedtls_mpi_free( &v );
be_bryan 0:b74591d5ab33 352 mbedtls_mpi_free( &h );
be_bryan 0:b74591d5ab33 353
be_bryan 0:b74591d5ab33 354 return( ret );
be_bryan 0:b74591d5ab33 355 }
be_bryan 0:b74591d5ab33 356
be_bryan 0:b74591d5ab33 357 /*
be_bryan 0:b74591d5ab33 358 * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof
be_bryan 0:b74591d5ab33 359 * Output: verified public key X
be_bryan 0:b74591d5ab33 360 */
be_bryan 0:b74591d5ab33 361 static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 362 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 363 const int pf,
be_bryan 0:b74591d5ab33 364 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 365 mbedtls_ecp_point *X,
be_bryan 0:b74591d5ab33 366 const char *id,
be_bryan 0:b74591d5ab33 367 const unsigned char **p,
be_bryan 0:b74591d5ab33 368 const unsigned char *end )
be_bryan 0:b74591d5ab33 369 {
be_bryan 0:b74591d5ab33 370 int ret;
be_bryan 0:b74591d5ab33 371
be_bryan 0:b74591d5ab33 372 if( end < *p )
be_bryan 0:b74591d5ab33 373 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
be_bryan 0:b74591d5ab33 374
be_bryan 0:b74591d5ab33 375 /*
be_bryan 0:b74591d5ab33 376 * struct {
be_bryan 0:b74591d5ab33 377 * ECPoint X;
be_bryan 0:b74591d5ab33 378 * ECSchnorrZKP zkp;
be_bryan 0:b74591d5ab33 379 * } ECJPAKEKeyKP;
be_bryan 0:b74591d5ab33 380 */
be_bryan 0:b74591d5ab33 381 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) );
be_bryan 0:b74591d5ab33 382 if( mbedtls_ecp_is_zero( X ) )
be_bryan 0:b74591d5ab33 383 {
be_bryan 0:b74591d5ab33 384 ret = MBEDTLS_ERR_ECP_INVALID_KEY;
be_bryan 0:b74591d5ab33 385 goto cleanup;
be_bryan 0:b74591d5ab33 386 }
be_bryan 0:b74591d5ab33 387
be_bryan 0:b74591d5ab33 388 MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) );
be_bryan 0:b74591d5ab33 389
be_bryan 0:b74591d5ab33 390 cleanup:
be_bryan 0:b74591d5ab33 391 return( ret );
be_bryan 0:b74591d5ab33 392 }
be_bryan 0:b74591d5ab33 393
be_bryan 0:b74591d5ab33 394 /*
be_bryan 0:b74591d5ab33 395 * Generate an ECJPAKEKeyKP
be_bryan 0:b74591d5ab33 396 * Output: the serialized structure, plus private/public key pair
be_bryan 0:b74591d5ab33 397 */
be_bryan 0:b74591d5ab33 398 static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 399 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 400 const int pf,
be_bryan 0:b74591d5ab33 401 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 402 mbedtls_mpi *x,
be_bryan 0:b74591d5ab33 403 mbedtls_ecp_point *X,
be_bryan 0:b74591d5ab33 404 const char *id,
be_bryan 0:b74591d5ab33 405 unsigned char **p,
be_bryan 0:b74591d5ab33 406 const unsigned char *end,
be_bryan 0:b74591d5ab33 407 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 408 void *p_rng )
be_bryan 0:b74591d5ab33 409 {
be_bryan 0:b74591d5ab33 410 int ret;
be_bryan 0:b74591d5ab33 411 size_t len;
be_bryan 0:b74591d5ab33 412
be_bryan 0:b74591d5ab33 413 if( end < *p )
be_bryan 0:b74591d5ab33 414 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 415
be_bryan 0:b74591d5ab33 416 /* Generate key (7.4.2.3.1) and write it out */
be_bryan 0:b74591d5ab33 417 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X,
be_bryan 0:b74591d5ab33 418 f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 419 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X,
be_bryan 0:b74591d5ab33 420 pf, &len, *p, end - *p ) );
be_bryan 0:b74591d5ab33 421 *p += len;
be_bryan 0:b74591d5ab33 422
be_bryan 0:b74591d5ab33 423 /* Generate and write proof */
be_bryan 0:b74591d5ab33 424 MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id,
be_bryan 0:b74591d5ab33 425 p, end, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 426
be_bryan 0:b74591d5ab33 427 cleanup:
be_bryan 0:b74591d5ab33 428 return( ret );
be_bryan 0:b74591d5ab33 429 }
be_bryan 0:b74591d5ab33 430
be_bryan 0:b74591d5ab33 431 /*
be_bryan 0:b74591d5ab33 432 * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs
be_bryan 0:b74591d5ab33 433 * Ouputs: verified peer public keys Xa, Xb
be_bryan 0:b74591d5ab33 434 */
be_bryan 0:b74591d5ab33 435 static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 436 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 437 const int pf,
be_bryan 0:b74591d5ab33 438 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 439 mbedtls_ecp_point *Xa,
be_bryan 0:b74591d5ab33 440 mbedtls_ecp_point *Xb,
be_bryan 0:b74591d5ab33 441 const char *id,
be_bryan 0:b74591d5ab33 442 const unsigned char *buf,
be_bryan 0:b74591d5ab33 443 size_t len )
be_bryan 0:b74591d5ab33 444 {
be_bryan 0:b74591d5ab33 445 int ret;
be_bryan 0:b74591d5ab33 446 const unsigned char *p = buf;
be_bryan 0:b74591d5ab33 447 const unsigned char *end = buf + len;
be_bryan 0:b74591d5ab33 448
be_bryan 0:b74591d5ab33 449 /*
be_bryan 0:b74591d5ab33 450 * struct {
be_bryan 0:b74591d5ab33 451 * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2];
be_bryan 0:b74591d5ab33 452 * } ECJPAKEKeyKPPairList;
be_bryan 0:b74591d5ab33 453 */
be_bryan 0:b74591d5ab33 454 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) );
be_bryan 0:b74591d5ab33 455 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) );
be_bryan 0:b74591d5ab33 456
be_bryan 0:b74591d5ab33 457 if( p != end )
be_bryan 0:b74591d5ab33 458 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
be_bryan 0:b74591d5ab33 459
be_bryan 0:b74591d5ab33 460 cleanup:
be_bryan 0:b74591d5ab33 461 return( ret );
be_bryan 0:b74591d5ab33 462 }
be_bryan 0:b74591d5ab33 463
be_bryan 0:b74591d5ab33 464 /*
be_bryan 0:b74591d5ab33 465 * Generate a ECJPAKEKeyKPPairList
be_bryan 0:b74591d5ab33 466 * Outputs: the serialized structure, plus two private/public key pairs
be_bryan 0:b74591d5ab33 467 */
be_bryan 0:b74591d5ab33 468 static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info,
be_bryan 0:b74591d5ab33 469 const mbedtls_ecp_group *grp,
be_bryan 0:b74591d5ab33 470 const int pf,
be_bryan 0:b74591d5ab33 471 const mbedtls_ecp_point *G,
be_bryan 0:b74591d5ab33 472 mbedtls_mpi *xm1,
be_bryan 0:b74591d5ab33 473 mbedtls_ecp_point *Xa,
be_bryan 0:b74591d5ab33 474 mbedtls_mpi *xm2,
be_bryan 0:b74591d5ab33 475 mbedtls_ecp_point *Xb,
be_bryan 0:b74591d5ab33 476 const char *id,
be_bryan 0:b74591d5ab33 477 unsigned char *buf,
be_bryan 0:b74591d5ab33 478 size_t len,
be_bryan 0:b74591d5ab33 479 size_t *olen,
be_bryan 0:b74591d5ab33 480 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 481 void *p_rng )
be_bryan 0:b74591d5ab33 482 {
be_bryan 0:b74591d5ab33 483 int ret;
be_bryan 0:b74591d5ab33 484 unsigned char *p = buf;
be_bryan 0:b74591d5ab33 485 const unsigned char *end = buf + len;
be_bryan 0:b74591d5ab33 486
be_bryan 0:b74591d5ab33 487 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id,
be_bryan 0:b74591d5ab33 488 &p, end, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 489 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id,
be_bryan 0:b74591d5ab33 490 &p, end, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 491
be_bryan 0:b74591d5ab33 492 *olen = p - buf;
be_bryan 0:b74591d5ab33 493
be_bryan 0:b74591d5ab33 494 cleanup:
be_bryan 0:b74591d5ab33 495 return( ret );
be_bryan 0:b74591d5ab33 496 }
be_bryan 0:b74591d5ab33 497
be_bryan 0:b74591d5ab33 498 /*
be_bryan 0:b74591d5ab33 499 * Read and process the first round message
be_bryan 0:b74591d5ab33 500 */
be_bryan 0:b74591d5ab33 501 int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 502 const unsigned char *buf,
be_bryan 0:b74591d5ab33 503 size_t len )
be_bryan 0:b74591d5ab33 504 {
be_bryan 0:b74591d5ab33 505 return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format,
be_bryan 0:b74591d5ab33 506 &ctx->grp.G,
be_bryan 0:b74591d5ab33 507 &ctx->Xp1, &ctx->Xp2, ID_PEER,
be_bryan 0:b74591d5ab33 508 buf, len ) );
be_bryan 0:b74591d5ab33 509 }
be_bryan 0:b74591d5ab33 510
be_bryan 0:b74591d5ab33 511 /*
be_bryan 0:b74591d5ab33 512 * Generate and write the first round message
be_bryan 0:b74591d5ab33 513 */
be_bryan 0:b74591d5ab33 514 int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 515 unsigned char *buf, size_t len, size_t *olen,
be_bryan 0:b74591d5ab33 516 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 517 void *p_rng )
be_bryan 0:b74591d5ab33 518 {
be_bryan 0:b74591d5ab33 519 return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format,
be_bryan 0:b74591d5ab33 520 &ctx->grp.G,
be_bryan 0:b74591d5ab33 521 &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2,
be_bryan 0:b74591d5ab33 522 ID_MINE, buf, len, olen, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 523 }
be_bryan 0:b74591d5ab33 524
be_bryan 0:b74591d5ab33 525 /*
be_bryan 0:b74591d5ab33 526 * Compute the sum of three points R = A + B + C
be_bryan 0:b74591d5ab33 527 */
be_bryan 0:b74591d5ab33 528 static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R,
be_bryan 0:b74591d5ab33 529 const mbedtls_ecp_point *A,
be_bryan 0:b74591d5ab33 530 const mbedtls_ecp_point *B,
be_bryan 0:b74591d5ab33 531 const mbedtls_ecp_point *C )
be_bryan 0:b74591d5ab33 532 {
be_bryan 0:b74591d5ab33 533 int ret;
be_bryan 0:b74591d5ab33 534 mbedtls_mpi one;
be_bryan 0:b74591d5ab33 535
be_bryan 0:b74591d5ab33 536 mbedtls_mpi_init( &one );
be_bryan 0:b74591d5ab33 537
be_bryan 0:b74591d5ab33 538 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
be_bryan 0:b74591d5ab33 539 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) );
be_bryan 0:b74591d5ab33 540 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) );
be_bryan 0:b74591d5ab33 541
be_bryan 0:b74591d5ab33 542 cleanup:
be_bryan 0:b74591d5ab33 543 mbedtls_mpi_free( &one );
be_bryan 0:b74591d5ab33 544
be_bryan 0:b74591d5ab33 545 return( ret );
be_bryan 0:b74591d5ab33 546 }
be_bryan 0:b74591d5ab33 547
be_bryan 0:b74591d5ab33 548 /*
be_bryan 0:b74591d5ab33 549 * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6)
be_bryan 0:b74591d5ab33 550 */
be_bryan 0:b74591d5ab33 551 int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 552 const unsigned char *buf,
be_bryan 0:b74591d5ab33 553 size_t len )
be_bryan 0:b74591d5ab33 554 {
be_bryan 0:b74591d5ab33 555 int ret;
be_bryan 0:b74591d5ab33 556 const unsigned char *p = buf;
be_bryan 0:b74591d5ab33 557 const unsigned char *end = buf + len;
be_bryan 0:b74591d5ab33 558 mbedtls_ecp_group grp;
be_bryan 0:b74591d5ab33 559 mbedtls_ecp_point G; /* C: GB, S: GA */
be_bryan 0:b74591d5ab33 560
be_bryan 0:b74591d5ab33 561 mbedtls_ecp_group_init( &grp );
be_bryan 0:b74591d5ab33 562 mbedtls_ecp_point_init( &G );
be_bryan 0:b74591d5ab33 563
be_bryan 0:b74591d5ab33 564 /*
be_bryan 0:b74591d5ab33 565 * Server: GA = X3 + X4 + X1 (7.4.2.6.1)
be_bryan 0:b74591d5ab33 566 * Client: GB = X1 + X2 + X3 (7.4.2.5.1)
be_bryan 0:b74591d5ab33 567 * Unified: G = Xm1 + Xm2 + Xp1
be_bryan 0:b74591d5ab33 568 * We need that before parsing in order to check Xp as we read it
be_bryan 0:b74591d5ab33 569 */
be_bryan 0:b74591d5ab33 570 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
be_bryan 0:b74591d5ab33 571 &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) );
be_bryan 0:b74591d5ab33 572
be_bryan 0:b74591d5ab33 573 /*
be_bryan 0:b74591d5ab33 574 * struct {
be_bryan 0:b74591d5ab33 575 * ECParameters curve_params; // only client reading server msg
be_bryan 0:b74591d5ab33 576 * ECJPAKEKeyKP ecjpake_key_kp;
be_bryan 0:b74591d5ab33 577 * } Client/ServerECJPAKEParams;
be_bryan 0:b74591d5ab33 578 */
be_bryan 0:b74591d5ab33 579 if( ctx->role == MBEDTLS_ECJPAKE_CLIENT )
be_bryan 0:b74591d5ab33 580 {
be_bryan 0:b74591d5ab33 581 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) );
be_bryan 0:b74591d5ab33 582 if( grp.id != ctx->grp.id )
be_bryan 0:b74591d5ab33 583 {
be_bryan 0:b74591d5ab33 584 ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
be_bryan 0:b74591d5ab33 585 goto cleanup;
be_bryan 0:b74591d5ab33 586 }
be_bryan 0:b74591d5ab33 587 }
be_bryan 0:b74591d5ab33 588
be_bryan 0:b74591d5ab33 589 MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp,
be_bryan 0:b74591d5ab33 590 ctx->point_format,
be_bryan 0:b74591d5ab33 591 &G, &ctx->Xp, ID_PEER, &p, end ) );
be_bryan 0:b74591d5ab33 592
be_bryan 0:b74591d5ab33 593 if( p != end )
be_bryan 0:b74591d5ab33 594 {
be_bryan 0:b74591d5ab33 595 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
be_bryan 0:b74591d5ab33 596 goto cleanup;
be_bryan 0:b74591d5ab33 597 }
be_bryan 0:b74591d5ab33 598
be_bryan 0:b74591d5ab33 599 cleanup:
be_bryan 0:b74591d5ab33 600 mbedtls_ecp_group_free( &grp );
be_bryan 0:b74591d5ab33 601 mbedtls_ecp_point_free( &G );
be_bryan 0:b74591d5ab33 602
be_bryan 0:b74591d5ab33 603 return( ret );
be_bryan 0:b74591d5ab33 604 }
be_bryan 0:b74591d5ab33 605
be_bryan 0:b74591d5ab33 606 /*
be_bryan 0:b74591d5ab33 607 * Compute R = +/- X * S mod N, taking care not to leak S
be_bryan 0:b74591d5ab33 608 */
be_bryan 0:b74591d5ab33 609 static int ecjpake_mul_secret( mbedtls_mpi *R, int sign,
be_bryan 0:b74591d5ab33 610 const mbedtls_mpi *X,
be_bryan 0:b74591d5ab33 611 const mbedtls_mpi *S,
be_bryan 0:b74591d5ab33 612 const mbedtls_mpi *N,
be_bryan 0:b74591d5ab33 613 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 614 void *p_rng )
be_bryan 0:b74591d5ab33 615 {
be_bryan 0:b74591d5ab33 616 int ret;
be_bryan 0:b74591d5ab33 617 mbedtls_mpi b; /* Blinding value, then s + N * blinding */
be_bryan 0:b74591d5ab33 618
be_bryan 0:b74591d5ab33 619 mbedtls_mpi_init( &b );
be_bryan 0:b74591d5ab33 620
be_bryan 0:b74591d5ab33 621 /* b = s + rnd-128-bit * N */
be_bryan 0:b74591d5ab33 622 MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 623 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) );
be_bryan 0:b74591d5ab33 624 MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) );
be_bryan 0:b74591d5ab33 625
be_bryan 0:b74591d5ab33 626 /* R = sign * X * b mod N */
be_bryan 0:b74591d5ab33 627 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) );
be_bryan 0:b74591d5ab33 628 R->s *= sign;
be_bryan 0:b74591d5ab33 629 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) );
be_bryan 0:b74591d5ab33 630
be_bryan 0:b74591d5ab33 631 cleanup:
be_bryan 0:b74591d5ab33 632 mbedtls_mpi_free( &b );
be_bryan 0:b74591d5ab33 633
be_bryan 0:b74591d5ab33 634 return( ret );
be_bryan 0:b74591d5ab33 635 }
be_bryan 0:b74591d5ab33 636
be_bryan 0:b74591d5ab33 637 /*
be_bryan 0:b74591d5ab33 638 * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6)
be_bryan 0:b74591d5ab33 639 */
be_bryan 0:b74591d5ab33 640 int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 641 unsigned char *buf, size_t len, size_t *olen,
be_bryan 0:b74591d5ab33 642 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 643 void *p_rng )
be_bryan 0:b74591d5ab33 644 {
be_bryan 0:b74591d5ab33 645 int ret;
be_bryan 0:b74591d5ab33 646 mbedtls_ecp_point G; /* C: GA, S: GB */
be_bryan 0:b74591d5ab33 647 mbedtls_ecp_point Xm; /* C: Xc, S: Xs */
be_bryan 0:b74591d5ab33 648 mbedtls_mpi xm; /* C: xc, S: xs */
be_bryan 0:b74591d5ab33 649 unsigned char *p = buf;
be_bryan 0:b74591d5ab33 650 const unsigned char *end = buf + len;
be_bryan 0:b74591d5ab33 651 size_t ec_len;
be_bryan 0:b74591d5ab33 652
be_bryan 0:b74591d5ab33 653 mbedtls_ecp_point_init( &G );
be_bryan 0:b74591d5ab33 654 mbedtls_ecp_point_init( &Xm );
be_bryan 0:b74591d5ab33 655 mbedtls_mpi_init( &xm );
be_bryan 0:b74591d5ab33 656
be_bryan 0:b74591d5ab33 657 /*
be_bryan 0:b74591d5ab33 658 * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1)
be_bryan 0:b74591d5ab33 659 *
be_bryan 0:b74591d5ab33 660 * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA
be_bryan 0:b74591d5ab33 661 * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB
be_bryan 0:b74591d5ab33 662 * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G
be_bryan 0:b74591d5ab33 663 */
be_bryan 0:b74591d5ab33 664 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
be_bryan 0:b74591d5ab33 665 &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) );
be_bryan 0:b74591d5ab33 666 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s,
be_bryan 0:b74591d5ab33 667 &ctx->grp.N, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 668 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 669
be_bryan 0:b74591d5ab33 670 /*
be_bryan 0:b74591d5ab33 671 * Now write things out
be_bryan 0:b74591d5ab33 672 *
be_bryan 0:b74591d5ab33 673 * struct {
be_bryan 0:b74591d5ab33 674 * ECParameters curve_params; // only server writing its message
be_bryan 0:b74591d5ab33 675 * ECJPAKEKeyKP ecjpake_key_kp;
be_bryan 0:b74591d5ab33 676 * } Client/ServerECJPAKEParams;
be_bryan 0:b74591d5ab33 677 */
be_bryan 0:b74591d5ab33 678 if( ctx->role == MBEDTLS_ECJPAKE_SERVER )
be_bryan 0:b74591d5ab33 679 {
be_bryan 0:b74591d5ab33 680 if( end < p )
be_bryan 0:b74591d5ab33 681 {
be_bryan 0:b74591d5ab33 682 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
be_bryan 0:b74591d5ab33 683 goto cleanup;
be_bryan 0:b74591d5ab33 684 }
be_bryan 0:b74591d5ab33 685 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len,
be_bryan 0:b74591d5ab33 686 p, end - p ) );
be_bryan 0:b74591d5ab33 687 p += ec_len;
be_bryan 0:b74591d5ab33 688 }
be_bryan 0:b74591d5ab33 689
be_bryan 0:b74591d5ab33 690 if( end < p )
be_bryan 0:b74591d5ab33 691 {
be_bryan 0:b74591d5ab33 692 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
be_bryan 0:b74591d5ab33 693 goto cleanup;
be_bryan 0:b74591d5ab33 694 }
be_bryan 0:b74591d5ab33 695 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm,
be_bryan 0:b74591d5ab33 696 ctx->point_format, &ec_len, p, end - p ) );
be_bryan 0:b74591d5ab33 697 p += ec_len;
be_bryan 0:b74591d5ab33 698
be_bryan 0:b74591d5ab33 699 MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp,
be_bryan 0:b74591d5ab33 700 ctx->point_format,
be_bryan 0:b74591d5ab33 701 &G, &xm, &Xm, ID_MINE,
be_bryan 0:b74591d5ab33 702 &p, end, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 703
be_bryan 0:b74591d5ab33 704 *olen = p - buf;
be_bryan 0:b74591d5ab33 705
be_bryan 0:b74591d5ab33 706 cleanup:
be_bryan 0:b74591d5ab33 707 mbedtls_ecp_point_free( &G );
be_bryan 0:b74591d5ab33 708 mbedtls_ecp_point_free( &Xm );
be_bryan 0:b74591d5ab33 709 mbedtls_mpi_free( &xm );
be_bryan 0:b74591d5ab33 710
be_bryan 0:b74591d5ab33 711 return( ret );
be_bryan 0:b74591d5ab33 712 }
be_bryan 0:b74591d5ab33 713
be_bryan 0:b74591d5ab33 714 /*
be_bryan 0:b74591d5ab33 715 * Derive PMS (7.4.2.7 / 7.4.2.8)
be_bryan 0:b74591d5ab33 716 */
be_bryan 0:b74591d5ab33 717 int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 718 unsigned char *buf, size_t len, size_t *olen,
be_bryan 0:b74591d5ab33 719 int (*f_rng)(void *, unsigned char *, size_t),
be_bryan 0:b74591d5ab33 720 void *p_rng )
be_bryan 0:b74591d5ab33 721 {
be_bryan 0:b74591d5ab33 722 int ret;
be_bryan 0:b74591d5ab33 723 mbedtls_ecp_point K;
be_bryan 0:b74591d5ab33 724 mbedtls_mpi m_xm2_s, one;
be_bryan 0:b74591d5ab33 725 unsigned char kx[MBEDTLS_ECP_MAX_BYTES];
be_bryan 0:b74591d5ab33 726 size_t x_bytes;
be_bryan 0:b74591d5ab33 727
be_bryan 0:b74591d5ab33 728 *olen = mbedtls_md_get_size( ctx->md_info );
be_bryan 0:b74591d5ab33 729 if( len < *olen )
be_bryan 0:b74591d5ab33 730 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
be_bryan 0:b74591d5ab33 731
be_bryan 0:b74591d5ab33 732 mbedtls_ecp_point_init( &K );
be_bryan 0:b74591d5ab33 733 mbedtls_mpi_init( &m_xm2_s );
be_bryan 0:b74591d5ab33 734 mbedtls_mpi_init( &one );
be_bryan 0:b74591d5ab33 735
be_bryan 0:b74591d5ab33 736 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
be_bryan 0:b74591d5ab33 737
be_bryan 0:b74591d5ab33 738 /*
be_bryan 0:b74591d5ab33 739 * Client: K = ( Xs - X4 * x2 * s ) * x2
be_bryan 0:b74591d5ab33 740 * Server: K = ( Xc - X2 * x4 * s ) * x4
be_bryan 0:b74591d5ab33 741 * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2
be_bryan 0:b74591d5ab33 742 */
be_bryan 0:b74591d5ab33 743 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s,
be_bryan 0:b74591d5ab33 744 &ctx->grp.N, f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 745 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K,
be_bryan 0:b74591d5ab33 746 &one, &ctx->Xp,
be_bryan 0:b74591d5ab33 747 &m_xm2_s, &ctx->Xp2 ) );
be_bryan 0:b74591d5ab33 748 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K,
be_bryan 0:b74591d5ab33 749 f_rng, p_rng ) );
be_bryan 0:b74591d5ab33 750
be_bryan 0:b74591d5ab33 751 /* PMS = SHA-256( K.X ) */
be_bryan 0:b74591d5ab33 752 x_bytes = ( ctx->grp.pbits + 7 ) / 8;
be_bryan 0:b74591d5ab33 753 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) );
be_bryan 0:b74591d5ab33 754 MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) );
be_bryan 0:b74591d5ab33 755
be_bryan 0:b74591d5ab33 756 cleanup:
be_bryan 0:b74591d5ab33 757 mbedtls_ecp_point_free( &K );
be_bryan 0:b74591d5ab33 758 mbedtls_mpi_free( &m_xm2_s );
be_bryan 0:b74591d5ab33 759 mbedtls_mpi_free( &one );
be_bryan 0:b74591d5ab33 760
be_bryan 0:b74591d5ab33 761 return( ret );
be_bryan 0:b74591d5ab33 762 }
be_bryan 0:b74591d5ab33 763
be_bryan 0:b74591d5ab33 764 #undef ID_MINE
be_bryan 0:b74591d5ab33 765 #undef ID_PEER
be_bryan 0:b74591d5ab33 766
be_bryan 0:b74591d5ab33 767
be_bryan 0:b74591d5ab33 768 #if defined(MBEDTLS_SELF_TEST)
be_bryan 0:b74591d5ab33 769
be_bryan 0:b74591d5ab33 770 #if defined(MBEDTLS_PLATFORM_C)
be_bryan 0:b74591d5ab33 771 #include "mbedtls/platform.h"
be_bryan 0:b74591d5ab33 772 #else
be_bryan 0:b74591d5ab33 773 #include <stdio.h>
be_bryan 0:b74591d5ab33 774 #define mbedtls_printf printf
be_bryan 0:b74591d5ab33 775 #endif
be_bryan 0:b74591d5ab33 776
be_bryan 0:b74591d5ab33 777 #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \
be_bryan 0:b74591d5ab33 778 !defined(MBEDTLS_SHA256_C)
be_bryan 0:b74591d5ab33 779 int mbedtls_ecjpake_self_test( int verbose )
be_bryan 0:b74591d5ab33 780 {
be_bryan 0:b74591d5ab33 781 (void) verbose;
be_bryan 0:b74591d5ab33 782 return( 0 );
be_bryan 0:b74591d5ab33 783 }
be_bryan 0:b74591d5ab33 784 #else
be_bryan 0:b74591d5ab33 785
be_bryan 0:b74591d5ab33 786 static const unsigned char ecjpake_test_password[] = {
be_bryan 0:b74591d5ab33 787 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74,
be_bryan 0:b74591d5ab33 788 0x65, 0x73, 0x74
be_bryan 0:b74591d5ab33 789 };
be_bryan 0:b74591d5ab33 790
be_bryan 0:b74591d5ab33 791 static const unsigned char ecjpake_test_x1[] = {
be_bryan 0:b74591d5ab33 792 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c,
be_bryan 0:b74591d5ab33 793 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
be_bryan 0:b74591d5ab33 794 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21
be_bryan 0:b74591d5ab33 795 };
be_bryan 0:b74591d5ab33 796
be_bryan 0:b74591d5ab33 797 static const unsigned char ecjpake_test_x2[] = {
be_bryan 0:b74591d5ab33 798 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
be_bryan 0:b74591d5ab33 799 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
be_bryan 0:b74591d5ab33 800 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
be_bryan 0:b74591d5ab33 801 };
be_bryan 0:b74591d5ab33 802
be_bryan 0:b74591d5ab33 803 static const unsigned char ecjpake_test_x3[] = {
be_bryan 0:b74591d5ab33 804 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
be_bryan 0:b74591d5ab33 805 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
be_bryan 0:b74591d5ab33 806 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
be_bryan 0:b74591d5ab33 807 };
be_bryan 0:b74591d5ab33 808
be_bryan 0:b74591d5ab33 809 static const unsigned char ecjpake_test_x4[] = {
be_bryan 0:b74591d5ab33 810 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc,
be_bryan 0:b74591d5ab33 811 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8,
be_bryan 0:b74591d5ab33 812 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1
be_bryan 0:b74591d5ab33 813 };
be_bryan 0:b74591d5ab33 814
be_bryan 0:b74591d5ab33 815 static const unsigned char ecjpake_test_cli_one[] = {
be_bryan 0:b74591d5ab33 816 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19,
be_bryan 0:b74591d5ab33 817 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44,
be_bryan 0:b74591d5ab33 818 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad,
be_bryan 0:b74591d5ab33 819 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62,
be_bryan 0:b74591d5ab33 820 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9,
be_bryan 0:b74591d5ab33 821 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d,
be_bryan 0:b74591d5ab33 822 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e,
be_bryan 0:b74591d5ab33 823 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e,
be_bryan 0:b74591d5ab33 824 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73,
be_bryan 0:b74591d5ab33 825 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22,
be_bryan 0:b74591d5ab33 826 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce,
be_bryan 0:b74591d5ab33 827 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00,
be_bryan 0:b74591d5ab33 828 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b,
be_bryan 0:b74591d5ab33 829 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e,
be_bryan 0:b74591d5ab33 830 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62,
be_bryan 0:b74591d5ab33 831 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5,
be_bryan 0:b74591d5ab33 832 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb,
be_bryan 0:b74591d5ab33 833 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35,
be_bryan 0:b74591d5ab33 834 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0,
be_bryan 0:b74591d5ab33 835 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb,
be_bryan 0:b74591d5ab33 836 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47,
be_bryan 0:b74591d5ab33 837 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39,
be_bryan 0:b74591d5ab33 838 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97,
be_bryan 0:b74591d5ab33 839 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40,
be_bryan 0:b74591d5ab33 840 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d,
be_bryan 0:b74591d5ab33 841 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa,
be_bryan 0:b74591d5ab33 842 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d,
be_bryan 0:b74591d5ab33 843 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0
be_bryan 0:b74591d5ab33 844 };
be_bryan 0:b74591d5ab33 845
be_bryan 0:b74591d5ab33 846 static const unsigned char ecjpake_test_srv_one[] = {
be_bryan 0:b74591d5ab33 847 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb,
be_bryan 0:b74591d5ab33 848 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18,
be_bryan 0:b74591d5ab33 849 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47,
be_bryan 0:b74591d5ab33 850 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f,
be_bryan 0:b74591d5ab33 851 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7,
be_bryan 0:b74591d5ab33 852 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d,
be_bryan 0:b74591d5ab33 853 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64,
be_bryan 0:b74591d5ab33 854 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36,
be_bryan 0:b74591d5ab33 855 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2,
be_bryan 0:b74591d5ab33 856 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec,
be_bryan 0:b74591d5ab33 857 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16,
be_bryan 0:b74591d5ab33 858 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96,
be_bryan 0:b74591d5ab33 859 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3,
be_bryan 0:b74591d5ab33 860 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19,
be_bryan 0:b74591d5ab33 861 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f,
be_bryan 0:b74591d5ab33 862 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8,
be_bryan 0:b74591d5ab33 863 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7,
be_bryan 0:b74591d5ab33 864 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea,
be_bryan 0:b74591d5ab33 865 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5,
be_bryan 0:b74591d5ab33 866 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6,
be_bryan 0:b74591d5ab33 867 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31,
be_bryan 0:b74591d5ab33 868 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d,
be_bryan 0:b74591d5ab33 869 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8,
be_bryan 0:b74591d5ab33 870 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee,
be_bryan 0:b74591d5ab33 871 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84,
be_bryan 0:b74591d5ab33 872 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f,
be_bryan 0:b74591d5ab33 873 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80,
be_bryan 0:b74591d5ab33 874 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12
be_bryan 0:b74591d5ab33 875 };
be_bryan 0:b74591d5ab33 876
be_bryan 0:b74591d5ab33 877 static const unsigned char ecjpake_test_srv_two[] = {
be_bryan 0:b74591d5ab33 878 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23,
be_bryan 0:b74591d5ab33 879 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c,
be_bryan 0:b74591d5ab33 880 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f,
be_bryan 0:b74591d5ab33 881 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca,
be_bryan 0:b74591d5ab33 882 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26,
be_bryan 0:b74591d5ab33 883 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55,
be_bryan 0:b74591d5ab33 884 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38,
be_bryan 0:b74591d5ab33 885 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6,
be_bryan 0:b74591d5ab33 886 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9,
be_bryan 0:b74591d5ab33 887 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4,
be_bryan 0:b74591d5ab33 888 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2,
be_bryan 0:b74591d5ab33 889 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8,
be_bryan 0:b74591d5ab33 890 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd,
be_bryan 0:b74591d5ab33 891 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c
be_bryan 0:b74591d5ab33 892 };
be_bryan 0:b74591d5ab33 893
be_bryan 0:b74591d5ab33 894 static const unsigned char ecjpake_test_cli_two[] = {
be_bryan 0:b74591d5ab33 895 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46,
be_bryan 0:b74591d5ab33 896 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb,
be_bryan 0:b74591d5ab33 897 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72,
be_bryan 0:b74591d5ab33 898 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce,
be_bryan 0:b74591d5ab33 899 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98,
be_bryan 0:b74591d5ab33 900 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31,
be_bryan 0:b74591d5ab33 901 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15,
be_bryan 0:b74591d5ab33 902 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36,
be_bryan 0:b74591d5ab33 903 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8,
be_bryan 0:b74591d5ab33 904 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45,
be_bryan 0:b74591d5ab33 905 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d,
be_bryan 0:b74591d5ab33 906 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58,
be_bryan 0:b74591d5ab33 907 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82,
be_bryan 0:b74591d5ab33 908 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c
be_bryan 0:b74591d5ab33 909 };
be_bryan 0:b74591d5ab33 910
be_bryan 0:b74591d5ab33 911 static const unsigned char ecjpake_test_pms[] = {
be_bryan 0:b74591d5ab33 912 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7,
be_bryan 0:b74591d5ab33 913 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9,
be_bryan 0:b74591d5ab33 914 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51
be_bryan 0:b74591d5ab33 915 };
be_bryan 0:b74591d5ab33 916
be_bryan 0:b74591d5ab33 917 /* Load my private keys and generate the correponding public keys */
be_bryan 0:b74591d5ab33 918 static int ecjpake_test_load( mbedtls_ecjpake_context *ctx,
be_bryan 0:b74591d5ab33 919 const unsigned char *xm1, size_t len1,
be_bryan 0:b74591d5ab33 920 const unsigned char *xm2, size_t len2 )
be_bryan 0:b74591d5ab33 921 {
be_bryan 0:b74591d5ab33 922 int ret;
be_bryan 0:b74591d5ab33 923
be_bryan 0:b74591d5ab33 924 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) );
be_bryan 0:b74591d5ab33 925 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) );
be_bryan 0:b74591d5ab33 926 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1,
be_bryan 0:b74591d5ab33 927 &ctx->grp.G, NULL, NULL ) );
be_bryan 0:b74591d5ab33 928 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2,
be_bryan 0:b74591d5ab33 929 &ctx->grp.G, NULL, NULL ) );
be_bryan 0:b74591d5ab33 930
be_bryan 0:b74591d5ab33 931 cleanup:
be_bryan 0:b74591d5ab33 932 return( ret );
be_bryan 0:b74591d5ab33 933 }
be_bryan 0:b74591d5ab33 934
be_bryan 0:b74591d5ab33 935 /* For tests we don't need a secure RNG;
be_bryan 0:b74591d5ab33 936 * use the LGC from Numerical Recipes for simplicity */
be_bryan 0:b74591d5ab33 937 static int ecjpake_lgc( void *p, unsigned char *out, size_t len )
be_bryan 0:b74591d5ab33 938 {
be_bryan 0:b74591d5ab33 939 static uint32_t x = 42;
be_bryan 0:b74591d5ab33 940 (void) p;
be_bryan 0:b74591d5ab33 941
be_bryan 0:b74591d5ab33 942 while( len > 0 )
be_bryan 0:b74591d5ab33 943 {
be_bryan 0:b74591d5ab33 944 size_t use_len = len > 4 ? 4 : len;
be_bryan 0:b74591d5ab33 945 x = 1664525 * x + 1013904223;
be_bryan 0:b74591d5ab33 946 memcpy( out, &x, use_len );
be_bryan 0:b74591d5ab33 947 out += use_len;
be_bryan 0:b74591d5ab33 948 len -= use_len;
be_bryan 0:b74591d5ab33 949 }
be_bryan 0:b74591d5ab33 950
be_bryan 0:b74591d5ab33 951 return( 0 );
be_bryan 0:b74591d5ab33 952 }
be_bryan 0:b74591d5ab33 953
be_bryan 0:b74591d5ab33 954 #define TEST_ASSERT( x ) \
be_bryan 0:b74591d5ab33 955 do { \
be_bryan 0:b74591d5ab33 956 if( x ) \
be_bryan 0:b74591d5ab33 957 ret = 0; \
be_bryan 0:b74591d5ab33 958 else \
be_bryan 0:b74591d5ab33 959 { \
be_bryan 0:b74591d5ab33 960 ret = 1; \
be_bryan 0:b74591d5ab33 961 goto cleanup; \
be_bryan 0:b74591d5ab33 962 } \
be_bryan 0:b74591d5ab33 963 } while( 0 )
be_bryan 0:b74591d5ab33 964
be_bryan 0:b74591d5ab33 965 /*
be_bryan 0:b74591d5ab33 966 * Checkup routine
be_bryan 0:b74591d5ab33 967 */
be_bryan 0:b74591d5ab33 968 int mbedtls_ecjpake_self_test( int verbose )
be_bryan 0:b74591d5ab33 969 {
be_bryan 0:b74591d5ab33 970 int ret;
be_bryan 0:b74591d5ab33 971 mbedtls_ecjpake_context cli;
be_bryan 0:b74591d5ab33 972 mbedtls_ecjpake_context srv;
be_bryan 0:b74591d5ab33 973 unsigned char buf[512], pms[32];
be_bryan 0:b74591d5ab33 974 size_t len, pmslen;
be_bryan 0:b74591d5ab33 975
be_bryan 0:b74591d5ab33 976 mbedtls_ecjpake_init( &cli );
be_bryan 0:b74591d5ab33 977 mbedtls_ecjpake_init( &srv );
be_bryan 0:b74591d5ab33 978
be_bryan 0:b74591d5ab33 979 if( verbose != 0 )
be_bryan 0:b74591d5ab33 980 mbedtls_printf( " ECJPAKE test #0 (setup): " );
be_bryan 0:b74591d5ab33 981
be_bryan 0:b74591d5ab33 982 TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT,
be_bryan 0:b74591d5ab33 983 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
be_bryan 0:b74591d5ab33 984 ecjpake_test_password,
be_bryan 0:b74591d5ab33 985 sizeof( ecjpake_test_password ) ) == 0 );
be_bryan 0:b74591d5ab33 986
be_bryan 0:b74591d5ab33 987 TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER,
be_bryan 0:b74591d5ab33 988 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
be_bryan 0:b74591d5ab33 989 ecjpake_test_password,
be_bryan 0:b74591d5ab33 990 sizeof( ecjpake_test_password ) ) == 0 );
be_bryan 0:b74591d5ab33 991
be_bryan 0:b74591d5ab33 992 if( verbose != 0 )
be_bryan 0:b74591d5ab33 993 mbedtls_printf( "passed\n" );
be_bryan 0:b74591d5ab33 994
be_bryan 0:b74591d5ab33 995 if( verbose != 0 )
be_bryan 0:b74591d5ab33 996 mbedtls_printf( " ECJPAKE test #1 (random handshake): " );
be_bryan 0:b74591d5ab33 997
be_bryan 0:b74591d5ab33 998 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli,
be_bryan 0:b74591d5ab33 999 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1000
be_bryan 0:b74591d5ab33 1001 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 );
be_bryan 0:b74591d5ab33 1002
be_bryan 0:b74591d5ab33 1003 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv,
be_bryan 0:b74591d5ab33 1004 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1005
be_bryan 0:b74591d5ab33 1006 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 );
be_bryan 0:b74591d5ab33 1007
be_bryan 0:b74591d5ab33 1008 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv,
be_bryan 0:b74591d5ab33 1009 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1010
be_bryan 0:b74591d5ab33 1011 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 );
be_bryan 0:b74591d5ab33 1012
be_bryan 0:b74591d5ab33 1013 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
be_bryan 0:b74591d5ab33 1014 pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1015
be_bryan 0:b74591d5ab33 1016 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli,
be_bryan 0:b74591d5ab33 1017 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1018
be_bryan 0:b74591d5ab33 1019 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 );
be_bryan 0:b74591d5ab33 1020
be_bryan 0:b74591d5ab33 1021 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
be_bryan 0:b74591d5ab33 1022 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1023
be_bryan 0:b74591d5ab33 1024 TEST_ASSERT( len == pmslen );
be_bryan 0:b74591d5ab33 1025 TEST_ASSERT( memcmp( buf, pms, len ) == 0 );
be_bryan 0:b74591d5ab33 1026
be_bryan 0:b74591d5ab33 1027 if( verbose != 0 )
be_bryan 0:b74591d5ab33 1028 mbedtls_printf( "passed\n" );
be_bryan 0:b74591d5ab33 1029
be_bryan 0:b74591d5ab33 1030 if( verbose != 0 )
be_bryan 0:b74591d5ab33 1031 mbedtls_printf( " ECJPAKE test #2 (reference handshake): " );
be_bryan 0:b74591d5ab33 1032
be_bryan 0:b74591d5ab33 1033 /* Simulate generation of round one */
be_bryan 0:b74591d5ab33 1034 MBEDTLS_MPI_CHK( ecjpake_test_load( &cli,
be_bryan 0:b74591d5ab33 1035 ecjpake_test_x1, sizeof( ecjpake_test_x1 ),
be_bryan 0:b74591d5ab33 1036 ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) );
be_bryan 0:b74591d5ab33 1037
be_bryan 0:b74591d5ab33 1038 MBEDTLS_MPI_CHK( ecjpake_test_load( &srv,
be_bryan 0:b74591d5ab33 1039 ecjpake_test_x3, sizeof( ecjpake_test_x3 ),
be_bryan 0:b74591d5ab33 1040 ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) );
be_bryan 0:b74591d5ab33 1041
be_bryan 0:b74591d5ab33 1042 /* Read round one */
be_bryan 0:b74591d5ab33 1043 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv,
be_bryan 0:b74591d5ab33 1044 ecjpake_test_cli_one,
be_bryan 0:b74591d5ab33 1045 sizeof( ecjpake_test_cli_one ) ) == 0 );
be_bryan 0:b74591d5ab33 1046
be_bryan 0:b74591d5ab33 1047 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli,
be_bryan 0:b74591d5ab33 1048 ecjpake_test_srv_one,
be_bryan 0:b74591d5ab33 1049 sizeof( ecjpake_test_srv_one ) ) == 0 );
be_bryan 0:b74591d5ab33 1050
be_bryan 0:b74591d5ab33 1051 /* Skip generation of round two, read round two */
be_bryan 0:b74591d5ab33 1052 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli,
be_bryan 0:b74591d5ab33 1053 ecjpake_test_srv_two,
be_bryan 0:b74591d5ab33 1054 sizeof( ecjpake_test_srv_two ) ) == 0 );
be_bryan 0:b74591d5ab33 1055
be_bryan 0:b74591d5ab33 1056 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv,
be_bryan 0:b74591d5ab33 1057 ecjpake_test_cli_two,
be_bryan 0:b74591d5ab33 1058 sizeof( ecjpake_test_cli_two ) ) == 0 );
be_bryan 0:b74591d5ab33 1059
be_bryan 0:b74591d5ab33 1060 /* Server derives PMS */
be_bryan 0:b74591d5ab33 1061 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
be_bryan 0:b74591d5ab33 1062 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1063
be_bryan 0:b74591d5ab33 1064 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
be_bryan 0:b74591d5ab33 1065 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
be_bryan 0:b74591d5ab33 1066
be_bryan 0:b74591d5ab33 1067 memset( buf, 0, len ); /* Avoid interferences with next step */
be_bryan 0:b74591d5ab33 1068
be_bryan 0:b74591d5ab33 1069 /* Client derives PMS */
be_bryan 0:b74591d5ab33 1070 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
be_bryan 0:b74591d5ab33 1071 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
be_bryan 0:b74591d5ab33 1072
be_bryan 0:b74591d5ab33 1073 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
be_bryan 0:b74591d5ab33 1074 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
be_bryan 0:b74591d5ab33 1075
be_bryan 0:b74591d5ab33 1076 if( verbose != 0 )
be_bryan 0:b74591d5ab33 1077 mbedtls_printf( "passed\n" );
be_bryan 0:b74591d5ab33 1078
be_bryan 0:b74591d5ab33 1079 cleanup:
be_bryan 0:b74591d5ab33 1080 mbedtls_ecjpake_free( &cli );
be_bryan 0:b74591d5ab33 1081 mbedtls_ecjpake_free( &srv );
be_bryan 0:b74591d5ab33 1082
be_bryan 0:b74591d5ab33 1083 if( ret != 0 )
be_bryan 0:b74591d5ab33 1084 {
be_bryan 0:b74591d5ab33 1085 if( verbose != 0 )
be_bryan 0:b74591d5ab33 1086 mbedtls_printf( "failed\n" );
be_bryan 0:b74591d5ab33 1087
be_bryan 0:b74591d5ab33 1088 ret = 1;
be_bryan 0:b74591d5ab33 1089 }
be_bryan 0:b74591d5ab33 1090
be_bryan 0:b74591d5ab33 1091 if( verbose != 0 )
be_bryan 0:b74591d5ab33 1092 mbedtls_printf( "\n" );
be_bryan 0:b74591d5ab33 1093
be_bryan 0:b74591d5ab33 1094 return( ret );
be_bryan 0:b74591d5ab33 1095 }
be_bryan 0:b74591d5ab33 1096
be_bryan 0:b74591d5ab33 1097 #undef TEST_ASSERT
be_bryan 0:b74591d5ab33 1098
be_bryan 0:b74591d5ab33 1099 #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */
be_bryan 0:b74591d5ab33 1100
be_bryan 0:b74591d5ab33 1101 #endif /* MBEDTLS_SELF_TEST */
be_bryan 0:b74591d5ab33 1102
be_bryan 0:b74591d5ab33 1103 #endif /* MBEDTLS_ECJPAKE_C */