Pinned to some recent date

Committer:
Simon Cooksey
Date:
Thu Nov 17 16:43:53 2016 +0000
Revision:
0:fb7af294d5d9
Initial commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
Simon Cooksey 0:fb7af294d5d9 1 /*
Simon Cooksey 0:fb7af294d5d9 2 * Elliptic curve J-PAKE
Simon Cooksey 0:fb7af294d5d9 3 *
Simon Cooksey 0:fb7af294d5d9 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Simon Cooksey 0:fb7af294d5d9 5 * SPDX-License-Identifier: Apache-2.0
Simon Cooksey 0:fb7af294d5d9 6 *
Simon Cooksey 0:fb7af294d5d9 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
Simon Cooksey 0:fb7af294d5d9 8 * not use this file except in compliance with the License.
Simon Cooksey 0:fb7af294d5d9 9 * You may obtain a copy of the License at
Simon Cooksey 0:fb7af294d5d9 10 *
Simon Cooksey 0:fb7af294d5d9 11 * http://www.apache.org/licenses/LICENSE-2.0
Simon Cooksey 0:fb7af294d5d9 12 *
Simon Cooksey 0:fb7af294d5d9 13 * Unless required by applicable law or agreed to in writing, software
Simon Cooksey 0:fb7af294d5d9 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
Simon Cooksey 0:fb7af294d5d9 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Simon Cooksey 0:fb7af294d5d9 16 * See the License for the specific language governing permissions and
Simon Cooksey 0:fb7af294d5d9 17 * limitations under the License.
Simon Cooksey 0:fb7af294d5d9 18 *
Simon Cooksey 0:fb7af294d5d9 19 * This file is part of mbed TLS (https://tls.mbed.org)
Simon Cooksey 0:fb7af294d5d9 20 */
Simon Cooksey 0:fb7af294d5d9 21
Simon Cooksey 0:fb7af294d5d9 22 /*
Simon Cooksey 0:fb7af294d5d9 23 * References in the code are to the Thread v1.0 Specification,
Simon Cooksey 0:fb7af294d5d9 24 * available to members of the Thread Group http://threadgroup.org/
Simon Cooksey 0:fb7af294d5d9 25 */
Simon Cooksey 0:fb7af294d5d9 26
Simon Cooksey 0:fb7af294d5d9 27 #if !defined(MBEDTLS_CONFIG_FILE)
Simon Cooksey 0:fb7af294d5d9 28 #include "mbedtls/config.h"
Simon Cooksey 0:fb7af294d5d9 29 #else
Simon Cooksey 0:fb7af294d5d9 30 #include MBEDTLS_CONFIG_FILE
Simon Cooksey 0:fb7af294d5d9 31 #endif
Simon Cooksey 0:fb7af294d5d9 32
Simon Cooksey 0:fb7af294d5d9 33 #if defined(MBEDTLS_ECJPAKE_C)
Simon Cooksey 0:fb7af294d5d9 34
Simon Cooksey 0:fb7af294d5d9 35 #include "mbedtls/ecjpake.h"
Simon Cooksey 0:fb7af294d5d9 36
Simon Cooksey 0:fb7af294d5d9 37 #include <string.h>
Simon Cooksey 0:fb7af294d5d9 38
Simon Cooksey 0:fb7af294d5d9 39 /*
Simon Cooksey 0:fb7af294d5d9 40 * Convert a mbedtls_ecjpake_role to identifier string
Simon Cooksey 0:fb7af294d5d9 41 */
Simon Cooksey 0:fb7af294d5d9 42 static const char * const ecjpake_id[] = {
Simon Cooksey 0:fb7af294d5d9 43 "client",
Simon Cooksey 0:fb7af294d5d9 44 "server"
Simon Cooksey 0:fb7af294d5d9 45 };
Simon Cooksey 0:fb7af294d5d9 46
Simon Cooksey 0:fb7af294d5d9 47 #define ID_MINE ( ecjpake_id[ ctx->role ] )
Simon Cooksey 0:fb7af294d5d9 48 #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] )
Simon Cooksey 0:fb7af294d5d9 49
Simon Cooksey 0:fb7af294d5d9 50 /*
Simon Cooksey 0:fb7af294d5d9 51 * Initialize context
Simon Cooksey 0:fb7af294d5d9 52 */
Simon Cooksey 0:fb7af294d5d9 53 void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx )
Simon Cooksey 0:fb7af294d5d9 54 {
Simon Cooksey 0:fb7af294d5d9 55 if( ctx == NULL )
Simon Cooksey 0:fb7af294d5d9 56 return;
Simon Cooksey 0:fb7af294d5d9 57
Simon Cooksey 0:fb7af294d5d9 58 ctx->md_info = NULL;
Simon Cooksey 0:fb7af294d5d9 59 mbedtls_ecp_group_init( &ctx->grp );
Simon Cooksey 0:fb7af294d5d9 60 ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED;
Simon Cooksey 0:fb7af294d5d9 61
Simon Cooksey 0:fb7af294d5d9 62 mbedtls_ecp_point_init( &ctx->Xm1 );
Simon Cooksey 0:fb7af294d5d9 63 mbedtls_ecp_point_init( &ctx->Xm2 );
Simon Cooksey 0:fb7af294d5d9 64 mbedtls_ecp_point_init( &ctx->Xp1 );
Simon Cooksey 0:fb7af294d5d9 65 mbedtls_ecp_point_init( &ctx->Xp2 );
Simon Cooksey 0:fb7af294d5d9 66 mbedtls_ecp_point_init( &ctx->Xp );
Simon Cooksey 0:fb7af294d5d9 67
Simon Cooksey 0:fb7af294d5d9 68 mbedtls_mpi_init( &ctx->xm1 );
Simon Cooksey 0:fb7af294d5d9 69 mbedtls_mpi_init( &ctx->xm2 );
Simon Cooksey 0:fb7af294d5d9 70 mbedtls_mpi_init( &ctx->s );
Simon Cooksey 0:fb7af294d5d9 71 }
Simon Cooksey 0:fb7af294d5d9 72
Simon Cooksey 0:fb7af294d5d9 73 /*
Simon Cooksey 0:fb7af294d5d9 74 * Free context
Simon Cooksey 0:fb7af294d5d9 75 */
Simon Cooksey 0:fb7af294d5d9 76 void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx )
Simon Cooksey 0:fb7af294d5d9 77 {
Simon Cooksey 0:fb7af294d5d9 78 if( ctx == NULL )
Simon Cooksey 0:fb7af294d5d9 79 return;
Simon Cooksey 0:fb7af294d5d9 80
Simon Cooksey 0:fb7af294d5d9 81 ctx->md_info = NULL;
Simon Cooksey 0:fb7af294d5d9 82 mbedtls_ecp_group_free( &ctx->grp );
Simon Cooksey 0:fb7af294d5d9 83
Simon Cooksey 0:fb7af294d5d9 84 mbedtls_ecp_point_free( &ctx->Xm1 );
Simon Cooksey 0:fb7af294d5d9 85 mbedtls_ecp_point_free( &ctx->Xm2 );
Simon Cooksey 0:fb7af294d5d9 86 mbedtls_ecp_point_free( &ctx->Xp1 );
Simon Cooksey 0:fb7af294d5d9 87 mbedtls_ecp_point_free( &ctx->Xp2 );
Simon Cooksey 0:fb7af294d5d9 88 mbedtls_ecp_point_free( &ctx->Xp );
Simon Cooksey 0:fb7af294d5d9 89
Simon Cooksey 0:fb7af294d5d9 90 mbedtls_mpi_free( &ctx->xm1 );
Simon Cooksey 0:fb7af294d5d9 91 mbedtls_mpi_free( &ctx->xm2 );
Simon Cooksey 0:fb7af294d5d9 92 mbedtls_mpi_free( &ctx->s );
Simon Cooksey 0:fb7af294d5d9 93 }
Simon Cooksey 0:fb7af294d5d9 94
Simon Cooksey 0:fb7af294d5d9 95 /*
Simon Cooksey 0:fb7af294d5d9 96 * Setup context
Simon Cooksey 0:fb7af294d5d9 97 */
Simon Cooksey 0:fb7af294d5d9 98 int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 99 mbedtls_ecjpake_role role,
Simon Cooksey 0:fb7af294d5d9 100 mbedtls_md_type_t hash,
Simon Cooksey 0:fb7af294d5d9 101 mbedtls_ecp_group_id curve,
Simon Cooksey 0:fb7af294d5d9 102 const unsigned char *secret,
Simon Cooksey 0:fb7af294d5d9 103 size_t len )
Simon Cooksey 0:fb7af294d5d9 104 {
Simon Cooksey 0:fb7af294d5d9 105 int ret;
Simon Cooksey 0:fb7af294d5d9 106
Simon Cooksey 0:fb7af294d5d9 107 ctx->role = role;
Simon Cooksey 0:fb7af294d5d9 108
Simon Cooksey 0:fb7af294d5d9 109 if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL )
Simon Cooksey 0:fb7af294d5d9 110 return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE );
Simon Cooksey 0:fb7af294d5d9 111
Simon Cooksey 0:fb7af294d5d9 112 MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) );
Simon Cooksey 0:fb7af294d5d9 113
Simon Cooksey 0:fb7af294d5d9 114 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) );
Simon Cooksey 0:fb7af294d5d9 115
Simon Cooksey 0:fb7af294d5d9 116 cleanup:
Simon Cooksey 0:fb7af294d5d9 117 if( ret != 0 )
Simon Cooksey 0:fb7af294d5d9 118 mbedtls_ecjpake_free( ctx );
Simon Cooksey 0:fb7af294d5d9 119
Simon Cooksey 0:fb7af294d5d9 120 return( ret );
Simon Cooksey 0:fb7af294d5d9 121 }
Simon Cooksey 0:fb7af294d5d9 122
Simon Cooksey 0:fb7af294d5d9 123 /*
Simon Cooksey 0:fb7af294d5d9 124 * Check if context is ready for use
Simon Cooksey 0:fb7af294d5d9 125 */
Simon Cooksey 0:fb7af294d5d9 126 int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx )
Simon Cooksey 0:fb7af294d5d9 127 {
Simon Cooksey 0:fb7af294d5d9 128 if( ctx->md_info == NULL ||
Simon Cooksey 0:fb7af294d5d9 129 ctx->grp.id == MBEDTLS_ECP_DP_NONE ||
Simon Cooksey 0:fb7af294d5d9 130 ctx->s.p == NULL )
Simon Cooksey 0:fb7af294d5d9 131 {
Simon Cooksey 0:fb7af294d5d9 132 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Simon Cooksey 0:fb7af294d5d9 133 }
Simon Cooksey 0:fb7af294d5d9 134
Simon Cooksey 0:fb7af294d5d9 135 return( 0 );
Simon Cooksey 0:fb7af294d5d9 136 }
Simon Cooksey 0:fb7af294d5d9 137
Simon Cooksey 0:fb7af294d5d9 138 /*
Simon Cooksey 0:fb7af294d5d9 139 * Write a point plus its length to a buffer
Simon Cooksey 0:fb7af294d5d9 140 */
Simon Cooksey 0:fb7af294d5d9 141 static int ecjpake_write_len_point( unsigned char **p,
Simon Cooksey 0:fb7af294d5d9 142 const unsigned char *end,
Simon Cooksey 0:fb7af294d5d9 143 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 144 const int pf,
Simon Cooksey 0:fb7af294d5d9 145 const mbedtls_ecp_point *P )
Simon Cooksey 0:fb7af294d5d9 146 {
Simon Cooksey 0:fb7af294d5d9 147 int ret;
Simon Cooksey 0:fb7af294d5d9 148 size_t len;
Simon Cooksey 0:fb7af294d5d9 149
Simon Cooksey 0:fb7af294d5d9 150 /* Need at least 4 for length plus 1 for point */
Simon Cooksey 0:fb7af294d5d9 151 if( end < *p || end - *p < 5 )
Simon Cooksey 0:fb7af294d5d9 152 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 153
Simon Cooksey 0:fb7af294d5d9 154 ret = mbedtls_ecp_point_write_binary( grp, P, pf,
Simon Cooksey 0:fb7af294d5d9 155 &len, *p + 4, end - ( *p + 4 ) );
Simon Cooksey 0:fb7af294d5d9 156 if( ret != 0 )
Simon Cooksey 0:fb7af294d5d9 157 return( ret );
Simon Cooksey 0:fb7af294d5d9 158
Simon Cooksey 0:fb7af294d5d9 159 (*p)[0] = (unsigned char)( ( len >> 24 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 160 (*p)[1] = (unsigned char)( ( len >> 16 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 161 (*p)[2] = (unsigned char)( ( len >> 8 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 162 (*p)[3] = (unsigned char)( ( len ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 163
Simon Cooksey 0:fb7af294d5d9 164 *p += 4 + len;
Simon Cooksey 0:fb7af294d5d9 165
Simon Cooksey 0:fb7af294d5d9 166 return( 0 );
Simon Cooksey 0:fb7af294d5d9 167 }
Simon Cooksey 0:fb7af294d5d9 168
Simon Cooksey 0:fb7af294d5d9 169 /*
Simon Cooksey 0:fb7af294d5d9 170 * Size of the temporary buffer for ecjpake_hash:
Simon Cooksey 0:fb7af294d5d9 171 * 3 EC points plus their length, plus ID and its length (4 + 6 bytes)
Simon Cooksey 0:fb7af294d5d9 172 */
Simon Cooksey 0:fb7af294d5d9 173 #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 )
Simon Cooksey 0:fb7af294d5d9 174
Simon Cooksey 0:fb7af294d5d9 175 /*
Simon Cooksey 0:fb7af294d5d9 176 * Compute hash for ZKP (7.4.2.2.2.1)
Simon Cooksey 0:fb7af294d5d9 177 */
Simon Cooksey 0:fb7af294d5d9 178 static int ecjpake_hash( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 179 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 180 const int pf,
Simon Cooksey 0:fb7af294d5d9 181 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 182 const mbedtls_ecp_point *V,
Simon Cooksey 0:fb7af294d5d9 183 const mbedtls_ecp_point *X,
Simon Cooksey 0:fb7af294d5d9 184 const char *id,
Simon Cooksey 0:fb7af294d5d9 185 mbedtls_mpi *h )
Simon Cooksey 0:fb7af294d5d9 186 {
Simon Cooksey 0:fb7af294d5d9 187 int ret;
Simon Cooksey 0:fb7af294d5d9 188 unsigned char buf[ECJPAKE_HASH_BUF_LEN];
Simon Cooksey 0:fb7af294d5d9 189 unsigned char *p = buf;
Simon Cooksey 0:fb7af294d5d9 190 const unsigned char *end = buf + sizeof( buf );
Simon Cooksey 0:fb7af294d5d9 191 const size_t id_len = strlen( id );
Simon Cooksey 0:fb7af294d5d9 192 unsigned char hash[MBEDTLS_MD_MAX_SIZE];
Simon Cooksey 0:fb7af294d5d9 193
Simon Cooksey 0:fb7af294d5d9 194 /* Write things to temporary buffer */
Simon Cooksey 0:fb7af294d5d9 195 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) );
Simon Cooksey 0:fb7af294d5d9 196 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) );
Simon Cooksey 0:fb7af294d5d9 197 MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) );
Simon Cooksey 0:fb7af294d5d9 198
Simon Cooksey 0:fb7af294d5d9 199 if( end - p < 4 )
Simon Cooksey 0:fb7af294d5d9 200 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 201
Simon Cooksey 0:fb7af294d5d9 202 *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 203 *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 204 *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 205 *p++ = (unsigned char)( ( id_len ) & 0xFF );
Simon Cooksey 0:fb7af294d5d9 206
Simon Cooksey 0:fb7af294d5d9 207 if( end < p || (size_t)( end - p ) < id_len )
Simon Cooksey 0:fb7af294d5d9 208 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 209
Simon Cooksey 0:fb7af294d5d9 210 memcpy( p, id, id_len );
Simon Cooksey 0:fb7af294d5d9 211 p += id_len;
Simon Cooksey 0:fb7af294d5d9 212
Simon Cooksey 0:fb7af294d5d9 213 /* Compute hash */
Simon Cooksey 0:fb7af294d5d9 214 mbedtls_md( md_info, buf, p - buf, hash );
Simon Cooksey 0:fb7af294d5d9 215
Simon Cooksey 0:fb7af294d5d9 216 /* Turn it into an integer mod n */
Simon Cooksey 0:fb7af294d5d9 217 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash,
Simon Cooksey 0:fb7af294d5d9 218 mbedtls_md_get_size( md_info ) ) );
Simon Cooksey 0:fb7af294d5d9 219 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) );
Simon Cooksey 0:fb7af294d5d9 220
Simon Cooksey 0:fb7af294d5d9 221 cleanup:
Simon Cooksey 0:fb7af294d5d9 222 return( ret );
Simon Cooksey 0:fb7af294d5d9 223 }
Simon Cooksey 0:fb7af294d5d9 224
Simon Cooksey 0:fb7af294d5d9 225 /*
Simon Cooksey 0:fb7af294d5d9 226 * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3)
Simon Cooksey 0:fb7af294d5d9 227 */
Simon Cooksey 0:fb7af294d5d9 228 static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 229 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 230 const int pf,
Simon Cooksey 0:fb7af294d5d9 231 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 232 const mbedtls_ecp_point *X,
Simon Cooksey 0:fb7af294d5d9 233 const char *id,
Simon Cooksey 0:fb7af294d5d9 234 const unsigned char **p,
Simon Cooksey 0:fb7af294d5d9 235 const unsigned char *end )
Simon Cooksey 0:fb7af294d5d9 236 {
Simon Cooksey 0:fb7af294d5d9 237 int ret;
Simon Cooksey 0:fb7af294d5d9 238 mbedtls_ecp_point V, VV;
Simon Cooksey 0:fb7af294d5d9 239 mbedtls_mpi r, h;
Simon Cooksey 0:fb7af294d5d9 240 size_t r_len;
Simon Cooksey 0:fb7af294d5d9 241
Simon Cooksey 0:fb7af294d5d9 242 mbedtls_ecp_point_init( &V );
Simon Cooksey 0:fb7af294d5d9 243 mbedtls_ecp_point_init( &VV );
Simon Cooksey 0:fb7af294d5d9 244 mbedtls_mpi_init( &r );
Simon Cooksey 0:fb7af294d5d9 245 mbedtls_mpi_init( &h );
Simon Cooksey 0:fb7af294d5d9 246
Simon Cooksey 0:fb7af294d5d9 247 /*
Simon Cooksey 0:fb7af294d5d9 248 * struct {
Simon Cooksey 0:fb7af294d5d9 249 * ECPoint V;
Simon Cooksey 0:fb7af294d5d9 250 * opaque r<1..2^8-1>;
Simon Cooksey 0:fb7af294d5d9 251 * } ECSchnorrZKP;
Simon Cooksey 0:fb7af294d5d9 252 */
Simon Cooksey 0:fb7af294d5d9 253 if( end < *p )
Simon Cooksey 0:fb7af294d5d9 254 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Simon Cooksey 0:fb7af294d5d9 255
Simon Cooksey 0:fb7af294d5d9 256 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) );
Simon Cooksey 0:fb7af294d5d9 257
Simon Cooksey 0:fb7af294d5d9 258 if( end < *p || (size_t)( end - *p ) < 1 )
Simon Cooksey 0:fb7af294d5d9 259 {
Simon Cooksey 0:fb7af294d5d9 260 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Simon Cooksey 0:fb7af294d5d9 261 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 262 }
Simon Cooksey 0:fb7af294d5d9 263
Simon Cooksey 0:fb7af294d5d9 264 r_len = *(*p)++;
Simon Cooksey 0:fb7af294d5d9 265
Simon Cooksey 0:fb7af294d5d9 266 if( end < *p || (size_t)( end - *p ) < r_len )
Simon Cooksey 0:fb7af294d5d9 267 {
Simon Cooksey 0:fb7af294d5d9 268 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Simon Cooksey 0:fb7af294d5d9 269 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 270 }
Simon Cooksey 0:fb7af294d5d9 271
Simon Cooksey 0:fb7af294d5d9 272 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) );
Simon Cooksey 0:fb7af294d5d9 273 *p += r_len;
Simon Cooksey 0:fb7af294d5d9 274
Simon Cooksey 0:fb7af294d5d9 275 /*
Simon Cooksey 0:fb7af294d5d9 276 * Verification
Simon Cooksey 0:fb7af294d5d9 277 */
Simon Cooksey 0:fb7af294d5d9 278 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
Simon Cooksey 0:fb7af294d5d9 279 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp,
Simon Cooksey 0:fb7af294d5d9 280 &VV, &h, X, &r, G ) );
Simon Cooksey 0:fb7af294d5d9 281
Simon Cooksey 0:fb7af294d5d9 282 if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 )
Simon Cooksey 0:fb7af294d5d9 283 {
Simon Cooksey 0:fb7af294d5d9 284 ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
Simon Cooksey 0:fb7af294d5d9 285 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 286 }
Simon Cooksey 0:fb7af294d5d9 287
Simon Cooksey 0:fb7af294d5d9 288 cleanup:
Simon Cooksey 0:fb7af294d5d9 289 mbedtls_ecp_point_free( &V );
Simon Cooksey 0:fb7af294d5d9 290 mbedtls_ecp_point_free( &VV );
Simon Cooksey 0:fb7af294d5d9 291 mbedtls_mpi_free( &r );
Simon Cooksey 0:fb7af294d5d9 292 mbedtls_mpi_free( &h );
Simon Cooksey 0:fb7af294d5d9 293
Simon Cooksey 0:fb7af294d5d9 294 return( ret );
Simon Cooksey 0:fb7af294d5d9 295 }
Simon Cooksey 0:fb7af294d5d9 296
Simon Cooksey 0:fb7af294d5d9 297 /*
Simon Cooksey 0:fb7af294d5d9 298 * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2)
Simon Cooksey 0:fb7af294d5d9 299 */
Simon Cooksey 0:fb7af294d5d9 300 static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 301 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 302 const int pf,
Simon Cooksey 0:fb7af294d5d9 303 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 304 const mbedtls_mpi *x,
Simon Cooksey 0:fb7af294d5d9 305 const mbedtls_ecp_point *X,
Simon Cooksey 0:fb7af294d5d9 306 const char *id,
Simon Cooksey 0:fb7af294d5d9 307 unsigned char **p,
Simon Cooksey 0:fb7af294d5d9 308 const unsigned char *end,
Simon Cooksey 0:fb7af294d5d9 309 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 310 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 311 {
Simon Cooksey 0:fb7af294d5d9 312 int ret;
Simon Cooksey 0:fb7af294d5d9 313 mbedtls_ecp_point V;
Simon Cooksey 0:fb7af294d5d9 314 mbedtls_mpi v;
Simon Cooksey 0:fb7af294d5d9 315 mbedtls_mpi h; /* later recycled to hold r */
Simon Cooksey 0:fb7af294d5d9 316 size_t len;
Simon Cooksey 0:fb7af294d5d9 317
Simon Cooksey 0:fb7af294d5d9 318 if( end < *p )
Simon Cooksey 0:fb7af294d5d9 319 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 320
Simon Cooksey 0:fb7af294d5d9 321 mbedtls_ecp_point_init( &V );
Simon Cooksey 0:fb7af294d5d9 322 mbedtls_mpi_init( &v );
Simon Cooksey 0:fb7af294d5d9 323 mbedtls_mpi_init( &h );
Simon Cooksey 0:fb7af294d5d9 324
Simon Cooksey 0:fb7af294d5d9 325 /* Compute signature */
Simon Cooksey 0:fb7af294d5d9 326 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp,
Simon Cooksey 0:fb7af294d5d9 327 G, &v, &V, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 328 MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) );
Simon Cooksey 0:fb7af294d5d9 329 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */
Simon Cooksey 0:fb7af294d5d9 330 MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */
Simon Cooksey 0:fb7af294d5d9 331 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */
Simon Cooksey 0:fb7af294d5d9 332
Simon Cooksey 0:fb7af294d5d9 333 /* Write it out */
Simon Cooksey 0:fb7af294d5d9 334 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V,
Simon Cooksey 0:fb7af294d5d9 335 pf, &len, *p, end - *p ) );
Simon Cooksey 0:fb7af294d5d9 336 *p += len;
Simon Cooksey 0:fb7af294d5d9 337
Simon Cooksey 0:fb7af294d5d9 338 len = mbedtls_mpi_size( &h ); /* actually r */
Simon Cooksey 0:fb7af294d5d9 339 if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 )
Simon Cooksey 0:fb7af294d5d9 340 {
Simon Cooksey 0:fb7af294d5d9 341 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
Simon Cooksey 0:fb7af294d5d9 342 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 343 }
Simon Cooksey 0:fb7af294d5d9 344
Simon Cooksey 0:fb7af294d5d9 345 *(*p)++ = (unsigned char)( len & 0xFF );
Simon Cooksey 0:fb7af294d5d9 346 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */
Simon Cooksey 0:fb7af294d5d9 347 *p += len;
Simon Cooksey 0:fb7af294d5d9 348
Simon Cooksey 0:fb7af294d5d9 349 cleanup:
Simon Cooksey 0:fb7af294d5d9 350 mbedtls_ecp_point_free( &V );
Simon Cooksey 0:fb7af294d5d9 351 mbedtls_mpi_free( &v );
Simon Cooksey 0:fb7af294d5d9 352 mbedtls_mpi_free( &h );
Simon Cooksey 0:fb7af294d5d9 353
Simon Cooksey 0:fb7af294d5d9 354 return( ret );
Simon Cooksey 0:fb7af294d5d9 355 }
Simon Cooksey 0:fb7af294d5d9 356
Simon Cooksey 0:fb7af294d5d9 357 /*
Simon Cooksey 0:fb7af294d5d9 358 * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof
Simon Cooksey 0:fb7af294d5d9 359 * Output: verified public key X
Simon Cooksey 0:fb7af294d5d9 360 */
Simon Cooksey 0:fb7af294d5d9 361 static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 362 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 363 const int pf,
Simon Cooksey 0:fb7af294d5d9 364 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 365 mbedtls_ecp_point *X,
Simon Cooksey 0:fb7af294d5d9 366 const char *id,
Simon Cooksey 0:fb7af294d5d9 367 const unsigned char **p,
Simon Cooksey 0:fb7af294d5d9 368 const unsigned char *end )
Simon Cooksey 0:fb7af294d5d9 369 {
Simon Cooksey 0:fb7af294d5d9 370 int ret;
Simon Cooksey 0:fb7af294d5d9 371
Simon Cooksey 0:fb7af294d5d9 372 if( end < *p )
Simon Cooksey 0:fb7af294d5d9 373 return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
Simon Cooksey 0:fb7af294d5d9 374
Simon Cooksey 0:fb7af294d5d9 375 /*
Simon Cooksey 0:fb7af294d5d9 376 * struct {
Simon Cooksey 0:fb7af294d5d9 377 * ECPoint X;
Simon Cooksey 0:fb7af294d5d9 378 * ECSchnorrZKP zkp;
Simon Cooksey 0:fb7af294d5d9 379 * } ECJPAKEKeyKP;
Simon Cooksey 0:fb7af294d5d9 380 */
Simon Cooksey 0:fb7af294d5d9 381 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) );
Simon Cooksey 0:fb7af294d5d9 382 if( mbedtls_ecp_is_zero( X ) )
Simon Cooksey 0:fb7af294d5d9 383 {
Simon Cooksey 0:fb7af294d5d9 384 ret = MBEDTLS_ERR_ECP_INVALID_KEY;
Simon Cooksey 0:fb7af294d5d9 385 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 386 }
Simon Cooksey 0:fb7af294d5d9 387
Simon Cooksey 0:fb7af294d5d9 388 MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) );
Simon Cooksey 0:fb7af294d5d9 389
Simon Cooksey 0:fb7af294d5d9 390 cleanup:
Simon Cooksey 0:fb7af294d5d9 391 return( ret );
Simon Cooksey 0:fb7af294d5d9 392 }
Simon Cooksey 0:fb7af294d5d9 393
Simon Cooksey 0:fb7af294d5d9 394 /*
Simon Cooksey 0:fb7af294d5d9 395 * Generate an ECJPAKEKeyKP
Simon Cooksey 0:fb7af294d5d9 396 * Output: the serialized structure, plus private/public key pair
Simon Cooksey 0:fb7af294d5d9 397 */
Simon Cooksey 0:fb7af294d5d9 398 static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 399 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 400 const int pf,
Simon Cooksey 0:fb7af294d5d9 401 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 402 mbedtls_mpi *x,
Simon Cooksey 0:fb7af294d5d9 403 mbedtls_ecp_point *X,
Simon Cooksey 0:fb7af294d5d9 404 const char *id,
Simon Cooksey 0:fb7af294d5d9 405 unsigned char **p,
Simon Cooksey 0:fb7af294d5d9 406 const unsigned char *end,
Simon Cooksey 0:fb7af294d5d9 407 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 408 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 409 {
Simon Cooksey 0:fb7af294d5d9 410 int ret;
Simon Cooksey 0:fb7af294d5d9 411 size_t len;
Simon Cooksey 0:fb7af294d5d9 412
Simon Cooksey 0:fb7af294d5d9 413 if( end < *p )
Simon Cooksey 0:fb7af294d5d9 414 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 415
Simon Cooksey 0:fb7af294d5d9 416 /* Generate key (7.4.2.3.1) and write it out */
Simon Cooksey 0:fb7af294d5d9 417 MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X,
Simon Cooksey 0:fb7af294d5d9 418 f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 419 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X,
Simon Cooksey 0:fb7af294d5d9 420 pf, &len, *p, end - *p ) );
Simon Cooksey 0:fb7af294d5d9 421 *p += len;
Simon Cooksey 0:fb7af294d5d9 422
Simon Cooksey 0:fb7af294d5d9 423 /* Generate and write proof */
Simon Cooksey 0:fb7af294d5d9 424 MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id,
Simon Cooksey 0:fb7af294d5d9 425 p, end, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 426
Simon Cooksey 0:fb7af294d5d9 427 cleanup:
Simon Cooksey 0:fb7af294d5d9 428 return( ret );
Simon Cooksey 0:fb7af294d5d9 429 }
Simon Cooksey 0:fb7af294d5d9 430
Simon Cooksey 0:fb7af294d5d9 431 /*
Simon Cooksey 0:fb7af294d5d9 432 * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs
Simon Cooksey 0:fb7af294d5d9 433 * Ouputs: verified peer public keys Xa, Xb
Simon Cooksey 0:fb7af294d5d9 434 */
Simon Cooksey 0:fb7af294d5d9 435 static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 436 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 437 const int pf,
Simon Cooksey 0:fb7af294d5d9 438 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 439 mbedtls_ecp_point *Xa,
Simon Cooksey 0:fb7af294d5d9 440 mbedtls_ecp_point *Xb,
Simon Cooksey 0:fb7af294d5d9 441 const char *id,
Simon Cooksey 0:fb7af294d5d9 442 const unsigned char *buf,
Simon Cooksey 0:fb7af294d5d9 443 size_t len )
Simon Cooksey 0:fb7af294d5d9 444 {
Simon Cooksey 0:fb7af294d5d9 445 int ret;
Simon Cooksey 0:fb7af294d5d9 446 const unsigned char *p = buf;
Simon Cooksey 0:fb7af294d5d9 447 const unsigned char *end = buf + len;
Simon Cooksey 0:fb7af294d5d9 448
Simon Cooksey 0:fb7af294d5d9 449 /*
Simon Cooksey 0:fb7af294d5d9 450 * struct {
Simon Cooksey 0:fb7af294d5d9 451 * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2];
Simon Cooksey 0:fb7af294d5d9 452 * } ECJPAKEKeyKPPairList;
Simon Cooksey 0:fb7af294d5d9 453 */
Simon Cooksey 0:fb7af294d5d9 454 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) );
Simon Cooksey 0:fb7af294d5d9 455 MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) );
Simon Cooksey 0:fb7af294d5d9 456
Simon Cooksey 0:fb7af294d5d9 457 if( p != end )
Simon Cooksey 0:fb7af294d5d9 458 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Simon Cooksey 0:fb7af294d5d9 459
Simon Cooksey 0:fb7af294d5d9 460 cleanup:
Simon Cooksey 0:fb7af294d5d9 461 return( ret );
Simon Cooksey 0:fb7af294d5d9 462 }
Simon Cooksey 0:fb7af294d5d9 463
Simon Cooksey 0:fb7af294d5d9 464 /*
Simon Cooksey 0:fb7af294d5d9 465 * Generate a ECJPAKEKeyKPPairList
Simon Cooksey 0:fb7af294d5d9 466 * Outputs: the serialized structure, plus two private/public key pairs
Simon Cooksey 0:fb7af294d5d9 467 */
Simon Cooksey 0:fb7af294d5d9 468 static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info,
Simon Cooksey 0:fb7af294d5d9 469 const mbedtls_ecp_group *grp,
Simon Cooksey 0:fb7af294d5d9 470 const int pf,
Simon Cooksey 0:fb7af294d5d9 471 const mbedtls_ecp_point *G,
Simon Cooksey 0:fb7af294d5d9 472 mbedtls_mpi *xm1,
Simon Cooksey 0:fb7af294d5d9 473 mbedtls_ecp_point *Xa,
Simon Cooksey 0:fb7af294d5d9 474 mbedtls_mpi *xm2,
Simon Cooksey 0:fb7af294d5d9 475 mbedtls_ecp_point *Xb,
Simon Cooksey 0:fb7af294d5d9 476 const char *id,
Simon Cooksey 0:fb7af294d5d9 477 unsigned char *buf,
Simon Cooksey 0:fb7af294d5d9 478 size_t len,
Simon Cooksey 0:fb7af294d5d9 479 size_t *olen,
Simon Cooksey 0:fb7af294d5d9 480 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 481 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 482 {
Simon Cooksey 0:fb7af294d5d9 483 int ret;
Simon Cooksey 0:fb7af294d5d9 484 unsigned char *p = buf;
Simon Cooksey 0:fb7af294d5d9 485 const unsigned char *end = buf + len;
Simon Cooksey 0:fb7af294d5d9 486
Simon Cooksey 0:fb7af294d5d9 487 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id,
Simon Cooksey 0:fb7af294d5d9 488 &p, end, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 489 MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id,
Simon Cooksey 0:fb7af294d5d9 490 &p, end, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 491
Simon Cooksey 0:fb7af294d5d9 492 *olen = p - buf;
Simon Cooksey 0:fb7af294d5d9 493
Simon Cooksey 0:fb7af294d5d9 494 cleanup:
Simon Cooksey 0:fb7af294d5d9 495 return( ret );
Simon Cooksey 0:fb7af294d5d9 496 }
Simon Cooksey 0:fb7af294d5d9 497
Simon Cooksey 0:fb7af294d5d9 498 /*
Simon Cooksey 0:fb7af294d5d9 499 * Read and process the first round message
Simon Cooksey 0:fb7af294d5d9 500 */
Simon Cooksey 0:fb7af294d5d9 501 int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 502 const unsigned char *buf,
Simon Cooksey 0:fb7af294d5d9 503 size_t len )
Simon Cooksey 0:fb7af294d5d9 504 {
Simon Cooksey 0:fb7af294d5d9 505 return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format,
Simon Cooksey 0:fb7af294d5d9 506 &ctx->grp.G,
Simon Cooksey 0:fb7af294d5d9 507 &ctx->Xp1, &ctx->Xp2, ID_PEER,
Simon Cooksey 0:fb7af294d5d9 508 buf, len ) );
Simon Cooksey 0:fb7af294d5d9 509 }
Simon Cooksey 0:fb7af294d5d9 510
Simon Cooksey 0:fb7af294d5d9 511 /*
Simon Cooksey 0:fb7af294d5d9 512 * Generate and write the first round message
Simon Cooksey 0:fb7af294d5d9 513 */
Simon Cooksey 0:fb7af294d5d9 514 int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 515 unsigned char *buf, size_t len, size_t *olen,
Simon Cooksey 0:fb7af294d5d9 516 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 517 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 518 {
Simon Cooksey 0:fb7af294d5d9 519 return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format,
Simon Cooksey 0:fb7af294d5d9 520 &ctx->grp.G,
Simon Cooksey 0:fb7af294d5d9 521 &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2,
Simon Cooksey 0:fb7af294d5d9 522 ID_MINE, buf, len, olen, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 523 }
Simon Cooksey 0:fb7af294d5d9 524
Simon Cooksey 0:fb7af294d5d9 525 /*
Simon Cooksey 0:fb7af294d5d9 526 * Compute the sum of three points R = A + B + C
Simon Cooksey 0:fb7af294d5d9 527 */
Simon Cooksey 0:fb7af294d5d9 528 static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R,
Simon Cooksey 0:fb7af294d5d9 529 const mbedtls_ecp_point *A,
Simon Cooksey 0:fb7af294d5d9 530 const mbedtls_ecp_point *B,
Simon Cooksey 0:fb7af294d5d9 531 const mbedtls_ecp_point *C )
Simon Cooksey 0:fb7af294d5d9 532 {
Simon Cooksey 0:fb7af294d5d9 533 int ret;
Simon Cooksey 0:fb7af294d5d9 534 mbedtls_mpi one;
Simon Cooksey 0:fb7af294d5d9 535
Simon Cooksey 0:fb7af294d5d9 536 mbedtls_mpi_init( &one );
Simon Cooksey 0:fb7af294d5d9 537
Simon Cooksey 0:fb7af294d5d9 538 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
Simon Cooksey 0:fb7af294d5d9 539 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) );
Simon Cooksey 0:fb7af294d5d9 540 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) );
Simon Cooksey 0:fb7af294d5d9 541
Simon Cooksey 0:fb7af294d5d9 542 cleanup:
Simon Cooksey 0:fb7af294d5d9 543 mbedtls_mpi_free( &one );
Simon Cooksey 0:fb7af294d5d9 544
Simon Cooksey 0:fb7af294d5d9 545 return( ret );
Simon Cooksey 0:fb7af294d5d9 546 }
Simon Cooksey 0:fb7af294d5d9 547
Simon Cooksey 0:fb7af294d5d9 548 /*
Simon Cooksey 0:fb7af294d5d9 549 * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6)
Simon Cooksey 0:fb7af294d5d9 550 */
Simon Cooksey 0:fb7af294d5d9 551 int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 552 const unsigned char *buf,
Simon Cooksey 0:fb7af294d5d9 553 size_t len )
Simon Cooksey 0:fb7af294d5d9 554 {
Simon Cooksey 0:fb7af294d5d9 555 int ret;
Simon Cooksey 0:fb7af294d5d9 556 const unsigned char *p = buf;
Simon Cooksey 0:fb7af294d5d9 557 const unsigned char *end = buf + len;
Simon Cooksey 0:fb7af294d5d9 558 mbedtls_ecp_group grp;
Simon Cooksey 0:fb7af294d5d9 559 mbedtls_ecp_point G; /* C: GB, S: GA */
Simon Cooksey 0:fb7af294d5d9 560
Simon Cooksey 0:fb7af294d5d9 561 mbedtls_ecp_group_init( &grp );
Simon Cooksey 0:fb7af294d5d9 562 mbedtls_ecp_point_init( &G );
Simon Cooksey 0:fb7af294d5d9 563
Simon Cooksey 0:fb7af294d5d9 564 /*
Simon Cooksey 0:fb7af294d5d9 565 * Server: GA = X3 + X4 + X1 (7.4.2.6.1)
Simon Cooksey 0:fb7af294d5d9 566 * Client: GB = X1 + X2 + X3 (7.4.2.5.1)
Simon Cooksey 0:fb7af294d5d9 567 * Unified: G = Xm1 + Xm2 + Xp1
Simon Cooksey 0:fb7af294d5d9 568 * We need that before parsing in order to check Xp as we read it
Simon Cooksey 0:fb7af294d5d9 569 */
Simon Cooksey 0:fb7af294d5d9 570 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
Simon Cooksey 0:fb7af294d5d9 571 &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) );
Simon Cooksey 0:fb7af294d5d9 572
Simon Cooksey 0:fb7af294d5d9 573 /*
Simon Cooksey 0:fb7af294d5d9 574 * struct {
Simon Cooksey 0:fb7af294d5d9 575 * ECParameters curve_params; // only client reading server msg
Simon Cooksey 0:fb7af294d5d9 576 * ECJPAKEKeyKP ecjpake_key_kp;
Simon Cooksey 0:fb7af294d5d9 577 * } Client/ServerECJPAKEParams;
Simon Cooksey 0:fb7af294d5d9 578 */
Simon Cooksey 0:fb7af294d5d9 579 if( ctx->role == MBEDTLS_ECJPAKE_CLIENT )
Simon Cooksey 0:fb7af294d5d9 580 {
Simon Cooksey 0:fb7af294d5d9 581 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) );
Simon Cooksey 0:fb7af294d5d9 582 if( grp.id != ctx->grp.id )
Simon Cooksey 0:fb7af294d5d9 583 {
Simon Cooksey 0:fb7af294d5d9 584 ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE;
Simon Cooksey 0:fb7af294d5d9 585 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 586 }
Simon Cooksey 0:fb7af294d5d9 587 }
Simon Cooksey 0:fb7af294d5d9 588
Simon Cooksey 0:fb7af294d5d9 589 MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp,
Simon Cooksey 0:fb7af294d5d9 590 ctx->point_format,
Simon Cooksey 0:fb7af294d5d9 591 &G, &ctx->Xp, ID_PEER, &p, end ) );
Simon Cooksey 0:fb7af294d5d9 592
Simon Cooksey 0:fb7af294d5d9 593 if( p != end )
Simon Cooksey 0:fb7af294d5d9 594 {
Simon Cooksey 0:fb7af294d5d9 595 ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
Simon Cooksey 0:fb7af294d5d9 596 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 597 }
Simon Cooksey 0:fb7af294d5d9 598
Simon Cooksey 0:fb7af294d5d9 599 cleanup:
Simon Cooksey 0:fb7af294d5d9 600 mbedtls_ecp_group_free( &grp );
Simon Cooksey 0:fb7af294d5d9 601 mbedtls_ecp_point_free( &G );
Simon Cooksey 0:fb7af294d5d9 602
Simon Cooksey 0:fb7af294d5d9 603 return( ret );
Simon Cooksey 0:fb7af294d5d9 604 }
Simon Cooksey 0:fb7af294d5d9 605
Simon Cooksey 0:fb7af294d5d9 606 /*
Simon Cooksey 0:fb7af294d5d9 607 * Compute R = +/- X * S mod N, taking care not to leak S
Simon Cooksey 0:fb7af294d5d9 608 */
Simon Cooksey 0:fb7af294d5d9 609 static int ecjpake_mul_secret( mbedtls_mpi *R, int sign,
Simon Cooksey 0:fb7af294d5d9 610 const mbedtls_mpi *X,
Simon Cooksey 0:fb7af294d5d9 611 const mbedtls_mpi *S,
Simon Cooksey 0:fb7af294d5d9 612 const mbedtls_mpi *N,
Simon Cooksey 0:fb7af294d5d9 613 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 614 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 615 {
Simon Cooksey 0:fb7af294d5d9 616 int ret;
Simon Cooksey 0:fb7af294d5d9 617 mbedtls_mpi b; /* Blinding value, then s + N * blinding */
Simon Cooksey 0:fb7af294d5d9 618
Simon Cooksey 0:fb7af294d5d9 619 mbedtls_mpi_init( &b );
Simon Cooksey 0:fb7af294d5d9 620
Simon Cooksey 0:fb7af294d5d9 621 /* b = s + rnd-128-bit * N */
Simon Cooksey 0:fb7af294d5d9 622 MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 623 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) );
Simon Cooksey 0:fb7af294d5d9 624 MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) );
Simon Cooksey 0:fb7af294d5d9 625
Simon Cooksey 0:fb7af294d5d9 626 /* R = sign * X * b mod N */
Simon Cooksey 0:fb7af294d5d9 627 MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) );
Simon Cooksey 0:fb7af294d5d9 628 R->s *= sign;
Simon Cooksey 0:fb7af294d5d9 629 MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) );
Simon Cooksey 0:fb7af294d5d9 630
Simon Cooksey 0:fb7af294d5d9 631 cleanup:
Simon Cooksey 0:fb7af294d5d9 632 mbedtls_mpi_free( &b );
Simon Cooksey 0:fb7af294d5d9 633
Simon Cooksey 0:fb7af294d5d9 634 return( ret );
Simon Cooksey 0:fb7af294d5d9 635 }
Simon Cooksey 0:fb7af294d5d9 636
Simon Cooksey 0:fb7af294d5d9 637 /*
Simon Cooksey 0:fb7af294d5d9 638 * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6)
Simon Cooksey 0:fb7af294d5d9 639 */
Simon Cooksey 0:fb7af294d5d9 640 int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 641 unsigned char *buf, size_t len, size_t *olen,
Simon Cooksey 0:fb7af294d5d9 642 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 643 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 644 {
Simon Cooksey 0:fb7af294d5d9 645 int ret;
Simon Cooksey 0:fb7af294d5d9 646 mbedtls_ecp_point G; /* C: GA, S: GB */
Simon Cooksey 0:fb7af294d5d9 647 mbedtls_ecp_point Xm; /* C: Xc, S: Xs */
Simon Cooksey 0:fb7af294d5d9 648 mbedtls_mpi xm; /* C: xc, S: xs */
Simon Cooksey 0:fb7af294d5d9 649 unsigned char *p = buf;
Simon Cooksey 0:fb7af294d5d9 650 const unsigned char *end = buf + len;
Simon Cooksey 0:fb7af294d5d9 651 size_t ec_len;
Simon Cooksey 0:fb7af294d5d9 652
Simon Cooksey 0:fb7af294d5d9 653 mbedtls_ecp_point_init( &G );
Simon Cooksey 0:fb7af294d5d9 654 mbedtls_ecp_point_init( &Xm );
Simon Cooksey 0:fb7af294d5d9 655 mbedtls_mpi_init( &xm );
Simon Cooksey 0:fb7af294d5d9 656
Simon Cooksey 0:fb7af294d5d9 657 /*
Simon Cooksey 0:fb7af294d5d9 658 * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1)
Simon Cooksey 0:fb7af294d5d9 659 *
Simon Cooksey 0:fb7af294d5d9 660 * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA
Simon Cooksey 0:fb7af294d5d9 661 * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB
Simon Cooksey 0:fb7af294d5d9 662 * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G
Simon Cooksey 0:fb7af294d5d9 663 */
Simon Cooksey 0:fb7af294d5d9 664 MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G,
Simon Cooksey 0:fb7af294d5d9 665 &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) );
Simon Cooksey 0:fb7af294d5d9 666 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s,
Simon Cooksey 0:fb7af294d5d9 667 &ctx->grp.N, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 668 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 669
Simon Cooksey 0:fb7af294d5d9 670 /*
Simon Cooksey 0:fb7af294d5d9 671 * Now write things out
Simon Cooksey 0:fb7af294d5d9 672 *
Simon Cooksey 0:fb7af294d5d9 673 * struct {
Simon Cooksey 0:fb7af294d5d9 674 * ECParameters curve_params; // only server writing its message
Simon Cooksey 0:fb7af294d5d9 675 * ECJPAKEKeyKP ecjpake_key_kp;
Simon Cooksey 0:fb7af294d5d9 676 * } Client/ServerECJPAKEParams;
Simon Cooksey 0:fb7af294d5d9 677 */
Simon Cooksey 0:fb7af294d5d9 678 if( ctx->role == MBEDTLS_ECJPAKE_SERVER )
Simon Cooksey 0:fb7af294d5d9 679 {
Simon Cooksey 0:fb7af294d5d9 680 if( end < p )
Simon Cooksey 0:fb7af294d5d9 681 {
Simon Cooksey 0:fb7af294d5d9 682 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
Simon Cooksey 0:fb7af294d5d9 683 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 684 }
Simon Cooksey 0:fb7af294d5d9 685 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len,
Simon Cooksey 0:fb7af294d5d9 686 p, end - p ) );
Simon Cooksey 0:fb7af294d5d9 687 p += ec_len;
Simon Cooksey 0:fb7af294d5d9 688 }
Simon Cooksey 0:fb7af294d5d9 689
Simon Cooksey 0:fb7af294d5d9 690 if( end < p )
Simon Cooksey 0:fb7af294d5d9 691 {
Simon Cooksey 0:fb7af294d5d9 692 ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
Simon Cooksey 0:fb7af294d5d9 693 goto cleanup;
Simon Cooksey 0:fb7af294d5d9 694 }
Simon Cooksey 0:fb7af294d5d9 695 MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm,
Simon Cooksey 0:fb7af294d5d9 696 ctx->point_format, &ec_len, p, end - p ) );
Simon Cooksey 0:fb7af294d5d9 697 p += ec_len;
Simon Cooksey 0:fb7af294d5d9 698
Simon Cooksey 0:fb7af294d5d9 699 MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp,
Simon Cooksey 0:fb7af294d5d9 700 ctx->point_format,
Simon Cooksey 0:fb7af294d5d9 701 &G, &xm, &Xm, ID_MINE,
Simon Cooksey 0:fb7af294d5d9 702 &p, end, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 703
Simon Cooksey 0:fb7af294d5d9 704 *olen = p - buf;
Simon Cooksey 0:fb7af294d5d9 705
Simon Cooksey 0:fb7af294d5d9 706 cleanup:
Simon Cooksey 0:fb7af294d5d9 707 mbedtls_ecp_point_free( &G );
Simon Cooksey 0:fb7af294d5d9 708 mbedtls_ecp_point_free( &Xm );
Simon Cooksey 0:fb7af294d5d9 709 mbedtls_mpi_free( &xm );
Simon Cooksey 0:fb7af294d5d9 710
Simon Cooksey 0:fb7af294d5d9 711 return( ret );
Simon Cooksey 0:fb7af294d5d9 712 }
Simon Cooksey 0:fb7af294d5d9 713
Simon Cooksey 0:fb7af294d5d9 714 /*
Simon Cooksey 0:fb7af294d5d9 715 * Derive PMS (7.4.2.7 / 7.4.2.8)
Simon Cooksey 0:fb7af294d5d9 716 */
Simon Cooksey 0:fb7af294d5d9 717 int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 718 unsigned char *buf, size_t len, size_t *olen,
Simon Cooksey 0:fb7af294d5d9 719 int (*f_rng)(void *, unsigned char *, size_t),
Simon Cooksey 0:fb7af294d5d9 720 void *p_rng )
Simon Cooksey 0:fb7af294d5d9 721 {
Simon Cooksey 0:fb7af294d5d9 722 int ret;
Simon Cooksey 0:fb7af294d5d9 723 mbedtls_ecp_point K;
Simon Cooksey 0:fb7af294d5d9 724 mbedtls_mpi m_xm2_s, one;
Simon Cooksey 0:fb7af294d5d9 725 unsigned char kx[MBEDTLS_ECP_MAX_BYTES];
Simon Cooksey 0:fb7af294d5d9 726 size_t x_bytes;
Simon Cooksey 0:fb7af294d5d9 727
Simon Cooksey 0:fb7af294d5d9 728 *olen = mbedtls_md_get_size( ctx->md_info );
Simon Cooksey 0:fb7af294d5d9 729 if( len < *olen )
Simon Cooksey 0:fb7af294d5d9 730 return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
Simon Cooksey 0:fb7af294d5d9 731
Simon Cooksey 0:fb7af294d5d9 732 mbedtls_ecp_point_init( &K );
Simon Cooksey 0:fb7af294d5d9 733 mbedtls_mpi_init( &m_xm2_s );
Simon Cooksey 0:fb7af294d5d9 734 mbedtls_mpi_init( &one );
Simon Cooksey 0:fb7af294d5d9 735
Simon Cooksey 0:fb7af294d5d9 736 MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) );
Simon Cooksey 0:fb7af294d5d9 737
Simon Cooksey 0:fb7af294d5d9 738 /*
Simon Cooksey 0:fb7af294d5d9 739 * Client: K = ( Xs - X4 * x2 * s ) * x2
Simon Cooksey 0:fb7af294d5d9 740 * Server: K = ( Xc - X2 * x4 * s ) * x4
Simon Cooksey 0:fb7af294d5d9 741 * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2
Simon Cooksey 0:fb7af294d5d9 742 */
Simon Cooksey 0:fb7af294d5d9 743 MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s,
Simon Cooksey 0:fb7af294d5d9 744 &ctx->grp.N, f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 745 MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K,
Simon Cooksey 0:fb7af294d5d9 746 &one, &ctx->Xp,
Simon Cooksey 0:fb7af294d5d9 747 &m_xm2_s, &ctx->Xp2 ) );
Simon Cooksey 0:fb7af294d5d9 748 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K,
Simon Cooksey 0:fb7af294d5d9 749 f_rng, p_rng ) );
Simon Cooksey 0:fb7af294d5d9 750
Simon Cooksey 0:fb7af294d5d9 751 /* PMS = SHA-256( K.X ) */
Simon Cooksey 0:fb7af294d5d9 752 x_bytes = ( ctx->grp.pbits + 7 ) / 8;
Simon Cooksey 0:fb7af294d5d9 753 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) );
Simon Cooksey 0:fb7af294d5d9 754 MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) );
Simon Cooksey 0:fb7af294d5d9 755
Simon Cooksey 0:fb7af294d5d9 756 cleanup:
Simon Cooksey 0:fb7af294d5d9 757 mbedtls_ecp_point_free( &K );
Simon Cooksey 0:fb7af294d5d9 758 mbedtls_mpi_free( &m_xm2_s );
Simon Cooksey 0:fb7af294d5d9 759 mbedtls_mpi_free( &one );
Simon Cooksey 0:fb7af294d5d9 760
Simon Cooksey 0:fb7af294d5d9 761 return( ret );
Simon Cooksey 0:fb7af294d5d9 762 }
Simon Cooksey 0:fb7af294d5d9 763
Simon Cooksey 0:fb7af294d5d9 764 #undef ID_MINE
Simon Cooksey 0:fb7af294d5d9 765 #undef ID_PEER
Simon Cooksey 0:fb7af294d5d9 766
Simon Cooksey 0:fb7af294d5d9 767
Simon Cooksey 0:fb7af294d5d9 768 #if defined(MBEDTLS_SELF_TEST)
Simon Cooksey 0:fb7af294d5d9 769
Simon Cooksey 0:fb7af294d5d9 770 #if defined(MBEDTLS_PLATFORM_C)
Simon Cooksey 0:fb7af294d5d9 771 #include "mbedtls/platform.h"
Simon Cooksey 0:fb7af294d5d9 772 #else
Simon Cooksey 0:fb7af294d5d9 773 #include <stdio.h>
Simon Cooksey 0:fb7af294d5d9 774 #define mbedtls_printf printf
Simon Cooksey 0:fb7af294d5d9 775 #endif
Simon Cooksey 0:fb7af294d5d9 776
Simon Cooksey 0:fb7af294d5d9 777 #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \
Simon Cooksey 0:fb7af294d5d9 778 !defined(MBEDTLS_SHA256_C)
Simon Cooksey 0:fb7af294d5d9 779 int mbedtls_ecjpake_self_test( int verbose )
Simon Cooksey 0:fb7af294d5d9 780 {
Simon Cooksey 0:fb7af294d5d9 781 (void) verbose;
Simon Cooksey 0:fb7af294d5d9 782 return( 0 );
Simon Cooksey 0:fb7af294d5d9 783 }
Simon Cooksey 0:fb7af294d5d9 784 #else
Simon Cooksey 0:fb7af294d5d9 785
Simon Cooksey 0:fb7af294d5d9 786 static const unsigned char ecjpake_test_password[] = {
Simon Cooksey 0:fb7af294d5d9 787 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74,
Simon Cooksey 0:fb7af294d5d9 788 0x65, 0x73, 0x74
Simon Cooksey 0:fb7af294d5d9 789 };
Simon Cooksey 0:fb7af294d5d9 790
Simon Cooksey 0:fb7af294d5d9 791 static const unsigned char ecjpake_test_x1[] = {
Simon Cooksey 0:fb7af294d5d9 792 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c,
Simon Cooksey 0:fb7af294d5d9 793 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
Simon Cooksey 0:fb7af294d5d9 794 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21
Simon Cooksey 0:fb7af294d5d9 795 };
Simon Cooksey 0:fb7af294d5d9 796
Simon Cooksey 0:fb7af294d5d9 797 static const unsigned char ecjpake_test_x2[] = {
Simon Cooksey 0:fb7af294d5d9 798 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
Simon Cooksey 0:fb7af294d5d9 799 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
Simon Cooksey 0:fb7af294d5d9 800 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
Simon Cooksey 0:fb7af294d5d9 801 };
Simon Cooksey 0:fb7af294d5d9 802
Simon Cooksey 0:fb7af294d5d9 803 static const unsigned char ecjpake_test_x3[] = {
Simon Cooksey 0:fb7af294d5d9 804 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c,
Simon Cooksey 0:fb7af294d5d9 805 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78,
Simon Cooksey 0:fb7af294d5d9 806 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81
Simon Cooksey 0:fb7af294d5d9 807 };
Simon Cooksey 0:fb7af294d5d9 808
Simon Cooksey 0:fb7af294d5d9 809 static const unsigned char ecjpake_test_x4[] = {
Simon Cooksey 0:fb7af294d5d9 810 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc,
Simon Cooksey 0:fb7af294d5d9 811 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8,
Simon Cooksey 0:fb7af294d5d9 812 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1
Simon Cooksey 0:fb7af294d5d9 813 };
Simon Cooksey 0:fb7af294d5d9 814
Simon Cooksey 0:fb7af294d5d9 815 static const unsigned char ecjpake_test_cli_one[] = {
Simon Cooksey 0:fb7af294d5d9 816 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19,
Simon Cooksey 0:fb7af294d5d9 817 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44,
Simon Cooksey 0:fb7af294d5d9 818 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad,
Simon Cooksey 0:fb7af294d5d9 819 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62,
Simon Cooksey 0:fb7af294d5d9 820 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9,
Simon Cooksey 0:fb7af294d5d9 821 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d,
Simon Cooksey 0:fb7af294d5d9 822 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e,
Simon Cooksey 0:fb7af294d5d9 823 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e,
Simon Cooksey 0:fb7af294d5d9 824 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73,
Simon Cooksey 0:fb7af294d5d9 825 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22,
Simon Cooksey 0:fb7af294d5d9 826 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce,
Simon Cooksey 0:fb7af294d5d9 827 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00,
Simon Cooksey 0:fb7af294d5d9 828 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b,
Simon Cooksey 0:fb7af294d5d9 829 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e,
Simon Cooksey 0:fb7af294d5d9 830 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62,
Simon Cooksey 0:fb7af294d5d9 831 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5,
Simon Cooksey 0:fb7af294d5d9 832 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb,
Simon Cooksey 0:fb7af294d5d9 833 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35,
Simon Cooksey 0:fb7af294d5d9 834 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0,
Simon Cooksey 0:fb7af294d5d9 835 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb,
Simon Cooksey 0:fb7af294d5d9 836 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47,
Simon Cooksey 0:fb7af294d5d9 837 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39,
Simon Cooksey 0:fb7af294d5d9 838 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97,
Simon Cooksey 0:fb7af294d5d9 839 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40,
Simon Cooksey 0:fb7af294d5d9 840 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d,
Simon Cooksey 0:fb7af294d5d9 841 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa,
Simon Cooksey 0:fb7af294d5d9 842 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d,
Simon Cooksey 0:fb7af294d5d9 843 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0
Simon Cooksey 0:fb7af294d5d9 844 };
Simon Cooksey 0:fb7af294d5d9 845
Simon Cooksey 0:fb7af294d5d9 846 static const unsigned char ecjpake_test_srv_one[] = {
Simon Cooksey 0:fb7af294d5d9 847 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb,
Simon Cooksey 0:fb7af294d5d9 848 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18,
Simon Cooksey 0:fb7af294d5d9 849 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47,
Simon Cooksey 0:fb7af294d5d9 850 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f,
Simon Cooksey 0:fb7af294d5d9 851 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7,
Simon Cooksey 0:fb7af294d5d9 852 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d,
Simon Cooksey 0:fb7af294d5d9 853 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64,
Simon Cooksey 0:fb7af294d5d9 854 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36,
Simon Cooksey 0:fb7af294d5d9 855 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2,
Simon Cooksey 0:fb7af294d5d9 856 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec,
Simon Cooksey 0:fb7af294d5d9 857 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16,
Simon Cooksey 0:fb7af294d5d9 858 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96,
Simon Cooksey 0:fb7af294d5d9 859 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3,
Simon Cooksey 0:fb7af294d5d9 860 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19,
Simon Cooksey 0:fb7af294d5d9 861 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f,
Simon Cooksey 0:fb7af294d5d9 862 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8,
Simon Cooksey 0:fb7af294d5d9 863 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7,
Simon Cooksey 0:fb7af294d5d9 864 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea,
Simon Cooksey 0:fb7af294d5d9 865 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5,
Simon Cooksey 0:fb7af294d5d9 866 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6,
Simon Cooksey 0:fb7af294d5d9 867 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31,
Simon Cooksey 0:fb7af294d5d9 868 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d,
Simon Cooksey 0:fb7af294d5d9 869 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8,
Simon Cooksey 0:fb7af294d5d9 870 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee,
Simon Cooksey 0:fb7af294d5d9 871 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84,
Simon Cooksey 0:fb7af294d5d9 872 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f,
Simon Cooksey 0:fb7af294d5d9 873 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80,
Simon Cooksey 0:fb7af294d5d9 874 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12
Simon Cooksey 0:fb7af294d5d9 875 };
Simon Cooksey 0:fb7af294d5d9 876
Simon Cooksey 0:fb7af294d5d9 877 static const unsigned char ecjpake_test_srv_two[] = {
Simon Cooksey 0:fb7af294d5d9 878 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23,
Simon Cooksey 0:fb7af294d5d9 879 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c,
Simon Cooksey 0:fb7af294d5d9 880 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f,
Simon Cooksey 0:fb7af294d5d9 881 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca,
Simon Cooksey 0:fb7af294d5d9 882 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26,
Simon Cooksey 0:fb7af294d5d9 883 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55,
Simon Cooksey 0:fb7af294d5d9 884 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38,
Simon Cooksey 0:fb7af294d5d9 885 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6,
Simon Cooksey 0:fb7af294d5d9 886 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9,
Simon Cooksey 0:fb7af294d5d9 887 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4,
Simon Cooksey 0:fb7af294d5d9 888 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2,
Simon Cooksey 0:fb7af294d5d9 889 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8,
Simon Cooksey 0:fb7af294d5d9 890 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd,
Simon Cooksey 0:fb7af294d5d9 891 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c
Simon Cooksey 0:fb7af294d5d9 892 };
Simon Cooksey 0:fb7af294d5d9 893
Simon Cooksey 0:fb7af294d5d9 894 static const unsigned char ecjpake_test_cli_two[] = {
Simon Cooksey 0:fb7af294d5d9 895 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46,
Simon Cooksey 0:fb7af294d5d9 896 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb,
Simon Cooksey 0:fb7af294d5d9 897 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72,
Simon Cooksey 0:fb7af294d5d9 898 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce,
Simon Cooksey 0:fb7af294d5d9 899 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98,
Simon Cooksey 0:fb7af294d5d9 900 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31,
Simon Cooksey 0:fb7af294d5d9 901 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15,
Simon Cooksey 0:fb7af294d5d9 902 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36,
Simon Cooksey 0:fb7af294d5d9 903 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8,
Simon Cooksey 0:fb7af294d5d9 904 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45,
Simon Cooksey 0:fb7af294d5d9 905 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d,
Simon Cooksey 0:fb7af294d5d9 906 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58,
Simon Cooksey 0:fb7af294d5d9 907 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82,
Simon Cooksey 0:fb7af294d5d9 908 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c
Simon Cooksey 0:fb7af294d5d9 909 };
Simon Cooksey 0:fb7af294d5d9 910
Simon Cooksey 0:fb7af294d5d9 911 static const unsigned char ecjpake_test_pms[] = {
Simon Cooksey 0:fb7af294d5d9 912 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7,
Simon Cooksey 0:fb7af294d5d9 913 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9,
Simon Cooksey 0:fb7af294d5d9 914 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51
Simon Cooksey 0:fb7af294d5d9 915 };
Simon Cooksey 0:fb7af294d5d9 916
Simon Cooksey 0:fb7af294d5d9 917 /* Load my private keys and generate the correponding public keys */
Simon Cooksey 0:fb7af294d5d9 918 static int ecjpake_test_load( mbedtls_ecjpake_context *ctx,
Simon Cooksey 0:fb7af294d5d9 919 const unsigned char *xm1, size_t len1,
Simon Cooksey 0:fb7af294d5d9 920 const unsigned char *xm2, size_t len2 )
Simon Cooksey 0:fb7af294d5d9 921 {
Simon Cooksey 0:fb7af294d5d9 922 int ret;
Simon Cooksey 0:fb7af294d5d9 923
Simon Cooksey 0:fb7af294d5d9 924 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) );
Simon Cooksey 0:fb7af294d5d9 925 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) );
Simon Cooksey 0:fb7af294d5d9 926 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1,
Simon Cooksey 0:fb7af294d5d9 927 &ctx->grp.G, NULL, NULL ) );
Simon Cooksey 0:fb7af294d5d9 928 MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2,
Simon Cooksey 0:fb7af294d5d9 929 &ctx->grp.G, NULL, NULL ) );
Simon Cooksey 0:fb7af294d5d9 930
Simon Cooksey 0:fb7af294d5d9 931 cleanup:
Simon Cooksey 0:fb7af294d5d9 932 return( ret );
Simon Cooksey 0:fb7af294d5d9 933 }
Simon Cooksey 0:fb7af294d5d9 934
Simon Cooksey 0:fb7af294d5d9 935 /* For tests we don't need a secure RNG;
Simon Cooksey 0:fb7af294d5d9 936 * use the LGC from Numerical Recipes for simplicity */
Simon Cooksey 0:fb7af294d5d9 937 static int ecjpake_lgc( void *p, unsigned char *out, size_t len )
Simon Cooksey 0:fb7af294d5d9 938 {
Simon Cooksey 0:fb7af294d5d9 939 static uint32_t x = 42;
Simon Cooksey 0:fb7af294d5d9 940 (void) p;
Simon Cooksey 0:fb7af294d5d9 941
Simon Cooksey 0:fb7af294d5d9 942 while( len > 0 )
Simon Cooksey 0:fb7af294d5d9 943 {
Simon Cooksey 0:fb7af294d5d9 944 size_t use_len = len > 4 ? 4 : len;
Simon Cooksey 0:fb7af294d5d9 945 x = 1664525 * x + 1013904223;
Simon Cooksey 0:fb7af294d5d9 946 memcpy( out, &x, use_len );
Simon Cooksey 0:fb7af294d5d9 947 out += use_len;
Simon Cooksey 0:fb7af294d5d9 948 len -= use_len;
Simon Cooksey 0:fb7af294d5d9 949 }
Simon Cooksey 0:fb7af294d5d9 950
Simon Cooksey 0:fb7af294d5d9 951 return( 0 );
Simon Cooksey 0:fb7af294d5d9 952 }
Simon Cooksey 0:fb7af294d5d9 953
Simon Cooksey 0:fb7af294d5d9 954 #define TEST_ASSERT( x ) \
Simon Cooksey 0:fb7af294d5d9 955 do { \
Simon Cooksey 0:fb7af294d5d9 956 if( x ) \
Simon Cooksey 0:fb7af294d5d9 957 ret = 0; \
Simon Cooksey 0:fb7af294d5d9 958 else \
Simon Cooksey 0:fb7af294d5d9 959 { \
Simon Cooksey 0:fb7af294d5d9 960 ret = 1; \
Simon Cooksey 0:fb7af294d5d9 961 goto cleanup; \
Simon Cooksey 0:fb7af294d5d9 962 } \
Simon Cooksey 0:fb7af294d5d9 963 } while( 0 )
Simon Cooksey 0:fb7af294d5d9 964
Simon Cooksey 0:fb7af294d5d9 965 /*
Simon Cooksey 0:fb7af294d5d9 966 * Checkup routine
Simon Cooksey 0:fb7af294d5d9 967 */
Simon Cooksey 0:fb7af294d5d9 968 int mbedtls_ecjpake_self_test( int verbose )
Simon Cooksey 0:fb7af294d5d9 969 {
Simon Cooksey 0:fb7af294d5d9 970 int ret;
Simon Cooksey 0:fb7af294d5d9 971 mbedtls_ecjpake_context cli;
Simon Cooksey 0:fb7af294d5d9 972 mbedtls_ecjpake_context srv;
Simon Cooksey 0:fb7af294d5d9 973 unsigned char buf[512], pms[32];
Simon Cooksey 0:fb7af294d5d9 974 size_t len, pmslen;
Simon Cooksey 0:fb7af294d5d9 975
Simon Cooksey 0:fb7af294d5d9 976 mbedtls_ecjpake_init( &cli );
Simon Cooksey 0:fb7af294d5d9 977 mbedtls_ecjpake_init( &srv );
Simon Cooksey 0:fb7af294d5d9 978
Simon Cooksey 0:fb7af294d5d9 979 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 980 mbedtls_printf( " ECJPAKE test #0 (setup): " );
Simon Cooksey 0:fb7af294d5d9 981
Simon Cooksey 0:fb7af294d5d9 982 TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT,
Simon Cooksey 0:fb7af294d5d9 983 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
Simon Cooksey 0:fb7af294d5d9 984 ecjpake_test_password,
Simon Cooksey 0:fb7af294d5d9 985 sizeof( ecjpake_test_password ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 986
Simon Cooksey 0:fb7af294d5d9 987 TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER,
Simon Cooksey 0:fb7af294d5d9 988 MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1,
Simon Cooksey 0:fb7af294d5d9 989 ecjpake_test_password,
Simon Cooksey 0:fb7af294d5d9 990 sizeof( ecjpake_test_password ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 991
Simon Cooksey 0:fb7af294d5d9 992 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 993 mbedtls_printf( "passed\n" );
Simon Cooksey 0:fb7af294d5d9 994
Simon Cooksey 0:fb7af294d5d9 995 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 996 mbedtls_printf( " ECJPAKE test #1 (random handshake): " );
Simon Cooksey 0:fb7af294d5d9 997
Simon Cooksey 0:fb7af294d5d9 998 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli,
Simon Cooksey 0:fb7af294d5d9 999 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1000
Simon Cooksey 0:fb7af294d5d9 1001 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1002
Simon Cooksey 0:fb7af294d5d9 1003 TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv,
Simon Cooksey 0:fb7af294d5d9 1004 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1005
Simon Cooksey 0:fb7af294d5d9 1006 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1007
Simon Cooksey 0:fb7af294d5d9 1008 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv,
Simon Cooksey 0:fb7af294d5d9 1009 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1010
Simon Cooksey 0:fb7af294d5d9 1011 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1012
Simon Cooksey 0:fb7af294d5d9 1013 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
Simon Cooksey 0:fb7af294d5d9 1014 pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1015
Simon Cooksey 0:fb7af294d5d9 1016 TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli,
Simon Cooksey 0:fb7af294d5d9 1017 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1018
Simon Cooksey 0:fb7af294d5d9 1019 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1020
Simon Cooksey 0:fb7af294d5d9 1021 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
Simon Cooksey 0:fb7af294d5d9 1022 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1023
Simon Cooksey 0:fb7af294d5d9 1024 TEST_ASSERT( len == pmslen );
Simon Cooksey 0:fb7af294d5d9 1025 TEST_ASSERT( memcmp( buf, pms, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1026
Simon Cooksey 0:fb7af294d5d9 1027 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 1028 mbedtls_printf( "passed\n" );
Simon Cooksey 0:fb7af294d5d9 1029
Simon Cooksey 0:fb7af294d5d9 1030 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 1031 mbedtls_printf( " ECJPAKE test #2 (reference handshake): " );
Simon Cooksey 0:fb7af294d5d9 1032
Simon Cooksey 0:fb7af294d5d9 1033 /* Simulate generation of round one */
Simon Cooksey 0:fb7af294d5d9 1034 MBEDTLS_MPI_CHK( ecjpake_test_load( &cli,
Simon Cooksey 0:fb7af294d5d9 1035 ecjpake_test_x1, sizeof( ecjpake_test_x1 ),
Simon Cooksey 0:fb7af294d5d9 1036 ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) );
Simon Cooksey 0:fb7af294d5d9 1037
Simon Cooksey 0:fb7af294d5d9 1038 MBEDTLS_MPI_CHK( ecjpake_test_load( &srv,
Simon Cooksey 0:fb7af294d5d9 1039 ecjpake_test_x3, sizeof( ecjpake_test_x3 ),
Simon Cooksey 0:fb7af294d5d9 1040 ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) );
Simon Cooksey 0:fb7af294d5d9 1041
Simon Cooksey 0:fb7af294d5d9 1042 /* Read round one */
Simon Cooksey 0:fb7af294d5d9 1043 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv,
Simon Cooksey 0:fb7af294d5d9 1044 ecjpake_test_cli_one,
Simon Cooksey 0:fb7af294d5d9 1045 sizeof( ecjpake_test_cli_one ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1046
Simon Cooksey 0:fb7af294d5d9 1047 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli,
Simon Cooksey 0:fb7af294d5d9 1048 ecjpake_test_srv_one,
Simon Cooksey 0:fb7af294d5d9 1049 sizeof( ecjpake_test_srv_one ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1050
Simon Cooksey 0:fb7af294d5d9 1051 /* Skip generation of round two, read round two */
Simon Cooksey 0:fb7af294d5d9 1052 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli,
Simon Cooksey 0:fb7af294d5d9 1053 ecjpake_test_srv_two,
Simon Cooksey 0:fb7af294d5d9 1054 sizeof( ecjpake_test_srv_two ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1055
Simon Cooksey 0:fb7af294d5d9 1056 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv,
Simon Cooksey 0:fb7af294d5d9 1057 ecjpake_test_cli_two,
Simon Cooksey 0:fb7af294d5d9 1058 sizeof( ecjpake_test_cli_two ) ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1059
Simon Cooksey 0:fb7af294d5d9 1060 /* Server derives PMS */
Simon Cooksey 0:fb7af294d5d9 1061 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv,
Simon Cooksey 0:fb7af294d5d9 1062 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1063
Simon Cooksey 0:fb7af294d5d9 1064 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
Simon Cooksey 0:fb7af294d5d9 1065 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1066
Simon Cooksey 0:fb7af294d5d9 1067 memset( buf, 0, len ); /* Avoid interferences with next step */
Simon Cooksey 0:fb7af294d5d9 1068
Simon Cooksey 0:fb7af294d5d9 1069 /* Client derives PMS */
Simon Cooksey 0:fb7af294d5d9 1070 TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli,
Simon Cooksey 0:fb7af294d5d9 1071 buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1072
Simon Cooksey 0:fb7af294d5d9 1073 TEST_ASSERT( len == sizeof( ecjpake_test_pms ) );
Simon Cooksey 0:fb7af294d5d9 1074 TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 );
Simon Cooksey 0:fb7af294d5d9 1075
Simon Cooksey 0:fb7af294d5d9 1076 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 1077 mbedtls_printf( "passed\n" );
Simon Cooksey 0:fb7af294d5d9 1078
Simon Cooksey 0:fb7af294d5d9 1079 cleanup:
Simon Cooksey 0:fb7af294d5d9 1080 mbedtls_ecjpake_free( &cli );
Simon Cooksey 0:fb7af294d5d9 1081 mbedtls_ecjpake_free( &srv );
Simon Cooksey 0:fb7af294d5d9 1082
Simon Cooksey 0:fb7af294d5d9 1083 if( ret != 0 )
Simon Cooksey 0:fb7af294d5d9 1084 {
Simon Cooksey 0:fb7af294d5d9 1085 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 1086 mbedtls_printf( "failed\n" );
Simon Cooksey 0:fb7af294d5d9 1087
Simon Cooksey 0:fb7af294d5d9 1088 ret = 1;
Simon Cooksey 0:fb7af294d5d9 1089 }
Simon Cooksey 0:fb7af294d5d9 1090
Simon Cooksey 0:fb7af294d5d9 1091 if( verbose != 0 )
Simon Cooksey 0:fb7af294d5d9 1092 mbedtls_printf( "\n" );
Simon Cooksey 0:fb7af294d5d9 1093
Simon Cooksey 0:fb7af294d5d9 1094 return( ret );
Simon Cooksey 0:fb7af294d5d9 1095 }
Simon Cooksey 0:fb7af294d5d9 1096
Simon Cooksey 0:fb7af294d5d9 1097 #undef TEST_ASSERT
Simon Cooksey 0:fb7af294d5d9 1098
Simon Cooksey 0:fb7af294d5d9 1099 #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */
Simon Cooksey 0:fb7af294d5d9 1100
Simon Cooksey 0:fb7af294d5d9 1101 #endif /* MBEDTLS_SELF_TEST */
Simon Cooksey 0:fb7af294d5d9 1102
Simon Cooksey 0:fb7af294d5d9 1103 #endif /* MBEDTLS_ECJPAKE_C */