1817466cbSJens Wiklander /* 2817466cbSJens Wiklander * Elliptic curve J-PAKE 3817466cbSJens Wiklander * 47901324dSJerome Forissier * Copyright The Mbed TLS Contributors 57901324dSJerome Forissier * SPDX-License-Identifier: Apache-2.0 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander */ 19817466cbSJens Wiklander 20817466cbSJens Wiklander /* 21817466cbSJens Wiklander * References in the code are to the Thread v1.0 Specification, 22817466cbSJens Wiklander * available to members of the Thread Group http://threadgroup.org/ 23817466cbSJens Wiklander */ 24817466cbSJens Wiklander 257901324dSJerome Forissier #include "common.h" 26817466cbSJens Wiklander 27817466cbSJens Wiklander #if defined(MBEDTLS_ECJPAKE_C) 28817466cbSJens Wiklander 29817466cbSJens Wiklander #include "mbedtls/ecjpake.h" 303d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 3111fa71b9SJerome Forissier #include "mbedtls/error.h" 32817466cbSJens Wiklander 33817466cbSJens Wiklander #include <string.h> 34817466cbSJens Wiklander 353d3b0591SJens Wiklander #if !defined(MBEDTLS_ECJPAKE_ALT) 363d3b0591SJens Wiklander 373d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 383d3b0591SJens Wiklander #define ECJPAKE_VALIDATE_RET( cond ) \ 393d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 403d3b0591SJens Wiklander #define ECJPAKE_VALIDATE( cond ) \ 413d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 423d3b0591SJens Wiklander 43817466cbSJens Wiklander /* 44817466cbSJens Wiklander * Convert a mbedtls_ecjpake_role to identifier string 45817466cbSJens Wiklander */ 46817466cbSJens Wiklander static const char * const ecjpake_id[] = { 47817466cbSJens Wiklander "client", 48817466cbSJens Wiklander "server" 49817466cbSJens Wiklander }; 50817466cbSJens Wiklander 51817466cbSJens Wiklander #define ID_MINE ( ecjpake_id[ ctx->role ] ) 52817466cbSJens Wiklander #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] ) 53817466cbSJens Wiklander 54817466cbSJens Wiklander /* 55817466cbSJens Wiklander * Initialize context 56817466cbSJens Wiklander */ 57817466cbSJens Wiklander void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx ) 58817466cbSJens Wiklander { 593d3b0591SJens Wiklander ECJPAKE_VALIDATE( ctx != NULL ); 60817466cbSJens Wiklander 61817466cbSJens Wiklander ctx->md_info = NULL; 62817466cbSJens Wiklander mbedtls_ecp_group_init( &ctx->grp ); 63817466cbSJens Wiklander ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED; 64817466cbSJens Wiklander 65817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm1 ); 66817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm2 ); 67817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp1 ); 68817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp2 ); 69817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp ); 70817466cbSJens Wiklander 71817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm1 ); 72817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm2 ); 73817466cbSJens Wiklander mbedtls_mpi_init( &ctx->s ); 74817466cbSJens Wiklander } 75817466cbSJens Wiklander 76817466cbSJens Wiklander /* 77817466cbSJens Wiklander * Free context 78817466cbSJens Wiklander */ 79817466cbSJens Wiklander void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx ) 80817466cbSJens Wiklander { 81817466cbSJens Wiklander if( ctx == NULL ) 82817466cbSJens Wiklander return; 83817466cbSJens Wiklander 84817466cbSJens Wiklander ctx->md_info = NULL; 85817466cbSJens Wiklander mbedtls_ecp_group_free( &ctx->grp ); 86817466cbSJens Wiklander 87817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm1 ); 88817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm2 ); 89817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp1 ); 90817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp2 ); 91817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp ); 92817466cbSJens Wiklander 93817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm1 ); 94817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm2 ); 95817466cbSJens Wiklander mbedtls_mpi_free( &ctx->s ); 96817466cbSJens Wiklander } 97817466cbSJens Wiklander 98817466cbSJens Wiklander /* 99817466cbSJens Wiklander * Setup context 100817466cbSJens Wiklander */ 101817466cbSJens Wiklander int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx, 102817466cbSJens Wiklander mbedtls_ecjpake_role role, 103817466cbSJens Wiklander mbedtls_md_type_t hash, 104817466cbSJens Wiklander mbedtls_ecp_group_id curve, 105817466cbSJens Wiklander const unsigned char *secret, 106817466cbSJens Wiklander size_t len ) 107817466cbSJens Wiklander { 10811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 109817466cbSJens Wiklander 1103d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 1113d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( role == MBEDTLS_ECJPAKE_CLIENT || 1123d3b0591SJens Wiklander role == MBEDTLS_ECJPAKE_SERVER ); 1133d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( secret != NULL || len == 0 ); 1143d3b0591SJens Wiklander 115817466cbSJens Wiklander ctx->role = role; 116817466cbSJens Wiklander 117817466cbSJens Wiklander if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL ) 118817466cbSJens Wiklander return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE ); 119817466cbSJens Wiklander 120817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) ); 121817466cbSJens Wiklander 122817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) ); 123817466cbSJens Wiklander 124817466cbSJens Wiklander cleanup: 125817466cbSJens Wiklander if( ret != 0 ) 126817466cbSJens Wiklander mbedtls_ecjpake_free( ctx ); 127817466cbSJens Wiklander 128817466cbSJens Wiklander return( ret ); 129817466cbSJens Wiklander } 130817466cbSJens Wiklander 131817466cbSJens Wiklander /* 132817466cbSJens Wiklander * Check if context is ready for use 133817466cbSJens Wiklander */ 134817466cbSJens Wiklander int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx ) 135817466cbSJens Wiklander { 1363d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 1373d3b0591SJens Wiklander 138817466cbSJens Wiklander if( ctx->md_info == NULL || 139817466cbSJens Wiklander ctx->grp.id == MBEDTLS_ECP_DP_NONE || 140817466cbSJens Wiklander ctx->s.p == NULL ) 141817466cbSJens Wiklander { 142817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 143817466cbSJens Wiklander } 144817466cbSJens Wiklander 145817466cbSJens Wiklander return( 0 ); 146817466cbSJens Wiklander } 147817466cbSJens Wiklander 148817466cbSJens Wiklander /* 149817466cbSJens Wiklander * Write a point plus its length to a buffer 150817466cbSJens Wiklander */ 151817466cbSJens Wiklander static int ecjpake_write_len_point( unsigned char **p, 152817466cbSJens Wiklander const unsigned char *end, 153817466cbSJens Wiklander const mbedtls_ecp_group *grp, 154817466cbSJens Wiklander const int pf, 155817466cbSJens Wiklander const mbedtls_ecp_point *P ) 156817466cbSJens Wiklander { 15711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 158817466cbSJens Wiklander size_t len; 159817466cbSJens Wiklander 160817466cbSJens Wiklander /* Need at least 4 for length plus 1 for point */ 161817466cbSJens Wiklander if( end < *p || end - *p < 5 ) 162817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 163817466cbSJens Wiklander 164817466cbSJens Wiklander ret = mbedtls_ecp_point_write_binary( grp, P, pf, 165817466cbSJens Wiklander &len, *p + 4, end - ( *p + 4 ) ); 166817466cbSJens Wiklander if( ret != 0 ) 167817466cbSJens Wiklander return( ret ); 168817466cbSJens Wiklander 169*039e02dfSJerome Forissier MBEDTLS_PUT_UINT32_BE( len, *p, 0 ); 170817466cbSJens Wiklander 171817466cbSJens Wiklander *p += 4 + len; 172817466cbSJens Wiklander 173817466cbSJens Wiklander return( 0 ); 174817466cbSJens Wiklander } 175817466cbSJens Wiklander 176817466cbSJens Wiklander /* 177817466cbSJens Wiklander * Size of the temporary buffer for ecjpake_hash: 178817466cbSJens Wiklander * 3 EC points plus their length, plus ID and its length (4 + 6 bytes) 179817466cbSJens Wiklander */ 180817466cbSJens Wiklander #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 ) 181817466cbSJens Wiklander 182817466cbSJens Wiklander /* 183817466cbSJens Wiklander * Compute hash for ZKP (7.4.2.2.2.1) 184817466cbSJens Wiklander */ 185817466cbSJens Wiklander static int ecjpake_hash( const mbedtls_md_info_t *md_info, 186817466cbSJens Wiklander const mbedtls_ecp_group *grp, 187817466cbSJens Wiklander const int pf, 188817466cbSJens Wiklander const mbedtls_ecp_point *G, 189817466cbSJens Wiklander const mbedtls_ecp_point *V, 190817466cbSJens Wiklander const mbedtls_ecp_point *X, 191817466cbSJens Wiklander const char *id, 192817466cbSJens Wiklander mbedtls_mpi *h ) 193817466cbSJens Wiklander { 19411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 195817466cbSJens Wiklander unsigned char buf[ECJPAKE_HASH_BUF_LEN]; 196817466cbSJens Wiklander unsigned char *p = buf; 197817466cbSJens Wiklander const unsigned char *end = buf + sizeof( buf ); 198817466cbSJens Wiklander const size_t id_len = strlen( id ); 199817466cbSJens Wiklander unsigned char hash[MBEDTLS_MD_MAX_SIZE]; 200817466cbSJens Wiklander 201817466cbSJens Wiklander /* Write things to temporary buffer */ 202817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) ); 203817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) ); 204817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) ); 205817466cbSJens Wiklander 206817466cbSJens Wiklander if( end - p < 4 ) 207817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 208817466cbSJens Wiklander 209*039e02dfSJerome Forissier MBEDTLS_PUT_UINT32_BE( id_len, p, 0 ); 210*039e02dfSJerome Forissier p += 4; 211817466cbSJens Wiklander 212817466cbSJens Wiklander if( end < p || (size_t)( end - p ) < id_len ) 213817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 214817466cbSJens Wiklander 215817466cbSJens Wiklander memcpy( p, id, id_len ); 216817466cbSJens Wiklander p += id_len; 217817466cbSJens Wiklander 218817466cbSJens Wiklander /* Compute hash */ 2195b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_md( md_info, buf, p - buf, hash ) ); 220817466cbSJens Wiklander 221817466cbSJens Wiklander /* Turn it into an integer mod n */ 222817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash, 223817466cbSJens Wiklander mbedtls_md_get_size( md_info ) ) ); 224817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) ); 225817466cbSJens Wiklander 226817466cbSJens Wiklander cleanup: 227817466cbSJens Wiklander return( ret ); 228817466cbSJens Wiklander } 229817466cbSJens Wiklander 230817466cbSJens Wiklander /* 231817466cbSJens Wiklander * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3) 232817466cbSJens Wiklander */ 233817466cbSJens Wiklander static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info, 234817466cbSJens Wiklander const mbedtls_ecp_group *grp, 235817466cbSJens Wiklander const int pf, 236817466cbSJens Wiklander const mbedtls_ecp_point *G, 237817466cbSJens Wiklander const mbedtls_ecp_point *X, 238817466cbSJens Wiklander const char *id, 239817466cbSJens Wiklander const unsigned char **p, 240817466cbSJens Wiklander const unsigned char *end ) 241817466cbSJens Wiklander { 24211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 243817466cbSJens Wiklander mbedtls_ecp_point V, VV; 244817466cbSJens Wiklander mbedtls_mpi r, h; 245817466cbSJens Wiklander size_t r_len; 246817466cbSJens Wiklander 247817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 248817466cbSJens Wiklander mbedtls_ecp_point_init( &VV ); 249817466cbSJens Wiklander mbedtls_mpi_init( &r ); 250817466cbSJens Wiklander mbedtls_mpi_init( &h ); 251817466cbSJens Wiklander 252817466cbSJens Wiklander /* 253817466cbSJens Wiklander * struct { 254817466cbSJens Wiklander * ECPoint V; 255817466cbSJens Wiklander * opaque r<1..2^8-1>; 256817466cbSJens Wiklander * } ECSchnorrZKP; 257817466cbSJens Wiklander */ 258817466cbSJens Wiklander if( end < *p ) 259817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 260817466cbSJens Wiklander 261817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) ); 262817466cbSJens Wiklander 263817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 ) 264817466cbSJens Wiklander { 265817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 266817466cbSJens Wiklander goto cleanup; 267817466cbSJens Wiklander } 268817466cbSJens Wiklander 269817466cbSJens Wiklander r_len = *(*p)++; 270817466cbSJens Wiklander 2717901324dSJerome Forissier if( end < *p || (size_t)( end - *p ) < r_len || r_len == 0 ) 272817466cbSJens Wiklander { 273817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 274817466cbSJens Wiklander goto cleanup; 275817466cbSJens Wiklander } 276817466cbSJens Wiklander 277817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) ); 278817466cbSJens Wiklander *p += r_len; 279817466cbSJens Wiklander 280817466cbSJens Wiklander /* 281817466cbSJens Wiklander * Verification 282817466cbSJens Wiklander */ 283817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 284817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp, 285817466cbSJens Wiklander &VV, &h, X, &r, G ) ); 286817466cbSJens Wiklander 287817466cbSJens Wiklander if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 ) 288817466cbSJens Wiklander { 289817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED; 290817466cbSJens Wiklander goto cleanup; 291817466cbSJens Wiklander } 292817466cbSJens Wiklander 293817466cbSJens Wiklander cleanup: 294817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 295817466cbSJens Wiklander mbedtls_ecp_point_free( &VV ); 296817466cbSJens Wiklander mbedtls_mpi_free( &r ); 297817466cbSJens Wiklander mbedtls_mpi_free( &h ); 298817466cbSJens Wiklander 299817466cbSJens Wiklander return( ret ); 300817466cbSJens Wiklander } 301817466cbSJens Wiklander 302817466cbSJens Wiklander /* 303817466cbSJens Wiklander * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2) 304817466cbSJens Wiklander */ 305817466cbSJens Wiklander static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info, 306817466cbSJens Wiklander const mbedtls_ecp_group *grp, 307817466cbSJens Wiklander const int pf, 308817466cbSJens Wiklander const mbedtls_ecp_point *G, 309817466cbSJens Wiklander const mbedtls_mpi *x, 310817466cbSJens Wiklander const mbedtls_ecp_point *X, 311817466cbSJens Wiklander const char *id, 312817466cbSJens Wiklander unsigned char **p, 313817466cbSJens Wiklander const unsigned char *end, 314817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 315817466cbSJens Wiklander void *p_rng ) 316817466cbSJens Wiklander { 31711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 318817466cbSJens Wiklander mbedtls_ecp_point V; 319817466cbSJens Wiklander mbedtls_mpi v; 320817466cbSJens Wiklander mbedtls_mpi h; /* later recycled to hold r */ 321817466cbSJens Wiklander size_t len; 322817466cbSJens Wiklander 323817466cbSJens Wiklander if( end < *p ) 324817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 325817466cbSJens Wiklander 326817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 327817466cbSJens Wiklander mbedtls_mpi_init( &v ); 328817466cbSJens Wiklander mbedtls_mpi_init( &h ); 329817466cbSJens Wiklander 330817466cbSJens Wiklander /* Compute signature */ 331817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, 332817466cbSJens Wiklander G, &v, &V, f_rng, p_rng ) ); 333817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 334817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */ 335817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */ 336817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */ 337817466cbSJens Wiklander 338817466cbSJens Wiklander /* Write it out */ 339817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V, 340817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 341817466cbSJens Wiklander *p += len; 342817466cbSJens Wiklander 343817466cbSJens Wiklander len = mbedtls_mpi_size( &h ); /* actually r */ 344817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 ) 345817466cbSJens Wiklander { 346817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 347817466cbSJens Wiklander goto cleanup; 348817466cbSJens Wiklander } 349817466cbSJens Wiklander 350*039e02dfSJerome Forissier *(*p)++ = MBEDTLS_BYTE_0( len ); 351817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */ 352817466cbSJens Wiklander *p += len; 353817466cbSJens Wiklander 354817466cbSJens Wiklander cleanup: 355817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 356817466cbSJens Wiklander mbedtls_mpi_free( &v ); 357817466cbSJens Wiklander mbedtls_mpi_free( &h ); 358817466cbSJens Wiklander 359817466cbSJens Wiklander return( ret ); 360817466cbSJens Wiklander } 361817466cbSJens Wiklander 362817466cbSJens Wiklander /* 363817466cbSJens Wiklander * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof 364817466cbSJens Wiklander * Output: verified public key X 365817466cbSJens Wiklander */ 366817466cbSJens Wiklander static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info, 367817466cbSJens Wiklander const mbedtls_ecp_group *grp, 368817466cbSJens Wiklander const int pf, 369817466cbSJens Wiklander const mbedtls_ecp_point *G, 370817466cbSJens Wiklander mbedtls_ecp_point *X, 371817466cbSJens Wiklander const char *id, 372817466cbSJens Wiklander const unsigned char **p, 373817466cbSJens Wiklander const unsigned char *end ) 374817466cbSJens Wiklander { 37511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 376817466cbSJens Wiklander 377817466cbSJens Wiklander if( end < *p ) 378817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 379817466cbSJens Wiklander 380817466cbSJens Wiklander /* 381817466cbSJens Wiklander * struct { 382817466cbSJens Wiklander * ECPoint X; 383817466cbSJens Wiklander * ECSchnorrZKP zkp; 384817466cbSJens Wiklander * } ECJPAKEKeyKP; 385817466cbSJens Wiklander */ 386817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) ); 387817466cbSJens Wiklander if( mbedtls_ecp_is_zero( X ) ) 388817466cbSJens Wiklander { 389817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 390817466cbSJens Wiklander goto cleanup; 391817466cbSJens Wiklander } 392817466cbSJens Wiklander 393817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) ); 394817466cbSJens Wiklander 395817466cbSJens Wiklander cleanup: 396817466cbSJens Wiklander return( ret ); 397817466cbSJens Wiklander } 398817466cbSJens Wiklander 399817466cbSJens Wiklander /* 400817466cbSJens Wiklander * Generate an ECJPAKEKeyKP 401817466cbSJens Wiklander * Output: the serialized structure, plus private/public key pair 402817466cbSJens Wiklander */ 403817466cbSJens Wiklander static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info, 404817466cbSJens Wiklander const mbedtls_ecp_group *grp, 405817466cbSJens Wiklander const int pf, 406817466cbSJens Wiklander const mbedtls_ecp_point *G, 407817466cbSJens Wiklander mbedtls_mpi *x, 408817466cbSJens Wiklander mbedtls_ecp_point *X, 409817466cbSJens Wiklander const char *id, 410817466cbSJens Wiklander unsigned char **p, 411817466cbSJens Wiklander const unsigned char *end, 412817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 413817466cbSJens Wiklander void *p_rng ) 414817466cbSJens Wiklander { 41511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 416817466cbSJens Wiklander size_t len; 417817466cbSJens Wiklander 418817466cbSJens Wiklander if( end < *p ) 419817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 420817466cbSJens Wiklander 421817466cbSJens Wiklander /* Generate key (7.4.2.3.1) and write it out */ 422817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X, 423817466cbSJens Wiklander f_rng, p_rng ) ); 424817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X, 425817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 426817466cbSJens Wiklander *p += len; 427817466cbSJens Wiklander 428817466cbSJens Wiklander /* Generate and write proof */ 429817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id, 430817466cbSJens Wiklander p, end, f_rng, p_rng ) ); 431817466cbSJens Wiklander 432817466cbSJens Wiklander cleanup: 433817466cbSJens Wiklander return( ret ); 434817466cbSJens Wiklander } 435817466cbSJens Wiklander 436817466cbSJens Wiklander /* 437817466cbSJens Wiklander * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs 438*039e02dfSJerome Forissier * Outputs: verified peer public keys Xa, Xb 439817466cbSJens Wiklander */ 440817466cbSJens Wiklander static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info, 441817466cbSJens Wiklander const mbedtls_ecp_group *grp, 442817466cbSJens Wiklander const int pf, 443817466cbSJens Wiklander const mbedtls_ecp_point *G, 444817466cbSJens Wiklander mbedtls_ecp_point *Xa, 445817466cbSJens Wiklander mbedtls_ecp_point *Xb, 446817466cbSJens Wiklander const char *id, 447817466cbSJens Wiklander const unsigned char *buf, 448817466cbSJens Wiklander size_t len ) 449817466cbSJens Wiklander { 45011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 451817466cbSJens Wiklander const unsigned char *p = buf; 452817466cbSJens Wiklander const unsigned char *end = buf + len; 453817466cbSJens Wiklander 454817466cbSJens Wiklander /* 455817466cbSJens Wiklander * struct { 456817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2]; 457817466cbSJens Wiklander * } ECJPAKEKeyKPPairList; 458817466cbSJens Wiklander */ 459817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) ); 460817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) ); 461817466cbSJens Wiklander 462817466cbSJens Wiklander if( p != end ) 463817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 464817466cbSJens Wiklander 465817466cbSJens Wiklander cleanup: 466817466cbSJens Wiklander return( ret ); 467817466cbSJens Wiklander } 468817466cbSJens Wiklander 469817466cbSJens Wiklander /* 470817466cbSJens Wiklander * Generate a ECJPAKEKeyKPPairList 471817466cbSJens Wiklander * Outputs: the serialized structure, plus two private/public key pairs 472817466cbSJens Wiklander */ 473817466cbSJens Wiklander static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info, 474817466cbSJens Wiklander const mbedtls_ecp_group *grp, 475817466cbSJens Wiklander const int pf, 476817466cbSJens Wiklander const mbedtls_ecp_point *G, 477817466cbSJens Wiklander mbedtls_mpi *xm1, 478817466cbSJens Wiklander mbedtls_ecp_point *Xa, 479817466cbSJens Wiklander mbedtls_mpi *xm2, 480817466cbSJens Wiklander mbedtls_ecp_point *Xb, 481817466cbSJens Wiklander const char *id, 482817466cbSJens Wiklander unsigned char *buf, 483817466cbSJens Wiklander size_t len, 484817466cbSJens Wiklander size_t *olen, 485817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 486817466cbSJens Wiklander void *p_rng ) 487817466cbSJens Wiklander { 48811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 489817466cbSJens Wiklander unsigned char *p = buf; 490817466cbSJens Wiklander const unsigned char *end = buf + len; 491817466cbSJens Wiklander 492817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id, 493817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 494817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id, 495817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 496817466cbSJens Wiklander 497817466cbSJens Wiklander *olen = p - buf; 498817466cbSJens Wiklander 499817466cbSJens Wiklander cleanup: 500817466cbSJens Wiklander return( ret ); 501817466cbSJens Wiklander } 502817466cbSJens Wiklander 503817466cbSJens Wiklander /* 504817466cbSJens Wiklander * Read and process the first round message 505817466cbSJens Wiklander */ 506817466cbSJens Wiklander int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx, 507817466cbSJens Wiklander const unsigned char *buf, 508817466cbSJens Wiklander size_t len ) 509817466cbSJens Wiklander { 5103d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5113d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5123d3b0591SJens Wiklander 513817466cbSJens Wiklander return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format, 514817466cbSJens Wiklander &ctx->grp.G, 515817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, ID_PEER, 516817466cbSJens Wiklander buf, len ) ); 517817466cbSJens Wiklander } 518817466cbSJens Wiklander 519817466cbSJens Wiklander /* 520817466cbSJens Wiklander * Generate and write the first round message 521817466cbSJens Wiklander */ 522817466cbSJens Wiklander int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx, 523817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 524817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 525817466cbSJens Wiklander void *p_rng ) 526817466cbSJens Wiklander { 5273d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5283d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5293d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 5303d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 5313d3b0591SJens Wiklander 532817466cbSJens Wiklander return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format, 533817466cbSJens Wiklander &ctx->grp.G, 534817466cbSJens Wiklander &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2, 535817466cbSJens Wiklander ID_MINE, buf, len, olen, f_rng, p_rng ) ); 536817466cbSJens Wiklander } 537817466cbSJens Wiklander 538817466cbSJens Wiklander /* 539817466cbSJens Wiklander * Compute the sum of three points R = A + B + C 540817466cbSJens Wiklander */ 541817466cbSJens Wiklander static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 542817466cbSJens Wiklander const mbedtls_ecp_point *A, 543817466cbSJens Wiklander const mbedtls_ecp_point *B, 544817466cbSJens Wiklander const mbedtls_ecp_point *C ) 545817466cbSJens Wiklander { 54611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 547817466cbSJens Wiklander mbedtls_mpi one; 548817466cbSJens Wiklander 549817466cbSJens Wiklander mbedtls_mpi_init( &one ); 550817466cbSJens Wiklander 551817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 552817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) ); 553817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) ); 554817466cbSJens Wiklander 555817466cbSJens Wiklander cleanup: 556817466cbSJens Wiklander mbedtls_mpi_free( &one ); 557817466cbSJens Wiklander 558817466cbSJens Wiklander return( ret ); 559817466cbSJens Wiklander } 560817466cbSJens Wiklander 561817466cbSJens Wiklander /* 562817466cbSJens Wiklander * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6) 563817466cbSJens Wiklander */ 564817466cbSJens Wiklander int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx, 565817466cbSJens Wiklander const unsigned char *buf, 566817466cbSJens Wiklander size_t len ) 567817466cbSJens Wiklander { 56811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 569817466cbSJens Wiklander const unsigned char *p = buf; 570817466cbSJens Wiklander const unsigned char *end = buf + len; 571817466cbSJens Wiklander mbedtls_ecp_group grp; 572817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GB, S: GA */ 573817466cbSJens Wiklander 5743d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5753d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5763d3b0591SJens Wiklander 577817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 578817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 579817466cbSJens Wiklander 580817466cbSJens Wiklander /* 581817466cbSJens Wiklander * Server: GA = X3 + X4 + X1 (7.4.2.6.1) 582817466cbSJens Wiklander * Client: GB = X1 + X2 + X3 (7.4.2.5.1) 583817466cbSJens Wiklander * Unified: G = Xm1 + Xm2 + Xp1 584817466cbSJens Wiklander * We need that before parsing in order to check Xp as we read it 585817466cbSJens Wiklander */ 586817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 587817466cbSJens Wiklander &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) ); 588817466cbSJens Wiklander 589817466cbSJens Wiklander /* 590817466cbSJens Wiklander * struct { 591817466cbSJens Wiklander * ECParameters curve_params; // only client reading server msg 592817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 593817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 594817466cbSJens Wiklander */ 595817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_CLIENT ) 596817466cbSJens Wiklander { 597817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) ); 598817466cbSJens Wiklander if( grp.id != ctx->grp.id ) 599817466cbSJens Wiklander { 600817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 601817466cbSJens Wiklander goto cleanup; 602817466cbSJens Wiklander } 603817466cbSJens Wiklander } 604817466cbSJens Wiklander 605817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp, 606817466cbSJens Wiklander ctx->point_format, 607817466cbSJens Wiklander &G, &ctx->Xp, ID_PEER, &p, end ) ); 608817466cbSJens Wiklander 609817466cbSJens Wiklander if( p != end ) 610817466cbSJens Wiklander { 611817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 612817466cbSJens Wiklander goto cleanup; 613817466cbSJens Wiklander } 614817466cbSJens Wiklander 615817466cbSJens Wiklander cleanup: 616817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 617817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 618817466cbSJens Wiklander 619817466cbSJens Wiklander return( ret ); 620817466cbSJens Wiklander } 621817466cbSJens Wiklander 622817466cbSJens Wiklander /* 623817466cbSJens Wiklander * Compute R = +/- X * S mod N, taking care not to leak S 624817466cbSJens Wiklander */ 625817466cbSJens Wiklander static int ecjpake_mul_secret( mbedtls_mpi *R, int sign, 626817466cbSJens Wiklander const mbedtls_mpi *X, 627817466cbSJens Wiklander const mbedtls_mpi *S, 628817466cbSJens Wiklander const mbedtls_mpi *N, 629817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 630817466cbSJens Wiklander void *p_rng ) 631817466cbSJens Wiklander { 63211fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 633817466cbSJens Wiklander mbedtls_mpi b; /* Blinding value, then s + N * blinding */ 634817466cbSJens Wiklander 635817466cbSJens Wiklander mbedtls_mpi_init( &b ); 636817466cbSJens Wiklander 637817466cbSJens Wiklander /* b = s + rnd-128-bit * N */ 638817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) ); 639817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) ); 640817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) ); 641817466cbSJens Wiklander 642817466cbSJens Wiklander /* R = sign * X * b mod N */ 643817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) ); 644817466cbSJens Wiklander R->s *= sign; 645817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) ); 646817466cbSJens Wiklander 647817466cbSJens Wiklander cleanup: 648817466cbSJens Wiklander mbedtls_mpi_free( &b ); 649817466cbSJens Wiklander 650817466cbSJens Wiklander return( ret ); 651817466cbSJens Wiklander } 652817466cbSJens Wiklander 653817466cbSJens Wiklander /* 654817466cbSJens Wiklander * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6) 655817466cbSJens Wiklander */ 656817466cbSJens Wiklander int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx, 657817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 658817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 659817466cbSJens Wiklander void *p_rng ) 660817466cbSJens Wiklander { 66111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 662817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GA, S: GB */ 663817466cbSJens Wiklander mbedtls_ecp_point Xm; /* C: Xc, S: Xs */ 664817466cbSJens Wiklander mbedtls_mpi xm; /* C: xc, S: xs */ 665817466cbSJens Wiklander unsigned char *p = buf; 666817466cbSJens Wiklander const unsigned char *end = buf + len; 667817466cbSJens Wiklander size_t ec_len; 668817466cbSJens Wiklander 6693d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 6703d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 6713d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 6723d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 6733d3b0591SJens Wiklander 674817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 675817466cbSJens Wiklander mbedtls_ecp_point_init( &Xm ); 676817466cbSJens Wiklander mbedtls_mpi_init( &xm ); 677817466cbSJens Wiklander 678817466cbSJens Wiklander /* 679817466cbSJens Wiklander * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1) 680817466cbSJens Wiklander * 681817466cbSJens Wiklander * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA 682817466cbSJens Wiklander * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB 683817466cbSJens Wiklander * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G 684817466cbSJens Wiklander */ 685817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 686817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) ); 687817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s, 688817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 689817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) ); 690817466cbSJens Wiklander 691817466cbSJens Wiklander /* 692817466cbSJens Wiklander * Now write things out 693817466cbSJens Wiklander * 694817466cbSJens Wiklander * struct { 695817466cbSJens Wiklander * ECParameters curve_params; // only server writing its message 696817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 697817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 698817466cbSJens Wiklander */ 699817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_SERVER ) 700817466cbSJens Wiklander { 701817466cbSJens Wiklander if( end < p ) 702817466cbSJens Wiklander { 703817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 704817466cbSJens Wiklander goto cleanup; 705817466cbSJens Wiklander } 706817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len, 707817466cbSJens Wiklander p, end - p ) ); 708817466cbSJens Wiklander p += ec_len; 709817466cbSJens Wiklander } 710817466cbSJens Wiklander 711817466cbSJens Wiklander if( end < p ) 712817466cbSJens Wiklander { 713817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 714817466cbSJens Wiklander goto cleanup; 715817466cbSJens Wiklander } 716817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm, 717817466cbSJens Wiklander ctx->point_format, &ec_len, p, end - p ) ); 718817466cbSJens Wiklander p += ec_len; 719817466cbSJens Wiklander 720817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp, 721817466cbSJens Wiklander ctx->point_format, 722817466cbSJens Wiklander &G, &xm, &Xm, ID_MINE, 723817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 724817466cbSJens Wiklander 725817466cbSJens Wiklander *olen = p - buf; 726817466cbSJens Wiklander 727817466cbSJens Wiklander cleanup: 728817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 729817466cbSJens Wiklander mbedtls_ecp_point_free( &Xm ); 730817466cbSJens Wiklander mbedtls_mpi_free( &xm ); 731817466cbSJens Wiklander 732817466cbSJens Wiklander return( ret ); 733817466cbSJens Wiklander } 734817466cbSJens Wiklander 735817466cbSJens Wiklander /* 736817466cbSJens Wiklander * Derive PMS (7.4.2.7 / 7.4.2.8) 737817466cbSJens Wiklander */ 738817466cbSJens Wiklander int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx, 739817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 740817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 741817466cbSJens Wiklander void *p_rng ) 742817466cbSJens Wiklander { 74311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 744817466cbSJens Wiklander mbedtls_ecp_point K; 745817466cbSJens Wiklander mbedtls_mpi m_xm2_s, one; 746817466cbSJens Wiklander unsigned char kx[MBEDTLS_ECP_MAX_BYTES]; 747817466cbSJens Wiklander size_t x_bytes; 748817466cbSJens Wiklander 7493d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 7503d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 7513d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 7523d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 7533d3b0591SJens Wiklander 754817466cbSJens Wiklander *olen = mbedtls_md_get_size( ctx->md_info ); 755817466cbSJens Wiklander if( len < *olen ) 756817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 757817466cbSJens Wiklander 758817466cbSJens Wiklander mbedtls_ecp_point_init( &K ); 759817466cbSJens Wiklander mbedtls_mpi_init( &m_xm2_s ); 760817466cbSJens Wiklander mbedtls_mpi_init( &one ); 761817466cbSJens Wiklander 762817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 763817466cbSJens Wiklander 764817466cbSJens Wiklander /* 765817466cbSJens Wiklander * Client: K = ( Xs - X4 * x2 * s ) * x2 766817466cbSJens Wiklander * Server: K = ( Xc - X2 * x4 * s ) * x4 767817466cbSJens Wiklander * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2 768817466cbSJens Wiklander */ 769817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s, 770817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 771817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K, 772817466cbSJens Wiklander &one, &ctx->Xp, 773817466cbSJens Wiklander &m_xm2_s, &ctx->Xp2 ) ); 774817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K, 775817466cbSJens Wiklander f_rng, p_rng ) ); 776817466cbSJens Wiklander 777817466cbSJens Wiklander /* PMS = SHA-256( K.X ) */ 778817466cbSJens Wiklander x_bytes = ( ctx->grp.pbits + 7 ) / 8; 779817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) ); 780817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) ); 781817466cbSJens Wiklander 782817466cbSJens Wiklander cleanup: 783817466cbSJens Wiklander mbedtls_ecp_point_free( &K ); 784817466cbSJens Wiklander mbedtls_mpi_free( &m_xm2_s ); 785817466cbSJens Wiklander mbedtls_mpi_free( &one ); 786817466cbSJens Wiklander 787817466cbSJens Wiklander return( ret ); 788817466cbSJens Wiklander } 789817466cbSJens Wiklander 790817466cbSJens Wiklander #undef ID_MINE 791817466cbSJens Wiklander #undef ID_PEER 792817466cbSJens Wiklander 7933d3b0591SJens Wiklander #endif /* ! MBEDTLS_ECJPAKE_ALT */ 794817466cbSJens Wiklander 795817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 796817466cbSJens Wiklander 797817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 798817466cbSJens Wiklander #include "mbedtls/platform.h" 799817466cbSJens Wiklander #else 800817466cbSJens Wiklander #include <stdio.h> 801817466cbSJens Wiklander #define mbedtls_printf printf 802817466cbSJens Wiklander #endif 803817466cbSJens Wiklander 804817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \ 805817466cbSJens Wiklander !defined(MBEDTLS_SHA256_C) 806817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 807817466cbSJens Wiklander { 808817466cbSJens Wiklander (void) verbose; 809817466cbSJens Wiklander return( 0 ); 810817466cbSJens Wiklander } 811817466cbSJens Wiklander #else 812817466cbSJens Wiklander 813817466cbSJens Wiklander static const unsigned char ecjpake_test_password[] = { 814817466cbSJens Wiklander 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74, 815817466cbSJens Wiklander 0x65, 0x73, 0x74 816817466cbSJens Wiklander }; 817817466cbSJens Wiklander 8187901324dSJerome Forissier #if !defined(MBEDTLS_ECJPAKE_ALT) 8197901324dSJerome Forissier 820817466cbSJens Wiklander static const unsigned char ecjpake_test_x1[] = { 821817466cbSJens Wiklander 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 822817466cbSJens Wiklander 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 823817466cbSJens Wiklander 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21 824817466cbSJens Wiklander }; 825817466cbSJens Wiklander 826817466cbSJens Wiklander static const unsigned char ecjpake_test_x2[] = { 827817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 828817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 829817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 830817466cbSJens Wiklander }; 831817466cbSJens Wiklander 832817466cbSJens Wiklander static const unsigned char ecjpake_test_x3[] = { 833817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 834817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 835817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 836817466cbSJens Wiklander }; 837817466cbSJens Wiklander 838817466cbSJens Wiklander static const unsigned char ecjpake_test_x4[] = { 839817466cbSJens Wiklander 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 840817466cbSJens Wiklander 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 841817466cbSJens Wiklander 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1 842817466cbSJens Wiklander }; 843817466cbSJens Wiklander 844817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_one[] = { 845817466cbSJens Wiklander 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19, 846817466cbSJens Wiklander 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44, 847817466cbSJens Wiklander 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad, 848817466cbSJens Wiklander 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62, 849817466cbSJens Wiklander 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9, 850817466cbSJens Wiklander 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d, 851817466cbSJens Wiklander 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e, 852817466cbSJens Wiklander 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e, 853817466cbSJens Wiklander 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73, 854817466cbSJens Wiklander 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22, 855817466cbSJens Wiklander 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce, 856817466cbSJens Wiklander 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00, 857817466cbSJens Wiklander 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b, 858817466cbSJens Wiklander 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e, 859817466cbSJens Wiklander 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62, 860817466cbSJens Wiklander 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5, 861817466cbSJens Wiklander 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb, 862817466cbSJens Wiklander 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35, 863817466cbSJens Wiklander 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0, 864817466cbSJens Wiklander 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb, 865817466cbSJens Wiklander 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47, 866817466cbSJens Wiklander 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39, 867817466cbSJens Wiklander 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97, 868817466cbSJens Wiklander 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40, 869817466cbSJens Wiklander 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d, 870817466cbSJens Wiklander 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa, 871817466cbSJens Wiklander 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d, 872817466cbSJens Wiklander 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0 873817466cbSJens Wiklander }; 874817466cbSJens Wiklander 875817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_one[] = { 876817466cbSJens Wiklander 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 877817466cbSJens Wiklander 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 878817466cbSJens Wiklander 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 879817466cbSJens Wiklander 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 880817466cbSJens Wiklander 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 881817466cbSJens Wiklander 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d, 882817466cbSJens Wiklander 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64, 883817466cbSJens Wiklander 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36, 884817466cbSJens Wiklander 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2, 885817466cbSJens Wiklander 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec, 886817466cbSJens Wiklander 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16, 887817466cbSJens Wiklander 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96, 888817466cbSJens Wiklander 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3, 889817466cbSJens Wiklander 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19, 890817466cbSJens Wiklander 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f, 891817466cbSJens Wiklander 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8, 892817466cbSJens Wiklander 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7, 893817466cbSJens Wiklander 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea, 894817466cbSJens Wiklander 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5, 895817466cbSJens Wiklander 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6, 896817466cbSJens Wiklander 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31, 897817466cbSJens Wiklander 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d, 898817466cbSJens Wiklander 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8, 899817466cbSJens Wiklander 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee, 900817466cbSJens Wiklander 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84, 901817466cbSJens Wiklander 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f, 902817466cbSJens Wiklander 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80, 903817466cbSJens Wiklander 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12 904817466cbSJens Wiklander }; 905817466cbSJens Wiklander 906817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_two[] = { 907817466cbSJens Wiklander 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23, 908817466cbSJens Wiklander 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c, 909817466cbSJens Wiklander 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f, 910817466cbSJens Wiklander 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca, 911817466cbSJens Wiklander 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26, 912817466cbSJens Wiklander 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55, 913817466cbSJens Wiklander 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38, 914817466cbSJens Wiklander 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6, 915817466cbSJens Wiklander 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9, 916817466cbSJens Wiklander 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4, 917817466cbSJens Wiklander 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2, 918817466cbSJens Wiklander 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8, 919817466cbSJens Wiklander 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd, 920817466cbSJens Wiklander 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c 921817466cbSJens Wiklander }; 922817466cbSJens Wiklander 923817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_two[] = { 924817466cbSJens Wiklander 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46, 925817466cbSJens Wiklander 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb, 926817466cbSJens Wiklander 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72, 927817466cbSJens Wiklander 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce, 928817466cbSJens Wiklander 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98, 929817466cbSJens Wiklander 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31, 930817466cbSJens Wiklander 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15, 931817466cbSJens Wiklander 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36, 932817466cbSJens Wiklander 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8, 933817466cbSJens Wiklander 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45, 934817466cbSJens Wiklander 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d, 935817466cbSJens Wiklander 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58, 936817466cbSJens Wiklander 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82, 937817466cbSJens Wiklander 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c 938817466cbSJens Wiklander }; 939817466cbSJens Wiklander 940817466cbSJens Wiklander static const unsigned char ecjpake_test_pms[] = { 941817466cbSJens Wiklander 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7, 942817466cbSJens Wiklander 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9, 943817466cbSJens Wiklander 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51 944817466cbSJens Wiklander }; 945817466cbSJens Wiklander 9465b25c76aSJerome Forissier /* Load my private keys and generate the corresponding public keys */ 947817466cbSJens Wiklander static int ecjpake_test_load( mbedtls_ecjpake_context *ctx, 948817466cbSJens Wiklander const unsigned char *xm1, size_t len1, 949817466cbSJens Wiklander const unsigned char *xm2, size_t len2 ) 950817466cbSJens Wiklander { 95111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 952817466cbSJens Wiklander 953817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) ); 954817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) ); 955817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1, 956817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 957817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2, 958817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 959817466cbSJens Wiklander 960817466cbSJens Wiklander cleanup: 961817466cbSJens Wiklander return( ret ); 962817466cbSJens Wiklander } 963817466cbSJens Wiklander 9647901324dSJerome Forissier #endif /* ! MBEDTLS_ECJPAKE_ALT */ 9657901324dSJerome Forissier 966817466cbSJens Wiklander /* For tests we don't need a secure RNG; 967817466cbSJens Wiklander * use the LGC from Numerical Recipes for simplicity */ 968817466cbSJens Wiklander static int ecjpake_lgc( void *p, unsigned char *out, size_t len ) 969817466cbSJens Wiklander { 970817466cbSJens Wiklander static uint32_t x = 42; 971817466cbSJens Wiklander (void) p; 972817466cbSJens Wiklander 973817466cbSJens Wiklander while( len > 0 ) 974817466cbSJens Wiklander { 975817466cbSJens Wiklander size_t use_len = len > 4 ? 4 : len; 976817466cbSJens Wiklander x = 1664525 * x + 1013904223; 977817466cbSJens Wiklander memcpy( out, &x, use_len ); 978817466cbSJens Wiklander out += use_len; 979817466cbSJens Wiklander len -= use_len; 980817466cbSJens Wiklander } 981817466cbSJens Wiklander 982817466cbSJens Wiklander return( 0 ); 983817466cbSJens Wiklander } 984817466cbSJens Wiklander 985817466cbSJens Wiklander #define TEST_ASSERT( x ) \ 986817466cbSJens Wiklander do { \ 987817466cbSJens Wiklander if( x ) \ 988817466cbSJens Wiklander ret = 0; \ 989817466cbSJens Wiklander else \ 990817466cbSJens Wiklander { \ 991817466cbSJens Wiklander ret = 1; \ 992817466cbSJens Wiklander goto cleanup; \ 993817466cbSJens Wiklander } \ 994817466cbSJens Wiklander } while( 0 ) 995817466cbSJens Wiklander 996817466cbSJens Wiklander /* 997817466cbSJens Wiklander * Checkup routine 998817466cbSJens Wiklander */ 999817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 1000817466cbSJens Wiklander { 100111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1002817466cbSJens Wiklander mbedtls_ecjpake_context cli; 1003817466cbSJens Wiklander mbedtls_ecjpake_context srv; 1004817466cbSJens Wiklander unsigned char buf[512], pms[32]; 1005817466cbSJens Wiklander size_t len, pmslen; 1006817466cbSJens Wiklander 1007817466cbSJens Wiklander mbedtls_ecjpake_init( &cli ); 1008817466cbSJens Wiklander mbedtls_ecjpake_init( &srv ); 1009817466cbSJens Wiklander 1010817466cbSJens Wiklander if( verbose != 0 ) 1011817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #0 (setup): " ); 1012817466cbSJens Wiklander 1013817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT, 1014817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 1015817466cbSJens Wiklander ecjpake_test_password, 1016817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 1017817466cbSJens Wiklander 1018817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER, 1019817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 1020817466cbSJens Wiklander ecjpake_test_password, 1021817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 1022817466cbSJens Wiklander 1023817466cbSJens Wiklander if( verbose != 0 ) 1024817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1025817466cbSJens Wiklander 1026817466cbSJens Wiklander if( verbose != 0 ) 1027817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #1 (random handshake): " ); 1028817466cbSJens Wiklander 1029817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli, 1030817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1031817466cbSJens Wiklander 1032817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 ); 1033817466cbSJens Wiklander 1034817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv, 1035817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1036817466cbSJens Wiklander 1037817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 ); 1038817466cbSJens Wiklander 1039817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv, 1040817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1041817466cbSJens Wiklander 1042817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 ); 1043817466cbSJens Wiklander 1044817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1045817466cbSJens Wiklander pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 ); 1046817466cbSJens Wiklander 1047817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli, 1048817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1049817466cbSJens Wiklander 1050817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 ); 1051817466cbSJens Wiklander 1052817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1053817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1054817466cbSJens Wiklander 1055817466cbSJens Wiklander TEST_ASSERT( len == pmslen ); 1056817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, pms, len ) == 0 ); 1057817466cbSJens Wiklander 1058817466cbSJens Wiklander if( verbose != 0 ) 1059817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1060817466cbSJens Wiklander 10617901324dSJerome Forissier #if !defined(MBEDTLS_ECJPAKE_ALT) 10627901324dSJerome Forissier /* 'reference handshake' tests can only be run against implementations 10637901324dSJerome Forissier * for which we have 100% control over how the random ephemeral keys 10647901324dSJerome Forissier * are generated. This is only the case for the internal mbed TLS 10657901324dSJerome Forissier * implementation, so these tests are skipped in case the internal 10667901324dSJerome Forissier * implementation is swapped out for an alternative one. */ 1067817466cbSJens Wiklander if( verbose != 0 ) 1068817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #2 (reference handshake): " ); 1069817466cbSJens Wiklander 1070817466cbSJens Wiklander /* Simulate generation of round one */ 1071817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &cli, 1072817466cbSJens Wiklander ecjpake_test_x1, sizeof( ecjpake_test_x1 ), 1073817466cbSJens Wiklander ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) ); 1074817466cbSJens Wiklander 1075817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &srv, 1076817466cbSJens Wiklander ecjpake_test_x3, sizeof( ecjpake_test_x3 ), 1077817466cbSJens Wiklander ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) ); 1078817466cbSJens Wiklander 1079817466cbSJens Wiklander /* Read round one */ 1080817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, 1081817466cbSJens Wiklander ecjpake_test_cli_one, 1082817466cbSJens Wiklander sizeof( ecjpake_test_cli_one ) ) == 0 ); 1083817466cbSJens Wiklander 1084817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, 1085817466cbSJens Wiklander ecjpake_test_srv_one, 1086817466cbSJens Wiklander sizeof( ecjpake_test_srv_one ) ) == 0 ); 1087817466cbSJens Wiklander 1088817466cbSJens Wiklander /* Skip generation of round two, read round two */ 1089817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, 1090817466cbSJens Wiklander ecjpake_test_srv_two, 1091817466cbSJens Wiklander sizeof( ecjpake_test_srv_two ) ) == 0 ); 1092817466cbSJens Wiklander 1093817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, 1094817466cbSJens Wiklander ecjpake_test_cli_two, 1095817466cbSJens Wiklander sizeof( ecjpake_test_cli_two ) ) == 0 ); 1096817466cbSJens Wiklander 1097817466cbSJens Wiklander /* Server derives PMS */ 1098817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1099817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1100817466cbSJens Wiklander 1101817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1102817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1103817466cbSJens Wiklander 1104817466cbSJens Wiklander memset( buf, 0, len ); /* Avoid interferences with next step */ 1105817466cbSJens Wiklander 1106817466cbSJens Wiklander /* Client derives PMS */ 1107817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1108817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1109817466cbSJens Wiklander 1110817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1111817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1112817466cbSJens Wiklander 1113817466cbSJens Wiklander if( verbose != 0 ) 1114817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 11157901324dSJerome Forissier #endif /* ! MBEDTLS_ECJPAKE_ALT */ 1116817466cbSJens Wiklander 1117817466cbSJens Wiklander cleanup: 1118817466cbSJens Wiklander mbedtls_ecjpake_free( &cli ); 1119817466cbSJens Wiklander mbedtls_ecjpake_free( &srv ); 1120817466cbSJens Wiklander 1121817466cbSJens Wiklander if( ret != 0 ) 1122817466cbSJens Wiklander { 1123817466cbSJens Wiklander if( verbose != 0 ) 1124817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 1125817466cbSJens Wiklander 1126817466cbSJens Wiklander ret = 1; 1127817466cbSJens Wiklander } 1128817466cbSJens Wiklander 1129817466cbSJens Wiklander if( verbose != 0 ) 1130817466cbSJens Wiklander mbedtls_printf( "\n" ); 1131817466cbSJens Wiklander 1132817466cbSJens Wiklander return( ret ); 1133817466cbSJens Wiklander } 1134817466cbSJens Wiklander 1135817466cbSJens Wiklander #undef TEST_ASSERT 1136817466cbSJens Wiklander 1137817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */ 1138817466cbSJens Wiklander 1139817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 1140817466cbSJens Wiklander 1141817466cbSJens Wiklander #endif /* MBEDTLS_ECJPAKE_C */ 1142