1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * Elliptic curve J-PAKE 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * References in the code are to the Thread v1.0 Specification, 24817466cbSJens Wiklander * available to members of the Thread Group http://threadgroup.org/ 25817466cbSJens Wiklander */ 26817466cbSJens Wiklander 27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 28817466cbSJens Wiklander #include "mbedtls/config.h" 29817466cbSJens Wiklander #else 30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 31817466cbSJens Wiklander #endif 32817466cbSJens Wiklander 33817466cbSJens Wiklander #if defined(MBEDTLS_ECJPAKE_C) 34817466cbSJens Wiklander 35817466cbSJens Wiklander #include "mbedtls/ecjpake.h" 363d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 37*11fa71b9SJerome Forissier #include "mbedtls/error.h" 38817466cbSJens Wiklander 39817466cbSJens Wiklander #include <string.h> 40817466cbSJens Wiklander 413d3b0591SJens Wiklander #if !defined(MBEDTLS_ECJPAKE_ALT) 423d3b0591SJens Wiklander 433d3b0591SJens Wiklander /* Parameter validation macros based on platform_util.h */ 443d3b0591SJens Wiklander #define ECJPAKE_VALIDATE_RET( cond ) \ 453d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE_RET( cond, MBEDTLS_ERR_ECP_BAD_INPUT_DATA ) 463d3b0591SJens Wiklander #define ECJPAKE_VALIDATE( cond ) \ 473d3b0591SJens Wiklander MBEDTLS_INTERNAL_VALIDATE( cond ) 483d3b0591SJens Wiklander 49817466cbSJens Wiklander /* 50817466cbSJens Wiklander * Convert a mbedtls_ecjpake_role to identifier string 51817466cbSJens Wiklander */ 52817466cbSJens Wiklander static const char * const ecjpake_id[] = { 53817466cbSJens Wiklander "client", 54817466cbSJens Wiklander "server" 55817466cbSJens Wiklander }; 56817466cbSJens Wiklander 57817466cbSJens Wiklander #define ID_MINE ( ecjpake_id[ ctx->role ] ) 58817466cbSJens Wiklander #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] ) 59817466cbSJens Wiklander 60817466cbSJens Wiklander /* 61817466cbSJens Wiklander * Initialize context 62817466cbSJens Wiklander */ 63817466cbSJens Wiklander void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx ) 64817466cbSJens Wiklander { 653d3b0591SJens Wiklander ECJPAKE_VALIDATE( ctx != NULL ); 66817466cbSJens Wiklander 67817466cbSJens Wiklander ctx->md_info = NULL; 68817466cbSJens Wiklander mbedtls_ecp_group_init( &ctx->grp ); 69817466cbSJens Wiklander ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED; 70817466cbSJens Wiklander 71817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm1 ); 72817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm2 ); 73817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp1 ); 74817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp2 ); 75817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp ); 76817466cbSJens Wiklander 77817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm1 ); 78817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm2 ); 79817466cbSJens Wiklander mbedtls_mpi_init( &ctx->s ); 80817466cbSJens Wiklander } 81817466cbSJens Wiklander 82817466cbSJens Wiklander /* 83817466cbSJens Wiklander * Free context 84817466cbSJens Wiklander */ 85817466cbSJens Wiklander void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx ) 86817466cbSJens Wiklander { 87817466cbSJens Wiklander if( ctx == NULL ) 88817466cbSJens Wiklander return; 89817466cbSJens Wiklander 90817466cbSJens Wiklander ctx->md_info = NULL; 91817466cbSJens Wiklander mbedtls_ecp_group_free( &ctx->grp ); 92817466cbSJens Wiklander 93817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm1 ); 94817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm2 ); 95817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp1 ); 96817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp2 ); 97817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp ); 98817466cbSJens Wiklander 99817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm1 ); 100817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm2 ); 101817466cbSJens Wiklander mbedtls_mpi_free( &ctx->s ); 102817466cbSJens Wiklander } 103817466cbSJens Wiklander 104817466cbSJens Wiklander /* 105817466cbSJens Wiklander * Setup context 106817466cbSJens Wiklander */ 107817466cbSJens Wiklander int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx, 108817466cbSJens Wiklander mbedtls_ecjpake_role role, 109817466cbSJens Wiklander mbedtls_md_type_t hash, 110817466cbSJens Wiklander mbedtls_ecp_group_id curve, 111817466cbSJens Wiklander const unsigned char *secret, 112817466cbSJens Wiklander size_t len ) 113817466cbSJens Wiklander { 114*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 115817466cbSJens Wiklander 1163d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 1173d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( role == MBEDTLS_ECJPAKE_CLIENT || 1183d3b0591SJens Wiklander role == MBEDTLS_ECJPAKE_SERVER ); 1193d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( secret != NULL || len == 0 ); 1203d3b0591SJens Wiklander 121817466cbSJens Wiklander ctx->role = role; 122817466cbSJens Wiklander 123817466cbSJens Wiklander if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL ) 124817466cbSJens Wiklander return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE ); 125817466cbSJens Wiklander 126817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) ); 127817466cbSJens Wiklander 128817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) ); 129817466cbSJens Wiklander 130817466cbSJens Wiklander cleanup: 131817466cbSJens Wiklander if( ret != 0 ) 132817466cbSJens Wiklander mbedtls_ecjpake_free( ctx ); 133817466cbSJens Wiklander 134817466cbSJens Wiklander return( ret ); 135817466cbSJens Wiklander } 136817466cbSJens Wiklander 137817466cbSJens Wiklander /* 138817466cbSJens Wiklander * Check if context is ready for use 139817466cbSJens Wiklander */ 140817466cbSJens Wiklander int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx ) 141817466cbSJens Wiklander { 1423d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 1433d3b0591SJens Wiklander 144817466cbSJens Wiklander if( ctx->md_info == NULL || 145817466cbSJens Wiklander ctx->grp.id == MBEDTLS_ECP_DP_NONE || 146817466cbSJens Wiklander ctx->s.p == NULL ) 147817466cbSJens Wiklander { 148817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 149817466cbSJens Wiklander } 150817466cbSJens Wiklander 151817466cbSJens Wiklander return( 0 ); 152817466cbSJens Wiklander } 153817466cbSJens Wiklander 154817466cbSJens Wiklander /* 155817466cbSJens Wiklander * Write a point plus its length to a buffer 156817466cbSJens Wiklander */ 157817466cbSJens Wiklander static int ecjpake_write_len_point( unsigned char **p, 158817466cbSJens Wiklander const unsigned char *end, 159817466cbSJens Wiklander const mbedtls_ecp_group *grp, 160817466cbSJens Wiklander const int pf, 161817466cbSJens Wiklander const mbedtls_ecp_point *P ) 162817466cbSJens Wiklander { 163*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 164817466cbSJens Wiklander size_t len; 165817466cbSJens Wiklander 166817466cbSJens Wiklander /* Need at least 4 for length plus 1 for point */ 167817466cbSJens Wiklander if( end < *p || end - *p < 5 ) 168817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 169817466cbSJens Wiklander 170817466cbSJens Wiklander ret = mbedtls_ecp_point_write_binary( grp, P, pf, 171817466cbSJens Wiklander &len, *p + 4, end - ( *p + 4 ) ); 172817466cbSJens Wiklander if( ret != 0 ) 173817466cbSJens Wiklander return( ret ); 174817466cbSJens Wiklander 175817466cbSJens Wiklander (*p)[0] = (unsigned char)( ( len >> 24 ) & 0xFF ); 176817466cbSJens Wiklander (*p)[1] = (unsigned char)( ( len >> 16 ) & 0xFF ); 177817466cbSJens Wiklander (*p)[2] = (unsigned char)( ( len >> 8 ) & 0xFF ); 178817466cbSJens Wiklander (*p)[3] = (unsigned char)( ( len ) & 0xFF ); 179817466cbSJens Wiklander 180817466cbSJens Wiklander *p += 4 + len; 181817466cbSJens Wiklander 182817466cbSJens Wiklander return( 0 ); 183817466cbSJens Wiklander } 184817466cbSJens Wiklander 185817466cbSJens Wiklander /* 186817466cbSJens Wiklander * Size of the temporary buffer for ecjpake_hash: 187817466cbSJens Wiklander * 3 EC points plus their length, plus ID and its length (4 + 6 bytes) 188817466cbSJens Wiklander */ 189817466cbSJens Wiklander #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 ) 190817466cbSJens Wiklander 191817466cbSJens Wiklander /* 192817466cbSJens Wiklander * Compute hash for ZKP (7.4.2.2.2.1) 193817466cbSJens Wiklander */ 194817466cbSJens Wiklander static int ecjpake_hash( const mbedtls_md_info_t *md_info, 195817466cbSJens Wiklander const mbedtls_ecp_group *grp, 196817466cbSJens Wiklander const int pf, 197817466cbSJens Wiklander const mbedtls_ecp_point *G, 198817466cbSJens Wiklander const mbedtls_ecp_point *V, 199817466cbSJens Wiklander const mbedtls_ecp_point *X, 200817466cbSJens Wiklander const char *id, 201817466cbSJens Wiklander mbedtls_mpi *h ) 202817466cbSJens Wiklander { 203*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 204817466cbSJens Wiklander unsigned char buf[ECJPAKE_HASH_BUF_LEN]; 205817466cbSJens Wiklander unsigned char *p = buf; 206817466cbSJens Wiklander const unsigned char *end = buf + sizeof( buf ); 207817466cbSJens Wiklander const size_t id_len = strlen( id ); 208817466cbSJens Wiklander unsigned char hash[MBEDTLS_MD_MAX_SIZE]; 209817466cbSJens Wiklander 210817466cbSJens Wiklander /* Write things to temporary buffer */ 211817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) ); 212817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) ); 213817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) ); 214817466cbSJens Wiklander 215817466cbSJens Wiklander if( end - p < 4 ) 216817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 217817466cbSJens Wiklander 218817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF ); 219817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF ); 220817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF ); 221817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len ) & 0xFF ); 222817466cbSJens Wiklander 223817466cbSJens Wiklander if( end < p || (size_t)( end - p ) < id_len ) 224817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 225817466cbSJens Wiklander 226817466cbSJens Wiklander memcpy( p, id, id_len ); 227817466cbSJens Wiklander p += id_len; 228817466cbSJens Wiklander 229817466cbSJens Wiklander /* Compute hash */ 2305b25c76aSJerome Forissier MBEDTLS_MPI_CHK( mbedtls_md( md_info, buf, p - buf, hash ) ); 231817466cbSJens Wiklander 232817466cbSJens Wiklander /* Turn it into an integer mod n */ 233817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash, 234817466cbSJens Wiklander mbedtls_md_get_size( md_info ) ) ); 235817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) ); 236817466cbSJens Wiklander 237817466cbSJens Wiklander cleanup: 238817466cbSJens Wiklander return( ret ); 239817466cbSJens Wiklander } 240817466cbSJens Wiklander 241817466cbSJens Wiklander /* 242817466cbSJens Wiklander * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3) 243817466cbSJens Wiklander */ 244817466cbSJens Wiklander static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info, 245817466cbSJens Wiklander const mbedtls_ecp_group *grp, 246817466cbSJens Wiklander const int pf, 247817466cbSJens Wiklander const mbedtls_ecp_point *G, 248817466cbSJens Wiklander const mbedtls_ecp_point *X, 249817466cbSJens Wiklander const char *id, 250817466cbSJens Wiklander const unsigned char **p, 251817466cbSJens Wiklander const unsigned char *end ) 252817466cbSJens Wiklander { 253*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 254817466cbSJens Wiklander mbedtls_ecp_point V, VV; 255817466cbSJens Wiklander mbedtls_mpi r, h; 256817466cbSJens Wiklander size_t r_len; 257817466cbSJens Wiklander 258817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 259817466cbSJens Wiklander mbedtls_ecp_point_init( &VV ); 260817466cbSJens Wiklander mbedtls_mpi_init( &r ); 261817466cbSJens Wiklander mbedtls_mpi_init( &h ); 262817466cbSJens Wiklander 263817466cbSJens Wiklander /* 264817466cbSJens Wiklander * struct { 265817466cbSJens Wiklander * ECPoint V; 266817466cbSJens Wiklander * opaque r<1..2^8-1>; 267817466cbSJens Wiklander * } ECSchnorrZKP; 268817466cbSJens Wiklander */ 269817466cbSJens Wiklander if( end < *p ) 270817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 271817466cbSJens Wiklander 272817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) ); 273817466cbSJens Wiklander 274817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 ) 275817466cbSJens Wiklander { 276817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 277817466cbSJens Wiklander goto cleanup; 278817466cbSJens Wiklander } 279817466cbSJens Wiklander 280817466cbSJens Wiklander r_len = *(*p)++; 281817466cbSJens Wiklander 282817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < r_len ) 283817466cbSJens Wiklander { 284817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 285817466cbSJens Wiklander goto cleanup; 286817466cbSJens Wiklander } 287817466cbSJens Wiklander 288817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) ); 289817466cbSJens Wiklander *p += r_len; 290817466cbSJens Wiklander 291817466cbSJens Wiklander /* 292817466cbSJens Wiklander * Verification 293817466cbSJens Wiklander */ 294817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 295817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp, 296817466cbSJens Wiklander &VV, &h, X, &r, G ) ); 297817466cbSJens Wiklander 298817466cbSJens Wiklander if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 ) 299817466cbSJens Wiklander { 300817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED; 301817466cbSJens Wiklander goto cleanup; 302817466cbSJens Wiklander } 303817466cbSJens Wiklander 304817466cbSJens Wiklander cleanup: 305817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 306817466cbSJens Wiklander mbedtls_ecp_point_free( &VV ); 307817466cbSJens Wiklander mbedtls_mpi_free( &r ); 308817466cbSJens Wiklander mbedtls_mpi_free( &h ); 309817466cbSJens Wiklander 310817466cbSJens Wiklander return( ret ); 311817466cbSJens Wiklander } 312817466cbSJens Wiklander 313817466cbSJens Wiklander /* 314817466cbSJens Wiklander * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2) 315817466cbSJens Wiklander */ 316817466cbSJens Wiklander static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info, 317817466cbSJens Wiklander const mbedtls_ecp_group *grp, 318817466cbSJens Wiklander const int pf, 319817466cbSJens Wiklander const mbedtls_ecp_point *G, 320817466cbSJens Wiklander const mbedtls_mpi *x, 321817466cbSJens Wiklander const mbedtls_ecp_point *X, 322817466cbSJens Wiklander const char *id, 323817466cbSJens Wiklander unsigned char **p, 324817466cbSJens Wiklander const unsigned char *end, 325817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 326817466cbSJens Wiklander void *p_rng ) 327817466cbSJens Wiklander { 328*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 329817466cbSJens Wiklander mbedtls_ecp_point V; 330817466cbSJens Wiklander mbedtls_mpi v; 331817466cbSJens Wiklander mbedtls_mpi h; /* later recycled to hold r */ 332817466cbSJens Wiklander size_t len; 333817466cbSJens Wiklander 334817466cbSJens Wiklander if( end < *p ) 335817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 336817466cbSJens Wiklander 337817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 338817466cbSJens Wiklander mbedtls_mpi_init( &v ); 339817466cbSJens Wiklander mbedtls_mpi_init( &h ); 340817466cbSJens Wiklander 341817466cbSJens Wiklander /* Compute signature */ 342817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, 343817466cbSJens Wiklander G, &v, &V, f_rng, p_rng ) ); 344817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 345817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */ 346817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */ 347817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */ 348817466cbSJens Wiklander 349817466cbSJens Wiklander /* Write it out */ 350817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V, 351817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 352817466cbSJens Wiklander *p += len; 353817466cbSJens Wiklander 354817466cbSJens Wiklander len = mbedtls_mpi_size( &h ); /* actually r */ 355817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 ) 356817466cbSJens Wiklander { 357817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 358817466cbSJens Wiklander goto cleanup; 359817466cbSJens Wiklander } 360817466cbSJens Wiklander 361817466cbSJens Wiklander *(*p)++ = (unsigned char)( len & 0xFF ); 362817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */ 363817466cbSJens Wiklander *p += len; 364817466cbSJens Wiklander 365817466cbSJens Wiklander cleanup: 366817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 367817466cbSJens Wiklander mbedtls_mpi_free( &v ); 368817466cbSJens Wiklander mbedtls_mpi_free( &h ); 369817466cbSJens Wiklander 370817466cbSJens Wiklander return( ret ); 371817466cbSJens Wiklander } 372817466cbSJens Wiklander 373817466cbSJens Wiklander /* 374817466cbSJens Wiklander * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof 375817466cbSJens Wiklander * Output: verified public key X 376817466cbSJens Wiklander */ 377817466cbSJens Wiklander static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info, 378817466cbSJens Wiklander const mbedtls_ecp_group *grp, 379817466cbSJens Wiklander const int pf, 380817466cbSJens Wiklander const mbedtls_ecp_point *G, 381817466cbSJens Wiklander mbedtls_ecp_point *X, 382817466cbSJens Wiklander const char *id, 383817466cbSJens Wiklander const unsigned char **p, 384817466cbSJens Wiklander const unsigned char *end ) 385817466cbSJens Wiklander { 386*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 387817466cbSJens Wiklander 388817466cbSJens Wiklander if( end < *p ) 389817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 390817466cbSJens Wiklander 391817466cbSJens Wiklander /* 392817466cbSJens Wiklander * struct { 393817466cbSJens Wiklander * ECPoint X; 394817466cbSJens Wiklander * ECSchnorrZKP zkp; 395817466cbSJens Wiklander * } ECJPAKEKeyKP; 396817466cbSJens Wiklander */ 397817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) ); 398817466cbSJens Wiklander if( mbedtls_ecp_is_zero( X ) ) 399817466cbSJens Wiklander { 400817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 401817466cbSJens Wiklander goto cleanup; 402817466cbSJens Wiklander } 403817466cbSJens Wiklander 404817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) ); 405817466cbSJens Wiklander 406817466cbSJens Wiklander cleanup: 407817466cbSJens Wiklander return( ret ); 408817466cbSJens Wiklander } 409817466cbSJens Wiklander 410817466cbSJens Wiklander /* 411817466cbSJens Wiklander * Generate an ECJPAKEKeyKP 412817466cbSJens Wiklander * Output: the serialized structure, plus private/public key pair 413817466cbSJens Wiklander */ 414817466cbSJens Wiklander static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info, 415817466cbSJens Wiklander const mbedtls_ecp_group *grp, 416817466cbSJens Wiklander const int pf, 417817466cbSJens Wiklander const mbedtls_ecp_point *G, 418817466cbSJens Wiklander mbedtls_mpi *x, 419817466cbSJens Wiklander mbedtls_ecp_point *X, 420817466cbSJens Wiklander const char *id, 421817466cbSJens Wiklander unsigned char **p, 422817466cbSJens Wiklander const unsigned char *end, 423817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 424817466cbSJens Wiklander void *p_rng ) 425817466cbSJens Wiklander { 426*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 427817466cbSJens Wiklander size_t len; 428817466cbSJens Wiklander 429817466cbSJens Wiklander if( end < *p ) 430817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 431817466cbSJens Wiklander 432817466cbSJens Wiklander /* Generate key (7.4.2.3.1) and write it out */ 433817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X, 434817466cbSJens Wiklander f_rng, p_rng ) ); 435817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X, 436817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 437817466cbSJens Wiklander *p += len; 438817466cbSJens Wiklander 439817466cbSJens Wiklander /* Generate and write proof */ 440817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id, 441817466cbSJens Wiklander p, end, f_rng, p_rng ) ); 442817466cbSJens Wiklander 443817466cbSJens Wiklander cleanup: 444817466cbSJens Wiklander return( ret ); 445817466cbSJens Wiklander } 446817466cbSJens Wiklander 447817466cbSJens Wiklander /* 448817466cbSJens Wiklander * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs 449817466cbSJens Wiklander * Ouputs: verified peer public keys Xa, Xb 450817466cbSJens Wiklander */ 451817466cbSJens Wiklander static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info, 452817466cbSJens Wiklander const mbedtls_ecp_group *grp, 453817466cbSJens Wiklander const int pf, 454817466cbSJens Wiklander const mbedtls_ecp_point *G, 455817466cbSJens Wiklander mbedtls_ecp_point *Xa, 456817466cbSJens Wiklander mbedtls_ecp_point *Xb, 457817466cbSJens Wiklander const char *id, 458817466cbSJens Wiklander const unsigned char *buf, 459817466cbSJens Wiklander size_t len ) 460817466cbSJens Wiklander { 461*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 462817466cbSJens Wiklander const unsigned char *p = buf; 463817466cbSJens Wiklander const unsigned char *end = buf + len; 464817466cbSJens Wiklander 465817466cbSJens Wiklander /* 466817466cbSJens Wiklander * struct { 467817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2]; 468817466cbSJens Wiklander * } ECJPAKEKeyKPPairList; 469817466cbSJens Wiklander */ 470817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) ); 471817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) ); 472817466cbSJens Wiklander 473817466cbSJens Wiklander if( p != end ) 474817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 475817466cbSJens Wiklander 476817466cbSJens Wiklander cleanup: 477817466cbSJens Wiklander return( ret ); 478817466cbSJens Wiklander } 479817466cbSJens Wiklander 480817466cbSJens Wiklander /* 481817466cbSJens Wiklander * Generate a ECJPAKEKeyKPPairList 482817466cbSJens Wiklander * Outputs: the serialized structure, plus two private/public key pairs 483817466cbSJens Wiklander */ 484817466cbSJens Wiklander static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info, 485817466cbSJens Wiklander const mbedtls_ecp_group *grp, 486817466cbSJens Wiklander const int pf, 487817466cbSJens Wiklander const mbedtls_ecp_point *G, 488817466cbSJens Wiklander mbedtls_mpi *xm1, 489817466cbSJens Wiklander mbedtls_ecp_point *Xa, 490817466cbSJens Wiklander mbedtls_mpi *xm2, 491817466cbSJens Wiklander mbedtls_ecp_point *Xb, 492817466cbSJens Wiklander const char *id, 493817466cbSJens Wiklander unsigned char *buf, 494817466cbSJens Wiklander size_t len, 495817466cbSJens Wiklander size_t *olen, 496817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 497817466cbSJens Wiklander void *p_rng ) 498817466cbSJens Wiklander { 499*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 500817466cbSJens Wiklander unsigned char *p = buf; 501817466cbSJens Wiklander const unsigned char *end = buf + len; 502817466cbSJens Wiklander 503817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id, 504817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 505817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id, 506817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 507817466cbSJens Wiklander 508817466cbSJens Wiklander *olen = p - buf; 509817466cbSJens Wiklander 510817466cbSJens Wiklander cleanup: 511817466cbSJens Wiklander return( ret ); 512817466cbSJens Wiklander } 513817466cbSJens Wiklander 514817466cbSJens Wiklander /* 515817466cbSJens Wiklander * Read and process the first round message 516817466cbSJens Wiklander */ 517817466cbSJens Wiklander int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx, 518817466cbSJens Wiklander const unsigned char *buf, 519817466cbSJens Wiklander size_t len ) 520817466cbSJens Wiklander { 5213d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5223d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5233d3b0591SJens Wiklander 524817466cbSJens Wiklander return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format, 525817466cbSJens Wiklander &ctx->grp.G, 526817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, ID_PEER, 527817466cbSJens Wiklander buf, len ) ); 528817466cbSJens Wiklander } 529817466cbSJens Wiklander 530817466cbSJens Wiklander /* 531817466cbSJens Wiklander * Generate and write the first round message 532817466cbSJens Wiklander */ 533817466cbSJens Wiklander int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx, 534817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 535817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 536817466cbSJens Wiklander void *p_rng ) 537817466cbSJens Wiklander { 5383d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5393d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5403d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 5413d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 5423d3b0591SJens Wiklander 543817466cbSJens Wiklander return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format, 544817466cbSJens Wiklander &ctx->grp.G, 545817466cbSJens Wiklander &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2, 546817466cbSJens Wiklander ID_MINE, buf, len, olen, f_rng, p_rng ) ); 547817466cbSJens Wiklander } 548817466cbSJens Wiklander 549817466cbSJens Wiklander /* 550817466cbSJens Wiklander * Compute the sum of three points R = A + B + C 551817466cbSJens Wiklander */ 552817466cbSJens Wiklander static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 553817466cbSJens Wiklander const mbedtls_ecp_point *A, 554817466cbSJens Wiklander const mbedtls_ecp_point *B, 555817466cbSJens Wiklander const mbedtls_ecp_point *C ) 556817466cbSJens Wiklander { 557*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 558817466cbSJens Wiklander mbedtls_mpi one; 559817466cbSJens Wiklander 560817466cbSJens Wiklander mbedtls_mpi_init( &one ); 561817466cbSJens Wiklander 562817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 563817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) ); 564817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) ); 565817466cbSJens Wiklander 566817466cbSJens Wiklander cleanup: 567817466cbSJens Wiklander mbedtls_mpi_free( &one ); 568817466cbSJens Wiklander 569817466cbSJens Wiklander return( ret ); 570817466cbSJens Wiklander } 571817466cbSJens Wiklander 572817466cbSJens Wiklander /* 573817466cbSJens Wiklander * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6) 574817466cbSJens Wiklander */ 575817466cbSJens Wiklander int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx, 576817466cbSJens Wiklander const unsigned char *buf, 577817466cbSJens Wiklander size_t len ) 578817466cbSJens Wiklander { 579*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 580817466cbSJens Wiklander const unsigned char *p = buf; 581817466cbSJens Wiklander const unsigned char *end = buf + len; 582817466cbSJens Wiklander mbedtls_ecp_group grp; 583817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GB, S: GA */ 584817466cbSJens Wiklander 5853d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 5863d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 5873d3b0591SJens Wiklander 588817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 589817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 590817466cbSJens Wiklander 591817466cbSJens Wiklander /* 592817466cbSJens Wiklander * Server: GA = X3 + X4 + X1 (7.4.2.6.1) 593817466cbSJens Wiklander * Client: GB = X1 + X2 + X3 (7.4.2.5.1) 594817466cbSJens Wiklander * Unified: G = Xm1 + Xm2 + Xp1 595817466cbSJens Wiklander * We need that before parsing in order to check Xp as we read it 596817466cbSJens Wiklander */ 597817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 598817466cbSJens Wiklander &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) ); 599817466cbSJens Wiklander 600817466cbSJens Wiklander /* 601817466cbSJens Wiklander * struct { 602817466cbSJens Wiklander * ECParameters curve_params; // only client reading server msg 603817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 604817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 605817466cbSJens Wiklander */ 606817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_CLIENT ) 607817466cbSJens Wiklander { 608817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) ); 609817466cbSJens Wiklander if( grp.id != ctx->grp.id ) 610817466cbSJens Wiklander { 611817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 612817466cbSJens Wiklander goto cleanup; 613817466cbSJens Wiklander } 614817466cbSJens Wiklander } 615817466cbSJens Wiklander 616817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp, 617817466cbSJens Wiklander ctx->point_format, 618817466cbSJens Wiklander &G, &ctx->Xp, ID_PEER, &p, end ) ); 619817466cbSJens Wiklander 620817466cbSJens Wiklander if( p != end ) 621817466cbSJens Wiklander { 622817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 623817466cbSJens Wiklander goto cleanup; 624817466cbSJens Wiklander } 625817466cbSJens Wiklander 626817466cbSJens Wiklander cleanup: 627817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 628817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 629817466cbSJens Wiklander 630817466cbSJens Wiklander return( ret ); 631817466cbSJens Wiklander } 632817466cbSJens Wiklander 633817466cbSJens Wiklander /* 634817466cbSJens Wiklander * Compute R = +/- X * S mod N, taking care not to leak S 635817466cbSJens Wiklander */ 636817466cbSJens Wiklander static int ecjpake_mul_secret( mbedtls_mpi *R, int sign, 637817466cbSJens Wiklander const mbedtls_mpi *X, 638817466cbSJens Wiklander const mbedtls_mpi *S, 639817466cbSJens Wiklander const mbedtls_mpi *N, 640817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 641817466cbSJens Wiklander void *p_rng ) 642817466cbSJens Wiklander { 643*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 644817466cbSJens Wiklander mbedtls_mpi b; /* Blinding value, then s + N * blinding */ 645817466cbSJens Wiklander 646817466cbSJens Wiklander mbedtls_mpi_init( &b ); 647817466cbSJens Wiklander 648817466cbSJens Wiklander /* b = s + rnd-128-bit * N */ 649817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) ); 650817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) ); 651817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) ); 652817466cbSJens Wiklander 653817466cbSJens Wiklander /* R = sign * X * b mod N */ 654817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) ); 655817466cbSJens Wiklander R->s *= sign; 656817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) ); 657817466cbSJens Wiklander 658817466cbSJens Wiklander cleanup: 659817466cbSJens Wiklander mbedtls_mpi_free( &b ); 660817466cbSJens Wiklander 661817466cbSJens Wiklander return( ret ); 662817466cbSJens Wiklander } 663817466cbSJens Wiklander 664817466cbSJens Wiklander /* 665817466cbSJens Wiklander * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6) 666817466cbSJens Wiklander */ 667817466cbSJens Wiklander int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx, 668817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 669817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 670817466cbSJens Wiklander void *p_rng ) 671817466cbSJens Wiklander { 672*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 673817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GA, S: GB */ 674817466cbSJens Wiklander mbedtls_ecp_point Xm; /* C: Xc, S: Xs */ 675817466cbSJens Wiklander mbedtls_mpi xm; /* C: xc, S: xs */ 676817466cbSJens Wiklander unsigned char *p = buf; 677817466cbSJens Wiklander const unsigned char *end = buf + len; 678817466cbSJens Wiklander size_t ec_len; 679817466cbSJens Wiklander 6803d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 6813d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 6823d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 6833d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 6843d3b0591SJens Wiklander 685817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 686817466cbSJens Wiklander mbedtls_ecp_point_init( &Xm ); 687817466cbSJens Wiklander mbedtls_mpi_init( &xm ); 688817466cbSJens Wiklander 689817466cbSJens Wiklander /* 690817466cbSJens Wiklander * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1) 691817466cbSJens Wiklander * 692817466cbSJens Wiklander * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA 693817466cbSJens Wiklander * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB 694817466cbSJens Wiklander * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G 695817466cbSJens Wiklander */ 696817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 697817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) ); 698817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s, 699817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 700817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) ); 701817466cbSJens Wiklander 702817466cbSJens Wiklander /* 703817466cbSJens Wiklander * Now write things out 704817466cbSJens Wiklander * 705817466cbSJens Wiklander * struct { 706817466cbSJens Wiklander * ECParameters curve_params; // only server writing its message 707817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 708817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 709817466cbSJens Wiklander */ 710817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_SERVER ) 711817466cbSJens Wiklander { 712817466cbSJens Wiklander if( end < p ) 713817466cbSJens Wiklander { 714817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 715817466cbSJens Wiklander goto cleanup; 716817466cbSJens Wiklander } 717817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len, 718817466cbSJens Wiklander p, end - p ) ); 719817466cbSJens Wiklander p += ec_len; 720817466cbSJens Wiklander } 721817466cbSJens Wiklander 722817466cbSJens Wiklander if( end < p ) 723817466cbSJens Wiklander { 724817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 725817466cbSJens Wiklander goto cleanup; 726817466cbSJens Wiklander } 727817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm, 728817466cbSJens Wiklander ctx->point_format, &ec_len, p, end - p ) ); 729817466cbSJens Wiklander p += ec_len; 730817466cbSJens Wiklander 731817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp, 732817466cbSJens Wiklander ctx->point_format, 733817466cbSJens Wiklander &G, &xm, &Xm, ID_MINE, 734817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 735817466cbSJens Wiklander 736817466cbSJens Wiklander *olen = p - buf; 737817466cbSJens Wiklander 738817466cbSJens Wiklander cleanup: 739817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 740817466cbSJens Wiklander mbedtls_ecp_point_free( &Xm ); 741817466cbSJens Wiklander mbedtls_mpi_free( &xm ); 742817466cbSJens Wiklander 743817466cbSJens Wiklander return( ret ); 744817466cbSJens Wiklander } 745817466cbSJens Wiklander 746817466cbSJens Wiklander /* 747817466cbSJens Wiklander * Derive PMS (7.4.2.7 / 7.4.2.8) 748817466cbSJens Wiklander */ 749817466cbSJens Wiklander int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx, 750817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 751817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 752817466cbSJens Wiklander void *p_rng ) 753817466cbSJens Wiklander { 754*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 755817466cbSJens Wiklander mbedtls_ecp_point K; 756817466cbSJens Wiklander mbedtls_mpi m_xm2_s, one; 757817466cbSJens Wiklander unsigned char kx[MBEDTLS_ECP_MAX_BYTES]; 758817466cbSJens Wiklander size_t x_bytes; 759817466cbSJens Wiklander 7603d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( ctx != NULL ); 7613d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( buf != NULL ); 7623d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( olen != NULL ); 7633d3b0591SJens Wiklander ECJPAKE_VALIDATE_RET( f_rng != NULL ); 7643d3b0591SJens Wiklander 765817466cbSJens Wiklander *olen = mbedtls_md_get_size( ctx->md_info ); 766817466cbSJens Wiklander if( len < *olen ) 767817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 768817466cbSJens Wiklander 769817466cbSJens Wiklander mbedtls_ecp_point_init( &K ); 770817466cbSJens Wiklander mbedtls_mpi_init( &m_xm2_s ); 771817466cbSJens Wiklander mbedtls_mpi_init( &one ); 772817466cbSJens Wiklander 773817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 774817466cbSJens Wiklander 775817466cbSJens Wiklander /* 776817466cbSJens Wiklander * Client: K = ( Xs - X4 * x2 * s ) * x2 777817466cbSJens Wiklander * Server: K = ( Xc - X2 * x4 * s ) * x4 778817466cbSJens Wiklander * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2 779817466cbSJens Wiklander */ 780817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s, 781817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 782817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K, 783817466cbSJens Wiklander &one, &ctx->Xp, 784817466cbSJens Wiklander &m_xm2_s, &ctx->Xp2 ) ); 785817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K, 786817466cbSJens Wiklander f_rng, p_rng ) ); 787817466cbSJens Wiklander 788817466cbSJens Wiklander /* PMS = SHA-256( K.X ) */ 789817466cbSJens Wiklander x_bytes = ( ctx->grp.pbits + 7 ) / 8; 790817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) ); 791817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) ); 792817466cbSJens Wiklander 793817466cbSJens Wiklander cleanup: 794817466cbSJens Wiklander mbedtls_ecp_point_free( &K ); 795817466cbSJens Wiklander mbedtls_mpi_free( &m_xm2_s ); 796817466cbSJens Wiklander mbedtls_mpi_free( &one ); 797817466cbSJens Wiklander 798817466cbSJens Wiklander return( ret ); 799817466cbSJens Wiklander } 800817466cbSJens Wiklander 801817466cbSJens Wiklander #undef ID_MINE 802817466cbSJens Wiklander #undef ID_PEER 803817466cbSJens Wiklander 8043d3b0591SJens Wiklander #endif /* ! MBEDTLS_ECJPAKE_ALT */ 805817466cbSJens Wiklander 806817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 807817466cbSJens Wiklander 808817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 809817466cbSJens Wiklander #include "mbedtls/platform.h" 810817466cbSJens Wiklander #else 811817466cbSJens Wiklander #include <stdio.h> 812817466cbSJens Wiklander #define mbedtls_printf printf 813817466cbSJens Wiklander #endif 814817466cbSJens Wiklander 815817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \ 816817466cbSJens Wiklander !defined(MBEDTLS_SHA256_C) 817817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 818817466cbSJens Wiklander { 819817466cbSJens Wiklander (void) verbose; 820817466cbSJens Wiklander return( 0 ); 821817466cbSJens Wiklander } 822817466cbSJens Wiklander #else 823817466cbSJens Wiklander 824817466cbSJens Wiklander static const unsigned char ecjpake_test_password[] = { 825817466cbSJens Wiklander 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74, 826817466cbSJens Wiklander 0x65, 0x73, 0x74 827817466cbSJens Wiklander }; 828817466cbSJens Wiklander 829817466cbSJens Wiklander static const unsigned char ecjpake_test_x1[] = { 830817466cbSJens Wiklander 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 831817466cbSJens Wiklander 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 832817466cbSJens Wiklander 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21 833817466cbSJens Wiklander }; 834817466cbSJens Wiklander 835817466cbSJens Wiklander static const unsigned char ecjpake_test_x2[] = { 836817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 837817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 838817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 839817466cbSJens Wiklander }; 840817466cbSJens Wiklander 841817466cbSJens Wiklander static const unsigned char ecjpake_test_x3[] = { 842817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 843817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 844817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 845817466cbSJens Wiklander }; 846817466cbSJens Wiklander 847817466cbSJens Wiklander static const unsigned char ecjpake_test_x4[] = { 848817466cbSJens Wiklander 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 849817466cbSJens Wiklander 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 850817466cbSJens Wiklander 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1 851817466cbSJens Wiklander }; 852817466cbSJens Wiklander 853817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_one[] = { 854817466cbSJens Wiklander 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19, 855817466cbSJens Wiklander 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44, 856817466cbSJens Wiklander 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad, 857817466cbSJens Wiklander 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62, 858817466cbSJens Wiklander 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9, 859817466cbSJens Wiklander 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d, 860817466cbSJens Wiklander 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e, 861817466cbSJens Wiklander 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e, 862817466cbSJens Wiklander 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73, 863817466cbSJens Wiklander 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22, 864817466cbSJens Wiklander 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce, 865817466cbSJens Wiklander 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00, 866817466cbSJens Wiklander 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b, 867817466cbSJens Wiklander 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e, 868817466cbSJens Wiklander 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62, 869817466cbSJens Wiklander 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5, 870817466cbSJens Wiklander 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb, 871817466cbSJens Wiklander 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35, 872817466cbSJens Wiklander 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0, 873817466cbSJens Wiklander 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb, 874817466cbSJens Wiklander 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47, 875817466cbSJens Wiklander 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39, 876817466cbSJens Wiklander 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97, 877817466cbSJens Wiklander 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40, 878817466cbSJens Wiklander 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d, 879817466cbSJens Wiklander 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa, 880817466cbSJens Wiklander 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d, 881817466cbSJens Wiklander 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0 882817466cbSJens Wiklander }; 883817466cbSJens Wiklander 884817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_one[] = { 885817466cbSJens Wiklander 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 886817466cbSJens Wiklander 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 887817466cbSJens Wiklander 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 888817466cbSJens Wiklander 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 889817466cbSJens Wiklander 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 890817466cbSJens Wiklander 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d, 891817466cbSJens Wiklander 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64, 892817466cbSJens Wiklander 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36, 893817466cbSJens Wiklander 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2, 894817466cbSJens Wiklander 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec, 895817466cbSJens Wiklander 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16, 896817466cbSJens Wiklander 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96, 897817466cbSJens Wiklander 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3, 898817466cbSJens Wiklander 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19, 899817466cbSJens Wiklander 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f, 900817466cbSJens Wiklander 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8, 901817466cbSJens Wiklander 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7, 902817466cbSJens Wiklander 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea, 903817466cbSJens Wiklander 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5, 904817466cbSJens Wiklander 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6, 905817466cbSJens Wiklander 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31, 906817466cbSJens Wiklander 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d, 907817466cbSJens Wiklander 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8, 908817466cbSJens Wiklander 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee, 909817466cbSJens Wiklander 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84, 910817466cbSJens Wiklander 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f, 911817466cbSJens Wiklander 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80, 912817466cbSJens Wiklander 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12 913817466cbSJens Wiklander }; 914817466cbSJens Wiklander 915817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_two[] = { 916817466cbSJens Wiklander 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23, 917817466cbSJens Wiklander 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c, 918817466cbSJens Wiklander 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f, 919817466cbSJens Wiklander 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca, 920817466cbSJens Wiklander 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26, 921817466cbSJens Wiklander 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55, 922817466cbSJens Wiklander 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38, 923817466cbSJens Wiklander 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6, 924817466cbSJens Wiklander 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9, 925817466cbSJens Wiklander 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4, 926817466cbSJens Wiklander 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2, 927817466cbSJens Wiklander 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8, 928817466cbSJens Wiklander 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd, 929817466cbSJens Wiklander 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c 930817466cbSJens Wiklander }; 931817466cbSJens Wiklander 932817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_two[] = { 933817466cbSJens Wiklander 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46, 934817466cbSJens Wiklander 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb, 935817466cbSJens Wiklander 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72, 936817466cbSJens Wiklander 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce, 937817466cbSJens Wiklander 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98, 938817466cbSJens Wiklander 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31, 939817466cbSJens Wiklander 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15, 940817466cbSJens Wiklander 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36, 941817466cbSJens Wiklander 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8, 942817466cbSJens Wiklander 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45, 943817466cbSJens Wiklander 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d, 944817466cbSJens Wiklander 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58, 945817466cbSJens Wiklander 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82, 946817466cbSJens Wiklander 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c 947817466cbSJens Wiklander }; 948817466cbSJens Wiklander 949817466cbSJens Wiklander static const unsigned char ecjpake_test_pms[] = { 950817466cbSJens Wiklander 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7, 951817466cbSJens Wiklander 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9, 952817466cbSJens Wiklander 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51 953817466cbSJens Wiklander }; 954817466cbSJens Wiklander 9555b25c76aSJerome Forissier /* Load my private keys and generate the corresponding public keys */ 956817466cbSJens Wiklander static int ecjpake_test_load( mbedtls_ecjpake_context *ctx, 957817466cbSJens Wiklander const unsigned char *xm1, size_t len1, 958817466cbSJens Wiklander const unsigned char *xm2, size_t len2 ) 959817466cbSJens Wiklander { 960*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 961817466cbSJens Wiklander 962817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) ); 963817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) ); 964817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1, 965817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 966817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2, 967817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 968817466cbSJens Wiklander 969817466cbSJens Wiklander cleanup: 970817466cbSJens Wiklander return( ret ); 971817466cbSJens Wiklander } 972817466cbSJens Wiklander 973817466cbSJens Wiklander /* For tests we don't need a secure RNG; 974817466cbSJens Wiklander * use the LGC from Numerical Recipes for simplicity */ 975817466cbSJens Wiklander static int ecjpake_lgc( void *p, unsigned char *out, size_t len ) 976817466cbSJens Wiklander { 977817466cbSJens Wiklander static uint32_t x = 42; 978817466cbSJens Wiklander (void) p; 979817466cbSJens Wiklander 980817466cbSJens Wiklander while( len > 0 ) 981817466cbSJens Wiklander { 982817466cbSJens Wiklander size_t use_len = len > 4 ? 4 : len; 983817466cbSJens Wiklander x = 1664525 * x + 1013904223; 984817466cbSJens Wiklander memcpy( out, &x, use_len ); 985817466cbSJens Wiklander out += use_len; 986817466cbSJens Wiklander len -= use_len; 987817466cbSJens Wiklander } 988817466cbSJens Wiklander 989817466cbSJens Wiklander return( 0 ); 990817466cbSJens Wiklander } 991817466cbSJens Wiklander 992817466cbSJens Wiklander #define TEST_ASSERT( x ) \ 993817466cbSJens Wiklander do { \ 994817466cbSJens Wiklander if( x ) \ 995817466cbSJens Wiklander ret = 0; \ 996817466cbSJens Wiklander else \ 997817466cbSJens Wiklander { \ 998817466cbSJens Wiklander ret = 1; \ 999817466cbSJens Wiklander goto cleanup; \ 1000817466cbSJens Wiklander } \ 1001817466cbSJens Wiklander } while( 0 ) 1002817466cbSJens Wiklander 1003817466cbSJens Wiklander /* 1004817466cbSJens Wiklander * Checkup routine 1005817466cbSJens Wiklander */ 1006817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 1007817466cbSJens Wiklander { 1008*11fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; 1009817466cbSJens Wiklander mbedtls_ecjpake_context cli; 1010817466cbSJens Wiklander mbedtls_ecjpake_context srv; 1011817466cbSJens Wiklander unsigned char buf[512], pms[32]; 1012817466cbSJens Wiklander size_t len, pmslen; 1013817466cbSJens Wiklander 1014817466cbSJens Wiklander mbedtls_ecjpake_init( &cli ); 1015817466cbSJens Wiklander mbedtls_ecjpake_init( &srv ); 1016817466cbSJens Wiklander 1017817466cbSJens Wiklander if( verbose != 0 ) 1018817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #0 (setup): " ); 1019817466cbSJens Wiklander 1020817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT, 1021817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 1022817466cbSJens Wiklander ecjpake_test_password, 1023817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 1024817466cbSJens Wiklander 1025817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER, 1026817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 1027817466cbSJens Wiklander ecjpake_test_password, 1028817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 1029817466cbSJens Wiklander 1030817466cbSJens Wiklander if( verbose != 0 ) 1031817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1032817466cbSJens Wiklander 1033817466cbSJens Wiklander if( verbose != 0 ) 1034817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #1 (random handshake): " ); 1035817466cbSJens Wiklander 1036817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli, 1037817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1038817466cbSJens Wiklander 1039817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 ); 1040817466cbSJens Wiklander 1041817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv, 1042817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1043817466cbSJens Wiklander 1044817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 ); 1045817466cbSJens Wiklander 1046817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv, 1047817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1048817466cbSJens Wiklander 1049817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 ); 1050817466cbSJens Wiklander 1051817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1052817466cbSJens Wiklander pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 ); 1053817466cbSJens Wiklander 1054817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli, 1055817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1056817466cbSJens Wiklander 1057817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 ); 1058817466cbSJens Wiklander 1059817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1060817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1061817466cbSJens Wiklander 1062817466cbSJens Wiklander TEST_ASSERT( len == pmslen ); 1063817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, pms, len ) == 0 ); 1064817466cbSJens Wiklander 1065817466cbSJens Wiklander if( verbose != 0 ) 1066817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1067817466cbSJens Wiklander 1068817466cbSJens Wiklander if( verbose != 0 ) 1069817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #2 (reference handshake): " ); 1070817466cbSJens Wiklander 1071817466cbSJens Wiklander /* Simulate generation of round one */ 1072817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &cli, 1073817466cbSJens Wiklander ecjpake_test_x1, sizeof( ecjpake_test_x1 ), 1074817466cbSJens Wiklander ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) ); 1075817466cbSJens Wiklander 1076817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &srv, 1077817466cbSJens Wiklander ecjpake_test_x3, sizeof( ecjpake_test_x3 ), 1078817466cbSJens Wiklander ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) ); 1079817466cbSJens Wiklander 1080817466cbSJens Wiklander /* Read round one */ 1081817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, 1082817466cbSJens Wiklander ecjpake_test_cli_one, 1083817466cbSJens Wiklander sizeof( ecjpake_test_cli_one ) ) == 0 ); 1084817466cbSJens Wiklander 1085817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, 1086817466cbSJens Wiklander ecjpake_test_srv_one, 1087817466cbSJens Wiklander sizeof( ecjpake_test_srv_one ) ) == 0 ); 1088817466cbSJens Wiklander 1089817466cbSJens Wiklander /* Skip generation of round two, read round two */ 1090817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, 1091817466cbSJens Wiklander ecjpake_test_srv_two, 1092817466cbSJens Wiklander sizeof( ecjpake_test_srv_two ) ) == 0 ); 1093817466cbSJens Wiklander 1094817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, 1095817466cbSJens Wiklander ecjpake_test_cli_two, 1096817466cbSJens Wiklander sizeof( ecjpake_test_cli_two ) ) == 0 ); 1097817466cbSJens Wiklander 1098817466cbSJens Wiklander /* Server derives PMS */ 1099817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1100817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1101817466cbSJens Wiklander 1102817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1103817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1104817466cbSJens Wiklander 1105817466cbSJens Wiklander memset( buf, 0, len ); /* Avoid interferences with next step */ 1106817466cbSJens Wiklander 1107817466cbSJens Wiklander /* Client derives PMS */ 1108817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1109817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1110817466cbSJens Wiklander 1111817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1112817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1113817466cbSJens Wiklander 1114817466cbSJens Wiklander if( verbose != 0 ) 1115817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1116817466cbSJens Wiklander 1117817466cbSJens Wiklander cleanup: 1118817466cbSJens Wiklander mbedtls_ecjpake_free( &cli ); 1119817466cbSJens Wiklander mbedtls_ecjpake_free( &srv ); 1120817466cbSJens Wiklander 1121817466cbSJens Wiklander if( ret != 0 ) 1122817466cbSJens Wiklander { 1123817466cbSJens Wiklander if( verbose != 0 ) 1124817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 1125817466cbSJens Wiklander 1126817466cbSJens Wiklander ret = 1; 1127817466cbSJens Wiklander } 1128817466cbSJens Wiklander 1129817466cbSJens Wiklander if( verbose != 0 ) 1130817466cbSJens Wiklander mbedtls_printf( "\n" ); 1131817466cbSJens Wiklander 1132817466cbSJens Wiklander return( ret ); 1133817466cbSJens Wiklander } 1134817466cbSJens Wiklander 1135817466cbSJens Wiklander #undef TEST_ASSERT 1136817466cbSJens Wiklander 1137817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */ 1138817466cbSJens Wiklander 1139817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 1140817466cbSJens Wiklander 1141817466cbSJens Wiklander #endif /* MBEDTLS_ECJPAKE_C */ 1142