1*c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * Elliptic curve J-PAKE 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * References in the code are to the Thread v1.0 Specification, 24817466cbSJens Wiklander * available to members of the Thread Group http://threadgroup.org/ 25817466cbSJens Wiklander */ 26817466cbSJens Wiklander 27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 28817466cbSJens Wiklander #include "mbedtls/config.h" 29817466cbSJens Wiklander #else 30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 31817466cbSJens Wiklander #endif 32817466cbSJens Wiklander 33817466cbSJens Wiklander #if defined(MBEDTLS_ECJPAKE_C) 34817466cbSJens Wiklander 35817466cbSJens Wiklander #include "mbedtls/ecjpake.h" 36817466cbSJens Wiklander 37817466cbSJens Wiklander #include <string.h> 38817466cbSJens Wiklander 39817466cbSJens Wiklander /* 40817466cbSJens Wiklander * Convert a mbedtls_ecjpake_role to identifier string 41817466cbSJens Wiklander */ 42817466cbSJens Wiklander static const char * const ecjpake_id[] = { 43817466cbSJens Wiklander "client", 44817466cbSJens Wiklander "server" 45817466cbSJens Wiklander }; 46817466cbSJens Wiklander 47817466cbSJens Wiklander #define ID_MINE ( ecjpake_id[ ctx->role ] ) 48817466cbSJens Wiklander #define ID_PEER ( ecjpake_id[ 1 - ctx->role ] ) 49817466cbSJens Wiklander 50817466cbSJens Wiklander /* 51817466cbSJens Wiklander * Initialize context 52817466cbSJens Wiklander */ 53817466cbSJens Wiklander void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx ) 54817466cbSJens Wiklander { 55817466cbSJens Wiklander if( ctx == NULL ) 56817466cbSJens Wiklander return; 57817466cbSJens Wiklander 58817466cbSJens Wiklander ctx->md_info = NULL; 59817466cbSJens Wiklander mbedtls_ecp_group_init( &ctx->grp ); 60817466cbSJens Wiklander ctx->point_format = MBEDTLS_ECP_PF_UNCOMPRESSED; 61817466cbSJens Wiklander 62817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm1 ); 63817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xm2 ); 64817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp1 ); 65817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp2 ); 66817466cbSJens Wiklander mbedtls_ecp_point_init( &ctx->Xp ); 67817466cbSJens Wiklander 68817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm1 ); 69817466cbSJens Wiklander mbedtls_mpi_init( &ctx->xm2 ); 70817466cbSJens Wiklander mbedtls_mpi_init( &ctx->s ); 71817466cbSJens Wiklander } 72817466cbSJens Wiklander 73817466cbSJens Wiklander /* 74817466cbSJens Wiklander * Free context 75817466cbSJens Wiklander */ 76817466cbSJens Wiklander void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx ) 77817466cbSJens Wiklander { 78817466cbSJens Wiklander if( ctx == NULL ) 79817466cbSJens Wiklander return; 80817466cbSJens Wiklander 81817466cbSJens Wiklander ctx->md_info = NULL; 82817466cbSJens Wiklander mbedtls_ecp_group_free( &ctx->grp ); 83817466cbSJens Wiklander 84817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm1 ); 85817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xm2 ); 86817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp1 ); 87817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp2 ); 88817466cbSJens Wiklander mbedtls_ecp_point_free( &ctx->Xp ); 89817466cbSJens Wiklander 90817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm1 ); 91817466cbSJens Wiklander mbedtls_mpi_free( &ctx->xm2 ); 92817466cbSJens Wiklander mbedtls_mpi_free( &ctx->s ); 93817466cbSJens Wiklander } 94817466cbSJens Wiklander 95817466cbSJens Wiklander /* 96817466cbSJens Wiklander * Setup context 97817466cbSJens Wiklander */ 98817466cbSJens Wiklander int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx, 99817466cbSJens Wiklander mbedtls_ecjpake_role role, 100817466cbSJens Wiklander mbedtls_md_type_t hash, 101817466cbSJens Wiklander mbedtls_ecp_group_id curve, 102817466cbSJens Wiklander const unsigned char *secret, 103817466cbSJens Wiklander size_t len ) 104817466cbSJens Wiklander { 105817466cbSJens Wiklander int ret; 106817466cbSJens Wiklander 107817466cbSJens Wiklander ctx->role = role; 108817466cbSJens Wiklander 109817466cbSJens Wiklander if( ( ctx->md_info = mbedtls_md_info_from_type( hash ) ) == NULL ) 110817466cbSJens Wiklander return( MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE ); 111817466cbSJens Wiklander 112817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_group_load( &ctx->grp, curve ) ); 113817466cbSJens Wiklander 114817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) ); 115817466cbSJens Wiklander 116817466cbSJens Wiklander cleanup: 117817466cbSJens Wiklander if( ret != 0 ) 118817466cbSJens Wiklander mbedtls_ecjpake_free( ctx ); 119817466cbSJens Wiklander 120817466cbSJens Wiklander return( ret ); 121817466cbSJens Wiklander } 122817466cbSJens Wiklander 123817466cbSJens Wiklander /* 124817466cbSJens Wiklander * Check if context is ready for use 125817466cbSJens Wiklander */ 126817466cbSJens Wiklander int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx ) 127817466cbSJens Wiklander { 128817466cbSJens Wiklander if( ctx->md_info == NULL || 129817466cbSJens Wiklander ctx->grp.id == MBEDTLS_ECP_DP_NONE || 130817466cbSJens Wiklander ctx->s.p == NULL ) 131817466cbSJens Wiklander { 132817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 133817466cbSJens Wiklander } 134817466cbSJens Wiklander 135817466cbSJens Wiklander return( 0 ); 136817466cbSJens Wiklander } 137817466cbSJens Wiklander 138817466cbSJens Wiklander /* 139817466cbSJens Wiklander * Write a point plus its length to a buffer 140817466cbSJens Wiklander */ 141817466cbSJens Wiklander static int ecjpake_write_len_point( unsigned char **p, 142817466cbSJens Wiklander const unsigned char *end, 143817466cbSJens Wiklander const mbedtls_ecp_group *grp, 144817466cbSJens Wiklander const int pf, 145817466cbSJens Wiklander const mbedtls_ecp_point *P ) 146817466cbSJens Wiklander { 147817466cbSJens Wiklander int ret; 148817466cbSJens Wiklander size_t len; 149817466cbSJens Wiklander 150817466cbSJens Wiklander /* Need at least 4 for length plus 1 for point */ 151817466cbSJens Wiklander if( end < *p || end - *p < 5 ) 152817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 153817466cbSJens Wiklander 154817466cbSJens Wiklander ret = mbedtls_ecp_point_write_binary( grp, P, pf, 155817466cbSJens Wiklander &len, *p + 4, end - ( *p + 4 ) ); 156817466cbSJens Wiklander if( ret != 0 ) 157817466cbSJens Wiklander return( ret ); 158817466cbSJens Wiklander 159817466cbSJens Wiklander (*p)[0] = (unsigned char)( ( len >> 24 ) & 0xFF ); 160817466cbSJens Wiklander (*p)[1] = (unsigned char)( ( len >> 16 ) & 0xFF ); 161817466cbSJens Wiklander (*p)[2] = (unsigned char)( ( len >> 8 ) & 0xFF ); 162817466cbSJens Wiklander (*p)[3] = (unsigned char)( ( len ) & 0xFF ); 163817466cbSJens Wiklander 164817466cbSJens Wiklander *p += 4 + len; 165817466cbSJens Wiklander 166817466cbSJens Wiklander return( 0 ); 167817466cbSJens Wiklander } 168817466cbSJens Wiklander 169817466cbSJens Wiklander /* 170817466cbSJens Wiklander * Size of the temporary buffer for ecjpake_hash: 171817466cbSJens Wiklander * 3 EC points plus their length, plus ID and its length (4 + 6 bytes) 172817466cbSJens Wiklander */ 173817466cbSJens Wiklander #define ECJPAKE_HASH_BUF_LEN ( 3 * ( 4 + MBEDTLS_ECP_MAX_PT_LEN ) + 4 + 6 ) 174817466cbSJens Wiklander 175817466cbSJens Wiklander /* 176817466cbSJens Wiklander * Compute hash for ZKP (7.4.2.2.2.1) 177817466cbSJens Wiklander */ 178817466cbSJens Wiklander static int ecjpake_hash( const mbedtls_md_info_t *md_info, 179817466cbSJens Wiklander const mbedtls_ecp_group *grp, 180817466cbSJens Wiklander const int pf, 181817466cbSJens Wiklander const mbedtls_ecp_point *G, 182817466cbSJens Wiklander const mbedtls_ecp_point *V, 183817466cbSJens Wiklander const mbedtls_ecp_point *X, 184817466cbSJens Wiklander const char *id, 185817466cbSJens Wiklander mbedtls_mpi *h ) 186817466cbSJens Wiklander { 187817466cbSJens Wiklander int ret; 188817466cbSJens Wiklander unsigned char buf[ECJPAKE_HASH_BUF_LEN]; 189817466cbSJens Wiklander unsigned char *p = buf; 190817466cbSJens Wiklander const unsigned char *end = buf + sizeof( buf ); 191817466cbSJens Wiklander const size_t id_len = strlen( id ); 192817466cbSJens Wiklander unsigned char hash[MBEDTLS_MD_MAX_SIZE]; 193817466cbSJens Wiklander 194817466cbSJens Wiklander /* Write things to temporary buffer */ 195817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, G ) ); 196817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, V ) ); 197817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_write_len_point( &p, end, grp, pf, X ) ); 198817466cbSJens Wiklander 199817466cbSJens Wiklander if( end - p < 4 ) 200817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 201817466cbSJens Wiklander 202817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF ); 203817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF ); 204817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF ); 205817466cbSJens Wiklander *p++ = (unsigned char)( ( id_len ) & 0xFF ); 206817466cbSJens Wiklander 207817466cbSJens Wiklander if( end < p || (size_t)( end - p ) < id_len ) 208817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 209817466cbSJens Wiklander 210817466cbSJens Wiklander memcpy( p, id, id_len ); 211817466cbSJens Wiklander p += id_len; 212817466cbSJens Wiklander 213817466cbSJens Wiklander /* Compute hash */ 214817466cbSJens Wiklander mbedtls_md( md_info, buf, p - buf, hash ); 215817466cbSJens Wiklander 216817466cbSJens Wiklander /* Turn it into an integer mod n */ 217817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( h, hash, 218817466cbSJens Wiklander mbedtls_md_get_size( md_info ) ) ); 219817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( h, h, &grp->N ) ); 220817466cbSJens Wiklander 221817466cbSJens Wiklander cleanup: 222817466cbSJens Wiklander return( ret ); 223817466cbSJens Wiklander } 224817466cbSJens Wiklander 225817466cbSJens Wiklander /* 226817466cbSJens Wiklander * Parse a ECShnorrZKP (7.4.2.2.2) and verify it (7.4.2.3.3) 227817466cbSJens Wiklander */ 228817466cbSJens Wiklander static int ecjpake_zkp_read( const mbedtls_md_info_t *md_info, 229817466cbSJens Wiklander const mbedtls_ecp_group *grp, 230817466cbSJens Wiklander const int pf, 231817466cbSJens Wiklander const mbedtls_ecp_point *G, 232817466cbSJens Wiklander const mbedtls_ecp_point *X, 233817466cbSJens Wiklander const char *id, 234817466cbSJens Wiklander const unsigned char **p, 235817466cbSJens Wiklander const unsigned char *end ) 236817466cbSJens Wiklander { 237817466cbSJens Wiklander int ret; 238817466cbSJens Wiklander mbedtls_ecp_point V, VV; 239817466cbSJens Wiklander mbedtls_mpi r, h; 240817466cbSJens Wiklander size_t r_len; 241817466cbSJens Wiklander 242817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 243817466cbSJens Wiklander mbedtls_ecp_point_init( &VV ); 244817466cbSJens Wiklander mbedtls_mpi_init( &r ); 245817466cbSJens Wiklander mbedtls_mpi_init( &h ); 246817466cbSJens Wiklander 247817466cbSJens Wiklander /* 248817466cbSJens Wiklander * struct { 249817466cbSJens Wiklander * ECPoint V; 250817466cbSJens Wiklander * opaque r<1..2^8-1>; 251817466cbSJens Wiklander * } ECSchnorrZKP; 252817466cbSJens Wiklander */ 253817466cbSJens Wiklander if( end < *p ) 254817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 255817466cbSJens Wiklander 256817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, &V, p, end - *p ) ); 257817466cbSJens Wiklander 258817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 ) 259817466cbSJens Wiklander { 260817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 261817466cbSJens Wiklander goto cleanup; 262817466cbSJens Wiklander } 263817466cbSJens Wiklander 264817466cbSJens Wiklander r_len = *(*p)++; 265817466cbSJens Wiklander 266817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < r_len ) 267817466cbSJens Wiklander { 268817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 269817466cbSJens Wiklander goto cleanup; 270817466cbSJens Wiklander } 271817466cbSJens Wiklander 272817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &r, *p, r_len ) ); 273817466cbSJens Wiklander *p += r_len; 274817466cbSJens Wiklander 275817466cbSJens Wiklander /* 276817466cbSJens Wiklander * Verification 277817466cbSJens Wiklander */ 278817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 279817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( (mbedtls_ecp_group *) grp, 280817466cbSJens Wiklander &VV, &h, X, &r, G ) ); 281817466cbSJens Wiklander 282817466cbSJens Wiklander if( mbedtls_ecp_point_cmp( &VV, &V ) != 0 ) 283817466cbSJens Wiklander { 284817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED; 285817466cbSJens Wiklander goto cleanup; 286817466cbSJens Wiklander } 287817466cbSJens Wiklander 288817466cbSJens Wiklander cleanup: 289817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 290817466cbSJens Wiklander mbedtls_ecp_point_free( &VV ); 291817466cbSJens Wiklander mbedtls_mpi_free( &r ); 292817466cbSJens Wiklander mbedtls_mpi_free( &h ); 293817466cbSJens Wiklander 294817466cbSJens Wiklander return( ret ); 295817466cbSJens Wiklander } 296817466cbSJens Wiklander 297817466cbSJens Wiklander /* 298817466cbSJens Wiklander * Generate ZKP (7.4.2.3.2) and write it as ECSchnorrZKP (7.4.2.2.2) 299817466cbSJens Wiklander */ 300817466cbSJens Wiklander static int ecjpake_zkp_write( const mbedtls_md_info_t *md_info, 301817466cbSJens Wiklander const mbedtls_ecp_group *grp, 302817466cbSJens Wiklander const int pf, 303817466cbSJens Wiklander const mbedtls_ecp_point *G, 304817466cbSJens Wiklander const mbedtls_mpi *x, 305817466cbSJens Wiklander const mbedtls_ecp_point *X, 306817466cbSJens Wiklander const char *id, 307817466cbSJens Wiklander unsigned char **p, 308817466cbSJens Wiklander const unsigned char *end, 309817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 310817466cbSJens Wiklander void *p_rng ) 311817466cbSJens Wiklander { 312817466cbSJens Wiklander int ret; 313817466cbSJens Wiklander mbedtls_ecp_point V; 314817466cbSJens Wiklander mbedtls_mpi v; 315817466cbSJens Wiklander mbedtls_mpi h; /* later recycled to hold r */ 316817466cbSJens Wiklander size_t len; 317817466cbSJens Wiklander 318817466cbSJens Wiklander if( end < *p ) 319817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 320817466cbSJens Wiklander 321817466cbSJens Wiklander mbedtls_ecp_point_init( &V ); 322817466cbSJens Wiklander mbedtls_mpi_init( &v ); 323817466cbSJens Wiklander mbedtls_mpi_init( &h ); 324817466cbSJens Wiklander 325817466cbSJens Wiklander /* Compute signature */ 326817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, 327817466cbSJens Wiklander G, &v, &V, f_rng, p_rng ) ); 328817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_hash( md_info, grp, pf, G, &V, X, id, &h ) ); 329817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &h, &h, x ) ); /* x*h */ 330817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_sub_mpi( &h, &v, &h ) ); /* v - x*h */ 331817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( &h, &h, &grp->N ) ); /* r */ 332817466cbSJens Wiklander 333817466cbSJens Wiklander /* Write it out */ 334817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, &V, 335817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 336817466cbSJens Wiklander *p += len; 337817466cbSJens Wiklander 338817466cbSJens Wiklander len = mbedtls_mpi_size( &h ); /* actually r */ 339817466cbSJens Wiklander if( end < *p || (size_t)( end - *p ) < 1 + len || len > 255 ) 340817466cbSJens Wiklander { 341817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 342817466cbSJens Wiklander goto cleanup; 343817466cbSJens Wiklander } 344817466cbSJens Wiklander 345817466cbSJens Wiklander *(*p)++ = (unsigned char)( len & 0xFF ); 346817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &h, *p, len ) ); /* r */ 347817466cbSJens Wiklander *p += len; 348817466cbSJens Wiklander 349817466cbSJens Wiklander cleanup: 350817466cbSJens Wiklander mbedtls_ecp_point_free( &V ); 351817466cbSJens Wiklander mbedtls_mpi_free( &v ); 352817466cbSJens Wiklander mbedtls_mpi_free( &h ); 353817466cbSJens Wiklander 354817466cbSJens Wiklander return( ret ); 355817466cbSJens Wiklander } 356817466cbSJens Wiklander 357817466cbSJens Wiklander /* 358817466cbSJens Wiklander * Parse a ECJPAKEKeyKP (7.4.2.2.1) and check proof 359817466cbSJens Wiklander * Output: verified public key X 360817466cbSJens Wiklander */ 361817466cbSJens Wiklander static int ecjpake_kkp_read( const mbedtls_md_info_t *md_info, 362817466cbSJens Wiklander const mbedtls_ecp_group *grp, 363817466cbSJens Wiklander const int pf, 364817466cbSJens Wiklander const mbedtls_ecp_point *G, 365817466cbSJens Wiklander mbedtls_ecp_point *X, 366817466cbSJens Wiklander const char *id, 367817466cbSJens Wiklander const unsigned char **p, 368817466cbSJens Wiklander const unsigned char *end ) 369817466cbSJens Wiklander { 370817466cbSJens Wiklander int ret; 371817466cbSJens Wiklander 372817466cbSJens Wiklander if( end < *p ) 373817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA ); 374817466cbSJens Wiklander 375817466cbSJens Wiklander /* 376817466cbSJens Wiklander * struct { 377817466cbSJens Wiklander * ECPoint X; 378817466cbSJens Wiklander * ECSchnorrZKP zkp; 379817466cbSJens Wiklander * } ECJPAKEKeyKP; 380817466cbSJens Wiklander */ 381817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_point( grp, X, p, end - *p ) ); 382817466cbSJens Wiklander if( mbedtls_ecp_is_zero( X ) ) 383817466cbSJens Wiklander { 384817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_INVALID_KEY; 385817466cbSJens Wiklander goto cleanup; 386817466cbSJens Wiklander } 387817466cbSJens Wiklander 388817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_read( md_info, grp, pf, G, X, id, p, end ) ); 389817466cbSJens Wiklander 390817466cbSJens Wiklander cleanup: 391817466cbSJens Wiklander return( ret ); 392817466cbSJens Wiklander } 393817466cbSJens Wiklander 394817466cbSJens Wiklander /* 395817466cbSJens Wiklander * Generate an ECJPAKEKeyKP 396817466cbSJens Wiklander * Output: the serialized structure, plus private/public key pair 397817466cbSJens Wiklander */ 398817466cbSJens Wiklander static int ecjpake_kkp_write( const mbedtls_md_info_t *md_info, 399817466cbSJens Wiklander const mbedtls_ecp_group *grp, 400817466cbSJens Wiklander const int pf, 401817466cbSJens Wiklander const mbedtls_ecp_point *G, 402817466cbSJens Wiklander mbedtls_mpi *x, 403817466cbSJens Wiklander mbedtls_ecp_point *X, 404817466cbSJens Wiklander const char *id, 405817466cbSJens Wiklander unsigned char **p, 406817466cbSJens Wiklander const unsigned char *end, 407817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 408817466cbSJens Wiklander void *p_rng ) 409817466cbSJens Wiklander { 410817466cbSJens Wiklander int ret; 411817466cbSJens Wiklander size_t len; 412817466cbSJens Wiklander 413817466cbSJens Wiklander if( end < *p ) 414817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 415817466cbSJens Wiklander 416817466cbSJens Wiklander /* Generate key (7.4.2.3.1) and write it out */ 417817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_gen_keypair_base( (mbedtls_ecp_group *) grp, G, x, X, 418817466cbSJens Wiklander f_rng, p_rng ) ); 419817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( grp, X, 420817466cbSJens Wiklander pf, &len, *p, end - *p ) ); 421817466cbSJens Wiklander *p += len; 422817466cbSJens Wiklander 423817466cbSJens Wiklander /* Generate and write proof */ 424817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( md_info, grp, pf, G, x, X, id, 425817466cbSJens Wiklander p, end, f_rng, p_rng ) ); 426817466cbSJens Wiklander 427817466cbSJens Wiklander cleanup: 428817466cbSJens Wiklander return( ret ); 429817466cbSJens Wiklander } 430817466cbSJens Wiklander 431817466cbSJens Wiklander /* 432817466cbSJens Wiklander * Read a ECJPAKEKeyKPPairList (7.4.2.3) and check proofs 433817466cbSJens Wiklander * Ouputs: verified peer public keys Xa, Xb 434817466cbSJens Wiklander */ 435817466cbSJens Wiklander static int ecjpake_kkpp_read( const mbedtls_md_info_t *md_info, 436817466cbSJens Wiklander const mbedtls_ecp_group *grp, 437817466cbSJens Wiklander const int pf, 438817466cbSJens Wiklander const mbedtls_ecp_point *G, 439817466cbSJens Wiklander mbedtls_ecp_point *Xa, 440817466cbSJens Wiklander mbedtls_ecp_point *Xb, 441817466cbSJens Wiklander const char *id, 442817466cbSJens Wiklander const unsigned char *buf, 443817466cbSJens Wiklander size_t len ) 444817466cbSJens Wiklander { 445817466cbSJens Wiklander int ret; 446817466cbSJens Wiklander const unsigned char *p = buf; 447817466cbSJens Wiklander const unsigned char *end = buf + len; 448817466cbSJens Wiklander 449817466cbSJens Wiklander /* 450817466cbSJens Wiklander * struct { 451817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp_pair_list[2]; 452817466cbSJens Wiklander * } ECJPAKEKeyKPPairList; 453817466cbSJens Wiklander */ 454817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xa, id, &p, end ) ); 455817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( md_info, grp, pf, G, Xb, id, &p, end ) ); 456817466cbSJens Wiklander 457817466cbSJens Wiklander if( p != end ) 458817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 459817466cbSJens Wiklander 460817466cbSJens Wiklander cleanup: 461817466cbSJens Wiklander return( ret ); 462817466cbSJens Wiklander } 463817466cbSJens Wiklander 464817466cbSJens Wiklander /* 465817466cbSJens Wiklander * Generate a ECJPAKEKeyKPPairList 466817466cbSJens Wiklander * Outputs: the serialized structure, plus two private/public key pairs 467817466cbSJens Wiklander */ 468817466cbSJens Wiklander static int ecjpake_kkpp_write( const mbedtls_md_info_t *md_info, 469817466cbSJens Wiklander const mbedtls_ecp_group *grp, 470817466cbSJens Wiklander const int pf, 471817466cbSJens Wiklander const mbedtls_ecp_point *G, 472817466cbSJens Wiklander mbedtls_mpi *xm1, 473817466cbSJens Wiklander mbedtls_ecp_point *Xa, 474817466cbSJens Wiklander mbedtls_mpi *xm2, 475817466cbSJens Wiklander mbedtls_ecp_point *Xb, 476817466cbSJens Wiklander const char *id, 477817466cbSJens Wiklander unsigned char *buf, 478817466cbSJens Wiklander size_t len, 479817466cbSJens Wiklander size_t *olen, 480817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 481817466cbSJens Wiklander void *p_rng ) 482817466cbSJens Wiklander { 483817466cbSJens Wiklander int ret; 484817466cbSJens Wiklander unsigned char *p = buf; 485817466cbSJens Wiklander const unsigned char *end = buf + len; 486817466cbSJens Wiklander 487817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm1, Xa, id, 488817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 489817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_write( md_info, grp, pf, G, xm2, Xb, id, 490817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 491817466cbSJens Wiklander 492817466cbSJens Wiklander *olen = p - buf; 493817466cbSJens Wiklander 494817466cbSJens Wiklander cleanup: 495817466cbSJens Wiklander return( ret ); 496817466cbSJens Wiklander } 497817466cbSJens Wiklander 498817466cbSJens Wiklander /* 499817466cbSJens Wiklander * Read and process the first round message 500817466cbSJens Wiklander */ 501817466cbSJens Wiklander int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx, 502817466cbSJens Wiklander const unsigned char *buf, 503817466cbSJens Wiklander size_t len ) 504817466cbSJens Wiklander { 505817466cbSJens Wiklander return( ecjpake_kkpp_read( ctx->md_info, &ctx->grp, ctx->point_format, 506817466cbSJens Wiklander &ctx->grp.G, 507817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, ID_PEER, 508817466cbSJens Wiklander buf, len ) ); 509817466cbSJens Wiklander } 510817466cbSJens Wiklander 511817466cbSJens Wiklander /* 512817466cbSJens Wiklander * Generate and write the first round message 513817466cbSJens Wiklander */ 514817466cbSJens Wiklander int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx, 515817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 516817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 517817466cbSJens Wiklander void *p_rng ) 518817466cbSJens Wiklander { 519817466cbSJens Wiklander return( ecjpake_kkpp_write( ctx->md_info, &ctx->grp, ctx->point_format, 520817466cbSJens Wiklander &ctx->grp.G, 521817466cbSJens Wiklander &ctx->xm1, &ctx->Xm1, &ctx->xm2, &ctx->Xm2, 522817466cbSJens Wiklander ID_MINE, buf, len, olen, f_rng, p_rng ) ); 523817466cbSJens Wiklander } 524817466cbSJens Wiklander 525817466cbSJens Wiklander /* 526817466cbSJens Wiklander * Compute the sum of three points R = A + B + C 527817466cbSJens Wiklander */ 528817466cbSJens Wiklander static int ecjpake_ecp_add3( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, 529817466cbSJens Wiklander const mbedtls_ecp_point *A, 530817466cbSJens Wiklander const mbedtls_ecp_point *B, 531817466cbSJens Wiklander const mbedtls_ecp_point *C ) 532817466cbSJens Wiklander { 533817466cbSJens Wiklander int ret; 534817466cbSJens Wiklander mbedtls_mpi one; 535817466cbSJens Wiklander 536817466cbSJens Wiklander mbedtls_mpi_init( &one ); 537817466cbSJens Wiklander 538817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 539817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, A, &one, B ) ); 540817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( grp, R, &one, R, &one, C ) ); 541817466cbSJens Wiklander 542817466cbSJens Wiklander cleanup: 543817466cbSJens Wiklander mbedtls_mpi_free( &one ); 544817466cbSJens Wiklander 545817466cbSJens Wiklander return( ret ); 546817466cbSJens Wiklander } 547817466cbSJens Wiklander 548817466cbSJens Wiklander /* 549817466cbSJens Wiklander * Read and process second round message (C: 7.4.2.5, S: 7.4.2.6) 550817466cbSJens Wiklander */ 551817466cbSJens Wiklander int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx, 552817466cbSJens Wiklander const unsigned char *buf, 553817466cbSJens Wiklander size_t len ) 554817466cbSJens Wiklander { 555817466cbSJens Wiklander int ret; 556817466cbSJens Wiklander const unsigned char *p = buf; 557817466cbSJens Wiklander const unsigned char *end = buf + len; 558817466cbSJens Wiklander mbedtls_ecp_group grp; 559817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GB, S: GA */ 560817466cbSJens Wiklander 561817466cbSJens Wiklander mbedtls_ecp_group_init( &grp ); 562817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 563817466cbSJens Wiklander 564817466cbSJens Wiklander /* 565817466cbSJens Wiklander * Server: GA = X3 + X4 + X1 (7.4.2.6.1) 566817466cbSJens Wiklander * Client: GB = X1 + X2 + X3 (7.4.2.5.1) 567817466cbSJens Wiklander * Unified: G = Xm1 + Xm2 + Xp1 568817466cbSJens Wiklander * We need that before parsing in order to check Xp as we read it 569817466cbSJens Wiklander */ 570817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 571817466cbSJens Wiklander &ctx->Xm1, &ctx->Xm2, &ctx->Xp1 ) ); 572817466cbSJens Wiklander 573817466cbSJens Wiklander /* 574817466cbSJens Wiklander * struct { 575817466cbSJens Wiklander * ECParameters curve_params; // only client reading server msg 576817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 577817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 578817466cbSJens Wiklander */ 579817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_CLIENT ) 580817466cbSJens Wiklander { 581817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_read_group( &grp, &p, len ) ); 582817466cbSJens Wiklander if( grp.id != ctx->grp.id ) 583817466cbSJens Wiklander { 584817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE; 585817466cbSJens Wiklander goto cleanup; 586817466cbSJens Wiklander } 587817466cbSJens Wiklander } 588817466cbSJens Wiklander 589817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_kkp_read( ctx->md_info, &ctx->grp, 590817466cbSJens Wiklander ctx->point_format, 591817466cbSJens Wiklander &G, &ctx->Xp, ID_PEER, &p, end ) ); 592817466cbSJens Wiklander 593817466cbSJens Wiklander if( p != end ) 594817466cbSJens Wiklander { 595817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BAD_INPUT_DATA; 596817466cbSJens Wiklander goto cleanup; 597817466cbSJens Wiklander } 598817466cbSJens Wiklander 599817466cbSJens Wiklander cleanup: 600817466cbSJens Wiklander mbedtls_ecp_group_free( &grp ); 601817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 602817466cbSJens Wiklander 603817466cbSJens Wiklander return( ret ); 604817466cbSJens Wiklander } 605817466cbSJens Wiklander 606817466cbSJens Wiklander /* 607817466cbSJens Wiklander * Compute R = +/- X * S mod N, taking care not to leak S 608817466cbSJens Wiklander */ 609817466cbSJens Wiklander static int ecjpake_mul_secret( mbedtls_mpi *R, int sign, 610817466cbSJens Wiklander const mbedtls_mpi *X, 611817466cbSJens Wiklander const mbedtls_mpi *S, 612817466cbSJens Wiklander const mbedtls_mpi *N, 613817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 614817466cbSJens Wiklander void *p_rng ) 615817466cbSJens Wiklander { 616817466cbSJens Wiklander int ret; 617817466cbSJens Wiklander mbedtls_mpi b; /* Blinding value, then s + N * blinding */ 618817466cbSJens Wiklander 619817466cbSJens Wiklander mbedtls_mpi_init( &b ); 620817466cbSJens Wiklander 621817466cbSJens Wiklander /* b = s + rnd-128-bit * N */ 622817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_fill_random( &b, 16, f_rng, p_rng ) ); 623817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( &b, &b, N ) ); 624817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_add_mpi( &b, &b, S ) ); 625817466cbSJens Wiklander 626817466cbSJens Wiklander /* R = sign * X * b mod N */ 627817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mul_mpi( R, X, &b ) ); 628817466cbSJens Wiklander R->s *= sign; 629817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_mod_mpi( R, R, N ) ); 630817466cbSJens Wiklander 631817466cbSJens Wiklander cleanup: 632817466cbSJens Wiklander mbedtls_mpi_free( &b ); 633817466cbSJens Wiklander 634817466cbSJens Wiklander return( ret ); 635817466cbSJens Wiklander } 636817466cbSJens Wiklander 637817466cbSJens Wiklander /* 638817466cbSJens Wiklander * Generate and write the second round message (S: 7.4.2.5, C: 7.4.2.6) 639817466cbSJens Wiklander */ 640817466cbSJens Wiklander int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx, 641817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 642817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 643817466cbSJens Wiklander void *p_rng ) 644817466cbSJens Wiklander { 645817466cbSJens Wiklander int ret; 646817466cbSJens Wiklander mbedtls_ecp_point G; /* C: GA, S: GB */ 647817466cbSJens Wiklander mbedtls_ecp_point Xm; /* C: Xc, S: Xs */ 648817466cbSJens Wiklander mbedtls_mpi xm; /* C: xc, S: xs */ 649817466cbSJens Wiklander unsigned char *p = buf; 650817466cbSJens Wiklander const unsigned char *end = buf + len; 651817466cbSJens Wiklander size_t ec_len; 652817466cbSJens Wiklander 653817466cbSJens Wiklander mbedtls_ecp_point_init( &G ); 654817466cbSJens Wiklander mbedtls_ecp_point_init( &Xm ); 655817466cbSJens Wiklander mbedtls_mpi_init( &xm ); 656817466cbSJens Wiklander 657817466cbSJens Wiklander /* 658817466cbSJens Wiklander * First generate private/public key pair (S: 7.4.2.5.1, C: 7.4.2.6.1) 659817466cbSJens Wiklander * 660817466cbSJens Wiklander * Client: GA = X1 + X3 + X4 | xs = x2 * s | Xc = xc * GA 661817466cbSJens Wiklander * Server: GB = X3 + X1 + X2 | xs = x4 * s | Xs = xs * GB 662817466cbSJens Wiklander * Unified: G = Xm1 + Xp1 + Xp2 | xm = xm2 * s | Xm = xm * G 663817466cbSJens Wiklander */ 664817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_ecp_add3( &ctx->grp, &G, 665817466cbSJens Wiklander &ctx->Xp1, &ctx->Xp2, &ctx->Xm1 ) ); 666817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &xm, 1, &ctx->xm2, &ctx->s, 667817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 668817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &Xm, &xm, &G, f_rng, p_rng ) ); 669817466cbSJens Wiklander 670817466cbSJens Wiklander /* 671817466cbSJens Wiklander * Now write things out 672817466cbSJens Wiklander * 673817466cbSJens Wiklander * struct { 674817466cbSJens Wiklander * ECParameters curve_params; // only server writing its message 675817466cbSJens Wiklander * ECJPAKEKeyKP ecjpake_key_kp; 676817466cbSJens Wiklander * } Client/ServerECJPAKEParams; 677817466cbSJens Wiklander */ 678817466cbSJens Wiklander if( ctx->role == MBEDTLS_ECJPAKE_SERVER ) 679817466cbSJens Wiklander { 680817466cbSJens Wiklander if( end < p ) 681817466cbSJens Wiklander { 682817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 683817466cbSJens Wiklander goto cleanup; 684817466cbSJens Wiklander } 685817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_group( &ctx->grp, &ec_len, 686817466cbSJens Wiklander p, end - p ) ); 687817466cbSJens Wiklander p += ec_len; 688817466cbSJens Wiklander } 689817466cbSJens Wiklander 690817466cbSJens Wiklander if( end < p ) 691817466cbSJens Wiklander { 692817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL; 693817466cbSJens Wiklander goto cleanup; 694817466cbSJens Wiklander } 695817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_tls_write_point( &ctx->grp, &Xm, 696817466cbSJens Wiklander ctx->point_format, &ec_len, p, end - p ) ); 697817466cbSJens Wiklander p += ec_len; 698817466cbSJens Wiklander 699817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_zkp_write( ctx->md_info, &ctx->grp, 700817466cbSJens Wiklander ctx->point_format, 701817466cbSJens Wiklander &G, &xm, &Xm, ID_MINE, 702817466cbSJens Wiklander &p, end, f_rng, p_rng ) ); 703817466cbSJens Wiklander 704817466cbSJens Wiklander *olen = p - buf; 705817466cbSJens Wiklander 706817466cbSJens Wiklander cleanup: 707817466cbSJens Wiklander mbedtls_ecp_point_free( &G ); 708817466cbSJens Wiklander mbedtls_ecp_point_free( &Xm ); 709817466cbSJens Wiklander mbedtls_mpi_free( &xm ); 710817466cbSJens Wiklander 711817466cbSJens Wiklander return( ret ); 712817466cbSJens Wiklander } 713817466cbSJens Wiklander 714817466cbSJens Wiklander /* 715817466cbSJens Wiklander * Derive PMS (7.4.2.7 / 7.4.2.8) 716817466cbSJens Wiklander */ 717817466cbSJens Wiklander int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx, 718817466cbSJens Wiklander unsigned char *buf, size_t len, size_t *olen, 719817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), 720817466cbSJens Wiklander void *p_rng ) 721817466cbSJens Wiklander { 722817466cbSJens Wiklander int ret; 723817466cbSJens Wiklander mbedtls_ecp_point K; 724817466cbSJens Wiklander mbedtls_mpi m_xm2_s, one; 725817466cbSJens Wiklander unsigned char kx[MBEDTLS_ECP_MAX_BYTES]; 726817466cbSJens Wiklander size_t x_bytes; 727817466cbSJens Wiklander 728817466cbSJens Wiklander *olen = mbedtls_md_get_size( ctx->md_info ); 729817466cbSJens Wiklander if( len < *olen ) 730817466cbSJens Wiklander return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL ); 731817466cbSJens Wiklander 732817466cbSJens Wiklander mbedtls_ecp_point_init( &K ); 733817466cbSJens Wiklander mbedtls_mpi_init( &m_xm2_s ); 734817466cbSJens Wiklander mbedtls_mpi_init( &one ); 735817466cbSJens Wiklander 736817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_lset( &one, 1 ) ); 737817466cbSJens Wiklander 738817466cbSJens Wiklander /* 739817466cbSJens Wiklander * Client: K = ( Xs - X4 * x2 * s ) * x2 740817466cbSJens Wiklander * Server: K = ( Xc - X2 * x4 * s ) * x4 741817466cbSJens Wiklander * Unified: K = ( Xp - Xp2 * xm2 * s ) * xm2 742817466cbSJens Wiklander */ 743817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_mul_secret( &m_xm2_s, -1, &ctx->xm2, &ctx->s, 744817466cbSJens Wiklander &ctx->grp.N, f_rng, p_rng ) ); 745817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_muladd( &ctx->grp, &K, 746817466cbSJens Wiklander &one, &ctx->Xp, 747817466cbSJens Wiklander &m_xm2_s, &ctx->Xp2 ) ); 748817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &K, &ctx->xm2, &K, 749817466cbSJens Wiklander f_rng, p_rng ) ); 750817466cbSJens Wiklander 751817466cbSJens Wiklander /* PMS = SHA-256( K.X ) */ 752817466cbSJens Wiklander x_bytes = ( ctx->grp.pbits + 7 ) / 8; 753817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( &K.X, kx, x_bytes ) ); 754817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) ); 755817466cbSJens Wiklander 756817466cbSJens Wiklander cleanup: 757817466cbSJens Wiklander mbedtls_ecp_point_free( &K ); 758817466cbSJens Wiklander mbedtls_mpi_free( &m_xm2_s ); 759817466cbSJens Wiklander mbedtls_mpi_free( &one ); 760817466cbSJens Wiklander 761817466cbSJens Wiklander return( ret ); 762817466cbSJens Wiklander } 763817466cbSJens Wiklander 764817466cbSJens Wiklander #undef ID_MINE 765817466cbSJens Wiklander #undef ID_PEER 766817466cbSJens Wiklander 767817466cbSJens Wiklander 768817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 769817466cbSJens Wiklander 770817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 771817466cbSJens Wiklander #include "mbedtls/platform.h" 772817466cbSJens Wiklander #else 773817466cbSJens Wiklander #include <stdio.h> 774817466cbSJens Wiklander #define mbedtls_printf printf 775817466cbSJens Wiklander #endif 776817466cbSJens Wiklander 777817466cbSJens Wiklander #if !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) || \ 778817466cbSJens Wiklander !defined(MBEDTLS_SHA256_C) 779817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 780817466cbSJens Wiklander { 781817466cbSJens Wiklander (void) verbose; 782817466cbSJens Wiklander return( 0 ); 783817466cbSJens Wiklander } 784817466cbSJens Wiklander #else 785817466cbSJens Wiklander 786817466cbSJens Wiklander static const unsigned char ecjpake_test_password[] = { 787817466cbSJens Wiklander 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x6a, 0x70, 0x61, 0x6b, 0x65, 0x74, 788817466cbSJens Wiklander 0x65, 0x73, 0x74 789817466cbSJens Wiklander }; 790817466cbSJens Wiklander 791817466cbSJens Wiklander static const unsigned char ecjpake_test_x1[] = { 792817466cbSJens Wiklander 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 793817466cbSJens Wiklander 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 794817466cbSJens Wiklander 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21 795817466cbSJens Wiklander }; 796817466cbSJens Wiklander 797817466cbSJens Wiklander static const unsigned char ecjpake_test_x2[] = { 798817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 799817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 800817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 801817466cbSJens Wiklander }; 802817466cbSJens Wiklander 803817466cbSJens Wiklander static const unsigned char ecjpake_test_x3[] = { 804817466cbSJens Wiklander 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 805817466cbSJens Wiklander 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 806817466cbSJens Wiklander 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 807817466cbSJens Wiklander }; 808817466cbSJens Wiklander 809817466cbSJens Wiklander static const unsigned char ecjpake_test_x4[] = { 810817466cbSJens Wiklander 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 811817466cbSJens Wiklander 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 812817466cbSJens Wiklander 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1 813817466cbSJens Wiklander }; 814817466cbSJens Wiklander 815817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_one[] = { 816817466cbSJens Wiklander 0x41, 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19, 817817466cbSJens Wiklander 0x33, 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44, 818817466cbSJens Wiklander 0xe5, 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad, 819817466cbSJens Wiklander 0xa7, 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62, 820817466cbSJens Wiklander 0x1f, 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9, 821817466cbSJens Wiklander 0x06, 0x07, 0x31, 0xf6, 0x94, 0xa4, 0x41, 0x04, 0x1d, 0xd0, 0xbd, 0x5d, 822817466cbSJens Wiklander 0x45, 0x66, 0xc9, 0xbe, 0xd9, 0xce, 0x7d, 0xe7, 0x01, 0xb5, 0xe8, 0x2e, 823817466cbSJens Wiklander 0x08, 0xe8, 0x4b, 0x73, 0x04, 0x66, 0x01, 0x8a, 0xb9, 0x03, 0xc7, 0x9e, 824817466cbSJens Wiklander 0xb9, 0x82, 0x17, 0x22, 0x36, 0xc0, 0xc1, 0x72, 0x8a, 0xe4, 0xbf, 0x73, 825817466cbSJens Wiklander 0x61, 0x0d, 0x34, 0xde, 0x44, 0x24, 0x6e, 0xf3, 0xd9, 0xc0, 0x5a, 0x22, 826817466cbSJens Wiklander 0x36, 0xfb, 0x66, 0xa6, 0x58, 0x3d, 0x74, 0x49, 0x30, 0x8b, 0xab, 0xce, 827817466cbSJens Wiklander 0x20, 0x72, 0xfe, 0x16, 0x66, 0x29, 0x92, 0xe9, 0x23, 0x5c, 0x25, 0x00, 828817466cbSJens Wiklander 0x2f, 0x11, 0xb1, 0x50, 0x87, 0xb8, 0x27, 0x38, 0xe0, 0x3c, 0x94, 0x5b, 829817466cbSJens Wiklander 0xf7, 0xa2, 0x99, 0x5d, 0xda, 0x1e, 0x98, 0x34, 0x58, 0x41, 0x04, 0x7e, 830817466cbSJens Wiklander 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 0x92, 0x62, 831817466cbSJens Wiklander 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 0x9a, 0xc5, 832817466cbSJens Wiklander 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 0x0a, 0xeb, 833817466cbSJens Wiklander 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 0xc3, 0x35, 834817466cbSJens Wiklander 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 0x2b, 0xb0, 835817466cbSJens Wiklander 0x13, 0xbb, 0x2b, 0x41, 0x04, 0xa4, 0x95, 0x58, 0xd3, 0x2e, 0xd1, 0xeb, 836817466cbSJens Wiklander 0xfc, 0x18, 0x16, 0xaf, 0x4f, 0xf0, 0x9b, 0x55, 0xfc, 0xb4, 0xca, 0x47, 837817466cbSJens Wiklander 0xb2, 0xa0, 0x2d, 0x1e, 0x7c, 0xaf, 0x11, 0x79, 0xea, 0x3f, 0xe1, 0x39, 838817466cbSJens Wiklander 0x5b, 0x22, 0xb8, 0x61, 0x96, 0x40, 0x16, 0xfa, 0xba, 0xf7, 0x2c, 0x97, 839817466cbSJens Wiklander 0x56, 0x95, 0xd9, 0x3d, 0x4d, 0xf0, 0xe5, 0x19, 0x7f, 0xe9, 0xf0, 0x40, 840817466cbSJens Wiklander 0x63, 0x4e, 0xd5, 0x97, 0x64, 0x93, 0x77, 0x87, 0xbe, 0x20, 0xbc, 0x4d, 841817466cbSJens Wiklander 0xee, 0xbb, 0xf9, 0xb8, 0xd6, 0x0a, 0x33, 0x5f, 0x04, 0x6c, 0xa3, 0xaa, 842817466cbSJens Wiklander 0x94, 0x1e, 0x45, 0x86, 0x4c, 0x7c, 0xad, 0xef, 0x9c, 0xf7, 0x5b, 0x3d, 843817466cbSJens Wiklander 0x8b, 0x01, 0x0e, 0x44, 0x3e, 0xf0 844817466cbSJens Wiklander }; 845817466cbSJens Wiklander 846817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_one[] = { 847817466cbSJens Wiklander 0x41, 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 848817466cbSJens Wiklander 0xd7, 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 849817466cbSJens Wiklander 0x40, 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 850817466cbSJens Wiklander 0x79, 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 851817466cbSJens Wiklander 0xd1, 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 852817466cbSJens Wiklander 0xe3, 0x2b, 0xb0, 0x13, 0xbb, 0x2b, 0x41, 0x04, 0x09, 0xf8, 0x5b, 0x3d, 853817466cbSJens Wiklander 0x20, 0xeb, 0xd7, 0x88, 0x5c, 0xe4, 0x64, 0xc0, 0x8d, 0x05, 0x6d, 0x64, 854817466cbSJens Wiklander 0x28, 0xfe, 0x4d, 0xd9, 0x28, 0x7a, 0xa3, 0x65, 0xf1, 0x31, 0xf4, 0x36, 855817466cbSJens Wiklander 0x0f, 0xf3, 0x86, 0xd8, 0x46, 0x89, 0x8b, 0xc4, 0xb4, 0x15, 0x83, 0xc2, 856817466cbSJens Wiklander 0xa5, 0x19, 0x7f, 0x65, 0xd7, 0x87, 0x42, 0x74, 0x6c, 0x12, 0xa5, 0xec, 857817466cbSJens Wiklander 0x0a, 0x4f, 0xfe, 0x2f, 0x27, 0x0a, 0x75, 0x0a, 0x1d, 0x8f, 0xb5, 0x16, 858817466cbSJens Wiklander 0x20, 0x93, 0x4d, 0x74, 0xeb, 0x43, 0xe5, 0x4d, 0xf4, 0x24, 0xfd, 0x96, 859817466cbSJens Wiklander 0x30, 0x6c, 0x01, 0x17, 0xbf, 0x13, 0x1a, 0xfa, 0xbf, 0x90, 0xa9, 0xd3, 860817466cbSJens Wiklander 0x3d, 0x11, 0x98, 0xd9, 0x05, 0x19, 0x37, 0x35, 0x14, 0x41, 0x04, 0x19, 861817466cbSJens Wiklander 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 0xee, 0x0f, 862817466cbSJens Wiklander 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 0x70, 0xf8, 863817466cbSJens Wiklander 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 0xfe, 0xc7, 864817466cbSJens Wiklander 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 0xc4, 0xea, 865817466cbSJens Wiklander 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 0x1a, 0xc5, 866817466cbSJens Wiklander 0x6a, 0x56, 0x12, 0x41, 0x04, 0x36, 0x0a, 0x1c, 0xea, 0x33, 0xfc, 0xe6, 867817466cbSJens Wiklander 0x41, 0x15, 0x64, 0x58, 0xe0, 0xa4, 0xea, 0xc2, 0x19, 0xe9, 0x68, 0x31, 868817466cbSJens Wiklander 0xe6, 0xae, 0xbc, 0x88, 0xb3, 0xf3, 0x75, 0x2f, 0x93, 0xa0, 0x28, 0x1d, 869817466cbSJens Wiklander 0x1b, 0xf1, 0xfb, 0x10, 0x60, 0x51, 0xdb, 0x96, 0x94, 0xa8, 0xd6, 0xe8, 870817466cbSJens Wiklander 0x62, 0xa5, 0xef, 0x13, 0x24, 0xa3, 0xd9, 0xe2, 0x78, 0x94, 0xf1, 0xee, 871817466cbSJens Wiklander 0x4f, 0x7c, 0x59, 0x19, 0x99, 0x65, 0xa8, 0xdd, 0x4a, 0x20, 0x91, 0x84, 872817466cbSJens Wiklander 0x7d, 0x2d, 0x22, 0xdf, 0x3e, 0xe5, 0x5f, 0xaa, 0x2a, 0x3f, 0xb3, 0x3f, 873817466cbSJens Wiklander 0xd2, 0xd1, 0xe0, 0x55, 0xa0, 0x7a, 0x7c, 0x61, 0xec, 0xfb, 0x8d, 0x80, 874817466cbSJens Wiklander 0xec, 0x00, 0xc2, 0xc9, 0xeb, 0x12 875817466cbSJens Wiklander }; 876817466cbSJens Wiklander 877817466cbSJens Wiklander static const unsigned char ecjpake_test_srv_two[] = { 878817466cbSJens Wiklander 0x03, 0x00, 0x17, 0x41, 0x04, 0x0f, 0xb2, 0x2b, 0x1d, 0x5d, 0x11, 0x23, 879817466cbSJens Wiklander 0xe0, 0xef, 0x9f, 0xeb, 0x9d, 0x8a, 0x2e, 0x59, 0x0a, 0x1f, 0x4d, 0x7c, 880817466cbSJens Wiklander 0xed, 0x2c, 0x2b, 0x06, 0x58, 0x6e, 0x8f, 0x2a, 0x16, 0xd4, 0xeb, 0x2f, 881817466cbSJens Wiklander 0xda, 0x43, 0x28, 0xa2, 0x0b, 0x07, 0xd8, 0xfd, 0x66, 0x76, 0x54, 0xca, 882817466cbSJens Wiklander 0x18, 0xc5, 0x4e, 0x32, 0xa3, 0x33, 0xa0, 0x84, 0x54, 0x51, 0xe9, 0x26, 883817466cbSJens Wiklander 0xee, 0x88, 0x04, 0xfd, 0x7a, 0xf0, 0xaa, 0xa7, 0xa6, 0x41, 0x04, 0x55, 884817466cbSJens Wiklander 0x16, 0xea, 0x3e, 0x54, 0xa0, 0xd5, 0xd8, 0xb2, 0xce, 0x78, 0x6b, 0x38, 885817466cbSJens Wiklander 0xd3, 0x83, 0x37, 0x00, 0x29, 0xa5, 0xdb, 0xe4, 0x45, 0x9c, 0x9d, 0xd6, 886817466cbSJens Wiklander 0x01, 0xb4, 0x08, 0xa2, 0x4a, 0xe6, 0x46, 0x5c, 0x8a, 0xc9, 0x05, 0xb9, 887817466cbSJens Wiklander 0xeb, 0x03, 0xb5, 0xd3, 0x69, 0x1c, 0x13, 0x9e, 0xf8, 0x3f, 0x1c, 0xd4, 888817466cbSJens Wiklander 0x20, 0x0f, 0x6c, 0x9c, 0xd4, 0xec, 0x39, 0x22, 0x18, 0xa5, 0x9e, 0xd2, 889817466cbSJens Wiklander 0x43, 0xd3, 0xc8, 0x20, 0xff, 0x72, 0x4a, 0x9a, 0x70, 0xb8, 0x8c, 0xb8, 890817466cbSJens Wiklander 0x6f, 0x20, 0xb4, 0x34, 0xc6, 0x86, 0x5a, 0xa1, 0xcd, 0x79, 0x06, 0xdd, 891817466cbSJens Wiklander 0x7c, 0x9b, 0xce, 0x35, 0x25, 0xf5, 0x08, 0x27, 0x6f, 0x26, 0x83, 0x6c 892817466cbSJens Wiklander }; 893817466cbSJens Wiklander 894817466cbSJens Wiklander static const unsigned char ecjpake_test_cli_two[] = { 895817466cbSJens Wiklander 0x41, 0x04, 0x69, 0xd5, 0x4e, 0xe8, 0x5e, 0x90, 0xce, 0x3f, 0x12, 0x46, 896817466cbSJens Wiklander 0x74, 0x2d, 0xe5, 0x07, 0xe9, 0x39, 0xe8, 0x1d, 0x1d, 0xc1, 0xc5, 0xcb, 897817466cbSJens Wiklander 0x98, 0x8b, 0x58, 0xc3, 0x10, 0xc9, 0xfd, 0xd9, 0x52, 0x4d, 0x93, 0x72, 898817466cbSJens Wiklander 0x0b, 0x45, 0x54, 0x1c, 0x83, 0xee, 0x88, 0x41, 0x19, 0x1d, 0xa7, 0xce, 899817466cbSJens Wiklander 0xd8, 0x6e, 0x33, 0x12, 0xd4, 0x36, 0x23, 0xc1, 0xd6, 0x3e, 0x74, 0x98, 900817466cbSJens Wiklander 0x9a, 0xba, 0x4a, 0xff, 0xd1, 0xee, 0x41, 0x04, 0x07, 0x7e, 0x8c, 0x31, 901817466cbSJens Wiklander 0xe2, 0x0e, 0x6b, 0xed, 0xb7, 0x60, 0xc1, 0x35, 0x93, 0xe6, 0x9f, 0x15, 902817466cbSJens Wiklander 0xbe, 0x85, 0xc2, 0x7d, 0x68, 0xcd, 0x09, 0xcc, 0xb8, 0xc4, 0x18, 0x36, 903817466cbSJens Wiklander 0x08, 0x91, 0x7c, 0x5c, 0x3d, 0x40, 0x9f, 0xac, 0x39, 0xfe, 0xfe, 0xe8, 904817466cbSJens Wiklander 0x2f, 0x72, 0x92, 0xd3, 0x6f, 0x0d, 0x23, 0xe0, 0x55, 0x91, 0x3f, 0x45, 905817466cbSJens Wiklander 0xa5, 0x2b, 0x85, 0xdd, 0x8a, 0x20, 0x52, 0xe9, 0xe1, 0x29, 0xbb, 0x4d, 906817466cbSJens Wiklander 0x20, 0x0f, 0x01, 0x1f, 0x19, 0x48, 0x35, 0x35, 0xa6, 0xe8, 0x9a, 0x58, 907817466cbSJens Wiklander 0x0c, 0x9b, 0x00, 0x03, 0xba, 0xf2, 0x14, 0x62, 0xec, 0xe9, 0x1a, 0x82, 908817466cbSJens Wiklander 0xcc, 0x38, 0xdb, 0xdc, 0xae, 0x60, 0xd9, 0xc5, 0x4c 909817466cbSJens Wiklander }; 910817466cbSJens Wiklander 911817466cbSJens Wiklander static const unsigned char ecjpake_test_pms[] = { 912817466cbSJens Wiklander 0xf3, 0xd4, 0x7f, 0x59, 0x98, 0x44, 0xdb, 0x92, 0xa5, 0x69, 0xbb, 0xe7, 913817466cbSJens Wiklander 0x98, 0x1e, 0x39, 0xd9, 0x31, 0xfd, 0x74, 0x3b, 0xf2, 0x2e, 0x98, 0xf9, 914817466cbSJens Wiklander 0xb4, 0x38, 0xf7, 0x19, 0xd3, 0xc4, 0xf3, 0x51 915817466cbSJens Wiklander }; 916817466cbSJens Wiklander 917817466cbSJens Wiklander /* Load my private keys and generate the correponding public keys */ 918817466cbSJens Wiklander static int ecjpake_test_load( mbedtls_ecjpake_context *ctx, 919817466cbSJens Wiklander const unsigned char *xm1, size_t len1, 920817466cbSJens Wiklander const unsigned char *xm2, size_t len2 ) 921817466cbSJens Wiklander { 922817466cbSJens Wiklander int ret; 923817466cbSJens Wiklander 924817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm1, xm1, len1 ) ); 925817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->xm2, xm2, len2 ) ); 926817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm1, &ctx->xm1, 927817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 928817466cbSJens Wiklander MBEDTLS_MPI_CHK( mbedtls_ecp_mul( &ctx->grp, &ctx->Xm2, &ctx->xm2, 929817466cbSJens Wiklander &ctx->grp.G, NULL, NULL ) ); 930817466cbSJens Wiklander 931817466cbSJens Wiklander cleanup: 932817466cbSJens Wiklander return( ret ); 933817466cbSJens Wiklander } 934817466cbSJens Wiklander 935817466cbSJens Wiklander /* For tests we don't need a secure RNG; 936817466cbSJens Wiklander * use the LGC from Numerical Recipes for simplicity */ 937817466cbSJens Wiklander static int ecjpake_lgc( void *p, unsigned char *out, size_t len ) 938817466cbSJens Wiklander { 939817466cbSJens Wiklander static uint32_t x = 42; 940817466cbSJens Wiklander (void) p; 941817466cbSJens Wiklander 942817466cbSJens Wiklander while( len > 0 ) 943817466cbSJens Wiklander { 944817466cbSJens Wiklander size_t use_len = len > 4 ? 4 : len; 945817466cbSJens Wiklander x = 1664525 * x + 1013904223; 946817466cbSJens Wiklander memcpy( out, &x, use_len ); 947817466cbSJens Wiklander out += use_len; 948817466cbSJens Wiklander len -= use_len; 949817466cbSJens Wiklander } 950817466cbSJens Wiklander 951817466cbSJens Wiklander return( 0 ); 952817466cbSJens Wiklander } 953817466cbSJens Wiklander 954817466cbSJens Wiklander #define TEST_ASSERT( x ) \ 955817466cbSJens Wiklander do { \ 956817466cbSJens Wiklander if( x ) \ 957817466cbSJens Wiklander ret = 0; \ 958817466cbSJens Wiklander else \ 959817466cbSJens Wiklander { \ 960817466cbSJens Wiklander ret = 1; \ 961817466cbSJens Wiklander goto cleanup; \ 962817466cbSJens Wiklander } \ 963817466cbSJens Wiklander } while( 0 ) 964817466cbSJens Wiklander 965817466cbSJens Wiklander /* 966817466cbSJens Wiklander * Checkup routine 967817466cbSJens Wiklander */ 968817466cbSJens Wiklander int mbedtls_ecjpake_self_test( int verbose ) 969817466cbSJens Wiklander { 970817466cbSJens Wiklander int ret; 971817466cbSJens Wiklander mbedtls_ecjpake_context cli; 972817466cbSJens Wiklander mbedtls_ecjpake_context srv; 973817466cbSJens Wiklander unsigned char buf[512], pms[32]; 974817466cbSJens Wiklander size_t len, pmslen; 975817466cbSJens Wiklander 976817466cbSJens Wiklander mbedtls_ecjpake_init( &cli ); 977817466cbSJens Wiklander mbedtls_ecjpake_init( &srv ); 978817466cbSJens Wiklander 979817466cbSJens Wiklander if( verbose != 0 ) 980817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #0 (setup): " ); 981817466cbSJens Wiklander 982817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &cli, MBEDTLS_ECJPAKE_CLIENT, 983817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 984817466cbSJens Wiklander ecjpake_test_password, 985817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 986817466cbSJens Wiklander 987817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_setup( &srv, MBEDTLS_ECJPAKE_SERVER, 988817466cbSJens Wiklander MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, 989817466cbSJens Wiklander ecjpake_test_password, 990817466cbSJens Wiklander sizeof( ecjpake_test_password ) ) == 0 ); 991817466cbSJens Wiklander 992817466cbSJens Wiklander if( verbose != 0 ) 993817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 994817466cbSJens Wiklander 995817466cbSJens Wiklander if( verbose != 0 ) 996817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #1 (random handshake): " ); 997817466cbSJens Wiklander 998817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &cli, 999817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1000817466cbSJens Wiklander 1001817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, buf, len ) == 0 ); 1002817466cbSJens Wiklander 1003817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_one( &srv, 1004817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1005817466cbSJens Wiklander 1006817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, buf, len ) == 0 ); 1007817466cbSJens Wiklander 1008817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &srv, 1009817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1010817466cbSJens Wiklander 1011817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, buf, len ) == 0 ); 1012817466cbSJens Wiklander 1013817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1014817466cbSJens Wiklander pms, sizeof( pms ), &pmslen, ecjpake_lgc, NULL ) == 0 ); 1015817466cbSJens Wiklander 1016817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_write_round_two( &cli, 1017817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1018817466cbSJens Wiklander 1019817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, buf, len ) == 0 ); 1020817466cbSJens Wiklander 1021817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1022817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1023817466cbSJens Wiklander 1024817466cbSJens Wiklander TEST_ASSERT( len == pmslen ); 1025817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, pms, len ) == 0 ); 1026817466cbSJens Wiklander 1027817466cbSJens Wiklander if( verbose != 0 ) 1028817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1029817466cbSJens Wiklander 1030817466cbSJens Wiklander if( verbose != 0 ) 1031817466cbSJens Wiklander mbedtls_printf( " ECJPAKE test #2 (reference handshake): " ); 1032817466cbSJens Wiklander 1033817466cbSJens Wiklander /* Simulate generation of round one */ 1034817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &cli, 1035817466cbSJens Wiklander ecjpake_test_x1, sizeof( ecjpake_test_x1 ), 1036817466cbSJens Wiklander ecjpake_test_x2, sizeof( ecjpake_test_x2 ) ) ); 1037817466cbSJens Wiklander 1038817466cbSJens Wiklander MBEDTLS_MPI_CHK( ecjpake_test_load( &srv, 1039817466cbSJens Wiklander ecjpake_test_x3, sizeof( ecjpake_test_x3 ), 1040817466cbSJens Wiklander ecjpake_test_x4, sizeof( ecjpake_test_x4 ) ) ); 1041817466cbSJens Wiklander 1042817466cbSJens Wiklander /* Read round one */ 1043817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &srv, 1044817466cbSJens Wiklander ecjpake_test_cli_one, 1045817466cbSJens Wiklander sizeof( ecjpake_test_cli_one ) ) == 0 ); 1046817466cbSJens Wiklander 1047817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_one( &cli, 1048817466cbSJens Wiklander ecjpake_test_srv_one, 1049817466cbSJens Wiklander sizeof( ecjpake_test_srv_one ) ) == 0 ); 1050817466cbSJens Wiklander 1051817466cbSJens Wiklander /* Skip generation of round two, read round two */ 1052817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &cli, 1053817466cbSJens Wiklander ecjpake_test_srv_two, 1054817466cbSJens Wiklander sizeof( ecjpake_test_srv_two ) ) == 0 ); 1055817466cbSJens Wiklander 1056817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_read_round_two( &srv, 1057817466cbSJens Wiklander ecjpake_test_cli_two, 1058817466cbSJens Wiklander sizeof( ecjpake_test_cli_two ) ) == 0 ); 1059817466cbSJens Wiklander 1060817466cbSJens Wiklander /* Server derives PMS */ 1061817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &srv, 1062817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1063817466cbSJens Wiklander 1064817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1065817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1066817466cbSJens Wiklander 1067817466cbSJens Wiklander memset( buf, 0, len ); /* Avoid interferences with next step */ 1068817466cbSJens Wiklander 1069817466cbSJens Wiklander /* Client derives PMS */ 1070817466cbSJens Wiklander TEST_ASSERT( mbedtls_ecjpake_derive_secret( &cli, 1071817466cbSJens Wiklander buf, sizeof( buf ), &len, ecjpake_lgc, NULL ) == 0 ); 1072817466cbSJens Wiklander 1073817466cbSJens Wiklander TEST_ASSERT( len == sizeof( ecjpake_test_pms ) ); 1074817466cbSJens Wiklander TEST_ASSERT( memcmp( buf, ecjpake_test_pms, len ) == 0 ); 1075817466cbSJens Wiklander 1076817466cbSJens Wiklander if( verbose != 0 ) 1077817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 1078817466cbSJens Wiklander 1079817466cbSJens Wiklander cleanup: 1080817466cbSJens Wiklander mbedtls_ecjpake_free( &cli ); 1081817466cbSJens Wiklander mbedtls_ecjpake_free( &srv ); 1082817466cbSJens Wiklander 1083817466cbSJens Wiklander if( ret != 0 ) 1084817466cbSJens Wiklander { 1085817466cbSJens Wiklander if( verbose != 0 ) 1086817466cbSJens Wiklander mbedtls_printf( "failed\n" ); 1087817466cbSJens Wiklander 1088817466cbSJens Wiklander ret = 1; 1089817466cbSJens Wiklander } 1090817466cbSJens Wiklander 1091817466cbSJens Wiklander if( verbose != 0 ) 1092817466cbSJens Wiklander mbedtls_printf( "\n" ); 1093817466cbSJens Wiklander 1094817466cbSJens Wiklander return( ret ); 1095817466cbSJens Wiklander } 1096817466cbSJens Wiklander 1097817466cbSJens Wiklander #undef TEST_ASSERT 1098817466cbSJens Wiklander 1099817466cbSJens Wiklander #endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_SHA256_C */ 1100817466cbSJens Wiklander 1101817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 1102817466cbSJens Wiklander 1103817466cbSJens Wiklander #endif /* MBEDTLS_ECJPAKE_C */ 1104