1*62c56f98SSadaf Ebrahimi/* BEGIN_HEADER */ 2*62c56f98SSadaf Ebrahimi#include "mbedtls/ecjpake.h" 3*62c56f98SSadaf Ebrahimi 4*62c56f98SSadaf Ebrahimi#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) && defined(MBEDTLS_MD_CAN_SHA256) 5*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_x1[] = { 6*62c56f98SSadaf Ebrahimi 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 7*62c56f98SSadaf Ebrahimi 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 8*62c56f98SSadaf Ebrahimi 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x21 9*62c56f98SSadaf Ebrahimi}; 10*62c56f98SSadaf Ebrahimi 11*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_x2[] = { 12*62c56f98SSadaf Ebrahimi 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 13*62c56f98SSadaf Ebrahimi 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 14*62c56f98SSadaf Ebrahimi 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 15*62c56f98SSadaf Ebrahimi}; 16*62c56f98SSadaf Ebrahimi 17*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_x3[] = { 18*62c56f98SSadaf Ebrahimi 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 19*62c56f98SSadaf Ebrahimi 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 20*62c56f98SSadaf Ebrahimi 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x81 21*62c56f98SSadaf Ebrahimi}; 22*62c56f98SSadaf Ebrahimi 23*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_x4[] = { 24*62c56f98SSadaf Ebrahimi 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 25*62c56f98SSadaf Ebrahimi 0xcd, 0xce, 0xcf, 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 26*62c56f98SSadaf Ebrahimi 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, 0xe1 27*62c56f98SSadaf Ebrahimi}; 28*62c56f98SSadaf Ebrahimi 29*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_X1[] = { 30*62c56f98SSadaf Ebrahimi 0x04, 0xac, 0xcf, 0x01, 0x06, 0xef, 0x85, 0x8f, 0xa2, 0xd9, 0x19, 0x33, 31*62c56f98SSadaf Ebrahimi 0x13, 0x46, 0x80, 0x5a, 0x78, 0xb5, 0x8b, 0xba, 0xd0, 0xb8, 0x44, 0xe5, 32*62c56f98SSadaf Ebrahimi 0xc7, 0x89, 0x28, 0x79, 0x14, 0x61, 0x87, 0xdd, 0x26, 0x66, 0xad, 0xa7, 33*62c56f98SSadaf Ebrahimi 0x81, 0xbb, 0x7f, 0x11, 0x13, 0x72, 0x25, 0x1a, 0x89, 0x10, 0x62, 0x1f, 34*62c56f98SSadaf Ebrahimi 0x63, 0x4d, 0xf1, 0x28, 0xac, 0x48, 0xe3, 0x81, 0xfd, 0x6e, 0xf9, 0x06, 35*62c56f98SSadaf Ebrahimi 0x07, 0x31, 0xf6, 0x94, 0xa4 36*62c56f98SSadaf Ebrahimi}; 37*62c56f98SSadaf Ebrahimi 38*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_X2[] = { 39*62c56f98SSadaf Ebrahimi 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 40*62c56f98SSadaf Ebrahimi 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 41*62c56f98SSadaf Ebrahimi 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 42*62c56f98SSadaf Ebrahimi 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 43*62c56f98SSadaf Ebrahimi 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 44*62c56f98SSadaf Ebrahimi 0x2b, 0xb0, 0x13, 0xbb, 0x2b 45*62c56f98SSadaf Ebrahimi}; 46*62c56f98SSadaf Ebrahimi 47*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_X3[] = { 48*62c56f98SSadaf Ebrahimi 0x04, 0x7e, 0xa6, 0xe3, 0xa4, 0x48, 0x70, 0x37, 0xa9, 0xe0, 0xdb, 0xd7, 49*62c56f98SSadaf Ebrahimi 0x92, 0x62, 0xb2, 0xcc, 0x27, 0x3e, 0x77, 0x99, 0x30, 0xfc, 0x18, 0x40, 50*62c56f98SSadaf Ebrahimi 0x9a, 0xc5, 0x36, 0x1c, 0x5f, 0xe6, 0x69, 0xd7, 0x02, 0xe1, 0x47, 0x79, 51*62c56f98SSadaf Ebrahimi 0x0a, 0xeb, 0x4c, 0xe7, 0xfd, 0x65, 0x75, 0xab, 0x0f, 0x6c, 0x7f, 0xd1, 52*62c56f98SSadaf Ebrahimi 0xc3, 0x35, 0x93, 0x9a, 0xa8, 0x63, 0xba, 0x37, 0xec, 0x91, 0xb7, 0xe3, 53*62c56f98SSadaf Ebrahimi 0x2b, 0xb0, 0x13, 0xbb, 0x2b 54*62c56f98SSadaf Ebrahimi}; 55*62c56f98SSadaf Ebrahimi 56*62c56f98SSadaf Ebrahimistatic const unsigned char ecjpake_test_X4[] = { 57*62c56f98SSadaf Ebrahimi 0x04, 0x19, 0x0a, 0x07, 0x70, 0x0f, 0xfa, 0x4b, 0xe6, 0xae, 0x1d, 0x79, 58*62c56f98SSadaf Ebrahimi 0xee, 0x0f, 0x06, 0xae, 0xb5, 0x44, 0xcd, 0x5a, 0xdd, 0xaa, 0xbe, 0xdf, 59*62c56f98SSadaf Ebrahimi 0x70, 0xf8, 0x62, 0x33, 0x21, 0x33, 0x2c, 0x54, 0xf3, 0x55, 0xf0, 0xfb, 60*62c56f98SSadaf Ebrahimi 0xfe, 0xc7, 0x83, 0xed, 0x35, 0x9e, 0x5d, 0x0b, 0xf7, 0x37, 0x7a, 0x0f, 61*62c56f98SSadaf Ebrahimi 0xc4, 0xea, 0x7a, 0xce, 0x47, 0x3c, 0x9c, 0x11, 0x2b, 0x41, 0xcc, 0xd4, 62*62c56f98SSadaf Ebrahimi 0x1a, 0xc5, 0x6a, 0x56, 0x12 63*62c56f98SSadaf Ebrahimi}; 64*62c56f98SSadaf Ebrahimi 65*62c56f98SSadaf Ebrahimi/* Load my private and public keys, and peer's public keys */ 66*62c56f98SSadaf Ebrahimistatic int ecjpake_test_load(mbedtls_ecjpake_context *ctx, 67*62c56f98SSadaf Ebrahimi const unsigned char *xm1, size_t len_xm1, 68*62c56f98SSadaf Ebrahimi const unsigned char *xm2, size_t len_xm2, 69*62c56f98SSadaf Ebrahimi const unsigned char *Xm1, size_t len_Xm1, 70*62c56f98SSadaf Ebrahimi const unsigned char *Xm2, size_t len_Xm2, 71*62c56f98SSadaf Ebrahimi const unsigned char *Xp1, size_t len_Xp1, 72*62c56f98SSadaf Ebrahimi const unsigned char *Xp2, size_t len_Xp2) 73*62c56f98SSadaf Ebrahimi{ 74*62c56f98SSadaf Ebrahimi int ret; 75*62c56f98SSadaf Ebrahimi 76*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->xm1, xm1, len_xm1)); 77*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->xm2, xm2, len_xm2)); 78*62c56f98SSadaf Ebrahimi 79*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_ecp_point_read_binary(&ctx->grp, 80*62c56f98SSadaf Ebrahimi &ctx->Xm1, Xm1, len_Xm1)); 81*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_ecp_point_read_binary(&ctx->grp, 82*62c56f98SSadaf Ebrahimi &ctx->Xm2, Xm2, len_Xm2)); 83*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_ecp_point_read_binary(&ctx->grp, 84*62c56f98SSadaf Ebrahimi &ctx->Xp1, Xp1, len_Xp1)); 85*62c56f98SSadaf Ebrahimi MBEDTLS_MPI_CHK(mbedtls_ecp_point_read_binary(&ctx->grp, 86*62c56f98SSadaf Ebrahimi &ctx->Xp2, Xp2, len_Xp2)); 87*62c56f98SSadaf Ebrahimi 88*62c56f98SSadaf Ebrahimicleanup: 89*62c56f98SSadaf Ebrahimi return ret; 90*62c56f98SSadaf Ebrahimi} 91*62c56f98SSadaf Ebrahimi 92*62c56f98SSadaf Ebrahimi#define ADD_SIZE(x) x, sizeof(x) 93*62c56f98SSadaf Ebrahimi#endif /* MBEDTLS_ECP_DP_SECP256R1_ENABLED && MBEDTLS_MD_CAN_SHA256 */ 94*62c56f98SSadaf Ebrahimi/* END_HEADER */ 95*62c56f98SSadaf Ebrahimi 96*62c56f98SSadaf Ebrahimi/* BEGIN_DEPENDENCIES 97*62c56f98SSadaf Ebrahimi * depends_on:MBEDTLS_ECJPAKE_C 98*62c56f98SSadaf Ebrahimi * END_DEPENDENCIES 99*62c56f98SSadaf Ebrahimi */ 100*62c56f98SSadaf Ebrahimi 101*62c56f98SSadaf Ebrahimi/* BEGIN_CASE */ 102*62c56f98SSadaf Ebrahimivoid ecjpake_invalid_param() 103*62c56f98SSadaf Ebrahimi{ 104*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_context ctx; 105*62c56f98SSadaf Ebrahimi unsigned char buf[42] = { 0 }; 106*62c56f98SSadaf Ebrahimi size_t const len = sizeof(buf); 107*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_role invalid_role = (mbedtls_ecjpake_role) 42; 108*62c56f98SSadaf Ebrahimi mbedtls_md_type_t valid_md = MBEDTLS_MD_SHA256; 109*62c56f98SSadaf Ebrahimi mbedtls_ecp_group_id valid_group = MBEDTLS_ECP_DP_SECP256R1; 110*62c56f98SSadaf Ebrahimi 111*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 112*62c56f98SSadaf Ebrahimi 113*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_init(&ctx); 114*62c56f98SSadaf Ebrahimi 115*62c56f98SSadaf Ebrahimi TEST_EQUAL(MBEDTLS_ERR_ECP_BAD_INPUT_DATA, 116*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_setup(&ctx, 117*62c56f98SSadaf Ebrahimi invalid_role, 118*62c56f98SSadaf Ebrahimi valid_md, 119*62c56f98SSadaf Ebrahimi valid_group, 120*62c56f98SSadaf Ebrahimi buf, len)); 121*62c56f98SSadaf Ebrahimiexit: 122*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 123*62c56f98SSadaf Ebrahimi} 124*62c56f98SSadaf Ebrahimi/* END_CASE */ 125*62c56f98SSadaf Ebrahimi 126*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ 127*62c56f98SSadaf Ebrahimivoid ecjpake_selftest() 128*62c56f98SSadaf Ebrahimi{ 129*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 130*62c56f98SSadaf Ebrahimi 131*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_self_test(1) == 0); 132*62c56f98SSadaf Ebrahimi 133*62c56f98SSadaf Ebrahimiexit: 134*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 135*62c56f98SSadaf Ebrahimi} 136*62c56f98SSadaf Ebrahimi/* END_CASE */ 137*62c56f98SSadaf Ebrahimi 138*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_MD_CAN_SHA256 */ 139*62c56f98SSadaf Ebrahimivoid read_bad_md(data_t *msg) 140*62c56f98SSadaf Ebrahimi{ 141*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_context corrupt_ctx; 142*62c56f98SSadaf Ebrahimi const unsigned char *pw = NULL; 143*62c56f98SSadaf Ebrahimi const size_t pw_len = 0; 144*62c56f98SSadaf Ebrahimi int any_role = MBEDTLS_ECJPAKE_CLIENT; 145*62c56f98SSadaf Ebrahimi 146*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 147*62c56f98SSadaf Ebrahimi 148*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_init(&corrupt_ctx); 149*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_setup(&corrupt_ctx, any_role, 150*62c56f98SSadaf Ebrahimi MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, 151*62c56f98SSadaf Ebrahimi pw_len) == 0); 152*62c56f98SSadaf Ebrahimi corrupt_ctx.md_type = MBEDTLS_MD_NONE; 153*62c56f98SSadaf Ebrahimi 154*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_ecjpake_read_round_one(&corrupt_ctx, msg->x, 155*62c56f98SSadaf Ebrahimi msg->len), MBEDTLS_ERR_MD_BAD_INPUT_DATA); 156*62c56f98SSadaf Ebrahimi 157*62c56f98SSadaf Ebrahimiexit: 158*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_free(&corrupt_ctx); 159*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 160*62c56f98SSadaf Ebrahimi} 161*62c56f98SSadaf Ebrahimi/* END_CASE */ 162*62c56f98SSadaf Ebrahimi 163*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_MD_CAN_SHA256 */ 164*62c56f98SSadaf Ebrahimivoid read_round_one(int role, data_t *msg, int ref_ret) 165*62c56f98SSadaf Ebrahimi{ 166*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_context ctx; 167*62c56f98SSadaf Ebrahimi const unsigned char *pw = NULL; 168*62c56f98SSadaf Ebrahimi const size_t pw_len = 0; 169*62c56f98SSadaf Ebrahimi 170*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 171*62c56f98SSadaf Ebrahimi 172*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_init(&ctx); 173*62c56f98SSadaf Ebrahimi 174*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_setup(&ctx, role, 175*62c56f98SSadaf Ebrahimi MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, 176*62c56f98SSadaf Ebrahimi pw_len) == 0); 177*62c56f98SSadaf Ebrahimi 178*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_read_round_one(&ctx, msg->x, msg->len) == ref_ret); 179*62c56f98SSadaf Ebrahimi 180*62c56f98SSadaf Ebrahimiexit: 181*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_free(&ctx); 182*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 183*62c56f98SSadaf Ebrahimi} 184*62c56f98SSadaf Ebrahimi/* END_CASE */ 185*62c56f98SSadaf Ebrahimi 186*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_MD_CAN_SHA256 */ 187*62c56f98SSadaf Ebrahimivoid read_round_two_cli(data_t *msg, int ref_ret) 188*62c56f98SSadaf Ebrahimi{ 189*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_context ctx; 190*62c56f98SSadaf Ebrahimi const unsigned char *pw = NULL; 191*62c56f98SSadaf Ebrahimi const size_t pw_len = 0; 192*62c56f98SSadaf Ebrahimi 193*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 194*62c56f98SSadaf Ebrahimi 195*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_init(&ctx); 196*62c56f98SSadaf Ebrahimi 197*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_setup(&ctx, MBEDTLS_ECJPAKE_CLIENT, 198*62c56f98SSadaf Ebrahimi MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, 199*62c56f98SSadaf Ebrahimi pw_len) == 0); 200*62c56f98SSadaf Ebrahimi 201*62c56f98SSadaf Ebrahimi TEST_ASSERT(ecjpake_test_load(&ctx, 202*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_x1), ADD_SIZE(ecjpake_test_x2), 203*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_X1), ADD_SIZE(ecjpake_test_X2), 204*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_X3), ADD_SIZE(ecjpake_test_X4)) 205*62c56f98SSadaf Ebrahimi == 0); 206*62c56f98SSadaf Ebrahimi 207*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret); 208*62c56f98SSadaf Ebrahimi 209*62c56f98SSadaf Ebrahimiexit: 210*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_free(&ctx); 211*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 212*62c56f98SSadaf Ebrahimi} 213*62c56f98SSadaf Ebrahimi/* END_CASE */ 214*62c56f98SSadaf Ebrahimi 215*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED:MBEDTLS_MD_CAN_SHA256 */ 216*62c56f98SSadaf Ebrahimivoid read_round_two_srv(data_t *msg, int ref_ret) 217*62c56f98SSadaf Ebrahimi{ 218*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_context ctx; 219*62c56f98SSadaf Ebrahimi const unsigned char *pw = NULL; 220*62c56f98SSadaf Ebrahimi const size_t pw_len = 0; 221*62c56f98SSadaf Ebrahimi 222*62c56f98SSadaf Ebrahimi MD_PSA_INIT(); 223*62c56f98SSadaf Ebrahimi 224*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_init(&ctx); 225*62c56f98SSadaf Ebrahimi 226*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_setup(&ctx, MBEDTLS_ECJPAKE_SERVER, 227*62c56f98SSadaf Ebrahimi MBEDTLS_MD_SHA256, MBEDTLS_ECP_DP_SECP256R1, pw, 228*62c56f98SSadaf Ebrahimi pw_len) == 0); 229*62c56f98SSadaf Ebrahimi 230*62c56f98SSadaf Ebrahimi TEST_ASSERT(ecjpake_test_load(&ctx, 231*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_x3), ADD_SIZE(ecjpake_test_x4), 232*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_X3), ADD_SIZE(ecjpake_test_X4), 233*62c56f98SSadaf Ebrahimi ADD_SIZE(ecjpake_test_X1), ADD_SIZE(ecjpake_test_X2)) 234*62c56f98SSadaf Ebrahimi == 0); 235*62c56f98SSadaf Ebrahimi 236*62c56f98SSadaf Ebrahimi TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret); 237*62c56f98SSadaf Ebrahimi 238*62c56f98SSadaf Ebrahimiexit: 239*62c56f98SSadaf Ebrahimi mbedtls_ecjpake_free(&ctx); 240*62c56f98SSadaf Ebrahimi MD_PSA_DONE(); 241*62c56f98SSadaf Ebrahimi} 242*62c56f98SSadaf Ebrahimi/* END_CASE */ 243