1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2026-01-01 01:41:18 +01:00

Merge pull request #11801 from kaspar030/update_pkg_libcose

pkg/libcose: bump version
This commit is contained in:
Kaspar Schleiser 2019-07-18 09:44:32 +02:00 committed by GitHub
commit 8150b014b1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 111 additions and 97 deletions

View File

@ -1,6 +1,6 @@
PKG_NAME=libcose
PKG_URL=https://github.com/bergzand/libcose
PKG_VERSION=v0.3.1
PKG_VERSION=8b5f651c3203682a2d98121cd3e5c844cb2b4c36
PKG_LICENSE=LGPL
.PHONY: all

View File

@ -1,4 +1,4 @@
USEPKG += cn-cbor
USEPKG += nanocbor
USEMODULE += libcose_crypt

View File

@ -1,6 +1,6 @@
From 2d37e015c9fbf3711a7f931564983b20f2267da4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Joakim=20Nohlg=C3=A5rd?= <joakim.nohlgard@eistec.se>
Date: Tue, 15 May 2018 13:24:16 +0200
From ed69076abbe83ed256f1e1fbdf74726961c9071e Mon Sep 17 00:00:00 2001
From: Kaspar Schleiser <kaspar@schleiser.de>
Date: Fri, 5 Jul 2019 14:51:09 +0200
Subject: [PATCH] RIOT: Use RIOT random_bytes function instead of randombytes
---
@ -8,10 +8,10 @@ Subject: [PATCH] RIOT: Use RIOT random_bytes function instead of randombytes
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/crypt/hacl.c b/src/crypt/hacl.c
index a16dbd7e30..cb4808d684 100644
index c24d751732..3bdcabf95e 100644
--- a/src/crypt/hacl.c
+++ b/src/crypt/hacl.c
@@ -18,10 +18,10 @@
@@ -19,10 +19,10 @@
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
@ -21,9 +21,9 @@ index a16dbd7e30..cb4808d684 100644
extern bool Hacl_Ed25519_verify(uint8_t *public, uint8_t *msg, uint32_t len1, uint8_t *signature);
-extern void randombytes(uint8_t *target, uint64_t n);
#ifdef CRYPTO_HACL_INCLUDE_CHACHAPOLY
int cose_crypto_aead_encrypt_chachapoly(uint8_t *c,
size_t *clen,
@@ -65,7 +65,7 @@ ssize_t cose_crypto_keygen_chachapoly(uint8_t *sk, size_t len)
@@ -67,7 +67,7 @@ COSE_ssize_t cose_crypto_keygen_chachapoly(uint8_t *sk, size_t len)
if (len < COSE_CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES) {
return COSE_ERR_NOMEM;
}
@ -32,7 +32,7 @@ index a16dbd7e30..cb4808d684 100644
return COSE_CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES;
}
@@ -74,7 +74,7 @@ size_t cose_crypto_aead_nonce_chachapoly(uint8_t *nonce, size_t len)
@@ -76,7 +76,7 @@ size_t cose_crypto_aead_nonce_chachapoly(uint8_t *nonce, size_t len)
if (len < COSE_CRYPTO_AEAD_CHACHA20POLY1305_NONCEBYTES) {
return 0;
}
@ -40,7 +40,7 @@ index a16dbd7e30..cb4808d684 100644
+ random_bytes(nonce, COSE_CRYPTO_AEAD_CHACHA20POLY1305_NONCEBYTES);
return COSE_CRYPTO_AEAD_CHACHA20POLY1305_NONCEBYTES;
}
#endif /* CRYPTO_HACL_INCLUDE_CHACHAPOLY */
--
2.17.0
2.22.0

View File

@ -6,7 +6,6 @@
* General Public License v2.1. See the file LICENSE in the top level
* directory for more details.
*/
/**
* @ingroup tests
* @{
@ -24,8 +23,8 @@
#include <stdlib.h>
#include <string.h>
#include "cn-cbor/cn-cbor.h"
#include "cose.h"
#include "cose/sign.h"
#include "cose/crypto.h"
#include "embUnit.h"
#include "memarray.h"
@ -44,154 +43,169 @@ static unsigned char sk2[COSE_CRYPTO_SIGN_ED25519_SECRETKEYBYTES];
static unsigned char symmkey[COSE_CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES];
static uint8_t nonce[COSE_CRYPTO_AEAD_CHACHA20POLY1305_NONCEBYTES] = { 0 };
/* COSE structs */
static cose_sign_t sign, verify;
static cose_key_t signer, signer2, symm;
static cose_encrypt_t test_encrypt, test_decrypt;
static cose_sign_enc_t sign;
static cose_sign_dec_t verify;
static cose_signature_t signature1, signature2;
static cose_key_t signer1, signer2, symm;
static cose_encrypt_t test_encrypt;
static cose_encrypt_dec_t test_decrypt;
static cose_recp_dec_t test_derecp;
/* COSE sign buffer */
static uint8_t buf[1024];
/*Signature Verification buffer */
static uint8_t vbuf[1024];
static cn_cbor block_storage_data[MAX_NUMBER_BLOCKS];
static memarray_t storage;
/* CN_CBOR calloc/free functions */
static void *cose_calloc(size_t count, size_t size, void *memblock);
static void cose_free(void *ptr, void *memblock);
/* CN_CBOR block allocator context struct*/
static cn_cbor_context ct =
{
.calloc_func = cose_calloc,
.free_func = cose_free,
.context = &storage,
};
static void *cose_calloc(size_t count, size_t size, void *memblock)
{
(void)count;
void *block = memarray_alloc(memblock);
if (block) {
memset(block, 0, size);
}
return block;
}
static void cose_free(void *ptr, void *memblock)
{
memarray_free(memblock, ptr);
}
static uint8_t buf[2048];
/* Signature Verification buffer */
static uint8_t vbuf[2048];
static void setUp(void)
{
/* Initialize */
random_init(0);
memarray_init(&storage, block_storage_data, sizeof(cn_cbor),
MAX_NUMBER_BLOCKS);
/* Clear buffer */
memset(buf, 0, sizeof(buf));
memset(vbuf, 0, sizeof(vbuf));
}
/* Untagged 1 signer test */
static void test_libcose_01(void)
{
/* Set up first signer */
cose_key_init(&signer);
cose_key_set_keys(&signer, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA,
pk, NULL, sk);
cose_crypto_keypair_ed25519(&signer);
cose_key_set_kid(&signer, (uint8_t *)kid, sizeof(kid) - 1);
cose_key_init(&signer1);
cose_key_set_keys(&signer1, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA, pk,
NULL, sk);
cose_crypto_keypair_ed25519(&signer1);
cose_key_set_kid(&signer1, (uint8_t *)kid, sizeof(kid) - 1);
/* Initialize struct */
cose_sign_init(&sign, COSE_FLAGS_UNTAGGED);
cose_sign_init(&verify, 0);
cose_signature_init(&signature1);
/* Add payload */
cose_sign_set_payload(&sign, payload, sizeof(payload));
/* First signer */
cose_sign_add_signer(&sign, &signer);
cose_sign_add_signer(&sign, &signature1, &signer1);
/* Encode COSE sign object */
uint8_t *out = NULL;
ssize_t encode_size = cose_sign_encode(&sign, buf, sizeof(buf), &out, &ct);
ssize_t encode_size = cose_sign_encode(&sign, buf, sizeof(buf), &out);
TEST_ASSERT(encode_size > 0);
/* Decode again */
TEST_ASSERT_EQUAL_INT(cose_sign_decode(&verify, out, encode_size, &ct), 0);
TEST_ASSERT_EQUAL_INT(0, cose_sign_decode(&verify, out, encode_size));
/* Verify with signature slot 0 */
TEST_ASSERT_EQUAL_INT(cose_sign_verify(&verify, &signer,
0, vbuf, sizeof(vbuf), &ct), 0);
cose_signature_dec_t vsignature;
cose_sign_signature_iter_init(&vsignature);
TEST_ASSERT(cose_sign_signature_iter(&verify, &vsignature));
TEST_ASSERT_EQUAL_INT(0,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
/* Modify payload */
((uint8_t *)(verify.payload))[0]++;
/* Should fail due to modified payload */
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
}
/* 2 signer test */
static void test_libcose_02(void)
{
/* Set up first signer */
cose_key_init(&signer);
cose_key_set_keys(&signer, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA,
pk, NULL, sk);
cose_crypto_keypair_ed25519(&signer);
cose_key_set_kid(&signer, (uint8_t *)kid, sizeof(kid) - 1);
cose_key_init(&signer1);
cose_key_set_keys(&signer1, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA, pk,
NULL, sk);
cose_crypto_keypair_ed25519(&signer1);
cose_key_set_kid(&signer1, (uint8_t *)kid, sizeof(kid) - 1);
/* Second signer */
cose_key_init(&signer2);
cose_key_set_keys(&signer2, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA,
pk2, NULL, sk2);
cose_key_set_keys(&signer2, COSE_EC_CURVE_ED25519, COSE_ALGO_EDDSA, pk2,
NULL, sk2);
cose_crypto_keypair_ed25519(&signer2);
cose_key_set_kid(&signer2, (uint8_t *)kid2, sizeof(kid2) - 1);
/* Initialize struct */
/* Initialize structs */
cose_sign_init(&sign, 0);
cose_sign_init(&verify, 0);
cose_signature_init(&signature1);
cose_signature_init(&signature2);
/* Add payload */
cose_sign_set_payload(&sign, payload, sizeof(payload));
/* Signers */
cose_sign_add_signer(&sign, &signer);
cose_sign_add_signer(&sign, &signer2);
cose_sign_add_signer(&sign, &signature1, &signer1);
cose_sign_add_signer(&sign, &signature2, &signer2);
/* Encode COSE sign object */
uint8_t *out = NULL;
size_t len = cose_sign_encode(&sign, buf, sizeof(buf), &out, &ct);
size_t len = cose_sign_encode(&sign, buf, sizeof(buf), &out);
TEST_ASSERT(len > 0);
TEST_ASSERT_EQUAL_INT(cose_sign_decode(&verify, out, len, &ct), 0);
TEST_ASSERT_EQUAL_INT(0, cose_sign_decode(&verify, out, len));
/* Test correct signature with correct signer */
TEST_ASSERT_EQUAL_INT(cose_sign_verify(&verify, &signer, 0, vbuf,
sizeof(vbuf), &ct), 0);
TEST_ASSERT(cose_sign_verify(&verify, &signer, 1, vbuf,
sizeof(vbuf), &ct) != 0);
TEST_ASSERT(cose_sign_verify(&verify, &signer2, 0, vbuf,
sizeof(vbuf), &ct) != 0);
TEST_ASSERT_EQUAL_INT(cose_sign_verify(&verify, &signer2, 1, vbuf,
sizeof(vbuf), &ct), 0);
cose_signature_dec_t vsignature;
cose_sign_signature_iter_init(&vsignature);
TEST_ASSERT(cose_sign_signature_iter(&verify, &vsignature));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
TEST_ASSERT_EQUAL_INT(0,
cose_sign_verify(&verify, &vsignature, &signer2, vbuf,
sizeof(vbuf)));
TEST_ASSERT(cose_sign_signature_iter(&verify, &vsignature));
TEST_ASSERT_EQUAL_INT(0,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer2, vbuf,
sizeof(vbuf)));
/* Modify payload */
((uint8_t *)(verify.payload))[0]++;
cose_sign_signature_iter_init(&vsignature);
TEST_ASSERT(cose_sign_signature_iter(&verify, &vsignature));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer2, vbuf,
sizeof(vbuf)));
TEST_ASSERT(cose_sign_signature_iter(&verify, &vsignature));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer1, vbuf,
sizeof(vbuf)));
TEST_ASSERT_EQUAL_INT(-2,
cose_sign_verify(&verify, &vsignature, &signer2, vbuf,
sizeof(vbuf)));
}
/* Untagged 1 encrypt test with chacha20poly1305*/
static void test_libcose_03(void)
{
cose_key_init(&symm);
cose_encrypt_init(&test_encrypt);
cose_encrypt_init(&test_decrypt);
cose_encrypt_init(&test_encrypt, 0);
cose_crypto_keygen(symmkey, sizeof(symmkey), COSE_ALGO_CHACHA20POLY1305);
cose_key_set_kid(&symm, (uint8_t *)kid, sizeof(kid) - 1);
cose_key_set_keys(&symm, 0, COSE_ALGO_CHACHA20POLY1305,
NULL, NULL, symmkey);
cose_key_set_keys(&symm, 0, COSE_ALGO_CHACHA20POLY1305, NULL, NULL,
symmkey);
cose_encrypt_add_recipient(&test_encrypt, &symm);
cose_encrypt_set_payload(&test_encrypt, payload, sizeof(payload) - 1);
cose_encrypt_set_algo(&test_encrypt, COSE_ALGO_DIRECT);
cose_encrypt_set_payload(&test_encrypt, payload, sizeof(payload) - 1);
uint8_t *out = NULL;
ssize_t len = cose_encrypt_encode(&test_encrypt, buf, sizeof(buf), nonce, &out, &ct);
ssize_t len = cose_encrypt_encode(&test_encrypt, buf, sizeof(buf), nonce,
&out);
TEST_ASSERT(len > 0);
TEST_ASSERT_EQUAL_INT(cose_encrypt_decode(&test_decrypt, out, len, &ct), 0);
TEST_ASSERT_EQUAL_INT(0, cose_encrypt_decode(&test_decrypt, out, len));
size_t plaintext_len = 0;
int res = cose_encrypt_decrypt(&test_decrypt, &symm, 0, buf, sizeof(buf), vbuf,
&plaintext_len, &ct);
TEST_ASSERT_EQUAL_INT(res, 0);
TEST_ASSERT_EQUAL_INT(plaintext_len, sizeof(payload) - 1);
cose_encrypt_recp_iter(&test_decrypt, &test_derecp);
TEST_ASSERT_EQUAL_INT(0,
cose_encrypt_decrypt(&test_decrypt, &test_derecp,
&symm, buf, sizeof(buf),
vbuf, &plaintext_len));
TEST_ASSERT_EQUAL_INT( sizeof(payload) - 1, plaintext_len);
}
Test *tests_libcose(void)