mirror of https://github.com/ARMmbed/mbed-os.git
179 lines
5.4 KiB
C++
179 lines
5.4 KiB
C++
/*
|
|
* Copyright (c) 2018, Arm Limited and affiliates
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "gtest/gtest.h"
|
|
#include "LoRaMacCrypto.h"
|
|
|
|
#include "cipher_stub.h"
|
|
#include "cmac_stub.h"
|
|
#include "aes_stub.h"
|
|
|
|
class Test_LoRaMacCrypto : public testing::Test {
|
|
protected:
|
|
LoRaMacCrypto *object;
|
|
|
|
virtual void SetUp()
|
|
{
|
|
cipher_stub.info_value = NULL;
|
|
cipher_stub.int_zero_counter = 0;
|
|
cipher_stub.int_value = 0;
|
|
cmac_stub.int_zero_counter = 0;
|
|
cmac_stub.int_value = 0;
|
|
aes_stub.int_zero_counter = 0;
|
|
aes_stub.int_value = 0;
|
|
object = new LoRaMacCrypto();
|
|
}
|
|
|
|
virtual void TearDown()
|
|
{
|
|
delete object;
|
|
}
|
|
};
|
|
|
|
TEST_F(Test_LoRaMacCrypto, constructor)
|
|
{
|
|
EXPECT_TRUE(object);
|
|
LoRaMacCrypto obj;
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, compute_mic)
|
|
{
|
|
EXPECT_TRUE(MBEDTLS_ERR_CIPHER_ALLOC_FAILED == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
mbedtls_cipher_info_t info;
|
|
cipher_stub.info_value = &info;
|
|
cipher_stub.int_zero_counter = 0;
|
|
cipher_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
cipher_stub.int_value = 0;
|
|
cmac_stub.int_zero_counter = 0;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 1;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 2;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 3;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
uint32_t mic[16];
|
|
cmac_stub.int_zero_counter = 3;
|
|
cmac_stub.int_value = 0;
|
|
EXPECT_TRUE(0 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, mic));
|
|
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, encrypt_payload)
|
|
{
|
|
aes_stub.int_zero_counter = 0;
|
|
aes_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->encrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
|
|
aes_stub.int_zero_counter = 1;
|
|
aes_stub.int_value = -2;
|
|
uint8_t buf[60];
|
|
uint8_t enc[60];
|
|
EXPECT_TRUE(-2 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));
|
|
|
|
aes_stub.int_zero_counter = 2;
|
|
aes_stub.int_value = -3;
|
|
EXPECT_TRUE(-3 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));
|
|
|
|
aes_stub.int_value = 0;
|
|
EXPECT_TRUE(0 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));
|
|
|
|
EXPECT_TRUE(0 == object->encrypt_payload(buf, 60, NULL, 0, 0, 0, 0, enc));
|
|
|
|
aes_stub.int_zero_counter = 0;
|
|
EXPECT_TRUE(0 == object->encrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, decrypt_payload)
|
|
{
|
|
EXPECT_TRUE(0 == object->decrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, compute_join_frame_mic)
|
|
{
|
|
uint32_t mic[16];
|
|
EXPECT_TRUE(MBEDTLS_ERR_CIPHER_ALLOC_FAILED == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
|
|
mbedtls_cipher_info_t info;
|
|
cipher_stub.info_value = &info;
|
|
cipher_stub.int_zero_counter = 0;
|
|
cipher_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
|
|
|
|
cipher_stub.int_value = 0;
|
|
cmac_stub.int_zero_counter = 0;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 1;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 2;
|
|
cmac_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
|
|
|
|
cmac_stub.int_zero_counter = 3;
|
|
cmac_stub.int_value = 0;
|
|
EXPECT_TRUE(0 == object->compute_join_frame_mic(NULL, 0, NULL, 0, mic));
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, decrypt_join_frame)
|
|
{
|
|
aes_stub.int_zero_counter = 0;
|
|
aes_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->decrypt_join_frame(NULL, 0, NULL, 0, NULL));
|
|
|
|
aes_stub.int_zero_counter = 1;
|
|
aes_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->decrypt_join_frame(NULL, 0, NULL, 0, NULL));
|
|
|
|
aes_stub.int_value = 0;
|
|
uint8_t buf[60];
|
|
uint8_t enc[60];
|
|
EXPECT_TRUE(0 == object->decrypt_join_frame(buf, 60, NULL, 0, enc));
|
|
}
|
|
|
|
TEST_F(Test_LoRaMacCrypto, compute_skeys_for_join_frame)
|
|
{
|
|
uint8_t nwk_key[16];
|
|
uint8_t app_key[16];
|
|
uint8_t nonce[16];
|
|
|
|
aes_stub.int_zero_counter = 0;
|
|
aes_stub.int_value = -1;
|
|
EXPECT_TRUE(-1 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));
|
|
|
|
aes_stub.int_zero_counter = 1;
|
|
aes_stub.int_value = -2;
|
|
EXPECT_TRUE(-2 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));
|
|
|
|
aes_stub.int_zero_counter = 0;
|
|
aes_stub.int_value = 0;
|
|
EXPECT_TRUE(0 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));
|
|
}
|