xref: /nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/ble_sm_test.c (revision 042d53a763ad75cb1465103098bb88c245d95138)
1*042d53a7SEvalZero /*
2*042d53a7SEvalZero  * Licensed to the Apache Software Foundation (ASF) under one
3*042d53a7SEvalZero  * or more contributor license agreements.  See the NOTICE file
4*042d53a7SEvalZero  * distributed with this work for additional information
5*042d53a7SEvalZero  * regarding copyright ownership.  The ASF licenses this file
6*042d53a7SEvalZero  * to you under the Apache License, Version 2.0 (the
7*042d53a7SEvalZero  * "License"); you may not use this file except in compliance
8*042d53a7SEvalZero  * with the License.  You may obtain a copy of the License at
9*042d53a7SEvalZero  *
10*042d53a7SEvalZero  *  http://www.apache.org/licenses/LICENSE-2.0
11*042d53a7SEvalZero  *
12*042d53a7SEvalZero  * Unless required by applicable law or agreed to in writing,
13*042d53a7SEvalZero  * software distributed under the License is distributed on an
14*042d53a7SEvalZero  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15*042d53a7SEvalZero  * KIND, either express or implied.  See the License for the
16*042d53a7SEvalZero  * specific language governing permissions and limitations
17*042d53a7SEvalZero  * under the License.
18*042d53a7SEvalZero  */
19*042d53a7SEvalZero 
20*042d53a7SEvalZero #include <stddef.h>
21*042d53a7SEvalZero #include <string.h>
22*042d53a7SEvalZero #include <errno.h>
23*042d53a7SEvalZero #include "testutil/testutil.h"
24*042d53a7SEvalZero #include "nimble/hci_common.h"
25*042d53a7SEvalZero #include "nimble/nimble_opt.h"
26*042d53a7SEvalZero #include "host/ble_sm.h"
27*042d53a7SEvalZero #include "host/ble_hs_test.h"
28*042d53a7SEvalZero #include "ble_hs_test_util.h"
29*042d53a7SEvalZero #include "ble_sm_test_util.h"
30*042d53a7SEvalZero 
31*042d53a7SEvalZero #if NIMBLE_BLE_SM
32*042d53a7SEvalZero 
33*042d53a7SEvalZero /*****************************************************************************
34*042d53a7SEvalZero  * $misc                                                                     *
35*042d53a7SEvalZero  *****************************************************************************/
36*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_f4)37*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_f4)
38*042d53a7SEvalZero {
39*042d53a7SEvalZero 	uint8_t u[32] = { 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc,
40*042d53a7SEvalZero 			  0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef,
41*042d53a7SEvalZero 			  0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
42*042d53a7SEvalZero 			  0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20 };
43*042d53a7SEvalZero 	uint8_t v[32] = { 0xfd, 0xc5, 0x7f, 0xf4, 0x49, 0xdd, 0x4f, 0x6b,
44*042d53a7SEvalZero 			  0xfb, 0x7c, 0x9d, 0xf1, 0xc2, 0x9a, 0xcb, 0x59,
45*042d53a7SEvalZero 			  0x2a, 0xe7, 0xd4, 0xee, 0xfb, 0xfc, 0x0a, 0x90,
46*042d53a7SEvalZero 			  0x9a, 0xbb, 0xf6, 0x32, 0x3d, 0x8b, 0x18, 0x55 };
47*042d53a7SEvalZero 	uint8_t x[16] = { 0xab, 0xae, 0x2b, 0x71, 0xec, 0xb2, 0xff, 0xff,
48*042d53a7SEvalZero 			  0x3e, 0x73, 0x77, 0xd1, 0x54, 0x84, 0xcb, 0xd5 };
49*042d53a7SEvalZero 	uint8_t z = 0x00;
50*042d53a7SEvalZero 	uint8_t exp[16] = { 0x2d, 0x87, 0x74, 0xa9, 0xbe, 0xa1, 0xed, 0xf1,
51*042d53a7SEvalZero 			    0x1c, 0xbd, 0xa9, 0x07, 0xf1, 0x16, 0xc9, 0xf2 };
52*042d53a7SEvalZero 	uint8_t res[16];
53*042d53a7SEvalZero 	int err;
54*042d53a7SEvalZero 
55*042d53a7SEvalZero 	err = ble_sm_alg_f4(u, v, x, z, res);
56*042d53a7SEvalZero 	TEST_ASSERT_FATAL(err == 0);
57*042d53a7SEvalZero     TEST_ASSERT(memcmp(res, exp, 16) == 0);
58*042d53a7SEvalZero }
59*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_f5)60*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_f5)
61*042d53a7SEvalZero {
62*042d53a7SEvalZero 	uint8_t w[32] = { 0x98, 0xa6, 0xbf, 0x73, 0xf3, 0x34, 0x8d, 0x86,
63*042d53a7SEvalZero 			  0xf1, 0x66, 0xf8, 0xb4, 0x13, 0x6b, 0x79, 0x99,
64*042d53a7SEvalZero 			  0x9b, 0x7d, 0x39, 0x0a, 0xa6, 0x10, 0x10, 0x34,
65*042d53a7SEvalZero 			  0x05, 0xad, 0xc8, 0x57, 0xa3, 0x34, 0x02, 0xec };
66*042d53a7SEvalZero 	uint8_t n1[16] = { 0xab, 0xae, 0x2b, 0x71, 0xec, 0xb2, 0xff, 0xff,
67*042d53a7SEvalZero 			   0x3e, 0x73, 0x77, 0xd1, 0x54, 0x84, 0xcb, 0xd5 };
68*042d53a7SEvalZero 	uint8_t n2[16] = { 0xcf, 0xc4, 0x3d, 0xff, 0xf7, 0x83, 0x65, 0x21,
69*042d53a7SEvalZero 			   0x6e, 0x5f, 0xa7, 0x25, 0xcc, 0xe7, 0xe8, 0xa6 };
70*042d53a7SEvalZero     uint8_t a1t = 0x00;
71*042d53a7SEvalZero 	uint8_t a1[6] = { 0xce, 0xbf, 0x37, 0x37, 0x12, 0x56 };
72*042d53a7SEvalZero     uint8_t a2t = 0x00;
73*042d53a7SEvalZero     uint8_t a2[6] = { 0xc1, 0xcf, 0x2d, 0x70, 0x13, 0xa7 };
74*042d53a7SEvalZero 	uint8_t exp_ltk[16] = { 0x38, 0x0a, 0x75, 0x94, 0xb5, 0x22, 0x05,
75*042d53a7SEvalZero 				0x98, 0x23, 0xcd, 0xd7, 0x69, 0x11, 0x79,
76*042d53a7SEvalZero 				0x86, 0x69 };
77*042d53a7SEvalZero 	uint8_t exp_mackey[16] = { 0x20, 0x6e, 0x63, 0xce, 0x20, 0x6a, 0x3f,
78*042d53a7SEvalZero 				   0xfd, 0x02, 0x4a, 0x08, 0xa1, 0x76, 0xf1,
79*042d53a7SEvalZero 				   0x65, 0x29 };
80*042d53a7SEvalZero 	uint8_t mackey[16], ltk[16];
81*042d53a7SEvalZero 	int err;
82*042d53a7SEvalZero 
83*042d53a7SEvalZero 	err = ble_sm_alg_f5(w, n1, n2, a1t, a1, a2t, a2, mackey, ltk);
84*042d53a7SEvalZero 	TEST_ASSERT_FATAL(err == 0);
85*042d53a7SEvalZero     TEST_ASSERT(memcmp(mackey, exp_mackey, 16) == 0);
86*042d53a7SEvalZero     TEST_ASSERT(memcmp(ltk, exp_ltk, 16) == 0);
87*042d53a7SEvalZero }
88*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_f6)89*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_f6)
90*042d53a7SEvalZero {
91*042d53a7SEvalZero 	uint8_t w[16] = { 0x20, 0x6e, 0x63, 0xce, 0x20, 0x6a, 0x3f, 0xfd,
92*042d53a7SEvalZero 			  0x02, 0x4a, 0x08, 0xa1, 0x76, 0xf1, 0x65, 0x29 };
93*042d53a7SEvalZero 	uint8_t n1[16] = { 0xab, 0xae, 0x2b, 0x71, 0xec, 0xb2, 0xff, 0xff,
94*042d53a7SEvalZero 			   0x3e, 0x73, 0x77, 0xd1, 0x54, 0x84, 0xcb, 0xd5 };
95*042d53a7SEvalZero 	uint8_t n2[16] = { 0xcf, 0xc4, 0x3d, 0xff, 0xf7, 0x83, 0x65, 0x21,
96*042d53a7SEvalZero 			   0x6e, 0x5f, 0xa7, 0x25, 0xcc, 0xe7, 0xe8, 0xa6 };
97*042d53a7SEvalZero 	uint8_t r[16] = { 0xc8, 0x0f, 0x2d, 0x0c, 0xd2, 0x42, 0xda, 0x08,
98*042d53a7SEvalZero 			  0x54, 0xbb, 0x53, 0xb4, 0x3b, 0x34, 0xa3, 0x12 };
99*042d53a7SEvalZero 	uint8_t io_cap[3] = { 0x02, 0x01, 0x01 };
100*042d53a7SEvalZero     uint8_t a1t = 0x00;
101*042d53a7SEvalZero 	uint8_t a1[6] = { 0xce, 0xbf, 0x37, 0x37, 0x12, 0x56 };
102*042d53a7SEvalZero     uint8_t a2t = 0x00;
103*042d53a7SEvalZero     uint8_t a2[6] = { 0xc1, 0xcf, 0x2d, 0x70, 0x13, 0xa7 };
104*042d53a7SEvalZero 	uint8_t exp[16] = { 0x61, 0x8f, 0x95, 0xda, 0x09, 0x0b, 0x6c, 0xd2,
105*042d53a7SEvalZero 			    0xc5, 0xe8, 0xd0, 0x9c, 0x98, 0x73, 0xc4, 0xe3 };
106*042d53a7SEvalZero 	uint8_t res[16];
107*042d53a7SEvalZero 	int err;
108*042d53a7SEvalZero 
109*042d53a7SEvalZero 	err = ble_sm_alg_f6(w, n1, n2, r, io_cap, a1t, a1, a2t, a2, res);
110*042d53a7SEvalZero 	TEST_ASSERT_FATAL(err == 0);
111*042d53a7SEvalZero     TEST_ASSERT(memcmp(res, exp, 16) == 0);
112*042d53a7SEvalZero }
113*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_g2)114*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_g2)
115*042d53a7SEvalZero {
116*042d53a7SEvalZero 	uint8_t u[32] = { 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc,
117*042d53a7SEvalZero 			  0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef,
118*042d53a7SEvalZero 			  0xb9, 0xa5, 0xf9, 0xe9, 0xa7, 0x83, 0x2c, 0x5e,
119*042d53a7SEvalZero 			  0x2c, 0xbe, 0x97, 0xf2, 0xd2, 0x03, 0xb0, 0x20 };
120*042d53a7SEvalZero 	uint8_t v[32] = { 0xfd, 0xc5, 0x7f, 0xf4, 0x49, 0xdd, 0x4f, 0x6b,
121*042d53a7SEvalZero 			  0xfb, 0x7c, 0x9d, 0xf1, 0xc2, 0x9a, 0xcb, 0x59,
122*042d53a7SEvalZero 			  0x2a, 0xe7, 0xd4, 0xee, 0xfb, 0xfc, 0x0a, 0x90,
123*042d53a7SEvalZero 			  0x9a, 0xbb, 0xf6, 0x32, 0x3d, 0x8b, 0x18, 0x55 };
124*042d53a7SEvalZero 	uint8_t x[16] = { 0xab, 0xae, 0x2b, 0x71, 0xec, 0xb2, 0xff, 0xff,
125*042d53a7SEvalZero 			  0x3e, 0x73, 0x77, 0xd1, 0x54, 0x84, 0xcb, 0xd5 };
126*042d53a7SEvalZero 	uint8_t y[16] = { 0xcf, 0xc4, 0x3d, 0xff, 0xf7, 0x83, 0x65, 0x21,
127*042d53a7SEvalZero 			  0x6e, 0x5f, 0xa7, 0x25, 0xcc, 0xe7, 0xe8, 0xa6 };
128*042d53a7SEvalZero 	uint32_t exp_val = 0x2f9ed5ba % 1000000;
129*042d53a7SEvalZero 	uint32_t val;
130*042d53a7SEvalZero 	int err;
131*042d53a7SEvalZero 
132*042d53a7SEvalZero 	err = ble_sm_alg_g2(u, v, x, y, &val);
133*042d53a7SEvalZero 	TEST_ASSERT_FATAL(err == 0);
134*042d53a7SEvalZero 	TEST_ASSERT(val == exp_val);
135*042d53a7SEvalZero }
136*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_conn_broken)137*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_conn_broken)
138*042d53a7SEvalZero {
139*042d53a7SEvalZero     struct hci_disconn_complete disconn_evt;
140*042d53a7SEvalZero     int rc;
141*042d53a7SEvalZero 
142*042d53a7SEvalZero     ble_sm_test_util_init();
143*042d53a7SEvalZero 
144*042d53a7SEvalZero     ble_sm_dbg_set_next_pair_rand(((uint8_t[16]){0}));
145*042d53a7SEvalZero 
146*042d53a7SEvalZero     ble_hs_test_util_create_conn(2, ((uint8_t[6]){1,2,3,5,6,7}),
147*042d53a7SEvalZero                                  ble_sm_test_util_conn_cb, NULL);
148*042d53a7SEvalZero 
149*042d53a7SEvalZero     /* Initiate the pairing procedure. */
150*042d53a7SEvalZero     rc = ble_hs_test_util_security_initiate(2, 0);
151*042d53a7SEvalZero     TEST_ASSERT_FATAL(rc == 0);
152*042d53a7SEvalZero     TEST_ASSERT(ble_sm_num_procs() == 1);
153*042d53a7SEvalZero     ble_sm_test_util_io_inject_bad(2, BLE_SM_IOACT_NONE);
154*042d53a7SEvalZero 
155*042d53a7SEvalZero     /* Terminate the connection. */
156*042d53a7SEvalZero     disconn_evt.connection_handle = 2;
157*042d53a7SEvalZero     disconn_evt.status = 0;
158*042d53a7SEvalZero     disconn_evt.reason = BLE_ERR_REM_USER_CONN_TERM;
159*042d53a7SEvalZero     ble_gap_rx_disconn_complete(&disconn_evt);
160*042d53a7SEvalZero 
161*042d53a7SEvalZero     /* Verify security callback got called. */
162*042d53a7SEvalZero     TEST_ASSERT(ble_sm_test_gap_status == BLE_HS_ENOTCONN);
163*042d53a7SEvalZero     TEST_ASSERT(!ble_sm_test_sec_state.encrypted);
164*042d53a7SEvalZero     TEST_ASSERT(!ble_sm_test_sec_state.authenticated);
165*042d53a7SEvalZero }
166*042d53a7SEvalZero 
167*042d53a7SEvalZero /*****************************************************************************
168*042d53a7SEvalZero  * $peer                                                                     *
169*042d53a7SEvalZero  *****************************************************************************/
170*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_peer_fail_inval)171*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_peer_fail_inval)
172*042d53a7SEvalZero {
173*042d53a7SEvalZero     /* Invalid role detected before other arguments. */
174*042d53a7SEvalZero     ble_sm_test_util_peer_fail_inval(
175*042d53a7SEvalZero         1,
176*042d53a7SEvalZero         ((uint8_t[]){0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c}),
177*042d53a7SEvalZero         ((uint8_t[]){0x03, 0x02, 0x01, 0x50, 0x13, 0x00}),
178*042d53a7SEvalZero         ((struct ble_sm_pair_cmd[1]) { {
179*042d53a7SEvalZero             .io_cap = 0x14,
180*042d53a7SEvalZero             .oob_data_flag = 0,
181*042d53a7SEvalZero             .authreq = 0x12,
182*042d53a7SEvalZero             .max_enc_key_size = 20,
183*042d53a7SEvalZero             .init_key_dist = 0x0b,
184*042d53a7SEvalZero             .resp_key_dist = 0x11,
185*042d53a7SEvalZero         } }),
186*042d53a7SEvalZero         ((struct ble_sm_pair_fail[1]) { {
187*042d53a7SEvalZero             .reason = BLE_SM_ERR_CMD_NOT_SUPP,
188*042d53a7SEvalZero         } })
189*042d53a7SEvalZero     );
190*042d53a7SEvalZero 
191*042d53a7SEvalZero     /* Invalid key size - too small. */
192*042d53a7SEvalZero     ble_sm_test_util_peer_fail_inval(
193*042d53a7SEvalZero         0,
194*042d53a7SEvalZero         ((uint8_t[]){0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c}),
195*042d53a7SEvalZero         ((uint8_t[]){0x03, 0x02, 0x01, 0x50, 0x13, 0x00}),
196*042d53a7SEvalZero         ((struct ble_sm_pair_cmd[1]) { {
197*042d53a7SEvalZero             .io_cap = 0x04,
198*042d53a7SEvalZero             .oob_data_flag = 0,
199*042d53a7SEvalZero             .authreq = 0x5,
200*042d53a7SEvalZero             .max_enc_key_size = 6,
201*042d53a7SEvalZero             .init_key_dist = 0x07,
202*042d53a7SEvalZero             .resp_key_dist = 0x07,
203*042d53a7SEvalZero         } }),
204*042d53a7SEvalZero         ((struct ble_sm_pair_fail[1]) { {
205*042d53a7SEvalZero             .reason = BLE_SM_ERR_ENC_KEY_SZ,
206*042d53a7SEvalZero         } })
207*042d53a7SEvalZero     );
208*042d53a7SEvalZero 
209*042d53a7SEvalZero     /* Invalid key size - too large. */
210*042d53a7SEvalZero     ble_sm_test_util_peer_fail_inval(
211*042d53a7SEvalZero         0,
212*042d53a7SEvalZero         ((uint8_t[]){0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c}),
213*042d53a7SEvalZero         ((uint8_t[]){0x03, 0x02, 0x01, 0x50, 0x13, 0x00}),
214*042d53a7SEvalZero         ((struct ble_sm_pair_cmd[1]) { {
215*042d53a7SEvalZero             .io_cap = 0x04,
216*042d53a7SEvalZero             .oob_data_flag = 0,
217*042d53a7SEvalZero             .authreq = 0x5,
218*042d53a7SEvalZero             .max_enc_key_size = 17,
219*042d53a7SEvalZero             .init_key_dist = 0x07,
220*042d53a7SEvalZero             .resp_key_dist = 0x07,
221*042d53a7SEvalZero         } }),
222*042d53a7SEvalZero         ((struct ble_sm_pair_fail[1]) { {
223*042d53a7SEvalZero             .reason = BLE_SM_ERR_INVAL,
224*042d53a7SEvalZero         } })
225*042d53a7SEvalZero     );
226*042d53a7SEvalZero }
227*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_peer_lgcy_fail_confirm)228*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_peer_lgcy_fail_confirm)
229*042d53a7SEvalZero {
230*042d53a7SEvalZero     ble_sm_test_util_peer_lgcy_fail_confirm(
231*042d53a7SEvalZero         ((uint8_t[]){0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c}),
232*042d53a7SEvalZero         ((uint8_t[]){0x03, 0x02, 0x01, 0x50, 0x13, 0x00}),
233*042d53a7SEvalZero         ((struct ble_sm_pair_cmd[1]) { {
234*042d53a7SEvalZero             .io_cap = 0x04,
235*042d53a7SEvalZero             .oob_data_flag = 0,
236*042d53a7SEvalZero             .authreq = 0x05,
237*042d53a7SEvalZero             .max_enc_key_size = 16,
238*042d53a7SEvalZero             .init_key_dist = 0x07,
239*042d53a7SEvalZero             .resp_key_dist = 0x07,
240*042d53a7SEvalZero         } }),
241*042d53a7SEvalZero         ((struct ble_sm_pair_cmd[1]) { {
242*042d53a7SEvalZero             .io_cap = 3,
243*042d53a7SEvalZero             .oob_data_flag = 0,
244*042d53a7SEvalZero             .authreq = 0,
245*042d53a7SEvalZero             .max_enc_key_size = 16,
246*042d53a7SEvalZero             .init_key_dist = 0,
247*042d53a7SEvalZero             .resp_key_dist = 0,
248*042d53a7SEvalZero         } }),
249*042d53a7SEvalZero         ((struct ble_sm_pair_confirm[1]) { {
250*042d53a7SEvalZero             .value = {
251*042d53a7SEvalZero                 0x0a, 0xac, 0xa2, 0xae, 0xa6, 0x98, 0xdc, 0x6d,
252*042d53a7SEvalZero                 0x65, 0x84, 0x11, 0x69, 0x47, 0x36, 0x8d, 0xa0,
253*042d53a7SEvalZero             },
254*042d53a7SEvalZero         } }),
255*042d53a7SEvalZero         ((struct ble_sm_pair_confirm[1]) { {
256*042d53a7SEvalZero             .value = {
257*042d53a7SEvalZero                 0x45, 0xd2, 0x2c, 0x38, 0xd8, 0x91, 0x4f, 0x19,
258*042d53a7SEvalZero                 0xa2, 0xd4, 0xfc, 0x7d, 0xad, 0x37, 0x79, 0xe0
259*042d53a7SEvalZero             },
260*042d53a7SEvalZero         } }),
261*042d53a7SEvalZero         ((struct ble_sm_pair_random[1]) { {
262*042d53a7SEvalZero             .value = {
263*042d53a7SEvalZero                 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
264*042d53a7SEvalZero                 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
265*042d53a7SEvalZero             },
266*042d53a7SEvalZero         } }),
267*042d53a7SEvalZero         ((struct ble_sm_pair_random[1]) { {
268*042d53a7SEvalZero             .value = {
269*042d53a7SEvalZero                 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
270*042d53a7SEvalZero                 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
271*042d53a7SEvalZero             },
272*042d53a7SEvalZero         } }),
273*042d53a7SEvalZero         ((struct ble_sm_pair_fail[1]) { {
274*042d53a7SEvalZero             .reason = BLE_SM_ERR_CONFIRM_MISMATCH,
275*042d53a7SEvalZero         } })
276*042d53a7SEvalZero     );
277*042d53a7SEvalZero }
278*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_peer_bonding_bad)279*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_peer_bonding_bad)
280*042d53a7SEvalZero {
281*042d53a7SEvalZero     ble_sm_test_util_peer_bonding_bad(0x5684, 32);
282*042d53a7SEvalZero     ble_sm_test_util_peer_bonding_bad(54325, 65437);
283*042d53a7SEvalZero }
284*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_peer_sec_req_inval)285*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_peer_sec_req_inval)
286*042d53a7SEvalZero {
287*042d53a7SEvalZero     struct ble_sm_pair_fail fail;
288*042d53a7SEvalZero     struct ble_sm_sec_req sec_req;
289*042d53a7SEvalZero     int rc;
290*042d53a7SEvalZero 
291*042d53a7SEvalZero     ble_sm_test_util_init();
292*042d53a7SEvalZero 
293*042d53a7SEvalZero     ble_sm_dbg_set_next_pair_rand(((uint8_t[16]){0}));
294*042d53a7SEvalZero 
295*042d53a7SEvalZero     ble_hs_test_util_create_conn(2, ((uint8_t[6]){1,2,3,5,6,7}),
296*042d53a7SEvalZero                                  ble_sm_test_util_conn_cb,
297*042d53a7SEvalZero                                  NULL);
298*042d53a7SEvalZero 
299*042d53a7SEvalZero     /*** We are the slave; reject the security request. */
300*042d53a7SEvalZero     ble_hs_atomic_conn_set_flags(2, BLE_HS_CONN_F_MASTER, 0);
301*042d53a7SEvalZero 
302*042d53a7SEvalZero     sec_req.authreq = 0;
303*042d53a7SEvalZero     ble_sm_test_util_rx_sec_req(
304*042d53a7SEvalZero         2, &sec_req, BLE_HS_SM_US_ERR(BLE_SM_ERR_CMD_NOT_SUPP));
305*042d53a7SEvalZero 
306*042d53a7SEvalZero     fail.reason = BLE_SM_ERR_CMD_NOT_SUPP;
307*042d53a7SEvalZero     ble_sm_test_util_verify_tx_pair_fail(&fail);
308*042d53a7SEvalZero 
309*042d53a7SEvalZero     /*** Pairing already in progress; ignore security request. */
310*042d53a7SEvalZero     ble_hs_atomic_conn_set_flags(2, BLE_HS_CONN_F_MASTER, 1);
311*042d53a7SEvalZero     rc = ble_sm_pair_initiate(2);
312*042d53a7SEvalZero     TEST_ASSERT_FATAL(rc == 0);
313*042d53a7SEvalZero     ble_hs_test_util_prev_tx_queue_clear();
314*042d53a7SEvalZero 
315*042d53a7SEvalZero     ble_sm_test_util_rx_sec_req(2, &sec_req, BLE_HS_EALREADY);
316*042d53a7SEvalZero     TEST_ASSERT(ble_hs_test_util_prev_tx_queue_sz() == 0);
317*042d53a7SEvalZero }
318*042d53a7SEvalZero 
319*042d53a7SEvalZero /*****************************************************************************
320*042d53a7SEvalZero  * $us                                                                       *
321*042d53a7SEvalZero  *****************************************************************************/
322*042d53a7SEvalZero 
TEST_CASE(ble_sm_test_case_us_fail_inval)323*042d53a7SEvalZero TEST_CASE(ble_sm_test_case_us_fail_inval)
324*042d53a7SEvalZero {
325*042d53a7SEvalZero     struct ble_sm_test_params params;
326*042d53a7SEvalZero 
327*042d53a7SEvalZero     /* Invalid key size - too small. */
328*042d53a7SEvalZero     params = (struct ble_sm_test_params) {
329*042d53a7SEvalZero         .init_id_addr = {0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c},
330*042d53a7SEvalZero         .resp_id_addr = {0x03, 0x02, 0x01, 0x50, 0x13, 0x00},
331*042d53a7SEvalZero         .pair_req = (struct ble_sm_pair_cmd) {
332*042d53a7SEvalZero             .io_cap = 3,
333*042d53a7SEvalZero             .oob_data_flag = 0,
334*042d53a7SEvalZero             .authreq = 0,
335*042d53a7SEvalZero             .max_enc_key_size = 16,
336*042d53a7SEvalZero             .init_key_dist = 0,
337*042d53a7SEvalZero             .resp_key_dist = 0,
338*042d53a7SEvalZero         },
339*042d53a7SEvalZero         .pair_rsp = (struct ble_sm_pair_cmd) {
340*042d53a7SEvalZero             .io_cap = 0x04,
341*042d53a7SEvalZero             .oob_data_flag = 0,
342*042d53a7SEvalZero             .authreq = 0x05,
343*042d53a7SEvalZero             .max_enc_key_size = 6,
344*042d53a7SEvalZero             .init_key_dist = 0x07,
345*042d53a7SEvalZero             .resp_key_dist = 0x07,
346*042d53a7SEvalZero         },
347*042d53a7SEvalZero         .pair_fail = (struct ble_sm_pair_fail) {
348*042d53a7SEvalZero             .reason = BLE_SM_ERR_ENC_KEY_SZ,
349*042d53a7SEvalZero         },
350*042d53a7SEvalZero     };
351*042d53a7SEvalZero     ble_sm_test_util_us_fail_inval(&params);
352*042d53a7SEvalZero 
353*042d53a7SEvalZero     /* Invalid key size - too large. */
354*042d53a7SEvalZero     params = (struct ble_sm_test_params) {
355*042d53a7SEvalZero         .init_id_addr = {0xe1, 0xfc, 0xda, 0xf4, 0xb7, 0x6c},
356*042d53a7SEvalZero         .resp_id_addr = {0x03, 0x02, 0x01, 0x50, 0x13, 0x00},
357*042d53a7SEvalZero         .pair_req = (struct ble_sm_pair_cmd) {
358*042d53a7SEvalZero             .io_cap = 3,
359*042d53a7SEvalZero             .oob_data_flag = 0,
360*042d53a7SEvalZero             .authreq = 0,
361*042d53a7SEvalZero             .max_enc_key_size = 16,
362*042d53a7SEvalZero             .init_key_dist = 0,
363*042d53a7SEvalZero             .resp_key_dist = 0,
364*042d53a7SEvalZero         },
365*042d53a7SEvalZero         .pair_rsp = (struct ble_sm_pair_cmd) {
366*042d53a7SEvalZero             .io_cap = 0x04,
367*042d53a7SEvalZero             .oob_data_flag = 0,
368*042d53a7SEvalZero             .authreq = 0x05,
369*042d53a7SEvalZero             .max_enc_key_size = 17,
370*042d53a7SEvalZero             .init_key_dist = 0x07,
371*042d53a7SEvalZero             .resp_key_dist = 0x07,
372*042d53a7SEvalZero         },
373*042d53a7SEvalZero         .pair_fail = (struct ble_sm_pair_fail) {
374*042d53a7SEvalZero             .reason = BLE_SM_ERR_INVAL,
375*042d53a7SEvalZero         },
376*042d53a7SEvalZero     };
377*042d53a7SEvalZero     ble_sm_test_util_us_fail_inval(&params);
378*042d53a7SEvalZero }
379*042d53a7SEvalZero 
TEST_SUITE(ble_sm_gen_test_suite)380*042d53a7SEvalZero TEST_SUITE(ble_sm_gen_test_suite)
381*042d53a7SEvalZero {
382*042d53a7SEvalZero     tu_suite_set_post_test_cb(ble_hs_test_util_post_test, NULL);
383*042d53a7SEvalZero 
384*042d53a7SEvalZero     ble_sm_test_case_f4();
385*042d53a7SEvalZero     ble_sm_test_case_f5();
386*042d53a7SEvalZero     ble_sm_test_case_f6();
387*042d53a7SEvalZero     ble_sm_test_case_g2();
388*042d53a7SEvalZero 
389*042d53a7SEvalZero     ble_sm_test_case_peer_fail_inval();
390*042d53a7SEvalZero     ble_sm_test_case_peer_lgcy_fail_confirm();
391*042d53a7SEvalZero     ble_sm_test_case_us_fail_inval();
392*042d53a7SEvalZero     ble_sm_test_case_peer_bonding_bad();
393*042d53a7SEvalZero     ble_sm_test_case_conn_broken();
394*042d53a7SEvalZero     ble_sm_test_case_peer_sec_req_inval();
395*042d53a7SEvalZero }
396*042d53a7SEvalZero #endif
397*042d53a7SEvalZero 
398*042d53a7SEvalZero int
ble_sm_test_all(void)399*042d53a7SEvalZero ble_sm_test_all(void)
400*042d53a7SEvalZero {
401*042d53a7SEvalZero #if !NIMBLE_BLE_SM
402*042d53a7SEvalZero     return 0;
403*042d53a7SEvalZero #else
404*042d53a7SEvalZero     ble_sm_gen_test_suite();
405*042d53a7SEvalZero     ble_sm_lgcy_test_suite();
406*042d53a7SEvalZero     ble_sm_sc_test_suite();
407*042d53a7SEvalZero 
408*042d53a7SEvalZero     return tu_any_failed;
409*042d53a7SEvalZero #endif
410*042d53a7SEvalZero }
411