Newer
Older
mbed-os / connectivity / lorawan / tests / UNITTESTS / features / lorawan / loramaccrypto / Test_LoRaMacCrypto.cpp
/*
 * Copyright (c) 2018, Arm Limited and affiliates
 * SPDX-License-Identifier: Apache-2.0
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include "gtest/gtest.h"
#include "LoRaMacCrypto.h"

#include "cipher_stub.h"
#include "cmac_stub.h"
#include "aes_stub.h"

class Test_LoRaMacCrypto : public testing::Test {
protected:
    LoRaMacCrypto *object;

    virtual void SetUp()
    {
        cipher_stub.info_value = NULL;
        cipher_stub.int_zero_counter = 0;
        cipher_stub.int_value = 0;
        cmac_stub.int_zero_counter = 0;
        cmac_stub.int_value = 0;
        aes_stub.int_zero_counter = 0;
        aes_stub.int_value = 0;
        object = new LoRaMacCrypto();
    }

    virtual void TearDown()
    {
        delete object;
    }
};

TEST_F(Test_LoRaMacCrypto, constructor)
{
    EXPECT_TRUE(object);
    LoRaMacCrypto obj;
}

TEST_F(Test_LoRaMacCrypto, compute_mic)
{
    EXPECT_TRUE(MBEDTLS_ERR_CIPHER_ALLOC_FAILED == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    mbedtls_cipher_info_t info;
    cipher_stub.info_value = &info;
    cipher_stub.int_zero_counter = 0;
    cipher_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    cipher_stub.int_value = 0;
    cmac_stub.int_zero_counter = 0;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    cmac_stub.int_zero_counter = 1;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    cmac_stub.int_zero_counter = 2;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    cmac_stub.int_zero_counter = 3;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    uint32_t mic[16];
    cmac_stub.int_zero_counter = 3;
    cmac_stub.int_value = 0;
    EXPECT_TRUE(0 == object->compute_mic(NULL, 0, NULL, 0, 0, 0, 0, mic));

}

TEST_F(Test_LoRaMacCrypto, encrypt_payload)
{
    aes_stub.int_zero_counter = 0;
    aes_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->encrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));

    aes_stub.int_zero_counter = 1;
    aes_stub.int_value = -2;
    uint8_t buf[60];
    uint8_t enc[60];
    EXPECT_TRUE(-2 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));

    aes_stub.int_zero_counter = 2;
    aes_stub.int_value = -3;
    EXPECT_TRUE(-3 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));

    aes_stub.int_value = 0;
    EXPECT_TRUE(0 == object->encrypt_payload(buf, 20, NULL, 0, 0, 0, 0, enc));

    EXPECT_TRUE(0 == object->encrypt_payload(buf, 60, NULL, 0, 0, 0, 0, enc));

    aes_stub.int_zero_counter = 0;
    EXPECT_TRUE(0 == object->encrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));
}

TEST_F(Test_LoRaMacCrypto, decrypt_payload)
{
    EXPECT_TRUE(0 == object->decrypt_payload(NULL, 0, NULL, 0, 0, 0, 0, NULL));
}

TEST_F(Test_LoRaMacCrypto, compute_join_frame_mic)
{
    uint32_t mic[16];
    EXPECT_TRUE(MBEDTLS_ERR_CIPHER_ALLOC_FAILED == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));
    mbedtls_cipher_info_t info;
    cipher_stub.info_value = &info;
    cipher_stub.int_zero_counter = 0;
    cipher_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));

    cipher_stub.int_value = 0;
    cmac_stub.int_zero_counter = 0;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));

    cmac_stub.int_zero_counter = 1;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));

    cmac_stub.int_zero_counter = 2;
    cmac_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_join_frame_mic(NULL, 0, NULL, 0, NULL));

    cmac_stub.int_zero_counter = 3;
    cmac_stub.int_value = 0;
    EXPECT_TRUE(0 == object->compute_join_frame_mic(NULL, 0, NULL, 0, mic));
}

TEST_F(Test_LoRaMacCrypto, decrypt_join_frame)
{
    aes_stub.int_zero_counter = 0;
    aes_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->decrypt_join_frame(NULL, 0, NULL, 0, NULL));

    aes_stub.int_zero_counter = 1;
    aes_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->decrypt_join_frame(NULL, 0, NULL, 0, NULL));

    aes_stub.int_value = 0;
    uint8_t buf[60];
    uint8_t enc[60];
    EXPECT_TRUE(0 == object->decrypt_join_frame(buf, 60, NULL, 0, enc));
}

TEST_F(Test_LoRaMacCrypto, compute_skeys_for_join_frame)
{
    uint8_t nwk_key[16];
    uint8_t app_key[16];
    uint8_t nonce[16];

    aes_stub.int_zero_counter = 0;
    aes_stub.int_value = -1;
    EXPECT_TRUE(-1 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));

    aes_stub.int_zero_counter = 1;
    aes_stub.int_value = -2;
    EXPECT_TRUE(-2 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));

    aes_stub.int_zero_counter = 0;
    aes_stub.int_value = 0;
    EXPECT_TRUE(0 == object->compute_skeys_for_join_frame(NULL, 0, nonce, 0, nwk_key, app_key));
}