blob: b288d2172c8f2996e7afd17cdcac62a77c0ea99a [file] [log] [blame]
/*
* Copyright (c) 2022 Nordic Semiconductor ASA
*
* SPDX-License-Identifier: Apache-2.0
*/
#include "mocks/crypto_help_utils.h"
#include "mocks/hci_core.h"
#include "mocks/hci_core_expects.h"
#include "mocks/hmac_prng.h"
#include "mocks/hmac_prng_expects.h"
#include <zephyr/bluetooth/crypto.h>
#include <zephyr/fff.h>
#include <zephyr/kernel.h>
#include <host/crypto.h>
DEFINE_FFF_GLOBALS;
static void fff_reset_rule_before(const struct ztest_unit_test *test, void *fixture)
{
HCI_CORE_FFF_FAKES_LIST(RESET_FAKE);
HMAC_PRNG_FFF_FAKES_LIST(RESET_FAKE);
}
ZTEST_RULE(fff_reset_rule, fff_reset_rule_before, NULL);
ZTEST_SUITE(bt_rand, NULL, NULL, NULL, NULL, NULL);
/*
* Test bt_rand() succeeds while 'CONFIG_BT_HOST_CRYPTO_PRNG' isn't enabled.
*
* Constraints:
* - 'CONFIG_BT_HOST_CRYPTO_PRNG' isn't enabled
* - bt_hci_le_rand() succeeds and returns 0 (success)
*
* Expected behaviour:
* - bt_rand() returns 0 (success)
*/
ZTEST(bt_rand, test_bt_rand_succeeds_host_crypto_prng_disabled)
{
int err;
uint8_t buf[16];
size_t buf_len = 16;
uint8_t expected_args_history[] = {16};
Z_TEST_SKIP_IFDEF(CONFIG_BT_HOST_CRYPTO_PRNG);
bt_hci_le_rand_fake.return_val = 0;
err = bt_rand(buf, buf_len);
expect_call_count_bt_hci_le_rand(1, expected_args_history);
zassert_ok(err, "Unexpected error code '%d' was returned", err);
}
/*
* Test bt_rand() succeeds when tc_hmac_prng_generate() succeeds on the first call while
* 'CONFIG_BT_HOST_CRYPTO_PRNG' is enabled.
*
* Constraints:
* - 'CONFIG_BT_HOST_CRYPTO_PRNG' is enabled
* - tc_hmac_prng_generate() succeeds and returns 'TC_CRYPTO_SUCCESS' on the first call.
*
* Expected behaviour:
* - bt_rand() returns 0 (success)
*/
ZTEST(bt_rand, test_tc_hmac_prng_generate_succeeds_on_first_call)
{
int err;
uint8_t buf[16];
size_t buf_len = 16;
struct tc_hmac_prng_struct *hmac_prng = bt_crypto_get_hmac_prng_instance();
Z_TEST_SKIP_IFNDEF(CONFIG_BT_HOST_CRYPTO_PRNG);
tc_hmac_prng_generate_fake.return_val = TC_CRYPTO_SUCCESS;
err = bt_rand(buf, buf_len);
expect_call_count_tc_hmac_prng_generate(1, buf, buf_len, hmac_prng);
zassert_ok(err, "Unexpected error code '%d' was returned", err);
}
static int tc_hmac_prng_generate_custom_fake(uint8_t *out, unsigned int outlen, TCHmacPrng_t prng)
{
if (tc_hmac_prng_generate_fake.call_count == 1) {
return TC_HMAC_PRNG_RESEED_REQ;
}
return TC_CRYPTO_SUCCESS;
}
/*
* Test bt_rand() succeeds when tc_hmac_prng_generate() succeeds on the second call after a seeding
* request by tc_hmac_prng_generate() while 'CONFIG_BT_HOST_CRYPTO_PRNG' is enabled.
*
* Constraints:
* - 'CONFIG_BT_HOST_CRYPTO_PRNG' is enabled
* - tc_hmac_prng_generate() fails and returns 'TC_HMAC_PRNG_RESEED_REQ' on the first call.
* - tc_hmac_prng_generate() succeeds and returns 'TC_CRYPTO_SUCCESS' on the second call.
*
* Expected behaviour:
* - bt_rand() returns 0 (success)
*/
ZTEST(bt_rand, test_tc_hmac_prng_generate_succeeds_on_second_call)
{
int err;
uint8_t buf[16];
size_t buf_len = 16;
struct tc_hmac_prng_struct *hmac_prng = bt_crypto_get_hmac_prng_instance();
Z_TEST_SKIP_IFNDEF(CONFIG_BT_HOST_CRYPTO_PRNG);
tc_hmac_prng_generate_fake.custom_fake = tc_hmac_prng_generate_custom_fake;
/* This is to make prng_reseed() succeeds and return 0 */
bt_hci_le_rand_fake.return_val = 0;
tc_hmac_prng_reseed_fake.return_val = TC_CRYPTO_SUCCESS;
err = bt_rand(buf, buf_len);
expect_call_count_tc_hmac_prng_generate(2, buf, buf_len, hmac_prng);
expect_single_call_tc_hmac_prng_reseed(hmac_prng, 32, sizeof(int64_t));
zassert_ok(err, "Unexpected error code '%d' was returned", err);
}