/****************************************************************************** * * Copyright 2016 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ******************************************************************************/ #include <stdarg.h> #include <gmock/gmock.h> #include <gtest/gtest.h> #include "bt_trace.h" #include "hcidefs.h" #include "stack/include/smp_api.h" #include "stack/smp/p_256_ecc_pp.h" #include "stack/smp/smp_int.h" /* * This test verifies various key distribution methods in SMP works using the * following parameter set: * * When testing target as Master (Initiator is local, Responder is remote) * * Initiator's Pairing Request: 0x070710000001(01) * Responder's Pairing Response: 0x050008000003(02) * Initiator's Bluetooth Address: 0xA1A2A3A4A5A6 * Initiator's Bluetooth Address Type: 0x01 * Responder's Bluetooth Address: 0xB1B2B3B4B5B6 * Responder's Bluetooth Address Type: 0x00 * Initiator's Random Number: 0x5783D52156AD6F0E6388274EC6702EE0 * TK Encryption Key: 0x0 * * Correct values: * * p1: 0x05000800000302070710000001010001 * p1 XOR r: 0x5283dd2156ae6d096498274ec7712ee1 * p1 prime: 0x02c7aa2a9857ac866ff91232df0e3c95 * p2: 0x00000000a1a2a3a4a5a6b1b2b3b4b5b6 * MConfirm (c1): 0x1e1e3fef878988ead2a74dc5bef13b86 * * NOTE: All these values are presented in mathematical reasonable canonical * form that has MSB on the left and LSB on the right. In Bluetooth packets, * they are mostly reversed to be Little Endian which have LSB on the left and * MSB on the right. */ // Set remote bda to 0xB1B2B3B4B5B6 bool BTM_ReadRemoteConnectionAddr(const RawAddress& pseudo_addr, RawAddress& conn_addr, tBLE_ADDR_TYPE* p_addr_type) { conn_addr = RawAddress({0xB1, 0xB2, 0xB3, 0xB4, 0xB5, 0xB6}); *p_addr_type = 0x00; return true; } // Set local_bda to 0xA1A2A3A4A5A6 void BTM_ReadConnectionAddr(const RawAddress& remote_bda, RawAddress& local_conn_addr, tBLE_ADDR_TYPE* p_addr_type) { local_conn_addr = RawAddress({0xA1, 0xA2, 0xA3, 0xA4, 0xA5, 0xA6}); *p_addr_type = 0x01; } // Require bte_logmsg.cc to run, here is just to fake it as we don't care about // trace in unit test void LogMsg(uint32_t trace_set_mask, const char* fmt_str, ...) { va_list args; va_start(args, fmt_str); vprintf(fmt_str, args); va_end(args); } extern Octet16 smp_gen_p1_4_confirm(tSMP_CB* p_cb, tBLE_ADDR_TYPE remote_bd_addr_type); extern Octet16 smp_gen_p2_4_confirm(tSMP_CB* p_cb, const RawAddress& remote_bda); extern tSMP_STATUS smp_calculate_comfirm(tSMP_CB* p_cb, const Octet16& rand, Octet16* output); namespace testing { void dump_uint128(const Octet16& a, char* buffer) { for (unsigned int i = 0; i < OCTET16_LEN; ++i) { snprintf(buffer, 3, "%02x", a[i]); buffer += 2; } *buffer = '\0'; } void dump_uint128_reverse(const Octet16& a, char* buffer) { for (int i = (int)(OCTET16_LEN - 1); i >= 0; --i) { snprintf(buffer, 3, "%02x", a[i]); buffer += 2; } *buffer = '\0'; } void print_uint128(const Octet16& a) { for (unsigned int i = 0; i < OCTET16_LEN; ++i) { printf("%02x", a[i]); } printf("\n"); } Octet16 parse_uint128(const char* input) { Octet16 output{0}; for (unsigned int count = 0; count < OCTET16_LEN; count++) { sscanf(input, "%2hhx", &output[count]); input += 2; } return output; } class SmpCalculateConfirmTest : public Test { protected: tSMP_CB p_cb_; // Set random to 0x5783D52156AD6F0E6388274EC6702EE0 Octet16 rand_{0x57, 0x83, 0xD5, 0x21, 0x56, 0xAD, 0x6F, 0x0E, 0x63, 0x88, 0x27, 0x4E, 0xC6, 0x70, 0x2E, 0xE0}; void SetUp() { p_cb_.tk = {0}; // Set pairing request packet to 0x070710000001(01) p_cb_.local_io_capability = 0x01; p_cb_.loc_oob_flag = 0x00; p_cb_.loc_auth_req = 0x00; p_cb_.loc_enc_size = 0x10; p_cb_.local_i_key = 0x07; p_cb_.local_r_key = 0x07; // Set pairing response packet to 0x050008000003(02) p_cb_.peer_io_caps = 0x03; p_cb_.peer_oob_flag = 0x00; p_cb_.peer_auth_req = 0x00; p_cb_.peer_enc_size = 0x08; p_cb_.peer_i_key = 0x00; p_cb_.peer_r_key = 0x05; // Set role to master p_cb_.role = HCI_ROLE_MASTER; std::reverse(rand_.begin(), rand_.end()); } void TearDown() {} public: }; // Test smp_gen_p2_4_confirm function implementation TEST_F(SmpCalculateConfirmTest, test_smp_gen_p2_4_confirm_as_master) { RawAddress remote_bda; tBLE_ADDR_TYPE remote_bd_addr_type = 0; BTM_ReadRemoteConnectionAddr(p_cb_.pairing_bda, remote_bda, &remote_bd_addr_type); BTM_ReadConnectionAddr(p_cb_.pairing_bda, p_cb_.local_bda, &p_cb_.addr_type); Octet16 p2 = smp_gen_p2_4_confirm(&p_cb_, remote_bda); // Correct p2 is 0x00000000a1a2a3a4a5a6b1b2b3b4b5b6 const char expected_p2_str[] = "00000000a1a2a3a4a5a6b1b2b3b4b5b6"; char p2_str[2 * OCTET16_LEN + 1]; dump_uint128_reverse(p2, p2_str); ASSERT_THAT(p2_str, StrEq(expected_p2_str)); } // Test smp_gen_p1_4_confirm and aes_128 function implementation TEST_F(SmpCalculateConfirmTest, test_aes_128_as_master) { RawAddress remote_bda; tBLE_ADDR_TYPE remote_bd_addr_type = 0; BTM_ReadRemoteConnectionAddr(p_cb_.pairing_bda, remote_bda, &remote_bd_addr_type); BTM_ReadConnectionAddr(p_cb_.pairing_bda, p_cb_.local_bda, &p_cb_.addr_type); Octet16 p1 = smp_gen_p1_4_confirm(&p_cb_, remote_bd_addr_type); // Correct p1 is 0x05000800000302070710000001010001 const char expected_p1_str[] = "05000800000302070710000001010001"; char p1_str[2 * OCTET16_LEN + 1]; dump_uint128_reverse(p1, p1_str); ASSERT_THAT(p1_str, StrEq(expected_p1_str)); smp_xor_128(&p1, rand_); // Correct p1 xor r is 0x5283dd2156ae6d096498274ec7712ee1 const char expected_p1_xor_r_str[] = "5283dd2156ae6d096498274ec7712ee1"; char p1_xor_r_str[2 * OCTET16_LEN + 1]; dump_uint128_reverse(p1, p1_xor_r_str); ASSERT_THAT(p1_xor_r_str, StrEq(expected_p1_xor_r_str)); Octet16 output = crypto_toolbox::aes_128(p_cb_.tk, p1.data(), OCTET16_LEN); const char expected_p1_prime_str[] = "02c7aa2a9857ac866ff91232df0e3c95"; char p1_prime_str[2 * OCTET16_LEN + 1]; dump_uint128_reverse(output, p1_prime_str); ASSERT_THAT(p1_prime_str, StrEq(expected_p1_prime_str)); } // Test smp_calculate_comfirm function implementation TEST_F(SmpCalculateConfirmTest, test_smp_calculate_comfirm_as_master) { Octet16 output; tSMP_STATUS status = smp_calculate_comfirm(&p_cb_, rand_, &output); EXPECT_EQ(status, SMP_SUCCESS); // Correct MConfirm is 0x1e1e3fef878988ead2a74dc5bef13b86 const char expected_confirm_str[] = "1e1e3fef878988ead2a74dc5bef13b86"; char confirm_str[2 * OCTET16_LEN + 1]; dump_uint128_reverse(output, confirm_str); ASSERT_THAT(confirm_str, StrEq(expected_confirm_str)); } // Test ECC point validation TEST(SmpEccValidationTest, test_valid_points) { Point p; // Test data from Bluetooth Core Specification // Version 5.0 | Vol 2, Part G | 7.1.2 // Sample 1 p.x[7] = 0x20b003d2; p.x[6] = 0xf297be2c; p.x[5] = 0x5e2c83a7; p.x[4] = 0xe9f9a5b9; p.x[3] = 0xeff49111; p.x[2] = 0xacf4fddb; p.x[1] = 0xcc030148; p.x[0] = 0x0e359de6; p.y[7] = 0xdc809c49; p.y[6] = 0x652aeb6d; p.y[5] = 0x63329abf; p.y[4] = 0x5a52155c; p.y[3] = 0x766345c2; p.y[2] = 0x8fed3024; p.y[1] = 0x741c8ed0; p.y[0] = 0x1589d28b; EXPECT_TRUE(ECC_ValidatePoint(p)); // Sample 2 p.x[7] = 0x2c31a47b; p.x[6] = 0x5779809e; p.x[5] = 0xf44cb5ea; p.x[4] = 0xaf5c3e43; p.x[3] = 0xd5f8faad; p.x[2] = 0x4a8794cb; p.x[1] = 0x987e9b03; p.x[0] = 0x745c78dd; p.y[7] = 0x91951218; p.y[6] = 0x3898dfbe; p.y[5] = 0xcd52e240; p.y[4] = 0x8e43871f; p.y[3] = 0xd0211091; p.y[2] = 0x17bd3ed4; p.y[1] = 0xeaf84377; p.y[0] = 0x43715d4f; EXPECT_TRUE(ECC_ValidatePoint(p)); } TEST(SmpEccValidationTest, test_invalid_points) { Point p; multiprecision_init(p.x, 8); multiprecision_init(p.y, 8); EXPECT_FALSE(ECC_ValidatePoint(p)); // Sample 1 p.x[7] = 0x20b003d2; p.x[6] = 0xf297be2c; p.x[5] = 0x5e2c83a7; p.x[4] = 0xe9f9a5b9; p.x[3] = 0xeff49111; p.x[2] = 0xacf4fddb; p.x[1] = 0xcc030148; p.x[0] = 0x0e359de6; EXPECT_FALSE(ECC_ValidatePoint(p)); p.y[7] = 0xdc809c49; p.y[6] = 0x652aeb6d; p.y[5] = 0x63329abf; p.y[4] = 0x5a52155c; p.y[3] = 0x766345c2; p.y[2] = 0x8fed3024; p.y[1] = 0x741c8ed0; p.y[0] = 0x1589d28b; p.y[0]--; EXPECT_FALSE(ECC_ValidatePoint(p)); } } // namespace testing