You've already forked M5Unit-CRYPTO
mirror of
https://github.com/m5stack/M5Unit-CRYPTO.git
synced 2026-05-20 11:37:42 -07:00
1524 lines
56 KiB
C++
1524 lines
56 KiB
C++
/*
|
|
* SPDX-FileCopyrightText: 2025 M5Stack Technology CO LTD
|
|
*
|
|
* SPDX-License-Identifier: MIT
|
|
*/
|
|
/*
|
|
UnitTest for UnitATECC608B_TNGTLS
|
|
|
|
NOTE: These tests do NOT perform any irreversible operations (Lock, Write, PrivWrite,
|
|
private key generation, counter increment, etc.). All operations are read-only,
|
|
volatile-SRAM-only, or diagnostic (SelfTest).
|
|
*/
|
|
#include <gtest/gtest.h>
|
|
#include <Wire.h>
|
|
#include <M5Unified.h>
|
|
#include <M5UnitUnified.hpp>
|
|
#include <googletest/test_template.hpp>
|
|
#include <googletest/test_helper.hpp>
|
|
#include <unit/unit_ATECC608B_TNGTLS.hpp>
|
|
#include <cctype>
|
|
#include <limits>
|
|
#include <algorithm>
|
|
#include <cmath>
|
|
#include <esp_random.h>
|
|
|
|
using namespace m5::unit::googletest;
|
|
using namespace m5::unit;
|
|
using namespace m5::unit::atecc608;
|
|
using m5::unit::types::elapsed_time_t;
|
|
|
|
class TestATECC608B_TNGTLS : public I2CComponentTestBase<UnitATECC608B_TNGTLS> {
|
|
protected:
|
|
virtual UnitATECC608B_TNGTLS* get_instance() override
|
|
{
|
|
auto ptr = new m5::unit::UnitATECC608B_TNGTLS();
|
|
return ptr;
|
|
}
|
|
|
|
#if defined(USING_M5CORE2_AWS_BUILTIN)
|
|
virtual bool begin() override
|
|
{
|
|
// Core2 AWS builtin: use M5.In_I2C (I2C_NUM_1, SDA=21, SCL=22)
|
|
M5_LOGI("Using M5.In_I2C for builtin ATECC608B");
|
|
return Units.add(*unit, M5.In_I2C) && Units.begin();
|
|
}
|
|
#endif
|
|
};
|
|
|
|
namespace {
|
|
|
|
bool is_equal_hex_string(const char* hex_str, const uint8_t* bytes, size_t len)
|
|
{
|
|
for (uint32_t i = 0; i < len; ++i) {
|
|
char high = toupper(hex_str[i * 2]);
|
|
char low = toupper(hex_str[i * 2 + 1]);
|
|
uint8_t value =
|
|
((high >= 'A') ? (high - 'A' + 10) : (high - '0')) << 4 | ((low >= 'A') ? (low - 'A' + 10) : (low - '0'));
|
|
if (value != bytes[i]) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
inline bool is_valid_tempkey(const uint16_t s)
|
|
{
|
|
return (s >> 7) & 1;
|
|
}
|
|
|
|
inline bool is_valid_nomac_tempkey(const uint16_t s)
|
|
{
|
|
return (s >> 15) & 1;
|
|
}
|
|
|
|
inline bool is_valid_genkey_tempkey(const uint16_t s)
|
|
{
|
|
return (s >> 14) & 1;
|
|
}
|
|
|
|
inline bool is_valid_gendlg_tempkey(const uint16_t s)
|
|
{
|
|
return (s >> 13) & 1;
|
|
}
|
|
|
|
inline bool is_external_source_tempkey(const uint16_t s)
|
|
{
|
|
return (s >> 12) & 1;
|
|
}
|
|
|
|
uint8_t get_tempkey_keyID(const uint16_t state)
|
|
{
|
|
return (state >> 8) & 0x0F;
|
|
}
|
|
|
|
bool clear_tempkey(UnitATECC608B_TNGTLS* u)
|
|
{
|
|
#if 0
|
|
u->sleep();
|
|
u->wakeup();
|
|
#endif
|
|
|
|
uint16_t state{};
|
|
u->readDeviceState(state);
|
|
if (is_valid_tempkey(state)) {
|
|
uint8_t pubKey[64]{};
|
|
// private key stored in TempKey, Output public key
|
|
if (!u->generateKey(pubKey)) {
|
|
M5_LOGE("E1");
|
|
return false;
|
|
}
|
|
// Use Source as TempKey, So will clear TempKey...
|
|
uint8_t out[32]{};
|
|
if (!u->ECDHTempKey(out, pubKey)) {
|
|
M5_LOGE("E2");
|
|
return false;
|
|
}
|
|
}
|
|
u->readDeviceState(state);
|
|
return !is_valid_tempkey(state);
|
|
}
|
|
|
|
// SHA256
|
|
struct Sha256TestVector {
|
|
const char* name;
|
|
const uint8_t* input;
|
|
uint32_t input_len;
|
|
const uint8_t* expected;
|
|
};
|
|
|
|
constexpr Sha256TestVector sha256_test_vectors[] = {
|
|
{"empty", (const uint8_t[]){}, 0,
|
|
(const uint8_t[]){0xE3, 0xB0, 0xC4, 0x42, 0x98, 0xFC, 0x1C, 0x14, 0x9A, 0xFB, 0xF4, 0xC8, 0x99, 0x6F, 0xB9, 0x24,
|
|
0x27, 0xAE, 0x41, 0xE4, 0x64, 0x9B, 0x93, 0x4C, 0xA4, 0x95, 0x99, 0x1B, 0x78, 0x52, 0xB8, 0x55}},
|
|
{"abc", (const uint8_t[]){0x61, 0x62, 0x63}, 3,
|
|
(const uint8_t[]){0xBA, 0x78, 0x16, 0xBF, 0x8F, 0x01, 0xCF, 0xEA, 0x41, 0x41, 0x40, 0xDE, 0x5D, 0xAE, 0x22, 0x23,
|
|
0xB0, 0x03, 0x61, 0xA3, 0x96, 0x17, 0x7A, 0x9C, 0xB4, 0x10, 0xFF, 0x61, 0xF2, 0x00, 0x15, 0xAD}},
|
|
{"64_a",
|
|
(const uint8_t[]){0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61},
|
|
64,
|
|
(const uint8_t[]){0xFF, 0xE0, 0x54, 0xFE, 0x7A, 0xE0, 0xCB, 0x6D, 0xC6, 0x5C, 0x3A, 0xF9, 0xB6, 0x1D, 0x52, 0x09,
|
|
0xF4, 0x39, 0x85, 0x1D, 0xB4, 0x3D, 0x0B, 0xA5, 0x99, 0x73, 0x37, 0xDF, 0x15, 0x46, 0x68, 0xEB}},
|
|
{"56_a", (const uint8_t[]){0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61},
|
|
56,
|
|
(const uint8_t[]){0xB3, 0x54, 0x39, 0xA4, 0xAC, 0x6F, 0x09, 0x48, 0xB6, 0xD6, 0xF9, 0xE3, 0xC6, 0xAF, 0x0F, 0x5F,
|
|
0x59, 0x0C, 0xE2, 0x0F, 0x1B, 0xDE, 0x70, 0x90, 0xEF, 0x79, 0x70, 0x68, 0x6E, 0xC6, 0x73, 0x8A}},
|
|
{"100_a",
|
|
(const uint8_t[]){0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61},
|
|
100,
|
|
(const uint8_t[]){0x28, 0x16, 0x59, 0x78, 0x88, 0xE4, 0xA0, 0xD3, 0xA3, 0x6B, 0x82, 0xB8, 0x33, 0x16, 0xAB, 0x32,
|
|
0x68, 0x0E, 0xB8, 0xF0, 0x0F, 0x8C, 0xD3, 0xB9, 0x04, 0xD6, 0x81, 0x24, 0x6D, 0x28, 0x5A, 0x0E}},
|
|
};
|
|
|
|
// For 'a' String repeated 1000000 times
|
|
constexpr uint8_t sha256_a1000000_result[] = {0xCD, 0xC7, 0x6E, 0x5C, 0x99, 0x14, 0xFB, 0x92, 0x81, 0xA1, 0xC7,
|
|
0xE2, 0x84, 0xD7, 0x3E, 0x67, 0xF1, 0x80, 0x9A, 0x48, 0xA4, 0x97,
|
|
0x20, 0x0E, 0x04, 0x6D, 0x39, 0xCC, 0xC7, 0x11, 0x2C, 0xD0};
|
|
|
|
template <typename T, typename U>
|
|
void test_random(UnitATECC608B_TNGTLS* u, const U l, const U h)
|
|
{
|
|
const T lower = static_cast<T>(l);
|
|
const T higher = static_cast<T>(h);
|
|
|
|
uint32_t count{10};
|
|
std::vector<T> result;
|
|
|
|
while (count--) {
|
|
T value{};
|
|
EXPECT_TRUE(u->readRandom(value, lower, higher)); // [lower ... higher)
|
|
|
|
EXPECT_LT(value, higher);
|
|
EXPECT_GE(value, lower);
|
|
result.push_back(value);
|
|
}
|
|
EXPECT_EQ(result.size(), 10);
|
|
EXPECT_FALSE(std::all_of(result.cbegin() + 1, result.cend(), [&result](const T& v) { return v == result[0]; }))
|
|
<< "low:" << l << " high:" << h;
|
|
}
|
|
|
|
template <typename T, typename U>
|
|
void test_random_float(UnitATECC608B_TNGTLS* u, const U l, const U h)
|
|
{
|
|
const T lower = static_cast<T>(l);
|
|
const T higher = static_cast<T>(h);
|
|
|
|
uint32_t count{10};
|
|
std::vector<T> result;
|
|
|
|
while (count--) {
|
|
T value{};
|
|
EXPECT_TRUE(u->readRandom(value, lower, higher)); // [lower ... higher)
|
|
|
|
EXPECT_TRUE(value < higher) << "actual=" << value << ", expected<" << higher;
|
|
EXPECT_TRUE(value >= lower) << "actual=" << value << ", expected>=" << lower;
|
|
result.push_back(value);
|
|
}
|
|
EXPECT_EQ(result.size(), 10);
|
|
EXPECT_FALSE(std::all_of(result.cbegin() + 1, result.cend(), [&result](const T& v) { return v == result[0]; }))
|
|
<< "low:" << l << " high:" << h;
|
|
}
|
|
|
|
} // namespace
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, serialNumber)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t sn[9]{};
|
|
EXPECT_TRUE(unit->readSerialNumber(sn));
|
|
EXPECT_FALSE(std::all_of(std::begin(sn), std::end(sn), [](const uint8_t v) { return v == 0; }));
|
|
|
|
char sns[19]{};
|
|
EXPECT_TRUE(unit->readSerialNumber(sns));
|
|
EXPECT_TRUE(is_equal_hex_string(sns, sn, sizeof(sn)));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Counter)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint32_t org0{}, org1{};
|
|
|
|
EXPECT_TRUE(unit->readCounter(org0, 0));
|
|
EXPECT_TRUE(unit->readCounter(org1, 1));
|
|
|
|
// Skip: incrementCounter is irreversible (monotonic counter).
|
|
// Max value is 2,097,151 (0x1FFFFF). Repeated test runs will exhaust the counter permanently.
|
|
#if 0
|
|
uint32_t c0{}, c1{};
|
|
EXPECT_TRUE(unit->incrementCounter(c0, 0));
|
|
EXPECT_EQ(c0, org0 + 1);
|
|
|
|
EXPECT_TRUE(unit->incrementCounter(c1, 1));
|
|
EXPECT_EQ(c1, org1 + 1);
|
|
EXPECT_TRUE(unit->incrementCounter(c1, 1));
|
|
EXPECT_EQ(c1, org1 + 2);
|
|
|
|
EXPECT_TRUE(unit->readCounter(c0, 0));
|
|
EXPECT_TRUE(unit->readCounter(c1, 1));
|
|
EXPECT_EQ(c0, org0 + 1);
|
|
EXPECT_EQ(c1, org1 + 2);
|
|
#endif
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Info)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
{ // Revision
|
|
// The value of the fourth byte may change over time but it is 0x03 at the time of the initial product release
|
|
constexpr uint8_t atecc608b_tngtls_rev[4] = {0x00, 0x00, 0x60, 0x03};
|
|
uint8_t rev[4]{};
|
|
EXPECT_TRUE(unit->readRevision(rev));
|
|
|
|
EXPECT_TRUE(memcmp(rev, atecc608b_tngtls_rev, 3) == 0);
|
|
EXPECT_GE(rev[3], atecc608b_tngtls_rev[3]);
|
|
}
|
|
|
|
{ // KeyValid
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
bool valid{};
|
|
EXPECT_TRUE(unit->readKeyValid(valid, (Slot)s));
|
|
if (s <= 4) {
|
|
EXPECT_TRUE(valid) << s;
|
|
} else {
|
|
EXPECT_FALSE(valid) << s;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Nonce)
|
|
{
|
|
uint16_t state{};
|
|
uint8_t input20[20]{0x55};
|
|
uint8_t output[32]{};
|
|
uint8_t nonce32[32]{0x11};
|
|
uint8_t nonce64[64]{0x22};
|
|
|
|
// RNG mode: useRNG = true, updateSeed = true
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->createNonce(output, input20, true, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_FALSE(is_external_source_tempkey(state));
|
|
|
|
// RNG mode: useRNG = true, updateSeed = false
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->createNonce(output, input20, true, false));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_FALSE(is_external_source_tempkey(state));
|
|
|
|
// RNG mode: useRNG = false, updateSeed = true
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_FALSE(unit->createNonce(output, input20, false, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, nonce32));
|
|
EXPECT_TRUE(unit->createNonce(output, input20, false, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
|
|
// RNG mode: useRNG = false, updateSeed = false
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_FALSE(unit->createNonce(output, input20, false, false));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, nonce32));
|
|
EXPECT_TRUE(unit->createNonce(output, input20, false, false));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
|
|
//
|
|
// Write 32-byte nonce (TempKey)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, nonce32));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
|
|
// Write 32-byte nonce (MsgDigestBuf)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::MsgDigestBuffer, nonce32));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Write 32-byte nonce (AltBuf)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::AlternateKeyBuffer, nonce32));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Write 32-byte nonce (Illegal dest)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_FALSE(unit->writeNonce32(Destination::ExternalBuffer, nonce32));
|
|
|
|
// Write 64-byte nonce (TempKey)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce64(Destination::TempKey, nonce64));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
|
|
// Write 64-byte nonce (MsgDigestBuf)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce64(Destination::MsgDigestBuffer, nonce64));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Write 32-byte nonce (Illegal dest)
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_FALSE(unit->writeNonce64(Destination::AlternateKeyBuffer, nonce64));
|
|
EXPECT_FALSE(unit->writeNonce64(Destination::ExternalBuffer, nonce64));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Random)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t r[32]{};
|
|
EXPECT_TRUE(unit->readRandomArray(r));
|
|
// updateSeed=false is ignored on TNG-TLS (Mode=0x00 always used)
|
|
EXPECT_TRUE(unit->readRandomArray(r, false));
|
|
|
|
test_random<int8_t>(unit.get(), std::numeric_limits<int8_t>::lowest(),
|
|
std::numeric_limits<int8_t>::max()); // lowest ... (max-1)
|
|
test_random<int8_t>(unit.get(), -1, 2); // -1 ... 1
|
|
|
|
test_random<uint8_t>(unit.get(), std::numeric_limits<uint8_t>::lowest(),
|
|
std::numeric_limits<uint8_t>::max()); // lowest ... (max-1)
|
|
test_random<uint8_t>(unit.get(), 1, 3); // 1 ... 2
|
|
|
|
test_random<int16_t>(unit.get(), std::numeric_limits<int16_t>::lowest(),
|
|
std::numeric_limits<int16_t>::max()); // lowest ... (max-1)
|
|
test_random<int16_t>(unit.get(), -2, 1); // -2 ... 0
|
|
|
|
test_random<uint16_t>(unit.get(), std::numeric_limits<uint16_t>::lowest(),
|
|
std::numeric_limits<uint16_t>::max()); // lowest ... (max-1)
|
|
test_random<uint16_t>(unit.get(), 2, 4); // 2 ... 3
|
|
|
|
test_random<int32_t>(unit.get(), std::numeric_limits<int32_t>::lowest(),
|
|
std::numeric_limits<int32_t>::max()); // lowest ... (max-1)
|
|
test_random<int32_t>(unit.get(), -3, 0); // -3 ... -1
|
|
|
|
test_random<uint32_t>(unit.get(), std::numeric_limits<uint32_t>::lowest(),
|
|
std::numeric_limits<uint32_t>::max()); // lowest ... (max-1)
|
|
test_random<uint32_t>(unit.get(), 3, 5); // 3 ... 4
|
|
|
|
test_random<int64_t>(unit.get(), std::numeric_limits<int64_t>::lowest(),
|
|
std::numeric_limits<int64_t>::max()); // lowest ... (max-1)
|
|
test_random<int64_t>(unit.get(), -4, -1); // -4 ... -2
|
|
|
|
test_random<uint64_t>(unit.get(), std::numeric_limits<uint64_t>::lowest(),
|
|
std::numeric_limits<uint64_t>::max()); // lowest ... (max-1)
|
|
test_random<uint64_t>(unit.get(), 4, 6); // 4 ... 5
|
|
|
|
#if defined(__SIZEOF_INT128__)
|
|
#pragma message "Support int/uint128_t"
|
|
test_random<int128_t>(unit.get(), std::numeric_limits<int128_t>::lowest(),
|
|
std::numeric_limits<int128_t>::max()); // lowest ... (max-1)
|
|
test_random<int128_t>(unit.get(), -5, -2); // -5 ... -3
|
|
|
|
test_random<uint128_t>(unit.get(), std::numeric_limits<uint128_t>::lowest(),
|
|
std::numeric_limits<uint128_t>::max()); // lowest ... (max-1)
|
|
test_random<uint128_t>(unit.get(), 5, 7); // 5 ... 6
|
|
#endif
|
|
|
|
test_random<float>(unit.get(), -12345.6789f, 12345.6789f); // -12345.6789 ... 12345.67889999.....
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Read)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t cfg[128]{};
|
|
EXPECT_TRUE(unit->readConfigZone(cfg));
|
|
|
|
uint8_t data[416]{};
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
// Can read as clear text
|
|
if (s == 5 || s == 8 || s == 10 || s == 11 || s == 12) {
|
|
EXPECT_TRUE(unit->readDataZone(data, unit->getSlotSize((Slot)s), (Slot)s));
|
|
} else {
|
|
EXPECT_FALSE(unit->readDataZone(data, unit->getSlotSize((Slot)s), (Slot)s));
|
|
}
|
|
}
|
|
|
|
uint8_t otp[64]{};
|
|
EXPECT_TRUE(unit->readOTPZone(otp));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SHA256)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint16_t state{};
|
|
|
|
// Skip: 'a' String repeated 1000000 times
|
|
// Disabled due to insufficient heap on most embedded targets (1MB allocation).
|
|
// The SHA256 1M test vector is validated via the smaller test vectors above.
|
|
constexpr uint32_t ilen{1000000};
|
|
uint8_t* in = nullptr;
|
|
#if 0
|
|
in = (uint8_t*)malloc(1000000);
|
|
if (in) {
|
|
memset(in, (uint8_t)('a'), ilen);
|
|
}
|
|
#endif
|
|
|
|
// TempKey
|
|
for (int i = 0; i < m5::stl::size(sha256_test_vectors); ++i) {
|
|
uint8_t digest[32]{};
|
|
auto& e = sha256_test_vectors[i];
|
|
SCOPED_TRACE(e.name);
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, e.input_len));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
}
|
|
if (in) {
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(in, ilen));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
EXPECT_TRUE(memcmp(digest, sha256_a1000000_result, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
}
|
|
|
|
// MsgDigestBuffer
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
for (int i = 0; i < m5::stl::size(sha256_test_vectors); ++i) {
|
|
uint8_t digest[32]{};
|
|
auto& e = sha256_test_vectors[i];
|
|
SCOPED_TRACE(e.name);
|
|
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, e.input_len));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::MsgDigestBuffer, digest));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
if (in) {
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(in, ilen));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::MsgDigestBuffer, digest));
|
|
EXPECT_TRUE(memcmp(digest, sha256_a1000000_result, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
|
|
// ExternalBuffer
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
for (int i = 0; i < m5::stl::size(sha256_test_vectors); ++i) {
|
|
uint8_t digest[32]{};
|
|
auto& e = sha256_test_vectors[i];
|
|
SCOPED_TRACE(e.name);
|
|
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, e.input_len));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::ExternalBuffer, digest));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
// M5_LOGW("%04X", state);
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
if (in) {
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(in, ilen));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::ExternalBuffer, digest));
|
|
EXPECT_TRUE(memcmp(digest, sha256_a1000000_result, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
|
|
// Invalid dest
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
for (int i = 0; i < m5::stl::size(sha256_test_vectors); ++i) {
|
|
uint8_t digest[32]{};
|
|
auto& e = sha256_test_vectors[i];
|
|
SCOPED_TRACE(e.name);
|
|
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, e.input_len));
|
|
EXPECT_FALSE(unit->finalizeSHA256(Destination::AlternateKeyBuffer, digest));
|
|
EXPECT_FALSE(memcmp(digest, e.expected, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
if (in) {
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(in, 4));
|
|
EXPECT_FALSE(unit->finalizeSHA256(Destination::AlternateKeyBuffer, digest));
|
|
EXPECT_FALSE(memcmp(digest, sha256_a1000000_result, 32) == 0);
|
|
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
|
|
free(in);
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ECDHStoredKey)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint16_t state{};
|
|
uint8_t device_pubkey[64]{};
|
|
uint8_t shared_secret[32]{};
|
|
uint8_t nonce[32]{};
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
|
|
// Failed
|
|
EXPECT_FALSE(unit->ECDHStoredKey(shared_secret, Slot::PrimaryPrivateKey, device_pubkey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->ECDHStoredKey(shared_secret, nonce, Slot::PrimaryPrivateKey, device_pubkey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->ECDHStoredKey(Slot::PrimaryPrivateKey, device_pubkey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// For TNGTLS, the ECDH command may be run using the ECC private keys stored in Slots 0 and 2-4
|
|
// Output in the clear
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->generatePublicKey(device_pubkey, Slot::PrimaryPrivateKey));
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->ECDHStoredKey(shared_secret, (Slot)s, device_pubkey));
|
|
} else {
|
|
EXPECT_FALSE(unit->ECDHStoredKey(shared_secret, (Slot)s, device_pubkey));
|
|
}
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
|
|
// Output is encrypted
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->generatePublicKey(device_pubkey, Slot::PrimaryPrivateKey)); // Slot 0
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->ECDHStoredKey(shared_secret, nonce, (Slot)s, device_pubkey));
|
|
} else {
|
|
EXPECT_FALSE(unit->ECDHStoredKey(shared_secret, nonce, (Slot)s, device_pubkey));
|
|
}
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
// Results stored in TempKey
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->generatePublicKey(device_pubkey, Slot::PrimaryPrivateKey)); // Slot 0
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->ECDHStoredKey((Slot)s, device_pubkey));
|
|
} else {
|
|
EXPECT_FALSE(unit->ECDHStoredKey((Slot)s, device_pubkey));
|
|
}
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ECDHTempKey)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
uint16_t state{};
|
|
uint8_t pubKey[64]{};
|
|
uint8_t shared_secret[32]{};
|
|
uint8_t nonce[32]{};
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
|
|
// Failed
|
|
EXPECT_FALSE(unit->ECDHTempKey(shared_secret, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->ECDHTempKey(shared_secret, nonce, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->ECDHTempKey(pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->ECDHTempKey(Slot::GeneralData /*8*/, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Output in the clear
|
|
EXPECT_TRUE(unit->generateKey(pubKey)); // TempKey is ECC
|
|
EXPECT_TRUE(unit->ECDHTempKey(shared_secret, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Output is encrypted
|
|
EXPECT_TRUE(unit->generateKey(pubKey)); // TempKey is ECC
|
|
EXPECT_TRUE(unit->ECDHTempKey(shared_secret, nonce, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// Results stored in TempKey
|
|
EXPECT_TRUE(unit->generateKey(pubKey)); // TempKey is ECC
|
|
EXPECT_TRUE(unit->ECDHTempKey(pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
|
|
// Results stored in specified slot
|
|
// Skip: ECDHTempKey with output to Slot 8 overwrites general data storage.
|
|
// The original data cannot be restored, rendering Slot 8 unreliable for subsequent tests.
|
|
#if 0
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->readDataZone(data, 32, Slot::GeneralData));
|
|
|
|
EXPECT_TRUE(unit->generateKey(pubKey)); // TempKey is ECC
|
|
if (s == 8) {
|
|
EXPECT_TRUE(unit->ECDHTempKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_TRUE(unit->readDataZone(data2, 32, Slot::GeneralData));
|
|
EXPECT_NE(memcmp(data, data2, 32), 0);
|
|
} else {
|
|
EXPECT_FALSE(unit->ECDHTempKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state)); // Keep TempKey
|
|
}
|
|
}
|
|
#else
|
|
// Only test non-writable slots (all should fail), verifying slot permission enforcement
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
if (s == 8) {
|
|
continue; // Skip Slot 8: write is irreversible
|
|
}
|
|
EXPECT_TRUE(unit->generateKey(pubKey)); // TempKey is ECC
|
|
EXPECT_FALSE(unit->ECDHTempKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state)); // Keep TempKey
|
|
}
|
|
#endif
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, GenKey)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t pubKey[64]{};
|
|
uint16_t state{};
|
|
|
|
// Skip: generatePrivateKey overwrites the existing private key permanently.
|
|
// The original key used for TNG-TLS certificates cannot be recovered.
|
|
// Slots 0-1 are permanently locked for write. Slots 2-4 are writable but the
|
|
// original keys would be destroyed.
|
|
#if 0
|
|
// Private key
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
if (s >= 2 && s <= 4) {
|
|
EXPECT_TRUE(unit->generatePrivateKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
} else {
|
|
EXPECT_FALSE(unit->generatePrivateKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
}
|
|
#else
|
|
// Only test slots that should reject generatePrivateKey (non-writable slots)
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
if (s >= 2 && s <= 4) {
|
|
continue; // Skip writable slots: generatePrivateKey would destroy existing key
|
|
}
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_FALSE(unit->generatePrivateKey((Slot)s, pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
#endif
|
|
|
|
// Disposable key
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->generateKey(pubKey));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
|
|
// Public key
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
if (s <= 4) {
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey, (Slot)s, false));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
// TODO: 608BTNGTLS not support generate digest??? is it true?
|
|
#if 0
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey, (Slot)s, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_valid_genkey_tempkey(state));
|
|
#else
|
|
EXPECT_FALSE(unit->generatePublicKey(pubKey, (Slot)s, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
#endif
|
|
} else {
|
|
EXPECT_FALSE(unit->generatePublicKey(pubKey, (Slot)s, false));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
|
|
EXPECT_FALSE(unit->generatePublicKey(pubKey, (Slot)s, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
}
|
|
|
|
// Public Key Digest
|
|
const uint8_t nonce64[]{0x12};
|
|
const uint8_t other[3]{0x01, 0x02, 0x03};
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_FALSE(unit->generatePublicKeyDigest((Slot)s, other));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state));
|
|
}
|
|
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
EXPECT_TRUE(unit->writeNonce64(Destination::TempKey, nonce64));
|
|
if (s == 11) {
|
|
EXPECT_TRUE(unit->generatePublicKeyDigest((Slot)s, other));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(is_external_source_tempkey(state));
|
|
EXPECT_TRUE(is_valid_genkey_tempkey(state));
|
|
EXPECT_EQ(get_tempkey_keyID(state), 11);
|
|
} else {
|
|
EXPECT_FALSE(unit->generatePublicKeyDigest((Slot)s, other));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SignExternal)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t signature[64]{};
|
|
const uint8_t digest[32] = {0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A,
|
|
0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55,
|
|
0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF};
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
unit->signExternal(signature, (Slot)0, Source::MsgDigestBuffer); // break msg digest buffer
|
|
|
|
// Failed
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::TempKey, false));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, false));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::AlternateKeyBuffer, false));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::ExternalBuffer, false));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::TempKey, true));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, true));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::AlternateKeyBuffer, true));
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::ExternalBuffer, true));
|
|
}
|
|
|
|
// Source TempKey
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->signExternal(signature, (Slot)s, Source::TempKey, false));
|
|
} else {
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::TempKey, false));
|
|
}
|
|
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->signExternal(signature, (Slot)s, Source::TempKey, true));
|
|
} else {
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::TempKey, true));
|
|
}
|
|
}
|
|
|
|
// Source MsgDigestBuffer
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::MsgDigestBuffer, digest));
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, false));
|
|
} else {
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, false));
|
|
}
|
|
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::MsgDigestBuffer, digest));
|
|
if (s == 0 || (s >= 2 && s <= 4)) {
|
|
EXPECT_TRUE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, true));
|
|
} else {
|
|
EXPECT_FALSE(unit->signExternal(signature, (Slot)s, Source::MsgDigestBuffer, true));
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SignInternal)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint16_t state{};
|
|
uint8_t signature[64]{};
|
|
uint8_t pubKey[64]{};
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
unit->signExternal(signature, (Slot)0, Source::MsgDigestBuffer); // break msg digest buffer
|
|
|
|
// Failed
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::TempKey, false));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::MsgDigestBuffer, false));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::AlternateKeyBuffer, false));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::ExternalBuffer, false));
|
|
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::TempKey, true));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::MsgDigestBuffer, true));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::AlternateKeyBuffer, true));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)s, Source::ExternalBuffer, true));
|
|
}
|
|
|
|
// Failed because illegal TempKey (TempKey need to made by GenDig, GenKey)
|
|
const uint8_t nin[20]{0x12};
|
|
EXPECT_TRUE(unit->createNonce(nullptr, nin));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_FALSE(is_external_source_tempkey(state));
|
|
EXPECT_FALSE(unit->signInternal(signature, (Slot)1, Source::TempKey));
|
|
|
|
// Success: GenKey with digest creates valid TempKey for signInternal
|
|
// Slot 1 (InternalSignPrivateKey) is the only slot that can sign internal messages on TNGTLS
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey, Slot::InternalSignPrivateKey, true));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
EXPECT_TRUE(unit->signInternal(signature, Slot::InternalSignPrivateKey, Source::TempKey));
|
|
EXPECT_FALSE(std::all_of(std::begin(signature), std::end(signature), [](uint8_t v) { return v == 0; }));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SelfTest)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// All tests at once
|
|
uint8_t resultBits{0xFF};
|
|
EXPECT_TRUE(unit->selfTest(resultBits, 0x3D /* All: RNG,ECDSA,ECDH,AES,SHA */));
|
|
EXPECT_EQ(resultBits, 0x00) << "All self-test bits should be zero on success";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ZoneLock)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// TNGTLS devices ship with both config and data zones locked
|
|
bool configLocked{false}, dataLocked{false};
|
|
EXPECT_TRUE(unit->readZoneLocked(configLocked, dataLocked));
|
|
EXPECT_TRUE(configLocked) << "Config zone should be locked on TNGTLS";
|
|
EXPECT_TRUE(dataLocked) << "Data zone should be locked on TNGTLS";
|
|
|
|
// Slot lock status
|
|
uint16_t slotLockedBits{};
|
|
EXPECT_TRUE(unit->readSlotLocked(slotLockedBits));
|
|
// On TNGTLS, Slots 0 and 1 should be individually locked (bit=0 means locked)
|
|
EXPECT_EQ(slotLockedBits & (1 << 0), 0) << "Slot 0 should be locked";
|
|
EXPECT_EQ(slotLockedBits & (1 << 1), 0) << "Slot 1 should be locked";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SlotKeyConfig)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
for (uint8_t s = 0; s < 16; ++s) {
|
|
uint16_t slotCfg{}, keyCfg{};
|
|
EXPECT_TRUE(unit->readSlotConfig(slotCfg, (Slot)s)) << "Slot " << (int)s;
|
|
EXPECT_TRUE(unit->readKeyConfig(keyCfg, (Slot)s)) << "Slot " << (int)s;
|
|
|
|
// Verify ECC key slots (0-4) have KeyType = P256 (bits 4:2 == 0b100)
|
|
if (s <= 4) {
|
|
EXPECT_EQ((keyCfg >> 2) & 0x07, 0x04) << "Slot " << (int)s << " should be P256 ECC key";
|
|
}
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, VerifyExternal)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t signature[64]{};
|
|
uint8_t pubKey[64]{};
|
|
const uint8_t digest[32] = {0xF0, 0xE1, 0xD2, 0xC3, 0xB4, 0xA5, 0x96, 0x87, 0x78, 0x69, 0x5A,
|
|
0x4B, 0x3C, 0x2D, 0x1E, 0x0F, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55,
|
|
0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF};
|
|
|
|
// Sign with Slot 0 private key, then verify with its public key (roundtrip)
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey, Slot::PrimaryPrivateKey));
|
|
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_TRUE(unit->signExternal(signature, Slot::PrimaryPrivateKey, Source::TempKey));
|
|
|
|
// Verify: write the same digest to TempKey, then verify signature with public key
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_TRUE(unit->verifyExternal(nullptr, signature, pubKey, Source::TempKey));
|
|
|
|
// Verify with wrong public key should fail
|
|
uint8_t wrongPubKey[64]{};
|
|
memset(wrongPubKey, 0x42, sizeof(wrongPubKey));
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_FALSE(unit->verifyExternal(nullptr, signature, wrongPubKey, Source::TempKey));
|
|
|
|
// Verify with corrupted signature should fail
|
|
uint8_t badSig[64]{};
|
|
memcpy(badSig, signature, 64);
|
|
badSig[0] ^= 0xFF;
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_FALSE(unit->verifyExternal(nullptr, badSig, pubKey, Source::TempKey));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Certificate)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Device certificate
|
|
{
|
|
uint8_t certBuf[1024]{};
|
|
uint16_t certLen = sizeof(certBuf);
|
|
EXPECT_TRUE(unit->readDeviceCertificate(certBuf, certLen));
|
|
EXPECT_GT(certLen, 0);
|
|
|
|
// Verify DER structure: first byte should be SEQUENCE tag (0x30)
|
|
EXPECT_EQ(certBuf[0], 0x30) << "Device cert should start with DER SEQUENCE tag";
|
|
}
|
|
|
|
// Signer certificate
|
|
{
|
|
uint8_t certBuf[1024]{};
|
|
uint16_t certLen = sizeof(certBuf);
|
|
EXPECT_TRUE(unit->readSignerCertificate(certBuf, certLen));
|
|
EXPECT_GT(certLen, 0);
|
|
|
|
// Verify DER structure: first byte should be SEQUENCE tag (0x30)
|
|
EXPECT_EQ(certBuf[0], 0x30) << "Signer cert should start with DER SEQUENCE tag";
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SHA256_Convenience)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Test the convenience SHA256() method against known test vectors
|
|
for (int i = 0; i < m5::stl::size(sha256_test_vectors); ++i) {
|
|
uint8_t digest[32]{};
|
|
auto& e = sha256_test_vectors[i];
|
|
SCOPED_TRACE(e.name);
|
|
|
|
EXPECT_TRUE(clear_tempkey(unit.get()));
|
|
|
|
EXPECT_TRUE(unit->SHA256(Destination::TempKey, digest, e.input, e.input_len));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0);
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SHA256_MultiBlock)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// "100_a" test vector split into multiple updateSHA256 calls
|
|
auto& e = sha256_test_vectors[4]; // 100_a
|
|
EXPECT_EQ(e.input_len, 100);
|
|
|
|
// Split: 64 + 36
|
|
{
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, 64));
|
|
EXPECT_TRUE(unit->updateSHA256(e.input + 64, 36));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0) << "64+36 split";
|
|
}
|
|
|
|
// Split: 32 + 32 + 32 + 4
|
|
{
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(e.input, 32));
|
|
EXPECT_TRUE(unit->updateSHA256(e.input + 32, 32));
|
|
EXPECT_TRUE(unit->updateSHA256(e.input + 64, 32));
|
|
EXPECT_TRUE(unit->updateSHA256(e.input + 96, 4));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
EXPECT_TRUE(memcmp(digest, e.expected, 32) == 0) << "32+32+32+4 split";
|
|
}
|
|
|
|
// Split: 1 byte at a time for first 3 bytes ("abc" equivalent prefix), then rest
|
|
{
|
|
auto& abc = sha256_test_vectors[1]; // "abc"
|
|
uint8_t digest[32]{};
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->updateSHA256(abc.input, 1));
|
|
EXPECT_TRUE(unit->updateSHA256(abc.input + 1, 1));
|
|
EXPECT_TRUE(unit->updateSHA256(abc.input + 2, 1));
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
EXPECT_TRUE(memcmp(digest, abc.expected, 32) == 0) << "1+1+1 split";
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ConfigZoneValidation)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t cfg[128]{};
|
|
EXPECT_TRUE(unit->readConfigZone(cfg));
|
|
|
|
// Validate I2C address (byte 16): ATECC608B-TNGTLS default is 0x6A (0x35 << 1)
|
|
EXPECT_EQ(cfg[16], 0x6A) << "I2C address should be 0x6A (7-bit: 0x35)";
|
|
|
|
// Validate serial number consistency: SN[0:1] at bytes 0-3, SN[2:3] at bytes 8-12
|
|
// SN[0] and SN[1] are fixed by Microchip
|
|
uint8_t sn[9]{};
|
|
EXPECT_TRUE(unit->readSerialNumber(sn));
|
|
EXPECT_EQ(cfg[0], sn[0]);
|
|
EXPECT_EQ(cfg[1], sn[1]);
|
|
EXPECT_EQ(cfg[2], sn[2]);
|
|
EXPECT_EQ(cfg[3], sn[3]);
|
|
EXPECT_EQ(cfg[8], sn[4]);
|
|
EXPECT_EQ(cfg[9], sn[5]);
|
|
EXPECT_EQ(cfg[10], sn[6]);
|
|
EXPECT_EQ(cfg[11], sn[7]);
|
|
EXPECT_EQ(cfg[12], sn[8]);
|
|
|
|
// LockConfig (byte 87): 0x00 = locked
|
|
EXPECT_EQ(cfg[87], 0x00) << "Config zone should be locked";
|
|
// LockValue (byte 86): 0x00 = locked
|
|
EXPECT_EQ(cfg[86], 0x00) << "Data zone should be locked";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, OTPValidation)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t otp[64]{};
|
|
EXPECT_TRUE(unit->readOTPZone(otp));
|
|
|
|
// OTP zone should not be all zeros (TNGTLS has provisioned data)
|
|
EXPECT_FALSE(std::all_of(std::begin(otp), std::end(otp), [](const uint8_t v) { return v == 0; }))
|
|
<< "OTP zone should contain provisioned data";
|
|
|
|
// First 32 bytes and second 32 bytes should not be identical
|
|
EXPECT_NE(memcmp(otp, otp + 32, 32), 0) << "OTP halves should differ";
|
|
|
|
// Re-read and compare for consistency
|
|
uint8_t otp2[64]{};
|
|
EXPECT_TRUE(unit->readOTPZone(otp2));
|
|
EXPECT_EQ(memcmp(otp, otp2, 64), 0) << "OTP reads should be consistent";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Revision)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// revision() returns cached value from begin()
|
|
auto rev = unit->revision();
|
|
EXPECT_NE(rev, nullptr);
|
|
if (!rev) {
|
|
return;
|
|
}
|
|
|
|
// ATECC608B: RevNum = 00 00 60 03+
|
|
EXPECT_EQ(rev[0], 0x00);
|
|
EXPECT_EQ(rev[1], 0x00);
|
|
EXPECT_EQ(rev[2], 0x60);
|
|
EXPECT_GE(rev[3], 0x03);
|
|
|
|
// Should match a fresh readRevision()
|
|
uint8_t fresh[4]{};
|
|
EXPECT_TRUE(unit->readRevision(fresh));
|
|
EXPECT_EQ(memcmp(rev, fresh, 4), 0);
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SlotSize)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// ATECC608B-TNGTLS slot sizes per datasheet
|
|
for (uint8_t s = 0; s <= 7; ++s) {
|
|
EXPECT_EQ(unit->getSlotSize((Slot)s), 36) << "Slot " << (int)s;
|
|
}
|
|
EXPECT_EQ(unit->getSlotSize(Slot::GeneralData), 416) << "Slot 8";
|
|
for (uint8_t s = 9; s <= 15; ++s) {
|
|
EXPECT_EQ(unit->getSlotSize((Slot)s), 72) << "Slot " << (int)s;
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Config)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
auto cfg = unit->config();
|
|
EXPECT_TRUE(cfg.idle); // default
|
|
|
|
UnitATECC608B_TNGTLS::config_t cfg2;
|
|
cfg2.idle = false;
|
|
unit->config(cfg2);
|
|
EXPECT_FALSE(unit->config().idle);
|
|
|
|
// Restore
|
|
unit->config(cfg);
|
|
EXPECT_TRUE(unit->config().idle);
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, WakeupIdleSleep)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint16_t state{};
|
|
|
|
// Write nonce to TempKey, then idle — TempKey should be preserved
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey,
|
|
(const uint8_t[]){0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B,
|
|
0x0C, 0x0D, 0x0E, 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16,
|
|
0x17, 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20}));
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state));
|
|
|
|
// Idle preserves SRAM (device is already idle after writeNonce32, so wakeup first)
|
|
EXPECT_TRUE(unit->wakeup());
|
|
EXPECT_TRUE(unit->idle());
|
|
EXPECT_TRUE(unit->wakeup());
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_TRUE(is_valid_tempkey(state)) << "TempKey should survive idle";
|
|
|
|
// Sleep clears SRAM (wakeup first since device is idle after readDeviceState)
|
|
EXPECT_TRUE(unit->wakeup());
|
|
EXPECT_TRUE(unit->sleep());
|
|
EXPECT_TRUE(unit->wakeup());
|
|
EXPECT_TRUE(unit->readDeviceState(state));
|
|
EXPECT_FALSE(is_valid_tempkey(state)) << "TempKey should be cleared after sleep";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Counter_InvalidID)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Only counter IDs 0 and 1 are valid
|
|
uint32_t val{};
|
|
EXPECT_TRUE(unit->readCounter(val, 0));
|
|
EXPECT_TRUE(unit->readCounter(val, 1));
|
|
EXPECT_FALSE(unit->readCounter(val, 2));
|
|
EXPECT_FALSE(unit->readCounter(val, 255));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ReadRandom_NoArgs)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// readRandom(T&) without range arguments — full range of type
|
|
uint8_t u8{};
|
|
EXPECT_TRUE(unit->readRandom(u8));
|
|
int32_t i32{};
|
|
EXPECT_TRUE(unit->readRandom(i32));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ReadRandom_Boundary)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t val{};
|
|
|
|
// lower == upper should fail (empty range)
|
|
EXPECT_FALSE(unit->readRandom(val, (uint8_t)5, (uint8_t)5));
|
|
|
|
// upper == lower+1: always returns lower
|
|
for (int i = 0; i < 3; ++i) {
|
|
EXPECT_TRUE(unit->readRandom(val, (uint8_t)42, (uint8_t)43));
|
|
EXPECT_EQ(val, 42);
|
|
}
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, Certificate_Deeper)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Device certificate
|
|
uint8_t devCert[1024]{};
|
|
uint16_t devLen = sizeof(devCert);
|
|
EXPECT_TRUE(unit->readDeviceCertificate(devCert, devLen));
|
|
EXPECT_GT(devLen, 0);
|
|
EXPECT_EQ(devCert[0], 0x30) << "DER SEQUENCE tag";
|
|
|
|
// DER length field: long form if byte 1 has bit 7 set
|
|
uint16_t derContentLen = 0;
|
|
if (devCert[1] & 0x80) {
|
|
uint8_t numLenBytes = devCert[1] & 0x7F;
|
|
EXPECT_LE(numLenBytes, 2) << "DER length should be 1 or 2 bytes";
|
|
for (uint8_t i = 0; i < numLenBytes; ++i) {
|
|
derContentLen = (derContentLen << 8) | devCert[2 + i];
|
|
}
|
|
EXPECT_EQ(devLen, derContentLen + 2 + numLenBytes) << "DER total length mismatch";
|
|
}
|
|
|
|
// Device cert public key should match generatePublicKey(Slot::PrimaryPrivateKey)
|
|
uint8_t pubKey[64]{};
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey, Slot::PrimaryPrivateKey));
|
|
// The public key appears somewhere in the DER-encoded certificate
|
|
bool found = false;
|
|
for (uint16_t i = 0; i + 64 <= devLen; ++i) {
|
|
if (memcmp(&devCert[i], pubKey, 64) == 0) {
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
EXPECT_TRUE(found) << "Device cert should contain the public key from Slot 0";
|
|
|
|
// Signer certificate
|
|
uint8_t signerCert[1024]{};
|
|
uint16_t signerLen = sizeof(signerCert);
|
|
EXPECT_TRUE(unit->readSignerCertificate(signerCert, signerLen));
|
|
EXPECT_GT(signerLen, 0);
|
|
EXPECT_EQ(signerCert[0], 0x30) << "Signer cert DER SEQUENCE tag";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SelfTest_Individual)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Test individual self-test bits
|
|
uint8_t result{0xFF};
|
|
|
|
// RNG/DRBG (bit 0)
|
|
EXPECT_TRUE(unit->selfTest(result, 0x01));
|
|
EXPECT_EQ(result, 0x00);
|
|
|
|
// ECDSA (bit 2)
|
|
result = 0xFF;
|
|
EXPECT_TRUE(unit->selfTest(result, 0x04));
|
|
EXPECT_EQ(result, 0x00);
|
|
|
|
// SHA (bit 5)
|
|
result = 0xFF;
|
|
EXPECT_TRUE(unit->selfTest(result, 0x20));
|
|
EXPECT_EQ(result, 0x00);
|
|
}
|
|
|
|
// --- A. OTPValidation depth improvement is done inline above ---
|
|
|
|
// --- B. verifyStored: verify signature using stored public key in Slot 11 ---
|
|
TEST_F(TestATECC608B_TNGTLS, VerifyStored)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t signature[64]{};
|
|
const uint8_t digest[32] = {0xA0, 0xB1, 0xC2, 0xD3, 0xE4, 0xF5, 0x06, 0x17, 0x28, 0x39, 0x4A,
|
|
0x5B, 0x6C, 0x7D, 0x8E, 0x9F, 0x10, 0x21, 0x32, 0x43, 0x54, 0x65,
|
|
0x76, 0x87, 0x98, 0xA9, 0xBA, 0xCB, 0xDC, 0xED, 0xFE, 0x0F};
|
|
|
|
// Sign with Slot 0 (PrimaryPrivateKey), verify with Slot 11 (SignerPublicKey)
|
|
// Slot 11 stores the signer's public key — this verifies signer-signed messages, not device-signed.
|
|
// Instead, sign with Slot 0 and verify externally, then use verifyStored with Slot 11 for a signer test.
|
|
|
|
// First, verify that Slot 11 has a valid public key by reading it
|
|
uint8_t signerPubKey[72]{};
|
|
EXPECT_TRUE(unit->readDataZone(signerPubKey, 72, Slot::SignerPublicKey));
|
|
EXPECT_FALSE(std::all_of(std::begin(signerPubKey), std::end(signerPubKey), [](uint8_t v) { return v == 0; }))
|
|
<< "Slot 11 should contain signer public key";
|
|
|
|
// Sign externally with Slot 0 and verify with external pubkey (baseline)
|
|
uint8_t pubKey0[64]{};
|
|
EXPECT_TRUE(unit->generatePublicKey(pubKey0, Slot::PrimaryPrivateKey));
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_TRUE(unit->signExternal(signature, Slot::PrimaryPrivateKey, Source::TempKey));
|
|
|
|
// verifyStored uses Slot's stored public key — Slot 11 is signer key, not Slot 0 key
|
|
// So verification with Slot 11 should FAIL (signed with Slot 0's private key, not signer's)
|
|
EXPECT_TRUE(unit->writeNonce32(Destination::TempKey, digest));
|
|
EXPECT_FALSE(unit->verifyStored(nullptr, signature, Slot::SignerPublicKey, Source::TempKey))
|
|
<< "Slot 11 key != Slot 0 key, verification should fail";
|
|
}
|
|
|
|
// --- C. Edge cases ---
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, InvalidSlotNumber)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint16_t cfg{};
|
|
// Slots 7, 13, 14, 15 are reserved in TNGTLS but valid slot numbers (0-15)
|
|
// Slot numbers beyond 15 are invalid for readSlotConfig/readKeyConfig
|
|
// (the Slot enum is uint8_t, so we cast to test out-of-range)
|
|
|
|
// readDataZone with reserved/non-readable slots
|
|
uint8_t buf[36]{};
|
|
// Slot 0 (private key) should not be readable on locked TNGTLS
|
|
EXPECT_FALSE(unit->readDataZone(buf, 36, Slot::PrimaryPrivateKey));
|
|
// Slot 1 (private key) should not be readable
|
|
EXPECT_FALSE(unit->readDataZone(buf, 36, Slot::InternalSignPrivateKey));
|
|
|
|
// readKeyValid on non-ECC slot: command succeeds but valid should be false
|
|
bool valid{true};
|
|
EXPECT_TRUE(unit->readKeyValid(valid, Slot::MACAddress));
|
|
EXPECT_FALSE(valid) << "Slot 5 (MAC Address) is not an ECC key slot";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, SHA256_Error)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t digest[32]{};
|
|
|
|
// finalizeSHA256 without startSHA256 should fail
|
|
EXPECT_FALSE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
|
|
// Double startSHA256 — second start should reset, then finalize with empty message
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
EXPECT_TRUE(unit->startSHA256());
|
|
// Finalize immediately after start: SHA256 of empty message
|
|
EXPECT_TRUE(unit->finalizeSHA256(Destination::TempKey, digest));
|
|
// SHA256("") = e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
|
const uint8_t sha256_empty[] = {0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, 0x9a, 0xfb, 0xf4,
|
|
0xc8, 0x99, 0x6f, 0xb9, 0x24, 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b,
|
|
0x93, 0x4c, 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55};
|
|
EXPECT_EQ(memcmp(digest, sha256_empty, 32), 0) << "SHA256 of empty message mismatch";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ReadDataZone_SizeMismatch)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Slot 8 is 416 bytes (GeneralData)
|
|
EXPECT_EQ(unit->getSlotSize(Slot::GeneralData), 416);
|
|
|
|
// Read with correct size should succeed
|
|
uint8_t buf[416]{};
|
|
EXPECT_TRUE(unit->readDataZone(buf, 416, Slot::GeneralData));
|
|
|
|
// Read with smaller size
|
|
uint8_t smallBuf[32]{};
|
|
EXPECT_TRUE(unit->readDataZone(smallBuf, 32, Slot::GeneralData));
|
|
|
|
// Slot 10 (DeviceCompressedCertificate) is 72 bytes
|
|
EXPECT_EQ(unit->getSlotSize(Slot::DeviceCompressedCertificate), 72);
|
|
uint8_t certBuf[72]{};
|
|
EXPECT_TRUE(unit->readDataZone(certBuf, 72, Slot::DeviceCompressedCertificate));
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, CertificateChainVerification)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Read device certificate
|
|
uint8_t devCert[1024]{};
|
|
uint16_t devLen = sizeof(devCert);
|
|
EXPECT_TRUE(unit->readDeviceCertificate(devCert, devLen));
|
|
EXPECT_GT(devLen, 0);
|
|
|
|
// Read signer certificate
|
|
uint8_t signerCert[1024]{};
|
|
uint16_t signerLen = sizeof(signerCert);
|
|
EXPECT_TRUE(unit->readSignerCertificate(signerCert, signerLen));
|
|
EXPECT_GT(signerLen, 0);
|
|
|
|
// Device cert and signer cert should be different
|
|
if (devLen == signerLen) {
|
|
EXPECT_NE(memcmp(devCert, signerCert, devLen), 0) << "Device and signer certs should differ";
|
|
}
|
|
|
|
// Slot 11 (SignerPublicKey) should be readable and non-zero
|
|
uint8_t signerPubKey[72]{};
|
|
EXPECT_TRUE(unit->readDataZone(signerPubKey, 72, Slot::SignerPublicKey));
|
|
EXPECT_FALSE(std::all_of(std::begin(signerPubKey), std::end(signerPubKey), [](uint8_t v) { return v == 0; }))
|
|
<< "Slot 11 should contain signer public key";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ReadWriteGeneralData)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
// Save original data at offset 0
|
|
uint8_t original[32]{};
|
|
EXPECT_TRUE(unit->readGeneralData(original, 32, 0));
|
|
|
|
// Write test pattern
|
|
uint8_t pattern[32]{};
|
|
for (uint8_t i = 0; i < 32; ++i) {
|
|
pattern[i] = i ^ 0xA5;
|
|
}
|
|
EXPECT_TRUE(unit->writeGeneralData(pattern, 32, 0));
|
|
|
|
// Read back and verify
|
|
uint8_t readback[32]{};
|
|
EXPECT_TRUE(unit->readGeneralData(readback, 32, 0));
|
|
EXPECT_EQ(memcmp(pattern, readback, 32), 0) << "Write/read mismatch at offset 0";
|
|
|
|
// Write at offset 352
|
|
uint8_t pattern2[32]{};
|
|
for (uint8_t i = 0; i < 32; ++i) {
|
|
pattern2[i] = i ^ 0x5A;
|
|
}
|
|
EXPECT_TRUE(unit->writeGeneralData(pattern2, 32, 352));
|
|
|
|
uint8_t readback2[32]{};
|
|
EXPECT_TRUE(unit->readGeneralData(readback2, 32, 352));
|
|
EXPECT_EQ(memcmp(pattern2, readback2, 32), 0) << "Write/read mismatch at offset 352";
|
|
|
|
// Restore original data at offset 0
|
|
EXPECT_TRUE(unit->writeGeneralData(original, 32, 0));
|
|
|
|
// Verify restore
|
|
uint8_t verify[32]{};
|
|
EXPECT_TRUE(unit->readGeneralData(verify, 32, 0));
|
|
EXPECT_EQ(memcmp(original, verify, 32), 0) << "Restore failed";
|
|
}
|
|
|
|
TEST_F(TestATECC608B_TNGTLS, ReadWriteGeneralData_InvalidArgs)
|
|
{
|
|
SCOPED_TRACE(ustr);
|
|
|
|
uint8_t buf[32]{};
|
|
|
|
// Non-aligned offset
|
|
EXPECT_FALSE(unit->readGeneralData(buf, 32, 13));
|
|
EXPECT_FALSE(unit->writeGeneralData(buf, 32, 13));
|
|
|
|
// Non-aligned len
|
|
EXPECT_FALSE(unit->readGeneralData(buf, 7, 0));
|
|
EXPECT_FALSE(unit->writeGeneralData(buf, 7, 0));
|
|
|
|
// Offset beyond slot
|
|
EXPECT_FALSE(unit->readGeneralData(buf, 32, 416));
|
|
EXPECT_FALSE(unit->writeGeneralData(buf, 32, 416));
|
|
|
|
// nullptr
|
|
EXPECT_FALSE(unit->readGeneralData(nullptr, 32, 0));
|
|
EXPECT_FALSE(unit->writeGeneralData(nullptr, 32, 0));
|
|
|
|
// Zero len
|
|
EXPECT_FALSE(unit->readGeneralData(buf, 0, 0));
|
|
EXPECT_FALSE(unit->writeGeneralData(buf, 0, 0));
|
|
}
|