From: Tedd Ho-Jeong An <[email protected]>
This patch adds extra test cases for load_long_term_keys command.
---
tools/mgmt-tester.c | 299 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 299 insertions(+)
diff --git a/tools/mgmt-tester.c b/tools/mgmt-tester.c
index da53e4484..3feb62f1a 100644
--- a/tools/mgmt-tester.c
+++ b/tools/mgmt-tester.c
@@ -2690,6 +2690,224 @@ static const struct generic_data load_link_keys_invalid_params_test_3 = {
};
static const char load_ltks_valid_param_1[] = { 0x00, 0x00 };
+
+static const char load_ltks_valid_param_2[] = {
+ 0x01, 0x00, /* count */
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+};
+
+/* 20 keys at once */
+static const char load_ltks_valid_param_20[] = {
+ 0x14, 0x00, /* count */
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x01, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x02, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x03, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x04, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x05, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x06, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x07, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x08, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x09, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0a, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0b, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0c, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0d, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0e, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x0f, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x10, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x11, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x12, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+ 0x13, 0x01, 0x02, 0x03, 0x04, 0x05, /* bdaddr */
+ 0x01, /* addr type */
+ 0x00, /* authenticated */
+ 0x00, /* master */
+ 0x00, /* encryption size */
+ 0x00, 0x00, /* diversifier */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+};
+
/* Invalid key count */
static const char load_ltks_invalid_param_1[] = { 0x01, 0x00 };
/* Invalid addr type */
@@ -2726,6 +2944,35 @@ static const struct generic_data load_ltks_success_test_1 = {
.expect_status = MGMT_STATUS_SUCCESS,
};
+static const struct generic_data load_ltks_success_test_2 = {
+ .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+ .send_param = load_ltks_valid_param_2,
+ .send_len = sizeof(load_ltks_valid_param_2),
+ .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_3 = {
+ .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+ .send_param = load_ltks_valid_param_2,
+ .send_len = sizeof(load_ltks_valid_param_2),
+ .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_4 = {
+ .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+ .send_param = load_ltks_valid_param_20,
+ .send_len = sizeof(load_ltks_valid_param_20),
+ .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_5 = {
+ .setup_settings = settings_powered_le,
+ .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+ .send_param = load_ltks_valid_param_20,
+ .send_len = sizeof(load_ltks_valid_param_20),
+ .expect_status = MGMT_STATUS_SUCCESS,
+};
+
static const struct generic_data load_ltks_invalid_params_test_1 = {
.send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
.send_param = load_ltks_invalid_param_1,
@@ -6312,6 +6559,46 @@ static void setup_uuid_mix(const void *test_data)
setup_powered_callback, NULL, NULL);
}
+static void setup_load_ltks_callback(uint8_t status, uint16_t length,
+ const void *param, void *user_data)
+{
+ if (status != MGMT_STATUS_SUCCESS) {
+ tester_setup_failed();
+ return;
+ }
+
+ tester_print("Loaded Long Term Key");
+}
+
+static void setup_load_ltks_20_by_1(const void *test_data)
+{
+ struct test_data *data = tester_get_data();
+ struct mgmt_cp_load_long_term_keys *cp;
+ struct mgmt_ltk_info *info;
+ unsigned char param[sizeof(*cp) + sizeof(*info)] = { 0x00 };
+ unsigned char param_on[] = { 0x01 };
+ int i;
+
+ cp = (struct mgmt_cp_load_long_term_keys *)param;
+ cp->key_count = 1;
+
+ info = (struct mgmt_ltk_info *)cp->keys;
+ info->addr.type = 0x01; /* LE Public */
+
+ for (i = 0; i < 20; i++) {
+ /* Update BDADDR */
+ info->addr.bdaddr.b[0] = i + 1;
+
+ mgmt_send(data->mgmt, MGMT_OP_LOAD_LONG_TERM_KEYS,
+ data->mgmt_index, sizeof(param), param,
+ setup_load_ltks_callback, NULL, NULL);
+ }
+
+ mgmt_send(data->mgmt, MGMT_OP_SET_POWERED, data->mgmt_index,
+ sizeof(param_on), param_on,
+ setup_powered_callback, NULL, NULL);
+}
+
static void setup_add_device(const void *test_data)
{
struct test_data *data = tester_get_data();
@@ -10632,6 +10919,18 @@ int main(int argc, char *argv[])
test_bredrle("Load Long Term Keys - Success 1",
&load_ltks_success_test_1,
NULL, test_command_generic);
+ test_bredrle("Load Long Term Keys - Success 2",
+ &load_ltks_success_test_2,
+ NULL, test_command_generic);
+ test_bredrle("Load Long Term Keys - Success 3 (20 with count 1)",
+ &load_ltks_success_test_3,
+ setup_load_ltks_20_by_1, test_command_generic);
+ test_bredrle("Load Long Term Keys - Success 4 (20 with count 20)",
+ &load_ltks_success_test_4,
+ NULL, test_command_generic);
+ test_bredrle("Load Long Term Keys - Success 5 (Power On and 20 keys)",
+ &load_ltks_success_test_5,
+ NULL, test_command_generic);
test_bredrle("Load Long Term Keys - Invalid Parameters 1",
&load_ltks_invalid_params_test_1,
NULL, test_command_generic);
--
2.25.1
This is automated email and please do not reply to this email!
Dear submitter,
Thank you for submitting the patches to the linux bluetooth mailing list.
This is a CI test results with your patch series:
PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=544671
---Test result---
Test Summary:
CheckPatch PASS 0.54 seconds
GitLint PASS 0.10 seconds
Prep - Setup ELL PASS 39.77 seconds
Build - Prep PASS 0.09 seconds
Build - Configure PASS 6.97 seconds
Build - Make PASS 172.58 seconds
Make Check PASS 9.04 seconds
Make Distcheck PASS 202.74 seconds
Build w/ext ELL - Configure PASS 7.01 seconds
Build w/ext ELL - Make PASS 162.56 seconds
Details
##############################
Test: CheckPatch - PASS
Desc: Run checkpatch.pl script with rule in .checkpatch.conf
##############################
Test: GitLint - PASS
Desc: Run gitlint with rule in .gitlint
##############################
Test: Prep - Setup ELL - PASS
Desc: Clone, build, and install ELL
##############################
Test: Build - Prep - PASS
Desc: Prepare environment for build
##############################
Test: Build - Configure - PASS
Desc: Configure the BlueZ source tree
##############################
Test: Build - Make - PASS
Desc: Build the BlueZ source tree
##############################
Test: Make Check - PASS
Desc: Run 'make check'
##############################
Test: Make Distcheck - PASS
Desc: Run distcheck to check the distribution
##############################
Test: Build w/ext ELL - Configure - PASS
Desc: Configure BlueZ source with '--enable-external-ell' configuration
##############################
Test: Build w/ext ELL - Make - PASS
Desc: Build BlueZ source with '--enable-external-ell' configuration
---
Regards,
Linux Bluetooth