Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3715242ybb; Mon, 6 Apr 2020 14:15:28 -0700 (PDT) X-Google-Smtp-Source: APiQypIEJDjCklhKavZlYjNhaV6vlt+3iUf97CWRfQATkvQ0H41fgJQ/fUI1E99jMBmg8X984DPm X-Received: by 2002:a05:6808:287:: with SMTP id z7mr1180335oic.138.1586207728636; Mon, 06 Apr 2020 14:15:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586207728; cv=none; d=google.com; s=arc-20160816; b=x9FkSiVk+riAIa1jiF+0SyV7SUri/aRVUh6YnW5uhdYxhyMAqcptRo7gPgl+XJz5jR 1xrcebtgIY6ZCWjD/9lo5Iq7n8xxXcDtYMLF+1MqzMW3u5+W5K5u0npYSqd/04kDUI0O bAm5jEb3ajZxpYmbCUV/x69cXgbNjiPBhszP0Fw/mDJm42oAlO6QWsbwmt6smqJxboGQ MWZAFG3YTn77Vpqp16kVOHKGeVHxftd6/YUQ9URVK1beb+ntdaKclwMLnZ3CVo1uwqfY L5jJyh8ZAFrku6gEfK5oDfU+138QxlboMN4FsE/Xcq7dPGU92gu/fUij4+t32LcVH/oL l4/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=WonRw+4ODStzR6anIq5922KAmURvty+C1tiuaqgbIXo=; b=TI3Sr/pizgp+Lvs/m/M8+qu6Y7VuF3kUfBdfqNjgj5mB8olSRuMZtgPlxW9RMXk4f9 x2hGFdKj8qc3+Ve3OxEZE5ndVNx9BWINzDJ+RIHcye3YeF91m2sKrUZorGrJ7VIuRMtg /7WduvMnxfbF4+BE8dBZahVzgKnamF1t8nG7Pn5iKKvQ1QAbhsoZtbzg85uofxxiJzzV xN6CtwRQ5WXjCjvFNYiC7fzBkFw9O+KnIWgUuMf4R+Br9nMub3qx3HyVB/9f2V5pZy7l cLJHDu/AhXyGkZur7ZUIVL2slr00KylO/dWIFRqqBiWmNr7xFqeiBmI/tnxbgRdmIMlS dpjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=pJynulQq; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h19si341296otq.86.2020.04.06.14.14.57; Mon, 06 Apr 2020 14:15:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=pJynulQq; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726112AbgDFVOc (ORCPT + 99 others); Mon, 6 Apr 2020 17:14:32 -0400 Received: from mail-ot1-f66.google.com ([209.85.210.66]:34371 "EHLO mail-ot1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726084AbgDFVOc (ORCPT ); Mon, 6 Apr 2020 17:14:32 -0400 Received: by mail-ot1-f66.google.com with SMTP id m2so938109otr.1 for ; Mon, 06 Apr 2020 14:14:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WonRw+4ODStzR6anIq5922KAmURvty+C1tiuaqgbIXo=; b=pJynulQq3FKQd2FI/LjSkzZ7kQT7z0th/3p4JCtf2+IZL3W4C9rpYmuLrFGAD3+ywl Hfrqasn81+X+w+mwg93SxRkUS5pjRGjsxgyzhQVLaUazNo4Su/YGpY1PwJ97EMgpJEBH qnNIiPQJDi9zNYUxJf3oMlv1VLH1Rn9casLTXQ0NozSqPrICBbAzlH6H+NZdRK4bgGnX Sw23YoC0EMUs5FbhVfMnIVPcB2mEr96DIPg/cJPyJZRmxyILO4ToQPupkW0AtuOlCc+O YfoE6jK/7TCE96lgnEaHSeixG5e8YGmU5cJBkgH40TE8U1zcWBqh4RYOqF6gZojIeZsl wNWw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WonRw+4ODStzR6anIq5922KAmURvty+C1tiuaqgbIXo=; b=J9WRdPb7LWJPQ9pn04DTjGG6Ace9GotHEiJ0h1b/RiQUayAu8ZOssOcwYr9tGf7rHm 7qDWdjjn/XNrCV65MAMNMIdjDhujpkq/GDbJVFpCl4OXlZ952WrRJ3SiIdH2LZoJoK+6 bWsw1dSYhjv0ikVjQeJZG3SZhm4rqQYvsTBWDJNEgKtXuxZWBpfUzMTGJ4nJA84yWEBT 6BHGmFLfsm+HiGnH04hb1hl8MDBMlUJcqS7VD9zR2/vEdKHjo57qBvmWhNzN56bEVZyk PfiKLz2wufLkZicZ64KUQF1WvjBp4xkCTY83C9067zFA7znFDw2WB6oErMM8SYudo662 JJTg== X-Gm-Message-State: AGi0PuY9eCfK+1APtIupIsLg63SQ0Hz0znmhAwhB7KNICqJmF85s0aNU dhUA+HM28tL+eGpKzh+wUgI7d0wdE66RXbMIsNk= X-Received: by 2002:a9d:67c6:: with SMTP id c6mr19207142otn.11.1586207671050; Mon, 06 Apr 2020 14:14:31 -0700 (PDT) MIME-Version: 1.0 References: <20200406114845.255532-1-apusaka@google.com> <20200406194749.Bluez.v3.2.Ieda68013af7fbafbf53fbf7c8fd85ea295153e5e@changeid> In-Reply-To: <20200406194749.Bluez.v3.2.Ieda68013af7fbafbf53fbf7c8fd85ea295153e5e@changeid> From: Luiz Augusto von Dentz Date: Mon, 6 Apr 2020 14:14:19 -0700 Message-ID: Subject: Re: [Bluez PATCH v3 2/3] unit/test-crypto: test for bt_crypto_verify_att_sign To: Archie Pusaka Cc: linux-bluetooth , Archie Pusaka Content-Type: text/plain; charset="UTF-8" Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Hi Archie, On Mon, Apr 6, 2020 at 4:49 AM Archie Pusaka wrote: > > From: Archie Pusaka > > Adding tests for verifying att signature > > --- > > Changes in v3: > - Add unit test > > Changes in v2: None > > unit/test-crypto.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 59 insertions(+) > > diff --git a/unit/test-crypto.c b/unit/test-crypto.c > index e20b2fa66..3bc944be8 100644 > --- a/unit/test-crypto.c > +++ b/unit/test-crypto.c > @@ -272,6 +272,58 @@ static void test_gatt_hash(gconstpointer data) > tester_test_passed(); > } > > +struct verify_sign_test_data { > + const uint8_t *msg; > + uint16_t msg_len; > + const uint8_t *key; > + bool match; > +}; > + > +static const uint8_t msg_to_verify_pass[] = { > + 0xd2, 0x12, 0x00, 0x13, 0x37, 0x01, 0x00, 0x00, 0x00, 0xF1, 0x87, 0x1E, > + 0x93, 0x3C, 0x90, 0x0F, 0xf2 > +}; > + > +static const struct verify_sign_test_data verify_sign_pass_data = { > + .msg = msg_to_verify_pass, > + .msg_len = sizeof(msg_to_verify_pass), > + .key = key_5, > + .match = true, > +}; > + > +static const uint8_t msg_to_verify_bad_sign[] = { > + 0xd2, 0x12, 0x00, 0x13, 0x37, 0x01, 0x00, 0x00, 0x00, 0xF1, 0x87, 0x1E, > + 0x93, 0x3C, 0x90, 0x0F, 0xf1 > +}; > + > +static const struct verify_sign_test_data verify_sign_bad_sign_data = { > + .msg = msg_to_verify_bad_sign, > + .msg_len = sizeof(msg_to_verify_bad_sign), > + .key = key_5, > + .match = false, > +}; > + > +static const uint8_t msg_to_verify_too_short[] = { > + 0xd2, 0x12, 0x00, 0x13, 0x37 > +}; > + > +static const struct verify_sign_test_data verify_sign_too_short_data = { These should be msg_to_verify_too_short. > + .msg = msg_to_verify_bad_sign, > + .msg_len = sizeof(msg_to_verify_bad_sign), > + .key = key_5, > + .match = false, > +}; > + > +static void test_verify_sign(gconstpointer data) > +{ > + const struct verify_sign_test_data *d = data; > + bool result = bt_crypto_verify_att_sign(crypto, d->key, d->msg, > + d->msg_len); > + g_assert(result == d->match); > + > + tester_test_passed(); > +} > + > int main(int argc, char *argv[]) > { > int exit_status; > @@ -292,6 +344,13 @@ int main(int argc, char *argv[]) > > tester_add("/crypto/gatt_hash", NULL, NULL, test_gatt_hash, NULL); > > + tester_add("/crypto/verify_sign_pass", &verify_sign_pass_data, > + NULL, test_verify_sign, NULL); > + tester_add("/crypto/verify_sign_bad_sign", &verify_sign_bad_sign_data, > + NULL, test_verify_sign, NULL); > + tester_add("/crypto/verify_sign_too_short", &verify_sign_too_short_data, > + NULL, test_verify_sign, NULL); > + > exit_status = tester_run(); > > bt_crypto_unref(crypto); > -- > 2.26.0.292.g33ef6b2f38-goog > -- Luiz Augusto von Dentz