#include <stdlib.h>
#include "atca_test.h"
#include "basic/atca_basic.h"
#include "host/atca_host.h"
#include "test/atca_tests.h"
#include "atca_execution.h"
TEST(atca_cmd_unit_test, sign)
{
ATCA_STATUS status;
ATCAPacket packet;
uint16_t keyID = 0;
ATCACommand ca_cmd = _gDevice->mCommands;
unit_test_assert_config_is_locked();
packet.param1 = NONCE_MODE_PASSTHROUGH;
packet.param2 = 0x0000;
memset(packet.data, 0x55, 32);
status = atNonce(ca_cmd, &packet);
TEST_ASSERT_EQUAL_INT(NONCE_COUNT_LONG, packet.txsize);
status = atca_execute_command(&packet, _gDevice);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
TEST_ASSERT_EQUAL_INT(NONCE_RSP_SIZE_SHORT, packet.data[ATCA_COUNT_IDX]);
TEST_ASSERT_EQUAL_INT8(ATCA_SUCCESS, packet.data[ATCA_RSP_DATA_IDX]);
packet.param1 = SIGN_MODE_EXTERNAL;
packet.param2 = keyID;
status = atSign(ca_cmd, &packet);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atca_execute_command(&packet, _gDevice);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
}
TEST(atca_cmd_basic_test, sign)
{
ATCA_STATUS status = ATCA_SUCCESS;
uint8_t msg[ATCA_SHA_DIGEST_SIZE];
uint8_t public_key[ATCA_PUB_KEY_SIZE];
uint8_t signature[ATCA_SIG_SIZE];
uint16_t private_key_id = 0;
bool is_verified = false;
test_assert_config_is_locked();
test_assert_data_is_locked();
status = atcab_random(msg);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcab_genkey(private_key_id, public_key);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcab_sign(private_key_id, msg, signature);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcab_verify_extern(msg, signature, public_key, &is_verified);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
TEST_ASSERT_EQUAL(true, is_verified);
}
TEST(atca_cmd_basic_test, sign_internal)
{
uint8_t internal_key_id = 4; uint16_t private_key_id = 0;
ATCA_STATUS status = ATCA_SUCCESS;
uint8_t config[128];
uint8_t sn[9];
uint8_t public_key[ATCA_PUB_KEY_SIZE];
uint8_t num_in[NONCE_NUMIN_SIZE];
atca_temp_key_t temp_key;
atca_nonce_in_out_t nonce_params;
uint8_t rand_out[RANDOM_NUM_SIZE];
atca_gen_dig_in_out_t gen_dig_params;
uint8_t signature[ATCA_SIG_SIZE];
atca_sign_internal_in_out_t sign_params;
uint8_t msg[ATCA_SHA_DIGEST_SIZE];
bool is_verified = false;
test_assert_config_is_locked();
test_assert_data_is_locked();
status = atcab_read_config_zone(config);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
memcpy(&sn[0], &config[0], 4);
memcpy(&sn[4], &config[8], 5);
status = atcab_genkey(private_key_id, public_key);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
memset(&temp_key, 0, sizeof(temp_key));
memset(&num_in, 0, sizeof(num_in));
memset(&nonce_params, 0, sizeof(nonce_params));
nonce_params.mode = NONCE_MODE_SEED_UPDATE;
nonce_params.zero = 0;
nonce_params.num_in = num_in;
nonce_params.rand_out = rand_out;
nonce_params.temp_key = &temp_key;
status = atcab_nonce_rand(nonce_params.num_in, rand_out);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcah_nonce(&nonce_params);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
memset(&gen_dig_params, 0, sizeof(gen_dig_params));
gen_dig_params.zone = ATCA_ZONE_DATA;
gen_dig_params.key_id = internal_key_id;
gen_dig_params.is_key_nomac = false;
gen_dig_params.stored_value = g_slot4_key;
gen_dig_params.sn = sn;
gen_dig_params.other_data = NULL;
gen_dig_params.temp_key = &temp_key;
status = atcab_gendig(gen_dig_params.zone, gen_dig_params.key_id, NULL, 0);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcah_gen_dig(&gen_dig_params);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
memset(&sign_params, 0, sizeof(sign_params));
sign_params.mode = SIGN_MODE_INTERNAL | SIGN_MODE_INCLUDE_SN;
sign_params.key_id = private_key_id;
sign_params.sn = sn;
sign_params.temp_key = &temp_key;
sign_params.digest = msg;
status = atcab_sign_internal(sign_params.key_id, sign_params.for_invalidate, sign_params.mode & SIGN_MODE_INCLUDE_SN, signature);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcah_config_to_sign_internal(gCfg->devtype, &sign_params, config);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcah_sign_internal_msg(gCfg->devtype, &sign_params);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
status = atcab_verify_extern(sign_params.digest, signature, public_key, &is_verified);
TEST_ASSERT_EQUAL(ATCA_SUCCESS, status);
TEST_ASSERT_EQUAL(true, is_verified);
}
TEST(atca_cmd_basic_test, read_sig)
{
TEST_IGNORE_MESSAGE("Pending");
}
t_test_case_info sign_basic_test_info[] =
{
{ REGISTER_TEST_CASE(atca_cmd_basic_test, sign), DEVICE_MASK(ATECC108A) | DEVICE_MASK(ATECC508A) | DEVICE_MASK(ATECC608A) },
{ REGISTER_TEST_CASE(atca_cmd_basic_test, sign_internal), DEVICE_MASK(ATECC108A) | DEVICE_MASK(ATECC508A) | DEVICE_MASK(ATECC608A) },
{ REGISTER_TEST_CASE(atca_cmd_basic_test, read_sig), DEVICE_MASK(ATECC108A) | DEVICE_MASK(ATECC508A) | DEVICE_MASK(ATECC608A) },
{ (fp_test_case)NULL, (uint8_t)0 },
};
t_test_case_info sign_unit_test_info[] =
{
{ REGISTER_TEST_CASE(atca_cmd_unit_test, sign), DEVICE_MASK(ATECC108A) | DEVICE_MASK(ATECC508A) | DEVICE_MASK(ATECC608A) },
{ (fp_test_case)NULL, (uint8_t)0 },
};