• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2021-2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *    http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include <gtest/gtest.h>
17 #include <iostream>
18 
19 #include "file_ex.h"
20 #include "hks_ability.h"
21 #include "hks_config.h"
22 #include "hks_crypto_hal.h"
23 #include "hks_crypto_hal_common.h"
24 #include "hks_mem.h"
25 
26 using namespace testing::ext;
27 namespace OHOS {
28 namespace Security {
29 namespace Huks {
30 namespace UnitTest {
31 namespace {
32 struct TestCaseParams {
33     HksKeySpec spec = {0};
34     HksKeySpec specForAgree = {0};
35 
36     HksErrorCode generateKeyResult = HksErrorCode::HKS_SUCCESS;
37     HksErrorCode agreeResult = HksErrorCode::HKS_SUCCESS;
38 };
39 const uint32_t ALISE_KEY_SIZE = 256;
40 const uint32_t BOB_KEY_SIZE = 256;
41 
42 #ifdef HKS_UNTRUSTED_RUNNING_ENV
43 const TestCaseParams HKS_CRYPTO_HAL_ECDH_AGREE_001_PARAMS = {
44     .spec = {
45         .algType = HKS_ALG_ECC,
46         .keyLen = HKS_ECC_KEY_SIZE_224,
47         .algParam = nullptr,
48     },
49     .specForAgree = {
50         .algType = HKS_ALG_ECDH,
51         .keyLen = HKS_ECC_KEY_SIZE_224,
52         .algParam = nullptr,
53     },
54     .generateKeyResult = HKS_SUCCESS,
55     .agreeResult = HKS_SUCCESS,
56 };
57 #endif
58 
59 const TestCaseParams HKS_CRYPTO_HAL_ECDH_AGREE_002_PARAMS = {
60     .spec = {
61         .algType = HKS_ALG_ECC,
62         .keyLen = HKS_ECC_KEY_SIZE_256,
63         .algParam = nullptr,
64     },
65     .specForAgree = {
66         .algType = HKS_ALG_ECDH,
67         .keyLen = HKS_ECC_KEY_SIZE_256,
68         .algParam = nullptr,
69     },
70     .generateKeyResult = HKS_SUCCESS,
71     .agreeResult = HKS_SUCCESS,
72 };
73 
74 const TestCaseParams HKS_CRYPTO_HAL_ECDH_AGREE_003_PARAMS = {
75     .spec = {
76         .algType = HKS_ALG_ECC,
77         .keyLen = HKS_ECC_KEY_SIZE_384,
78         .algParam = nullptr,
79     },
80     .specForAgree = {
81         .algType = HKS_ALG_ECDH,
82         .keyLen = HKS_ECC_KEY_SIZE_384,
83         .algParam = nullptr,
84     },
85     .generateKeyResult = HKS_SUCCESS,
86     .agreeResult = HKS_SUCCESS,
87 };
88 
89 const TestCaseParams HKS_CRYPTO_HAL_ECDH_AGREE_004_PARAMS = {
90     .spec = {
91         .algType = HKS_ALG_ECC,
92         .keyLen = HKS_ECC_KEY_SIZE_521,
93         .algParam = nullptr,
94     },
95     .specForAgree = {
96         .algType = HKS_ALG_ECDH,
97         .keyLen = HKS_ECC_KEY_SIZE_521,
98         .algParam = nullptr,
99     },
100     .generateKeyResult = HKS_SUCCESS,
101     .agreeResult = HKS_SUCCESS,
102 };
103 }  // namespace
104 
105 class HksCryptoHalEcdhAgree : public HksCryptoHalCommon, public testing::Test {
106 public:
107     static void SetUpTestCase(void);
108     static void TearDownTestCase(void);
109     void SetUp();
110     void TearDown();
111 protected:
RunTestCase(const TestCaseParams & testCaseParams) const112     void RunTestCase(const TestCaseParams &testCaseParams) const
113     {
114         HksBlob alise = { .size = 0, .data = nullptr };
115         HksBlob bob = { .size = 0, .data = nullptr };
116 
117         EXPECT_EQ(HksCryptoHalGenerateKey(&testCaseParams.spec, &alise), testCaseParams.generateKeyResult);
118         EXPECT_EQ(HksCryptoHalGenerateKey(&testCaseParams.spec, &bob), testCaseParams.generateKeyResult);
119 
120         struct HksBlob pubKeyAlise = { .size = ALISE_KEY_SIZE, .data = (uint8_t *)HksMalloc(ALISE_KEY_SIZE) };
121         ASSERT_NE(pubKeyAlise.data, nullptr);
122         struct HksBlob pubKeyBob = { .size = BOB_KEY_SIZE, .data = (uint8_t *)HksMalloc(BOB_KEY_SIZE) };
123         ASSERT_NE(pubKeyBob.data, nullptr);
124 
125         EXPECT_EQ(HksCryptoHalGetPubKey(&alise, &pubKeyAlise), HKS_SUCCESS);
126         EXPECT_EQ(HksCryptoHalGetPubKey(&bob, &pubKeyBob), HKS_SUCCESS);
127 
128         struct HksBlob agreeKeyAlise = { .size = ALISE_KEY_SIZE, .data = (uint8_t *)HksMalloc(ALISE_KEY_SIZE) };
129         ASSERT_NE(agreeKeyAlise.data, nullptr);
130         struct HksBlob agreeKeyBob = { .size = BOB_KEY_SIZE, .data = (uint8_t *)HksMalloc(BOB_KEY_SIZE) };
131         ASSERT_NE(agreeKeyBob.data, nullptr);
132 
133         EXPECT_EQ(HksCryptoHalAgreeKey(&alise, &pubKeyBob, &testCaseParams.specForAgree, &agreeKeyAlise),
134             testCaseParams.agreeResult);
135         EXPECT_EQ(HksCryptoHalAgreeKey(&bob, &pubKeyAlise, &testCaseParams.specForAgree, &agreeKeyBob),
136             testCaseParams.agreeResult);
137 
138         EXPECT_EQ(agreeKeyAlise.size, agreeKeyBob.size);
139         EXPECT_EQ(HksMemCmp(agreeKeyAlise.data, agreeKeyBob.data, agreeKeyAlise.size), HKS_SUCCESS);
140 
141         HKS_FREE(alise.data);
142         HKS_FREE(bob.data);
143         HKS_FREE(pubKeyAlise.data);
144         HKS_FREE(pubKeyBob.data);
145         HKS_FREE(agreeKeyAlise.data);
146         HKS_FREE(agreeKeyBob.data);
147     }
148 };
149 
SetUpTestCase(void)150 void HksCryptoHalEcdhAgree::SetUpTestCase(void)
151 {
152 }
153 
TearDownTestCase(void)154 void HksCryptoHalEcdhAgree::TearDownTestCase(void)
155 {
156 }
157 
SetUp()158 void HksCryptoHalEcdhAgree::SetUp()
159 {
160     EXPECT_EQ(HksCryptoAbilityInit(), 0);
161 }
162 
TearDown()163 void HksCryptoHalEcdhAgree::TearDown()
164 {
165 }
166 
167 #ifdef HKS_UNTRUSTED_RUNNING_ENV
168 /**
169  * @tc.number    : HksCryptoHalEcdhAgree_001
170  * @tc.name      : HksCryptoHalEcdhAgree_001
171  * @tc.desc      : Using HksCryptoHalAgreeKey Agree ECC-224 key.
172  */
173 HWTEST_F(HksCryptoHalEcdhAgree, HksCryptoHalEcdhAgree_001, Function | SmallTest | Level0)
174 {
175     RunTestCase(HKS_CRYPTO_HAL_ECDH_AGREE_001_PARAMS);
176 }
177 #endif
178 
179 /**
180  * @tc.number    : HksCryptoHalEcdhAgree_002
181  * @tc.name      : HksCryptoHalEcdhAgree_002
182  * @tc.desc      : Using HksCryptoHalAgreeKey Agree ECC-256 key.
183  */
184 HWTEST_F(HksCryptoHalEcdhAgree, HksCryptoHalEcdhAgree_002, Function | SmallTest | Level0)
185 {
186     RunTestCase(HKS_CRYPTO_HAL_ECDH_AGREE_002_PARAMS);
187 }
188 
189 /**
190  * @tc.number    : HksCryptoHalEcdhAgree_003
191  * @tc.name      : HksCryptoHalEcdhAgree_003
192  * @tc.desc      : Using HksCryptoHalAgreeKey Agree ECC-384 key.
193  */
194 HWTEST_F(HksCryptoHalEcdhAgree, HksCryptoHalEcdhAgree_003, Function | SmallTest | Level0)
195 {
196     RunTestCase(HKS_CRYPTO_HAL_ECDH_AGREE_003_PARAMS);
197 }
198 
199 /**
200  * @tc.number    : HksCryptoHalEcdhAgree_004
201  * @tc.name      : HksCryptoHalEcdhAgree_004
202  * @tc.desc      : Using HksCryptoHalAgreeKey Agree ECC-521 key.
203  */
204 HWTEST_F(HksCryptoHalEcdhAgree, HksCryptoHalEcdhAgree_004, Function | SmallTest | Level0)
205 {
206     RunTestCase(HKS_CRYPTO_HAL_ECDH_AGREE_004_PARAMS);
207 }
208 }  // namespace UnitTest
209 }  // namespace Huks
210 }  // namespace Security
211 }  // namespace OHOS