Line data Source code
1 : /**
2 : * Copyright Notice:
3 : * Copyright 2025 DMTF. All rights reserved.
4 : * License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/libspdm/blob/main/LICENSE.md
5 : **/
6 :
7 : #include "spdm_unit_test.h"
8 : #include "internal/libspdm_requester_lib.h"
9 :
10 : #if (LIBSPDM_ENABLE_CAPABILITY_ENCAP_CAP) && (LIBSPDM_ENABLE_CAPABILITY_ENDPOINT_INFO_CAP)
11 :
12 : #pragma pack(1)
13 : typedef struct {
14 : spdm_message_header_t header;
15 : /* param1 - subcode of the request
16 : * param2 - Bit[7:4]: reserved
17 : * Bit[3:0]: slot_id */
18 : uint8_t request_attributes;
19 : uint8_t reserved[3];
20 : uint8_t nonce[32];
21 : } spdm_get_endpoint_info_request_max_t;
22 : #pragma pack()
23 :
24 : /* request signature, correct */
25 : spdm_get_endpoint_info_request_max_t m_libspdm_get_endpoint_info_request1 = {
26 : { SPDM_MESSAGE_VERSION_13, SPDM_GET_ENDPOINT_INFO,
27 : SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER, 0},
28 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
29 : {0, 0, 0},
30 : /* nonce */
31 : };
32 : size_t m_libspdm_get_endpoint_info_request1_size =
33 : sizeof(spdm_get_endpoint_info_request_t) + SPDM_NONCE_SIZE;
34 :
35 : /* request signature, correct, with slot_id == 0x1 */
36 : spdm_get_endpoint_info_request_max_t m_libspdm_get_endpoint_info_request2 = {
37 : { SPDM_MESSAGE_VERSION_13, SPDM_GET_ENDPOINT_INFO,
38 : SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER, 0x1},
39 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
40 : {0, 0, 0},
41 : /* nonce */
42 : };
43 : size_t m_libspdm_get_endpoint_info_request2_size =
44 : sizeof(spdm_get_endpoint_info_request_t) + SPDM_NONCE_SIZE;
45 :
46 : /* request signature, correct, with slot_id == 0xF */
47 : spdm_get_endpoint_info_request_max_t m_libspdm_get_endpoint_info_request3 = {
48 : { SPDM_MESSAGE_VERSION_13, SPDM_GET_ENDPOINT_INFO,
49 : SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER, 0xF},
50 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
51 : {0, 0, 0},
52 : /* nonce */
53 : };
54 : size_t m_libspdm_get_endpoint_info_request3_size =
55 : sizeof(spdm_get_endpoint_info_request_t) + SPDM_NONCE_SIZE;
56 :
57 : /* not request signature, correct */
58 : spdm_get_endpoint_info_request_max_t m_libspdm_get_endpoint_info_request4 = {
59 : { SPDM_MESSAGE_VERSION_13, SPDM_GET_ENDPOINT_INFO,
60 : SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER, 0},
61 : 0,
62 : {0, 0, 0},
63 : };
64 : size_t m_libspdm_get_endpoint_info_request4_size =
65 : sizeof(spdm_get_endpoint_info_request_t);
66 :
67 : /**
68 : * Test 1: Successful response to get endpoint_info with signature
69 : * Expected Behavior: get a RETURN_SUCCESS return code,
70 : * correct transcript.message_encap_e size,
71 : * correct response message size and fields
72 : * correct signature verification
73 : **/
74 1 : void libspdm_test_requester_encap_endpoint_info_case1(void **state)
75 : {
76 : libspdm_return_t status;
77 : libspdm_test_context_t *spdm_test_context;
78 : libspdm_context_t *spdm_context;
79 : libspdm_session_info_t* session_info;
80 : size_t response_size;
81 : uint8_t response[LIBSPDM_MAX_SPDM_MSG_SIZE];
82 : spdm_endpoint_info_response_t *spdm_response;
83 : uint32_t endpoint_info_size;
84 : uint8_t endpoint_info_buffer[LIBSPDM_MAX_ENDPOINT_INFO_LENGTH];
85 : void* signature;
86 : size_t signature_size;
87 : bool result;
88 : void *data;
89 : size_t data_size;
90 :
91 1 : spdm_test_context = *state;
92 1 : spdm_context = spdm_test_context->spdm_context;
93 1 : spdm_test_context->case_id = 0x1;
94 1 : spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_13 <<
95 : SPDM_VERSION_NUMBER_SHIFT_BIT;
96 1 : spdm_context->local_context.capability.flags = 0;
97 1 : spdm_context->local_context.capability.flags |=
98 : SPDM_GET_CAPABILITIES_REQUEST_FLAGS_EP_INFO_CAP_SIG;
99 1 : spdm_context->connection_info.capability.flags = 0;
100 1 : spdm_context->connection_info.algorithm.base_hash_algo = m_libspdm_use_hash_algo;
101 1 : spdm_context->connection_info.algorithm.base_asym_algo = m_libspdm_use_asym_algo;
102 1 : spdm_context->connection_info.algorithm.req_base_asym_alg = m_libspdm_use_req_asym_algo;
103 :
104 1 : libspdm_read_requester_public_certificate_chain(m_libspdm_use_hash_algo,
105 : m_libspdm_use_req_asym_algo, &data,
106 : &data_size, NULL, NULL);
107 :
108 1 : spdm_context->local_context.local_cert_chain_provision_size[0] = data_size;
109 1 : spdm_context->local_context.local_cert_chain_provision[0] = data;
110 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
111 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_size = data_size;
112 : libspdm_copy_mem(spdm_context->connection_info.peer_used_cert_chain[0].buffer,
113 : sizeof(spdm_context->connection_info.peer_used_cert_chain[0].buffer),
114 : data, data_size);
115 : #else
116 1 : libspdm_hash_all(
117 : spdm_context->connection_info.algorithm.base_hash_algo,
118 : data, data_size,
119 1 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_hash);
120 1 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_hash_size =
121 1 : libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
122 1 : libspdm_get_leaf_cert_public_key_from_cert_chain(
123 : spdm_context->connection_info.algorithm.base_hash_algo,
124 1 : spdm_context->connection_info.algorithm.req_base_asym_alg,
125 : data, data_size,
126 : &spdm_context->connection_info.peer_used_cert_chain[0].leaf_cert_public_key);
127 : #endif
128 :
129 1 : session_info = NULL;
130 :
131 1 : libspdm_reset_message_encap_e(spdm_context, session_info);
132 1 : response_size = sizeof(response);
133 1 : libspdm_get_random_number(SPDM_NONCE_SIZE,
134 : m_libspdm_get_endpoint_info_request1.nonce);
135 1 : status = libspdm_get_encap_response_endpoint_info(
136 : spdm_context, m_libspdm_get_endpoint_info_request1_size,
137 : &m_libspdm_get_endpoint_info_request1, &response_size, response);
138 :
139 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
140 :
141 : /* response size check */
142 1 : endpoint_info_size = 0;
143 1 : libspdm_generate_device_endpoint_info(
144 : spdm_context, SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER,
145 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
146 : &endpoint_info_size, endpoint_info_buffer);
147 2 : signature_size = libspdm_get_asym_signature_size(
148 1 : spdm_context->connection_info.algorithm.req_base_asym_alg);
149 1 : assert_int_equal(response_size,
150 : sizeof(spdm_endpoint_info_response_t) + SPDM_NONCE_SIZE +
151 : sizeof(uint32_t) + endpoint_info_size + signature_size);
152 1 : spdm_response = (void *)response;
153 :
154 : /* response message check */
155 1 : assert_int_equal(spdm_response->header.request_response_code,
156 : SPDM_ENDPOINT_INFO);
157 :
158 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
159 : /* transcript.message_encap_e size check */
160 : assert_int_equal(spdm_context->transcript.message_encap_e.buffer_size, 0);
161 : #endif
162 :
163 : /* signature verification */
164 1 : status = libspdm_append_message_encap_e(spdm_context, session_info,
165 : &m_libspdm_get_endpoint_info_request1,
166 : m_libspdm_get_endpoint_info_request1_size);
167 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
168 :
169 1 : status = libspdm_append_message_encap_e(spdm_context, session_info, spdm_response,
170 : response_size - signature_size);
171 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
172 :
173 1 : signature = (void *)((uint8_t *)spdm_response + response_size - signature_size);
174 1 : result = libspdm_verify_endpoint_info_signature(
175 : spdm_context, session_info, false, signature, signature_size);
176 1 : assert_true(result);
177 1 : }
178 :
179 : /**
180 : * Test 2: Successful response to get endpoint_info with signature, slot_id == 0x1
181 : * Expected Behavior: get a RETURN_SUCCESS return code,
182 : * correct transcript.message_encap_e size,
183 : * correct response message size and fields
184 : * correct signature verification
185 : **/
186 1 : void libspdm_test_requester_encap_endpoint_info_case2(void **state)
187 : {
188 : libspdm_return_t status;
189 : libspdm_test_context_t *spdm_test_context;
190 : libspdm_context_t *spdm_context;
191 : libspdm_session_info_t* session_info;
192 : size_t response_size;
193 : uint8_t response[LIBSPDM_MAX_SPDM_MSG_SIZE];
194 : spdm_endpoint_info_response_t *spdm_response;
195 : uint32_t endpoint_info_size;
196 : uint8_t endpoint_info_buffer[LIBSPDM_MAX_ENDPOINT_INFO_LENGTH];
197 : void* signature;
198 : size_t signature_size;
199 : bool result;
200 : void *data;
201 : size_t data_size;
202 :
203 1 : spdm_test_context = *state;
204 1 : spdm_context = spdm_test_context->spdm_context;
205 1 : spdm_test_context->case_id = 0x2;
206 1 : spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_13 <<
207 : SPDM_VERSION_NUMBER_SHIFT_BIT;
208 1 : spdm_context->local_context.capability.flags = 0;
209 1 : spdm_context->local_context.capability.flags |=
210 : SPDM_GET_CAPABILITIES_REQUEST_FLAGS_EP_INFO_CAP_SIG;
211 1 : spdm_context->connection_info.capability.flags = 0;
212 1 : spdm_context->connection_info.algorithm.base_hash_algo = m_libspdm_use_hash_algo;
213 1 : spdm_context->connection_info.algorithm.base_asym_algo = m_libspdm_use_asym_algo;
214 1 : spdm_context->connection_info.algorithm.req_base_asym_alg = m_libspdm_use_req_asym_algo;
215 :
216 1 : libspdm_read_requester_public_certificate_chain(m_libspdm_use_hash_algo,
217 : m_libspdm_use_req_asym_algo, &data,
218 : &data_size, NULL, NULL);
219 1 : spdm_context->local_context.local_cert_chain_provision_size[1] = data_size;
220 1 : spdm_context->local_context.local_cert_chain_provision[1] = data;
221 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
222 : spdm_context->connection_info.peer_used_cert_chain[1].buffer_size = data_size;
223 : libspdm_copy_mem(spdm_context->connection_info.peer_used_cert_chain[1].buffer,
224 : sizeof(spdm_context->connection_info.peer_used_cert_chain[1].buffer),
225 : data, data_size);
226 : #else
227 1 : libspdm_hash_all(
228 : spdm_context->connection_info.algorithm.base_hash_algo,
229 : data, data_size,
230 1 : spdm_context->connection_info.peer_used_cert_chain[1].buffer_hash);
231 1 : spdm_context->connection_info.peer_used_cert_chain[1].buffer_hash_size =
232 1 : libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
233 1 : libspdm_get_leaf_cert_public_key_from_cert_chain(
234 : spdm_context->connection_info.algorithm.base_hash_algo,
235 1 : spdm_context->connection_info.algorithm.req_base_asym_alg,
236 : data, data_size,
237 : &spdm_context->connection_info.peer_used_cert_chain[1].leaf_cert_public_key);
238 : #endif
239 :
240 1 : session_info = NULL;
241 :
242 1 : libspdm_reset_message_encap_e(spdm_context, session_info);
243 1 : response_size = sizeof(response);
244 1 : libspdm_get_random_number(SPDM_NONCE_SIZE,
245 : m_libspdm_get_endpoint_info_request1.nonce);
246 1 : status = libspdm_get_encap_response_endpoint_info(
247 : spdm_context, m_libspdm_get_endpoint_info_request2_size,
248 : &m_libspdm_get_endpoint_info_request2, &response_size, response);
249 :
250 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
251 :
252 : /* response size check */
253 1 : endpoint_info_size = 0;
254 1 : libspdm_generate_device_endpoint_info(
255 : spdm_context, SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER,
256 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
257 : &endpoint_info_size, endpoint_info_buffer);
258 2 : signature_size = libspdm_get_asym_signature_size(
259 1 : spdm_context->connection_info.algorithm.req_base_asym_alg);
260 1 : assert_int_equal(response_size,
261 : sizeof(spdm_endpoint_info_response_t) + SPDM_NONCE_SIZE +
262 : sizeof(uint32_t) + endpoint_info_size + signature_size);
263 1 : spdm_response = (void *)response;
264 :
265 : /* response message check */
266 1 : assert_int_equal(spdm_response->header.request_response_code,
267 : SPDM_ENDPOINT_INFO);
268 :
269 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
270 : /* transcript.message_encap_e size check */
271 : assert_int_equal(spdm_context->transcript.message_encap_e.buffer_size, 0);
272 : #endif
273 :
274 : /* signature verification */
275 1 : status = libspdm_append_message_encap_e(spdm_context, session_info,
276 : &m_libspdm_get_endpoint_info_request2,
277 : m_libspdm_get_endpoint_info_request2_size);
278 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
279 :
280 1 : status = libspdm_append_message_encap_e(spdm_context, session_info, spdm_response,
281 : response_size - signature_size);
282 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
283 :
284 1 : signature = (void *)((uint8_t *)spdm_response + response_size - signature_size);
285 1 : result = libspdm_verify_endpoint_info_signature(
286 : spdm_context, session_info, false, signature, signature_size);
287 1 : assert_true(result);
288 1 : }
289 :
290 : /**
291 : * Test 3: Successful response to get endpoint_info with signature, slot_id == 0xF
292 : * Expected Behavior: get a RETURN_SUCCESS return code,
293 : * correct transcript.message_encap_e size,
294 : * correct response message size and fields
295 : * correct signature verification
296 : **/
297 1 : void libspdm_test_requester_encap_endpoint_info_case3(void **state)
298 : {
299 : libspdm_return_t status;
300 : libspdm_test_context_t *spdm_test_context;
301 : libspdm_context_t *spdm_context;
302 : libspdm_session_info_t* session_info;
303 : size_t response_size;
304 : uint8_t response[LIBSPDM_MAX_SPDM_MSG_SIZE];
305 : spdm_endpoint_info_response_t *spdm_response;
306 : uint32_t endpoint_info_size;
307 : uint8_t endpoint_info_buffer[LIBSPDM_MAX_ENDPOINT_INFO_LENGTH];
308 : void* signature;
309 : size_t signature_size;
310 : bool result;
311 : void *data;
312 : size_t data_size;
313 :
314 1 : spdm_test_context = *state;
315 1 : spdm_context = spdm_test_context->spdm_context;
316 1 : spdm_test_context->case_id = 0x3;
317 1 : spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_13 <<
318 : SPDM_VERSION_NUMBER_SHIFT_BIT;
319 1 : spdm_context->local_context.capability.flags = 0;
320 1 : spdm_context->local_context.capability.flags |=
321 : SPDM_GET_CAPABILITIES_REQUEST_FLAGS_EP_INFO_CAP_SIG;
322 1 : spdm_context->connection_info.capability.flags = 0;
323 1 : spdm_context->connection_info.algorithm.base_hash_algo = m_libspdm_use_hash_algo;
324 1 : spdm_context->connection_info.algorithm.base_asym_algo = m_libspdm_use_asym_algo;
325 1 : spdm_context->connection_info.algorithm.req_base_asym_alg = m_libspdm_use_req_asym_algo;
326 :
327 1 : libspdm_read_requester_public_key(m_libspdm_use_req_asym_algo, &data, &data_size);
328 1 : spdm_context->local_context.local_public_key_provision = data;
329 1 : spdm_context->local_context.local_public_key_provision_size = data_size;
330 1 : spdm_context->connection_info.peer_used_cert_chain_slot_id = 0xF;
331 1 : spdm_context->local_context.peer_public_key_provision = data;
332 1 : spdm_context->local_context.peer_public_key_provision_size = data_size;
333 :
334 1 : session_info = NULL;
335 :
336 1 : libspdm_reset_message_encap_e(spdm_context, session_info);
337 1 : response_size = sizeof(response);
338 1 : libspdm_get_random_number(SPDM_NONCE_SIZE,
339 : m_libspdm_get_endpoint_info_request1.nonce);
340 1 : status = libspdm_get_encap_response_endpoint_info(
341 : spdm_context, m_libspdm_get_endpoint_info_request3_size,
342 : &m_libspdm_get_endpoint_info_request3, &response_size, response);
343 :
344 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
345 :
346 : /* response size check */
347 1 : endpoint_info_size = 0;
348 1 : libspdm_generate_device_endpoint_info(
349 : spdm_context, SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER,
350 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
351 : &endpoint_info_size, endpoint_info_buffer);
352 2 : signature_size = libspdm_get_asym_signature_size(
353 1 : spdm_context->connection_info.algorithm.req_base_asym_alg);
354 1 : assert_int_equal(response_size,
355 : sizeof(spdm_endpoint_info_response_t) + SPDM_NONCE_SIZE +
356 : sizeof(uint32_t) + endpoint_info_size + signature_size);
357 1 : spdm_response = (void *)response;
358 :
359 : /* response message check */
360 1 : assert_int_equal(spdm_response->header.request_response_code,
361 : SPDM_ENDPOINT_INFO);
362 :
363 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
364 : /* transcript.message_encap_e size check */
365 : assert_int_equal(spdm_context->transcript.message_encap_e.buffer_size, 0);
366 : #endif
367 :
368 : /* signature verification */
369 1 : status = libspdm_append_message_encap_e(spdm_context, session_info,
370 : &m_libspdm_get_endpoint_info_request3,
371 : m_libspdm_get_endpoint_info_request3_size);
372 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
373 :
374 1 : status = libspdm_append_message_encap_e(spdm_context, session_info, spdm_response,
375 : response_size - signature_size);
376 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
377 :
378 1 : signature = (void *)((uint8_t *)spdm_response + response_size - signature_size);
379 1 : result = libspdm_verify_endpoint_info_signature(
380 : spdm_context, session_info, false, signature, signature_size);
381 1 : assert_true(result);
382 1 : }
383 :
384 : /**
385 : * Test 4: Successful response to get endpoint_info without signature
386 : * Expected Behavior: get a RETURN_SUCCESS return code,
387 : * correct response message size and fields
388 : **/
389 1 : void libspdm_test_requester_encap_endpoint_info_case4(void **state)
390 : {
391 : libspdm_return_t status;
392 : libspdm_test_context_t *spdm_test_context;
393 : libspdm_context_t *spdm_context;
394 : size_t response_size;
395 : uint8_t response[LIBSPDM_MAX_SPDM_MSG_SIZE];
396 : spdm_endpoint_info_response_t *spdm_response;
397 : uint32_t endpoint_info_size;
398 : uint8_t endpoint_info_buffer[LIBSPDM_MAX_ENDPOINT_INFO_LENGTH];
399 :
400 1 : spdm_test_context = *state;
401 1 : spdm_context = spdm_test_context->spdm_context;
402 1 : spdm_test_context->case_id = 0x4;
403 1 : spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_13 <<
404 : SPDM_VERSION_NUMBER_SHIFT_BIT;
405 1 : spdm_context->local_context.capability.flags = 0;
406 1 : spdm_context->local_context.capability.flags |=
407 : SPDM_GET_CAPABILITIES_REQUEST_FLAGS_EP_INFO_CAP_NO_SIG;
408 1 : spdm_context->connection_info.capability.flags = 0;
409 :
410 1 : response_size = sizeof(response);
411 1 : status = libspdm_get_encap_response_endpoint_info(
412 : spdm_context, m_libspdm_get_endpoint_info_request4_size,
413 : &m_libspdm_get_endpoint_info_request4, &response_size, response);
414 :
415 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
416 :
417 : /* response size check */
418 1 : endpoint_info_size = 0;
419 1 : libspdm_generate_device_endpoint_info(
420 : spdm_context, SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER,
421 : 0, &endpoint_info_size, endpoint_info_buffer);
422 1 : assert_int_equal(response_size,
423 : sizeof(spdm_endpoint_info_response_t) +
424 : sizeof(uint32_t) + endpoint_info_size);
425 1 : spdm_response = (void *)response;
426 :
427 : /* response message check */
428 1 : assert_int_equal(spdm_response->header.request_response_code,
429 : SPDM_ENDPOINT_INFO);
430 1 : assert_int_equal(spdm_response->header.param2, 0);
431 1 : }
432 :
433 : /**
434 : * Test 5: Successful response to get session-based endpoint_info with signature
435 : * Expected Behavior: get a RETURN_SUCCESS return code,
436 : * correct transcript.message_encap_e size,
437 : * correct response message size and fields
438 : * correct signature verification
439 : **/
440 1 : void libspdm_test_requester_encap_endpoint_info_case5(void **state)
441 : {
442 : libspdm_return_t status;
443 : libspdm_test_context_t *spdm_test_context;
444 : libspdm_context_t *spdm_context;
445 : libspdm_session_info_t* session_info;
446 : size_t response_size;
447 : uint8_t response[LIBSPDM_MAX_SPDM_MSG_SIZE];
448 : spdm_endpoint_info_response_t *spdm_response;
449 : uint32_t endpoint_info_size;
450 : uint8_t endpoint_info_buffer[LIBSPDM_MAX_ENDPOINT_INFO_LENGTH];
451 : void* signature;
452 : size_t signature_size;
453 : bool result;
454 : void *data;
455 : size_t data_size;
456 : uint32_t session_id;
457 :
458 1 : spdm_test_context = *state;
459 1 : spdm_context = spdm_test_context->spdm_context;
460 1 : spdm_test_context->case_id = 0x1;
461 1 : spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_13 <<
462 : SPDM_VERSION_NUMBER_SHIFT_BIT;
463 1 : spdm_context->local_context.capability.flags = 0;
464 1 : spdm_context->local_context.capability.flags |=
465 : SPDM_GET_CAPABILITIES_REQUEST_FLAGS_EP_INFO_CAP_SIG;
466 1 : spdm_context->connection_info.capability.flags = 0;
467 1 : spdm_context->connection_info.algorithm.base_hash_algo = m_libspdm_use_hash_algo;
468 1 : spdm_context->connection_info.algorithm.base_asym_algo = m_libspdm_use_asym_algo;
469 1 : spdm_context->connection_info.algorithm.req_base_asym_alg = m_libspdm_use_req_asym_algo;
470 :
471 1 : libspdm_read_requester_public_certificate_chain(m_libspdm_use_hash_algo,
472 : m_libspdm_use_req_asym_algo, &data,
473 : &data_size, NULL, NULL);
474 :
475 1 : spdm_context->local_context.local_cert_chain_provision_size[0] = data_size;
476 1 : spdm_context->local_context.local_cert_chain_provision[0] = data;
477 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
478 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_size = data_size;
479 : libspdm_copy_mem(spdm_context->connection_info.peer_used_cert_chain[0].buffer,
480 : sizeof(spdm_context->connection_info.peer_used_cert_chain[0].buffer),
481 : data, data_size);
482 : #else
483 1 : libspdm_hash_all(
484 : spdm_context->connection_info.algorithm.base_hash_algo,
485 : data, data_size,
486 1 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_hash);
487 1 : spdm_context->connection_info.peer_used_cert_chain[0].buffer_hash_size =
488 1 : libspdm_get_hash_size(spdm_context->connection_info.algorithm.base_hash_algo);
489 1 : libspdm_get_leaf_cert_public_key_from_cert_chain(
490 : spdm_context->connection_info.algorithm.base_hash_algo,
491 1 : spdm_context->connection_info.algorithm.req_base_asym_alg,
492 : data, data_size,
493 : &spdm_context->connection_info.peer_used_cert_chain[0].leaf_cert_public_key);
494 : #endif
495 :
496 1 : session_id = 0xFFFFFFFF;
497 1 : spdm_context->latest_session_id = session_id;
498 1 : spdm_context->last_spdm_request_session_id_valid = true;
499 1 : spdm_context->last_spdm_request_session_id = session_id;
500 1 : session_info = &spdm_context->session_info[0];
501 1 : libspdm_session_info_init(spdm_context, session_info, session_id, true);
502 1 : libspdm_secured_message_set_session_state(
503 : session_info->secured_message_context,
504 : LIBSPDM_SESSION_STATE_ESTABLISHED);
505 :
506 1 : libspdm_reset_message_encap_e(spdm_context, session_info);
507 1 : response_size = sizeof(response);
508 1 : libspdm_get_random_number(SPDM_NONCE_SIZE,
509 : m_libspdm_get_endpoint_info_request1.nonce);
510 1 : status = libspdm_get_encap_response_endpoint_info(
511 : spdm_context, m_libspdm_get_endpoint_info_request1_size,
512 : &m_libspdm_get_endpoint_info_request1, &response_size, response);
513 :
514 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
515 :
516 : /* response size check */
517 1 : endpoint_info_size = 0;
518 1 : libspdm_generate_device_endpoint_info(
519 : spdm_context, SPDM_GET_ENDPOINT_INFO_REQUEST_SUBCODE_DEVICE_CLASS_IDENTIFIER,
520 : SPDM_GET_ENDPOINT_INFO_REQUEST_ATTRIBUTE_SIGNATURE_REQUESTED,
521 : &endpoint_info_size, endpoint_info_buffer);
522 2 : signature_size = libspdm_get_asym_signature_size(
523 1 : spdm_context->connection_info.algorithm.req_base_asym_alg);
524 1 : assert_int_equal(response_size,
525 : sizeof(spdm_endpoint_info_response_t) + SPDM_NONCE_SIZE +
526 : sizeof(uint32_t) + endpoint_info_size + signature_size);
527 1 : spdm_response = (void *)response;
528 :
529 : /* response message check */
530 1 : assert_int_equal(spdm_response->header.request_response_code,
531 : SPDM_ENDPOINT_INFO);
532 :
533 : #if LIBSPDM_RECORD_TRANSCRIPT_DATA_SUPPORT
534 : /* transcript.message_encap_e size check */
535 : assert_int_equal(session_info->session_transcript.message_encap_e.buffer_size, 0);
536 : #endif
537 :
538 : /* signature verification */
539 1 : status = libspdm_append_message_encap_e(spdm_context, session_info,
540 : &m_libspdm_get_endpoint_info_request1,
541 : m_libspdm_get_endpoint_info_request1_size);
542 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
543 :
544 1 : status = libspdm_append_message_encap_e(spdm_context, session_info, spdm_response,
545 : response_size - signature_size);
546 1 : assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
547 :
548 1 : signature = (void *)((uint8_t *)spdm_response + response_size - signature_size);
549 1 : result = libspdm_verify_endpoint_info_signature(
550 : spdm_context, session_info, false, signature, signature_size);
551 1 : assert_true(result);
552 1 : }
553 :
554 1 : int libspdm_requester_encap_endpoint_info_test_main(void)
555 : {
556 1 : const struct CMUnitTest spdm_requester_endpoint_info_tests[] = {
557 : /* Successful response to get endpoint_info with signature */
558 : cmocka_unit_test(libspdm_test_requester_encap_endpoint_info_case1),
559 : /* Successful response to get endpoint_info with signature, slot_id == 0x1 */
560 : cmocka_unit_test(libspdm_test_requester_encap_endpoint_info_case2),
561 : /* Successful response to get endpoint_info with signature, slot_id == 0xF */
562 : cmocka_unit_test(libspdm_test_requester_encap_endpoint_info_case3),
563 : /* Successful response to get endpoint_info without signature */
564 : cmocka_unit_test(libspdm_test_requester_encap_endpoint_info_case4),
565 : /* Successful response to get session-based endpoint_info with signature */
566 : cmocka_unit_test(libspdm_test_requester_encap_endpoint_info_case5),
567 : };
568 :
569 1 : libspdm_test_context_t test_context = {
570 : LIBSPDM_TEST_CONTEXT_VERSION,
571 : false,
572 : };
573 :
574 1 : libspdm_setup_test_context(&test_context);
575 :
576 1 : return cmocka_run_group_tests(spdm_requester_endpoint_info_tests,
577 : libspdm_unit_test_group_setup,
578 : libspdm_unit_test_group_teardown);
579 : }
580 :
581 : #endif /* (LIBSPDM_ENABLE_CAPABILITY_ENCAP_CAP) && (...) */
|