LCOV - code coverage report
Current view: top level - unit_test/test_spdm_responder - encap_key_update.c (source / functions) Coverage Total Hit
Test: coverage.info Lines: 100.0 % 115 115
Test Date: 2025-06-29 08:09:00 Functions: 100.0 % 7 7

            Line data    Source code
       1              : /**
       2              :  *  Copyright Notice:
       3              :  *  Copyright 2021-2022 DMTF. All rights reserved.
       4              :  *  License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/libspdm/blob/main/LICENSE.md
       5              :  **/
       6              : #include "spdm_unit_test.h"
       7              : #include "internal/libspdm_secured_message_lib.h"
       8              : #include "internal/libspdm_responder_lib.h"
       9              : 
      10              : #if LIBSPDM_ENABLE_CAPABILITY_ENCAP_CAP
      11              : 
      12            5 : static void libspdm_set_standard_key_update_test_state(libspdm_context_t *spdm_context,
      13              :                                                        uint32_t *session_id)
      14              : {
      15              :     libspdm_session_info_t *session_info;
      16              : 
      17            5 :     spdm_context->response_state = LIBSPDM_RESPONSE_STATE_NORMAL;
      18            5 :     spdm_context->connection_info.connection_state = LIBSPDM_CONNECTION_STATE_NEGOTIATED;
      19            5 :     spdm_context->connection_info.capability.flags |=
      20              :         SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_KEY_UPD_CAP;
      21            5 :     spdm_context->connection_info.capability.flags |=
      22              :         SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_ENCRYPT_CAP;
      23            5 :     spdm_context->connection_info.capability.flags |= SPDM_GET_CAPABILITIES_RESPONSE_FLAGS_MAC_CAP;
      24            5 :     spdm_context->local_context.capability.flags |= SPDM_GET_CAPABILITIES_REQUEST_FLAGS_KEY_UPD_CAP;
      25            5 :     spdm_context->local_context.capability.flags |= SPDM_GET_CAPABILITIES_REQUEST_FLAGS_ENCRYPT_CAP;
      26            5 :     spdm_context->local_context.capability.flags |= SPDM_GET_CAPABILITIES_REQUEST_FLAGS_MAC_CAP;
      27              : 
      28            5 :     spdm_context->transcript.message_a.buffer_size = 0;
      29            5 :     spdm_context->connection_info.algorithm.base_hash_algo = m_libspdm_use_hash_algo;
      30            5 :     spdm_context->connection_info.algorithm.base_asym_algo = m_libspdm_use_asym_algo;
      31            5 :     spdm_context->connection_info.algorithm.dhe_named_group = m_libspdm_use_dhe_algo;
      32            5 :     spdm_context->connection_info.algorithm.aead_cipher_suite = m_libspdm_use_aead_algo;
      33              : 
      34            5 :     *session_id = 0xFFFFFFFF;
      35            5 :     spdm_context->latest_session_id = *session_id;
      36            5 :     spdm_context->last_spdm_request_session_id = *session_id;
      37            5 :     session_info = &spdm_context->session_info[0];
      38            5 :     libspdm_session_info_init(spdm_context, session_info, *session_id, true);
      39            5 :     libspdm_secured_message_set_session_state(session_info->secured_message_context,
      40              :                                               LIBSPDM_SESSION_STATE_ESTABLISHED);
      41            5 : }
      42              : 
      43              : /**
      44              :  * Test 1: receiving a correct UPDATE_KEY_ACK message for updating
      45              :  * only the request data key.
      46              :  * Expected behavior: client returns a Status of RETURN_SUCCESS,Communication needs to continue.
      47              :  **/
      48            1 : void libspdm_test_responder_encap_key_update_case1(void **state)
      49              : {
      50              :     libspdm_return_t status;
      51              :     libspdm_test_context_t *spdm_test_context;
      52              :     libspdm_context_t *spdm_context;
      53              :     uint32_t session_id;
      54              :     bool need_continue;
      55              : 
      56            1 :     spdm_test_context = *state;
      57            1 :     spdm_context = spdm_test_context->spdm_context;
      58              : 
      59            1 :     spdm_test_context->case_id = 0x1;
      60            1 :     spdm_context->last_spdm_request_session_id_valid = true;
      61            1 :     spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_11 <<
      62              :                                             SPDM_VERSION_NUMBER_SHIFT_BIT;
      63            1 :     libspdm_set_standard_key_update_test_state(
      64              :         spdm_context, &session_id);
      65              : 
      66            1 :     spdm_context->encap_context.last_encap_request_header.spdm_version = SPDM_MESSAGE_VERSION_11;
      67            1 :     spdm_context->encap_context.last_encap_request_header.request_response_code =
      68              :         SPDM_KEY_UPDATE_ACK;
      69            1 :     spdm_context->encap_context.last_encap_request_header.param1 =
      70              :         SPDM_KEY_UPDATE_OPERATIONS_TABLE_UPDATE_KEY;
      71            1 :     spdm_context->encap_context.last_encap_request_header.param2 = 0;
      72              : 
      73              :     spdm_key_update_response_t spdm_response;
      74            1 :     size_t spdm_response_size = sizeof(spdm_key_update_response_t);
      75              : 
      76            1 :     spdm_response.header.spdm_version = SPDM_MESSAGE_VERSION_11;
      77            1 :     spdm_response.header.request_response_code = SPDM_KEY_UPDATE_ACK;
      78            1 :     spdm_response.header.param1 = SPDM_KEY_UPDATE_OPERATIONS_TABLE_UPDATE_KEY;
      79            1 :     spdm_response.header.param2 = 0;
      80              : 
      81            1 :     status = libspdm_process_encap_response_key_update(spdm_context, spdm_response_size,
      82              :                                                        &spdm_response, &need_continue);
      83              : 
      84            1 :     assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
      85            1 :     assert_int_equal(need_continue, true);
      86            1 : }
      87              : 
      88              : /**
      89              :  * Test 2: receiving a correct UPDATE_KEY_ACK message for updating
      90              :  * only the request data key.
      91              :  * Expected behavior: client returns a Status of RETURN_SUCCESS,Communication needs to continue.
      92              :  **/
      93            1 : void libspdm_test_responder_encap_key_update_case2(void **state)
      94              : {
      95              :     libspdm_return_t status;
      96              :     libspdm_test_context_t *spdm_test_context;
      97              :     libspdm_context_t *spdm_context;
      98              :     uint32_t session_id;
      99              :     bool need_continue;
     100              : 
     101            1 :     spdm_test_context = *state;
     102            1 :     spdm_context = spdm_test_context->spdm_context;
     103              : 
     104            1 :     spdm_test_context->case_id = 0x2;
     105            1 :     spdm_context->last_spdm_request_session_id_valid = true;
     106            1 :     spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_11 <<
     107              :                                             SPDM_VERSION_NUMBER_SHIFT_BIT;
     108            1 :     libspdm_set_standard_key_update_test_state(
     109              :         spdm_context, &session_id);
     110              : 
     111            1 :     spdm_context->encap_context.last_encap_request_header.spdm_version = SPDM_MESSAGE_VERSION_11;
     112            1 :     spdm_context->encap_context.last_encap_request_header.request_response_code =
     113              :         SPDM_KEY_UPDATE_ACK;
     114            1 :     spdm_context->encap_context.last_encap_request_header.param1 =
     115              :         SPDM_KEY_UPDATE_OPERATIONS_TABLE_VERIFY_NEW_KEY;
     116            1 :     spdm_context->encap_context.last_encap_request_header.param2 = 0;
     117              : 
     118              :     spdm_key_update_response_t spdm_response;
     119            1 :     size_t spdm_response_size = sizeof(spdm_key_update_response_t);
     120              : 
     121            1 :     spdm_response.header.spdm_version = SPDM_MESSAGE_VERSION_11;
     122            1 :     spdm_response.header.request_response_code = SPDM_KEY_UPDATE_ACK;
     123            1 :     spdm_response.header.param1 = SPDM_KEY_UPDATE_OPERATIONS_TABLE_VERIFY_NEW_KEY;
     124            1 :     spdm_response.header.param2 = 0;
     125              : 
     126            1 :     status = libspdm_process_encap_response_key_update(spdm_context, spdm_response_size,
     127              :                                                        &spdm_response, &need_continue);
     128              : 
     129            1 :     assert_int_equal(status, LIBSPDM_STATUS_SUCCESS);
     130            1 :     assert_int_equal(need_continue, false);
     131            1 : }
     132              : /**
     133              :  * Test 3: receiving a correct UPDATE_KEY_ACK message for updating
     134              :  * only the request data key. last_spdm_request_session_id_valid invalid
     135              :  * Expected behavior: client returns a Status of RETURN_UNSUPPORTED,No further communication is required.
     136              :  **/
     137            1 : void libspdm_test_responder_encap_key_update_case3(void **state)
     138              : {
     139              :     libspdm_return_t status;
     140              :     libspdm_test_context_t *spdm_test_context;
     141              :     libspdm_context_t *spdm_context;
     142              :     uint32_t session_id;
     143              :     bool need_continue;
     144              : 
     145            1 :     spdm_test_context = *state;
     146            1 :     spdm_context = spdm_test_context->spdm_context;
     147              : 
     148            1 :     spdm_test_context->case_id = 0x3;
     149            1 :     spdm_context->last_spdm_request_session_id_valid = false;
     150            1 :     spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_11 <<
     151              :                                             SPDM_VERSION_NUMBER_SHIFT_BIT;
     152            1 :     libspdm_set_standard_key_update_test_state(
     153              :         spdm_context, &session_id);
     154              : 
     155              :     spdm_key_update_response_t spdm_response;
     156            1 :     size_t spdm_response_size = sizeof(spdm_key_update_response_t);
     157              : 
     158            1 :     spdm_response.header.spdm_version = SPDM_MESSAGE_VERSION_11;
     159            1 :     spdm_response.header.request_response_code =    SPDM_KEY_UPDATE_ACK;
     160            1 :     spdm_response.header.param1 = 0;
     161            1 :     spdm_response.header.param2 = 0;
     162              : 
     163            1 :     status = libspdm_process_encap_response_key_update(spdm_context, spdm_response_size,
     164              :                                                        &spdm_response, &need_continue);
     165            1 :     assert_int_equal(status, LIBSPDM_STATUS_UNSUPPORTED_CAP);
     166            1 : }
     167              : 
     168              : /**
     169              :  * Test 4: receives an ERROR message indicating InvalidParameters when updating key.
     170              :  * Expected behavior: client returns a Status of RETURN_SECURITY_VIOLATION, and
     171              :  * no keys should be updated.
     172              :  **/
     173            1 : void libspdm_test_responder_encap_key_update_case4(void **state)
     174              : {
     175              :     libspdm_return_t status;
     176              :     libspdm_test_context_t *spdm_test_context;
     177              :     libspdm_context_t *spdm_context;
     178              :     uint32_t session_id;
     179              :     bool need_continue;
     180              : 
     181            1 :     spdm_test_context = *state;
     182            1 :     spdm_context = spdm_test_context->spdm_context;
     183              : 
     184            1 :     spdm_test_context->case_id = 0x4;
     185            1 :     spdm_context->last_spdm_request_session_id_valid = true;
     186            1 :     spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_11 <<
     187              :                                             SPDM_VERSION_NUMBER_SHIFT_BIT;
     188            1 :     libspdm_set_standard_key_update_test_state(
     189              :         spdm_context, &session_id);
     190              : 
     191              :     spdm_key_update_response_t spdm_response;
     192            1 :     size_t spdm_response_size = sizeof(spdm_key_update_response_t);
     193              : 
     194            1 :     spdm_response.header.spdm_version = SPDM_MESSAGE_VERSION_11;
     195            1 :     spdm_response.header.request_response_code = SPDM_ERROR;
     196            1 :     spdm_response.header.param1 = SPDM_ERROR_CODE_DECRYPT_ERROR;
     197            1 :     spdm_response.header.param2 = 0;
     198              : 
     199            1 :     status = libspdm_process_encap_response_key_update(spdm_context, spdm_response_size,
     200              :                                                        &spdm_response, &need_continue);
     201              : 
     202            1 :     assert_int_equal(status, LIBSPDM_STATUS_SESSION_MSG_ERROR);
     203            1 : }
     204              : 
     205              : /**
     206              :  * Test 5: spdm_response message is correct but does not match last_encap_request_header error message
     207              :  * Expected behavior: client returns a Status of RETURN_DEVICE_ERROR
     208              :  **/
     209            1 : void libspdm_test_responder_encap_key_update_case5(void **state)
     210              : {
     211              :     libspdm_return_t status;
     212              :     libspdm_test_context_t *spdm_test_context;
     213              :     libspdm_context_t *spdm_context;
     214              :     uint32_t session_id;
     215              :     bool need_continue;
     216              : 
     217            1 :     spdm_test_context = *state;
     218            1 :     spdm_context = spdm_test_context->spdm_context;
     219              : 
     220            1 :     spdm_test_context->case_id = 0x5;
     221            1 :     spdm_context->last_spdm_request_session_id_valid = true;
     222            1 :     spdm_context->connection_info.version = SPDM_MESSAGE_VERSION_11 <<
     223              :                                             SPDM_VERSION_NUMBER_SHIFT_BIT;
     224            1 :     libspdm_set_standard_key_update_test_state(
     225              :         spdm_context, &session_id);
     226              : 
     227            1 :     spdm_context->encap_context.last_encap_request_header.spdm_version = SPDM_MESSAGE_VERSION_11;
     228            1 :     spdm_context->encap_context.last_encap_request_header.request_response_code =
     229              :         SPDM_KEY_UPDATE_ACK;
     230            1 :     spdm_context->encap_context.last_encap_request_header.param1 = SPDM_ERROR_CODE_DECRYPT_ERROR;
     231            1 :     spdm_context->encap_context.last_encap_request_header.param2 = 0;
     232              : 
     233              :     spdm_key_update_response_t spdm_response;
     234            1 :     size_t spdm_response_size = sizeof(spdm_key_update_response_t);
     235              : 
     236            1 :     spdm_response.header.spdm_version = SPDM_MESSAGE_VERSION_11;
     237            1 :     spdm_response.header.request_response_code = SPDM_KEY_UPDATE_ACK;
     238            1 :     spdm_response.header.param1 = 0;
     239            1 :     spdm_response.header.param2 = 0;
     240              : 
     241            1 :     status = libspdm_process_encap_response_key_update(spdm_context, spdm_response_size,
     242              :                                                        &spdm_response, &need_continue);
     243              : 
     244            1 :     assert_int_equal(status, LIBSPDM_STATUS_INVALID_MSG_FIELD);
     245            1 : }
     246              : 
     247            1 : int libspdm_responder_encap_key_update_test_main(void)
     248              : {
     249            1 :     const struct CMUnitTest spdm_responder_key_update_tests[] = {
     250              :         /* Successful response*/
     251              :         cmocka_unit_test(libspdm_test_responder_encap_key_update_case1),
     252              :         /* Successful response,No further communication is required.*/
     253              :         cmocka_unit_test(libspdm_test_responder_encap_key_update_case2),
     254              :         /* last_spdm_request_session_id_valid : false */
     255              :         cmocka_unit_test(libspdm_test_responder_encap_key_update_case3),
     256              :         /* Error response: RETURN_SECURITY_VIOLATION */
     257              :         cmocka_unit_test(libspdm_test_responder_encap_key_update_case4),
     258              :         /* Error response: RETURN_DEVICE_ERROR */
     259              :         cmocka_unit_test(libspdm_test_responder_encap_key_update_case5),
     260              :     };
     261              : 
     262            1 :     libspdm_test_context_t test_context = {
     263              :         LIBSPDM_TEST_CONTEXT_VERSION,
     264              :         false,
     265              :     };
     266              : 
     267            1 :     libspdm_setup_test_context(&test_context);
     268              : 
     269            1 :     return cmocka_run_group_tests(spdm_responder_key_update_tests,
     270              :                                   libspdm_unit_test_group_setup,
     271              :                                   libspdm_unit_test_group_teardown);
     272              : }
     273              : 
     274              : #endif /* LIBSPDM_ENABLE_CAPABILITY_ENCAP_CAP*/
        

Generated by: LCOV version 2.0-1