tools/mgmt-tester: Add test cases for load_long_term_keys command
authorTedd Ho-Jeong An <tedd.an@intel.com>
Thu, 9 Sep 2021 23:09:23 +0000 (16:09 -0700)
committerAyush Garg <ayush.garg@samsung.com>
Fri, 11 Mar 2022 13:38:37 +0000 (19:08 +0530)
This patch adds extra test cases for load_long_term_keys command.

Signed-off-by: Anuj Jain <anuj01.jain@samsung.com>
Signed-off-by: Ayush Garg <ayush.garg@samsung.com>
tools/mgmt-tester.c

index 45fa9c2..40a362f 100755 (executable)
@@ -2721,6 +2721,224 @@ static const struct generic_data load_link_keys_invalid_params_test_3 = {
 };
 
 static const char load_ltks_valid_param_1[] = { 0x00, 0x00 };
+
+static const char load_ltks_valid_param_2[] = {
+       0x01, 0x00,                                     /* count */
+       0x00, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+};
+
+/* 20 keys at once */
+static const char load_ltks_valid_param_20[] = {
+       0x14, 0x00,                                     /* count */
+       0x00, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x01, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x02, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x03, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x04, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x05, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x06, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x07, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x08, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x09, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0a, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0b, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0c, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0d, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0e, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x0f, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x10, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x11, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x12, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+
+       0x13, 0x01, 0x02, 0x03, 0x04, 0x05,             /* bdaddr */
+       0x01,                                           /* addr type */
+       0x00,                                           /* authenticated */
+       0x00,                                           /* master */
+       0x00,                                           /* encryption size */
+       0x00, 0x00,                                     /* diversifier */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* rand */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (1/2) */
+       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /* value (2/2) */
+};
+
 /* Invalid key count */
 static const char load_ltks_invalid_param_1[] = { 0x01, 0x00 };
 /* Invalid addr type */
@@ -2757,6 +2975,35 @@ static const struct generic_data load_ltks_success_test_1 = {
        .expect_status = MGMT_STATUS_SUCCESS,
 };
 
+static const struct generic_data load_ltks_success_test_2 = {
+       .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+       .send_param = load_ltks_valid_param_2,
+       .send_len = sizeof(load_ltks_valid_param_2),
+       .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_3 = {
+       .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+       .send_param = load_ltks_valid_param_2,
+       .send_len = sizeof(load_ltks_valid_param_2),
+       .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_4 = {
+       .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+       .send_param = load_ltks_valid_param_20,
+       .send_len = sizeof(load_ltks_valid_param_20),
+       .expect_status = MGMT_STATUS_SUCCESS,
+};
+
+static const struct generic_data load_ltks_success_test_5 = {
+       .setup_settings = settings_powered_le,
+       .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
+       .send_param = load_ltks_valid_param_20,
+       .send_len = sizeof(load_ltks_valid_param_20),
+       .expect_status = MGMT_STATUS_SUCCESS,
+};
+
 static const struct generic_data load_ltks_invalid_params_test_1 = {
        .send_opcode = MGMT_OP_LOAD_LONG_TERM_KEYS,
        .send_param = load_ltks_invalid_param_1,
@@ -6343,6 +6590,46 @@ static void setup_uuid_mix(const void *test_data)
                                        setup_powered_callback, NULL, NULL);
 }
 
+static void setup_load_ltks_callback(uint8_t status, uint16_t length,
+                                       const void *param, void *user_data)
+{
+       if (status != MGMT_STATUS_SUCCESS) {
+               tester_setup_failed();
+               return;
+       }
+
+       tester_print("Loaded Long Term Key");
+}
+
+static void setup_load_ltks_20_by_1(const void *test_data)
+{
+       struct test_data *data = tester_get_data();
+       struct mgmt_cp_load_long_term_keys *cp;
+       struct mgmt_ltk_info *info;
+       unsigned char param[sizeof(*cp) + sizeof(*info)] = { 0x00 };
+       unsigned char param_on[] = { 0x01 };
+       int i;
+
+       cp = (struct mgmt_cp_load_long_term_keys *)param;
+       cp->key_count = 1;
+
+       info = (struct mgmt_ltk_info *)cp->keys;
+       info->addr.type = 0x01;         /* LE Public */
+
+       for (i = 0; i < 20; i++) {
+               /* Update BDADDR */
+               info->addr.bdaddr.b[0] = i + 1;
+
+               mgmt_send(data->mgmt, MGMT_OP_LOAD_LONG_TERM_KEYS,
+                         data->mgmt_index, sizeof(param), param,
+                         setup_load_ltks_callback, NULL, NULL);
+       }
+
+       mgmt_send(data->mgmt, MGMT_OP_SET_POWERED, data->mgmt_index,
+                                       sizeof(param_on), param_on,
+                                       setup_powered_callback, NULL, NULL);
+}
+
 static void setup_add_device(const void *test_data)
 {
        struct test_data *data = tester_get_data();
@@ -10871,6 +11158,18 @@ int main(int argc, char *argv[])
        test_bredrle("Load Long Term Keys - Success 1",
                                &load_ltks_success_test_1,
                                NULL, test_command_generic);
+       test_bredrle("Load Long Term Keys - Success 2",
+                               &load_ltks_success_test_2,
+                               NULL, test_command_generic);
+       test_bredrle("Load Long Term Keys - Success 3 (20 with count 1)",
+                               &load_ltks_success_test_3,
+                               setup_load_ltks_20_by_1, test_command_generic);
+       test_bredrle("Load Long Term Keys - Success 4 (20 with count 20)",
+                               &load_ltks_success_test_4,
+                               NULL, test_command_generic);
+       test_bredrle("Load Long Term Keys - Success 5 (Power On and 20 keys)",
+                               &load_ltks_success_test_5,
+                               NULL, test_command_generic);
        test_bredrle("Load Long Term Keys - Invalid Parameters 1",
                                &load_ltks_invalid_params_test_1,
                                NULL, test_command_generic);