xref: /aosp_15_r20/hardware/interfaces/keymaster/4.0/vts/functional/VerificationTokenTest.cpp (revision 4d7e907c777eeecc4c5bd7cf640a754fac206ff7)
1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker  * Copyright (C) 2017 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker  *
4*4d7e907cSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker  *
8*4d7e907cSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker  *
10*4d7e907cSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker  * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker  */
16*4d7e907cSAndroid Build Coastguard Worker 
17*4d7e907cSAndroid Build Coastguard Worker #include "KeymasterHidlTest.h"
18*4d7e907cSAndroid Build Coastguard Worker 
19*4d7e907cSAndroid Build Coastguard Worker namespace android {
20*4d7e907cSAndroid Build Coastguard Worker namespace hardware {
21*4d7e907cSAndroid Build Coastguard Worker namespace keymaster {
22*4d7e907cSAndroid Build Coastguard Worker namespace V4_0 {
23*4d7e907cSAndroid Build Coastguard Worker namespace test {
24*4d7e907cSAndroid Build Coastguard Worker 
25*4d7e907cSAndroid Build Coastguard Worker class VerificationTokenTest : public KeymasterHidlTest {
26*4d7e907cSAndroid Build Coastguard Worker    protected:
27*4d7e907cSAndroid Build Coastguard Worker     struct VerifyAuthorizationResult {
28*4d7e907cSAndroid Build Coastguard Worker         bool callSuccessful;
29*4d7e907cSAndroid Build Coastguard Worker         ErrorCode error;
30*4d7e907cSAndroid Build Coastguard Worker         VerificationToken token;
31*4d7e907cSAndroid Build Coastguard Worker     };
32*4d7e907cSAndroid Build Coastguard Worker 
verifyAuthorization(uint64_t operationHandle,const AuthorizationSet & paramsToVerify,const HardwareAuthToken & authToken)33*4d7e907cSAndroid Build Coastguard Worker     VerifyAuthorizationResult verifyAuthorization(uint64_t operationHandle,
34*4d7e907cSAndroid Build Coastguard Worker                                                   const AuthorizationSet& paramsToVerify,
35*4d7e907cSAndroid Build Coastguard Worker                                                   const HardwareAuthToken& authToken) {
36*4d7e907cSAndroid Build Coastguard Worker         VerifyAuthorizationResult result;
37*4d7e907cSAndroid Build Coastguard Worker         result.callSuccessful =
38*4d7e907cSAndroid Build Coastguard Worker             keymaster()
39*4d7e907cSAndroid Build Coastguard Worker                 .verifyAuthorization(operationHandle, paramsToVerify.hidl_data(), authToken,
40*4d7e907cSAndroid Build Coastguard Worker                                      [&](auto error, auto token) {
41*4d7e907cSAndroid Build Coastguard Worker                                          result.error = error;
42*4d7e907cSAndroid Build Coastguard Worker                                          result.token = token;
43*4d7e907cSAndroid Build Coastguard Worker                                      })
44*4d7e907cSAndroid Build Coastguard Worker                 .isOk();
45*4d7e907cSAndroid Build Coastguard Worker         return result;
46*4d7e907cSAndroid Build Coastguard Worker     }
47*4d7e907cSAndroid Build Coastguard Worker 
getTime()48*4d7e907cSAndroid Build Coastguard Worker     uint64_t getTime() {
49*4d7e907cSAndroid Build Coastguard Worker         struct timespec timespec;
50*4d7e907cSAndroid Build Coastguard Worker         EXPECT_EQ(0, clock_gettime(CLOCK_BOOTTIME, &timespec));
51*4d7e907cSAndroid Build Coastguard Worker         return timespec.tv_sec * 1000 + timespec.tv_nsec / 1000000;
52*4d7e907cSAndroid Build Coastguard Worker     }
53*4d7e907cSAndroid Build Coastguard Worker 
sleep_ms(uint32_t milliseconds)54*4d7e907cSAndroid Build Coastguard Worker     int sleep_ms(uint32_t milliseconds) {
55*4d7e907cSAndroid Build Coastguard Worker         struct timespec sleep_time = {static_cast<time_t>(milliseconds / 1000),
56*4d7e907cSAndroid Build Coastguard Worker                                       static_cast<long>(milliseconds % 1000) * 1000000};
57*4d7e907cSAndroid Build Coastguard Worker         while (sleep_time.tv_sec || sleep_time.tv_nsec) {
58*4d7e907cSAndroid Build Coastguard Worker             if (nanosleep(&sleep_time /* to wait */,
59*4d7e907cSAndroid Build Coastguard Worker                           &sleep_time /* remaining (on interrruption) */) == 0) {
60*4d7e907cSAndroid Build Coastguard Worker                 sleep_time = {};
61*4d7e907cSAndroid Build Coastguard Worker             } else {
62*4d7e907cSAndroid Build Coastguard Worker                 if (errno != EINTR) return errno;
63*4d7e907cSAndroid Build Coastguard Worker             }
64*4d7e907cSAndroid Build Coastguard Worker         }
65*4d7e907cSAndroid Build Coastguard Worker         return 0;
66*4d7e907cSAndroid Build Coastguard Worker     }
67*4d7e907cSAndroid Build Coastguard Worker 
68*4d7e907cSAndroid Build Coastguard Worker };  // namespace test
69*4d7e907cSAndroid Build Coastguard Worker 
70*4d7e907cSAndroid Build Coastguard Worker /*
71*4d7e907cSAndroid Build Coastguard Worker  * VerificationTokens exist to facilitate cross-Keymaster verification of requirements.  As
72*4d7e907cSAndroid Build Coastguard Worker  * such, the precise capabilities required will vary depending on the specific vendor
73*4d7e907cSAndroid Build Coastguard Worker  * implementations. Essentially, VerificationTokens are a "hook" to enable vendor
74*4d7e907cSAndroid Build Coastguard Worker  * implementations to communicate, so the precise usage is defined by those vendors.  The only
75*4d7e907cSAndroid Build Coastguard Worker  * thing we really can test is that tokens can be created by TEE keymasters, and that the
76*4d7e907cSAndroid Build Coastguard Worker  * timestamps increase as expected.
77*4d7e907cSAndroid Build Coastguard Worker  */
TEST_P(VerificationTokenTest,TestCreation)78*4d7e907cSAndroid Build Coastguard Worker TEST_P(VerificationTokenTest, TestCreation) {
79*4d7e907cSAndroid Build Coastguard Worker     auto result1 = verifyAuthorization(
80*4d7e907cSAndroid Build Coastguard Worker         1 /* operation handle */, AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
81*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(result1.callSuccessful);
82*4d7e907cSAndroid Build Coastguard Worker     auto result1_time = getTime();
83*4d7e907cSAndroid Build Coastguard Worker 
84*4d7e907cSAndroid Build Coastguard Worker     if (SecLevel() == SecurityLevel::STRONGBOX) {
85*4d7e907cSAndroid Build Coastguard Worker         // StrongBox should not implement verifyAuthorization.
86*4d7e907cSAndroid Build Coastguard Worker         EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error);
87*4d7e907cSAndroid Build Coastguard Worker         return;
88*4d7e907cSAndroid Build Coastguard Worker     }
89*4d7e907cSAndroid Build Coastguard Worker 
90*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result1.error);
91*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(1U, result1.token.challenge);
92*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(SecLevel(), result1.token.securityLevel);
93*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result1.token.parametersVerified.size())
94*4d7e907cSAndroid Build Coastguard Worker         << "We didn't supply any parameters to verify";
95*4d7e907cSAndroid Build Coastguard Worker     EXPECT_GT(result1.token.timestamp, 0U);
96*4d7e907cSAndroid Build Coastguard Worker 
97*4d7e907cSAndroid Build Coastguard Worker     constexpr uint32_t time_to_sleep = 200;
98*4d7e907cSAndroid Build Coastguard Worker     sleep_ms(time_to_sleep);
99*4d7e907cSAndroid Build Coastguard Worker 
100*4d7e907cSAndroid Build Coastguard Worker     auto result2 = verifyAuthorization(
101*4d7e907cSAndroid Build Coastguard Worker         2 /* operation handle */, AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
102*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(result2.callSuccessful);
103*4d7e907cSAndroid Build Coastguard Worker     auto result2_time = getTime();
104*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result2.error);
105*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(2U, result2.token.challenge);
106*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(SecLevel(), result2.token.securityLevel);
107*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result2.token.parametersVerified.size())
108*4d7e907cSAndroid Build Coastguard Worker         << "We didn't supply any parameters to verify";
109*4d7e907cSAndroid Build Coastguard Worker 
110*4d7e907cSAndroid Build Coastguard Worker     auto host_time_delta = result2_time - result1_time;
111*4d7e907cSAndroid Build Coastguard Worker 
112*4d7e907cSAndroid Build Coastguard Worker     EXPECT_GE(host_time_delta, time_to_sleep)
113*4d7e907cSAndroid Build Coastguard Worker         << "We slept for " << time_to_sleep << " ms, the clock must have advanced by that much";
114*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(host_time_delta, time_to_sleep + 100)
115*4d7e907cSAndroid Build Coastguard Worker         << "The verifyAuthorization call took " << (host_time_delta - time_to_sleep)
116*4d7e907cSAndroid Build Coastguard Worker         << " ms?  That's awful!";
117*4d7e907cSAndroid Build Coastguard Worker 
118*4d7e907cSAndroid Build Coastguard Worker     auto km_time_delta = result2.token.timestamp - result1.token.timestamp;
119*4d7e907cSAndroid Build Coastguard Worker 
120*4d7e907cSAndroid Build Coastguard Worker     // If not too much else is going on on the system, the time delta should be quite close.  Allow
121*4d7e907cSAndroid Build Coastguard Worker     // 20 ms of slop just to avoid test flakiness.
122*4d7e907cSAndroid Build Coastguard Worker     //
123*4d7e907cSAndroid Build Coastguard Worker     // TODO(swillden): see if we can output values so they can be gathered across many runs and
124*4d7e907cSAndroid Build Coastguard Worker     // report if times aren't nearly always <1ms apart.
125*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(host_time_delta, km_time_delta + 20);
126*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(km_time_delta, host_time_delta + 20);
127*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(result1.token.mac.size(), result2.token.mac.size());
128*4d7e907cSAndroid Build Coastguard Worker     ASSERT_NE(0,
129*4d7e907cSAndroid Build Coastguard Worker               memcmp(result1.token.mac.data(), result2.token.mac.data(), result1.token.mac.size()));
130*4d7e907cSAndroid Build Coastguard Worker }
131*4d7e907cSAndroid Build Coastguard Worker 
132*4d7e907cSAndroid Build Coastguard Worker /*
133*4d7e907cSAndroid Build Coastguard Worker  * Test that the mac changes when the time stamp changes. This is does not guarantee that the time
134*4d7e907cSAndroid Build Coastguard Worker  * stamp is included in the mac but on failure we know that it is not. Other than in the test
135*4d7e907cSAndroid Build Coastguard Worker  * case above we call verifyAuthorization with the exact same set of parameters.
136*4d7e907cSAndroid Build Coastguard Worker  */
TEST_P(VerificationTokenTest,MacChangesOnChangingTimestamp)137*4d7e907cSAndroid Build Coastguard Worker TEST_P(VerificationTokenTest, MacChangesOnChangingTimestamp) {
138*4d7e907cSAndroid Build Coastguard Worker     auto result1 =
139*4d7e907cSAndroid Build Coastguard Worker             verifyAuthorization(0 /* operation handle */,
140*4d7e907cSAndroid Build Coastguard Worker                                 AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
141*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(result1.callSuccessful);
142*4d7e907cSAndroid Build Coastguard Worker     auto result1_time = getTime();
143*4d7e907cSAndroid Build Coastguard Worker 
144*4d7e907cSAndroid Build Coastguard Worker     if (SecLevel() == SecurityLevel::STRONGBOX) {
145*4d7e907cSAndroid Build Coastguard Worker         // StrongBox should not implement verifyAuthorization.
146*4d7e907cSAndroid Build Coastguard Worker         EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error);
147*4d7e907cSAndroid Build Coastguard Worker         return;
148*4d7e907cSAndroid Build Coastguard Worker     }
149*4d7e907cSAndroid Build Coastguard Worker 
150*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result1.error);
151*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result1.token.challenge);
152*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(SecLevel(), result1.token.securityLevel);
153*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result1.token.parametersVerified.size())
154*4d7e907cSAndroid Build Coastguard Worker             << "We didn't supply any parameters to verify";
155*4d7e907cSAndroid Build Coastguard Worker     EXPECT_GT(result1.token.timestamp, 0U);
156*4d7e907cSAndroid Build Coastguard Worker 
157*4d7e907cSAndroid Build Coastguard Worker     constexpr uint32_t time_to_sleep = 200;
158*4d7e907cSAndroid Build Coastguard Worker     sleep_ms(time_to_sleep);
159*4d7e907cSAndroid Build Coastguard Worker 
160*4d7e907cSAndroid Build Coastguard Worker     auto result2 =
161*4d7e907cSAndroid Build Coastguard Worker             verifyAuthorization(0 /* operation handle */,
162*4d7e907cSAndroid Build Coastguard Worker                                 AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
163*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(result2.callSuccessful);
164*4d7e907cSAndroid Build Coastguard Worker     auto result2_time = getTime();
165*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(ErrorCode::OK, result2.error);
166*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result2.token.challenge);
167*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(SecLevel(), result2.token.securityLevel);
168*4d7e907cSAndroid Build Coastguard Worker     EXPECT_EQ(0U, result2.token.parametersVerified.size())
169*4d7e907cSAndroid Build Coastguard Worker             << "We didn't supply any parameters to verify";
170*4d7e907cSAndroid Build Coastguard Worker 
171*4d7e907cSAndroid Build Coastguard Worker     auto host_time_delta = result2_time - result1_time;
172*4d7e907cSAndroid Build Coastguard Worker 
173*4d7e907cSAndroid Build Coastguard Worker     EXPECT_GE(host_time_delta, time_to_sleep)
174*4d7e907cSAndroid Build Coastguard Worker             << "We slept for " << time_to_sleep << " ms, the clock must have advanced by that much";
175*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(host_time_delta, time_to_sleep + 100)
176*4d7e907cSAndroid Build Coastguard Worker             << "The verifyAuthorization call took " << (host_time_delta - time_to_sleep)
177*4d7e907cSAndroid Build Coastguard Worker             << " ms?  That's awful!";
178*4d7e907cSAndroid Build Coastguard Worker 
179*4d7e907cSAndroid Build Coastguard Worker     auto km_time_delta = result2.token.timestamp - result1.token.timestamp;
180*4d7e907cSAndroid Build Coastguard Worker 
181*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(host_time_delta, km_time_delta + 20);
182*4d7e907cSAndroid Build Coastguard Worker     EXPECT_LE(km_time_delta, host_time_delta + 20);
183*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(result1.token.mac.size(), result2.token.mac.size());
184*4d7e907cSAndroid Build Coastguard Worker     ASSERT_NE(0,
185*4d7e907cSAndroid Build Coastguard Worker               memcmp(result1.token.mac.data(), result2.token.mac.data(), result1.token.mac.size()));
186*4d7e907cSAndroid Build Coastguard Worker }
187*4d7e907cSAndroid Build Coastguard Worker 
188*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_HIDL_TEST(VerificationTokenTest);
189*4d7e907cSAndroid Build Coastguard Worker 
190*4d7e907cSAndroid Build Coastguard Worker }  // namespace test
191*4d7e907cSAndroid Build Coastguard Worker }  // namespace V4_0
192*4d7e907cSAndroid Build Coastguard Worker }  // namespace keymaster
193*4d7e907cSAndroid Build Coastguard Worker }  // namespace hardware
194*4d7e907cSAndroid Build Coastguard Worker }  // namespace android
195