1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker * Copyright (C) 2017 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker *
4*4d7e907cSAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker *
8*4d7e907cSAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker *
10*4d7e907cSAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker */
16*4d7e907cSAndroid Build Coastguard Worker
17*4d7e907cSAndroid Build Coastguard Worker #include "KeymasterHidlTest.h"
18*4d7e907cSAndroid Build Coastguard Worker
19*4d7e907cSAndroid Build Coastguard Worker namespace android {
20*4d7e907cSAndroid Build Coastguard Worker namespace hardware {
21*4d7e907cSAndroid Build Coastguard Worker namespace keymaster {
22*4d7e907cSAndroid Build Coastguard Worker namespace V4_0 {
23*4d7e907cSAndroid Build Coastguard Worker namespace test {
24*4d7e907cSAndroid Build Coastguard Worker
25*4d7e907cSAndroid Build Coastguard Worker class VerificationTokenTest : public KeymasterHidlTest {
26*4d7e907cSAndroid Build Coastguard Worker protected:
27*4d7e907cSAndroid Build Coastguard Worker struct VerifyAuthorizationResult {
28*4d7e907cSAndroid Build Coastguard Worker bool callSuccessful;
29*4d7e907cSAndroid Build Coastguard Worker ErrorCode error;
30*4d7e907cSAndroid Build Coastguard Worker VerificationToken token;
31*4d7e907cSAndroid Build Coastguard Worker };
32*4d7e907cSAndroid Build Coastguard Worker
verifyAuthorization(uint64_t operationHandle,const AuthorizationSet & paramsToVerify,const HardwareAuthToken & authToken)33*4d7e907cSAndroid Build Coastguard Worker VerifyAuthorizationResult verifyAuthorization(uint64_t operationHandle,
34*4d7e907cSAndroid Build Coastguard Worker const AuthorizationSet& paramsToVerify,
35*4d7e907cSAndroid Build Coastguard Worker const HardwareAuthToken& authToken) {
36*4d7e907cSAndroid Build Coastguard Worker VerifyAuthorizationResult result;
37*4d7e907cSAndroid Build Coastguard Worker result.callSuccessful =
38*4d7e907cSAndroid Build Coastguard Worker keymaster()
39*4d7e907cSAndroid Build Coastguard Worker .verifyAuthorization(operationHandle, paramsToVerify.hidl_data(), authToken,
40*4d7e907cSAndroid Build Coastguard Worker [&](auto error, auto token) {
41*4d7e907cSAndroid Build Coastguard Worker result.error = error;
42*4d7e907cSAndroid Build Coastguard Worker result.token = token;
43*4d7e907cSAndroid Build Coastguard Worker })
44*4d7e907cSAndroid Build Coastguard Worker .isOk();
45*4d7e907cSAndroid Build Coastguard Worker return result;
46*4d7e907cSAndroid Build Coastguard Worker }
47*4d7e907cSAndroid Build Coastguard Worker
getTime()48*4d7e907cSAndroid Build Coastguard Worker uint64_t getTime() {
49*4d7e907cSAndroid Build Coastguard Worker struct timespec timespec;
50*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0, clock_gettime(CLOCK_BOOTTIME, ×pec));
51*4d7e907cSAndroid Build Coastguard Worker return timespec.tv_sec * 1000 + timespec.tv_nsec / 1000000;
52*4d7e907cSAndroid Build Coastguard Worker }
53*4d7e907cSAndroid Build Coastguard Worker
sleep_ms(uint32_t milliseconds)54*4d7e907cSAndroid Build Coastguard Worker int sleep_ms(uint32_t milliseconds) {
55*4d7e907cSAndroid Build Coastguard Worker struct timespec sleep_time = {static_cast<time_t>(milliseconds / 1000),
56*4d7e907cSAndroid Build Coastguard Worker static_cast<long>(milliseconds % 1000) * 1000000};
57*4d7e907cSAndroid Build Coastguard Worker while (sleep_time.tv_sec || sleep_time.tv_nsec) {
58*4d7e907cSAndroid Build Coastguard Worker if (nanosleep(&sleep_time /* to wait */,
59*4d7e907cSAndroid Build Coastguard Worker &sleep_time /* remaining (on interrruption) */) == 0) {
60*4d7e907cSAndroid Build Coastguard Worker sleep_time = {};
61*4d7e907cSAndroid Build Coastguard Worker } else {
62*4d7e907cSAndroid Build Coastguard Worker if (errno != EINTR) return errno;
63*4d7e907cSAndroid Build Coastguard Worker }
64*4d7e907cSAndroid Build Coastguard Worker }
65*4d7e907cSAndroid Build Coastguard Worker return 0;
66*4d7e907cSAndroid Build Coastguard Worker }
67*4d7e907cSAndroid Build Coastguard Worker
68*4d7e907cSAndroid Build Coastguard Worker }; // namespace test
69*4d7e907cSAndroid Build Coastguard Worker
70*4d7e907cSAndroid Build Coastguard Worker /*
71*4d7e907cSAndroid Build Coastguard Worker * VerificationTokens exist to facilitate cross-Keymaster verification of requirements. As
72*4d7e907cSAndroid Build Coastguard Worker * such, the precise capabilities required will vary depending on the specific vendor
73*4d7e907cSAndroid Build Coastguard Worker * implementations. Essentially, VerificationTokens are a "hook" to enable vendor
74*4d7e907cSAndroid Build Coastguard Worker * implementations to communicate, so the precise usage is defined by those vendors. The only
75*4d7e907cSAndroid Build Coastguard Worker * thing we really can test is that tokens can be created by TEE keymasters, and that the
76*4d7e907cSAndroid Build Coastguard Worker * timestamps increase as expected.
77*4d7e907cSAndroid Build Coastguard Worker */
TEST_P(VerificationTokenTest,TestCreation)78*4d7e907cSAndroid Build Coastguard Worker TEST_P(VerificationTokenTest, TestCreation) {
79*4d7e907cSAndroid Build Coastguard Worker auto result1 = verifyAuthorization(
80*4d7e907cSAndroid Build Coastguard Worker 1 /* operation handle */, AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
81*4d7e907cSAndroid Build Coastguard Worker ASSERT_TRUE(result1.callSuccessful);
82*4d7e907cSAndroid Build Coastguard Worker auto result1_time = getTime();
83*4d7e907cSAndroid Build Coastguard Worker
84*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() == SecurityLevel::STRONGBOX) {
85*4d7e907cSAndroid Build Coastguard Worker // StrongBox should not implement verifyAuthorization.
86*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error);
87*4d7e907cSAndroid Build Coastguard Worker return;
88*4d7e907cSAndroid Build Coastguard Worker }
89*4d7e907cSAndroid Build Coastguard Worker
90*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result1.error);
91*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(1U, result1.token.challenge);
92*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(SecLevel(), result1.token.securityLevel);
93*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result1.token.parametersVerified.size())
94*4d7e907cSAndroid Build Coastguard Worker << "We didn't supply any parameters to verify";
95*4d7e907cSAndroid Build Coastguard Worker EXPECT_GT(result1.token.timestamp, 0U);
96*4d7e907cSAndroid Build Coastguard Worker
97*4d7e907cSAndroid Build Coastguard Worker constexpr uint32_t time_to_sleep = 200;
98*4d7e907cSAndroid Build Coastguard Worker sleep_ms(time_to_sleep);
99*4d7e907cSAndroid Build Coastguard Worker
100*4d7e907cSAndroid Build Coastguard Worker auto result2 = verifyAuthorization(
101*4d7e907cSAndroid Build Coastguard Worker 2 /* operation handle */, AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
102*4d7e907cSAndroid Build Coastguard Worker ASSERT_TRUE(result2.callSuccessful);
103*4d7e907cSAndroid Build Coastguard Worker auto result2_time = getTime();
104*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result2.error);
105*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(2U, result2.token.challenge);
106*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(SecLevel(), result2.token.securityLevel);
107*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result2.token.parametersVerified.size())
108*4d7e907cSAndroid Build Coastguard Worker << "We didn't supply any parameters to verify";
109*4d7e907cSAndroid Build Coastguard Worker
110*4d7e907cSAndroid Build Coastguard Worker auto host_time_delta = result2_time - result1_time;
111*4d7e907cSAndroid Build Coastguard Worker
112*4d7e907cSAndroid Build Coastguard Worker EXPECT_GE(host_time_delta, time_to_sleep)
113*4d7e907cSAndroid Build Coastguard Worker << "We slept for " << time_to_sleep << " ms, the clock must have advanced by that much";
114*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(host_time_delta, time_to_sleep + 100)
115*4d7e907cSAndroid Build Coastguard Worker << "The verifyAuthorization call took " << (host_time_delta - time_to_sleep)
116*4d7e907cSAndroid Build Coastguard Worker << " ms? That's awful!";
117*4d7e907cSAndroid Build Coastguard Worker
118*4d7e907cSAndroid Build Coastguard Worker auto km_time_delta = result2.token.timestamp - result1.token.timestamp;
119*4d7e907cSAndroid Build Coastguard Worker
120*4d7e907cSAndroid Build Coastguard Worker // If not too much else is going on on the system, the time delta should be quite close. Allow
121*4d7e907cSAndroid Build Coastguard Worker // 20 ms of slop just to avoid test flakiness.
122*4d7e907cSAndroid Build Coastguard Worker //
123*4d7e907cSAndroid Build Coastguard Worker // TODO(swillden): see if we can output values so they can be gathered across many runs and
124*4d7e907cSAndroid Build Coastguard Worker // report if times aren't nearly always <1ms apart.
125*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(host_time_delta, km_time_delta + 20);
126*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(km_time_delta, host_time_delta + 20);
127*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(result1.token.mac.size(), result2.token.mac.size());
128*4d7e907cSAndroid Build Coastguard Worker ASSERT_NE(0,
129*4d7e907cSAndroid Build Coastguard Worker memcmp(result1.token.mac.data(), result2.token.mac.data(), result1.token.mac.size()));
130*4d7e907cSAndroid Build Coastguard Worker }
131*4d7e907cSAndroid Build Coastguard Worker
132*4d7e907cSAndroid Build Coastguard Worker /*
133*4d7e907cSAndroid Build Coastguard Worker * Test that the mac changes when the time stamp changes. This is does not guarantee that the time
134*4d7e907cSAndroid Build Coastguard Worker * stamp is included in the mac but on failure we know that it is not. Other than in the test
135*4d7e907cSAndroid Build Coastguard Worker * case above we call verifyAuthorization with the exact same set of parameters.
136*4d7e907cSAndroid Build Coastguard Worker */
TEST_P(VerificationTokenTest,MacChangesOnChangingTimestamp)137*4d7e907cSAndroid Build Coastguard Worker TEST_P(VerificationTokenTest, MacChangesOnChangingTimestamp) {
138*4d7e907cSAndroid Build Coastguard Worker auto result1 =
139*4d7e907cSAndroid Build Coastguard Worker verifyAuthorization(0 /* operation handle */,
140*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
141*4d7e907cSAndroid Build Coastguard Worker ASSERT_TRUE(result1.callSuccessful);
142*4d7e907cSAndroid Build Coastguard Worker auto result1_time = getTime();
143*4d7e907cSAndroid Build Coastguard Worker
144*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() == SecurityLevel::STRONGBOX) {
145*4d7e907cSAndroid Build Coastguard Worker // StrongBox should not implement verifyAuthorization.
146*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::UNIMPLEMENTED, result1.error);
147*4d7e907cSAndroid Build Coastguard Worker return;
148*4d7e907cSAndroid Build Coastguard Worker }
149*4d7e907cSAndroid Build Coastguard Worker
150*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result1.error);
151*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result1.token.challenge);
152*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(SecLevel(), result1.token.securityLevel);
153*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result1.token.parametersVerified.size())
154*4d7e907cSAndroid Build Coastguard Worker << "We didn't supply any parameters to verify";
155*4d7e907cSAndroid Build Coastguard Worker EXPECT_GT(result1.token.timestamp, 0U);
156*4d7e907cSAndroid Build Coastguard Worker
157*4d7e907cSAndroid Build Coastguard Worker constexpr uint32_t time_to_sleep = 200;
158*4d7e907cSAndroid Build Coastguard Worker sleep_ms(time_to_sleep);
159*4d7e907cSAndroid Build Coastguard Worker
160*4d7e907cSAndroid Build Coastguard Worker auto result2 =
161*4d7e907cSAndroid Build Coastguard Worker verifyAuthorization(0 /* operation handle */,
162*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet() /* paramtersToVerify */, HardwareAuthToken());
163*4d7e907cSAndroid Build Coastguard Worker ASSERT_TRUE(result2.callSuccessful);
164*4d7e907cSAndroid Build Coastguard Worker auto result2_time = getTime();
165*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result2.error);
166*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result2.token.challenge);
167*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(SecLevel(), result2.token.securityLevel);
168*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(0U, result2.token.parametersVerified.size())
169*4d7e907cSAndroid Build Coastguard Worker << "We didn't supply any parameters to verify";
170*4d7e907cSAndroid Build Coastguard Worker
171*4d7e907cSAndroid Build Coastguard Worker auto host_time_delta = result2_time - result1_time;
172*4d7e907cSAndroid Build Coastguard Worker
173*4d7e907cSAndroid Build Coastguard Worker EXPECT_GE(host_time_delta, time_to_sleep)
174*4d7e907cSAndroid Build Coastguard Worker << "We slept for " << time_to_sleep << " ms, the clock must have advanced by that much";
175*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(host_time_delta, time_to_sleep + 100)
176*4d7e907cSAndroid Build Coastguard Worker << "The verifyAuthorization call took " << (host_time_delta - time_to_sleep)
177*4d7e907cSAndroid Build Coastguard Worker << " ms? That's awful!";
178*4d7e907cSAndroid Build Coastguard Worker
179*4d7e907cSAndroid Build Coastguard Worker auto km_time_delta = result2.token.timestamp - result1.token.timestamp;
180*4d7e907cSAndroid Build Coastguard Worker
181*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(host_time_delta, km_time_delta + 20);
182*4d7e907cSAndroid Build Coastguard Worker EXPECT_LE(km_time_delta, host_time_delta + 20);
183*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(result1.token.mac.size(), result2.token.mac.size());
184*4d7e907cSAndroid Build Coastguard Worker ASSERT_NE(0,
185*4d7e907cSAndroid Build Coastguard Worker memcmp(result1.token.mac.data(), result2.token.mac.data(), result1.token.mac.size()));
186*4d7e907cSAndroid Build Coastguard Worker }
187*4d7e907cSAndroid Build Coastguard Worker
188*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_HIDL_TEST(VerificationTokenTest);
189*4d7e907cSAndroid Build Coastguard Worker
190*4d7e907cSAndroid Build Coastguard Worker } // namespace test
191*4d7e907cSAndroid Build Coastguard Worker } // namespace V4_0
192*4d7e907cSAndroid Build Coastguard Worker } // namespace keymaster
193*4d7e907cSAndroid Build Coastguard Worker } // namespace hardware
194*4d7e907cSAndroid Build Coastguard Worker } // namespace android
195