• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2014 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #ifndef SYSTEM_KEYMASTER_ANDROID_KEYMASTER_TEST_UTILS_H_
18 #define SYSTEM_KEYMASTER_ANDROID_KEYMASTER_TEST_UTILS_H_
19 
20 /*
21  * Utilities used to help with testing.  Not used in production code.
22  */
23 
24 #include <stdarg.h>
25 
26 #include <algorithm>
27 #include <memory>
28 #include <ostream>
29 #include <string>
30 #include <vector>
31 
32 #include <gtest/gtest.h>
33 
34 #include <hardware/keymaster0.h>
35 #include <hardware/keymaster1.h>
36 #include <hardware/keymaster2.h>
37 #include <hardware/keymaster_defs.h>
38 
39 #include <keymaster/android_keymaster_utils.h>
40 #include <keymaster/authorization_set.h>
41 #include <keymaster/keymaster_context.h>
42 #include <keymaster/logger.h>
43 
44 std::ostream& operator<<(std::ostream& os, const keymaster_key_param_t& param);
45 bool operator==(const keymaster_key_param_t& a, const keymaster_key_param_t& b);
46 std::string hex2str(std::string);
47 
48 namespace keymaster {
49 
50 bool operator==(const AuthorizationSet& a, const AuthorizationSet& b);
51 bool operator!=(const AuthorizationSet& a, const AuthorizationSet& b);
52 
53 std::ostream& operator<<(std::ostream& os, const AuthorizationSet& set);
54 
55 namespace test {
56 
57 template <keymaster_tag_t Tag, typename KeymasterEnum>
contains(const AuthorizationSet & set,TypedEnumTag<KM_ENUM,Tag,KeymasterEnum> tag,KeymasterEnum val)58 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM, Tag, KeymasterEnum> tag,
59               KeymasterEnum val) {
60     int pos = set.find(tag);
61     return pos != -1 && static_cast<KeymasterEnum>(set[pos].enumerated) == val;
62 }
63 
64 template <keymaster_tag_t Tag, typename KeymasterEnum>
contains(const AuthorizationSet & set,TypedEnumTag<KM_ENUM_REP,Tag,KeymasterEnum> tag,KeymasterEnum val)65 bool contains(const AuthorizationSet& set, TypedEnumTag<KM_ENUM_REP, Tag, KeymasterEnum> tag,
66               KeymasterEnum val) {
67     int pos = -1;
68     while ((pos = set.find(tag, pos)) != -1)
69         if (static_cast<KeymasterEnum>(set[pos].enumerated) == val)
70             return true;
71     return false;
72 }
73 
74 template <keymaster_tag_t Tag>
contains(const AuthorizationSet & set,TypedTag<KM_UINT,Tag> tag,uint32_t val)75 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT, Tag> tag, uint32_t val) {
76     int pos = set.find(tag);
77     return pos != -1 && set[pos].integer == val;
78 }
79 
80 template <keymaster_tag_t Tag>
contains(const AuthorizationSet & set,TypedTag<KM_UINT_REP,Tag> tag,uint32_t val)81 bool contains(const AuthorizationSet& set, TypedTag<KM_UINT_REP, Tag> tag, uint32_t val) {
82     int pos = -1;
83     while ((pos = set.find(tag, pos)) != -1)
84         if (set[pos].integer == val)
85             return true;
86     return false;
87 }
88 
89 template <keymaster_tag_t Tag>
contains(const AuthorizationSet & set,TypedTag<KM_ULONG,Tag> tag,uint64_t val)90 bool contains(const AuthorizationSet& set, TypedTag<KM_ULONG, Tag> tag, uint64_t val) {
91     int pos = set.find(tag);
92     return pos != -1 && set[pos].long_integer == val;
93 }
94 
95 template <keymaster_tag_t Tag>
contains(const AuthorizationSet & set,TypedTag<KM_BYTES,Tag> tag,const std::string & val)96 bool contains(const AuthorizationSet& set, TypedTag<KM_BYTES, Tag> tag, const std::string& val) {
97     int pos = set.find(tag);
98     return pos != -1 &&
99            std::string(reinterpret_cast<const char*>(set[pos].blob.data),
100                        set[pos].blob.data_length) == val;
101 }
102 
103 template <keymaster_tag_t Tag>
contains(const AuthorizationSet & set,TypedTag<KM_BIGNUM,Tag> tag,const std::string & val)104 bool contains(const AuthorizationSet& set, TypedTag<KM_BIGNUM, Tag> tag, const std::string& val) {
105     int pos = set.find(tag);
106     return pos != -1 &&
107            std::string(reinterpret_cast<const char*>(set[pos].blob.data),
108                        set[pos].blob.data_length) == val;
109 }
110 
contains(const AuthorizationSet & set,keymaster_tag_t tag)111 inline bool contains(const AuthorizationSet& set, keymaster_tag_t tag) {
112     return set.find(tag) != -1;
113 }
114 
115 class StdoutLogger : public Logger {
116   public:
StdoutLogger()117     StdoutLogger() { set_instance(this); }
118 
log_msg(LogLevel level,const char * fmt,va_list args)119     int log_msg(LogLevel level, const char* fmt, va_list args) const {
120         int output_len = 0;
121         switch (level) {
122         case DEBUG_LVL:
123             output_len = printf("DEBUG: ");
124             break;
125         case INFO_LVL:
126             output_len = printf("INFO: ");
127             break;
128         case WARNING_LVL:
129             output_len = printf("WARNING: ");
130             break;
131         case ERROR_LVL:
132             output_len = printf("ERROR: ");
133             break;
134         case SEVERE_LVL:
135             output_len = printf("SEVERE: ");
136             break;
137         }
138 
139         output_len += vprintf(fmt, args);
140         output_len += printf("\n");
141         return output_len;
142     }
143 };
144 
make_string(const uint8_t * data,size_t length)145 inline std::string make_string(const uint8_t* data, size_t length) {
146     return std::string(reinterpret_cast<const char*>(data), length);
147 }
148 
make_string(const uint8_t (& a)[N])149 template <size_t N> std::string make_string(const uint8_t (&a)[N]) {
150     return make_string(a, N);
151 }
152 
153 /**
154  * Keymaster2TestInstance is used to parameterize Keymaster2Tests.  Its main function is to create a
155  * keymaster2_device_t to which test calls can be directed.  It also provides a place to specify
156  * various bits of alternative behavior, in cases where different devices are expected to behave
157  * differently (any such cases are a potential bug, but sometimes they may make sense).
158  */
159 class Keymaster2TestInstanceCreator {
160   public:
~Keymaster2TestInstanceCreator()161     virtual ~Keymaster2TestInstanceCreator(){};
162     virtual keymaster2_device_t* CreateDevice() const = 0;
163 
164     virtual bool algorithm_in_km0_hardware(keymaster_algorithm_t algorithm) const = 0;
165     virtual int keymaster0_calls() const = 0;
minimal_digest_set()166     virtual int minimal_digest_set() const { return false; }
167     virtual bool is_keymaster1_hw() const = 0;
168     virtual KeymasterContext* keymaster_context() const = 0;
169 
170     virtual std::string name() const = 0;
171 };
172 
173 // Use a shared_ptr because it's copyable.
174 typedef std::shared_ptr<Keymaster2TestInstanceCreator> InstanceCreatorPtr;
175 
176 std::ostream& operator<<(std::ostream& os, const InstanceCreatorPtr& instance_creator);
177 
178 const uint64_t OP_HANDLE_SENTINEL = 0xFFFFFFFFFFFFFFFF;
179 class Keymaster2Test : public testing::TestWithParam<InstanceCreatorPtr> {
180   protected:
181     Keymaster2Test();
182     ~Keymaster2Test();
183 
184     keymaster2_device_t* device();
185 
186     keymaster_error_t GenerateKey(const AuthorizationSetBuilder& builder);
187 
188     keymaster_error_t DeleteKey();
189 
190     keymaster_error_t ImportKey(const AuthorizationSetBuilder& builder,
191                                 keymaster_key_format_t format, const std::string& key_material);
192 
193     keymaster_error_t ExportKey(keymaster_key_format_t format, std::string* export_data);
194 
195     keymaster_error_t GetCharacteristics();
196 
197     keymaster_error_t BeginOperation(keymaster_purpose_t purpose);
198     keymaster_error_t BeginOperation(keymaster_purpose_t purpose, const AuthorizationSet& input_set,
199                                      AuthorizationSet* output_set = nullptr);
200 
201     keymaster_error_t UpdateOperation(const std::string& message, std::string* output,
202                                       size_t* input_consumed);
203     keymaster_error_t UpdateOperation(const AuthorizationSet& additional_params,
204                                       const std::string& message, AuthorizationSet* output_params,
205                                       std::string* output, size_t* input_consumed);
206 
207     keymaster_error_t FinishOperation(std::string* output);
208     keymaster_error_t FinishOperation(const std::string& input, const std::string& signature,
209                                       std::string* output);
FinishOperation(const AuthorizationSet & additional_params,const std::string & input,const std::string & signature,std::string * output)210     keymaster_error_t FinishOperation(const AuthorizationSet& additional_params,
211                                       const std::string& input, const std::string& signature,
212                                       std::string* output) {
213         return FinishOperation(additional_params, input, signature, nullptr /* output_params */,
214                                output);
215     }
216     keymaster_error_t FinishOperation(const AuthorizationSet& additional_params,
217                                       const std::string& input, const std::string& signature,
218                                       AuthorizationSet* output_params, std::string* output);
219 
220     keymaster_error_t AbortOperation();
221 
222     keymaster_error_t AttestKey(const std::string& attest_challenge,
223                                 const std::string& attest_app_id, keymaster_cert_chain_t* chain);
224 
225     keymaster_error_t UpgradeKey(const AuthorizationSet& upgrade_params);
226 
227     keymaster_error_t GetVersion(uint8_t* major, uint8_t* minor, uint8_t* subminor);
228     std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message);
229     std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
230                                const AuthorizationSet& begin_params,
231                                const AuthorizationSet& update_params,
232                                AuthorizationSet* output_params = nullptr);
233     std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
234                                const std::string& signature, const AuthorizationSet& begin_params,
235                                const AuthorizationSet& update_params,
236                                AuthorizationSet* output_params = nullptr);
237     std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
238                                const std::string& signature);
239 
240     void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
241     void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
242                      keymaster_padding_t padding);
243     void MacMessage(const std::string& message, std::string* signature, size_t mac_length);
244 
245     void VerifyMessage(const std::string& message, const std::string& signature,
246                        keymaster_digest_t digest);
247     void VerifyMessage(const std::string& message, const std::string& signature,
248                        keymaster_digest_t digest, keymaster_padding_t padding);
249     void VerifyMac(const std::string& message, const std::string& signature);
250 
251     std::string EncryptMessage(const std::string& message, keymaster_padding_t padding,
252                                std::string* generated_nonce = nullptr);
253     std::string EncryptMessage(const std::string& message, keymaster_digest_t digest,
254                                keymaster_padding_t padding, std::string* generated_nonce = nullptr);
255     std::string EncryptMessage(const std::string& message, keymaster_block_mode_t block_mode,
256                                keymaster_padding_t padding, std::string* generated_nonce = nullptr);
257     std::string EncryptMessage(const AuthorizationSet& update_params, const std::string& message,
258                                keymaster_digest_t digest, keymaster_padding_t padding,
259                                std::string* generated_nonce = nullptr);
260     std::string EncryptMessage(const AuthorizationSet& update_params, const std::string& message,
261                                keymaster_block_mode_t block_mode, keymaster_padding_t padding,
262                                std::string* generated_nonce = nullptr);
263     std::string EncryptMessageWithParams(const std::string& message,
264                                          const AuthorizationSet& begin_params,
265                                          const AuthorizationSet& update_params,
266                                          AuthorizationSet* output_params);
267 
268     std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding);
269     std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
270                                keymaster_padding_t padding);
271     std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode,
272                                keymaster_padding_t padding);
273     std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
274                                keymaster_padding_t padding, const std::string& nonce);
275     std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode,
276                                keymaster_padding_t padding, const std::string& nonce);
277     std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext,
278                                keymaster_digest_t digest, keymaster_padding_t padding,
279                                const std::string& nonce);
280     std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext,
281                                keymaster_block_mode_t block_mode, keymaster_padding_t padding,
282                                const std::string& nonce);
283     std::string DecryptMessageWithParams(const std::string& message,
284                                          const AuthorizationSet& begin_params,
285                                          const AuthorizationSet& update_params,
286                                          AuthorizationSet* output_params);
287 
288     void CheckHmacTestVector(const std::string& key, const std::string& message,
289                              keymaster_digest_t digest, std::string expected_mac);
290     void CheckAesOcbTestVector(const std::string& key, const std::string& nonce,
291                                const std::string& associated_data, const std::string& message,
292                                const std::string& expected_ciphertext);
293     void CheckAesCtrTestVector(const std::string& key, const std::string& nonce,
294                                const std::string& message, const std::string& expected_ciphertext);
295     void CheckTripleDesTestVector(keymaster_purpose_t purpose, keymaster_block_mode_t mode,
296                                   keymaster_padding_t padding, const std::string& key,
297                                   const std::string& iv, const std::string& message,
298                                   const std::string& expected_ciphertext);
299     AuthorizationSet UserAuthParams();
300     AuthorizationSet ClientParams();
301 
302     template <typename T>
ResponseContains(const std::vector<T> & expected,const T * values,size_t len)303     bool ResponseContains(const std::vector<T>& expected, const T* values, size_t len) {
304         return expected.size() == len &&
305                std::is_permutation(values, values + len, expected.begin());
306     }
307 
ResponseContains(T expected,const T * values,size_t len)308     template <typename T> bool ResponseContains(T expected, const T* values, size_t len) {
309         return (len == 1 && *values == expected);
310     }
311 
312     AuthorizationSet hw_enforced();
313     AuthorizationSet sw_enforced();
314 
315     void FreeCharacteristics();
316     void FreeKeyBlob();
317 
318     void corrupt_key_blob();
319 
set_key_blob(const uint8_t * key,size_t key_length)320     void set_key_blob(const uint8_t* key, size_t key_length) {
321         FreeKeyBlob();
322         blob_.key_material = key;
323         blob_.key_material_size = key_length;
324     }
325 
set_key_blob(KeymasterKeyBlob blob)326     void set_key_blob(KeymasterKeyBlob blob) { blob_ = blob.release(); }
set_key_characteristics(const AuthorizationSet & hw_enforced,const AuthorizationSet & sw_enforced)327     void set_key_characteristics(const AuthorizationSet& hw_enforced,
328                                  const AuthorizationSet& sw_enforced) {
329         FreeCharacteristics();
330         hw_enforced.CopyToParamSet(&characteristics_.hw_enforced);
331         sw_enforced.CopyToParamSet(&characteristics_.sw_enforced);
332     }
333 
client_params()334     AuthorizationSet client_params() {
335         return AuthorizationSet(client_params_, sizeof(client_params_) / sizeof(client_params_[0]));
336     }
337 
338   private:
339     keymaster2_device_t* device_;
340     keymaster_blob_t client_id_ = {.data = reinterpret_cast<const uint8_t*>("app_id"),
341                                    .data_length = 6};
342     keymaster_key_param_t client_params_[1] = {
343         Authorization(TAG_APPLICATION_ID, client_id_.data, client_id_.data_length)};
344 
345     uint64_t op_handle_;
346 
347     keymaster_key_blob_t blob_;
348     keymaster_key_characteristics_t characteristics_;
349 };
350 
351 struct Keymaster0CountingWrapper : public keymaster0_device_t {
Keymaster0CountingWrapperKeymaster0CountingWrapper352     explicit Keymaster0CountingWrapper(keymaster0_device_t* device) : device_(device), counter_(0) {
353         common = device_->common;
354         common.close = counting_close_device;
355         client_version = device_->client_version;
356         flags = device_->flags;
357         context = this;
358 
359         generate_keypair = counting_generate_keypair;
360         import_keypair = counting_import_keypair;
361         get_keypair_public = counting_get_keypair_public;
362         delete_keypair = counting_delete_keypair;
363         delete_all = counting_delete_all;
364         sign_data = counting_sign_data;
365         verify_data = counting_verify_data;
366     }
367 
countKeymaster0CountingWrapper368     int count() { return counter_; }
369 
370     // The blobs generated by the underlying softkeymaster start with "PK#8".  Tweak the prefix so
371     // they don't get identified as softkeymaster blobs.
munge_blobKeymaster0CountingWrapper372     static void munge_blob(uint8_t* blob, size_t blob_length) {
373         if (blob && blob_length > 0 && *blob == 'P')
374             *blob = 'Q';  // Mind your Ps and Qs!
375     }
376 
377     // Copy and un-modfy the blob.  The caller must clean up the return value.
unmunge_blobKeymaster0CountingWrapper378     static uint8_t* unmunge_blob(const uint8_t* blob, size_t blob_length) {
379         uint8_t* dup_blob = dup_buffer(blob, blob_length);
380         if (dup_blob && blob_length > 0 && *dup_blob == 'Q')
381             *dup_blob = 'P';
382         return dup_blob;
383     }
384 
deviceKeymaster0CountingWrapper385     static keymaster0_device_t* device(const keymaster0_device_t* dev) {
386         Keymaster0CountingWrapper* wrapper =
387             reinterpret_cast<Keymaster0CountingWrapper*>(dev->context);
388         return wrapper->device_;
389     }
390 
incrementKeymaster0CountingWrapper391     static void increment(const keymaster0_device_t* dev) {
392         Keymaster0CountingWrapper* wrapper =
393             reinterpret_cast<Keymaster0CountingWrapper*>(dev->context);
394         wrapper->counter_++;
395     }
396 
counting_close_deviceKeymaster0CountingWrapper397     static int counting_close_device(hw_device_t* dev) {
398         keymaster0_device_t* k0_dev = reinterpret_cast<keymaster0_device_t*>(dev);
399         increment(k0_dev);
400         Keymaster0CountingWrapper* wrapper =
401             reinterpret_cast<Keymaster0CountingWrapper*>(k0_dev->context);
402         int retval =
403             wrapper->device_->common.close(reinterpret_cast<hw_device_t*>(wrapper->device_));
404         delete wrapper;
405         return retval;
406     }
407 
counting_generate_keypairKeymaster0CountingWrapper408     static int counting_generate_keypair(const struct keymaster0_device* dev,
409                                          const keymaster_keypair_t key_type, const void* key_params,
410                                          uint8_t** key_blob, size_t* key_blob_length) {
411         increment(dev);
412         int result = device(dev)->generate_keypair(device(dev), key_type, key_params, key_blob,
413                                                    key_blob_length);
414         if (result == 0)
415             munge_blob(*key_blob, *key_blob_length);
416         return result;
417     }
418 
counting_import_keypairKeymaster0CountingWrapper419     static int counting_import_keypair(const struct keymaster0_device* dev, const uint8_t* key,
420                                        const size_t key_length, uint8_t** key_blob,
421                                        size_t* key_blob_length) {
422         increment(dev);
423         int result =
424             device(dev)->import_keypair(device(dev), key, key_length, key_blob, key_blob_length);
425         if (result == 0)
426             munge_blob(*key_blob, *key_blob_length);
427         return result;
428     }
429 
counting_get_keypair_publicKeymaster0CountingWrapper430     static int counting_get_keypair_public(const struct keymaster0_device* dev,
431                                            const uint8_t* key_blob, const size_t key_blob_length,
432                                            uint8_t** x509_data, size_t* x509_data_length) {
433         increment(dev);
434         std::unique_ptr<uint8_t[]> dup_blob(unmunge_blob(key_blob, key_blob_length));
435         return device(dev)->get_keypair_public(device(dev), dup_blob.get(), key_blob_length,
436                                                x509_data, x509_data_length);
437     }
438 
counting_delete_keypairKeymaster0CountingWrapper439     static int counting_delete_keypair(const struct keymaster0_device* dev, const uint8_t* key_blob,
440                                        const size_t key_blob_length) {
441         increment(dev);
442         if (key_blob && key_blob_length > 0)
443             EXPECT_EQ('Q', *key_blob);
444         if (device(dev)->delete_keypair) {
445             std::unique_ptr<uint8_t[]> dup_blob(unmunge_blob(key_blob, key_blob_length));
446             return device(dev)->delete_keypair(device(dev), dup_blob.get(), key_blob_length);
447         }
448         return 0;
449     }
450 
counting_delete_allKeymaster0CountingWrapper451     static int counting_delete_all(const struct keymaster0_device* dev) {
452         increment(dev);
453         if (device(dev)->delete_all)
454             return device(dev)->delete_all(device(dev));
455         return 0;
456     }
457 
counting_sign_dataKeymaster0CountingWrapper458     static int counting_sign_data(const struct keymaster0_device* dev, const void* signing_params,
459                                   const uint8_t* key_blob, const size_t key_blob_length,
460                                   const uint8_t* data, const size_t data_length,
461                                   uint8_t** signed_data, size_t* signed_data_length) {
462         increment(dev);
463         std::unique_ptr<uint8_t[]> dup_blob(unmunge_blob(key_blob, key_blob_length));
464         return device(dev)->sign_data(device(dev), signing_params, dup_blob.get(), key_blob_length,
465                                       data, data_length, signed_data, signed_data_length);
466     }
467 
counting_verify_dataKeymaster0CountingWrapper468     static int counting_verify_data(const struct keymaster0_device* dev, const void* signing_params,
469                                     const uint8_t* key_blob, const size_t key_blob_length,
470                                     const uint8_t* signed_data, const size_t signed_data_length,
471                                     const uint8_t* signature, const size_t signature_length) {
472         increment(dev);
473         std::unique_ptr<uint8_t[]> dup_blob(unmunge_blob(key_blob, key_blob_length));
474         return device(dev)->verify_data(device(dev), signing_params, dup_blob.get(),
475                                         key_blob_length, signed_data, signed_data_length, signature,
476                                         signature_length);
477     }
478 
479   private:
480     keymaster0_device_t* device_;
481     int counter_;
482 };
483 
484 /**
485  * This function takes a keymaster1_device_t and wraps it in an adapter that supports only
486  * KM_DIGEST_SHA_2_256.
487  */
488 keymaster1_device_t* make_device_sha256_only(keymaster1_device_t* device);
489 
490 }  // namespace test
491 }  // namespace keymaster
492 
493 #endif  // SYSTEM_KEYMASTER_ANDROID_KEYMASTER_TEST_UTILS_H_
494