/*
|
* Copyright 2016 The Android Open Source Project
|
*
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
* you may not use this file except in compliance with the License.
|
* You may obtain a copy of the License at
|
*
|
* http://www.apache.org/licenses/LICENSE-2.0
|
*
|
* Unless required by applicable law or agreed to in writing, software
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
* See the License for the specific language governing permissions and
|
* limitations under the License.
|
*/
|
|
#include <fstream>
|
|
#include <gtest/gtest.h>
|
|
#include <keymaster/keymaster_context.h>
|
|
#include "android_keymaster_test_utils.h"
|
#include <keymaster/attestation_record.h>
|
|
namespace keymaster {
|
namespace test {
|
|
class TestContext : public AttestationRecordContext {
|
public:
|
keymaster_security_level_t GetSecurityLevel() const override {
|
return KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT;
|
}
|
keymaster_error_t GenerateUniqueId(uint64_t /* creation_date_time */,
|
const keymaster_blob_t& application_id,
|
bool /* reset_since_rotation */,
|
Buffer* unique_id) const override {
|
// Use the application ID directly as the unique ID.
|
unique_id->Reinitialize(application_id.data, application_id.data_length);
|
return KM_ERROR_OK;
|
}
|
keymaster_error_t GetVerifiedBootParams(keymaster_blob_t* verified_boot_key,
|
keymaster_verified_boot_t* verified_boot_state,
|
bool* device_locked) const override {
|
verified_boot_key->data = vboot_key_;
|
verified_boot_key->data_length = sizeof(vboot_key_);
|
*verified_boot_state = KM_VERIFIED_BOOT_VERIFIED;
|
*device_locked = true;
|
return KM_ERROR_OK;
|
}
|
|
void VerifyRootOfTrust(const keymaster_blob_t& verified_boot_key,
|
keymaster_verified_boot_t verified_boot_state, bool device_locked) {
|
EXPECT_EQ(sizeof(vboot_key_), verified_boot_key.data_length);
|
if (sizeof(vboot_key_) == verified_boot_key.data_length) {
|
EXPECT_EQ(0, memcmp(verified_boot_key.data, vboot_key_, sizeof(vboot_key_)));
|
}
|
EXPECT_TRUE(device_locked);
|
EXPECT_EQ(KM_VERIFIED_BOOT_VERIFIED, verified_boot_state);
|
}
|
|
private:
|
uint8_t vboot_key_[32]{"test_vboot_key"};
|
};
|
|
TEST(AttestTest, Simple) {
|
TestContext context;
|
AuthorizationSet hw_set(AuthorizationSetBuilder()
|
.RsaSigningKey(512, 3)
|
.Digest(KM_DIGEST_SHA_2_256)
|
.Digest(KM_DIGEST_SHA_2_384)
|
.Authorization(TAG_OS_VERSION, 60000)
|
.Authorization(TAG_OS_PATCHLEVEL, 201512)
|
.Authorization(TAG_INCLUDE_UNIQUE_ID));
|
AuthorizationSet sw_set(AuthorizationSetBuilder()
|
.Authorization(TAG_ACTIVE_DATETIME, 10)
|
.Authorization(TAG_CREATION_DATETIME, 10)
|
.Authorization(TAG_APPLICATION_ID, "fake_app_id", 11));
|
|
UniquePtr<uint8_t[]> asn1;
|
size_t asn1_len = 0;
|
AuthorizationSet attest_params(
|
AuthorizationSetBuilder()
|
.Authorization(TAG_ATTESTATION_CHALLENGE, "fake_challenge", 14)
|
.Authorization(TAG_ATTESTATION_APPLICATION_ID, "fake_attest_app_id", 18));
|
ASSERT_EQ(KM_ERROR_OK,
|
build_attestation_record(attest_params, sw_set, hw_set, context, &asn1, &asn1_len));
|
EXPECT_GT(asn1_len, 0U);
|
|
std::ofstream output("attest.der",
|
std::ofstream::out | std::ofstream::binary | std::ofstream::trunc);
|
if (output)
|
output.write(reinterpret_cast<const char*>(asn1.get()), asn1_len);
|
output.close();
|
|
AuthorizationSet parsed_hw_set;
|
AuthorizationSet parsed_sw_set;
|
uint32_t attestation_version;
|
uint32_t keymaster_version;
|
keymaster_security_level_t attestation_security_level;
|
keymaster_security_level_t keymaster_security_level;
|
keymaster_blob_t attestation_challenge = {};
|
keymaster_blob_t unique_id = {};
|
EXPECT_EQ(KM_ERROR_OK,
|
parse_attestation_record(asn1.get(), asn1_len, &attestation_version,
|
&attestation_security_level, &keymaster_version,
|
&keymaster_security_level, &attestation_challenge,
|
&parsed_sw_set, &parsed_hw_set, &unique_id));
|
|
// Check that the challenge is consistent across build and parse.
|
EXPECT_EQ("fake_challenge",
|
std::string(reinterpret_cast<const char*>(attestation_challenge.data), 14));
|
delete[] attestation_challenge.data;
|
|
// Check that the unique id was populated as expected.
|
EXPECT_EQ("fake_app_id", std::string(reinterpret_cast<const char*>(unique_id.data), 11));
|
delete[] unique_id.data;
|
|
// The attestation ID is expected to appear in parsed_sw_set.
|
sw_set.push_back(TAG_ATTESTATION_APPLICATION_ID, "fake_attest_app_id", 18);
|
|
// The TAG_INCLUDE_UNIQUE_ID tag is not expected to appear in parsed_hw_set.
|
hw_set.erase(hw_set.find(TAG_INCLUDE_UNIQUE_ID));
|
|
// Check that the list of tags is consistent across build and parse.
|
hw_set.Sort();
|
sw_set.Sort();
|
parsed_hw_set.Sort();
|
parsed_sw_set.Sort();
|
EXPECT_EQ(hw_set, parsed_hw_set);
|
EXPECT_EQ(sw_set, parsed_sw_set);
|
|
// Check the root of trust values.
|
keymaster_blob_t verified_boot_key;
|
keymaster_verified_boot_t verified_boot_state;
|
bool device_locked;
|
EXPECT_EQ(KM_ERROR_OK, parse_root_of_trust(asn1.get(), asn1_len, &verified_boot_key,
|
&verified_boot_state, &device_locked));
|
context.VerifyRootOfTrust(verified_boot_key, verified_boot_state, device_locked);
|
delete[] verified_boot_key.data;
|
}
|
|
} // namespace test
|
} // namespace keymaster
|