xref: /aosp_15_r20/bootable/recovery/tests/unit/uncrypt_test.cpp (revision e7c364b630b241adcb6c7726a21055250b91fdac)
1*e7c364b6SAndroid Build Coastguard Worker /*
2*e7c364b6SAndroid Build Coastguard Worker  * Copyright (C) 2016 The Android Open Source Project
3*e7c364b6SAndroid Build Coastguard Worker  *
4*e7c364b6SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*e7c364b6SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*e7c364b6SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*e7c364b6SAndroid Build Coastguard Worker  *
8*e7c364b6SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*e7c364b6SAndroid Build Coastguard Worker  *
10*e7c364b6SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*e7c364b6SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*e7c364b6SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*e7c364b6SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*e7c364b6SAndroid Build Coastguard Worker  * limitations under the License.
15*e7c364b6SAndroid Build Coastguard Worker  */
16*e7c364b6SAndroid Build Coastguard Worker 
17*e7c364b6SAndroid Build Coastguard Worker #include <arpa/inet.h>
18*e7c364b6SAndroid Build Coastguard Worker #include <sys/socket.h>
19*e7c364b6SAndroid Build Coastguard Worker #include <sys/types.h>
20*e7c364b6SAndroid Build Coastguard Worker #include <sys/un.h>
21*e7c364b6SAndroid Build Coastguard Worker #include <unistd.h>
22*e7c364b6SAndroid Build Coastguard Worker 
23*e7c364b6SAndroid Build Coastguard Worker #include <algorithm>
24*e7c364b6SAndroid Build Coastguard Worker #include <string>
25*e7c364b6SAndroid Build Coastguard Worker 
26*e7c364b6SAndroid Build Coastguard Worker #include <android-base/file.h>
27*e7c364b6SAndroid Build Coastguard Worker #include <android-base/logging.h>
28*e7c364b6SAndroid Build Coastguard Worker #include <android-base/properties.h>
29*e7c364b6SAndroid Build Coastguard Worker #include <android-base/unique_fd.h>
30*e7c364b6SAndroid Build Coastguard Worker #include <bootloader_message/bootloader_message.h>
31*e7c364b6SAndroid Build Coastguard Worker #include <gtest/gtest.h>
32*e7c364b6SAndroid Build Coastguard Worker 
33*e7c364b6SAndroid Build Coastguard Worker using namespace std::string_literals;
34*e7c364b6SAndroid Build Coastguard Worker 
35*e7c364b6SAndroid Build Coastguard Worker static const std::string UNCRYPT_SOCKET = "/dev/socket/uncrypt";
36*e7c364b6SAndroid Build Coastguard Worker static const std::string INIT_SVC_SETUP_BCB = "init.svc.setup-bcb";
37*e7c364b6SAndroid Build Coastguard Worker static const std::string INIT_SVC_CLEAR_BCB = "init.svc.clear-bcb";
38*e7c364b6SAndroid Build Coastguard Worker static const std::string INIT_SVC_UNCRYPT = "init.svc.uncrypt";
39*e7c364b6SAndroid Build Coastguard Worker static constexpr int SOCKET_CONNECTION_MAX_RETRY = 30;
40*e7c364b6SAndroid Build Coastguard Worker 
StopService()41*e7c364b6SAndroid Build Coastguard Worker static void StopService() {
42*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(android::base::SetProperty("ctl.stop", "setup-bcb"));
43*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(android::base::SetProperty("ctl.stop", "clear-bcb"));
44*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(android::base::SetProperty("ctl.stop", "uncrypt"));
45*e7c364b6SAndroid Build Coastguard Worker 
46*e7c364b6SAndroid Build Coastguard Worker   bool success = false;
47*e7c364b6SAndroid Build Coastguard Worker   for (int retry = 0; retry < SOCKET_CONNECTION_MAX_RETRY; retry++) {
48*e7c364b6SAndroid Build Coastguard Worker     std::string setup_bcb = android::base::GetProperty(INIT_SVC_SETUP_BCB, "");
49*e7c364b6SAndroid Build Coastguard Worker     std::string clear_bcb = android::base::GetProperty(INIT_SVC_CLEAR_BCB, "");
50*e7c364b6SAndroid Build Coastguard Worker     std::string uncrypt = android::base::GetProperty(INIT_SVC_UNCRYPT, "");
51*e7c364b6SAndroid Build Coastguard Worker     GTEST_LOG_(INFO) << "setup-bcb: [" << setup_bcb << "] clear-bcb: [" << clear_bcb
52*e7c364b6SAndroid Build Coastguard Worker                      << "] uncrypt: [" << uncrypt << "]";
53*e7c364b6SAndroid Build Coastguard Worker     if (setup_bcb != "running" && clear_bcb != "running" && uncrypt != "running") {
54*e7c364b6SAndroid Build Coastguard Worker       success = true;
55*e7c364b6SAndroid Build Coastguard Worker       break;
56*e7c364b6SAndroid Build Coastguard Worker     }
57*e7c364b6SAndroid Build Coastguard Worker     sleep(1);
58*e7c364b6SAndroid Build Coastguard Worker   }
59*e7c364b6SAndroid Build Coastguard Worker 
60*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(success) << "uncrypt service is not available.";
61*e7c364b6SAndroid Build Coastguard Worker }
62*e7c364b6SAndroid Build Coastguard Worker 
63*e7c364b6SAndroid Build Coastguard Worker class UncryptTest : public ::testing::Test {
64*e7c364b6SAndroid Build Coastguard Worker  protected:
UncryptTest()65*e7c364b6SAndroid Build Coastguard Worker   UncryptTest() : has_misc(true) {}
66*e7c364b6SAndroid Build Coastguard Worker 
SetUp()67*e7c364b6SAndroid Build Coastguard Worker   void SetUp() override {
68*e7c364b6SAndroid Build Coastguard Worker     std::string err;
69*e7c364b6SAndroid Build Coastguard Worker     has_misc = !get_bootloader_message_blk_device(&err).empty();
70*e7c364b6SAndroid Build Coastguard Worker   }
71*e7c364b6SAndroid Build Coastguard Worker 
TearDown()72*e7c364b6SAndroid Build Coastguard Worker   void TearDown() override {
73*e7c364b6SAndroid Build Coastguard Worker     // Clear the BCB.
74*e7c364b6SAndroid Build Coastguard Worker     if (has_misc) {
75*e7c364b6SAndroid Build Coastguard Worker       std::string err;
76*e7c364b6SAndroid Build Coastguard Worker       ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err;
77*e7c364b6SAndroid Build Coastguard Worker     }
78*e7c364b6SAndroid Build Coastguard Worker   }
79*e7c364b6SAndroid Build Coastguard Worker 
SetupOrClearBcb(bool isSetup,const std::string & message,const std::string & message_in_bcb) const80*e7c364b6SAndroid Build Coastguard Worker   void SetupOrClearBcb(bool isSetup, const std::string& message,
81*e7c364b6SAndroid Build Coastguard Worker                        const std::string& message_in_bcb) const {
82*e7c364b6SAndroid Build Coastguard Worker     // Restart the setup-bcb service.
83*e7c364b6SAndroid Build Coastguard Worker     StopService();
84*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(android::base::SetProperty("ctl.start", isSetup ? "setup-bcb" : "clear-bcb"));
85*e7c364b6SAndroid Build Coastguard Worker 
86*e7c364b6SAndroid Build Coastguard Worker     // Test tends to be flaky if proceeding immediately ("Transport endpoint is not connected").
87*e7c364b6SAndroid Build Coastguard Worker     sleep(1);
88*e7c364b6SAndroid Build Coastguard Worker 
89*e7c364b6SAndroid Build Coastguard Worker     sockaddr_un un = {};
90*e7c364b6SAndroid Build Coastguard Worker     un.sun_family = AF_UNIX;
91*e7c364b6SAndroid Build Coastguard Worker     strlcpy(un.sun_path, UNCRYPT_SOCKET.c_str(), sizeof(un.sun_path));
92*e7c364b6SAndroid Build Coastguard Worker 
93*e7c364b6SAndroid Build Coastguard Worker     int sockfd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0);
94*e7c364b6SAndroid Build Coastguard Worker     ASSERT_NE(-1, sockfd);
95*e7c364b6SAndroid Build Coastguard Worker 
96*e7c364b6SAndroid Build Coastguard Worker     // Connect to the uncrypt socket.
97*e7c364b6SAndroid Build Coastguard Worker     bool success = false;
98*e7c364b6SAndroid Build Coastguard Worker     for (int retry = 0; retry < SOCKET_CONNECTION_MAX_RETRY; retry++) {
99*e7c364b6SAndroid Build Coastguard Worker       if (connect(sockfd, reinterpret_cast<sockaddr*>(&un), sizeof(sockaddr_un)) == 0) {
100*e7c364b6SAndroid Build Coastguard Worker         success = true;
101*e7c364b6SAndroid Build Coastguard Worker         break;
102*e7c364b6SAndroid Build Coastguard Worker       }
103*e7c364b6SAndroid Build Coastguard Worker       sleep(1);
104*e7c364b6SAndroid Build Coastguard Worker     }
105*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(success);
106*e7c364b6SAndroid Build Coastguard Worker 
107*e7c364b6SAndroid Build Coastguard Worker     if (isSetup) {
108*e7c364b6SAndroid Build Coastguard Worker       // Send out the BCB message.
109*e7c364b6SAndroid Build Coastguard Worker       int length = static_cast<int>(message.size());
110*e7c364b6SAndroid Build Coastguard Worker       int length_out = htonl(length);
111*e7c364b6SAndroid Build Coastguard Worker       ASSERT_TRUE(android::base::WriteFully(sockfd, &length_out, sizeof(int)))
112*e7c364b6SAndroid Build Coastguard Worker           << "Failed to write length: " << strerror(errno);
113*e7c364b6SAndroid Build Coastguard Worker       ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length))
114*e7c364b6SAndroid Build Coastguard Worker           << "Failed to write message: " << strerror(errno);
115*e7c364b6SAndroid Build Coastguard Worker     }
116*e7c364b6SAndroid Build Coastguard Worker 
117*e7c364b6SAndroid Build Coastguard Worker     // Check the status code from uncrypt.
118*e7c364b6SAndroid Build Coastguard Worker     int status;
119*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(android::base::ReadFully(sockfd, &status, sizeof(int)));
120*e7c364b6SAndroid Build Coastguard Worker     ASSERT_EQ(100U, ntohl(status));
121*e7c364b6SAndroid Build Coastguard Worker 
122*e7c364b6SAndroid Build Coastguard Worker     // Ack having received the status code.
123*e7c364b6SAndroid Build Coastguard Worker     int code = 0;
124*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(android::base::WriteFully(sockfd, &code, sizeof(int)));
125*e7c364b6SAndroid Build Coastguard Worker 
126*e7c364b6SAndroid Build Coastguard Worker     ASSERT_EQ(0, close(sockfd));
127*e7c364b6SAndroid Build Coastguard Worker 
128*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(android::base::SetProperty("ctl.stop", isSetup ? "setup-bcb" : "clear-bcb"));
129*e7c364b6SAndroid Build Coastguard Worker 
130*e7c364b6SAndroid Build Coastguard Worker     // Verify the message by reading from BCB directly.
131*e7c364b6SAndroid Build Coastguard Worker     bootloader_message boot;
132*e7c364b6SAndroid Build Coastguard Worker     std::string err;
133*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(read_bootloader_message(&boot, &err)) << "Failed to read BCB: " << err;
134*e7c364b6SAndroid Build Coastguard Worker 
135*e7c364b6SAndroid Build Coastguard Worker     if (isSetup) {
136*e7c364b6SAndroid Build Coastguard Worker       ASSERT_EQ("boot-recovery", std::string(boot.command));
137*e7c364b6SAndroid Build Coastguard Worker       ASSERT_EQ(message_in_bcb, std::string(boot.recovery));
138*e7c364b6SAndroid Build Coastguard Worker 
139*e7c364b6SAndroid Build Coastguard Worker       // The rest of the boot.recovery message should be zero'd out.
140*e7c364b6SAndroid Build Coastguard Worker       ASSERT_LE(message_in_bcb.size(), sizeof(boot.recovery));
141*e7c364b6SAndroid Build Coastguard Worker       size_t left = sizeof(boot.recovery) - message_in_bcb.size();
142*e7c364b6SAndroid Build Coastguard Worker       ASSERT_EQ(std::string(left, '\0'), std::string(&boot.recovery[message_in_bcb.size()], left));
143*e7c364b6SAndroid Build Coastguard Worker 
144*e7c364b6SAndroid Build Coastguard Worker       // Clear the BCB.
145*e7c364b6SAndroid Build Coastguard Worker       ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err;
146*e7c364b6SAndroid Build Coastguard Worker     } else {
147*e7c364b6SAndroid Build Coastguard Worker       // All the bytes should be cleared.
148*e7c364b6SAndroid Build Coastguard Worker       ASSERT_EQ(std::string(sizeof(boot), '\0'),
149*e7c364b6SAndroid Build Coastguard Worker                 std::string(reinterpret_cast<const char*>(&boot), sizeof(boot)));
150*e7c364b6SAndroid Build Coastguard Worker     }
151*e7c364b6SAndroid Build Coastguard Worker   }
152*e7c364b6SAndroid Build Coastguard Worker 
VerifyBootloaderMessage(const std::string & expected)153*e7c364b6SAndroid Build Coastguard Worker   void VerifyBootloaderMessage(const std::string& expected) {
154*e7c364b6SAndroid Build Coastguard Worker     std::string err;
155*e7c364b6SAndroid Build Coastguard Worker     bootloader_message boot;
156*e7c364b6SAndroid Build Coastguard Worker     ASSERT_TRUE(read_bootloader_message(&boot, &err)) << "Failed to read BCB: " << err;
157*e7c364b6SAndroid Build Coastguard Worker 
158*e7c364b6SAndroid Build Coastguard Worker     // Check that we have all the expected bytes.
159*e7c364b6SAndroid Build Coastguard Worker     ASSERT_EQ(expected, std::string(reinterpret_cast<const char*>(&boot), sizeof(boot)));
160*e7c364b6SAndroid Build Coastguard Worker   }
161*e7c364b6SAndroid Build Coastguard Worker 
162*e7c364b6SAndroid Build Coastguard Worker   bool has_misc;
163*e7c364b6SAndroid Build Coastguard Worker };
164*e7c364b6SAndroid Build Coastguard Worker 
TEST_F(UncryptTest,setup_bcb)165*e7c364b6SAndroid Build Coastguard Worker TEST_F(UncryptTest, setup_bcb) {
166*e7c364b6SAndroid Build Coastguard Worker   if (!has_misc) {
167*e7c364b6SAndroid Build Coastguard Worker     GTEST_LOG_(INFO) << "Test skipped due to no /misc partition found on the device.";
168*e7c364b6SAndroid Build Coastguard Worker     return;
169*e7c364b6SAndroid Build Coastguard Worker   }
170*e7c364b6SAndroid Build Coastguard Worker 
171*e7c364b6SAndroid Build Coastguard Worker   std::string random_data;
172*e7c364b6SAndroid Build Coastguard Worker   random_data.reserve(sizeof(bootloader_message));
173*e7c364b6SAndroid Build Coastguard Worker   generate_n(back_inserter(random_data), sizeof(bootloader_message), []() { return rand() % 128; });
174*e7c364b6SAndroid Build Coastguard Worker 
175*e7c364b6SAndroid Build Coastguard Worker   bootloader_message boot;
176*e7c364b6SAndroid Build Coastguard Worker   memcpy(&boot, random_data.c_str(), random_data.size());
177*e7c364b6SAndroid Build Coastguard Worker 
178*e7c364b6SAndroid Build Coastguard Worker   std::string err;
179*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(write_bootloader_message(boot, &err)) << "Failed to write BCB: " << err;
180*e7c364b6SAndroid Build Coastguard Worker   VerifyBootloaderMessage(random_data);
181*e7c364b6SAndroid Build Coastguard Worker 
182*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err;
183*e7c364b6SAndroid Build Coastguard Worker   VerifyBootloaderMessage(std::string(sizeof(bootloader_message), '\0'));
184*e7c364b6SAndroid Build Coastguard Worker 
185*e7c364b6SAndroid Build Coastguard Worker   std::string message = "--update_message=abc value";
186*e7c364b6SAndroid Build Coastguard Worker   std::string message_in_bcb = "recovery\n--update_message=abc value\n";
187*e7c364b6SAndroid Build Coastguard Worker   SetupOrClearBcb(true, message, message_in_bcb);
188*e7c364b6SAndroid Build Coastguard Worker 
189*e7c364b6SAndroid Build Coastguard Worker   SetupOrClearBcb(false, "", "");
190*e7c364b6SAndroid Build Coastguard Worker 
191*e7c364b6SAndroid Build Coastguard Worker   TemporaryFile wipe_package;
192*e7c364b6SAndroid Build Coastguard Worker   ASSERT_TRUE(android::base::WriteStringToFile(std::string(345, 'a'), wipe_package.path));
193*e7c364b6SAndroid Build Coastguard Worker 
194*e7c364b6SAndroid Build Coastguard Worker   // It's expected to store a wipe package in /misc, with the package size passed to recovery.
195*e7c364b6SAndroid Build Coastguard Worker   message = "--wipe_ab\n--wipe_package="s + wipe_package.path + "\n--reason=wipePackage"s;
196*e7c364b6SAndroid Build Coastguard Worker   message_in_bcb = "recovery\n--wipe_ab\n--wipe_package_size=345\n--reason=wipePackage\n";
197*e7c364b6SAndroid Build Coastguard Worker   SetupOrClearBcb(true, message, message_in_bcb);
198*e7c364b6SAndroid Build Coastguard Worker }
199