xref: /aosp_15_r20/hardware/interfaces/identity/aidl/vts/UserAuthTests.cpp (revision 4d7e907c777eeecc4c5bd7cf640a754fac206ff7)
1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker  * Copyright (C) 2019 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker  *
4*4d7e907cSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker  *
8*4d7e907cSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker  *
10*4d7e907cSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker  * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker  */
16*4d7e907cSAndroid Build Coastguard Worker 
17*4d7e907cSAndroid Build Coastguard Worker #define LOG_TAG "UserAuthTests"
18*4d7e907cSAndroid Build Coastguard Worker 
19*4d7e907cSAndroid Build Coastguard Worker #include <aidl/Gtest.h>
20*4d7e907cSAndroid Build Coastguard Worker #include <aidl/Vintf.h>
21*4d7e907cSAndroid Build Coastguard Worker #include <aidl/android/hardware/keymaster/HardwareAuthToken.h>
22*4d7e907cSAndroid Build Coastguard Worker #include <aidl/android/hardware/keymaster/VerificationToken.h>
23*4d7e907cSAndroid Build Coastguard Worker #include <android-base/logging.h>
24*4d7e907cSAndroid Build Coastguard Worker #include <android/hardware/identity/IIdentityCredentialStore.h>
25*4d7e907cSAndroid Build Coastguard Worker #include <android/hardware/identity/support/IdentityCredentialSupport.h>
26*4d7e907cSAndroid Build Coastguard Worker #include <binder/IServiceManager.h>
27*4d7e907cSAndroid Build Coastguard Worker #include <binder/ProcessState.h>
28*4d7e907cSAndroid Build Coastguard Worker #include <cppbor.h>
29*4d7e907cSAndroid Build Coastguard Worker #include <cppbor_parse.h>
30*4d7e907cSAndroid Build Coastguard Worker #include <gtest/gtest.h>
31*4d7e907cSAndroid Build Coastguard Worker #include <future>
32*4d7e907cSAndroid Build Coastguard Worker #include <map>
33*4d7e907cSAndroid Build Coastguard Worker #include <utility>
34*4d7e907cSAndroid Build Coastguard Worker 
35*4d7e907cSAndroid Build Coastguard Worker #include "Util.h"
36*4d7e907cSAndroid Build Coastguard Worker 
37*4d7e907cSAndroid Build Coastguard Worker namespace android::hardware::identity {
38*4d7e907cSAndroid Build Coastguard Worker 
39*4d7e907cSAndroid Build Coastguard Worker using std::endl;
40*4d7e907cSAndroid Build Coastguard Worker using std::make_pair;
41*4d7e907cSAndroid Build Coastguard Worker using std::map;
42*4d7e907cSAndroid Build Coastguard Worker using std::optional;
43*4d7e907cSAndroid Build Coastguard Worker using std::pair;
44*4d7e907cSAndroid Build Coastguard Worker using std::string;
45*4d7e907cSAndroid Build Coastguard Worker using std::tie;
46*4d7e907cSAndroid Build Coastguard Worker using std::vector;
47*4d7e907cSAndroid Build Coastguard Worker 
48*4d7e907cSAndroid Build Coastguard Worker using ::android::sp;
49*4d7e907cSAndroid Build Coastguard Worker using ::android::String16;
50*4d7e907cSAndroid Build Coastguard Worker using ::android::binder::Status;
51*4d7e907cSAndroid Build Coastguard Worker 
52*4d7e907cSAndroid Build Coastguard Worker using ::android::hardware::keymaster::HardwareAuthToken;
53*4d7e907cSAndroid Build Coastguard Worker using ::android::hardware::keymaster::VerificationToken;
54*4d7e907cSAndroid Build Coastguard Worker 
55*4d7e907cSAndroid Build Coastguard Worker class UserAuthTests : public testing::TestWithParam<string> {
56*4d7e907cSAndroid Build Coastguard Worker   public:
SetUp()57*4d7e907cSAndroid Build Coastguard Worker     virtual void SetUp() override {
58*4d7e907cSAndroid Build Coastguard Worker         credentialStore_ = android::waitForDeclaredService<IIdentityCredentialStore>(
59*4d7e907cSAndroid Build Coastguard Worker                 String16(GetParam().c_str()));
60*4d7e907cSAndroid Build Coastguard Worker         ASSERT_NE(credentialStore_, nullptr);
61*4d7e907cSAndroid Build Coastguard Worker     }
62*4d7e907cSAndroid Build Coastguard Worker 
63*4d7e907cSAndroid Build Coastguard Worker     void provisionData();
64*4d7e907cSAndroid Build Coastguard Worker     void setupRetrieveData();
65*4d7e907cSAndroid Build Coastguard Worker     pair<HardwareAuthToken, VerificationToken> mintTokens(uint64_t challengeForAuthToken,
66*4d7e907cSAndroid Build Coastguard Worker                                                           int64_t ageOfAuthTokenMilliSeconds);
67*4d7e907cSAndroid Build Coastguard Worker     void retrieveData(HardwareAuthToken authToken, VerificationToken verificationToken,
68*4d7e907cSAndroid Build Coastguard Worker                       bool expectSuccess, bool useSessionTranscript);
69*4d7e907cSAndroid Build Coastguard Worker 
70*4d7e907cSAndroid Build Coastguard Worker     // Set by provisionData
71*4d7e907cSAndroid Build Coastguard Worker     SecureAccessControlProfile sacp0_;
72*4d7e907cSAndroid Build Coastguard Worker     SecureAccessControlProfile sacp1_;
73*4d7e907cSAndroid Build Coastguard Worker     SecureAccessControlProfile sacp2_;
74*4d7e907cSAndroid Build Coastguard Worker 
75*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> encContentUserAuthPerSession_;
76*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> encContentUserAuthTimeout_;
77*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> encContentAccessibleByAll_;
78*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> encContentAccessibleByNone_;
79*4d7e907cSAndroid Build Coastguard Worker 
80*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> credentialData_;
81*4d7e907cSAndroid Build Coastguard Worker 
82*4d7e907cSAndroid Build Coastguard Worker     // Set by setupRetrieveData().
83*4d7e907cSAndroid Build Coastguard Worker     int64_t authChallenge_;
84*4d7e907cSAndroid Build Coastguard Worker     cppbor::Map sessionTranscript_;
85*4d7e907cSAndroid Build Coastguard Worker     sp<IIdentityCredential> credential_;
86*4d7e907cSAndroid Build Coastguard Worker 
87*4d7e907cSAndroid Build Coastguard Worker     // Set by retrieveData()
88*4d7e907cSAndroid Build Coastguard Worker     bool canGetUserAuthPerSession_;
89*4d7e907cSAndroid Build Coastguard Worker     bool canGetUserAuthTimeout_;
90*4d7e907cSAndroid Build Coastguard Worker     bool canGetAccessibleByAll_;
91*4d7e907cSAndroid Build Coastguard Worker     bool canGetAccessibleByNone_;
92*4d7e907cSAndroid Build Coastguard Worker 
93*4d7e907cSAndroid Build Coastguard Worker     sp<IIdentityCredentialStore> credentialStore_;
94*4d7e907cSAndroid Build Coastguard Worker };
95*4d7e907cSAndroid Build Coastguard Worker 
provisionData()96*4d7e907cSAndroid Build Coastguard Worker void UserAuthTests::provisionData() {
97*4d7e907cSAndroid Build Coastguard Worker     string docType = "org.iso.18013-5.2019.mdl";
98*4d7e907cSAndroid Build Coastguard Worker     bool testCredential = true;
99*4d7e907cSAndroid Build Coastguard Worker     sp<IWritableIdentityCredential> wc;
100*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(credentialStore_->createCredential(docType, testCredential, &wc).isOk());
101*4d7e907cSAndroid Build Coastguard Worker 
102*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> attestationApplicationId = {};
103*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> attestationChallenge = {1};
104*4d7e907cSAndroid Build Coastguard Worker     vector<Certificate> certChain;
105*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->getAttestationCertificate(attestationApplicationId, attestationChallenge,
106*4d7e907cSAndroid Build Coastguard Worker                                               &certChain)
107*4d7e907cSAndroid Build Coastguard Worker                         .isOk());
108*4d7e907cSAndroid Build Coastguard Worker 
109*4d7e907cSAndroid Build Coastguard Worker     size_t proofOfProvisioningSize = 381;
110*4d7e907cSAndroid Build Coastguard Worker     // Not in v1 HAL, may fail
111*4d7e907cSAndroid Build Coastguard Worker     wc->setExpectedProofOfProvisioningSize(proofOfProvisioningSize);
112*4d7e907cSAndroid Build Coastguard Worker 
113*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->startPersonalization(3 /* numAccessControlProfiles */,
114*4d7e907cSAndroid Build Coastguard Worker                                          {4} /* numDataElementsPerNamespace */)
115*4d7e907cSAndroid Build Coastguard Worker                         .isOk());
116*4d7e907cSAndroid Build Coastguard Worker 
117*4d7e907cSAndroid Build Coastguard Worker     // Access control profile 0: user auth every session (timeout = 0)
118*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addAccessControlProfile(0, {}, true, 0, 65 /* secureUserId */, &sacp0_).isOk());
119*4d7e907cSAndroid Build Coastguard Worker 
120*4d7e907cSAndroid Build Coastguard Worker     // Access control profile 1: user auth, 60 seconds timeout
121*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(
122*4d7e907cSAndroid Build Coastguard Worker             wc->addAccessControlProfile(1, {}, true, 60000, 65 /* secureUserId */, &sacp1_).isOk());
123*4d7e907cSAndroid Build Coastguard Worker 
124*4d7e907cSAndroid Build Coastguard Worker     // Access control profile 2: open access
125*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addAccessControlProfile(2, {}, false, 0, 0, &sacp2_).isOk());
126*4d7e907cSAndroid Build Coastguard Worker 
127*4d7e907cSAndroid Build Coastguard Worker     // Data Element: "UserAuth Per Session"
128*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->beginAddEntry({0}, "ns", "UserAuth Per Session", 1).isOk());
129*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addEntryValue({9}, &encContentUserAuthPerSession_).isOk());
130*4d7e907cSAndroid Build Coastguard Worker 
131*4d7e907cSAndroid Build Coastguard Worker     // Data Element: "UserAuth Timeout"
132*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->beginAddEntry({1}, "ns", "UserAuth Timeout", 1).isOk());
133*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addEntryValue({9}, &encContentUserAuthTimeout_).isOk());
134*4d7e907cSAndroid Build Coastguard Worker 
135*4d7e907cSAndroid Build Coastguard Worker     // Data Element: "Accessible by All"
136*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->beginAddEntry({2}, "ns", "Accessible by All", 1).isOk());
137*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByAll_).isOk());
138*4d7e907cSAndroid Build Coastguard Worker 
139*4d7e907cSAndroid Build Coastguard Worker     // Data Element: "Accessible by None"
140*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->beginAddEntry({}, "ns", "Accessible by None", 1).isOk());
141*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByNone_).isOk());
142*4d7e907cSAndroid Build Coastguard Worker 
143*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> proofOfProvisioningSignature;
144*4d7e907cSAndroid Build Coastguard Worker     Status status = wc->finishAddingEntries(&credentialData_, &proofOfProvisioningSignature);
145*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(status.isOk()) << status.exceptionCode() << ": " << status.exceptionMessage();
146*4d7e907cSAndroid Build Coastguard Worker }
147*4d7e907cSAndroid Build Coastguard Worker 
148*4d7e907cSAndroid Build Coastguard Worker // From ReaderAuthTest.cpp - TODO: consolidate with Util.h
149*4d7e907cSAndroid Build Coastguard Worker pair<vector<uint8_t>, vector<uint8_t>> generateReaderKey();
150*4d7e907cSAndroid Build Coastguard Worker vector<uint8_t> generateReaderCert(const vector<uint8_t>& publicKey,
151*4d7e907cSAndroid Build Coastguard Worker                                    const vector<uint8_t>& signingKey);
152*4d7e907cSAndroid Build Coastguard Worker RequestDataItem buildRequestDataItem(const string& name, size_t size,
153*4d7e907cSAndroid Build Coastguard Worker                                      vector<int32_t> accessControlProfileIds);
154*4d7e907cSAndroid Build Coastguard Worker 
calcSessionTranscript(const vector<uint8_t> & ePublicKey)155*4d7e907cSAndroid Build Coastguard Worker cppbor::Map calcSessionTranscript(const vector<uint8_t>& ePublicKey) {
156*4d7e907cSAndroid Build Coastguard Worker     auto [getXYSuccess, ephX, ephY] = support::ecPublicKeyGetXandY(ePublicKey);
157*4d7e907cSAndroid Build Coastguard Worker     cppbor::Map deviceEngagement = cppbor::Map().add("ephX", ephX).add("ephY", ephY);
158*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> deviceEngagementBytes = deviceEngagement.encode();
159*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> eReaderPubBytes = cppbor::Tstr("ignored").encode();
160*4d7e907cSAndroid Build Coastguard Worker     // Let SessionTranscript be a map here (it's an array in EndToEndTest) just
161*4d7e907cSAndroid Build Coastguard Worker     // to check that the implementation can deal with either.
162*4d7e907cSAndroid Build Coastguard Worker     cppbor::Map sessionTranscript;
163*4d7e907cSAndroid Build Coastguard Worker     sessionTranscript.add(42, cppbor::SemanticTag(24, deviceEngagementBytes));
164*4d7e907cSAndroid Build Coastguard Worker     sessionTranscript.add(43, cppbor::SemanticTag(24, eReaderPubBytes));
165*4d7e907cSAndroid Build Coastguard Worker     return sessionTranscript;
166*4d7e907cSAndroid Build Coastguard Worker }
167*4d7e907cSAndroid Build Coastguard Worker 
setupRetrieveData()168*4d7e907cSAndroid Build Coastguard Worker void UserAuthTests::setupRetrieveData() {
169*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(credentialStore_
170*4d7e907cSAndroid Build Coastguard Worker                         ->getCredential(
171*4d7e907cSAndroid Build Coastguard Worker                                 CipherSuite::CIPHERSUITE_ECDHE_HKDF_ECDSA_WITH_AES_256_GCM_SHA256,
172*4d7e907cSAndroid Build Coastguard Worker                                 credentialData_, &credential_)
173*4d7e907cSAndroid Build Coastguard Worker                         .isOk());
174*4d7e907cSAndroid Build Coastguard Worker 
175*4d7e907cSAndroid Build Coastguard Worker     optional<vector<uint8_t>> readerEKeyPair = support::createEcKeyPair();
176*4d7e907cSAndroid Build Coastguard Worker     optional<vector<uint8_t>> readerEPublicKey =
177*4d7e907cSAndroid Build Coastguard Worker             support::ecKeyPairGetPublicKey(readerEKeyPair.value());
178*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(credential_->setReaderEphemeralPublicKey(readerEPublicKey.value()).isOk());
179*4d7e907cSAndroid Build Coastguard Worker 
180*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> eKeyPair;
181*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(credential_->createEphemeralKeyPair(&eKeyPair).isOk());
182*4d7e907cSAndroid Build Coastguard Worker     optional<vector<uint8_t>> ePublicKey = support::ecKeyPairGetPublicKey(eKeyPair);
183*4d7e907cSAndroid Build Coastguard Worker     sessionTranscript_ = calcSessionTranscript(ePublicKey.value());
184*4d7e907cSAndroid Build Coastguard Worker 
185*4d7e907cSAndroid Build Coastguard Worker     Status status = credential_->createAuthChallenge(&authChallenge_);
186*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(status.isOk()) << status.exceptionCode() << ": " << status.exceptionMessage();
187*4d7e907cSAndroid Build Coastguard Worker }
188*4d7e907cSAndroid Build Coastguard Worker 
retrieveData(HardwareAuthToken authToken,VerificationToken verificationToken,bool expectSuccess,bool useSessionTranscript)189*4d7e907cSAndroid Build Coastguard Worker void UserAuthTests::retrieveData(HardwareAuthToken authToken, VerificationToken verificationToken,
190*4d7e907cSAndroid Build Coastguard Worker                                  bool expectSuccess, bool useSessionTranscript) {
191*4d7e907cSAndroid Build Coastguard Worker     canGetUserAuthPerSession_ = false;
192*4d7e907cSAndroid Build Coastguard Worker     canGetUserAuthTimeout_ = false;
193*4d7e907cSAndroid Build Coastguard Worker     canGetAccessibleByAll_ = false;
194*4d7e907cSAndroid Build Coastguard Worker     canGetAccessibleByNone_ = false;
195*4d7e907cSAndroid Build Coastguard Worker 
196*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> itemsRequestBytes;
197*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> sessionTranscriptBytes;
198*4d7e907cSAndroid Build Coastguard Worker     if (useSessionTranscript) {
199*4d7e907cSAndroid Build Coastguard Worker         sessionTranscriptBytes = sessionTranscript_.encode();
200*4d7e907cSAndroid Build Coastguard Worker 
201*4d7e907cSAndroid Build Coastguard Worker         itemsRequestBytes =
202*4d7e907cSAndroid Build Coastguard Worker                 cppbor::Map("nameSpaces",
203*4d7e907cSAndroid Build Coastguard Worker                             cppbor::Map().add("ns", cppbor::Map()
204*4d7e907cSAndroid Build Coastguard Worker                                                             .add("UserAuth Per Session", false)
205*4d7e907cSAndroid Build Coastguard Worker                                                             .add("UserAuth Timeout", false)
206*4d7e907cSAndroid Build Coastguard Worker                                                             .add("Accessible by All", false)
207*4d7e907cSAndroid Build Coastguard Worker                                                             .add("Accessible by None", false)))
208*4d7e907cSAndroid Build Coastguard Worker                         .encode();
209*4d7e907cSAndroid Build Coastguard Worker         vector<uint8_t> dataToSign = cppbor::Array()
210*4d7e907cSAndroid Build Coastguard Worker                                              .add("ReaderAuthentication")
211*4d7e907cSAndroid Build Coastguard Worker                                              .add(sessionTranscript_.clone())
212*4d7e907cSAndroid Build Coastguard Worker                                              .add(cppbor::SemanticTag(24, itemsRequestBytes))
213*4d7e907cSAndroid Build Coastguard Worker                                              .encode();
214*4d7e907cSAndroid Build Coastguard Worker     }
215*4d7e907cSAndroid Build Coastguard Worker 
216*4d7e907cSAndroid Build Coastguard Worker     // Generate the key that will be used to sign AuthenticatedData.
217*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> signingKeyBlob;
218*4d7e907cSAndroid Build Coastguard Worker     Certificate signingKeyCertificate;
219*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(
220*4d7e907cSAndroid Build Coastguard Worker             credential_->generateSigningKeyPair(&signingKeyBlob, &signingKeyCertificate).isOk());
221*4d7e907cSAndroid Build Coastguard Worker 
222*4d7e907cSAndroid Build Coastguard Worker     RequestNamespace rns;
223*4d7e907cSAndroid Build Coastguard Worker     rns.namespaceName = "ns";
224*4d7e907cSAndroid Build Coastguard Worker     rns.items.push_back(buildRequestDataItem("UserAuth Per Session", 1, {0}));
225*4d7e907cSAndroid Build Coastguard Worker     rns.items.push_back(buildRequestDataItem("UserAuth Timeout", 1, {1}));
226*4d7e907cSAndroid Build Coastguard Worker     rns.items.push_back(buildRequestDataItem("Accessible by All", 1, {2}));
227*4d7e907cSAndroid Build Coastguard Worker     rns.items.push_back(buildRequestDataItem("Accessible by None", 1, {}));
228*4d7e907cSAndroid Build Coastguard Worker     // OK to fail, not available in v1 HAL
229*4d7e907cSAndroid Build Coastguard Worker     credential_->setRequestedNamespaces({rns}).isOk();
230*4d7e907cSAndroid Build Coastguard Worker 
231*4d7e907cSAndroid Build Coastguard Worker     // OK to fail, not available in v1 HAL
232*4d7e907cSAndroid Build Coastguard Worker     credential_->setVerificationToken(verificationToken);
233*4d7e907cSAndroid Build Coastguard Worker 
234*4d7e907cSAndroid Build Coastguard Worker     Status status = credential_->startRetrieval({sacp0_, sacp1_, sacp2_}, authToken,
235*4d7e907cSAndroid Build Coastguard Worker                                                 itemsRequestBytes, signingKeyBlob,
236*4d7e907cSAndroid Build Coastguard Worker                                                 sessionTranscriptBytes, {} /* readerSignature */,
237*4d7e907cSAndroid Build Coastguard Worker                                                 {4 /* numDataElementsPerNamespace */});
238*4d7e907cSAndroid Build Coastguard Worker     if (expectSuccess) {
239*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(status.isOk());
240*4d7e907cSAndroid Build Coastguard Worker     } else {
241*4d7e907cSAndroid Build Coastguard Worker         ASSERT_FALSE(status.isOk());
242*4d7e907cSAndroid Build Coastguard Worker         return;
243*4d7e907cSAndroid Build Coastguard Worker     }
244*4d7e907cSAndroid Build Coastguard Worker 
245*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> decrypted;
246*4d7e907cSAndroid Build Coastguard Worker 
247*4d7e907cSAndroid Build Coastguard Worker     status = credential_->startRetrieveEntryValue("ns", "UserAuth Per Session", 1, {0});
248*4d7e907cSAndroid Build Coastguard Worker     if (status.isOk()) {
249*4d7e907cSAndroid Build Coastguard Worker         canGetUserAuthPerSession_ = true;
250*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(
251*4d7e907cSAndroid Build Coastguard Worker                 credential_->retrieveEntryValue(encContentUserAuthPerSession_, &decrypted).isOk());
252*4d7e907cSAndroid Build Coastguard Worker     }
253*4d7e907cSAndroid Build Coastguard Worker 
254*4d7e907cSAndroid Build Coastguard Worker     status = credential_->startRetrieveEntryValue("ns", "UserAuth Timeout", 1, {1});
255*4d7e907cSAndroid Build Coastguard Worker     if (status.isOk()) {
256*4d7e907cSAndroid Build Coastguard Worker         canGetUserAuthTimeout_ = true;
257*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(credential_->retrieveEntryValue(encContentUserAuthTimeout_, &decrypted).isOk());
258*4d7e907cSAndroid Build Coastguard Worker     }
259*4d7e907cSAndroid Build Coastguard Worker 
260*4d7e907cSAndroid Build Coastguard Worker     status = credential_->startRetrieveEntryValue("ns", "Accessible by All", 1, {2});
261*4d7e907cSAndroid Build Coastguard Worker     if (status.isOk()) {
262*4d7e907cSAndroid Build Coastguard Worker         canGetAccessibleByAll_ = true;
263*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(credential_->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk());
264*4d7e907cSAndroid Build Coastguard Worker     }
265*4d7e907cSAndroid Build Coastguard Worker 
266*4d7e907cSAndroid Build Coastguard Worker     status = credential_->startRetrieveEntryValue("ns", "Accessible by None", 1, {});
267*4d7e907cSAndroid Build Coastguard Worker     if (status.isOk()) {
268*4d7e907cSAndroid Build Coastguard Worker         canGetAccessibleByNone_ = true;
269*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(
270*4d7e907cSAndroid Build Coastguard Worker                 credential_->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk());
271*4d7e907cSAndroid Build Coastguard Worker     }
272*4d7e907cSAndroid Build Coastguard Worker 
273*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> mac;
274*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> deviceNameSpaces;
275*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(credential_->finishRetrieval(&mac, &deviceNameSpaces).isOk());
276*4d7e907cSAndroid Build Coastguard Worker }
277*4d7e907cSAndroid Build Coastguard Worker 
mintTokens(uint64_t challengeForAuthToken,int64_t ageOfAuthTokenMilliSeconds)278*4d7e907cSAndroid Build Coastguard Worker pair<HardwareAuthToken, VerificationToken> UserAuthTests::mintTokens(
279*4d7e907cSAndroid Build Coastguard Worker         uint64_t challengeForAuthToken, int64_t ageOfAuthTokenMilliSeconds) {
280*4d7e907cSAndroid Build Coastguard Worker     HardwareAuthToken authToken;
281*4d7e907cSAndroid Build Coastguard Worker     VerificationToken verificationToken;
282*4d7e907cSAndroid Build Coastguard Worker 
283*4d7e907cSAndroid Build Coastguard Worker     uint64_t epochMilliseconds = 1000ULL * 1000ULL * 1000ULL * 1000ULL;
284*4d7e907cSAndroid Build Coastguard Worker 
285*4d7e907cSAndroid Build Coastguard Worker     authToken.challenge = challengeForAuthToken;
286*4d7e907cSAndroid Build Coastguard Worker     authToken.userId = 65;
287*4d7e907cSAndroid Build Coastguard Worker     authToken.authenticatorId = 0;
288*4d7e907cSAndroid Build Coastguard Worker     authToken.authenticatorType = ::android::hardware::keymaster::HardwareAuthenticatorType::NONE;
289*4d7e907cSAndroid Build Coastguard Worker     authToken.timestamp.milliSeconds = epochMilliseconds - ageOfAuthTokenMilliSeconds;
290*4d7e907cSAndroid Build Coastguard Worker     authToken.mac.clear();
291*4d7e907cSAndroid Build Coastguard Worker     verificationToken.challenge = authChallenge_;
292*4d7e907cSAndroid Build Coastguard Worker     verificationToken.timestamp.milliSeconds = epochMilliseconds;
293*4d7e907cSAndroid Build Coastguard Worker     verificationToken.securityLevel =
294*4d7e907cSAndroid Build Coastguard Worker             ::android::hardware::keymaster::SecurityLevel::TRUSTED_ENVIRONMENT;
295*4d7e907cSAndroid Build Coastguard Worker     verificationToken.mac.clear();
296*4d7e907cSAndroid Build Coastguard Worker     return make_pair(authToken, verificationToken);
297*4d7e907cSAndroid Build Coastguard Worker }
298*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,GoodChallenge)299*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, GoodChallenge) {
300*4d7e907cSAndroid Build Coastguard Worker     provisionData();
301*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
302*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(authChallenge_,  // challengeForAuthToken
303*4d7e907cSAndroid Build Coastguard Worker                                                      0);              // ageOfAuthTokenMilliSeconds
304*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
305*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
306*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthPerSession_);
307*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
308*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
309*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
310*4d7e907cSAndroid Build Coastguard Worker }
311*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,OtherChallenge)312*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, OtherChallenge) {
313*4d7e907cSAndroid Build Coastguard Worker     provisionData();
314*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
315*4d7e907cSAndroid Build Coastguard Worker     uint64_t otherChallenge = authChallenge_ ^ 0x12345678;
316*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(otherChallenge,  // challengeForAuthToken
317*4d7e907cSAndroid Build Coastguard Worker                                                      0);              // ageOfAuthTokenMilliSeconds
318*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
319*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
320*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
321*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
322*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
323*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
324*4d7e907cSAndroid Build Coastguard Worker }
325*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,NoChallenge)326*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, NoChallenge) {
327*4d7e907cSAndroid Build Coastguard Worker     provisionData();
328*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
329*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,   // challengeForAuthToken
330*4d7e907cSAndroid Build Coastguard Worker                                                      0);  // ageOfAuthTokenMilliSeconds
331*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
332*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
333*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
334*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
335*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
336*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
337*4d7e907cSAndroid Build Coastguard Worker }
338*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,AuthTokenAgeZero)339*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, AuthTokenAgeZero) {
340*4d7e907cSAndroid Build Coastguard Worker     provisionData();
341*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
342*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,   // challengeForAuthToken
343*4d7e907cSAndroid Build Coastguard Worker                                                      0);  // ageOfAuthTokenMilliSeconds
344*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
345*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
346*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
347*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
348*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
349*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
350*4d7e907cSAndroid Build Coastguard Worker }
351*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,AuthTokenFromTheFuture)352*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, AuthTokenFromTheFuture) {
353*4d7e907cSAndroid Build Coastguard Worker     provisionData();
354*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
355*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,           // challengeForAuthToken
356*4d7e907cSAndroid Build Coastguard Worker                                                      -1 * 1000);  // ageOfAuthTokenMilliSeconds
357*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
358*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
359*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
360*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthTimeout_);
361*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
362*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
363*4d7e907cSAndroid Build Coastguard Worker }
364*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,AuthTokenInsideTimeout)365*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, AuthTokenInsideTimeout) {
366*4d7e907cSAndroid Build Coastguard Worker     provisionData();
367*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
368*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,           // challengeForAuthToken
369*4d7e907cSAndroid Build Coastguard Worker                                                      30 * 1000);  // ageOfAuthTokenMilliSeconds
370*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
371*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
372*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
373*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
374*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
375*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
376*4d7e907cSAndroid Build Coastguard Worker }
377*4d7e907cSAndroid Build Coastguard Worker 
TEST_P(UserAuthTests,AuthTokenOutsideTimeout)378*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, AuthTokenOutsideTimeout) {
379*4d7e907cSAndroid Build Coastguard Worker     provisionData();
380*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
381*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,           // challengeForAuthToken
382*4d7e907cSAndroid Build Coastguard Worker                                                      61 * 1000);  // ageOfAuthTokenMilliSeconds
383*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
384*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
385*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
386*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthTimeout_);
387*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
388*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
389*4d7e907cSAndroid Build Coastguard Worker }
390*4d7e907cSAndroid Build Coastguard Worker 
391*4d7e907cSAndroid Build Coastguard Worker // The API works even when there's no SessionTranscript / itemsRequest.
392*4d7e907cSAndroid Build Coastguard Worker // Verify that.
TEST_P(UserAuthTests,NoSessionTranscript)393*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, NoSessionTranscript) {
394*4d7e907cSAndroid Build Coastguard Worker     provisionData();
395*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
396*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,          // challengeForAuthToken
397*4d7e907cSAndroid Build Coastguard Worker                                                      1 * 1000);  // ageOfAuthTokenMilliSeconds
398*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
399*4d7e907cSAndroid Build Coastguard Worker                  false /* useSessionTranscript */);
400*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
401*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
402*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
403*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
404*4d7e907cSAndroid Build Coastguard Worker }
405*4d7e907cSAndroid Build Coastguard Worker 
406*4d7e907cSAndroid Build Coastguard Worker // This test verifies that it's possible to do multiple requests as long
407*4d7e907cSAndroid Build Coastguard Worker // as the sessionTranscript doesn't change.
408*4d7e907cSAndroid Build Coastguard Worker //
TEST_P(UserAuthTests,MultipleRequestsSameSessionTranscript)409*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, MultipleRequestsSameSessionTranscript) {
410*4d7e907cSAndroid Build Coastguard Worker     provisionData();
411*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
412*4d7e907cSAndroid Build Coastguard Worker 
413*4d7e907cSAndroid Build Coastguard Worker     // First we try with a stale authToken
414*4d7e907cSAndroid Build Coastguard Worker     //
415*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,           // challengeForAuthToken
416*4d7e907cSAndroid Build Coastguard Worker                                                      61 * 1000);  // ageOfAuthTokenMilliSeconds
417*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
418*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
419*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
420*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthTimeout_);
421*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
422*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
423*4d7e907cSAndroid Build Coastguard Worker 
424*4d7e907cSAndroid Build Coastguard Worker     // Then we get a new authToken and try again.
425*4d7e907cSAndroid Build Coastguard Worker     tie(authToken, verificationToken) = mintTokens(0,          // challengeForAuthToken
426*4d7e907cSAndroid Build Coastguard Worker                                                    5 * 1000);  // ageOfAuthTokenMilliSeconds
427*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
428*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
429*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
430*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetUserAuthTimeout_);
431*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
432*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
433*4d7e907cSAndroid Build Coastguard Worker }
434*4d7e907cSAndroid Build Coastguard Worker 
435*4d7e907cSAndroid Build Coastguard Worker // Like MultipleRequestsSameSessionTranscript but we change the sessionTranscript
436*4d7e907cSAndroid Build Coastguard Worker // between the two calls. This test verifies that change is detected and the
437*4d7e907cSAndroid Build Coastguard Worker // second request fails.
438*4d7e907cSAndroid Build Coastguard Worker //
TEST_P(UserAuthTests,MultipleRequestsSessionTranscriptChanges)439*4d7e907cSAndroid Build Coastguard Worker TEST_P(UserAuthTests, MultipleRequestsSessionTranscriptChanges) {
440*4d7e907cSAndroid Build Coastguard Worker     provisionData();
441*4d7e907cSAndroid Build Coastguard Worker     setupRetrieveData();
442*4d7e907cSAndroid Build Coastguard Worker 
443*4d7e907cSAndroid Build Coastguard Worker     // First we try with a stale authToken
444*4d7e907cSAndroid Build Coastguard Worker     //
445*4d7e907cSAndroid Build Coastguard Worker     auto [authToken, verificationToken] = mintTokens(0,           // challengeForAuthToken
446*4d7e907cSAndroid Build Coastguard Worker                                                      61 * 1000);  // ageOfAuthTokenMilliSeconds
447*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, true /* expectSuccess */,
448*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
449*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthPerSession_);
450*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetUserAuthTimeout_);
451*4d7e907cSAndroid Build Coastguard Worker     EXPECT_TRUE(canGetAccessibleByAll_);
452*4d7e907cSAndroid Build Coastguard Worker     EXPECT_FALSE(canGetAccessibleByNone_);
453*4d7e907cSAndroid Build Coastguard Worker 
454*4d7e907cSAndroid Build Coastguard Worker     // Then we get a new authToken and try again.
455*4d7e907cSAndroid Build Coastguard Worker     tie(authToken, verificationToken) = mintTokens(0,          // challengeForAuthToken
456*4d7e907cSAndroid Build Coastguard Worker                                                    5 * 1000);  // ageOfAuthTokenMilliSeconds
457*4d7e907cSAndroid Build Coastguard Worker 
458*4d7e907cSAndroid Build Coastguard Worker     // Change sessionTranscript...
459*4d7e907cSAndroid Build Coastguard Worker     optional<vector<uint8_t>> eKeyPairNew = support::createEcKeyPair();
460*4d7e907cSAndroid Build Coastguard Worker     optional<vector<uint8_t>> ePublicKeyNew = support::ecKeyPairGetPublicKey(eKeyPairNew.value());
461*4d7e907cSAndroid Build Coastguard Worker     sessionTranscript_ = calcSessionTranscript(ePublicKeyNew.value());
462*4d7e907cSAndroid Build Coastguard Worker 
463*4d7e907cSAndroid Build Coastguard Worker     // ... and expect failure.
464*4d7e907cSAndroid Build Coastguard Worker     retrieveData(authToken, verificationToken, false /* expectSuccess */,
465*4d7e907cSAndroid Build Coastguard Worker                  true /* useSessionTranscript */);
466*4d7e907cSAndroid Build Coastguard Worker }
467*4d7e907cSAndroid Build Coastguard Worker 
468*4d7e907cSAndroid Build Coastguard Worker GTEST_ALLOW_UNINSTANTIATED_PARAMETERIZED_TEST(UserAuthTests);
469*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_TEST_SUITE_P(
470*4d7e907cSAndroid Build Coastguard Worker         Identity, UserAuthTests,
471*4d7e907cSAndroid Build Coastguard Worker         testing::ValuesIn(android::getAidlHalInstanceNames(IIdentityCredentialStore::descriptor)),
472*4d7e907cSAndroid Build Coastguard Worker         android::PrintInstanceNameToString);
473*4d7e907cSAndroid Build Coastguard Worker 
474*4d7e907cSAndroid Build Coastguard Worker }  // namespace android::hardware::identity
475