xref: /aosp_15_r20/hardware/interfaces/keymaster/4.0/vts/functional/BootloaderStateTest.cpp (revision 4d7e907c777eeecc4c5bd7cf640a754fac206ff7)
1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker  * Copyright (C) 2023 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker  *
4*4d7e907cSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker  *
8*4d7e907cSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker  *
10*4d7e907cSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker  * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker  */
16*4d7e907cSAndroid Build Coastguard Worker 
17*4d7e907cSAndroid Build Coastguard Worker #include <memory>
18*4d7e907cSAndroid Build Coastguard Worker #include <optional>
19*4d7e907cSAndroid Build Coastguard Worker #include <string>
20*4d7e907cSAndroid Build Coastguard Worker #include <vector>
21*4d7e907cSAndroid Build Coastguard Worker 
22*4d7e907cSAndroid Build Coastguard Worker #include <android-base/properties.h>
23*4d7e907cSAndroid Build Coastguard Worker #include <fstab/fstab.h>
24*4d7e907cSAndroid Build Coastguard Worker #include <libavb/libavb.h>
25*4d7e907cSAndroid Build Coastguard Worker #include <libavb_user/avb_ops_user.h>
26*4d7e907cSAndroid Build Coastguard Worker 
27*4d7e907cSAndroid Build Coastguard Worker #include "KeymasterHidlTest.h"
28*4d7e907cSAndroid Build Coastguard Worker 
29*4d7e907cSAndroid Build Coastguard Worker namespace android::hardware::keymaster::V4_0::test {
30*4d7e907cSAndroid Build Coastguard Worker 
31*4d7e907cSAndroid Build Coastguard Worker using ::std::string;
32*4d7e907cSAndroid Build Coastguard Worker using ::std::vector;
33*4d7e907cSAndroid Build Coastguard Worker 
34*4d7e907cSAndroid Build Coastguard Worker // Since this test needs to talk to Keymaster HAL, it can only run as root. Thus,
35*4d7e907cSAndroid Build Coastguard Worker // bootloader can not be locked.
36*4d7e907cSAndroid Build Coastguard Worker class BootloaderStateTest : public KeymasterHidlTest {
37*4d7e907cSAndroid Build Coastguard Worker   public:
SetUp()38*4d7e907cSAndroid Build Coastguard Worker     virtual void SetUp() override {
39*4d7e907cSAndroid Build Coastguard Worker         KeymasterHidlTest::SetUp();
40*4d7e907cSAndroid Build Coastguard Worker 
41*4d7e907cSAndroid Build Coastguard Worker         // Generate a key.
42*4d7e907cSAndroid Build Coastguard Worker         auto ec = GenerateKey(AuthorizationSetBuilder()
43*4d7e907cSAndroid Build Coastguard Worker                                       .Authorization(TAG_NO_AUTH_REQUIRED)
44*4d7e907cSAndroid Build Coastguard Worker                                       .EcdsaSigningKey(EcCurve::P_256)
45*4d7e907cSAndroid Build Coastguard Worker                                       .Digest(Digest::SHA_2_256));
46*4d7e907cSAndroid Build Coastguard Worker         ASSERT_EQ(ec, ErrorCode::OK) << "Failed to generate key.";
47*4d7e907cSAndroid Build Coastguard Worker 
48*4d7e907cSAndroid Build Coastguard Worker         // Generate attestation.
49*4d7e907cSAndroid Build Coastguard Worker         hidl_vec<hidl_vec<uint8_t>> cert_chain;
50*4d7e907cSAndroid Build Coastguard Worker         ec = AttestKey(AuthorizationSetBuilder()
51*4d7e907cSAndroid Build Coastguard Worker                                .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
52*4d7e907cSAndroid Build Coastguard Worker                                .Authorization(TAG_ATTESTATION_APPLICATION_ID, HidlBuf("foo")),
53*4d7e907cSAndroid Build Coastguard Worker                        &cert_chain);
54*4d7e907cSAndroid Build Coastguard Worker         ASSERT_EQ(ec, ErrorCode::OK) << "Failed to generate attestation.";
55*4d7e907cSAndroid Build Coastguard Worker 
56*4d7e907cSAndroid Build Coastguard Worker         X509_Ptr cert(parse_cert_blob(cert_chain[0]));
57*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(cert.get()) << "Failed to parse certificate blob.";
58*4d7e907cSAndroid Build Coastguard Worker 
59*4d7e907cSAndroid Build Coastguard Worker         ASN1_OCTET_STRING* attest_rec = get_attestation_record(cert.get());
60*4d7e907cSAndroid Build Coastguard Worker         ASSERT_TRUE(attest_rec) << "Failed to get attestation record.";
61*4d7e907cSAndroid Build Coastguard Worker 
62*4d7e907cSAndroid Build Coastguard Worker         // Parse root of trust.
63*4d7e907cSAndroid Build Coastguard Worker         auto result = parse_root_of_trust(attest_rec->data, attest_rec->length, &attestedVbKey_,
64*4d7e907cSAndroid Build Coastguard Worker                                           &attestedVbState_, &attestedBootloaderState_,
65*4d7e907cSAndroid Build Coastguard Worker                                           &attestedVbmetaDigest_);
66*4d7e907cSAndroid Build Coastguard Worker         ASSERT_EQ(result, ErrorCode::OK) << "Failed to parse root of trust.";
67*4d7e907cSAndroid Build Coastguard Worker     }
68*4d7e907cSAndroid Build Coastguard Worker 
69*4d7e907cSAndroid Build Coastguard Worker     hidl_vec<uint8_t> attestedVbKey_;
70*4d7e907cSAndroid Build Coastguard Worker     keymaster_verified_boot_t attestedVbState_;
71*4d7e907cSAndroid Build Coastguard Worker     bool attestedBootloaderState_;
72*4d7e907cSAndroid Build Coastguard Worker     hidl_vec<uint8_t> attestedVbmetaDigest_;
73*4d7e907cSAndroid Build Coastguard Worker };
74*4d7e907cSAndroid Build Coastguard Worker 
75*4d7e907cSAndroid Build Coastguard Worker // Check that attested bootloader state is set to unlocked.
TEST_P(BootloaderStateTest,BootloaderIsUnlocked)76*4d7e907cSAndroid Build Coastguard Worker TEST_P(BootloaderStateTest, BootloaderIsUnlocked) {
77*4d7e907cSAndroid Build Coastguard Worker     ASSERT_FALSE(attestedBootloaderState_)
78*4d7e907cSAndroid Build Coastguard Worker             << "This test runs as root. Bootloader must be unlocked.";
79*4d7e907cSAndroid Build Coastguard Worker }
80*4d7e907cSAndroid Build Coastguard Worker 
81*4d7e907cSAndroid Build Coastguard Worker // Check that verified boot state is set to "unverified", i.e. "orange".
TEST_P(BootloaderStateTest,VbStateIsUnverified)82*4d7e907cSAndroid Build Coastguard Worker TEST_P(BootloaderStateTest, VbStateIsUnverified) {
83*4d7e907cSAndroid Build Coastguard Worker     // Unlocked bootloader implies that verified boot state must be "unverified".
84*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(attestedVbState_, KM_VERIFIED_BOOT_UNVERIFIED)
85*4d7e907cSAndroid Build Coastguard Worker             << "Verified boot state must be \"UNVERIFIED\" aka \"orange\".";
86*4d7e907cSAndroid Build Coastguard Worker 
87*4d7e907cSAndroid Build Coastguard Worker     // AVB spec stipulates that bootloader must set "androidboot.verifiedbootstate" parameter
88*4d7e907cSAndroid Build Coastguard Worker     // on the kernel command-line. This parameter is exposed to userspace as
89*4d7e907cSAndroid Build Coastguard Worker     // "ro.boot.verifiedbootstate" property.
90*4d7e907cSAndroid Build Coastguard Worker     auto vbStateProp = ::android::base::GetProperty("ro.boot.verifiedbootstate", "");
91*4d7e907cSAndroid Build Coastguard Worker     ASSERT_EQ(vbStateProp, "orange")
92*4d7e907cSAndroid Build Coastguard Worker             << "Verified boot state must be \"UNVERIFIED\" aka \"orange\".";
93*4d7e907cSAndroid Build Coastguard Worker }
94*4d7e907cSAndroid Build Coastguard Worker 
95*4d7e907cSAndroid Build Coastguard Worker // Following error codes from avb_slot_data() mean that slot data was loaded
96*4d7e907cSAndroid Build Coastguard Worker // (even if verification failed).
avb_slot_data_loaded(AvbSlotVerifyResult result)97*4d7e907cSAndroid Build Coastguard Worker static inline bool avb_slot_data_loaded(AvbSlotVerifyResult result) {
98*4d7e907cSAndroid Build Coastguard Worker     switch (result) {
99*4d7e907cSAndroid Build Coastguard Worker         case AVB_SLOT_VERIFY_RESULT_OK:
100*4d7e907cSAndroid Build Coastguard Worker         case AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION:
101*4d7e907cSAndroid Build Coastguard Worker         case AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX:
102*4d7e907cSAndroid Build Coastguard Worker         case AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED:
103*4d7e907cSAndroid Build Coastguard Worker             return true;
104*4d7e907cSAndroid Build Coastguard Worker         default:
105*4d7e907cSAndroid Build Coastguard Worker             return false;
106*4d7e907cSAndroid Build Coastguard Worker     }
107*4d7e907cSAndroid Build Coastguard Worker }
108*4d7e907cSAndroid Build Coastguard Worker 
109*4d7e907cSAndroid Build Coastguard Worker // Check that attested vbmeta digest is correct.
TEST_P(BootloaderStateTest,VbmetaDigest)110*4d7e907cSAndroid Build Coastguard Worker TEST_P(BootloaderStateTest, VbmetaDigest) {
111*4d7e907cSAndroid Build Coastguard Worker     AvbSlotVerifyData* avbSlotData;
112*4d7e907cSAndroid Build Coastguard Worker     auto suffix = fs_mgr_get_slot_suffix();
113*4d7e907cSAndroid Build Coastguard Worker     const char* partitions[] = {nullptr};
114*4d7e907cSAndroid Build Coastguard Worker     auto avbOps = avb_ops_user_new();
115*4d7e907cSAndroid Build Coastguard Worker 
116*4d7e907cSAndroid Build Coastguard Worker     // For VTS, devices run with vendor_boot-debug.img, which is not release key
117*4d7e907cSAndroid Build Coastguard Worker     // signed. Use AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR to bypass avb
118*4d7e907cSAndroid Build Coastguard Worker     // verification errors. This is OK since we only care about the digest for
119*4d7e907cSAndroid Build Coastguard Worker     // this test case.
120*4d7e907cSAndroid Build Coastguard Worker     auto result = avb_slot_verify(avbOps, partitions, suffix.c_str(),
121*4d7e907cSAndroid Build Coastguard Worker                                   AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR,
122*4d7e907cSAndroid Build Coastguard Worker                                   AVB_HASHTREE_ERROR_MODE_EIO, &avbSlotData);
123*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE(avb_slot_data_loaded(result)) << "Failed to load avb slot data";
124*4d7e907cSAndroid Build Coastguard Worker 
125*4d7e907cSAndroid Build Coastguard Worker     // Unfortunately, bootloader is not required to report the algorithm used
126*4d7e907cSAndroid Build Coastguard Worker     // to calculate the digest. There are only two supported options though,
127*4d7e907cSAndroid Build Coastguard Worker     // SHA256 and SHA512. Attested VBMeta digest must match one of these.
128*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> digest256(AVB_SHA256_DIGEST_SIZE);
129*4d7e907cSAndroid Build Coastguard Worker     vector<uint8_t> digest512(AVB_SHA512_DIGEST_SIZE);
130*4d7e907cSAndroid Build Coastguard Worker 
131*4d7e907cSAndroid Build Coastguard Worker     avb_slot_verify_data_calculate_vbmeta_digest(avbSlotData, AVB_DIGEST_TYPE_SHA256,
132*4d7e907cSAndroid Build Coastguard Worker                                                  digest256.data());
133*4d7e907cSAndroid Build Coastguard Worker     avb_slot_verify_data_calculate_vbmeta_digest(avbSlotData, AVB_DIGEST_TYPE_SHA512,
134*4d7e907cSAndroid Build Coastguard Worker                                                  digest512.data());
135*4d7e907cSAndroid Build Coastguard Worker 
136*4d7e907cSAndroid Build Coastguard Worker     ASSERT_TRUE((attestedVbmetaDigest_ == digest256) || (attestedVbmetaDigest_ == digest512))
137*4d7e907cSAndroid Build Coastguard Worker             << "Attested digest does not match computed digest.";
138*4d7e907cSAndroid Build Coastguard Worker }
139*4d7e907cSAndroid Build Coastguard Worker 
140*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_HIDL_TEST(BootloaderStateTest);
141*4d7e907cSAndroid Build Coastguard Worker 
142*4d7e907cSAndroid Build Coastguard Worker }  // namespace android::hardware::keymaster::V4_0::test
143