1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker * Copyright (C) 2020 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker *
4*4d7e907cSAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker *
8*4d7e907cSAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker *
10*4d7e907cSAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker */
16*4d7e907cSAndroid Build Coastguard Worker
17*4d7e907cSAndroid Build Coastguard Worker #define LOG_TAG "keymaster_hidl_hal_test"
18*4d7e907cSAndroid Build Coastguard Worker #include <cutils/log.h>
19*4d7e907cSAndroid Build Coastguard Worker #include <vector>
20*4d7e907cSAndroid Build Coastguard Worker
21*4d7e907cSAndroid Build Coastguard Worker #include "Keymaster4_1HidlTest.h"
22*4d7e907cSAndroid Build Coastguard Worker
23*4d7e907cSAndroid Build Coastguard Worker #include <cutils/properties.h>
24*4d7e907cSAndroid Build Coastguard Worker
25*4d7e907cSAndroid Build Coastguard Worker #include <openssl/x509.h>
26*4d7e907cSAndroid Build Coastguard Worker
27*4d7e907cSAndroid Build Coastguard Worker #include <keymasterV4_1/attestation_record.h>
28*4d7e907cSAndroid Build Coastguard Worker #include <keymasterV4_1/authorization_set.h>
29*4d7e907cSAndroid Build Coastguard Worker
30*4d7e907cSAndroid Build Coastguard Worker using android::hardware::keymaster::V4_0::test::add_tag_from_prop;
31*4d7e907cSAndroid Build Coastguard Worker
32*4d7e907cSAndroid Build Coastguard Worker // Not to dump the attestation by default. Can enable by specify the parameter
33*4d7e907cSAndroid Build Coastguard Worker // "--dump_attestations" on lunching VTS
34*4d7e907cSAndroid Build Coastguard Worker static bool dumpAttestations = false;
35*4d7e907cSAndroid Build Coastguard Worker
36*4d7e907cSAndroid Build Coastguard Worker namespace android::hardware::keymaster::V4_0 {
37*4d7e907cSAndroid Build Coastguard Worker
operator ==(const AuthorizationSet & a,const AuthorizationSet & b)38*4d7e907cSAndroid Build Coastguard Worker bool operator==(const AuthorizationSet& a, const AuthorizationSet& b) {
39*4d7e907cSAndroid Build Coastguard Worker return std::equal(a.begin(), a.end(), b.begin(), b.end());
40*4d7e907cSAndroid Build Coastguard Worker }
41*4d7e907cSAndroid Build Coastguard Worker
42*4d7e907cSAndroid Build Coastguard Worker } // namespace android::hardware::keymaster::V4_0
43*4d7e907cSAndroid Build Coastguard Worker
44*4d7e907cSAndroid Build Coastguard Worker namespace android::hardware::keymaster::V4_1 {
45*4d7e907cSAndroid Build Coastguard Worker
operator <<(::std::ostream & os,Tag tag)46*4d7e907cSAndroid Build Coastguard Worker inline ::std::ostream& operator<<(::std::ostream& os, Tag tag) {
47*4d7e907cSAndroid Build Coastguard Worker return os << toString(tag);
48*4d7e907cSAndroid Build Coastguard Worker }
49*4d7e907cSAndroid Build Coastguard Worker
50*4d7e907cSAndroid Build Coastguard Worker namespace test {
51*4d7e907cSAndroid Build Coastguard Worker
52*4d7e907cSAndroid Build Coastguard Worker using std::string;
53*4d7e907cSAndroid Build Coastguard Worker using std::tuple;
54*4d7e907cSAndroid Build Coastguard Worker
55*4d7e907cSAndroid Build Coastguard Worker namespace {
56*4d7e907cSAndroid Build Coastguard Worker
57*4d7e907cSAndroid Build Coastguard Worker char nibble2hex[16] = {'0', '1', '2', '3', '4', '5', '6', '7',
58*4d7e907cSAndroid Build Coastguard Worker '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};
59*4d7e907cSAndroid Build Coastguard Worker
bin2hex(const hidl_vec<uint8_t> & data)60*4d7e907cSAndroid Build Coastguard Worker string bin2hex(const hidl_vec<uint8_t>& data) {
61*4d7e907cSAndroid Build Coastguard Worker string retval;
62*4d7e907cSAndroid Build Coastguard Worker retval.reserve(data.size() * 2 + 1);
63*4d7e907cSAndroid Build Coastguard Worker for (uint8_t byte : data) {
64*4d7e907cSAndroid Build Coastguard Worker retval.push_back(nibble2hex[0x0F & (byte >> 4)]);
65*4d7e907cSAndroid Build Coastguard Worker retval.push_back(nibble2hex[0x0F & byte]);
66*4d7e907cSAndroid Build Coastguard Worker }
67*4d7e907cSAndroid Build Coastguard Worker return retval;
68*4d7e907cSAndroid Build Coastguard Worker }
69*4d7e907cSAndroid Build Coastguard Worker
dumpContent(string content)70*4d7e907cSAndroid Build Coastguard Worker inline void dumpContent(string content) {
71*4d7e907cSAndroid Build Coastguard Worker std::cout << content << std::endl;
72*4d7e907cSAndroid Build Coastguard Worker }
73*4d7e907cSAndroid Build Coastguard Worker
74*4d7e907cSAndroid Build Coastguard Worker struct AuthorizationSetDifferences {
75*4d7e907cSAndroid Build Coastguard Worker string aName;
76*4d7e907cSAndroid Build Coastguard Worker string bName;
77*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet aWhackB;
78*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet bWhackA;
79*4d7e907cSAndroid Build Coastguard Worker };
80*4d7e907cSAndroid Build Coastguard Worker
operator <<(std::ostream & o,const AuthorizationSetDifferences & diffs)81*4d7e907cSAndroid Build Coastguard Worker std::ostream& operator<<(std::ostream& o, const AuthorizationSetDifferences& diffs) {
82*4d7e907cSAndroid Build Coastguard Worker if (!diffs.aWhackB.empty()) {
83*4d7e907cSAndroid Build Coastguard Worker o << "Set " << diffs.aName << " contains the following that " << diffs.bName << " does not"
84*4d7e907cSAndroid Build Coastguard Worker << diffs.aWhackB;
85*4d7e907cSAndroid Build Coastguard Worker if (!diffs.bWhackA.empty()) o << std::endl;
86*4d7e907cSAndroid Build Coastguard Worker }
87*4d7e907cSAndroid Build Coastguard Worker
88*4d7e907cSAndroid Build Coastguard Worker if (!diffs.bWhackA.empty()) {
89*4d7e907cSAndroid Build Coastguard Worker o << "Set " << diffs.bName << " contains the following that " << diffs.aName << " does not"
90*4d7e907cSAndroid Build Coastguard Worker << diffs.bWhackA;
91*4d7e907cSAndroid Build Coastguard Worker }
92*4d7e907cSAndroid Build Coastguard Worker return o;
93*4d7e907cSAndroid Build Coastguard Worker }
94*4d7e907cSAndroid Build Coastguard Worker
95*4d7e907cSAndroid Build Coastguard Worker // Computes and returns a \ b and b \ a ('\' is the set-difference operator, a \ b means all the
96*4d7e907cSAndroid Build Coastguard Worker // elements that are in a but not b, i.e. take a and whack all the elements in b) to the provided
97*4d7e907cSAndroid Build Coastguard Worker // stream. The sets must be sorted.
98*4d7e907cSAndroid Build Coastguard Worker //
99*4d7e907cSAndroid Build Coastguard Worker // This provides a simple and clear view of how the two sets differ, generally much
100*4d7e907cSAndroid Build Coastguard Worker // easier than scrutinizing printouts of the two sets.
difference(string aName,const AuthorizationSet & a,string bName,const AuthorizationSet & b)101*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetDifferences difference(string aName, const AuthorizationSet& a, string bName,
102*4d7e907cSAndroid Build Coastguard Worker const AuthorizationSet& b) {
103*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetDifferences diffs = {std::move(aName), std::move(bName), {}, {}};
104*4d7e907cSAndroid Build Coastguard Worker std::set_difference(a.begin(), a.end(), b.begin(), b.end(), std::back_inserter(diffs.aWhackB));
105*4d7e907cSAndroid Build Coastguard Worker std::set_difference(b.begin(), b.end(), a.begin(), a.end(), std::back_inserter(diffs.bWhackA));
106*4d7e907cSAndroid Build Coastguard Worker return diffs;
107*4d7e907cSAndroid Build Coastguard Worker }
108*4d7e907cSAndroid Build Coastguard Worker
109*4d7e907cSAndroid Build Coastguard Worker #define DIFFERENCE(a, b) difference(#a, a, #b, b)
110*4d7e907cSAndroid Build Coastguard Worker
check_root_of_trust(const RootOfTrust & root_of_trust)111*4d7e907cSAndroid Build Coastguard Worker void check_root_of_trust(const RootOfTrust& root_of_trust) {
112*4d7e907cSAndroid Build Coastguard Worker char vb_meta_device_state[PROPERTY_VALUE_MAX];
113*4d7e907cSAndroid Build Coastguard Worker if (property_get("ro.boot.vbmeta.device_state", vb_meta_device_state, "") == 0) return;
114*4d7e907cSAndroid Build Coastguard Worker
115*4d7e907cSAndroid Build Coastguard Worker char vb_meta_digest[PROPERTY_VALUE_MAX];
116*4d7e907cSAndroid Build Coastguard Worker EXPECT_GT(property_get("ro.boot.vbmeta.digest", vb_meta_digest, ""), 0);
117*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(vb_meta_digest, bin2hex(root_of_trust.verified_boot_hash));
118*4d7e907cSAndroid Build Coastguard Worker
119*4d7e907cSAndroid Build Coastguard Worker // Verified boot key should be all 0's if the boot state is not verified or self signed
120*4d7e907cSAndroid Build Coastguard Worker HidlBuf empty_boot_key(string(32, '\0'));
121*4d7e907cSAndroid Build Coastguard Worker
122*4d7e907cSAndroid Build Coastguard Worker char vb_meta_bootstate[PROPERTY_VALUE_MAX];
123*4d7e907cSAndroid Build Coastguard Worker auto& verified_boot_key = root_of_trust.verified_boot_key;
124*4d7e907cSAndroid Build Coastguard Worker auto& verified_boot_state = root_of_trust.verified_boot_state;
125*4d7e907cSAndroid Build Coastguard Worker EXPECT_GT(property_get("ro.boot.verifiedbootstate", vb_meta_bootstate, ""), 0);
126*4d7e907cSAndroid Build Coastguard Worker if (!strcmp(vb_meta_bootstate, "green")) {
127*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_VERIFIED);
128*4d7e907cSAndroid Build Coastguard Worker EXPECT_NE(verified_boot_key, empty_boot_key);
129*4d7e907cSAndroid Build Coastguard Worker } else if (!strcmp(vb_meta_bootstate, "yellow")) {
130*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_SELF_SIGNED);
131*4d7e907cSAndroid Build Coastguard Worker EXPECT_NE(verified_boot_key, empty_boot_key);
132*4d7e907cSAndroid Build Coastguard Worker } else if (!strcmp(vb_meta_bootstate, "orange")) {
133*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED);
134*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_key, empty_boot_key);
135*4d7e907cSAndroid Build Coastguard Worker } else if (!strcmp(vb_meta_bootstate, "red")) {
136*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_FAILED);
137*4d7e907cSAndroid Build Coastguard Worker } else {
138*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_state, V4_0::KM_VERIFIED_BOOT_UNVERIFIED);
139*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(verified_boot_key, empty_boot_key);
140*4d7e907cSAndroid Build Coastguard Worker }
141*4d7e907cSAndroid Build Coastguard Worker }
142*4d7e907cSAndroid Build Coastguard Worker
tag_in_list(const KeyParameter & entry)143*4d7e907cSAndroid Build Coastguard Worker bool tag_in_list(const KeyParameter& entry) {
144*4d7e907cSAndroid Build Coastguard Worker // Attestations don't contain everything in key authorization lists, so we need to filter
145*4d7e907cSAndroid Build Coastguard Worker // the key lists to produce the lists that we expect to match the attestations.
146*4d7e907cSAndroid Build Coastguard Worker auto tag_list = {
147*4d7e907cSAndroid Build Coastguard Worker Tag::INCLUDE_UNIQUE_ID, Tag::BLOB_USAGE_REQUIREMENTS, Tag::EC_CURVE,
148*4d7e907cSAndroid Build Coastguard Worker Tag::HARDWARE_TYPE, Tag::VENDOR_PATCHLEVEL, Tag::BOOT_PATCHLEVEL,
149*4d7e907cSAndroid Build Coastguard Worker Tag::CREATION_DATETIME,
150*4d7e907cSAndroid Build Coastguard Worker };
151*4d7e907cSAndroid Build Coastguard Worker return std::find(tag_list.begin(), tag_list.end(), (V4_1::Tag)entry.tag) != tag_list.end();
152*4d7e907cSAndroid Build Coastguard Worker }
153*4d7e907cSAndroid Build Coastguard Worker
filter_tags(const AuthorizationSet & set)154*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet filter_tags(const AuthorizationSet& set) {
155*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet filtered;
156*4d7e907cSAndroid Build Coastguard Worker std::remove_copy_if(set.begin(), set.end(), std::back_inserter(filtered), tag_in_list);
157*4d7e907cSAndroid Build Coastguard Worker return filtered;
158*4d7e907cSAndroid Build Coastguard Worker }
159*4d7e907cSAndroid Build Coastguard Worker
check_attestation_record(AttestationRecord attestation,const HidlBuf & challenge,AuthorizationSet expected_sw_enforced,AuthorizationSet expected_hw_enforced,SecurityLevel expected_security_level)160*4d7e907cSAndroid Build Coastguard Worker void check_attestation_record(AttestationRecord attestation, const HidlBuf& challenge,
161*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet expected_sw_enforced,
162*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet expected_hw_enforced,
163*4d7e907cSAndroid Build Coastguard Worker SecurityLevel expected_security_level) {
164*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(41U, attestation.keymaster_version);
165*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(4U, attestation.attestation_version);
166*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(expected_security_level, attestation.attestation_security_level);
167*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(expected_security_level, attestation.keymaster_security_level);
168*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(challenge, attestation.attestation_challenge);
169*4d7e907cSAndroid Build Coastguard Worker
170*4d7e907cSAndroid Build Coastguard Worker check_root_of_trust(attestation.root_of_trust);
171*4d7e907cSAndroid Build Coastguard Worker
172*4d7e907cSAndroid Build Coastguard Worker // Sort all of the authorization lists, so that equality matching works.
173*4d7e907cSAndroid Build Coastguard Worker expected_sw_enforced.Sort();
174*4d7e907cSAndroid Build Coastguard Worker expected_hw_enforced.Sort();
175*4d7e907cSAndroid Build Coastguard Worker attestation.software_enforced.Sort();
176*4d7e907cSAndroid Build Coastguard Worker attestation.hardware_enforced.Sort();
177*4d7e907cSAndroid Build Coastguard Worker
178*4d7e907cSAndroid Build Coastguard Worker expected_sw_enforced = filter_tags(expected_sw_enforced);
179*4d7e907cSAndroid Build Coastguard Worker expected_hw_enforced = filter_tags(expected_hw_enforced);
180*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet attestation_sw_enforced = filter_tags(attestation.software_enforced);
181*4d7e907cSAndroid Build Coastguard Worker AuthorizationSet attestation_hw_enforced = filter_tags(attestation.hardware_enforced);
182*4d7e907cSAndroid Build Coastguard Worker
183*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(expected_sw_enforced, attestation_sw_enforced)
184*4d7e907cSAndroid Build Coastguard Worker << DIFFERENCE(expected_sw_enforced, attestation_sw_enforced);
185*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(expected_hw_enforced, attestation_hw_enforced)
186*4d7e907cSAndroid Build Coastguard Worker << DIFFERENCE(expected_hw_enforced, attestation_hw_enforced);
187*4d7e907cSAndroid Build Coastguard Worker }
188*4d7e907cSAndroid Build Coastguard Worker
parse_cert_blob(const std::vector<uint8_t> & blob)189*4d7e907cSAndroid Build Coastguard Worker X509_Ptr parse_cert_blob(const std::vector<uint8_t>& blob) {
190*4d7e907cSAndroid Build Coastguard Worker const uint8_t* p = blob.data();
191*4d7e907cSAndroid Build Coastguard Worker return X509_Ptr(d2i_X509(nullptr /* allocate new */, &p, blob.size()));
192*4d7e907cSAndroid Build Coastguard Worker }
193*4d7e907cSAndroid Build Coastguard Worker
check_certificate_chain_signatures(const hidl_vec<hidl_vec<uint8_t>> & cert_chain)194*4d7e907cSAndroid Build Coastguard Worker bool check_certificate_chain_signatures(const hidl_vec<hidl_vec<uint8_t>>& cert_chain) {
195*4d7e907cSAndroid Build Coastguard Worker // TODO: Check that root is self-signed once b/187803288 is resolved.
196*4d7e907cSAndroid Build Coastguard Worker for (size_t i = 0; i < cert_chain.size() - 1; ++i) {
197*4d7e907cSAndroid Build Coastguard Worker X509_Ptr key_cert(parse_cert_blob(cert_chain[i]));
198*4d7e907cSAndroid Build Coastguard Worker X509_Ptr signing_cert(parse_cert_blob(cert_chain[i + 1]));
199*4d7e907cSAndroid Build Coastguard Worker
200*4d7e907cSAndroid Build Coastguard Worker if (!key_cert.get() || !signing_cert.get()) {
201*4d7e907cSAndroid Build Coastguard Worker return false;
202*4d7e907cSAndroid Build Coastguard Worker }
203*4d7e907cSAndroid Build Coastguard Worker
204*4d7e907cSAndroid Build Coastguard Worker EVP_PKEY_Ptr signing_pubkey(X509_get_pubkey(signing_cert.get()));
205*4d7e907cSAndroid Build Coastguard Worker if (!signing_pubkey.get()) {
206*4d7e907cSAndroid Build Coastguard Worker return false;
207*4d7e907cSAndroid Build Coastguard Worker }
208*4d7e907cSAndroid Build Coastguard Worker
209*4d7e907cSAndroid Build Coastguard Worker if (!X509_verify(key_cert.get(), signing_pubkey.get())) {
210*4d7e907cSAndroid Build Coastguard Worker return false;
211*4d7e907cSAndroid Build Coastguard Worker }
212*4d7e907cSAndroid Build Coastguard Worker }
213*4d7e907cSAndroid Build Coastguard Worker return true;
214*4d7e907cSAndroid Build Coastguard Worker }
215*4d7e907cSAndroid Build Coastguard Worker
216*4d7e907cSAndroid Build Coastguard Worker } // namespace
217*4d7e907cSAndroid Build Coastguard Worker
218*4d7e907cSAndroid Build Coastguard Worker using std::string;
219*4d7e907cSAndroid Build Coastguard Worker using DeviceUniqueAttestationTest = Keymaster4_1HidlTest;
220*4d7e907cSAndroid Build Coastguard Worker
TEST_P(DeviceUniqueAttestationTest,NonStrongBoxOnly)221*4d7e907cSAndroid Build Coastguard Worker TEST_P(DeviceUniqueAttestationTest, NonStrongBoxOnly) {
222*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() == SecurityLevel::STRONGBOX) return;
223*4d7e907cSAndroid Build Coastguard Worker
224*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
225*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
226*4d7e907cSAndroid Build Coastguard Worker .RsaSigningKey(2048, 65537)
227*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
228*4d7e907cSAndroid Build Coastguard Worker .Padding(PaddingMode::RSA_PKCS1_1_5_SIGN)
229*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
230*4d7e907cSAndroid Build Coastguard Worker
231*4d7e907cSAndroid Build Coastguard Worker hidl_vec<hidl_vec<uint8_t>> cert_chain;
232*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::UNIMPLEMENTED,
233*4d7e907cSAndroid Build Coastguard Worker convert(AttestKey(
234*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
235*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
236*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
237*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, HidlBuf("foo")),
238*4d7e907cSAndroid Build Coastguard Worker &cert_chain)));
239*4d7e907cSAndroid Build Coastguard Worker CheckedDeleteKey();
240*4d7e907cSAndroid Build Coastguard Worker
241*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
242*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
243*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(EcCurve::P_256)
244*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
245*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
246*4d7e907cSAndroid Build Coastguard Worker
247*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::UNIMPLEMENTED,
248*4d7e907cSAndroid Build Coastguard Worker convert(AttestKey(
249*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
250*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
251*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge"))
252*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, HidlBuf("foo")),
253*4d7e907cSAndroid Build Coastguard Worker &cert_chain)));
254*4d7e907cSAndroid Build Coastguard Worker CheckedDeleteKey();
255*4d7e907cSAndroid Build Coastguard Worker }
256*4d7e907cSAndroid Build Coastguard Worker
TEST_P(DeviceUniqueAttestationTest,Rsa)257*4d7e907cSAndroid Build Coastguard Worker TEST_P(DeviceUniqueAttestationTest, Rsa) {
258*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() != SecurityLevel::STRONGBOX) return;
259*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
260*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
261*4d7e907cSAndroid Build Coastguard Worker .RsaSigningKey(2048, 65537)
262*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
263*4d7e907cSAndroid Build Coastguard Worker .Padding(PaddingMode::RSA_PKCS1_1_5_SIGN)
264*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
265*4d7e907cSAndroid Build Coastguard Worker
266*4d7e907cSAndroid Build Coastguard Worker hidl_vec<hidl_vec<uint8_t>> cert_chain;
267*4d7e907cSAndroid Build Coastguard Worker HidlBuf challenge("challenge");
268*4d7e907cSAndroid Build Coastguard Worker HidlBuf app_id("foo");
269*4d7e907cSAndroid Build Coastguard Worker ErrorCode result =
270*4d7e907cSAndroid Build Coastguard Worker convert(AttestKey(AuthorizationSetBuilder()
271*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
272*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, challenge)
273*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id),
274*4d7e907cSAndroid Build Coastguard Worker &cert_chain));
275*4d7e907cSAndroid Build Coastguard Worker
276*4d7e907cSAndroid Build Coastguard Worker // It is optional for Strong box to support DeviceUniqueAttestation.
277*4d7e907cSAndroid Build Coastguard Worker if (result == ErrorCode::CANNOT_ATTEST_IDS) return;
278*4d7e907cSAndroid Build Coastguard Worker
279*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result);
280*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(2U, cert_chain.size());
281*4d7e907cSAndroid Build Coastguard Worker EXPECT_TRUE(check_certificate_chain_signatures(cert_chain));
282*4d7e907cSAndroid Build Coastguard Worker if (dumpAttestations) {
283*4d7e907cSAndroid Build Coastguard Worker for (auto cert_ : cert_chain) dumpContent(bin2hex(cert_));
284*4d7e907cSAndroid Build Coastguard Worker }
285*4d7e907cSAndroid Build Coastguard Worker auto [err, attestation] = parse_attestation_record(cert_chain[0]);
286*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, err);
287*4d7e907cSAndroid Build Coastguard Worker
288*4d7e907cSAndroid Build Coastguard Worker check_attestation_record(
289*4d7e907cSAndroid Build Coastguard Worker attestation, challenge,
290*4d7e907cSAndroid Build Coastguard Worker /* sw_enforced */
291*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder().Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id),
292*4d7e907cSAndroid Build Coastguard Worker /* hw_enforced */
293*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
294*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
295*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
296*4d7e907cSAndroid Build Coastguard Worker .RsaSigningKey(2048, 65537)
297*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
298*4d7e907cSAndroid Build Coastguard Worker .Padding(PaddingMode::RSA_PKCS1_1_5_SIGN)
299*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ORIGIN, KeyOrigin::GENERATED)
300*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_VERSION, os_version())
301*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_PATCHLEVEL, os_patch_level()),
302*4d7e907cSAndroid Build Coastguard Worker SecLevel());
303*4d7e907cSAndroid Build Coastguard Worker }
304*4d7e907cSAndroid Build Coastguard Worker
TEST_P(DeviceUniqueAttestationTest,Ecdsa)305*4d7e907cSAndroid Build Coastguard Worker TEST_P(DeviceUniqueAttestationTest, Ecdsa) {
306*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() != SecurityLevel::STRONGBOX) return;
307*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
308*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
309*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(256)
310*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
311*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
312*4d7e907cSAndroid Build Coastguard Worker
313*4d7e907cSAndroid Build Coastguard Worker hidl_vec<hidl_vec<uint8_t>> cert_chain;
314*4d7e907cSAndroid Build Coastguard Worker HidlBuf challenge("challenge");
315*4d7e907cSAndroid Build Coastguard Worker HidlBuf app_id("foo");
316*4d7e907cSAndroid Build Coastguard Worker ErrorCode result =
317*4d7e907cSAndroid Build Coastguard Worker convert(AttestKey(AuthorizationSetBuilder()
318*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
319*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, challenge)
320*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id),
321*4d7e907cSAndroid Build Coastguard Worker &cert_chain));
322*4d7e907cSAndroid Build Coastguard Worker
323*4d7e907cSAndroid Build Coastguard Worker // It is optional for Strong box to support DeviceUniqueAttestation.
324*4d7e907cSAndroid Build Coastguard Worker if (result == ErrorCode::CANNOT_ATTEST_IDS) return;
325*4d7e907cSAndroid Build Coastguard Worker
326*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(ErrorCode::OK, result);
327*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(2U, cert_chain.size());
328*4d7e907cSAndroid Build Coastguard Worker EXPECT_TRUE(check_certificate_chain_signatures(cert_chain));
329*4d7e907cSAndroid Build Coastguard Worker if (dumpAttestations) {
330*4d7e907cSAndroid Build Coastguard Worker for (auto cert_ : cert_chain) dumpContent(bin2hex(cert_));
331*4d7e907cSAndroid Build Coastguard Worker }
332*4d7e907cSAndroid Build Coastguard Worker auto [err, attestation] = parse_attestation_record(cert_chain[0]);
333*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, err);
334*4d7e907cSAndroid Build Coastguard Worker
335*4d7e907cSAndroid Build Coastguard Worker check_attestation_record(
336*4d7e907cSAndroid Build Coastguard Worker attestation, challenge,
337*4d7e907cSAndroid Build Coastguard Worker /* sw_enforced */
338*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder().Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id),
339*4d7e907cSAndroid Build Coastguard Worker /* hw_enforced */
340*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
341*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
342*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
343*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(256)
344*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
345*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_EC_CURVE, EcCurve::P_256)
346*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ORIGIN, KeyOrigin::GENERATED)
347*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_VERSION, os_version())
348*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_PATCHLEVEL, os_patch_level()),
349*4d7e907cSAndroid Build Coastguard Worker SecLevel());
350*4d7e907cSAndroid Build Coastguard Worker }
351*4d7e907cSAndroid Build Coastguard Worker
TEST_P(DeviceUniqueAttestationTest,EcdsaDeviceUniqueAttestationID)352*4d7e907cSAndroid Build Coastguard Worker TEST_P(DeviceUniqueAttestationTest, EcdsaDeviceUniqueAttestationID) {
353*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() != SecurityLevel::STRONGBOX) return;
354*4d7e907cSAndroid Build Coastguard Worker
355*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
356*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
357*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(256)
358*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
359*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
360*4d7e907cSAndroid Build Coastguard Worker
361*4d7e907cSAndroid Build Coastguard Worker // Collection of valid attestation ID tags.
362*4d7e907cSAndroid Build Coastguard Worker auto attestation_id_tags = AuthorizationSetBuilder();
363*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_BRAND, "ro.product.brand");
364*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_DEVICE, "ro.product.device");
365*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_PRODUCT, "ro.product.name");
366*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_SERIAL, "ro.serial");
367*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_MANUFACTURER,
368*4d7e907cSAndroid Build Coastguard Worker "ro.product.manufacturer");
369*4d7e907cSAndroid Build Coastguard Worker add_tag_from_prop(&attestation_id_tags, V4_0::TAG_ATTESTATION_ID_MODEL, "ro.product.model");
370*4d7e907cSAndroid Build Coastguard Worker
371*4d7e907cSAndroid Build Coastguard Worker for (const KeyParameter& tag : attestation_id_tags) {
372*4d7e907cSAndroid Build Coastguard Worker hidl_vec<hidl_vec<uint8_t>> cert_chain;
373*4d7e907cSAndroid Build Coastguard Worker HidlBuf challenge("challenge");
374*4d7e907cSAndroid Build Coastguard Worker HidlBuf app_id("foo");
375*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder builder =
376*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
377*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
378*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, challenge)
379*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id);
380*4d7e907cSAndroid Build Coastguard Worker builder.push_back(tag);
381*4d7e907cSAndroid Build Coastguard Worker ErrorCode result = convert(AttestKey(builder, &cert_chain));
382*4d7e907cSAndroid Build Coastguard Worker
383*4d7e907cSAndroid Build Coastguard Worker // It is optional for Strong box to support DeviceUniqueAttestation.
384*4d7e907cSAndroid Build Coastguard Worker if (result == ErrorCode::CANNOT_ATTEST_IDS) return;
385*4d7e907cSAndroid Build Coastguard Worker
386*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, result);
387*4d7e907cSAndroid Build Coastguard Worker EXPECT_EQ(2U, cert_chain.size());
388*4d7e907cSAndroid Build Coastguard Worker if (dumpAttestations) {
389*4d7e907cSAndroid Build Coastguard Worker for (auto cert_ : cert_chain) dumpContent(bin2hex(cert_));
390*4d7e907cSAndroid Build Coastguard Worker }
391*4d7e907cSAndroid Build Coastguard Worker auto [err, attestation] = parse_attestation_record(cert_chain[0]);
392*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, err);
393*4d7e907cSAndroid Build Coastguard Worker
394*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder hw_enforced =
395*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
396*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
397*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
398*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(256)
399*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
400*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ORIGIN, KeyOrigin::GENERATED)
401*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_VERSION, os_version())
402*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_OS_PATCHLEVEL, os_patch_level());
403*4d7e907cSAndroid Build Coastguard Worker hw_enforced.push_back(tag);
404*4d7e907cSAndroid Build Coastguard Worker check_attestation_record(
405*4d7e907cSAndroid Build Coastguard Worker attestation, challenge,
406*4d7e907cSAndroid Build Coastguard Worker /* sw_enforced */
407*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder().Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id),
408*4d7e907cSAndroid Build Coastguard Worker hw_enforced, SecLevel());
409*4d7e907cSAndroid Build Coastguard Worker }
410*4d7e907cSAndroid Build Coastguard Worker }
411*4d7e907cSAndroid Build Coastguard Worker
TEST_P(DeviceUniqueAttestationTest,EcdsaDeviceUniqueAttestationMismatchID)412*4d7e907cSAndroid Build Coastguard Worker TEST_P(DeviceUniqueAttestationTest, EcdsaDeviceUniqueAttestationMismatchID) {
413*4d7e907cSAndroid Build Coastguard Worker if (SecLevel() != SecurityLevel::STRONGBOX) return;
414*4d7e907cSAndroid Build Coastguard Worker
415*4d7e907cSAndroid Build Coastguard Worker ASSERT_EQ(ErrorCode::OK, convert(GenerateKey(AuthorizationSetBuilder()
416*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_NO_AUTH_REQUIRED)
417*4d7e907cSAndroid Build Coastguard Worker .EcdsaSigningKey(256)
418*4d7e907cSAndroid Build Coastguard Worker .Digest(Digest::SHA_2_256)
419*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_INCLUDE_UNIQUE_ID))));
420*4d7e907cSAndroid Build Coastguard Worker
421*4d7e907cSAndroid Build Coastguard Worker // Collection of invalid attestation ID tags.
422*4d7e907cSAndroid Build Coastguard Worker std::string invalid = "completely-invalid";
423*4d7e907cSAndroid Build Coastguard Worker auto attestation_id_tags =
424*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
425*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_BRAND, invalid.data(), invalid.size())
426*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_DEVICE, invalid.data(), invalid.size())
427*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_PRODUCT, invalid.data(), invalid.size())
428*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_SERIAL, invalid.data(), invalid.size())
429*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_IMEI, invalid.data(), invalid.size())
430*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_MEID, invalid.data(), invalid.size())
431*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_MANUFACTURER, invalid.data(),
432*4d7e907cSAndroid Build Coastguard Worker invalid.size())
433*4d7e907cSAndroid Build Coastguard Worker .Authorization(V4_0::TAG_ATTESTATION_ID_MODEL, invalid.data(), invalid.size());
434*4d7e907cSAndroid Build Coastguard Worker
435*4d7e907cSAndroid Build Coastguard Worker for (const KeyParameter& invalid_tag : attestation_id_tags) {
436*4d7e907cSAndroid Build Coastguard Worker hidl_vec<hidl_vec<uint8_t>> cert_chain;
437*4d7e907cSAndroid Build Coastguard Worker HidlBuf challenge("challenge");
438*4d7e907cSAndroid Build Coastguard Worker HidlBuf app_id("foo");
439*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder builder =
440*4d7e907cSAndroid Build Coastguard Worker AuthorizationSetBuilder()
441*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_DEVICE_UNIQUE_ATTESTATION)
442*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_CHALLENGE, challenge)
443*4d7e907cSAndroid Build Coastguard Worker .Authorization(TAG_ATTESTATION_APPLICATION_ID, app_id);
444*4d7e907cSAndroid Build Coastguard Worker builder.push_back(invalid_tag);
445*4d7e907cSAndroid Build Coastguard Worker ErrorCode result = convert(AttestKey(builder, &cert_chain));
446*4d7e907cSAndroid Build Coastguard Worker
447*4d7e907cSAndroid Build Coastguard Worker EXPECT_TRUE(result == ErrorCode::CANNOT_ATTEST_IDS || result == ErrorCode::INVALID_TAG)
448*4d7e907cSAndroid Build Coastguard Worker << "result: " << static_cast<int32_t>(result);
449*4d7e907cSAndroid Build Coastguard Worker }
450*4d7e907cSAndroid Build Coastguard Worker }
451*4d7e907cSAndroid Build Coastguard Worker
452*4d7e907cSAndroid Build Coastguard Worker INSTANTIATE_KEYMASTER_4_1_HIDL_TEST(DeviceUniqueAttestationTest);
453*4d7e907cSAndroid Build Coastguard Worker
454*4d7e907cSAndroid Build Coastguard Worker } // namespace test
455*4d7e907cSAndroid Build Coastguard Worker } // namespace android::hardware::keymaster::V4_1
456*4d7e907cSAndroid Build Coastguard Worker
main(int argc,char ** argv)457*4d7e907cSAndroid Build Coastguard Worker int main(int argc, char** argv) {
458*4d7e907cSAndroid Build Coastguard Worker ::testing::InitGoogleTest(&argc, argv);
459*4d7e907cSAndroid Build Coastguard Worker for (int i = 1; i < argc; ++i) {
460*4d7e907cSAndroid Build Coastguard Worker if (argv[i][0] == '-') {
461*4d7e907cSAndroid Build Coastguard Worker if (std::string(argv[i]) == "--dump_attestations") {
462*4d7e907cSAndroid Build Coastguard Worker dumpAttestations = true;
463*4d7e907cSAndroid Build Coastguard Worker }
464*4d7e907cSAndroid Build Coastguard Worker }
465*4d7e907cSAndroid Build Coastguard Worker }
466*4d7e907cSAndroid Build Coastguard Worker int status = RUN_ALL_TESTS();
467*4d7e907cSAndroid Build Coastguard Worker ALOGI("Test result = %d", status);
468*4d7e907cSAndroid Build Coastguard Worker return status;
469*4d7e907cSAndroid Build Coastguard Worker }
470