diff options
author | Shawn Willden <swillden@google.com> | 2022-03-20 12:49:46 -0600 |
---|---|---|
committer | Shawn Willden <swillden@google.com> | 2022-06-02 07:44:23 -0600 |
commit | 0ae6bb0656aeb1b3cc2a9f79201a6244aaae91f5 (patch) | |
tree | 4c480ec173e6c8f5e36f79c811c7271488c0c6ac /security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp | |
parent | e8919888ad3ece2d0587272487f231fc6450ad1e (diff) |
Implement alternate SE RoT provisioning
Bug: 219076736
Test: VtsAidlKeyMintTargetTest
Change-Id: Ia696d7765f316d35eba1b4e65acae6c1072987b1
Diffstat (limited to 'security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp')
-rw-r--r-- | security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp | 99 |
1 files changed, 85 insertions, 14 deletions
diff --git a/security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp b/security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp index e630f7008e..c9a156d3e6 100644 --- a/security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp +++ b/security/keymint/aidl/vts/functional/SecureElementProvisioningTest.cpp @@ -36,6 +36,8 @@ using std::map; using std::shared_ptr; using std::vector; +constexpr int kRoTVersion1 = 40001; + class SecureElementProvisioningTest : public testing::Test { protected: static void SetUpTestSuite() { @@ -57,6 +59,83 @@ class SecureElementProvisioningTest : public testing::Test { } } + void validateMacedRootOfTrust(const vector<uint8_t>& rootOfTrust) { + SCOPED_TRACE(testing::Message() << "RoT: " << bin2hex(rootOfTrust)); + + const auto [macItem, macEndPos, macErrMsg] = cppbor::parse(rootOfTrust); + ASSERT_TRUE(macItem) << "Root of trust parsing failed: " << macErrMsg; + ASSERT_EQ(macItem->semanticTagCount(), 1); + ASSERT_EQ(macItem->semanticTag(0), cppcose::kCoseMac0SemanticTag); + ASSERT_TRUE(macItem->asArray()); + ASSERT_EQ(macItem->asArray()->size(), cppcose::kCoseMac0EntryCount); + + const auto& protectedItem = macItem->asArray()->get(cppcose::kCoseMac0ProtectedParams); + ASSERT_TRUE(protectedItem); + ASSERT_TRUE(protectedItem->asBstr()); + const auto [protMap, protEndPos, protErrMsg] = cppbor::parse(protectedItem->asBstr()); + ASSERT_TRUE(protMap); + ASSERT_TRUE(protMap->asMap()); + ASSERT_EQ(protMap->asMap()->size(), 1); + + const auto& algorithm = protMap->asMap()->get(cppcose::ALGORITHM); + ASSERT_TRUE(algorithm); + ASSERT_TRUE(algorithm->asInt()); + ASSERT_EQ(algorithm->asInt()->value(), cppcose::HMAC_256); + + const auto& unprotItem = macItem->asArray()->get(cppcose::kCoseMac0UnprotectedParams); + ASSERT_TRUE(unprotItem); + ASSERT_TRUE(unprotItem->asMap()); + ASSERT_EQ(unprotItem->asMap()->size(), 0); + + const auto& payload = macItem->asArray()->get(cppcose::kCoseMac0Payload); + ASSERT_TRUE(payload); + ASSERT_TRUE(payload->asBstr()); + validateRootOfTrust(payload->asBstr()->value()); + + const auto& tag = macItem->asArray()->get(cppcose::kCoseMac0Tag); + ASSERT_TRUE(tag); + ASSERT_TRUE(tag->asBstr()); + ASSERT_EQ(tag->asBstr()->value().size(), 32); + // Cannot validate tag correctness. Only the secure side has the necessary key. + } + + void validateRootOfTrust(const vector<uint8_t>& payload) { + SCOPED_TRACE(testing::Message() << "RoT payload: " << bin2hex(payload)); + + const auto [rot, rotPos, rotErrMsg] = cppbor::parse(payload); + ASSERT_TRUE(rot); + ASSERT_EQ(rot->semanticTagCount(), 1); + ASSERT_EQ(rot->semanticTag(), kRoTVersion1); + ASSERT_TRUE(rot->asArray()); + ASSERT_EQ(rot->asArray()->size(), 5); + + size_t pos = 0; + + const auto& vbKey = rot->asArray()->get(pos++); + ASSERT_TRUE(vbKey); + ASSERT_TRUE(vbKey->asBstr()); + + const auto& deviceLocked = rot->asArray()->get(pos++); + ASSERT_TRUE(deviceLocked); + ASSERT_TRUE(deviceLocked->asBool()); + + const auto& verifiedBootState = rot->asArray()->get(pos++); + ASSERT_TRUE(verifiedBootState); + ASSERT_TRUE(verifiedBootState->asInt()); + + const auto& verifiedBootHash = rot->asArray()->get(pos++); + ASSERT_TRUE(verifiedBootHash); + ASSERT_TRUE(verifiedBootHash->asBstr()); + + const auto& bootPatchLevel = rot->asArray()->get(pos++); + ASSERT_TRUE(bootPatchLevel); + ASSERT_TRUE(bootPatchLevel->asInt()); + + verify_root_of_trust(vbKey->asBstr()->value(), deviceLocked->asBool()->value(), + static_cast<VerifiedBoot>(verifiedBootState->asInt()->value()), + verifiedBootHash->asBstr()->value()); + } + int32_t AidlVersion(shared_ptr<IKeyMintDevice> keymint) { int32_t version = 0; auto status = keymint->getInterfaceVersion(&version); @@ -96,29 +175,19 @@ TEST_F(SecureElementProvisioningTest, TeeOnly) { vector<uint8_t> rootOfTrust1; Status result = tee->getRootOfTrust(challenge1, &rootOfTrust1); - - // TODO: Remove the next line to require TEEs to succeed. - if (!result.isOk()) return; - - ASSERT_TRUE(result.isOk()); - - // TODO: Parse and validate rootOfTrust1 here + ASSERT_TRUE(result.isOk()) << "getRootOfTrust returned " << result.getServiceSpecificError(); + validateMacedRootOfTrust(rootOfTrust1); vector<uint8_t> rootOfTrust2; result = tee->getRootOfTrust(challenge2, &rootOfTrust2); ASSERT_TRUE(result.isOk()); - - // TODO: Parse and validate rootOfTrust2 here - + validateMacedRootOfTrust(rootOfTrust2); ASSERT_NE(rootOfTrust1, rootOfTrust2); vector<uint8_t> rootOfTrust3; result = tee->getRootOfTrust(challenge1, &rootOfTrust3); ASSERT_TRUE(result.isOk()); - ASSERT_EQ(rootOfTrust1, rootOfTrust3); - - // TODO: Parse and validate rootOfTrust3 here } TEST_F(SecureElementProvisioningTest, TeeDoesNotImplementStrongBoxMethods) { @@ -252,7 +321,7 @@ TEST_F(SecureElementProvisioningTest, ProvisioningTest) { result = tee->getRootOfTrust(challenge, &rootOfTrust); ASSERT_TRUE(result.isOk()); - // TODO: Verify COSE_Mac0 structure and content here. + validateMacedRootOfTrust(rootOfTrust); result = sb->sendRootOfTrust(rootOfTrust); ASSERT_TRUE(result.isOk()); @@ -296,6 +365,8 @@ TEST_F(SecureElementProvisioningTest, InvalidProvisioningTest) { result = tee->getRootOfTrust(challenge, &rootOfTrust); ASSERT_TRUE(result.isOk()); + validateMacedRootOfTrust(rootOfTrust); + vector<uint8_t> corruptedRootOfTrust = rootOfTrust; corruptedRootOfTrust[corruptedRootOfTrust.size() / 2]++; result = sb->sendRootOfTrust(corruptedRootOfTrust); |