diff options
author | David Drysdale <drysdale@google.com> | 2021-04-13 11:15:51 +0100 |
---|---|---|
committer | David Drysdale <drysdale@google.com> | 2021-04-30 14:50:14 +0100 |
commit | bb3d85eaa4c8564ea864df2dd5abea8c585e0408 (patch) | |
tree | 3ed50481d64bedf3a83fc7ae461a0fd9868a1b8b /security/keymint/support/keymint_utils.cpp | |
parent | 7de9febd174214cfb9ac65ada12c2ceb988cd19d (diff) |
Test for patchlevels and too much entropy
Add tests for:
- Too much entropy should be rejected with INVALID_INPUT_LENGTH
- All authorization lists should include a vendor and boot patchlevel.
These requirements are in both the KeyMint and the KeyMaster 4.0 AIDL
specificications, but have never been policed before.
Currently disabled with a command-line flag because CF does not have
the patchlevels and so fails lots of tests.
Test: VtsKeyMintAidlTargetTest
Change-Id: Ic9622ef3f1b80e013a34059218e3e029f392eb72
Diffstat (limited to 'security/keymint/support/keymint_utils.cpp')
-rw-r--r-- | security/keymint/support/keymint_utils.cpp | 21 |
1 files changed, 13 insertions, 8 deletions
diff --git a/security/keymint/support/keymint_utils.cpp b/security/keymint/support/keymint_utils.cpp index e73d602b1d..2dbdfa8e13 100644 --- a/security/keymint/support/keymint_utils.cpp +++ b/security/keymint/support/keymint_utils.cpp @@ -31,10 +31,11 @@ constexpr size_t kSubminorVersionMatch = 5; constexpr size_t kPlatformVersionMatchCount = kSubminorVersionMatch + 1; constexpr char kPlatformPatchlevelProp[] = "ro.build.version.security_patch"; -constexpr char kPlatformPatchlevelRegex[] = "^([0-9]{4})-([0-9]{2})-[0-9]{2}$"; +constexpr char kVendorPatchlevelProp[] = "ro.vendor.build.security_patch"; +constexpr char kPatchlevelRegex[] = "^([0-9]{4})-([0-9]{2})-[0-9]{2}$"; constexpr size_t kYearMatch = 1; constexpr size_t kMonthMatch = 2; -constexpr size_t kPlatformPatchlevelMatchCount = kMonthMatch + 1; +constexpr size_t kPatchlevelMatchCount = kMonthMatch + 1; uint32_t match_to_uint32(const char* expression, const regmatch_t& match) { if (match.rm_so == -1) return 0; @@ -80,15 +81,14 @@ uint32_t getOsVersion() { return getOsVersion(version.c_str()); } -uint32_t getOsPatchlevel(const char* patchlevel_str) { +uint32_t getPatchlevel(const char* patchlevel_str) { regex_t regex; - if (regcomp(®ex, kPlatformPatchlevelRegex, REG_EXTENDED) != 0) { + if (regcomp(®ex, kPatchlevelRegex, REG_EXTENDED) != 0) { return 0; } - regmatch_t matches[kPlatformPatchlevelMatchCount]; - int not_match = - regexec(®ex, patchlevel_str, kPlatformPatchlevelMatchCount, matches, 0 /* flags */); + regmatch_t matches[kPatchlevelMatchCount]; + int not_match = regexec(®ex, patchlevel_str, kPatchlevelMatchCount, matches, 0 /* flags */); regfree(®ex); if (not_match) { return 0; @@ -105,7 +105,12 @@ uint32_t getOsPatchlevel(const char* patchlevel_str) { uint32_t getOsPatchlevel() { std::string patchlevel = wait_and_get_property(kPlatformPatchlevelProp); - return getOsPatchlevel(patchlevel.c_str()); + return getPatchlevel(patchlevel.c_str()); +} + +uint32_t getVendorPatchlevel() { + std::string patchlevel = wait_and_get_property(kVendorPatchlevelProp); + return getPatchlevel(patchlevel.c_str()); } } // namespace aidl::android::hardware::security::keymint |