Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 1 | // Copyright 2020, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
Paul Crowley | d5653e5 | 2021-03-25 09:46:31 -0700 | [diff] [blame] | 15 | //! Export into Rust a function to create a KeyMintDevice and add it as a service. |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 16 | |
Paul Crowley | d5653e5 | 2021-03-25 09:46:31 -0700 | [diff] [blame] | 17 | #[allow(missing_docs)] // TODO remove this |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 18 | extern "C" { |
| 19 | fn addKeyMintDeviceService() -> i32; |
| 20 | } |
| 21 | |
Paul Crowley | d5653e5 | 2021-03-25 09:46:31 -0700 | [diff] [blame] | 22 | #[allow(missing_docs)] // TODO remove this |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 23 | pub fn add_keymint_device_service() -> i32 { |
Andrew Walbran | a47698a | 2023-07-21 17:23:56 +0100 | [diff] [blame] | 24 | // SAFETY: This is always safe to call. |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 25 | unsafe { addKeyMintDeviceService() } |
| 26 | } |
| 27 | |
| 28 | #[cfg(test)] |
| 29 | mod tests { |
| 30 | |
| 31 | use super::*; |
| 32 | use android_hardware_security_keymint::aidl::android::hardware::security::keymint::{ |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 33 | Algorithm::Algorithm, BeginResult::BeginResult, BlockMode::BlockMode, Digest::Digest, |
David Drysdale | f5c1ab0 | 2021-04-19 19:08:14 +0100 | [diff] [blame] | 34 | ErrorCode::ErrorCode, IKeyMintDevice::IKeyMintDevice, KeyCreationResult::KeyCreationResult, |
Janis Danisevskis | 67f3056 | 2021-05-21 13:20:22 -0700 | [diff] [blame] | 35 | KeyFormat::KeyFormat, KeyOrigin::KeyOrigin, KeyParameter::KeyParameter, |
| 36 | KeyParameterValue::KeyParameterValue, KeyPurpose::KeyPurpose, PaddingMode::PaddingMode, |
| 37 | SecurityLevel::SecurityLevel, Tag::Tag, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 38 | }; |
Stephen Crane | 221bbb5 | 2020-12-16 15:52:10 -0800 | [diff] [blame] | 39 | use android_hardware_security_keymint::binder::{self, Strong}; |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 40 | use android_security_compat::aidl::android::security::compat::IKeystoreCompatService::IKeystoreCompatService; |
| 41 | |
Joel Galenson | f21c002 | 2020-12-11 14:37:52 -0800 | [diff] [blame] | 42 | static COMPAT_NAME: &str = "android.security.compat"; |
| 43 | |
Stephen Crane | 221bbb5 | 2020-12-16 15:52:10 -0800 | [diff] [blame] | 44 | fn get_device() -> Option<Strong<dyn IKeyMintDevice>> { |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 45 | add_keymint_device_service(); |
Stephen Crane | 221bbb5 | 2020-12-16 15:52:10 -0800 | [diff] [blame] | 46 | let compat_service: Strong<dyn IKeystoreCompatService> = |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 47 | binder::get_interface(COMPAT_NAME).ok()?; |
| 48 | compat_service.getKeyMintDevice(SecurityLevel::TRUSTED_ENVIRONMENT).ok() |
| 49 | } |
| 50 | |
| 51 | macro_rules! get_device_or_skip_test { |
| 52 | () => { |
| 53 | match get_device() { |
| 54 | Some(dev) => dev, |
| 55 | None => return, |
| 56 | } |
| 57 | }; |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 58 | } |
| 59 | |
| 60 | #[test] |
| 61 | fn test_get_hardware_info() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 62 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | d4dbfd5 | 2021-01-25 09:45:33 -0800 | [diff] [blame] | 63 | let hinfo = legacy.getHardwareInfo(); |
| 64 | assert!(hinfo.is_ok()); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 65 | } |
| 66 | |
| 67 | #[test] |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 68 | fn test_add_rng_entropy() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 69 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 70 | let result = legacy.addRngEntropy(&[42; 16]); |
| 71 | assert!(result.is_ok(), "{:?}", result); |
| 72 | } |
| 73 | |
| 74 | // TODO: If I only need the key itself, don't return the other things. |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 75 | fn generate_key(legacy: &dyn IKeyMintDevice, kps: Vec<KeyParameter>) -> KeyCreationResult { |
Shawn Willden | c2f3acf | 2021-02-03 07:07:17 -0700 | [diff] [blame] | 76 | let creation_result = |
| 77 | legacy.generateKey(&kps, None /* attest_key */).expect("Failed to generate key"); |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 78 | assert_ne!(creation_result.keyBlob.len(), 0); |
| 79 | creation_result |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 80 | } |
| 81 | |
Janis Danisevskis | 2c08401 | 2021-01-31 22:23:17 -0800 | [diff] [blame] | 82 | // Per RFC 5280 4.1.2.5, an undefined expiration (not-after) field should be set to GeneralizedTime |
| 83 | // 999912312359559, which is 253402300799000 ms from Jan 1, 1970. |
| 84 | const UNDEFINED_NOT_AFTER: i64 = 253402300799000i64; |
| 85 | |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 86 | fn generate_rsa_key(legacy: &dyn IKeyMintDevice, encrypt: bool, attest: bool) -> Vec<u8> { |
| 87 | let mut kps = vec![ |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 88 | KeyParameter { |
| 89 | tag: Tag::ALGORITHM, |
| 90 | value: KeyParameterValue::Algorithm(Algorithm::RSA), |
| 91 | }, |
| 92 | KeyParameter { tag: Tag::KEY_SIZE, value: KeyParameterValue::Integer(2048) }, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 93 | KeyParameter { |
| 94 | tag: Tag::RSA_PUBLIC_EXPONENT, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 95 | value: KeyParameterValue::LongInteger(65537), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 96 | }, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 97 | KeyParameter { tag: Tag::DIGEST, value: KeyParameterValue::Digest(Digest::SHA_2_256) }, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 98 | KeyParameter { |
| 99 | tag: Tag::PADDING, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 100 | value: KeyParameterValue::PaddingMode(PaddingMode::RSA_PSS), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 101 | }, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 102 | KeyParameter { tag: Tag::NO_AUTH_REQUIRED, value: KeyParameterValue::BoolValue(true) }, |
| 103 | KeyParameter { |
| 104 | tag: Tag::PURPOSE, |
| 105 | value: KeyParameterValue::KeyPurpose(KeyPurpose::SIGN), |
| 106 | }, |
Janis Danisevskis | 2c08401 | 2021-01-31 22:23:17 -0800 | [diff] [blame] | 107 | KeyParameter { |
| 108 | tag: Tag::CERTIFICATE_NOT_BEFORE, |
| 109 | value: KeyParameterValue::DateTime(0), |
| 110 | }, |
| 111 | KeyParameter { |
| 112 | tag: Tag::CERTIFICATE_NOT_AFTER, |
| 113 | value: KeyParameterValue::DateTime(UNDEFINED_NOT_AFTER), |
| 114 | }, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 115 | ]; |
| 116 | if encrypt { |
| 117 | kps.push(KeyParameter { |
| 118 | tag: Tag::PURPOSE, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 119 | value: KeyParameterValue::KeyPurpose(KeyPurpose::ENCRYPT), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 120 | }); |
| 121 | } |
| 122 | if attest { |
| 123 | kps.push(KeyParameter { |
| 124 | tag: Tag::ATTESTATION_CHALLENGE, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 125 | value: KeyParameterValue::Blob(vec![42; 8]), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 126 | }); |
| 127 | kps.push(KeyParameter { |
| 128 | tag: Tag::ATTESTATION_APPLICATION_ID, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 129 | value: KeyParameterValue::Blob(vec![42; 8]), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 130 | }); |
| 131 | } |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 132 | let creation_result = generate_key(legacy, kps); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 133 | if attest { |
| 134 | // TODO: Will this always be greater than 1? |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 135 | assert!(creation_result.certificateChain.len() > 1); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 136 | } else { |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 137 | assert_eq!(creation_result.certificateChain.len(), 1); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 138 | } |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 139 | creation_result.keyBlob |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 140 | } |
| 141 | |
| 142 | #[test] |
| 143 | fn test_generate_key_no_encrypt() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 144 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 145 | generate_rsa_key(legacy.as_ref(), false, false); |
| 146 | } |
| 147 | |
| 148 | #[test] |
| 149 | fn test_generate_key_encrypt() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 150 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 151 | generate_rsa_key(legacy.as_ref(), true, false); |
| 152 | } |
| 153 | |
| 154 | #[test] |
| 155 | fn test_generate_key_attested() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 156 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 157 | generate_rsa_key(legacy.as_ref(), false, true); |
| 158 | } |
| 159 | |
| 160 | #[test] |
| 161 | fn test_import_key() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 162 | let legacy = get_device_or_skip_test!(); |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 163 | let kps = [KeyParameter { |
| 164 | tag: Tag::ALGORITHM, |
| 165 | value: KeyParameterValue::Algorithm(Algorithm::AES), |
| 166 | }]; |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 167 | let kf = KeyFormat::RAW; |
| 168 | let kd = [0; 16]; |
Shawn Willden | c2f3acf | 2021-02-03 07:07:17 -0700 | [diff] [blame] | 169 | let creation_result = |
| 170 | legacy.importKey(&kps, kf, &kd, None /* attest_key */).expect("Failed to import key"); |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 171 | assert_ne!(creation_result.keyBlob.len(), 0); |
| 172 | assert_eq!(creation_result.certificateChain.len(), 0); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 173 | } |
| 174 | |
| 175 | #[test] |
| 176 | fn test_import_wrapped_key() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 177 | let legacy = get_device_or_skip_test!(); |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 178 | let result = legacy.importWrappedKey(&[], &[], &[], &[], 0, 0); |
Joel Galenson | d4dbfd5 | 2021-01-25 09:45:33 -0800 | [diff] [blame] | 179 | // For this test we only care that there was no crash. |
| 180 | assert!(result.is_ok() || result.is_err()); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 181 | } |
| 182 | |
| 183 | #[test] |
| 184 | fn test_upgrade_key() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 185 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 186 | let blob = generate_rsa_key(legacy.as_ref(), false, false); |
| 187 | let result = legacy.upgradeKey(&blob, &[]); |
Joel Galenson | d4dbfd5 | 2021-01-25 09:45:33 -0800 | [diff] [blame] | 188 | // For this test we only care that there was no crash. |
| 189 | assert!(result.is_ok() || result.is_err()); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 190 | } |
| 191 | |
| 192 | #[test] |
| 193 | fn test_delete_key() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 194 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 195 | let blob = generate_rsa_key(legacy.as_ref(), false, false); |
| 196 | let result = legacy.deleteKey(&blob); |
| 197 | assert!(result.is_ok(), "{:?}", result); |
| 198 | } |
| 199 | |
| 200 | #[test] |
| 201 | fn test_delete_all_keys() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 202 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 203 | let result = legacy.deleteAllKeys(); |
| 204 | assert!(result.is_ok(), "{:?}", result); |
| 205 | } |
| 206 | |
| 207 | #[test] |
| 208 | fn test_destroy_attestation_ids() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 209 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 210 | let result = legacy.destroyAttestationIds(); |
| 211 | assert!(result.is_err()); |
| 212 | assert_eq!(result.unwrap_err().service_specific_error(), ErrorCode::UNIMPLEMENTED.0,); |
| 213 | } |
| 214 | |
| 215 | fn generate_aes_key(legacy: &dyn IKeyMintDevice) -> Vec<u8> { |
| 216 | let kps = vec![ |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 217 | KeyParameter { |
| 218 | tag: Tag::ALGORITHM, |
| 219 | value: KeyParameterValue::Algorithm(Algorithm::AES), |
| 220 | }, |
| 221 | KeyParameter { tag: Tag::KEY_SIZE, value: KeyParameterValue::Integer(128) }, |
| 222 | KeyParameter { |
| 223 | tag: Tag::BLOCK_MODE, |
| 224 | value: KeyParameterValue::BlockMode(BlockMode::CBC), |
| 225 | }, |
| 226 | KeyParameter { |
| 227 | tag: Tag::PADDING, |
| 228 | value: KeyParameterValue::PaddingMode(PaddingMode::NONE), |
| 229 | }, |
| 230 | KeyParameter { tag: Tag::NO_AUTH_REQUIRED, value: KeyParameterValue::BoolValue(true) }, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 231 | KeyParameter { |
| 232 | tag: Tag::PURPOSE, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 233 | value: KeyParameterValue::KeyPurpose(KeyPurpose::ENCRYPT), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 234 | }, |
| 235 | KeyParameter { |
| 236 | tag: Tag::PURPOSE, |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 237 | value: KeyParameterValue::KeyPurpose(KeyPurpose::DECRYPT), |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 238 | }, |
| 239 | ]; |
Shawn Willden | dbdac60 | 2021-01-12 22:35:16 -0700 | [diff] [blame] | 240 | let creation_result = generate_key(legacy, kps); |
| 241 | assert_eq!(creation_result.certificateChain.len(), 0); |
| 242 | creation_result.keyBlob |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 243 | } |
| 244 | |
| 245 | fn begin( |
| 246 | legacy: &dyn IKeyMintDevice, |
| 247 | blob: &[u8], |
| 248 | purpose: KeyPurpose, |
| 249 | extra_params: Option<Vec<KeyParameter>>, |
| 250 | ) -> BeginResult { |
| 251 | let mut kps = vec![ |
Janis Danisevskis | b60c004 | 2020-12-17 00:11:21 -0800 | [diff] [blame] | 252 | KeyParameter { |
| 253 | tag: Tag::BLOCK_MODE, |
| 254 | value: KeyParameterValue::BlockMode(BlockMode::CBC), |
| 255 | }, |
| 256 | KeyParameter { |
| 257 | tag: Tag::PADDING, |
| 258 | value: KeyParameterValue::PaddingMode(PaddingMode::NONE), |
| 259 | }, |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 260 | ]; |
| 261 | if let Some(mut extras) = extra_params { |
| 262 | kps.append(&mut extras); |
| 263 | } |
Chris Wailes | d5aaaef | 2021-07-27 16:04:33 -0700 | [diff] [blame] | 264 | let result = legacy.begin(purpose, blob, &kps, None); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 265 | assert!(result.is_ok(), "{:?}", result); |
| 266 | result.unwrap() |
| 267 | } |
| 268 | |
| 269 | #[test] |
| 270 | fn test_begin_abort() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 271 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 272 | let blob = generate_aes_key(legacy.as_ref()); |
| 273 | let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); |
| 274 | let operation = begin_result.operation.unwrap(); |
| 275 | let result = operation.abort(); |
| 276 | assert!(result.is_ok(), "{:?}", result); |
| 277 | let result = operation.abort(); |
| 278 | assert!(result.is_err()); |
| 279 | } |
| 280 | |
| 281 | #[test] |
| 282 | fn test_begin_update_finish() { |
Janis Danisevskis | 1291384 | 2021-02-01 13:49:25 -0800 | [diff] [blame] | 283 | let legacy = get_device_or_skip_test!(); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 284 | let blob = generate_aes_key(legacy.as_ref()); |
| 285 | |
| 286 | let begin_result = begin(legacy.as_ref(), &blob, KeyPurpose::ENCRYPT, None); |
| 287 | let operation = begin_result.operation.unwrap(); |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 288 | |
| 289 | let update_aad_result = operation.updateAad( |
Charisee | a1e1c48 | 2022-02-26 01:26:35 +0000 | [diff] [blame] | 290 | b"foobar".as_ref(), |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 291 | None, /* authToken */ |
| 292 | None, /* timestampToken */ |
| 293 | ); |
| 294 | assert!(update_aad_result.is_ok(), "{:?}", update_aad_result); |
| 295 | |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 296 | let message = [42; 128]; |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 297 | let result = operation.finish( |
| 298 | Some(&message), |
| 299 | None, /* signature */ |
| 300 | None, /* authToken */ |
| 301 | None, /* timestampToken */ |
| 302 | None, /* confirmationToken */ |
| 303 | ); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 304 | assert!(result.is_ok(), "{:?}", result); |
| 305 | let ciphertext = result.unwrap(); |
| 306 | assert!(!ciphertext.is_empty()); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 307 | |
| 308 | let begin_result = |
| 309 | begin(legacy.as_ref(), &blob, KeyPurpose::DECRYPT, Some(begin_result.params)); |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 310 | |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 311 | let operation = begin_result.operation.unwrap(); |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 312 | |
| 313 | let update_aad_result = operation.updateAad( |
Charisee | a1e1c48 | 2022-02-26 01:26:35 +0000 | [diff] [blame] | 314 | b"foobar".as_ref(), |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 315 | None, /* authToken */ |
| 316 | None, /* timestampToken */ |
| 317 | ); |
| 318 | assert!(update_aad_result.is_ok(), "{:?}", update_aad_result); |
| 319 | |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 320 | let result = operation.update( |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 321 | &ciphertext, |
| 322 | None, /* authToken */ |
| 323 | None, /* timestampToken */ |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 324 | ); |
| 325 | assert!(result.is_ok(), "{:?}", result); |
Shawn Willden | 44cc03d | 2021-02-19 10:53:49 -0700 | [diff] [blame] | 326 | assert_eq!(result.unwrap(), message); |
| 327 | let result = operation.finish( |
| 328 | None, /* input */ |
| 329 | None, /* signature */ |
| 330 | None, /* authToken */ |
| 331 | None, /* timestampToken */ |
| 332 | None, /* confirmationToken */ |
| 333 | ); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 334 | assert!(result.is_ok(), "{:?}", result); |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 335 | } |
Joel Galenson | f21c002 | 2020-12-11 14:37:52 -0800 | [diff] [blame] | 336 | |
| 337 | #[test] |
| 338 | fn test_secure_clock() { |
| 339 | add_keymint_device_service(); |
Stephen Crane | 221bbb5 | 2020-12-16 15:52:10 -0800 | [diff] [blame] | 340 | let compat_service: binder::Strong<dyn IKeystoreCompatService> = |
Joel Galenson | 9978cd4 | 2021-02-23 09:11:10 -0800 | [diff] [blame] | 341 | match binder::get_interface(COMPAT_NAME) { |
| 342 | Ok(cs) => cs, |
| 343 | _ => return, |
| 344 | }; |
| 345 | let secure_clock = match compat_service.getSecureClock() { |
| 346 | Ok(sc) => sc, |
| 347 | _ => return, |
| 348 | }; |
Joel Galenson | f21c002 | 2020-12-11 14:37:52 -0800 | [diff] [blame] | 349 | |
| 350 | let challenge = 42; |
| 351 | let result = secure_clock.generateTimeStamp(challenge); |
| 352 | assert!(result.is_ok(), "{:?}", result); |
| 353 | let result = result.unwrap(); |
| 354 | assert_eq!(result.challenge, challenge); |
| 355 | assert_eq!(result.mac.len(), 32); |
| 356 | } |
| 357 | |
| 358 | #[test] |
| 359 | fn test_shared_secret() { |
| 360 | add_keymint_device_service(); |
Stephen Crane | 221bbb5 | 2020-12-16 15:52:10 -0800 | [diff] [blame] | 361 | let compat_service: binder::Strong<dyn IKeystoreCompatService> = |
Joel Galenson | 9978cd4 | 2021-02-23 09:11:10 -0800 | [diff] [blame] | 362 | match binder::get_interface(COMPAT_NAME) { |
| 363 | Ok(cs) => cs, |
| 364 | _ => return, |
| 365 | }; |
| 366 | let shared_secret = match compat_service.getSharedSecret(SecurityLevel::TRUSTED_ENVIRONMENT) |
| 367 | { |
| 368 | Ok(ss) => ss, |
| 369 | _ => return, |
| 370 | }; |
Joel Galenson | f21c002 | 2020-12-11 14:37:52 -0800 | [diff] [blame] | 371 | |
| 372 | let result = shared_secret.getSharedSecretParameters(); |
| 373 | assert!(result.is_ok(), "{:?}", result); |
| 374 | let params = result.unwrap(); |
| 375 | |
| 376 | let result = shared_secret.computeSharedSecret(&[params]); |
| 377 | assert!(result.is_ok(), "{:?}", result); |
| 378 | assert_ne!(result.unwrap().len(), 0); |
| 379 | } |
Janis Danisevskis | 67f3056 | 2021-05-21 13:20:22 -0700 | [diff] [blame] | 380 | |
| 381 | #[test] |
| 382 | fn test_get_key_characteristics() { |
| 383 | let legacy = get_device_or_skip_test!(); |
| 384 | let hw_info = legacy.getHardwareInfo().expect("GetHardwareInfo"); |
| 385 | |
| 386 | let blob = generate_rsa_key(legacy.as_ref(), false, false); |
| 387 | let characteristics = |
| 388 | legacy.getKeyCharacteristics(&blob, &[], &[]).expect("GetKeyCharacteristics."); |
| 389 | |
| 390 | assert!(characteristics.iter().any(|kc| kc.securityLevel == hw_info.securityLevel)); |
| 391 | let sec_level_enforced = &characteristics |
| 392 | .iter() |
| 393 | .find(|kc| kc.securityLevel == hw_info.securityLevel) |
| 394 | .expect("There should be characteristics matching the device's security level.") |
| 395 | .authorizations; |
| 396 | |
| 397 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 398 | kp, |
| 399 | KeyParameter { |
| 400 | tag: Tag::PURPOSE, |
| 401 | value: KeyParameterValue::KeyPurpose(KeyPurpose::SIGN) |
| 402 | } |
| 403 | ))); |
| 404 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 405 | kp, |
| 406 | KeyParameter { tag: Tag::DIGEST, value: KeyParameterValue::Digest(Digest::SHA_2_256) } |
| 407 | ))); |
| 408 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 409 | kp, |
| 410 | KeyParameter { |
| 411 | tag: Tag::PADDING, |
| 412 | value: KeyParameterValue::PaddingMode(PaddingMode::RSA_PSS) |
| 413 | } |
| 414 | ))); |
| 415 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 416 | kp, |
| 417 | KeyParameter { |
| 418 | tag: Tag::ALGORITHM, |
| 419 | value: KeyParameterValue::Algorithm(Algorithm::RSA) |
| 420 | } |
| 421 | ))); |
| 422 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 423 | kp, |
| 424 | KeyParameter { tag: Tag::KEY_SIZE, value: KeyParameterValue::Integer(2048) } |
| 425 | ))); |
| 426 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 427 | kp, |
| 428 | KeyParameter { |
| 429 | tag: Tag::RSA_PUBLIC_EXPONENT, |
| 430 | value: KeyParameterValue::LongInteger(65537) |
| 431 | } |
| 432 | ))); |
| 433 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 434 | kp, |
| 435 | KeyParameter { tag: Tag::NO_AUTH_REQUIRED, value: KeyParameterValue::BoolValue(true) } |
| 436 | ))); |
| 437 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 438 | kp, |
| 439 | KeyParameter { |
| 440 | tag: Tag::ORIGIN, |
| 441 | value: KeyParameterValue::Origin(KeyOrigin::GENERATED) |
| 442 | } |
| 443 | ))); |
| 444 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 445 | kp, |
| 446 | KeyParameter { tag: Tag::OS_VERSION, value: KeyParameterValue::Integer(_) } |
| 447 | ))); |
| 448 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 449 | kp, |
| 450 | KeyParameter { tag: Tag::OS_PATCHLEVEL, value: KeyParameterValue::Integer(_) } |
| 451 | ))); |
| 452 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 453 | kp, |
Janis Danisevskis | 600321a | 2021-09-30 16:15:25 +0000 | [diff] [blame] | 454 | KeyParameter { tag: Tag::VENDOR_PATCHLEVEL, value: KeyParameterValue::Integer(_) } |
| 455 | ))); |
| 456 | assert!(sec_level_enforced.iter().any(|kp| matches!( |
| 457 | kp, |
Janis Danisevskis | 67f3056 | 2021-05-21 13:20:22 -0700 | [diff] [blame] | 458 | KeyParameter { tag: Tag::BOOT_PATCHLEVEL, value: KeyParameterValue::Integer(_) } |
| 459 | ))); |
| 460 | } |
Joel Galenson | de386b4 | 2020-09-30 10:53:05 -0700 | [diff] [blame] | 461 | } |