123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249 |
- /*
- * Copyright (C) 2015 The Android Open Source Project
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- #include <endian.h>
- #include <gtest/gtest.h>
- #include <hardware/gatekeeper.h>
- #include <gatekeeper/gatekeeper.h> // For password_handle_t
- #include <unistd.h>
- using ::testing::Test;
- using ::gatekeeper::password_handle_t;
- using ::gatekeeper::secure_id_t;
- class GateKeeperDeviceTest : public virtual Test {
- public:
- GateKeeperDeviceTest() {}
- virtual ~GateKeeperDeviceTest() {}
- virtual void SetUp() {
- gatekeeper_device_initialize(&device);
- }
- virtual void TearDown() {
- gatekeeper_close(device);
- }
- static void gatekeeper_device_initialize(gatekeeper_device_t **dev) {
- int ret;
- const hw_module_t *mod;
- ret = hw_get_module_by_class(GATEKEEPER_HARDWARE_MODULE_ID, NULL, &mod);
- ASSERT_EQ(0, ret);
- ret = gatekeeper_open(mod, dev);
- ASSERT_EQ(0, ret);
- }
- gatekeeper_device_t *device;
- };
- TEST_F(GateKeeperDeviceTest, EnrollAndVerifyStress) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- uint8_t *auth_token;
- uint32_t auth_token_len;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- for (int i = 0; i < 1000; i++) {
- bool should_reenroll;
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
- ASSERT_EQ(0, ret);
- }
- }
- TEST_F(GateKeeperDeviceTest, EnrollAndVerify) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- uint8_t *auth_token;
- uint32_t auth_token_len;
- hw_auth_token_t *hat;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- bool should_reenroll;
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len, &should_reenroll);
- ASSERT_EQ(0, should_reenroll);
- ASSERT_EQ(0, ret);
- hat = reinterpret_cast<hw_auth_token_t *>(auth_token);
- ASSERT_EQ(HW_AUTH_TOKEN_VERSION, hat->version);
- ASSERT_EQ(htobe32(HW_AUTH_PASSWORD), hat->authenticator_type);
- }
- TEST_F(GateKeeperDeviceTest, EnrollAndVerifyTimeout) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- uint8_t *auth_token = NULL;
- uint32_t auth_token_len;
- bool should_reenroll;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- int payload_val = password_payload[0];
- password_payload[0] = 4;
- int timeout = 0;
- for (int i = 0; i < 20; i++) {
- bool should_reenroll;
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len,
- &should_reenroll);
- ASSERT_NE(0, ret);
- ASSERT_EQ(NULL, auth_token);
- if (ret > 0) {
- timeout = ret;
- }
- }
- ASSERT_NE(0, timeout);
- sleep((timeout + 999)/ 1000);
- password_payload[0] = payload_val;
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len,
- &should_reenroll);
- ASSERT_EQ(0, ret);
- }
- TEST_F(GateKeeperDeviceTest, EnrollAndVerifyBadPassword) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- uint8_t *auth_token = NULL;
- uint32_t auth_token_len;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- password_payload[0] = 4;
- bool should_reenroll;
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len,
- &should_reenroll);
- ASSERT_NE(0, ret);
- ASSERT_EQ(NULL, auth_token);
- }
- TEST_F(GateKeeperDeviceTest, MinFailedAttemptsBeforeLockout) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- uint8_t *auth_token = NULL;
- uint32_t auth_token_len;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- password_payload[0] = 4;
- // User should have at least 4 attempts before being locked out
- static const int MIN_FAILED_ATTEMPTS = 4;
- bool should_reenroll;
- for (int i = 0; i < MIN_FAILED_ATTEMPTS; i++) {
- ret = device->verify(device, 400, 0, password_handle, password_handle_length,
- password_payload, password_len, &auth_token, &auth_token_len,
- &should_reenroll);
- // shoudln't be a timeout
- ASSERT_LT(ret, 0);
- }
- }
- TEST_F(GateKeeperDeviceTest, UntrustedReEnroll) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- password_handle_t *handle = reinterpret_cast<password_handle_t *>(password_handle);
- secure_id_t sid = handle->user_id;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- handle = reinterpret_cast<password_handle_t *>(password_handle);
- ASSERT_NE(sid, handle->user_id);
- }
- TEST_F(GateKeeperDeviceTest, TrustedReEnroll) {
- uint32_t password_len = 50;
- uint8_t password_payload[password_len];
- uint8_t *password_handle;
- uint32_t password_handle_length;
- int ret;
- ret = device->enroll(device, 400, NULL, 0, NULL, 0, password_payload, password_len,
- &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- password_handle_t *handle = reinterpret_cast<password_handle_t *>(password_handle);
- secure_id_t sid = handle->user_id;
- ret = device->enroll(device, 400, password_handle, password_handle_length, password_payload,
- password_len, password_payload, password_len, &password_handle, &password_handle_length);
- ASSERT_EQ(0, ret);
- handle = reinterpret_cast<password_handle_t *>(password_handle);
- ASSERT_EQ(sid, handle->user_id);
- }
|