/* * Copyright (C) 2018 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "ConfirmationIOHidlHalTest" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include using ::android::sp; using ::std::string; namespace android { namespace hardware { namespace confirmationui { namespace V1_0 { namespace test { namespace { const support::auth_token_key_t testKey(static_cast(TestKeyBits::BYTE)); class HMacImplementation { public: static support::NullOr hmac256( const support::auth_token_key_t& key, std::initializer_list buffers) { HMAC_CTX hmacCtx; HMAC_CTX_init(&hmacCtx); if (!HMAC_Init_ex(&hmacCtx, key.data(), key.size(), EVP_sha256(), nullptr)) { return {}; } for (auto& buffer : buffers) { if (!HMAC_Update(&hmacCtx, buffer.data(), buffer.size())) { return {}; } } support::hmac_t result; if (!HMAC_Final(&hmacCtx, result.data(), nullptr)) { return {}; } return result; } }; using HMacer = support::HMac; template hidl_vec testHMAC(const Data&... data) { auto hmac = HMacer::hmac256(testKey, data...); if (!hmac.isOk()) { EXPECT_TRUE(false) << "Failed to compute test hmac. This is a self-test error."; return {}; } hidl_vec result(hmac.value().size()); copy(hmac.value().data(), hmac.value().data() + hmac.value().size(), result.data()); return result; } using ::android::hardware::keymaster::V4_0::HardwareAuthToken; using ::android::hardware::keymaster::V4_0::HardwareAuthenticatorType; template auto toBytes(const T& v) -> const uint8_t (&)[sizeof(T)] { return *reinterpret_cast(&v); } HardwareAuthToken makeTestToken(const TestModeCommands command, uint64_t timestamp = 0) { HardwareAuthToken auth_token; auth_token.challenge = static_cast(command); auth_token.userId = 0; auth_token.authenticatorId = 0; auth_token.authenticatorType = HardwareAuthenticatorType::NONE; auth_token.timestamp = timestamp; // Canonical form of auth-token v0 // version (1 byte) // challenge (8 bytes) // user_id (8 bytes) // authenticator_id (8 bytes) // authenticator_type (4 bytes) // timestamp (8 bytes) // total 37 bytes auth_token.mac = testHMAC("\0", toBytes(auth_token.challenge), // toBytes(auth_token.userId), // toBytes(auth_token.authenticatorId), // toBytes(support::hton(auth_token.authenticatorType)), // toBytes(support::hton(auth_token.timestamp))); // return auth_token; } #define DEBUG_CONFRIMATIONUI_UTILS_TEST #ifdef DEBUG_CONFRIMATIONUI_UTILS_TEST std::ostream& hexdump(std::ostream& out, const uint8_t* data, size_t size) { for (size_t i = 0; i < size; ++i) { uint8_t byte = data[i]; out << std::hex << std::setw(2) << std::setfill('0') << (unsigned)byte; switch (i & 0xf) { case 0xf: out << "\n"; break; case 7: out << " "; break; default: out << " "; break; } } return out; } #endif constexpr char hex_value[256] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 0, 0, 0, 0, 0, // '0'..'9' 0, 10, 11, 12, 13, 14, 15, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 'A'..'F' 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 10, 11, 12, 13, 14, 15, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 'a'..'f' 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, // 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; std::string hex2str(std::string a) { std::string b; size_t num = a.size() / 2; b.resize(num); for (size_t i = 0; i < num; i++) { b[i] = (hex_value[a[i * 2] & 0xFF] << 4) + (hex_value[a[i * 2 + 1] & 0xFF]); } return b; } } // namespace class ConfirmationArgs { public: ResponseCode error_; hidl_vec formattedMessage_; hidl_vec confirmationToken_; bool verifyConfirmationToken() { static constexpr char confirmationPrefix[] = "confirmation token"; EXPECT_EQ(32U, confirmationToken_.size()); return 32U == confirmationToken_.size() && !memcmp(confirmationToken_.data(), testHMAC(confirmationPrefix, formattedMessage_).data(), 32); } }; class ConfirmationTestCallback : public ::testing::VtsHalHidlTargetCallbackBase, public IConfirmationResultCallback { public: Return result(ResponseCode error, const hidl_vec& formattedMessage, const hidl_vec& confirmationToken) override { ConfirmationArgs args; args.error_ = error; args.formattedMessage_ = formattedMessage; args.confirmationToken_ = confirmationToken; NotifyFromCallback(args); return Void(); } }; class ConfirmationUIHidlTest : public ::testing::TestWithParam { public: void TearDown() override { confirmator_->abort(); } void SetUp() override { confirmator_ = IConfirmationUI::getService(GetParam()); ASSERT_NE(nullptr, confirmator_.get()); } protected: sp confirmator_; }; #define ASSERT_HAL_CALL(expected, call) \ { \ auto result = call; \ ASSERT_TRUE(result.isOk()); \ ASSERT_EQ(expected, static_cast(result)); \ } struct CnCborDeleter { void operator()(cn_cbor* ptr) { cn_cbor_free(ptr); } }; typedef std::unique_ptr CnCborPtr; // Simulates the User taping Ok TEST_P(ConfirmationUIHidlTest, UserOkTest) { static constexpr char test_prompt[] = "Me first, gimme gimme!"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->deliverSecureInputEvent( makeTestToken(TestModeCommands::OK_EVENT))); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::OK, result.args->error_); ASSERT_TRUE(result.args->verifyConfirmationToken()); cn_cbor_errback cn_cbor_error; auto parsed_message = CnCborPtr(cn_cbor_decode(result.args->formattedMessage_.data(), result.args->formattedMessage_.size(), &cn_cbor_error)); // is parsable CBOR ASSERT_TRUE(parsed_message.get()); // is a map ASSERT_EQ(CN_CBOR_MAP, parsed_message->type); // the message must have exactly 2 key value pairs. // cn_cbor holds 2* in the length field ASSERT_EQ(4, parsed_message->length); // map has key "prompt" auto prompt = cn_cbor_mapget_string(parsed_message.get(), "prompt"); ASSERT_TRUE(prompt); ASSERT_EQ(CN_CBOR_TEXT, prompt->type); ASSERT_EQ(22, prompt->length); ASSERT_EQ(0, memcmp(test_prompt, prompt->v.str, 22)); // map has key "extra" auto extra_out = cn_cbor_mapget_string(parsed_message.get(), "extra"); ASSERT_TRUE(extra_out); ASSERT_EQ(CN_CBOR_BYTES, extra_out->type); ASSERT_EQ(3, extra_out->length); ASSERT_EQ(0, memcmp(test_extra, extra_out->v.bytes, 3)); } // Initiates a confirmation prompt with a message that is too long TEST_P(ConfirmationUIHidlTest, MessageTooLongTest) { static constexpr uint8_t test_extra[static_cast(MessageSize::MAX)] = {}; static constexpr char test_prompt[] = "D\'oh!"; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + sizeof(test_extra)); ASSERT_HAL_CALL(ResponseCode::UIErrorMessageTooLong, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); } // If the message gets very long some HAL implementations might fail even before the message // reaches the trusted app implementation. But the HAL must still diagnose the correct error. TEST_P(ConfirmationUIHidlTest, MessageWayTooLongTest) { static constexpr uint8_t test_extra[static_cast(MessageSize::MAX) * 10] = {}; static constexpr char test_prompt[] = "D\'oh!"; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + sizeof(test_extra)); ASSERT_HAL_CALL(ResponseCode::UIErrorMessageTooLong, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); } // Simulates the User tapping the Cancel TEST_P(ConfirmationUIHidlTest, UserCancelTest) { static constexpr char test_prompt[] = "Me first, gimme gimme!"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->deliverSecureInputEvent( makeTestToken(TestModeCommands::CANCEL_EVENT))); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Canceled, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Simulates the framework cancelling an ongoing prompt TEST_P(ConfirmationUIHidlTest, AbortTest) { static constexpr char test_prompt[] = "Me first, gimme gimme!"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); confirmator_->abort(); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Aborted, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Tests if the confirmation dialog can successfully render 100 'W' characters as required by // the design guidelines. TEST_P(ConfirmationUIHidlTest, PortableMessageTest1) { static constexpr char test_prompt[] = "WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW" "WWWWWWWWWWWWWW"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); confirmator_->abort(); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Aborted, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Tests if the confirmation dialog can successfully render 100 'W' characters as required by // the design guidelines in magnified mode. TEST_P(ConfirmationUIHidlTest, PortableMessageTest1Magnified) { static constexpr char test_prompt[] = "WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW" "WWWWWWWWWWWWWW"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {UIOption::AccessibilityMagnified})); confirmator_->abort(); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Aborted, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Tests if the confirmation dialog can successfully render 8 groups of 12 'W' characters as // required by the design guidelines. TEST_P(ConfirmationUIHidlTest, PortableMessageTest2) { static constexpr char test_prompt[] = "WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW " "WWWWWWWWWWWW WWWWWWWWWWWW"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); confirmator_->abort(); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Aborted, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Tests if the confirmation dialog can successfully render 8 groups of 12 'W' characters as // required by the design guidelines in magnified mode. TEST_P(ConfirmationUIHidlTest, PortableMessageTest2Magnified) { static constexpr char test_prompt[] = "WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW WWWWWWWWWWWW " "WWWWWWWWWWWW WWWWWWWWWWWW"; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::OK, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {UIOption::AccessibilityMagnified})); confirmator_->abort(); auto result = conf_cb->WaitForCallback(); ASSERT_EQ(ResponseCode::Aborted, result.args->error_); ASSERT_EQ(0U, result.args->confirmationToken_.size()); ASSERT_EQ(0U, result.args->formattedMessage_.size()); } // Passing malformed UTF-8 to the confirmation UI // This test passes a string that ends in the middle of a multibyte character TEST_P(ConfirmationUIHidlTest, MalformedUTF8Test1) { static constexpr char test_prompt[] = {char(0xc0), 0}; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::UIErrorMalformedUTF8Encoding, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); } // Passing malformed UTF-8 to the confirmation UI // This test passes a string with a 5-byte character. TEST_P(ConfirmationUIHidlTest, MalformedUTF8Test2) { static constexpr char test_prompt[] = {char(0xf8), char(0x82), char(0x82), char(0x82), char(0x82), 0}; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::UIErrorMalformedUTF8Encoding, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); } // Passing malformed UTF-8 to the confirmation UI // This test passes a string with a 2-byte character followed by a stray non UTF-8 character. TEST_P(ConfirmationUIHidlTest, MalformedUTF8Test3) { static constexpr char test_prompt[] = {char(0xc0), char(0x82), char(0x83), 0}; static constexpr uint8_t test_extra[] = {0x1, 0x2, 0x3}; sp conf_cb = new ConfirmationTestCallback; hidl_string prompt_text(test_prompt); hidl_vec extra(test_extra, test_extra + 3); ASSERT_HAL_CALL(ResponseCode::UIErrorMalformedUTF8Encoding, confirmator_->promptUserConfirmation(conf_cb, prompt_text, extra, "en", {})); } // Test the implementation of HMAC SHA 256 against a golden blob. TEST(ConfirmationUITestSelfTest, HMAC256SelfTest) { const char key_str[32] = "keykeykeykeykeykeykeykeykeykeyk"; const uint8_t(&key)[32] = *reinterpret_cast(key_str); auto expected = hex2str("2377fbcaa7fb3f6c20cfa1d9ebc60e9922cf58c909e25e300f3cb57f7805c886"); auto result = HMacer::hmac256(key, "value1", "value2", "value3"); #ifdef DEBUG_CONFRIMATIONUI_UTILS_TEST hexdump(std::cout, reinterpret_cast(expected.data()), 32) << std::endl; hexdump(std::cout, result.value().data(), 32) << std::endl; #endif support::ByteBufferProxy expected_bytes(expected); ASSERT_TRUE(result.isOk()); ASSERT_EQ(expected, result.value()); } GTEST_ALLOW_UNINSTANTIATED_PARAMETERIZED_TEST(ConfirmationUIHidlTest); INSTANTIATE_TEST_SUITE_P( PerInstance, ConfirmationUIHidlTest, testing::ValuesIn(android::hardware::getAllHalInstanceNames(IConfirmationUI::descriptor)), android::hardware::PrintInstanceNameToString); } // namespace test } // namespace V1_0 } // namespace confirmationui } // namespace hardware } // namespace android