upload android base code part6
This commit is contained in:
parent
421e214c7d
commit
4e516ec6ed
35396 changed files with 9188716 additions and 0 deletions
167
android/system/tpm/trunks/session_manager_test.cc
Normal file
167
android/system/tpm/trunks/session_manager_test.cc
Normal file
|
@ -0,0 +1,167 @@
|
|||
//
|
||||
// Copyright (C) 2015 The Android Open Source Project
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
//
|
||||
|
||||
#include "trunks/session_manager_impl.h"
|
||||
|
||||
#include <vector>
|
||||
|
||||
#include <base/logging.h>
|
||||
#include <base/strings/string_number_conversions.h>
|
||||
#include <gmock/gmock.h>
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "trunks/error_codes.h"
|
||||
#include "trunks/mock_tpm.h"
|
||||
#include "trunks/tpm_generated.h"
|
||||
#include "trunks/tpm_utility.h"
|
||||
#include "trunks/trunks_factory_for_test.h"
|
||||
|
||||
using testing::_;
|
||||
using testing::DoAll;
|
||||
using testing::NiceMock;
|
||||
using testing::Return;
|
||||
using testing::SetArgPointee;
|
||||
|
||||
namespace trunks {
|
||||
|
||||
class SessionManagerTest : public testing::Test {
|
||||
public:
|
||||
SessionManagerTest() : session_manager_(factory_) {
|
||||
delegate_ = new HmacAuthorizationDelegate();
|
||||
}
|
||||
~SessionManagerTest() override {}
|
||||
|
||||
void SetUp() override { factory_.set_tpm(&mock_tpm_); }
|
||||
|
||||
void SetHandle(TPM_HANDLE handle) {
|
||||
session_manager_.session_handle_ = handle;
|
||||
}
|
||||
|
||||
TPM2B_PUBLIC_KEY_RSA GetValidRSAPublicKey() {
|
||||
const char kValidModulus[] =
|
||||
"A1D50D088994000492B5F3ED8A9C5FC8772706219F4C063B2F6A8C6B74D3AD6B"
|
||||
"212A53D01DABB34A6261288540D420D3BA59ED279D859DE6227A7AB6BD88FADD"
|
||||
"FC3078D465F4DF97E03A52A587BD0165AE3B180FE7B255B7BEDC1BE81CB1383F"
|
||||
"E9E46F9312B1EF28F4025E7D332E33F4416525FEB8F0FC7B815E8FBB79CDABE6"
|
||||
"327B5A155FEF13F559A7086CB8A543D72AD6ECAEE2E704FF28824149D7F4E393"
|
||||
"D3C74E721ACA97F7ADBE2CCF7B4BCC165F7380F48065F2C8370F25F066091259"
|
||||
"D14EA362BAF236E3CD8771A94BDEDA3900577143A238AB92B6C55F11DEFAFB31"
|
||||
"7D1DC5B6AE210C52B008D87F2A7BFF6EB5C4FB32D6ECEC6505796173951A3167";
|
||||
std::vector<uint8_t> bytes;
|
||||
CHECK(base::HexStringToBytes(kValidModulus, &bytes));
|
||||
CHECK_EQ(bytes.size(), 256u);
|
||||
TPM2B_PUBLIC_KEY_RSA rsa;
|
||||
rsa.size = bytes.size();
|
||||
memcpy(rsa.buffer, bytes.data(), bytes.size());
|
||||
return rsa;
|
||||
}
|
||||
|
||||
protected:
|
||||
TrunksFactoryForTest factory_;
|
||||
NiceMock<MockTpm> mock_tpm_;
|
||||
HmacAuthorizationDelegate* delegate_;
|
||||
SessionManagerImpl session_manager_;
|
||||
};
|
||||
|
||||
TEST_F(SessionManagerTest, CloseSessionSuccess) {
|
||||
TPM_HANDLE handle = TPM_RH_FIRST;
|
||||
SetHandle(handle);
|
||||
EXPECT_CALL(mock_tpm_, FlushContextSync(handle, nullptr))
|
||||
.WillOnce(Return(TPM_RC_SUCCESS));
|
||||
session_manager_.CloseSession();
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, CloseSessionNoHandle) {
|
||||
TPM_HANDLE handle = kUninitializedHandle;
|
||||
SetHandle(handle);
|
||||
EXPECT_CALL(mock_tpm_, FlushContextSync(handle, nullptr)).Times(0);
|
||||
session_manager_.CloseSession();
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, GetSessionHandleTest) {
|
||||
TPM_HANDLE handle = TPM_RH_FIRST;
|
||||
EXPECT_EQ(kUninitializedHandle, session_manager_.GetSessionHandle());
|
||||
SetHandle(handle);
|
||||
EXPECT_EQ(handle, session_manager_.GetSessionHandle());
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, StartSessionSuccess) {
|
||||
TPM_SE session_type = TPM_SE_TRIAL;
|
||||
TPM2B_PUBLIC public_data;
|
||||
public_data.public_area.type = TPM_ALG_RSA;
|
||||
public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
||||
EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, nullptr))
|
||||
.WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS)));
|
||||
TPM_HANDLE handle = TPM_RH_FIRST;
|
||||
TPM2B_NONCE nonce;
|
||||
nonce.size = 20;
|
||||
EXPECT_CALL(mock_tpm_, StartAuthSessionSyncShort(_, handle, _, _,
|
||||
session_type, _, _, _, _, _))
|
||||
.WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS)));
|
||||
EXPECT_EQ(TPM_RC_SUCCESS, session_manager_.StartSession(
|
||||
session_type, handle, "", false, delegate_));
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, StartSessionBadSaltingKey) {
|
||||
TPM2B_PUBLIC public_data;
|
||||
public_data.public_area.type = TPM_ALG_RSA;
|
||||
public_data.public_area.unique.rsa.size = 32;
|
||||
EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, nullptr))
|
||||
.WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS)));
|
||||
EXPECT_EQ(TRUNKS_RC_SESSION_SETUP_ERROR,
|
||||
session_manager_.StartSession(TPM_SE_TRIAL, TPM_RH_NULL, "", false,
|
||||
delegate_));
|
||||
public_data.public_area.type = TPM_ALG_ECC;
|
||||
public_data.public_area.unique.rsa.size = 256;
|
||||
EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, nullptr))
|
||||
.WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS)));
|
||||
EXPECT_EQ(TRUNKS_RC_SESSION_SETUP_ERROR,
|
||||
session_manager_.StartSession(TPM_SE_TRIAL, TPM_RH_NULL, "", false,
|
||||
delegate_));
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, StartSessionFailure) {
|
||||
TPM2B_PUBLIC public_data;
|
||||
public_data.public_area.type = TPM_ALG_RSA;
|
||||
public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
||||
EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, nullptr))
|
||||
.WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS)));
|
||||
EXPECT_CALL(mock_tpm_,
|
||||
StartAuthSessionSyncShort(_, TPM_RH_NULL, _, _, _, _, _, _, _, _))
|
||||
.WillOnce(Return(TPM_RC_FAILURE));
|
||||
EXPECT_EQ(TPM_RC_FAILURE,
|
||||
session_manager_.StartSession(TPM_SE_TRIAL, TPM_RH_NULL, "", false,
|
||||
delegate_));
|
||||
}
|
||||
|
||||
TEST_F(SessionManagerTest, StartSessionBadNonce) {
|
||||
TPM_SE session_type = TPM_SE_TRIAL;
|
||||
TPM2B_PUBLIC public_data;
|
||||
public_data.public_area.type = TPM_ALG_RSA;
|
||||
public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
||||
EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, nullptr))
|
||||
.WillOnce(DoAll(SetArgPointee<2>(public_data), Return(TPM_RC_SUCCESS)));
|
||||
TPM_HANDLE handle = TPM_RH_FIRST;
|
||||
TPM2B_NONCE nonce;
|
||||
nonce.size = 0;
|
||||
EXPECT_CALL(mock_tpm_, StartAuthSessionSyncShort(_, handle, _, _,
|
||||
session_type, _, _, _, _, _))
|
||||
.WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS)));
|
||||
EXPECT_EQ(TPM_RC_FAILURE, session_manager_.StartSession(
|
||||
session_type, handle, "", false, delegate_));
|
||||
}
|
||||
|
||||
} // namespace trunks
|
Loading…
Add table
Add a link
Reference in a new issue