Source release 19.4.0
This commit is contained in:
@@ -8,6 +8,7 @@
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "bcc_validator.h"
|
||||
#include "log.h"
|
||||
|
||||
using ::testing::AllOf;
|
||||
using ::testing::Ge;
|
||||
@@ -17,60 +18,227 @@ using ::testing::Le;
|
||||
namespace wvoec {
|
||||
namespace util {
|
||||
namespace {
|
||||
// Self-signed phase 1 BCC generated by OPK reference implementation.
|
||||
// Phase 2 DICE BCC generated by OPK reference implementation.
|
||||
const std::vector<uint8_t> kBcc = {
|
||||
0x83, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1, 0x0b, 0x40, 0xff,
|
||||
0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97, 0xa6, 0x80, 0xee,
|
||||
0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb, 0x10, 0x84, 0x43,
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0xf8, 0xaa, 0x01, 0x68, 0x69, 0x73, 0x73,
|
||||
0x75, 0x65, 0x72, 0x20, 0x30, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x3a, 0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72,
|
||||
0x6f, 0x69, 0x64, 0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58,
|
||||
0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x3c, 0xfe, 0x6e, 0x28, 0x8b, 0x53, 0x31, 0x64, 0xb2, 0x16,
|
||||
0x26, 0x4c, 0x5f, 0x8e, 0x76, 0xfd, 0xb9, 0x25, 0x8e, 0x8c, 0xf5, 0x80,
|
||||
0xfe, 0xa5, 0x74, 0xbb, 0x0c, 0x5a, 0xef, 0xe3, 0x21, 0xce, 0x3a, 0x00,
|
||||
0x47, 0x44, 0x58, 0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20,
|
||||
0xb3, 0x16, 0x96, 0xda, 0x0e, 0x6c, 0x46, 0x26, 0x1e, 0x52, 0x9b, 0x43,
|
||||
0x9b, 0x68, 0xd0, 0x32, 0x5e, 0x31, 0x39, 0xf9, 0x69, 0x28, 0xec, 0x03,
|
||||
0xeb, 0x06, 0x4c, 0xf3, 0x60, 0xf1, 0xd3, 0x0e, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x52, 0x58, 0x20, 0x38, 0x0c, 0x43, 0xc2, 0xc5, 0x36, 0x5a, 0x91, 0xb4,
|
||||
0x2d, 0x85, 0x22, 0xb4, 0xb9, 0x6e, 0x43, 0xd2, 0xd0, 0x3e, 0x2f, 0xc4,
|
||||
0x1f, 0xb7, 0xb3, 0x4c, 0x6b, 0xfd, 0x90, 0xc7, 0x80, 0x42, 0x84, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68,
|
||||
0x57, 0x69, 0x64, 0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11,
|
||||
0x72, 0x62, 0x31, 0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x2d,
|
||||
0xd1, 0xac, 0x94, 0xbe, 0x4b, 0x89, 0x98, 0xba, 0xec, 0xb6, 0x01, 0xaf,
|
||||
0xaf, 0xda, 0x01, 0x8f, 0xeb, 0x03, 0xd2, 0x8f, 0x42, 0x12, 0x55, 0xe4,
|
||||
0x4b, 0xe2, 0xdf, 0x47, 0x68, 0x27, 0x6a, 0x3a, 0x00, 0x47, 0x44, 0x56,
|
||||
0x41, 0x01, 0x58, 0x40, 0xd7, 0xe8, 0x9b, 0x9b, 0x8f, 0x3f, 0xe7, 0x66,
|
||||
0x24, 0x87, 0x48, 0xf4, 0xbd, 0x47, 0x3b, 0x85, 0xfb, 0x2c, 0x0e, 0xed,
|
||||
0x7d, 0xf4, 0xa6, 0xb5, 0x30, 0x77, 0xea, 0x92, 0x63, 0xc0, 0x1e, 0x8b,
|
||||
0x40, 0xec, 0x71, 0x66, 0xf8, 0xe2, 0x92, 0x07, 0x67, 0x08, 0x25, 0x70,
|
||||
0x4a, 0x06, 0x41, 0x72, 0x21, 0xdf, 0xd4, 0xa7, 0x1a, 0xeb, 0xe9, 0x5f,
|
||||
0x11, 0x30, 0x5b, 0xaa, 0x09, 0xe3, 0x24, 0x00, 0x84, 0x43, 0xa1, 0x01,
|
||||
0x27, 0xa0, 0x58, 0xf7, 0xaa, 0x01, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79, 0x20, 0x32, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72, 0x6f, 0x69, 0x64,
|
||||
0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58, 0x2d, 0xa5, 0x01,
|
||||
0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21, 0x58, 0x20, 0xe6,
|
||||
0xc1, 0x67, 0xa8, 0x6d, 0x92, 0x16, 0xb8, 0x9c, 0xd1, 0xc4, 0xd4, 0xd3,
|
||||
0xf3, 0xc1, 0x22, 0x95, 0x80, 0x49, 0xd0, 0xb3, 0x50, 0x9f, 0x1d, 0xec,
|
||||
0x6f, 0xa8, 0x6c, 0xd2, 0xbd, 0x1a, 0x68, 0x3a, 0x00, 0x47, 0x44, 0x58,
|
||||
0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20, 0x8d, 0x76, 0x93,
|
||||
0x9d, 0x2f, 0x0e, 0x5f, 0xbd, 0x36, 0x58, 0x51, 0x53, 0xc4, 0xa0, 0xaf,
|
||||
0xdb, 0x91, 0x41, 0x6a, 0x62, 0xf0, 0x03, 0x6a, 0x77, 0x8b, 0x2e, 0x5f,
|
||||
0xa7, 0x29, 0x94, 0x69, 0x9d, 0x3a, 0x00, 0x47, 0x44, 0x52, 0x58, 0x20,
|
||||
0xc0, 0x0b, 0xa4, 0x78, 0xac, 0xa9, 0xb6, 0x96, 0x64, 0xaa, 0x55, 0xf6,
|
||||
0x52, 0xe2, 0xa6, 0x7b, 0xd7, 0x6f, 0xd5, 0xe5, 0xc1, 0xbd, 0xef, 0x97,
|
||||
0xf3, 0x0e, 0xea, 0xbc, 0x4b, 0x9e, 0xb7, 0xec, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68, 0x57, 0x69, 0x64,
|
||||
0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11, 0x72, 0x62, 0x31,
|
||||
0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x35, 0x65, 0xd2, 0xaf,
|
||||
0x10, 0xf0, 0x67, 0x3e, 0x58, 0xf9, 0xfc, 0xc0, 0x6d, 0x46, 0xd2, 0x61,
|
||||
0x34, 0xa6, 0xf1, 0xd5, 0x0d, 0x7b, 0x6e, 0x4f, 0xd7, 0x13, 0xcb, 0x1d,
|
||||
0xd6, 0xef, 0x2a, 0x23, 0x3a, 0x00, 0x47, 0x44, 0x56, 0x41, 0x01, 0x58,
|
||||
0x40, 0xa6, 0x67, 0x96, 0xf6, 0x31, 0x68, 0x45, 0x49, 0x7c, 0x38, 0x3f,
|
||||
0xde, 0x91, 0x02, 0xe3, 0x2a, 0x91, 0xc8, 0x0b, 0x3c, 0xdf, 0x2b, 0x18,
|
||||
0xcf, 0x9f, 0x06, 0xc0, 0xbe, 0x58, 0xbe, 0x12, 0x2c, 0xaa, 0x32, 0xa1,
|
||||
0x34, 0x0d, 0xf2, 0x8b, 0xa5, 0x87, 0x17, 0x66, 0x61, 0xd9, 0xdc, 0x08,
|
||||
0x52, 0x86, 0x51, 0x6f, 0x63, 0xfc, 0xaf, 0x7e, 0xc7, 0xeb, 0xa6, 0x73,
|
||||
0x19, 0xb1, 0x1a, 0xc9, 0x06};
|
||||
// Phase 1 self-signed BCC generated by OPK reference implementation.
|
||||
const std::vector<uint8_t> kDegeneratedBcc = {
|
||||
0x82, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1, 0x0b, 0x40, 0xff,
|
||||
0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97, 0xa6, 0x80, 0xee,
|
||||
0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb, 0x10, 0x84, 0x43,
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0x40, 0xa4, 0x01, 0x60, 0x02, 0x60, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x57, 0x58, 0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04,
|
||||
0x81, 0x02, 0x20, 0x06, 0x21, 0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02,
|
||||
0x41, 0xf1, 0x0b, 0x40, 0xff, 0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc,
|
||||
0x5a, 0x97, 0xa6, 0x80, 0xee, 0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77,
|
||||
0xe5, 0xfb, 0x10, 0x3a, 0x00, 0x47, 0x44, 0x58, 0x41, 0x20, 0x58, 0x40,
|
||||
0x73, 0x02, 0x36, 0xaa, 0x6d, 0x52, 0x50, 0x67, 0x43, 0xc4, 0x0b, 0xf8,
|
||||
0x3f, 0x35, 0x2a, 0xd8, 0x44, 0x09, 0xf4, 0x1d, 0xca, 0x91, 0x12, 0x27,
|
||||
0x01, 0xdf, 0x73, 0xb7, 0x9b, 0x31, 0x28, 0x8e, 0xae, 0x9b, 0xc6, 0x7a,
|
||||
0xdc, 0x07, 0xab, 0x69, 0xd2, 0x85, 0x9a, 0x15, 0x8b, 0xe3, 0x5b, 0xf2,
|
||||
0x94, 0x95, 0xee, 0x49, 0x74, 0xc5, 0x85, 0x62, 0x3d, 0x46, 0x4c, 0xeb,
|
||||
0x11, 0x89, 0x68, 0x02};
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0xf8, 0xaa, 0x01, 0x68, 0x69, 0x73, 0x73,
|
||||
0x75, 0x65, 0x72, 0x20, 0x30, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x3a, 0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72,
|
||||
0x6f, 0x69, 0x64, 0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58,
|
||||
0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1, 0x0b, 0x40, 0xff,
|
||||
0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97, 0xa6, 0x80, 0xee,
|
||||
0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb, 0x10, 0x3a, 0x00,
|
||||
0x47, 0x44, 0x58, 0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20,
|
||||
0xb3, 0x16, 0x96, 0xda, 0x0e, 0x6c, 0x46, 0x26, 0x1e, 0x52, 0x9b, 0x43,
|
||||
0x9b, 0x68, 0xd0, 0x32, 0x5e, 0x31, 0x39, 0xf9, 0x69, 0x28, 0xec, 0x03,
|
||||
0xeb, 0x06, 0x4c, 0xf3, 0x60, 0xf1, 0xd3, 0x0e, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x52, 0x58, 0x20, 0x38, 0x0c, 0x43, 0xc2, 0xc5, 0x36, 0x5a, 0x91, 0xb4,
|
||||
0x2d, 0x85, 0x22, 0xb4, 0xb9, 0x6e, 0x43, 0xd2, 0xd0, 0x3e, 0x2f, 0xc4,
|
||||
0x1f, 0xb7, 0xb3, 0x4c, 0x6b, 0xfd, 0x90, 0xc7, 0x80, 0x42, 0x84, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68,
|
||||
0x57, 0x69, 0x64, 0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11,
|
||||
0x72, 0x62, 0x31, 0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x2d,
|
||||
0xd1, 0xac, 0x94, 0xbe, 0x4b, 0x89, 0x98, 0xba, 0xec, 0xb6, 0x01, 0xaf,
|
||||
0xaf, 0xda, 0x01, 0x8f, 0xeb, 0x03, 0xd2, 0x8f, 0x42, 0x12, 0x55, 0xe4,
|
||||
0x4b, 0xe2, 0xdf, 0x47, 0x68, 0x27, 0x6a, 0x3a, 0x00, 0x47, 0x44, 0x56,
|
||||
0x41, 0x01, 0x58, 0x40, 0x3a, 0xda, 0xff, 0x7f, 0x11, 0xc4, 0xd8, 0x62,
|
||||
0x15, 0x06, 0x03, 0x1a, 0x9b, 0x4d, 0x23, 0xf1, 0x97, 0x33, 0x94, 0x67,
|
||||
0xfa, 0xef, 0x29, 0xe4, 0x18, 0x34, 0x38, 0xad, 0x1d, 0x0d, 0x91, 0x17,
|
||||
0x3a, 0xe3, 0x6b, 0xd0, 0x50, 0xc9, 0x86, 0x8c, 0x9b, 0x62, 0x6b, 0xac,
|
||||
0x8e, 0xa4, 0xa7, 0x4b, 0x94, 0x6b, 0xc7, 0xce, 0xf4, 0xe4, 0xe5, 0x12,
|
||||
0x1d, 0xf6, 0x19, 0xf9, 0x4d, 0x5b, 0x9a, 0x00};
|
||||
// Key bytes all zero
|
||||
const std::vector<uint8_t> kBccWrongEntryKey = {
|
||||
0x82, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1, 0x0b, 0x40, 0xff,
|
||||
0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97, 0xa6, 0x80, 0xee,
|
||||
0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb, 0x10, 0x84, 0x43,
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0x40, 0xa4, 0x01, 0x60, 0x02, 0x60, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x57, 0x58, 0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04,
|
||||
0x81, 0x02, 0x20, 0x06, 0x21, 0x58, 0x20, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0x3a, 0x00, 0x47, 0x44, 0x58, 0x41, 0x20, 0x58, 0x40,
|
||||
0x89, 0x1d, 0xff, 0xb3, 0x3b, 0xe2, 0xdc, 0xc6, 0xbc, 0xbd, 0xc7, 0xcd,
|
||||
0x3f, 0x9c, 0x43, 0xf6, 0xdd, 0xea, 0x58, 0x53, 0x45, 0x8f, 0x87, 0x17,
|
||||
0x0a, 0xe4, 0x06, 0xf2, 0xbe, 0x14, 0x69, 0x13, 0x3d, 0x1d, 0xd0, 0x52,
|
||||
0x8f, 0x56, 0x4b, 0x0f, 0xad, 0x2e, 0xf0, 0xbf, 0xbb, 0xd1, 0x35, 0x9c,
|
||||
0x5a, 0xe8, 0x67, 0xbe, 0xec, 0xff, 0x9d, 0xfe, 0xac, 0x8d, 0x47, 0x4e,
|
||||
0x6d, 0xd1, 0xd3, 0x02};
|
||||
0x83, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x84, 0x43,
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0xf8, 0xaa, 0x01, 0x68, 0x69, 0x73, 0x73,
|
||||
0x75, 0x65, 0x72, 0x20, 0x30, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x3a, 0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72,
|
||||
0x6f, 0x69, 0x64, 0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58,
|
||||
0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x3c, 0xfe, 0x6e, 0x28, 0x8b, 0x53, 0x31, 0x64, 0xb2, 0x16,
|
||||
0x26, 0x4c, 0x5f, 0x8e, 0x76, 0xfd, 0xb9, 0x25, 0x8e, 0x8c, 0xf5, 0x80,
|
||||
0xfe, 0xa5, 0x74, 0xbb, 0x0c, 0x5a, 0xef, 0xe3, 0x21, 0xce, 0x3a, 0x00,
|
||||
0x47, 0x44, 0x58, 0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20,
|
||||
0xb3, 0x16, 0x96, 0xda, 0x0e, 0x6c, 0x46, 0x26, 0x1e, 0x52, 0x9b, 0x43,
|
||||
0x9b, 0x68, 0xd0, 0x32, 0x5e, 0x31, 0x39, 0xf9, 0x69, 0x28, 0xec, 0x03,
|
||||
0xeb, 0x06, 0x4c, 0xf3, 0x60, 0xf1, 0xd3, 0x0e, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x52, 0x58, 0x20, 0x38, 0x0c, 0x43, 0xc2, 0xc5, 0x36, 0x5a, 0x91, 0xb4,
|
||||
0x2d, 0x85, 0x22, 0xb4, 0xb9, 0x6e, 0x43, 0xd2, 0xd0, 0x3e, 0x2f, 0xc4,
|
||||
0x1f, 0xb7, 0xb3, 0x4c, 0x6b, 0xfd, 0x90, 0xc7, 0x80, 0x42, 0x84, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68,
|
||||
0x57, 0x69, 0x64, 0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11,
|
||||
0x72, 0x62, 0x31, 0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x2d,
|
||||
0xd1, 0xac, 0x94, 0xbe, 0x4b, 0x89, 0x98, 0xba, 0xec, 0xb6, 0x01, 0xaf,
|
||||
0xaf, 0xda, 0x01, 0x8f, 0xeb, 0x03, 0xd2, 0x8f, 0x42, 0x12, 0x55, 0xe4,
|
||||
0x4b, 0xe2, 0xdf, 0x47, 0x68, 0x27, 0x6a, 0x3a, 0x00, 0x47, 0x44, 0x56,
|
||||
0x41, 0x01, 0x58, 0x40, 0xd7, 0xe8, 0x9b, 0x9b, 0x8f, 0x3f, 0xe7, 0x66,
|
||||
0x24, 0x87, 0x48, 0xf4, 0xbd, 0x47, 0x3b, 0x85, 0xfb, 0x2c, 0x0e, 0xed,
|
||||
0x7d, 0xf4, 0xa6, 0xb5, 0x30, 0x77, 0xea, 0x92, 0x63, 0xc0, 0x1e, 0x8b,
|
||||
0x40, 0xec, 0x71, 0x66, 0xf8, 0xe2, 0x92, 0x07, 0x67, 0x08, 0x25, 0x70,
|
||||
0x4a, 0x06, 0x41, 0x72, 0x21, 0xdf, 0xd4, 0xa7, 0x1a, 0xeb, 0xe9, 0x5f,
|
||||
0x11, 0x30, 0x5b, 0xaa, 0x09, 0xe3, 0x24, 0x00, 0x84, 0x43, 0xa1, 0x01,
|
||||
0x27, 0xa0, 0x58, 0xf7, 0xaa, 0x01, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79, 0x20, 0x32, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72, 0x6f, 0x69, 0x64,
|
||||
0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58, 0x2d, 0xa5, 0x01,
|
||||
0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21, 0x58, 0x20, 0xe6,
|
||||
0xc1, 0x67, 0xa8, 0x6d, 0x92, 0x16, 0xb8, 0x9c, 0xd1, 0xc4, 0xd4, 0xd3,
|
||||
0xf3, 0xc1, 0x22, 0x95, 0x80, 0x49, 0xd0, 0xb3, 0x50, 0x9f, 0x1d, 0xec,
|
||||
0x6f, 0xa8, 0x6c, 0xd2, 0xbd, 0x1a, 0x68, 0x3a, 0x00, 0x47, 0x44, 0x58,
|
||||
0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20, 0x8d, 0x76, 0x93,
|
||||
0x9d, 0x2f, 0x0e, 0x5f, 0xbd, 0x36, 0x58, 0x51, 0x53, 0xc4, 0xa0, 0xaf,
|
||||
0xdb, 0x91, 0x41, 0x6a, 0x62, 0xf0, 0x03, 0x6a, 0x77, 0x8b, 0x2e, 0x5f,
|
||||
0xa7, 0x29, 0x94, 0x69, 0x9d, 0x3a, 0x00, 0x47, 0x44, 0x52, 0x58, 0x20,
|
||||
0xc0, 0x0b, 0xa4, 0x78, 0xac, 0xa9, 0xb6, 0x96, 0x64, 0xaa, 0x55, 0xf6,
|
||||
0x52, 0xe2, 0xa6, 0x7b, 0xd7, 0x6f, 0xd5, 0xe5, 0xc1, 0xbd, 0xef, 0x97,
|
||||
0xf3, 0x0e, 0xea, 0xbc, 0x4b, 0x9e, 0xb7, 0xec, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68, 0x57, 0x69, 0x64,
|
||||
0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11, 0x72, 0x62, 0x31,
|
||||
0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x35, 0x65, 0xd2, 0xaf,
|
||||
0x10, 0xf0, 0x67, 0x3e, 0x58, 0xf9, 0xfc, 0xc0, 0x6d, 0x46, 0xd2, 0x61,
|
||||
0x34, 0xa6, 0xf1, 0xd5, 0x0d, 0x7b, 0x6e, 0x4f, 0xd7, 0x13, 0xcb, 0x1d,
|
||||
0xd6, 0xef, 0x2a, 0x23, 0x3a, 0x00, 0x47, 0x44, 0x56, 0x41, 0x01, 0x58,
|
||||
0x40, 0xa6, 0x67, 0x96, 0xf6, 0x31, 0x68, 0x45, 0x49, 0x7c, 0x38, 0x3f,
|
||||
0xde, 0x91, 0x02, 0xe3, 0x2a, 0x91, 0xc8, 0x0b, 0x3c, 0xdf, 0x2b, 0x18,
|
||||
0xcf, 0x9f, 0x06, 0xc0, 0xbe, 0x58, 0xbe, 0x12, 0x2c, 0xaa, 0x32, 0xa1,
|
||||
0x34, 0x0d, 0xf2, 0x8b, 0xa5, 0x87, 0x17, 0x66, 0x61, 0xd9, 0xdc, 0x08,
|
||||
0x52, 0x86, 0x51, 0x6f, 0x63, 0xfc, 0xaf, 0x7e, 0xc7, 0xeb, 0xa6, 0x73,
|
||||
0x19, 0xb1, 0x1a, 0xc9, 0x06};
|
||||
const std::vector<uint8_t> kBccMissingIssuer = {
|
||||
0x82, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x83, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1, 0x0b, 0x40, 0xff,
|
||||
0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97, 0xa6, 0x80, 0xee,
|
||||
0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb, 0x10, 0x84, 0x43,
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0x3e, 0xa3, 0x02, 0x60, 0x3a, 0x00, 0x47,
|
||||
0x44, 0x57, 0x58, 0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02,
|
||||
0x20, 0x06, 0x21, 0x58, 0x20, 0x02, 0xab, 0xbe, 0x80, 0x02, 0x41, 0xf1,
|
||||
0x0b, 0x40, 0xff, 0xd5, 0xf0, 0xd0, 0x26, 0x65, 0x70, 0xdc, 0x5a, 0x97,
|
||||
0xa6, 0x80, 0xee, 0x15, 0x95, 0xec, 0x26, 0x36, 0x70, 0x77, 0xe5, 0xfb,
|
||||
0x10, 0x3a, 0x00, 0x47, 0x44, 0x58, 0x41, 0x20, 0x58, 0x40, 0xf9, 0x46,
|
||||
0x36, 0xbd, 0x95, 0x75, 0xc2, 0x3d, 0xf9, 0xa2, 0xbe, 0x60, 0x8e, 0xbf,
|
||||
0x64, 0x89, 0xdf, 0xb9, 0x9c, 0x3c, 0x17, 0x36, 0x23, 0x9a, 0x68, 0x1a,
|
||||
0x34, 0x36, 0x51, 0x89, 0x59, 0xf2, 0x54, 0x62, 0xd3, 0x8f, 0xeb, 0x9b,
|
||||
0x75, 0x3e, 0xe9, 0xfc, 0xe3, 0xc2, 0x8f, 0x84, 0xb1, 0x71, 0xcd, 0x29,
|
||||
0x12, 0x65, 0xeb, 0xab, 0x28, 0x4b, 0xe2, 0x3e, 0x1b, 0xd8, 0x17, 0xdb,
|
||||
0x97, 0x0f};
|
||||
0xa1, 0x01, 0x27, 0xa0, 0x58, 0xf8, 0xaa, 0x01, 0x68, 0x69, 0x73, 0x73,
|
||||
0x75, 0x65, 0x72, 0x20, 0x30, 0x02, 0x67, 0x65, 0x6e, 0x74, 0x72, 0x79,
|
||||
0x20, 0x31, 0x3a, 0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e, 0x64, 0x72,
|
||||
0x6f, 0x69, 0x64, 0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44, 0x57, 0x58,
|
||||
0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20, 0x06, 0x21,
|
||||
0x58, 0x20, 0x3c, 0xfe, 0x6e, 0x28, 0x8b, 0x53, 0x31, 0x64, 0xb2, 0x16,
|
||||
0x26, 0x4c, 0x5f, 0x8e, 0x76, 0xfd, 0xb9, 0x25, 0x8e, 0x8c, 0xf5, 0x80,
|
||||
0xfe, 0xa5, 0x74, 0xbb, 0x0c, 0x5a, 0xef, 0xe3, 0x21, 0xce, 0x3a, 0x00,
|
||||
0x47, 0x44, 0x58, 0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50, 0x58, 0x20,
|
||||
0xb3, 0x16, 0x96, 0xda, 0x0e, 0x6c, 0x46, 0x26, 0x1e, 0x52, 0x9b, 0x43,
|
||||
0x9b, 0x68, 0xd0, 0x32, 0x5e, 0x31, 0x39, 0xf9, 0x69, 0x28, 0xec, 0x03,
|
||||
0xeb, 0x06, 0x4c, 0xf3, 0x60, 0xf1, 0xd3, 0x0e, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x52, 0x58, 0x20, 0x38, 0x0c, 0x43, 0xc2, 0xc5, 0x36, 0x5a, 0x91, 0xb4,
|
||||
0x2d, 0x85, 0x22, 0xb4, 0xb9, 0x6e, 0x43, 0xd2, 0xd0, 0x3e, 0x2f, 0xc4,
|
||||
0x1f, 0xb7, 0xb3, 0x4c, 0x6b, 0xfd, 0x90, 0xc7, 0x80, 0x42, 0x84, 0x3a,
|
||||
0x00, 0x47, 0x44, 0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11, 0x71, 0x68,
|
||||
0x57, 0x69, 0x64, 0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00, 0x01, 0x11,
|
||||
0x72, 0x62, 0x31, 0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58, 0x20, 0x2d,
|
||||
0xd1, 0xac, 0x94, 0xbe, 0x4b, 0x89, 0x98, 0xba, 0xec, 0xb6, 0x01, 0xaf,
|
||||
0xaf, 0xda, 0x01, 0x8f, 0xeb, 0x03, 0xd2, 0x8f, 0x42, 0x12, 0x55, 0xe4,
|
||||
0x4b, 0xe2, 0xdf, 0x47, 0x68, 0x27, 0x6a, 0x3a, 0x00, 0x47, 0x44, 0x56,
|
||||
0x41, 0x01, 0x58, 0x40, 0xd7, 0xe8, 0x9b, 0x9b, 0x8f, 0x3f, 0xe7, 0x66,
|
||||
0x24, 0x87, 0x48, 0xf4, 0xbd, 0x47, 0x3b, 0x85, 0xfb, 0x2c, 0x0e, 0xed,
|
||||
0x7d, 0xf4, 0xa6, 0xb5, 0x30, 0x77, 0xea, 0x92, 0x63, 0xc0, 0x1e, 0x8b,
|
||||
0x40, 0xec, 0x71, 0x66, 0xf8, 0xe2, 0x92, 0x07, 0x67, 0x08, 0x25, 0x70,
|
||||
0x4a, 0x06, 0x41, 0x72, 0x21, 0xdf, 0xd4, 0xa7, 0x1a, 0xeb, 0xe9, 0x5f,
|
||||
0x11, 0x30, 0x5b, 0xaa, 0x09, 0xe3, 0x24, 0x00, 0x84, 0x43, 0xa1, 0x01,
|
||||
0x27, 0xa0, 0x58, 0xf0, 0xaa, 0x01, 0x60, 0x02, 0x67, 0x65, 0x6e, 0x74,
|
||||
0x72, 0x79, 0x20, 0x32, 0x3a, 0x00, 0x47, 0x44, 0x59, 0x6a, 0x61, 0x6e,
|
||||
0x64, 0x72, 0x6f, 0x69, 0x64, 0x2e, 0x31, 0x35, 0x3a, 0x00, 0x47, 0x44,
|
||||
0x57, 0x58, 0x2d, 0xa5, 0x01, 0x01, 0x03, 0x27, 0x04, 0x81, 0x02, 0x20,
|
||||
0x06, 0x21, 0x58, 0x20, 0xe6, 0xc1, 0x67, 0xa8, 0x6d, 0x92, 0x16, 0xb8,
|
||||
0x9c, 0xd1, 0xc4, 0xd4, 0xd3, 0xf3, 0xc1, 0x22, 0x95, 0x80, 0x49, 0xd0,
|
||||
0xb3, 0x50, 0x9f, 0x1d, 0xec, 0x6f, 0xa8, 0x6c, 0xd2, 0xbd, 0x1a, 0x68,
|
||||
0x3a, 0x00, 0x47, 0x44, 0x58, 0x41, 0x20, 0x3a, 0x00, 0x47, 0x44, 0x50,
|
||||
0x58, 0x20, 0x8d, 0x76, 0x93, 0x9d, 0x2f, 0x0e, 0x5f, 0xbd, 0x36, 0x58,
|
||||
0x51, 0x53, 0xc4, 0xa0, 0xaf, 0xdb, 0x91, 0x41, 0x6a, 0x62, 0xf0, 0x03,
|
||||
0x6a, 0x77, 0x8b, 0x2e, 0x5f, 0xa7, 0x29, 0x94, 0x69, 0x9d, 0x3a, 0x00,
|
||||
0x47, 0x44, 0x52, 0x58, 0x20, 0xc0, 0x0b, 0xa4, 0x78, 0xac, 0xa9, 0xb6,
|
||||
0x96, 0x64, 0xaa, 0x55, 0xf6, 0x52, 0xe2, 0xa6, 0x7b, 0xd7, 0x6f, 0xd5,
|
||||
0xe5, 0xc1, 0xbd, 0xef, 0x97, 0xf3, 0x0e, 0xea, 0xbc, 0x4b, 0x9e, 0xb7,
|
||||
0xec, 0x3a, 0x00, 0x47, 0x44, 0x53, 0x57, 0xa2, 0x3a, 0x00, 0x01, 0x11,
|
||||
0x71, 0x68, 0x57, 0x69, 0x64, 0x65, 0x76, 0x69, 0x6e, 0x65, 0x3a, 0x00,
|
||||
0x01, 0x11, 0x72, 0x62, 0x31, 0x39, 0x3a, 0x00, 0x47, 0x44, 0x54, 0x58,
|
||||
0x20, 0x35, 0x65, 0xd2, 0xaf, 0x10, 0xf0, 0x67, 0x3e, 0x58, 0xf9, 0xfc,
|
||||
0xc0, 0x6d, 0x46, 0xd2, 0x61, 0x34, 0xa6, 0xf1, 0xd5, 0x0d, 0x7b, 0x6e,
|
||||
0x4f, 0xd7, 0x13, 0xcb, 0x1d, 0xd6, 0xef, 0x2a, 0x23, 0x3a, 0x00, 0x47,
|
||||
0x44, 0x56, 0x41, 0x01, 0x58, 0x40, 0x5a, 0x77, 0x3b, 0x51, 0x81, 0xad,
|
||||
0x48, 0x54, 0x39, 0x86, 0x89, 0xd9, 0x0c, 0x87, 0x0a, 0x1b, 0x8c, 0x17,
|
||||
0xd8, 0x14, 0xad, 0xfd, 0x64, 0x46, 0x71, 0x97, 0xa2, 0xd5, 0x15, 0x52,
|
||||
0x1f, 0x87, 0xee, 0x48, 0x55, 0x4c, 0xba, 0x01, 0xcb, 0x18, 0xa4, 0x26,
|
||||
0x89, 0xb7, 0x6e, 0x91, 0xc8, 0x21, 0x68, 0x1e, 0xad, 0x4a, 0x95, 0x33,
|
||||
0xe7, 0xaa, 0x68, 0xe5, 0x06, 0x4d, 0xfa, 0xcf, 0x73, 0x03};
|
||||
} // namespace
|
||||
|
||||
static void DumpValidatorOutput(const BccValidator& validator) {
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
LOGI("%s", out.c_str());
|
||||
for (auto& msg : validator.GetValidateMessages()) {
|
||||
LOGE("Error code %d: %s", msg.first, msg.second.c_str());
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoBccValidatorTest, BccParseError) {
|
||||
const std::vector<uint8_t> bcc_bad(kBcc.begin(), kBcc.end() - 1);
|
||||
BccValidator validator;
|
||||
@@ -89,8 +257,25 @@ TEST(OEMCryptoBccValidatorTest, Bcc) {
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("key encoding format: DEVICE_KEY_BYTE_STRING"));
|
||||
EXPECT_THAT(out, HasSubstr("key algorithm type: EDDSA"));
|
||||
EXPECT_THAT(out, HasSubstr("key_type:byte_string"));
|
||||
EXPECT_THAT(out, HasSubstr("signature_algorithm:EdDSA"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoBccValidatorTest, DegeneratedBcc) {
|
||||
BccValidator validator;
|
||||
CborMessageStatus result = validator.Parse(kDegeneratedBcc);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("key_type:byte_string"));
|
||||
EXPECT_THAT(out, HasSubstr("signature_algorithm:EdDSA"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoBccValidatorTest, BccWrongEntryKey) {
|
||||
@@ -101,12 +286,17 @@ TEST(OEMCryptoBccValidatorTest, BccWrongEntryKey) {
|
||||
EXPECT_EQ(result, kCborValidateError);
|
||||
// Non-fatal validation error should be able to return formatted output.
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("key encoding format: DEVICE_KEY_BYTE_STRING"));
|
||||
EXPECT_THAT(out, HasSubstr("key algorithm type: EDDSA"));
|
||||
EXPECT_THAT(out, HasSubstr("key_type:byte_string"));
|
||||
EXPECT_THAT(out, HasSubstr("key_bytes:000000"));
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
// Expect more than 1 validation errors caused by wrong entry key including
|
||||
// invalid key, signature error, etc
|
||||
EXPECT_GE(msgs.size(), 1u);
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoBccValidatorTest, BccParseThreeTimes) {
|
||||
@@ -135,13 +325,16 @@ TEST(OEMCryptoBccValidatorTest, BccMissingIssuer) {
|
||||
result = validator.Validate();
|
||||
EXPECT_EQ(result, kCborValidateError);
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("key encoding format: DEVICE_KEY_BYTE_STRING"));
|
||||
EXPECT_THAT(out, HasSubstr("key algorithm type: EDDSA"));
|
||||
EXPECT_THAT(out, HasSubstr("key_type:byte_string"));
|
||||
EXPECT_THAT(out, HasSubstr("signature_algorithm:EdDSA"));
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("Missing Issuer"));
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("missing required field issuer"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
} // namespace util
|
||||
} // namespace wvoec
|
||||
|
||||
@@ -8,6 +8,7 @@
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "device_info_validator.h"
|
||||
#include "log.h"
|
||||
|
||||
using ::testing::AllOf;
|
||||
using ::testing::Ge;
|
||||
@@ -30,7 +31,7 @@ cppbor::Map BuildDeviceInfoMap(int version) {
|
||||
.add("model", "model")
|
||||
.add("vb_state", "green")
|
||||
.add("bootloader_state", "unlocked")
|
||||
.add("vbmeta_digest", cppbor::Bstr(std::vector<uint8_t>()))
|
||||
.add("vbmeta_digest", cppbor::Bstr(std::vector<uint8_t>(32, 0xCC)))
|
||||
.add("os_version", "os_version")
|
||||
.add("system_patch_level", 202312)
|
||||
.add("boot_patch_level", 20231201)
|
||||
@@ -61,6 +62,14 @@ std::vector<uint8_t> BuildDeviceInfo(int version) {
|
||||
}
|
||||
} // namespace
|
||||
|
||||
static void DumpValidatorOutput(const DeviceInfoValidator& validator) {
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
LOGI("%s", out.c_str());
|
||||
for (auto& msg : validator.GetValidateMessages()) {
|
||||
LOGE("Error code %d: %s", msg.first, msg.second.c_str());
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoParseError) {
|
||||
const std::vector<uint8_t> device_info = BuildDeviceInfo(kDeviceVersion3);
|
||||
const std::vector<uint8_t> device_info_bad(device_info.begin(),
|
||||
@@ -87,6 +96,9 @@ TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoNotMap) {
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateFatal, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("Device info is not a CBOR map"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest,
|
||||
@@ -95,8 +107,7 @@ TEST(OEMCryptoDeviceInfoValidatorTest,
|
||||
cppbor::Map()
|
||||
.add("brand", "brand")
|
||||
.add("manufacturer", "manufacturer")
|
||||
.add(123, 456) // Non-Tstr key type
|
||||
.add("system_patch_level", "not a uint") // Non-uint value type
|
||||
.add(123, 456) // Non-Tstr key type
|
||||
.canonicalize()
|
||||
.encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion3);
|
||||
@@ -112,25 +123,22 @@ TEST(OEMCryptoDeviceInfoValidatorTest,
|
||||
return p.second.find("Unexpected entry key type") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, unexpected_key_type_found);
|
||||
const bool unexpected_value_type_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("system_patch_level has the wrong type") !=
|
||||
std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, unexpected_value_type_found);
|
||||
const bool missing_model_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("model is missing") != std::string::npos;
|
||||
});
|
||||
const bool missing_model_found =
|
||||
std::any_of(msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("missing important field model") !=
|
||||
std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, missing_model_found);
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV3NonCanonical) {
|
||||
const cppbor::Map map = BuildDeviceInfoMap(kDeviceVersion3);
|
||||
const std::vector<uint8_t> device_info = map.encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion3);
|
||||
DeviceInfoValidator validator(kDeviceVersion3, true /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
@@ -141,43 +149,97 @@ TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV3NonCanonical) {
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second,
|
||||
HasSubstr("Device info ordering is non-canonical"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV3) {
|
||||
const std::vector<uint8_t> device_info = BuildDeviceInfo(kDeviceVersion3);
|
||||
DeviceInfoValidator validator(kDeviceVersion3);
|
||||
DeviceInfoValidator validator(kDeviceVersion3, true /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("manufacturer: manufacturer"));
|
||||
EXPECT_THAT(out, HasSubstr("model: model"));
|
||||
EXPECT_THAT(out, HasSubstr("fused: 0"));
|
||||
EXPECT_THAT(out, HasSubstr("manufacturer:manufacturer"));
|
||||
EXPECT_THAT(out, HasSubstr("model:model"));
|
||||
EXPECT_THAT(out, HasSubstr("fused:0"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV3InvalidFields) {
|
||||
cppbor::Map device_info_map =
|
||||
cppbor::Map()
|
||||
.add("brand", "brand")
|
||||
.add("manufacturer", "manufacturer")
|
||||
.add("product", "product")
|
||||
.add("model", "model")
|
||||
.add("vb_state", "invalid_green") // invalid value
|
||||
.add("bootloader_state", "invalid_unlocked") // invalid value
|
||||
.add("vbmeta_digest", cppbor::Bstr(std::vector<uint8_t>(32, 0xCC)))
|
||||
.add("os_version", "os_version")
|
||||
.add("system_patch_level", 100) // invalid value, expects "YYYYMM"
|
||||
.add("boot_patch_level",
|
||||
12345678) // invalid value, expectes "YYYYMMDD"
|
||||
.add("vendor_patch_level",
|
||||
"20231201") // invalid value, expects YYYYMMDD in int
|
||||
.add("security_level", "tee")
|
||||
.add("device", "device")
|
||||
.add("fused", 9); // invalid value, expects 0 or 1
|
||||
auto device_info = device_info_map.canonicalize().encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion3, true /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, Ge(kCborValidateError));
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
std::string out = "";
|
||||
for (auto& msg : msgs) {
|
||||
out += (msg.second + "\n");
|
||||
}
|
||||
EXPECT_THAT(out, HasSubstr("invalid value for system_patch_level"));
|
||||
EXPECT_THAT(out, HasSubstr("invalid value for boot_patch_level"));
|
||||
EXPECT_THAT(out, HasSubstr("missing required field vendor_patch_level"));
|
||||
EXPECT_THAT(out, HasSubstr("unexpected value for vb_state"));
|
||||
EXPECT_THAT(out, HasSubstr("unexpected value for bootloader_state"));
|
||||
EXPECT_THAT(out, HasSubstr("unexpected value for fused"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV2) {
|
||||
const std::vector<uint8_t> device_info = BuildDeviceInfo(kDeviceVersion2);
|
||||
DeviceInfoValidator validator(kDeviceVersion2);
|
||||
DeviceInfoValidator validator(kDeviceVersion2, true /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("manufacturer: manufacturer"));
|
||||
EXPECT_THAT(out, HasSubstr("model: model"));
|
||||
EXPECT_THAT(out, HasSubstr("fused: 0"));
|
||||
EXPECT_THAT(out, HasSubstr("version: 2"));
|
||||
EXPECT_THAT(out, HasSubstr("manufacturer:manufacturer"));
|
||||
EXPECT_THAT(out, HasSubstr("model:model"));
|
||||
EXPECT_THAT(out, HasSubstr("fused:0"));
|
||||
EXPECT_THAT(out, HasSubstr("version:2"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV1MissingField) {
|
||||
const std::vector<uint8_t> device_info = cppbor::Map()
|
||||
.add("brand", "brand")
|
||||
.add("security_level", "tee")
|
||||
.add("version", 1)
|
||||
.canonicalize()
|
||||
.encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion1);
|
||||
const std::vector<uint8_t> device_info =
|
||||
cppbor::Map()
|
||||
.add("manufacturer", "manufacturer")
|
||||
.add("model", "model")
|
||||
.add("brand", "brand")
|
||||
.add("security_level", "tee")
|
||||
.add("version", 1)
|
||||
.canonicalize()
|
||||
.encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion1, true /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
@@ -186,19 +248,50 @@ TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV1MissingField) {
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("att_id_state is missing"));
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("missing required field att_id_state"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoV1) {
|
||||
DeviceInfoValidator validator(kDeviceVersion1);
|
||||
DeviceInfoValidator validator(kDeviceVersion1, true /* is_gms */);
|
||||
const std::vector<uint8_t> device_info = BuildDeviceInfo(kDeviceVersion1);
|
||||
CborMessageStatus result = validator.Parse(device_info);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("board: board"));
|
||||
EXPECT_THAT(out, HasSubstr("version: 1"));
|
||||
EXPECT_THAT(out, HasSubstr("board:board"));
|
||||
EXPECT_THAT(out, HasSubstr("version:1"));
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
|
||||
TEST(OEMCryptoDeviceInfoValidatorTest, DeviceInfoMissingFused) {
|
||||
const std::vector<uint8_t> device_info_bad =
|
||||
cppbor::Map()
|
||||
.add("model", "model")
|
||||
.add("manufacturer", "manufacturer")
|
||||
.canonicalize()
|
||||
.encode();
|
||||
DeviceInfoValidator validator(kDeviceVersion1, false /* is_gms */);
|
||||
CborMessageStatus result = validator.Parse(device_info_bad);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_EQ(kCborValidateWarning, result);
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
const bool missing_fused_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("missing field fused") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, missing_fused_found);
|
||||
if (result >= kCborValidateWarning) {
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
}
|
||||
} // namespace util
|
||||
} // namespace wvoec
|
||||
|
||||
@@ -7,6 +7,7 @@
|
||||
#include <gmock/gmock.h>
|
||||
#include <gtest/gtest.h>
|
||||
|
||||
#include "log.h"
|
||||
#include "signed_csr_payload_validator.h"
|
||||
|
||||
using ::testing::AllOf;
|
||||
@@ -86,6 +87,14 @@ std::vector<uint8_t> GetDefaultSignedCsrPayload() {
|
||||
.add(cppbor::Bstr(GetDefaultSignature()))
|
||||
.encode();
|
||||
}
|
||||
|
||||
static void DumpValidatorOutput(const SignedCsrPayloadValidator& validator) {
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
LOGI("%s", out.c_str());
|
||||
for (auto& msg : validator.GetValidateMessages()) {
|
||||
LOGE("Error code %d: %s", msg.first, msg.second.c_str());
|
||||
}
|
||||
}
|
||||
} // namespace
|
||||
|
||||
TEST(OEMCryptoSignedCsrPayloadValidatorTest, SignedCsrPayloadParseError) {
|
||||
@@ -119,7 +128,8 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataNotMap) {
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateFatal, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("ProtectedParams must be a CBOR map"));
|
||||
EXPECT_THAT(msgs[0].second,
|
||||
HasSubstr("Unexpected signed csr payload protected type: ARRAY"));
|
||||
}
|
||||
|
||||
TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataMapMissingKey) {
|
||||
@@ -135,12 +145,13 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataMapMissingKey) {
|
||||
CborMessageStatus result = validator.Parse(signed_csr_payload);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, kCborValidateFatal);
|
||||
EXPECT_THAT(result, kCborValidateError);
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateFatal, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("ProtectedParams is empty"));
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("missing required field protected"));
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
|
||||
TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataMapKeyWarnings) {
|
||||
@@ -163,7 +174,7 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataMapKeyWarnings) {
|
||||
const bool unexpected_key_type_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("Unsupported key type") != std::string::npos;
|
||||
return p.second.find("Invalid key type") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, unexpected_key_type_found);
|
||||
const bool unexpected_key_value_found = std::any_of(
|
||||
@@ -172,13 +183,14 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, ProtectedDataMapKeyWarnings) {
|
||||
return p.second.find("Unsupported key value") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, unexpected_key_value_found);
|
||||
const bool unexpected_entry_found =
|
||||
std::any_of(msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("ProtectedParams expects 1 entry") !=
|
||||
std::string::npos;
|
||||
});
|
||||
const bool unexpected_entry_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("Protected data map expects 1 entry") !=
|
||||
std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, unexpected_entry_found);
|
||||
DumpValidatorOutput(validator);
|
||||
}
|
||||
|
||||
TEST(OEMCryptoSignedCsrPayloadValidatorTest, InvalidChallengeAndPayload) {
|
||||
@@ -212,16 +224,13 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, InvalidChallengeAndPayload) {
|
||||
const bool challenge_error_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find("Challenge size must be between 0 and 64 bytes") !=
|
||||
std::string::npos;
|
||||
return p.second.find("Unexpected challenge size") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, challenge_error_found);
|
||||
const bool csr_payload_error_found = std::any_of(
|
||||
msgs.begin(), msgs.end(),
|
||||
[](const std::pair<CborMessageStatus, std::string>& p) {
|
||||
return p.second.find(
|
||||
"CSR payload version must be must be equal to 3") !=
|
||||
std::string::npos;
|
||||
return p.second.find("Invalid version") != std::string::npos;
|
||||
});
|
||||
EXPECT_EQ(true, csr_payload_error_found);
|
||||
}
|
||||
@@ -250,11 +259,11 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, KeysToSignEmptyList) {
|
||||
CborMessageStatus result = validator.Parse(signed_csr_payload);
|
||||
EXPECT_EQ(kCborParseOk, result);
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, kCborValidateFatal);
|
||||
EXPECT_THAT(result, kCborValidateError);
|
||||
const std::vector<std::pair<CborMessageStatus, std::string>> msgs =
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateFatal, msgs[0].first);
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("Keys must be a CBOR array"));
|
||||
}
|
||||
|
||||
@@ -275,7 +284,7 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, SignatureMissing) {
|
||||
validator.GetValidateMessages();
|
||||
EXPECT_EQ(1u, msgs.size());
|
||||
EXPECT_EQ(kCborValidateError, msgs[0].first);
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("CoseSign1 signature is missing"));
|
||||
EXPECT_THAT(msgs[0].second, HasSubstr("missing required field signature"));
|
||||
}
|
||||
|
||||
TEST(OEMCryptoSignedCsrPayloadValidatorTest, ValidateOk) {
|
||||
@@ -285,10 +294,9 @@ TEST(OEMCryptoSignedCsrPayloadValidatorTest, ValidateOk) {
|
||||
result = validator.Validate();
|
||||
EXPECT_THAT(result, AllOf(Ge(kCborValidateOk), Le(kCborValidateWarning)));
|
||||
const std::string out = validator.GetFormattedMessage();
|
||||
EXPECT_THAT(out, HasSubstr("1: ES256"));
|
||||
EXPECT_THAT(out, HasSubstr("version: 3"));
|
||||
EXPECT_THAT(out, HasSubstr("certificate_type: widevine"));
|
||||
EXPECT_THAT(out, HasSubstr("keys_to_sign: []"));
|
||||
EXPECT_THAT(out, HasSubstr("algorithm:ECDSA_SHA256"));
|
||||
EXPECT_THAT(out, HasSubstr("version:3"));
|
||||
EXPECT_THAT(out, HasSubstr("type:widevine"));
|
||||
}
|
||||
} // namespace util
|
||||
} // namespace wvoec
|
||||
|
||||
Reference in New Issue
Block a user