blob: cd0d0f0225ee5d6c673f061a377b4435c90391a3 [file] [log] [blame]
//
// Copyright (C) 2015 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include <base/at_exit.h>
#include <base/run_loop.h>
#include <gmock/gmock.h>
#include <gtest/gtest.h>
#include "tpm_manager/server/mock_local_data_store.h"
#include "tpm_manager/server/mock_tpm_initializer.h"
#include "tpm_manager/server/mock_tpm_nvram.h"
#include "tpm_manager/server/mock_tpm_status.h"
#include "tpm_manager/server/tpm_manager_service.h"
using testing::_;
using testing::AtLeast;
using testing::Invoke;
using testing::NiceMock;
using testing::Return;
using testing::SaveArg;
using testing::SetArgPointee;
namespace {
const char kOwnerPassword[] = "owner";
const char kOwnerDependency[] = "owner_dependency";
const char kOtherDependency[] = "other_dependency";
base::AtExitManager dummy;
} // namespace
namespace tpm_manager {
// A test fixture that takes care of message loop management and configuring a
// TpmManagerService instance with mock dependencies.
class TpmManagerServiceTest : public testing::Test {
public:
~TpmManagerServiceTest() override = default;
void SetUp() override {
service_.reset(new TpmManagerService(
true /*wait_for_ownership*/, &mock_local_data_store_, &mock_tpm_status_,
&mock_tpm_initializer_, &mock_tpm_nvram_));
SetupService();
}
protected:
void Run() { run_loop_.Run(); }
void RunServiceWorkerAndQuit() {
// Run out the service worker loop by posting a new command and waiting for
// the response.
auto callback = [this](const GetTpmStatusReply& reply) { Quit(); };
GetTpmStatusRequest request;
service_->GetTpmStatus(request, base::Bind(callback));
Run();
}
void Quit() { run_loop_.Quit(); }
void SetupService() { CHECK(service_->Initialize()); }
NiceMock<MockLocalDataStore> mock_local_data_store_;
NiceMock<MockTpmInitializer> mock_tpm_initializer_;
NiceMock<MockTpmNvram> mock_tpm_nvram_;
NiceMock<MockTpmStatus> mock_tpm_status_;
std::unique_ptr<TpmManagerService> service_;
private:
base::MessageLoop message_loop_;
base::RunLoop run_loop_;
};
// Tests must call SetupService().
class TpmManagerServiceTest_NoWaitForOwnership : public TpmManagerServiceTest {
public:
~TpmManagerServiceTest_NoWaitForOwnership() override = default;
void SetUp() override {
service_.reset(new TpmManagerService(
false /*wait_for_ownership*/, &mock_local_data_store_,
&mock_tpm_status_, &mock_tpm_initializer_, &mock_tpm_nvram_));
}
};
TEST_F(TpmManagerServiceTest_NoWaitForOwnership, AutoInitialize) {
// Make sure InitializeTpm doesn't get multiple calls.
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm()).Times(1);
SetupService();
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest_NoWaitForOwnership, AutoInitializeNoTpm) {
EXPECT_CALL(mock_tpm_status_, IsTpmEnabled()).WillRepeatedly(Return(false));
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm()).Times(0);
SetupService();
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest_NoWaitForOwnership, AutoInitializeFailure) {
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm())
.WillRepeatedly(Return(false));
SetupService();
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest_NoWaitForOwnership,
TakeOwnershipAfterAutoInitialize) {
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm()).Times(AtLeast(2));
SetupService();
auto callback = [this](const TakeOwnershipReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
Quit();
};
TakeOwnershipRequest request;
service_->TakeOwnership(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, NoAutoInitialize) {
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm()).Times(0);
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, GetTpmStatusSuccess) {
EXPECT_CALL(mock_tpm_status_, GetDictionaryAttackInfo(_, _, _, _))
.WillRepeatedly(Invoke([](int* counter, int* threshold, bool* lockout,
int* seconds_remaining) {
*counter = 5;
*threshold = 6;
*lockout = true;
*seconds_remaining = 7;
return true;
}));
LocalData local_data;
local_data.set_owner_password(kOwnerPassword);
EXPECT_CALL(mock_local_data_store_, Read(_))
.WillRepeatedly(DoAll(SetArgPointee<0>(local_data), Return(true)));
auto callback = [this](const GetTpmStatusReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_TRUE(reply.enabled());
EXPECT_TRUE(reply.owned());
EXPECT_EQ(kOwnerPassword, reply.local_data().owner_password());
EXPECT_EQ(5, reply.dictionary_attack_counter());
EXPECT_EQ(6, reply.dictionary_attack_threshold());
EXPECT_TRUE(reply.dictionary_attack_lockout_in_effect());
EXPECT_EQ(7, reply.dictionary_attack_lockout_seconds_remaining());
Quit();
};
GetTpmStatusRequest request;
service_->GetTpmStatus(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, GetTpmStatusLocalDataFailure) {
EXPECT_CALL(mock_local_data_store_, Read(_)).WillRepeatedly(Return(false));
auto callback = [this](const GetTpmStatusReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_TRUE(reply.enabled());
EXPECT_TRUE(reply.owned());
EXPECT_FALSE(reply.has_local_data());
EXPECT_TRUE(reply.has_dictionary_attack_counter());
EXPECT_TRUE(reply.has_dictionary_attack_threshold());
EXPECT_TRUE(reply.has_dictionary_attack_lockout_in_effect());
EXPECT_TRUE(reply.has_dictionary_attack_lockout_seconds_remaining());
Quit();
};
GetTpmStatusRequest request;
service_->GetTpmStatus(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, GetTpmStatusNoTpm) {
EXPECT_CALL(mock_tpm_status_, IsTpmEnabled()).WillRepeatedly(Return(false));
EXPECT_CALL(mock_tpm_status_, GetDictionaryAttackInfo(_, _, _, _))
.WillRepeatedly(Return(false));
auto callback = [this](const GetTpmStatusReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_FALSE(reply.enabled());
EXPECT_TRUE(reply.owned());
EXPECT_TRUE(reply.has_local_data());
EXPECT_FALSE(reply.has_dictionary_attack_counter());
EXPECT_FALSE(reply.has_dictionary_attack_threshold());
EXPECT_FALSE(reply.has_dictionary_attack_lockout_in_effect());
EXPECT_FALSE(reply.has_dictionary_attack_lockout_seconds_remaining());
Quit();
};
GetTpmStatusRequest request;
service_->GetTpmStatus(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, TakeOwnershipSuccess) {
// Make sure InitializeTpm doesn't get multiple calls.
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm()).Times(1);
auto callback = [this](const TakeOwnershipReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
Quit();
};
TakeOwnershipRequest request;
service_->TakeOwnership(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, TakeOwnershipFailure) {
EXPECT_CALL(mock_tpm_initializer_, InitializeTpm())
.WillRepeatedly(Return(false));
auto callback = [this](const TakeOwnershipReply& reply) {
EXPECT_EQ(STATUS_DEVICE_ERROR, reply.status());
Quit();
};
TakeOwnershipRequest request;
service_->TakeOwnership(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, TakeOwnershipNoTpm) {
EXPECT_CALL(mock_tpm_status_, IsTpmEnabled()).WillRepeatedly(Return(false));
auto callback = [this](const TakeOwnershipReply& reply) {
EXPECT_EQ(STATUS_NOT_AVAILABLE, reply.status());
Quit();
};
TakeOwnershipRequest request;
service_->TakeOwnership(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, RemoveOwnerDependencyReadFailure) {
EXPECT_CALL(mock_local_data_store_, Read(_)).WillRepeatedly(Return(false));
auto callback = [this](const RemoveOwnerDependencyReply& reply) {
EXPECT_EQ(STATUS_DEVICE_ERROR, reply.status());
Quit();
};
RemoveOwnerDependencyRequest request;
request.set_owner_dependency(kOwnerDependency);
service_->RemoveOwnerDependency(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, RemoveOwnerDependencyWriteFailure) {
EXPECT_CALL(mock_local_data_store_, Write(_)).WillRepeatedly(Return(false));
auto callback = [this](const RemoveOwnerDependencyReply& reply) {
EXPECT_EQ(STATUS_DEVICE_ERROR, reply.status());
Quit();
};
RemoveOwnerDependencyRequest request;
request.set_owner_dependency(kOwnerDependency);
service_->RemoveOwnerDependency(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, RemoveOwnerDependencyNotCleared) {
LocalData local_data;
local_data.set_owner_password(kOwnerPassword);
local_data.add_owner_dependency(kOwnerDependency);
local_data.add_owner_dependency(kOtherDependency);
EXPECT_CALL(mock_local_data_store_, Read(_))
.WillOnce(DoAll(SetArgPointee<0>(local_data), Return(true)));
EXPECT_CALL(mock_local_data_store_, Write(_))
.WillOnce(DoAll(SaveArg<0>(&local_data), Return(true)));
auto callback = [this, &local_data](const RemoveOwnerDependencyReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_EQ(1, local_data.owner_dependency_size());
EXPECT_EQ(kOtherDependency, local_data.owner_dependency(0));
EXPECT_TRUE(local_data.has_owner_password());
EXPECT_EQ(kOwnerPassword, local_data.owner_password());
Quit();
};
RemoveOwnerDependencyRequest request;
request.set_owner_dependency(kOwnerDependency);
service_->RemoveOwnerDependency(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, RemoveOwnerDependencyCleared) {
LocalData local_data;
local_data.set_owner_password(kOwnerPassword);
local_data.add_owner_dependency(kOwnerDependency);
EXPECT_CALL(mock_local_data_store_, Read(_))
.WillOnce(DoAll(SetArgPointee<0>(local_data), Return(true)));
EXPECT_CALL(mock_local_data_store_, Write(_))
.WillOnce(DoAll(SaveArg<0>(&local_data), Return(true)));
auto callback = [this, &local_data](const RemoveOwnerDependencyReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_EQ(0, local_data.owner_dependency_size());
EXPECT_FALSE(local_data.has_owner_password());
Quit();
};
RemoveOwnerDependencyRequest request;
request.set_owner_dependency(kOwnerDependency);
service_->RemoveOwnerDependency(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, RemoveOwnerDependencyNotPresent) {
LocalData local_data;
local_data.set_owner_password(kOwnerPassword);
local_data.add_owner_dependency(kOwnerDependency);
EXPECT_CALL(mock_local_data_store_, Read(_))
.WillOnce(DoAll(SetArgPointee<0>(local_data), Return(true)));
EXPECT_CALL(mock_local_data_store_, Write(_))
.WillOnce(DoAll(SaveArg<0>(&local_data), Return(true)));
auto callback = [this, &local_data](const RemoveOwnerDependencyReply& reply) {
EXPECT_EQ(STATUS_SUCCESS, reply.status());
EXPECT_EQ(1, local_data.owner_dependency_size());
EXPECT_EQ(kOwnerDependency, local_data.owner_dependency(0));
EXPECT_TRUE(local_data.has_owner_password());
EXPECT_EQ(kOwnerPassword, local_data.owner_password());
Quit();
};
RemoveOwnerDependencyRequest request;
request.set_owner_dependency(kOtherDependency);
service_->RemoveOwnerDependency(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, DefineSpaceFailure) {
uint32_t nvram_index = 5;
size_t nvram_size = 32;
std::vector<NvramSpaceAttribute> attributes{NVRAM_BOOT_WRITE_LOCK};
NvramSpacePolicy policy = NVRAM_POLICY_PCR0;
std::string auth_value = "1234";
EXPECT_CALL(mock_tpm_nvram_, DefineSpace(nvram_index, nvram_size, attributes,
auth_value, policy))
.WillRepeatedly(Return(NVRAM_RESULT_INVALID_PARAMETER));
auto callback = [this](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_INVALID_PARAMETER, reply.result());
Quit();
};
DefineSpaceRequest request;
request.set_index(nvram_index);
request.set_size(nvram_size);
request.add_attributes(NVRAM_BOOT_WRITE_LOCK);
request.set_policy(policy);
request.set_authorization_value(auth_value);
service_->DefineSpace(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, DefineSpaceSuccess) {
uint32_t nvram_index = 5;
uint32_t nvram_size = 32;
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto list_callback = [nvram_index](const ListSpacesReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
EXPECT_EQ(1, reply.index_list_size());
EXPECT_EQ(nvram_index, reply.index_list(0));
};
auto info_callback = [nvram_size](const GetSpaceInfoReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
EXPECT_EQ(nvram_size, reply.size());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_size);
service_->DefineSpace(define_request, base::Bind(define_callback));
ListSpacesRequest list_request;
service_->ListSpaces(list_request, base::Bind(list_callback));
GetSpaceInfoRequest info_request;
info_request.set_index(nvram_index);
service_->GetSpaceInfo(info_request, base::Bind(info_callback));
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, DestroyUnitializedNvram) {
auto callback = [this](const DestroySpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SPACE_DOES_NOT_EXIST, reply.result());
Quit();
};
DestroySpaceRequest request;
service_->DestroySpace(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, DestroySpaceSuccess) {
uint32_t nvram_index = 5;
uint32_t nvram_size = 32;
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto destroy_callback = [](const DestroySpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_size);
service_->DefineSpace(define_request, base::Bind(define_callback));
DestroySpaceRequest destroy_request;
destroy_request.set_index(nvram_index);
service_->DestroySpace(destroy_request, base::Bind(destroy_callback));
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, DoubleDestroySpace) {
uint32_t nvram_index = 5;
uint32_t nvram_size = 32;
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto destroy_callback_success = [](const DestroySpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto destroy_callback_failure = [](const DestroySpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SPACE_DOES_NOT_EXIST, reply.result());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_size);
service_->DefineSpace(define_request, base::Bind(define_callback));
DestroySpaceRequest destroy_request;
destroy_request.set_index(nvram_index);
service_->DestroySpace(destroy_request, base::Bind(destroy_callback_success));
service_->DestroySpace(destroy_request, base::Bind(destroy_callback_failure));
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, WriteSpaceIncorrectSize) {
uint32_t nvram_index = 5;
std::string nvram_data("nvram_data");
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto write_callback = [](const WriteSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_INVALID_PARAMETER, reply.result());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_data.size() - 1);
service_->DefineSpace(define_request, base::Bind(define_callback));
WriteSpaceRequest write_request;
write_request.set_index(nvram_index);
write_request.set_data(nvram_data);
service_->WriteSpace(write_request, base::Bind(write_callback));
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, WriteBeforeAfterLock) {
uint32_t nvram_index = 5;
std::string nvram_data("nvram_data");
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto write_callback_success = [](const WriteSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto lock_callback = [](const LockSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto write_callback_failure = [](const WriteSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_OPERATION_DISABLED, reply.result());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_data.size());
service_->DefineSpace(define_request, base::Bind(define_callback));
WriteSpaceRequest write_request;
write_request.set_index(nvram_index);
write_request.set_data(nvram_data);
service_->WriteSpace(write_request, base::Bind(write_callback_success));
LockSpaceRequest lock_request;
lock_request.set_index(nvram_index);
lock_request.set_lock_write(true);
service_->LockSpace(lock_request, base::Bind(lock_callback));
service_->WriteSpace(write_request, base::Bind(write_callback_failure));
RunServiceWorkerAndQuit();
}
TEST_F(TpmManagerServiceTest, ReadUninitializedNvram) {
auto callback = [this](const ReadSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SPACE_DOES_NOT_EXIST, reply.result());
Quit();
};
ReadSpaceRequest request;
service_->ReadSpace(request, base::Bind(callback));
Run();
}
TEST_F(TpmManagerServiceTest, ReadWriteSpaceSuccess) {
uint32_t nvram_index = 5;
std::string nvram_data("nvram_data");
auto define_callback = [](const DefineSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto write_callback = [](const WriteSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
};
auto read_callback = [nvram_data](const ReadSpaceReply& reply) {
EXPECT_EQ(NVRAM_RESULT_SUCCESS, reply.result());
EXPECT_EQ(nvram_data, reply.data());
};
DefineSpaceRequest define_request;
define_request.set_index(nvram_index);
define_request.set_size(nvram_data.size());
service_->DefineSpace(define_request, base::Bind(define_callback));
WriteSpaceRequest write_request;
write_request.set_index(nvram_index);
write_request.set_data(nvram_data);
service_->WriteSpace(write_request, base::Bind(write_callback));
ReadSpaceRequest read_request;
read_request.set_index(nvram_index);
service_->ReadSpace(read_request, base::Bind(read_callback));
RunServiceWorkerAndQuit();
}
} // namespace tpm_manager