blob: 801a396ecb3dd51649a5fb2390fae1e229203ed2 [file] [log] [blame]
Nathan Harold2e9a5202017-09-26 11:44:23 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
19import static org.junit.Assert.assertEquals;
Benedict Wong0febe5e2017-08-22 21:42:33 -070020import static org.junit.Assert.fail;
Nathan Harold2e9a5202017-09-26 11:44:23 -070021import static org.mockito.Matchers.anyInt;
22import static org.mockito.Matchers.anyLong;
23import static org.mockito.Matchers.anyString;
24import static org.mockito.Matchers.eq;
25import static org.mockito.Mockito.mock;
26import static org.mockito.Mockito.verify;
27import static org.mockito.Mockito.when;
28
29import android.content.Context;
30import android.net.INetd;
31import android.net.IpSecAlgorithm;
32import android.net.IpSecConfig;
33import android.net.IpSecManager;
34import android.net.IpSecSpiResponse;
Nathan Harold2e9a5202017-09-26 11:44:23 -070035import android.net.IpSecTransformResponse;
36import android.net.NetworkUtils;
37import android.os.Binder;
38import android.os.ParcelFileDescriptor;
39import android.support.test.filters.SmallTest;
Benedict Wong344bd622017-11-16 15:27:22 -080040import android.system.Os;
Nathan Harold2e9a5202017-09-26 11:44:23 -070041
42import java.net.Socket;
43import java.util.Arrays;
44import java.util.Collection;
45
46import org.junit.Before;
47import org.junit.Test;
48import org.junit.runner.RunWith;
49import org.junit.runners.Parameterized;
50
51/** Unit tests for {@link IpSecService}. */
52@SmallTest
53@RunWith(Parameterized.class)
54public class IpSecServiceParameterizedTest {
55
Nathan Harolda2523312018-01-05 19:25:13 -080056 private static final int TEST_SPI = 0xD1201D;
Nathan Harold2e9a5202017-09-26 11:44:23 -070057
Nathan Harolda2523312018-01-05 19:25:13 -080058 private final String mDestinationAddr;
Nathan Harold5676f5f2018-01-16 19:34:01 -080059 private final String mSourceAddr;
Nathan Harold2e9a5202017-09-26 11:44:23 -070060
61 @Parameterized.Parameters
62 public static Collection ipSecConfigs() {
Nathan Harold5676f5f2018-01-16 19:34:01 -080063 return Arrays.asList(new Object[][] {{"1.2.3.4", "8.8.4.4"}, {"2601::2", "2601::10"}});
Nathan Harold2e9a5202017-09-26 11:44:23 -070064 }
65
Benedict Wong4ebc2c52017-11-01 17:14:25 -070066 private static final byte[] AEAD_KEY = {
67 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
68 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
69 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
70 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F,
71 0x73, 0x61, 0x6C, 0x74
72 };
Nathan Harold2e9a5202017-09-26 11:44:23 -070073 private static final byte[] CRYPT_KEY = {
74 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
75 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
76 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
77 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
78 };
79 private static final byte[] AUTH_KEY = {
80 0x7A, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
81 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x7F,
82 0x7A, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
83 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x7F
84 };
85
86 Context mMockContext;
87 INetd mMockNetd;
88 IpSecService.IpSecServiceConfiguration mMockIpSecSrvConfig;
89 IpSecService mIpSecService;
90
Benedict Wong0febe5e2017-08-22 21:42:33 -070091 private static final IpSecAlgorithm AUTH_ALGO =
92 new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 4);
93 private static final IpSecAlgorithm CRYPT_ALGO =
94 new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
95 private static final IpSecAlgorithm AEAD_ALGO =
Benedict Wong4ebc2c52017-11-01 17:14:25 -070096 new IpSecAlgorithm(IpSecAlgorithm.AUTH_CRYPT_AES_GCM, AEAD_KEY, 128);
Benedict Wong0febe5e2017-08-22 21:42:33 -070097
Nathan Harold5676f5f2018-01-16 19:34:01 -080098 public IpSecServiceParameterizedTest(String sourceAddr, String destAddr) {
99 mSourceAddr = sourceAddr;
100 mDestinationAddr = destAddr;
Nathan Harold2e9a5202017-09-26 11:44:23 -0700101 }
102
103 @Before
104 public void setUp() throws Exception {
105 mMockContext = mock(Context.class);
106 mMockNetd = mock(INetd.class);
107 mMockIpSecSrvConfig = mock(IpSecService.IpSecServiceConfiguration.class);
108 mIpSecService = new IpSecService(mMockContext, mMockIpSecSrvConfig);
109
110 // Injecting mock netd
111 when(mMockIpSecSrvConfig.getNetdInstance()).thenReturn(mMockNetd);
112 }
113
114 @Test
115 public void testIpSecServiceReserveSpi() throws Exception {
Nathan Harolda2523312018-01-05 19:25:13 -0800116 when(mMockNetd.ipSecAllocateSpi(anyInt(), anyString(), eq(mDestinationAddr), eq(TEST_SPI)))
117 .thenReturn(TEST_SPI);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700118
119 IpSecSpiResponse spiResp =
Jonathan Basseri5fb92902017-11-16 10:58:01 -0800120 mIpSecService.allocateSecurityParameterIndex(
Nathan Harolda2523312018-01-05 19:25:13 -0800121 mDestinationAddr, TEST_SPI, new Binder());
Nathan Harold2e9a5202017-09-26 11:44:23 -0700122 assertEquals(IpSecManager.Status.OK, spiResp.status);
Nathan Harolda2523312018-01-05 19:25:13 -0800123 assertEquals(TEST_SPI, spiResp.spi);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700124 }
125
126 @Test
127 public void testReleaseSecurityParameterIndex() throws Exception {
Nathan Harolda2523312018-01-05 19:25:13 -0800128 when(mMockNetd.ipSecAllocateSpi(anyInt(), anyString(), eq(mDestinationAddr), eq(TEST_SPI)))
129 .thenReturn(TEST_SPI);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700130
131 IpSecSpiResponse spiResp =
Jonathan Basseri5fb92902017-11-16 10:58:01 -0800132 mIpSecService.allocateSecurityParameterIndex(
Nathan Harolda2523312018-01-05 19:25:13 -0800133 mDestinationAddr, TEST_SPI, new Binder());
Nathan Harold2e9a5202017-09-26 11:44:23 -0700134
135 mIpSecService.releaseSecurityParameterIndex(spiResp.resourceId);
136
137 verify(mMockNetd)
138 .ipSecDeleteSecurityAssociation(
Di Lu0b611f42018-01-11 11:35:25 -0800139 eq(spiResp.resourceId),
140 anyString(),
141 anyString(),
142 eq(TEST_SPI),
143 anyInt(),
144 anyInt());
Benedict Wong344bd622017-11-16 15:27:22 -0800145
146 // Verify quota and RefcountedResource objects cleaned up
147 IpSecService.UserRecord userRecord =
148 mIpSecService.mUserResourceTracker.getUserRecord(Os.getuid());
149 assertEquals(0, userRecord.mSpiQuotaTracker.mCurrent);
150 try {
151 userRecord.mSpiRecords.getRefcountedResourceOrThrow(spiResp.resourceId);
152 fail("Expected IllegalArgumentException on attempt to access deleted resource");
153 } catch (IllegalArgumentException expected) {
154
155 }
156 }
157
158 @Test
159 public void testSecurityParameterIndexBinderDeath() throws Exception {
Nathan Harolda2523312018-01-05 19:25:13 -0800160 when(mMockNetd.ipSecAllocateSpi(anyInt(), anyString(), eq(mDestinationAddr), eq(TEST_SPI)))
161 .thenReturn(TEST_SPI);
Benedict Wong344bd622017-11-16 15:27:22 -0800162
163 IpSecSpiResponse spiResp =
Nathan Harold660a3352017-12-14 14:46:46 -0800164 mIpSecService.allocateSecurityParameterIndex(
Nathan Harolda2523312018-01-05 19:25:13 -0800165 mDestinationAddr, TEST_SPI, new Binder());
Benedict Wong344bd622017-11-16 15:27:22 -0800166
167 IpSecService.UserRecord userRecord =
168 mIpSecService.mUserResourceTracker.getUserRecord(Os.getuid());
169 IpSecService.RefcountedResource refcountedRecord =
170 userRecord.mSpiRecords.getRefcountedResourceOrThrow(spiResp.resourceId);
171
172 refcountedRecord.binderDied();
173
174 verify(mMockNetd)
175 .ipSecDeleteSecurityAssociation(
Di Lu0b611f42018-01-11 11:35:25 -0800176 eq(spiResp.resourceId),
177 anyString(),
178 anyString(),
179 eq(TEST_SPI),
180 anyInt(),
181 anyInt());
Benedict Wong344bd622017-11-16 15:27:22 -0800182
183 // Verify quota and RefcountedResource objects cleaned up
184 assertEquals(0, userRecord.mSpiQuotaTracker.mCurrent);
185 try {
186 userRecord.mSpiRecords.getRefcountedResourceOrThrow(spiResp.resourceId);
187 fail("Expected IllegalArgumentException on attempt to access deleted resource");
188 } catch (IllegalArgumentException expected) {
189
190 }
Nathan Harold2e9a5202017-09-26 11:44:23 -0700191 }
192
Nathan Harolda2523312018-01-05 19:25:13 -0800193 private int getNewSpiResourceId(String remoteAddress, int returnSpi) throws Exception {
194 when(mMockNetd.ipSecAllocateSpi(anyInt(), anyString(), anyString(), anyInt()))
Benedict Wong0febe5e2017-08-22 21:42:33 -0700195 .thenReturn(returnSpi);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700196
Benedict Wong0febe5e2017-08-22 21:42:33 -0700197 IpSecSpiResponse spi =
Jonathan Basseri5fb92902017-11-16 10:58:01 -0800198 mIpSecService.allocateSecurityParameterIndex(
Benedict Wong0febe5e2017-08-22 21:42:33 -0700199 NetworkUtils.numericToInetAddress(remoteAddress).getHostAddress(),
200 IpSecManager.INVALID_SECURITY_PARAMETER_INDEX,
201 new Binder());
202 return spi.resourceId;
203 }
Nathan Harold2e9a5202017-09-26 11:44:23 -0700204
Benedict Wong0febe5e2017-08-22 21:42:33 -0700205 private void addDefaultSpisAndRemoteAddrToIpSecConfig(IpSecConfig config) throws Exception {
Nathan Harolda2523312018-01-05 19:25:13 -0800206 config.setSpiResourceId(getNewSpiResourceId(mDestinationAddr, TEST_SPI));
Nathan Harold5676f5f2018-01-16 19:34:01 -0800207 config.setSourceAddress(mSourceAddr);
Nathan Harolda2523312018-01-05 19:25:13 -0800208 config.setDestinationAddress(mDestinationAddr);
Benedict Wong0febe5e2017-08-22 21:42:33 -0700209 }
210
211 private void addAuthAndCryptToIpSecConfig(IpSecConfig config) throws Exception {
Nathan Harolda2523312018-01-05 19:25:13 -0800212 config.setEncryption(CRYPT_ALGO);
213 config.setAuthentication(AUTH_ALGO);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700214 }
215
216 @Test
Benedict Wongf33f03132018-01-18 14:38:16 -0800217 public void testCreateTransform() throws Exception {
Benedict Wong0febe5e2017-08-22 21:42:33 -0700218 IpSecConfig ipSecConfig = new IpSecConfig();
219 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
220 addAuthAndCryptToIpSecConfig(ipSecConfig);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700221
222 IpSecTransformResponse createTransformResp =
Benedict Wongf33f03132018-01-18 14:38:16 -0800223 mIpSecService.createTransform(ipSecConfig, new Binder());
Nathan Harold2e9a5202017-09-26 11:44:23 -0700224 assertEquals(IpSecManager.Status.OK, createTransformResp.status);
225
226 verify(mMockNetd)
227 .ipSecAddSecurityAssociation(
228 eq(createTransformResp.resourceId),
229 anyInt(),
Nathan Harold2e9a5202017-09-26 11:44:23 -0700230 anyString(),
231 anyString(),
232 anyLong(),
Nathan Harolda2523312018-01-05 19:25:13 -0800233 eq(TEST_SPI),
Di Lu0b611f42018-01-11 11:35:25 -0800234 anyInt(),
235 anyInt(),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700236 eq(IpSecAlgorithm.AUTH_HMAC_SHA256),
237 eq(AUTH_KEY),
238 anyInt(),
239 eq(IpSecAlgorithm.CRYPT_AES_CBC),
240 eq(CRYPT_KEY),
241 anyInt(),
242 eq(""),
Manoj Boopathi Rajfffa8112017-10-26 11:49:02 -0700243 eq(new byte[] {}),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700244 eq(0),
245 anyInt(),
246 anyInt(),
247 anyInt());
248 }
249
250 @Test
Benedict Wongf33f03132018-01-18 14:38:16 -0800251 public void testCreateTransformAead() throws Exception {
Benedict Wong0febe5e2017-08-22 21:42:33 -0700252 IpSecConfig ipSecConfig = new IpSecConfig();
253 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
254
Nathan Harolda2523312018-01-05 19:25:13 -0800255 ipSecConfig.setAuthenticatedEncryption(AEAD_ALGO);
Benedict Wong0febe5e2017-08-22 21:42:33 -0700256
257 IpSecTransformResponse createTransformResp =
Benedict Wongf33f03132018-01-18 14:38:16 -0800258 mIpSecService.createTransform(ipSecConfig, new Binder());
Benedict Wong0febe5e2017-08-22 21:42:33 -0700259 assertEquals(IpSecManager.Status.OK, createTransformResp.status);
260
261 verify(mMockNetd)
262 .ipSecAddSecurityAssociation(
263 eq(createTransformResp.resourceId),
264 anyInt(),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700265 anyString(),
266 anyString(),
267 anyLong(),
Nathan Harolda2523312018-01-05 19:25:13 -0800268 eq(TEST_SPI),
Di Lu0b611f42018-01-11 11:35:25 -0800269 anyInt(),
270 anyInt(),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700271 eq(""),
Manoj Boopathi Rajfffa8112017-10-26 11:49:02 -0700272 eq(new byte[] {}),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700273 eq(0),
274 eq(""),
Manoj Boopathi Rajfffa8112017-10-26 11:49:02 -0700275 eq(new byte[] {}),
Benedict Wong0febe5e2017-08-22 21:42:33 -0700276 eq(0),
277 eq(IpSecAlgorithm.AUTH_CRYPT_AES_GCM),
Benedict Wong4ebc2c52017-11-01 17:14:25 -0700278 eq(AEAD_KEY),
Nathan Harold2e9a5202017-09-26 11:44:23 -0700279 anyInt(),
280 anyInt(),
281 anyInt(),
282 anyInt());
283 }
284
Benedict Wonge6b42772017-12-13 18:26:40 -0800285 public void testCreateTwoTransformsWithSameSpis() throws Exception {
286 IpSecConfig ipSecConfig = new IpSecConfig();
287 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
288 addAuthAndCryptToIpSecConfig(ipSecConfig);
289
290 IpSecTransformResponse createTransformResp =
291 mIpSecService.createTransform(ipSecConfig, new Binder());
292 assertEquals(IpSecManager.Status.OK, createTransformResp.status);
293
294 // Attempting to create transform a second time with the same SPIs should throw an error...
295 try {
296 mIpSecService.createTransform(ipSecConfig, new Binder());
297 fail("IpSecService should have thrown an error for reuse of SPI");
298 } catch (IllegalStateException expected) {
299 }
300
301 // ... even if the transform is deleted
302 mIpSecService.deleteTransform(createTransformResp.resourceId);
303 try {
304 mIpSecService.createTransform(ipSecConfig, new Binder());
305 fail("IpSecService should have thrown an error for reuse of SPI");
306 } catch (IllegalStateException expected) {
307 }
308 }
309
Nathan Harold2e9a5202017-09-26 11:44:23 -0700310 @Test
Benedict Wongf33f03132018-01-18 14:38:16 -0800311 public void testDeleteTransform() throws Exception {
Benedict Wong0febe5e2017-08-22 21:42:33 -0700312 IpSecConfig ipSecConfig = new IpSecConfig();
313 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
314 addAuthAndCryptToIpSecConfig(ipSecConfig);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700315
316 IpSecTransformResponse createTransformResp =
Benedict Wongf33f03132018-01-18 14:38:16 -0800317 mIpSecService.createTransform(ipSecConfig, new Binder());
318 mIpSecService.deleteTransform(createTransformResp.resourceId);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700319
320 verify(mMockNetd)
321 .ipSecDeleteSecurityAssociation(
Di Lu0b611f42018-01-11 11:35:25 -0800322 eq(createTransformResp.resourceId),
323 anyString(),
324 anyString(),
325 eq(TEST_SPI),
326 anyInt(),
327 anyInt());
Benedict Wong344bd622017-11-16 15:27:22 -0800328
329 // Verify quota and RefcountedResource objects cleaned up
330 IpSecService.UserRecord userRecord =
331 mIpSecService.mUserResourceTracker.getUserRecord(Os.getuid());
332 assertEquals(0, userRecord.mTransformQuotaTracker.mCurrent);
333 try {
334 userRecord.mTransformRecords.getRefcountedResourceOrThrow(
335 createTransformResp.resourceId);
336 fail("Expected IllegalArgumentException on attempt to access deleted resource");
337 } catch (IllegalArgumentException expected) {
338
339 }
340 }
341
342 @Test
343 public void testTransportModeTransformBinderDeath() throws Exception {
344 IpSecConfig ipSecConfig = new IpSecConfig();
345 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
346 addAuthAndCryptToIpSecConfig(ipSecConfig);
347
348 IpSecTransformResponse createTransformResp =
Benedict Wongf33f03132018-01-18 14:38:16 -0800349 mIpSecService.createTransform(ipSecConfig, new Binder());
Benedict Wong344bd622017-11-16 15:27:22 -0800350
351 IpSecService.UserRecord userRecord =
352 mIpSecService.mUserResourceTracker.getUserRecord(Os.getuid());
353 IpSecService.RefcountedResource refcountedRecord =
354 userRecord.mTransformRecords.getRefcountedResourceOrThrow(
355 createTransformResp.resourceId);
356
357 refcountedRecord.binderDied();
358
359 verify(mMockNetd)
360 .ipSecDeleteSecurityAssociation(
Di Lu0b611f42018-01-11 11:35:25 -0800361 eq(createTransformResp.resourceId),
362 anyString(),
363 anyString(),
364 eq(TEST_SPI),
365 anyInt(),
366 anyInt());
Benedict Wong344bd622017-11-16 15:27:22 -0800367
368 // Verify quota and RefcountedResource objects cleaned up
369 assertEquals(0, userRecord.mTransformQuotaTracker.mCurrent);
370 try {
371 userRecord.mTransformRecords.getRefcountedResourceOrThrow(
372 createTransformResp.resourceId);
373 fail("Expected IllegalArgumentException on attempt to access deleted resource");
374 } catch (IllegalArgumentException expected) {
375
376 }
Nathan Harold2e9a5202017-09-26 11:44:23 -0700377 }
378
379 @Test
380 public void testApplyTransportModeTransform() throws Exception {
Benedict Wong0febe5e2017-08-22 21:42:33 -0700381 IpSecConfig ipSecConfig = new IpSecConfig();
382 addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
383 addAuthAndCryptToIpSecConfig(ipSecConfig);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700384
385 IpSecTransformResponse createTransformResp =
Benedict Wongf33f03132018-01-18 14:38:16 -0800386 mIpSecService.createTransform(ipSecConfig, new Binder());
Nathan Harold2e9a5202017-09-26 11:44:23 -0700387 ParcelFileDescriptor pfd = ParcelFileDescriptor.fromSocket(new Socket());
388
389 int resourceId = createTransformResp.resourceId;
Nathan Harolda2523312018-01-05 19:25:13 -0800390 mIpSecService.applyTransportModeTransform(pfd, IpSecManager.DIRECTION_OUT, resourceId);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700391
392 verify(mMockNetd)
393 .ipSecApplyTransportModeTransform(
394 eq(pfd.getFileDescriptor()),
395 eq(resourceId),
Nathan Harolda2523312018-01-05 19:25:13 -0800396 eq(IpSecManager.DIRECTION_OUT),
Nathan Harold2e9a5202017-09-26 11:44:23 -0700397 anyString(),
398 anyString(),
Nathan Harolda2523312018-01-05 19:25:13 -0800399 eq(TEST_SPI));
Nathan Harold2e9a5202017-09-26 11:44:23 -0700400 }
401
402 @Test
403 public void testRemoveTransportModeTransform() throws Exception {
404 ParcelFileDescriptor pfd = ParcelFileDescriptor.fromSocket(new Socket());
Nathan Haroldf73d2522018-01-17 01:00:20 -0800405 mIpSecService.removeTransportModeTransforms(pfd);
Nathan Harold2e9a5202017-09-26 11:44:23 -0700406
407 verify(mMockNetd).ipSecRemoveTransportModeTransform(pfd.getFileDescriptor());
408 }
409}