Merge "Add support for AES-GCM-ESP as an IPSec algorithm" am: b6df7f0d35 am: f0d0bdc372
am: f92bfc3b77 Change-Id: I49932a5fc048b4a60512fac45a3537f050397168
This commit is contained in:
@@ -17,10 +17,12 @@
|
|||||||
package com.android.server;
|
package com.android.server;
|
||||||
|
|
||||||
import static org.junit.Assert.assertEquals;
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
import static org.mockito.Matchers.anyInt;
|
import static org.mockito.Matchers.anyInt;
|
||||||
import static org.mockito.Matchers.anyLong;
|
import static org.mockito.Matchers.anyLong;
|
||||||
import static org.mockito.Matchers.anyString;
|
import static org.mockito.Matchers.anyString;
|
||||||
import static org.mockito.Matchers.eq;
|
import static org.mockito.Matchers.eq;
|
||||||
|
import static org.mockito.Matchers.isNull;
|
||||||
import static org.mockito.Mockito.mock;
|
import static org.mockito.Mockito.mock;
|
||||||
import static org.mockito.Mockito.verify;
|
import static org.mockito.Mockito.verify;
|
||||||
import static org.mockito.Mockito.when;
|
import static org.mockito.Mockito.when;
|
||||||
@@ -37,7 +39,6 @@ import android.net.NetworkUtils;
|
|||||||
import android.os.Binder;
|
import android.os.Binder;
|
||||||
import android.os.ParcelFileDescriptor;
|
import android.os.ParcelFileDescriptor;
|
||||||
import android.support.test.filters.SmallTest;
|
import android.support.test.filters.SmallTest;
|
||||||
import android.system.OsConstants;
|
|
||||||
|
|
||||||
import java.net.Socket;
|
import java.net.Socket;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
@@ -53,8 +54,8 @@ import org.junit.runners.Parameterized;
|
|||||||
@RunWith(Parameterized.class)
|
@RunWith(Parameterized.class)
|
||||||
public class IpSecServiceParameterizedTest {
|
public class IpSecServiceParameterizedTest {
|
||||||
|
|
||||||
private static final int DROID_SPI = 0xD1201D;
|
private static final int TEST_SPI_OUT = 0xD1201D;
|
||||||
private static final int DROID_SPI2 = DROID_SPI + 1;
|
private static final int TEST_SPI_IN = TEST_SPI_OUT + 1;
|
||||||
|
|
||||||
private final String mRemoteAddr;
|
private final String mRemoteAddr;
|
||||||
|
|
||||||
@@ -81,6 +82,16 @@ public class IpSecServiceParameterizedTest {
|
|||||||
IpSecService.IpSecServiceConfiguration mMockIpSecSrvConfig;
|
IpSecService.IpSecServiceConfiguration mMockIpSecSrvConfig;
|
||||||
IpSecService mIpSecService;
|
IpSecService mIpSecService;
|
||||||
|
|
||||||
|
private static final IpSecAlgorithm AUTH_ALGO =
|
||||||
|
new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 4);
|
||||||
|
private static final IpSecAlgorithm CRYPT_ALGO =
|
||||||
|
new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
|
||||||
|
private static final IpSecAlgorithm AEAD_ALGO =
|
||||||
|
new IpSecAlgorithm(IpSecAlgorithm.AUTH_CRYPT_AES_GCM, CRYPT_KEY, CRYPT_KEY.length * 4);
|
||||||
|
|
||||||
|
private static final int[] DIRECTIONS =
|
||||||
|
new int[] {IpSecTransform.DIRECTION_IN, IpSecTransform.DIRECTION_OUT};
|
||||||
|
|
||||||
public IpSecServiceParameterizedTest(String remoteAddr) {
|
public IpSecServiceParameterizedTest(String remoteAddr) {
|
||||||
mRemoteAddr = remoteAddr;
|
mRemoteAddr = remoteAddr;
|
||||||
}
|
}
|
||||||
@@ -103,14 +114,14 @@ public class IpSecServiceParameterizedTest {
|
|||||||
eq(IpSecTransform.DIRECTION_OUT),
|
eq(IpSecTransform.DIRECTION_OUT),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(mRemoteAddr),
|
eq(mRemoteAddr),
|
||||||
eq(DROID_SPI)))
|
eq(TEST_SPI_OUT)))
|
||||||
.thenReturn(DROID_SPI);
|
.thenReturn(TEST_SPI_OUT);
|
||||||
|
|
||||||
IpSecSpiResponse spiResp =
|
IpSecSpiResponse spiResp =
|
||||||
mIpSecService.reserveSecurityParameterIndex(
|
mIpSecService.reserveSecurityParameterIndex(
|
||||||
IpSecTransform.DIRECTION_OUT, mRemoteAddr, DROID_SPI, new Binder());
|
IpSecTransform.DIRECTION_OUT, mRemoteAddr, TEST_SPI_OUT, new Binder());
|
||||||
assertEquals(IpSecManager.Status.OK, spiResp.status);
|
assertEquals(IpSecManager.Status.OK, spiResp.status);
|
||||||
assertEquals(DROID_SPI, spiResp.spi);
|
assertEquals(TEST_SPI_OUT, spiResp.spi);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -120,56 +131,60 @@ public class IpSecServiceParameterizedTest {
|
|||||||
eq(IpSecTransform.DIRECTION_OUT),
|
eq(IpSecTransform.DIRECTION_OUT),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(mRemoteAddr),
|
eq(mRemoteAddr),
|
||||||
eq(DROID_SPI)))
|
eq(TEST_SPI_OUT)))
|
||||||
.thenReturn(DROID_SPI);
|
.thenReturn(TEST_SPI_OUT);
|
||||||
|
|
||||||
IpSecSpiResponse spiResp =
|
IpSecSpiResponse spiResp =
|
||||||
mIpSecService.reserveSecurityParameterIndex(
|
mIpSecService.reserveSecurityParameterIndex(
|
||||||
IpSecTransform.DIRECTION_OUT, mRemoteAddr, DROID_SPI, new Binder());
|
IpSecTransform.DIRECTION_OUT, mRemoteAddr, TEST_SPI_OUT, new Binder());
|
||||||
|
|
||||||
mIpSecService.releaseSecurityParameterIndex(spiResp.resourceId);
|
mIpSecService.releaseSecurityParameterIndex(spiResp.resourceId);
|
||||||
|
|
||||||
verify(mMockNetd)
|
verify(mMockNetd)
|
||||||
.ipSecDeleteSecurityAssociation(
|
.ipSecDeleteSecurityAssociation(
|
||||||
eq(spiResp.resourceId), anyInt(), anyString(), anyString(), eq(DROID_SPI));
|
eq(spiResp.resourceId),
|
||||||
|
anyInt(),
|
||||||
|
anyString(),
|
||||||
|
anyString(),
|
||||||
|
eq(TEST_SPI_OUT));
|
||||||
}
|
}
|
||||||
|
|
||||||
IpSecConfig buildIpSecConfig() throws Exception {
|
private int getNewSpiResourceId(int direction, String remoteAddress, int returnSpi)
|
||||||
IpSecManager ipSecManager = new IpSecManager(mIpSecService);
|
throws Exception {
|
||||||
|
|
||||||
// Mocking the netd to allocate SPI
|
|
||||||
when(mMockNetd.ipSecAllocateSpi(anyInt(), anyInt(), anyString(), anyString(), anyInt()))
|
when(mMockNetd.ipSecAllocateSpi(anyInt(), anyInt(), anyString(), anyString(), anyInt()))
|
||||||
.thenReturn(DROID_SPI)
|
.thenReturn(returnSpi);
|
||||||
.thenReturn(DROID_SPI2);
|
|
||||||
|
|
||||||
IpSecAlgorithm encryptAlgo = new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
|
IpSecSpiResponse spi =
|
||||||
IpSecAlgorithm authAlgo =
|
mIpSecService.reserveSecurityParameterIndex(
|
||||||
new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 8);
|
direction,
|
||||||
|
NetworkUtils.numericToInetAddress(remoteAddress).getHostAddress(),
|
||||||
|
IpSecManager.INVALID_SECURITY_PARAMETER_INDEX,
|
||||||
|
new Binder());
|
||||||
|
return spi.resourceId;
|
||||||
|
}
|
||||||
|
|
||||||
/** Allocate and add SPI records in the IpSecService through IpSecManager interface. */
|
private void addDefaultSpisAndRemoteAddrToIpSecConfig(IpSecConfig config) throws Exception {
|
||||||
IpSecManager.SecurityParameterIndex outSpi =
|
config.setSpiResourceId(
|
||||||
ipSecManager.reserveSecurityParameterIndex(
|
IpSecTransform.DIRECTION_OUT,
|
||||||
IpSecTransform.DIRECTION_OUT,
|
getNewSpiResourceId(IpSecTransform.DIRECTION_OUT, mRemoteAddr, TEST_SPI_OUT));
|
||||||
NetworkUtils.numericToInetAddress(mRemoteAddr));
|
config.setSpiResourceId(
|
||||||
IpSecManager.SecurityParameterIndex inSpi =
|
IpSecTransform.DIRECTION_IN,
|
||||||
ipSecManager.reserveSecurityParameterIndex(
|
getNewSpiResourceId(IpSecTransform.DIRECTION_IN, mRemoteAddr, TEST_SPI_IN));
|
||||||
IpSecTransform.DIRECTION_IN,
|
|
||||||
NetworkUtils.numericToInetAddress(mRemoteAddr));
|
|
||||||
|
|
||||||
IpSecConfig config = new IpSecConfig();
|
|
||||||
config.setSpiResourceId(IpSecTransform.DIRECTION_IN, inSpi.getResourceId());
|
|
||||||
config.setSpiResourceId(IpSecTransform.DIRECTION_OUT, outSpi.getResourceId());
|
|
||||||
config.setEncryption(IpSecTransform.DIRECTION_OUT, encryptAlgo);
|
|
||||||
config.setAuthentication(IpSecTransform.DIRECTION_OUT, authAlgo);
|
|
||||||
config.setEncryption(IpSecTransform.DIRECTION_IN, encryptAlgo);
|
|
||||||
config.setAuthentication(IpSecTransform.DIRECTION_IN, authAlgo);
|
|
||||||
config.setRemoteAddress(mRemoteAddr);
|
config.setRemoteAddress(mRemoteAddr);
|
||||||
return config;
|
}
|
||||||
|
|
||||||
|
private void addAuthAndCryptToIpSecConfig(IpSecConfig config) throws Exception {
|
||||||
|
for (int direction : DIRECTIONS) {
|
||||||
|
config.setEncryption(direction, CRYPT_ALGO);
|
||||||
|
config.setAuthentication(direction, AUTH_ALGO);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testCreateTransportModeTransform() throws Exception {
|
public void testCreateTransportModeTransform() throws Exception {
|
||||||
IpSecConfig ipSecConfig = buildIpSecConfig();
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
addAuthAndCryptToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
IpSecTransformResponse createTransformResp =
|
IpSecTransformResponse createTransformResp =
|
||||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
@@ -183,13 +198,72 @@ public class IpSecServiceParameterizedTest {
|
|||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyLong(),
|
anyLong(),
|
||||||
eq(DROID_SPI),
|
eq(TEST_SPI_OUT),
|
||||||
eq(IpSecAlgorithm.AUTH_HMAC_SHA256),
|
eq(IpSecAlgorithm.AUTH_HMAC_SHA256),
|
||||||
eq(AUTH_KEY),
|
eq(AUTH_KEY),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
eq(IpSecAlgorithm.CRYPT_AES_CBC),
|
eq(IpSecAlgorithm.CRYPT_AES_CBC),
|
||||||
eq(CRYPT_KEY),
|
eq(CRYPT_KEY),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
|
eq(""),
|
||||||
|
isNull(),
|
||||||
|
eq(0),
|
||||||
|
anyInt(),
|
||||||
|
anyInt(),
|
||||||
|
anyInt());
|
||||||
|
verify(mMockNetd)
|
||||||
|
.ipSecAddSecurityAssociation(
|
||||||
|
eq(createTransformResp.resourceId),
|
||||||
|
anyInt(),
|
||||||
|
eq(IpSecTransform.DIRECTION_IN),
|
||||||
|
anyString(),
|
||||||
|
anyString(),
|
||||||
|
anyLong(),
|
||||||
|
eq(TEST_SPI_IN),
|
||||||
|
eq(IpSecAlgorithm.AUTH_HMAC_SHA256),
|
||||||
|
eq(AUTH_KEY),
|
||||||
|
anyInt(),
|
||||||
|
eq(IpSecAlgorithm.CRYPT_AES_CBC),
|
||||||
|
eq(CRYPT_KEY),
|
||||||
|
anyInt(),
|
||||||
|
eq(""),
|
||||||
|
isNull(),
|
||||||
|
eq(0),
|
||||||
|
anyInt(),
|
||||||
|
anyInt(),
|
||||||
|
anyInt());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateTransportModeTransformAead() throws Exception {
|
||||||
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
|
ipSecConfig.setAuthenticatedEncryption(IpSecTransform.DIRECTION_OUT, AEAD_ALGO);
|
||||||
|
ipSecConfig.setAuthenticatedEncryption(IpSecTransform.DIRECTION_IN, AEAD_ALGO);
|
||||||
|
|
||||||
|
IpSecTransformResponse createTransformResp =
|
||||||
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
|
assertEquals(IpSecManager.Status.OK, createTransformResp.status);
|
||||||
|
|
||||||
|
verify(mMockNetd)
|
||||||
|
.ipSecAddSecurityAssociation(
|
||||||
|
eq(createTransformResp.resourceId),
|
||||||
|
anyInt(),
|
||||||
|
eq(IpSecTransform.DIRECTION_OUT),
|
||||||
|
anyString(),
|
||||||
|
anyString(),
|
||||||
|
anyLong(),
|
||||||
|
eq(TEST_SPI_OUT),
|
||||||
|
eq(""),
|
||||||
|
isNull(),
|
||||||
|
eq(0),
|
||||||
|
eq(""),
|
||||||
|
isNull(),
|
||||||
|
eq(0),
|
||||||
|
eq(IpSecAlgorithm.AUTH_CRYPT_AES_GCM),
|
||||||
|
eq(CRYPT_KEY),
|
||||||
|
anyInt(),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
anyInt());
|
anyInt());
|
||||||
@@ -201,11 +275,14 @@ public class IpSecServiceParameterizedTest {
|
|||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyLong(),
|
anyLong(),
|
||||||
eq(DROID_SPI2),
|
eq(TEST_SPI_IN),
|
||||||
eq(IpSecAlgorithm.AUTH_HMAC_SHA256),
|
eq(""),
|
||||||
eq(AUTH_KEY),
|
isNull(),
|
||||||
anyInt(),
|
eq(0),
|
||||||
eq(IpSecAlgorithm.CRYPT_AES_CBC),
|
eq(""),
|
||||||
|
isNull(),
|
||||||
|
eq(0),
|
||||||
|
eq(IpSecAlgorithm.AUTH_CRYPT_AES_GCM),
|
||||||
eq(CRYPT_KEY),
|
eq(CRYPT_KEY),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
anyInt(),
|
anyInt(),
|
||||||
@@ -213,9 +290,69 @@ public class IpSecServiceParameterizedTest {
|
|||||||
anyInt());
|
anyInt());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateInvalidConfigAeadWithAuth() throws Exception {
|
||||||
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
|
for (int direction : DIRECTIONS) {
|
||||||
|
ipSecConfig.setAuthentication(direction, AUTH_ALGO);
|
||||||
|
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
|
fail(
|
||||||
|
"IpSecService should have thrown an error on authentication being"
|
||||||
|
+ " enabled with authenticated encryption");
|
||||||
|
} catch (IllegalArgumentException expected) {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateInvalidConfigAeadWithCrypt() throws Exception {
|
||||||
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
|
for (int direction : DIRECTIONS) {
|
||||||
|
ipSecConfig.setEncryption(direction, CRYPT_ALGO);
|
||||||
|
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
|
fail(
|
||||||
|
"IpSecService should have thrown an error on encryption being"
|
||||||
|
+ " enabled with authenticated encryption");
|
||||||
|
} catch (IllegalArgumentException expected) {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateInvalidConfigAeadWithAuthAndCrypt() throws Exception {
|
||||||
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
|
for (int direction : DIRECTIONS) {
|
||||||
|
ipSecConfig.setAuthentication(direction, AUTH_ALGO);
|
||||||
|
ipSecConfig.setEncryption(direction, CRYPT_ALGO);
|
||||||
|
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
|
fail(
|
||||||
|
"IpSecService should have thrown an error on authentication and encryption being"
|
||||||
|
+ " enabled with authenticated encryption");
|
||||||
|
} catch (IllegalArgumentException expected) {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testDeleteTransportModeTransform() throws Exception {
|
public void testDeleteTransportModeTransform() throws Exception {
|
||||||
IpSecConfig ipSecConfig = buildIpSecConfig();
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
addAuthAndCryptToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
IpSecTransformResponse createTransformResp =
|
IpSecTransformResponse createTransformResp =
|
||||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
@@ -227,19 +364,21 @@ public class IpSecServiceParameterizedTest {
|
|||||||
eq(IpSecTransform.DIRECTION_OUT),
|
eq(IpSecTransform.DIRECTION_OUT),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(DROID_SPI));
|
eq(TEST_SPI_OUT));
|
||||||
verify(mMockNetd)
|
verify(mMockNetd)
|
||||||
.ipSecDeleteSecurityAssociation(
|
.ipSecDeleteSecurityAssociation(
|
||||||
eq(createTransformResp.resourceId),
|
eq(createTransformResp.resourceId),
|
||||||
eq(IpSecTransform.DIRECTION_IN),
|
eq(IpSecTransform.DIRECTION_IN),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(DROID_SPI2));
|
eq(TEST_SPI_IN));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testApplyTransportModeTransform() throws Exception {
|
public void testApplyTransportModeTransform() throws Exception {
|
||||||
IpSecConfig ipSecConfig = buildIpSecConfig();
|
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||||
|
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||||
|
addAuthAndCryptToIpSecConfig(ipSecConfig);
|
||||||
|
|
||||||
IpSecTransformResponse createTransformResp =
|
IpSecTransformResponse createTransformResp =
|
||||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||||
@@ -255,7 +394,7 @@ public class IpSecServiceParameterizedTest {
|
|||||||
eq(IpSecTransform.DIRECTION_OUT),
|
eq(IpSecTransform.DIRECTION_OUT),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(DROID_SPI));
|
eq(TEST_SPI_OUT));
|
||||||
verify(mMockNetd)
|
verify(mMockNetd)
|
||||||
.ipSecApplyTransportModeTransform(
|
.ipSecApplyTransportModeTransform(
|
||||||
eq(pfd.getFileDescriptor()),
|
eq(pfd.getFileDescriptor()),
|
||||||
@@ -263,7 +402,7 @@ public class IpSecServiceParameterizedTest {
|
|||||||
eq(IpSecTransform.DIRECTION_IN),
|
eq(IpSecTransform.DIRECTION_IN),
|
||||||
anyString(),
|
anyString(),
|
||||||
anyString(),
|
anyString(),
|
||||||
eq(DROID_SPI2));
|
eq(TEST_SPI_IN));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|||||||
Reference in New Issue
Block a user