Merge "Add VTS Test for Secure Element HAL" am: 6a75cdbe96

am: 3b24df528a

Change-Id: Id3458e6a4826c7e4f0f05d9a38d802d9c7dc5488
This commit is contained in:
Ruchi Kandoi
2018-02-02 04:20:34 +00:00
committed by android-build-merger
3 changed files with 280 additions and 0 deletions

View File

@@ -247,6 +247,14 @@
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" optional="true">
<name>android.hardware.secure_element</name>
<version>1.0</version>
<interface>
<name>ISecureElement</name>
<instance>eSE1</instance>
</interface>
</hal>
<hal format="hidl" optional="true">
<name>android.hardware.sensors</name>
<version>1.0</version>

View File

@@ -0,0 +1,24 @@
//
// Copyright (C) 2018 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
cc_test {
name: "VtsHalSecureElementV1_0TargetTest",
defaults: ["VtsHalTargetTestDefaults"],
srcs: ["VtsHalSecureElementV1_0TargetTest.cpp"],
static_libs: [
"android.hardware.secure_element@1.0",
],
}

View File

@@ -0,0 +1,248 @@
/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define LOG_TAG "secure_element_hidl_hal_test"
#include <android-base/logging.h>
#include <android/hardware/secure_element/1.0/ISecureElement.h>
#include <android/hardware/secure_element/1.0/ISecureElementHalCallback.h>
#include <android/hardware/secure_element/1.0/types.h>
#include <VtsHalHidlTargetCallbackBase.h>
#include <VtsHalHidlTargetTestBase.h>
#include <VtsHalHidlTargetTestEnvBase.h>
using ::android::hardware::secure_element::V1_0::ISecureElement;
using ::android::hardware::secure_element::V1_0::ISecureElementHalCallback;
using ::android::hardware::secure_element::V1_0::SecureElementStatus;
using ::android::hardware::secure_element::V1_0::LogicalChannelResponse;
using ::android::hardware::Return;
using ::android::hardware::Void;
using ::android::sp;
using ::testing::VtsHalHidlTargetTestEnvBase;
#define SELECT_ISD \
{ 0x00, 0xA4, 0x04, 0x00, 0x00 }
#define SEQUENCE_COUNTER \
{ 0x80, 0xCA, 0x00, 0xC1, 0x00 }
#define MANAGE_SELECT \
{ 0x00, 0xA4, 0x04, 0x00, 0x00 }
#define CRS_AID \
{ 0xA0, 0x00, 0x00, 0x01, 0x51, 0x43, 0x52, 0x53, 0x00 }
constexpr char kCallbackNameOnStateChange[] = "onStateChange";
class SecureElementCallbackArgs {
public:
bool state_;
};
class SecureElementHalCallback
: public ::testing::VtsHalHidlTargetCallbackBase<SecureElementCallbackArgs>,
public ISecureElementHalCallback {
public:
virtual ~SecureElementHalCallback() = default;
Return<void> onStateChange(bool state) override {
SecureElementCallbackArgs args;
args.state_ = state;
NotifyFromCallback(kCallbackNameOnStateChange, args);
return Void();
};
};
class SecureElementHidlEnvironment : public VtsHalHidlTargetTestEnvBase {
public:
// get the test environment singleton
static SecureElementHidlEnvironment* Instance() {
static SecureElementHidlEnvironment* instance = new SecureElementHidlEnvironment;
return instance;
}
virtual void registerTestServices() override { registerTestService<ISecureElement>(); }
private:
SecureElementHidlEnvironment() {}
GTEST_DISALLOW_COPY_AND_ASSIGN_(SecureElementHidlEnvironment);
};
class SecureElementHidlTest : public ::testing::VtsHalHidlTargetTestBase {
public:
virtual void SetUp() override {
std::string serviceName =
SecureElementHidlEnvironment::Instance()->getServiceName<ISecureElement>("eSE1");
LOG(INFO) << "get service with name:" << serviceName;
ASSERT_FALSE(serviceName.empty());
se_ = ::testing::VtsHalHidlTargetTestBase::getService<ISecureElement>(serviceName);
ASSERT_NE(se_, nullptr);
se_cb_ = new SecureElementHalCallback();
ASSERT_NE(se_cb_, nullptr);
}
sp<ISecureElement> se_;
sp<SecureElementHalCallback> se_cb_;
};
/*
* isCardPresent:
* Expects the card to be present
*/
TEST_F(SecureElementHidlTest, isCardPresent) {
EXPECT_TRUE(se_->isCardPresent());
}
/*
* transmit:
* Check status word in the response
*/
TEST_F(SecureElementHidlTest, transmit) {
std::vector<uint8_t> aid = CRS_AID;
SecureElementStatus statusReturned;
LogicalChannelResponse response;
se_->openLogicalChannel(
aid, 0x00,
[&statusReturned, &response](LogicalChannelResponse channelResponse,
SecureElementStatus status) {
statusReturned = status;
if (status == SecureElementStatus::SUCCESS) {
response.channelNumber = channelResponse.channelNumber;
response.selectResponse.resize(channelResponse.selectResponse.size());
for (size_t i = 0; i < channelResponse.selectResponse.size(); i++) {
response.selectResponse[i] = channelResponse.selectResponse[i];
}
}
});
EXPECT_EQ(SecureElementStatus::SUCCESS, statusReturned);
EXPECT_LE((unsigned int)3, response.selectResponse.size());
EXPECT_LE(1, response.channelNumber);
std::vector<uint8_t> command = SELECT_ISD;
std::vector<uint8_t> transmitResponse;
se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
transmitResponse.resize(res.size());
for (size_t i = 0; i < res.size(); i++) {
transmitResponse[i] = res[i];
}
});
EXPECT_LE((unsigned int)3, transmitResponse.size());
EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
command = SEQUENCE_COUNTER;
se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
transmitResponse.resize(res.size());
for (size_t i = 0; i < res.size(); i++) {
transmitResponse[i] = res[i];
}
});
EXPECT_LE((unsigned int)3, transmitResponse.size());
EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
EXPECT_EQ(SecureElementStatus::SUCCESS, se_->closeChannel(response.channelNumber));
}
/*
* OpenCloseBasicChannel:
* If the secure element allows opening of basic channel:
* open channel, check the length of selectResponse and close the channel
*/
TEST_F(SecureElementHidlTest, openBasicChannel) {
std::vector<uint8_t> aid = CRS_AID;
SecureElementStatus statusReturned;
std::vector<uint8_t> response;
se_->openBasicChannel(aid, 0x00,
[&statusReturned, &response](std::vector<uint8_t> selectResponse,
SecureElementStatus status) {
statusReturned = status;
if (status == SecureElementStatus::SUCCESS) {
response.resize(selectResponse.size());
for (size_t i = 0; i < selectResponse.size(); i++) {
response[i] = selectResponse[i];
}
}
});
if (statusReturned == SecureElementStatus::SUCCESS) {
EXPECT_LE((unsigned int)3, response.size());
std::vector<uint8_t> command = SELECT_ISD;
std::vector<uint8_t> transmitResponse;
se_->transmit(command, [&transmitResponse](std::vector<uint8_t> res) {
transmitResponse.resize(res.size());
for (size_t i = 0; i < res.size(); i++) {
transmitResponse[i] = res[i];
}
});
EXPECT_LE((unsigned int)3, transmitResponse.size());
EXPECT_EQ(0x90, transmitResponse[transmitResponse.size() - 2]);
EXPECT_EQ(0x00, transmitResponse[transmitResponse.size() - 1]);
return;
}
EXPECT_EQ(SecureElementStatus::UNSUPPORTED_OPERATION, statusReturned);
}
/*
* GetATR
*/
TEST_F(SecureElementHidlTest, getAtr) {
std::vector<uint8_t> atr;
se_->getAtr([&atr](std::vector<uint8_t> atrReturned) {
atr.resize(atrReturned.size());
for (size_t i = 0; i < atrReturned.size(); i++) {
atr[i] = atrReturned[i];
}
});
if (atr.size() == 0) {
return;
}
EXPECT_GE((unsigned int)32, atr.size());
EXPECT_LE((unsigned int)1, atr.size());
}
/*
* OpenCloseLogicalChannel:
* Open Channel
* Check status
* Close Channel
*/
TEST_F(SecureElementHidlTest, openCloseLogicalChannel) {
std::vector<uint8_t> aid = CRS_AID;
SecureElementStatus statusReturned;
LogicalChannelResponse response;
se_->openLogicalChannel(
aid, 0x00,
[&statusReturned, &response](LogicalChannelResponse channelResponse,
SecureElementStatus status) {
statusReturned = status;
if (status == SecureElementStatus::SUCCESS) {
response.channelNumber = channelResponse.channelNumber;
response.selectResponse.resize(channelResponse.selectResponse.size());
for (size_t i = 0; i < channelResponse.selectResponse.size(); i++) {
response.selectResponse[i] = channelResponse.selectResponse[i];
}
}
});
EXPECT_EQ(SecureElementStatus::SUCCESS, statusReturned);
EXPECT_LE((unsigned int)3, response.selectResponse.size());
EXPECT_LE(1, response.channelNumber);
EXPECT_EQ(SecureElementStatus::SUCCESS, se_->closeChannel(response.channelNumber));
}
int main(int argc, char** argv) {
::testing::AddGlobalTestEnvironment(SecureElementHidlEnvironment::Instance());
::testing::InitGoogleTest(&argc, argv);
SecureElementHidlEnvironment::Instance()->init(&argc, argv);
int status = RUN_ALL_TESTS();
return status;
}