//
// Copyright (C) 2015 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "tpm_manager/server/tpm2_initializer_impl.h"
#include <memory>
#include <gmock/gmock.h>
#include <gtest/gtest.h>
#include <trunks/mock_tpm_utility.h>
#include <trunks/trunks_factory_for_test.h>
#include "tpm_manager/common/tpm_manager_constants.h"
#include "tpm_manager/server/mock_local_data_store.h"
#include "tpm_manager/server/mock_openssl_crypto_util.h"
#include "tpm_manager/server/mock_tpm_status.h"
using testing::_;
using testing::DoAll;
using testing::NiceMock;
using testing::Return;
using testing::SaveArg;
using testing::SetArgPointee;
namespace tpm_manager {
class Tpm2InitializerTest : public testing::Test {
public:
Tpm2InitializerTest() = default;
virtual ~Tpm2InitializerTest() = default;
void SetUp() {
trunks::TrunksFactoryForTest* factory = new trunks::TrunksFactoryForTest();
factory->set_tpm_utility(&mock_tpm_utility_);
tpm_initializer_.reset(new Tpm2InitializerImpl(factory,
&mock_openssl_util_,
&mock_data_store_,
&mock_tpm_status_));
}
protected:
NiceMock<MockOpensslCryptoUtil> mock_openssl_util_;
NiceMock<MockLocalDataStore> mock_data_store_;
NiceMock<MockTpmStatus> mock_tpm_status_;
NiceMock<trunks::MockTpmUtility> mock_tpm_utility_;
std::unique_ptr<TpmInitializer> tpm_initializer_;
};
TEST_F(Tpm2InitializerTest, InitializeTpmNoSeedTpm) {
EXPECT_CALL(mock_tpm_utility_, StirRandom(_, _))
.WillRepeatedly(Return(trunks::TPM_RC_FAILURE));
EXPECT_FALSE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmAlreadyOwned) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillRepeatedly(Return(true));
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(_, _, _))
.Times(0);
EXPECT_TRUE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmLocalDataReadError) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillRepeatedly(Return(false));
EXPECT_CALL(mock_data_store_, Read(_))
.WillRepeatedly(Return(false));
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(_, _, _))
.Times(0);
EXPECT_FALSE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmLocalDataWriteError) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillRepeatedly(Return(false));
EXPECT_CALL(mock_data_store_, Write(_))
.WillRepeatedly(Return(false));
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(_, _, _))
.Times(0);
EXPECT_FALSE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmOwnershipError) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillOnce(Return(false));
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(_, _, _))
.WillRepeatedly(Return(trunks::TPM_RC_FAILURE));
EXPECT_FALSE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmSuccess) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillOnce(Return(false));
std::string owner_password;
std::string endorsement_password;
std::string lockout_password;
LocalData local_data;
EXPECT_CALL(mock_data_store_, Read(_))
.WillOnce(DoAll(SetArgPointee<0>(local_data),
Return(true)));
EXPECT_CALL(mock_tpm_utility_, GenerateRandom(_, _, _))
.Times(3) // Once for owner, endorsement and lockout passwords
.WillRepeatedly(Return(trunks::TPM_RC_SUCCESS));
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(_, _, _))
.WillOnce(Return(trunks::TPM_RC_SUCCESS));
EXPECT_TRUE(tpm_initializer_->InitializeTpm());
}
TEST_F(Tpm2InitializerTest, InitializeTpmSuccessAfterError) {
EXPECT_CALL(mock_tpm_status_, IsTpmOwned())
.WillOnce(Return(false));
std::string owner_password("owner");
std::string endorsement_password("endorsement");
std::string lockout_password("lockout");
LocalData local_data;
local_data.add_owner_dependency(kTestDependency);
local_data.set_owner_password(owner_password);
local_data.set_endorsement_password(endorsement_password);
local_data.set_lockout_password(lockout_password);
EXPECT_CALL(mock_data_store_, Read(_))
.WillOnce(DoAll(SetArgPointee<0>(local_data),
Return(true)));
EXPECT_CALL(mock_data_store_, Write(_))
.WillOnce(DoAll(SaveArg<0>(&local_data),
Return(true)));
EXPECT_EQ(1, local_data.owner_dependency_size());
EXPECT_EQ(kTestDependency, local_data.owner_dependency(0));
EXPECT_EQ(owner_password, local_data.owner_password());
EXPECT_EQ(endorsement_password, local_data.endorsement_password());
EXPECT_EQ(lockout_password, local_data.lockout_password());
EXPECT_CALL(mock_tpm_utility_, TakeOwnership(owner_password,
endorsement_password,
lockout_password))
.WillOnce(Return(trunks::TPM_RC_SUCCESS));
EXPECT_TRUE(tpm_initializer_->InitializeTpm());
}
} // namespace tpm_manager