Merge "Add validation to IpSecConfig algorithm setters"
am: a954f20f46
Change-Id: I7d241a4348fd1339ff7475ee9301c7fe6c7453c0
This commit is contained in:
@@ -231,6 +231,31 @@ public final class IpSecAlgorithm implements Parcelable {
|
||||
}
|
||||
}
|
||||
|
||||
/** @hide */
|
||||
public boolean isAuthentication() {
|
||||
switch (getName()) {
|
||||
// Fallthrough
|
||||
case AUTH_HMAC_MD5:
|
||||
case AUTH_HMAC_SHA1:
|
||||
case AUTH_HMAC_SHA256:
|
||||
case AUTH_HMAC_SHA384:
|
||||
case AUTH_HMAC_SHA512:
|
||||
return true;
|
||||
default:
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
/** @hide */
|
||||
public boolean isEncryption() {
|
||||
return getName().equals(CRYPT_AES_CBC);
|
||||
}
|
||||
|
||||
/** @hide */
|
||||
public boolean isAead() {
|
||||
return getName().equals(AUTH_CRYPT_AES_GCM);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String toString() {
|
||||
return new StringBuilder()
|
||||
|
||||
@@ -52,6 +52,7 @@ import android.util.SparseArray;
|
||||
|
||||
import com.android.internal.annotations.GuardedBy;
|
||||
import com.android.internal.annotations.VisibleForTesting;
|
||||
import com.android.internal.util.Preconditions;
|
||||
|
||||
import java.io.FileDescriptor;
|
||||
import java.io.IOException;
|
||||
@@ -1030,6 +1031,30 @@ public class IpSecService extends IIpSecService.Stub {
|
||||
releaseResource(userRecord.mEncapSocketRecords, resourceId);
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
void validateAlgorithms(IpSecConfig config, int direction) throws IllegalArgumentException {
|
||||
IpSecAlgorithm auth = config.getAuthentication(direction);
|
||||
IpSecAlgorithm crypt = config.getEncryption(direction);
|
||||
IpSecAlgorithm aead = config.getAuthenticatedEncryption(direction);
|
||||
|
||||
// Validate the algorithm set
|
||||
Preconditions.checkArgument(
|
||||
aead != null || crypt != null || auth != null,
|
||||
"No Encryption or Authentication algorithms specified");
|
||||
Preconditions.checkArgument(
|
||||
auth == null || auth.isAuthentication(),
|
||||
"Unsupported algorithm for Authentication");
|
||||
Preconditions.checkArgument(
|
||||
crypt == null || crypt.isEncryption(), "Unsupported algorithm for Encryption");
|
||||
Preconditions.checkArgument(
|
||||
aead == null || aead.isAead(),
|
||||
"Unsupported algorithm for Authenticated Encryption");
|
||||
Preconditions.checkArgument(
|
||||
aead == null || (auth == null && crypt == null),
|
||||
"Authenticated Encryption is mutually exclusive with other Authentication "
|
||||
+ "or Encryption algorithms");
|
||||
}
|
||||
|
||||
/**
|
||||
* Checks an IpSecConfig parcel to ensure that the contents are sane and throws an
|
||||
* IllegalArgumentException if they are not.
|
||||
@@ -1079,17 +1104,7 @@ public class IpSecService extends IIpSecService.Stub {
|
||||
}
|
||||
|
||||
for (int direction : DIRECTIONS) {
|
||||
IpSecAlgorithm crypt = config.getEncryption(direction);
|
||||
IpSecAlgorithm auth = config.getAuthentication(direction);
|
||||
IpSecAlgorithm authenticatedEncryption = config.getAuthenticatedEncryption(direction);
|
||||
if (authenticatedEncryption == null && crypt == null && auth == null) {
|
||||
throw new IllegalArgumentException(
|
||||
"No Encryption or Authentication algorithms specified");
|
||||
} else if (authenticatedEncryption != null && (auth != null || crypt != null)) {
|
||||
throw new IllegalArgumentException(
|
||||
"Authenticated Encryption is mutually"
|
||||
+ " exclusive with other Authentication or Encryption algorithms");
|
||||
}
|
||||
validateAlgorithms(config, direction);
|
||||
|
||||
// Retrieve SPI record; will throw IllegalArgumentException if not found
|
||||
userRecord.mSpiRecords.getResourceOrThrow(config.getSpiResourceId(direction));
|
||||
|
||||
@@ -347,64 +347,6 @@ public class IpSecServiceParameterizedTest {
|
||||
anyInt());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCreateInvalidConfigAeadWithAuth() throws Exception {
|
||||
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||
|
||||
for (int direction : DIRECTIONS) {
|
||||
ipSecConfig.setAuthentication(direction, AUTH_ALGO);
|
||||
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||
}
|
||||
|
||||
try {
|
||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||
fail(
|
||||
"IpSecService should have thrown an error on authentication being"
|
||||
+ " enabled with authenticated encryption");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCreateInvalidConfigAeadWithCrypt() throws Exception {
|
||||
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||
|
||||
for (int direction : DIRECTIONS) {
|
||||
ipSecConfig.setEncryption(direction, CRYPT_ALGO);
|
||||
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||
}
|
||||
|
||||
try {
|
||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||
fail(
|
||||
"IpSecService should have thrown an error on encryption being"
|
||||
+ " enabled with authenticated encryption");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCreateInvalidConfigAeadWithAuthAndCrypt() throws Exception {
|
||||
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||
addDefaultSpisAndRemoteAddrToIpSecConfig(ipSecConfig);
|
||||
|
||||
for (int direction : DIRECTIONS) {
|
||||
ipSecConfig.setAuthentication(direction, AUTH_ALGO);
|
||||
ipSecConfig.setEncryption(direction, CRYPT_ALGO);
|
||||
ipSecConfig.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||
}
|
||||
|
||||
try {
|
||||
mIpSecService.createTransportModeTransform(ipSecConfig, new Binder());
|
||||
fail(
|
||||
"IpSecService should have thrown an error on authentication and encryption being"
|
||||
+ " enabled with authenticated encryption");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testDeleteTransportModeTransform() throws Exception {
|
||||
IpSecConfig ipSecConfig = new IpSecConfig();
|
||||
|
||||
@@ -35,6 +35,8 @@ import static org.mockito.Mockito.when;
|
||||
|
||||
import android.content.Context;
|
||||
import android.net.INetd;
|
||||
import android.net.IpSecAlgorithm;
|
||||
import android.net.IpSecConfig;
|
||||
import android.net.IpSecManager;
|
||||
import android.net.IpSecSpiResponse;
|
||||
import android.net.IpSecTransform;
|
||||
@@ -76,6 +78,36 @@ public class IpSecServiceTest {
|
||||
|
||||
private static final InetAddress INADDR_ANY;
|
||||
|
||||
private static final byte[] AEAD_KEY = {
|
||||
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||||
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
|
||||
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
||||
0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F,
|
||||
0x73, 0x61, 0x6C, 0x74
|
||||
};
|
||||
private static final byte[] CRYPT_KEY = {
|
||||
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||||
0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
|
||||
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
||||
0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
|
||||
};
|
||||
private static final byte[] AUTH_KEY = {
|
||||
0x7A, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x7F,
|
||||
0x7A, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x7F
|
||||
};
|
||||
|
||||
private static final IpSecAlgorithm AUTH_ALGO =
|
||||
new IpSecAlgorithm(IpSecAlgorithm.AUTH_HMAC_SHA256, AUTH_KEY, AUTH_KEY.length * 4);
|
||||
private static final IpSecAlgorithm CRYPT_ALGO =
|
||||
new IpSecAlgorithm(IpSecAlgorithm.CRYPT_AES_CBC, CRYPT_KEY);
|
||||
private static final IpSecAlgorithm AEAD_ALGO =
|
||||
new IpSecAlgorithm(IpSecAlgorithm.AUTH_CRYPT_AES_GCM, AEAD_KEY, 128);
|
||||
|
||||
private static final int[] DIRECTIONS =
|
||||
new int[] {IpSecTransform.DIRECTION_IN, IpSecTransform.DIRECTION_OUT};
|
||||
|
||||
static {
|
||||
try {
|
||||
INADDR_ANY = InetAddress.getByAddress(new byte[] {0, 0, 0, 0});
|
||||
@@ -269,6 +301,127 @@ public class IpSecServiceTest {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAuth() {
|
||||
for (int direction : DIRECTIONS) {
|
||||
// Validate that correct algorithm type succeeds
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthentication(direction, AUTH_ALGO);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
|
||||
// Validate that incorrect algorithm types fails
|
||||
for (IpSecAlgorithm algo : new IpSecAlgorithm[] {CRYPT_ALGO, AEAD_ALGO}) {
|
||||
try {
|
||||
config = new IpSecConfig();
|
||||
config.setAuthentication(direction, algo);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
fail("Did not throw exception on invalid algorithm type");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsCrypt() {
|
||||
for (int direction : DIRECTIONS) {
|
||||
// Validate that correct algorithm type succeeds
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setEncryption(direction, CRYPT_ALGO);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
|
||||
// Validate that incorrect algorithm types fails
|
||||
for (IpSecAlgorithm algo : new IpSecAlgorithm[] {AUTH_ALGO, AEAD_ALGO}) {
|
||||
try {
|
||||
config = new IpSecConfig();
|
||||
config.setEncryption(direction, algo);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
fail("Did not throw exception on invalid algorithm type");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAead() {
|
||||
for (int direction : DIRECTIONS) {
|
||||
// Validate that correct algorithm type succeeds
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthenticatedEncryption(direction, AEAD_ALGO);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
|
||||
// Validate that incorrect algorithm types fails
|
||||
for (IpSecAlgorithm algo : new IpSecAlgorithm[] {AUTH_ALGO, CRYPT_ALGO}) {
|
||||
try {
|
||||
config = new IpSecConfig();
|
||||
config.setAuthenticatedEncryption(direction, algo);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
fail("Did not throw exception on invalid algorithm type");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAuthCrypt() {
|
||||
for (int direction : DIRECTIONS) {
|
||||
// Validate that correct algorithm type succeeds
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthentication(direction, AUTH_ALGO);
|
||||
config.setEncryption(direction, CRYPT_ALGO);
|
||||
mIpSecService.validateAlgorithms(config, direction);
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsNoAlgorithms() {
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
try {
|
||||
mIpSecService.validateAlgorithms(config, IpSecTransform.DIRECTION_IN);
|
||||
fail("Expected exception; no algorithms specified");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAeadWithAuth() {
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthenticatedEncryption(IpSecTransform.DIRECTION_IN, AEAD_ALGO);
|
||||
config.setAuthentication(IpSecTransform.DIRECTION_IN, AUTH_ALGO);
|
||||
try {
|
||||
mIpSecService.validateAlgorithms(config, IpSecTransform.DIRECTION_IN);
|
||||
fail("Expected exception; both AEAD and auth algorithm specified");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAeadWithCrypt() {
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthenticatedEncryption(IpSecTransform.DIRECTION_IN, AEAD_ALGO);
|
||||
config.setEncryption(IpSecTransform.DIRECTION_IN, CRYPT_ALGO);
|
||||
try {
|
||||
mIpSecService.validateAlgorithms(config, IpSecTransform.DIRECTION_IN);
|
||||
fail("Expected exception; both AEAD and crypt algorithm specified");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testValidateAlgorithmsAeadWithAuthAndCrypt() {
|
||||
IpSecConfig config = new IpSecConfig();
|
||||
config.setAuthenticatedEncryption(IpSecTransform.DIRECTION_IN, AEAD_ALGO);
|
||||
config.setAuthentication(IpSecTransform.DIRECTION_IN, AUTH_ALGO);
|
||||
config.setEncryption(IpSecTransform.DIRECTION_IN, CRYPT_ALGO);
|
||||
try {
|
||||
mIpSecService.validateAlgorithms(config, IpSecTransform.DIRECTION_IN);
|
||||
fail("Expected exception; AEAD, auth and crypt algorithm specified");
|
||||
} catch (IllegalArgumentException expected) {
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testDeleteInvalidTransportModeTransform() throws Exception {
|
||||
try {
|
||||
|
||||
Reference in New Issue
Block a user