Add backend id to database scheme
[platform/core/security/key-manager.git] / tests / test_db_crypto.cpp
index 215e691..a493448 100644 (file)
 #include <boost/test/unit_test.hpp>
-#include <boost/test/results_reporter.hpp>
 #include <unistd.h>
 #include <db-crypto.h>
 #include <iostream>
+#include <ckm/ckm-type.h>
 #include <ckm/ckm-error.h>
 #include <errno.h>
-
 #include <test_common.h>
-
-BOOST_GLOBAL_FIXTURE(TestConfig)
+#include <DBFixture.h>
 
 using namespace CKM;
 
-const char* default_alias = "alias";
-const char* default_label = "label";
-
-const char* crypto_db = "/tmp/testme.db";
-
+namespace
+{
 const int restricted_local = 1;
 const int restricted_global = 0;
 
-DBRow createDefaultRow(int restricted = restricted_local,
-        DBDataType type = DBDataType::BINARY_DATA) {
-    DBRow row;
-    row.alias = default_alias;
-    row.smackLabel = default_label;
-    row.exportable = 1;
-    row.restricted = restricted;
-    row.algorithmType = DBCMAlgType::AES_CBC_256;
-    row.dataType = type;
-    row.iv = createDefaultPass();
-
-    return row;
-}
+const unsigned int c_test_retries = 1000;
+const unsigned int c_num_names = 500;
+const unsigned int c_num_names_add_test = 5000;
+const unsigned int c_names_per_label = 15;
 
-void compareDBRow(const DBRow &lhs, const DBRow &rhs) {
-    BOOST_CHECK_MESSAGE(lhs.alias == rhs.alias,
-            "Aliases didn't match! Got: " << rhs.alias
-                << " , expected : " << lhs.alias);
+} // namespace anonymous
 
-    BOOST_CHECK_MESSAGE(lhs.smackLabel == rhs.smackLabel,
-            "smackLabel didn't match! Got: " << rhs.smackLabel
-                << " , expected : " << lhs.smackLabel);
+BOOST_FIXTURE_TEST_SUITE(DBCRYPTO_TEST, DBFixture)
+BOOST_AUTO_TEST_CASE(DBtestSimple) {
+    DB::Row rowPattern = create_default_row();
+    rowPattern.data = RawBuffer(32, 1);
+    rowPattern.dataSize = rowPattern.data.size();
+    rowPattern.tag = RawBuffer(AES_GCM_TAG_SIZE, 1);
 
-    BOOST_CHECK_MESSAGE(lhs.restricted == rhs.restricted,
-            "restricted didn't match! Got: " << rhs.restricted
-                << " , expected : " << lhs.restricted);
+    check_DB_integrity(rowPattern);
+}
+BOOST_AUTO_TEST_CASE(DBtestBIG) {
+    DB::Row rowPattern = create_default_row();
+    rowPattern.data = createBigBlob(4096);
+    rowPattern.dataSize = rowPattern.data.size();
+    rowPattern.tag = RawBuffer(AES_GCM_TAG_SIZE, 1);
 
-    BOOST_CHECK_MESSAGE(lhs.exportable == rhs.exportable,
-            "exportable didn't match! Got: " << rhs.exportable
-                << " , expected : " << lhs.exportable);
+    check_DB_integrity(rowPattern);
+}
+BOOST_AUTO_TEST_CASE(DBtestGlobal) {
+    DB::Row rowPattern = create_default_row();
+    rowPattern.data = RawBuffer(1024, 2);
+    rowPattern.dataSize = rowPattern.data.size();
+    rowPattern.tag = RawBuffer(AES_GCM_TAG_SIZE, 1);
 
-    BOOST_CHECK_MESSAGE(lhs.iv == rhs.iv,
-            "iv didn't match! Got: " << rhs.iv.size()
-                << " , expected : " << lhs.iv.size());
+    BOOST_REQUIRE_NO_THROW(m_db.saveRow(rowPattern));
 
-    BOOST_CHECK_MESSAGE(lhs.data == rhs.data,
-            "data didn't match! Got: " << rhs.data.size()
-                << " , expected : " << lhs.data.size());
+    DB::Row name_duplicate = rowPattern;
+    rowPattern.ownerLabel = rowPattern.ownerLabel + "1";
 }
+BOOST_AUTO_TEST_CASE(DBtestTransaction) {
+    DB::Row rowPattern = create_default_row();
+    rowPattern.data = RawBuffer(100, 20);
+    rowPattern.dataSize = rowPattern.data.size();
+    rowPattern.tag = RawBuffer(AES_GCM_TAG_SIZE, 1);
+    DB::Crypto::Transaction transaction(&m_db);
 
-void checkDBIntegrity(const DBRow &rowPattern, DBCrypto &db) {
+    BOOST_REQUIRE_NO_THROW(m_db.saveRow(rowPattern));
+    BOOST_REQUIRE_NO_THROW(transaction.rollback());
 
-    BOOST_REQUIRE_NO_THROW(db.saveDBRow(rowPattern));
-    DBRow selectRow = rowPattern;
+    DB::Crypto::RowOptional row_optional;
+    BOOST_REQUIRE_NO_THROW(row_optional = m_db.getRow(m_default_name, m_default_label,
+                                                      DataType::BINARY_DATA));
+    BOOST_CHECK_MESSAGE(!row_optional, "Row still present after rollback");
+}
 
-    DBCrypto::DBRowOptional optional_row;
-    BOOST_REQUIRE_NO_THROW(optional_row = db.getDBRow("alias", "label", DBDataType::BINARY_DATA));
-    BOOST_REQUIRE_MESSAGE(optional_row, "Select didn't return any row");
+BOOST_AUTO_TEST_CASE(DBtestBackend) {
+    DB::Row rowPattern = create_default_row();
+    rowPattern.data = RawBuffer(32, 1);
+    rowPattern.dataSize = rowPattern.data.size();
+    rowPattern.tag = RawBuffer(AES_GCM_TAG_SIZE, 1);
 
-    compareDBRow(selectRow, rowPattern);
-    DBRow alias_duplicate = rowPattern;
-    alias_duplicate.data = createDefaultPass();
-    alias_duplicate.dataSize = alias_duplicate.data.size();
+    rowPattern.backendId =  CryptoBackend::OpenSSL;
+    check_DB_integrity(rowPattern);
 
-    BOOST_REQUIRE_THROW(db.saveDBRow(alias_duplicate), DBCrypto::Exception::AliasExists);
-    BOOST_REQUIRE_NO_THROW(db.deleteDBRow("alias", "label"));
+    rowPattern.backendId =  CryptoBackend::TrustZone;
+    check_DB_integrity(rowPattern);
 
-    DBCrypto::DBRowOptional row_optional;
-    BOOST_REQUIRE_NO_THROW(row_optional = db.getDBRow("alias", "label", DBDataType::BINARY_DATA));
-    BOOST_REQUIRE_MESSAGE(!row_optional, "Select should not return row after deletion");
+    rowPattern.backendId =  CryptoBackend::None;
+    check_DB_integrity(rowPattern);
 }
 
-BOOST_AUTO_TEST_SUITE(DBCRYPTO_TEST)
-BOOST_AUTO_TEST_CASE(DBtestSimple) {
+BOOST_AUTO_TEST_SUITE_END()
 
-    BOOST_CHECK(unlink(crypto_db) == 0 || errno == ENOENT);
-    DBCrypto db;
-    BOOST_REQUIRE_NO_THROW(db = DBCrypto(crypto_db, defaultPass));
 
-    DBRow rowPattern = createDefaultRow();
-    rowPattern.data = SafeBuffer(32, 1);
-    rowPattern.dataSize = rowPattern.data.size();
 
-    checkDBIntegrity(rowPattern, db);
+BOOST_FIXTURE_TEST_SUITE(DBCRYPTO_PERF_TEST, DBFixture)
+
+BOOST_AUTO_TEST_CASE(DBperfAddNames)
+{
+    // actual test
+    performance_start("saveRow");
+    {
+        generate_perf_DB(c_num_names_add_test, c_names_per_label);
+    }
+    performance_stop(c_num_names_add_test);
 }
-BOOST_AUTO_TEST_CASE(DBtestBIG) {
-    BOOST_CHECK(unlink(crypto_db) == 0 || errno == ENOENT);
-    DBCrypto db;
-    BOOST_REQUIRE_NO_THROW(db = DBCrypto(crypto_db, defaultPass));
 
-    DBRow rowPattern = createDefaultRow();
-    rowPattern.data = createBigBlob(4096);
-    rowPattern.dataSize = rowPattern.data.size();
+BOOST_AUTO_TEST_CASE(DBperfLookupAliasByOwner)
+{
+    // prepare data
+    generate_perf_DB(c_num_names, c_names_per_label);
+
+    unsigned int num_labels = c_num_names/c_names_per_label;
+    Name name;
+    Label label;
+
+    // actual test - successful lookup
+    performance_start("getRow");
+    for(unsigned int t=0; t<c_test_retries; t++)
+    {
+        int label_num = rand() % num_labels;
+        generate_label(label_num, label);
+
+        unsigned int start_name = label_num*c_names_per_label;
+        for(unsigned int name_num=start_name; name_num<(start_name+c_names_per_label); name_num++)
+        {
+            generate_name(name_num, name);
+            read_row_expect_success(name, label);
+        }
+    }
+    performance_stop(c_test_retries * c_num_names);
+}
 
-    checkDBIntegrity(rowPattern, db);
+BOOST_AUTO_TEST_CASE(DBperfLookupAliasRandomOwnershipNoPermissions)
+{
+    // prepare data
+    generate_perf_DB(c_num_names, c_names_per_label);
+
+    Name name;
+    Label owner_label;
+    Label smack_label;
+    unsigned int num_labels = c_num_names / c_names_per_label;
+
+    // actual test - random lookup
+    performance_start("getRow");
+    for(unsigned int t=0; t<c_test_retries; t++)
+    {
+        int name_idx = rand()%c_num_names;
+        generate_name(name_idx, name);
+        generate_label(name_idx/c_names_per_label, owner_label);
+        generate_label(rand()%num_labels, smack_label);
+
+        // do not care of result
+        m_db.getRow(name, owner_label, DataType::BINARY_DATA);
+    }
+    performance_stop(c_test_retries * c_num_names);
 }
-BOOST_AUTO_TEST_CASE(DBtestGlobal) {
-    BOOST_CHECK(unlink(crypto_db) == 0 || errno == ENOENT);
-    DBCrypto db;
-    BOOST_REQUIRE_NO_THROW(db = DBCrypto(crypto_db, defaultPass));
 
-    DBRow rowPattern = createDefaultRow(restricted_global);
-    rowPattern.data = SafeBuffer(1024, 2);
-    rowPattern.dataSize = rowPattern.data.size();
+BOOST_AUTO_TEST_CASE(DBperfAddPermissions)
+{
+    // prepare data
+    generate_perf_DB(c_num_names, c_names_per_label);
 
-    BOOST_REQUIRE_NO_THROW(db.saveDBRow(rowPattern));
+    // actual test - add access rights
+    performance_start("setPermission");
+    long iterations = add_full_access_rights(c_num_names, c_names_per_label);
+    performance_stop(iterations);
+}
 
-    DBRow alias_duplicate = rowPattern;
-    rowPattern.smackLabel = rowPattern.smackLabel + "1";
+BOOST_AUTO_TEST_CASE(DBperfAliasRemoval)
+{
+    // prepare data
+    generate_perf_DB(c_num_names, c_names_per_label);
+    add_full_access_rights(c_num_names, c_names_per_label);
+
+    // actual test - random lookup
+    performance_start("deleteRow");
+    Name name;
+    Label label;
+    for(unsigned int t=0; t<c_num_names; t++)
+    {
+        generate_name(t, name);
+        generate_label(t/c_names_per_label, label);
+
+        BOOST_REQUIRE_NO_THROW(m_db.deleteRow(name, label));
+    }
+    performance_stop(c_num_names);
+
+    // verify everything has been removed
+    unsigned int num_labels = c_num_names / c_names_per_label;
+    for(unsigned int l=0; l<num_labels; l++)
+    {
+        generate_label(l, label);
+        LabelNameVector expect_no_data;
+        BOOST_REQUIRE_NO_THROW(m_db.listNames(label, expect_no_data, DataType::BINARY_DATA));
+        BOOST_REQUIRE(0 == expect_no_data.size());
+    }
+}
 
-    BOOST_REQUIRE_THROW(db.saveDBRow(alias_duplicate),
-            DBCrypto::Exception::AliasExists);
+BOOST_AUTO_TEST_CASE(DBperfGetAliasList)
+{
+    // prepare data
+    generate_perf_DB(c_num_names, c_names_per_label);
+    add_full_access_rights(c_num_names, c_names_per_label);
+
+    unsigned int num_labels = c_num_names / c_names_per_label;
+    Label label;
+
+    // actual test - random lookup
+    performance_start("listNames");
+    for(unsigned int t=0; t<(c_test_retries/num_labels); t++)
+    {
+        LabelNameVector ret_list;
+        generate_label(rand()%num_labels, label);
+
+        BOOST_REQUIRE_NO_THROW(m_db.listNames(label, ret_list, DataType::BINARY_DATA));
+        BOOST_REQUIRE(c_num_names == ret_list.size());
+        ret_list.clear();
+    }
+    performance_stop(c_test_retries/num_labels);
 }
-BOOST_AUTO_TEST_CASE(DBtestTransaction) {
-    BOOST_CHECK(unlink(crypto_db) == 0 || errno == ENOENT);
-    DBCrypto db;
-    BOOST_REQUIRE_NO_THROW(db = DBCrypto(crypto_db, defaultPass));
+BOOST_AUTO_TEST_SUITE_END()
 
-    DBRow rowPattern = createDefaultRow(0);
-    rowPattern.data = SafeBuffer(100, 20);
-    rowPattern.dataSize = rowPattern.data.size();
-    DBCrypto::Transaction transaction(&db);
 
-    BOOST_REQUIRE_NO_THROW(db.saveDBRow(rowPattern));
-    BOOST_REQUIRE_NO_THROW(transaction.rollback());
+BOOST_AUTO_TEST_SUITE(DBCRYPTO_MIGRATION_TEST)
+namespace
+{
+const unsigned migration_names = 16107;
+const unsigned migration_labels = 273;
+const unsigned migration_reference_label_idx = 0;
+const unsigned migration_accessed_element_idx = 7;
+
+void verifyDBisValid(DBFixture & fixture)
+{
+    /**
+     * there are (migration_labels), each having (migration_names)/(migration_labels) entries.
+     * reference label (migration_reference_label_idx) exists such that it has access to
+     * all others' label element with index (migration_accessed_element_idx).
+     *
+     * Example:
+     * - migration_label_63 has access to all items owned by migration_label_63,
+     *   which gives (migration_names)/(migration_labels) entries.
+     *
+     * - migration_label_0 (0 is the reference label) has access to all items
+     *   owned by migration_label_0 and all others' label element index 7,
+     *   which gives (migration_names)/(migration_labels)  + (migration_labels-1) entries.
+     *
+     */
+    Label reference_label;
+    fixture.generate_label(migration_reference_label_idx, reference_label);
+
+    // check number of elements accessible to the reference label
+    LabelNameVector ret_list;
+    BOOST_REQUIRE_NO_THROW(fixture.m_db.listNames(reference_label, ret_list, DataType::BINARY_DATA));
+    BOOST_REQUIRE((migration_names/migration_labels)/*own items*/ + (migration_labels-1)/*other labels'*/ == ret_list.size());
+    ret_list.clear();
+
+    // check number of elements accessible to the other labels
+    for(unsigned int l=0; l<migration_labels; l++)
+    {
+        // bypass the reference owner label
+        if(l == migration_reference_label_idx)
+            continue;
+
+        Label current_label;
+        fixture.generate_label(l, current_label);
+        BOOST_REQUIRE_NO_THROW(fixture.m_db.listNames(current_label, ret_list, DataType::BINARY_DATA));
+        BOOST_REQUIRE((migration_names/migration_labels) == ret_list.size());
+        for(auto it: ret_list)
+            BOOST_REQUIRE(it.first == current_label);
+        ret_list.clear();
+    }
+}
 
-    DBCrypto::DBRowOptional row_optional;
-    BOOST_REQUIRE_NO_THROW(row_optional = db.getDBRow(default_alias, default_label,
-            DBDataType::BINARY_DATA));
-    BOOST_CHECK_MESSAGE(!row_optional, "Row still present after rollback");
+struct DBVer1Migration : public DBFixture
+{
+    DBVer1Migration() : DBFixture("/usr/share/ckm-db-test/testme_ver1.db")
+    {}
+};
+
+struct DBVer2Migration : public DBFixture
+{
+    DBVer2Migration() : DBFixture("/usr/share/ckm-db-test/testme_ver2.db")
+    {}
+};
+
+struct DBVer3Migration : public DBFixture
+{
+    DBVer3Migration() : DBFixture("/usr/share/ckm-db-test/testme_ver3.db")
+    {}
+};
+}
+
+BOOST_AUTO_TEST_CASE(DBMigrationDBVer1)
+{
+    DBVer1Migration DBver1;
+    verifyDBisValid(DBver1);
+}
 
+BOOST_AUTO_TEST_CASE(DBMigrationDBVer2)
+{
+    DBVer2Migration DBver2;
+    verifyDBisValid(DBver2);
 }
+
+BOOST_AUTO_TEST_CASE(DBMigrationDBVer3)
+{
+    DBVer3Migration DBver3;
+    verifyDBisValid(DBver3);
+}
+
+BOOST_AUTO_TEST_CASE(DBMigrationDBCurrent)
+{
+    DBFixture currentDB;
+
+    // prepare data using current DB mechanism
+    Label reference_label;
+    currentDB.generate_label(migration_reference_label_idx, reference_label);
+    {
+        currentDB.generate_perf_DB(migration_names, migration_names/migration_labels);
+
+        // only the reference label has access to the other labels element <migration_accessed_element_idx>
+        for(unsigned int l=0; l<migration_labels; l++)
+        {
+            // bypass the reference owner label
+            if(l == migration_reference_label_idx)
+                continue;
+
+            unsigned element_index = migration_accessed_element_idx + l*migration_names/migration_labels;
+
+            // add permission
+            Name accessed_name;
+            currentDB.generate_name(element_index, accessed_name);
+            Label current_label;
+            currentDB.generate_label(l, current_label);
+            currentDB.add_permission(accessed_name, current_label, reference_label);
+        }
+    }
+
+    verifyDBisValid(currentDB);
+}
+
 BOOST_AUTO_TEST_SUITE_END()