Merge "Implement FilePackage class"

This commit is contained in:
Tianjie Xu 2019-03-15 17:40:52 +00:00 committed by Gerrit Code Review
commit 698dc08561
8 changed files with 273 additions and 17 deletions

View file

@ -151,6 +151,7 @@ cc_defaults {
static_libs: [
"librecovery_fastboot",
"libminui",
"libpackage",
"libverifier",
"libotautil",
@ -175,7 +176,6 @@ cc_library_static {
"fsck_unshare_blocks.cpp",
"fuse_sdcard_provider.cpp",
"install.cpp",
"package.cpp",
"recovery.cpp",
"roots.cpp",
],
@ -210,6 +210,29 @@ cc_library_static {
],
}
cc_library_static {
name: "libpackage",
recovery_available: true,
defaults: [
"recovery_defaults",
],
srcs: [
"package.cpp",
],
shared_libs: [
"libbase",
"libcrypto",
"libziparchive",
],
static_libs: [
"libotautil",
],
}
cc_binary {
name: "recovery",
recovery: true,

View file

@ -17,10 +17,12 @@
#include "package.h"
#include <string.h>
#include <unistd.h>
#include <android-base/file.h>
#include <android-base/logging.h>
#include <android-base/stringprintf.h>
#include <openssl/sha.h>
#include <android-base/unique_fd.h>
#include "otautil/error_code.h"
#include "otautil/sysutil.h"
@ -67,14 +69,38 @@ class MemoryPackage : public Package {
ZipArchiveHandle zip_handle_;
};
// TODO(xunchang) Implement the PackageFromFd.
void Package::SetProgress(float progress) {
if (set_progress_) {
set_progress_(progress);
}
}
class FilePackage : public Package {
public:
FilePackage(android::base::unique_fd&& fd, uint64_t file_size, const std::string& path,
const std::function<void(float)>& set_progress);
~FilePackage() override;
uint64_t GetPackageSize() const override {
return package_size_;
}
bool ReadFullyAtOffset(uint8_t* buffer, uint64_t byte_count, uint64_t offset) override;
ZipArchiveHandle GetZipArchiveHandle() override;
bool UpdateHashAtOffset(const std::vector<HasherUpdateCallback>& hashers, uint64_t start,
uint64_t length) override;
private:
android::base::unique_fd fd_; // The underlying fd to the open package.
uint64_t package_size_;
std::string path_; // The physical path to the package.
ZipArchiveHandle zip_handle_;
};
std::unique_ptr<Package> Package::CreateMemoryPackage(
const std::string& path, const std::function<void(float)>& set_progress) {
std::unique_ptr<MemMapping> mmap = std::make_unique<MemMapping>();
@ -86,6 +112,23 @@ std::unique_ptr<Package> Package::CreateMemoryPackage(
return std::make_unique<MemoryPackage>(path, std::move(mmap), set_progress);
}
std::unique_ptr<Package> Package::CreateFilePackage(
const std::string& path, const std::function<void(float)>& set_progress) {
android::base::unique_fd fd(open(path.c_str(), O_RDONLY));
if (fd == -1) {
PLOG(ERROR) << "Failed to open " << path;
return nullptr;
}
off64_t file_size = lseek64(fd.get(), 0, SEEK_END);
if (file_size == -1) {
PLOG(ERROR) << "Failed to get the package size";
return nullptr;
}
return std::make_unique<FilePackage>(std::move(fd), file_size, path, set_progress);
}
std::unique_ptr<Package> Package::CreateMemoryPackage(
std::vector<uint8_t> content, const std::function<void(float)>& set_progress) {
return std::make_unique<MemoryPackage>(std::move(content), set_progress);
@ -152,3 +195,68 @@ ZipArchiveHandle MemoryPackage::GetZipArchiveHandle() {
return zip_handle_;
}
FilePackage::FilePackage(android::base::unique_fd&& fd, uint64_t file_size, const std::string& path,
const std::function<void(float)>& set_progress)
: fd_(std::move(fd)), package_size_(file_size), path_(path), zip_handle_(nullptr) {
set_progress_ = set_progress;
}
FilePackage::~FilePackage() {
if (zip_handle_) {
CloseArchive(zip_handle_);
}
}
bool FilePackage::ReadFullyAtOffset(uint8_t* buffer, uint64_t byte_count, uint64_t offset) {
if (byte_count > package_size_ || offset > package_size_ - byte_count) {
LOG(ERROR) << "Out of bound read, offset: " << offset << ", size: " << byte_count
<< ", total package_size: " << package_size_;
return false;
}
if (!android::base::ReadFullyAtOffset(fd_.get(), buffer, byte_count, offset)) {
PLOG(ERROR) << "Failed to read " << byte_count << " bytes data at offset " << offset;
return false;
}
return true;
}
bool FilePackage::UpdateHashAtOffset(const std::vector<HasherUpdateCallback>& hashers,
uint64_t start, uint64_t length) {
if (length > package_size_ || start > package_size_ - length) {
LOG(ERROR) << "Out of bound read, offset: " << start << ", size: " << length
<< ", total package_size: " << package_size_;
return false;
}
uint64_t so_far = 0;
while (so_far < length) {
uint64_t read_size = std::min<uint64_t>(length - so_far, 16 * MiB);
std::vector<uint8_t> buffer(read_size);
if (!ReadFullyAtOffset(buffer.data(), read_size, start + so_far)) {
return false;
}
for (const auto& hasher : hashers) {
hasher(buffer.data(), read_size);
}
so_far += read_size;
}
return true;
}
ZipArchiveHandle FilePackage::GetZipArchiveHandle() {
if (zip_handle_) {
return zip_handle_;
}
if (auto err = OpenArchiveFd(fd_.get(), path_.c_str(), &zip_handle_); err != 0) {
LOG(ERROR) << "Can't open package" << path_ << " : " << ErrorCodeString(err);
return nullptr;
}
return zip_handle_;
}

View file

@ -32,6 +32,13 @@
// interface for both packages loaded in memory and packages read from fd.
class Package : public VerifierInterface {
public:
static std::unique_ptr<Package> CreateMemoryPackage(
const std::string& path, const std::function<void(float)>& set_progress);
static std::unique_ptr<Package> CreateMemoryPackage(
std::vector<uint8_t> content, const std::function<void(float)>& set_progress);
static std::unique_ptr<Package> CreateFilePackage(const std::string& path,
const std::function<void(float)>& set_progress);
virtual ~Package() = default;
// Opens the package as a zip file and returns the ZipArchiveHandle.
@ -40,12 +47,6 @@ class Package : public VerifierInterface {
// Updates the progress in fraction during package verification.
void SetProgress(float progress) override;
static std::unique_ptr<Package> CreateMemoryPackage(
const std::string& path, const std::function<void(float)>& set_progress);
static std::unique_ptr<Package> CreateMemoryPackage(
std::vector<uint8_t> content, const std::function<void(float)>& set_progress);
protected:
// An optional function to update the progress.
std::function<void(float)> set_progress_;

View file

@ -77,6 +77,7 @@ librecovery_static_libs = [
"librecovery",
"librecovery_fastboot",
"libminui",
"libpackage",
"libverifier",
"libotautil",
@ -117,6 +118,7 @@ cc_test {
static_libs: libapplypatch_static_libs + [
"librecovery_ui",
"libminui",
"libpackage",
"libverifier",
"libotautil",
"libupdater",

View file

@ -240,8 +240,10 @@ class VerifierTest : public testing::TestWithParam<std::vector<std::string>> {
void SetUp() override {
std::vector<std::string> args = GetParam();
std::string path = from_testdata_base(args[0]);
package_ = Package::CreateMemoryPackage(path, nullptr);
ASSERT_NE(nullptr, package_);
memory_package_ = Package::CreateMemoryPackage(path, nullptr);
ASSERT_NE(nullptr, memory_package_);
file_package_ = Package::CreateFilePackage(path, nullptr);
ASSERT_NE(nullptr, file_package_);
for (auto it = ++args.cbegin(); it != args.cend(); ++it) {
std::string public_key_file = from_testdata_base("testkey_" + *it + ".x509.pem");
@ -250,7 +252,8 @@ class VerifierTest : public testing::TestWithParam<std::vector<std::string>> {
}
}
std::unique_ptr<Package> package_;
std::unique_ptr<Package> memory_package_;
std::unique_ptr<Package> file_package_;
std::vector<Certificate> certs_;
};
@ -304,11 +307,13 @@ TEST(VerifierTest, BadPackage_SignatureStartOutOfBounds) {
}
TEST_P(VerifierSuccessTest, VerifySucceed) {
ASSERT_EQ(VERIFY_SUCCESS, verify_file(package_.get(), certs_));
ASSERT_EQ(VERIFY_SUCCESS, verify_file(memory_package_.get(), certs_));
ASSERT_EQ(VERIFY_SUCCESS, verify_file(file_package_.get(), certs_));
}
TEST_P(VerifierFailureTest, VerifyFailure) {
ASSERT_EQ(VERIFY_FAILURE, verify_file(package_.get(), certs_));
ASSERT_EQ(VERIFY_FAILURE, verify_file(memory_package_.get(), certs_));
ASSERT_EQ(VERIFY_FAILURE, verify_file(file_package_.get(), certs_));
}
INSTANTIATE_TEST_CASE_P(SingleKeySuccess, VerifierSuccessTest,

117
tests/unit/package_test.cpp Normal file
View file

@ -0,0 +1,117 @@
/*
* Copyright (C) 2019 The Android Open Source Project
*
* Licensed under the Apache License, version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agree to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <stdio.h>
#include <functional>
#include <string>
#include <vector>
#include <android-base/file.h>
#include <gtest/gtest.h>
#include <openssl/sha.h>
#include <ziparchive/zip_writer.h>
#include "common/test_constants.h"
#include "package.h"
class PackageTest : public ::testing::Test {
protected:
void SetUp() override;
// A list of package classes for test, including MemoryPackage and FilePackage.
std::vector<std::unique_ptr<Package>> packages_;
TemporaryFile temp_file_; // test package file.
std::string file_content_; // actual bytes of the package file.
};
void PackageTest::SetUp() {
std::vector<std::string> entries = { "file1.txt", "file2.txt", "dir1/file3.txt" };
FILE* file_ptr = fdopen(temp_file_.release(), "wb");
ZipWriter writer(file_ptr);
for (const auto& entry : entries) {
ASSERT_EQ(0, writer.StartEntry(entry.c_str(), ZipWriter::kCompress));
ASSERT_EQ(0, writer.WriteBytes(entry.c_str(), entry.size()));
ASSERT_EQ(0, writer.FinishEntry());
}
writer.Finish();
ASSERT_EQ(0, fclose(file_ptr));
ASSERT_TRUE(android::base::ReadFileToString(temp_file_.path, &file_content_));
auto memory_package = Package::CreateMemoryPackage(temp_file_.path, nullptr);
ASSERT_TRUE(memory_package);
packages_.emplace_back(std::move(memory_package));
auto file_package = Package::CreateFilePackage(temp_file_.path, nullptr);
ASSERT_TRUE(file_package);
packages_.emplace_back(std::move(file_package));
}
TEST_F(PackageTest, ReadFullyAtOffset_success) {
for (const auto& package : packages_) {
std::vector<uint8_t> buffer(file_content_.size());
ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 0));
ASSERT_EQ(file_content_, std::string(buffer.begin(), buffer.end()));
ASSERT_TRUE(package->ReadFullyAtOffset(buffer.data(), file_content_.size() - 10, 10));
ASSERT_EQ(file_content_.substr(10), std::string(buffer.begin(), buffer.end() - 10));
}
}
TEST_F(PackageTest, ReadFullyAtOffset_failure) {
for (const auto& package : packages_) {
std::vector<uint8_t> buffer(file_content_.size());
// Out of bound read.
ASSERT_FALSE(package->ReadFullyAtOffset(buffer.data(), file_content_.size(), 10));
}
}
TEST_F(PackageTest, UpdateHashAtOffset_sha1_hash) {
// Check that the hash matches for first half of the file.
uint64_t hash_size = file_content_.size() / 2;
std::vector<uint8_t> expected_sha(SHA_DIGEST_LENGTH);
SHA1(reinterpret_cast<uint8_t*>(file_content_.data()), hash_size, expected_sha.data());
for (const auto& package : packages_) {
SHA_CTX ctx;
SHA1_Init(&ctx);
std::vector<HasherUpdateCallback> hashers{ std::bind(&SHA1_Update, &ctx, std::placeholders::_1,
std::placeholders::_2) };
package->UpdateHashAtOffset(hashers, 0, hash_size);
std::vector<uint8_t> calculated_sha(SHA_DIGEST_LENGTH);
SHA1_Final(calculated_sha.data(), &ctx);
ASSERT_EQ(expected_sha, calculated_sha);
}
}
TEST_F(PackageTest, GetZipArchiveHandle_extract_entry) {
for (const auto& package : packages_) {
ZipArchiveHandle zip = package->GetZipArchiveHandle();
ASSERT_TRUE(zip);
// Check that we can extract one zip entry.
std::string entry_name = "dir1/file3.txt";
ZipString path(entry_name.c_str());
ZipEntry entry;
ASSERT_EQ(0, FindEntry(zip, path, &entry));
std::vector<uint8_t> extracted(entry_name.size());
ASSERT_EQ(0, ExtractToMemory(zip, &entry, extracted.data(), extracted.size()));
ASSERT_EQ(entry_name, std::string(extracted.begin(), extracted.end()));
}
}

View file

@ -39,8 +39,6 @@
#include "asn1_decoder.h"
#include "otautil/print_sha1.h"
static constexpr size_t MiB = 1024 * 1024;
/*
* Simple version of PKCS#7 SignedData extraction. This extracts the
* signature OCTET STRING to be used for signature verification.

View file

@ -27,6 +27,8 @@
#include <openssl/rsa.h>
#include <openssl/sha.h>
constexpr size_t MiB = 1024 * 1024;
using HasherUpdateCallback = std::function<void(const uint8_t* addr, uint64_t size)>;
struct RSADeleter {