| Index: src/platform/vboot_reference/tests/firmware_rollback_tests.c
|
| diff --git a/src/platform/vboot_reference/tests/firmware_rollback_tests.c b/src/platform/vboot_reference/tests/firmware_rollback_tests.c
|
| index 3608db737fd87775f4ebad786815f226f3327b53..14c0475c3224ec72f5946d61eb315575b5d672df 100644
|
| --- a/src/platform/vboot_reference/tests/firmware_rollback_tests.c
|
| +++ b/src/platform/vboot_reference/tests/firmware_rollback_tests.c
|
| @@ -16,14 +16,14 @@
|
| #include "test_common.h"
|
|
|
| const char* kRootKeyPublicFile = "testkeys/key_rsa8192.keyb";
|
| +uint8_t kValidFirmwareData[1] = { 'F' };
|
| +uint8_t kCorruptFirmwareData[1] = { 'X' };
|
|
|
| /* Tests that check for correctness of the VerifyFirmwareDriver_f() logic
|
| * and rollback prevention. */
|
| void VerifyFirmwareDriverTest(void) {
|
| - uint8_t* valid_firmwareA = NULL;
|
| - uint8_t* valid_firmwareB = NULL;
|
| - uint8_t* corrupt_firmwareA = NULL;
|
| - uint8_t* corrupt_firmwareB = NULL;
|
| + uint8_t* verification_blobA = NULL;
|
| + uint8_t* verification_blobB = NULL;
|
| uint64_t len;
|
| uint8_t* root_key_pub = BufferFromFile(kRootKeyPublicFile, &len);
|
|
|
| @@ -31,43 +31,55 @@ void VerifyFirmwareDriverTest(void) {
|
| g_firmware_key_version = 1;
|
| g_firmware_version = 1;
|
|
|
| - valid_firmwareA = GenerateRollbackTestFirmwareBlob(1, 1, 0);
|
| - valid_firmwareB = GenerateRollbackTestFirmwareBlob(1, 1, 0);
|
| - corrupt_firmwareA = GenerateRollbackTestFirmwareBlob(1, 1, 1);
|
| - corrupt_firmwareB = GenerateRollbackTestFirmwareBlob(1, 1, 1);
|
| + verification_blobA = GenerateRollbackTestVerificationBlob(1, 1);
|
| + verification_blobB = GenerateRollbackTestVerificationBlob(1, 1);
|
|
|
| TEST_EQ(VerifyFirmwareDriver_f(root_key_pub,
|
| - valid_firmwareA, valid_firmwareB),
|
| + verification_blobA,
|
| + kValidFirmwareData,
|
| + verification_blobB,
|
| + kValidFirmwareData),
|
| BOOT_FIRMWARE_A_CONTINUE,
|
| "Firmware A (Valid with current version), "
|
| "Firmware B (Valid with current version)");
|
| TEST_EQ(VerifyFirmwareDriver_f(root_key_pub,
|
| - corrupt_firmwareA, valid_firmwareB),
|
| + verification_blobA,
|
| + kCorruptFirmwareData,
|
| + verification_blobB,
|
| + kValidFirmwareData),
|
| BOOT_FIRMWARE_B_CONTINUE,
|
| "Firmware A (Corrupt with current version), "
|
| - "FirmwareB (Valid with current version)");
|
| + "Firmware B (Valid with current version)");
|
| TEST_EQ(VerifyFirmwareDriver_f(root_key_pub,
|
| - valid_firmwareA, corrupt_firmwareB),
|
| + verification_blobA,
|
| + kValidFirmwareData,
|
| + verification_blobB,
|
| + kCorruptFirmwareData),
|
| BOOT_FIRMWARE_A_CONTINUE,
|
| "Firmware A (Valid with current version), "
|
| - "FirmwareB (Corrupt with current version)");
|
| + "Firmware B (Corrupt with current version)");
|
| TEST_EQ(VerifyFirmwareDriver_f(root_key_pub,
|
| - corrupt_firmwareA, corrupt_firmwareB),
|
| + verification_blobA,
|
| + kCorruptFirmwareData,
|
| + verification_blobB,
|
| + kCorruptFirmwareData),
|
| BOOT_FIRMWARE_RECOVERY_CONTINUE,
|
| "Firmware A (Corrupt with current version), "
|
| - "FirmwareB (Corrupt with current version");
|
| + "Firmware B (Corrupt with current version");
|
| g_firmware_key_version = 2;
|
| g_firmware_version = 2;
|
| - TEST_EQ(VerifyFirmwareDriver_f(root_key_pub, valid_firmwareA, valid_firmwareB),
|
| + TEST_EQ(VerifyFirmwareDriver_f(root_key_pub,
|
| + verification_blobA,
|
| + kValidFirmwareData,
|
| + verification_blobB,
|
| + kValidFirmwareData),
|
| BOOT_FIRMWARE_RECOVERY_CONTINUE,
|
| "Firmware A (Valid with old version), "
|
| "Old Firmware B (Valid with old version)");
|
|
|
| Free(root_key_pub);
|
| - Free(valid_firmwareA);
|
| - Free(valid_firmwareB);
|
| - Free(corrupt_firmwareA);
|
| - Free(corrupt_firmwareB);
|
| + Free(verification_blobA);
|
| + Free(verification_blobB);
|
| }
|
|
|
| int main(int argc, char* argv[]) {
|
|
|