| Index: tests/vboot_common3_tests.c
|
| diff --git a/tests/vboot_common3_tests.c b/tests/vboot_common3_tests.c
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..a4e69fd19aa2183469df053f21fa8644c1ae8d0f
|
| --- /dev/null
|
| +++ b/tests/vboot_common3_tests.c
|
| @@ -0,0 +1,295 @@
|
| +/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
|
| + * Use of this source code is governed by a BSD-style license that can be
|
| + * found in the LICENSE file.
|
| + *
|
| + * Tests for firmware image library.
|
| + */
|
| +
|
| +#include <stdio.h>
|
| +#include <stdlib.h>
|
| +
|
| +#include "cryptolib.h"
|
| +#include "file_keys.h"
|
| +#include "firmware_image.h"
|
| +#include "host_common.h"
|
| +#include "test_common.h"
|
| +#include "utility.h"
|
| +#include "vboot_common.h"
|
| +
|
| +
|
| +static void ReChecksumKeyBlock(VbKeyBlockHeader *h) {
|
| + uint8_t* newchk = DigestBuf((const uint8_t*)h,
|
| + h->key_block_checksum.data_size,
|
| + SHA512_DIGEST_ALGORITHM);
|
| + Memcpy(GetSignatureData(&h->key_block_checksum), newchk, SHA512_DIGEST_SIZE);
|
| + Free(newchk);
|
| +}
|
| +
|
| +
|
| +static void VerifyKeyBlockTest(const VbPublicKey* public_key,
|
| + const VbPrivateKey* private_key,
|
| + const VbPublicKey* data_key) {
|
| +
|
| + VbKeyBlockHeader *hdr;
|
| + VbKeyBlockHeader *h;
|
| + uint64_t hsize;
|
| +
|
| + hdr = CreateKeyBlock(data_key, private_key, 0x1234);
|
| + TEST_NEQ((size_t)hdr, 0, "VerifyKeyBlock() prerequisites");
|
| + if (!hdr)
|
| + return;
|
| + hsize = hdr->key_block_size;
|
| + h = (VbKeyBlockHeader*)Malloc(hsize + 1024);
|
| +
|
| + TEST_EQ(VerifyKeyBlock(hdr, hsize, NULL), 0,
|
| + "VerifyKeyBlock() ok using checksum");
|
| + TEST_EQ(VerifyKeyBlock(hdr, hsize, public_key), 0,
|
| + "VerifyKeyBlock() ok using key");
|
| +
|
| + TEST_NEQ(VerifyKeyBlock(hdr, hsize-1, NULL), 0, "VerifyKeyBlock() size");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->magic[0] &= 0x12;
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0, "VerifyKeyBlock() magic");
|
| +
|
| + /* Care about major version but not minor */
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_major++;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0, "VerifyKeyBlock() major++");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_major--;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0, "VerifyKeyBlock() major--");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_minor++;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_EQ(VerifyKeyBlock(h, hsize, NULL), 0, "VerifyKeyBlock() minor++");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_minor--;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_EQ(VerifyKeyBlock(h, hsize, NULL), 0, "VerifyKeyBlock() minor--");
|
| +
|
| + /* Check hash */
|
| + Memcpy(h, hdr, hsize);
|
| + h->key_block_checksum.sig_offset = hsize;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0,
|
| + "VerifyKeyBlock() checksum off end");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->key_block_checksum.sig_size /= 2;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0,
|
| + "VerifyKeyBlock() checksum too small");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + GetPublicKeyData(&h->data_key)[0] ^= 0x34;
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0,
|
| + "VerifyKeyBlock() checksum mismatch");
|
| +
|
| + /* Check signature */
|
| + Memcpy(h, hdr, hsize);
|
| + h->key_block_signature.sig_offset = hsize;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, public_key), 0,
|
| + "VerifyKeyBlock() sig off end");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->key_block_signature.sig_size--;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, public_key), 0,
|
| + "VerifyKeyBlock() sig too small");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + GetPublicKeyData(&h->data_key)[0] ^= 0x34;
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, public_key), 0,
|
| + "VerifyKeyBlock() sig mismatch");
|
| +
|
| + /* Check that we signed header and data key */
|
| + Memcpy(h, hdr, hsize);
|
| + h->key_block_checksum.data_size = 4;
|
| + h->data_key.key_offset = 0;
|
| + h->data_key.key_size = 0;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0,
|
| + "VerifyKeyBlock() didn't sign header");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->data_key.key_offset = hsize;
|
| + ReChecksumKeyBlock(h);
|
| + TEST_NEQ(VerifyKeyBlock(h, hsize, NULL), 0,
|
| + "VerifyKeyBlock() data key off end");
|
| +
|
| + /* TODO: verify parser can support a bigger header (i.e., one where
|
| + * data_key.key_offset is bigger than expected). */
|
| +
|
| + Free(h);
|
| + Free(hdr);
|
| +}
|
| +
|
| +
|
| +static void ReSignFirmwarePreamble(VbFirmwarePreambleHeader *h,
|
| + const VbPrivateKey *key) {
|
| + VbSignature *sig = CalculateSignature((const uint8_t*)h,
|
| + h->preamble_signature.data_size, key);
|
| +
|
| + SignatureCopy(&h->preamble_signature, sig);
|
| + Free(sig);
|
| +}
|
| +
|
| +
|
| +static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key,
|
| + const VbPrivateKey* private_key,
|
| + const VbPublicKey* kernel_subkey) {
|
| +
|
| + VbFirmwarePreambleHeader *hdr;
|
| + VbFirmwarePreambleHeader *h;
|
| + RSAPublicKey* rsa;
|
| + uint64_t hsize;
|
| +
|
| + /* Create a dummy signature */
|
| + VbSignature *body_sig = SignatureAlloc(56, 78);
|
| +
|
| + rsa = PublicKeyToRSA(public_key);
|
| + hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key);
|
| + TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble2() prerequisites");
|
| + if (!hdr)
|
| + return;
|
| + hsize = hdr->preamble_size;
|
| + h = (VbFirmwarePreambleHeader*)Malloc(hsize + 16384);
|
| +
|
| + TEST_EQ(VerifyFirmwarePreamble2(hdr, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() ok using key");
|
| + TEST_NEQ(VerifyFirmwarePreamble2(hdr, hsize-1, rsa), 0,
|
| + "VerifyFirmwarePreamble2() size");
|
| +
|
| + /* Care about major version but not minor */
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_major++;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() major++");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_major--;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() major--");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_minor++;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_EQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() minor++");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->header_version_minor--;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_EQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() minor--");
|
| +
|
| + /* Check signature */
|
| + Memcpy(h, hdr, hsize);
|
| + h->preamble_signature.sig_offset = hsize;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() sig off end");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->preamble_signature.sig_size--;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() sig too small");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + GetPublicKeyData(&h->kernel_subkey)[0] ^= 0x34;
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() sig mismatch");
|
| +
|
| + /* Check that we signed header, kernel subkey, and body sig */
|
| + Memcpy(h, hdr, hsize);
|
| + h->preamble_signature.data_size = 4;
|
| + h->kernel_subkey.key_offset = 0;
|
| + h->kernel_subkey.key_size = 0;
|
| + h->body_signature.sig_offset = 0;
|
| + h->body_signature.sig_size = 0;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() didn't sign header");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->kernel_subkey.key_offset = hsize;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() kernel subkey off end");
|
| +
|
| + Memcpy(h, hdr, hsize);
|
| + h->body_signature.sig_offset = hsize;
|
| + ReSignFirmwarePreamble(h, private_key);
|
| + TEST_NEQ(VerifyFirmwarePreamble2(h, hsize, rsa), 0,
|
| + "VerifyFirmwarePreamble2() body sig off end");
|
| +
|
| + /* TODO: verify parser can support a bigger header. */
|
| +
|
| + Free(h);
|
| + RSAPublicKeyFree(rsa);
|
| + Free(hdr);
|
| +}
|
| +
|
| +
|
| +int main(int argc, char* argv[]) {
|
| + VbPrivateKey* signing_private_key = NULL;
|
| + VbPublicKey* signing_public_key = NULL;
|
| + int signing_key_algorithm;
|
| +
|
| + VbPublicKey* data_public_key = NULL;
|
| + int data_key_algorithm;
|
| +
|
| + int error_code = 0;
|
| +
|
| + if(argc != 7) {
|
| + fprintf(stderr, "Usage: %s <signing_key_algorithm> <data_key_algorithm>"
|
| + " <signing key> <processed signing pubkey>"
|
| + " <data key> <processed data pubkey>\n", argv[0]);
|
| + return -1;
|
| + }
|
| +
|
| + /* Read verification keys and create a test image. */
|
| + signing_key_algorithm = atoi(argv[1]);
|
| + data_key_algorithm = atoi(argv[2]);
|
| +
|
| + signing_private_key = PrivateKeyRead(argv[3], signing_key_algorithm);
|
| + if (!signing_private_key) {
|
| + fprintf(stderr, "Error reading signing_private_key");
|
| + return 1;
|
| + }
|
| +
|
| + signing_public_key = PublicKeyRead(argv[4], signing_key_algorithm, 1);
|
| + if (!signing_public_key) {
|
| + fprintf(stderr, "Error reading signing_public_key");
|
| + return 1;
|
| + }
|
| +
|
| + data_public_key = PublicKeyRead(argv[6], data_key_algorithm, 1);
|
| + if (!data_public_key) {
|
| + fprintf(stderr, "Error reading data_public_key");
|
| + return 1;
|
| + }
|
| +
|
| + VerifyKeyBlockTest(signing_public_key, signing_private_key, data_public_key);
|
| + VerifyFirmwarePreambleTest(signing_public_key, signing_private_key,
|
| + data_public_key);
|
| +
|
| + if (signing_public_key)
|
| + Free(signing_public_key);
|
| + if (signing_private_key)
|
| + Free(signing_private_key);
|
| + if (data_public_key)
|
| + Free(data_public_key);
|
| +
|
| + return error_code;
|
| +}
|
|
|