OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * Tests for firmware image library. | 5 * Tests for firmware image library. |
6 */ | 6 */ |
7 | 7 |
8 #include <stdio.h> | 8 #include <stdio.h> |
9 #include <stdlib.h> | 9 #include <stdlib.h> |
10 | 10 |
(...skipping 13 matching lines...) Expand all Loading... |
24 Free(newchk); | 24 Free(newchk); |
25 } | 25 } |
26 | 26 |
27 | 27 |
28 static void KeyBlockVerifyTest(const VbPublicKey* public_key, | 28 static void KeyBlockVerifyTest(const VbPublicKey* public_key, |
29 const VbPrivateKey* private_key, | 29 const VbPrivateKey* private_key, |
30 const VbPublicKey* data_key) { | 30 const VbPublicKey* data_key) { |
31 | 31 |
32 VbKeyBlockHeader *hdr; | 32 VbKeyBlockHeader *hdr; |
33 VbKeyBlockHeader *h; | 33 VbKeyBlockHeader *h; |
34 uint64_t hsize; | 34 unsigned hsize; |
35 | 35 |
36 hdr = KeyBlockCreate(data_key, private_key, 0x1234); | 36 hdr = KeyBlockCreate(data_key, private_key, 0x1234); |
37 TEST_NEQ((size_t)hdr, 0, "KeyBlockVerify() prerequisites"); | 37 TEST_NEQ((size_t)hdr, 0, "KeyBlockVerify() prerequisites"); |
38 if (!hdr) | 38 if (!hdr) |
39 return; | 39 return; |
40 hsize = hdr->key_block_size; | 40 hsize = (unsigned) hdr->key_block_size; |
41 h = (VbKeyBlockHeader*)Malloc(hsize + 1024); | 41 h = (VbKeyBlockHeader*)Malloc(hsize + 1024); |
42 | 42 |
43 TEST_EQ(KeyBlockVerify(hdr, hsize, NULL), 0, | 43 TEST_EQ(KeyBlockVerify(hdr, hsize, NULL), 0, |
44 "KeyBlockVerify() ok using checksum"); | 44 "KeyBlockVerify() ok using checksum"); |
45 TEST_EQ(KeyBlockVerify(hdr, hsize, public_key), 0, | 45 TEST_EQ(KeyBlockVerify(hdr, hsize, public_key), 0, |
46 "KeyBlockVerify() ok using key"); | 46 "KeyBlockVerify() ok using key"); |
47 | 47 |
48 TEST_NEQ(KeyBlockVerify(hdr, hsize - 1, NULL), 0, "KeyBlockVerify() size--"); | 48 TEST_NEQ(KeyBlockVerify(hdr, hsize - 1, NULL), 0, "KeyBlockVerify() size--"); |
49 TEST_EQ(KeyBlockVerify(hdr, hsize + 1, NULL), 0, "KeyBlockVerify() size++"); | 49 TEST_EQ(KeyBlockVerify(hdr, hsize + 1, NULL), 0, "KeyBlockVerify() size++"); |
50 | 50 |
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
142 } | 142 } |
143 | 143 |
144 | 144 |
145 static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key, | 145 static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key, |
146 const VbPrivateKey* private_key, | 146 const VbPrivateKey* private_key, |
147 const VbPublicKey* kernel_subkey) { | 147 const VbPublicKey* kernel_subkey) { |
148 | 148 |
149 VbFirmwarePreambleHeader *hdr; | 149 VbFirmwarePreambleHeader *hdr; |
150 VbFirmwarePreambleHeader *h; | 150 VbFirmwarePreambleHeader *h; |
151 RSAPublicKey* rsa; | 151 RSAPublicKey* rsa; |
152 uint64_t hsize; | 152 unsigned hsize; |
153 | 153 |
154 /* Create a dummy signature */ | 154 /* Create a dummy signature */ |
155 VbSignature *body_sig = SignatureAlloc(56, 78); | 155 VbSignature *body_sig = SignatureAlloc(56, 78); |
156 | 156 |
157 rsa = PublicKeyToRSA(public_key); | 157 rsa = PublicKeyToRSA(public_key); |
158 hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key); | 158 hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key); |
159 TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble2() prerequisites"); | 159 TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble2() prerequisites"); |
160 if (!hdr) | 160 if (!hdr) |
161 return; | 161 return; |
162 hsize = hdr->preamble_size; | 162 hsize = (unsigned) hdr->preamble_size; |
163 h = (VbFirmwarePreambleHeader*)Malloc(hsize + 16384); | 163 h = (VbFirmwarePreambleHeader*)Malloc(hsize + 16384); |
164 | 164 |
165 TEST_EQ(VerifyFirmwarePreamble2(hdr, hsize, rsa), 0, | 165 TEST_EQ(VerifyFirmwarePreamble2(hdr, hsize, rsa), 0, |
166 "VerifyFirmwarePreamble2() ok using key"); | 166 "VerifyFirmwarePreamble2() ok using key"); |
167 TEST_NEQ(VerifyFirmwarePreamble2(hdr, hsize - 1, rsa), 0, | 167 TEST_NEQ(VerifyFirmwarePreamble2(hdr, hsize - 1, rsa), 0, |
168 "VerifyFirmwarePreamble2() size--"); | 168 "VerifyFirmwarePreamble2() size--"); |
169 TEST_EQ(VerifyFirmwarePreamble2(hdr, hsize + 1, rsa), 0, | 169 TEST_EQ(VerifyFirmwarePreamble2(hdr, hsize + 1, rsa), 0, |
170 "VerifyFirmwarePreamble2() size++"); | 170 "VerifyFirmwarePreamble2() size++"); |
171 | 171 |
172 /* Care about major version but not minor */ | 172 /* Care about major version but not minor */ |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
288 | 288 |
289 if (signing_public_key) | 289 if (signing_public_key) |
290 Free(signing_public_key); | 290 Free(signing_public_key); |
291 if (signing_private_key) | 291 if (signing_private_key) |
292 Free(signing_private_key); | 292 Free(signing_private_key); |
293 if (data_public_key) | 293 if (data_public_key) |
294 Free(data_public_key); | 294 Free(data_public_key); |
295 | 295 |
296 return error_code; | 296 return error_code; |
297 } | 297 } |
OLD | NEW |