Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(113)

Side by Side Diff: src/platform/vboot_reference/tests/firmware_image_tests.c

Issue 661353: Vboot Reference: Refactor Code. (Closed)
Patch Set: Review Fixes. Created 10 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be 2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file. 3 * found in the LICENSE file.
4 * 4 *
5 * Tests for firmware image library. 5 * Tests for firmware image library.
6 */ 6 */
7 7
8 #include <stdio.h> 8 #include <stdio.h>
9 #include <stdlib.h> 9 #include <stdlib.h>
10 10
(...skipping 13 matching lines...) Expand all
24 fprintf(stderr, "%s Test " COL_GREEN " PASSED\n" COL_STOP, testname); 24 fprintf(stderr, "%s Test " COL_GREEN " PASSED\n" COL_STOP, testname);
25 return 1; 25 return 1;
26 } 26 }
27 else { 27 else {
28 fprintf(stderr, "%s Test " COL_RED " FAILED\n" COL_STOP, testname); 28 fprintf(stderr, "%s Test " COL_RED " FAILED\n" COL_STOP, testname);
29 return 0; 29 return 0;
30 } 30 }
31 } 31 }
32 32
33 FirmwareImage* GenerateTestFirmwareImage(int algorithm, 33 FirmwareImage* GenerateTestFirmwareImage(int algorithm,
34 uint8_t* sign_key, 34 uint8_t* firmware_sign_key,
35 int key_version, 35 int firmware_key_version,
36 int firmware_version, 36 int firmware_version,
37 int firmware_len) { 37 int firmware_len) {
38 FirmwareImage* image = FirmwareImageNew(); 38 FirmwareImage* image = FirmwareImageNew();
39 uint8_t* header_checksum; 39 uint8_t* header_checksum;
40 DigestContext ctx; 40 DigestContext ctx;
41 41
42 Memcpy(image->magic, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE); 42 Memcpy(image->magic, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE);
43 image->sign_algorithm = algorithm; 43 image->firmware_sign_algorithm = algorithm;
44 image->sign_key = (uint8_t*) Malloc( 44 image->firmware_sign_key = (uint8_t*) Malloc(
45 RSAProcessedKeySize(image->sign_algorithm)); 45 RSAProcessedKeySize(image->firmware_sign_algorithm));
46 Memcpy(image->sign_key, sign_key, RSAProcessedKeySize(image->sign_algorithm)); 46 Memcpy(image->firmware_sign_key, firmware_sign_key,
47 image->key_version = key_version; 47 RSAProcessedKeySize(image->firmware_sign_algorithm));
48 image->firmware_key_version = firmware_key_version;
48 49
49 /* Update correct header length. */ 50 /* Update correct header length. */
50 image->header_len = (sizeof(image->header_len) + 51 image->header_len = (sizeof(image->header_len) +
51 sizeof(image->sign_algorithm) + 52 sizeof(image->firmware_sign_algorithm) +
52 RSAProcessedKeySize(image->sign_algorithm) + 53 RSAProcessedKeySize(image->firmware_sign_algorithm) +
53 sizeof(image->key_version) + 54 sizeof(image->firmware_key_version) +
54 sizeof(image->header_checksum)); 55 sizeof(image->header_checksum));
55 56
56 /* Calculate SHA-512 digest on header and populate header_checksum. */ 57 /* Calculate SHA-512 digest on header and populate header_checksum. */
57 DigestInit(&ctx, ROOT_SIGNATURE_ALGORITHM); 58 DigestInit(&ctx, ROOT_SIGNATURE_ALGORITHM);
58 DigestUpdate(&ctx, (uint8_t*) &image->header_len, 59 DigestUpdate(&ctx, (uint8_t*) &image->header_len,
59 sizeof(image->header_len)); 60 sizeof(image->header_len));
60 DigestUpdate(&ctx, (uint8_t*) &image->sign_algorithm, 61 DigestUpdate(&ctx, (uint8_t*) &image->firmware_sign_algorithm,
61 sizeof(image->sign_algorithm)); 62 sizeof(image->firmware_sign_algorithm));
62 DigestUpdate(&ctx, image->sign_key, 63 DigestUpdate(&ctx, image->firmware_sign_key,
63 RSAProcessedKeySize(image->sign_algorithm)); 64 RSAProcessedKeySize(image->firmware_sign_algorithm));
64 DigestUpdate(&ctx, (uint8_t*) &image->key_version, 65 DigestUpdate(&ctx, (uint8_t*) &image->firmware_key_version,
65 sizeof(image->key_version)); 66 sizeof(image->firmware_key_version));
66 header_checksum = DigestFinal(&ctx); 67 header_checksum = DigestFinal(&ctx);
67 Memcpy(image->header_checksum, header_checksum, SHA512_DIGEST_SIZE); 68 Memcpy(image->header_checksum, header_checksum, SHA512_DIGEST_SIZE);
68 Free(header_checksum); 69 Free(header_checksum);
69 70
70 71
71 /* Populate firmware and preamble with dummy data. */ 72 /* Populate firmware and preamble with dummy data. */
72 image->firmware_version = firmware_version; 73 image->firmware_version = firmware_version;
73 image->firmware_len = firmware_len; 74 image->firmware_len = firmware_len;
74 image->preamble_signature = image->firmware_signature = NULL; 75 image->preamble_signature = image->firmware_signature = NULL;
75 Memset(image->preamble, 'P', FIRMWARE_PREAMBLE_SIZE); 76 Memset(image->preamble, 'P', FIRMWARE_PREAMBLE_SIZE);
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after
137 "FirmwareImage Tamper Verification (Dev Mode)")) 138 "FirmwareImage Tamper Verification (Dev Mode)"))
138 success = 0; 139 success = 0;
139 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_DISABLED), 140 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_DISABLED),
140 VERIFY_FIRMWARE_SIGNATURE_FAILED, 141 VERIFY_FIRMWARE_SIGNATURE_FAILED,
141 "FirmwareImage Tamper Verification (Trusted)")) 142 "FirmwareImage Tamper Verification (Trusted)"))
142 success = 0; 143 success = 0;
143 image->firmware_data[0] = 'F'; 144 image->firmware_data[0] = 'F';
144 145
145 146
146 fprintf(stderr, "[[Tampering with root key signature...]]\n"); 147 fprintf(stderr, "[[Tampering with root key signature...]]\n");
147 image->key_signature[0] = 0xFF; 148 image->firmware_key_signature[0] = 0xFF;
148 image->key_signature[1] = 0x00; 149 image->firmware_key_signature[1] = 0x00;
149 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_ENABLED), 150 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_ENABLED),
150 VERIFY_FIRMWARE_SUCCESS, 151 VERIFY_FIRMWARE_SUCCESS,
151 "FirmwareImage Root Signature Tamper Verification (Dev Mode)")) 152 "FirmwareImage Root Signature Tamper Verification (Dev Mode)"))
152 success = 0; 153 success = 0;
153 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_DISABLED), 154 if (!TEST_EQ(VerifyFirmwareImage(root_key, image, DEV_MODE_DISABLED),
154 VERIFY_FIRMWARE_ROOT_SIGNATURE_FAILED, 155 VERIFY_FIRMWARE_ROOT_SIGNATURE_FAILED,
155 "FirmwareImage Root Signature Tamper Verification (Trusted)")) 156 "FirmwareImage Root Signature Tamper Verification (Trusted)"))
156 success = 0; 157 success = 0;
157 158
158 return success; 159 return success;
159 } 160 }
160 161
161 int main(int argc, char* argv[]) { 162 int main(int argc, char* argv[]) {
162 uint32_t len; 163 uint32_t len;
163 uint8_t* sign_key_buf = NULL; 164 uint8_t* firmware_sign_key_buf = NULL;
164 uint8_t* root_key_blob = NULL; 165 uint8_t* root_key_blob = NULL;
165 uint8_t* firmware_blob = NULL; 166 uint8_t* firmware_blob = NULL;
167 int firmware_blob_len = 0;
166 FirmwareImage* image = NULL; 168 FirmwareImage* image = NULL;
167 RSAPublicKey* root_key = NULL; 169 RSAPublicKey* root_key = NULL;
168 int error_code = 1; 170 int error_code = 1;
169 char* tmp_firmwareblob_file = ".tmpFirmwareBlob";
170 171
171 if(argc != 6) { 172 if(argc != 6) {
172 fprintf(stderr, "Usage: %s <algorithm> <root key> <processed root pubkey>" 173 fprintf(stderr, "Usage: %s <algorithm> <root key> <processed root pubkey>"
173 " <signing key> <processed signing key>\n", argv[0]); 174 " <signing key> <processed signing key>\n", argv[0]);
174 return -1; 175 return -1;
175 } 176 }
176 177
177 /* Read verification keys and create a test image. */ 178 /* Read verification keys and create a test image. */
178 root_key = RSAPublicKeyFromFile(argv[3]); 179 root_key = RSAPublicKeyFromFile(argv[3]);
179 root_key_blob = BufferFromFile(argv[3], &len); 180 root_key_blob = BufferFromFile(argv[3], &len);
180 sign_key_buf = BufferFromFile(argv[5], &len); 181 firmware_sign_key_buf = BufferFromFile(argv[5], &len);
181 image = GenerateTestFirmwareImage(atoi(argv[1]), sign_key_buf, 1, 182 image = GenerateTestFirmwareImage(atoi(argv[1]), firmware_sign_key_buf, 1,
182 1, 1000); 183 1, 1000);
183 184
184 if (!root_key || !sign_key_buf || !image) { 185 if (!root_key || !firmware_sign_key_buf || !image) {
185 error_code = 1; 186 error_code = 1;
186 goto failure; 187 goto failure;
187 } 188 }
188 189
189 /* Generate and populate signatures. */ 190 /* Generate and populate signatures. */
190 if (!AddFirmwareKeySignature(image, argv[2])) { 191 if (!AddFirmwareKeySignature(image, argv[2])) {
191 fprintf(stderr, "Couldn't create key signature.\n"); 192 fprintf(stderr, "Couldn't create key signature.\n");
192 error_code = 1; 193 error_code = 1;
193 goto failure; 194 goto failure;
194 } 195 }
195 196
196 if (!AddFirmwareSignature(image, argv[4], image->sign_algorithm)) { 197 if (!AddFirmwareSignature(image, argv[4])) {
197 fprintf(stderr, "Couldn't create firmware and preamble signature.\n"); 198 fprintf(stderr, "Couldn't create firmware and preamble signature.\n");
198 error_code = 1; 199 error_code = 1;
199 goto failure; 200 goto failure;
200 } 201 }
201 202
202 203 firmware_blob = GetFirmwareBlob(image, &firmware_blob_len);
203 /* Generate a firmware binary blob from image.
204 *
205 * TODO(gauravsh): There should be a function to directly generate a binary
206 * blob buffer from a FirmwareImage instead of indirectly writing to a file
207 * and reading it into a buffer.
208 */
209 if (!WriteFirmwareImage(tmp_firmwareblob_file, image)) {
210 fprintf(stderr, "Couldn't create a temporary firmware blob file.\n");
211 error_code = 1;
212 goto failure;
213 }
214 firmware_blob = BufferFromFile(tmp_firmwareblob_file, &len);
215 204
216 /* Test Firmware blob verify operations. */ 205 /* Test Firmware blob verify operations. */
217 if (!VerifyFirmwareTest(firmware_blob, root_key_blob)) 206 if (!VerifyFirmwareTest(firmware_blob, root_key_blob))
218 error_code = 255; 207 error_code = 255;
219 208
220 /* Test FirmwareImage verify operations. */ 209 /* Test FirmwareImage verify operations. */
221 if (!VerifyFirmwareImageTest(image, root_key)) 210 if (!VerifyFirmwareImageTest(image, root_key))
222 error_code = 255; 211 error_code = 255;
223 if (!VerifyFirmwareImageTamperTest(image, root_key)) 212 if (!VerifyFirmwareImageTamperTest(image, root_key))
224 error_code = 255; 213 error_code = 255;
225 214
226 failure: 215 failure:
227 Free(firmware_blob); 216 Free(firmware_blob);
228 Free(image); 217 Free(image);
229 Free(sign_key_buf); 218 Free(firmware_sign_key_buf);
230 Free(root_key_blob); 219 Free(root_key_blob);
231 Free(root_key); 220 Free(root_key);
232 221
233 return error_code; 222 return error_code;
234 } 223 }
OLDNEW
« no previous file with comments | « src/platform/vboot_reference/tests/Makefile ('k') | src/platform/vboot_reference/tests/kernel_image_tests.c » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698