| /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| * Use of this source code is governed by a BSD-style license that can be |
| * found in the LICENSE file. |
| * |
| * Common functions used by tests. |
| */ |
| |
| #include "test_common.h" |
| |
| #include <stdio.h> |
| |
| #include "cryptolib.h" |
| #include "file_keys.h" |
| #include "utility.h" |
| |
| /* ANSI Color coding sequences. */ |
| #define COL_GREEN "\e[1;32m" |
| #define COL_RED "\e[0;31m" |
| #define COL_STOP "\e[m" |
| |
| /* Global test success flag. */ |
| int gTestSuccess = 1; |
| |
| int TEST_EQ(int result, int expected_result, char* testname) { |
| if (result == expected_result) { |
| fprintf(stderr, "%s Test " COL_GREEN "PASSED\n" COL_STOP, testname); |
| return 1; |
| } |
| else { |
| fprintf(stderr, "%s Test " COL_RED "FAILED\n" COL_STOP, testname); |
| gTestSuccess = 0; |
| return 0; |
| } |
| } |
| |
| int TEST_NEQ(int result, int not_expected_result, char* testname) { |
| if (result != not_expected_result) { |
| fprintf(stderr, "%s Test " COL_GREEN "PASSED\n" COL_STOP, testname); |
| return 1; |
| } |
| else { |
| fprintf(stderr, "%s Test " COL_RED "FAILED\n" COL_STOP, testname); |
| gTestSuccess = 0; |
| return 0; |
| } |
| } |
| |
| KernelImage* GenerateTestKernelImage(int firmware_sign_algorithm, |
| int kernel_sign_algorithm, |
| const uint8_t* kernel_sign_key, |
| int kernel_key_version, |
| int kernel_version, |
| uint64_t kernel_len, |
| const char* firmware_key_file, |
| const char* kernel_key_file, |
| uint8_t kernel_data_fill_char) { |
| KernelImage* image = KernelImageNew(); |
| |
| Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE); |
| image->header_version = 1; |
| image->firmware_sign_algorithm = firmware_sign_algorithm; |
| image->kernel_sign_algorithm = kernel_sign_algorithm; |
| image->kernel_key_version = kernel_key_version; |
| image->kernel_sign_key = (uint8_t*) Malloc( |
| RSAProcessedKeySize(image->kernel_sign_algorithm)); |
| Memcpy(image->kernel_sign_key, kernel_sign_key, |
| RSAProcessedKeySize(image->kernel_sign_algorithm)); |
| |
| /* Update correct header length. */ |
| image->header_len = GetKernelHeaderLen(image); |
| |
| /* Calculate SHA-512 digest on header and populate header_checksum. */ |
| CalculateKernelHeaderChecksum(image, image->header_checksum); |
| |
| /* Populate kernel options and data with dummy data. */ |
| image->kernel_version = kernel_version; |
| image->bootloader_offset = 0; |
| image->bootloader_size = 512; |
| image->padded_header_size = 100; |
| image->kernel_len = kernel_len; |
| image->kernel_key_signature = image->kernel_signature = NULL; |
| image->kernel_data = Malloc(kernel_len); |
| Memset(image->kernel_data, kernel_data_fill_char, kernel_len); |
| |
| /* Generate and populate signatures. */ |
| if (!AddKernelKeySignature(image, firmware_key_file)) { |
| debug("Couldn't create key signature.\n"); |
| KernelImageFree(image); |
| return NULL; |
| } |
| |
| if (!AddKernelSignature(image, kernel_key_file)) { |
| debug("Couldn't create kernel option and kernel signature.\n"); |
| KernelImageFree(image); |
| return NULL; |
| } |
| |
| return image; |
| } |
| |
| uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm, |
| int kernel_sign_algorithm, |
| const uint8_t* kernel_sign_key, |
| int kernel_key_version, |
| int kernel_version, |
| uint64_t kernel_len, |
| const char* firmware_key_file, |
| const char* kernel_key_file) { |
| KernelImage* image = NULL; |
| uint8_t* kernel_blob = NULL; |
| uint64_t kernel_blob_len = 0; |
| |
| image = GenerateTestKernelImage(firmware_sign_algorithm, |
| kernel_sign_algorithm, |
| kernel_sign_key, |
| kernel_key_version, |
| kernel_version, |
| kernel_len, |
| firmware_key_file, |
| kernel_key_file, |
| 'K'); |
| |
| kernel_blob = GetKernelBlob(image, &kernel_blob_len); |
| KernelImageFree(image); |
| return kernel_blob; |
| } |
| |
| uint8_t* GenerateRollbackTestKernelBlob(int kernel_key_version, |
| int kernel_version, |
| int is_corrupt) { |
| KernelImage* image = NULL; |
| uint64_t len; |
| uint8_t* kernel_blob = NULL; |
| uint8_t* kernel_sign_key = NULL; |
| kernel_sign_key = BufferFromFile("testkeys/key_rsa1024.keyb", |
| &len); |
| if (!kernel_sign_key) |
| return NULL; |
| image = GenerateTestKernelImage(0, /* Firmware algo: RSA1024/SHA1 */ |
| 0, /* Kernel algo: RSA1024/SHA1 */ |
| kernel_sign_key, |
| kernel_key_version, |
| kernel_version, |
| 1, /* kernel length. */ |
| "testkeys/key_rsa1024.pem", |
| "testkeys/key_rsa1024.pem", |
| 'K'); |
| if (!image) |
| return NULL; |
| if (is_corrupt) { |
| /* Invalidate image. */ |
| Memset(image->kernel_data, 'X', image->kernel_len); |
| } |
| kernel_blob = GetKernelBlob(image, &len); |
| KernelImageFree(image); |
| return kernel_blob; |
| } |