Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 1 | /* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 2 | * Use of this source code is governed by a BSD-style license that can be |
| 3 | * found in the LICENSE file. |
| 4 | * |
| 5 | * Tests for firmware image library. |
| 6 | */ |
| 7 | |
| 8 | #include <stdio.h> |
| 9 | #include <stdlib.h> |
| 10 | |
| 11 | #include "cryptolib.h" |
| 12 | #include "file_keys.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 13 | #include "host_common.h" |
| 14 | #include "test_common.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 15 | #include "vboot_common.h" |
| 16 | |
| 17 | |
| 18 | static void ReChecksumKeyBlock(VbKeyBlockHeader *h) { |
| 19 | uint8_t* newchk = DigestBuf((const uint8_t*)h, |
| 20 | h->key_block_checksum.data_size, |
| 21 | SHA512_DIGEST_ALGORITHM); |
| 22 | Memcpy(GetSignatureData(&h->key_block_checksum), newchk, SHA512_DIGEST_SIZE); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 23 | free(newchk); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 24 | } |
| 25 | |
| 26 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 27 | static void KeyBlockVerifyTest(const VbPublicKey* public_key, |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 28 | const VbPrivateKey* private_key, |
| 29 | const VbPublicKey* data_key) { |
| 30 | |
| 31 | VbKeyBlockHeader *hdr; |
| 32 | VbKeyBlockHeader *h; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 33 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 34 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 35 | hdr = KeyBlockCreate(data_key, private_key, 0x1234); |
| 36 | TEST_NEQ((size_t)hdr, 0, "KeyBlockVerify() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 37 | if (!hdr) |
| 38 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 39 | hsize = (unsigned) hdr->key_block_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 40 | h = (VbKeyBlockHeader*)malloc(hsize + 1024); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 41 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 42 | TEST_EQ(KeyBlockVerify(hdr, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 43 | "KeyBlockVerify() ok using checksum"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 44 | TEST_EQ(KeyBlockVerify(hdr, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 45 | "KeyBlockVerify() ok using key"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 46 | TEST_NEQ(KeyBlockVerify(hdr, hsize, NULL, 0), 0, |
| 47 | "KeyBlockVerify() missing key"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 48 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 49 | TEST_NEQ(KeyBlockVerify(hdr, hsize - 1, NULL, 1), 0, |
| 50 | "KeyBlockVerify() size--"); |
| 51 | TEST_EQ(KeyBlockVerify(hdr, hsize + 1, NULL, 1), 0, |
| 52 | "KeyBlockVerify() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 53 | |
| 54 | Memcpy(h, hdr, hsize); |
| 55 | h->magic[0] &= 0x12; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 56 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() magic"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 57 | |
| 58 | /* Care about major version but not minor */ |
| 59 | Memcpy(h, hdr, hsize); |
| 60 | h->header_version_major++; |
| 61 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 62 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 63 | |
| 64 | Memcpy(h, hdr, hsize); |
| 65 | h->header_version_major--; |
| 66 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 67 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 68 | |
| 69 | Memcpy(h, hdr, hsize); |
| 70 | h->header_version_minor++; |
| 71 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 72 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 73 | |
| 74 | Memcpy(h, hdr, hsize); |
| 75 | h->header_version_minor--; |
| 76 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 77 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 78 | |
| 79 | /* Check hash */ |
| 80 | Memcpy(h, hdr, hsize); |
| 81 | h->key_block_checksum.sig_offset = hsize; |
| 82 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 83 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 84 | "KeyBlockVerify() checksum off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 85 | |
| 86 | Memcpy(h, hdr, hsize); |
| 87 | h->key_block_checksum.sig_size /= 2; |
| 88 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 89 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 90 | "KeyBlockVerify() checksum too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 91 | |
| 92 | Memcpy(h, hdr, hsize); |
| 93 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 94 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 95 | "KeyBlockVerify() checksum mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 96 | |
| 97 | /* Check signature */ |
| 98 | Memcpy(h, hdr, hsize); |
| 99 | h->key_block_signature.sig_offset = hsize; |
| 100 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 101 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 102 | "KeyBlockVerify() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 103 | |
| 104 | Memcpy(h, hdr, hsize); |
| 105 | h->key_block_signature.sig_size--; |
| 106 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 107 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 108 | "KeyBlockVerify() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 109 | |
| 110 | Memcpy(h, hdr, hsize); |
| 111 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 112 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 113 | "KeyBlockVerify() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 114 | |
| 115 | /* Check that we signed header and data key */ |
| 116 | Memcpy(h, hdr, hsize); |
| 117 | h->key_block_checksum.data_size = 4; |
| 118 | h->data_key.key_offset = 0; |
| 119 | h->data_key.key_size = 0; |
| 120 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 121 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 122 | "KeyBlockVerify() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 123 | |
| 124 | Memcpy(h, hdr, hsize); |
| 125 | h->data_key.key_offset = hsize; |
| 126 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 127 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 128 | "KeyBlockVerify() data key off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 129 | |
| 130 | /* TODO: verify parser can support a bigger header (i.e., one where |
| 131 | * data_key.key_offset is bigger than expected). */ |
| 132 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 133 | free(h); |
| 134 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 135 | } |
| 136 | |
| 137 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 138 | static void ReSignFirmwarePreamble(VbFirmwarePreambleHeader* h, |
| 139 | const VbPrivateKey* key) { |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 140 | VbSignature *sig = CalculateSignature((const uint8_t*)h, |
| 141 | h->preamble_signature.data_size, key); |
| 142 | |
| 143 | SignatureCopy(&h->preamble_signature, sig); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 144 | free(sig); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 145 | } |
| 146 | |
| 147 | |
| 148 | static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key, |
| 149 | const VbPrivateKey* private_key, |
| 150 | const VbPublicKey* kernel_subkey) { |
| 151 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 152 | VbFirmwarePreambleHeader* hdr; |
| 153 | VbFirmwarePreambleHeader* h; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 154 | RSAPublicKey* rsa; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 155 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 156 | |
| 157 | /* Create a dummy signature */ |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 158 | VbSignature* body_sig = SignatureAlloc(56, 78); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 159 | |
| 160 | rsa = PublicKeyToRSA(public_key); |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 161 | hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key, |
| 162 | 0x5678); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 163 | TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 164 | if (!hdr) |
| 165 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 166 | hsize = (unsigned) hdr->preamble_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 167 | h = (VbFirmwarePreambleHeader*)malloc(hsize + 16384); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 168 | |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 169 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize, rsa), 0, |
| 170 | "VerifyFirmwarePreamble() ok using key"); |
| 171 | TEST_NEQ(VerifyFirmwarePreamble(hdr, hsize - 1, rsa), 0, |
| 172 | "VerifyFirmwarePreamble() size--"); |
| 173 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize + 1, rsa), 0, |
| 174 | "VerifyFirmwarePreamble() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 175 | |
| 176 | /* Care about major version but not minor */ |
| 177 | Memcpy(h, hdr, hsize); |
| 178 | h->header_version_major++; |
| 179 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 180 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 181 | "VerifyFirmwarePreamble() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 182 | |
| 183 | Memcpy(h, hdr, hsize); |
| 184 | h->header_version_major--; |
| 185 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 186 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 187 | "VerifyFirmwarePreamble() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 188 | |
| 189 | Memcpy(h, hdr, hsize); |
| 190 | h->header_version_minor++; |
| 191 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 192 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 193 | "VerifyFirmwarePreamble() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 194 | |
| 195 | Memcpy(h, hdr, hsize); |
| 196 | h->header_version_minor--; |
| 197 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 198 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 199 | "VerifyFirmwarePreamble() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 200 | |
| 201 | /* Check signature */ |
| 202 | Memcpy(h, hdr, hsize); |
| 203 | h->preamble_signature.sig_offset = hsize; |
| 204 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 205 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 206 | "VerifyFirmwarePreamble() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 207 | |
| 208 | Memcpy(h, hdr, hsize); |
| 209 | h->preamble_signature.sig_size--; |
| 210 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 211 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 212 | "VerifyFirmwarePreamble() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 213 | |
| 214 | Memcpy(h, hdr, hsize); |
| 215 | GetPublicKeyData(&h->kernel_subkey)[0] ^= 0x34; |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 216 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 217 | "VerifyFirmwarePreamble() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 218 | |
| 219 | /* Check that we signed header, kernel subkey, and body sig */ |
| 220 | Memcpy(h, hdr, hsize); |
| 221 | h->preamble_signature.data_size = 4; |
| 222 | h->kernel_subkey.key_offset = 0; |
| 223 | h->kernel_subkey.key_size = 0; |
| 224 | h->body_signature.sig_offset = 0; |
| 225 | h->body_signature.sig_size = 0; |
| 226 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 227 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 228 | "VerifyFirmwarePreamble() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 229 | |
| 230 | Memcpy(h, hdr, hsize); |
| 231 | h->kernel_subkey.key_offset = hsize; |
| 232 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 233 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 234 | "VerifyFirmwarePreamble() kernel subkey off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 235 | |
| 236 | Memcpy(h, hdr, hsize); |
| 237 | h->body_signature.sig_offset = hsize; |
| 238 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 239 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 240 | "VerifyFirmwarePreamble() body sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 241 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 242 | /* Check that we return flags properly for new and old structs */ |
| 243 | Memcpy(h, hdr, hsize); |
| 244 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0x5678, |
| 245 | "VbGetFirmwarePreambleFlags() v2.1"); |
| 246 | h->header_version_minor = 0; |
| 247 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0, |
| 248 | "VbGetFirmwarePreambleFlags() v2.0"); |
| 249 | |
| 250 | /* TODO: verify with extra padding at end of header. */ |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 251 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 252 | free(h); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 253 | RSAPublicKeyFree(rsa); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 254 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 255 | } |
| 256 | |
| 257 | |
| 258 | int main(int argc, char* argv[]) { |
| 259 | VbPrivateKey* signing_private_key = NULL; |
| 260 | VbPublicKey* signing_public_key = NULL; |
| 261 | int signing_key_algorithm; |
| 262 | |
| 263 | VbPublicKey* data_public_key = NULL; |
| 264 | int data_key_algorithm; |
| 265 | |
| 266 | int error_code = 0; |
| 267 | |
| 268 | if(argc != 7) { |
| 269 | fprintf(stderr, "Usage: %s <signing_key_algorithm> <data_key_algorithm>" |
| 270 | " <signing key> <processed signing pubkey>" |
| 271 | " <data key> <processed data pubkey>\n", argv[0]); |
| 272 | return -1; |
| 273 | } |
| 274 | |
| 275 | /* Read verification keys and create a test image. */ |
| 276 | signing_key_algorithm = atoi(argv[1]); |
| 277 | data_key_algorithm = atoi(argv[2]); |
| 278 | |
Bill Richardson | a08b5c9 | 2010-06-30 21:59:43 -0700 | [diff] [blame] | 279 | signing_private_key = PrivateKeyReadPem(argv[3], signing_key_algorithm); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 280 | if (!signing_private_key) { |
| 281 | fprintf(stderr, "Error reading signing_private_key"); |
| 282 | return 1; |
| 283 | } |
| 284 | |
Randall Spangler | d55c645 | 2010-06-10 12:43:51 -0700 | [diff] [blame] | 285 | signing_public_key = PublicKeyReadKeyb(argv[4], signing_key_algorithm, 1); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 286 | if (!signing_public_key) { |
| 287 | fprintf(stderr, "Error reading signing_public_key"); |
| 288 | return 1; |
| 289 | } |
| 290 | |
Randall Spangler | d55c645 | 2010-06-10 12:43:51 -0700 | [diff] [blame] | 291 | data_public_key = PublicKeyReadKeyb(argv[6], data_key_algorithm, 1); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 292 | if (!data_public_key) { |
| 293 | fprintf(stderr, "Error reading data_public_key"); |
| 294 | return 1; |
| 295 | } |
| 296 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 297 | KeyBlockVerifyTest(signing_public_key, signing_private_key, data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 298 | VerifyFirmwarePreambleTest(signing_public_key, signing_private_key, |
| 299 | data_public_key); |
| 300 | |
| 301 | if (signing_public_key) |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 302 | free(signing_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 303 | if (signing_private_key) |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 304 | free(signing_private_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 305 | if (data_public_key) |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 306 | free(data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 307 | |
| 308 | return error_code; |
| 309 | } |