Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 1 | /* Copyright (c) 2013 The Chromium OS Authors. All rights reserved. |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 2 | * Use of this source code is governed by a BSD-style license that can be |
| 3 | * found in the LICENSE file. |
| 4 | * |
| 5 | * Tests for firmware image library. |
| 6 | */ |
| 7 | |
| 8 | #include <stdio.h> |
| 9 | #include <stdlib.h> |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 10 | #include <string.h> |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 11 | |
| 12 | #include "cryptolib.h" |
| 13 | #include "file_keys.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 14 | #include "host_common.h" |
| 15 | #include "test_common.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 16 | #include "vboot_common.h" |
| 17 | |
| 18 | |
| 19 | static void ReChecksumKeyBlock(VbKeyBlockHeader *h) { |
| 20 | uint8_t* newchk = DigestBuf((const uint8_t*)h, |
| 21 | h->key_block_checksum.data_size, |
| 22 | SHA512_DIGEST_ALGORITHM); |
| 23 | Memcpy(GetSignatureData(&h->key_block_checksum), newchk, SHA512_DIGEST_SIZE); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 24 | free(newchk); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 25 | } |
| 26 | |
| 27 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 28 | static void KeyBlockVerifyTest(const VbPublicKey* public_key, |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 29 | const VbPrivateKey* private_key, |
| 30 | const VbPublicKey* data_key) { |
| 31 | |
| 32 | VbKeyBlockHeader *hdr; |
| 33 | VbKeyBlockHeader *h; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 34 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 35 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 36 | hdr = KeyBlockCreate(data_key, private_key, 0x1234); |
| 37 | TEST_NEQ((size_t)hdr, 0, "KeyBlockVerify() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 38 | if (!hdr) |
| 39 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 40 | hsize = (unsigned) hdr->key_block_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 41 | h = (VbKeyBlockHeader*)malloc(hsize + 1024); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 42 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 43 | TEST_EQ(KeyBlockVerify(hdr, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 44 | "KeyBlockVerify() ok using checksum"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 45 | TEST_EQ(KeyBlockVerify(hdr, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 46 | "KeyBlockVerify() ok using key"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 47 | TEST_NEQ(KeyBlockVerify(hdr, hsize, NULL, 0), 0, |
| 48 | "KeyBlockVerify() missing key"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 49 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 50 | TEST_NEQ(KeyBlockVerify(hdr, hsize - 1, NULL, 1), 0, |
| 51 | "KeyBlockVerify() size--"); |
| 52 | TEST_EQ(KeyBlockVerify(hdr, hsize + 1, NULL, 1), 0, |
| 53 | "KeyBlockVerify() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 54 | |
| 55 | Memcpy(h, hdr, hsize); |
| 56 | h->magic[0] &= 0x12; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 57 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() magic"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 58 | |
| 59 | /* Care about major version but not minor */ |
| 60 | Memcpy(h, hdr, hsize); |
| 61 | h->header_version_major++; |
| 62 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 63 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 64 | |
| 65 | Memcpy(h, hdr, hsize); |
| 66 | h->header_version_major--; |
| 67 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 68 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 69 | |
| 70 | Memcpy(h, hdr, hsize); |
| 71 | h->header_version_minor++; |
| 72 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 73 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 74 | |
| 75 | Memcpy(h, hdr, hsize); |
| 76 | h->header_version_minor--; |
| 77 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 78 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 79 | |
| 80 | /* Check hash */ |
| 81 | Memcpy(h, hdr, hsize); |
| 82 | h->key_block_checksum.sig_offset = hsize; |
| 83 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 84 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 85 | "KeyBlockVerify() checksum off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 86 | |
| 87 | Memcpy(h, hdr, hsize); |
| 88 | h->key_block_checksum.sig_size /= 2; |
| 89 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 90 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 91 | "KeyBlockVerify() checksum too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 92 | |
| 93 | Memcpy(h, hdr, hsize); |
| 94 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 95 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 96 | "KeyBlockVerify() checksum mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 97 | |
| 98 | /* Check signature */ |
| 99 | Memcpy(h, hdr, hsize); |
| 100 | h->key_block_signature.sig_offset = hsize; |
| 101 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 102 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 103 | "KeyBlockVerify() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 104 | |
| 105 | Memcpy(h, hdr, hsize); |
| 106 | h->key_block_signature.sig_size--; |
| 107 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 108 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 109 | "KeyBlockVerify() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 110 | |
| 111 | Memcpy(h, hdr, hsize); |
| 112 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 113 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 114 | "KeyBlockVerify() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 115 | |
Randall Spangler | 3b806ea | 2013-01-25 13:56:55 -0800 | [diff] [blame^] | 116 | Memcpy(h, hdr, hsize); |
| 117 | //ReChecksumKeyBlock(h); |
| 118 | h->key_block_checksum.data_size = h->key_block_size + 1; |
| 119 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 1), 0, |
| 120 | "KeyBlockVerify() checksum data past end of block"); |
| 121 | |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 122 | /* Check that we signed header and data key */ |
| 123 | Memcpy(h, hdr, hsize); |
| 124 | h->key_block_checksum.data_size = 4; |
| 125 | h->data_key.key_offset = 0; |
| 126 | h->data_key.key_size = 0; |
| 127 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 128 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 129 | "KeyBlockVerify() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 130 | |
| 131 | Memcpy(h, hdr, hsize); |
| 132 | h->data_key.key_offset = hsize; |
| 133 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 134 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 135 | "KeyBlockVerify() data key off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 136 | |
Randall Spangler | 3b806ea | 2013-01-25 13:56:55 -0800 | [diff] [blame^] | 137 | /* Corner cases for error checking */ |
| 138 | TEST_NEQ(KeyBlockVerify(NULL, 4, NULL, 1), 0, |
| 139 | "KeyBlockVerify size too small"); |
| 140 | |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 141 | /* TODO: verify parser can support a bigger header (i.e., one where |
| 142 | * data_key.key_offset is bigger than expected). */ |
| 143 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 144 | free(h); |
| 145 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 146 | } |
| 147 | |
| 148 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 149 | static void ReSignFirmwarePreamble(VbFirmwarePreambleHeader* h, |
| 150 | const VbPrivateKey* key) { |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 151 | VbSignature *sig = CalculateSignature((const uint8_t*)h, |
| 152 | h->preamble_signature.data_size, key); |
| 153 | |
| 154 | SignatureCopy(&h->preamble_signature, sig); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 155 | free(sig); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 156 | } |
| 157 | |
| 158 | |
| 159 | static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key, |
| 160 | const VbPrivateKey* private_key, |
| 161 | const VbPublicKey* kernel_subkey) { |
| 162 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 163 | VbFirmwarePreambleHeader* hdr; |
| 164 | VbFirmwarePreambleHeader* h; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 165 | RSAPublicKey* rsa; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 166 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 167 | |
| 168 | /* Create a dummy signature */ |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 169 | VbSignature* body_sig = SignatureAlloc(56, 78); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 170 | |
| 171 | rsa = PublicKeyToRSA(public_key); |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 172 | hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key, |
| 173 | 0x5678); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 174 | TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 175 | if (!hdr) |
| 176 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 177 | hsize = (unsigned) hdr->preamble_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 178 | h = (VbFirmwarePreambleHeader*)malloc(hsize + 16384); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 179 | |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 180 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize, rsa), 0, |
| 181 | "VerifyFirmwarePreamble() ok using key"); |
Randall Spangler | 3b806ea | 2013-01-25 13:56:55 -0800 | [diff] [blame^] | 182 | TEST_NEQ(VerifyFirmwarePreamble(hdr, 4, rsa), 0, |
| 183 | "VerifyFirmwarePreamble() size tiny"); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 184 | TEST_NEQ(VerifyFirmwarePreamble(hdr, hsize - 1, rsa), 0, |
| 185 | "VerifyFirmwarePreamble() size--"); |
| 186 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize + 1, rsa), 0, |
| 187 | "VerifyFirmwarePreamble() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 188 | |
| 189 | /* Care about major version but not minor */ |
| 190 | Memcpy(h, hdr, hsize); |
| 191 | h->header_version_major++; |
| 192 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 193 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 194 | "VerifyFirmwarePreamble() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 195 | |
| 196 | Memcpy(h, hdr, hsize); |
| 197 | h->header_version_major--; |
| 198 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 199 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 200 | "VerifyFirmwarePreamble() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 201 | |
| 202 | Memcpy(h, hdr, hsize); |
| 203 | h->header_version_minor++; |
| 204 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 205 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 206 | "VerifyFirmwarePreamble() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 207 | |
| 208 | Memcpy(h, hdr, hsize); |
| 209 | h->header_version_minor--; |
| 210 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 211 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 212 | "VerifyFirmwarePreamble() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 213 | |
| 214 | /* Check signature */ |
| 215 | Memcpy(h, hdr, hsize); |
| 216 | h->preamble_signature.sig_offset = hsize; |
| 217 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 218 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 219 | "VerifyFirmwarePreamble() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 220 | |
| 221 | Memcpy(h, hdr, hsize); |
| 222 | h->preamble_signature.sig_size--; |
| 223 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 224 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 225 | "VerifyFirmwarePreamble() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 226 | |
| 227 | Memcpy(h, hdr, hsize); |
| 228 | GetPublicKeyData(&h->kernel_subkey)[0] ^= 0x34; |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 229 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 230 | "VerifyFirmwarePreamble() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 231 | |
| 232 | /* Check that we signed header, kernel subkey, and body sig */ |
| 233 | Memcpy(h, hdr, hsize); |
| 234 | h->preamble_signature.data_size = 4; |
| 235 | h->kernel_subkey.key_offset = 0; |
| 236 | h->kernel_subkey.key_size = 0; |
| 237 | h->body_signature.sig_offset = 0; |
| 238 | h->body_signature.sig_size = 0; |
| 239 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 240 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 241 | "VerifyFirmwarePreamble() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 242 | |
| 243 | Memcpy(h, hdr, hsize); |
| 244 | h->kernel_subkey.key_offset = hsize; |
| 245 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 246 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 247 | "VerifyFirmwarePreamble() kernel subkey off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 248 | |
| 249 | Memcpy(h, hdr, hsize); |
| 250 | h->body_signature.sig_offset = hsize; |
| 251 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 252 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 253 | "VerifyFirmwarePreamble() body sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 254 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 255 | /* Check that we return flags properly for new and old structs */ |
| 256 | Memcpy(h, hdr, hsize); |
| 257 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0x5678, |
| 258 | "VbGetFirmwarePreambleFlags() v2.1"); |
| 259 | h->header_version_minor = 0; |
| 260 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0, |
| 261 | "VbGetFirmwarePreambleFlags() v2.0"); |
| 262 | |
| 263 | /* TODO: verify with extra padding at end of header. */ |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 264 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 265 | free(h); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 266 | RSAPublicKeyFree(rsa); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 267 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 268 | } |
| 269 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 270 | int test_permutation(int signing_key_algorithm, int data_key_algorithm, |
| 271 | const char *keys_dir) |
| 272 | { |
| 273 | char filename[1024]; |
| 274 | int signing_rsa_len = siglen_map[signing_key_algorithm] * 8;; |
| 275 | int data_rsa_len = siglen_map[data_key_algorithm] * 8;; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 276 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 277 | VbPrivateKey* signing_private_key = NULL; |
| 278 | VbPublicKey* signing_public_key = NULL; |
| 279 | VbPublicKey* data_public_key = NULL; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 280 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 281 | printf("***Testing signing algorithm: %s\n", |
| 282 | algo_strings[signing_key_algorithm]); |
| 283 | printf("***With data key algorithm: %s\n", |
| 284 | algo_strings[data_key_algorithm]); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 285 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 286 | sprintf(filename, "%s/key_rsa%d.pem", keys_dir, signing_rsa_len); |
| 287 | signing_private_key = PrivateKeyReadPem(filename, |
| 288 | signing_key_algorithm); |
| 289 | if (!signing_private_key) { |
| 290 | fprintf(stderr, "Error reading signing_private_key: %s\n", |
| 291 | filename); |
| 292 | return 1; |
| 293 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 294 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 295 | sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, signing_rsa_len); |
| 296 | signing_public_key = PublicKeyReadKeyb(filename, |
| 297 | signing_key_algorithm, 1); |
| 298 | if (!signing_public_key) { |
| 299 | fprintf(stderr, "Error reading signing_public_key: %s\n", |
| 300 | filename); |
| 301 | return 1; |
| 302 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 303 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 304 | sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, data_rsa_len); |
| 305 | data_public_key = PublicKeyReadKeyb(filename, |
| 306 | data_key_algorithm, 1); |
| 307 | if (!data_public_key) { |
| 308 | fprintf(stderr, "Error reading data_public_key: %s\n", |
| 309 | filename); |
| 310 | return 1; |
| 311 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 312 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 313 | KeyBlockVerifyTest(signing_public_key, signing_private_key, |
| 314 | data_public_key); |
| 315 | VerifyFirmwarePreambleTest(signing_public_key, signing_private_key, |
| 316 | data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 317 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 318 | if (signing_public_key) |
| 319 | free(signing_public_key); |
| 320 | if (signing_private_key) |
| 321 | free(signing_private_key); |
| 322 | if (data_public_key) |
| 323 | free(data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 324 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 325 | return 0; |
| 326 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 327 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 328 | struct test_perm |
| 329 | { |
| 330 | int signing_algorithm; |
| 331 | int data_key_algorithm; |
| 332 | }; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 333 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 334 | /* |
| 335 | * Permutations of signing and data key algorithms in active use: |
| 336 | * 7 (rsa4096 sha256) - 4 (rsa2048 sha256) |
| 337 | * 11 (rsa8192 sha512) - 4 (rsa2048 sha256) |
| 338 | * 11 (rsa8192 sha512) - 7 (rsa4096 sha256) |
| 339 | */ |
| 340 | const struct test_perm test_perms[] = {{7, 4}, {11, 4}, {11, 7}}; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 341 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame] | 342 | int main(int argc, char* argv[]) |
| 343 | { |
| 344 | if (argc == 2) { |
| 345 | /* Test only the algorithms we use */ |
| 346 | int i; |
| 347 | |
| 348 | for (i = 0; i < ARRAY_SIZE(test_perms); i++) { |
| 349 | if (test_permutation(test_perms[i].signing_algorithm, |
| 350 | test_perms[i].data_key_algorithm, |
| 351 | argv[1])) |
| 352 | return 1; |
| 353 | } |
| 354 | |
| 355 | } else if (argc == 3 && !strcasecmp(argv[2], "--all")) { |
| 356 | /* Test all the algorithms */ |
| 357 | int sign_alg, data_alg; |
| 358 | |
| 359 | for (sign_alg = 0; sign_alg < kNumAlgorithms; sign_alg++) { |
| 360 | for (data_alg = 0; data_alg < kNumAlgorithms; |
| 361 | data_alg++) { |
| 362 | if (test_permutation(sign_alg, data_alg, |
| 363 | argv[1])) |
| 364 | return 1; |
| 365 | } |
| 366 | } |
| 367 | } else { |
| 368 | fprintf(stderr, "Usage: %s <keys_dir> [--all]", argv[0]); |
| 369 | return -1; |
| 370 | } |
| 371 | |
| 372 | return gTestSuccess ? 0 : 255; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 373 | } |