Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 1 | /* Copyright (c) 2013 The Chromium OS Authors. All rights reserved. |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 2 | * Use of this source code is governed by a BSD-style license that can be |
| 3 | * found in the LICENSE file. |
| 4 | * |
| 5 | * Tests for firmware image library. |
| 6 | */ |
| 7 | |
| 8 | #include <stdio.h> |
| 9 | #include <stdlib.h> |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 10 | #include <string.h> |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 11 | |
| 12 | #include "cryptolib.h" |
| 13 | #include "file_keys.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 14 | #include "host_common.h" |
| 15 | #include "test_common.h" |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 16 | #include "vboot_common.h" |
| 17 | |
| 18 | |
| 19 | static void ReChecksumKeyBlock(VbKeyBlockHeader *h) { |
| 20 | uint8_t* newchk = DigestBuf((const uint8_t*)h, |
| 21 | h->key_block_checksum.data_size, |
| 22 | SHA512_DIGEST_ALGORITHM); |
| 23 | Memcpy(GetSignatureData(&h->key_block_checksum), newchk, SHA512_DIGEST_SIZE); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 24 | free(newchk); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 25 | } |
| 26 | |
| 27 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 28 | static void KeyBlockVerifyTest(const VbPublicKey* public_key, |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 29 | const VbPrivateKey* private_key, |
| 30 | const VbPublicKey* data_key) { |
| 31 | |
| 32 | VbKeyBlockHeader *hdr; |
| 33 | VbKeyBlockHeader *h; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 34 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 35 | |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 36 | hdr = KeyBlockCreate(data_key, private_key, 0x1234); |
| 37 | TEST_NEQ((size_t)hdr, 0, "KeyBlockVerify() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 38 | if (!hdr) |
| 39 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 40 | hsize = (unsigned) hdr->key_block_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 41 | h = (VbKeyBlockHeader*)malloc(hsize + 1024); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 42 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 43 | TEST_EQ(KeyBlockVerify(hdr, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 44 | "KeyBlockVerify() ok using checksum"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 45 | TEST_EQ(KeyBlockVerify(hdr, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 46 | "KeyBlockVerify() ok using key"); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 47 | TEST_NEQ(KeyBlockVerify(hdr, hsize, NULL, 0), 0, |
| 48 | "KeyBlockVerify() missing key"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 49 | |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 50 | TEST_NEQ(KeyBlockVerify(hdr, hsize - 1, NULL, 1), 0, |
| 51 | "KeyBlockVerify() size--"); |
| 52 | TEST_EQ(KeyBlockVerify(hdr, hsize + 1, NULL, 1), 0, |
| 53 | "KeyBlockVerify() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 54 | |
| 55 | Memcpy(h, hdr, hsize); |
| 56 | h->magic[0] &= 0x12; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 57 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() magic"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 58 | |
| 59 | /* Care about major version but not minor */ |
| 60 | Memcpy(h, hdr, hsize); |
| 61 | h->header_version_major++; |
| 62 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 63 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 64 | |
| 65 | Memcpy(h, hdr, hsize); |
| 66 | h->header_version_major--; |
| 67 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 68 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 69 | |
| 70 | Memcpy(h, hdr, hsize); |
| 71 | h->header_version_minor++; |
| 72 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 73 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 74 | |
| 75 | Memcpy(h, hdr, hsize); |
| 76 | h->header_version_minor--; |
| 77 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 78 | TEST_EQ(KeyBlockVerify(h, hsize, NULL, 1), 0, "KeyBlockVerify() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 79 | |
| 80 | /* Check hash */ |
| 81 | Memcpy(h, hdr, hsize); |
| 82 | h->key_block_checksum.sig_offset = hsize; |
| 83 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 84 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 85 | "KeyBlockVerify() checksum off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 86 | |
| 87 | Memcpy(h, hdr, hsize); |
| 88 | h->key_block_checksum.sig_size /= 2; |
| 89 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 90 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 91 | "KeyBlockVerify() checksum too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 92 | |
| 93 | Memcpy(h, hdr, hsize); |
| 94 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 95 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 96 | "KeyBlockVerify() checksum mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 97 | |
| 98 | /* Check signature */ |
| 99 | Memcpy(h, hdr, hsize); |
| 100 | h->key_block_signature.sig_offset = hsize; |
| 101 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 102 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 103 | "KeyBlockVerify() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 104 | |
| 105 | Memcpy(h, hdr, hsize); |
| 106 | h->key_block_signature.sig_size--; |
| 107 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 108 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 109 | "KeyBlockVerify() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 110 | |
| 111 | Memcpy(h, hdr, hsize); |
| 112 | GetPublicKeyData(&h->data_key)[0] ^= 0x34; |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 113 | TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 114 | "KeyBlockVerify() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 115 | |
| 116 | /* Check that we signed header and data key */ |
| 117 | Memcpy(h, hdr, hsize); |
| 118 | h->key_block_checksum.data_size = 4; |
| 119 | h->data_key.key_offset = 0; |
| 120 | h->data_key.key_size = 0; |
| 121 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 122 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 123 | "KeyBlockVerify() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 124 | |
| 125 | Memcpy(h, hdr, hsize); |
| 126 | h->data_key.key_offset = hsize; |
| 127 | ReChecksumKeyBlock(h); |
Randall Spangler | 138acfe | 2010-08-17 15:45:21 -0700 | [diff] [blame] | 128 | TEST_NEQ(KeyBlockVerify(h, hsize, NULL, 1), 0, |
Randall Spangler | 729b872 | 2010-06-11 11:16:20 -0700 | [diff] [blame] | 129 | "KeyBlockVerify() data key off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 130 | |
| 131 | /* TODO: verify parser can support a bigger header (i.e., one where |
| 132 | * data_key.key_offset is bigger than expected). */ |
| 133 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 134 | free(h); |
| 135 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 136 | } |
| 137 | |
| 138 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 139 | static void ReSignFirmwarePreamble(VbFirmwarePreambleHeader* h, |
| 140 | const VbPrivateKey* key) { |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 141 | VbSignature *sig = CalculateSignature((const uint8_t*)h, |
| 142 | h->preamble_signature.data_size, key); |
| 143 | |
| 144 | SignatureCopy(&h->preamble_signature, sig); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 145 | free(sig); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 146 | } |
| 147 | |
| 148 | |
| 149 | static void VerifyFirmwarePreambleTest(const VbPublicKey* public_key, |
| 150 | const VbPrivateKey* private_key, |
| 151 | const VbPublicKey* kernel_subkey) { |
| 152 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 153 | VbFirmwarePreambleHeader* hdr; |
| 154 | VbFirmwarePreambleHeader* h; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 155 | RSAPublicKey* rsa; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 156 | unsigned hsize; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 157 | |
| 158 | /* Create a dummy signature */ |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 159 | VbSignature* body_sig = SignatureAlloc(56, 78); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 160 | |
| 161 | rsa = PublicKeyToRSA(public_key); |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 162 | hdr = CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig, private_key, |
| 163 | 0x5678); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 164 | TEST_NEQ(hdr && rsa, 0, "VerifyFirmwarePreamble() prerequisites"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 165 | if (!hdr) |
| 166 | return; |
vbendeb | 3ecaf77 | 2010-06-24 16:19:53 -0700 | [diff] [blame] | 167 | hsize = (unsigned) hdr->preamble_size; |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 168 | h = (VbFirmwarePreambleHeader*)malloc(hsize + 16384); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 169 | |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 170 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize, rsa), 0, |
| 171 | "VerifyFirmwarePreamble() ok using key"); |
| 172 | TEST_NEQ(VerifyFirmwarePreamble(hdr, hsize - 1, rsa), 0, |
| 173 | "VerifyFirmwarePreamble() size--"); |
| 174 | TEST_EQ(VerifyFirmwarePreamble(hdr, hsize + 1, rsa), 0, |
| 175 | "VerifyFirmwarePreamble() size++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 176 | |
| 177 | /* Care about major version but not minor */ |
| 178 | Memcpy(h, hdr, hsize); |
| 179 | h->header_version_major++; |
| 180 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 181 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 182 | "VerifyFirmwarePreamble() major++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 183 | |
| 184 | Memcpy(h, hdr, hsize); |
| 185 | h->header_version_major--; |
| 186 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 187 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 188 | "VerifyFirmwarePreamble() major--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 189 | |
| 190 | Memcpy(h, hdr, hsize); |
| 191 | h->header_version_minor++; |
| 192 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 193 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 194 | "VerifyFirmwarePreamble() minor++"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 195 | |
| 196 | Memcpy(h, hdr, hsize); |
| 197 | h->header_version_minor--; |
| 198 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 199 | TEST_EQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 200 | "VerifyFirmwarePreamble() minor--"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 201 | |
| 202 | /* Check signature */ |
| 203 | Memcpy(h, hdr, hsize); |
| 204 | h->preamble_signature.sig_offset = hsize; |
| 205 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 206 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 207 | "VerifyFirmwarePreamble() sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 208 | |
| 209 | Memcpy(h, hdr, hsize); |
| 210 | h->preamble_signature.sig_size--; |
| 211 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 212 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 213 | "VerifyFirmwarePreamble() sig too small"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 214 | |
| 215 | Memcpy(h, hdr, hsize); |
| 216 | GetPublicKeyData(&h->kernel_subkey)[0] ^= 0x34; |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 217 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 218 | "VerifyFirmwarePreamble() sig mismatch"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 219 | |
| 220 | /* Check that we signed header, kernel subkey, and body sig */ |
| 221 | Memcpy(h, hdr, hsize); |
| 222 | h->preamble_signature.data_size = 4; |
| 223 | h->kernel_subkey.key_offset = 0; |
| 224 | h->kernel_subkey.key_size = 0; |
| 225 | h->body_signature.sig_offset = 0; |
| 226 | h->body_signature.sig_size = 0; |
| 227 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 228 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 229 | "VerifyFirmwarePreamble() didn't sign header"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 230 | |
| 231 | Memcpy(h, hdr, hsize); |
| 232 | h->kernel_subkey.key_offset = hsize; |
| 233 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 234 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 235 | "VerifyFirmwarePreamble() kernel subkey off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 236 | |
| 237 | Memcpy(h, hdr, hsize); |
| 238 | h->body_signature.sig_offset = hsize; |
| 239 | ReSignFirmwarePreamble(h, private_key); |
Randall Spangler | 87c13d8 | 2010-07-19 10:35:40 -0700 | [diff] [blame] | 240 | TEST_NEQ(VerifyFirmwarePreamble(h, hsize, rsa), 0, |
| 241 | "VerifyFirmwarePreamble() body sig off end"); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 242 | |
Randall Spangler | a712e01 | 2011-07-13 09:48:41 -0700 | [diff] [blame] | 243 | /* Check that we return flags properly for new and old structs */ |
| 244 | Memcpy(h, hdr, hsize); |
| 245 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0x5678, |
| 246 | "VbGetFirmwarePreambleFlags() v2.1"); |
| 247 | h->header_version_minor = 0; |
| 248 | TEST_EQ(VbGetFirmwarePreambleFlags(h), 0, |
| 249 | "VbGetFirmwarePreambleFlags() v2.0"); |
| 250 | |
| 251 | /* TODO: verify with extra padding at end of header. */ |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 252 | |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 253 | free(h); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 254 | RSAPublicKeyFree(rsa); |
Randall Spangler | 32a6526 | 2011-06-27 10:49:11 -0700 | [diff] [blame] | 255 | free(hdr); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 256 | } |
| 257 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 258 | int test_permutation(int signing_key_algorithm, int data_key_algorithm, |
| 259 | const char *keys_dir) |
| 260 | { |
| 261 | char filename[1024]; |
| 262 | int signing_rsa_len = siglen_map[signing_key_algorithm] * 8;; |
| 263 | int data_rsa_len = siglen_map[data_key_algorithm] * 8;; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 264 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 265 | VbPrivateKey* signing_private_key = NULL; |
| 266 | VbPublicKey* signing_public_key = NULL; |
| 267 | VbPublicKey* data_public_key = NULL; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 268 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 269 | printf("***Testing signing algorithm: %s\n", |
| 270 | algo_strings[signing_key_algorithm]); |
| 271 | printf("***With data key algorithm: %s\n", |
| 272 | algo_strings[data_key_algorithm]); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 273 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 274 | sprintf(filename, "%s/key_rsa%d.pem", keys_dir, signing_rsa_len); |
| 275 | signing_private_key = PrivateKeyReadPem(filename, |
| 276 | signing_key_algorithm); |
| 277 | if (!signing_private_key) { |
| 278 | fprintf(stderr, "Error reading signing_private_key: %s\n", |
| 279 | filename); |
| 280 | return 1; |
| 281 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 282 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 283 | sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, signing_rsa_len); |
| 284 | signing_public_key = PublicKeyReadKeyb(filename, |
| 285 | signing_key_algorithm, 1); |
| 286 | if (!signing_public_key) { |
| 287 | fprintf(stderr, "Error reading signing_public_key: %s\n", |
| 288 | filename); |
| 289 | return 1; |
| 290 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 291 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 292 | sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, data_rsa_len); |
| 293 | data_public_key = PublicKeyReadKeyb(filename, |
| 294 | data_key_algorithm, 1); |
| 295 | if (!data_public_key) { |
| 296 | fprintf(stderr, "Error reading data_public_key: %s\n", |
| 297 | filename); |
| 298 | return 1; |
| 299 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 300 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 301 | KeyBlockVerifyTest(signing_public_key, signing_private_key, |
| 302 | data_public_key); |
| 303 | VerifyFirmwarePreambleTest(signing_public_key, signing_private_key, |
| 304 | data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 305 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 306 | if (signing_public_key) |
| 307 | free(signing_public_key); |
| 308 | if (signing_private_key) |
| 309 | free(signing_private_key); |
| 310 | if (data_public_key) |
| 311 | free(data_public_key); |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 312 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 313 | return 0; |
| 314 | } |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 315 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 316 | struct test_perm |
| 317 | { |
| 318 | int signing_algorithm; |
| 319 | int data_key_algorithm; |
| 320 | }; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 321 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 322 | /* |
| 323 | * Permutations of signing and data key algorithms in active use: |
| 324 | * 7 (rsa4096 sha256) - 4 (rsa2048 sha256) |
| 325 | * 11 (rsa8192 sha512) - 4 (rsa2048 sha256) |
| 326 | * 11 (rsa8192 sha512) - 7 (rsa4096 sha256) |
| 327 | */ |
| 328 | const struct test_perm test_perms[] = {{7, 4}, {11, 4}, {11, 7}}; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 329 | |
Randall Spangler | e061a25 | 2013-01-22 15:34:07 -0800 | [diff] [blame^] | 330 | int main(int argc, char* argv[]) |
| 331 | { |
| 332 | if (argc == 2) { |
| 333 | /* Test only the algorithms we use */ |
| 334 | int i; |
| 335 | |
| 336 | for (i = 0; i < ARRAY_SIZE(test_perms); i++) { |
| 337 | if (test_permutation(test_perms[i].signing_algorithm, |
| 338 | test_perms[i].data_key_algorithm, |
| 339 | argv[1])) |
| 340 | return 1; |
| 341 | } |
| 342 | |
| 343 | } else if (argc == 3 && !strcasecmp(argv[2], "--all")) { |
| 344 | /* Test all the algorithms */ |
| 345 | int sign_alg, data_alg; |
| 346 | |
| 347 | for (sign_alg = 0; sign_alg < kNumAlgorithms; sign_alg++) { |
| 348 | for (data_alg = 0; data_alg < kNumAlgorithms; |
| 349 | data_alg++) { |
| 350 | if (test_permutation(sign_alg, data_alg, |
| 351 | argv[1])) |
| 352 | return 1; |
| 353 | } |
| 354 | } |
| 355 | } else { |
| 356 | fprintf(stderr, "Usage: %s <keys_dir> [--all]", argv[0]); |
| 357 | return -1; |
| 358 | } |
| 359 | |
| 360 | return gTestSuccess ? 0 : 255; |
Randall Spangler | d183644 | 2010-06-10 09:59:04 -0700 | [diff] [blame] | 361 | } |