blob: 17fc3b96818d79e4a5c531b790203c6b892fc175 [file] [log] [blame]
Randall Spanglerefa37b82014-11-12 16:20:50 -08001/* Copyright (c) 2014 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file.
4 *
5 * Tests for api library, new style structs
6 */
7
8#include <stdio.h>
9
10#include "2sysincludes.h"
11#include "2api.h"
12#include "2common.h"
13#include "2misc.h"
14#include "2nvstorage.h"
15#include "2rsa.h"
16#include "2secdata.h"
17
18#include "test_common.h"
19#include "vb2_convert_structs.h"
20
21/* Common context for tests */
22static uint8_t workbuf[VB2_WORKBUF_RECOMMENDED_SIZE]
23 __attribute__ ((aligned (16)));
24static struct vb2_context ctx;
25static struct vb2_shared_data *sd;
26
27static const uint8_t mock_body[320] = "Mock body";
28static const int mock_body_size = sizeof(mock_body);
29static const int mock_algorithm = VB2_ALG_RSA2048_SHA256;
30static const int mock_hash_alg = VB2_HASH_SHA256;
31static int mock_sig_size;
32
33static const struct vb2_guid test_guid[4] = {
34 {.raw = {0x11}},
35 {.raw = {0x22}},
36 {.raw = {0x33}},
37 {.raw = {0x44}},
38};
39
40/* Mocked function data */
41static int retval_vb2_load_fw_keyblock;
42static int retval_vb2_load_fw_preamble;
43
44/* Type of test to reset for */
45enum reset_type {
46 FOR_MISC,
47 FOR_EXTEND_HASH,
48 FOR_CHECK_HASH,
49};
50
51static void reset_common_data(enum reset_type t)
52{
53 struct vb2_fw_preamble2 *pre;
54 struct vb2_signature2 *sig;
55 uint32_t sig_offset;
56
57 int i;
58
59 memset(workbuf, 0xaa, sizeof(workbuf));
60
61 memset(&ctx, 0, sizeof(ctx));
62 ctx.workbuf = workbuf;
63 ctx.workbuf_size = sizeof(workbuf);
64
65 vb2_init_context(&ctx);
66 sd = vb2_get_sd(&ctx);
67
68 vb2_nv_init(&ctx);
69
70 vb2_secdata_create(&ctx);
71 vb2_secdata_init(&ctx);
72
73 retval_vb2_load_fw_keyblock = VB2_SUCCESS;
74 retval_vb2_load_fw_preamble = VB2_SUCCESS;
75
76 sd->workbuf_preamble_offset = ctx.workbuf_used;
77 pre = (struct vb2_fw_preamble2 *)
78 (ctx.workbuf + sd->workbuf_preamble_offset);
79 pre->hash_count = 3;
80 pre->hash_offset = sig_offset = sizeof(*pre);
81
82 for (i = 0; i < 3; i++) {
83 sig = vb2_create_hash_sig(mock_body,
84 mock_body_size - 16 * i,
85 mock_hash_alg);
86 memcpy(&sig->guid, test_guid + i, sizeof(sig->guid));
87 memcpy((uint8_t *)pre + sig_offset, sig, sig->c.total_size);
88 sig_offset += sig->c.total_size;
89 mock_sig_size = sig->c.total_size;
90 free(sig);
91 }
92
93 sd->workbuf_preamble_size = sig_offset;
94 ctx.workbuf_used = sd->workbuf_preamble_offset
95 + sd->workbuf_preamble_size;
96
97 if (t == FOR_EXTEND_HASH || t == FOR_CHECK_HASH)
98 vb2api_init_hash2(&ctx, test_guid, NULL);
99
100 if (t == FOR_CHECK_HASH)
101 vb2api_extend_hash(&ctx, mock_body, mock_body_size);
102};
103
104/* Mocked functions */
105
106int vb2_load_fw_keyblock2(struct vb2_context *ctx)
107{
108 return retval_vb2_load_fw_keyblock;
109}
110
111int vb2_load_fw_preamble2(struct vb2_context *ctx)
112{
113 return retval_vb2_load_fw_preamble;
114}
115
116/* Tests */
117
118static void phase3_tests(void)
119{
120 reset_common_data(FOR_MISC);
121 TEST_SUCC(vb2api_fw_phase3_2(&ctx), "phase3 good");
122
123 reset_common_data(FOR_MISC);
124 retval_vb2_load_fw_keyblock = VB2_ERROR_MOCK;
125 TEST_EQ(vb2api_fw_phase3_2(&ctx), VB2_ERROR_MOCK, "phase3 keyblock");
126 TEST_EQ(vb2_nv_get(&ctx, VB2_NV_RECOVERY_REQUEST),
127 VB2_RECOVERY_RO_INVALID_RW, " recovery reason");
128
129 reset_common_data(FOR_MISC);
130 retval_vb2_load_fw_preamble = VB2_ERROR_MOCK;
131 TEST_EQ(vb2api_fw_phase3_2(&ctx), VB2_ERROR_MOCK, "phase3 keyblock");
132 TEST_EQ(vb2_nv_get(&ctx, VB2_NV_RECOVERY_REQUEST),
133 VB2_RECOVERY_RO_INVALID_RW, " recovery reason");
134}
135
136static void init_hash_tests(void)
137{
138 struct vb2_fw_preamble2 *pre;
139 struct vb2_signature2 *sig;
140 int wb_used_before;
141 uint32_t size;
142
143 reset_common_data(FOR_MISC);
144 pre = (struct vb2_fw_preamble2 *)
145 (ctx.workbuf + sd->workbuf_preamble_offset);
146 sig = (struct vb2_signature2 *)((uint8_t *)pre + pre->hash_offset);
147
148 wb_used_before = ctx.workbuf_used;
149 TEST_SUCC(vb2api_init_hash2(&ctx, test_guid, &size),
150 "init hash good");
151 TEST_EQ(sd->workbuf_hash_offset,
152 (wb_used_before + (VB2_WORKBUF_ALIGN - 1)) &
153 ~(VB2_WORKBUF_ALIGN - 1),
154 "hash context offset");
155 TEST_EQ(sd->workbuf_hash_size, sizeof(struct vb2_digest_context),
156 "hash context size");
157 TEST_EQ(ctx.workbuf_used,
158 sd->workbuf_hash_offset + sd->workbuf_hash_size,
159 "hash uses workbuf");
160 TEST_EQ(sd->hash_tag,
161 sd->workbuf_preamble_offset + pre->hash_offset,
162 "hash signature offset");
163 TEST_EQ(sd->hash_remaining_size, mock_body_size, "hash remaining");
164
165 wb_used_before = ctx.workbuf_used;
166 TEST_SUCC(vb2api_init_hash2(&ctx, test_guid + 2, NULL),
167 "init hash again");
168 TEST_EQ(ctx.workbuf_used, wb_used_before, "init hash reuses context");
169 TEST_EQ(sd->hash_tag,
170 sd->workbuf_preamble_offset + pre->hash_offset +
171 2 * mock_sig_size,
172 "hash signature offset 2");
173
174 reset_common_data(FOR_MISC);
175 TEST_EQ(vb2api_init_hash2(&ctx, test_guid + 3, &size),
176 VB2_ERROR_API_INIT_HASH_GUID, "init hash invalid guid");
177
178 reset_common_data(FOR_MISC);
179 sd->workbuf_preamble_size = 0;
180 TEST_EQ(vb2api_init_hash2(&ctx, test_guid, &size),
181 VB2_ERROR_API_INIT_HASH_PREAMBLE, "init hash preamble");
182
183 reset_common_data(FOR_MISC);
184 ctx.workbuf_used =
185 ctx.workbuf_size - sizeof(struct vb2_digest_context) + 8;
186 TEST_EQ(vb2api_init_hash2(&ctx, test_guid, &size),
187 VB2_ERROR_API_INIT_HASH_WORKBUF, "init hash workbuf");
188
189 reset_common_data(FOR_MISC);
190 sig->hash_alg = VB2_HASH_INVALID;
191 TEST_EQ(vb2api_init_hash2(&ctx, test_guid, &size),
192 VB2_ERROR_SHA_INIT_ALGORITHM, "init hash algorithm");
193}
194
195static void check_hash_tests(void)
196{
197 struct vb2_fw_preamble2 *pre;
198 struct vb2_signature2 *sig;
199 struct vb2_digest_context *dc;
200
201 reset_common_data(FOR_CHECK_HASH);
202 pre = (struct vb2_fw_preamble2 *)
203 (ctx.workbuf + sd->workbuf_preamble_offset);
204 sig = (struct vb2_signature2 *)((uint8_t *)pre + pre->hash_offset);
205 dc = (struct vb2_digest_context *)
206 (ctx.workbuf + sd->workbuf_hash_offset);
207
208 TEST_SUCC(vb2api_check_hash2(&ctx), "check hash good");
209
210 reset_common_data(FOR_CHECK_HASH);
211 sd->hash_tag = 0;
212 TEST_EQ(vb2api_check_hash2(&ctx),
213 VB2_ERROR_API_CHECK_HASH_TAG, "check hash tag");
214
215 reset_common_data(FOR_CHECK_HASH);
216 sd->workbuf_hash_size = 0;
217 TEST_EQ(vb2api_check_hash2(&ctx),
218 VB2_ERROR_API_CHECK_HASH_WORKBUF, "check hash no workbuf");
219
220 reset_common_data(FOR_CHECK_HASH);
221 sd->hash_remaining_size = 1;
222 TEST_EQ(vb2api_check_hash2(&ctx),
223 VB2_ERROR_API_CHECK_HASH_SIZE, "check hash size");
224
225 reset_common_data(FOR_CHECK_HASH);
226 ctx.workbuf_used = ctx.workbuf_size;
227 TEST_EQ(vb2api_check_hash2(&ctx),
228 VB2_ERROR_API_CHECK_HASH_WORKBUF_DIGEST, "check hash workbuf");
229
230 reset_common_data(FOR_CHECK_HASH);
231 dc->hash_alg = VB2_HASH_INVALID;
232 *((uint8_t *)sig + sig->sig_offset) ^= 0x55;
233 TEST_EQ(vb2api_check_hash2(&ctx),
234 VB2_ERROR_SHA_FINALIZE_ALGORITHM, "check hash finalize");
235
236 reset_common_data(FOR_CHECK_HASH);
237 *((uint8_t *)sig + sig->sig_offset) ^= 0x55;
238 TEST_EQ(vb2api_check_hash2(&ctx),
239 VB2_ERROR_API_CHECK_HASH_SIG, "check hash sig");
240}
241
242int main(int argc, char* argv[])
243{
244 phase3_tests();
245 init_hash_tests();
246 check_hash_tests();
247
248 return gTestSuccess ? 0 : 255;
249}