summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNicolas Boichat <drinkcat@google.com>2017-08-23 17:39:25 +0800
committerchrome-bot <chrome-bot@chromium.org>2017-08-24 01:25:50 -0700
commit4ec9ee378497b414dbf8f899ea3d297b48f40bc7 (patch)
tree786a744714bfd4704d34b46c66dfcbb2d8658ab2
parenta9cbc267362c71005790cf5b7ca6a8f8d864cea0 (diff)
downloadvboot-4ec9ee378497b414dbf8f899ea3d297b48f40bc7.tar.gz
vb21_common2_tests: Fix test for exponent 3 keys
vb2_public_key_read_keyb cannot be used for VB2.1 public keys (especially not for 2048 exponent 3 or F4, as their size is the same so the algorithm cannot be guess). Instead, do what futility/rwsig does and derive the public key from the private RSA key. BRANCH=none BUG=b:64854892 TEST=make runlongtests Change-Id: Ie81f40e6076cd0c234012b9af58e39425f8b717c Signed-off-by: Nicolas Boichat <drinkcat@google.com> Reviewed-on: https://chromium-review.googlesource.com/628177 Commit-Ready: Nicolas Boichat <drinkcat@chromium.org> Tested-by: Nicolas Boichat <drinkcat@chromium.org> Reviewed-by: Randall Spangler <rspangler@chromium.org> Reviewed-by: Caveh Jalali <caveh@google.com>
-rw-r--r--tests/vb21_common2_tests.c31
1 files changed, 25 insertions, 6 deletions
diff --git a/tests/vb21_common2_tests.c b/tests/vb21_common2_tests.c
index 7f1aefa2..7531b593 100644
--- a/tests/vb21_common2_tests.c
+++ b/tests/vb21_common2_tests.c
@@ -17,6 +17,7 @@
#include "host_key2.h"
#include "host_signature2.h"
#include "test_common.h"
+#include "util_misc.h"
static const uint8_t test_data[] = "This is some test data to sign.";
@@ -246,7 +247,10 @@ int test_algorithm(int key_algorithm, const char *keys_dir)
struct vb2_private_key *prik = NULL;
struct vb21_signature *sig2 = NULL;
- struct vb2_public_key *pubk = NULL;
+ struct vb2_public_key *pubk;
+ uint8_t *pubk_buf = 0;
+ uint8_t *keyb_data = 0;
+ uint32_t keyb_size;
struct vb21_packed_key *key2 = NULL;
printf("***Testing algorithm: %s\n",
@@ -261,11 +265,26 @@ int test_algorithm(int key_algorithm, const char *keys_dir)
prik->sig_alg = sig_alg;
vb2_private_key_set_desc(prik, "private key");
- snprintf(filename, sizeof(filename), "%s/key_%s.keyb",
- keys_dir,
- vb2_get_crypto_algorithm_file(key_algorithm));
- TEST_SUCC(vb2_public_key_read_keyb(&pubk, filename),
- "Read public key");
+
+ /* Create the public key */
+ TEST_SUCC(vb2_public_key_alloc(&pubk, sig_alg), "Allocate public key");
+ /* Extract the keyb blob */
+ TEST_SUCC(vb_keyb_from_rsa(prik->rsa_private_key,
+ &keyb_data, &keyb_size),
+ "Extract public key");
+
+ /*
+ * Copy the keyb blob to the public key's buffer, because that's
+ * where vb2_unpack_key_data() and vb2_public_key_pack() expect
+ * to find it.
+ */
+ pubk_buf = vb2_public_key_packed_data(pubk);
+ memcpy(pubk_buf, keyb_data, keyb_size);
+
+ /* Fill in the internal struct pointers */
+ TEST_SUCC(vb2_unpack_key_data(pubk, pubk_buf, keyb_size),
+ "unpack public key blob");
+
pubk->hash_alg = hash_alg;
vb2_public_key_set_desc(pubk, "public key");
TEST_SUCC(vb21_public_key_pack(&key2, pubk), "Pack public key");