summaryrefslogtreecommitdiff
path: root/tests/vb2_common2_tests.c
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2014-10-23 17:38:18 -0700
committerchrome-internal-fetch <chrome-internal-fetch@google.com>2014-10-29 22:23:49 +0000
commitd274a2e9536907d0474d988f32f602cd64ed1ae6 (patch)
tree2119babccda38dc38f6d7bb35c23e53ad9077b29 /tests/vb2_common2_tests.c
parentf6cfb974ce465cf977490fe26db9c8735da97571 (diff)
downloadvboot-d274a2e9536907d0474d988f32f602cd64ed1ae6.tar.gz
vboot2: Add vb2_unpack_key2() and unit testsfactory-rambi-6420.B
This unpacks new-style packed keys. For now, it can also handle old-style packed keys by passing them to the old unpacking function. Once we've switched over to new-style keys in the signing scripts, we'll remove the old format to save code size. Also added is a test library which converts from old to new struct formats. That should eventually get absorbed into futility, and the test keys directory should have both old and new format packed keys in it. BUG=chromium:423882 BRANCH=none TEST=VBOOT2=1 make runtests Change-Id: I0fe31f124781d1ea1efedab65dcd6130bfca18dd Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/225490 Reviewed-by: Bill Richardson <wfrichar@chromium.org>
Diffstat (limited to 'tests/vb2_common2_tests.c')
-rw-r--r--tests/vb2_common2_tests.c109
1 files changed, 109 insertions, 0 deletions
diff --git a/tests/vb2_common2_tests.c b/tests/vb2_common2_tests.c
index 4b3a34e6..f58d2a35 100644
--- a/tests/vb2_common2_tests.c
+++ b/tests/vb2_common2_tests.c
@@ -11,6 +11,7 @@
#include "file_keys.h"
#include "host_common.h"
+#include "vb2_convert_structs.h"
#include "vboot_common.h"
#include "test_common.h"
@@ -75,6 +76,113 @@ static void test_unpack_key(const VbPublicKey *orig_key)
free(key);
}
+static void test_unpack_key2(const VbPublicKey *orig_key)
+{
+ /* vb2_packed_key and VbPublicKey are bit-identical */
+ const struct vb2_packed_key *key1 =
+ (const struct vb2_packed_key *)orig_key;
+
+ struct vb2_public_key pubk;
+ struct vb2_packed_key2 *key2;
+ uint32_t size;
+
+ /* Should be able to handle a vboot1-style key binary as well */
+ TEST_SUCC(vb2_unpack_key2(&pubk, (uint8_t *)key1,
+ key1->key_offset + key1->key_size),
+ "vb2_unpack_key2() passthru");
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ TEST_SUCC(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ "vb2_unpack_key2() ok");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->key_offset += 4;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_INSIDE_DATA_OUTSIDE,
+ "vb2_unpack_key2() buffer too small");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->c.desc_offset += size;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_INSIDE_DATA_OUTSIDE,
+ "vb2_unpack_key2() buffer too small for desc");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->c.desc_size = 0;
+ key2->c.desc_offset = 0;
+ TEST_SUCC(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ "vb2_unpack_key2() no desc");
+ TEST_EQ(strcmp(pubk.desc, ""), 0, " empty desc string");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->c.magic++;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_INSIDE_DATA_OUTSIDE,
+ "vb2_unpack_key2() bad magic");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->c.struct_version_major++;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_STRUCT_VERSION,
+ "vb2_unpack_key2() bad major version");
+ free(key2);
+
+ /*
+ * Minor version changes are ok. Note that this test assumes that the
+ * source key struct version is the highest actually known to the
+ * reader. If the reader does know about minor version + 1 and that
+ * adds fields, this test will likely fail. But at that point, we
+ * should have already added a test for minor version compatibility to
+ * handle both old and new struct versions, so someone will have
+ * noticed this comment.
+ */
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->c.struct_version_minor++;
+ TEST_SUCC(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ "vb2_unpack_key2() minor version change ok");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->sig_algorithm = VB2_SIG_INVALID;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM,
+ "vb2_unpack_key2() bad sig algorithm");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->hash_algorithm = VB2_HASH_INVALID;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM,
+ "vb2_unpack_key2() bad hash algorithm");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->key_size--;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_SIZE,
+ "vb2_unpack_key2() invalid size");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ key2->key_offset--;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_ALIGN,
+ "vb2_unpack_key2() unaligned data");
+ free(key2);
+
+ key2 = vb2_convert_packed_key2(key1, "Test key", &size);
+ *(uint32_t *)((uint8_t *)key2 + key2->key_offset) /= 2;
+ TEST_EQ(vb2_unpack_key2(&pubk, (uint8_t *)key2, size),
+ VB2_ERROR_UNPACK_KEY_ARRAY_SIZE,
+ "vb2_unpack_key2() invalid key array size");
+ free(key2);
+}
+
static void test_verify_data(const VbPublicKey *public_key,
const VbPrivateKey *private_key)
{
@@ -173,6 +281,7 @@ int test_algorithm(int key_algorithm, const char *keys_dir)
}
test_unpack_key(public_key);
+ test_unpack_key2(public_key);
test_verify_data(public_key, private_key);
if (public_key)