summaryrefslogtreecommitdiff
path: root/tests/vb2_gbb_tests.c
diff options
context:
space:
mode:
authorJoel Kitching <kitching@google.com>2019-05-23 15:33:54 +0800
committerCommit Bot <commit-bot@chromium.org>2019-06-07 22:40:03 +0000
commit3eb00efa4eb30e02d1b3197dafc5975fdcbe5914 (patch)
treea60cece3b500976279a32bb7e71d4ba993d4400e /tests/vb2_gbb_tests.c
parent96d5a58cbe65d762c64dc0e8f5ecc7af397015a4 (diff)
downloadvboot-3eb00efa4eb30e02d1b3197dafc5975fdcbe5914.tar.gz
vboot: rewrite GBB functions and API
Old vboot1-style GBB accessor functions were awkwardly located within region-init.c. Rewrite GBB accessor functions for vboot2, and formally expose HWID retrieval function via vboot2 API. workbuf is used for key retrieval functions, while a buffer provided by the caller is used for HWID retrieval function. Reintroduce vboot_display_tests to `make runtests` test suite. Move GBB tests from vboot_display_tests to vb2_gbb_tests. Properly propagate vb2_workbuf objects within the function call stack (vb2_load_partition). BUG=b:124141368, chromium:954774 TEST=Build and flash to eve, check that Chrome OS boots TEST=Build with CL:1627469 applied, check HWID TEST=make clean && make runtests BRANCH=none Change-Id: I398d1329f0b092de35aac73d98dfd9aee6e4e7de Signed-off-by: Joel Kitching <kitching@google.com> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1584488 Tested-by: Joel Kitching <kitching@chromium.org> Reviewed-by: Julius Werner <jwerner@chromium.org> Commit-Queue: Jason Clinton <jclinton@chromium.org>
Diffstat (limited to 'tests/vb2_gbb_tests.c')
-rw-r--r--tests/vb2_gbb_tests.c350
1 files changed, 350 insertions, 0 deletions
diff --git a/tests/vb2_gbb_tests.c b/tests/vb2_gbb_tests.c
new file mode 100644
index 00000000..0c5eff5e
--- /dev/null
+++ b/tests/vb2_gbb_tests.c
@@ -0,0 +1,350 @@
+/* Copyright 2019 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ *
+ * Tests for GBB library.
+ */
+
+#include "2common.h"
+#include "2misc.h"
+#include "test_common.h"
+
+/* Mock data */
+static char gbb_data[4096 + sizeof(struct vb2_gbb_header)];
+static struct vb2_gbb_header *gbb = (struct vb2_gbb_header *)gbb_data;
+static struct vb2_packed_key *rootkey;
+static struct vb2_context ctx;
+static struct vb2_workbuf wb;
+static uint8_t workbuf[VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE];
+
+static void set_gbb_hwid(const char *hwid, size_t size)
+{
+ memcpy(gbb_data + gbb->hwid_offset, hwid, size);
+ gbb->hwid_size = size;
+}
+
+static void reset_common_data(void)
+{
+ int gbb_used;
+
+ memset(gbb_data, 0, sizeof(gbb_data));
+ gbb->header_size = sizeof(*gbb);
+ gbb->major_version = VB2_GBB_MAJOR_VER;
+ gbb->minor_version = VB2_GBB_MINOR_VER;
+ gbb->flags = 0;
+ gbb_used = sizeof(struct vb2_gbb_header);
+
+ gbb->recovery_key_offset = gbb_used;
+ gbb->recovery_key_size = 64;
+ gbb_used += gbb->recovery_key_size;
+ gbb->rootkey_offset = gbb_used;
+ gbb->rootkey_size = sizeof(struct vb2_packed_key);
+ gbb_used += gbb->rootkey_size;
+
+ rootkey = ((void *)gbb + gbb->rootkey_offset);
+ rootkey->key_offset = sizeof(*rootkey);
+
+ gbb->hwid_offset = gbb_used;
+ const char hwid_src[] = "Test HWID";
+ set_gbb_hwid(hwid_src, sizeof(hwid_src));
+
+ memset(workbuf, 0, sizeof(workbuf));
+ memset(&ctx, 0, sizeof(ctx));
+ ctx.workbuf = workbuf;
+ ctx.workbuf_size = sizeof(workbuf);
+ vb2_init_context(&ctx);
+ vb2_workbuf_from_ctx(&ctx, &wb);
+}
+
+/* Mocks */
+struct vb2_gbb_header *vb2_get_gbb(struct vb2_context *c)
+{
+ return gbb;
+}
+
+int vb2ex_read_resource(struct vb2_context *c,
+ enum vb2_resource_index index,
+ uint32_t offset,
+ void *buf,
+ uint32_t size)
+{
+ uint8_t *rptr;
+ uint32_t rsize;
+
+ switch(index) {
+ case VB2_RES_GBB:
+ rptr = (uint8_t *)&gbb_data;
+ rsize = sizeof(gbb_data);
+ break;
+ default:
+ return VB2_ERROR_EX_READ_RESOURCE_INDEX;
+ }
+
+ if (offset > rsize || offset + size > rsize)
+ return VB2_ERROR_EX_READ_RESOURCE_SIZE;
+
+ memcpy(buf, rptr + offset, size);
+ return VB2_SUCCESS;
+}
+
+/* Tests */
+static void key_tests(void)
+{
+ /* Assume that root key and recovery key are dealt with using the same
+ code in our GBB library functions. */
+ struct vb2_packed_key *keyp;
+ struct vb2_workbuf wborig;
+ const char key_data[] = "HELLOWORLD";
+ uint32_t size;
+
+ /* gbb.offset < sizeof(vb2_gbb_header) */
+ reset_common_data();
+ wborig = wb;
+ gbb->rootkey_offset = sizeof(*gbb) - 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_GBB_INVALID,
+ "gbb.rootkey offset too small");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* gbb.offset > gbb_data */
+ reset_common_data();
+ wborig = wb;
+ gbb->rootkey_offset = sizeof(gbb_data) + 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_EX_READ_RESOURCE_SIZE,
+ "gbb.rootkey offset too large");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* gbb.size < sizeof(vb2_packed_key) */
+ reset_common_data();
+ wborig = wb;
+ gbb->rootkey_size = sizeof(*rootkey) - 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_GBB_INVALID,
+ "gbb.rootkey size too small");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* sizeof(vb2_packed_key) > workbuf.size */
+ reset_common_data();
+ wborig = wb;
+ wb.size = sizeof(*rootkey) - 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_GBB_WORKBUF,
+ "workbuf size too small for vb2_packed_key header");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* packed_key.offset < sizeof(vb2_packed_key) */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = 1;
+ rootkey->key_offset = sizeof(*rootkey) - 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_INSIDE_DATA_OVERLAP,
+ "rootkey offset too small");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* packed_key.offset > gbb_data */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = 1;
+ rootkey->key_offset = sizeof(gbb_data) + 1;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_EX_READ_RESOURCE_SIZE,
+ "rootkey size too large");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* packed_key.size > workbuf.size */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = wb.size + 1;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size + 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_GBB_WORKBUF,
+ "workbuf size too small for vb2_packed_key contents");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* gbb.size < sizeof(vb2_packed_key) + packed_key.size */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = 2;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size - 1;
+ TEST_EQ(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ VB2_ERROR_INSIDE_DATA_OUTSIDE,
+ "rootkey size exceeds gbb.rootkey size");
+ TEST_TRUE(wb.buf == wborig.buf,
+ " workbuf restored on error");
+
+ /* gbb.size == sizeof(vb2_packed_key) + packed_key.size */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = sizeof(key_data);
+ memcpy((void *)rootkey + rootkey->key_offset,
+ key_data, sizeof(key_data));
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size;
+ TEST_SUCC(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ "succeeds when gbb.rootkey and rootkey sizes agree");
+ TEST_TRUE(wb.size < wborig.size,
+ " workbuf shrank on success");
+ TEST_EQ(memcmp(rootkey, keyp, rootkey->key_offset + rootkey->key_size),
+ 0, " copied key data successfully");
+ TEST_EQ(size, rootkey->key_offset + rootkey->key_size,
+ " correct size returned");
+
+ /* gbb.size > sizeof(vb2_packed_key) + packed_key.size
+ packed_key.offset = +0 */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_size = 1;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size + 1;
+ TEST_SUCC(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ "succeeds when gbb.rootkey is padded after key");
+ TEST_TRUE(wb.size < wborig.size,
+ " workbuf shrank on success");
+ TEST_EQ(size, rootkey->key_offset + rootkey->key_size,
+ " correct size returned");
+
+ /* gbb.size > sizeof(vb2_packed_key) + packed_key.size
+ packed_key.offset = +1 */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_offset = sizeof(*rootkey) + 1;
+ rootkey->key_size = 1;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size;
+ TEST_SUCC(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ "succeeds when gbb.rootkey is padded before key");
+ TEST_TRUE(wb.size < wborig.size,
+ " workbuf shrank on success");
+ TEST_EQ(size, rootkey->key_offset + rootkey->key_size,
+ " correct size returned");
+
+ /* packed_key.size = 0, packed_key.offset = +1 */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_offset = sizeof(*rootkey) + 1;
+ rootkey->key_size = 0;
+ gbb->rootkey_size = rootkey->key_offset + rootkey->key_size + 1;
+ TEST_SUCC(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ "succeeds when gbb.rootkey is padded; empty test key");
+ TEST_TRUE(wb.size < wborig.size,
+ " workbuf shrank on success");
+ TEST_EQ(size, rootkey->key_offset + rootkey->key_size,
+ " correct size returned");
+
+ /* packed_key.size = 0, packed_key.offset = -1 */
+ reset_common_data();
+ wborig = wb;
+ rootkey->key_offset = sizeof(*rootkey) - 1;
+ rootkey->key_size = 0;
+ gbb->rootkey_size = sizeof(*rootkey) + rootkey->key_size + 1;
+ TEST_SUCC(vb2_gbb_read_root_key(&ctx, &keyp, &size, &wb),
+ "succeeds when gbb.rootkey is padded; empty test key");
+ TEST_TRUE(wb.size < wborig.size,
+ " workbuf shrank on success");
+ TEST_EQ(size, sizeof(*rootkey), " correct size returned");
+}
+
+static void hwid_tests(void)
+{
+ char hwid[VB2_GBB_HWID_MAX_SIZE];
+ uint32_t size;
+
+ /* GBB HWID size = 0 */
+ {
+ reset_common_data();
+ gbb->hwid_size = 0;
+ size = VB2_GBB_HWID_MAX_SIZE;
+ TEST_EQ(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ VB2_ERROR_GBB_INVALID,
+ "GBB HWID size invalid (HWID missing)");
+ }
+
+ /* GBB HWID offset > GBB size */
+ {
+ reset_common_data();
+ gbb->hwid_offset = sizeof(gbb_data) + 1;
+ size = VB2_GBB_HWID_MAX_SIZE;
+ TEST_EQ(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ VB2_ERROR_EX_READ_RESOURCE_SIZE,
+ "GBB HWID offset invalid");
+ }
+
+ /* buffer size < HWID size */
+ {
+ const char hwid_src[] = "Test HWID";
+ reset_common_data();
+ set_gbb_hwid(hwid_src, sizeof(hwid_src));
+ size = sizeof(hwid_src) - 1;
+ TEST_EQ(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ VB2_ERROR_INVALID_PARAMETER,
+ "HWID too large for buffer");
+ }
+
+ /* GBB HWID size < HWID size */
+ {
+ const char hwid_src[] = "Test HWID";
+ reset_common_data();
+ set_gbb_hwid(hwid_src, sizeof(hwid_src) - 1);
+ size = sizeof(hwid_src);
+ TEST_EQ(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ VB2_ERROR_INVALID_PARAMETER,
+ "HWID larger than GBB HWID size");
+ }
+
+ /* buffer size == HWID size */
+ {
+ const char hwid_src[] = "Test HWID";
+ reset_common_data();
+ set_gbb_hwid(hwid_src, sizeof(hwid_src));
+ size = sizeof(hwid_src);
+ TEST_SUCC(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ "read normal HWID");
+ TEST_EQ(strcmp(hwid, "Test HWID"), 0, " HWID correct");
+ TEST_EQ(strlen(hwid) + 1, size, " HWID size consistent");
+ TEST_EQ(strlen(hwid), strlen("Test HWID"),
+ " HWID size correct");
+ }
+
+ /* buffer size > HWID size */
+ {
+ const char hwid_src[] = "Test HWID";
+ reset_common_data();
+ set_gbb_hwid(hwid_src, sizeof(hwid_src));
+ size = sizeof(hwid_src) + 1;
+ TEST_SUCC(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ "read normal HWID");
+ TEST_EQ(strcmp(hwid, "Test HWID"), 0, " HWID correct");
+ TEST_EQ(strlen(hwid) + 1, size, " HWID size consistent");
+ TEST_EQ(strlen(hwid), strlen("Test HWID"),
+ " HWID size correct");
+ }
+
+ /* HWID with garbage */
+ {
+ const char hwid_src[] = "Test HWID\0garbagegarbage";
+ reset_common_data();
+ set_gbb_hwid(hwid_src, sizeof(hwid_src));
+ size = VB2_GBB_HWID_MAX_SIZE;
+ TEST_SUCC(vb2api_gbb_read_hwid(&ctx, hwid, &size),
+ "read HWID with garbage");
+ TEST_EQ(strcmp(hwid, "Test HWID"), 0, " HWID correct");
+ TEST_EQ(strlen(hwid) + 1, size, " HWID size consistent");
+ TEST_EQ(strlen(hwid), strlen("Test HWID"),
+ " HWID size correct");
+ }
+}
+
+int main(int argc, char* argv[])
+{
+ key_tests();
+ hwid_tests();
+
+ return gTestSuccess ? 0 : 255;
+}