summaryrefslogtreecommitdiff
path: root/tests/vb20_common3_tests.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/vb20_common3_tests.c')
-rw-r--r--tests/vb20_common3_tests.c38
1 files changed, 24 insertions, 14 deletions
diff --git a/tests/vb20_common3_tests.c b/tests/vb20_common3_tests.c
index 95207382..6de4b8a0 100644
--- a/tests/vb20_common3_tests.c
+++ b/tests/vb20_common3_tests.c
@@ -203,18 +203,18 @@ static void test_verify_keyblock(const VbPublicKey *public_key,
}
static void resign_fw_preamble(struct vb2_fw_preamble *h,
- const VbPrivateKey *key)
+ struct vb2_private_key *key)
{
- VbSignature *sig = CalculateSignature(
+ struct vb2_signature *sig = vb2_calculate_signature(
(const uint8_t *)h, h->preamble_signature.data_size, key);
- SignatureCopy((VbSignature *)&h->preamble_signature, sig);
+ vb2_copy_signature(&h->preamble_signature, sig);
free(sig);
}
static void test_verify_fw_preamble(const VbPublicKey *public_key,
- const VbPrivateKey *private_key,
- const VbPublicKey *kernel_subkey)
+ struct vb2_private_key *private_key,
+ struct vb2_packed_key *kernel_subkey)
{
struct vb2_fw_preamble *hdr;
struct vb2_fw_preamble *h;
@@ -227,17 +227,16 @@ static void test_verify_fw_preamble(const VbPublicKey *public_key,
vb2_workbuf_init(&wb, workbuf, sizeof(workbuf));
/* Create a dummy signature */
- VbSignature *body_sig = SignatureAlloc(56, 78);
+ struct vb2_signature *body_sig = vb2_alloc_signature(56, 78);
TEST_SUCC(vb2_unpack_key(&rsa, (uint8_t *)public_key,
public_key->key_offset + public_key->key_size),
"vb2_verify_fw_preamble() prereq key");
- hdr = (struct vb2_fw_preamble *)
- CreateFirmwarePreamble(0x1234, kernel_subkey, body_sig,
- private_key, 0x5678);
+ hdr = vb2_create_fw_preamble(0x1234, kernel_subkey, body_sig,
+ private_key, 0x5678);
TEST_PTR_NEQ(hdr, NULL,
- "VerifyFirmwarePreamble() prereq test preamble");
+ "vb2_verify_fw_preamble() prereq test preamble");
if (!hdr)
return;
hsize = (uint32_t) hdr->preamble_size;
@@ -368,7 +367,7 @@ static void test_verify_kernel_preamble(const VbPublicKey *public_key,
vb2_workbuf_init(&wb, workbuf, sizeof(workbuf));
/* Create a dummy signature */
- VbSignature *body_sig = SignatureAlloc(56, 0x214000);
+ struct vb2_signature *body_sig = vb2_alloc_signature(56, 0x214000);
TEST_SUCC(vb2_unpack_key(&rsa, (uint8_t *)public_key,
public_key->key_offset + public_key->key_size),
@@ -376,7 +375,8 @@ static void test_verify_kernel_preamble(const VbPublicKey *public_key,
hdr = (struct vb2_kernel_preamble *)
CreateKernelPreamble(0x1234, 0x100000, 0x300000, 0x4000,
- body_sig, 0x304000, 0x10000, 0, 0,
+ (VbSignature *)body_sig,
+ 0x304000, 0x10000, 0, 0,
private_key);
TEST_PTR_NEQ(hdr, NULL,
"vb2_verify_kernel_preamble() prereq test preamble");
@@ -542,6 +542,14 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
return 1;
}
+ struct vb2_private_key *signing_private_key2 =
+ vb2_read_private_key_pem(filename, signing_key_algorithm);
+ if (!signing_private_key2) {
+ fprintf(stderr, "Error reading signing_private_key: %s\n",
+ filename);
+ return 1;
+ }
+
sprintf(filename, "%s/key_rsa%d.keyb", keys_dir, signing_rsa_len);
signing_public_key = PublicKeyReadKeyb(filename,
signing_key_algorithm, 1);
@@ -564,14 +572,16 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm,
data_public_key);
test_verify_keyblock(signing_public_key, signing_private_key,
data_public_key);
- test_verify_fw_preamble(signing_public_key, signing_private_key,
- data_public_key);
+ test_verify_fw_preamble(signing_public_key, signing_private_key2,
+ (struct vb2_packed_key *)data_public_key);
test_verify_kernel_preamble(signing_public_key, signing_private_key);
if (signing_public_key)
free(signing_public_key);
if (signing_private_key)
free(signing_private_key);
+ if (signing_private_key2)
+ free(signing_private_key2);
if (data_public_key)
free(data_public_key);