summaryrefslogtreecommitdiff
path: root/tests/vb20_common_tests.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/vb20_common_tests.c')
-rw-r--r--tests/vb20_common_tests.c87
1 files changed, 0 insertions, 87 deletions
diff --git a/tests/vb20_common_tests.c b/tests/vb20_common_tests.c
index 9cc6dd7f..d4555f44 100644
--- a/tests/vb20_common_tests.c
+++ b/tests/vb20_common_tests.c
@@ -17,9 +17,6 @@
static void test_struct_packing(void)
{
/* Test vboot2 versions of vboot1 structs */
- TEST_EQ(EXPECTED_VB2_PACKED_KEY_SIZE,
- sizeof(struct vb2_packed_key),
- "sizeof(vb2_packed_key)");
TEST_EQ(EXPECTED_VB2_SIGNATURE_SIZE,
sizeof(struct vb2_signature),
"sizeof(vb2_signature)");
@@ -29,14 +26,8 @@ static void test_struct_packing(void)
TEST_EQ(EXPECTED_VB2_FW_PREAMBLE_SIZE,
sizeof(struct vb2_fw_preamble),
"sizeof(vb2_fw_preamble)");
- TEST_EQ(EXPECTED_VB2_GBB_HEADER_SIZE,
- sizeof(struct vb2_gbb_header),
- "sizeof(vb2_gbb_header)");
/* And make sure they're the same as their vboot1 equivalents */
- TEST_EQ(EXPECTED_VB2_PACKED_KEY_SIZE,
- EXPECTED_VBPUBLICKEY_SIZE,
- "vboot1->2 packed key sizes same");
TEST_EQ(EXPECTED_VB2_SIGNATURE_SIZE,
EXPECTED_VBSIGNATURE_SIZE,
"vboot1->2 signature sizes same");
@@ -51,25 +42,6 @@ static void test_struct_packing(void)
static void test_helper_functions(void)
{
{
- uint8_t *p = (uint8_t *)test_helper_functions;
- TEST_EQ((int)vb2_offset_of(p, p), 0, "vb2_offset_of() equal");
- TEST_EQ((int)vb2_offset_of(p, p+10), 10,
- "vb2_offset_of() positive");
- }
-
- {
- struct vb2_packed_key k = {.key_offset = sizeof(k)};
- TEST_EQ((int)vb2_offset_of(&k, vb2_packed_key_data(&k)),
- sizeof(k), "vb2_packed_key_data() adjacent");
- }
-
- {
- struct vb2_packed_key k = {.key_offset = 123};
- TEST_EQ((int)vb2_offset_of(&k, vb2_packed_key_data(&k)), 123,
- "vb2_packed_key_data() spaced");
- }
-
- {
struct vb2_signature s = {.sig_offset = sizeof(s)};
TEST_EQ((int)vb2_offset_of(&s, vb2_signature_data(&s)),
sizeof(s), "vb2_signature_data() adjacent");
@@ -82,65 +54,6 @@ static void test_helper_functions(void)
}
{
- uint8_t *p = (uint8_t *)test_helper_functions;
- TEST_SUCC(vb2_verify_member_inside(p, 20, p, 6, 11, 3),
- "MemberInside ok 1");
- TEST_SUCC(vb2_verify_member_inside(p, 20, p+4, 4, 8, 4),
- "MemberInside ok 2");
- TEST_EQ(vb2_verify_member_inside(p, 20, p-4, 4, 8, 4),
- VB2_ERROR_INSIDE_MEMBER_OUTSIDE,
- "MemberInside member before parent");
- TEST_EQ(vb2_verify_member_inside(p, 20, p+20, 4, 8, 4),
- VB2_ERROR_INSIDE_MEMBER_OUTSIDE,
- "MemberInside member after parent");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 21, 0, 0),
- VB2_ERROR_INSIDE_MEMBER_OUTSIDE,
- "MemberInside member too big");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 4, 21, 0),
- VB2_ERROR_INSIDE_DATA_OUTSIDE,
- "MemberInside data after parent");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 4, SIZE_MAX, 0),
- VB2_ERROR_INSIDE_DATA_OUTSIDE,
- "MemberInside data before parent");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 4, 4, 17),
- VB2_ERROR_INSIDE_DATA_OUTSIDE,
- "MemberInside data too big");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 8, 4, 8),
- VB2_ERROR_INSIDE_DATA_OVERLAP,
- "MemberInside data overlaps member");
- TEST_EQ(vb2_verify_member_inside(p, -8, p, 12, 0, 0),
- VB2_ERROR_INSIDE_PARENT_WRAPS,
- "MemberInside wraparound 1");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, -8, 0, 0),
- VB2_ERROR_INSIDE_MEMBER_WRAPS,
- "MemberInside wraparound 2");
- TEST_EQ(vb2_verify_member_inside(p, 20, p, 4, 4, -12),
- VB2_ERROR_INSIDE_DATA_WRAPS,
- "MemberInside wraparound 3");
- }
-
- {
- struct vb2_packed_key k = {.key_offset = sizeof(k),
- .key_size = 128};
- TEST_SUCC(vb2_verify_packed_key_inside(&k, sizeof(k)+128, &k),
- "PublicKeyInside ok 1");
- TEST_SUCC(vb2_verify_packed_key_inside(&k - 1,
- 2*sizeof(k)+128, &k),
- "PublicKeyInside ok 2");
- TEST_EQ(vb2_verify_packed_key_inside(&k, 128, &k),
- VB2_ERROR_INSIDE_DATA_OUTSIDE,
- "PublicKeyInside key too big");
- }
-
- {
- struct vb2_packed_key k = {.key_offset = 100,
- .key_size = 4};
- TEST_EQ(vb2_verify_packed_key_inside(&k, 99, &k),
- VB2_ERROR_INSIDE_DATA_OUTSIDE,
- "PublicKeyInside offset too big");
- }
-
- {
struct vb2_signature s = {.sig_offset = sizeof(s),
.sig_size = 128};
TEST_SUCC(vb2_verify_signature_inside(&s, sizeof(s)+128, &s),