diff options
Diffstat (limited to 'tests')
-rw-r--r-- | tests/vb20_common2_tests.c | 13 | ||||
-rw-r--r-- | tests/vb20_common3_tests.c | 10 | ||||
-rw-r--r-- | tests/vb21_common2_tests.c | 12 | ||||
-rw-r--r-- | tests/vb2_rsa_utility_tests.c | 2 | ||||
-rw-r--r-- | tests/vboot_common_tests.c | 3 |
5 files changed, 24 insertions, 16 deletions
diff --git a/tests/vb20_common2_tests.c b/tests/vb20_common2_tests.c index 671fa9fe..00861e58 100644 --- a/tests/vb20_common2_tests.c +++ b/tests/vb20_common2_tests.c @@ -13,6 +13,7 @@ #include "2rsa.h" #include "file_keys.h" #include "host_common.h" +#include "host_key2.h" #include "vb2_common.h" #include "vboot_common.h" #include "test_common.h" @@ -138,7 +139,8 @@ static void test_verify_data(const struct vb2_packed_key *key1, int test_algorithm(int key_algorithm, const char *keys_dir) { char filename[1024]; - int rsa_len = siglen_map[key_algorithm] * 8; + int rsa_bits = 8 * vb2_rsa_sig_size( + vb2_crypto_to_signature(key_algorithm)); struct vb2_private_key *private_key = NULL; struct vb2_signature *sig = NULL; @@ -146,10 +148,11 @@ int test_algorithm(int key_algorithm, const char *keys_dir) int retval = 1; - printf("***Testing algorithm: %s\n", algo_strings[key_algorithm]); + printf("***Testing algorithm: %s\n", + vb2_get_crypto_algorithm_name(key_algorithm)); snprintf(filename, sizeof(filename), - "%s/key_rsa%d.pem", keys_dir, rsa_len); + "%s/key_rsa%d.pem", keys_dir, rsa_bits); private_key = vb2_read_private_key_pem(filename, key_algorithm); if (!private_key) { fprintf(stderr, "Error reading private_key: %s\n", filename); @@ -157,7 +160,7 @@ int test_algorithm(int key_algorithm, const char *keys_dir) } snprintf(filename, sizeof(filename), - "%s/key_rsa%d.keyb", keys_dir, rsa_len); + "%s/key_rsa%d.keyb", keys_dir, rsa_bits); key1 = vb2_read_packed_keyb(filename, key_algorithm, 1); if (!key1) { fprintf(stderr, "Error reading public_key: %s\n", filename); @@ -208,7 +211,7 @@ int main(int argc, char *argv[]) { /* Test all the algorithms */ int alg; - for (alg = 0; alg < kNumAlgorithms; alg++) { + for (alg = 0; alg < VB2_ALG_COUNT; alg++) { if (test_algorithm(alg, argv[1])) return 1; } diff --git a/tests/vb20_common3_tests.c b/tests/vb20_common3_tests.c index b4e5bf5e..e5538673 100644 --- a/tests/vb20_common3_tests.c +++ b/tests/vb20_common3_tests.c @@ -515,8 +515,10 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm, const char *keys_dir) { char filename[1024]; - int signing_rsa_len = siglen_map[signing_key_algorithm] * 8; - int data_rsa_len = siglen_map[data_key_algorithm] * 8; + int signing_rsa_len = 8 * vb2_rsa_sig_size( + vb2_crypto_to_signature(signing_key_algorithm)); + int data_rsa_len = 8 * vb2_rsa_sig_size( + vb2_crypto_to_signature(data_key_algorithm)); int retval = 1; struct vb2_private_key *signing_private_key = NULL; @@ -524,9 +526,9 @@ int test_permutation(int signing_key_algorithm, int data_key_algorithm, struct vb2_packed_key *data_public_key = NULL; printf("***Testing signing algorithm: %s\n", - algo_strings[signing_key_algorithm]); + vb2_get_crypto_algorithm_name(signing_key_algorithm)); printf("***With data key algorithm: %s\n", - algo_strings[data_key_algorithm]); + vb2_get_crypto_algorithm_name(data_key_algorithm)); snprintf(filename, sizeof(filename), "%s/key_rsa%d.pem", keys_dir, signing_rsa_len); diff --git a/tests/vb21_common2_tests.c b/tests/vb21_common2_tests.c index 15e4d505..b121fa5a 100644 --- a/tests/vb21_common2_tests.c +++ b/tests/vb21_common2_tests.c @@ -239,7 +239,8 @@ static void test_verify_data(const struct vb2_public_key *pubk_orig, int test_algorithm(int key_algorithm, const char *keys_dir) { char filename[1024]; - int rsa_len = siglen_map[key_algorithm] * 8; + int rsa_bits = 8 * vb2_rsa_sig_size( + vb2_crypto_to_signature(key_algorithm)); enum vb2_signature_algorithm sig_alg = vb2_crypto_to_signature(key_algorithm); @@ -250,10 +251,11 @@ int test_algorithm(int key_algorithm, const char *keys_dir) struct vb2_public_key *pubk = NULL; struct vb21_packed_key *key2 = NULL; - printf("***Testing algorithm: %s\n", algo_strings[key_algorithm]); + printf("***Testing algorithm: %s\n", + vb2_get_crypto_algorithm_name(key_algorithm)); snprintf(filename, sizeof(filename), - "%s/key_rsa%d.pem", keys_dir, rsa_len); + "%s/key_rsa%d.pem", keys_dir, rsa_bits); TEST_SUCC(vb2_private_key_read_pem(&prik, filename), "Read private key"); prik->hash_alg = hash_alg; @@ -261,7 +263,7 @@ int test_algorithm(int key_algorithm, const char *keys_dir) vb2_private_key_set_desc(prik, "private key"); snprintf(filename, sizeof(filename), - "%s/key_rsa%d.keyb", keys_dir, rsa_len); + "%s/key_rsa%d.keyb", keys_dir, rsa_bits); TEST_SUCC(vb2_public_key_read_keyb(&pubk, filename), "Read public key"); pubk->hash_alg = hash_alg; @@ -305,7 +307,7 @@ int main(int argc, char *argv[]) { /* Test all the algorithms */ int alg; - for (alg = 0; alg < kNumAlgorithms; alg++) { + for (alg = 0; alg < VB2_ALG_COUNT; alg++) { if (test_algorithm(alg, argv[1])) return 1; } diff --git a/tests/vb2_rsa_utility_tests.c b/tests/vb2_rsa_utility_tests.c index 99282bf7..df603272 100644 --- a/tests/vb2_rsa_utility_tests.c +++ b/tests/vb2_rsa_utility_tests.c @@ -40,7 +40,7 @@ static void test_utils(void) .hash_alg = VB2_HASH_INVALID}; /* Verify old and new algorithm count constants match */ - TEST_EQ(kNumAlgorithms, VB2_ALG_COUNT, "Algorithm counts"); + TEST_EQ(VB2_ALG_COUNT, VB2_ALG_COUNT, "Algorithm counts"); /* Crypto algorithm to sig algorithm mapping */ TEST_EQ(vb2_crypto_to_signature(VB2_ALG_RSA1024_SHA1), diff --git a/tests/vboot_common_tests.c b/tests/vboot_common_tests.c index d5494d42..8e005260 100644 --- a/tests/vboot_common_tests.c +++ b/tests/vboot_common_tests.c @@ -9,6 +9,7 @@ #include <stdio.h> #include <stdlib.h> +#include "host_common.h" #include "test_common.h" #include "utility.h" #include "vboot_common.h" @@ -154,7 +155,7 @@ static void PublicKeyTest(void) PublicKeyInit(k, (uint8_t*)(k + 1), 2 * sizeof(VbPublicKey)); TEST_EQ(k->key_offset, sizeof(VbPublicKey), "PublicKeyInit key_offset"); TEST_EQ(k->key_size, 2 * sizeof(VbPublicKey), "PublicKeyInit key_size"); - TEST_EQ(k->algorithm, kNumAlgorithms, "PublicKeyInit algorithm"); + TEST_EQ(k->algorithm, VB2_ALG_COUNT, "PublicKeyInit algorithm"); TEST_EQ(k->key_version, 0, "PublicKeyInit key_version"); /* Set algorithm and version, so we can tell if they get copied */ |