/* Copyright (c) 2014 The Chromium OS Authors. All rights reserved. * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. * * Tests for firmware 2common.c */ #include "2sysincludes.h" #include "vb2_common.h" #include "vboot_struct.h" /* For old struct sizes */ #include "test_common.h" /* * Test struct packing for vboot_struct.h structs which are passed between * firmware and OS, or passed between different phases of firmware. */ static void test_struct_packing(void) { /* Test vboot2 versions of vboot1 structs */ TEST_EQ(EXPECTED_VB2_SIGNATURE_SIZE, sizeof(struct vb2_signature), "sizeof(vb2_signature)"); TEST_EQ(EXPECTED_VB2_KEYBLOCK_SIZE, sizeof(struct vb2_keyblock), "sizeof(vb2_keyblock)"); TEST_EQ(EXPECTED_VB2_FW_PREAMBLE_SIZE, sizeof(struct vb2_fw_preamble), "sizeof(vb2_fw_preamble)"); /* And make sure they're the same as their vboot1 equivalents */ TEST_EQ(EXPECTED_VB2_SIGNATURE_SIZE, EXPECTED_VBSIGNATURE_SIZE, "vboot1->2 signature sizes same"); TEST_EQ(EXPECTED_VB2_KEYBLOCK_SIZE, EXPECTED_VBKEYBLOCKHEADER_SIZE, "vboot1->2 keyblock sizes same"); } /** * Helper functions not dependent on specific key sizes */ static void test_helper_functions(void) { { struct vb2_signature s = {.sig_offset = sizeof(s)}; TEST_EQ((int)vb2_offset_of(&s, vb2_signature_data(&s)), sizeof(s), "vb2_signature_data() adjacent"); } { struct vb2_signature s = {.sig_offset = 123}; TEST_EQ((int)vb2_offset_of(&s, vb2_signature_data(&s)), 123, "vb2_signature_data() spaced"); } { struct vb2_signature s = {.sig_offset = sizeof(s), .sig_size = 128}; TEST_SUCC(vb2_verify_signature_inside(&s, sizeof(s)+128, &s), "SignatureInside ok 1"); TEST_SUCC(vb2_verify_signature_inside(&s - 1, 2*sizeof(s)+128, &s), "SignatureInside ok 2"); TEST_EQ(vb2_verify_signature_inside(&s, 128, &s), VB2_ERROR_INSIDE_DATA_OUTSIDE, "SignatureInside sig too big"); } { struct vb2_signature s = {.sig_offset = 100, .sig_size = 4}; TEST_EQ(vb2_verify_signature_inside(&s, 99, &s), VB2_ERROR_INSIDE_DATA_OUTSIDE, "SignatureInside offset too big"); } } int main(int argc, char* argv[]) { test_struct_packing(); test_helper_functions(); return gTestSuccess ? 0 : 255; }