#!/bin/bash # Copyright (c) 2014 The Chromium OS Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. # # End-to-end test for vboot2 firmware verification # Load common constants and variables. . "$(dirname "$0")/common.sh" set -e echo 'Creating test firmware' # Run tests in a dedicated directory for easy cleanup or debugging. DIR="${TEST_DIR}/vb2fw_test_dir" [ -d "$DIR" ] || mkdir -p "$DIR" echo "Testing vb2_verify_fw in $DIR" cd "$DIR" # Dummy firmware body echo 'This is a test firmware body. This is only a test. Lalalalala' \ > body.test algo_to_rsa() { case $1 in 0|1|2) printf "rsa1024";; 3|4|5) printf "rsa2048";; 6|7|8) printf "rsa4096";; 9|10|11) printf "rsa8192";; *) exit 1;; esac } algo_to_sha() { case $1 in 0|3|6|9) printf "sha1";; 1|4|7|10) printf "sha256";; 2|5|8|11) printf "sha512";; *) exit 1;; esac } run_test() { local root_algo=$1 local fw_algo=$2 local kern_algo=$3 local root_rsa="$(algo_to_rsa ${root_algo})" local fw_rsa="$(algo_to_rsa ${fw_algo})" local kern_rsa="$(algo_to_rsa ${kern_algo})" local root_sha="$(algo_to_sha ${root_algo})" local fw_sha="$(algo_to_sha ${fw_algo})" local kern_sha="$(algo_to_sha ${kern_algo})" # Pack keys using original vboot utilities ${FUTILITY} vbutil_key --pack rootkey.test \ --key "${TESTKEY_DIR}/key_${root_rsa}.keyb" --algorithm ${root_algo} ${FUTILITY} vbutil_key --pack fwsubkey.test \ --key "${TESTKEY_DIR}/key_${fw_rsa}.keyb" --algorithm ${fw_algo} ${FUTILITY} vbutil_key --pack kernkey.test \ --key "${TESTKEY_DIR}/key_${kern_rsa}.keyb" --algorithm ${kern_algo} # Create a GBB with the root key ${FUTILITY} gbb -c 128,2400,0,0 gbb.test ${FUTILITY} gbb gbb.test -s --hwid='Test GBB' \ --rootkey=rootkey.test # Keyblock with firmware subkey is signed by root key ${FUTILITY} vbutil_keyblock --pack keyblock.test \ --datapubkey fwsubkey.test \ --signprivate "${TESTKEY_DIR}/key_${root_rsa}.${root_sha}.vbprivk" # Firmware preamble is signed with the firmware subkey ${FUTILITY} vbutil_firmware \ --vblock vblock.test \ --keyblock keyblock.test \ --signprivate "${TESTKEY_DIR}/key_${fw_rsa}.${fw_sha}.vbprivk" \ --fv body.test \ --version 1 \ --kernelkey kernkey.test echo "Verifying test firmware using vb2_verify_fw" \ "(root=${root_algo}, fw=${fw_algo}, kernel=${kern_algo})" # Verify the firmware using vboot2 checks ${BUILD_RUN}/tests/vb20_verify_fw gbb.test vblock.test body.test happy 'vb2_verify_fw succeeded' } run_test 11 7 4 run_test 11 11 11 run_test 1 1 1