/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. */ /* Routines for verifying a file's signature. Useful in testing the core * RSA verification implementation. */ #include /* For PRIu64 macro */ #include #include #include #include #include #include "load_kernel_fw.h" #include "boot_device.h" #include "host_common.h" #include "rollback_index.h" #include "utility.h" #include "vboot_kernel.h" #define LBA_BYTES 512 #define KERNEL_BUFFER_SIZE 0xA00000 /* Global variables for stub functions */ static LoadKernelParams lkp; static FILE *image_file = NULL; /* Boot device stub implementations to read from the image file */ int BootDeviceReadLBA(uint64_t lba_start, uint64_t lba_count, void *buffer) { printf("Read(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count); if (lba_start > lkp.ending_lba || lba_start + lba_count - 1 > lkp.ending_lba) { fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n", lba_start, lba_count, lkp.ending_lba); return 1; } fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET); if (1 != fread(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) { fprintf(stderr, "Read error."); return 1; } return 0; } int BootDeviceWriteLBA(uint64_t lba_start, uint64_t lba_count, const void *buffer) { printf("Write(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count); if (lba_start > lkp.ending_lba || lba_start + lba_count - 1 > lkp.ending_lba) { fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n", lba_start, lba_count, lkp.ending_lba); return 1; } /* TODO: enable writes, once we're sure it won't trash our example file */ return 0; fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET); if (1 != fwrite(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) { fprintf(stderr, "Read error."); return 1; } return 0; } /* Main routine */ int main(int argc, char* argv[]) { const char* image_name; int rv, c, argsleft; int errorcnt = 0; char *e = 0; Memset(&lkp, 0, sizeof(LoadKernelParams)); lkp.bytes_per_lba = LBA_BYTES; lkp.boot_flags = BOOT_FLAG_RECOVERY; /* Parse options */ opterr = 0; while ((c=getopt(argc, argv, ":b:")) != -1) { switch (c) { case 'b': lkp.boot_flags = strtoull(optarg, &e, 0); if (!*optarg || (e && *e)) { fprintf(stderr, "Invalid argument to -%c: \"%s\"\n", c, optarg); errorcnt++; } break; case '?': fprintf(stderr, "Unrecognized switch: -%c\n", optopt); errorcnt++; break; case ':': fprintf(stderr, "Missing argument to -%c\n", optopt); errorcnt++; break; default: errorcnt++; break; } } /* Update argc */ argsleft = argc - optind; if (errorcnt || !argsleft) { fprintf(stderr, "usage: %s [options] []\n", argv[0]); fprintf(stderr, "\noptions:\n"); fprintf(stderr, " -b NUM boot flag bits (default %" PRIu64 "):\n", BOOT_FLAG_RECOVERY); fprintf(stderr, " %" PRIu64 " = developer mode on\n", BOOT_FLAG_DEVELOPER); fprintf(stderr, " %" PRIu64 " = recovery mode on\n", BOOT_FLAG_RECOVERY); return 1; } image_name = argv[optind]; /* Read header signing key blob */ if (argsleft > 1) { uint64_t key_size; lkp.header_sign_key_blob = ReadFile(argv[optind+1], &key_size); if (!lkp.header_sign_key_blob) { fprintf(stderr, "Unable to read key file %s\n", argv[optind+1]); return 1; } } /* Need to skip the address check, since we're putting it somewhere on the * heap instead of its actual target address in the firmware. */ lkp.boot_flags |= BOOT_FLAG_SKIP_ADDR_CHECK; printf("bootflags = %" PRIu64 "\n", lkp.boot_flags); /* Get image size */ printf("Reading from image: %s\n", image_name); image_file = fopen(image_name, "rb"); if (!image_file) { fprintf(stderr, "Unable to open image file %s\n", image_name); return 1; } fseek(image_file, 0, SEEK_END); lkp.ending_lba = (ftell(image_file) / LBA_BYTES) - 1; rewind(image_file); printf("Ending LBA: %" PRIu64 "\n", lkp.ending_lba); /* Allocate a buffer for the kernel */ lkp.kernel_buffer = Malloc(KERNEL_BUFFER_SIZE); if(!lkp.kernel_buffer) { fprintf(stderr, "Unable to allocate kernel buffer.\n"); return 1; } lkp.kernel_buffer_size = KERNEL_BUFFER_SIZE; /* Call LoadKernel() */ rv = LoadKernel(&lkp); printf("LoadKernel() returned %d\n", rv); if (LOAD_KERNEL_SUCCESS == rv) { printf("Partition number: %" PRIu64 "\n", lkp.partition_number); printf("Bootloader address: %" PRIu64 "\n", lkp.bootloader_address); printf("Bootloader size: %" PRIu64 "\n", lkp.bootloader_size); printf("Partition guid: " "%02x%02x%02x%02x-%02x%02x-%02x%02x" "-%02x%02x-%02x%02x%02x%02x%02x%02x\n", lkp.partition_guid[3], lkp.partition_guid[2], lkp.partition_guid[1], lkp.partition_guid[0], lkp.partition_guid[5], lkp.partition_guid[4], lkp.partition_guid[7], lkp.partition_guid[6], lkp.partition_guid[8], lkp.partition_guid[9], lkp.partition_guid[10], lkp.partition_guid[11], lkp.partition_guid[12], lkp.partition_guid[13], lkp.partition_guid[14], lkp.partition_guid[15]); } fclose(image_file); Free(lkp.kernel_buffer); return rv != LOAD_KERNEL_SUCCESS; }