| #!/bin/bash |
| |
| # Copyright (c) 2014 The Chromium OS Authors. All rights reserved. |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| # |
| # End-to-end test for vboot2 firmware verification |
| |
| # Load common constants and variables. |
| . "$(dirname "$0")/common.sh" |
| |
| set -e |
| |
| echo 'Creating test firmware' |
| |
| # Run tests in a dedicated directory for easy cleanup or debugging. |
| DIR="${TEST_DIR}/vb2fw_test_dir" |
| [ -d "$DIR" ] || mkdir -p "$DIR" |
| echo "Testing vb2_verify_fw in $DIR" |
| cd "$DIR" |
| |
| # Dummy firmware body |
| echo 'This is a test firmware body. This is only a test. Lalalalala' \ |
| > body.test |
| |
| algo_to_rsa() |
| { |
| case $1 in |
| 0|1|2) printf "rsa1024";; |
| 3|4|5) printf "rsa2048";; |
| 6|7|8) printf "rsa4096";; |
| 9|10|11) printf "rsa8192";; |
| *) exit 1;; |
| esac |
| } |
| |
| algo_to_sha() |
| { |
| case $1 in |
| 0|3|6|9) printf "sha1";; |
| 1|4|7|10) printf "sha256";; |
| 2|5|8|11) printf "sha512";; |
| *) exit 1;; |
| esac |
| } |
| |
| run_test() |
| { |
| local root_algo=$1 |
| local fw_algo=$2 |
| local kern_algo=$3 |
| |
| local root_rsa="$(algo_to_rsa ${root_algo})" |
| local fw_rsa="$(algo_to_rsa ${fw_algo})" |
| local kern_rsa="$(algo_to_rsa ${kern_algo})" |
| |
| local root_sha="$(algo_to_sha ${root_algo})" |
| local fw_sha="$(algo_to_sha ${fw_algo})" |
| local kern_sha="$(algo_to_sha ${kern_algo})" |
| |
| # Pack keys using original vboot utilities |
| ${FUTILITY} vbutil_key --pack rootkey.test \ |
| --key "${TESTKEY_DIR}/key_${root_rsa}.keyb" --algorithm ${root_algo} |
| ${FUTILITY} vbutil_key --pack fwsubkey.test \ |
| --key "${TESTKEY_DIR}/key_${fw_rsa}.keyb" --algorithm ${fw_algo} |
| ${FUTILITY} vbutil_key --pack kernkey.test \ |
| --key "${TESTKEY_DIR}/key_${kern_rsa}.keyb" --algorithm ${kern_algo} |
| |
| # Create a GBB with the root key |
| ${FUTILITY} gbb -c 128,2400,0,0 gbb.test |
| ${FUTILITY} gbb gbb.test -s --hwid='Test GBB' \ |
| --rootkey=rootkey.test |
| |
| # Keyblock with firmware subkey is signed by root key |
| ${FUTILITY} vbutil_keyblock --pack keyblock.test \ |
| --datapubkey fwsubkey.test \ |
| --signprivate "${TESTKEY_DIR}/key_${root_rsa}.${root_sha}.vbprivk" |
| |
| # Firmware preamble is signed with the firmware subkey |
| ${FUTILITY} vbutil_firmware \ |
| --vblock vblock.test \ |
| --keyblock keyblock.test \ |
| --signprivate "${TESTKEY_DIR}/key_${fw_rsa}.${fw_sha}.vbprivk" \ |
| --fv body.test \ |
| --version 1 \ |
| --kernelkey kernkey.test |
| |
| echo "Verifying test firmware using vb2_verify_fw" \ |
| "(root=${root_algo}, fw=${fw_algo}, kernel=${kern_algo})" |
| |
| # Verify the firmware using vboot2 checks |
| ${BUILD_RUN}/tests/vb20_verify_fw gbb.test vblock.test body.test |
| |
| happy 'vb2_verify_fw succeeded' |
| } |
| |
| run_test 11 7 4 |
| run_test 11 11 11 |
| run_test 1 1 1 |