blob: 7cfea90e52de57cc5a011c57bbf3ede11e71502c [file] [log] [blame]
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*
* Tests for firmware vboot_common.c
*/
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include "test_common.h"
#include "utility.h"
#include "vboot_common.h"
/*
* Test struct packing for vboot_struct.h structs which are passed between
* firmware and OS, or passed between different phases of firmware.
*/
static void StructPackingTest(void)
{
TEST_EQ(EXPECTED_VBPUBLICKEY_SIZE, sizeof(VbPublicKey),
"sizeof(VbPublicKey)");
TEST_EQ(EXPECTED_VBSIGNATURE_SIZE, sizeof(VbSignature),
"sizeof(VbSignature)");
TEST_EQ(EXPECTED_VBKEYBLOCKHEADER_SIZE, sizeof(VbKeyBlockHeader),
"sizeof(VbKeyBlockHeader)");
TEST_EQ(EXPECTED_VBFIRMWAREPREAMBLEHEADER2_0_SIZE,
sizeof(VbFirmwarePreambleHeader2_0),
"sizeof(VbFirmwarePreambleHeader2_0)");
TEST_EQ(EXPECTED_VBFIRMWAREPREAMBLEHEADER2_1_SIZE,
sizeof(VbFirmwarePreambleHeader),
"sizeof(VbFirmwarePreambleHeader)");
TEST_EQ(EXPECTED_VBKERNELPREAMBLEHEADER_SIZE,
sizeof(VbKernelPreambleHeader),
"sizeof(VbKernelPreambleHeader)");
TEST_EQ(VB_SHARED_DATA_HEADER_SIZE_V1,
(long)&((VbSharedDataHeader*)NULL)->recovery_reason,
"sizeof(VbSharedDataHeader) V1");
TEST_EQ(VB_SHARED_DATA_HEADER_SIZE_V2,
sizeof(VbSharedDataHeader),
"sizeof(VbSharedDataHeader) V2");
}
/* Test array size macro */
static void ArraySizeTest(void)
{
uint8_t arr1[12];
uint32_t arr2[7];
uint64_t arr3[9];
TEST_EQ(ARRAY_SIZE(arr1), 12, "ARRAYSIZE(uint8_t)");
TEST_EQ(ARRAY_SIZE(arr2), 7, "ARRAYSIZE(uint32_t)");
TEST_EQ(ARRAY_SIZE(arr3), 9, "ARRAYSIZE(uint64_t)");
}
/* Helper functions not dependent on specific key sizes */
static void VerifyHelperFunctions(void)
{
{
uint8_t *p = (uint8_t *)VerifyHelperFunctions;
TEST_EQ((int)OffsetOf(p, p), 0, "OffsetOf() equal");
TEST_EQ((int)OffsetOf(p, p+10), 10, "OffsetOf() positive");
TEST_EQ((int)OffsetOf(p, p+0x12345678), 0x12345678,
"OffsetOf() large");
}
{
VbPublicKey k = {sizeof(k), 2, 3, 4};
TEST_EQ((int)OffsetOf(&k, GetPublicKeyData(&k)), sizeof(k),
"GetPublicKeyData() adjacent");
TEST_EQ((int)OffsetOf(&k, GetPublicKeyDataC(&k)), sizeof(k),
"GetPublicKeyDataC() adjacent");
}
{
VbPublicKey k = {123, 2, 3, 4};
TEST_EQ((int)OffsetOf(&k, GetPublicKeyData(&k)), 123,
"GetPublicKeyData() spaced");
TEST_EQ((int)OffsetOf(&k, GetPublicKeyDataC(&k)), 123,
"GetPublicKeyDataC() spaced");
}
{
uint8_t *p = (uint8_t *)VerifyHelperFunctions;
TEST_EQ(VerifyMemberInside(p, 20, p, 6, 11, 3), 0,
"MemberInside ok 1");
TEST_EQ(VerifyMemberInside(p, 20, p+4, 4, 8, 4), 0,
"MemberInside ok 2");
TEST_EQ(VerifyMemberInside(p, 20, p-4, 4, 8, 4), 1,
"MemberInside member before parent");
TEST_EQ(VerifyMemberInside(p, 20, p+20, 4, 8, 4), 1,
"MemberInside member after parent");
TEST_EQ(VerifyMemberInside(p, 20, p, 21, 0, 0), 1,
"MemberInside member too big");
TEST_EQ(VerifyMemberInside(p, 20, p, 4, 21, 0), 1,
"MemberInside data after parent");
TEST_EQ(VerifyMemberInside(p, 20, p, 4, (uint64_t)-1, 0), 1,
"MemberInside data before parent");
TEST_EQ(VerifyMemberInside(p, 20, p, 4, 4, 17), 1,
"MemberInside data too big");
TEST_EQ(VerifyMemberInside(p, (uint64_t)-1,
p+(uint64_t)-10, 12, 5, 0), 1,
"MemberInside wraparound 1");
TEST_EQ(VerifyMemberInside(p, (uint64_t)-1,
p+(uint64_t)-10, 5, 12, 0), 1,
"MemberInside wraparound 2");
TEST_EQ(VerifyMemberInside(p, (uint64_t)-1,
p+(uint64_t)-10, 5, 0, 12), 1,
"MemberInside wraparound 3");
}
{
VbPublicKey k = {sizeof(k), 128, 0, 0};
TEST_EQ(VerifyPublicKeyInside(&k, sizeof(k)+128, &k), 0,
"PublicKeyInside ok 1");
TEST_EQ(VerifyPublicKeyInside(&k - 1, 2*sizeof(k)+128, &k), 0,
"PublicKeyInside ok 2");
TEST_EQ(VerifyPublicKeyInside(&k, 128, &k), 1,
"PublicKeyInside key too big");
}
{
VbPublicKey k = {100, 4, 0, 0};
TEST_EQ(VerifyPublicKeyInside(&k, 99, &k), 1,
"PublicKeyInside offset too big");
}
{
VbSignature s = {sizeof(s), 128, 2000};
TEST_EQ(VerifySignatureInside(&s, sizeof(s)+128, &s), 0,
"SignatureInside ok 1");
TEST_EQ(VerifySignatureInside(&s - 1, 2*sizeof(s)+128, &s), 0,
"SignatureInside ok 2");
TEST_EQ(VerifySignatureInside(&s, 128, &s), 1,
"SignatureInside sig too big");
}
{
VbSignature s = {100, 4, 0};
TEST_EQ(VerifySignatureInside(&s, 99, &s), 1,
"SignatureInside offset too big");
}
}
/* Public key utility functions */
static void PublicKeyTest(void)
{
VbPublicKey k[3];
VbPublicKey j[5];
/* Fill some bits of the public key data */
Memset(j, 0, sizeof(j));
Memset(k, 0x42, sizeof(k));
k[1].key_size = 12345;
k[2].key_version = 67;
PublicKeyInit(k, (uint8_t*)(k + 1), 2 * sizeof(VbPublicKey));
TEST_EQ(k->key_offset, sizeof(VbPublicKey), "PublicKeyInit key_offset");
TEST_EQ(k->key_size, 2 * sizeof(VbPublicKey), "PublicKeyInit key_size");
TEST_EQ(k->algorithm, kNumAlgorithms, "PublicKeyInit algorithm");
TEST_EQ(k->key_version, 0, "PublicKeyInit key_version");
/* Set algorithm and version, so we can tell if they get copied */
k->algorithm = 3;
k->key_version = 21;
/* Copying to a smaller destination should fail */
PublicKeyInit(j, (uint8_t*)(j + 1), 2 * sizeof(VbPublicKey) - 1);
TEST_NEQ(0, PublicKeyCopy(j, k), "PublicKeyCopy too small");
/* Copying to same or larger size should succeed */
PublicKeyInit(j, (uint8_t*)(j + 2), 2 * sizeof(VbPublicKey) + 1);
TEST_EQ(0, PublicKeyCopy(j, k), "PublicKeyCopy same");
/* Offset in destination shouldn't have been modified */
TEST_EQ(j->key_offset, 2 * sizeof(VbPublicKey),
"PublicKeyCopy key_offset");
/* Size should have been reduced to match the source */
TEST_EQ(k->key_size, 2 * sizeof(VbPublicKey), "PublicKeyCopy key_size");
/* Other fields should have been copied */
TEST_EQ(k->algorithm, j->algorithm, "PublicKeyCopy algorithm");
TEST_EQ(k->key_version, j->key_version, "PublicKeyCopy key_version");
/* Data should have been copied */
TEST_EQ(0,
Memcmp(GetPublicKeyData(k), GetPublicKeyData(j), k->key_size),
"PublicKeyCopy data");
}
/* VbSharedData utility tests */
static void VbSharedDataTest(void)
{
uint8_t buf[VB_SHARED_DATA_MIN_SIZE + 1];
VbSharedDataHeader* d = (VbSharedDataHeader*)buf;
TEST_NEQ(VBOOT_SUCCESS,
VbSharedDataInit(d, sizeof(VbSharedDataHeader) - 1),
"VbSharedDataInit too small");
TEST_NEQ(VBOOT_SUCCESS,
VbSharedDataInit(d, VB_SHARED_DATA_MIN_SIZE - 1),
"VbSharedDataInit too small 2");
TEST_NEQ(VBOOT_SUCCESS,
VbSharedDataInit(NULL, VB_SHARED_DATA_MIN_SIZE),
"VbSharedDataInit null");
Memset(buf, 0x68, sizeof(buf));
TEST_EQ(VBOOT_SUCCESS, VbSharedDataInit(d, VB_SHARED_DATA_MIN_SIZE),
"VbSharedDataInit");
/* Check fields that should have been initialized */
TEST_EQ(d->magic, VB_SHARED_DATA_MAGIC, "VbSharedDataInit magic");
TEST_EQ(d->struct_version, VB_SHARED_DATA_VERSION,
"VbSharedDataInit version");
TEST_EQ(d->struct_size, sizeof(VbSharedDataHeader),
"VbSharedDataInit struct_size");
TEST_EQ(d->data_size, VB_SHARED_DATA_MIN_SIZE,
"VbSharedDataInit data_size");
TEST_EQ(d->data_used, d->struct_size, "VbSharedDataInit data_used");
TEST_EQ(d->firmware_index, 0xFF, "VbSharedDataInit firmware index");
/* Sample some other fields to make sure they were zeroed */
TEST_EQ(d->flags, 0, "VbSharedDataInit firmware flags");
TEST_EQ(d->lk_call_count, 0, "VbSharedDataInit lk_call_count");
TEST_EQ(d->kernel_version_lowest, 0,
"VbSharedDataInit kernel_version_lowest");
TEST_NEQ(VBOOT_SUCCESS, VbSharedDataSetKernelKey(NULL, NULL),
"VbSharedDataSetKernelKey null");
}
int main(int argc, char* argv[])
{
StructPackingTest();
ArraySizeTest();
VerifyHelperFunctions();
PublicKeyTest();
VbSharedDataTest();
if (vboot_api_stub_check_memory())
return 255;
return gTestSuccess ? 0 : 255;
}