vb20_misc_tests.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391
  1. /* Copyright (c) 2014 The Chromium OS Authors. All rights reserved.
  2. * Use of this source code is governed by a BSD-style license that can be
  3. * found in the LICENSE file.
  4. *
  5. * Tests for misc library
  6. */
  7. #include <stdio.h>
  8. #include "2sysincludes.h"
  9. #include "2api.h"
  10. #include "2common.h"
  11. #include "2misc.h"
  12. #include "2nvstorage.h"
  13. #include "2rsa.h"
  14. #include "2secdata.h"
  15. #include "vb2_common.h"
  16. #include "test_common.h"
  17. /* Common context for tests */
  18. static uint8_t workbuf[VB2_WORKBUF_RECOMMENDED_SIZE]
  19. __attribute__ ((aligned (VB2_WORKBUF_ALIGN)));
  20. static struct vb2_context cc;
  21. static struct vb2_shared_data *sd;
  22. /* Mocked function data */
  23. static struct {
  24. struct vb2_gbb_header h;
  25. struct vb2_packed_key rootkey;
  26. char rootkey_data[32];
  27. } mock_gbb;
  28. static struct {
  29. /* Keyblock */
  30. struct {
  31. struct vb2_keyblock kb;
  32. char data_key_data[16];
  33. uint8_t kbdata[128];
  34. } k;
  35. /* Preamble follows keyblock */
  36. struct {
  37. struct vb2_fw_preamble pre;
  38. uint8_t predata[128];
  39. } p;
  40. } mock_vblock;
  41. static int mock_read_res_fail_on_call;
  42. static int mock_unpack_key_retval;
  43. static int mock_verify_keyblock_retval;
  44. static int mock_verify_preamble_retval;
  45. /* Type of test to reset for */
  46. enum reset_type {
  47. FOR_KEYBLOCK,
  48. FOR_PREAMBLE
  49. };
  50. static void reset_common_data(enum reset_type t)
  51. {
  52. struct vb2_keyblock *kb = &mock_vblock.k.kb;
  53. struct vb2_fw_preamble *pre = &mock_vblock.p.pre;
  54. memset(workbuf, 0xaa, sizeof(workbuf));
  55. memset(&cc, 0, sizeof(cc));
  56. cc.workbuf = workbuf;
  57. cc.workbuf_size = sizeof(workbuf);
  58. vb2_init_context(&cc);
  59. sd = vb2_get_sd(&cc);
  60. vb2_nv_init(&cc);
  61. vb2_secdata_create(&cc);
  62. vb2_secdata_init(&cc);
  63. mock_read_res_fail_on_call = 0;
  64. mock_unpack_key_retval = VB2_SUCCESS;
  65. mock_verify_keyblock_retval = VB2_SUCCESS;
  66. mock_verify_preamble_retval = VB2_SUCCESS;
  67. /* Set up mock data for verifying keyblock */
  68. sd->fw_version_secdata = 0x20002;
  69. vb2_secdata_set(&cc, VB2_SECDATA_VERSIONS, sd->fw_version_secdata);
  70. sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey);
  71. sd->gbb_rootkey_size = sizeof(mock_gbb.rootkey_data);
  72. sd->last_fw_result = VB2_FW_RESULT_SUCCESS;
  73. mock_gbb.rootkey.algorithm = 11;
  74. mock_gbb.rootkey.key_offset =
  75. vb2_offset_of(&mock_gbb.rootkey,
  76. &mock_gbb.rootkey_data);
  77. mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data);
  78. kb->keyblock_size = sizeof(mock_vblock.k);
  79. kb->data_key.algorithm = 7;
  80. kb->data_key.key_version = 2;
  81. kb->data_key.key_offset =
  82. vb2_offset_of(&mock_vblock.k, &mock_vblock.k.data_key_data) -
  83. vb2_offset_of(&mock_vblock.k, &kb->data_key);
  84. kb->data_key.key_size = sizeof(mock_vblock.k.data_key_data);
  85. strcpy(mock_vblock.k.data_key_data, "data key data!!");
  86. pre->preamble_size = sizeof(mock_vblock.p);
  87. pre->firmware_version = 2;
  88. /* If verifying preamble, verify keyblock first to set up data key */
  89. if (t == FOR_PREAMBLE)
  90. vb2_load_fw_keyblock(&cc);
  91. };
  92. /* Mocked functions */
  93. int vb2ex_read_resource(struct vb2_context *ctx,
  94. enum vb2_resource_index index,
  95. uint32_t offset,
  96. void *buf,
  97. uint32_t size)
  98. {
  99. uint8_t *rptr;
  100. uint32_t rsize;
  101. if (--mock_read_res_fail_on_call == 0)
  102. return VB2_ERROR_EX_READ_RESOURCE_INDEX;
  103. switch(index) {
  104. case VB2_RES_GBB:
  105. rptr = (uint8_t *)&mock_gbb;
  106. rsize = sizeof(mock_gbb);
  107. break;
  108. case VB2_RES_FW_VBLOCK:
  109. rptr = (uint8_t *)&mock_vblock;
  110. rsize = sizeof(mock_vblock);
  111. break;
  112. default:
  113. return VB2_ERROR_EX_READ_RESOURCE_INDEX;
  114. }
  115. if (offset > rsize || offset + size > rsize)
  116. return VB2_ERROR_EX_READ_RESOURCE_SIZE;
  117. memcpy(buf, rptr + offset, size);
  118. return VB2_SUCCESS;
  119. }
  120. int vb2_unpack_key_buffer(struct vb2_public_key *key,
  121. const uint8_t *buf,
  122. uint32_t size)
  123. {
  124. key->arrsize = 0;
  125. return mock_unpack_key_retval;
  126. }
  127. int vb2_verify_keyblock(struct vb2_keyblock *block,
  128. uint32_t size,
  129. const struct vb2_public_key *key,
  130. const struct vb2_workbuf *wb)
  131. {
  132. return mock_verify_keyblock_retval;
  133. }
  134. int vb2_verify_fw_preamble(struct vb2_fw_preamble *preamble,
  135. uint32_t size,
  136. const struct vb2_public_key *key,
  137. const struct vb2_workbuf *wb)
  138. {
  139. return mock_verify_preamble_retval;
  140. }
  141. /* Tests */
  142. static void verify_keyblock_tests(void)
  143. {
  144. struct vb2_keyblock *kb = &mock_vblock.k.kb;
  145. struct vb2_packed_key *k;
  146. int wb_used_before;
  147. /* Test successful call */
  148. reset_common_data(FOR_KEYBLOCK);
  149. wb_used_before = cc.workbuf_used;
  150. TEST_SUCC(vb2_load_fw_keyblock(&cc), "keyblock verify");
  151. TEST_EQ(sd->fw_version, 0x20000, "keyblock version");
  152. TEST_EQ(sd->vblock_preamble_offset, sizeof(mock_vblock.k),
  153. "preamble offset");
  154. TEST_EQ(sd->workbuf_data_key_offset,
  155. (wb_used_before + (VB2_WORKBUF_ALIGN - 1)) &
  156. ~(VB2_WORKBUF_ALIGN - 1),
  157. "keyblock data key offset");
  158. TEST_EQ(cc.workbuf_used,
  159. sd->workbuf_data_key_offset + sd->workbuf_data_key_size,
  160. "workbuf used");
  161. /* Make sure data key was properly saved */
  162. k = (struct vb2_packed_key *)(cc.workbuf + sd->workbuf_data_key_offset);
  163. TEST_EQ(k->algorithm, 7, "data key algorithm");
  164. TEST_EQ(k->key_version, 2, "data key version");
  165. TEST_EQ(k->key_size, sizeof(mock_vblock.k.data_key_data),
  166. "data key size");
  167. TEST_EQ(memcmp(cc.workbuf + sd->workbuf_data_key_offset +
  168. k->key_offset, mock_vblock.k.data_key_data,
  169. sizeof(mock_vblock.k.data_key_data)),
  170. 0, "data key data");
  171. TEST_EQ(cc.workbuf_used,
  172. sd->workbuf_data_key_offset + sd->workbuf_data_key_size,
  173. "workbuf used after");
  174. /* Test failures */
  175. reset_common_data(FOR_KEYBLOCK);
  176. cc.workbuf_used = cc.workbuf_size - sd->gbb_rootkey_size + 8;
  177. TEST_EQ(vb2_load_fw_keyblock(&cc),
  178. VB2_ERROR_FW_KEYBLOCK_WORKBUF_ROOT_KEY,
  179. "keyblock not enough workbuf for root key");
  180. reset_common_data(FOR_KEYBLOCK);
  181. sd->gbb_rootkey_size = sizeof(mock_gbb);
  182. TEST_EQ(vb2_load_fw_keyblock(&cc),
  183. VB2_ERROR_EX_READ_RESOURCE_SIZE,
  184. "keyblock read root key");
  185. reset_common_data(FOR_KEYBLOCK);
  186. mock_unpack_key_retval = VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM;
  187. TEST_EQ(vb2_load_fw_keyblock(&cc),
  188. VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM,
  189. "keyblock unpack root key");
  190. reset_common_data(FOR_KEYBLOCK);
  191. cc.workbuf_used = cc.workbuf_size - sd->gbb_rootkey_size - 8;
  192. TEST_EQ(vb2_load_fw_keyblock(&cc),
  193. VB2_ERROR_FW_KEYBLOCK_WORKBUF_HEADER,
  194. "keyblock not enough workbuf for header");
  195. reset_common_data(FOR_KEYBLOCK);
  196. mock_read_res_fail_on_call = 2;
  197. TEST_EQ(vb2_load_fw_keyblock(&cc),
  198. VB2_ERROR_EX_READ_RESOURCE_INDEX,
  199. "keyblock read keyblock header");
  200. reset_common_data(FOR_KEYBLOCK);
  201. cc.workbuf_used = cc.workbuf_size - sd->gbb_rootkey_size
  202. - sizeof(struct vb2_keyblock);
  203. TEST_EQ(vb2_load_fw_keyblock(&cc),
  204. VB2_ERROR_FW_KEYBLOCK_WORKBUF,
  205. "keyblock not enough workbuf for entire keyblock");
  206. reset_common_data(FOR_KEYBLOCK);
  207. kb->keyblock_size = sizeof(mock_vblock) + 1;
  208. TEST_EQ(vb2_load_fw_keyblock(&cc),
  209. VB2_ERROR_EX_READ_RESOURCE_SIZE,
  210. "keyblock read keyblock");
  211. reset_common_data(FOR_KEYBLOCK);
  212. mock_verify_keyblock_retval = VB2_ERROR_KEYBLOCK_MAGIC;
  213. TEST_EQ(vb2_load_fw_keyblock(&cc),
  214. VB2_ERROR_KEYBLOCK_MAGIC,
  215. "keyblock verify keyblock");
  216. reset_common_data(FOR_KEYBLOCK);
  217. kb->data_key.key_version = 0x10000;
  218. TEST_EQ(vb2_load_fw_keyblock(&cc),
  219. VB2_ERROR_FW_KEYBLOCK_VERSION_RANGE,
  220. "keyblock version range");
  221. reset_common_data(FOR_KEYBLOCK);
  222. kb->data_key.key_version = 1;
  223. TEST_EQ(vb2_load_fw_keyblock(&cc),
  224. VB2_ERROR_FW_KEYBLOCK_VERSION_ROLLBACK,
  225. "keyblock rollback");
  226. reset_common_data(FOR_KEYBLOCK);
  227. kb->data_key.key_version = 1;
  228. sd->gbb_flags |= VB2_GBB_FLAG_DISABLE_FW_ROLLBACK_CHECK;
  229. TEST_SUCC(vb2_load_fw_keyblock(&cc), "keyblock rollback with GBB flag");
  230. }
  231. static void verify_preamble_tests(void)
  232. {
  233. struct vb2_fw_preamble *pre = &mock_vblock.p.pre;
  234. int wb_used_before;
  235. uint32_t v;
  236. /* Test successful call */
  237. reset_common_data(FOR_PREAMBLE);
  238. wb_used_before = cc.workbuf_used;
  239. TEST_SUCC(vb2_load_fw_preamble(&cc), "preamble good");
  240. TEST_EQ(sd->fw_version, 0x20002, "combined version");
  241. TEST_EQ(sd->workbuf_preamble_offset,
  242. (wb_used_before + (VB2_WORKBUF_ALIGN - 1)) &
  243. ~(VB2_WORKBUF_ALIGN - 1),
  244. "preamble offset");
  245. TEST_EQ(sd->workbuf_preamble_size, pre->preamble_size, "preamble size");
  246. TEST_EQ(cc.workbuf_used,
  247. sd->workbuf_preamble_offset + sd->workbuf_preamble_size,
  248. "workbuf used");
  249. /* Expected failures */
  250. reset_common_data(FOR_PREAMBLE);
  251. sd->workbuf_data_key_size = 0;
  252. TEST_EQ(vb2_load_fw_preamble(&cc),
  253. VB2_ERROR_FW_PREAMBLE2_DATA_KEY,
  254. "preamble no data key");
  255. reset_common_data(FOR_PREAMBLE);
  256. mock_unpack_key_retval = VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM;
  257. TEST_EQ(vb2_load_fw_preamble(&cc),
  258. VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM,
  259. "preamble unpack data key");
  260. reset_common_data(FOR_PREAMBLE);
  261. cc.workbuf_used = cc.workbuf_size - sizeof(struct vb2_fw_preamble) + 8;
  262. TEST_EQ(vb2_load_fw_preamble(&cc),
  263. VB2_ERROR_FW_PREAMBLE2_WORKBUF_HEADER,
  264. "preamble not enough workbuf for header");
  265. reset_common_data(FOR_PREAMBLE);
  266. sd->vblock_preamble_offset = sizeof(mock_vblock);
  267. TEST_EQ(vb2_load_fw_preamble(&cc),
  268. VB2_ERROR_EX_READ_RESOURCE_SIZE,
  269. "preamble read header");
  270. reset_common_data(FOR_PREAMBLE);
  271. cc.workbuf_used = cc.workbuf_size - sizeof(mock_vblock.p) + 8;
  272. TEST_EQ(vb2_load_fw_preamble(&cc),
  273. VB2_ERROR_FW_PREAMBLE2_WORKBUF,
  274. "preamble not enough workbuf");
  275. reset_common_data(FOR_PREAMBLE);
  276. pre->preamble_size = sizeof(mock_vblock);
  277. TEST_EQ(vb2_load_fw_preamble(&cc),
  278. VB2_ERROR_EX_READ_RESOURCE_SIZE,
  279. "preamble read full");
  280. reset_common_data(FOR_PREAMBLE);
  281. mock_verify_preamble_retval = VB2_ERROR_PREAMBLE_SIG_INVALID;
  282. TEST_EQ(vb2_load_fw_preamble(&cc),
  283. VB2_ERROR_PREAMBLE_SIG_INVALID,
  284. "preamble verify");
  285. reset_common_data(FOR_PREAMBLE);
  286. pre->firmware_version = 0x10000;
  287. TEST_EQ(vb2_load_fw_preamble(&cc),
  288. VB2_ERROR_FW_PREAMBLE_VERSION_RANGE,
  289. "preamble version range");
  290. reset_common_data(FOR_PREAMBLE);
  291. pre->firmware_version = 1;
  292. TEST_EQ(vb2_load_fw_preamble(&cc),
  293. VB2_ERROR_FW_PREAMBLE_VERSION_ROLLBACK,
  294. "preamble version rollback");
  295. reset_common_data(FOR_PREAMBLE);
  296. pre->firmware_version = 1;
  297. sd->gbb_flags |= VB2_GBB_FLAG_DISABLE_FW_ROLLBACK_CHECK;
  298. TEST_SUCC(vb2_load_fw_preamble(&cc), "version rollback with GBB flag");
  299. reset_common_data(FOR_PREAMBLE);
  300. pre->firmware_version = 3;
  301. TEST_SUCC(vb2_load_fw_preamble(&cc),
  302. "preamble version roll forward");
  303. vb2_secdata_get(&cc, VB2_SECDATA_VERSIONS, &v);
  304. TEST_EQ(v, 0x20003, "roll forward");
  305. /* Newer version without result success doesn't roll forward */
  306. reset_common_data(FOR_PREAMBLE);
  307. pre->firmware_version = 3;
  308. sd->last_fw_result = VB2_FW_RESULT_UNKNOWN;
  309. TEST_SUCC(vb2_load_fw_preamble(&cc),
  310. "preamble version no roll forward 1");
  311. vb2_secdata_get(&cc, VB2_SECDATA_VERSIONS, &v);
  312. TEST_EQ(v, 0x20002, "no roll forward");
  313. /* Newer version with success but for other slot doesn't roll forward */
  314. reset_common_data(FOR_PREAMBLE);
  315. pre->firmware_version = 3;
  316. sd->last_fw_slot = 1;
  317. TEST_SUCC(vb2_load_fw_preamble(&cc),
  318. "preamble version no roll forward 2");
  319. vb2_secdata_get(&cc, VB2_SECDATA_VERSIONS, &v);
  320. TEST_EQ(v, 0x20002, "no roll forward");
  321. }
  322. int main(int argc, char* argv[])
  323. {
  324. verify_keyblock_tests();
  325. verify_preamble_tests();
  326. return gTestSuccess ? 0 : 255;
  327. }