1*8617a60dSAndroid Build Coastguard Worker /* Copyright 2015 The ChromiumOS Authors
2*8617a60dSAndroid Build Coastguard Worker * Use of this source code is governed by a BSD-style license that can be
3*8617a60dSAndroid Build Coastguard Worker * found in the LICENSE file.
4*8617a60dSAndroid Build Coastguard Worker *
5*8617a60dSAndroid Build Coastguard Worker * Tests for kernel verification library
6*8617a60dSAndroid Build Coastguard Worker */
7*8617a60dSAndroid Build Coastguard Worker
8*8617a60dSAndroid Build Coastguard Worker #include <stdio.h>
9*8617a60dSAndroid Build Coastguard Worker
10*8617a60dSAndroid Build Coastguard Worker #include "2api.h"
11*8617a60dSAndroid Build Coastguard Worker #include "2common.h"
12*8617a60dSAndroid Build Coastguard Worker #include "2misc.h"
13*8617a60dSAndroid Build Coastguard Worker #include "2nvstorage.h"
14*8617a60dSAndroid Build Coastguard Worker #include "2rsa.h"
15*8617a60dSAndroid Build Coastguard Worker #include "2secdata.h"
16*8617a60dSAndroid Build Coastguard Worker #include "2sysincludes.h"
17*8617a60dSAndroid Build Coastguard Worker #include "common/tests.h"
18*8617a60dSAndroid Build Coastguard Worker
19*8617a60dSAndroid Build Coastguard Worker /* Common context for tests */
20*8617a60dSAndroid Build Coastguard Worker static uint8_t workbuf[VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE]
21*8617a60dSAndroid Build Coastguard Worker __attribute__((aligned(VB2_WORKBUF_ALIGN)));
22*8617a60dSAndroid Build Coastguard Worker static struct vb2_workbuf wb;
23*8617a60dSAndroid Build Coastguard Worker static struct vb2_context *ctx;
24*8617a60dSAndroid Build Coastguard Worker static struct vb2_shared_data *sd;
25*8617a60dSAndroid Build Coastguard Worker
26*8617a60dSAndroid Build Coastguard Worker /* Mocked function data */
27*8617a60dSAndroid Build Coastguard Worker
28*8617a60dSAndroid Build Coastguard Worker static struct {
29*8617a60dSAndroid Build Coastguard Worker struct vb2_gbb_header h;
30*8617a60dSAndroid Build Coastguard Worker struct vb2_packed_key recovery_key;
31*8617a60dSAndroid Build Coastguard Worker char recovery_key_data[32];
32*8617a60dSAndroid Build Coastguard Worker } mock_gbb;
33*8617a60dSAndroid Build Coastguard Worker
34*8617a60dSAndroid Build Coastguard Worker static struct {
35*8617a60dSAndroid Build Coastguard Worker /* Keyblock */
36*8617a60dSAndroid Build Coastguard Worker struct {
37*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock kb;
38*8617a60dSAndroid Build Coastguard Worker char data_key_data[16];
39*8617a60dSAndroid Build Coastguard Worker uint8_t kbdata[128];
40*8617a60dSAndroid Build Coastguard Worker uint8_t hash[VB2_SHA512_DIGEST_SIZE];
41*8617a60dSAndroid Build Coastguard Worker } k;
42*8617a60dSAndroid Build Coastguard Worker /* Preamble follows keyblock */
43*8617a60dSAndroid Build Coastguard Worker struct {
44*8617a60dSAndroid Build Coastguard Worker struct vb2_kernel_preamble pre;
45*8617a60dSAndroid Build Coastguard Worker uint8_t predata[128];
46*8617a60dSAndroid Build Coastguard Worker } p;
47*8617a60dSAndroid Build Coastguard Worker } mock_vblock;
48*8617a60dSAndroid Build Coastguard Worker
49*8617a60dSAndroid Build Coastguard Worker static int mock_read_res_fail_on_call;
50*8617a60dSAndroid Build Coastguard Worker static int mock_unpack_key_retval;
51*8617a60dSAndroid Build Coastguard Worker static int mock_verify_keyblock_retval;
52*8617a60dSAndroid Build Coastguard Worker static int mock_verify_preamble_retval;
53*8617a60dSAndroid Build Coastguard Worker
54*8617a60dSAndroid Build Coastguard Worker /* Type of test to reset for */
55*8617a60dSAndroid Build Coastguard Worker enum reset_type {
56*8617a60dSAndroid Build Coastguard Worker FOR_KEYBLOCK,
57*8617a60dSAndroid Build Coastguard Worker FOR_PREAMBLE
58*8617a60dSAndroid Build Coastguard Worker };
59*8617a60dSAndroid Build Coastguard Worker
rehash_keyblock(void)60*8617a60dSAndroid Build Coastguard Worker static void rehash_keyblock(void)
61*8617a60dSAndroid Build Coastguard Worker {
62*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
63*8617a60dSAndroid Build Coastguard Worker struct vb2_signature *hashsig = &mock_vblock.k.kb.keyblock_hash;
64*8617a60dSAndroid Build Coastguard Worker struct vb2_digest_context dc;
65*8617a60dSAndroid Build Coastguard Worker
66*8617a60dSAndroid Build Coastguard Worker
67*8617a60dSAndroid Build Coastguard Worker hashsig->sig_offset = vb2_offset_of(hashsig, mock_vblock.k.hash);
68*8617a60dSAndroid Build Coastguard Worker hashsig->sig_size = sizeof(mock_vblock.k.hash);
69*8617a60dSAndroid Build Coastguard Worker hashsig->data_size = hashsig->sig_offset;
70*8617a60dSAndroid Build Coastguard Worker vb2_digest_init(&dc, false, VB2_HASH_SHA512, 0);
71*8617a60dSAndroid Build Coastguard Worker vb2_digest_extend(&dc, (const uint8_t *)kb, hashsig->data_size);
72*8617a60dSAndroid Build Coastguard Worker vb2_digest_finalize(&dc, mock_vblock.k.hash, hashsig->sig_size);
73*8617a60dSAndroid Build Coastguard Worker }
74*8617a60dSAndroid Build Coastguard Worker
reset_common_data(enum reset_type t)75*8617a60dSAndroid Build Coastguard Worker static void reset_common_data(enum reset_type t)
76*8617a60dSAndroid Build Coastguard Worker {
77*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
78*8617a60dSAndroid Build Coastguard Worker struct vb2_kernel_preamble *pre = &mock_vblock.p.pre;
79*8617a60dSAndroid Build Coastguard Worker
80*8617a60dSAndroid Build Coastguard Worker memset(workbuf, 0xaa, sizeof(workbuf));
81*8617a60dSAndroid Build Coastguard Worker
82*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2api_init(workbuf, sizeof(workbuf), &ctx),
83*8617a60dSAndroid Build Coastguard Worker "vb2api_init failed");
84*8617a60dSAndroid Build Coastguard Worker
85*8617a60dSAndroid Build Coastguard Worker vb2_workbuf_from_ctx(ctx, &wb);
86*8617a60dSAndroid Build Coastguard Worker sd = vb2_get_sd(ctx);
87*8617a60dSAndroid Build Coastguard Worker
88*8617a60dSAndroid Build Coastguard Worker vb2_nv_init(ctx);
89*8617a60dSAndroid Build Coastguard Worker
90*8617a60dSAndroid Build Coastguard Worker vb2api_secdata_kernel_create(ctx);
91*8617a60dSAndroid Build Coastguard Worker vb2_secdata_kernel_init(ctx);
92*8617a60dSAndroid Build Coastguard Worker
93*8617a60dSAndroid Build Coastguard Worker mock_read_res_fail_on_call = 0;
94*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_SUCCESS;
95*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_SUCCESS;
96*8617a60dSAndroid Build Coastguard Worker mock_verify_preamble_retval = VB2_SUCCESS;
97*8617a60dSAndroid Build Coastguard Worker
98*8617a60dSAndroid Build Coastguard Worker /* Set up mock data for verifying keyblock */
99*8617a60dSAndroid Build Coastguard Worker sd->kernel_version_secdata = 0x20002;
100*8617a60dSAndroid Build Coastguard Worker vb2_secdata_kernel_set(ctx, VB2_SECDATA_KERNEL_VERSIONS, 0x20002);
101*8617a60dSAndroid Build Coastguard Worker
102*8617a60dSAndroid Build Coastguard Worker mock_gbb.recovery_key.algorithm = 11;
103*8617a60dSAndroid Build Coastguard Worker mock_gbb.recovery_key.key_offset =
104*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_gbb.recovery_key,
105*8617a60dSAndroid Build Coastguard Worker &mock_gbb.recovery_key_data);
106*8617a60dSAndroid Build Coastguard Worker mock_gbb.recovery_key.key_size = sizeof(mock_gbb.recovery_key_data);
107*8617a60dSAndroid Build Coastguard Worker
108*8617a60dSAndroid Build Coastguard Worker kb->keyblock_size = sizeof(mock_vblock.k);
109*8617a60dSAndroid Build Coastguard Worker memcpy(kb->magic, VB2_KEYBLOCK_MAGIC, VB2_KEYBLOCK_MAGIC_SIZE);
110*8617a60dSAndroid Build Coastguard Worker
111*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags = VB2_KEYBLOCK_FLAG_DEVELOPER_1 |
112*8617a60dSAndroid Build Coastguard Worker VB2_KEYBLOCK_FLAG_DEVELOPER_0 |
113*8617a60dSAndroid Build Coastguard Worker VB2_KEYBLOCK_FLAG_RECOVERY_1 | VB2_KEYBLOCK_FLAG_RECOVERY_0;
114*8617a60dSAndroid Build Coastguard Worker kb->header_version_major = VB2_KEYBLOCK_VERSION_MAJOR;
115*8617a60dSAndroid Build Coastguard Worker kb->header_version_minor = VB2_KEYBLOCK_VERSION_MINOR;
116*8617a60dSAndroid Build Coastguard Worker kb->data_key.algorithm = 7;
117*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 2;
118*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_offset =
119*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_vblock.k, &mock_vblock.k.data_key_data) -
120*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_vblock.k, &kb->data_key);
121*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_size = sizeof(mock_vblock.k.data_key_data);
122*8617a60dSAndroid Build Coastguard Worker strcpy(mock_vblock.k.data_key_data, "data key data!!");
123*8617a60dSAndroid Build Coastguard Worker rehash_keyblock();
124*8617a60dSAndroid Build Coastguard Worker
125*8617a60dSAndroid Build Coastguard Worker pre->preamble_size = sizeof(mock_vblock.p);
126*8617a60dSAndroid Build Coastguard Worker pre->kernel_version = 2;
127*8617a60dSAndroid Build Coastguard Worker
128*8617a60dSAndroid Build Coastguard Worker /* If verifying preamble, verify keyblock first to set up data key */
129*8617a60dSAndroid Build Coastguard Worker if (t == FOR_PREAMBLE)
130*8617a60dSAndroid Build Coastguard Worker vb2_load_kernel_keyblock(ctx);
131*8617a60dSAndroid Build Coastguard Worker };
132*8617a60dSAndroid Build Coastguard Worker
133*8617a60dSAndroid Build Coastguard Worker /* Mocked functions */
134*8617a60dSAndroid Build Coastguard Worker
vb2ex_read_resource(struct vb2_context * c,enum vb2_resource_index index,uint32_t offset,void * buf,uint32_t size)135*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2ex_read_resource(struct vb2_context *c,
136*8617a60dSAndroid Build Coastguard Worker enum vb2_resource_index index, uint32_t offset,
137*8617a60dSAndroid Build Coastguard Worker void *buf, uint32_t size)
138*8617a60dSAndroid Build Coastguard Worker {
139*8617a60dSAndroid Build Coastguard Worker uint8_t *rptr;
140*8617a60dSAndroid Build Coastguard Worker uint32_t rsize;
141*8617a60dSAndroid Build Coastguard Worker
142*8617a60dSAndroid Build Coastguard Worker if (--mock_read_res_fail_on_call == 0)
143*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_MOCK;
144*8617a60dSAndroid Build Coastguard Worker
145*8617a60dSAndroid Build Coastguard Worker switch(index) {
146*8617a60dSAndroid Build Coastguard Worker case VB2_RES_GBB:
147*8617a60dSAndroid Build Coastguard Worker rptr = (uint8_t *)&mock_gbb;
148*8617a60dSAndroid Build Coastguard Worker rsize = sizeof(mock_gbb);
149*8617a60dSAndroid Build Coastguard Worker break;
150*8617a60dSAndroid Build Coastguard Worker case VB2_RES_KERNEL_VBLOCK:
151*8617a60dSAndroid Build Coastguard Worker rptr = (uint8_t *)&mock_vblock;
152*8617a60dSAndroid Build Coastguard Worker rsize = sizeof(mock_vblock);
153*8617a60dSAndroid Build Coastguard Worker break;
154*8617a60dSAndroid Build Coastguard Worker default:
155*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_EX_READ_RESOURCE_INDEX;
156*8617a60dSAndroid Build Coastguard Worker }
157*8617a60dSAndroid Build Coastguard Worker
158*8617a60dSAndroid Build Coastguard Worker if (offset > rsize || offset + size > rsize)
159*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_EX_READ_RESOURCE_SIZE;
160*8617a60dSAndroid Build Coastguard Worker
161*8617a60dSAndroid Build Coastguard Worker memcpy(buf, rptr + offset, size);
162*8617a60dSAndroid Build Coastguard Worker return VB2_SUCCESS;
163*8617a60dSAndroid Build Coastguard Worker }
164*8617a60dSAndroid Build Coastguard Worker
vb2_unpack_key_buffer(struct vb2_public_key * key,const uint8_t * buf,uint32_t size)165*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_unpack_key_buffer(struct vb2_public_key *key,
166*8617a60dSAndroid Build Coastguard Worker const uint8_t *buf, uint32_t size)
167*8617a60dSAndroid Build Coastguard Worker {
168*8617a60dSAndroid Build Coastguard Worker key->arrsize = 0;
169*8617a60dSAndroid Build Coastguard Worker return mock_unpack_key_retval;
170*8617a60dSAndroid Build Coastguard Worker }
171*8617a60dSAndroid Build Coastguard Worker
vb2_verify_keyblock(struct vb2_keyblock * block,uint32_t size,const struct vb2_public_key * key,const struct vb2_workbuf * w)172*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_verify_keyblock(struct vb2_keyblock *block, uint32_t size,
173*8617a60dSAndroid Build Coastguard Worker const struct vb2_public_key *key,
174*8617a60dSAndroid Build Coastguard Worker const struct vb2_workbuf *w)
175*8617a60dSAndroid Build Coastguard Worker {
176*8617a60dSAndroid Build Coastguard Worker return mock_verify_keyblock_retval;
177*8617a60dSAndroid Build Coastguard Worker }
178*8617a60dSAndroid Build Coastguard Worker
vb2_verify_kernel_preamble(struct vb2_kernel_preamble * preamble,uint32_t size,const struct vb2_public_key * key,const struct vb2_workbuf * w)179*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_verify_kernel_preamble(struct vb2_kernel_preamble *preamble,
180*8617a60dSAndroid Build Coastguard Worker uint32_t size,
181*8617a60dSAndroid Build Coastguard Worker const struct vb2_public_key *key,
182*8617a60dSAndroid Build Coastguard Worker const struct vb2_workbuf *w)
183*8617a60dSAndroid Build Coastguard Worker {
184*8617a60dSAndroid Build Coastguard Worker return mock_verify_preamble_retval;
185*8617a60dSAndroid Build Coastguard Worker }
186*8617a60dSAndroid Build Coastguard Worker
187*8617a60dSAndroid Build Coastguard Worker /* Tests */
188*8617a60dSAndroid Build Coastguard Worker
verify_keyblock_hash_tests(void)189*8617a60dSAndroid Build Coastguard Worker static void verify_keyblock_hash_tests(void)
190*8617a60dSAndroid Build Coastguard Worker {
191*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
192*8617a60dSAndroid Build Coastguard Worker
193*8617a60dSAndroid Build Coastguard Worker /* Test successful call */
194*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
195*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_verify_keyblock_hash(kb, kb->keyblock_size, &wb),
196*8617a60dSAndroid Build Coastguard Worker "Keyblock hash good");
197*8617a60dSAndroid Build Coastguard Worker
198*8617a60dSAndroid Build Coastguard Worker /* Validity check keyblock */
199*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
200*8617a60dSAndroid Build Coastguard Worker kb->magic[0] ^= 0xd0;
201*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_verify_keyblock_hash(kb, kb->keyblock_size, &wb),
202*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KEYBLOCK_MAGIC, "Keyblock validity check");
203*8617a60dSAndroid Build Coastguard Worker
204*8617a60dSAndroid Build Coastguard Worker /*
205*8617a60dSAndroid Build Coastguard Worker * Validity check should be looking at the keyblock hash struct, not
206*8617a60dSAndroid Build Coastguard Worker * the keyblock signature struct.
207*8617a60dSAndroid Build Coastguard Worker */
208*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
209*8617a60dSAndroid Build Coastguard Worker kb->keyblock_hash.data_size = sizeof(*kb) - 1;
210*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_verify_keyblock_hash(kb, kb->keyblock_size, &wb),
211*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KEYBLOCK_SIGNED_TOO_LITTLE,
212*8617a60dSAndroid Build Coastguard Worker "Keyblock check hash sig");
213*8617a60dSAndroid Build Coastguard Worker
214*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
215*8617a60dSAndroid Build Coastguard Worker mock_vblock.k.data_key_data[0] ^= 0xa0;
216*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_verify_keyblock_hash(kb, kb->keyblock_size, &wb),
217*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KEYBLOCK_HASH_INVALID_IN_DEV_MODE,
218*8617a60dSAndroid Build Coastguard Worker "Keyblock check hash invalid");
219*8617a60dSAndroid Build Coastguard Worker }
220*8617a60dSAndroid Build Coastguard Worker
load_kernel_keyblock_tests(void)221*8617a60dSAndroid Build Coastguard Worker static void load_kernel_keyblock_tests(void)
222*8617a60dSAndroid Build Coastguard Worker {
223*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
224*8617a60dSAndroid Build Coastguard Worker struct vb2_packed_key *k;
225*8617a60dSAndroid Build Coastguard Worker int expected_offset;
226*8617a60dSAndroid Build Coastguard Worker
227*8617a60dSAndroid Build Coastguard Worker /* Test successful call */
228*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
229*8617a60dSAndroid Build Coastguard Worker expected_offset = sd->workbuf_used;
230*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx), "Kernel keyblock good");
231*8617a60dSAndroid Build Coastguard Worker TEST_NEQ(sd->flags & VB2_SD_FLAG_KERNEL_SIGNED, 0, " Kernel signed");
232*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->kernel_version, 0x20000, "keyblock version");
233*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->vblock_preamble_offset, sizeof(mock_vblock.k),
234*8617a60dSAndroid Build Coastguard Worker "preamble offset");
235*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->data_key_offset, expected_offset,
236*8617a60dSAndroid Build Coastguard Worker "keyblock data key offset");
237*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
238*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->data_key_offset +
239*8617a60dSAndroid Build Coastguard Worker sd->data_key_size),
240*8617a60dSAndroid Build Coastguard Worker "workbuf used");
241*8617a60dSAndroid Build Coastguard Worker
242*8617a60dSAndroid Build Coastguard Worker /* Make sure data key was properly saved */
243*8617a60dSAndroid Build Coastguard Worker k = vb2_member_of(sd, sd->data_key_offset);
244*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->algorithm, 7, "data key algorithm");
245*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->key_version, 2, "data key version");
246*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->key_size, sizeof(mock_vblock.k.data_key_data),
247*8617a60dSAndroid Build Coastguard Worker "data key size");
248*8617a60dSAndroid Build Coastguard Worker TEST_EQ(memcmp(vb2_member_of(k, k->key_offset),
249*8617a60dSAndroid Build Coastguard Worker mock_vblock.k.data_key_data,
250*8617a60dSAndroid Build Coastguard Worker sizeof(mock_vblock.k.data_key_data)),
251*8617a60dSAndroid Build Coastguard Worker 0, "data key data");
252*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
253*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->data_key_offset +
254*8617a60dSAndroid Build Coastguard Worker sd->data_key_size),
255*8617a60dSAndroid Build Coastguard Worker "workbuf used after");
256*8617a60dSAndroid Build Coastguard Worker
257*8617a60dSAndroid Build Coastguard Worker /* Test failures */
258*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
259*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_ERROR_MOCK;
260*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
261*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK, "Kernel keyblock unpack key");
262*8617a60dSAndroid Build Coastguard Worker
263*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
264*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
265*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(*kb));
266*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
267*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_WORKBUF_HEADER,
268*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock workbuf header");
269*8617a60dSAndroid Build Coastguard Worker
270*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
271*8617a60dSAndroid Build Coastguard Worker mock_read_res_fail_on_call = 1;
272*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
273*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK, "Kernel keyblock read header");
274*8617a60dSAndroid Build Coastguard Worker
275*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
276*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
277*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(kb->keyblock_size);
278*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
279*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_WORKBUF,
280*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock workbuf");
281*8617a60dSAndroid Build Coastguard Worker
282*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
283*8617a60dSAndroid Build Coastguard Worker mock_read_res_fail_on_call = 2;
284*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
285*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK, "Kernel keyblock read");
286*8617a60dSAndroid Build Coastguard Worker
287*8617a60dSAndroid Build Coastguard Worker /* Normally, require signed keyblock */
288*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
289*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_ERROR_MOCK;
290*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
291*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK, "Verify keyblock");
292*8617a60dSAndroid Build Coastguard Worker
293*8617a60dSAndroid Build Coastguard Worker /* Not in dev mode */
294*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
295*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_DEVELOPER_MODE;
296*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_ERROR_MOCK;
297*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx), "Kernel keyblock hash good");
298*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->flags & VB2_SD_FLAG_KERNEL_SIGNED, 0, " Kernel signed");
299*8617a60dSAndroid Build Coastguard Worker
300*8617a60dSAndroid Build Coastguard Worker /* But we do in dev+rec mode */
301*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
302*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_DEVELOPER_MODE | VB2_CONTEXT_RECOVERY_MODE;
303*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_ERROR_MOCK;
304*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
305*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK, "Kernel keyblock dev+rec");
306*8617a60dSAndroid Build Coastguard Worker
307*8617a60dSAndroid Build Coastguard Worker /* Test keyblock flags matching mode */
308*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
309*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_DEVELOPER_0;
310*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
311*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_DEV_FLAG,
312*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock dev only");
313*8617a60dSAndroid Build Coastguard Worker
314*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
315*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_RECOVERY_0;
316*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
317*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_REC_FLAG,
318*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock rec only");
319*8617a60dSAndroid Build Coastguard Worker
320*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
321*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_RECOVERY_1;
322*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_RECOVERY_MODE;
323*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
324*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_REC_FLAG,
325*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock not rec");
326*8617a60dSAndroid Build Coastguard Worker
327*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
328*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_DEVELOPER_0;
329*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_RECOVERY_0;
330*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_RECOVERY_MODE;
331*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
332*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_DEV_FLAG,
333*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock rec but not dev+rec");
334*8617a60dSAndroid Build Coastguard Worker
335*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
336*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_DEVELOPER_0;
337*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags &= ~VB2_KEYBLOCK_FLAG_RECOVERY_0;
338*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_DEVELOPER_MODE | VB2_CONTEXT_RECOVERY_MODE;
339*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx),
340*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock flags dev+rec");
341*8617a60dSAndroid Build Coastguard Worker
342*8617a60dSAndroid Build Coastguard Worker /* System in dev mode ignores flags */
343*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
344*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_DEVELOPER_MODE;
345*8617a60dSAndroid Build Coastguard Worker kb->keyblock_flags = 0;
346*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx), "Kernel keyblock dev flags");
347*8617a60dSAndroid Build Coastguard Worker
348*8617a60dSAndroid Build Coastguard Worker /* Test rollback */
349*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
350*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 0x10000;
351*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
352*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_VERSION_RANGE,
353*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock version range");
354*8617a60dSAndroid Build Coastguard Worker
355*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
356*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 1;
357*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_keyblock(ctx),
358*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_KEYBLOCK_VERSION_ROLLBACK,
359*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock rollback");
360*8617a60dSAndroid Build Coastguard Worker
361*8617a60dSAndroid Build Coastguard Worker /* Rollback ok in developer mode */
362*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
363*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 1;
364*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_DEVELOPER_MODE;
365*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx),
366*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock rollback dev");
367*8617a60dSAndroid Build Coastguard Worker
368*8617a60dSAndroid Build Coastguard Worker /*
369*8617a60dSAndroid Build Coastguard Worker * Recovery keyblocks aren't versioned (and even if they were, it
370*8617a60dSAndroid Build Coastguard Worker * wouldn't be with the same version as a normal kernel).
371*8617a60dSAndroid Build Coastguard Worker */
372*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
373*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 1;
374*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_RECOVERY_MODE;
375*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_keyblock(ctx),
376*8617a60dSAndroid Build Coastguard Worker "Kernel keyblock rollback rec");
377*8617a60dSAndroid Build Coastguard Worker }
378*8617a60dSAndroid Build Coastguard Worker
load_kernel_preamble_tests(void)379*8617a60dSAndroid Build Coastguard Worker static void load_kernel_preamble_tests(void)
380*8617a60dSAndroid Build Coastguard Worker {
381*8617a60dSAndroid Build Coastguard Worker struct vb2_kernel_preamble *pre = &mock_vblock.p.pre;
382*8617a60dSAndroid Build Coastguard Worker int expected_offset;
383*8617a60dSAndroid Build Coastguard Worker //uint32_t v;
384*8617a60dSAndroid Build Coastguard Worker
385*8617a60dSAndroid Build Coastguard Worker /* Test successful call */
386*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
387*8617a60dSAndroid Build Coastguard Worker expected_offset = sd->workbuf_used;
388*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_kernel_preamble(ctx), "preamble good");
389*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->kernel_version, 0x20002, "combined version");
390*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->preamble_offset, expected_offset,
391*8617a60dSAndroid Build Coastguard Worker "preamble offset");
392*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->preamble_size, pre->preamble_size, "preamble size");
393*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
394*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->preamble_offset +
395*8617a60dSAndroid Build Coastguard Worker sd->preamble_size),
396*8617a60dSAndroid Build Coastguard Worker "workbuf used");
397*8617a60dSAndroid Build Coastguard Worker
398*8617a60dSAndroid Build Coastguard Worker /* Expected failures */
399*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
400*8617a60dSAndroid Build Coastguard Worker sd->data_key_size = 0;
401*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
402*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_PREAMBLE2_DATA_KEY,
403*8617a60dSAndroid Build Coastguard Worker "preamble no data key");
404*8617a60dSAndroid Build Coastguard Worker
405*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
406*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM;
407*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
408*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM,
409*8617a60dSAndroid Build Coastguard Worker "preamble unpack data key");
410*8617a60dSAndroid Build Coastguard Worker
411*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
412*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
413*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(struct vb2_kernel_preamble));
414*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
415*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_PREAMBLE2_WORKBUF_HEADER,
416*8617a60dSAndroid Build Coastguard Worker "preamble not enough workbuf for header");
417*8617a60dSAndroid Build Coastguard Worker
418*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
419*8617a60dSAndroid Build Coastguard Worker sd->vblock_preamble_offset = sizeof(mock_vblock);
420*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
421*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
422*8617a60dSAndroid Build Coastguard Worker "preamble read header");
423*8617a60dSAndroid Build Coastguard Worker
424*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
425*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
426*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(mock_vblock.p));
427*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
428*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_PREAMBLE2_WORKBUF,
429*8617a60dSAndroid Build Coastguard Worker "preamble not enough workbuf");
430*8617a60dSAndroid Build Coastguard Worker
431*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
432*8617a60dSAndroid Build Coastguard Worker pre->preamble_size = sizeof(mock_vblock);
433*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
434*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
435*8617a60dSAndroid Build Coastguard Worker "preamble read full");
436*8617a60dSAndroid Build Coastguard Worker
437*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
438*8617a60dSAndroid Build Coastguard Worker mock_verify_preamble_retval = VB2_ERROR_MOCK;
439*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
440*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_MOCK,
441*8617a60dSAndroid Build Coastguard Worker "preamble verify");
442*8617a60dSAndroid Build Coastguard Worker
443*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
444*8617a60dSAndroid Build Coastguard Worker pre->kernel_version = 0x10000;
445*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
446*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_PREAMBLE_VERSION_RANGE,
447*8617a60dSAndroid Build Coastguard Worker "preamble version range");
448*8617a60dSAndroid Build Coastguard Worker
449*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
450*8617a60dSAndroid Build Coastguard Worker pre->kernel_version = 1;
451*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_kernel_preamble(ctx),
452*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KERNEL_PREAMBLE_VERSION_ROLLBACK,
453*8617a60dSAndroid Build Coastguard Worker "preamble version rollback");
454*8617a60dSAndroid Build Coastguard Worker }
455*8617a60dSAndroid Build Coastguard Worker
main(int argc,char * argv[])456*8617a60dSAndroid Build Coastguard Worker int main(int argc, char* argv[])
457*8617a60dSAndroid Build Coastguard Worker {
458*8617a60dSAndroid Build Coastguard Worker verify_keyblock_hash_tests();
459*8617a60dSAndroid Build Coastguard Worker load_kernel_keyblock_tests();
460*8617a60dSAndroid Build Coastguard Worker load_kernel_preamble_tests();
461*8617a60dSAndroid Build Coastguard Worker
462*8617a60dSAndroid Build Coastguard Worker return gTestSuccess ? 0 : 255;
463*8617a60dSAndroid Build Coastguard Worker }
464