1*8617a60dSAndroid Build Coastguard Worker /* Copyright 2014 The ChromiumOS Authors
2*8617a60dSAndroid Build Coastguard Worker * Use of this source code is governed by a BSD-style license that can be
3*8617a60dSAndroid Build Coastguard Worker * found in the LICENSE file.
4*8617a60dSAndroid Build Coastguard Worker *
5*8617a60dSAndroid Build Coastguard Worker * Tests for firmware verification library
6*8617a60dSAndroid Build Coastguard Worker */
7*8617a60dSAndroid Build Coastguard Worker
8*8617a60dSAndroid Build Coastguard Worker #include <stdio.h>
9*8617a60dSAndroid Build Coastguard Worker
10*8617a60dSAndroid Build Coastguard Worker #include "2api.h"
11*8617a60dSAndroid Build Coastguard Worker #include "2common.h"
12*8617a60dSAndroid Build Coastguard Worker #include "2misc.h"
13*8617a60dSAndroid Build Coastguard Worker #include "2nvstorage.h"
14*8617a60dSAndroid Build Coastguard Worker #include "2rsa.h"
15*8617a60dSAndroid Build Coastguard Worker #include "2secdata.h"
16*8617a60dSAndroid Build Coastguard Worker #include "2sysincludes.h"
17*8617a60dSAndroid Build Coastguard Worker #include "common/tests.h"
18*8617a60dSAndroid Build Coastguard Worker
19*8617a60dSAndroid Build Coastguard Worker /* Common context for tests */
20*8617a60dSAndroid Build Coastguard Worker static uint8_t workbuf[VB2_FIRMWARE_WORKBUF_RECOMMENDED_SIZE]
21*8617a60dSAndroid Build Coastguard Worker __attribute__((aligned(VB2_WORKBUF_ALIGN)));
22*8617a60dSAndroid Build Coastguard Worker static struct vb2_context *ctx;
23*8617a60dSAndroid Build Coastguard Worker static struct vb2_shared_data *sd;
24*8617a60dSAndroid Build Coastguard Worker static struct vb2_gbb_header gbb;
25*8617a60dSAndroid Build Coastguard Worker
26*8617a60dSAndroid Build Coastguard Worker /* Mocked function data */
27*8617a60dSAndroid Build Coastguard Worker
28*8617a60dSAndroid Build Coastguard Worker static struct {
29*8617a60dSAndroid Build Coastguard Worker struct vb2_gbb_header h;
30*8617a60dSAndroid Build Coastguard Worker struct vb2_packed_key rootkey;
31*8617a60dSAndroid Build Coastguard Worker char rootkey_data[32];
32*8617a60dSAndroid Build Coastguard Worker } mock_gbb;
33*8617a60dSAndroid Build Coastguard Worker
34*8617a60dSAndroid Build Coastguard Worker static struct {
35*8617a60dSAndroid Build Coastguard Worker /* Keyblock */
36*8617a60dSAndroid Build Coastguard Worker struct {
37*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock kb;
38*8617a60dSAndroid Build Coastguard Worker char data_key_data[16];
39*8617a60dSAndroid Build Coastguard Worker uint8_t kbdata[128];
40*8617a60dSAndroid Build Coastguard Worker } k;
41*8617a60dSAndroid Build Coastguard Worker /* Preamble follows keyblock */
42*8617a60dSAndroid Build Coastguard Worker struct {
43*8617a60dSAndroid Build Coastguard Worker struct vb2_fw_preamble pre;
44*8617a60dSAndroid Build Coastguard Worker uint8_t predata[128];
45*8617a60dSAndroid Build Coastguard Worker } p;
46*8617a60dSAndroid Build Coastguard Worker
47*8617a60dSAndroid Build Coastguard Worker } mock_vblock;
48*8617a60dSAndroid Build Coastguard Worker
49*8617a60dSAndroid Build Coastguard Worker static int mock_read_res_fail_on_call;
50*8617a60dSAndroid Build Coastguard Worker static int mock_unpack_key_retval;
51*8617a60dSAndroid Build Coastguard Worker static int mock_verify_keyblock_retval;
52*8617a60dSAndroid Build Coastguard Worker static int mock_verify_preamble_retval;
53*8617a60dSAndroid Build Coastguard Worker
54*8617a60dSAndroid Build Coastguard Worker /* Type of test to reset for */
55*8617a60dSAndroid Build Coastguard Worker enum reset_type {
56*8617a60dSAndroid Build Coastguard Worker FOR_KEYBLOCK,
57*8617a60dSAndroid Build Coastguard Worker FOR_PREAMBLE
58*8617a60dSAndroid Build Coastguard Worker };
59*8617a60dSAndroid Build Coastguard Worker
reset_common_data(enum reset_type t)60*8617a60dSAndroid Build Coastguard Worker static void reset_common_data(enum reset_type t)
61*8617a60dSAndroid Build Coastguard Worker {
62*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
63*8617a60dSAndroid Build Coastguard Worker struct vb2_fw_preamble *pre = &mock_vblock.p.pre;
64*8617a60dSAndroid Build Coastguard Worker
65*8617a60dSAndroid Build Coastguard Worker memset(workbuf, 0xaa, sizeof(workbuf));
66*8617a60dSAndroid Build Coastguard Worker
67*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2api_init(workbuf, sizeof(workbuf), &ctx),
68*8617a60dSAndroid Build Coastguard Worker "vb2api_init failed");
69*8617a60dSAndroid Build Coastguard Worker
70*8617a60dSAndroid Build Coastguard Worker memset(&gbb, 0, sizeof(gbb));
71*8617a60dSAndroid Build Coastguard Worker sd = vb2_get_sd(ctx);
72*8617a60dSAndroid Build Coastguard Worker
73*8617a60dSAndroid Build Coastguard Worker vb2_nv_init(ctx);
74*8617a60dSAndroid Build Coastguard Worker
75*8617a60dSAndroid Build Coastguard Worker vb2api_secdata_firmware_create(ctx);
76*8617a60dSAndroid Build Coastguard Worker vb2_secdata_firmware_init(ctx);
77*8617a60dSAndroid Build Coastguard Worker
78*8617a60dSAndroid Build Coastguard Worker vb2api_secdata_kernel_create(ctx);
79*8617a60dSAndroid Build Coastguard Worker vb2_secdata_kernel_init(ctx);
80*8617a60dSAndroid Build Coastguard Worker
81*8617a60dSAndroid Build Coastguard Worker mock_read_res_fail_on_call = 0;
82*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_SUCCESS;
83*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_SUCCESS;
84*8617a60dSAndroid Build Coastguard Worker mock_verify_preamble_retval = VB2_SUCCESS;
85*8617a60dSAndroid Build Coastguard Worker
86*8617a60dSAndroid Build Coastguard Worker /* Set up mock data for verifying keyblock */
87*8617a60dSAndroid Build Coastguard Worker sd->fw_version_secdata = 0x20002;
88*8617a60dSAndroid Build Coastguard Worker vb2_secdata_firmware_set(ctx, VB2_SECDATA_FIRMWARE_VERSIONS,
89*8617a60dSAndroid Build Coastguard Worker sd->fw_version_secdata);
90*8617a60dSAndroid Build Coastguard Worker
91*8617a60dSAndroid Build Coastguard Worker gbb.rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey);
92*8617a60dSAndroid Build Coastguard Worker gbb.rootkey_size = sizeof(mock_gbb.rootkey_data);
93*8617a60dSAndroid Build Coastguard Worker sd->last_fw_result = VB2_FW_RESULT_SUCCESS;
94*8617a60dSAndroid Build Coastguard Worker
95*8617a60dSAndroid Build Coastguard Worker mock_gbb.rootkey.algorithm = 11;
96*8617a60dSAndroid Build Coastguard Worker mock_gbb.rootkey.key_offset =
97*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_gbb.rootkey,
98*8617a60dSAndroid Build Coastguard Worker &mock_gbb.rootkey_data);
99*8617a60dSAndroid Build Coastguard Worker mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data);
100*8617a60dSAndroid Build Coastguard Worker
101*8617a60dSAndroid Build Coastguard Worker kb->keyblock_size = sizeof(mock_vblock.k);
102*8617a60dSAndroid Build Coastguard Worker kb->data_key.algorithm = 7;
103*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 2;
104*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_offset =
105*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_vblock.k, &mock_vblock.k.data_key_data) -
106*8617a60dSAndroid Build Coastguard Worker vb2_offset_of(&mock_vblock.k, &kb->data_key);
107*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_size = sizeof(mock_vblock.k.data_key_data);
108*8617a60dSAndroid Build Coastguard Worker strcpy(mock_vblock.k.data_key_data, "data key data!!");
109*8617a60dSAndroid Build Coastguard Worker
110*8617a60dSAndroid Build Coastguard Worker pre->preamble_size = sizeof(mock_vblock.p);
111*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 2;
112*8617a60dSAndroid Build Coastguard Worker
113*8617a60dSAndroid Build Coastguard Worker /* If verifying preamble, verify keyblock first to set up data key */
114*8617a60dSAndroid Build Coastguard Worker if (t == FOR_PREAMBLE)
115*8617a60dSAndroid Build Coastguard Worker vb2_load_fw_keyblock(ctx);
116*8617a60dSAndroid Build Coastguard Worker };
117*8617a60dSAndroid Build Coastguard Worker
118*8617a60dSAndroid Build Coastguard Worker /* Mocked functions */
vb2_get_gbb(struct vb2_context * c)119*8617a60dSAndroid Build Coastguard Worker struct vb2_gbb_header *vb2_get_gbb(struct vb2_context *c)
120*8617a60dSAndroid Build Coastguard Worker {
121*8617a60dSAndroid Build Coastguard Worker return &gbb;
122*8617a60dSAndroid Build Coastguard Worker }
123*8617a60dSAndroid Build Coastguard Worker
vb2ex_read_resource(struct vb2_context * c,enum vb2_resource_index index,uint32_t offset,void * buf,uint32_t size)124*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2ex_read_resource(struct vb2_context *c,
125*8617a60dSAndroid Build Coastguard Worker enum vb2_resource_index index, uint32_t offset,
126*8617a60dSAndroid Build Coastguard Worker void *buf, uint32_t size)
127*8617a60dSAndroid Build Coastguard Worker {
128*8617a60dSAndroid Build Coastguard Worker uint8_t *rptr;
129*8617a60dSAndroid Build Coastguard Worker uint32_t rsize;
130*8617a60dSAndroid Build Coastguard Worker
131*8617a60dSAndroid Build Coastguard Worker if (--mock_read_res_fail_on_call == 0)
132*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_EX_READ_RESOURCE_INDEX;
133*8617a60dSAndroid Build Coastguard Worker
134*8617a60dSAndroid Build Coastguard Worker switch(index) {
135*8617a60dSAndroid Build Coastguard Worker case VB2_RES_GBB:
136*8617a60dSAndroid Build Coastguard Worker rptr = (uint8_t *)&mock_gbb;
137*8617a60dSAndroid Build Coastguard Worker rsize = sizeof(mock_gbb);
138*8617a60dSAndroid Build Coastguard Worker break;
139*8617a60dSAndroid Build Coastguard Worker case VB2_RES_FW_VBLOCK:
140*8617a60dSAndroid Build Coastguard Worker rptr = (uint8_t *)&mock_vblock;
141*8617a60dSAndroid Build Coastguard Worker rsize = sizeof(mock_vblock);
142*8617a60dSAndroid Build Coastguard Worker break;
143*8617a60dSAndroid Build Coastguard Worker default:
144*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_EX_READ_RESOURCE_INDEX;
145*8617a60dSAndroid Build Coastguard Worker }
146*8617a60dSAndroid Build Coastguard Worker
147*8617a60dSAndroid Build Coastguard Worker if (offset > rsize || offset + size > rsize)
148*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_EX_READ_RESOURCE_SIZE;
149*8617a60dSAndroid Build Coastguard Worker
150*8617a60dSAndroid Build Coastguard Worker memcpy(buf, rptr + offset, size);
151*8617a60dSAndroid Build Coastguard Worker return VB2_SUCCESS;
152*8617a60dSAndroid Build Coastguard Worker }
153*8617a60dSAndroid Build Coastguard Worker
vb2_unpack_key_buffer(struct vb2_public_key * key,const uint8_t * buf,uint32_t size)154*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_unpack_key_buffer(struct vb2_public_key *key,
155*8617a60dSAndroid Build Coastguard Worker const uint8_t *buf, uint32_t size)
156*8617a60dSAndroid Build Coastguard Worker {
157*8617a60dSAndroid Build Coastguard Worker key->arrsize = 0;
158*8617a60dSAndroid Build Coastguard Worker return mock_unpack_key_retval;
159*8617a60dSAndroid Build Coastguard Worker }
160*8617a60dSAndroid Build Coastguard Worker
161*8617a60dSAndroid Build Coastguard Worker static struct vb2_public_key last_used_key;
162*8617a60dSAndroid Build Coastguard Worker
vb2_verify_keyblock(struct vb2_keyblock * block,uint32_t size,const struct vb2_public_key * key,const struct vb2_workbuf * wb)163*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_verify_keyblock(struct vb2_keyblock *block, uint32_t size,
164*8617a60dSAndroid Build Coastguard Worker const struct vb2_public_key *key,
165*8617a60dSAndroid Build Coastguard Worker const struct vb2_workbuf *wb)
166*8617a60dSAndroid Build Coastguard Worker {
167*8617a60dSAndroid Build Coastguard Worker memcpy(&last_used_key, key, sizeof(struct vb2_public_key));
168*8617a60dSAndroid Build Coastguard Worker return mock_verify_keyblock_retval;
169*8617a60dSAndroid Build Coastguard Worker }
170*8617a60dSAndroid Build Coastguard Worker
vb2_verify_fw_preamble(struct vb2_fw_preamble * preamble,uint32_t size,const struct vb2_public_key * key,const struct vb2_workbuf * wb)171*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_verify_fw_preamble(struct vb2_fw_preamble *preamble,
172*8617a60dSAndroid Build Coastguard Worker uint32_t size,
173*8617a60dSAndroid Build Coastguard Worker const struct vb2_public_key *key,
174*8617a60dSAndroid Build Coastguard Worker const struct vb2_workbuf *wb)
175*8617a60dSAndroid Build Coastguard Worker {
176*8617a60dSAndroid Build Coastguard Worker memcpy(&last_used_key, key, sizeof(struct vb2_public_key));
177*8617a60dSAndroid Build Coastguard Worker return mock_verify_preamble_retval;
178*8617a60dSAndroid Build Coastguard Worker }
179*8617a60dSAndroid Build Coastguard Worker
180*8617a60dSAndroid Build Coastguard Worker /* Tests */
181*8617a60dSAndroid Build Coastguard Worker
verify_keyblock_tests(void)182*8617a60dSAndroid Build Coastguard Worker static void verify_keyblock_tests(void)
183*8617a60dSAndroid Build Coastguard Worker {
184*8617a60dSAndroid Build Coastguard Worker struct vb2_keyblock *kb = &mock_vblock.k.kb;
185*8617a60dSAndroid Build Coastguard Worker struct vb2_packed_key *k;
186*8617a60dSAndroid Build Coastguard Worker int expected_offset;
187*8617a60dSAndroid Build Coastguard Worker
188*8617a60dSAndroid Build Coastguard Worker /* Test successful call */
189*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
190*8617a60dSAndroid Build Coastguard Worker expected_offset = sd->workbuf_used;
191*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock verify");
192*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->fw_version, 0x20000, "keyblock version");
193*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->vblock_preamble_offset, sizeof(mock_vblock.k),
194*8617a60dSAndroid Build Coastguard Worker "preamble offset");
195*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->data_key_offset, expected_offset,
196*8617a60dSAndroid Build Coastguard Worker "keyblock data key offset");
197*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
198*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->data_key_offset +
199*8617a60dSAndroid Build Coastguard Worker sd->data_key_size),
200*8617a60dSAndroid Build Coastguard Worker "workbuf used");
201*8617a60dSAndroid Build Coastguard Worker
202*8617a60dSAndroid Build Coastguard Worker /* Make sure data key was properly saved */
203*8617a60dSAndroid Build Coastguard Worker k = vb2_member_of(sd, sd->data_key_offset);
204*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->algorithm, 7, "data key algorithm");
205*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->key_version, 2, "data key version");
206*8617a60dSAndroid Build Coastguard Worker TEST_EQ(k->key_size, sizeof(mock_vblock.k.data_key_data),
207*8617a60dSAndroid Build Coastguard Worker "data key size");
208*8617a60dSAndroid Build Coastguard Worker TEST_EQ(memcmp(vb2_member_of(k, k->key_offset),
209*8617a60dSAndroid Build Coastguard Worker mock_vblock.k.data_key_data,
210*8617a60dSAndroid Build Coastguard Worker sizeof(mock_vblock.k.data_key_data)),
211*8617a60dSAndroid Build Coastguard Worker 0, "data key data");
212*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
213*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->data_key_offset +
214*8617a60dSAndroid Build Coastguard Worker sd->data_key_size),
215*8617a60dSAndroid Build Coastguard Worker "workbuf used after");
216*8617a60dSAndroid Build Coastguard Worker
217*8617a60dSAndroid Build Coastguard Worker /* Test hwcrypto conditions */
218*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
219*8617a60dSAndroid Build Coastguard Worker
220*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock verify");
221*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
222*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden by TPM flag");
223*8617a60dSAndroid Build Coastguard Worker
224*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_RECOVERY_MODE;
225*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock verify");
226*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
227*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden by TPM flag on recovery mode");
228*8617a60dSAndroid Build Coastguard Worker
229*8617a60dSAndroid Build Coastguard Worker vb2_secdata_kernel_set(ctx, VB2_SECDATA_KERNEL_FLAGS,
230*8617a60dSAndroid Build Coastguard Worker VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED);
231*8617a60dSAndroid Build Coastguard Worker
232*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock verify");
233*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
234*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden on recovery mode");
235*8617a60dSAndroid Build Coastguard Worker
236*8617a60dSAndroid Build Coastguard Worker ctx->flags &= ~VB2_CONTEXT_RECOVERY_MODE;
237*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock verify");
238*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 1, "hwcrypto is allowed");
239*8617a60dSAndroid Build Coastguard Worker
240*8617a60dSAndroid Build Coastguard Worker /* Test failures */
241*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
242*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
243*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(gbb.rootkey_size);
244*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
245*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_KEYBLOCK_WORKBUF_ROOT_KEY,
246*8617a60dSAndroid Build Coastguard Worker "keyblock not enough workbuf for root key");
247*8617a60dSAndroid Build Coastguard Worker
248*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
249*8617a60dSAndroid Build Coastguard Worker gbb.rootkey_size = sizeof(mock_gbb);
250*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
251*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
252*8617a60dSAndroid Build Coastguard Worker "keyblock read root key");
253*8617a60dSAndroid Build Coastguard Worker
254*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
255*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM;
256*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
257*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM,
258*8617a60dSAndroid Build Coastguard Worker "keyblock unpack root key");
259*8617a60dSAndroid Build Coastguard Worker
260*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
261*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size -
262*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(gbb.rootkey_size);
263*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
264*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_KEYBLOCK_WORKBUF_HEADER,
265*8617a60dSAndroid Build Coastguard Worker "keyblock not enough workbuf for header");
266*8617a60dSAndroid Build Coastguard Worker
267*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
268*8617a60dSAndroid Build Coastguard Worker mock_read_res_fail_on_call = 2;
269*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
270*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_INDEX,
271*8617a60dSAndroid Build Coastguard Worker "keyblock read keyblock header");
272*8617a60dSAndroid Build Coastguard Worker
273*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
274*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size -
275*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(gbb.rootkey_size) -
276*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(struct vb2_keyblock));
277*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
278*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_KEYBLOCK_WORKBUF,
279*8617a60dSAndroid Build Coastguard Worker "keyblock not enough workbuf for entire keyblock");
280*8617a60dSAndroid Build Coastguard Worker
281*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
282*8617a60dSAndroid Build Coastguard Worker kb->keyblock_size = sizeof(mock_vblock) + 1;
283*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
284*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
285*8617a60dSAndroid Build Coastguard Worker "keyblock read keyblock");
286*8617a60dSAndroid Build Coastguard Worker
287*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
288*8617a60dSAndroid Build Coastguard Worker mock_verify_keyblock_retval = VB2_ERROR_KEYBLOCK_MAGIC;
289*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
290*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_KEYBLOCK_MAGIC,
291*8617a60dSAndroid Build Coastguard Worker "keyblock verify keyblock");
292*8617a60dSAndroid Build Coastguard Worker
293*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
294*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 0x10000;
295*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
296*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_KEYBLOCK_VERSION_RANGE,
297*8617a60dSAndroid Build Coastguard Worker "keyblock version range");
298*8617a60dSAndroid Build Coastguard Worker
299*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
300*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 1;
301*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_keyblock(ctx),
302*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_KEYBLOCK_VERSION_ROLLBACK,
303*8617a60dSAndroid Build Coastguard Worker "keyblock rollback");
304*8617a60dSAndroid Build Coastguard Worker
305*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_KEYBLOCK);
306*8617a60dSAndroid Build Coastguard Worker kb->data_key.key_version = 1;
307*8617a60dSAndroid Build Coastguard Worker gbb.flags |= VB2_GBB_FLAG_DISABLE_FW_ROLLBACK_CHECK;
308*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_keyblock(ctx), "keyblock rollback with GBB flag");
309*8617a60dSAndroid Build Coastguard Worker }
310*8617a60dSAndroid Build Coastguard Worker
verify_preamble_tests(void)311*8617a60dSAndroid Build Coastguard Worker static void verify_preamble_tests(void)
312*8617a60dSAndroid Build Coastguard Worker {
313*8617a60dSAndroid Build Coastguard Worker struct vb2_fw_preamble *pre = &mock_vblock.p.pre;
314*8617a60dSAndroid Build Coastguard Worker int expected_offset;
315*8617a60dSAndroid Build Coastguard Worker uint32_t v;
316*8617a60dSAndroid Build Coastguard Worker
317*8617a60dSAndroid Build Coastguard Worker /* Test successful call */
318*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
319*8617a60dSAndroid Build Coastguard Worker expected_offset = sd->workbuf_used;
320*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "preamble good");
321*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->fw_version, 0x20002, "combined version");
322*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->preamble_offset, expected_offset,
323*8617a60dSAndroid Build Coastguard Worker "preamble offset");
324*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->preamble_size, pre->preamble_size, "preamble size");
325*8617a60dSAndroid Build Coastguard Worker TEST_EQ(sd->workbuf_used,
326*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sd->preamble_offset +
327*8617a60dSAndroid Build Coastguard Worker sd->preamble_size),
328*8617a60dSAndroid Build Coastguard Worker "workbuf used");
329*8617a60dSAndroid Build Coastguard Worker
330*8617a60dSAndroid Build Coastguard Worker /* Test hwcrypto conditions */
331*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
332*8617a60dSAndroid Build Coastguard Worker
333*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "preamble good");
334*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
335*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden by TPM flag");
336*8617a60dSAndroid Build Coastguard Worker
337*8617a60dSAndroid Build Coastguard Worker ctx->flags |= VB2_CONTEXT_RECOVERY_MODE;
338*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "preamble good");
339*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
340*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden by TPM flag on recovery mode");
341*8617a60dSAndroid Build Coastguard Worker
342*8617a60dSAndroid Build Coastguard Worker vb2_secdata_kernel_set(ctx, VB2_SECDATA_KERNEL_FLAGS,
343*8617a60dSAndroid Build Coastguard Worker VB2_SECDATA_KERNEL_FLAG_HWCRYPTO_ALLOWED);
344*8617a60dSAndroid Build Coastguard Worker
345*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "preamble good");
346*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 0,
347*8617a60dSAndroid Build Coastguard Worker "hwcrypto is forbidden on recovery mode");
348*8617a60dSAndroid Build Coastguard Worker
349*8617a60dSAndroid Build Coastguard Worker ctx->flags &= ~VB2_CONTEXT_RECOVERY_MODE;
350*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "preamble good");
351*8617a60dSAndroid Build Coastguard Worker TEST_EQ(last_used_key.allow_hwcrypto, 1,
352*8617a60dSAndroid Build Coastguard Worker "hwcrypto is allowed");
353*8617a60dSAndroid Build Coastguard Worker
354*8617a60dSAndroid Build Coastguard Worker
355*8617a60dSAndroid Build Coastguard Worker /* Expected failures */
356*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
357*8617a60dSAndroid Build Coastguard Worker sd->data_key_size = 0;
358*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
359*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_PREAMBLE2_DATA_KEY,
360*8617a60dSAndroid Build Coastguard Worker "preamble no data key");
361*8617a60dSAndroid Build Coastguard Worker
362*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
363*8617a60dSAndroid Build Coastguard Worker mock_unpack_key_retval = VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM;
364*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
365*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM,
366*8617a60dSAndroid Build Coastguard Worker "preamble unpack data key");
367*8617a60dSAndroid Build Coastguard Worker
368*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
369*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
370*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(struct vb2_fw_preamble));
371*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
372*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_PREAMBLE2_WORKBUF_HEADER,
373*8617a60dSAndroid Build Coastguard Worker "preamble not enough workbuf for header");
374*8617a60dSAndroid Build Coastguard Worker
375*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
376*8617a60dSAndroid Build Coastguard Worker sd->vblock_preamble_offset = sizeof(mock_vblock);
377*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
378*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
379*8617a60dSAndroid Build Coastguard Worker "preamble read header");
380*8617a60dSAndroid Build Coastguard Worker
381*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
382*8617a60dSAndroid Build Coastguard Worker sd->workbuf_used = sd->workbuf_size + VB2_WORKBUF_ALIGN -
383*8617a60dSAndroid Build Coastguard Worker vb2_wb_round_up(sizeof(mock_vblock.p));
384*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
385*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_PREAMBLE2_WORKBUF,
386*8617a60dSAndroid Build Coastguard Worker "preamble not enough workbuf");
387*8617a60dSAndroid Build Coastguard Worker
388*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
389*8617a60dSAndroid Build Coastguard Worker pre->preamble_size = sizeof(mock_vblock);
390*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
391*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_EX_READ_RESOURCE_SIZE,
392*8617a60dSAndroid Build Coastguard Worker "preamble read full");
393*8617a60dSAndroid Build Coastguard Worker
394*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
395*8617a60dSAndroid Build Coastguard Worker mock_verify_preamble_retval = VB2_ERROR_PREAMBLE_SIG_INVALID;
396*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
397*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_PREAMBLE_SIG_INVALID,
398*8617a60dSAndroid Build Coastguard Worker "preamble verify");
399*8617a60dSAndroid Build Coastguard Worker
400*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
401*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 0x10000;
402*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
403*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_PREAMBLE_VERSION_RANGE,
404*8617a60dSAndroid Build Coastguard Worker "preamble version range");
405*8617a60dSAndroid Build Coastguard Worker
406*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
407*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 1;
408*8617a60dSAndroid Build Coastguard Worker TEST_EQ(vb2_load_fw_preamble(ctx),
409*8617a60dSAndroid Build Coastguard Worker VB2_ERROR_FW_PREAMBLE_VERSION_ROLLBACK,
410*8617a60dSAndroid Build Coastguard Worker "preamble version rollback");
411*8617a60dSAndroid Build Coastguard Worker
412*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
413*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 1;
414*8617a60dSAndroid Build Coastguard Worker gbb.flags |= VB2_GBB_FLAG_DISABLE_FW_ROLLBACK_CHECK;
415*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx), "version rollback with GBB flag");
416*8617a60dSAndroid Build Coastguard Worker
417*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
418*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 3;
419*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx),
420*8617a60dSAndroid Build Coastguard Worker "preamble version roll forward");
421*8617a60dSAndroid Build Coastguard Worker v = vb2_secdata_firmware_get(ctx, VB2_SECDATA_FIRMWARE_VERSIONS);
422*8617a60dSAndroid Build Coastguard Worker TEST_EQ(v, 0x20003, "roll forward");
423*8617a60dSAndroid Build Coastguard Worker
424*8617a60dSAndroid Build Coastguard Worker /* Newer version without result success doesn't roll forward */
425*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
426*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 3;
427*8617a60dSAndroid Build Coastguard Worker sd->last_fw_result = VB2_FW_RESULT_UNKNOWN;
428*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx),
429*8617a60dSAndroid Build Coastguard Worker "preamble version no roll forward 1");
430*8617a60dSAndroid Build Coastguard Worker v = vb2_secdata_firmware_get(ctx, VB2_SECDATA_FIRMWARE_VERSIONS);
431*8617a60dSAndroid Build Coastguard Worker TEST_EQ(v, 0x20002, "no roll forward");
432*8617a60dSAndroid Build Coastguard Worker
433*8617a60dSAndroid Build Coastguard Worker /* Newer version with success but for other slot doesn't roll forward */
434*8617a60dSAndroid Build Coastguard Worker reset_common_data(FOR_PREAMBLE);
435*8617a60dSAndroid Build Coastguard Worker pre->firmware_version = 3;
436*8617a60dSAndroid Build Coastguard Worker sd->last_fw_slot = 1;
437*8617a60dSAndroid Build Coastguard Worker TEST_SUCC(vb2_load_fw_preamble(ctx),
438*8617a60dSAndroid Build Coastguard Worker "preamble version no roll forward 2");
439*8617a60dSAndroid Build Coastguard Worker v = vb2_secdata_firmware_get(ctx, VB2_SECDATA_FIRMWARE_VERSIONS);
440*8617a60dSAndroid Build Coastguard Worker TEST_EQ(v, 0x20002, "no roll forward");
441*8617a60dSAndroid Build Coastguard Worker }
442*8617a60dSAndroid Build Coastguard Worker
main(int argc,char * argv[])443*8617a60dSAndroid Build Coastguard Worker int main(int argc, char* argv[])
444*8617a60dSAndroid Build Coastguard Worker {
445*8617a60dSAndroid Build Coastguard Worker verify_keyblock_tests();
446*8617a60dSAndroid Build Coastguard Worker verify_preamble_tests();
447*8617a60dSAndroid Build Coastguard Worker
448*8617a60dSAndroid Build Coastguard Worker return gTestSuccess ? 0 : 255;
449*8617a60dSAndroid Build Coastguard Worker }
450