187 lines
7.4 KiB
C++
187 lines
7.4 KiB
C++
//
|
|
// Copyright (C) 2018 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
#include "update_engine/payload_consumer/verity_writer_android.h"
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <brillo/secure_blob.h>
|
|
#include <gtest/gtest.h>
|
|
|
|
#include "update_engine/common/test_utils.h"
|
|
#include "update_engine/common/utils.h"
|
|
#include "update_engine/payload_consumer/file_descriptor.h"
|
|
|
|
namespace chromeos_update_engine {
|
|
|
|
class VerityWriterAndroidTest : public ::testing::Test {
|
|
protected:
|
|
void SetUp() override {
|
|
partition_.target_path = temp_file_.path();
|
|
partition_.block_size = 4096;
|
|
partition_.hash_tree_data_offset = 0;
|
|
partition_.hash_tree_data_size = 4096;
|
|
partition_.hash_tree_offset = 4096;
|
|
partition_.hash_tree_size = 4096;
|
|
partition_.hash_tree_algorithm = "sha1";
|
|
partition_.fec_roots = 2;
|
|
partition_fd_ = std::make_shared<EintrSafeFileDescriptor>();
|
|
partition_fd_->Open(partition_.target_path.c_str(), O_RDWR);
|
|
}
|
|
|
|
VerityWriterAndroid verity_writer_;
|
|
InstallPlan::Partition partition_;
|
|
FileDescriptorPtr partition_fd_;
|
|
ScopedTempFile temp_file_;
|
|
};
|
|
|
|
TEST_F(VerityWriterAndroidTest, SimpleTest) {
|
|
brillo::Blob part_data(8192);
|
|
test_utils::WriteFileVector(partition_.target_path, part_data);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096));
|
|
ASSERT_TRUE(verity_writer_.Update(4096, part_data.data() + 4096, 4096));
|
|
ASSERT_TRUE(
|
|
verity_writer_.Finalize(partition_fd_.get(), partition_fd_.get()));
|
|
brillo::Blob actual_part;
|
|
utils::ReadFile(partition_.target_path, &actual_part);
|
|
// dd if=/dev/zero bs=4096 count=1 2>/dev/null | sha1sum | xxd -r -p |
|
|
// hexdump -v -e '/1 "0x%02x, "'
|
|
brillo::Blob hash = {0x1c, 0xea, 0xf7, 0x3d, 0xf4, 0x0e, 0x53,
|
|
0x1d, 0xf3, 0xbf, 0xb2, 0x6b, 0x4f, 0xb7,
|
|
0xcd, 0x95, 0xfb, 0x7b, 0xff, 0x1d};
|
|
memcpy(part_data.data() + 4096, hash.data(), hash.size());
|
|
ASSERT_EQ(part_data, actual_part);
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, NoOpTest) {
|
|
partition_.hash_tree_data_size = 0;
|
|
partition_.hash_tree_size = 0;
|
|
brillo::Blob part_data(4096);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size()));
|
|
ASSERT_TRUE(verity_writer_.Update(4096, part_data.data(), part_data.size()));
|
|
ASSERT_TRUE(verity_writer_.Update(8192, part_data.data(), part_data.size()));
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, DiscontinuedRead) {
|
|
partition_.hash_tree_data_size = 8192;
|
|
partition_.hash_tree_size = 4096;
|
|
brillo::Blob part_data(4096);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size()));
|
|
ASSERT_FALSE(verity_writer_.Update(8192, part_data.data(), part_data.size()));
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, InvalidHashAlgorithmTest) {
|
|
partition_.hash_tree_algorithm = "sha123";
|
|
ASSERT_FALSE(verity_writer_.Init(partition_));
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, WrongHashTreeSizeTest) {
|
|
partition_.hash_tree_size = 8192;
|
|
ASSERT_FALSE(verity_writer_.Init(partition_));
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, SHA256Test) {
|
|
partition_.hash_tree_algorithm = "sha256";
|
|
brillo::Blob part_data(8192);
|
|
test_utils::WriteFileVector(partition_.target_path, part_data);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096));
|
|
ASSERT_TRUE(verity_writer_.Update(4096, part_data.data() + 4096, 4096));
|
|
ASSERT_TRUE(
|
|
verity_writer_.Finalize(partition_fd_.get(), partition_fd_.get()));
|
|
brillo::Blob actual_part;
|
|
utils::ReadFile(partition_.target_path, &actual_part);
|
|
// dd if=/dev/zero bs=4096 count=1 2>/dev/null | sha256sum | xxd -r -p |
|
|
// hexdump -v -e '/1 "0x%02x, "'
|
|
brillo::Blob hash = {0xad, 0x7f, 0xac, 0xb2, 0x58, 0x6f, 0xc6, 0xe9,
|
|
0x66, 0xc0, 0x04, 0xd7, 0xd1, 0xd1, 0x6b, 0x02,
|
|
0x4f, 0x58, 0x05, 0xff, 0x7c, 0xb4, 0x7c, 0x7a,
|
|
0x85, 0xda, 0xbd, 0x8b, 0x48, 0x89, 0x2c, 0xa7};
|
|
memcpy(part_data.data() + 4096, hash.data(), hash.size());
|
|
ASSERT_EQ(part_data, actual_part);
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, NonZeroOffsetSHA256Test) {
|
|
partition_.hash_tree_algorithm = "sha256";
|
|
partition_.hash_tree_data_offset = 100;
|
|
partition_.hash_tree_offset =
|
|
partition_.hash_tree_data_offset + partition_.hash_tree_data_size;
|
|
brillo::Blob part_data(8192 + partition_.hash_tree_data_offset);
|
|
test_utils::WriteFileVector(partition_.target_path, part_data);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), 4096));
|
|
ASSERT_TRUE(verity_writer_.Update(4096, part_data.data() + 4096, 4096));
|
|
ASSERT_TRUE(verity_writer_.Update(
|
|
8192, part_data.data() + 8192, partition_.hash_tree_data_offset));
|
|
ASSERT_TRUE(
|
|
verity_writer_.Finalize(partition_fd_.get(), partition_fd_.get()));
|
|
brillo::Blob actual_part;
|
|
utils::ReadFile(partition_.target_path, &actual_part);
|
|
// dd if=/dev/zero bs=4096 count=1 2>/dev/null | sha256sum | xxd -r -p |
|
|
// hexdump -v -e '/1 "0x%02x, "'
|
|
brillo::Blob hash = {0xad, 0x7f, 0xac, 0xb2, 0x58, 0x6f, 0xc6, 0xe9,
|
|
0x66, 0xc0, 0x04, 0xd7, 0xd1, 0xd1, 0x6b, 0x02,
|
|
0x4f, 0x58, 0x05, 0xff, 0x7c, 0xb4, 0x7c, 0x7a,
|
|
0x85, 0xda, 0xbd, 0x8b, 0x48, 0x89, 0x2c, 0xa7};
|
|
memcpy(
|
|
part_data.data() + partition_.hash_tree_offset, hash.data(), hash.size());
|
|
ASSERT_EQ(part_data, actual_part);
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, FECTest) {
|
|
partition_.fec_data_offset = 0;
|
|
partition_.fec_data_size = 4096;
|
|
partition_.fec_offset = 4096;
|
|
partition_.fec_size = 2 * 4096;
|
|
brillo::Blob part_data(3 * 4096, 0x1);
|
|
test_utils::WriteFileVector(partition_.target_path, part_data);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size()));
|
|
ASSERT_TRUE(
|
|
verity_writer_.Finalize(partition_fd_.get(), partition_fd_.get()));
|
|
brillo::Blob actual_part;
|
|
utils::ReadFile(partition_.target_path, &actual_part);
|
|
// Write FEC data.
|
|
for (size_t i = 4096; i < part_data.size(); i += 2) {
|
|
part_data[i] = 0x8e;
|
|
part_data[i + 1] = 0x8f;
|
|
}
|
|
ASSERT_EQ(part_data, actual_part);
|
|
}
|
|
|
|
TEST_F(VerityWriterAndroidTest, HashTreeDisabled) {
|
|
partition_.hash_tree_size = 0;
|
|
partition_.hash_tree_data_size = 0;
|
|
partition_.hash_tree_offset = 0;
|
|
partition_.hash_tree_data_offset = 0;
|
|
|
|
partition_.fec_data_offset = 0;
|
|
partition_.fec_data_size = 4096;
|
|
partition_.fec_offset = 4096;
|
|
partition_.fec_size = 2 * 4096;
|
|
brillo::Blob part_data(3 * 4096, 0x1);
|
|
test_utils::WriteFileVector(partition_.target_path, part_data);
|
|
ASSERT_TRUE(verity_writer_.Init(partition_));
|
|
ASSERT_TRUE(verity_writer_.Update(0, part_data.data(), part_data.size()));
|
|
ASSERT_TRUE(
|
|
verity_writer_.Finalize(partition_fd_.get(), partition_fd_.get()));
|
|
}
|
|
|
|
} // namespace chromeos_update_engine
|