blob: 01d092680cb2d5ee2fb6a9d98088304df22d08df [file] [log] [blame]
Doug Zongker73ae31c2009-12-09 17:01:45 -08001/*
2 * Copyright (C) 2009 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <stdio.h>
18#include <stdlib.h>
19#include <stdarg.h>
20
21#include "verifier.h"
Doug Zongkerdaefc1d2011-10-31 09:34:15 -070022#include "ui.h"
Doug Zongker73ae31c2009-12-09 17:01:45 -080023
24// This is build/target/product/security/testkey.x509.pem after being
25// dumped out by dumpkey.jar.
26RSAPublicKey test_key =
27 { 64, 0xc926ad21,
28 { 1795090719, 2141396315, 950055447, -1713398866,
29 -26044131, 1920809988, 546586521, -795969498,
30 1776797858, -554906482, 1805317999, 1429410244,
31 129622599, 1422441418, 1783893377, 1222374759,
32 -1731647369, 323993566, 28517732, 609753416,
33 1826472888, 215237850, -33324596, -245884705,
34 -1066504894, 774857746, 154822455, -1797768399,
35 -1536767878, -1275951968, -1500189652, 87251430,
36 -1760039318, 120774784, 571297800, -599067824,
37 -1815042109, -483341846, -893134306, -1900097649,
38 -1027721089, 950095497, 555058928, 414729973,
39 1136544882, -1250377212, 465547824, -236820568,
40 -1563171242, 1689838846, -404210357, 1048029507,
41 895090649, 247140249, 178744550, -747082073,
42 -1129788053, 109881576, -350362881, 1044303212,
43 -522594267, -1309816990, -557446364, -695002876},
44 { -857949815, -510492167, -1494742324, -1208744608,
45 251333580, 2131931323, 512774938, 325948880,
46 -1637480859, 2102694287, -474399070, 792812816,
47 1026422502, 2053275343, -1494078096, -1181380486,
48 165549746, -21447327, -229719404, 1902789247,
49 772932719, -353118870, -642223187, 216871947,
50 -1130566647, 1942378755, -298201445, 1055777370,
51 964047799, 629391717, -2062222979, -384408304,
52 191868569, -1536083459, -612150544, -1297252564,
53 -1592438046, -724266841, -518093464, -370899750,
54 -739277751, -1536141862, 1323144535, 61311905,
55 1997411085, 376844204, 213777604, -217643712,
56 9135381, 1625809335, -1490225159, -1342673351,
57 1117190829, -57654514, 1825108855, -1281819325,
58 1111251351, -1726129724, 1684324211, -1773988491,
Doug Zongker17495272012-07-25 13:10:58 -070059 367251975, 810756730, -1941182952, 1175080310 },
60 3
61 };
62
63RSAPublicKey test_f4_key =
64 { 64, 0xc9bd1f21,
65 { 293133087u, 3210546773u, 865313125u, 250921607u,
66 3158780490u, 943703457u, 1242806226u, 2986289859u,
67 2942743769u, 2457906415u, 2719374299u, 1783459420u,
68 149579627u, 3081531591u, 3440738617u, 2788543742u,
69 2758457512u, 1146764939u, 3699497403u, 2446203424u,
70 1744968926u, 1159130537u, 2370028300u, 3978231572u,
71 3392699980u, 1487782451u, 1180150567u, 2841334302u,
72 3753960204u, 961373345u, 3333628321u, 748825784u,
73 2978557276u, 1566596926u, 1613056060u, 2600292737u,
74 1847226629u, 50398611u, 1890374404u, 2878700735u,
75 2286201787u, 1401186359u, 619285059u, 731930817u,
76 2340993166u, 1156490245u, 2992241729u, 151498140u,
77 318782170u, 3480838990u, 2100383433u, 4223552555u,
78 3628927011u, 4247846280u, 1759029513u, 4215632601u,
79 2719154626u, 3490334597u, 1751299340u, 3487864726u,
80 3668753795u, 4217506054u, 3748782284u, 3150295088u },
81 { 1772626313u, 445326068u, 3477676155u, 1758201194u,
82 2986784722u, 491035581u, 3922936562u, 702212696u,
83 2979856666u, 3324974564u, 2488428922u, 3056318590u,
84 1626954946u, 664714029u, 398585816u, 3964097931u,
85 3356701905u, 2298377729u, 2040082097u, 3025491477u,
86 539143308u, 3348777868u, 2995302452u, 3602465520u,
87 212480763u, 2691021393u, 1307177300u, 704008044u,
88 2031136606u, 1054106474u, 3838318865u, 2441343869u,
89 1477566916u, 700949900u, 2534790355u, 3353533667u,
90 336163563u, 4106790558u, 2701448228u, 1571536379u,
91 1103842411u, 3623110423u, 1635278839u, 1577828979u,
92 910322800u, 715583630u, 138128831u, 1017877531u,
93 2289162787u, 447994798u, 1897243165u, 4121561445u,
94 4150719842u, 2131821093u, 2262395396u, 3305771534u,
95 980753571u, 3256525190u, 3128121808u, 1072869975u,
96 3507939515u, 4229109952u, 118381341u, 2209831334u },
97 65537
Doug Zongker73ae31c2009-12-09 17:01:45 -080098 };
99
Doug Zongkerdaefc1d2011-10-31 09:34:15 -0700100RecoveryUI* ui = NULL;
Doug Zongker73ae31c2009-12-09 17:01:45 -0800101
Doug Zongkerdaefc1d2011-10-31 09:34:15 -0700102// verifier expects to find a UI object; we provide one that does
103// nothing but print.
104class FakeUI : public RecoveryUI {
105 void Init() { }
106 void SetBackground(Icon icon) { }
Doug Zongker73ae31c2009-12-09 17:01:45 -0800107
Doug Zongkerdaefc1d2011-10-31 09:34:15 -0700108 void SetProgressType(ProgressType determinate) { }
109 void ShowProgress(float portion, float seconds) { }
110 void SetProgress(float fraction) { }
111
112 void ShowText(bool visible) { }
113 bool IsTextVisible() { return false; }
114 bool WasTextEverVisible() { return false; }
115 void Print(const char* fmt, ...) {
116 char buf[256];
117 va_list ap;
118 va_start(ap, fmt);
119 vsnprintf(buf, 256, fmt, ap);
120 va_end(ap);
121
122 fputs(buf, stderr);
123 }
124
Doug Zongkerdaefc1d2011-10-31 09:34:15 -0700125 void StartMenu(const char* const * headers, const char* const * items,
126 int initial_selection) { }
127 int SelectMenu(int sel) { return 0; }
128 void EndMenu() { }
129};
Doug Zongker73ae31c2009-12-09 17:01:45 -0800130
131int main(int argc, char **argv) {
Doug Zongker17495272012-07-25 13:10:58 -0700132 if (argc != 2 && argc != 3) {
133 fprintf(stderr, "Usage: %s [-f4] <package>\n", argv[0]);
Doug Zongker73ae31c2009-12-09 17:01:45 -0800134 return 2;
135 }
136
Doug Zongker17495272012-07-25 13:10:58 -0700137 RSAPublicKey* key = &test_key;
138 ++argv;
139 if (strcmp(argv[0], "-f4") == 0) {
140 ++argv;
141 key = &test_f4_key;
142 }
143
Doug Zongkerdaefc1d2011-10-31 09:34:15 -0700144 ui = new FakeUI();
145
Doug Zongker17495272012-07-25 13:10:58 -0700146 int result = verify_file(*argv, key, 1);
Doug Zongker73ae31c2009-12-09 17:01:45 -0800147 if (result == VERIFY_SUCCESS) {
148 printf("SUCCESS\n");
149 return 0;
150 } else if (result == VERIFY_FAILURE) {
151 printf("FAILURE\n");
152 return 1;
153 } else {
154 printf("bad return value\n");
155 return 3;
156 }
157}