diff options
author | NingSun <ning.sun@intel.com> | 2018-02-08 08:34:03 -0800 |
---|---|---|
committer | NingSun <ning.sun@intel.com> | 2018-02-08 09:14:52 -0800 |
commit | 0c89b3ccba7c9b7332ab67ae1936aff51ca62367 (patch) | |
tree | 70c1b1d160d4c6d0a83395ca9a87c1264d0d3439 /SoftHSMv2/src/lib/test/InfoTests.cpp | |
parent | 945613b4db4e07f75d2bc7463db580ddfaa700fd (diff) |
Initial sshsm project structure
Issue-ID: AAF-94
Change-Id: I5e82fff418e7567b161acf9b98013a9b85ffc5b4
Signed-off-by: NingSun <ning.sun@intel.com>
Diffstat (limited to 'SoftHSMv2/src/lib/test/InfoTests.cpp')
-rw-r--r-- | SoftHSMv2/src/lib/test/InfoTests.cpp | 320 |
1 files changed, 320 insertions, 0 deletions
diff --git a/SoftHSMv2/src/lib/test/InfoTests.cpp b/SoftHSMv2/src/lib/test/InfoTests.cpp new file mode 100644 index 0000000..958d96e --- /dev/null +++ b/SoftHSMv2/src/lib/test/InfoTests.cpp @@ -0,0 +1,320 @@ +/* + * Copyright (c) 2010 .SE (The Internet Infrastructure Foundation) + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY + * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE + * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER + * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR + * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN + * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +/***************************************************************************** + InfoTests.cpp + + Contains test cases to C_GetInfo, C_GetFunctionList, C_GetSlotList, + C_GetSlotInfo, C_GetTokenInfo, C_GetMechanismList, and C_GetMechanismInfo + *****************************************************************************/ + +#include <config.h> +#include <stdlib.h> +#include <string.h> +#include "InfoTests.h" + +CPPUNIT_TEST_SUITE_REGISTRATION(InfoTests); + +void InfoTests::testGetInfo() +{ + CK_RV rv; + CK_INFO ckInfo; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetInfo(&ckInfo) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetInfo(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetInfo(&ckInfo) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} + +void InfoTests::testGetFunctionList() +{ + CK_RV rv; + CK_FUNCTION_LIST_PTR ckFuncList; + + rv = CRYPTOKI_F_PTR( C_GetFunctionList(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetFunctionList(&ckFuncList) ); + CPPUNIT_ASSERT(rv == CKR_OK); +} + +void InfoTests::testGetSlotList() +{ + CK_RV rv; + CK_ULONG ulSlotCount = 0; + CK_SLOT_ID_PTR pSlotList; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + // Get the size of the buffer + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + pSlotList = (CK_SLOT_ID_PTR)malloc(ulSlotCount * sizeof(CK_SLOT_ID)); + + // Check if we have a too small buffer + ulSlotCount = 0; + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, pSlotList, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); + + // Get the slot list + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, pSlotList, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + free(pSlotList); + + // Get the number of slots with tokens + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, NULL_PTR, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + pSlotList = (CK_SLOT_ID_PTR)malloc(ulSlotCount * sizeof(CK_SLOT_ID)); + + // Check if we have a too small buffer + ulSlotCount = 0; + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, pSlotList, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); + + // Get the slot list + rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, pSlotList, &ulSlotCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + free(pSlotList); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} + +void InfoTests::testGetSlotInfo() +{ + CK_RV rv; + CK_SLOT_INFO slotInfo; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_invalidSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_OK); + CPPUNIT_ASSERT((slotInfo.flags & CKF_TOKEN_PRESENT ) == CKF_TOKEN_PRESENT); + CPPUNIT_ASSERT((slotInfo.flags & CKF_REMOVABLE_DEVICE ) == 0); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} + +void InfoTests::testGetSlotInfoAlt() +{ + CK_RV rv; + CK_SLOT_INFO slotInfo; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + +#ifndef _WIN32 + setenv("SOFTHSM2_CONF", "./softhsm2-alt.conf", 1); +#else + setenv("SOFTHSM2_CONF", ".\\softhsm2-alt.conf", 1); +#endif + + CK_UTF8CHAR label[32]; + memset(label, ' ', 32); + memcpy(label, "token1", strlen("token1")); + + // (Re)initialize the token + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + rv = CRYPTOKI_F_PTR( C_InitToken(m_initializedTokenSlotID, m_soPin1, m_soPin1Length, label) ); + CPPUNIT_ASSERT(rv == CKR_OK); + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_invalidSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); + + rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); + CPPUNIT_ASSERT(rv == CKR_OK); + CPPUNIT_ASSERT((slotInfo.flags & CKF_TOKEN_PRESENT ) == CKF_TOKEN_PRESENT); + CPPUNIT_ASSERT((slotInfo.flags & CKF_REMOVABLE_DEVICE ) == CKF_REMOVABLE_DEVICE); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +#ifndef _WIN32 + setenv("SOFTHSM2_CONF", "./softhsm2.conf", 1); +#else + setenv("SOFTHSM2_CONF", ".\\softhsm2.conf", 1); +#endif +} + + +void InfoTests::testGetTokenInfo() +{ + CK_RV rv; + CK_TOKEN_INFO tokenInfo; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, &tokenInfo) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_invalidSlotID, &tokenInfo) ); + CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); + + rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, &tokenInfo) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + CPPUNIT_ASSERT((tokenInfo.flags & CKF_TOKEN_INITIALIZED) == 0); + + rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_initializedTokenSlotID, &tokenInfo) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + CPPUNIT_ASSERT((tokenInfo.flags & CKF_TOKEN_INITIALIZED) == CKF_TOKEN_INITIALIZED); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} + +void InfoTests::testGetMechanismList() +{ + CK_RV rv; + CK_ULONG ulMechCount = 0; + CK_MECHANISM_TYPE_PTR pMechanismList; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_invalidSlotID, NULL_PTR, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); + + // Get the size of the buffer + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + pMechanismList = (CK_MECHANISM_TYPE_PTR)malloc(ulMechCount * sizeof(CK_MECHANISM_TYPE_PTR)); + + // Check if we have a too small buffer + ulMechCount = 0; + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); + + // Get the mechanism list + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + free(pMechanismList); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} + +void InfoTests::testGetMechanismInfo() +{ + CK_RV rv; + CK_MECHANISM_INFO info; + CK_ULONG ulMechCount = 0; + CK_MECHANISM_TYPE_PTR pMechanismList; + + // Just make sure that we finalize any previous failed tests + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); + + rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, CKM_RSA_PKCS, &info) ); + CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); + + rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + // Get the mechanism list + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + CPPUNIT_ASSERT(ulMechCount != 0); + pMechanismList = (CK_MECHANISM_TYPE_PTR)malloc(ulMechCount * sizeof(CK_MECHANISM_TYPE_PTR)); + rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); + CPPUNIT_ASSERT(rv == CKR_OK); + + rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, pMechanismList[0], NULL_PTR) ); + CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); + + rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_invalidSlotID, pMechanismList[0], &info) ); + CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); + + rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, CKM_VENDOR_DEFINED, &info) ); + CPPUNIT_ASSERT(rv == CKR_MECHANISM_INVALID); + + for (unsigned int i = 0; i < ulMechCount; i++) + { + rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, pMechanismList[i], &info) ); + CPPUNIT_ASSERT(rv == CKR_OK); + } + + free(pMechanismList); + + CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); +} |