| /* |
| * Copyright (c) 2010 .SE (The Internet Infrastructure Foundation) |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE |
| * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER |
| * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR |
| * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN |
| * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| /***************************************************************************** |
| InfoTests.cpp |
| |
| Contains test cases to C_GetInfo, C_GetFunctionList, C_GetSlotList, |
| C_GetSlotInfo, C_GetTokenInfo, C_GetMechanismList, and C_GetMechanismInfo |
| *****************************************************************************/ |
| |
| #include <config.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include "InfoTests.h" |
| |
| CPPUNIT_TEST_SUITE_REGISTRATION(InfoTests); |
| |
| void InfoTests::testGetInfo() |
| { |
| CK_RV rv; |
| CK_INFO ckInfo; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetInfo(&ckInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetInfo(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetInfo(&ckInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |
| |
| void InfoTests::testGetFunctionList() |
| { |
| CK_RV rv; |
| CK_FUNCTION_LIST_PTR ckFuncList; |
| |
| rv = CRYPTOKI_F_PTR( C_GetFunctionList(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetFunctionList(&ckFuncList) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| } |
| |
| void InfoTests::testGetSlotList() |
| { |
| CK_RV rv; |
| CK_ULONG ulSlotCount = 0; |
| CK_SLOT_ID_PTR pSlotList; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| // Get the size of the buffer |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, NULL_PTR, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| pSlotList = (CK_SLOT_ID_PTR)malloc(ulSlotCount * sizeof(CK_SLOT_ID)); |
| |
| // Check if we have a too small buffer |
| ulSlotCount = 0; |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, pSlotList, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); |
| |
| // Get the slot list |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_FALSE, pSlotList, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| free(pSlotList); |
| |
| // Get the number of slots with tokens |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, NULL_PTR, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| pSlotList = (CK_SLOT_ID_PTR)malloc(ulSlotCount * sizeof(CK_SLOT_ID)); |
| |
| // Check if we have a too small buffer |
| ulSlotCount = 0; |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, pSlotList, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); |
| |
| // Get the slot list |
| rv = CRYPTOKI_F_PTR( C_GetSlotList(CK_TRUE, pSlotList, &ulSlotCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| free(pSlotList); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |
| |
| void InfoTests::testGetSlotInfo() |
| { |
| CK_RV rv; |
| CK_SLOT_INFO slotInfo; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_invalidSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| CPPUNIT_ASSERT((slotInfo.flags & CKF_TOKEN_PRESENT ) == CKF_TOKEN_PRESENT); |
| CPPUNIT_ASSERT((slotInfo.flags & CKF_REMOVABLE_DEVICE ) == 0); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |
| |
| void InfoTests::testGetSlotInfoAlt() |
| { |
| CK_RV rv; |
| CK_SLOT_INFO slotInfo; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| #ifndef _WIN32 |
| setenv("SOFTHSM2_CONF", "./softhsm2-alt.conf", 1); |
| #else |
| setenv("SOFTHSM2_CONF", ".\\softhsm2-alt.conf", 1); |
| #endif |
| |
| CK_UTF8CHAR label[32]; |
| memset(label, ' ', 32); |
| memcpy(label, "token1", strlen("token1")); |
| |
| // (Re)initialize the token |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| rv = CRYPTOKI_F_PTR( C_InitToken(m_initializedTokenSlotID, m_soPin1, m_soPin1Length, label) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_invalidSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); |
| |
| rv = CRYPTOKI_F_PTR( C_GetSlotInfo(m_notInitializedTokenSlotID, &slotInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| CPPUNIT_ASSERT((slotInfo.flags & CKF_TOKEN_PRESENT ) == CKF_TOKEN_PRESENT); |
| CPPUNIT_ASSERT((slotInfo.flags & CKF_REMOVABLE_DEVICE ) == CKF_REMOVABLE_DEVICE); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| #ifndef _WIN32 |
| setenv("SOFTHSM2_CONF", "./softhsm2.conf", 1); |
| #else |
| setenv("SOFTHSM2_CONF", ".\\softhsm2.conf", 1); |
| #endif |
| } |
| |
| |
| void InfoTests::testGetTokenInfo() |
| { |
| CK_RV rv; |
| CK_TOKEN_INFO tokenInfo; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, &tokenInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_invalidSlotID, &tokenInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); |
| |
| rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_notInitializedTokenSlotID, &tokenInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| CPPUNIT_ASSERT((tokenInfo.flags & CKF_TOKEN_INITIALIZED) == 0); |
| |
| rv = CRYPTOKI_F_PTR( C_GetTokenInfo(m_initializedTokenSlotID, &tokenInfo) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| CPPUNIT_ASSERT((tokenInfo.flags & CKF_TOKEN_INITIALIZED) == CKF_TOKEN_INITIALIZED); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |
| |
| void InfoTests::testGetMechanismList() |
| { |
| CK_RV rv; |
| CK_ULONG ulMechCount = 0; |
| CK_MECHANISM_TYPE_PTR pMechanismList; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_invalidSlotID, NULL_PTR, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); |
| |
| // Get the size of the buffer |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| pMechanismList = (CK_MECHANISM_TYPE_PTR)malloc(ulMechCount * sizeof(CK_MECHANISM_TYPE_PTR)); |
| |
| // Check if we have a too small buffer |
| ulMechCount = 0; |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_BUFFER_TOO_SMALL); |
| |
| // Get the mechanism list |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| free(pMechanismList); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |
| |
| void InfoTests::testGetMechanismInfo() |
| { |
| CK_RV rv; |
| CK_MECHANISM_INFO info; |
| CK_ULONG ulMechCount = 0; |
| CK_MECHANISM_TYPE_PTR pMechanismList; |
| |
| // Just make sure that we finalize any previous failed tests |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, CKM_RSA_PKCS, &info) ); |
| CPPUNIT_ASSERT(rv == CKR_CRYPTOKI_NOT_INITIALIZED); |
| |
| rv = CRYPTOKI_F_PTR( C_Initialize(NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| // Get the mechanism list |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, NULL_PTR, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| CPPUNIT_ASSERT(ulMechCount != 0); |
| pMechanismList = (CK_MECHANISM_TYPE_PTR)malloc(ulMechCount * sizeof(CK_MECHANISM_TYPE_PTR)); |
| rv = CRYPTOKI_F_PTR( C_GetMechanismList(m_initializedTokenSlotID, pMechanismList, &ulMechCount) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, pMechanismList[0], NULL_PTR) ); |
| CPPUNIT_ASSERT(rv == CKR_ARGUMENTS_BAD); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_invalidSlotID, pMechanismList[0], &info) ); |
| CPPUNIT_ASSERT(rv == CKR_SLOT_ID_INVALID); |
| |
| rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, CKM_VENDOR_DEFINED, &info) ); |
| CPPUNIT_ASSERT(rv == CKR_MECHANISM_INVALID); |
| |
| for (unsigned int i = 0; i < ulMechCount; i++) |
| { |
| rv = CRYPTOKI_F_PTR( C_GetMechanismInfo(m_initializedTokenSlotID, pMechanismList[i], &info) ); |
| CPPUNIT_ASSERT(rv == CKR_OK); |
| } |
| |
| free(pMechanismList); |
| |
| CRYPTOKI_F_PTR( C_Finalize(NULL_PTR) ); |
| } |