Skip to content

Commit

Permalink
Test pin locking prevention
Browse files Browse the repository at this point in the history
Signed-off-by: Simo Sorce <simo@redhat.com>
  • Loading branch information
simo5 committed Oct 25, 2024
1 parent f740d8d commit edc6740
Show file tree
Hide file tree
Showing 2 changed files with 80 additions and 0 deletions.
1 change: 1 addition & 0 deletions tests/meson.build
Original file line number Diff line number Diff line change
Expand Up @@ -140,6 +140,7 @@ tests = {
'uri': {'suites': ['softokn', 'softhsm', 'kryoptic']},
'ecxc': {'suites': ['softhsm', 'kryoptic']},
'cms': {'suites': ['softokn', 'kryoptic']},
'pinlock': {'suites': ['kryoptic']},
}

test_wrapper = find_program('test-wrapper')
Expand Down
79 changes: 79 additions & 0 deletions tests/tpinlock
Original file line number Diff line number Diff line change
@@ -0,0 +1,79 @@
#!/bin/bash -e
# Copyright (C) 2022 Simo Sorce <simo@redhat.com>
# SPDX-License-Identifier: Apache-2.0

source "${TESTSSRCDIR}/helpers.sh"

title PARA "Test PIN lock prevention"

ORIG_OPENSSL_CONF=${OPENSSL_CONF}
sed "s/^pkcs11-module-token-pin.*$/##nopin/" "${OPENSSL_CONF}" > "${OPENSSL_CONF}.nopin"
OPENSSL_CONF=${OPENSSL_CONF}.nopin

BADPIN="bad"
BADPINURI=${PRIURI}?pin-value=${BADPIN}
GOODPINURI=${PRIURI}?pin-value=${PINVALUE}

FAIL=0
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "PIN initialized" && FAIL=1
if [ $FAIL -eq 0 ]; then
echo "Failed to detect PIN status"
exit 1
fi

# Kryoptic allows for 10 tries by default
for i in {1..10}; do
echo "Login attempt: $i"
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -l -T -p ${BADPIN} && false
DETECT=0
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "final user PIN try" && DETECT=1
if [ $DETECT -eq 1 ]; then
break
fi
done
FAIL=0
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "final user PIN try" && FAIL=1
if [ $FAIL -eq 0 ]; then
echo "Failed to reach "final try" status"
exit 1
fi

# Now we test one operation with a bad pin.
# It should fail but not lock the token
title LINE "Try op with bad pin and fail"
FAIL=0
ossl '
pkeyutl -sign -inkey "${BADPINURI}"
-in ${TMPPDIR}/sha256.bin
-out ${TMPPDIR}/pinlock-sig.bin' || FAIL=1
if [ $FAIL -eq 0 ]; then
echo "Operation should have failed, pin lock prevention not working"
exit 1
fi

# Now we test one operation with a good pin.
# It should fail because the token is on last try
title LINE "Try op with good pin and fail"
FAIL=0
ossl '
pkeyutl -sign -inkey "${GOODPINURI}"
-in ${TMPPDIR}/sha256.bin
-out ${TMPPDIR}/pinlock-sig.bin' || FAIL=1
if [ $FAIL -eq 0 ]; then
echo "Operation should have failed, pin lock prevention not working"
exit 1
fi


# Now reset the token counter with a good try
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -l -T -p ${PINVALUE}

# Now we test one operation with a good pin.
# It should succeed
title LINE "Try op with good pin and succeed"
ossl '
pkeyutl -sign -inkey "${GOODPINURI}"
-in ${TMPPDIR}/sha256.bin
-out ${TMPPDIR}/pinlock-sig.bin'

OPENSSL_CONF=${ORIG_OPENSSL_CONF}

0 comments on commit edc6740

Please sign in to comment.