forked from latchset/pkcs11-provider
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Simo Sorce <simo@redhat.com>
- Loading branch information
Showing
2 changed files
with
80 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,79 @@ | ||
#!/bin/bash -e | ||
# Copyright (C) 2022 Simo Sorce <simo@redhat.com> | ||
# SPDX-License-Identifier: Apache-2.0 | ||
|
||
source "${TESTSSRCDIR}/helpers.sh" | ||
|
||
title PARA "Test PIN lock prevention" | ||
|
||
ORIG_OPENSSL_CONF=${OPENSSL_CONF} | ||
sed "s/^pkcs11-module-token-pin.*$/##nopin/" "${OPENSSL_CONF}" > "${OPENSSL_CONF}.nopin" | ||
OPENSSL_CONF=${OPENSSL_CONF}.nopin | ||
|
||
BADPIN="bad" | ||
BADPINURI=${PRIURI}?pin-value=${BADPIN} | ||
GOODPINURI=${PRIURI}?pin-value=${PINVALUE} | ||
|
||
FAIL=0 | ||
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "PIN initialized" && FAIL=1 | ||
if [ $FAIL -eq 0 ]; then | ||
echo "Failed to detect PIN status" | ||
exit 1 | ||
fi | ||
|
||
# Kryoptic allows for 10 tries by default | ||
for i in {1..10}; do | ||
echo "Login attempt: $i" | ||
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -l -T -p ${BADPIN} && false | ||
DETECT=0 | ||
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "final user PIN try" && DETECT=1 | ||
if [ $DETECT -eq 1 ]; then | ||
break | ||
fi | ||
done | ||
FAIL=0 | ||
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -T | grep "final user PIN try" && FAIL=1 | ||
if [ $FAIL -eq 0 ]; then | ||
echo "Failed to reach "final try" status" | ||
exit 1 | ||
fi | ||
|
||
# Now we test one operation with a bad pin. | ||
# It should fail but not lock the token | ||
title LINE "Try op with bad pin and fail" | ||
FAIL=0 | ||
ossl ' | ||
pkeyutl -sign -inkey "${BADPINURI}" | ||
-in ${TMPPDIR}/sha256.bin | ||
-out ${TMPPDIR}/pinlock-sig.bin' || FAIL=1 | ||
if [ $FAIL -eq 0 ]; then | ||
echo "Operation should have failed, pin lock prevention not working" | ||
exit 1 | ||
fi | ||
|
||
# Now we test one operation with a good pin. | ||
# It should fail because the token is on last try | ||
title LINE "Try op with good pin and fail" | ||
FAIL=0 | ||
ossl ' | ||
pkeyutl -sign -inkey "${GOODPINURI}" | ||
-in ${TMPPDIR}/sha256.bin | ||
-out ${TMPPDIR}/pinlock-sig.bin' || FAIL=1 | ||
if [ $FAIL -eq 0 ]; then | ||
echo "Operation should have failed, pin lock prevention not working" | ||
exit 1 | ||
fi | ||
|
||
|
||
# Now reset the token counter with a good try | ||
pkcs11-tool --module ${PKCS11_PROVIDER_MODULE=} -l -T -p ${PINVALUE} | ||
|
||
# Now we test one operation with a good pin. | ||
# It should succeed | ||
title LINE "Try op with good pin and succeed" | ||
ossl ' | ||
pkeyutl -sign -inkey "${GOODPINURI}" | ||
-in ${TMPPDIR}/sha256.bin | ||
-out ${TMPPDIR}/pinlock-sig.bin' | ||
|
||
OPENSSL_CONF=${ORIG_OPENSSL_CONF} |