summaryrefslogtreecommitdiff
path: root/tests/testpkcs11.sh
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2019-03-13 15:14:37 +0100
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2019-03-15 10:10:27 +0100
commite4c83eea960a43a38814ffd19cc5aae8ff1d206d (patch)
tree3e1bc97d9de3505a6138d368b928a8284c5de06a /tests/testpkcs11.sh
parent9dca575622586e4c94ced9e453ae0a91f346d711 (diff)
downloadgnutls-e4c83eea960a43a38814ffd19cc5aae8ff1d206d.tar.gz
pkcs11: security officer login implies writable sessiontmp-fix-pkcs11-so
According to the PKCS#11 v2.30, 6.7.1 there are no read-only Security Officer sessions. Resolves: #721 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/testpkcs11.sh')
-rwxr-xr-xtests/testpkcs11.sh20
1 files changed, 20 insertions, 0 deletions
diff --git a/tests/testpkcs11.sh b/tests/testpkcs11.sh
index 49acc0ff9f..e98fb8ed4a 100755
--- a/tests/testpkcs11.sh
+++ b/tests/testpkcs11.sh
@@ -341,6 +341,24 @@ export_pubkey_of_privkey () {
}
# $1: token
+# $2: SO PIN
+# $3: bits
+list_pubkey_as_so () {
+ export GNUTLS_SO_PIN="$2"
+ token="$1"
+ bits="$3"
+
+ echo -n "* Exporting public key as SO... "
+ ${P11TOOL} ${ADDITIONAL_PARAM} --so-login --list-all "${token}" >>"${LOGFILE}" 2>&1
+ if test $? != 0; then
+ echo failed
+ exit 1
+ fi
+
+ echo ok
+}
+
+# $1: token
# $2: PIN
change_id_of_privkey () {
export GNUTLS_PIN="$2"
@@ -599,6 +617,7 @@ write_certificate_test () {
exit_error
fi
+ echo ok
rm -f ${TMPFILE}
echo -n "* Trying to obtain back the cert... "
@@ -1091,6 +1110,7 @@ generate_rsa_privkey "${TOKEN}" "${GNUTLS_PIN}" 1024
change_id_of_privkey "${TOKEN}" "${GNUTLS_PIN}"
export_pubkey_of_privkey "${TOKEN}" "${GNUTLS_PIN}"
change_label_of_privkey "${TOKEN}" "${GNUTLS_PIN}"
+list_pubkey_as_so "${TOKEN}" "${GNUTLS_SO_PIN}"
write_certificate_test "${TOKEN}" "${GNUTLS_PIN}" "${srcdir}/testpkcs11-certs/ca.key" "${srcdir}/testpkcs11-certs/ca.crt" tmp-client.pub
write_serv_privkey "${TOKEN}" "${GNUTLS_PIN}" "${srcdir}/testpkcs11-certs/server.key"