1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
|
#!/bin/bash
# Copyright (C) 2025 Tobias Deiminger
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
outdir="output.$$"
URL="pkcs11:token=libp11-0;id=%01%02%03%04;object=server-key-0"
# Load common test functions
. ${srcdir}/common.sh
# Generate test input files
printf ${PIN} > $outdir/pin.txt
printf "${PIN}\n" > $outdir/pin_with_trailing_newline.txt
# Do the token initialization
init_token "rsa" "1" "libp11" ${ID} "server-key" "privkey" "pubkey" "cert"
# Load openssl settings
. ${srcdir}/openssl-settings.sh
# Restore openssl settings
trap cleanup EXIT
# Run the test
for PIN_SOURCE_ATTR in \
"pin-source=$outdir/pin.txt" \
"pin-source=$outdir/pin_with_trailing_newline.txt" \
"pin-source=file:$outdir/pin.txt" \
"pin-source=file:$outdir/pin_with_trailing_newline.txt"
do
${WRAPPER} ./check-privkey "${URL};type=cert" "${URL};type=private;${PIN_SOURCE_ATTR}" \
${MODULE} "${outdir}/engines.cnf"
rc=$?
if [[ $rc -eq 77 ]]; then
echo "PIN source test skipped."
rm -rf "$outdir"
exit 77
elif [[ $rc -ne 0 ]]; then
echo "The private key loading couldn't get the public key from the certificate URL."
exit 1
fi
done
rm -rf "$outdir"
exit 0
|