opensc-sys 0.1.1

FFI bindings to OpenSC
Documentation
/*
 * p11test_case_mechs.c: Check mechanisms supported by token
 *
 * Copyright (C) 2016, 2017 Red Hat, Inc.
 *
 * Author: Jakub Jelen <jjelen@redhat.com>
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include "p11test_case_mechs.h"

void supported_mechanisms_test(void **state) {
	token_info_t *info = (token_info_t *) *state;
	CK_FUNCTION_LIST_PTR function_pointer = info->function_pointer;

	CK_RV rv;
	CK_ULONG mechanism_count, i;
	CK_MECHANISM_TYPE_PTR mechanism_list;
	CK_MECHANISM_INFO_PTR mechanism_info;
	CK_FLAGS j;
	test_mech_t *mech = NULL;

	P11TEST_START(info);
	rv = function_pointer->C_GetMechanismList(info->slot_id, NULL_PTR,
		&mechanism_count);
	if ((rv == CKR_OK) && (mechanism_count > 0)) {
		mechanism_list = (CK_MECHANISM_TYPE_PTR)
			malloc(mechanism_count * sizeof(CK_MECHANISM_TYPE));
		rv = function_pointer->C_GetMechanismList(info->slot_id,
			mechanism_list, &mechanism_count);
		if (rv != CKR_OK) {
			free(mechanism_list);
			function_pointer->C_Finalize(NULL_PTR);
			P11TEST_FAIL(info, "Could not get mechanism list!");
		}

		mechanism_info = (CK_MECHANISM_INFO_PTR)
			malloc(mechanism_count * sizeof(CK_MECHANISM_INFO));
		if (mechanism_info == NULL)
			P11TEST_FAIL(info, "Couldn't malloc()");

		for (i = 0; i < mechanism_count; i++) {
			CK_MECHANISM_TYPE mechanism_type = mechanism_list[i];
			rv = function_pointer->C_GetMechanismInfo(info->slot_id,
				mechanism_type, &mechanism_info[i]);
			if (rv != CKR_OK)
				continue;

			/* store mechanisms list for later tests */

			/* List all known RSA mechanisms */
			if (mechanism_list[i] == CKM_RSA_X_509
					|| mechanism_list[i] == CKM_RSA_PKCS
					|| mechanism_list[i] == CKM_MD5_RSA_PKCS
					|| mechanism_list[i] == CKM_RIPEMD160_RSA_PKCS
					|| mechanism_list[i] == CKM_SHA1_RSA_PKCS
					|| mechanism_list[i] == CKM_SHA224_RSA_PKCS
					|| mechanism_list[i] == CKM_SHA256_RSA_PKCS
					|| mechanism_list[i] == CKM_SHA384_RSA_PKCS
					|| mechanism_list[i] == CKM_SHA512_RSA_PKCS
					|| mechanism_list[i] == CKM_RSA_PKCS_PSS
					|| mechanism_list[i] == CKM_SHA1_RSA_PKCS_PSS
					|| mechanism_list[i] == CKM_SHA256_RSA_PKCS_PSS
					|| mechanism_list[i] == CKM_SHA384_RSA_PKCS_PSS
					|| mechanism_list[i] == CKM_SHA512_RSA_PKCS_PSS
					|| mechanism_list[i] == CKM_RSA_PKCS_OAEP) {
				if (token.num_rsa_mechs < MAX_MECHS) {
					mech = &token.rsa_mechs[token.num_rsa_mechs++];
					mech->mech = mechanism_list[i];
					mech->usage_flags = mechanism_info[i].flags;
				} else
					P11TEST_FAIL(info, "Too many RSA mechanisms (%d)", MAX_MECHS);
			}

			/* We list all known EC mechanisms */
			if (mechanism_list[i] == CKM_ECDSA
					|| mechanism_list[i] == CKM_ECDSA_SHA1
					|| mechanism_list[i] == CKM_ECDSA_SHA256
					|| mechanism_list[i] == CKM_ECDSA_SHA384
					|| mechanism_list[i] == CKM_ECDSA_SHA512
					/* Including derive mechanisms */
					|| mechanism_list[i] == CKM_ECDH1_DERIVE
					|| mechanism_list[i] == CKM_ECDH1_COFACTOR_DERIVE
					|| mechanism_list[i] == CKM_ECMQV_DERIVE) {
				if (token.num_ec_mechs < MAX_MECHS) {
					mech = &token.ec_mechs[token.num_ec_mechs++];
					mech->mech = mechanism_list[i];
					mech->usage_flags = mechanism_info[i].flags;
				} else
					P11TEST_FAIL(info, "Too many EC mechanisms (%d)", MAX_MECHS);
			}

			if ((mechanism_info[i].flags & CKF_GENERATE_KEY_PAIR) != 0) {
				if (token.num_keygen_mechs < MAX_MECHS) {
					mech = &token.keygen_mechs[token.num_keygen_mechs++];
					mech->mech = mechanism_list[i];
					mech->usage_flags = mechanism_info[i].flags;
				} else
					P11TEST_FAIL(info, "Too many KEYGEN mechanisms (%d)", MAX_MECHS);
			}
		}

		printf("[      MECHANISM      ] [ KEY SIZE ] [  FLAGS   ]\n");
		printf("[        CKM_*        ] [ MIN][ MAX] [          ]\n");
		P11TEST_DATA_ROW(info, 4,
			's', "MECHANISM",
			's', "MIN KEY",
			's', "MAX KEY",
			's', "FLAGS");
		for (i = 0; i < mechanism_count; i++) {
			printf("[%-21s] [%4lu][%4lu] [%10s]",
				get_mechanism_name(mechanism_list[i]),
				mechanism_info[i].ulMinKeySize,
				mechanism_info[i].ulMaxKeySize,
				get_mechanism_flag_name(mechanism_info[i].flags));
			P11TEST_DATA_ROW(info, 4,
				's', get_mechanism_name(mechanism_list[i]),
				'd', mechanism_info[i].ulMinKeySize,
				'd', mechanism_info[i].ulMaxKeySize,
				's', get_mechanism_flag_name(mechanism_info[i].flags));
			for (j = 1; j <= CKF_EC_COMPRESS; j = j<<1)
				if ((mechanism_info[i].flags & j) != 0)
					printf(" %s", get_mechanism_flag_name(j));
			printf("\n");
		}
		free(mechanism_list);
		free(mechanism_info);
	}
	P11TEST_PASS(info);
}