Blob Blame History Raw
#!/bin/sh

# Copyright (C) 2013 Nikos Mavrogiannopoulos
# Copyright (C) 2015 Red Hat, Inc.
#
# This is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation; either version 3 of the License, or (at
# your option) any later version.
#
# GnuTLS is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with GnuTLS; if not, write to the Free Software Foundation,
# Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.

outdir="output.$$"

# Load common test functions
. ${srcdir}/rsa-common.sh

sed -e "s|@MODULE_PATH@|${MODULE}|g" -e \
	"s|@ENGINE_PATH@|../src/.libs/pkcs11.so|g" \
	<"${srcdir}/engines.cnf.in" >"${outdir}/engines.cnf"

# Set the used PIN and PUK
PIN=1234
PUK=1234

# Initialize SoftHSM DB
init_db

# Create 2 different tokens
init_card $PIN $PUK "token1"
init_card $PIN $PUK "token2"

# Force the use of the local built engine
export OPENSSL_ENGINES="../src/.libs/"

# Generate a key pair in the second token
pkcs11-tool --module ${MODULE} -l --pin $PIN --keypairgen --key-type \
	rsa:1024 --id 01020304 --label pkey --token-label token2
if test $? != 0;then
	exit 1;
fi

# Run the test program which will stop and wait for a signal (SIGUSR1)
./fork-change-slot \
	"pkcs11:token=token2;object=pkey;type=private;pin-value=$PIN" \
	"${outdir}/engines.cnf" ${MODULE} &
pid=$!

# Wait the test program to reach the sigwait
sleep 3

# Remove the first token to change the slotID associated with token2
${SOFTHSM_TOOL} --delete-token --token token1

# Send the signal to the waiting process
kill -USR1 `pgrep -P $pid`

# Test the result
wait $pid
if test $? != 0;then
	exit 1;
fi

# Cleanup
rm -rf "$outdir"

exit 0