mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
6720f1343a
* configure.ac: Detect TPM emulator and enable tests. * tests/tpm2dtests/: New test suite. * tests/Makefile.am: Run tests. -- Add a set of tests that exercise tpm2daemon handling of keys and verify compatibility with non-tpm based keys. Running this test infrastructure requires a tpm emulator, which is tested for during configuration. If an emulator is not found, the tests won't be run since they require the presence of a TPM (although the TPM handling code will still be built). Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com> - Fixed tests/Makefile.am for make distcheck. Signed-off-by: Werner Koch <wk@gnupg.org>
37 lines
1.3 KiB
Scheme
37 lines
1.3 KiB
Scheme
#!/usr/bin/env gpgscm
|
|
|
|
;; Copyright (C) 2021 James.Bottomley@HansenPartnership.com
|
|
;;
|
|
;; SPDX-License-Identifier: GPL-3.0-or-later
|
|
;;
|
|
(load (in-srcdir "tests" "tpm2dtests" "defs.scm"))
|
|
|
|
(setup-environment)
|
|
|
|
;;
|
|
;; Check that a key with a long passphrase can be created and check
|
|
;; the passphrase can be truncated and still work
|
|
;;
|
|
(define name "ecc <ecc@example.com>")
|
|
(define name1 "ecc1 <ecc1@example.com>")
|
|
(define algo "nistp256")
|
|
|
|
(setenv "PINENTRY_USER_DATA" "this is a password longer than the TPM max of the name algorithm (i.e. 32)" #t)
|
|
(quick-gen name algo)
|
|
|
|
(setenv "PINENTRY_USER_DATA" "this is a password longer than the TPM max of the name" #t)
|
|
(check-sig name)
|
|
|
|
;; exactly the TPM limit (sha256 hash name algorithm: 32)
|
|
(setenv "PINENTRY_USER_DATA" "12345678901234567890123456789012" #t)
|
|
(quick-gen name1 algo)
|
|
|
|
(info "checking TPM signing failure with truncated passphrase")
|
|
;; passphrase one character shorter, should fail with bad passphrase
|
|
(setenv "PINENTRY_USER_DATA" "1234567890123456789012345678901" #t)
|
|
(let ((result (call-with-io `(,@GPG --default-key ,name1 --sign msg.txt) "")))
|
|
(if (= 0 (:retcode result))
|
|
(throw "Signing Key succeeded with wrong passphrase")
|
|
(unless (string-contains? (:stderr result) "Bad passphrase")
|
|
(throw "Unexpected signing error:" (:stderr result)))))
|