Blame SOURCES/0032-testcase-Enhance-p11sak-testcase-to-generate-IBM-Kyb.patch

397a93
From 3247a4f1d1d8a9b8d7f3bc6c1dd85234dd184cbb Mon Sep 17 00:00:00 2001
397a93
From: Ingo Franzki <ifranzki@linux.ibm.com>
397a93
Date: Wed, 9 Nov 2022 09:45:21 +0100
397a93
Subject: [PATCH 32/34] testcase: Enhance p11sak testcase to generate IBM Kyber
397a93
 keys
397a93
397a93
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
397a93
---
397a93
 testcases/misc_tests/p11sak_test.sh | 44 +++++++++++++++++++++++++++++++++++++
397a93
 1 file changed, 44 insertions(+)
397a93
397a93
diff --git a/testcases/misc_tests/p11sak_test.sh b/testcases/misc_tests/p11sak_test.sh
397a93
index a0d3c644..b3374c6a 100755
397a93
--- a/testcases/misc_tests/p11sak_test.sh
397a93
+++ b/testcases/misc_tests/p11sak_test.sh
397a93
@@ -38,6 +38,9 @@ P11SAK_EC_POST=p11sak-ec-post.out
397a93
 P11SAK_IBM_DIL_PRE=p11sak-ibm-dil-pre.out
397a93
 P11SAK_IBM_DIL_LONG=p11sak-ibm-dil-long.out
397a93
 P11SAK_IBM_DIL_POST=p11sak-ibm-dil-post.out
397a93
+P11SAK_IBM_KYBER_PRE=p11sak-ibm-kyber-pre.out
397a93
+P11SAK_IBM_KYBER_LONG=p11sak-ibm-kyber-long.out
397a93
+P11SAK_IBM_KYBER_POST=p11sak-ibm-kyber-post.out
397a93
 P11SAK_ALL_PINOPT=p11sak-all-pinopt
397a93
 P11SAK_ALL_PINENV=p11sak-all-pinenv
397a93
 P11SAK_ALL_PINCON=p11sak-all-pincon
397a93
@@ -83,6 +86,12 @@ if [[ -n $( pkcsconf -m -c $SLOT | grep CKM_IBM_DILITHIUM) ]]; then
397a93
 else
397a93
 	echo "Skip generating ibm-dilithium keys, slot does not support CKM_IBM_DILITHIUM"
397a93
 fi
397a93
+# ibm-kyber
397a93
+if [[ -n $( pkcsconf -m -c $SLOT | grep CKM_IBM_KYBER) ]]; then
397a93
+	p11sak generate-key ibm-kyber r2_1024 --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ibm-kyber
397a93
+else
397a93
+	echo "Skip generating ibm-kyber keys, slot does not support CKM_IBM_KYBER"
397a93
+fi
397a93
 
397a93
 
397a93
 echo "** Now list keys and redirect output to pre-files - 'p11sak_test.sh'"
397a93
@@ -102,6 +111,7 @@ p11sak list-key aes --slot $SLOT --pin $PKCS11_USER_PIN --long &> $P11SAK_AES_LO
397a93
 p11sak list-key rsa --slot $SLOT --pin $PKCS11_USER_PIN --long &> $P11SAK_RSA_LONG
397a93
 p11sak list-key ec --slot $SLOT --pin $PKCS11_USER_PIN --long &> $P11SAK_EC_LONG
397a93
 p11sak list-key ibm-dilithium --slot $SLOT --pin $PKCS11_USER_PIN --long &> $P11SAK_IBM_DIL_LONG
397a93
+p11sak list-key ibm-kyber --slot $SLOT --pin $PKCS11_USER_PIN --long &> $P11SAK_IBM_KYBER_LONG
397a93
 
397a93
 p11sak list-key all --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_ALL_PINOPT
397a93
 RC_P11SAK_PINOPT=$?
397a93
@@ -143,6 +153,9 @@ p11sak remove-key ec --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ec-secp5
397a93
 # remove ibm dilithium keys
397a93
 p11sak remove-key ibm-dilithium --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ibm-dilithium:pub -f
397a93
 p11sak remove-key ibm-dilithium --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ibm-dilithium:prv -f
397a93
+# remove ibm kyber keys
397a93
+p11sak remove-key ibm-kyber --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ibm-kyber:pub -f
397a93
+p11sak remove-key ibm-kyber --slot $SLOT --pin $PKCS11_USER_PIN --label p11sak-ibm-kyber:prv -f
397a93
 
397a93
 
397a93
 echo "** Now list keys and rediirect to post-files - 'p11sak_test.sh'"
397a93
@@ -155,6 +168,7 @@ p11sak list-key aes --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_AES_POST
397a93
 p11sak list-key rsa --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_RSA_POST
397a93
 p11sak list-key ec --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_EC_POST
397a93
 p11sak list-key ibm-dilithium --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_IBM_DIL_POST
397a93
+p11sak list-key ibm-kyber --slot $SLOT --pin $PKCS11_USER_PIN &> $P11SAK_IBM_KYBER_POST
397a93
 
397a93
 
397a93
 echo "** Now checking output files to determine PASS/FAIL of tests - 'p11sak_test.sh'"
397a93
@@ -670,6 +684,33 @@ else
397a93
 	echo "* TESTCASE list-key ibm-dilithium SKIP Listed random ibm-dilithium public keys CK_BYTE attribute"
397a93
 fi
397a93
 
397a93
+if [[ -n $( pkcsconf -m -c $SLOT | grep CKM_IBM_KYBER) ]]; then
397a93
+	# CK_BBOOL
397a93
+	if [[ $(grep -A 35 'p11sak-ibm-kyber' $P11SAK_IBM_KYBER_LONG | grep -c 'CK_TRUE') == "12" ]]; then
397a93
+		echo "* TESTCASE list-key ibm-kyber PASS Listed random ibm-kyber public keys CK_BBOOL attribute"
397a93
+	else
397a93
+		echo "* TESTCASE list-key ibm-kyber FAIL Failed to list ibm-kyber public keys CK_BBOOL attribute"
397a93
+		status=1
397a93
+	fi
397a93
+	# CK_ULONG
397a93
+	if [[ $(grep -A 35 'p11sak-ibm-kyber' $P11SAK_IBM_KYBER_LONG | grep -c 'CKA_MODULUS_BITS:') == "0" ]]; then
397a93
+		echo "* TESTCASE list-key ibm-kyber PASS Listed random ibm-kyber public keys CK_ULONG attribute"
397a93
+	else
397a93
+		echo "* TESTCASE list-key ibm-kyber FAIL Failed to list ibm-kyber public keys CK_ULONG attribute"
397a93
+		status=1
397a93
+	fi
397a93
+	# CK_BYTE
397a93
+	if [[ $(grep -A 35 'p11sak-ibm-kyber' $P11SAK_IBM_KYBER_LONG | grep -c 'CKA_MODULUS:') == "0" ]]; then
397a93
+		echo "* TESTCASE list-key ibm-kyber PASS Listed random ibm-kyber public keys CK_BYTE attribute"
397a93
+	else
397a93
+		echo "* TESTCASE list-key ibm-kyber FAIL Failed to list ibm-kyber public keys CK_BYTE attribute"
397a93
+		status=1
397a93
+	fi
397a93
+else
397a93
+	echo "* TESTCASE list-key ibm-kyber SKIP Listed random ibm-kyber public keys CK_BBOOL attribute"
397a93
+	echo "* TESTCASE list-key ibm-kyber SKIP Listed random ibm-kyber public keys CK_ULONG attribute"
397a93
+	echo "* TESTCASE list-key ibm-kyber SKIP Listed random ibm-kyber public keys CK_BYTE attribute"
397a93
+fi
397a93
 
397a93
 # check token pin handling
397a93
 if [ $RC_P11SAK_PINOPT = 0 ]; then
397a93
@@ -724,6 +765,9 @@ rm -f $P11SAK_EC_POST
397a93
 rm -f $P11SAK_IBM_DIL_PRE
397a93
 rm -f $P11SAK_IBM_DIL_LONG
397a93
 rm -f $P11SAK_IBM_DIL_POST
397a93
+rm -f $P11SAK_IBM_KYBER_PRE
397a93
+rm -f $P11SAK_IBM_KYBER_LONG
397a93
+rm -f $P11SAK_IBM_KYBER_POST
397a93
 rm -f $P11SAK_ALL_PINOPT
397a93
 rm -f $P11SAK_ALL_PINENV
397a93
 rm -f $P11SAK_ALL_PINCON
397a93
-- 
397a93
2.16.2.windows.1
397a93