/* * FreeRTOS PKCS #11 V2.2.0 * Copyright (C) 2019 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Permission is hereby granted, free of charge, to any person obtaining a copy of * this software and associated documentation files (the "Software"), to deal in * the Software without restriction, including without limitation the rights to * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of * the Software, and to permit persons to whom the Software is furnished to do so, * subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * http://aws.amazon.com/freertos * http://www.FreeRTOS.org */ /*------------------------------------------------------------------------------ */ /* */ /* This code was auto-generated by a tool. */ /* */ /* Changes to this file may cause incorrect behavior and will be */ /* lost if the code is regenerated. */ /* */ /*----------------------------------------------------------------------------- */ #include "iot_test_pkcs11_globals.h" void C_Verify_normal_behavior() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_OK, rv ); } void C_Verify_exceptional_behavior_0() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_OPERATION_NOT_INITIALIZED, rv ); } void C_Verify_exceptional_behavior_1() { CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_SESSION_HANDLE_INVALID, rv ); } void C_Verify_exceptional_behavior_2() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = NULL_PTR; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = NULL_PTR; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_ARGUMENTS_BAD, rv ); } void C_Verify_exceptional_behavior_3() { CK_BYTE invalidSignature[ pkcs11ECDSA_P256_SIGNATURE_LENGTH ] = { 0x00 }; CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = invalidSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_SIGNATURE_INVALID, rv ); } void C_Verify_exceptional_behavior_4() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = 0; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_SIGNATURE_LEN_RANGE, rv ); } void C_Verify_exceptional_behavior_5() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = 0; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_DATA_LEN_RANGE, rv ); } void C_Verify_exceptional_behavior_6() { CK_SESSION_HANDLE hSession = xGlobalSession; CK_BYTE_PTR pData = ecdsaHashedMessage; CK_ULONG ulDataLen = pkcs11SHA256_DIGEST_LENGTH; CK_BYTE_PTR pSignature = ecdsaSignature; CK_ULONG ulSignatureLen = pkcs11ECDSA_P256_SIGNATURE_LENGTH; CK_RV rv = pxGlobalFunctionList->C_Verify( hSession, pData, ulDataLen, pSignature, ulSignatureLen ); TEST_ASSERT_EQUAL( CKR_CRYPTOKI_NOT_INITIALIZED, rv ); }