swtpm/tests/Makefile.am
Stefan Berger f956bce305 tests: Add test case for loading of an NVRAM completely full with keys
Add a test case that fills up the NVRAM area with as many persisted keys
as possible and then fills up the rest with an NVRAM index so that all
space is occupied. We have to be able to load this state again into the
NVRAM once the OBJECT's size increases due to RSA keys size increase,
which must have us increase the total size of NVRAM in libtpm's TPM profile.

The state in tests/data/tpm2state5/tpm2-00.permall was created using
libtpms 0.6.0, where only 2048 bit keys were supported and total NVRAM size
was 128kb. This state file should never be changed and always be loadable
into a current libtpms. In its USER NVRAM it holds 64 persisted 2048 bit
keys and an NVRAM index with 236 bytes. For this to stay the reference
NVRAM, we need to make sure that it fits exactly to the byte.

Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
2020-04-24 15:03:03 -04:00

206 lines
4.7 KiB
Makefile

#
# tests/Makefile.am
#
# For the license, see the LICENSE file in the root directory.
#
check_PROGRAMS =
TESTS_ENVIRONMENT = \
abs_top_testdir=`cd '$(top_srcdir)'/tests; pwd` \
abs_top_builddir=`cd '$(top_builddir)'; pwd` \
abs_top_srcdir=`cd '$(top_srcdir)'; pwd`
TESTS = \
test_vtpm_proxy \
test_tpm2_vtpm_proxy
if WITH_CHARDEV
TESTS += \
test_ctrlchannel2 \
test_ctrlchannel4 \
test_tpm2_ctrlchannel2
endif
TESTS += \
test_ctrlchannel \
test_ctrlchannel3 \
test_encrypted_state \
test_getcap \
test_hashing \
test_hashing2 \
test_init \
test_locality \
test_migration_key \
test_resume_volatile \
test_save_load_encrypted_state \
test_save_load_state \
test_setbuffersize \
test_volatilestate \
test_swtpm_bios \
test_tpm_probe \
test_tpm12 \
test_wrongorder \
\
test_print_capabilities
TESTS += \
test_tpm2_derived_keys \
test_tpm2_encrypted_state \
test_tpm2_init \
test_tpm2_getcap \
test_tpm2_locality \
test_tpm2_hashing \
test_tpm2_hashing2 \
test_tpm2_hashing3 \
test_tpm2_migration_key \
test_tpm2_print_capabilities \
test_tpm2_resume_volatile \
test_tpm2_savestate \
test_tpm2_save_load_encrypted_state \
test_tpm2_save_load_state_2 \
test_tpm2_save_load_state_3 \
test_tpm2_save_load_state_da_timeout \
test_tpm2_setbuffersize \
test_tpm2_volatilestate \
test_tpm2_wrongorder \
test_tpm2_probe \
\
test_tpm2_swtpm_bios \
\
test_tpm2_ibmtss2
if HAVE_TCSD
TESTS += \
test_commandline \
test_parameters
endif
if WITH_GNUTLS
TESTS += \
test_swtpm_cert \
test_tpm2_parameters \
test_tpm2_samples_create_tpmca \
test_tpm2_samples_swtpm_localca \
test_tpm2_samples_swtpm_localca_pkcs11 \
test_tpm2_swtpm_cert \
test_tpm2_swtpm_cert_ecc \
test_tpm2_swtpm_setup_create_cert
if HAVE_TCSD
TESTS += \
test_swtpm_setup_create_cert \
test_samples_create_tpmca
endif
endif
EXTRA_DIST=$(TESTS) \
swtpm_setup.conf \
common \
create_certs.sh \
data/ecpubek.pem \
data/ecprivek.pem \
data/issuercert.pem \
data/pubek.pem \
data/signkey.pem \
data/signkey-encrypted.pem \
data/keyfile.txt \
data/keyfile256bit.txt \
data/pwdfile.txt \
data/migkey1/tpm2-volatilestate.bin \
data/migkey1/volatilestate.bin \
data/tpmstate1/tpm-00.permall \
data/tpmstate1/tpm-00.volatilestate \
data/tpmstate1/README \
data/tpmstate2/tpm-00.permall \
data/tpmstate2/tpm-00.volatilestate \
data/tpmstate2/pwdfile.txt \
data/tpmstate2/README \
data/tpmstate2b/tpm-00.permall \
data/tpmstate2b/tpm-00.volatilestate \
data/tpmstate2b/pwdfile.txt \
data/tpm2state1/tpm2-00.permall \
data/tpm2state1/tpm2-00.volatilestate \
data/tpm2state2/tpm2-00.permall \
data/tpm2state2/tpm2-00.volatilestate \
data/tpm2state2b/pwdfile.txt \
data/tpm2state2b/tpm2-00.permall \
data/tpm2state2b/tpm2-00.volatilestate \
data/tpm2state2/pwdfile.txt \
data/tpm2state3/hkey.priv \
data/tpm2state3/hkey.pub \
data/tpm2state3/signature.bin \
data/tpm2state3/tpm2-00.permall \
data/tpm2state3c/tpm2-00.volatilestate \
data/tpm2state3c/tpm2-00.permall \
data/tpm2state3d/tpm2-00.volatilestate \
data/tpm2state3d/signature2.bin \
data/tpm2state3d/tpm2-00.permall \
data/tpm2state3b/h81000000.bin \
data/tpm2state3b/h02000000.bin \
data/tpm2state3b/tpm2-00.volatilestate \
data/tpm2state3b/tpm2-00.permall \
data/tpm2state4/tpm2-00.volatilestate \
data/tpm2state4/tpm2-00.permall \
data/tpm2state5/signature.bin \
data/tpm2state5/tpm2-00.permall \
load_vtpm_proxy \
patches/libtpm.patch \
softhsm_setup \
test_clientfds.py \
test_common \
test_cuse \
test_setdatafd.py \
test_swtpm_cert \
_test_encrypted_state \
_test_getcap \
_test_hashing \
_test_hashing2 \
_test_init \
_test_locality \
_test_migration_key \
_test_migration_key_2 \
_test_print_capabilities \
_test_resume_volatile \
_test_save_load_encrypted_state \
_test_save_load_state \
_test_setbuffersize \
_test_swtpm_bios \
_test_tpm_probe \
_test_tpm2_derived_keys \
_test_tpm2_encrypted_state \
_test_tpm2_getcap \
_test_tpm2_hashing \
_test_tpm2_hashing2 \
_test_tpm2_hashing3 \
_test_tpm2_init \
_test_tpm2_locality \
_test_tpm2_migration_key \
_test_tpm2_print_capabilities \
_test_tpm2_probe \
_test_tpm2_resume_volatile \
_test_tpm2_savestate \
_test_tpm2_save_load_encrypted_state \
_test_tpm2_save_load_state_da_timeout \
_test_tpm2_setbuffersize \
_test_tpm2_swtpm_bios \
_test_tpm2_volatilestate \
_test_tpm2_wrongorder \
_test_volatilestate \
_test_wrongorder
check-display:
@if test -n "$$SWTPM_EXE"; then \
echo "*** Using SWTPM_EXE=$$SWTPM_EXE"; \
fi
@if test -n "$$SWTPM_BIOS"; then \
echo "*** Using SWTPM_BIOS=$$SWTPM_BIOS"; \
fi
@if test -n "$$SWTPM_IOCTL"; then \
echo "*** Using SWTPM_IOCTL=$$SWTPM_IOCTL"; \
fi
@if test -n "$$SWTPM_CERT"; then \
echo "*** Using SWTPM_CERT=$$SWTPM_CERT"; \
fi
check: check-am check-display