remove FirmwarePkgData (FPD) tests that OpenSSL does not support

pull/166/head
Chris Conlon 2019-08-26 14:34:42 -06:00
parent 9ba23720cf
commit 0ae950fc91
1 changed files with 0 additions and 102 deletions

View File

@ -169,108 +169,6 @@ if [ -f 'signedFirmwarePkgData_noattrs.der' ]; then
fi
fi
if [ -f 'signedEncryptedFPD_attrs.der' ]; then
# 1. verify signedData to extract inner EncryptedData
OUTPUT=$(openssl cms -verify -in signedEncryptedFPD_attrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner EncryptedData
OUTPUT=$(openssl cms -EncryptedData_decrypt -in scripts/innertmp.der -inform der -secretkey $AES256_KEY)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedEncryptedFPD_attrs.der:\t\t\tPASSED!'
else
echo -e '\tsignedEncryptedFPD_attrs.der:\t\t\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedEncryptedFPD_noattrs.der' ]; then
# 1. verify signedData to extract inner EncryptedData
OUTPUT=$(openssl cms -verify -in signedEncryptedFPD_noattrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner EncryptedData
OUTPUT=$(openssl cms -EncryptedData_decrypt -in scripts/innertmp.der -inform der -secretkey $AES256_KEY)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedEncryptedFPD_noattrs.der:\t\t\tPASSED!'
else
echo -e '\tsignedEncryptedFPD_noattrs.der:\t\t\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedCompressedFPD_attrs.der' ]; then
# 1. verify signedData to extract inner EncryptedData
OUTPUT=$(openssl cms -verify -in signedCompressedFPD_attrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner CompressedData
OUTPUT=$(openssl cms -uncompress -in scripts/innertmp.der -inform der)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedCompressedFPD_attrs.der:\t\t\tPASSED!'
else
echo -e '\tsignedCompressedFPD_attrs.der:\t\t\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedCompressedFPD_noattrs.der' ]; then
# 1. verify signedData to extract inner EncryptedData
OUTPUT=$(openssl cms -verify -in signedCompressedFPD_noattrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner CompressedData
OUTPUT=$(openssl cms -uncompress -in scripts/innertmp.der -inform der)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedCompressedFPD_noattrs.der:\t\tPASSED!'
else
echo -e '\tsignedCompressedFPD_noattrs.der:\t\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedEncryptedCompressedFPD_attrs.der' ]; then
# 1. verify signedData to extract inner CompressedData
OUTPUT=$(openssl cms -verify -in signedEncryptedCompressedFPD_attrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner EncryptedData
OUTPUT=$(openssl cms -EncryptedData_decrypt -in scripts/innertmp.der -inform der -out scripts/innertmp.der -outform der -secretkey $AES256_KEY)
# 3. decode inner CompressedData
OUTPUT=$(openssl cms -uncompress -in scripts/innertmp.der -inform der)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedEncryptedCompressedFPD_attrs.der:\t\tPASSED!'
else
echo -e '\tsignedEncryptedCompressedFPD_attrs.der:\t\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedEncryptedCompressedFPD_noattrs.der' ]; then
# 1. verify signedData to extract inner CompressedData
OUTPUT=$(openssl cms -verify -in signedEncryptedCompressedFPD_noattrs.der -inform der -CAfile $RSA_RECIP_CERT -out scripts/innertmp.der -outform der 2>/dev/null)
# 2. decrypt inner EncryptedData
OUTPUT=$(openssl cms -EncryptedData_decrypt -in scripts/innertmp.der -inform der -out scripts/innertmp.der -outform der -secretkey $AES256_KEY)
# 3. decode inner CompressedData
OUTPUT=$(openssl cms -uncompress -in scripts/innertmp.der -inform der)
rm -f scripts/innertmp.der
if [ "$OUTPUT" == "$EXPECTED_INNER_CONTENT" ]; then
echo -e '\tsignedEncryptedCompressedFPD_noattrs.der:\tPASSED!'
else
echo -e '\tsignedEncryptedCompressedFPD_noattrs.der:\tFAILED!'
echo -e "\t... output = $OUTPUT, expected '$EXPECTED_INNER_CONTENT'"
fi
fi
if [ -f 'signedData_detached_attrs.der' ]; then
OUTPUT=$(openssl cms -verify -in signedData_detached_attrs.der -inform der -CAfile $RSA_RECIP_CERT -content $INNER_CONTENT_FILE 2>/dev/null)