@@ -2846,160 +2846,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
28462846 Ok ( ( ) )
28472847}
28482848
2849- // #[test]
2850- // #[serial]
2851- // fn kbkdf_invalid_data_params() -> TestResult {
2852- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2853- // if is_softhsm() {
2854- // return Ok(());
2855- // }
2856-
2857- // let (pkcs11, slot) = init_pins();
2858-
2859- // // Open a session and log in
2860- // let session = pkcs11.open_rw_session(slot)?;
2861- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2862-
2863- // // Generate base key
2864- // let base_template = vec![
2865- // Attribute::Token(true),
2866- // Attribute::Private(false),
2867- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2868- // Attribute::Derive(true),
2869- // ];
2870- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2871-
2872- // // The template of the key to derive
2873- // let derived_key_template = vec![
2874- // Attribute::Token(false),
2875- // Attribute::Private(false),
2876- // Attribute::Class(ObjectClass::SECRET_KEY),
2877- // Attribute::KeyType(KeyType::AES),
2878- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2879- // Attribute::Encrypt(true),
2880- // Attribute::Decrypt(true),
2881- // ];
2882-
2883- // // Instantiate KBKDF in counter mode without additional keys
2884- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2885- // let dkm_length_format =
2886- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2887- // let data_params = vec![
2888- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2889- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2890- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2891- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2892- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2893- // ];
2894- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2895-
2896- // // Derive key
2897- // let derived_key = session.derive_key(
2898- // &Mechanism::KbkdfCounter(params),
2899- // base_key,
2900- // &derived_key_template,
2901- // )?;
2902-
2903- // let wanted_attributes = vec![
2904- // AttributeType::Class,
2905- // AttributeType::KeyType,
2906- // AttributeType::Encrypt,
2907- // AttributeType::Decrypt,
2908- // AttributeType::Sign,
2909- // AttributeType::Verify,
2910- // AttributeType::Derive,
2911- // AttributeType::ValueLen,
2912- // ];
2913-
2914- // // TODO: remove this!
2915- // println!(
2916- // "Main derived key: {:#?}",
2917- // session.get_attributes(derived_key, &wanted_attributes)?
2918- // );
2919-
2920- // session.destroy_object(derived_key)?;
2921- // session.destroy_object(base_key)?;
2922-
2923- // Ok(())
2924- // }
2925-
2926- // #[test]
2927- // #[serial]
2928- // fn kbkdf_missing_data_params() -> TestResult {
2929- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2930- // if is_softhsm() {
2931- // return Ok(());
2932- // }
2933-
2934- // let (pkcs11, slot) = init_pins();
2935-
2936- // // Open a session and log in
2937- // let session = pkcs11.open_rw_session(slot)?;
2938- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2939-
2940- // // Generate base key
2941- // let base_template = vec![
2942- // Attribute::Token(true),
2943- // Attribute::Private(false),
2944- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2945- // Attribute::Derive(true),
2946- // ];
2947- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2948-
2949- // // The template of the key to derive
2950- // let derived_key_template = vec![
2951- // Attribute::Token(false),
2952- // Attribute::Private(false),
2953- // Attribute::Class(ObjectClass::SECRET_KEY),
2954- // Attribute::KeyType(KeyType::AES),
2955- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2956- // Attribute::Encrypt(true),
2957- // Attribute::Decrypt(true),
2958- // ];
2959-
2960- // // Instantiate KBKDF in counter mode without additional keys
2961- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2962- // let dkm_length_format =
2963- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2964- // let data_params = vec![
2965- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2966- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2967- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2968- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2969- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2970- // ];
2971- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2972-
2973- // // Derive key
2974- // let derived_key = session.derive_key(
2975- // &Mechanism::KbkdfCounter(params),
2976- // base_key,
2977- // &derived_key_template,
2978- // )?;
2979-
2980- // let wanted_attributes = vec![
2981- // AttributeType::Class,
2982- // AttributeType::KeyType,
2983- // AttributeType::Encrypt,
2984- // AttributeType::Decrypt,
2985- // AttributeType::Sign,
2986- // AttributeType::Verify,
2987- // AttributeType::Derive,
2988- // AttributeType::ValueLen,
2989- // ];
2990-
2991- // // TODO: remove this!
2992- // println!(
2993- // "Main derived key: {:#?}",
2994- // session.get_attributes(derived_key, &wanted_attributes)?
2995- // );
2996-
2997- // session.destroy_object(derived_key)?;
2998- // session.destroy_object(base_key)?;
2999-
3000- // Ok(())
3001- // }
3002-
30032849#[ test]
30042850#[ serial]
30052851fn sign_verify_sha1_hmac ( ) -> TestResult {
0 commit comments