@@ -2965,160 +2965,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
29652965 Ok ( ( ) )
29662966}
29672967
2968- // #[test]
2969- // #[serial]
2970- // fn kbkdf_invalid_data_params() -> TestResult {
2971- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2972- // if is_softhsm() {
2973- // return Ok(());
2974- // }
2975-
2976- // let (pkcs11, slot) = init_pins();
2977-
2978- // // Open a session and log in
2979- // let session = pkcs11.open_rw_session(slot)?;
2980- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2981-
2982- // // Generate base key
2983- // let base_template = vec![
2984- // Attribute::Token(true),
2985- // Attribute::Private(false),
2986- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2987- // Attribute::Derive(true),
2988- // ];
2989- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2990-
2991- // // The template of the key to derive
2992- // let derived_key_template = vec![
2993- // Attribute::Token(false),
2994- // Attribute::Private(false),
2995- // Attribute::Class(ObjectClass::SECRET_KEY),
2996- // Attribute::KeyType(KeyType::AES),
2997- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2998- // Attribute::Encrypt(true),
2999- // Attribute::Decrypt(true),
3000- // ];
3001-
3002- // // Instantiate KBKDF in counter mode without additional keys
3003- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3004- // let dkm_length_format =
3005- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3006- // let data_params = vec![
3007- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3008- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3009- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3010- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3011- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3012- // ];
3013- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3014-
3015- // // Derive key
3016- // let derived_key = session.derive_key(
3017- // &Mechanism::KbkdfCounter(params),
3018- // base_key,
3019- // &derived_key_template,
3020- // )?;
3021-
3022- // let wanted_attributes = vec![
3023- // AttributeType::Class,
3024- // AttributeType::KeyType,
3025- // AttributeType::Encrypt,
3026- // AttributeType::Decrypt,
3027- // AttributeType::Sign,
3028- // AttributeType::Verify,
3029- // AttributeType::Derive,
3030- // AttributeType::ValueLen,
3031- // ];
3032-
3033- // // TODO: remove this!
3034- // println!(
3035- // "Main derived key: {:#?}",
3036- // session.get_attributes(derived_key, &wanted_attributes)?
3037- // );
3038-
3039- // session.destroy_object(derived_key)?;
3040- // session.destroy_object(base_key)?;
3041-
3042- // Ok(())
3043- // }
3044-
3045- // #[test]
3046- // #[serial]
3047- // fn kbkdf_missing_data_params() -> TestResult {
3048- // /* SoftHSM does not support NIST SP800-108 KDF yet */
3049- // if is_softhsm() {
3050- // return Ok(());
3051- // }
3052-
3053- // let (pkcs11, slot) = init_pins();
3054-
3055- // // Open a session and log in
3056- // let session = pkcs11.open_rw_session(slot)?;
3057- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
3058-
3059- // // Generate base key
3060- // let base_template = vec![
3061- // Attribute::Token(true),
3062- // Attribute::Private(false),
3063- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3064- // Attribute::Derive(true),
3065- // ];
3066- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
3067-
3068- // // The template of the key to derive
3069- // let derived_key_template = vec![
3070- // Attribute::Token(false),
3071- // Attribute::Private(false),
3072- // Attribute::Class(ObjectClass::SECRET_KEY),
3073- // Attribute::KeyType(KeyType::AES),
3074- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3075- // Attribute::Encrypt(true),
3076- // Attribute::Decrypt(true),
3077- // ];
3078-
3079- // // Instantiate KBKDF in counter mode without additional keys
3080- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3081- // let dkm_length_format =
3082- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3083- // let data_params = vec![
3084- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3085- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3086- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3087- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3088- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3089- // ];
3090- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3091-
3092- // // Derive key
3093- // let derived_key = session.derive_key(
3094- // &Mechanism::KbkdfCounter(params),
3095- // base_key,
3096- // &derived_key_template,
3097- // )?;
3098-
3099- // let wanted_attributes = vec![
3100- // AttributeType::Class,
3101- // AttributeType::KeyType,
3102- // AttributeType::Encrypt,
3103- // AttributeType::Decrypt,
3104- // AttributeType::Sign,
3105- // AttributeType::Verify,
3106- // AttributeType::Derive,
3107- // AttributeType::ValueLen,
3108- // ];
3109-
3110- // // TODO: remove this!
3111- // println!(
3112- // "Main derived key: {:#?}",
3113- // session.get_attributes(derived_key, &wanted_attributes)?
3114- // );
3115-
3116- // session.destroy_object(derived_key)?;
3117- // session.destroy_object(base_key)?;
3118-
3119- // Ok(())
3120- // }
3121-
31222968#[ test]
31232969#[ serial]
31242970fn sign_verify_sha1_hmac ( ) -> TestResult {
0 commit comments