Skip to content

Commit b2bc6ed

Browse files
Removed unused tests I forgot about
Signed-off-by: Jacob Prud'homme <[email protected]>
1 parent 9c3b9bb commit b2bc6ed

File tree

1 file changed

+0
-154
lines changed

1 file changed

+0
-154
lines changed

cryptoki/tests/basic.rs

-154
Original file line numberDiff line numberDiff line change
@@ -2846,160 +2846,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
28462846
Ok(())
28472847
}
28482848

2849-
// #[test]
2850-
// #[serial]
2851-
// fn kbkdf_invalid_data_params() -> TestResult {
2852-
// /* SoftHSM does not support NIST SP800-108 KDF yet */
2853-
// if is_softhsm() {
2854-
// return Ok(());
2855-
// }
2856-
2857-
// let (pkcs11, slot) = init_pins();
2858-
2859-
// // Open a session and log in
2860-
// let session = pkcs11.open_rw_session(slot)?;
2861-
// session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2862-
2863-
// // Generate base key
2864-
// let base_template = vec![
2865-
// Attribute::Token(true),
2866-
// Attribute::Private(false),
2867-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2868-
// Attribute::Derive(true),
2869-
// ];
2870-
// let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2871-
2872-
// // The template of the key to derive
2873-
// let derived_key_template = vec![
2874-
// Attribute::Token(false),
2875-
// Attribute::Private(false),
2876-
// Attribute::Class(ObjectClass::SECRET_KEY),
2877-
// Attribute::KeyType(KeyType::AES),
2878-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2879-
// Attribute::Encrypt(true),
2880-
// Attribute::Decrypt(true),
2881-
// ];
2882-
2883-
// // Instantiate KBKDF in counter mode without additional keys
2884-
// let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2885-
// let dkm_length_format =
2886-
// KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2887-
// let data_params = vec![
2888-
// PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2889-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2890-
// PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2891-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2892-
// PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2893-
// ];
2894-
// let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2895-
2896-
// // Derive key
2897-
// let derived_key = session.derive_key(
2898-
// &Mechanism::KbkdfCounter(params),
2899-
// base_key,
2900-
// &derived_key_template,
2901-
// )?;
2902-
2903-
// let wanted_attributes = vec![
2904-
// AttributeType::Class,
2905-
// AttributeType::KeyType,
2906-
// AttributeType::Encrypt,
2907-
// AttributeType::Decrypt,
2908-
// AttributeType::Sign,
2909-
// AttributeType::Verify,
2910-
// AttributeType::Derive,
2911-
// AttributeType::ValueLen,
2912-
// ];
2913-
2914-
// // TODO: remove this!
2915-
// println!(
2916-
// "Main derived key: {:#?}",
2917-
// session.get_attributes(derived_key, &wanted_attributes)?
2918-
// );
2919-
2920-
// session.destroy_object(derived_key)?;
2921-
// session.destroy_object(base_key)?;
2922-
2923-
// Ok(())
2924-
// }
2925-
2926-
// #[test]
2927-
// #[serial]
2928-
// fn kbkdf_missing_data_params() -> TestResult {
2929-
// /* SoftHSM does not support NIST SP800-108 KDF yet */
2930-
// if is_softhsm() {
2931-
// return Ok(());
2932-
// }
2933-
2934-
// let (pkcs11, slot) = init_pins();
2935-
2936-
// // Open a session and log in
2937-
// let session = pkcs11.open_rw_session(slot)?;
2938-
// session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2939-
2940-
// // Generate base key
2941-
// let base_template = vec![
2942-
// Attribute::Token(true),
2943-
// Attribute::Private(false),
2944-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2945-
// Attribute::Derive(true),
2946-
// ];
2947-
// let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2948-
2949-
// // The template of the key to derive
2950-
// let derived_key_template = vec![
2951-
// Attribute::Token(false),
2952-
// Attribute::Private(false),
2953-
// Attribute::Class(ObjectClass::SECRET_KEY),
2954-
// Attribute::KeyType(KeyType::AES),
2955-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2956-
// Attribute::Encrypt(true),
2957-
// Attribute::Decrypt(true),
2958-
// ];
2959-
2960-
// // Instantiate KBKDF in counter mode without additional keys
2961-
// let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2962-
// let dkm_length_format =
2963-
// KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2964-
// let data_params = vec![
2965-
// PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2966-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2967-
// PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2968-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2969-
// PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2970-
// ];
2971-
// let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2972-
2973-
// // Derive key
2974-
// let derived_key = session.derive_key(
2975-
// &Mechanism::KbkdfCounter(params),
2976-
// base_key,
2977-
// &derived_key_template,
2978-
// )?;
2979-
2980-
// let wanted_attributes = vec![
2981-
// AttributeType::Class,
2982-
// AttributeType::KeyType,
2983-
// AttributeType::Encrypt,
2984-
// AttributeType::Decrypt,
2985-
// AttributeType::Sign,
2986-
// AttributeType::Verify,
2987-
// AttributeType::Derive,
2988-
// AttributeType::ValueLen,
2989-
// ];
2990-
2991-
// // TODO: remove this!
2992-
// println!(
2993-
// "Main derived key: {:#?}",
2994-
// session.get_attributes(derived_key, &wanted_attributes)?
2995-
// );
2996-
2997-
// session.destroy_object(derived_key)?;
2998-
// session.destroy_object(base_key)?;
2999-
3000-
// Ok(())
3001-
// }
3002-
30032849
#[test]
30042850
#[serial]
30052851
fn sign_verify_sha1_hmac() -> TestResult {

0 commit comments

Comments
 (0)