@@ -2846,160 +2846,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
2846
2846
Ok ( ( ) )
2847
2847
}
2848
2848
2849
- // #[test]
2850
- // #[serial]
2851
- // fn kbkdf_invalid_data_params() -> TestResult {
2852
- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2853
- // if is_softhsm() {
2854
- // return Ok(());
2855
- // }
2856
-
2857
- // let (pkcs11, slot) = init_pins();
2858
-
2859
- // // Open a session and log in
2860
- // let session = pkcs11.open_rw_session(slot)?;
2861
- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2862
-
2863
- // // Generate base key
2864
- // let base_template = vec![
2865
- // Attribute::Token(true),
2866
- // Attribute::Private(false),
2867
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2868
- // Attribute::Derive(true),
2869
- // ];
2870
- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2871
-
2872
- // // The template of the key to derive
2873
- // let derived_key_template = vec![
2874
- // Attribute::Token(false),
2875
- // Attribute::Private(false),
2876
- // Attribute::Class(ObjectClass::SECRET_KEY),
2877
- // Attribute::KeyType(KeyType::AES),
2878
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2879
- // Attribute::Encrypt(true),
2880
- // Attribute::Decrypt(true),
2881
- // ];
2882
-
2883
- // // Instantiate KBKDF in counter mode without additional keys
2884
- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2885
- // let dkm_length_format =
2886
- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2887
- // let data_params = vec![
2888
- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2889
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2890
- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2891
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2892
- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2893
- // ];
2894
- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2895
-
2896
- // // Derive key
2897
- // let derived_key = session.derive_key(
2898
- // &Mechanism::KbkdfCounter(params),
2899
- // base_key,
2900
- // &derived_key_template,
2901
- // )?;
2902
-
2903
- // let wanted_attributes = vec![
2904
- // AttributeType::Class,
2905
- // AttributeType::KeyType,
2906
- // AttributeType::Encrypt,
2907
- // AttributeType::Decrypt,
2908
- // AttributeType::Sign,
2909
- // AttributeType::Verify,
2910
- // AttributeType::Derive,
2911
- // AttributeType::ValueLen,
2912
- // ];
2913
-
2914
- // // TODO: remove this!
2915
- // println!(
2916
- // "Main derived key: {:#?}",
2917
- // session.get_attributes(derived_key, &wanted_attributes)?
2918
- // );
2919
-
2920
- // session.destroy_object(derived_key)?;
2921
- // session.destroy_object(base_key)?;
2922
-
2923
- // Ok(())
2924
- // }
2925
-
2926
- // #[test]
2927
- // #[serial]
2928
- // fn kbkdf_missing_data_params() -> TestResult {
2929
- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2930
- // if is_softhsm() {
2931
- // return Ok(());
2932
- // }
2933
-
2934
- // let (pkcs11, slot) = init_pins();
2935
-
2936
- // // Open a session and log in
2937
- // let session = pkcs11.open_rw_session(slot)?;
2938
- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2939
-
2940
- // // Generate base key
2941
- // let base_template = vec![
2942
- // Attribute::Token(true),
2943
- // Attribute::Private(false),
2944
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2945
- // Attribute::Derive(true),
2946
- // ];
2947
- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2948
-
2949
- // // The template of the key to derive
2950
- // let derived_key_template = vec![
2951
- // Attribute::Token(false),
2952
- // Attribute::Private(false),
2953
- // Attribute::Class(ObjectClass::SECRET_KEY),
2954
- // Attribute::KeyType(KeyType::AES),
2955
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2956
- // Attribute::Encrypt(true),
2957
- // Attribute::Decrypt(true),
2958
- // ];
2959
-
2960
- // // Instantiate KBKDF in counter mode without additional keys
2961
- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
2962
- // let dkm_length_format =
2963
- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
2964
- // let data_params = vec![
2965
- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
2966
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
2967
- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
2968
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
2969
- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
2970
- // ];
2971
- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
2972
-
2973
- // // Derive key
2974
- // let derived_key = session.derive_key(
2975
- // &Mechanism::KbkdfCounter(params),
2976
- // base_key,
2977
- // &derived_key_template,
2978
- // )?;
2979
-
2980
- // let wanted_attributes = vec![
2981
- // AttributeType::Class,
2982
- // AttributeType::KeyType,
2983
- // AttributeType::Encrypt,
2984
- // AttributeType::Decrypt,
2985
- // AttributeType::Sign,
2986
- // AttributeType::Verify,
2987
- // AttributeType::Derive,
2988
- // AttributeType::ValueLen,
2989
- // ];
2990
-
2991
- // // TODO: remove this!
2992
- // println!(
2993
- // "Main derived key: {:#?}",
2994
- // session.get_attributes(derived_key, &wanted_attributes)?
2995
- // );
2996
-
2997
- // session.destroy_object(derived_key)?;
2998
- // session.destroy_object(base_key)?;
2999
-
3000
- // Ok(())
3001
- // }
3002
-
3003
2849
#[ test]
3004
2850
#[ serial]
3005
2851
fn sign_verify_sha1_hmac ( ) -> TestResult {
0 commit comments