@@ -2965,160 +2965,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
2965
2965
Ok ( ( ) )
2966
2966
}
2967
2967
2968
- // #[test]
2969
- // #[serial]
2970
- // fn kbkdf_invalid_data_params() -> TestResult {
2971
- // /* SoftHSM does not support NIST SP800-108 KDF yet */
2972
- // if is_softhsm() {
2973
- // return Ok(());
2974
- // }
2975
-
2976
- // let (pkcs11, slot) = init_pins();
2977
-
2978
- // // Open a session and log in
2979
- // let session = pkcs11.open_rw_session(slot)?;
2980
- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2981
-
2982
- // // Generate base key
2983
- // let base_template = vec![
2984
- // Attribute::Token(true),
2985
- // Attribute::Private(false),
2986
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2987
- // Attribute::Derive(true),
2988
- // ];
2989
- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2990
-
2991
- // // The template of the key to derive
2992
- // let derived_key_template = vec![
2993
- // Attribute::Token(false),
2994
- // Attribute::Private(false),
2995
- // Attribute::Class(ObjectClass::SECRET_KEY),
2996
- // Attribute::KeyType(KeyType::AES),
2997
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2998
- // Attribute::Encrypt(true),
2999
- // Attribute::Decrypt(true),
3000
- // ];
3001
-
3002
- // // Instantiate KBKDF in counter mode without additional keys
3003
- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3004
- // let dkm_length_format =
3005
- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3006
- // let data_params = vec![
3007
- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3008
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3009
- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3010
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3011
- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3012
- // ];
3013
- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3014
-
3015
- // // Derive key
3016
- // let derived_key = session.derive_key(
3017
- // &Mechanism::KbkdfCounter(params),
3018
- // base_key,
3019
- // &derived_key_template,
3020
- // )?;
3021
-
3022
- // let wanted_attributes = vec![
3023
- // AttributeType::Class,
3024
- // AttributeType::KeyType,
3025
- // AttributeType::Encrypt,
3026
- // AttributeType::Decrypt,
3027
- // AttributeType::Sign,
3028
- // AttributeType::Verify,
3029
- // AttributeType::Derive,
3030
- // AttributeType::ValueLen,
3031
- // ];
3032
-
3033
- // // TODO: remove this!
3034
- // println!(
3035
- // "Main derived key: {:#?}",
3036
- // session.get_attributes(derived_key, &wanted_attributes)?
3037
- // );
3038
-
3039
- // session.destroy_object(derived_key)?;
3040
- // session.destroy_object(base_key)?;
3041
-
3042
- // Ok(())
3043
- // }
3044
-
3045
- // #[test]
3046
- // #[serial]
3047
- // fn kbkdf_missing_data_params() -> TestResult {
3048
- // /* SoftHSM does not support NIST SP800-108 KDF yet */
3049
- // if is_softhsm() {
3050
- // return Ok(());
3051
- // }
3052
-
3053
- // let (pkcs11, slot) = init_pins();
3054
-
3055
- // // Open a session and log in
3056
- // let session = pkcs11.open_rw_session(slot)?;
3057
- // session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
3058
-
3059
- // // Generate base key
3060
- // let base_template = vec![
3061
- // Attribute::Token(true),
3062
- // Attribute::Private(false),
3063
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3064
- // Attribute::Derive(true),
3065
- // ];
3066
- // let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
3067
-
3068
- // // The template of the key to derive
3069
- // let derived_key_template = vec![
3070
- // Attribute::Token(false),
3071
- // Attribute::Private(false),
3072
- // Attribute::Class(ObjectClass::SECRET_KEY),
3073
- // Attribute::KeyType(KeyType::AES),
3074
- // Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3075
- // Attribute::Encrypt(true),
3076
- // Attribute::Decrypt(true),
3077
- // ];
3078
-
3079
- // // Instantiate KBKDF in counter mode without additional keys
3080
- // let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3081
- // let dkm_length_format =
3082
- // KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3083
- // let data_params = vec![
3084
- // PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3085
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3086
- // PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3087
- // PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3088
- // PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3089
- // ];
3090
- // let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3091
-
3092
- // // Derive key
3093
- // let derived_key = session.derive_key(
3094
- // &Mechanism::KbkdfCounter(params),
3095
- // base_key,
3096
- // &derived_key_template,
3097
- // )?;
3098
-
3099
- // let wanted_attributes = vec![
3100
- // AttributeType::Class,
3101
- // AttributeType::KeyType,
3102
- // AttributeType::Encrypt,
3103
- // AttributeType::Decrypt,
3104
- // AttributeType::Sign,
3105
- // AttributeType::Verify,
3106
- // AttributeType::Derive,
3107
- // AttributeType::ValueLen,
3108
- // ];
3109
-
3110
- // // TODO: remove this!
3111
- // println!(
3112
- // "Main derived key: {:#?}",
3113
- // session.get_attributes(derived_key, &wanted_attributes)?
3114
- // );
3115
-
3116
- // session.destroy_object(derived_key)?;
3117
- // session.destroy_object(base_key)?;
3118
-
3119
- // Ok(())
3120
- // }
3121
-
3122
2968
#[ test]
3123
2969
#[ serial]
3124
2970
fn sign_verify_sha1_hmac ( ) -> TestResult {
0 commit comments