Skip to content

Commit 4e6be13

Browse files
Removed unused tests I forgot about
Signed-off-by: Jacob Prud'homme <[email protected]>
1 parent 1d2fca8 commit 4e6be13

File tree

1 file changed

+0
-154
lines changed

1 file changed

+0
-154
lines changed

cryptoki/tests/basic.rs

-154
Original file line numberDiff line numberDiff line change
@@ -2965,160 +2965,6 @@ fn kbkdf_invalid_data_params_double_pipeline_mode() -> TestResult {
29652965
Ok(())
29662966
}
29672967

2968-
// #[test]
2969-
// #[serial]
2970-
// fn kbkdf_invalid_data_params() -> TestResult {
2971-
// /* SoftHSM does not support NIST SP800-108 KDF yet */
2972-
// if is_softhsm() {
2973-
// return Ok(());
2974-
// }
2975-
2976-
// let (pkcs11, slot) = init_pins();
2977-
2978-
// // Open a session and log in
2979-
// let session = pkcs11.open_rw_session(slot)?;
2980-
// session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
2981-
2982-
// // Generate base key
2983-
// let base_template = vec![
2984-
// Attribute::Token(true),
2985-
// Attribute::Private(false),
2986-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2987-
// Attribute::Derive(true),
2988-
// ];
2989-
// let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
2990-
2991-
// // The template of the key to derive
2992-
// let derived_key_template = vec![
2993-
// Attribute::Token(false),
2994-
// Attribute::Private(false),
2995-
// Attribute::Class(ObjectClass::SECRET_KEY),
2996-
// Attribute::KeyType(KeyType::AES),
2997-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
2998-
// Attribute::Encrypt(true),
2999-
// Attribute::Decrypt(true),
3000-
// ];
3001-
3002-
// // Instantiate KBKDF in counter mode without additional keys
3003-
// let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3004-
// let dkm_length_format =
3005-
// KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3006-
// let data_params = vec![
3007-
// PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3008-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3009-
// PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3010-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3011-
// PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3012-
// ];
3013-
// let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3014-
3015-
// // Derive key
3016-
// let derived_key = session.derive_key(
3017-
// &Mechanism::KbkdfCounter(params),
3018-
// base_key,
3019-
// &derived_key_template,
3020-
// )?;
3021-
3022-
// let wanted_attributes = vec![
3023-
// AttributeType::Class,
3024-
// AttributeType::KeyType,
3025-
// AttributeType::Encrypt,
3026-
// AttributeType::Decrypt,
3027-
// AttributeType::Sign,
3028-
// AttributeType::Verify,
3029-
// AttributeType::Derive,
3030-
// AttributeType::ValueLen,
3031-
// ];
3032-
3033-
// // TODO: remove this!
3034-
// println!(
3035-
// "Main derived key: {:#?}",
3036-
// session.get_attributes(derived_key, &wanted_attributes)?
3037-
// );
3038-
3039-
// session.destroy_object(derived_key)?;
3040-
// session.destroy_object(base_key)?;
3041-
3042-
// Ok(())
3043-
// }
3044-
3045-
// #[test]
3046-
// #[serial]
3047-
// fn kbkdf_missing_data_params() -> TestResult {
3048-
// /* SoftHSM does not support NIST SP800-108 KDF yet */
3049-
// if is_softhsm() {
3050-
// return Ok(());
3051-
// }
3052-
3053-
// let (pkcs11, slot) = init_pins();
3054-
3055-
// // Open a session and log in
3056-
// let session = pkcs11.open_rw_session(slot)?;
3057-
// session.login(UserType::User, Some(&AuthPin::new(USER_PIN.into())))?;
3058-
3059-
// // Generate base key
3060-
// let base_template = vec![
3061-
// Attribute::Token(true),
3062-
// Attribute::Private(false),
3063-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3064-
// Attribute::Derive(true),
3065-
// ];
3066-
// let base_key = session.generate_key(&Mechanism::AesKeyGen, &base_template)?;
3067-
3068-
// // The template of the key to derive
3069-
// let derived_key_template = vec![
3070-
// Attribute::Token(false),
3071-
// Attribute::Private(false),
3072-
// Attribute::Class(ObjectClass::SECRET_KEY),
3073-
// Attribute::KeyType(KeyType::AES),
3074-
// Attribute::ValueLen((AES256_BLOCK_SIZE as u64).into()),
3075-
// Attribute::Encrypt(true),
3076-
// Attribute::Decrypt(true),
3077-
// ];
3078-
3079-
// // Instantiate KBKDF in counter mode without additional keys
3080-
// let counter_format = KbkdfCounterFormat::new(Endianness::Big, 16);
3081-
// let dkm_length_format =
3082-
// KbkdfDkmLengthFormat::new(DkmLengthMethod::SumOfKeys, Endianness::Big, 16);
3083-
// let data_params = vec![
3084-
// PrfDataParam::new(PrfDataParamType::IterationVariable(Some(&counter_format))),
3085-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"test_label")),
3086-
// PrfDataParam::new(PrfDataParamType::ByteArray(&[0])),
3087-
// PrfDataParam::new(PrfDataParamType::ByteArray(b"\xfe\xed\xbe\xef")),
3088-
// PrfDataParam::new(PrfDataParamType::DkmLength(&dkm_length_format)),
3089-
// ];
3090-
// let params = KbkdfParams::new(MechanismType::AES_CMAC, &data_params, None);
3091-
3092-
// // Derive key
3093-
// let derived_key = session.derive_key(
3094-
// &Mechanism::KbkdfCounter(params),
3095-
// base_key,
3096-
// &derived_key_template,
3097-
// )?;
3098-
3099-
// let wanted_attributes = vec![
3100-
// AttributeType::Class,
3101-
// AttributeType::KeyType,
3102-
// AttributeType::Encrypt,
3103-
// AttributeType::Decrypt,
3104-
// AttributeType::Sign,
3105-
// AttributeType::Verify,
3106-
// AttributeType::Derive,
3107-
// AttributeType::ValueLen,
3108-
// ];
3109-
3110-
// // TODO: remove this!
3111-
// println!(
3112-
// "Main derived key: {:#?}",
3113-
// session.get_attributes(derived_key, &wanted_attributes)?
3114-
// );
3115-
3116-
// session.destroy_object(derived_key)?;
3117-
// session.destroy_object(base_key)?;
3118-
3119-
// Ok(())
3120-
// }
3121-
31222968
#[test]
31232969
#[serial]
31242970
fn sign_verify_sha1_hmac() -> TestResult {

0 commit comments

Comments
 (0)