@@ -449,12 +449,13 @@ fn session_find_objects() -> testresult::TestResult {
449
449
Attribute :: Token ( true ) ,
450
450
Attribute :: Encrypt ( true ) ,
451
451
Attribute :: Label ( format!( "key_{}" , i) . as_bytes( ) . to_vec( ) ) ,
452
+ Attribute :: ValueLen ( 32 . into( ) ) ,
452
453
Attribute :: Id ( "12345678" . as_bytes( ) . to_vec( ) ) , // reusing the same CKA_ID
453
454
] ;
454
455
455
456
// generate a secret key
456
457
let _key = session
457
- . generate_key ( & Mechanism :: Des3KeyGen , & key_template)
458
+ . generate_key ( & Mechanism :: AesKeyGen , & key_template)
458
459
. unwrap ( ) ;
459
460
} ) ;
460
461
@@ -463,7 +464,7 @@ fn session_find_objects() -> testresult::TestResult {
463
464
Attribute :: Token ( true ) ,
464
465
Attribute :: Id ( "12345678" . as_bytes( ) . to_vec( ) ) ,
465
466
Attribute :: Class ( ObjectClass :: SECRET_KEY ) ,
466
- Attribute :: KeyType ( KeyType :: DES3 ) ,
467
+ Attribute :: KeyType ( KeyType :: AES ) ,
467
468
] ;
468
469
469
470
let mut found_keys = session. find_objects ( & key_search_template) ?;
@@ -498,20 +499,21 @@ fn session_objecthandle_iterator() -> testresult::TestResult {
498
499
let key_template = vec ! [
499
500
Attribute :: Token ( true ) ,
500
501
Attribute :: Encrypt ( true ) ,
502
+ Attribute :: ValueLen ( 32 . into( ) ) ,
501
503
Attribute :: Label ( format!( "key_{}" , i) . as_bytes( ) . to_vec( ) ) ,
502
504
Attribute :: Id ( "12345678" . as_bytes( ) . to_vec( ) ) , // reusing the same CKA_ID
503
505
] ;
504
506
505
507
// generate a secret key
506
- session. generate_key ( & Mechanism :: Des3KeyGen , & key_template) ?;
508
+ session. generate_key ( & Mechanism :: AesKeyGen , & key_template) ?;
507
509
}
508
510
509
511
// retrieve these keys using this template
510
512
let key_search_template = vec ! [
511
513
Attribute :: Token ( true ) ,
512
514
Attribute :: Id ( "12345678" . as_bytes( ) . to_vec( ) ) ,
513
515
Attribute :: Class ( ObjectClass :: SECRET_KEY ) ,
514
- Attribute :: KeyType ( KeyType :: DES3 ) ,
516
+ Attribute :: KeyType ( KeyType :: AES ) ,
515
517
] ;
516
518
517
519
// test iter_objects_with_cache_size()
@@ -587,23 +589,23 @@ fn wrap_and_unwrap_key() {
587
589
588
590
let key_to_be_wrapped_template = vec ! [
589
591
Attribute :: Token ( true ) ,
592
+ Attribute :: ValueLen ( 32 . into( ) ) ,
590
593
// the key needs to be extractable to be suitable for being wrapped
591
594
Attribute :: Extractable ( true ) ,
592
595
Attribute :: Encrypt ( true ) ,
593
596
] ;
594
597
595
598
// generate a secret key that will be wrapped
596
599
let key_to_be_wrapped = session
597
- . generate_key ( & Mechanism :: Des3KeyGen , & key_to_be_wrapped_template)
600
+ . generate_key ( & Mechanism :: AesKeyGen , & key_to_be_wrapped_template)
598
601
. unwrap ( ) ;
599
602
600
- // Des3Ecb input length must be a multiple of 8
601
- // see: PKCS#11 spec Table 10-10, DES-ECB Key And Data Length Constraints
603
+ // AesEcb input length must be a multiple of 16
602
604
let encrypted_with_original = session
603
605
. encrypt (
604
- & Mechanism :: Des3Ecb ,
606
+ & Mechanism :: AesEcb ,
605
607
key_to_be_wrapped,
606
- & [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ] ,
608
+ & [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 ] ,
607
609
)
608
610
. unwrap ( ) ;
609
611
@@ -643,14 +645,14 @@ fn wrap_and_unwrap_key() {
643
645
Attribute :: Private ( true ) ,
644
646
Attribute :: Encrypt ( true ) ,
645
647
Attribute :: Class ( ObjectClass :: SECRET_KEY ) ,
646
- Attribute :: KeyType ( KeyType :: DES3 ) ,
648
+ Attribute :: KeyType ( KeyType :: AES ) ,
647
649
] ,
648
650
)
649
651
. unwrap ( ) ;
650
652
651
653
let encrypted_with_unwrapped = session
652
654
. encrypt (
653
- & Mechanism :: Des3Ecb ,
655
+ & Mechanism :: AesEcb ,
654
656
unwrapped_key,
655
657
& [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ] ,
656
658
)
0 commit comments