@@ -228,10 +228,12 @@ fn sign_verify_multipart() -> TestResult {
228
228
229
229
let pub_key_template = vec ! [
230
230
Attribute :: Token ( true ) ,
231
+ Attribute :: Private ( false ) ,
231
232
Attribute :: PublicExponent ( public_exponent) ,
232
233
Attribute :: ModulusBits ( modulus_bits. into( ) ) ,
234
+ Attribute :: Verify ( true ) ,
233
235
] ;
234
- let priv_key_template = vec ! [ Attribute :: Token ( true ) ] ;
236
+ let priv_key_template = vec ! [ Attribute :: Token ( true ) , Attribute :: Sign ( true ) ] ;
235
237
236
238
// Generate keypair
237
239
let ( pub_key, priv_key) = session. generate_key_pair (
@@ -331,10 +333,12 @@ fn sign_verify_multipart_already_initialized() -> TestResult {
331
333
332
334
let pub_key_template = vec ! [
333
335
Attribute :: Token ( true ) ,
336
+ Attribute :: Private ( false ) ,
334
337
Attribute :: PublicExponent ( public_exponent) ,
335
338
Attribute :: ModulusBits ( modulus_bits. into( ) ) ,
339
+ Attribute :: Verify ( true ) ,
336
340
] ;
337
- let priv_key_template = vec ! [ Attribute :: Token ( true ) ] ;
341
+ let priv_key_template = vec ! [ Attribute :: Token ( true ) , Attribute :: Sign ( true ) ] ;
338
342
339
343
// Generate keypair
340
344
let ( pub_key, priv_key) = session. generate_key_pair (
@@ -437,7 +441,10 @@ fn encrypt_decrypt_multipart() -> TestResult {
437
441
// Generate key (currently SoftHSM only supports multi-part encrypt/decrypt for symmetric crypto)
438
442
let template = vec ! [
439
443
Attribute :: Token ( true ) ,
444
+ Attribute :: Private ( false ) ,
440
445
Attribute :: ValueLen ( ( 128 / 8 ) . into( ) ) ,
446
+ Attribute :: Encrypt ( true ) ,
447
+ Attribute :: Decrypt ( true ) ,
441
448
] ;
442
449
let key = session. generate_key ( & Mechanism :: AesKeyGen , & template) ?;
443
450
@@ -539,7 +546,10 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
539
546
// Generate key (currently SoftHSM only supports multi-part encrypt/decrypt for symmetric crypto)
540
547
let template = vec ! [
541
548
Attribute :: Token ( true ) ,
549
+ Attribute :: Private ( false ) ,
542
550
Attribute :: ValueLen ( ( 128 / 8 ) . into( ) ) ,
551
+ Attribute :: Encrypt ( true ) ,
552
+ Attribute :: Decrypt ( true ) ,
543
553
] ;
544
554
let key = session. generate_key ( & Mechanism :: AesKeyGen , & template) ?;
545
555
@@ -1655,6 +1665,7 @@ fn sha256_digest_multipart_with_key() -> TestResult {
1655
1665
// Create a key to add to the digest
1656
1666
let key_template = vec ! [
1657
1667
Attribute :: Token ( true ) ,
1668
+ Attribute :: Private ( false ) ,
1658
1669
Attribute :: ValueLen ( ( 256 / 8 ) . into( ) ) ,
1659
1670
// Key must be non-sensitive and extractable to get its bytes and digest them directly, for comparison
1660
1671
Attribute :: Sensitive ( false ) ,
0 commit comments