@@ -601,11 +601,6 @@ fn encrypt_decrypt_multipart_already_initialized() -> TestResult {
601
601
#[ test]
602
602
#[ serial]
603
603
fn derive_key ( ) -> TestResult {
604
- /* FIXME: This is now broken in Kryoptic: https://github.com/latchset/kryoptic/issues/184 */
605
- if !is_softhsm ( ) {
606
- /* return Ignore(); */
607
- return Ok ( ( ) ) ;
608
- }
609
604
let ( pkcs11, slot) = init_pins ( ) ;
610
605
611
606
// open a session
@@ -904,12 +899,6 @@ fn session_objecthandle_iterator() -> testresult::TestResult {
904
899
#[ test]
905
900
#[ serial]
906
901
fn wrap_and_unwrap_key ( ) {
907
- /* FIXME: This is now broken in Kryoptic: https://github.com/latchset/kryoptic/issues/184 */
908
- if !is_softhsm ( ) {
909
- /* return Ignore(); */
910
- return ;
911
- }
912
-
913
902
let ( pkcs11, slot) = init_pins ( ) ;
914
903
// open a session
915
904
let session = pkcs11. open_rw_session ( slot) . unwrap ( ) ;
@@ -952,7 +941,7 @@ fn wrap_and_unwrap_key() {
952
941
] ;
953
942
954
943
// priv key template
955
- let priv_key_template = vec ! [ Attribute :: Token ( true ) ] ;
944
+ let priv_key_template = vec ! [ Attribute :: Token ( true ) , ( Attribute :: Unwrap ( true ) ) ] ;
956
945
957
946
let ( wrapping_key, unwrapping_key) = session
958
947
. generate_key_pair (
@@ -1048,7 +1037,7 @@ fn get_info_test() -> TestResult {
1048
1037
assert_eq ! ( info. cryptoki_version( ) . minor( ) , 40 ) ;
1049
1038
} else {
1050
1039
assert_eq ! ( info. cryptoki_version( ) . major( ) , 3 ) ;
1051
- assert_eq ! ( info. cryptoki_version( ) . minor( ) , 0 ) ;
1040
+ assert_eq ! ( info. cryptoki_version( ) . minor( ) , 2 ) ;
1052
1041
}
1053
1042
Ok ( ( ) )
1054
1043
}
@@ -1352,11 +1341,6 @@ fn test_clone_initialize() {
1352
1341
#[ test]
1353
1342
#[ serial]
1354
1343
fn aes_key_attributes_test ( ) -> TestResult {
1355
- /* FIXME: This is now broken in Kryoptic: https://github.com/latchset/kryoptic/issues/182 */
1356
- if !is_softhsm ( ) {
1357
- /* return Ignore(); */
1358
- return Ok ( ( ) ) ;
1359
- }
1360
1344
let ( pkcs11, slot) = init_pins ( ) ;
1361
1345
1362
1346
// open a session
@@ -1672,11 +1656,6 @@ fn sha256_digest_multipart() -> TestResult {
1672
1656
#[ test]
1673
1657
#[ serial]
1674
1658
fn sha256_digest_multipart_with_key ( ) -> TestResult {
1675
- // FIXME: Getting value from sensitive objects is now broken in Kryoptic: https://github.com/latchset/kryoptic/issues/193
1676
- if !is_softhsm ( ) {
1677
- return Ok ( ( ) ) ;
1678
- }
1679
-
1680
1659
let ( pkcs11, slot) = init_pins ( ) ;
1681
1660
1682
1661
// Open a session and log in
0 commit comments