const KeyAliasPair PEERS = { "peer_ec_private", "peer_ec_public" };
const KeyAliasPair PEERS2 = { "peer2_ec_private", "peer2_ec_public" };
const KeyAliasPair WRONG = { "wrong_ec_private", "wrong_ec_public" };
-const KeyAliasPair RSA = { "rsa_private", "rsa_public" };
+const KeyAliasPair RSA_KEYS = { "rsa_private", "rsa_public" };
const char* const DERIVED = "derived";
GenerateEC(CKMC_EC_PRIME256V1, PEERS2, EXPORTABLE, EXPORTABLE);
GenerateEC(CKMC_EC_PRIME192V1, WRONG, UNEXPORTABLE, EXPORTABLE);
- ckmc_remove_alias(RSA.prv.c_str());
- ckmc_remove_alias(RSA.pub.c_str());
+ ckmc_remove_alias(RSA_KEYS.prv.c_str());
+ ckmc_remove_alias(RSA_KEYS.pub.c_str());
assert_positive(ckmc_create_key_pair_rsa,
1024,
- RSA.prv.c_str(),
- RSA.pub.c_str(),
+ RSA_KEYS.prv.c_str(),
+ RSA_KEYS.pub.c_str(),
UNEXPORTABLE,
EXPORTABLE);
}
assert_buffers_equal(plain.get(), decrypted, false);
}
-
RUNNER_TEST(TEAL_0020_key_agreement_wrong_arguments)
{
auto pub_key = getKey(PEERS.pub);
int main(int argc, char *argv[])
{
+ require_default_user(argv);
+
return DPL::Test::TestRunnerSingleton::Instance().ExecTestRunner(argc, argv);
}