ckmc_key_free(get_AES_key);
}
+RUNNER_TEST(T3055_CAPI_create_asym_key_same_alias)
+{
+ int temp;
+ const char *key_alias = "same-alias-test";
+ ckmc_policy_s policy {nullptr, true};
+
+ temp = ckmc_create_key_pair_rsa(1024, key_alias, key_alias, policy, policy);
+ RUNNER_ASSERT_MSG(CKMC_ERROR_INVALID_PARAMETER == temp, CKMCReadableError(temp));
+ temp = ckmc_create_key_pair_dsa(1024, key_alias, key_alias, policy, policy);
+ RUNNER_ASSERT_MSG(CKMC_ERROR_INVALID_PARAMETER == temp, CKMCReadableError(temp));
+ temp = ckmc_create_key_pair_ecdsa(CKMC_EC_PRIME192V1, key_alias, key_alias, policy, policy);
+ RUNNER_ASSERT_MSG(CKMC_ERROR_INVALID_PARAMETER == temp, CKMCReadableError(temp));
+}
+
-RUNNER_TEST(T3055_CAPI_deinit)
+RUNNER_TEST(T3056_CAPI_deinit)
{
int temp;
EXPORTABLE);
}
+RUNNER_TEST(KEM_create_keypair_same_alias, KemCreateKeypairFixture)
+{
+ assert_invalid_param(ckmc_create_key_pair_kem,
+ CKMC_ML_KEM_768,
+ private_key_alias.c_str(),
+ private_key_alias.c_str(),
+ UNEXPORTABLE_PW,
+ EXPORTABLE);
+}
+
RUNNER_TEST(KEM_create_keypair_invalid_parameter, KemCreateKeypairFixture)
{
ckmc_kem_type_e invalid_kem_type = static_cast<ckmc_kem_type_e>(5);
ckmc_buffer_free(dataToEncrypt);
ckmc_buffer_free(encrypted);
ckmc_buffer_free(decrypted);
-}
\ No newline at end of file
+}