get_public_key_from_tz(ckmc_create_key_pair_rsa, 1024);
}
-// Not supported yet from key-manager-ta.
-// RUNNER_TEST(T3049_get_public_dsa_key_from_TZ)
-// {
-// get_public_key_from_tz(ckmc_create_key_pair_dsa, 1024);
-// }
+RUNNER_TEST(T3049_get_public_dsa_key_from_TZ)
+{
+ get_public_key_from_tz(ckmc_create_key_pair_dsa, 1024);
+}
RUNNER_TEST(T3050_deinit_C_API)
{
Info(public_key_alias_2,
policy_public_key_2),
Info(private_key_alias_3,
- policy_private_key_3),
+ policy_private_key_3,
+ backend()),
Info(public_key_alias_3,
- policy_public_key_3),
+ policy_public_key_3,
+ backend()),
Info(private_key_alias_4,
policy_private_key_4,
backend()),
for (int i = 0; i < KEY_IDX_MAX; i++)
{
Policy prvPolicy(Password(), false, m_backend);
- Policy pubPolicy(Password(), type != DSA, m_backend);
+ Policy pubPolicy(Password(), true, m_backend);
if (i == PASSWORD_PROTECTED) {
prvPolicy.password.assign(PASSWORD);
pubPolicy.password.assign(PASSWORD);
testSignVerifyWithExportedPubkey(ECDSA, EC_SECP384R1, PRIMARY);
}
-// Not supported yet from key-manager-ta.
-// RUNNER_TEST(TSV_0420_verify_with_exported_pubkey_dsa_1024)
-// {
-// testSignVerifyWithExportedPubkey(DSA, 1024, PRIMARY);
-// }
-
-// RUNNER_TEST(TSV_0421_verify_with_exported_pubkey_dsa_2048)
-// {
-// testSignVerifyWithExportedPubkey(DSA, 2048, PRIMARY);
-// }
-
-// RUNNER_TEST(TSV_0422_verify_with_exported_pubkey_dsa_3072)
-// {
-// testSignVerifyWithExportedPubkey(DSA, 3072, PRIMARY);
-// }
-
-// #ifndef TZ_LEGACY_BACKEND // no support for DSA 4k keys in old TEE implementations
-// RUNNER_TEST(TSV_0423_verify_with_exported_pubkey_dsa_4096)
-// {
-// testSignVerifyWithExportedPubkey(DSA, 4096, PRIMARY);
-// }
-// #endif
+RUNNER_TEST(TSV_0420_verify_with_exported_pubkey_dsa_1024)
+{
+ testSignVerifyWithExportedPubkey(DSA, 1024, PRIMARY);
+}
+
+// Not supported from tef-simulator & key-manager-ta
+#ifndef TZ_BACKEND
+RUNNER_TEST(TSV_0421_verify_with_exported_pubkey_dsa_2048)
+{
+ testSignVerifyWithExportedPubkey(DSA, 2048, PRIMARY);
+}
+
+RUNNER_TEST(TSV_0422_verify_with_exported_pubkey_dsa_3072)
+{
+ testSignVerifyWithExportedPubkey(DSA, 3072, PRIMARY);
+}
+
+#ifndef TZ_LEGACY_BACKEND // no support for DSA 4k keys in old TEE implementations
+RUNNER_TEST(TSV_0423_verify_with_exported_pubkey_dsa_4096)
+{
+ testSignVerifyWithExportedPubkey(DSA, 4096, PRIMARY);
+}
+#endif
+#endif
// TODO: border cases for padding
// TODO: invalid arguments