return CipherCtxPtr(ctx, ckmc_cipher_free);
}
-CKM::Policy generate_ckm_policy(int iterator_nr) {
+CKM::Policy generate_ckm_policy(int iterator_nr, bool set_pass) {
CKM::Password password;
- if ((iterator_nr & 0x1) != 0)
+ if (((iterator_nr & 0x1) != 0) && set_pass)
password.assign("test_pwd");
return CKM::Policy(password, (iterator_nr & 0x2) != 0);
}
ckmc_key_s *generate_AES_key(size_t lengthBits, const char *passwd);
void validate_AES_key(ckmc_key_s *analyzed);
void compare_AES_keys(ckmc_key_s *first, ckmc_key_s *second); // true if equal
-CKM::Policy generate_ckm_policy(int iterator_nr); // generates policy based on given number
+CKM::Policy generate_ckm_policy(int iterator_nr, bool set_pass = true); // generates policy based on given number
// Test env class for database cleanup. Pass database uids to cleanup before and after test
template <uid_t ...Args>
// make aliases with & without: password protection, exportable flag
for (int it = 0; it < aliasNameCount; ++it)
{
- CKM::Policy policy = generate_ckm_policy(it);
+#ifdef TZ_BACKEND
+ // TZ_BACKEND doesn't support importing asymmetric key with password
+ CKM::Policy policy = generate_ckm_policy(it, false);
+#else
+ CKM::Policy policy = generate_ckm_policy(it, true);
+#endif
currentAlias = "T1024_appkey" + std::to_string(it);
expected.emplace_back(currentAlias,
!policy.password.empty(),