&signature)),
CKMCReadableError(temp));
+// TZ backend does not support "no hash" and ignores padding option (public key is in TZ)
+#ifndef TZ_BACKEND
// verify: no padding + no hash
RUNNER_ASSERT_MSG(
CKMC_ERROR_NONE == (temp = ckmc_verify_signature(
CKMC_HASH_NONE,
CKMC_PKCS1_PADDING)),
CKMCReadableError(temp));
+#endif
// verify: no padding + hash
RUNNER_ASSERT_MSG(
&signature)),
CKMCReadableError(temp));
+// TZ backend does not support "no hash" option (public key is in TZ)
+#ifndef TZ_BACKEND
// verify: padding + no hash
RUNNER_ASSERT_MSG(
CKMC_ERROR_NONE == (temp = ckmc_verify_signature(
CKMC_HASH_NONE,
CKMC_NONE_PADDING)),
CKMCReadableError(temp));
+#endif
// verify: no padding + hash
RUNNER_ASSERT_MSG(
prikey.password = key_passwd;
ckmc_policy_s pripolicy;
+
pripolicy.password = pri_passwd;
+
+#ifdef TZ_BACKEND // TZ backend does not support EC key import
+ pripolicy.extractable = 1;
+#else
pripolicy.extractable = 0;
+#endif
RUNNER_ASSERT_MSG(
CKMC_ERROR_NONE == (temp = ckmc_save_key(pub_alias.c_str(), pubkey, pubpolicy)),
CKM::Alias pri_alias = "dsa-prv1";
char *pri_passwd = NULL;
char *pub_passwd = NULL;
- ckmc_hash_algo_e hash_algo = CKMC_HASH_SHA256;
+ ckmc_hash_algo_e hash_algo = CKMC_HASH_SHA1;
ckmc_rsa_padding_algo_e pad_algo = CKMC_PKCS1_PADDING;
ckmc_raw_buffer_s *signature = NULL;
pubpolicy.extractable = 0;
ckmc_policy_s pripolicy;
+
pripolicy.password = pri_passwd;
pripolicy.extractable = 1;
ckmc_policy_s pripolicy;
pripolicy.password = pri_passwd;
+#ifdef TZ_BACKEND // TZ backend does not support EC key import
+ pripolicy.extractable = 1;
+#else
pripolicy.extractable = 0;
+#endif
RUNNER_ASSERT_MSG(