Revert change to pkcs11-tool because of upstream changes in RSA signature tests

Fixed a typo that went undetected
This commit is contained in:
Andreas Schwier 2012-08-13 11:34:18 +02:00 committed by Viktor Tarasov
parent 8e8acf1ff6
commit efb4673ec8
2 changed files with 1 additions and 9 deletions

View File

@ -230,7 +230,7 @@ static int sc_hsm_decode_ecdsa_signature(sc_card_t *card,
}
if (outlen < (fieldsizebytes * 2)) {
LOG_TEST_RETURN(card->ctx, SC_ERROR_INVALID_DATA, "output too small for EC signature");
LOG_TEST_RET(card->ctx, SC_ERROR_INVALID_DATA, "output too small for EC signature");
}
memset(out, 0, outlen);

View File

@ -3342,14 +3342,6 @@ static int test_signature(CK_SESSION_HANDLE sess)
return errors;
}
// ASC: The firstMechType mechanism is broken for cards that support multiple
// key types. find_mechanism always selects ECDSA, leading to a failure later.
// This hack ensures that ECDSA is never selected as firstMechType
if (firstMechType == CKM_ECDSA) {
firstMechType = CKM_RSA_X_509;
}
printf("Signatures (currently only RSA signatures)\n");
for (j = 0; find_object(sess, CKO_PRIVATE_KEY, &privKeyObject, NULL, 0, j); j++) {
printf(" testing key %ld ", j);