Revert change to pkcs11-tool because of upstream changes in RSA signature tests
Fixed a typo that went undetected
This commit is contained in:
parent
8e8acf1ff6
commit
efb4673ec8
|
@ -230,7 +230,7 @@ static int sc_hsm_decode_ecdsa_signature(sc_card_t *card,
|
|||
}
|
||||
|
||||
if (outlen < (fieldsizebytes * 2)) {
|
||||
LOG_TEST_RETURN(card->ctx, SC_ERROR_INVALID_DATA, "output too small for EC signature");
|
||||
LOG_TEST_RET(card->ctx, SC_ERROR_INVALID_DATA, "output too small for EC signature");
|
||||
}
|
||||
memset(out, 0, outlen);
|
||||
|
||||
|
|
|
@ -3342,14 +3342,6 @@ static int test_signature(CK_SESSION_HANDLE sess)
|
|||
return errors;
|
||||
}
|
||||
|
||||
// ASC: The firstMechType mechanism is broken for cards that support multiple
|
||||
// key types. find_mechanism always selects ECDSA, leading to a failure later.
|
||||
// This hack ensures that ECDSA is never selected as firstMechType
|
||||
|
||||
if (firstMechType == CKM_ECDSA) {
|
||||
firstMechType = CKM_RSA_X_509;
|
||||
}
|
||||
|
||||
printf("Signatures (currently only RSA signatures)\n");
|
||||
for (j = 0; find_object(sess, CKO_PRIVATE_KEY, &privKeyObject, NULL, 0, j); j++) {
|
||||
printf(" testing key %ld ", j);
|
||||
|
|
Loading…
Reference in New Issue