@@ -1888,6 +1888,20 @@ static CK_RV test_pkcs5_pbkdf2_key_gen(void* args)
18881888 }
18891889#endif
18901890
1891+ #ifdef WOLFSSL_SHA384
1892+ if (ret == CKR_OK) {
1893+ CK_PKCS5_PBKD2_PARAMS sha384Params = pbkdf2Params;
1894+ CK_MECHANISM sha384Mech = mechanism;
1895+ sha384Params.prf = CKP_PKCS5_PBKD2_HMAC_SHA384;
1896+ sha384Mech.pParameter = &sha384Params;
1897+
1898+ ret = funcList->C_GenerateKey(session, &sha384Mech, keyTemplate,
1899+ sizeof(keyTemplate)/sizeof(CK_ATTRIBUTE), &key);
1900+ CHECK_CKR(ret, "PKCS#5 PBKDF2 with SHA384");
1901+ }
1902+ #endif
1903+
1904+ #ifdef WOLFSSL_SHA512
18911905 if (ret == CKR_OK) {
18921906 CK_PKCS5_PBKD2_PARAMS sha512Params = pbkdf2Params;
18931907 CK_MECHANISM sha512Mech = mechanism;
@@ -1898,6 +1912,7 @@ static CK_RV test_pkcs5_pbkdf2_key_gen(void* args)
18981912 sizeof(keyTemplate)/sizeof(CK_ATTRIBUTE), &key);
18991913 CHECK_CKR(ret, "PKCS#5 PBKDF2 with SHA512");
19001914 }
1915+ #endif
19011916
19021917 return ret;
19031918}
@@ -2460,7 +2475,7 @@ static CK_RV test_copy_object_deep_copy(void* args)
24602475 return ret;
24612476}
24622477
2463- #if (!defined(NO_RSA) && !defined(WOLFPKCS11_TPM))
2478+ #if (!defined(NO_RSA) && !defined(WOLFPKCS11_TPM) && defined(WOLFSSL_KEY_GEN) )
24642479static CK_RV test_copy_object_rsa_key(void* args)
24652480{
24662481 CK_SESSION_HANDLE session = *(CK_SESSION_HANDLE*)args;
@@ -5353,7 +5368,7 @@ static CK_RV test_recover(void* args)
53535368 }
53545369 if (ret == CKR_OK) {
53555370 ret = funcList->C_VerifyRecover(session, sig, sigSz, data, &dataSz);
5356- #ifndef NO_RSA
5371+ #if !defined( NO_RSA) && defined(WC_RSA_DIRECT)
53575372 CHECK_CKR_FAIL(ret, CKR_OPERATION_NOT_INITIALIZED,
53585373 "Verify Recover not initialized");
53595374#else
@@ -5365,7 +5380,7 @@ static CK_RV test_recover(void* args)
53655380 return ret;
53665381}
53675382
5368- #ifndef NO_RSA
5383+ #if !defined( NO_RSA) && defined(WC_RSA_DIRECT)
53695384static CK_RV rsa_verify_recover(CK_SESSION_HANDLE session,
53705385 CK_MECHANISM_TYPE mech_type)
53715386{
@@ -15762,7 +15777,7 @@ static TEST_FUNC testFunc[] = {
1576215777 PKCS11TEST_FUNC_SESS_DECL(test_op_state_fail),
1576315778 PKCS11TEST_FUNC_SESS_DECL(test_object),
1576415779 PKCS11TEST_FUNC_SESS_DECL(test_copy_object_deep_copy),
15765- #if (!defined(NO_RSA) && !defined(WOLFPKCS11_TPM))
15780+ #if (!defined(NO_RSA) && !defined(WOLFPKCS11_TPM) && defined(WOLFSSL_KEY_GEN) )
1576615781 PKCS11TEST_FUNC_SESS_DECL(test_copy_object_rsa_key),
1576715782#endif
1576815783#ifdef HAVE_ECC
@@ -15793,7 +15808,7 @@ static TEST_FUNC testFunc[] = {
1579315808 PKCS11TEST_FUNC_SESS_DECL(test_digest_fail),
1579415809 PKCS11TEST_FUNC_SESS_DECL(test_sign_verify),
1579515810 PKCS11TEST_FUNC_SESS_DECL(test_recover),
15796- #ifndef NO_RSA
15811+ #if !defined( NO_RSA) && defined(WC_RSA_DIRECT)
1579715812 PKCS11TEST_FUNC_SESS_DECL(test_verify_recover_pkcs),
1579815813 PKCS11TEST_FUNC_SESS_DECL(test_verify_recover_x509),
1579915814#endif
0 commit comments