Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions golang/examples/bip32_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -588,11 +588,11 @@ func Example_bip32_KeyDerivation() {
),
BaseKey: publicKey,
}
deriveKeyResponsePub, err := cryptoClient.DeriveKey(context.Background(), deriveKeyRequestPub)
_, err = cryptoClient.DeriveKey(context.Background(), deriveKeyRequestPub)
if err != nil {
fmt.Println("Don't supporte deriving key from pulic -> public in current soft-hsm version")
} else {
fmt.Printf("Derive key from public to public successfully %v", deriveKeyResponsePub)
fmt.Printf("Derive key from public to public successfully")
}

// Output:
Expand All @@ -604,7 +604,7 @@ func Example_bip32_KeyDerivation() {
// Derived Key type=CkBIP0032PRV2PUB index=0
// Derive key from private -> public
// Derive key from private -> private
// Don't supporte deriving key from pulic -> public in current soft-hsm version
// Derive key from public to public successfully
}

//cross sign and verification
Expand Down
10 changes: 5 additions & 5 deletions golang/examples/ed25519_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -432,17 +432,17 @@ func TestED25519InvalidKeyType(t *testing.T) {
signature, err := ed25519KeySignSingle(t, cryptoClient, generateKeyPairResponseECDSA.PrivKeyBytes, signData)
assert.Error(t, err)
assert.Contains(t, err.Error(), "SignSingle error")
assert.Contains(t, err.Error(), "CKR_MECHANISM_INVALID")
assert.Contains(t, err.Error(), "CKR_KEY_TYPE_INCONSISTENT")

signature, err = ed25519KeySign(t, cryptoClient, generateKeyPairResponseECDSA.PrivKeyBytes, signData)
assert.Error(t, err)
assert.Contains(t, err.Error(), "SignInit error")
assert.Contains(t, err.Error(), "CKR_MECHANISM_INVALID")
assert.Contains(t, err.Error(), "CKR_KEY_TYPE_INCONSISTENT")

signature, err = ed25519KeySignMulti(t, cryptoClient, generateKeyPairResponseECDSA.PrivKeyBytes, signData)
assert.Error(t, err)
assert.Contains(t, err.Error(), "SignInit error")
assert.Contains(t, err.Error(), "CKR_MECHANISM_INVALID")
assert.Contains(t, err.Error(), "CKR_KEY_TYPE_INCONSISTENT")

// Verify with the wrong key type
generateKeyPairResponseED25519, err := ed25519KeyGenerate(t, cryptoClient)
Expand All @@ -457,12 +457,12 @@ func TestED25519InvalidKeyType(t *testing.T) {
err = ed25519KeyVerify(t, cryptoClient, generateKeyPairResponseECDSA.PubKeyBytes, signData, signature)
assert.Error(t, err)
assert.Contains(t, err.Error(), "VerifyInit error")
assert.Contains(t, err.Error(), "CKR_MECHANISM_INVALID")
assert.Contains(t, err.Error(), "CKR_KEY_TYPE_INCONSISTENT")

err = ed25519KeyVerifyMulti(t, cryptoClient, generateKeyPairResponseECDSA.PubKeyBytes, signData, signature)
assert.Error(t, err)
assert.Contains(t, err.Error(), "VerifyInit error")
assert.Contains(t, err.Error(), "CKR_MECHANISM_INVALID")
assert.Contains(t, err.Error(), "CKR_KEY_TYPE_INCONSISTENT")
}

func TestED25519InvalidKeys(t *testing.T) {
Expand Down