@@ -1988,7 +1988,9 @@ fn rsa_pkcs_oaep_empty() -> TestResult {
1988
1988
let session = pkcs11. open_rw_session ( slot) ?;
1989
1989
session. login ( UserType :: User , Some ( & AuthPin :: new ( USER_PIN . into ( ) ) ) ) ?;
1990
1990
1991
+ let public_exponent: Vec < u8 > = vec ! [ 0x01 , 0x00 , 0x01 ] ;
1991
1992
let pub_key_template = [
1993
+ Attribute :: PublicExponent ( public_exponent) ,
1992
1994
Attribute :: ModulusBits ( 2048 . into ( ) ) ,
1993
1995
Attribute :: Encrypt ( true ) ,
1994
1996
] ;
@@ -2027,7 +2029,9 @@ fn rsa_pkcs_oaep_with_data() -> TestResult {
2027
2029
let session = pkcs11. open_rw_session ( slot) ?;
2028
2030
session. login ( UserType :: User , Some ( & AuthPin :: new ( USER_PIN . into ( ) ) ) ) ?;
2029
2031
2032
+ let public_exponent: Vec < u8 > = vec ! [ 0x01 , 0x00 , 0x01 ] ;
2030
2033
let pub_key_template = [
2034
+ Attribute :: PublicExponent ( public_exponent) ,
2031
2035
Attribute :: ModulusBits ( 2048 . into ( ) ) ,
2032
2036
Attribute :: Encrypt ( true ) ,
2033
2037
] ;
@@ -3737,7 +3741,7 @@ fn unique_id() -> TestResult {
3737
3741
3738
3742
// we can get the UniqueId attribute
3739
3743
let attrs = session. get_attributes ( key, & [ AttributeType :: UniqueId ] ) ?;
3740
- if is_softhsm ( ) {
3744
+ if is_softhsm ( ) || is_softokn ( ) {
3741
3745
// SoftHSM does not support this attribute at all
3742
3746
assert_eq ! ( attrs. len( ) , 0 ) ;
3743
3747
} else {
0 commit comments