@@ -63,7 +63,7 @@ func TestPKCS11ECKeySignVerify(t *testing.T) {
63
63
t .Fatal ("Failed signing message [%s]" , err )
64
64
}
65
65
66
- pass , err := verifyECDSA (key , hash1 , R , S )
66
+ pass , err := verifyECDSA (key , hash1 , R , S , currentTestConfig . securityLevel / 8 )
67
67
if err != nil {
68
68
t .Fatal ("Error verifying message 1 [%s]" , err )
69
69
}
@@ -76,7 +76,7 @@ func TestPKCS11ECKeySignVerify(t *testing.T) {
76
76
t .Fatal ("Signature should match with software verification!" )
77
77
}
78
78
79
- pass , err = verifyECDSA (key , hash2 , R , S )
79
+ pass , err = verifyECDSA (key , hash2 , R , S , currentTestConfig . securityLevel / 8 )
80
80
if err != nil {
81
81
t .Fatal ("Error verifying message 2 [%s]" , err )
82
82
}
@@ -129,7 +129,7 @@ func TestPKCS11ECKeyImportSignVerify(t *testing.T) {
129
129
t .Fatal ("Failed signing message [%s]" , err )
130
130
}
131
131
132
- pass , err := verifyECDSA (ski , hash1 , R , S )
132
+ pass , err := verifyECDSA (ski , hash1 , R , S , currentTestConfig . securityLevel / 8 )
133
133
if err != nil {
134
134
t .Fatalf ("Error verifying message 1 [%s]\n %s\n \n %s" , err , hex .Dump (R .Bytes ()), hex .Dump (S .Bytes ()))
135
135
}
@@ -142,7 +142,7 @@ func TestPKCS11ECKeyImportSignVerify(t *testing.T) {
142
142
t .Fatal ("Signature should match with software verification!" )
143
143
}
144
144
145
- pass , err = verifyECDSA (ski , hash2 , R , S )
145
+ pass , err = verifyECDSA (ski , hash2 , R , S , currentTestConfig . securityLevel / 8 )
146
146
if err != nil {
147
147
t .Fatal ("Error verifying message 2 [%s]" , err )
148
148
}
@@ -198,15 +198,15 @@ func TestPKCS11ECKeyExport(t *testing.T) {
198
198
t .Fatalf ("Failed signing message [%s]" , err )
199
199
}
200
200
201
- pass , err := verifyECDSA (key2 , hash1 , R , S )
201
+ pass , err := verifyECDSA (key2 , hash1 , R , S , currentTestConfig . securityLevel / 8 )
202
202
if err != nil {
203
203
t .Fatalf ("Error verifying message 1 [%s]" , err )
204
204
}
205
205
if pass == false {
206
206
t .Fatal ("Signature should match! [1]" )
207
207
}
208
208
209
- pass , err = verifyECDSA (key , hash1 , R , S )
209
+ pass , err = verifyECDSA (key , hash1 , R , S , currentTestConfig . securityLevel / 8 )
210
210
if err != nil {
211
211
t .Fatalf ("Error verifying message 2 [%s]" , err )
212
212
}
@@ -219,7 +219,7 @@ func TestPKCS11ECKeyExport(t *testing.T) {
219
219
t .Fatal ("Signature should match with software verification!" )
220
220
}
221
221
222
- pass , err = verifyECDSA (key , hash2 , R , S )
222
+ pass , err = verifyECDSA (key , hash2 , R , S , currentTestConfig . securityLevel / 8 )
223
223
if err != nil {
224
224
t .Fatal ("Error verifying message 3 [%s]" , err )
225
225
}
0 commit comments