@@ -33,7 +33,7 @@ fn sign_verify() -> Result<()> {
33
33
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
34
34
35
35
// open a session
36
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
36
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
37
37
38
38
// log in the session
39
39
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
@@ -85,7 +85,7 @@ fn encrypt_decrypt() -> Result<()> {
85
85
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
86
86
87
87
// open a session
88
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
88
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
89
89
90
90
// log in the session
91
91
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
@@ -141,7 +141,7 @@ fn derive_key() -> Result<()> {
141
141
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
142
142
143
143
// open a session
144
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
144
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
145
145
146
146
// log in the session
147
147
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
@@ -236,7 +236,7 @@ fn import_export() -> Result<()> {
236
236
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
237
237
238
238
// open a session
239
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
239
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
240
240
241
241
// log in the session
242
242
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
@@ -306,7 +306,7 @@ fn wrap_and_unwrap_key() {
306
306
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
307
307
308
308
// open a session
309
- let session = pkcs11. open_session_no_callback ( slot, flags ) . unwrap ( ) ;
309
+ let session = pkcs11. open_session_no_callback ( slot, true ) . unwrap ( ) ;
310
310
311
311
// log in the session
312
312
session. login ( UserType :: User , Some ( USER_PIN ) ) . unwrap ( ) ;
@@ -400,7 +400,7 @@ fn login_feast() {
400
400
for _ in 0 ..SESSIONS {
401
401
let pkcs11 = pkcs11. clone ( ) ;
402
402
threads. push ( thread:: spawn ( move || {
403
- let session = pkcs11. open_session_no_callback ( slot, flags ) . unwrap ( ) ;
403
+ let session = pkcs11. open_session_no_callback ( slot, true ) . unwrap ( ) ;
404
404
match session. login ( UserType :: User , Some ( USER_PIN ) ) {
405
405
Ok ( _) | Err ( Error :: Pkcs11 ( RvError :: UserAlreadyLoggedIn ) ) => { }
406
406
Err ( e) => panic ! ( "Bad error response: {}" , e) ,
@@ -463,19 +463,9 @@ fn get_session_info_test() -> Result<()> {
463
463
let ( pkcs11, slot) = init_pins ( ) ;
464
464
465
465
let mut flags = SessionFlags :: new ( ) ;
466
-
467
- // Check that OpenSession errors when CKF_SERIAL_SESSION is not set
468
- if let Err ( cryptoki:: error:: Error :: Pkcs11 ( rv_error) ) =
469
- pkcs11. open_session_no_callback ( slot, flags)
470
- {
471
- assert_eq ! ( rv_error, RvError :: SessionParallelNotSupported ) ;
472
- } else {
473
- panic ! ( "Should error when CKF_SERIAL_SESSION is not set" ) ;
474
- }
475
-
476
466
let _ = flags. set_serial_session ( true ) ;
477
467
{
478
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
468
+ let session = pkcs11. open_session_no_callback ( slot, false ) ?;
479
469
let session_info = session. get_session_info ( ) ?;
480
470
assert ! ( !session_info. read_write( ) ) ;
481
471
assert_eq ! ( session_info. slot_id( ) , slot) ;
@@ -504,7 +494,7 @@ fn get_session_info_test() -> Result<()> {
504
494
505
495
let _ = flags. set_rw_session ( true ) ;
506
496
507
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
497
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
508
498
let session_info = session. get_session_info ( ) ?;
509
499
assert ! ( session_info. read_write( ) ) ;
510
500
assert_eq ! ( session_info. slot_id( ) , slot) ;
@@ -539,7 +529,7 @@ fn generate_random_test() -> Result<()> {
539
529
let mut flags = SessionFlags :: new ( ) ;
540
530
541
531
let _ = flags. set_serial_session ( true ) ;
542
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
532
+ let session = pkcs11. open_session_no_callback ( slot, false ) ?;
543
533
544
534
let poor_seed: [ u8 ; 32 ] = [ 0 ; 32 ] ;
545
535
session. seed_random ( & poor_seed) ?;
@@ -566,7 +556,7 @@ fn set_pin_test() -> Result<()> {
566
556
let mut flags = SessionFlags :: new ( ) ;
567
557
568
558
let _ = flags. set_serial_session ( true ) . set_rw_session ( true ) ;
569
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
559
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
570
560
571
561
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
572
562
session. set_pin ( USER_PIN , new_user_pin) ?;
@@ -585,7 +575,7 @@ fn get_attribute_info_test() -> Result<()> {
585
575
let _ = flags. set_rw_session ( true ) . set_serial_session ( true ) ;
586
576
587
577
// open a session
588
- let session = pkcs11. open_session_no_callback ( slot, flags ) ?;
578
+ let session = pkcs11. open_session_no_callback ( slot, true ) ?;
589
579
590
580
// log in the session
591
581
session. login ( UserType :: User , Some ( USER_PIN ) ) ?;
0 commit comments