@@ -6537,28 +6537,28 @@ CK_RV SoftHSM::WrapKeyAsym
65376537 break ;
65386538 case CKM_SHA224:
65396539 mech = AsymMech::RSA_PKCS_OAEP_SHA224;
6540- expectedMgf = CKG_MGF1_SHA1 ;
6540+ expectedMgf = CKG_MGF1_SHA224 ;
65416541 // PKCS#11 2.40 draft 2 section 2.1.8: input length <= k-2-2hashLen
65426542 if (keydata.size () > modulus_length - 2 - 2 * 224 / 8 )
65436543 return CKR_KEY_SIZE_RANGE;
65446544 break ;
65456545 case CKM_SHA256:
65466546 mech = AsymMech::RSA_PKCS_OAEP_SHA256;
6547- expectedMgf = CKG_MGF1_SHA1 ;
6547+ expectedMgf = CKG_MGF1_SHA256 ;
65486548 // PKCS#11 2.40 draft 2 section 2.1.8: input length <= k-2-2hashLen
65496549 if (keydata.size () > modulus_length - 2 - 2 * 256 / 8 )
65506550 return CKR_KEY_SIZE_RANGE;
65516551 break ;
65526552 case CKM_SHA384:
65536553 mech = AsymMech::RSA_PKCS_OAEP_SHA384;
6554- expectedMgf = CKG_MGF1_SHA1 ;
6554+ expectedMgf = CKG_MGF1_SHA384 ;
65556555 // PKCS#11 2.40 draft 2 section 2.1.8: input length <= k-2-2hashLen
65566556 if (keydata.size () > modulus_length - 2 - 2 * 384 / 8 )
65576557 return CKR_KEY_SIZE_RANGE;
65586558 break ;
65596559 case CKM_SHA512:
65606560 mech = AsymMech::RSA_PKCS_OAEP_SHA512;
6561- expectedMgf = CKG_MGF1_SHA1 ;
6561+ expectedMgf = CKG_MGF1_SHA512 ;
65626562 // PKCS#11 2.40 draft 2 section 2.1.8: input length <= k-2-2hashLen
65636563 if (keydata.size () > modulus_length - 2 - 2 * 512 / 8 )
65646564 return CKR_KEY_SIZE_RANGE;
0 commit comments