Add option for COSE protected header

Add option to generate and check the protected header of the COSE
envelope.

Change-Id: I5d298c5a5bb90ba32443c731d75400169c06de1c
Signed-off-by: Mate Toth-Pal <mate.toth-pal@arm.com>
diff --git a/iat-verifier/tests/test_verifier.py b/iat-verifier/tests/test_verifier.py
index 5e15895..7725039 100644
--- a/iat-verifier/tests/test_verifier.py
+++ b/iat-verifier/tests/test_verifier.py
@@ -25,13 +25,13 @@
     source_path = os.path.join(DATA_DIR, source_name)
     fd, dest_path = tempfile.mkstemp()
     os.close(fd)
-    convert_map_to_token_files(source_path, keyfile, verifier, dest_path)
+    convert_map_to_token_files(source_path, keyfile, verifier, dest_path, True)
     return dest_path
 
 
 def read_iat(filename, keyfile, verifier):
     filepath = os.path.join(DATA_DIR, filename)
-    raw_iat = extract_iat_from_cose(keyfile, filepath, verifier)
+    raw_iat = extract_iat_from_cose(keyfile, filepath, verifier, True)
     return verifier.decode_and_validate_iat(raw_iat)
 
 
@@ -50,10 +50,10 @@
         good_sig = create_token('valid-iat.yaml', KEYFILE, verifier)
         bad_sig = create_token('valid-iat.yaml', KEYFILE_ALT, verifier)
 
-        raw_iat = extract_iat_from_cose(KEYFILE, good_sig, verifier)
+        raw_iat = extract_iat_from_cose(KEYFILE, good_sig, verifier, True)
 
         with self.assertRaises(ValueError) as cm:
-            raw_iat = extract_iat_from_cose(KEYFILE, bad_sig, verifier)
+            raw_iat = extract_iat_from_cose(KEYFILE, bad_sig, verifier, True)
 
         self.assertIn('Bad signature', cm.exception.args[0])