Have a couple of SipHash test uses the EVP_PKEY method
Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/7494)
This commit is contained in:
parent
14f61f81f2
commit
9f2e18111e
1 changed files with 9 additions and 1 deletions
|
@ -118,7 +118,7 @@ Key = 000102030405060708090A0B0C0D0E0F
|
|||
Input = 0001020304050607
|
||||
Output = 3b62a9ba6258f5610f83e264f31497b4
|
||||
|
||||
MAC = SipHash
|
||||
MAC = SipHash by EVP_PKEY
|
||||
Key = 000102030405060708090A0B0C0D0E0F
|
||||
Input = 000102030405060708
|
||||
Output = 264499060ad9baabc47f8b02bb6d71ed
|
||||
|
@ -159,6 +159,14 @@ Ctrl = digestsize:13
|
|||
Key = 000102030405060708090A0B0C0D0E0F
|
||||
Result = MAC_CTRL_ERROR
|
||||
|
||||
# SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
|
||||
# by EVP_PKEY this time
|
||||
|
||||
MAC = SipHash by EVP_PKEY
|
||||
Ctrl = digestsize:13
|
||||
Key = 000102030405060708090A0B0C0D0E0F
|
||||
Result = EVPPKEYCTXCTRL_ERROR
|
||||
|
||||
Title = HMAC tests (from RFC2104 and others)
|
||||
|
||||
MAC = HMAC
|
||||
|
|
Loading…
Reference in a new issue