From bbecbf2b3726630aeb79ed6cee68079df9727095 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Niels=20M=C3=B6ller?= <nisse@lysator.liu.se> Date: Fri, 11 Apr 2014 16:08:31 +0200 Subject: [PATCH] In aead tests, use aead->digest_size. --- ChangeLog | 2 ++ testsuite/testutils.c | 8 ++++---- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/ChangeLog b/ChangeLog index 8ec42181..b69a29c2 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,7 @@ 2014-04-11 Niels Möller <nisse@lysator.liu.se> + * testsuite/testutils.c (test_aead): Use aead->digest_size. + * configure.ac: Skip GMP tests if public key support is disabled. * eax.c (block16_xor): Fixed bug effecting 32-bit platforms. diff --git a/testsuite/testutils.c b/testsuite/testutils.c index 4fa3a18d..b273bece 100644 --- a/testsuite/testutils.c +++ b/testsuite/testutils.c @@ -478,19 +478,19 @@ test_aead(const struct nettle_aead *aead, { void *ctx = xalloc(aead->context_size); uint8_t *data; - uint8_t *buffer = xalloc(aead->block_size); + uint8_t *buffer = xalloc(aead->digest_size); size_t length; ASSERT (cleartext->length == ciphertext->length); length = cleartext->length; ASSERT (key->length == aead->key_size); - ASSERT (digest->length <= aead->block_size); + ASSERT (digest->length <= aead->digest_size); data = xalloc(length); /* encryption */ - memset(buffer, 0, aead->block_size); + memset(buffer, 0, aead->digest_size); aead->set_encrypt_key(ctx, key->data); if (nonce->length != aead->nonce_size) @@ -513,7 +513,7 @@ test_aead(const struct nettle_aead *aead, ASSERT(MEMEQ(digest->length, buffer, digest->data)); /* decryption */ - memset(buffer, 0, aead->block_size); + memset(buffer, 0, aead->digest_size); aead->set_decrypt_key(ctx, key->data); -- GitLab