Have a couple of SipHash test uses the EVP_PKEY method
authorRichard Levitte <levitte@openssl.org>
Wed, 24 Oct 2018 22:29:02 +0000 (00:29 +0200)
committerRichard Levitte <levitte@openssl.org>
Tue, 30 Oct 2018 07:09:07 +0000 (08:09 +0100)
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/7494)

test/recipes/30-test_evp_data/evpmac.txt

index 7774f414b13b4c897bcde1929602f1cb32f651d4..4788626dc893603a390327e41329711a5396140e 100644 (file)
@@ -118,7 +118,7 @@ Key = 000102030405060708090A0B0C0D0E0F
 Input = 0001020304050607
 Output = 3b62a9ba6258f5610f83e264f31497b4
 
-MAC = SipHash
+MAC = SipHash by EVP_PKEY
 Key = 000102030405060708090A0B0C0D0E0F
 Input = 000102030405060708
 Output = 264499060ad9baabc47f8b02bb6d71ed
@@ -159,6 +159,14 @@ Ctrl = digestsize:13
 Key = 000102030405060708090A0B0C0D0E0F
 Result = MAC_CTRL_ERROR
 
+# SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
+# by EVP_PKEY this time
+
+MAC = SipHash by EVP_PKEY
+Ctrl = digestsize:13
+Key = 000102030405060708090A0B0C0D0E0F
+Result = EVPPKEYCTXCTRL_ERROR
+
 Title = HMAC tests (from RFC2104 and others)
 
 MAC = HMAC