diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-09-11 19:52:19 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-09-11 19:52:19 -0500 |
commit | c48abb09571f7ade75612c8f254ca76df41ac80d (patch) | |
tree | 54f10fc2033a14ea63f0aba3a60135d0b634af9b /cryptography | |
parent | ed54991dc764cb5374cc33e7b98c7284b75d4651 (diff) | |
download | cryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.tar.gz cryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.tar.bz2 cryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.zip |
moved GCM tests to be run against all backends, added radar bug numbers
Diffstat (limited to 'cryptography')
-rw-r--r-- | cryptography/hazmat/backends/commoncrypto/ciphers.py | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/cryptography/hazmat/backends/commoncrypto/ciphers.py b/cryptography/hazmat/backends/commoncrypto/ciphers.py index 4f723487..6d3ba863 100644 --- a/cryptography/hazmat/backends/commoncrypto/ciphers.py +++ b/cryptography/hazmat/backends/commoncrypto/ciphers.py @@ -155,6 +155,7 @@ class _GCMCipherContext(object): # call to authenticate_additional_data will result in null byte output # for ciphertext. The following empty byte string call prevents the # issue, which is present in at least 10.8 and 10.9. + # Filed as rdar://18314544 self.authenticate_additional_data(b"") def update(self, data): @@ -173,6 +174,7 @@ class _GCMCipherContext(object): # call to update. If you pass just AAD and call finalize without a call # to update you'll get null bytes for tag. The following update call # prevents this issue, which is present in at least 10.8 and 10.9. + # Filed as rdar://18314580 self.update(b"") tag_size = self._cipher.block_size // 8 tag_buf = self._backend._ffi.new("unsigned char[]", tag_size) |