aboutsummaryrefslogtreecommitdiffstats
path: root/cryptography
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2014-09-11 19:52:19 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2014-09-11 19:52:19 -0500
commitc48abb09571f7ade75612c8f254ca76df41ac80d (patch)
tree54f10fc2033a14ea63f0aba3a60135d0b634af9b /cryptography
parented54991dc764cb5374cc33e7b98c7284b75d4651 (diff)
downloadcryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.tar.gz
cryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.tar.bz2
cryptography-c48abb09571f7ade75612c8f254ca76df41ac80d.zip
moved GCM tests to be run against all backends, added radar bug numbers
Diffstat (limited to 'cryptography')
-rw-r--r--cryptography/hazmat/backends/commoncrypto/ciphers.py2
1 files changed, 2 insertions, 0 deletions
diff --git a/cryptography/hazmat/backends/commoncrypto/ciphers.py b/cryptography/hazmat/backends/commoncrypto/ciphers.py
index 4f723487..6d3ba863 100644
--- a/cryptography/hazmat/backends/commoncrypto/ciphers.py
+++ b/cryptography/hazmat/backends/commoncrypto/ciphers.py
@@ -155,6 +155,7 @@ class _GCMCipherContext(object):
# call to authenticate_additional_data will result in null byte output
# for ciphertext. The following empty byte string call prevents the
# issue, which is present in at least 10.8 and 10.9.
+ # Filed as rdar://18314544
self.authenticate_additional_data(b"")
def update(self, data):
@@ -173,6 +174,7 @@ class _GCMCipherContext(object):
# call to update. If you pass just AAD and call finalize without a call
# to update you'll get null bytes for tag. The following update call
# prevents this issue, which is present in at least 10.8 and 10.9.
+ # Filed as rdar://18314580
self.update(b"")
tag_size = self._cipher.block_size // 8
tag_buf = self._backend._ffi.new("unsigned char[]", tag_size)