diff options
author | Matt Caswell <matt@openssl.org> | 2021-10-11 13:12:49 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2021-10-22 08:43:27 +0100 |
commit | cff7d58eb4c8e0ef43e2fd0b12bc067bd3540e2c (patch) | |
tree | 9897e61b1d3fd005e69f8a48675e61d0f21ce7c8 /test | |
parent | 61adb6cf950b65a7bfce9a8d78a7744dfae9f978 (diff) |
Fix test_CMAC_keygen
Make sure we correctly pass through the size of the buffer to
EVP_DigestSignFinal
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16789)
Diffstat (limited to 'test')
-rw-r--r-- | test/evp_extra_test.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c index 33c5a5b7e6..b241387b5e 100644 --- a/test/evp_extra_test.c +++ b/test/evp_extra_test.c @@ -2070,7 +2070,7 @@ static int get_cmac_val(EVP_PKEY *pkey, unsigned char *mac) { EVP_MD_CTX *mdctx = EVP_MD_CTX_new(); const char msg[] = "Hello World"; - size_t maclen; + size_t maclen = AES_BLOCK_SIZE; int ret = 1; if (!TEST_ptr(mdctx) |