Require explicitly supplied truncation length
Instead of providing default truncation lengths (based on RFC or otherwise), this change imposes a restriction that the truncation length must be supplied for all auth or aead algorithms. Bug: 77204048 Test: Updated tests, ran on walleye Change-Id: I4a0e2e71aa97259e56f44e7c8a2ce53135708d97
This commit is contained in:
@@ -62,7 +62,8 @@ public class IpSecConfigTest {
|
||||
c.setAuthentication(
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.AUTH_HMAC_MD5,
|
||||
new byte[] {1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF, 0}));
|
||||
new byte[] {1, 2, 3, 4, 5, 6, 7, 8, 9, 0xA, 0xB, 0xC, 0xD, 0xE, 0xF, 0},
|
||||
128));
|
||||
c.setAuthenticatedEncryption(
|
||||
new IpSecAlgorithm(
|
||||
IpSecAlgorithm.AUTH_CRYPT_AES_GCM,
|
||||
|
||||
Reference in New Issue
Block a user