diff options
| author | Frank Denis <124872+jedisct1@users.noreply.github.com> | 2023-03-22 07:17:52 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-03-22 06:17:52 +0000 |
| commit | 84b89d7cfe452f91fa22f2646ef53a3a7e990456 (patch) | |
| tree | f3ead35a68c20339cdaf42ec7753e5e85c001fad /test/behavior/array.zig | |
| parent | 87e07d8671b469431340c615dcdd5a5332d198ec (diff) | |
| download | zig-84b89d7cfe452f91fa22f2646ef53a3a7e990456.tar.gz zig-84b89d7cfe452f91fa22f2646ef53a3a7e990456.zip | |
crypto.hmac: set the recommended key size to the block size (#15031)
HMAC supports arbitrary key sizes, and there are no practical reasons
to use more than 256 bit keys.
It still makes sense to match the security level, though, especially
since a distinction between the block size and the key size can be
confusing.
Using HMAC.key_size instead of HMAC.mac_size caused our TLS
implementation to compute wrong shared secrets when SHA-384 was
used. So, fix it directly in `crypto.hmac` in order to prevent
other misuses.
Diffstat (limited to 'test/behavior/array.zig')
0 files changed, 0 insertions, 0 deletions
