diff options
author | Olivier Roques <oroques@cisco.com> | 2022-11-17 11:26:23 +0000 |
---|---|---|
committer | Olivier Roques <oroques+fdio@cisco.com> | 2022-11-22 13:07:51 +0000 |
commit | a5f7941f49160021506ecae0da090f0b204b75ea (patch) | |
tree | fefbd3c7837c319deeae624c41b2280ecace8f4f /libtransport/src/test/test_auth.cc | |
parent | b72257cade6be6fb09738f228d3b961321ca25f3 (diff) |
feat(auth): add support for ED25519 and ED448
Ref: HICN-818
Signed-off-by: Olivier Roques <oroques@cisco.com>
Change-Id: I8672f022b74be387e16496660a78edf3c1da4bf1
Diffstat (limited to 'libtransport/src/test/test_auth.cc')
-rw-r--r-- | libtransport/src/test/test_auth.cc | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/libtransport/src/test/test_auth.cc b/libtransport/src/test/test_auth.cc index 2ee3c0776..5440d3741 100644 --- a/libtransport/src/test/test_auth.cc +++ b/libtransport/src/test/test_auth.cc @@ -122,7 +122,7 @@ TEST_F(AuthTest, AsymmetricBufferRSA) { std::shared_ptr<AsymmetricVerifier> verif = std::make_shared<AsymmetricVerifier>(pubKey); - bool res = verif->verifyBuffer(buffer, sig, CryptoHashType::SHA256); + bool res = verif->verifyBuffer(buffer, sig, CryptoSuite::RSA_SHA256); EXPECT_EQ(res, true); } @@ -160,7 +160,7 @@ TEST_F(AuthTest, AsymmetricBufferDSA) { std::shared_ptr<AsymmetricVerifier> verif = std::make_shared<AsymmetricVerifier>(pubKey); - bool res = verif->verifyBuffer(buffer, sig, CryptoHashType::SHA256); + bool res = verif->verifyBuffer(buffer, sig, CryptoSuite::RSA_SHA256); EXPECT_EQ(res, true); } @@ -235,7 +235,7 @@ TEST_F(AuthTest, AsymmetricBufferECDSA) { std::shared_ptr<AsymmetricVerifier> verif = std::make_shared<AsymmetricVerifier>(pubKey); - bool res = verif->verifyBuffer(buffer, sig, CryptoHashType::SHA256); + bool res = verif->verifyBuffer(buffer, sig, CryptoSuite::RSA_SHA256); EXPECT_EQ(res, true); } // namespace auth @@ -290,7 +290,7 @@ TEST_F(AuthTest, HMACbuffer) { signer->signBuffer(buffer); utils::MemBuf::Ptr sig = signer->getSignature(); SymmetricVerifier hmac(PASSPHRASE); - bool res = hmac.verifyBuffer(buffer, sig, CryptoHashType::SHA256); + bool res = hmac.verifyBuffer(buffer, sig, CryptoSuite::RSA_SHA256); EXPECT_EQ(res, true); } |