diff --git a/tests/queries/0_stateless/01318_encrypt.reference b/tests/queries/0_stateless/01318_encrypt.reference index dbf8e62a562..e423bcf24fb 100644 --- a/tests/queries/0_stateless/01318_encrypt.reference +++ b/tests/queries/0_stateless/01318_encrypt.reference @@ -1,6 +1,3 @@ -UInt64 5417DEA8D67A1A03FD561809C62402FF -Float64 9B66D0AA685DC0F1EFFA2E385F7EA2F2 -Decimal64 5417DEA8D67A1A03FD561809C62402FF MySQL-compatitable mode, with key folding, no length checks, etc. aes-128-cbc B2EB028BC2236566A946085E65A5632B aes-128-cbc 25026C55954363AEF90325822218C370 diff --git a/tests/queries/0_stateless/01318_encrypt.sql b/tests/queries/0_stateless/01318_encrypt.sql index 087e8a5bc94..0e55a9a2aee 100644 --- a/tests/queries/0_stateless/01318_encrypt.sql +++ b/tests/queries/0_stateless/01318_encrypt.sql @@ -48,14 +48,6 @@ SELECT aes_encrypt_mysql('aes-128-ecb', 'text', 'key', 'IV', 1213); --{serverErr SELECT encrypt('aes-128-ecb', 'text', 'key', 'IV', 1213); --{serverError 43} bad AAD type SELECT encrypt('aes-128-gcm', 'text', 'key', 'IV', 1213); --{serverError 43} bad AAD type ------------------------------------------------------------------------------------------ --- Valid cases ------------------------------------------------------------------------------------------ - -SELECT 'UInt64', hex(aes_encrypt_mysql('aes-128-ecb', 123456789101112, 'keykeykeykeykeykeykeykeykeykeyke')); -SELECT 'Float64', hex(aes_encrypt_mysql('aes-128-ecb', 1234567891011.12, 'keykeykeykeykeykeykeykeykeykeyke')); -SELECT 'Decimal64', hex(aes_encrypt_mysql('aes-128-ecb', toDecimal64(1234567891011.12, 2), 'keykeykeykeykeykeykeykeykeykeyke')); - ----------------------------------------------------------------------------------------- -- Validate against predefined ciphertext,plaintext,key and IV for MySQL compatibility mode -----------------------------------------------------------------------------------------