Lines Matching refs:expected

100                               const void *expected, size_t expected_len,  in memory_err_compare()  argument
106 r = !TEST_mem_ne(expected, expected_len, got, got_len); in memory_err_compare()
108 r = TEST_mem_eq(expected, expected_len, got, got_len); in memory_err_compare()
401 DIGEST_DATA *expected = t->data; in digest_test_run() local
414 got = OPENSSL_malloc(expected->output_len > EVP_MAX_MD_SIZE ? in digest_test_run()
415 expected->output_len : EVP_MAX_MD_SIZE); in digest_test_run()
419 if (!EVP_DigestInit_ex(mctx, expected->digest, NULL)) { in digest_test_run()
423 if (expected->pad_type > 0) { in digest_test_run()
425 &expected->pad_type); in digest_test_run()
432 if (!evp_test_buffer_do(expected->input, digest_update_fn, mctx)) { in digest_test_run()
437 xof = (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0; in digest_test_run()
461 got_len = expected->output_len; in digest_test_run()
472 if (!TEST_int_eq(expected->output_len, got_len)) { in digest_test_run()
477 expected->output, expected->output_len, in digest_test_run()
484 if (sk_EVP_TEST_BUFFER_num(expected->input) == 1 in digest_test_run()
487 && !TEST_ptr(inbuf = sk_EVP_TEST_BUFFER_value(expected->input, 0)) in digest_test_run()
491 EVP_MD_get0_name(expected->fetched_digest), in digest_test_run()
495 expected->output, expected->output_len)) { in digest_test_run()
692 CIPHER_DATA *expected = t->data; in cipher_test_enc() local
706 in = expected->plaintext; in cipher_test_enc()
707 in_len = expected->plaintext_len; in cipher_test_enc()
708 expected_out = expected->ciphertext; in cipher_test_enc()
709 out_len = expected->ciphertext_len; in cipher_test_enc()
711 in = expected->ciphertext; in cipher_test_enc()
712 in_len = expected->ciphertext_len; in cipher_test_enc()
713 expected_out = expected->plaintext; in cipher_test_enc()
714 out_len = expected->plaintext_len; in cipher_test_enc()
739 if (!EVP_CipherInit_ex(ctx_base, expected->cipher, NULL, NULL, NULL, enc)) { in cipher_test_enc()
743 if (expected->cts_mode != NULL) { in cipher_test_enc()
747 (char *)expected->cts_mode, in cipher_test_enc()
755 if (expected->iv) { in cipher_test_enc()
756 if (expected->aead) { in cipher_test_enc()
758 expected->iv_len, 0)) { in cipher_test_enc()
762 } else if (expected->iv_len != (size_t)EVP_CIPHER_CTX_get_iv_length(ctx_base)) { in cipher_test_enc()
767 if (expected->aead && !expected->tls_aad) { in cipher_test_enc()
773 if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) { in cipher_test_enc()
778 tag = expected->tag; in cipher_test_enc()
780 if (tag || expected->aead != EVP_CIPH_GCM_MODE) { in cipher_test_enc()
782 expected->tag_len, tag)) in cipher_test_enc()
787 if (expected->rounds > 0) { in cipher_test_enc()
788 int rounds = (int)expected->rounds; in cipher_test_enc()
796 if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) { in cipher_test_enc()
800 if (expected->key_bits > 0) { in cipher_test_enc()
801 int bits = (int)expected->key_bits; in cipher_test_enc()
808 if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) { in cipher_test_enc()
814 if (expected->iv != NULL) { in cipher_test_enc()
818 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 in cipher_test_enc()
819 && !TEST_mem_eq(expected->iv, expected->iv_len, iv, in cipher_test_enc()
820 expected->iv_len))) { in cipher_test_enc()
837 if (expected->mac_key != NULL in cipher_test_enc()
839 (int)expected->mac_key_len, in cipher_test_enc()
840 (void *)expected->mac_key)) { in cipher_test_enc()
845 if (expected->tls_version) { in cipher_test_enc()
849 &expected->tls_version); in cipher_test_enc()
857 if (expected->aead == EVP_CIPH_CCM_MODE) { in cipher_test_enc()
863 if (expected->aad[0] != NULL && !expected->tls_aad) { in cipher_test_enc()
866 for (i = 0; expected->aad[i] != NULL; i++) { in cipher_test_enc()
867 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], in cipher_test_enc()
868 expected->aad_len[i])) in cipher_test_enc()
875 for (i = 0; expected->aad[i] != NULL; i++) { in cipher_test_enc()
876 if (expected->aad_len[i] > 0) { in cipher_test_enc()
877 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 1)) in cipher_test_enc()
881 if (expected->aad_len[i] > 2) { in cipher_test_enc()
883 expected->aad[i] + donelen, in cipher_test_enc()
884 expected->aad_len[i] - 2)) in cipher_test_enc()
886 donelen += expected->aad_len[i] - 2; in cipher_test_enc()
888 if (expected->aad_len[i] > 1 in cipher_test_enc()
890 expected->aad[i] + donelen, 1)) in cipher_test_enc()
896 if (expected->tls_aad) { in cipher_test_enc()
901 if ((tls_aad = OPENSSL_memdup(expected->aad[0], in cipher_test_enc()
902 expected->aad_len[0])) == NULL) in cipher_test_enc()
906 expected->aad_len[0]); in cipher_test_enc()
914 } else if (!enc && (expected->aead == EVP_CIPH_OCB_MODE in cipher_test_enc()
915 || expected->tag_late)) { in cipher_test_enc()
917 expected->tag_len, expected->tag)) { in cipher_test_enc()
958 if (!enc && expected->tls_aad) { in cipher_test_enc()
959 if (expected->tls_version >= TLS1_1_VERSION in cipher_test_enc()
960 && (EVP_CIPHER_is_a(expected->cipher, "AES-128-CBC-HMAC-SHA1") in cipher_test_enc()
961 || EVP_CIPHER_is_a(expected->cipher, "AES-256-CBC-HMAC-SHA1"))) { in cipher_test_enc()
962 tmplen -= expected->iv_len; in cipher_test_enc()
963 expected_out += expected->iv_len; in cipher_test_enc()
964 out_misalign += expected->iv_len; in cipher_test_enc()
972 if (enc && expected->aead && !expected->tls_aad) { in cipher_test_enc()
975 if (!TEST_size_t_le(expected->tag_len, sizeof(rtag))) { in cipher_test_enc()
980 expected->tag_len, rtag)) { in cipher_test_enc()
985 expected->tag, expected->tag_len, in cipher_test_enc()
986 rtag, expected->tag_len)) in cipher_test_enc()
990 if (expected->next_iv != NULL) { in cipher_test_enc()
994 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 in cipher_test_enc()
995 && !TEST_mem_eq(expected->next_iv, expected->iv_len, iv, in cipher_test_enc()
996 expected->iv_len))) { in cipher_test_enc()
1278 MAC_DATA *expected = t->data; in mac_test_run_pkey() local
1289 if (expected->xof) in mac_test_run_pkey()
1292 if (expected->alg == NULL) in mac_test_run_pkey()
1293 TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type)); in mac_test_run_pkey()
1296 OBJ_nid2sn(expected->type), expected->alg); in mac_test_run_pkey()
1298 if (expected->type == EVP_PKEY_CMAC) { in mac_test_run_pkey()
1300 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1307 if (expected->alg != NULL && is_cipher_disabled(expected->alg)) { in mac_test_run_pkey()
1308 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1313 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, NULL))) { in mac_test_run_pkey()
1318 key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len, in mac_test_run_pkey()
1324 OBJ_nid2sn(expected->type), NULL, in mac_test_run_pkey()
1325 expected->key, expected->key_len); in mac_test_run_pkey()
1332 if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) { in mac_test_run_pkey()
1333 if (is_digest_disabled(expected->alg)) { in mac_test_run_pkey()
1334 TEST_info("skipping, HMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1339 mdname = expected->alg; in mac_test_run_pkey()
1349 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) in mac_test_run_pkey()
1351 sk_OPENSSL_STRING_value(expected->controls, in mac_test_run_pkey()
1356 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { in mac_test_run_pkey()
1370 expected->output, expected->output_len, in mac_test_run_pkey()
1387 MAC_DATA *expected = t->data; in mac_test_run_mac() local
1396 EVP_MAC_settable_ctx_params(expected->mac); in mac_test_run_mac()
1399 if (expected->alg == NULL) in mac_test_run_mac()
1400 TEST_info("Trying the EVP_MAC %s test", expected->mac_name); in mac_test_run_mac()
1403 expected->mac_name, expected->alg); in mac_test_run_mac()
1405 if (expected->alg != NULL) { in mac_test_run_mac()
1415 expected->alg, 0); in mac_test_run_mac()
1420 expected->alg, 0); in mac_test_run_mac()
1426 if (expected->custom != NULL) in mac_test_run_mac()
1429 expected->custom, in mac_test_run_mac()
1430 expected->custom_len); in mac_test_run_mac()
1431 if (expected->salt != NULL) in mac_test_run_mac()
1434 expected->salt, in mac_test_run_mac()
1435 expected->salt_len); in mac_test_run_mac()
1436 if (expected->iv != NULL) in mac_test_run_mac()
1439 expected->iv, in mac_test_run_mac()
1440 expected->iv_len); in mac_test_run_mac()
1443 if (params_n + sk_OPENSSL_STRING_num(expected->controls) in mac_test_run_mac()
1449 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) { in mac_test_run_mac()
1451 char *value = sk_OPENSSL_STRING_value(expected->controls, i); in mac_test_run_mac()
1476 if ((ctx = EVP_MAC_CTX_new(expected->mac)) == NULL) { in mac_test_run_mac()
1481 if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) { in mac_test_run_mac()
1485 if (expected->output_size >= 0) in mac_test_run_mac()
1488 if (expected->block_size >= 0) in mac_test_run_mac()
1497 if (expected->output_size >= 0 in mac_test_run_mac()
1498 && !TEST_int_eq(output_size, expected->output_size)) { in mac_test_run_mac()
1502 if (expected->block_size >= 0 in mac_test_run_mac()
1503 && !TEST_int_eq(block_size, expected->block_size)) { in mac_test_run_mac()
1508 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { in mac_test_run_mac()
1512 xof = expected->xof; in mac_test_run_mac()
1514 if (!TEST_ptr(got = OPENSSL_malloc(expected->output_len))) { in mac_test_run_mac()
1518 if (!EVP_MAC_finalXOF(ctx, got, expected->output_len) in mac_test_run_mac()
1520 expected->output, expected->output_len, in mac_test_run_mac()
1521 got, expected->output_len)) { in mac_test_run_mac()
1536 expected->output, expected->output_len, in mac_test_run_mac()
1547 if (!TEST_true(EVP_Q_mac(libctx, expected->mac_name, NULL, in mac_test_run_mac()
1548 expected->alg, params, in mac_test_run_mac()
1549 expected->key, expected->key_len, in mac_test_run_mac()
1550 expected->input, expected->input_len, in mac_test_run_mac()
1553 expected->output, expected->output_len)) { in mac_test_run_mac()
1569 MAC_DATA *expected = t->data; in mac_test_run() local
1571 if (expected->mac != NULL) in mac_test_run()
1701 PKEY_DATA *expected = t->data; in pkey_test_run() local
1706 if (expected->keyop(expected->ctx, NULL, &got_len, in pkey_test_run()
1707 expected->input, expected->input_len) <= 0 in pkey_test_run()
1712 if (expected->keyop(expected->ctx, got, &got_len, in pkey_test_run()
1713 expected->input, expected->input_len) <= 0) { in pkey_test_run()
1718 expected->output, expected->output_len, in pkey_test_run()
1727 if (!TEST_ptr(copy = EVP_PKEY_CTX_dup(expected->ctx))) { in pkey_test_run()
1731 if (expected->keyop(copy, NULL, &got_len, expected->input, in pkey_test_run()
1732 expected->input_len) <= 0 in pkey_test_run()
1737 if (expected->keyop(copy, got, &got_len, expected->input, in pkey_test_run()
1738 expected->input_len) <= 0) { in pkey_test_run()
1743 expected->output, expected->output_len, in pkey_test_run()
1852 PKEY_DATA *expected = t->data; in pderive_test_run() local
1856 if (!TEST_ptr(dctx = EVP_PKEY_CTX_dup(expected->ctx))) { in pderive_test_run()
1874 expected->output, expected->output_len, in pderive_test_run()
2058 PBE_DATA *expected = t->data; in pbe_test_run() local
2065 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) { in pbe_test_run()
2069 if (expected->pbe_type == PBE_TYPE_PBKDF2) { in pbe_test_run()
2070 if (PKCS5_PBKDF2_HMAC((char *)expected->pass, expected->pass_len, in pbe_test_run()
2071 expected->salt, expected->salt_len, in pbe_test_run()
2072 expected->iter, expected->md, in pbe_test_run()
2073 expected->key_len, key) == 0) { in pbe_test_run()
2078 } else if (expected->pbe_type == PBE_TYPE_SCRYPT) { in pbe_test_run()
2079 if (EVP_PBE_scrypt((const char *)expected->pass, expected->pass_len, in pbe_test_run()
2080 expected->salt, expected->salt_len, in pbe_test_run()
2081 expected->N, expected->r, expected->p, in pbe_test_run()
2082 expected->maxmem, key, expected->key_len) == 0) { in pbe_test_run()
2087 } else if (expected->pbe_type == PBE_TYPE_PKCS12) { in pbe_test_run()
2088 fetched_digest = EVP_MD_fetch(libctx, EVP_MD_get0_name(expected->md), in pbe_test_run()
2094 if (PKCS12_key_gen_uni(expected->pass, expected->pass_len, in pbe_test_run()
2095 expected->salt, expected->salt_len, in pbe_test_run()
2096 expected->id, expected->iter, expected->key_len, in pbe_test_run()
2102 if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len, in pbe_test_run()
2103 key, expected->key_len)) in pbe_test_run()
2193 ENCODE_DATA *expected = t->data; in encode_test_run() local
2203 if (expected->encoding == BASE64_CANONICAL_ENCODING) { in encode_test_run()
2207 OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len)))) in encode_test_run()
2212 expected->input, expected->input_len))) in encode_test_run()
2221 expected->output, expected->output_len, in encode_test_run()
2227 OPENSSL_malloc(EVP_DECODE_LENGTH(expected->output_len)))) in encode_test_run()
2231 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output, in encode_test_run()
2232 expected->output_len) < 0) { in encode_test_run()
2244 if (expected->encoding != BASE64_INVALID_ENCODING in encode_test_run()
2246 expected->input, expected->input_len, in encode_test_run()
2438 RAND_DATA *expected = t->data; in rand_test_run() local
2441 size_t got_len = expected->generate_bits / 8; in rand_test_run()
2450 *p++ = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_USE_DF, &expected->use_df); in rand_test_run()
2451 if (expected->cipher != NULL) in rand_test_run()
2453 expected->cipher, 0); in rand_test_run()
2454 if (expected->digest != NULL) in rand_test_run()
2456 expected->digest, 0); in rand_test_run()
2459 if (!TEST_true(EVP_RAND_CTX_set_params(expected->ctx, params))) in rand_test_run()
2462 strength = EVP_RAND_get_strength(expected->ctx); in rand_test_run()
2463 for (i = 0; i <= expected->n; i++) { in rand_test_run()
2464 item = expected->data + i; in rand_test_run()
2474 if (!TEST_true(EVP_RAND_instantiate(expected->parent, strength, in rand_test_run()
2480 (expected->ctx, strength, in rand_test_run()
2481 expected->prediction_resistance, z, in rand_test_run()
2490 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2494 (expected->ctx, expected->prediction_resistance, in rand_test_run()
2504 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2508 (expected->ctx, got, got_len, in rand_test_run()
2509 strength, expected->prediction_resistance, in rand_test_run()
2518 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2522 (expected->ctx, got, got_len, in rand_test_run()
2523 strength, expected->prediction_resistance, in rand_test_run()
2528 if (!TEST_true(EVP_RAND_uninstantiate(expected->ctx)) in rand_test_run()
2529 || !TEST_true(EVP_RAND_uninstantiate(expected->parent)) in rand_test_run()
2530 || !TEST_true(EVP_RAND_verify_zeroization(expected->ctx)) in rand_test_run()
2531 || !TEST_int_eq(EVP_RAND_get_state(expected->ctx), in rand_test_run()
2540 TEST_info("Error in test case %d of %d\n", i, expected->n + 1); in rand_test_run()
2666 KDF_DATA *expected = t->data; in kdf_test_run() local
2668 size_t got_len = expected->output_len; in kdf_test_run()
2670 if (!EVP_KDF_CTX_set_params(expected->ctx, expected->params)) { in kdf_test_run()
2678 if (EVP_KDF_derive(expected->ctx, got, got_len, NULL) <= 0) { in kdf_test_run()
2683 expected->output, expected->output_len, in kdf_test_run()
2766 PKEY_KDF_DATA *expected = t->data; in pkey_kdf_test_run() local
2768 size_t got_len = expected->output_len; in pkey_kdf_test_run()
2774 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) { in pkey_kdf_test_run()
2778 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) { in pkey_kdf_test_run()
3153 DIGESTSIGN_DATA *expected = t->data; in digestsign_test_run() local
3157 if (!evp_test_buffer_do(expected->input, digestsign_update_fn, in digestsign_test_run()
3158 expected->ctx)) { in digestsign_test_run()
3163 if (!EVP_DigestSignFinal(expected->ctx, NULL, &got_len)) { in digestsign_test_run()
3171 if (!EVP_DigestSignFinal(expected->ctx, got, &got_len)) { in digestsign_test_run()
3176 expected->output, expected->output_len, in digestsign_test_run()
3235 DIGESTSIGN_DATA *expected = t->data; in oneshot_digestsign_test_run() local
3239 if (!EVP_DigestSign(expected->ctx, NULL, &got_len, in oneshot_digestsign_test_run()
3240 expected->osin, expected->osin_len)) { in oneshot_digestsign_test_run()
3248 if (!EVP_DigestSign(expected->ctx, got, &got_len, in oneshot_digestsign_test_run()
3249 expected->osin, expected->osin_len)) { in oneshot_digestsign_test_run()
3254 expected->output, expected->output_len, in oneshot_digestsign_test_run()