/test/ |
A D | bio_comp_test.c | 37 static int do_bio_comp_test(const BIO_METHOD *meth, size_t size) in do_bio_comp_test() argument 54 osize = BIO_write(bcomp, original, (int)size); in do_bio_comp_test() 55 if (!TEST_int_eq(osize, (int)size) in do_bio_comp_test() 65 rsize = BIO_read(bexp, result, (int)size); in do_bio_comp_test() 67 if (!TEST_int_eq((int)size, rsize) in do_bio_comp_test() 83 int size = sizes[n % 4]; in do_bio_comp() local 94 TEST_info("zeros of size %d\n", size); in do_bio_comp() 98 TEST_info("ones of size %d\n", size); in do_bio_comp() 102 TEST_info("sequential of size %d\n", size); in do_bio_comp() 107 TEST_info("random of size %d\n", size); in do_bio_comp() [all …]
|
A D | params_conversion_test.c | 32 size_t size; member 140 pc->size = sizeof(ref_i32); in param_conversion_load_stanza() 149 pc->size = sizeof(ref_i64); in param_conversion_load_stanza() 158 pc->size = sizeof(ref_u32); in param_conversion_load_stanza() 167 pc->size = sizeof(ref_u64); in param_conversion_load_stanza() 176 pc->size = sizeof(ref_d); in param_conversion_load_stanza() 206 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 227 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 248 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 269 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() [all …]
|
A D | modes_internal_test.c | 28 size_t size; member 189 size_t len = aes_cts128_vectors[num].size; in execute_cts128() 196 size_t tail, size; in execute_cts128() local 216 if (!TEST_true(len == size || len + 16 == size) in execute_cts128() 858 if (A.size == 1) in test_gcm128() 860 if (P.size == 1) in test_gcm128() 862 if (C.size == 1) in test_gcm128() 869 memset(out, 0, P.size); in test_gcm128() 877 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128() 881 memset(out, 0, P.size); in test_gcm128() [all …]
|
A D | bio_pw_callback_test.c | 72 static int callback_copy_password(char *buf, int size) in callback_copy_password() argument 99 memset(buf, 'e', size); in callback_copy_password() 100 ret = size; in callback_copy_password() 103 memset(buf, 'e', size); in callback_copy_password() 110 static int read_callback(char *buf, int size, int rwflag, void *u) in read_callback() argument 122 if (!TEST_int_gt(size, 0)) in read_callback() 126 ret = callback_copy_password(buf, size); in read_callback() 132 static int write_callback(char *buf, int size, int rwflag, void *u) in write_callback() argument 144 if (!TEST_int_gt(size, 0)) in write_callback() 148 ret = callback_copy_password(buf, size); in write_callback() [all …]
|
A D | quic_stream_test.c | 355 if (rec_len > size) { in test_single_copy_read() 356 rec_len = size; in test_single_copy_read() 360 size -= rec_len; in test_single_copy_read() 366 if (*fin || size == 0) in test_single_copy_read() 507 queued_min = off + size; in test_rstream_random() 513 if (queued_max < off + size) in test_rstream_random() 514 queued_max = off + size; in test_rstream_random() 524 if (off + size > data_size) in test_rstream_random() 525 off = data_size - size; in test_rstream_random() 527 queued_min = off + size; in test_rstream_random() [all …]
|
A D | secmemtest.c | 139 const int size = 64; in test_sec_mem_clear() local 144 || !TEST_ptr(p = OPENSSL_secure_malloc(size))) in test_sec_mem_clear() 147 for (i = 0; i < size; i++) in test_sec_mem_clear() 151 for (i = 0; i < size; i++) in test_sec_mem_clear() 163 for (i = sizeof(void *) * 2; i < size; i++) in test_sec_mem_clear()
|
A D | mem_alloc_test.c | 66 size_t size; member 96 size_t size; member 154 size_t size; member 431 size_t sz = td->nmemb * td->size; in test_xalloc() 519 size_t sz = nmemb * td->size; in test_xrealloc() 520 size_t old_sz = old_nmemb * td->size; in test_xrealloc() 572 td->size, in test_xrealloc() 575 ret = CRYPTO_realloc_array(ret, nmemb, td->size, in test_xrealloc() 602 size_t check_sz = MIN(td->orig_nmemb * td->size, in test_xrealloc() 603 td->new_nmemb * td->size); in test_xrealloc() [all …]
|
A D | poly1305_internal_test.c | 20 size_t size; member 1511 size_t inlen = test.input.size; in test_poly1305() 1514 size_t expectedlen = test.expected.size; in test_poly1305()
|
A D | timing_load_creds.c | 41 static void readx509(const char *contents, int size) in readx509() argument 44 BIO *b = BIO_new_mem_buf(contents, size); in readx509() 59 static void readpkey(const char *contents, int size) in readpkey() argument 61 BIO *b = BIO_new_mem_buf(contents, size); in readpkey()
|
A D | uitest.c | 21 static int test_pem_password_cb(char *buf, int size, int rwflag, void *userdata) in test_pem_password_cb() argument 23 OPENSSL_strlcpy(buf, (char *)userdata, (size_t)size); in test_pem_password_cb()
|
A D | quic_cc_test.c | 81 size_t size; member 185 pkt->size = sz; in net_sim_send() 214 s->spare_capacity += pkt->size; in net_sim_process_one() 235 loss_info.tx_size = pkt->size; in net_sim_process_one() 243 s->total_lost += pkt->size; in net_sim_process_one() 250 ack_info.tx_size = pkt->size; in net_sim_process_one() 255 s->total_acked += pkt->size; in net_sim_process_one()
|
A D | bio_core_test.c | 31 static int tst_bio_core_gets(OSSL_CORE_BIO *bio, char *buf, int size) in tst_bio_core_gets() argument 33 return BIO_gets(bio->bio, buf, size); in tst_bio_core_gets()
|
A D | siphash_internal_test.c | 21 size_t size; member 177 size_t expectedlen = test.expected.size; in test_siphash()
|
A D | evp_extra_test2.c | 254 size_t size; member 597 size_t input_len = ak->size; in test_d2i_AutoPrivateKey_ex() 762 if (!TEST_ptr(key_bio = BIO_new_mem_buf(keydata[id].kder, (int)keydata[id].size))) in test_d2i_PrivateKey_ex() 790 (int)keydata[testid].size))) in test_PEM_read_bio_negative() 1220 ret = TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, (long)keydata[0].size, in test_pkey_todata_null() 1243 ret = TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, (long)keydata[0].size, in test_pkey_export_null() 1260 int pdata_len = (int)keydata[0].size; in test_pkey_export() 1274 pdata_len = (int)keydata[0].size; in test_pkey_export() 1308 ret = TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, (long)keydata[0].size, in test_rsa_pss_sign()
|
A D | decoder_propq_test.c | 42 static int passcb(char *buf, int size, int rwflag, void *userdata) in passcb() argument
|
A D | cmp_protect_test.c | 214 const int size = sizeof(rand_data) / 2; in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() local 226 rand_data, size)) in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 228 rand_data + size, in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 229 size))) { in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key()
|
A D | asynciotest.c | 32 static int async_gets(BIO *bp, char *buf, int size); 276 static int async_gets(BIO *bio, char *buf, int size) in async_gets() argument
|
/test/ssl-tests/ |
A D | 13-fragmentation.cnf.in | 20 # Default fragment size is 512. 54 name => "small-app-data-large-fragment-size", 70 # Exceeds the 64kB write buffer size. 88 name => "large-app-data-large-fragment-size", 97 name => "large-app-data-odd-fragment-size", 107 # Default Application data size is 256. 190 # When the buffer / fragment size ratio is sufficiently large, 247 # Here fragment size == app data size < buffer size,
|
A D | 13-fragmentation.cnf | 9 test-4 = 4-small-app-data-large-fragment-size 13 test-8 = 8-large-app-data-large-fragment-size 14 test-9 = 9-large-app-data-odd-fragment-size 121 [4-small-app-data-large-fragment-size] 124 [4-small-app-data-large-fragment-size-ssl] 214 [8-large-app-data-large-fragment-size] 217 [8-large-app-data-large-fragment-size-ssl] 238 [9-large-app-data-odd-fragment-size] 241 [9-large-app-data-odd-fragment-size-ssl] 245 [9-large-app-data-odd-fragment-size-server] [all …]
|
/test/recipes/30-test_evp_data/ |
A D | evpmac_siphash.txt | 132 Ctrl = size:8 146 Ctrl = size:16 154 Ctrl = size:0 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 162 Ctrl = size:13 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 177 Ctrl = size:0 188 Ctrl = size:8
|
A D | evpmac_blake.txt | 179 Ctrl = size:128 185 Ctrl = size:1 191 Ctrl = size:32 199 Ctrl = size:32 235 Ctrl = size:64 240 Ctrl = size:16 246 Ctrl = size:16
|
A D | evpmac_common.txt | 423 Ctrl = size:32 444 Ctrl = size:64 467 Ctrl = size:32 488 Ctrl = size:64 498 Ctrl = size:51 522 Ctrl = size:32 585 Ctrl = size:3 595 Ctrl = size:3 606 Ctrl = size:3 618 Ctrl = size:3 [all …]
|
A D | evpkdf_argon2.txt | 152 Ctrl.size = size:3
|
/test/helpers/ |
A D | noisydgrambio.c | 19 size_t size; member 131 limit->size_sum -= limit->pinfos[idx].size; in bandwidth_limit() 156 limit->size_sum -= limit->pinfos[limit->start].size; in bandwidth_limit() 162 limit->pinfos[end].size = pktsize; in bandwidth_limit()
|
A D | ssltestlib.c | 38 static int tls_dump_gets(BIO *bp, char *buf, int size); 245 static int tls_dump_gets(BIO *bio, char *buf, int size) in tls_dump_gets() argument 289 static int mempacket_test_gets(BIO *bp, char *buf, int size); 743 static int mempacket_test_gets(BIO *bio, char *buf, int size) in mempacket_test_gets() argument 759 static int always_retry_gets(BIO *bp, char *buf, int size); 841 static int always_retry_gets(BIO *bio, char *buf, int size) in always_retry_gets() argument
|