Lines Matching defs:expected
94 * However, if there is expected to be an error and the actual error
95 * matches then the memory is expected to be different so handle this
99 const void *expected, size_t expected_len,
105 r = !TEST_mem_ne(expected, expected_len, got, got_len);
107 r = TEST_mem_eq(expected, expected_len, got, got_len);
400 DIGEST_DATA *expected = t->data;
413 got = OPENSSL_malloc(expected->output_len > EVP_MAX_MD_SIZE ?
414 expected->output_len : EVP_MAX_MD_SIZE);
418 if (!EVP_DigestInit_ex(mctx, expected->digest, NULL)) {
422 if (expected->pad_type > 0) {
424 &expected->pad_type);
431 if (!evp_test_buffer_do(expected->input, digest_update_fn, mctx)) {
436 xof = (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0;
460 got_len = expected->output_len;
471 if (!TEST_int_eq(expected->output_len, got_len)) {
476 expected->output, expected->output_len,
483 if (sk_EVP_TEST_BUFFER_num(expected->input) == 1
486 && !TEST_ptr(inbuf = sk_EVP_TEST_BUFFER_value(expected->input, 0))
490 EVP_MD_get0_name(expected->fetched_digest),
494 expected->output, expected->output_len)) {
693 CIPHER_DATA *expected = t->data;
707 in = expected->plaintext;
708 in_len = expected->plaintext_len;
709 expected_out = expected->ciphertext;
710 out_len = expected->ciphertext_len;
712 in = expected->ciphertext;
713 in_len = expected->ciphertext_len;
714 expected_out = expected->plaintext;
715 out_len = expected->plaintext_len;
740 if (!EVP_CipherInit_ex(ctx_base, expected->cipher, NULL, NULL, NULL, enc)) {
744 if (expected->cts_mode != NULL) {
748 (char *)expected->cts_mode,
756 if (expected->iv) {
757 if (expected->aead) {
759 expected->iv_len, 0) <= 0) {
763 } else if (expected->iv_len != (size_t)EVP_CIPHER_CTX_get_iv_length(ctx_base)) {
768 if (expected->aead && !expected->tls_aad) {
774 if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) {
779 tag = expected->tag;
781 if (tag || expected->aead != EVP_CIPH_GCM_MODE) {
783 expected->tag_len, tag) <= 0)
788 if (expected->rounds > 0) {
789 int rounds = (int)expected->rounds;
797 if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) {
801 if (expected->key_bits > 0) {
802 int bits = (int)expected->key_bits;
809 if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) {
815 if (expected->iv != NULL) {
819 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0
820 && !TEST_mem_eq(expected->iv, expected->iv_len, iv,
821 expected->iv_len))) {
838 if (expected->mac_key != NULL
840 (int)expected->mac_key_len,
841 (void *)expected->mac_key) <= 0) {
846 if (expected->tls_version) {
850 &expected->tls_version);
858 if (expected->aead == EVP_CIPH_CCM_MODE) {
864 if (expected->aad[0] != NULL && !expected->tls_aad) {
867 for (i = 0; expected->aad[i] != NULL; i++) {
868 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i],
869 expected->aad_len[i]))
876 for (i = 0; expected->aad[i] != NULL; i++) {
877 if (expected->aad_len[i] > 0) {
878 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 1))
882 if (expected->aad_len[i] > 2) {
884 expected->aad[i] + donelen,
885 expected->aad_len[i] - 2))
887 donelen += expected->aad_len[i] - 2;
889 if (expected->aad_len[i] > 1
891 expected->aad[i] + donelen, 1))
897 if (expected->tls_aad) {
902 if ((tls_aad = OPENSSL_memdup(expected->aad[0],
903 expected->aad_len[0])) == NULL)
907 expected->aad_len[0]);
915 } else if (!enc && (expected->aead == EVP_CIPH_OCB_MODE
916 || expected->tag_late)) {
918 expected->tag_len, expected->tag) <= 0) {
959 if (!enc && expected->tls_aad) {
960 if (expected->tls_version >= TLS1_1_VERSION
961 && (EVP_CIPHER_is_a(expected->cipher, "AES-128-CBC-HMAC-SHA1")
962 || EVP_CIPHER_is_a(expected->cipher, "AES-256-CBC-HMAC-SHA1"))) {
963 tmplen -= expected->iv_len;
964 expected_out += expected->iv_len;
965 out_misalign += expected->iv_len;
973 if (enc && expected->aead && !expected->tls_aad) {
976 if (!TEST_size_t_le(expected->tag_len, sizeof(rtag))) {
981 expected->tag_len, rtag) <= 0) {
986 expected->tag, expected->tag_len,
987 rtag, expected->tag_len))
991 if (expected->next_iv != NULL) {
995 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0
996 && !TEST_mem_eq(expected->next_iv, expected->iv_len, iv,
997 expected->iv_len))) {
1298 MAC_DATA *expected = t->data;
1309 if (expected->xof)
1312 if (expected->alg == NULL)
1313 TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type));
1316 OBJ_nid2sn(expected->type), expected->alg);
1318 if (expected->type == EVP_PKEY_CMAC) {
1320 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
1327 if (expected->alg != NULL && is_cipher_disabled(expected->alg)) {
1328 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
1333 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, NULL))) {
1338 key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len,
1344 OBJ_nid2sn(expected->type), NULL,
1345 expected->key, expected->key_len);
1352 if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) {
1353 if (is_digest_disabled(expected->alg)) {
1354 TEST_info("skipping, HMAC '%s' is disabled", expected->alg);
1359 mdname = expected->alg;
1369 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++)
1371 sk_OPENSSL_STRING_value(expected->controls,
1376 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1390 expected->output, expected->output_len,
1407 MAC_DATA *expected = t->data;
1416 EVP_MAC_settable_ctx_params(expected->mac);
1420 if (expected->alg == NULL)
1421 TEST_info("Trying the EVP_MAC %s test", expected->mac_name);
1424 expected->mac_name, expected->alg);
1426 if (expected->alg != NULL) {
1436 if (is_cipher_disabled(expected->alg))
1441 expected->alg, 0);
1444 if (is_digest_disabled(expected->alg))
1449 expected->alg, 0);
1455 TEST_info("skipping, algorithm '%s' is disabled", expected->alg);
1461 if (expected->custom != NULL)
1464 expected->custom,
1465 expected->custom_len);
1466 if (expected->salt != NULL)
1469 expected->salt,
1470 expected->salt_len);
1471 if (expected->iv != NULL)
1474 expected->iv,
1475 expected->iv_len);
1478 if (params_n + sk_OPENSSL_STRING_num(expected->controls)
1484 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) {
1486 char *value = sk_OPENSSL_STRING_value(expected->controls, i);
1511 if ((ctx = EVP_MAC_CTX_new(expected->mac)) == NULL) {
1516 if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) {
1520 if (expected->output_size >= 0)
1523 if (expected->block_size >= 0)
1532 if (expected->output_size >= 0
1533 && !TEST_int_eq(output_size, expected->output_size)) {
1537 if (expected->block_size >= 0
1538 && !TEST_int_eq(block_size, expected->block_size)) {
1544 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) {
1548 xof = expected->xof;
1550 if (!TEST_ptr(got = OPENSSL_malloc(expected->output_len))) {
1554 if (!EVP_MAC_finalXOF(ctx, got, expected->output_len)
1556 expected->output, expected->output_len,
1557 got, expected->output_len)) {
1572 expected->output, expected->output_len,
1584 if (expected->iv != NULL) {
1587 expected->iv,
1588 expected->iv_len);
1593 if (expected->no_reinit) {
1617 if (!TEST_true(EVP_Q_mac(libctx, expected->mac_name, NULL,
1618 expected->alg, params,
1619 expected->key, expected->key_len,
1620 expected->input, expected->input_len,
1623 expected->output, expected->output_len)) {
1639 MAC_DATA *expected = t->data;
1641 if (expected->mac != NULL)
1771 PKEY_DATA *expected = t->data;
1776 if (expected->keyop(expected->ctx, NULL, &got_len,
1777 expected->input, expected->input_len) <= 0
1782 if (expected->keyop(expected->ctx, got, &got_len,
1783 expected->input, expected->input_len) <= 0) {
1788 expected->output, expected->output_len,
1797 if (!TEST_ptr(copy = EVP_PKEY_CTX_dup(expected->ctx))) {
1801 if (expected->keyop(copy, NULL, &got_len, expected->input,
1802 expected->input_len) <= 0
1807 if (expected->keyop(copy, got, &got_len, expected->input,
1808 expected->input_len) <= 0) {
1813 expected->output, expected->output_len,
1967 PKEY_DATA *expected = t->data;
1971 if (!TEST_ptr(dctx = EVP_PKEY_CTX_dup(expected->ctx))) {
1990 expected->output, expected->output_len,
2174 PBE_DATA *expected = t->data;
2181 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) {
2185 if (expected->pbe_type == PBE_TYPE_PBKDF2) {
2186 if (PKCS5_PBKDF2_HMAC((char *)expected->pass, expected->pass_len,
2187 expected->salt, expected->salt_len,
2188 expected->iter, expected->md,
2189 expected->key_len, key) == 0) {
2194 } else if (expected->pbe_type == PBE_TYPE_SCRYPT) {
2195 if (EVP_PBE_scrypt((const char *)expected->pass, expected->pass_len,
2196 expected->salt, expected->salt_len,
2197 expected->N, expected->r, expected->p,
2198 expected->maxmem, key, expected->key_len) == 0) {
2203 } else if (expected->pbe_type == PBE_TYPE_PKCS12) {
2204 fetched_digest = EVP_MD_fetch(libctx, EVP_MD_get0_name(expected->md),
2210 if (PKCS12_key_gen_uni(expected->pass, expected->pass_len,
2211 expected->salt, expected->salt_len,
2212 expected->id, expected->iter, expected->key_len,
2218 if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len,
2219 key, expected->key_len))
2309 ENCODE_DATA *expected = t->data;
2319 if (expected->encoding == BASE64_CANONICAL_ENCODING) {
2323 OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len))))
2328 expected->input, expected->input_len)))
2337 expected->output, expected->output_len,
2343 OPENSSL_malloc(EVP_DECODE_LENGTH(expected->output_len))))
2347 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output,
2348 expected->output_len) < 0) {
2360 if (expected->encoding != BASE64_INVALID_ENCODING
2362 expected->input, expected->input_len,
2554 RAND_DATA *expected = t->data;
2557 size_t got_len = expected->generate_bits / 8;
2566 *p++ = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_USE_DF, &expected->use_df);
2567 if (expected->cipher != NULL)
2569 expected->cipher, 0);
2570 if (expected->digest != NULL)
2572 expected->digest, 0);
2575 if (!TEST_true(EVP_RAND_CTX_set_params(expected->ctx, params)))
2578 strength = EVP_RAND_get_strength(expected->ctx);
2579 for (i = 0; i <= expected->n; i++) {
2580 item = expected->data + i;
2590 if (!TEST_true(EVP_RAND_instantiate(expected->parent, strength,
2596 (expected->ctx, strength,
2597 expected->prediction_resistance, z,
2606 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2610 (expected->ctx, expected->prediction_resistance,
2620 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2624 (expected->ctx, got, got_len,
2625 strength, expected->prediction_resistance,
2634 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2638 (expected->ctx, got, got_len,
2639 strength, expected->prediction_resistance,
2644 if (!TEST_true(EVP_RAND_uninstantiate(expected->ctx))
2645 || !TEST_true(EVP_RAND_uninstantiate(expected->parent))
2646 || !TEST_true(EVP_RAND_verify_zeroization(expected->ctx))
2647 || !TEST_int_eq(EVP_RAND_get_state(expected->ctx),
2656 TEST_info("Error in test case %d of %d\n", i, expected->n + 1);
2782 KDF_DATA *expected = t->data;
2784 size_t got_len = expected->output_len;
2786 if (!EVP_KDF_CTX_set_params(expected->ctx, expected->params)) {
2794 if (EVP_KDF_derive(expected->ctx, got, got_len, NULL) <= 0) {
2799 expected->output, expected->output_len,
2882 PKEY_KDF_DATA *expected = t->data;
2888 got_len = expected->output_len;
2891 if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) {
2902 got_len = expected->output_len;
2904 got_len = expected->output_len * 2;
2911 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) {
2915 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) {
3290 DIGESTSIGN_DATA *expected = t->data;
3294 if (!evp_test_buffer_do(expected->input, digestsign_update_fn,
3295 expected->ctx)) {
3300 if (!EVP_DigestSignFinal(expected->ctx, NULL, &got_len)) {
3309 if (!EVP_DigestSignFinal(expected->ctx, got, &got_len)) {
3314 expected->output, expected->output_len,
3373 DIGESTSIGN_DATA *expected = t->data;
3377 if (!EVP_DigestSign(expected->ctx, NULL, &got_len,
3378 expected->osin, expected->osin_len)) {
3387 if (!EVP_DigestSign(expected->ctx, got, &got_len,
3388 expected->osin, expected->osin_len)) {
3393 expected->output, expected->output_len,