Lines Matching defs:output
96 * case without producing unnecessary test framework output.
333 /* Expected output */
334 unsigned char *output;
371 OPENSSL_free(mdat->output);
383 return parse_bin(value, &mdata->output, &mdata->output_len);
476 expected->output, expected->output_len,
494 expected->output, expected->output_len)) {
726 * 'tmp' will store both output and copy of input. We make the copy
1046 "%s output and %s input, %sfragmented",
1125 /* Expected output */
1126 unsigned char *output;
1221 OPENSSL_free(mdat->output);
1246 return parse_bin(value, &mdata->output, &mdata->output_len);
1390 expected->output, expected->output_len,
1556 expected->output, expected->output_len,
1572 expected->output, expected->output_len,
1623 expected->output, expected->output_len)) {
1670 /* Expected output */
1671 unsigned char *output;
1722 OPENSSL_free(kdata->output);
1763 return parse_bin(value, &kdata->output, &kdata->output_len);
1788 expected->output, expected->output_len,
1813 expected->output, expected->output_len,
1873 if (EVP_PKEY_verify(kdata->ctx, kdata->output, kdata->output_len,
1913 return parse_bin(value, &kdata->output, &kdata->output_len);
1990 expected->output, expected->output_len,
2032 /* Expected output */
2253 /* Expected output */
2254 unsigned char *output;
2291 OPENSSL_free(edata->output);
2303 return parse_bin(value, &edata->output, &edata->output_len);
2337 expected->output, expected->output_len,
2347 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output,
2401 unsigned char *output;
2418 /* Expected output */
2480 OPENSSL_free(rdata->data[i].output);
2528 return parse_bin(value, &item->output, &item->output_len);
2642 if (!TEST_mem_eq(got, got_len, item->output, item->output_len))
2676 /* Expected output */
2677 unsigned char *output;
2725 OPENSSL_free(kdata->output);
2774 return parse_bin(value, &kdata->output, &kdata->output_len);
2799 expected->output, expected->output_len,
2825 /* Expected output */
2826 unsigned char *output;
2864 OPENSSL_free(kdata->output);
2874 return parse_bin(value, &kdata->output, &kdata->output_len);
2887 /* FIPS(3.0.0): can't deal with oversized output buffers #18533 */
2890 /* Find out the KDF output size */
2897 * We may get an absurd output size, which signals that anything goes.
2898 * If not, we specify a too big buffer for the output, to test that
2915 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) {
3181 unsigned char *output; /* Expected output */
3182 size_t output_len; /* Expected output length */
3225 OPENSSL_free(mdata->output);
3266 return parse_bin(value, &mdata->output, &mdata->output_len);
3314 expected->output, expected->output_len,
3352 if (EVP_DigestVerifyFinal(mdata->ctx, mdata->output,
3393 expected->output, expected->output_len,
3420 if (EVP_DigestVerify(mdata->ctx, mdata->output, mdata->output_len,