Lines Matching +full:dsa +full:- +full:specific

2  * Copyright 2020-2024 The OpenSSL Project Authors. All Rights Reserved.
79 * Use 512-bit DH(X) keys with predetermined parameters for efficiency,
190 || strcmp(output_structure, "type-specific") != 0)
265 || !TEST_FL_ptr(*encoded = mem_buf->data)
266 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0))
270 mem_buf->data = NULL;
271 mem_buf->length = 0;
380 || !TEST_FL_ptr(*encoded = mem_buf->data)
381 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0))
385 mem_buf->data = NULL;
386 mem_buf->length = 0;
419 || !TEST_FL_ptr(*encoded = mem_buf->data)
420 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0))
424 mem_buf->data = NULL;
425 mem_buf->length = 0;
459 || !TEST_FL_ptr(*encoded = mem_buf->data)
460 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0))
464 mem_buf->data = NULL;
465 mem_buf->length = 0;
518 test_output_string(label, data, data_len - 1);
565 "-----BEGIN " PEM_STRING_PKCS8INF "-----";
568 sizeof(expected_pem_header) - 1);
595 else if (strcmp(type, "DSA") == 0)
618 "-----BEGIN %s PARAMETERS-----", type), 0)
625 "DER", "type-specific", NULL, NULL,
634 "PEM", "type-specific", NULL, NULL,
650 "-----BEGIN %s PRIVATE KEY-----", type), 0)
657 return TEST_skip("Test not available if using a non-default library context or FIPS provider");
662 "PEM", "type-specific", NULL, NULL,
711 static const char *pass_cipher = "AES-256-CBC";
743 "-----BEGIN " PEM_STRING_PKCS8 "-----";
746 sizeof(expected_pem_header) - 1);
770 "-----BEGIN %s PRIVATE KEY-----", type), 0)
772 && TEST_FL_ptr(strstr(data, "\nDEK-Info: "));
778 return TEST_skip("Test not available if using a non-default library context or FIPS provider");
783 "PEM", "type-specific", pass, pass_cipher,
834 "-----BEGIN " PEM_STRING_PUBLIC "-----";
838 sizeof(expected_pem_header) - 1);
1002 DOMAIN_KEYS(DSA);
1003 IMPLEMENT_TEST_SUITE(DSA, "DSA", 1)
1004 IMPLEMENT_TEST_SUITE_PARAMS(DSA, "DSA")
1005 IMPLEMENT_TEST_SUITE_LEGACY(DSA, "DSA")
1006 IMPLEMENT_TEST_SUITE_MSBLOB(DSA, "DSA")
1007 IMPLEMENT_TEST_SUITE_UNPROTECTED_PVK(DSA, "DSA")
1009 IMPLEMENT_TEST_SUITE_PROTECTED_PVK(DSA, "DSA")
1052 IMPLEMENT_TEST_SUITE(RSA_PSS, "RSA-PSS", 1)
1054 * RSA-PSS has no support for PEM_write_bio_PrivateKey_traditional(),
1168 /* sect233k1 characteristic-two-field tpBasis */
1247 OPT_ERR = -1,
1261 { "context", OPT_CONTEXT, '-',
1262 "Explicitly use a non-default library context" },
1266 "PEM format RSA-PSS key file to encode/decode" },
1297 OSSL_PARAM_utf8_string("group", groupname, sizeof(groupname) - 1),
1376 TEST_info("Generating DSA keys...");
1377 MAKE_DOMAIN_KEYS(DSA, "DSA", DSA_params);
1414 ADD_TEST_SUITE(DSA);
1415 ADD_TEST_SUITE_PARAMS(DSA);
1416 ADD_TEST_SUITE_LEGACY(DSA);
1417 ADD_TEST_SUITE_MSBLOB(DSA);
1418 ADD_TEST_SUITE_UNPROTECTED_PVK(DSA);
1420 ADD_TEST_SUITE_PROTECTED_PVK(DSA);
1456 * RSA-PSS has no support for PEM_write_bio_PrivateKey_traditional(),
1490 FREE_DOMAIN_KEYS(DSA);