Lines Matching full:expected
44 char *expected_err; /* Expected error value of test */
45 char *reason; /* Expected error reason string */
94 * However, if there is expected to be an error and the actual error
95 * matches then the memory is expected to be different so handle this
99 const void *expected, size_t expected_len, in memory_err_compare() argument
105 r = !TEST_mem_ne(expected, expected_len, got, got_len); in memory_err_compare()
107 r = TEST_mem_eq(expected, expected_len, got, got_len); in memory_err_compare()
333 /* Expected output */
400 DIGEST_DATA *expected = t->data; in digest_test_run() local
413 got = OPENSSL_malloc(expected->output_len > EVP_MAX_MD_SIZE ? in digest_test_run()
414 expected->output_len : EVP_MAX_MD_SIZE); in digest_test_run()
418 if (!EVP_DigestInit_ex(mctx, expected->digest, NULL)) { in digest_test_run()
422 if (expected->pad_type > 0) { in digest_test_run()
424 &expected->pad_type); in digest_test_run()
431 if (!evp_test_buffer_do(expected->input, digest_update_fn, mctx)) { in digest_test_run()
436 xof = (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0; in digest_test_run()
460 got_len = expected->output_len; in digest_test_run()
471 if (!TEST_int_eq(expected->output_len, got_len)) { in digest_test_run()
476 expected->output, expected->output_len, in digest_test_run()
483 if (sk_EVP_TEST_BUFFER_num(expected->input) == 1 in digest_test_run()
486 && !TEST_ptr(inbuf = sk_EVP_TEST_BUFFER_value(expected->input, 0)) in digest_test_run()
490 EVP_MD_get0_name(expected->fetched_digest), in digest_test_run()
494 expected->output, expected->output_len)) { in digest_test_run()
528 unsigned char *next_iv; /* Expected IV state after operation */
693 CIPHER_DATA *expected = t->data; in cipher_test_enc() local
710 in = expected->plaintext; in cipher_test_enc()
711 in_len = expected->plaintext_len; in cipher_test_enc()
712 expected_out = expected->ciphertext; in cipher_test_enc()
713 out_len = expected->ciphertext_len; in cipher_test_enc()
715 in = expected->ciphertext; in cipher_test_enc()
716 in_len = expected->ciphertext_len; in cipher_test_enc()
717 expected_out = expected->plaintext; in cipher_test_enc()
718 out_len = expected->plaintext_len; in cipher_test_enc()
743 if (!EVP_CipherInit_ex(ctx_base, expected->cipher, NULL, NULL, NULL, enc)) { in cipher_test_enc()
747 if (expected->cts_mode != NULL) { in cipher_test_enc()
751 (char *)expected->cts_mode, in cipher_test_enc()
759 if (expected->iv) { in cipher_test_enc()
760 if (expected->aead) { in cipher_test_enc()
762 expected->iv_len, 0) <= 0) { in cipher_test_enc()
766 } else if (expected->iv_len != (size_t)EVP_CIPHER_CTX_get_iv_length(ctx_base)) { in cipher_test_enc()
771 if (expected->aead && !expected->tls_aad) { in cipher_test_enc()
777 if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) { in cipher_test_enc()
782 tag = expected->tag; in cipher_test_enc()
784 if (tag || expected->aead != EVP_CIPH_GCM_MODE) { in cipher_test_enc()
786 expected->tag_len, tag) <= 0) in cipher_test_enc()
791 if (expected->rounds > 0) { in cipher_test_enc()
792 int rounds = (int)expected->rounds; in cipher_test_enc()
800 if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) { in cipher_test_enc()
804 if (expected->key_bits > 0) { in cipher_test_enc()
805 int bits = (int)expected->key_bits; in cipher_test_enc()
812 if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) { in cipher_test_enc()
818 if (expected->iv != NULL) { in cipher_test_enc()
822 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 in cipher_test_enc()
823 && !TEST_mem_eq(expected->iv, expected->iv_len, iv, in cipher_test_enc()
824 expected->iv_len))) { in cipher_test_enc()
835 EVP_CIPHER_get0_name(expected->cipher)); in cipher_test_enc()
849 if (expected->mac_key != NULL in cipher_test_enc()
851 (int)expected->mac_key_len, in cipher_test_enc()
852 (void *)expected->mac_key) <= 0) { in cipher_test_enc()
857 if (expected->tls_version) { in cipher_test_enc()
861 &expected->tls_version); in cipher_test_enc()
869 if (expected->aead == EVP_CIPH_CCM_MODE) { in cipher_test_enc()
875 if (expected->aad[0] != NULL && !expected->tls_aad) { in cipher_test_enc()
878 for (i = 0; expected->aad[i] != NULL; i++) { in cipher_test_enc()
879 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], in cipher_test_enc()
880 expected->aad_len[i])) in cipher_test_enc()
887 for (i = 0; expected->aad[i] != NULL; i++) { in cipher_test_enc()
888 if (expected->aad_len[i] > 0) { in cipher_test_enc()
889 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 1)) in cipher_test_enc()
893 if (expected->aad_len[i] > 2) { in cipher_test_enc()
895 expected->aad[i] + donelen, in cipher_test_enc()
896 expected->aad_len[i] - 2)) in cipher_test_enc()
898 donelen += expected->aad_len[i] - 2; in cipher_test_enc()
900 if (expected->aad_len[i] > 1 in cipher_test_enc()
902 expected->aad[i] + donelen, 1)) in cipher_test_enc()
908 if (expected->tls_aad) { in cipher_test_enc()
913 if ((tls_aad = OPENSSL_memdup(expected->aad[0], in cipher_test_enc()
914 expected->aad_len[0])) == NULL) in cipher_test_enc()
918 expected->aad_len[0]); in cipher_test_enc()
926 } else if (!enc && (expected->aead == EVP_CIPH_OCB_MODE in cipher_test_enc()
927 || expected->tag_late)) { in cipher_test_enc()
929 expected->tag_len, expected->tag) <= 0) { in cipher_test_enc()
970 if (!enc && expected->tls_aad) { in cipher_test_enc()
971 if (expected->tls_version >= TLS1_1_VERSION in cipher_test_enc()
972 && (EVP_CIPHER_is_a(expected->cipher, "AES-128-CBC-HMAC-SHA1") in cipher_test_enc()
973 || EVP_CIPHER_is_a(expected->cipher, "AES-256-CBC-HMAC-SHA1"))) { in cipher_test_enc()
974 tmplen -= expected->iv_len; in cipher_test_enc()
975 expected_out += expected->iv_len; in cipher_test_enc()
976 out_misalign += expected->iv_len; in cipher_test_enc()
984 if (enc && expected->aead && !expected->tls_aad) { in cipher_test_enc()
987 if (!TEST_size_t_le(expected->tag_len, sizeof(rtag))) { in cipher_test_enc()
992 expected->tag_len, rtag) <= 0) { in cipher_test_enc()
997 expected->tag, expected->tag_len, in cipher_test_enc()
998 rtag, expected->tag_len)) in cipher_test_enc()
1002 if (expected->next_iv != NULL) { in cipher_test_enc()
1006 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 in cipher_test_enc()
1007 && !TEST_mem_eq(expected->next_iv, expected->iv_len, iv, in cipher_test_enc()
1008 expected->iv_len))) { in cipher_test_enc()
1137 /* Expected output */
1310 MAC_DATA *expected = t->data; in mac_test_run_pkey() local
1321 if (expected->xof) in mac_test_run_pkey()
1324 if (expected->alg == NULL) in mac_test_run_pkey()
1325 TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type)); in mac_test_run_pkey()
1328 OBJ_nid2sn(expected->type), expected->alg); in mac_test_run_pkey()
1330 if (expected->type == EVP_PKEY_CMAC) { in mac_test_run_pkey()
1332 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1339 if (expected->alg != NULL && is_cipher_disabled(expected->alg)) { in mac_test_run_pkey()
1340 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1345 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, NULL))) { in mac_test_run_pkey()
1350 key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len, in mac_test_run_pkey()
1356 OBJ_nid2sn(expected->type), NULL, in mac_test_run_pkey()
1357 expected->key, expected->key_len); in mac_test_run_pkey()
1364 if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) { in mac_test_run_pkey()
1365 if (is_digest_disabled(expected->alg)) { in mac_test_run_pkey()
1366 TEST_info("skipping, HMAC '%s' is disabled", expected->alg); in mac_test_run_pkey()
1371 mdname = expected->alg; in mac_test_run_pkey()
1381 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) in mac_test_run_pkey()
1383 sk_OPENSSL_STRING_value(expected->controls, in mac_test_run_pkey()
1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { in mac_test_run_pkey()
1402 expected->output, expected->output_len, in mac_test_run_pkey()
1419 MAC_DATA *expected = t->data; in mac_test_run_mac() local
1429 EVP_MAC_settable_ctx_params(expected->mac); in mac_test_run_mac()
1433 if (expected->alg == NULL) in mac_test_run_mac()
1434 TEST_info("Trying the EVP_MAC %s test", expected->mac_name); in mac_test_run_mac()
1437 expected->mac_name, expected->alg); in mac_test_run_mac()
1439 if (expected->alg != NULL) { in mac_test_run_mac()
1449 if (is_cipher_disabled(expected->alg)) in mac_test_run_mac()
1454 expected->alg, 0); in mac_test_run_mac()
1457 if (is_digest_disabled(expected->alg)) in mac_test_run_mac()
1462 expected->alg, 0); in mac_test_run_mac()
1468 TEST_info("skipping, algorithm '%s' is disabled", expected->alg); in mac_test_run_mac()
1474 if (expected->custom != NULL) in mac_test_run_mac()
1477 expected->custom, in mac_test_run_mac()
1478 expected->custom_len); in mac_test_run_mac()
1479 if (expected->salt != NULL) in mac_test_run_mac()
1482 expected->salt, in mac_test_run_mac()
1483 expected->salt_len); in mac_test_run_mac()
1484 if (expected->iv != NULL) in mac_test_run_mac()
1487 expected->iv, in mac_test_run_mac()
1488 expected->iv_len); in mac_test_run_mac()
1491 if (params_n + sk_OPENSSL_STRING_num(expected->controls) in mac_test_run_mac()
1497 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) { in mac_test_run_mac()
1499 char *value = sk_OPENSSL_STRING_value(expected->controls, i); in mac_test_run_mac()
1527 if ((ctx = EVP_MAC_CTX_new(expected->mac)) == NULL) { in mac_test_run_mac()
1535 if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) { in mac_test_run_mac()
1556 if (expected->output_size >= 0) in mac_test_run_mac()
1559 if (expected->block_size >= 0) in mac_test_run_mac()
1568 if (expected->output_size >= 0 in mac_test_run_mac()
1569 && !TEST_int_eq(output_size, expected->output_size)) { in mac_test_run_mac()
1573 if (expected->block_size >= 0 in mac_test_run_mac()
1574 && !TEST_int_eq(block_size, expected->block_size)) { in mac_test_run_mac()
1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { in mac_test_run_mac()
1584 xof = expected->xof; in mac_test_run_mac()
1586 if (!TEST_ptr(got = OPENSSL_malloc(expected->output_len))) { in mac_test_run_mac()
1590 if (!EVP_MAC_finalXOF(ctx, got, expected->output_len) in mac_test_run_mac()
1592 expected->output, expected->output_len, in mac_test_run_mac()
1593 got, expected->output_len)) { in mac_test_run_mac()
1608 expected->output, expected->output_len, in mac_test_run_mac()
1620 if (expected->iv != NULL) { in mac_test_run_mac()
1623 expected->iv, in mac_test_run_mac()
1624 expected->iv_len); in mac_test_run_mac()
1629 if (expected->no_reinit) { in mac_test_run_mac()
1653 if (!TEST_true(EVP_Q_mac(libctx, expected->mac_name, NULL, in mac_test_run_mac()
1654 expected->alg, params, in mac_test_run_mac()
1655 expected->key, expected->key_len, in mac_test_run_mac()
1656 expected->input, expected->input_len, in mac_test_run_mac()
1659 expected->output, expected->output_len)) { in mac_test_run_mac()
1675 MAC_DATA *expected = t->data; in mac_test_run() local
1677 if (expected->mac != NULL) in mac_test_run()
1706 /* Expected output */
1807 PKEY_DATA *expected = t->data; in pkey_test_run() local
1812 if (expected->keyop(expected->ctx, NULL, &got_len, in pkey_test_run()
1813 expected->input, expected->input_len) <= 0 in pkey_test_run()
1818 if (expected->keyop(expected->ctx, got, &got_len, in pkey_test_run()
1819 expected->input, expected->input_len) <= 0) { in pkey_test_run()
1824 expected->output, expected->output_len, in pkey_test_run()
1833 if (!TEST_ptr(copy = EVP_PKEY_CTX_dup(expected->ctx))) { in pkey_test_run()
1837 if (expected->keyop(copy, NULL, &got_len, expected->input, in pkey_test_run()
1838 expected->input_len) <= 0 in pkey_test_run()
1843 if (expected->keyop(copy, got, &got_len, expected->input, in pkey_test_run()
1844 expected->input_len) <= 0) { in pkey_test_run()
1849 expected->output, expected->output_len, in pkey_test_run()
2003 PKEY_DATA *expected = t->data; in pderive_test_run() local
2007 if (!TEST_ptr(dctx = EVP_PKEY_CTX_dup(expected->ctx))) { in pderive_test_run()
2026 expected->output, expected->output_len, in pderive_test_run()
2068 /* Expected output */
2210 PBE_DATA *expected = t->data; in pbe_test_run() local
2217 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) { in pbe_test_run()
2221 if (expected->pbe_type == PBE_TYPE_PBKDF2) { in pbe_test_run()
2222 if (PKCS5_PBKDF2_HMAC((char *)expected->pass, expected->pass_len, in pbe_test_run()
2223 expected->salt, expected->salt_len, in pbe_test_run()
2224 expected->iter, expected->md, in pbe_test_run()
2225 expected->key_len, key) == 0) { in pbe_test_run()
2230 } else if (expected->pbe_type == PBE_TYPE_SCRYPT) { in pbe_test_run()
2231 if (EVP_PBE_scrypt((const char *)expected->pass, expected->pass_len, in pbe_test_run()
2232 expected->salt, expected->salt_len, in pbe_test_run()
2233 expected->N, expected->r, expected->p, in pbe_test_run()
2234 expected->maxmem, key, expected->key_len) == 0) { in pbe_test_run()
2239 } else if (expected->pbe_type == PBE_TYPE_PKCS12) { in pbe_test_run()
2240 fetched_digest = EVP_MD_fetch(libctx, EVP_MD_get0_name(expected->md), in pbe_test_run()
2246 if (PKCS12_key_gen_uni(expected->pass, expected->pass_len, in pbe_test_run()
2247 expected->salt, expected->salt_len, in pbe_test_run()
2248 expected->id, expected->iter, expected->key_len, in pbe_test_run()
2254 if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len, in pbe_test_run()
2255 key, expected->key_len)) in pbe_test_run()
2289 /* Expected output */
2345 ENCODE_DATA *expected = t->data; in encode_test_run() local
2355 if (expected->encoding == BASE64_CANONICAL_ENCODING) { in encode_test_run()
2359 OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len)))) in encode_test_run()
2364 expected->input, expected->input_len))) in encode_test_run()
2373 expected->output, expected->output_len, in encode_test_run()
2379 OPENSSL_malloc(EVP_DECODE_LENGTH(expected->output_len)))) in encode_test_run()
2383 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output, in encode_test_run()
2384 expected->output_len) < 0) { in encode_test_run()
2396 if (expected->encoding != BASE64_INVALID_ENCODING in encode_test_run()
2398 expected->input, expected->input_len, in encode_test_run()
2454 /* Expected output */
2590 RAND_DATA *expected = t->data; in rand_test_run() local
2593 size_t got_len = expected->generate_bits / 8; in rand_test_run()
2602 *p++ = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_USE_DF, &expected->use_df); in rand_test_run()
2603 if (expected->cipher != NULL) in rand_test_run()
2605 expected->cipher, 0); in rand_test_run()
2606 if (expected->digest != NULL) in rand_test_run()
2608 expected->digest, 0); in rand_test_run()
2611 if (!TEST_true(EVP_RAND_CTX_set_params(expected->ctx, params))) in rand_test_run()
2614 strength = EVP_RAND_get_strength(expected->ctx); in rand_test_run()
2615 for (i = 0; i <= expected->n; i++) { in rand_test_run()
2616 item = expected->data + i; in rand_test_run()
2626 if (!TEST_true(EVP_RAND_instantiate(expected->parent, strength, in rand_test_run()
2632 (expected->ctx, strength, in rand_test_run()
2633 expected->prediction_resistance, z, in rand_test_run()
2642 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2646 (expected->ctx, expected->prediction_resistance, in rand_test_run()
2656 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2660 (expected->ctx, got, got_len, in rand_test_run()
2661 strength, expected->prediction_resistance, in rand_test_run()
2670 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) in rand_test_run()
2674 (expected->ctx, got, got_len, in rand_test_run()
2675 strength, expected->prediction_resistance, in rand_test_run()
2680 if (!TEST_true(EVP_RAND_uninstantiate(expected->ctx)) in rand_test_run()
2681 || !TEST_true(EVP_RAND_uninstantiate(expected->parent)) in rand_test_run()
2682 || !TEST_true(EVP_RAND_verify_zeroization(expected->ctx)) in rand_test_run()
2683 || !TEST_int_eq(EVP_RAND_get_state(expected->ctx), in rand_test_run()
2692 TEST_info("Error in test case %d of %d\n", i, expected->n + 1); in rand_test_run()
2712 /* Expected output */
2821 KDF_DATA *expected = t->data; in kdf_test_run() local
2823 size_t got_len = expected->output_len; in kdf_test_run()
2825 if (!EVP_KDF_CTX_set_params(expected->ctx, expected->params)) { in kdf_test_run()
2833 if (EVP_KDF_derive(expected->ctx, got, got_len, NULL) <= 0) { in kdf_test_run()
2838 expected->output, expected->output_len, in kdf_test_run()
2864 /* Expected output */
2921 PKEY_KDF_DATA *expected = t->data; in pkey_kdf_test_run() local
2927 got_len = expected->output_len; in pkey_kdf_test_run()
2930 if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) { in pkey_kdf_test_run()
2941 got_len = expected->output_len; in pkey_kdf_test_run()
2943 got_len = expected->output_len * 2; in pkey_kdf_test_run()
2950 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) { in pkey_kdf_test_run()
2954 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) { in pkey_kdf_test_run()
3220 unsigned char *output; /* Expected output */
3221 size_t output_len; /* Expected output length */
3329 DIGESTSIGN_DATA *expected = t->data; in digestsign_test_run() local
3333 if (!evp_test_buffer_do(expected->input, digestsign_update_fn, in digestsign_test_run()
3334 expected->ctx)) { in digestsign_test_run()
3339 if (!EVP_DigestSignFinal(expected->ctx, NULL, &got_len)) { in digestsign_test_run()
3348 if (!EVP_DigestSignFinal(expected->ctx, got, &got_len)) { in digestsign_test_run()
3353 expected->output, expected->output_len, in digestsign_test_run()
3412 DIGESTSIGN_DATA *expected = t->data; in oneshot_digestsign_test_run() local
3416 if (!EVP_DigestSign(expected->ctx, NULL, &got_len, in oneshot_digestsign_test_run()
3417 expected->osin, expected->osin_len)) { in oneshot_digestsign_test_run()
3426 if (!EVP_DigestSign(expected->ctx, got, &got_len, in oneshot_digestsign_test_run()
3427 expected->osin, expected->osin_len)) { in oneshot_digestsign_test_run()
3432 expected->output, expected->output_len, in oneshot_digestsign_test_run()
3558 TEST_info("%s:%d: Expected %s got %s", in check_test_error()
3574 TEST_info("%s:%d: Expected error \"%s\" not set", in check_test_error()
3581 TEST_info("%s:%d: Expected error \"%s\", no strings available." in check_test_error()
3590 TEST_info("%s:%d: Expected error \"%s\", got \"%s\"", in check_test_error()