Lines Matching full:expected
44 char *expected_err; /* Expected error value of test */
45 char *reason; /* Expected error reason string */
94 * However, if there is expected to be an error and the actual error
95 * matches then the memory is expected to be different so handle this
99 const void *expected, size_t expected_len,
105 r = !TEST_mem_ne(expected, expected_len, got, got_len);
107 r = TEST_mem_eq(expected, expected_len, got, got_len);
333 /* Expected output */
400 DIGEST_DATA *expected = t->data;
413 got = OPENSSL_malloc(expected->output_len > EVP_MAX_MD_SIZE ?
414 expected->output_len : EVP_MAX_MD_SIZE);
418 if (!EVP_DigestInit_ex(mctx, expected->digest, NULL)) {
422 if (expected->pad_type > 0) {
424 &expected->pad_type);
431 if (!evp_test_buffer_do(expected->input, digest_update_fn, mctx)) {
436 xof = (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0;
460 got_len = expected->output_len;
471 if (!TEST_int_eq(expected->output_len, got_len)) {
476 expected->output, expected->output_len,
483 if (sk_EVP_TEST_BUFFER_num(expected->input) == 1
486 && !TEST_ptr(inbuf = sk_EVP_TEST_BUFFER_value(expected->input, 0))
490 EVP_MD_get0_name(expected->fetched_digest),
494 expected->output, expected->output_len)) {
528 unsigned char *next_iv; /* Expected IV state after operation */
693 CIPHER_DATA *expected = t->data;
710 in = expected->plaintext;
711 in_len = expected->plaintext_len;
712 expected_out = expected->ciphertext;
713 out_len = expected->ciphertext_len;
715 in = expected->ciphertext;
716 in_len = expected->ciphertext_len;
717 expected_out = expected->plaintext;
718 out_len = expected->plaintext_len;
743 if (!EVP_CipherInit_ex(ctx_base, expected->cipher, NULL, NULL, NULL, enc)) {
747 if (expected->cts_mode != NULL) {
751 (char *)expected->cts_mode,
759 if (expected->iv) {
760 if (expected->aead) {
762 expected->iv_len, 0) <= 0) {
766 } else if (expected->iv_len != (size_t)EVP_CIPHER_CTX_get_iv_length(ctx_base)) {
771 if (expected->aead && !expected->tls_aad) {
777 if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) {
782 tag = expected->tag;
784 if (tag || expected->aead != EVP_CIPH_GCM_MODE) {
786 expected->tag_len, tag) <= 0)
791 if (expected->rounds > 0) {
792 int rounds = (int)expected->rounds;
800 if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) {
804 if (expected->key_bits > 0) {
805 int bits = (int)expected->key_bits;
812 if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) {
818 if (expected->iv != NULL) {
822 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0
823 && !TEST_mem_eq(expected->iv, expected->iv_len, iv,
824 expected->iv_len))) {
835 EVP_CIPHER_get0_name(expected->cipher));
849 if (expected->mac_key != NULL
851 (int)expected->mac_key_len,
852 (void *)expected->mac_key) <= 0) {
857 if (expected->tls_version) {
861 &expected->tls_version);
869 if (expected->aead == EVP_CIPH_CCM_MODE) {
875 if (expected->aad[0] != NULL && !expected->tls_aad) {
878 for (i = 0; expected->aad[i] != NULL; i++) {
879 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i],
880 expected->aad_len[i]))
887 for (i = 0; expected->aad[i] != NULL; i++) {
888 if (expected->aad_len[i] > 0) {
889 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 1))
893 if (expected->aad_len[i] > 2) {
895 expected->aad[i] + donelen,
896 expected->aad_len[i] - 2))
898 donelen += expected->aad_len[i] - 2;
900 if (expected->aad_len[i] > 1
902 expected->aad[i] + donelen, 1))
908 if (expected->tls_aad) {
913 if ((tls_aad = OPENSSL_memdup(expected->aad[0],
914 expected->aad_len[0])) == NULL)
918 expected->aad_len[0]);
926 } else if (!enc && (expected->aead == EVP_CIPH_OCB_MODE
927 || expected->tag_late)) {
929 expected->tag_len, expected->tag) <= 0) {
970 if (!enc && expected->tls_aad) {
971 if (expected->tls_version >= TLS1_1_VERSION
972 && (EVP_CIPHER_is_a(expected->cipher, "AES-128-CBC-HMAC-SHA1")
973 || EVP_CIPHER_is_a(expected->cipher, "AES-256-CBC-HMAC-SHA1"))) {
974 tmplen -= expected->iv_len;
975 expected_out += expected->iv_len;
976 out_misalign += expected->iv_len;
984 if (enc && expected->aead && !expected->tls_aad) {
987 if (!TEST_size_t_le(expected->tag_len, sizeof(rtag))) {
992 expected->tag_len, rtag) <= 0) {
997 expected->tag, expected->tag_len,
998 rtag, expected->tag_len))
1002 if (expected->next_iv != NULL) {
1006 || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0
1007 && !TEST_mem_eq(expected->next_iv, expected->iv_len, iv,
1008 expected->iv_len))) {
1137 /* Expected output */
1310 MAC_DATA *expected = t->data;
1321 if (expected->xof)
1324 if (expected->alg == NULL)
1325 TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type));
1328 OBJ_nid2sn(expected->type), expected->alg);
1330 if (expected->type == EVP_PKEY_CMAC) {
1332 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
1339 if (expected->alg != NULL && is_cipher_disabled(expected->alg)) {
1340 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
1345 if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, NULL))) {
1350 key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len,
1356 OBJ_nid2sn(expected->type), NULL,
1357 expected->key, expected->key_len);
1364 if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) {
1365 if (is_digest_disabled(expected->alg)) {
1366 TEST_info("skipping, HMAC '%s' is disabled", expected->alg);
1371 mdname = expected->alg;
1381 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++)
1383 sk_OPENSSL_STRING_value(expected->controls,
1388 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) {
1402 expected->output, expected->output_len,
1419 MAC_DATA *expected = t->data;
1429 EVP_MAC_settable_ctx_params(expected->mac);
1433 if (expected->alg == NULL)
1434 TEST_info("Trying the EVP_MAC %s test", expected->mac_name);
1437 expected->mac_name, expected->alg);
1439 if (expected->alg != NULL) {
1449 if (is_cipher_disabled(expected->alg))
1454 expected->alg, 0);
1457 if (is_digest_disabled(expected->alg))
1462 expected->alg, 0);
1468 TEST_info("skipping, algorithm '%s' is disabled", expected->alg);
1474 if (expected->custom != NULL)
1477 expected->custom,
1478 expected->custom_len);
1479 if (expected->salt != NULL)
1482 expected->salt,
1483 expected->salt_len);
1484 if (expected->iv != NULL)
1487 expected->iv,
1488 expected->iv_len);
1491 if (params_n + sk_OPENSSL_STRING_num(expected->controls)
1497 for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) {
1499 char *value = sk_OPENSSL_STRING_value(expected->controls, i);
1527 if ((ctx = EVP_MAC_CTX_new(expected->mac)) == NULL) {
1535 if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) {
1556 if (expected->output_size >= 0)
1559 if (expected->block_size >= 0)
1568 if (expected->output_size >= 0
1569 && !TEST_int_eq(output_size, expected->output_size)) {
1573 if (expected->block_size >= 0
1574 && !TEST_int_eq(block_size, expected->block_size)) {
1580 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) {
1584 xof = expected->xof;
1586 if (!TEST_ptr(got = OPENSSL_malloc(expected->output_len))) {
1590 if (!EVP_MAC_finalXOF(ctx, got, expected->output_len)
1592 expected->output, expected->output_len,
1593 got, expected->output_len)) {
1608 expected->output, expected->output_len,
1620 if (expected->iv != NULL) {
1623 expected->iv,
1624 expected->iv_len);
1629 if (expected->no_reinit) {
1653 if (!TEST_true(EVP_Q_mac(libctx, expected->mac_name, NULL,
1654 expected->alg, params,
1655 expected->key, expected->key_len,
1656 expected->input, expected->input_len,
1659 expected->output, expected->output_len)) {
1675 MAC_DATA *expected = t->data;
1677 if (expected->mac != NULL)
1706 /* Expected output */
1807 PKEY_DATA *expected = t->data;
1812 if (expected->keyop(expected->ctx, NULL, &got_len,
1813 expected->input, expected->input_len) <= 0
1818 if (expected->keyop(expected->ctx, got, &got_len,
1819 expected->input, expected->input_len) <= 0) {
1824 expected->output, expected->output_len,
1833 if (!TEST_ptr(copy = EVP_PKEY_CTX_dup(expected->ctx))) {
1837 if (expected->keyop(copy, NULL, &got_len, expected->input,
1838 expected->input_len) <= 0
1843 if (expected->keyop(copy, got, &got_len, expected->input,
1844 expected->input_len) <= 0) {
1849 expected->output, expected->output_len,
2003 PKEY_DATA *expected = t->data;
2007 if (!TEST_ptr(dctx = EVP_PKEY_CTX_dup(expected->ctx))) {
2026 expected->output, expected->output_len,
2068 /* Expected output */
2210 PBE_DATA *expected = t->data;
2217 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) {
2221 if (expected->pbe_type == PBE_TYPE_PBKDF2) {
2222 if (PKCS5_PBKDF2_HMAC((char *)expected->pass, expected->pass_len,
2223 expected->salt, expected->salt_len,
2224 expected->iter, expected->md,
2225 expected->key_len, key) == 0) {
2230 } else if (expected->pbe_type == PBE_TYPE_SCRYPT) {
2231 if (EVP_PBE_scrypt((const char *)expected->pass, expected->pass_len,
2232 expected->salt, expected->salt_len,
2233 expected->N, expected->r, expected->p,
2234 expected->maxmem, key, expected->key_len) == 0) {
2239 } else if (expected->pbe_type == PBE_TYPE_PKCS12) {
2240 fetched_digest = EVP_MD_fetch(libctx, EVP_MD_get0_name(expected->md),
2246 if (PKCS12_key_gen_uni(expected->pass, expected->pass_len,
2247 expected->salt, expected->salt_len,
2248 expected->id, expected->iter, expected->key_len,
2254 if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len,
2255 key, expected->key_len))
2289 /* Expected output */
2345 ENCODE_DATA *expected = t->data;
2355 if (expected->encoding == BASE64_CANONICAL_ENCODING) {
2359 OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len))))
2364 expected->input, expected->input_len)))
2373 expected->output, expected->output_len,
2379 OPENSSL_malloc(EVP_DECODE_LENGTH(expected->output_len))))
2383 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output,
2384 expected->output_len) < 0) {
2396 if (expected->encoding != BASE64_INVALID_ENCODING
2398 expected->input, expected->input_len,
2454 /* Expected output */
2590 RAND_DATA *expected = t->data;
2593 size_t got_len = expected->generate_bits / 8;
2602 *p++ = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_USE_DF, &expected->use_df);
2603 if (expected->cipher != NULL)
2605 expected->cipher, 0);
2606 if (expected->digest != NULL)
2608 expected->digest, 0);
2611 if (!TEST_true(EVP_RAND_CTX_set_params(expected->ctx, params)))
2614 strength = EVP_RAND_get_strength(expected->ctx);
2615 for (i = 0; i <= expected->n; i++) {
2616 item = expected->data + i;
2626 if (!TEST_true(EVP_RAND_instantiate(expected->parent, strength,
2632 (expected->ctx, strength,
2633 expected->prediction_resistance, z,
2642 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2646 (expected->ctx, expected->prediction_resistance,
2656 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2660 (expected->ctx, got, got_len,
2661 strength, expected->prediction_resistance,
2670 if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params)))
2674 (expected->ctx, got, got_len,
2675 strength, expected->prediction_resistance,
2680 if (!TEST_true(EVP_RAND_uninstantiate(expected->ctx))
2681 || !TEST_true(EVP_RAND_uninstantiate(expected->parent))
2682 || !TEST_true(EVP_RAND_verify_zeroization(expected->ctx))
2683 || !TEST_int_eq(EVP_RAND_get_state(expected->ctx),
2692 TEST_info("Error in test case %d of %d\n", i, expected->n + 1);
2712 /* Expected output */
2821 KDF_DATA *expected = t->data;
2823 size_t got_len = expected->output_len;
2825 if (!EVP_KDF_CTX_set_params(expected->ctx, expected->params)) {
2833 if (EVP_KDF_derive(expected->ctx, got, got_len, NULL) <= 0) {
2838 expected->output, expected->output_len,
2864 /* Expected output */
2921 PKEY_KDF_DATA *expected = t->data;
2927 got_len = expected->output_len;
2930 if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) {
2941 got_len = expected->output_len;
2943 got_len = expected->output_len * 2;
2950 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) {
2954 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) {
3220 unsigned char *output; /* Expected output */
3221 size_t output_len; /* Expected output length */
3329 DIGESTSIGN_DATA *expected = t->data;
3333 if (!evp_test_buffer_do(expected->input, digestsign_update_fn,
3334 expected->ctx)) {
3339 if (!EVP_DigestSignFinal(expected->ctx, NULL, &got_len)) {
3348 if (!EVP_DigestSignFinal(expected->ctx, got, &got_len)) {
3353 expected->output, expected->output_len,
3412 DIGESTSIGN_DATA *expected = t->data;
3416 if (!EVP_DigestSign(expected->ctx, NULL, &got_len,
3417 expected->osin, expected->osin_len)) {
3426 if (!EVP_DigestSign(expected->ctx, got, &got_len,
3427 expected->osin, expected->osin_len)) {
3432 expected->output, expected->output_len,
3558 TEST_info("%s:%d: Expected %s got %s",
3574 TEST_info("%s:%d: Expected error \"%s\" not set",
3581 TEST_info("%s:%d: Expected error \"%s\", no strings available."
3590 TEST_info("%s:%d: Expected error \"%s\", got \"%s\"",