Lines Matching refs:tst

122     const struct ecdsa_keygen_st *tst = &ecdsa_keygen_data[id];
126 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", tst->curve_name))
183 const struct ecdsa_pub_verify_st *tst = &ecdsa_pv_data[id];
189 if (!TEST_true(ecdsa_create_pkey(&pkey, tst->curve_name,
190 tst->pub, tst->pub_len, tst->pass)))
193 if (tst->pass) {
195 || !TEST_int_eq(EVP_PKEY_public_check(key_ctx), tst->pass))
254 const struct ecdsa_siggen_st *tst = &ecdsa_siggen_data[id];
256 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", tst->curve_name)))
259 if (!TEST_true(sig_gen(pkey, NULL, tst->digest_alg, tst->msg, tst->msg_len,
283 const struct ecdsa_sigver_st *tst = &ecdsa_sigver_data[id];
285 if (!TEST_true(ecdsa_create_pkey(&pkey, tst->curve_name,
286 tst->pub, tst->pub_len, 1)))
290 || !TEST_ptr(rbn = BN_bin2bn(tst->r, tst->r_len, NULL))
291 || !TEST_ptr(sbn = BN_bin2bn(tst->s, tst->s_len, NULL))
298 && TEST_true(EVP_DigestVerifyInit_ex(md_ctx, NULL, tst->digest_alg,
301 tst->msg, tst->msg_len), tst->pass));
376 const struct dsa_paramgen_st *tst = &dsa_keygen_data[id];
378 if (!TEST_ptr(param_key = dsa_paramgen(tst->L, tst->N))
416 const struct dsa_paramgen_st *tst = &dsa_paramgen_data[id];
420 || !TEST_true(EVP_PKEY_CTX_set_dsa_paramgen_bits(paramgen_ctx, tst->L))
421 || !TEST_true(EVP_PKEY_CTX_set_dsa_paramgen_q_bits(paramgen_ctx, tst->N))
526 const struct dsa_pqver_st *tst = &dsa_pqver_data[id];
529 || !TEST_true(dsa_create_pkey(&param_key, tst->p, tst->p_len,
530 tst->q, tst->q_len, NULL, 0,
531 tst->seed, tst->seed_len, tst->counter,
537 || !TEST_int_eq(EVP_PKEY_param_check(key_ctx), tst->pass))
595 const struct dsa_siggen_st *tst = &dsa_siggen_data[id];
597 if (!TEST_ptr(pkey = dsa_keygen(tst->L, tst->N)))
600 if (!TEST_true(sig_gen(pkey, NULL, tst->digest_alg, tst->msg, tst->msg_len,
628 const struct dsa_sigver_st *tst = &dsa_sigver_data[id];
631 || !TEST_true(dsa_create_pkey(&pkey, tst->p, tst->p_len,
632 tst->q, tst->q_len, tst->g, tst->g_len,
633 NULL, 0, 0, 0, 0, tst->pub, tst->pub_len,
638 || !TEST_ptr(rbn = BN_bin2bn(tst->r, tst->r_len, NULL))
639 || !TEST_ptr(sbn = BN_bin2bn(tst->s, tst->s_len, NULL))
644 if (!TEST_ptr(md = EVP_MD_fetch(libctx, tst->digest_alg, ""))
645 || !TEST_true(EVP_Digest(tst->msg, tst->msg_len,
653 tst->pass))
703 const struct cipher_st *tst = &cipher_enc_data[id];
706 return TEST_true(cipher_enc(tst->alg, tst->pt, tst->pt_len,
707 tst->key, tst->key_len,
708 tst->iv, tst->iv_len,
709 tst->ct, tst->ct_len, enc))
710 && TEST_true(cipher_enc(tst->alg, tst->ct, tst->ct_len,
711 tst->key, tst->key_len,
712 tst->iv, tst->iv_len,
713 tst->pt, tst->pt_len, !enc));
775 const struct cipher_ccm_st *tst = &aes_ccm_enc_data[id];
778 const size_t tag_len = tst->ct_len - tst->pt_len;
779 const size_t ct_len = tst->ct_len - tag_len;
780 const unsigned char *tag = tst->ct + ct_len;
787 return aes_ccm_enc_dec(tst->alg, tst->pt, tst->pt_len,
788 tst->key, tst->key_len,
789 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
790 tst->ct, ct_len, tag, tag_len, enc, pass)
791 && aes_ccm_enc_dec(tst->alg, tst->ct, ct_len,
792 tst->key, tst->key_len,
793 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
794 tst->pt, tst->pt_len, tag, tag_len, !enc, pass)
796 && aes_ccm_enc_dec(tst->alg, tst->ct, ct_len,
797 tst->key, tst->key_len,
798 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
799 tst->pt, tst->pt_len,
871 const struct cipher_gcm_st *tst = &aes_gcm_enc_data[id];
875 return aes_gcm_enc_dec(tst->alg, tst->pt, tst->pt_len,
876 tst->key, tst->key_len,
877 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
878 tst->ct, tst->ct_len, tst->tag, tst->tag_len,
880 && aes_gcm_enc_dec(tst->alg, tst->ct, tst->ct_len,
881 tst->key, tst->key_len,
882 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
883 tst->pt, tst->pt_len, tst->tag, tst->tag_len,
886 && aes_gcm_enc_dec(tst->alg, tst->ct, tst->ct_len,
887 tst->key, tst->key_len,
888 tst->iv, tst->iv_len, tst->aad, tst->aad_len,
889 tst->pt, tst->pt_len, tst->aad, tst->tag_len,
951 const struct dh_safe_prime_keygen_st *tst = &dh_safe_prime_keygen_data[id];
954 (char *)tst->group_name, 0);
984 const struct dh_safe_prime_keyver_st *tst = &dh_safe_prime_keyver_data[id];
987 || !TEST_true(dh_create_pkey(&pkey, tst->group_name,
988 tst->pub, tst->pub_len,
989 tst->priv, tst->priv_len, bn_ctx, 1))
991 || !TEST_int_eq(EVP_PKEY_check(key_ctx), tst->pass))
1067 const struct rsa_keygen_st *tst = &rsa_keygen_data[id];
1070 || !TEST_ptr(xp1_bn = BN_bin2bn(tst->xp1, tst->xp1_len, NULL))
1071 || !TEST_ptr(xp2_bn = BN_bin2bn(tst->xp2, tst->xp2_len, NULL))
1072 || !TEST_ptr(xp_bn = BN_bin2bn(tst->xp, tst->xp_len, NULL))
1073 || !TEST_ptr(xq1_bn = BN_bin2bn(tst->xq1, tst->xq1_len, NULL))
1074 || !TEST_ptr(xq2_bn = BN_bin2bn(tst->xq2, tst->xq2_len, NULL))
1075 || !TEST_ptr(xq_bn = BN_bin2bn(tst->xq, tst->xq_len, NULL))
1092 || !TEST_ptr(e_bn = BN_bin2bn(tst->e, tst->e_len, NULL))
1095 || !TEST_int_gt(EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, tst->mod), 0)
1116 if (!TEST_mem_eq(tst->p1, tst->p1_len, p1, p1_len)
1117 || !TEST_mem_eq(tst->p2, tst->p2_len, p2, p2_len)
1118 || !TEST_mem_eq(tst->p, tst->p_len, p, p_len)
1119 || !TEST_mem_eq(tst->q1, tst->q1_len, q1, q1_len)
1120 || !TEST_mem_eq(tst->q2, tst->q2_len, q2, q2_len)
1121 || !TEST_mem_eq(tst->q, tst->q_len, q, q_len)
1122 || !TEST_mem_eq(tst->n, tst->n_len, n, n_len)
1123 || !TEST_mem_eq(tst->d, tst->d_len, d, d_len))
1165 const struct rsa_siggen_st *tst = &rsa_siggen_data[id];
1166 int salt_len = tst->pss_salt_len;
1168 TEST_note("RSA %s signature generation", tst->sig_pad_mode);
1172 (char *)tst->sig_pad_mode, 0);
1174 (char *)tst->digest_alg, 0);
1180 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", tst->mod))
1183 || !TEST_true(sig_gen(pkey, params, tst->digest_alg,
1184 tst->msg, tst->msg_len,
1207 const struct rsa_sigver_st *tst = &rsa_sigver_data[id];
1208 int salt_len = tst->pss_salt_len;
1210 TEST_note("RSA %s Signature Verify : expected to %s ", tst->sig_pad_mode,
1211 tst->pass == PASS ? "pass" : "fail");
1215 (char *)tst->sig_pad_mode, 0);
1217 (char *)tst->digest_alg, 0);
1224 || !TEST_true(rsa_create_pkey(&pkey, tst->n, tst->n_len,
1225 tst->e, tst->e_len, NULL, 0, bn_ctx))
1228 tst->digest_alg, libctx, NULL,
1231 || !TEST_int_eq(EVP_DigestVerify(md_ctx, tst->sig, tst->sig_len,
1232 tst->msg, tst->msg_len), tst->pass))
1252 const struct rsa_decrypt_prim_st *tst = &rsa_decrypt_prim_data[id];
1264 if (EVP_PKEY_decrypt(ctx, pt, &pt_len, tst->ct, tst->ct_len) <= 0)
1318 const struct drbg_st *tst = &drbg_data[id];
1334 if (!TEST_ptr(rand = EVP_RAND_fetch(libctx, tst->drbg_name, ""))
1340 (int *)&tst->use_df);
1342 (char *)tst->cipher, 0);
1349 (void *)tst->entropy_input,
1350 tst->entropy_input_len);
1352 (void *)tst->nonce,
1353 tst->nonce_len);
1379 tst->returned_bits, tst->returned_bits_len))