Lines Matching defs:output

96  * case without producing unnecessary test framework output.
333 /* Expected output */
334 unsigned char *output;
371 OPENSSL_free(mdat->output);
383 return parse_bin(value, &mdata->output, &mdata->output_len);
476 expected->output, expected->output_len,
494 expected->output, expected->output_len)) {
729 * 'tmp' will store both output and copy of input. We make the copy
1058 "%s output and %s input, %sfragmented",
1137 /* Expected output */
1138 unsigned char *output;
1233 OPENSSL_free(mdat->output);
1258 return parse_bin(value, &mdata->output, &mdata->output_len);
1402 expected->output, expected->output_len,
1592 expected->output, expected->output_len,
1608 expected->output, expected->output_len,
1659 expected->output, expected->output_len)) {
1706 /* Expected output */
1707 unsigned char *output;
1758 OPENSSL_free(kdata->output);
1799 return parse_bin(value, &kdata->output, &kdata->output_len);
1824 expected->output, expected->output_len,
1849 expected->output, expected->output_len,
1909 if (EVP_PKEY_verify(kdata->ctx, kdata->output, kdata->output_len,
1949 return parse_bin(value, &kdata->output, &kdata->output_len);
2026 expected->output, expected->output_len,
2068 /* Expected output */
2289 /* Expected output */
2290 unsigned char *output;
2327 OPENSSL_free(edata->output);
2339 return parse_bin(value, &edata->output, &edata->output_len);
2373 expected->output, expected->output_len,
2383 if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output,
2437 unsigned char *output;
2454 /* Expected output */
2516 OPENSSL_free(rdata->data[i].output);
2564 return parse_bin(value, &item->output, &item->output_len);
2678 if (!TEST_mem_eq(got, got_len, item->output, item->output_len))
2712 /* Expected output */
2713 unsigned char *output;
2761 OPENSSL_free(kdata->output);
2813 return parse_bin(value, &kdata->output, &kdata->output_len);
2838 expected->output, expected->output_len,
2864 /* Expected output */
2865 unsigned char *output;
2903 OPENSSL_free(kdata->output);
2913 return parse_bin(value, &kdata->output, &kdata->output_len);
2926 /* FIPS(3.0.0): can't deal with oversized output buffers #18533 */
2929 /* Find out the KDF output size */
2936 * We may get an absurd output size, which signals that anything goes.
2937 * If not, we specify a too big buffer for the output, to test that
2954 if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) {
3220 unsigned char *output; /* Expected output */
3221 size_t output_len; /* Expected output length */
3264 OPENSSL_free(mdata->output);
3305 return parse_bin(value, &mdata->output, &mdata->output_len);
3353 expected->output, expected->output_len,
3391 if (EVP_DigestVerifyFinal(mdata->ctx, mdata->output,
3432 expected->output, expected->output_len,
3459 if (EVP_DigestVerify(mdata->ctx, mdata->output, mdata->output_len,