• Home
  • Raw
  • Download

Lines Matching +full:no +full:- +full:fips

2  * Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved.
79 * Use 512-bit DH(X) keys with predetermined parameters for efficiency, in make_template()
90 * No real need to check the errors other than for the cascade in make_template()
115 * No real need to check the errors other than for the cascade in make_key()
253 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov()
254 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_prov()
258 mem_buf->data = NULL; in encode_EVP_PKEY_prov()
259 mem_buf->length = 0; in encode_EVP_PKEY_prov()
368 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM()
369 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_legacy_PEM()
373 mem_buf->data = NULL; in encode_EVP_PKEY_legacy_PEM()
374 mem_buf->length = 0; in encode_EVP_PKEY_legacy_PEM()
407 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_MSBLOB()
408 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_MSBLOB()
412 mem_buf->data = NULL; in encode_EVP_PKEY_MSBLOB()
413 mem_buf->length = 0; in encode_EVP_PKEY_MSBLOB()
447 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_PVK()
448 || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) in encode_EVP_PKEY_PVK()
452 mem_buf->data = NULL; in encode_EVP_PKEY_PVK()
453 mem_buf->length = 0; in encode_EVP_PKEY_PVK()
506 test_output_string(label, data, data_len - 1); in dump_pem()
537 static int test_unprotected_via_DER(const char *type, EVP_PKEY *key, int fips) in test_unprotected_via_DER() argument
545 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_DER()
553 "-----BEGIN " PEM_STRING_PKCS8INF "-----"; in check_unprotected_PKCS8_PEM()
556 sizeof(expected_pem_header) - 1); in check_unprotected_PKCS8_PEM()
559 static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key, int fips) in test_unprotected_via_PEM() argument
567 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_unprotected_via_PEM()
606 "-----BEGIN %s PARAMETERS-----", type), 0) in check_params_PEM()
613 "DER", "type-specific", NULL, NULL, in test_params_via_DER()
622 "PEM", "type-specific", NULL, NULL, in test_params_via_PEM()
638 "-----BEGIN %s PRIVATE KEY-----", type), 0) in check_unprotected_legacy_PEM()
645 … return TEST_skip("Test not available if using a non-default library context or FIPS provider"); in test_unprotected_via_legacy_PEM()
650 "PEM", "type-specific", NULL, NULL, in test_unprotected_via_legacy_PEM()
699 static const char *pass_cipher = "AES-256-CBC";
714 static int test_protected_via_DER(const char *type, EVP_PKEY *key, int fips) in test_protected_via_DER() argument
723 dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_DER()
731 "-----BEGIN " PEM_STRING_PKCS8 "-----"; in check_protected_PKCS8_PEM()
734 sizeof(expected_pem_header) - 1); in check_protected_PKCS8_PEM()
737 static int test_protected_via_PEM(const char *type, EVP_PKEY *key, int fips) in test_protected_via_PEM() argument
746 dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); in test_protected_via_PEM()
758 "-----BEGIN %s PRIVATE KEY-----", type), 0) in check_protected_legacy_PEM()
760 && TEST_FL_ptr(strstr(data, "\nDEK-Info: ")); in check_protected_legacy_PEM()
766 … return TEST_skip("Test not available if using a non-default library context or FIPS provider"); in test_protected_via_legacy_PEM()
771 "PEM", "type-specific", pass, pass_cipher, in test_protected_via_legacy_PEM()
807 static int test_public_via_DER(const char *type, EVP_PKEY *key, int fips) in test_public_via_DER() argument
815 fips ? 0 : FLAG_FAIL_IF_FIPS); in test_public_via_DER()
822 "-----BEGIN " PEM_STRING_PUBLIC "-----"; in check_public_PEM()
826 sizeof(expected_pem_header) - 1); in check_public_PEM()
829 static int test_public_via_PEM(const char *type, EVP_PKEY *key, int fips) in test_public_via_PEM() argument
837 fips ? 0 : FLAG_FAIL_IF_FIPS); in test_public_via_PEM()
882 #define IMPLEMENT_TEST_SUITE(KEYTYPE, KEYTYPEstr, fips) \ argument
885 return test_unprotected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \
889 return test_unprotected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \
893 return test_protected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \
897 return test_protected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \
901 return test_public_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \
905 return test_public_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \
985 * DH has no support for PEM_write_bio_PrivateKey_traditional(),
986 * so no legacy tests.
1028 * ED25519, ED448, X25519 and X448 have no support for
1029 * PEM_write_bio_PrivateKey_traditional(), so no legacy tests.
1036 IMPLEMENT_TEST_SUITE(RSA_PSS, "RSA-PSS", 1)
1038 * RSA-PSS has no support for PEM_write_bio_PrivateKey_traditional(),
1039 * so no legacy tests.
1152 /* sect233k1 characteristic-two-field tpBasis */ in do_create_ec_explicit_trinomial_params()
1231 OPT_ERR = -1,
1245 { "context", OPT_CONTEXT, '-', in test_get_options()
1246 "Explicitly use a non-default library context" }, in test_get_options()
1250 "PEM format RSA-PSS key file to encode/decode" }, in test_get_options()
1281 OSSL_PARAM_utf8_string("group", groupname, sizeof(groupname) - 1), in setup_tests()
1312 if (strcmp(prov_name, "fips") == 0) in setup_tests()
1323 /* FIPS(3.0.0): provider imports explicit params but they won't work #17998 */ in setup_tests()
1392 * DH has no support for PEM_write_bio_PrivateKey_traditional(), in setup_tests()
1393 * so no legacy tests. in setup_tests()
1425 * ED25519, ED448, X25519 and X448 have no support for in setup_tests()
1426 * PEM_write_bio_PrivateKey_traditional(), so no legacy tests. in setup_tests()
1433 * RSA-PSS has no support for PEM_write_bio_PrivateKey_traditional(), in setup_tests()
1434 * so no legacy tests. in setup_tests()