int setup_tests(void) { ADD_TEST(test_EVP_DigestSignInit); ADD_TEST(test_EVP_DigestVerifyInit); ADD_TEST(test_EVP_Enveloped); ADD_ALL_TESTS(test_d2i_AutoPrivateKey, OSSL_NELEM(keydata)); #ifndef OPENSSL_NO_EC ADD_TEST(test_EVP_PKCS82PKEY); #endif #ifndef OPENSSL_NO_SM2 ADD_TEST(test_EVP_SM2); ADD_TEST(test_EVP_SM2_verify); #endif ADD_ALL_TESTS(test_set_get_raw_keys, OSSL_NELEM(keys)); custom_pmeth = EVP_PKEY_meth_new(0xdefaced, 0); if (!TEST_ptr(custom_pmeth)) return 0; EVP_PKEY_meth_set_check(custom_pmeth, pkey_custom_check); EVP_PKEY_meth_set_public_check(custom_pmeth, pkey_custom_pub_check); EVP_PKEY_meth_set_param_check(custom_pmeth, pkey_custom_param_check); if (!TEST_int_eq(EVP_PKEY_meth_add0(custom_pmeth), 1)) return 0; ADD_ALL_TESTS(test_EVP_PKEY_check, OSSL_NELEM(keycheckdata)); ADD_TEST(test_HKDF); #ifndef OPENSSL_NO_EC ADD_TEST(test_X509_PUBKEY_inplace); #endif return 1; }
int setup_tests(void) { #ifndef OPENSSL_NO_BF # ifdef CHARSET_EBCDIC int n; ebcdic2ascii(cbc_data, cbc_data, strlen(cbc_data)); for (n = 0; n < 2; n++) { ebcdic2ascii(bf_key[n], bf_key[n], strlen(bf_key[n])); } # endif if (test_get_argument(0) != NULL) { print_test_data(); } else { ADD_ALL_TESTS(test_bf_ecb_raw, 2); ADD_ALL_TESTS(test_bf_ecb, NUM_TESTS); ADD_ALL_TESTS(test_bf_set_key, KEY_TEST_NUM-1); ADD_TEST(test_bf_cbc); ADD_TEST(test_bf_cfb64); ADD_TEST(test_bf_ofb64); } #endif return 1; }
int setup_tests(void) { ADD_ALL_TESTS(test_aes_cts128, OSSL_NELEM(aes_cts128_vectors)); ADD_ALL_TESTS(test_aes_cts128_nist, OSSL_NELEM(aes_cts128_vectors)); ADD_ALL_TESTS(test_gcm128, OSSL_NELEM(gcm128_vectors)); return 1; }
int setup_tests(void) { /* * On platforms where |time_t| is an unsigned integer, t will be a * positive number. * * We check if we're on a platform with a signed |time_t| with '!(t > 0)' * because some compilers are picky if you do 't < 0', or even 't <= 0' * if |t| is unsigned. */ time_t t = -1; /* * On some platforms, |time_t| is signed, but a negative value is an * error, and using it with gmtime() or localtime() generates a NULL. * If that is the case, we can't perform tests on negative values. */ struct tm *ptm = localtime(&t); ADD_ALL_TESTS(test_table_pos, OSSL_NELEM(tbl_testdata_pos)); if (!(t > 0) && ptm != NULL) { TEST_info("Adding negative-sign time_t tests"); ADD_ALL_TESTS(test_table_neg, OSSL_NELEM(tbl_testdata_neg)); } if (sizeof(time_t) > sizeof(uint32_t)) { TEST_info("Adding 64-bit time_t tests"); ADD_ALL_TESTS(test_table_pos_64bit, OSSL_NELEM(tbl_testdata_pos_64bit)); if (!(t > 0) && ptm != NULL) { TEST_info("Adding negative-sign 64-bit time_t tests"); ADD_ALL_TESTS(test_table_neg_64bit, OSSL_NELEM(tbl_testdata_neg_64bit)); } } ADD_ALL_TESTS(test_table_compare, OSSL_NELEM(tbl_compare_testdata)); return 1; }
int setup_tests(void) { app_data_index = RAND_DRBG_get_ex_new_index(0L, NULL, NULL, NULL, NULL); ADD_ALL_TESTS(test_kats, OSSL_NELEM(drbg_test)); ADD_ALL_TESTS(test_error_checks, OSSL_NELEM(drbg_test)); ADD_TEST(test_rand_add); return 1; }
int setup_tests(void) { if (!TEST_ptr(cert = test_get_argument(0)) || !TEST_ptr(privkey = test_get_argument(1))) return 0; ADD_ALL_TESTS(test_dtls_unprocessed, NUM_TESTS); ADD_ALL_TESTS(test_dtls_drop_records, TOTAL_RECORDS); return 1; }
int test_main(int argc, char **argv) { if (argc == 2 && strcmp(argv[1], "-expected") == 0) justprint = 1; ADD_TEST(test_big); ADD_ALL_TESTS(test_fp, nelem(pw_params)); ADD_ALL_TESTS(test_zu, nelem(zu_data)); ADD_ALL_TESTS(test_j, nelem(jf_data)); return run_tests(argv[0]); }
int setup_tests(void) { ADD_TEST(test_property_string); ADD_ALL_TESTS(test_property_parse, OSSL_NELEM(parser_tests)); ADD_ALL_TESTS(test_property_merge, OSSL_NELEM(merge_tests)); ADD_TEST(test_property_defn_cache); ADD_ALL_TESTS(test_definition_compares, OSSL_NELEM(definition_tests)); ADD_TEST(test_register_deregister); ADD_TEST(test_property); ADD_TEST(test_query_cache_stochastic); return 1; }
int main(int argc, char *argv[]) { BIO *err = NULL; int testresult = 1; if (argc != 3) { printf("Invalid argument count\n"); return 1; } cert = argv[1]; privkey = argv[2]; err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT); CRYPTO_set_mem_debug(1); CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); ADD_TEST(test_large_message_tls); ADD_TEST(test_large_message_tls_read_ahead); #ifndef OPENSSL_NO_DTLS ADD_TEST(test_large_message_dtls); #endif #ifndef OPENSSL_NO_OCSP ADD_TEST(test_tlsext_status_type); #endif ADD_TEST(test_session_with_only_int_cache); ADD_TEST(test_session_with_only_ext_cache); ADD_TEST(test_session_with_both_cache); ADD_ALL_TESTS(test_ssl_set_bio, TOTAL_SSL_SET_BIO_TESTS); ADD_TEST(test_ssl_bio_pop_next_bio); ADD_TEST(test_ssl_bio_pop_ssl_bio); ADD_TEST(test_ssl_bio_change_rbio); ADD_TEST(test_ssl_bio_change_wbio); ADD_ALL_TESTS(test_set_sigalgs, OSSL_NELEM(testsigalgs) * 2); ADD_ALL_TESTS(test_custom_exts, 2); testresult = run_tests(argv[0]); bio_s_mempacket_test_free(); #ifndef OPENSSL_NO_CRYPTO_MDEBUG if (CRYPTO_mem_leaks(err) <= 0) testresult = 1; #endif BIO_free(err); if (!testresult) printf("PASS\n"); return testresult; }
int setup_tests(void) { if (test_has_option("-h")) { printf("-h\tThis help\n"); printf("-b\tBenchmark gcm128 in addition to the tests\n"); return 1; } ADD_ALL_TESTS(test_aes_cts128, OSSL_NELEM(aes_cts128_vectors)); ADD_ALL_TESTS(test_aes_cts128_nist, OSSL_NELEM(aes_cts128_vectors)); ADD_ALL_TESTS(test_gcm128, OSSL_NELEM(gcm128_vectors)); return 1; }
int setup_tests(void) { #ifdef OPENSSL_NO_EC TEST_note("Elliptic curves are disabled."); #else /* get a list of all internal curves */ crv_len = EC_get_builtin_curves(NULL, 0); if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) || !TEST_true(EC_get_builtin_curves(curves, crv_len))) return 0; ADD_ALL_TESTS(test_builtin, crv_len); ADD_ALL_TESTS(x9_62_tests, OSSL_NELEM(ecdsa_cavs_kats)); #endif return 1; }
int setup_tests(void) { ADD_ALL_TESTS(test_param_int, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_long, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_uint, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_ulong, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_int32, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_uint32, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_size_t, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_int64, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_uint64, OSSL_NELEM(raw_values)); ADD_ALL_TESTS(test_param_bignum, OSSL_NELEM(raw_values)); ADD_TEST(test_param_real); ADD_TEST(test_param_construct); return 1; }
int setup_tests(void) { #ifndef OPENSSL_NO_MD2 ADD_ALL_TESTS(test_md2, OSSL_NELEM(test)); #endif return 1; }
int setup_tests(void) { #ifndef OPENSSL_NO_RC2 ADD_ALL_TESTS(test_rc2, OSSL_NELEM(RC2key)); #endif return 1; }
int setup_tests(void) { #ifndef OPENSSL_NO_CAST ADD_ALL_TESTS(cast_test_vector, OSSL_NELEM(k_len)); ADD_TEST(cast_test_iterations); #endif return 1; }
int setup_tests(void) { if (!TEST_ptr(cert = test_get_argument(0)) || !TEST_ptr(privkey = test_get_argument(1))) return 0; ADD_ALL_TESTS(test_servername, OSSL_NELEM(sni_test_fns)); return 1; }
int setup_tests(void) { size_t n = test_get_argument_count(); if (!TEST_int_gt(n, 0)) return 0; ADD_ALL_TESTS(test_509_dup_cert, n); return 1; }
int setup_tests(void) { if (!TEST_ptr(cert = test_get_argument(0)) || !TEST_ptr(privkey = test_get_argument(1))) return 0; ADD_ALL_TESTS(test_tls13ccs, 12); return 1; }
int setup_tests(void) { time_t t = -1; struct tm *ptm = localtime(&t); ADD_ALL_TESTS(test_table_pos, OSSL_NELEM(tbl_testdata_pos)); if (ptm != NULL) { TEST_info("Adding negative-sign time_t tests"); ADD_ALL_TESTS(test_table_neg, OSSL_NELEM(tbl_testdata_neg)); } if (sizeof(time_t) > sizeof(uint32_t)) { TEST_info("Adding 64-bit time_t tests"); ADD_ALL_TESTS(test_table_pos_64bit, OSSL_NELEM(tbl_testdata_pos_64bit)); if (ptm != NULL) { TEST_info("Adding negative-sign 64-bit time_t tests"); ADD_ALL_TESTS(test_table_neg_64bit, OSSL_NELEM(tbl_testdata_neg_64bit)); } } return 1; }
int setup_tests(void) { if (!TEST_ptr(ctx = BN_CTX_new())) return 0; ADD_TEST(test_is_prime_enhanced); ADD_ALL_TESTS(test_is_composite_enhanced, (int)OSSL_NELEM(composites)); ADD_TEST(test_bn_small_factors); return 1; }
int test_main(int argc, char *argv[]) { if (argc != 2) return EXIT_FAILURE; sessionfile = argv[1]; ADD_ALL_TESTS(test_client_hello, TOTAL_NUM_TESTS); return run_tests(argv[0]); }
int setup_tests(void) { if (!TEST_ptr(certstr = test_get_argument(0)) || !TEST_ptr(privkeystr = test_get_argument(1))) return 0; #ifndef OPENSSL_NO_OCSP ADD_TEST(test_resp_signer); ADD_ALL_TESTS(test_access_description, 3); ADD_TEST(test_ocsp_url_svcloc_new); #endif return 1; }
int setup_tests(void) { size_t n = test_get_argument_count(); if (!TEST_int_gt(n, 0)) { TEST_note("usage: x509_dup_cert_test cert.pem..."); return 0; } ADD_ALL_TESTS(test_509_dup_cert, n); return 1; }
int test_main(int argc, char *argv[]) { #ifndef OPENSSL_NO_BF # ifdef CHARSET_EBCDIC int n; ebcdic2ascii(cbc_data, cbc_data, strlen(cbc_data)); for (n = 0; n < 2; n++) { ebcdic2ascii(bf_key[n], bf_key[n], strlen(bf_key[n])); } # endif ADD_ALL_TESTS(test_bf_ecb_raw, 2); ADD_ALL_TESTS(test_bf_ecb, NUM_TESTS); ADD_ALL_TESTS(test_bf_set_key, KEY_TEST_NUM-1); ADD_TEST(test_bf_cbc); ADD_TEST(test_bf_cfb64); ADD_TEST(test_bf_ofb64); if (argc > 1) return print_test_data(); #endif return run_tests(argv[0]); }
int setup_tests(void) { ADD_TEST(test_check_public_exponent); ADD_TEST(test_check_prime_factor_range); ADD_TEST(test_check_prime_factor); ADD_TEST(test_check_private_exponent); ADD_TEST(test_check_crt_components); ADD_TEST(test_check_private_key); ADD_TEST(test_check_public_key); ADD_TEST(test_invalid_keypair); ADD_TEST(test_pq_diff); ADD_TEST(test_fips1864_keygen_kat); ADD_ALL_TESTS(test_sp80056b_keygen, (int)OSSL_NELEM(keygen_size)); return 1; }
int test_main(int argc, char *argv[]) { int testresult = 1; if (!TEST_int_eq(argc, 3)) return 1; cert = argv[1]; privkey = argv[2]; ADD_ALL_TESTS(test_dtls_unprocessed, NUM_TESTS); testresult = run_tests(argv[0]); bio_f_tls_dump_filter_free(); bio_s_mempacket_test_free(); return testresult; }
int setup_tests(void) { if (test_has_option("-h")) { BIO_printf(bio_out, "-h\tThis help\n"); BIO_printf(bio_out, "-b\tBenchmark in addition to the tests\n"); return 1; } b_stderr = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT); b_stdout = BIO_new_fp(stdout, BIO_NOCLOSE | BIO_FP_TEXT); #ifdef OPENSSL_SYS_VMS b_stderr = BIO_push(BIO_new(BIO_f_linebuffer()), b_stderr); b_stdout = BIO_push(BIO_new(BIO_f_linebuffer()), b_stdout); #endif ADD_TEST(test_siphash_basic); ADD_ALL_TESTS(test_siphash, OSSL_NELEM(tests)); if (test_has_option("-b")) ADD_TEST(benchmark_siphash); return 1; }
int main(int argc, char **argv) { int result = 0; long num_tests; if (argc != 2) return 1; conf = NCONF_new(NULL); OPENSSL_assert(conf != NULL); /* argv[1] should point to the test conf file */ OPENSSL_assert(NCONF_load(conf, argv[1], NULL) > 0); OPENSSL_assert(NCONF_get_number_e(conf, NULL, "num_tests", &num_tests)); ADD_ALL_TESTS(test_handshake, (int)(num_tests)); result = run_tests(argv[0]); return result; }
int test_main(int argc, char **argv) { int result = 0; if (argc != 2) { TEST_info("Missing file argument"); goto end; } if (!TEST_ptr(conf = NCONF_new(NULL)) /* argv[1] should point to test/ssl_test_ctx_test.conf */ || !TEST_int_gt(NCONF_load(conf, argv[1], NULL), 0)) goto end; ADD_TEST(test_empty_configuration); ADD_TEST(test_good_configuration); ADD_ALL_TESTS(test_bad_configuration, OSSL_NELEM(bad_configurations)); result = run_tests(argv[0]); end: NCONF_free(conf); return result; }
int test_main(int argc, char **argv) { int result = 0; if (argc != 2) return 1; conf = NCONF_new(NULL); TEST_check(conf != NULL); /* argv[1] should point to test/ssl_test_ctx_test.conf */ TEST_check(NCONF_load(conf, argv[1], NULL) > 0); ADD_TEST(test_empty_configuration); ADD_TEST(test_good_configuration); ADD_ALL_TESTS(test_bad_configuration, OSSL_NELEM(bad_configurations)); result = run_tests(argv[0]); NCONF_free(conf); return result; }