Lines Matching refs:keyword

694                              const char *keyword, const char *value)  in digest_test_parse()  argument
698 if (strcmp(keyword, "Input") == 0) in digest_test_parse()
700 if (strcmp(keyword, "Output") == 0) in digest_test_parse()
702 if (strcmp(keyword, "Count") == 0) in digest_test_parse()
704 if (strcmp(keyword, "Ncopy") == 0) in digest_test_parse()
706 if (strcmp(keyword, "Padding") == 0) in digest_test_parse()
708 if (strcmp(keyword, "XOF") == 0) in digest_test_parse()
710 if (strcmp(keyword, "OutputSize") == 0) { in digest_test_parse()
990 static int cipher_test_parse(EVP_TEST *t, const char *keyword, in cipher_test_parse() argument
996 if (strcmp(keyword, "Key") == 0) in cipher_test_parse()
998 if (strcmp(keyword, "Rounds") == 0) { in cipher_test_parse()
1005 if (strcmp(keyword, "IV") == 0) in cipher_test_parse()
1007 if (strcmp(keyword, "NextIV") == 0) in cipher_test_parse()
1009 if (strcmp(keyword, "Plaintext") == 0) in cipher_test_parse()
1011 if (strcmp(keyword, "Ciphertext") == 0) in cipher_test_parse()
1013 if (strcmp(keyword, "KeyBits") == 0) { in cipher_test_parse()
1023 if (strcmp(keyword, "TLSAAD") == 0) in cipher_test_parse()
1025 if (strcmp(keyword, "AAD") == 0 || tls_aad) { in cipher_test_parse()
1032 if (strcmp(keyword, "Tag") == 0) in cipher_test_parse()
1034 if (strcmp(keyword, "SetTagLate") == 0) { in cipher_test_parse()
1043 if (strcmp(keyword, "MACKey") == 0) in cipher_test_parse()
1045 if (strcmp(keyword, "TLSVersion") == 0) { in cipher_test_parse()
1053 if (strcmp(keyword, "Operation") == 0) { in cipher_test_parse()
1062 if (strcmp(keyword, "CTSMode") == 0) { in cipher_test_parse()
1066 if (strcmp(keyword, "XTSStandard") == 0) { in cipher_test_parse()
1070 if (strcmp(keyword, "CtrlInit") == 0) in cipher_test_parse()
1668 const char *keyword, const char *value) in mac_test_parse() argument
1672 if (strcmp(keyword, "Key") == 0) in mac_test_parse()
1674 if (strcmp(keyword, "IV") == 0) in mac_test_parse()
1676 if (strcmp(keyword, "Custom") == 0) in mac_test_parse()
1678 if (strcmp(keyword, "Salt") == 0) in mac_test_parse()
1680 if (strcmp(keyword, "Algorithm") == 0) { in mac_test_parse()
1686 if (strcmp(keyword, "Input") == 0) in mac_test_parse()
1688 if (strcmp(keyword, "Output") == 0) in mac_test_parse()
1690 if (strcmp(keyword, "XOF") == 0) in mac_test_parse()
1692 if (strcmp(keyword, "NoReinit") == 0) in mac_test_parse()
1694 if (strcmp(keyword, "Ctrl") == 0) in mac_test_parse()
1696 if (strcmp(keyword, "OutputSize") == 0) { in mac_test_parse()
1702 if (strcmp(keyword, "BlockSize") == 0) { in mac_test_parse()
2166 static int kem_test_parse(EVP_TEST *t, const char *keyword, const char *value) in kem_test_parse() argument
2170 if (strcmp(keyword, "Op") == 0) { in kem_test_parse()
2174 if (strcmp(keyword, "CtrlInit") == 0) in kem_test_parse()
2176 if (strcmp(keyword, "Input") == 0) in kem_test_parse()
2178 if (strcmp(keyword, "Output") == 0) in kem_test_parse()
2522 const char *keyword, const char *value) in pkey_test_parse() argument
2525 if (strcmp(keyword, "Input") == 0) in pkey_test_parse()
2527 if (strcmp(keyword, "Output") == 0) in pkey_test_parse()
2529 if (strcmp(keyword, "CtrlInit") == 0) in pkey_test_parse()
2531 if (strcmp(keyword, "Ctrl") == 0) in pkey_test_parse()
2778 const char *keyword, const char *value) in pderive_test_parse() argument
2783 if (strcmp(keyword, "PeerKeyValidate") == 0) in pderive_test_parse()
2786 if (validate || strcmp(keyword, "PeerKey") == 0) { in pderive_test_parse()
2795 if (strcmp(keyword, "SharedSecret") == 0) in pderive_test_parse()
2797 if (strcmp(keyword, "Ctrl") == 0) in pderive_test_parse()
2799 if (strcmp(keyword, "CtrlInit") == 0) in pderive_test_parse()
2918 const char *keyword, const char *value) in scrypt_test_parse() argument
2922 if (strcmp(keyword, "N") == 0) in scrypt_test_parse()
2924 if (strcmp(keyword, "p") == 0) in scrypt_test_parse()
2926 if (strcmp(keyword, "r") == 0) in scrypt_test_parse()
2928 if (strcmp(keyword, "maxmem") == 0) in scrypt_test_parse()
2935 const char *keyword, const char *value) in pbkdf2_test_parse() argument
2939 if (strcmp(keyword, "iter") == 0) { in pbkdf2_test_parse()
2945 if (strcmp(keyword, "MD") == 0) { in pbkdf2_test_parse()
2955 const char *keyword, const char *value) in pkcs12_test_parse() argument
2959 if (strcmp(keyword, "id") == 0) { in pkcs12_test_parse()
2965 return pbkdf2_test_parse(t, keyword, value); in pkcs12_test_parse()
3005 const char *keyword, const char *value) in pbe_test_parse() argument
3009 if (strcmp(keyword, "Password") == 0) in pbe_test_parse()
3011 if (strcmp(keyword, "Salt") == 0) in pbe_test_parse()
3013 if (strcmp(keyword, "Key") == 0) in pbe_test_parse()
3016 return pbkdf2_test_parse(t, keyword, value); in pbe_test_parse()
3018 return pkcs12_test_parse(t, keyword, value); in pbe_test_parse()
3021 return scrypt_test_parse(t, keyword, value); in pbe_test_parse()
3150 const char *keyword, const char *value) in encode_test_parse() argument
3154 if (strcmp(keyword, "Input") == 0) in encode_test_parse()
3156 if (strcmp(keyword, "Output") == 0) in encode_test_parse()
3369 const char *keyword, const char *value) in rand_test_parse() argument
3376 if ((p = strchr(keyword, '.')) != NULL) { in rand_test_parse()
3383 if (HAS_PREFIX(keyword, "Entropy.")) in rand_test_parse()
3385 if (HAS_PREFIX(keyword, "ReseedEntropy.")) in rand_test_parse()
3388 if (HAS_PREFIX(keyword, "Nonce.")) in rand_test_parse()
3390 if (HAS_PREFIX(keyword, "PersonalisationString.")) in rand_test_parse()
3392 if (HAS_PREFIX(keyword, "ReseedAdditionalInput.")) in rand_test_parse()
3395 if (HAS_PREFIX(keyword, "AdditionalInputA.")) in rand_test_parse()
3397 if (HAS_PREFIX(keyword, "AdditionalInputB.")) in rand_test_parse()
3399 if (HAS_PREFIX(keyword, "EntropyPredictionResistanceA.")) in rand_test_parse()
3401 if (HAS_PREFIX(keyword, "EntropyPredictionResistanceB.")) in rand_test_parse()
3403 if (HAS_PREFIX(keyword, "Output.")) in rand_test_parse()
3406 if (strcmp(keyword, "Cipher") == 0) in rand_test_parse()
3408 if (strcmp(keyword, "Digest") == 0) in rand_test_parse()
3410 if (strcmp(keyword, "DerivationFunction") == 0) { in rand_test_parse()
3414 if (strcmp(keyword, "GenerateBits") == 0) { in rand_test_parse()
3420 if (strcmp(keyword, "PredictionResistance") == 0) { in rand_test_parse()
3424 if (strcmp(keyword, "CtrlInit") == 0) in rand_test_parse()
3727 const char *keyword, const char *value) in kdf_test_parse() argument
3731 if (strcmp(keyword, "Output") == 0) in kdf_test_parse()
3733 if (strcmp(keyword, "CtrlInit") == 0) in kdf_test_parse()
3735 if (HAS_PREFIX(keyword, "Ctrl")) in kdf_test_parse()
3855 const char *keyword, const char *value) in pkey_kdf_test_parse() argument
3859 if (strcmp(keyword, "Output") == 0) in pkey_kdf_test_parse()
3861 if (HAS_PREFIX(keyword, "Ctrl")) in pkey_kdf_test_parse()
3989 static int void_test_parse(EVP_TEST *t, const char *keyword, const char *value) in void_test_parse() argument
4085 const char *keyword, const char *value) in keygen_test_parse() argument
4089 if (strcmp(keyword, "KeyName") == 0) in keygen_test_parse()
4091 if (strcmp(keyword, "KeyParam") == 0) in keygen_test_parse()
4093 if (strcmp(keyword, "Ctrl") == 0) in keygen_test_parse()
4262 const char *keyword, const char *value) in digestsigver_test_parse() argument
4266 if (strcmp(keyword, "Key") == 0) { in digestsigver_test_parse()
4282 if (strcmp(keyword, "Input") == 0) { in digestsigver_test_parse()
4287 if (strcmp(keyword, "Output") == 0) in digestsigver_test_parse()
4291 if (strcmp(keyword, "Count") == 0) in digestsigver_test_parse()
4293 if (strcmp(keyword, "Ncopy") == 0) in digestsigver_test_parse()
4296 if (strcmp(keyword, "Ctrl") == 0) in digestsigver_test_parse()
4298 if (strcmp(keyword, "CtrlInit") == 0) in digestsigver_test_parse()
4300 if (strcmp(keyword, "NonceType") == 0) { in digestsigver_test_parse()