/*
- * Copyright 2018-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved.
* Copyright (c) 2018-2019, Oracle and/or its affiliates. All rights reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
static EVP_KDF_CTX *get_kdfbyname(const char *name)
{
EVP_KDF *kdf = EVP_KDF_fetch(NULL, name, NULL);
- EVP_KDF_CTX *kctx = EVP_KDF_new_ctx(kdf);
+ EVP_KDF_CTX *kctx = EVP_KDF_CTX_new(kdf);
EVP_KDF_free(kdf);
return kctx;
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_TLS1_PRF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_HKDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
*p = OSSL_PARAM_construct_end();
if (!TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_PBKDF2))
- || !TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ || !TEST_true(EVP_KDF_CTX_set_params(kctx, params))
|| !TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
|| !TEST_mem_eq(out, sizeof(out), expected, sizeof(expected))
- || !TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ || !TEST_true(EVP_KDF_CTX_set_params(kctx, params))
/* A key length that is too small should fail */
|| !TEST_int_eq(EVP_KDF_derive(kctx, out, 112 / 8 - 1), 0)
/* A key length that is too large should fail */
#endif
ret = 1;
err:
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_SCRYPT))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
/* failure test *//*
&& TEST_int_le(EVP_KDF_derive(kctx, out, sizeof(out)), 0)*/
&& TEST_true(OSSL_PARAM_set_uint(p - 1, 10 * 1024 * 1024))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, p - 1))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, p - 1))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
#endif /* OPENSSL_NO_SCRYPT */
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_SSKDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_X963KDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
kctx = get_kdfbyname("KBKDF");
ret = TEST_ptr(kctx)
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
&& TEST_mem_eq(result, sizeof(result), outputs[i],
sizeof(outputs[i]));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
if (ret != 1)
return ret;
}
kctx = get_kdfbyname("KBKDF");
ret = TEST_ptr(kctx)
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
&& TEST_mem_eq(result, sizeof(result), outputs[i],
sizeof(outputs[i]));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
if (ret != 1)
return ret;
}
kctx = get_kdfbyname("KBKDF");
ret = TEST_ptr(kctx)
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
&& TEST_mem_eq(result, sizeof(result), output, sizeof(output));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
kctx = get_kdfbyname("KBKDF");
ret = TEST_ptr(kctx)
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
&& TEST_mem_eq(result, sizeof(result), output, sizeof(output));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_SSKDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_SSKDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_SSHKDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_X942KDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}
#endif /* OPENSSL_NO_CMS */
ret =
TEST_ptr(kctx = get_kdfbyname(OSSL_KDF_NAME_KRB5KDF))
- && TEST_true(EVP_KDF_set_ctx_params(kctx, params))
+ && TEST_true(EVP_KDF_CTX_set_params(kctx, params))
&& TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
&& TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
return ret;
}