parameter names.
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/25008)
OPENSSL_free(keygen->alg);
OPENSSL_free(keygen->keyname);
OPENSSL_free(keygen->paramname);
- OPENSSL_free(keygen->alg);
OPENSSL_free(t->data);
t->data = NULL;
}
KEYGEN_TEST_DATA *keygen = t->data;
EVP_PKEY *pkey = NULL, *keyparams = NULL;
EVP_PKEY_CTX *genctx = NULL; /* Keygen context to use */
- int rv = 1, i;
+ int rv = 1;
OSSL_PARAM params[4];
size_t params_n = 0;
# Key generation test
KeyGen = dhKeyAgreement
-Ctrl = dh_param:ffdhe2048
+Ctrl = group:ffdhe2048
KeyName = tmpdh
# ffdhe2048-1 and ffdhe2048-2 were randomly generated and have a shared secret
# Key generation tests
KeyGen = rsaEncryption
-Ctrl = rsa_keygen_bits:128
+Ctrl = bits:128
KeyName = tmprsa
Result = PKEY_CTRL_ERROR
Reason = key size too small
# RSA-PSS with restrictions, should succeed.
KeyGen = RSASSA-PSS
KeyName = tmppss
-Ctrl = rsa_pss_keygen_md:sha256
-Ctrl = rsa_pss_keygen_mgf1_md:sha512
+Ctrl = digest:sha256
+Ctrl = mgf1-digest:sha512
# Check MGF1 restrictions
DigestVerify = SHA256