Lines Matching +full:step +full:- +full:size

18      * Step-1 Generate Integrity Data for the packet, using the implemented API  in TEST()
32 auto response = algoPtr->generateIntegrityData(packet); in TEST()
34 EXPECT_EQ(true, (response.size() == in TEST()
38 * Step-2 Generate Integrity data using OpenSSL SHA1 algorithm in TEST()
48 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
56 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST()
58 if (HMAC(EVP_sha1(), k1.data(), k1.size(), in TEST()
68 * Step-3 Check if the integrity data we generated using the implemented API in TEST()
78 * Step-1 Generate Integrity data using OpenSSL SHA1 algorithm in TEST()
96 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
104 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST()
106 if (HMAC(EVP_sha1(), k1.data(), k1.size(), in TEST()
116 * Step-2 Insert the integrity data into the packet in TEST()
118 auto packetSize = packet.size(); in TEST()
126 * Step-3 Invoke the verifyIntegrityData API and validate the response in TEST()
132 auto check = algoPtr->verifyIntegrityData( in TEST()
133 packet, packetSize - message::parser::RMCP_SESSION_HEADER_SIZE, in TEST()
142 * Step-1 Add hardcoded Integrity data to the packet in TEST()
154 std::advance(integrityIter, integrity.size()); in TEST()
157 * Step-2 Invoke the verifyIntegrityData API and validate the response in TEST()
169 auto check = algoPtr->verifyIntegrityData( in TEST()
170 packet, packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE, in TEST()
179 * Step-1 Generate Integrity Data for the packet, using the implemented API in TEST()
194 auto response = algoPtr->generateIntegrityData(packet); in TEST()
197 (response.size() == in TEST()
201 * Step-2 Generate Integrity data using OpenSSL SHA256 algorithm in TEST()
211 if (HMAC(EVP_sha256(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
219 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST()
221 if (HMAC(EVP_sha256(), k1.data(), k1.size(), in TEST()
231 * Step-3 Check if the integrity data we generated using the implemented API in TEST()
241 * Step-1 Generate Integrity data using OpenSSL SHA256 algorithm in TEST()
260 if (HMAC(EVP_sha256(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
268 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST()
270 if (HMAC(EVP_sha256(), k1.data(), k1.size(), in TEST()
280 * Step-2 Insert the integrity data into the packet in TEST()
282 auto packetSize = packet.size(); in TEST()
290 * Step-3 Invoke the verifyIntegrityData API and validate the response in TEST()
296 auto check = algoPtr->verifyIntegrityData( in TEST()
297 packet, packetSize - message::parser::RMCP_SESSION_HEADER_SIZE, in TEST()
306 * Step-1 Add hardcoded Integrity data to the packet in TEST()
318 std::advance(integrityIter, integrity.size()); in TEST()
321 * Step-2 Invoke the verifyIntegrityData API and validate the response in TEST()
334 auto check = algoPtr->verifyIntegrityData( in TEST()
335 packet, packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE, in TEST()
344 * Step-1 Generate the encrypted data using the implemented API for in TEST()
345 * AES-CBC-128 in TEST()
361 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
371 auto cipher = cryptPtr->encryptPayload(payload); in TEST()
374 * Step-2 Decrypt the encrypted payload using OpenSSL EVP_aes_128_cbc() in TEST()
383 FAIL() << "EVP_DecryptInit_ex failed for type AES-CBC-128"; in TEST()
388 cipher.size() + cipher::crypt::AlgoAES128::AESCBC128BlockSize); in TEST()
394 cipher.size() - cipher::crypt::AlgoAES128::AESCBC128ConfHeader)) in TEST()
404 * Step -3 Check if the plain payload matches with the decrypted one in TEST()
413 * Step-1 Encrypt the payload using OpenSSL EVP_aes_128_cbc() in TEST()
419 payload.resize(payload.size() + 1); in TEST()
433 payload.size() + cipher::crypt::AlgoAES128::AESCBC128BlockSize); in TEST()
443 if (HMAC(EVP_sha1(), sik.data(), sik.size(), const1.data(), const1.size(), in TEST()
453 FAIL() << "EVP_EncryptInit_ex failed for type AES-CBC-128"; in TEST()
461 &outputLen, payload.data(), payload.size())) in TEST()
471 * Step-2 Decrypt the encrypted payload using the implemented API for in TEST()
472 * AES-CBC-128 in TEST()
479 auto plain = cryptPtr->decryptPayload(output, 0, output.size()); in TEST()
482 * Step -3 Check if the plain payload matches with the decrypted one in TEST()