@@ -1253,28 +1253,28 @@ int test_ecdsa_p192(void *data)
12531253 if (err == 0 ) {
12541254 PRINT_MSG ("Sign with OpenSSL" );
12551255 ecdsaSigLen = sizeof (ecdsaSig );
1256- err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1257- ecdsaSig , & ecdsaSigLen , 0 );
1256+ err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1257+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
12581258 }
12591259 if (err == 0 ) {
12601260 PRINT_MSG ("Verify with wolfprovider" );
1261- err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1262- ecdsaSig , ecdsaSigLen , 0 );
1261+ err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1262+ ecdsaSig , ecdsaSigLen , 0 , 0 );
12631263 }
12641264 if (err == 0 ) {
12651265 PRINT_MSG ("Verify bad signature with wolfprovider" );
12661266 ecdsaSig [1 ] ^= 0x80 ;
1267- res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1268- ecdsaSig , ecdsaSigLen , 0 );
1267+ res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1268+ ecdsaSig , ecdsaSigLen , 0 , 0 );
12691269 if (res != 1 )
12701270 err = 1 ;
12711271 }
12721272
12731273 if (err == 0 ) {
12741274 PRINT_MSG ("Sign with wolfprovider" );
12751275 ecdsaSigLen = sizeof (ecdsaSig );
1276- err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1277- ecdsaSig , & ecdsaSigLen , 0 );
1276+ err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1277+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
12781278#if defined(HAVE_FIPS ) || defined(HAVE_FIPS_VERSION )
12791279 err = err != 1 ;
12801280 if (err == 0 ) {
@@ -1289,8 +1289,8 @@ int test_ecdsa_p192(void *data)
12891289 }
12901290 if (err == 0 ) {
12911291 PRINT_MSG ("Verify with OpenSSL" );
1292- err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1293- ecdsaSig , ecdsaSigLen , 0 );
1292+ err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1293+ ecdsaSig , ecdsaSigLen , 0 , 0 );
12941294 }
12951295#endif /* HAVE_FIPS || HAVE_FIPS_VERSION */
12961296
@@ -1326,32 +1326,32 @@ int test_ecdsa_p224(void *data)
13261326 if (err == 0 ) {
13271327 PRINT_MSG ("Sign with OpenSSL" );
13281328 ecdsaSigLen = sizeof (ecdsaSig );
1329- err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1330- ecdsaSig , & ecdsaSigLen , 0 );
1329+ err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1330+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
13311331 }
13321332 if (err == 0 ) {
13331333 PRINT_MSG ("Verify with wolfprovider" );
1334- err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1335- ecdsaSig , ecdsaSigLen , 0 );
1334+ err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1335+ ecdsaSig , ecdsaSigLen , 0 , 0 );
13361336 }
13371337 if (err == 0 ) {
13381338 PRINT_MSG ("Verify bad signature with wolfprovider" );
13391339 ecdsaSig [1 ] ^= 0x80 ;
1340- res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1341- ecdsaSig , ecdsaSigLen , 0 );
1340+ res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1341+ ecdsaSig , ecdsaSigLen , 0 , 0 );
13421342 if (res != 1 )
13431343 err = 1 ;
13441344 }
13451345 if (err == 0 ) {
13461346 PRINT_MSG ("Sign with wolfprovider" );
13471347 ecdsaSigLen = sizeof (ecdsaSig );
1348- err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1349- ecdsaSig , & ecdsaSigLen , 0 );
1348+ err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1349+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
13501350 }
13511351 if (err == 0 ) {
13521352 PRINT_MSG ("Verify with OpenSSL" );
1353- err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1354- ecdsaSig , ecdsaSigLen , 0 );
1353+ err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1354+ ecdsaSig , ecdsaSigLen , 0 , 0 );
13551355 }
13561356
13571357 EVP_PKEY_free (pkey );
@@ -1382,31 +1382,31 @@ int test_ecdsa_p256(void *data)
13821382 PRINT_MSG ("Sign with OpenSSL" );
13831383 ecdsaSigLen = sizeof (ecdsaSig );
13841384 err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), "SHA-256" ,
1385- ecdsaSig , & ecdsaSigLen , 0 );
1385+ NULL , ecdsaSig , & ecdsaSigLen , 0 , 0 );
13861386 }
13871387 if (err == 0 ) {
13881388 PRINT_MSG ("Verify with wolfprovider" );
13891389 err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), "SHA-256" ,
1390- ecdsaSig , ecdsaSigLen , 0 );
1390+ NULL , ecdsaSig , ecdsaSigLen , 0 , 0 );
13911391 }
13921392 if (err == 0 ) {
13931393 PRINT_MSG ("Verify bad signature with wolfprovider" );
13941394 ecdsaSig [1 ] ^= 0x80 ;
13951395 res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), "SHA-256" ,
1396- ecdsaSig , ecdsaSigLen , 0 );
1396+ NULL , ecdsaSig , ecdsaSigLen , 0 , 0 );
13971397 if (res != 1 )
13981398 err = 1 ;
13991399 }
14001400 if (err == 0 ) {
14011401 PRINT_MSG ("Sign with wolfprovider" );
14021402 ecdsaSigLen = sizeof (ecdsaSig );
14031403 err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), "SHA-256" ,
1404- ecdsaSig , & ecdsaSigLen , 0 );
1404+ NULL , ecdsaSig , & ecdsaSigLen , 0 , 0 );
14051405 }
14061406 if (err == 0 ) {
14071407 PRINT_MSG ("Verify with OpenSSL" );
14081408 err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), "SHA-256" ,
1409- ecdsaSig , ecdsaSigLen , 0 );
1409+ NULL , ecdsaSig , ecdsaSigLen , 0 , 0 );
14101410 }
14111411
14121412 EVP_PKEY_free (pkey );
@@ -1441,32 +1441,32 @@ int test_ecdsa_p384(void *data)
14411441 if (err == 0 ) {
14421442 PRINT_MSG ("Sign with OpenSSL" );
14431443 ecdsaSigLen = sizeof (ecdsaSig );
1444- err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1445- ecdsaSig , & ecdsaSigLen , 0 );
1444+ err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1445+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
14461446 }
14471447 if (err == 0 ) {
14481448 PRINT_MSG ("Verify with wolfprovider" );
1449- err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1450- ecdsaSig , ecdsaSigLen , 0 );
1449+ err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1450+ ecdsaSig , ecdsaSigLen , 0 , 0 );
14511451 }
14521452 if (err == 0 ) {
14531453 PRINT_MSG ("Verify bad signature with wolfprovider" );
14541454 ecdsaSig [1 ] ^= 0x80 ;
1455- res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1456- ecdsaSig , ecdsaSigLen , 0 );
1455+ res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1456+ ecdsaSig , ecdsaSigLen , 0 , 0 );
14571457 if (res != 1 )
14581458 err = 1 ;
14591459 }
14601460 if (err == 0 ) {
14611461 PRINT_MSG ("Sign with wolfprovider" );
14621462 ecdsaSigLen = sizeof (ecdsaSig );
1463- err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1464- ecdsaSig , & ecdsaSigLen , 0 );
1463+ err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1464+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
14651465 }
14661466 if (err == 0 ) {
14671467 PRINT_MSG ("Verify with OpenSSL" );
1468- err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1469- ecdsaSig , ecdsaSigLen , 0 );
1468+ err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1469+ ecdsaSig , ecdsaSigLen , 0 , 0 );
14701470 }
14711471
14721472 EVP_PKEY_free (pkey );
@@ -1501,32 +1501,32 @@ int test_ecdsa_p521(void *data)
15011501 if (err == 0 ) {
15021502 PRINT_MSG ("Sign with OpenSSL" );
15031503 ecdsaSigLen = sizeof (ecdsaSig );
1504- err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1505- ecdsaSig , & ecdsaSigLen , 0 );
1504+ err = test_digest_sign (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1505+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
15061506 }
15071507 if (err == 0 ) {
15081508 PRINT_MSG ("Verify with wolfprovider" );
1509- err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1510- ecdsaSig , ecdsaSigLen , 0 );
1509+ err = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1510+ ecdsaSig , ecdsaSigLen , 0 , 0 );
15111511 }
15121512 if (err == 0 ) {
15131513 PRINT_MSG ("Verify bad signature with wolfprovider" );
15141514 ecdsaSig [1 ] ^= 0x80 ;
1515- res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1516- ecdsaSig , ecdsaSigLen , 0 );
1515+ res = test_digest_verify (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1516+ ecdsaSig , ecdsaSigLen , 0 , 0 );
15171517 if (res != 1 )
15181518 err = 1 ;
15191519 }
15201520 if (err == 0 ) {
15211521 PRINT_MSG ("Sign with wolfprovider" );
15221522 ecdsaSigLen = sizeof (ecdsaSig );
1523- err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md ,
1524- ecdsaSig , & ecdsaSigLen , 0 );
1523+ err = test_digest_sign (pkey , wpLibCtx , buf , sizeof (buf ), md , NULL ,
1524+ ecdsaSig , & ecdsaSigLen , 0 , 0 );
15251525 }
15261526 if (err == 0 ) {
15271527 PRINT_MSG ("Verify with OpenSSL" );
1528- err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md ,
1529- ecdsaSig , ecdsaSigLen , 0 );
1528+ err = test_digest_verify (pkey , osslLibCtx , buf , sizeof (buf ), md , NULL ,
1529+ ecdsaSig , ecdsaSigLen , 0 , 0 );
15301530 }
15311531
15321532 EVP_PKEY_free (pkey );
0 commit comments