Lines Matching refs:message

525     string message = "12345678901234567890123456789012";  in TEST_P()  local
527 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
539 string message(1024, 'a'); in TEST_P() local
541 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
552 string message = "12345678901234567890123456789012"; in TEST_P() local
566 string message(1024, 'a'); in TEST_P() local
568 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
579 string message(53, 'a'); in TEST_P() local
581 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
592 string message(54, 'a'); in TEST_P() local
600 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
615 string message(1024, 'a'); in TEST_P() local
629 string message(64 * 1024, 'a'); in TEST_P() local
637 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
705 string message = "1234567890123456789012345678901"; in TEST_P() local
707 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
730 string message(224 / 8, 'a'); in TEST_P() local
732 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
741 string message(1024, 'a'); in TEST_P() local
743 SignMessage(message, &signature, KM_DIGEST_SHA_2_256); in TEST_P()
752 string message(64 * 1024, 'a'); in TEST_P() local
759 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
780 string message(1024, 'a'); in TEST_P() local
783 message.resize(key_size / 8); in TEST_P()
784 SignMessage(message, &signature, digest); in TEST_P()
808 string message = "12345678901234567890123456789012"; in TEST_P() local
810 MacMessage(message, &signature, 160); in TEST_P()
821 string message = "12345678901234567890123456789012"; in TEST_P() local
823 MacMessage(message, &signature, 224); in TEST_P()
834 string message = "12345678901234567890123456789012"; in TEST_P() local
836 MacMessage(message, &signature, 256); in TEST_P()
848 string message = "12345678901234567890123456789012"; in TEST_P() local
850 MacMessage(message, &signature, 384); in TEST_P()
861 string message = "12345678901234567890123456789012"; in TEST_P() local
863 MacMessage(message, &signature, 512); in TEST_P()
875 string message = "12345678901234567890123456789012"; in TEST_P() local
877 MacMessage(message, &signature, 512); in TEST_P()
888 string message = "Hi There"; in TEST_P() local
914 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
915 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
916 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
917 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
924 string message = "what do ya want for nothing?"; in TEST_P() local
948 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
949 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
950 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
951 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
958 string message(50, 0xdd); in TEST_P() local
982 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
983 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
984 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
985 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
996 string message(50, 0xcd); in TEST_P() local
1020 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
1021 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
1022 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
1023 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
1030 string message = "Test With Truncation"; in TEST_P() local
1049 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
1050 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
1051 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
1052 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
1059 string message = "Test Using Larger Than Block-Size Key - Hash Key First"; in TEST_P() local
1084 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
1085 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
1086 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
1087 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
1094 string message = "This is a test using a larger than block-size key and a larger than " in TEST_P() local
1121 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_224, make_string(sha_224_expected)); in TEST_P()
1122 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_256, make_string(sha_256_expected)); in TEST_P()
1123 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_384, make_string(sha_384_expected)); in TEST_P()
1124 CheckHmacTestVector(key, message, KM_DIGEST_SHA_2_512, make_string(sha_512_expected)); in TEST_P()
1167 string message = "12345678901234567890123456789012"; in TEST_P() local
1169 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
1170 VerifyMessage(message, signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
1182 string message(1024, 'a'); in TEST_P() local
1184 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
1185 VerifyMessage(message, signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
1196 string message(1024, 'a'); in TEST_P() local
1198 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
1208 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1209 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
1222 string message(1024, 'a'); in TEST_P() local
1224 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PSS); in TEST_P()
1225 ++message[message.size() / 2]; in TEST_P()
1234 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1235 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
1247 string message(1024, 'a'); in TEST_P() local
1249 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
1250 VerifyMessage(message, signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
1261 string message(1024, 'a'); in TEST_P() local
1263 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
1273 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1274 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
1287 string message(1024, 'a'); in TEST_P() local
1289 SignMessage(message, &signature, KM_DIGEST_SHA_2_256, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P()
1290 ++message[message.size() / 2]; in TEST_P()
1299 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1300 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
1392 string message(message_len, 'a'); in TEST_P() local
1394 SignMessage(message, &signature, digest, padding_mode); in TEST_P()
1395 VerifyMessage(message, signature, digest, padding_mode); in TEST_P()
1410 string message = "12345678901234567890123456789012"; in TEST_P() local
1412 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
1413 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1422 string message = "12345678901234567890"; in TEST_P() local
1424 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
1425 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1434 string message = "1234567890123456789012345678901234"; in TEST_P() local
1442 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &output, &input_consumed)); in TEST_P()
1452 string message(66, 'a'); in TEST_P() local
1454 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
1455 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1458 message[65] ^= 7; in TEST_P()
1459 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1470 string message = "12345678901234567890123456789012"; in TEST_P() local
1472 SignMessage(message, &signature, KM_DIGEST_SHA_2_256); in TEST_P()
1473 VerifyMessage(message, signature, KM_DIGEST_SHA_2_256); in TEST_P()
1485 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1486 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
1495 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1497 MacMessage(message, &signature, 160); in TEST_P()
1498 VerifyMac(message, signature); in TEST_P()
1508 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1510 MacMessage(message, &signature, 224); in TEST_P()
1511 VerifyMac(message, signature); in TEST_P()
1521 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1523 MacMessage(message, &signature, 256); in TEST_P()
1524 VerifyMac(message, signature); in TEST_P()
1534 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1536 MacMessage(message, &signature, 256); in TEST_P()
1540 VerifyMac(message, signature); in TEST_P()
1549 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1560 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1562 MacMessage(message, &signature, 384); in TEST_P()
1563 VerifyMac(message, signature); in TEST_P()
1573 string message = "123456789012345678901234567890123456789012345678"; in TEST_P() local
1575 MacMessage(message, &signature, 512); in TEST_P()
1576 VerifyMac(message, signature); in TEST_P()
1686 string message(1024 / 8, 'a'); in TEST_P() local
1688 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
1689 VerifyMessage(message, signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
1708 string message(1024 / 8, 'a'); in TEST_P() local
1715 ProcessMessage(KM_PURPOSE_SIGN, message, begin_params, update_params, &output_params); in TEST_P()
1716 ProcessMessage(KM_PURPOSE_VERIFY, message, signature, begin_params, update_params, in TEST_P()
1772 string message(32, 'a'); in TEST_P() local
1774 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
1775 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1804 string message(32, 'a'); in TEST_P() local
1806 SignMessage(message, &signature, KM_DIGEST_NONE); in TEST_P()
1807 VerifyMessage(message, signature, KM_DIGEST_NONE); in TEST_P()
1836 string message = "Hello World!"; in TEST_P() local
1837 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); in TEST_P()
1839 EXPECT_EQ(message, plaintext); in TEST_P()
1856 string message = "Hello World!"; in TEST_P() local
1858 MacMessage(message, &signature, 256); in TEST_P()
1859 VerifyMessage(message, signature, KM_DIGEST_SHA_2_256); in TEST_P()
1871 string message = "12345678901234567890123456789012"; in TEST_P() local
1872 string ciphertext1 = EncryptMessage(string(message), KM_PAD_NONE); in TEST_P()
1875 string ciphertext2 = EncryptMessage(string(message), KM_PAD_NONE); in TEST_P()
1889 string message = "1"; in TEST_P() local
1891 string ciphertext = EncryptMessage(message, KM_PAD_NONE); in TEST_P()
1894 string expected_plaintext = string(256 / 8 - 1, 0) + message; in TEST_P()
1907 string message = "123456789012345678901234567890123"; in TEST_P() local
1915 EXPECT_EQ(KM_ERROR_INVALID_INPUT_LENGTH, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1939 string message(reinterpret_cast<const char*>(modulus_buf.get()), modulus_len); in TEST_P()
1947 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1955 message = string(reinterpret_cast<const char*>(modulus_buf.get()), modulus_len); in TEST_P()
1957 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
1971 string message = "Hello"; in TEST_P() local
1972 string ciphertext1 = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); in TEST_P()
1975 string ciphertext2 = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); in TEST_P()
1991 string message = "Hello World!"; in TEST_P() local
1992 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); in TEST_P()
1996 EXPECT_EQ(message, plaintext); in TEST_P()
2007 string message = "Hello World!"; in TEST_P() local
2023 string message = "Hello World!"; in TEST_P() local
2025 EncryptMessage(string(message), KM_DIGEST_SHA1, KM_PAD_RSA_OAEP); in TEST_P()
2042 string message = "Hello World!"; in TEST_P() local
2043 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); in TEST_P()
2064 string message = "12345678901234567890123"; in TEST_P() local
2072 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
2086 string message = "Hello World!"; in TEST_P() local
2087 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); in TEST_P()
2110 string message = "Hello World!"; in TEST_P() local
2111 string ciphertext1 = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); in TEST_P()
2114 string ciphertext2 = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); in TEST_P()
2127 string message = "Hello World!"; in TEST_P() local
2128 string ciphertext = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); in TEST_P()
2132 EXPECT_EQ(message, plaintext); in TEST_P()
2141 string message = "123456789012345678901234567890123456789012345678901234"; in TEST_P() local
2148 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &result, &input_consumed)); in TEST_P()
2161 string message = "Hello World!"; in TEST_P() local
2176 string message = "Hello World!"; in TEST_P() local
2177 string ciphertext = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); in TEST_P()
2236 string message = "12345678901234567890123456789012"; in TEST_P() local
2237 string ciphertext1 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
2238 EXPECT_EQ(message.size(), ciphertext1.size()); in TEST_P()
2240 string ciphertext2 = EncryptMessage(string(message), KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
2241 EXPECT_EQ(message.size(), ciphertext2.size()); in TEST_P()
2247 EXPECT_EQ(message, plaintext); in TEST_P()
2258 string message = "12345678901234567890123456789012"; in TEST_P() local
2273 string message = "1234567890123456789012345678901"; in TEST_P() local
2281 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(message, &ciphertext, &input_consumed)); in TEST_P()
2282 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
2296 string message(i, 'a'); in TEST_P() local
2297 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); in TEST_P()
2300 EXPECT_EQ(message, plaintext); in TEST_P()
2330 string message = "a"; in TEST_P() local
2331 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); in TEST_P()
2333 EXPECT_NE(ciphertext, message); in TEST_P()
2354 string message = "123"; in TEST_P() local
2356 string ciphertext1 = EncryptMessage(message, KM_MODE_CTR, KM_PAD_NONE, &iv1); in TEST_P()
2357 EXPECT_EQ(message.size(), ciphertext1.size()); in TEST_P()
2361 string ciphertext2 = EncryptMessage(message, KM_MODE_CTR, KM_PAD_NONE, &iv2); in TEST_P()
2362 EXPECT_EQ(message.size(), ciphertext2.size()); in TEST_P()
2370 EXPECT_EQ(message, plaintext); in TEST_P()
2382 string message(239, 'a'); in TEST_P() local
2391 for (size_t i = 0; i < message.size(); i += increment) in TEST_P()
2393 UpdateOperation(message.substr(i, increment), &ciphertext, &input_consumed)); in TEST_P()
2395 EXPECT_EQ(message.size(), ciphertext.size()); in TEST_P()
2411 EXPECT_EQ(message, plaintext); in TEST_P()
2501 string message = "12345678901234567890123456789012"; in TEST_P() local
2503 string ciphertext1 = EncryptMessage(message, KM_MODE_CBC, KM_PAD_NONE, &iv1); in TEST_P()
2504 EXPECT_EQ(message.size(), ciphertext1.size()); in TEST_P()
2507 string ciphertext2 = EncryptMessage(message, KM_MODE_CBC, KM_PAD_NONE, &iv2); in TEST_P()
2508 EXPECT_EQ(message.size(), ciphertext2.size()); in TEST_P()
2515 EXPECT_EQ(message, plaintext); in TEST_P()
2526 string message = "12345678901234567890123456789012"; in TEST_P() local
2529 string ciphertext1 = EncryptMessage(message, KM_MODE_CBC, KM_PAD_NONE, &iv1); in TEST_P()
2530 EXPECT_EQ(message.size(), ciphertext1.size()); in TEST_P()
2534 EXPECT_EQ(message, plaintext); in TEST_P()
2544 ProcessMessage(KM_PURPOSE_ENCRYPT, message, input_params, update_params, &output_params); in TEST_P()
2549 EXPECT_EQ(message, plaintext); in TEST_P()
2558 EXPECT_NE(message, plaintext); in TEST_P()
2569 string message = "12345678901234567890123456789012"; in TEST_P() local
2572 string ciphertext1 = EncryptMessage(message, KM_MODE_CBC, KM_PAD_NONE, &iv1); in TEST_P()
2573 EXPECT_EQ(message.size(), ciphertext1.size()); in TEST_P()
2577 EXPECT_EQ(message, plaintext); in TEST_P()
2600 string message(240, 'a'); in TEST_P() local
2609 for (size_t i = 0; i < message.size(); i += increment) in TEST_P()
2611 UpdateOperation(message.substr(i, increment), &ciphertext, &input_consumed)); in TEST_P()
2613 EXPECT_EQ(message.size(), ciphertext.size()); in TEST_P()
2629 EXPECT_EQ(message, plaintext); in TEST_P()
2642 string message(i, 'a'); in TEST_P() local
2644 string ciphertext = EncryptMessage(message, KM_MODE_CBC, KM_PAD_PKCS7, &iv); in TEST_P()
2647 EXPECT_EQ(message, plaintext); in TEST_P()
2660 string message = "123456789012345678901234567890123456"; in TEST_P() local
2675 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
2677 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
2692 EXPECT_EQ(message, plaintext); in TEST_P()
2703 string message = "123456789012345678901234567890123456"; in TEST_P() local
2726 string message = "123456789012345678901234567890123456"; in TEST_P() local
2741 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
2743 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
2937 string message = "123456789012345678901234567890123456"; in TEST_P() local
2958 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
2960 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
2978 EXPECT_EQ(message, plaintext); in TEST_P()
2988 string message = "12345678901234567890123456789012"; in TEST_P() local
3006 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
3008 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
3035 string message = "12345678901234567890123456789012"; in TEST_P() local
3050 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
3052 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
3066 EXPECT_NE(message, plaintext); in TEST_P()
3077 string message = "123456789012345678901234567890123456"; in TEST_P() local
3092 EXPECT_EQ(KM_ERROR_OK, UpdateOperation(update_params, message, &update_out_params, &ciphertext, in TEST_P()
3094 EXPECT_EQ(message.size(), input_consumed); in TEST_P()
3112 EXPECT_EQ(message, plaintext); in TEST_P()
3126 string message = "1234567890123456"; in TEST_P() local
3127 string ciphertext1 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3128 string ciphertext2 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3129 string ciphertext3 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3147 string message = "1234567890123456"; in TEST_P() local
3148 string ciphertext1 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3149 string ciphertext2 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3150 string ciphertext3 = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); in TEST_P()
3190 string message(64, 'a'); in TEST_P() local
3192 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
3207 string message(64, 'a'); in TEST_P() local
3209 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
3224 string message(32, static_cast<char>(0xFF)); in TEST_P() local
3226 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
3244 string message(64, 'a'); in TEST_P() local
3246 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
3288 string message(64, 'a'); in TEST_P() local
3290 SignMessage(message, &signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()
3291 VerifyMessage(message, signature, KM_DIGEST_NONE, KM_PAD_NONE); in TEST_P()