Lines Matching refs:keys
874 * params to ensure they are all accepted for EC keys
1103 /* EVP_PKEY_eq() returns -2 with missing public keys */
2119 } keys[] = {
2161 /* Check if this algorithm supports public keys */
2162 if (pub && keys[tst].pub == NULL)
2169 inlen = strlen(keys[tst].pub);
2170 in = (unsigned char *)keys[tst].pub;
2174 OBJ_nid2sn(keys[tst].type),
2179 pkey = EVP_PKEY_new_raw_public_key(keys[tst].type,
2188 inlen = strlen(keys[tst].priv);
2189 in = (unsigned char *)keys[tst].priv;
2192 testctx, OBJ_nid2sn(keys[tst].type),
2197 pkey = EVP_PKEY_new_raw_private_key(keys[tst].type,
2983 * the template must be ignored, and we know that's the case for RSA keys
3455 /* The keys should match. */
4493 /* Test we can create a signature keys with an associated ENGINE */
4641 /* Test that creating ECX keys with a short private key fails as expected */
4689 switch (keys[tst].type) {
4695 /* Check if this algorithm supports public keys */
4696 if (keys[tst].pub == NULL)
4699 pubkey = (unsigned char *)keys[tst].pub;
4700 pubkeylen = strlen(keys[tst].pub);
4702 pkey = EVP_PKEY_new_raw_public_key_ex(testctx, OBJ_nid2sn(keys[tst].type),
4788 ADD_ALL_TESTS(test_set_get_raw_keys, OSSL_NELEM(keys));
4878 ADD_ALL_TESTS(test_ecx_not_private_key, OSSL_NELEM(keys));