Lines Matching defs:key
66 EVP_PKEY *key;
290 * some tests with empty keys: HMAC_Init_ex() expects a non-NULL key
291 * buffer even if the key length is 0, in order to detect key reset.
524 unsigned char *key;
599 OPENSSL_free(cdat->key);
618 return parse_bin(value, &cdat->key, &cdat->key_len);
809 if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) {
1019 if (!cdat->key) {
1116 /* MAC key */
1117 unsigned char *key;
1216 OPENSSL_free(mdat->key);
1230 return parse_bin(value, &mdata->key, &mdata->key_len);
1301 EVP_PKEY *key = NULL;
1338 key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len,
1343 key = EVP_PKEY_new_raw_private_key_ex(libctx,
1345 expected->key, expected->key_len);
1347 if (key == NULL) {
1365 if (!EVP_DigestSignInit_ex(mctx, &pctx, mdname, libctx, NULL, key, NULL)) {
1401 EVP_PKEY_free(key);
1516 if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) {
1619 expected->key, expected->key_len,
1676 * Perform public key operation setup: lookup key, allocated ctx and call
1696 TEST_info("skipping, key '%s' is disabled", name);
2033 unsigned char *key;
2147 OPENSSL_free(pdat->key);
2160 return parse_bin(value, &pdata->key, &pdata->key_len);
2175 unsigned char *key;
2181 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) {
2189 expected->key_len, key) == 0) {
2198 expected->maxmem, key, expected->key_len) == 0) {
2213 key, fetched_digest) == 0) {
2218 if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len,
2219 key, expected->key_len))
2225 OPENSSL_free(key);
2684 * Perform public key operation setup: lookup key, allocated ctx and call
2723 for (p = kdata->params; p->key != NULL; p++)
2831 * Perform public key operation setup: lookup key, allocated ctx and call
2959 TEST_info("Can't find private key: %s", priv);
2964 TEST_info("Can't find public key: %s", pub);
3012 * other isn't: hence a key type mismatch.
3027 TEST_error("Unexpected error in key comparison");
3056 char *keyname; /* Key name to store key or NULL */
3130 TEST_info("Warning: legacy key generated %s", keygen->keyname);
3134 KEY_LIST *key;
3138 TEST_info("Duplicate key %s", keygen->keyname);
3142 if (!TEST_ptr(key = OPENSSL_malloc(sizeof(*key))))
3144 key->name = keygen->keyname;
3146 key->key = pkey;
3147 key->next = private_keys;
3148 private_keys = key;
3587 *ppk = lst->key;
3599 EVP_PKEY_free(lst->key);
3607 * Is the key type an unsupported algorithm?
3705 KEY_LIST *key, **klist;
3720 /* Are we adding a key? */
3724 if (strcmp(pp->key, "PrivateKey") == 0) {
3725 pkey = PEM_read_bio_PrivateKey_ex(t->s.key, NULL, 0, NULL, libctx, NULL);
3728 TEST_info("Can't read private key %s", pp->value);
3733 } else if (strcmp(pp->key, "PublicKey") == 0) {
3734 pkey = PEM_read_bio_PUBKEY_ex(t->s.key, NULL, 0, NULL, libctx, NULL);
3737 TEST_info("Can't read public key %s", pp->value);
3742 } else if (strcmp(pp->key, "PrivateKeyRaw") == 0
3743 || strcmp(pp->key, "PublicKeyRaw") == 0 ) {
3749 if (strcmp(pp->key, "PrivateKeyRaw") == 0)
3762 TEST_info("Failed to parse %s value", pp->key);
3772 TEST_info("Failed to create binary key");
3782 TEST_info("Can't read %s data", pp->key);
3788 } else if (strcmp(pp->key, "Availablein") == 0) {
3798 } else if (strcmp(pp->key, "FIPSversion") == 0) {
3816 /* If we have a key add to list */
3819 TEST_info("Duplicate key %s", pp->value);
3822 if (!TEST_ptr(key = OPENSSL_malloc(sizeof(*key))))
3824 key->name = take_value(pp);
3825 key->key = pkey;
3826 key->next = *klist;
3827 *klist = key;
3836 if (!TEST_ptr(t->meth = find_test(pp->key)))
3839 TEST_error("unknown %s: %s\n", pp->key, pp->value);
3843 /* TEST_info("skipping %s %s", pp->key, pp->value); */
3848 if (strcmp(pp->key, "Securitycheck") == 0) {
3859 } else if (strcmp(pp->key, "Availablein") == 0) {
3863 } else if (strcmp(pp->key, "Result") == 0) {
3869 } else if (strcmp(pp->key, "Function") == 0) {
3871 } else if (strcmp(pp->key, "Reason") == 0) {
3879 int rv = t->meth->parse(t, pp->key, pp->value);
3882 TEST_info("Line %d: unknown keyword %s", t->s.curr, pp->key);
3887 t->s.curr, pp->key, pp->value);
3925 BIO_free(t->s.key);