Searched refs:pkey2 (Results 1 - 7 of 7) sorted by relevance
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | derive.rs | 197 let pkey2 = PKey::from_ec_key(ec_key2).unwrap(); in test_ec_key_derive() 199 deriver.set_peer(&pkey2).unwrap(); in test_ec_key_derive() 211 let pkey2 = PKey::from_ec_key(ec_key2).unwrap(); in test_ec_key_derive_ex() 213 deriver.set_peer_ex(&pkey2, true).unwrap(); in test_ec_key_derive_ex()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_server2.c | 1544 mbedtls_pk_context pkey2; in main() local 1641 mbedtls_pk_init(&pkey2); in main() 2653 if ((ret = mbedtls_pk_parse_keyfile(&pkey2, opt.key_file2, in main() 2697 if ((ret = mbedtls_pk_parse_key(&pkey2, in main() 2735 mbedtls_pk_get_type(&pkey2)) == 0) { in main() 2736 ret = pk_wrap_as_opaque(&pkey2, psa_alg, psa_alg2, psa_usage, &key_slot2); in main() 2749 key_cert_init2 ? mbedtls_pk_get_name(&pkey2) : "none"); in main() 3090 mbedtls_pk_context *pk = &pkey2; in main() 4238 mbedtls_pk_free(&pkey2); in main()
|
/third_party/openssl/test/ |
H A D | endecode_test.c | 160 EVP_PKEY *pkey2 = NULL; in test_encode_decode() local 166 * Encode |pkey|, decode the result into |pkey2|, and finish off by in test_encode_decode() 167 * encoding |pkey2| as well. That last encoding is for checking and in test_encode_decode() 175 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, in test_encode_decode() 184 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, in test_encode_decode() 188 || !TEST_true(encode_cb(file, line, &encoded2, &encoded2_len, pkey2, selection, in test_encode_decode() 193 if (!TEST_int_eq(EVP_PKEY_parameters_eq(pkey, pkey2), 1)) in test_encode_decode() 196 if (!TEST_int_eq(EVP_PKEY_eq(pkey, pkey2), 1)) in test_encode_decode() 215 dump_cb("|pkey2| encoded", encoded2, encoded2_len); in test_encode_decode() 220 EVP_PKEY_free(pkey2); in test_encode_decode() [all...] |
H A D | ectest.c | 2709 EVP_PKEY *pkey1 = NULL, *pkey2 = NULL; in custom_params_test() local 2868 if(!TEST_ptr(pkey2 = EVP_PKEY_new()) in custom_params_test() 2869 || !TEST_int_eq(EVP_PKEY_assign_EC_KEY(pkey2, eckey2), 1)) in custom_params_test() 2871 eckey2 = NULL; /* ownership passed to pkey2 */ in custom_params_test() 2876 || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1) in custom_params_test() 2881 if (!TEST_ptr(pctx2 = EVP_PKEY_CTX_new(pkey2, NULL)) in custom_params_test() 2925 || !TEST_int_eq(EVP_PKEY_fromdata(pctx2, &pkey2, EVP_PKEY_PUBLIC_KEY, in custom_params_test() 2933 || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1) in custom_params_test() 2962 EVP_PKEY_free(pkey2); in custom_params_test()
|
H A D | evp_extra_test.c | 1699 EVP_PKEY *pkey2 = NULL; in test_EVP_PKCS82PKEY_wrong_tag() local 1716 || !TEST_ptr(pkey2 = EVP_PKCS82PKEY(p8inf)) in test_EVP_PKCS82PKEY_wrong_tag() 1724 EVP_PKEY_free(pkey2); in test_EVP_PKCS82PKEY_wrong_tag() 2915 EVP_PKEY *pkey1 = NULL, *pkey2 = NULL; in test_EVP_PKEY_set1_DH() local 2938 pkey2 = EVP_PKEY_new(); in test_EVP_PKEY_set1_DH() 2942 || !TEST_ptr(pkey2) in test_EVP_PKEY_set1_DH() 2956 if (!TEST_true(EVP_PKEY_set1_DH(pkey2, noqdh)) in test_EVP_PKEY_set1_DH() 2957 || !TEST_int_eq(EVP_PKEY_get_id(pkey2), EVP_PKEY_DH)) in test_EVP_PKEY_set1_DH() 2960 if (!TEST_true(EVP_PKEY_get_octet_string_param(pkey2, in test_EVP_PKEY_set1_DH() 2972 EVP_PKEY_free(pkey2); in test_EVP_PKEY_set1_DH() 3418 EVP_PKEY *pkey2 = NULL; test_ecpub() local [all...] |
H A D | evp_extra_test2.c | 1035 EVP_PKEY *pkey = NULL, *pkey2 = NULL; in test_dsa_fromdata_digest_prop() local 1055 || !TEST_int_eq(EVP_PKEY_paramgen(gctx, &pkey2), expected)) in test_dsa_fromdata_digest_prop() 1060 EVP_PKEY_free(pkey2); in test_dsa_fromdata_digest_prop()
|
/third_party/node/src/crypto/ |
H A D | crypto_keys.cc | 1163 EVP_PKEY* pkey2 = key2->GetAsymmetricKey().get(); in Equals() local 1165 int ok = EVP_PKEY_eq(pkey, pkey2); in Equals() 1167 int ok = EVP_PKEY_cmp(pkey, pkey2); in Equals()
|
Completed in 20 milliseconds