/third_party/rust/crates/rust-openssl/openssl/src/ |
D | derive.rs | 197 let pkey2 = PKey::from_ec_key(ec_key2).unwrap(); in test_ec_key_derive() localVariable 199 deriver.set_peer(&pkey2).unwrap(); in test_ec_key_derive() 211 let pkey2 = PKey::from_ec_key(ec_key2).unwrap(); in test_ec_key_derive_ex() localVariable 213 deriver.set_peer_ex(&pkey2, true).unwrap(); in test_ec_key_derive_ex()
|
D | pkey.rs | 902 let pkey2 = PKey::private_key_from_pkcs8(&serialized).unwrap(); in test_unencrypted_pkcs8() localVariable 905 pkey2.private_key_to_der().unwrap(), in test_unencrypted_pkcs8() 920 let pkey2 = PKey::private_key_from_pkcs8_passphrase(&der, b"mypass").unwrap(); in test_encrypted_pkcs8_passphrase() localVariable 923 pkey2.private_key_to_der().unwrap() in test_encrypted_pkcs8_passphrase() 1168 let pkey2 = PKey::from_ec_key(ec_key).unwrap(); in test_public_eq() localVariable 1170 assert!(!pkey1.public_eq(&pkey2)); in test_public_eq()
|
/third_party/openssl/test/ |
D | endecode_test.c | 160 EVP_PKEY *pkey2 = NULL; in test_encode_decode() local 175 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, in test_encode_decode() 184 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, in test_encode_decode() 188 || !TEST_true(encode_cb(file, line, &encoded2, &encoded2_len, pkey2, selection, in test_encode_decode() 193 if (!TEST_int_eq(EVP_PKEY_parameters_eq(pkey, pkey2), 1)) in test_encode_decode() 196 if (!TEST_int_eq(EVP_PKEY_eq(pkey, pkey2), 1)) in test_encode_decode() 220 EVP_PKEY_free(pkey2); in test_encode_decode()
|
D | evp_extra_test.c | 1699 EVP_PKEY *pkey2 = NULL; in test_EVP_PKCS82PKEY_wrong_tag() local 1716 || !TEST_ptr(pkey2 = EVP_PKCS82PKEY(p8inf)) in test_EVP_PKCS82PKEY_wrong_tag() 1724 EVP_PKEY_free(pkey2); in test_EVP_PKCS82PKEY_wrong_tag() 2915 EVP_PKEY *pkey1 = NULL, *pkey2 = NULL; in test_EVP_PKEY_set1_DH() local 2938 pkey2 = EVP_PKEY_new(); in test_EVP_PKEY_set1_DH() 2942 || !TEST_ptr(pkey2) in test_EVP_PKEY_set1_DH() 2956 if (!TEST_true(EVP_PKEY_set1_DH(pkey2, noqdh)) in test_EVP_PKEY_set1_DH() 2957 || !TEST_int_eq(EVP_PKEY_get_id(pkey2), EVP_PKEY_DH)) in test_EVP_PKEY_set1_DH() 2960 if (!TEST_true(EVP_PKEY_get_octet_string_param(pkey2, in test_EVP_PKEY_set1_DH() 2972 EVP_PKEY_free(pkey2); in test_EVP_PKEY_set1_DH() [all …]
|
D | evp_extra_test2.c | 1035 EVP_PKEY *pkey = NULL, *pkey2 = NULL; in test_dsa_fromdata_digest_prop() local 1055 || !TEST_int_eq(EVP_PKEY_paramgen(gctx, &pkey2), expected)) in test_dsa_fromdata_digest_prop() 1060 EVP_PKEY_free(pkey2); in test_dsa_fromdata_digest_prop()
|
D | ectest.c | 2709 EVP_PKEY *pkey1 = NULL, *pkey2 = NULL; in custom_params_test() local 2868 if(!TEST_ptr(pkey2 = EVP_PKEY_new()) in custom_params_test() 2869 || !TEST_int_eq(EVP_PKEY_assign_EC_KEY(pkey2, eckey2), 1)) in custom_params_test() 2876 || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1) in custom_params_test() 2881 if (!TEST_ptr(pctx2 = EVP_PKEY_CTX_new(pkey2, NULL)) in custom_params_test() 2925 || !TEST_int_eq(EVP_PKEY_fromdata(pctx2, &pkey2, EVP_PKEY_PUBLIC_KEY, in custom_params_test() 2933 || !TEST_int_eq(EVP_PKEY_derive_set_peer(pctx1, pkey2), 1) in custom_params_test() 2962 EVP_PKEY_free(pkey2); in custom_params_test()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_server2.c | 1503 mbedtls_pk_context pkey2; in main() local 1606 mbedtls_pk_init(&pkey2); in main() 2630 if ((ret = mbedtls_pk_parse_keyfile(&pkey2, opt.key_file2, in main() 2674 if ((ret = mbedtls_pk_parse_key(&pkey2, in main() 2714 mbedtls_pk_get_type(&pkey2)) == 0) { in main() 2715 ret = mbedtls_pk_wrap_as_opaque(&pkey2, &key_slot2, in main() 2730 key_cert_init2 ? mbedtls_pk_get_name(&pkey2) : "none"); in main() 3069 mbedtls_pk_context *pk = &pkey2; in main() 4203 mbedtls_pk_free(&pkey2); in main()
|
/third_party/node/src/crypto/ |
D | crypto_keys.cc | 1160 EVP_PKEY* pkey2 = key2->GetAsymmetricKey().get(); in Equals() local 1162 int ok = EVP_PKEY_eq(pkey, pkey2); in Equals() 1164 int ok = EVP_PKEY_cmp(pkey, pkey2); in Equals()
|