Searched refs:imprint (Results 1 - 8 of 8) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_verify_ctx.c101 OPENSSL_free(ctx->imprint);
116 TS_MSG_IMPRINT *imprint; local
137 /* Setting md_alg, imprint and imprint_len. */
138 imprint = TS_REQ_get_msg_imprint(req);
139 md_alg = TS_MSG_IMPRINT_get_algo(imprint);
142 msg = TS_MSG_IMPRINT_get_msg(imprint);
144 if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len)))
146 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len);
H A Dts_rsp_verify.c82 unsigned char **imprint, unsigned *imprint_len);
434 unsigned char *imprint = NULL; local
457 && !TS_check_imprints(ctx->md_alg, ctx->imprint, ctx->imprint_len,
464 &md_alg, &imprint, &imprint_len)
465 || !TS_check_imprints(md_alg, imprint, imprint_len, tst_info)))
491 OPENSSL_free(imprint);
595 unsigned char **imprint, unsigned *imprint_len)
605 *imprint = NULL;
622 if (!(*imprint = OPENSSL_malloc(*imprint_len))) {
633 if (!EVP_DigestFinal(&md_ctx, *imprint, NUL
593 TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, X509_ALGOR **md_alg, unsigned char **imprint, unsigned *imprint_len) argument
[all...]
H A Dts.h624 * Verify the message imprint provided by the user. This flag should not be
629 * Verify the message imprint computed by the verify method from the user
670 unsigned char *imprint; member in struct:TS_verify_ctx
703 * imprint, imprint_len = imprint from request
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_verify_ctx.c101 OPENSSL_free(ctx->imprint);
116 TS_MSG_IMPRINT *imprint; local
137 /* Setting md_alg, imprint and imprint_len. */
138 imprint = TS_REQ_get_msg_imprint(req);
139 md_alg = TS_MSG_IMPRINT_get_algo(imprint);
142 msg = TS_MSG_IMPRINT_get_msg(imprint);
144 if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len)))
146 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len);
H A Dts_rsp_verify.c82 unsigned char **imprint, unsigned *imprint_len);
434 unsigned char *imprint = NULL; local
457 && !TS_check_imprints(ctx->md_alg, ctx->imprint, ctx->imprint_len,
464 &md_alg, &imprint, &imprint_len)
465 || !TS_check_imprints(md_alg, imprint, imprint_len, tst_info)))
491 OPENSSL_free(imprint);
595 unsigned char **imprint, unsigned *imprint_len)
605 *imprint = NULL;
622 if (!(*imprint = OPENSSL_malloc(*imprint_len))) {
633 if (!EVP_DigestFinal(&md_ctx, *imprint, NUL
593 TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, X509_ALGOR **md_alg, unsigned char **imprint, unsigned *imprint_len) argument
[all...]
H A Dts.h624 * Verify the message imprint provided by the user. This flag should not be
629 * Verify the message imprint computed by the verify method from the user
670 unsigned char *imprint; member in struct:TS_verify_ctx
703 * imprint, imprint_len = imprint from request
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dts.c294 * Data file and message imprint cannot be specified at the same
1013 if (!(ctx->imprint = string_to_hex(digest, &imprint_len))) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dts.c294 * Data file and message imprint cannot be specified at the same
1013 if (!(ctx->imprint = string_to_hex(digest, &imprint_len))) {

Completed in 128 milliseconds