Searched refs:imprint (Results 1 - 8 of 8) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_verify_ctx.c | 101 OPENSSL_free(ctx->imprint); 116 TS_MSG_IMPRINT *imprint; local 137 /* Setting md_alg, imprint and imprint_len. */ 138 imprint = TS_REQ_get_msg_imprint(req); 139 md_alg = TS_MSG_IMPRINT_get_algo(imprint); 142 msg = TS_MSG_IMPRINT_get_msg(imprint); 144 if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len))) 146 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len);
|
H A D | ts_rsp_verify.c | 82 unsigned char **imprint, unsigned *imprint_len); 434 unsigned char *imprint = NULL; local 457 && !TS_check_imprints(ctx->md_alg, ctx->imprint, ctx->imprint_len, 464 &md_alg, &imprint, &imprint_len) 465 || !TS_check_imprints(md_alg, imprint, imprint_len, tst_info))) 491 OPENSSL_free(imprint); 595 unsigned char **imprint, unsigned *imprint_len) 605 *imprint = NULL; 622 if (!(*imprint = OPENSSL_malloc(*imprint_len))) { 633 if (!EVP_DigestFinal(&md_ctx, *imprint, NUL 593 TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, X509_ALGOR **md_alg, unsigned char **imprint, unsigned *imprint_len) argument [all...] |
H A D | ts.h | 624 * Verify the message imprint provided by the user. This flag should not be 629 * Verify the message imprint computed by the verify method from the user 670 unsigned char *imprint; member in struct:TS_verify_ctx 703 * imprint, imprint_len = imprint from request
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_verify_ctx.c | 101 OPENSSL_free(ctx->imprint); 116 TS_MSG_IMPRINT *imprint; local 137 /* Setting md_alg, imprint and imprint_len. */ 138 imprint = TS_REQ_get_msg_imprint(req); 139 md_alg = TS_MSG_IMPRINT_get_algo(imprint); 142 msg = TS_MSG_IMPRINT_get_msg(imprint); 144 if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len))) 146 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len);
|
H A D | ts_rsp_verify.c | 82 unsigned char **imprint, unsigned *imprint_len); 434 unsigned char *imprint = NULL; local 457 && !TS_check_imprints(ctx->md_alg, ctx->imprint, ctx->imprint_len, 464 &md_alg, &imprint, &imprint_len) 465 || !TS_check_imprints(md_alg, imprint, imprint_len, tst_info))) 491 OPENSSL_free(imprint); 595 unsigned char **imprint, unsigned *imprint_len) 605 *imprint = NULL; 622 if (!(*imprint = OPENSSL_malloc(*imprint_len))) { 633 if (!EVP_DigestFinal(&md_ctx, *imprint, NUL 593 TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, X509_ALGOR **md_alg, unsigned char **imprint, unsigned *imprint_len) argument [all...] |
H A D | ts.h | 624 * Verify the message imprint provided by the user. This flag should not be 629 * Verify the message imprint computed by the verify method from the user 670 unsigned char *imprint; member in struct:TS_verify_ctx 703 * imprint, imprint_len = imprint from request
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | ts.c | 294 * Data file and message imprint cannot be specified at the same 1013 if (!(ctx->imprint = string_to_hex(digest, &imprint_len))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | ts.c | 294 * Data file and message imprint cannot be specified at the same 1013 if (!(ctx->imprint = string_to_hex(digest, &imprint_len))) {
|
Completed in 128 milliseconds