Searched refs:recovered (Results 1 – 12 of 12) sorted by relevance
148 uint8_t *recovered = NULL; in test_sm2_crypt() local190 recovered = OPENSSL_zalloc(ptext_len); in test_sm2_crypt()191 if (!TEST_ptr(recovered) in test_sm2_crypt()193 recovered, &recovered_len)) in test_sm2_crypt()195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt()203 OPENSSL_free(recovered); in test_sm2_crypt()
41 cipher then the key length will be set to the value of the recovered42 key length. If the cipher is a fixed length cipher then the recovered48 recovered secret key size) if successful.
104 encoding method and stores the recovered data of at most B<tlen> bytes119 recovered data, -1 on error. Error codes can be obtained by calling
64 recovered message digest.
37 I<rout> buffer, if the call is successful recovered data is written to
82 recovered plaintext. A return value of 0 is not an error and
54 The content of B<buf> cannot be recovered from subsequent random generator output.
162 The engine has some problem which will be recovered soon, such as a buffer is
92 Verify the input data and output the recovered data.217 which it can be seen agrees with the recovered value above.
134 Verify the input data (which must be a hash) and output the recovered data.
191 Therefore, these credentials are easily recovered by anyone able to sniff/trace
252 Unless I<rout> is NULL, the recovered data should be written to the location254 The length of the recovered data should be written to I<*routlen>.
Completed in 31 milliseconds