/openssl/test/ |
H A D | ecdsatest.c | 257 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 262 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len - 1, tbs, sizeof(tbs)), -1) in test_builtin() 267 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 275 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 0) in test_builtin() 282 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 317 || !TEST_int_ne(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin() 324 || !TEST_int_eq(EVP_DigestVerify(mctx, sig, sig_len, tbs, sizeof(tbs)), 1) in test_builtin()
|
H A D | acvp_test.c | 331 || !TEST_int_eq(EVP_DigestVerify(md_ctx, sig, sig_len, in ecdsa_sigver_test() 1480 || !TEST_int_eq(EVP_DigestVerify(md_ctx, tst->sig, tst->sig_len, in rsa_sigver_test()
|
H A D | evp_test.c | 4532 if (EVP_DigestVerify(mdata->ctx, mdata->output, mdata->output_len, in oneshot_digestverify_test_run()
|
/openssl/doc/man3/ |
H A D | EVP_DigestVerifyInit.pod | 6 EVP_DigestVerifyFinal, EVP_DigestVerify - EVP signature verification functions 21 int EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sig, 118 EVP_DigestVerify() verifies B<tbslen> bytes at B<tbs> against the signature 126 EVP_DigestVerifyFinal() and EVP_DigestVerify() return 1 for success; any other 140 EVP_DigestVerify() is a one shot operation which verifies a single block of 171 EVP_DigestVerify() can only be called once, and cannot be used again without 176 EVP_DigestVerifyUpdate(), EVP_DigestVerifyFinal(), or EVP_DigestVerify().
|
H A D | EVP_VerifyInit.pod | 90 The previous two bugs are fixed in the newer EVP_DigestVerify*() function.
|
H A D | ECDSA_SIG_new.pod | 113 * This signature could now be passed to L<EVP_DigestVerify(3)>
|
H A D | EVP_PKEY_meth_new.pod | 332 EVP_DigestVerify functions. See L<EVP_DigestVerifyInit(3)> for details. 369 and L<EVP_DigestVerify(3)>.
|
/openssl/demos/signature/ |
H A D | EVP_ED_Signature_demo.c | 114 if (!EVP_DigestVerify(verify_context, sig_value, sig_len, in demo_verify()
|
/openssl/crypto/asn1/ |
H A D | a_verify.c | 215 ret = EVP_DigestVerify(ctx, signature->data, (size_t)signature->length, in ASN1_item_verify_ctx()
|
/openssl/doc/man7/ |
H A D | evp.pod | 20 L<B<EVP_DigestVerify>I<XXX>|EVP_DigestVerifyInit(3)> functions implement
|
H A D | EVP_SIGNATURE-ED25519.pod | 110 EVP_DigestSign() and EVP_DigestVerify() functions.
|
H A D | ossl-guide-migration.pod | 215 L<EVP_DigestSign(3)> and L<EVP_DigestVerify(3)>. 1117 L<EVP_DigestSign(3)> and L<EVP_DigestVerify(3)>.
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 682 int EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sigret, in EVP_DigestVerify() function
|
/openssl/apps/ |
H A D | pkeyutl.c | 827 rv = EVP_DigestVerify(mctx, sig, (size_t)siglen, mbuf, buf_len); in do_raw_keyop()
|
H A D | speed.c | 1330 ret = EVP_DigestVerify(edctx[testnum], eddsasig, eddsasigsize, buf, 20); in EdDSA_verify_loop() 1397 ret = EVP_DigestVerify(sm2ctx[testnum], sm2sig, sm2sigsize, in SM2_verify_loop() 3701 st = EVP_DigestVerify(loopargs[i].eddsa_ctx2[testnum], in speed_main() 3833 st = EVP_DigestVerify(loopargs[i].sm2_vfy_ctx[testnum], in speed_main()
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 575 j = EVP_DigestVerify(mctx, data, len, hdata, hdatalen); in tls_process_cert_verify()
|
H A D | statem_clnt.c | 2527 rv = EVP_DigestVerify(md_ctx, PACKET_data(&signature), in tls_process_key_exchange()
|
/openssl/include/openssl/ |
H A D | evp.h | 850 __owur int EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sigret,
|
/openssl/util/ |
H A D | libcrypto.num | 4145 EVP_DigestVerify 4237 3_0_0 EXIST::FUNCTION:
|
/openssl/ |
H A D | CHANGES.md | 3373 functionality such as `EVP_DigestSign*` and `EVP_DigestVerify*`.
|