Searched refs:DSA_verify (Results 1 – 10 of 10) sorted by relevance
/third_party/openssl/doc/man3/ |
D | DSA_sign.pod | 5 DSA_sign, DSA_sign_setup, DSA_verify - DSA signatures 16 int DSA_verify(int type, const unsigned char *dgst, int len, 33 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen> 47 DSA_verify() returns 1 for a valid signature, 0 for an incorrect
|
D | DSA_meth_new.pod | 134 response to the application calling DSA_do_verify() (or DSA_verify()). The
|
/third_party/openssl/test/ |
D | dsa_no_digest_size_test.c | 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify() 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify()
|
D | dsatest.c | 109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa))) in dsa_test()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_asn1.c | 132 int DSA_verify(int type, const unsigned char *dgst, int dgst_len, in DSA_verify() function
|
D | dsa_pmeth.c | 102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
|
/third_party/openssl/include/openssl/ |
D | dsa.h | 105 int DSA_verify(int type, const unsigned char *dgst, int dgst_len,
|
/third_party/openssl/apps/ |
D | speed.c | 1120 ret = DSA_verify(0, buf, 20, buf2, siglen, dsa_key[testnum]); in DSA_verify_loop() 2817 st = DSA_verify(0, loopargs[i].buf, 20, loopargs[i].buf2, in speed_main()
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 1274 #define DSA_verify BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, DSA_verify) macro
|
/third_party/openssl/util/ |
D | libcrypto.num | 783 DSA_verify 782 1_1_0 EXIST::FUNCTION:DSA
|