Home
last modified time | relevance | path

Searched refs:DSA_verify (Results 1 – 10 of 10) sorted by relevance

/third_party/openssl/doc/man3/
DDSA_sign.pod5 DSA_sign, DSA_sign_setup, DSA_verify - DSA signatures
16 int DSA_verify(int type, const unsigned char *dgst, int len,
33 DSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
47 DSA_verify() returns 1 for a valid signature, 0 for an incorrect
DDSA_meth_new.pod134 response to the application calling DSA_do_verify() (or DSA_verify()). The
/third_party/openssl/test/
Ddsa_no_digest_size_test.c187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { in sign_and_verify()
192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { in sign_and_verify()
Ddsatest.c109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa))) in dsa_test()
/third_party/openssl/crypto/dsa/
Ddsa_asn1.c132 int DSA_verify(int type, const unsigned char *dgst, int dgst_len, in DSA_verify() function
Ddsa_pmeth.c102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); in pkey_dsa_verify()
/third_party/openssl/include/openssl/
Ddsa.h105 int DSA_verify(int type, const unsigned char *dgst, int dgst_len,
/third_party/openssl/apps/
Dspeed.c1120 ret = DSA_verify(0, buf, 20, buf2, siglen, dsa_key[testnum]); in DSA_verify_loop()
2817 st = DSA_verify(0, loopargs[i].buf, 20, loopargs[i].buf2, in speed_main()
/third_party/grpc/src/boringssl/
Dboringssl_prefix_symbols.h1274 #define DSA_verify BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, DSA_verify) macro
/third_party/openssl/util/
Dlibcrypto.num783 DSA_verify 782 1_1_0 EXIST::FUNCTION:DSA