Home
last modified time | relevance | path

Searched refs:EVP_PKEY_verify (Results 1 – 25 of 25) sorted by relevance

/third_party/openssl/doc/man3/
DEVP_PKEY_verify.pod5 EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public key algorithm
12 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx,
21 The EVP_PKEY_verify() function performs a public key verification operation
32 The function EVP_PKEY_verify() can be called more than once on the same
37 EVP_PKEY_verify_init() and EVP_PKEY_verify() return 1 if the verification was
39 EVP_PKEY_verify() only indicates that the signature did not verify
74 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
DEVP_PKEY_get_default_digest_nid.pod35 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_decrypt.pod88 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_derive.pod87 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_encrypt.pod93 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_verify_recover.pod98 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_sign.pod98 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_keygen.pod186 L<EVP_PKEY_verify(3)>,
DEVP_PKEY_meth_new.pod299 valid. They are called by L<EVP_PKEY_verify_init(3)> and L<EVP_PKEY_verify(3)>.
DEVP_PKEY_CTX_ctrl.pod449 L<EVP_PKEY_verify(3)>,
/third_party/openssl/test/
Ddsa_no_digest_size_test.c175 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { in sign_and_verify()
181 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { in sign_and_verify()
Devp_test.c1267 if (EVP_PKEY_verify(kdata->ctx, kdata->output, kdata->output_len, in verify_test_run()
/third_party/openssl/crypto/evp/
Dp_verify.c51 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal()
Dm_sigver.c207 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen); in EVP_DigestVerifyFinal()
Dpmeth_fn.c86 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, in EVP_PKEY_verify() function
/third_party/openssl/doc/man7/
Devp.pod44 L<EVP_PKEY_verify(3)> and L<EVP_PKEY_verify_recover(3)>.
99 L<EVP_PKEY_verify(3)>,
/third_party/openssl/apps/
Dpkeyutl.c309 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, in pkeyutl_main()
/third_party/openssl/crypto/cms/
Dcms_sd.c864 r = EVP_PKEY_verify(pkctx, si->signature->data, in CMS_SignerInfo_verify_content()
/third_party/openssl/include/openssl/
Devp.h1388 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dcrypto_openssl.c2868 ret = EVP_PKEY_verify(pkctx, sig, sig_len, data, len); in crypto_ec_key_verify_signature()
/third_party/grpc/src/boringssl/
Dboringssl_prefix_symbols.h1618 #define EVP_PKEY_verify BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, EVP_PKEY_verify) macro
/third_party/openssl/crypto/err/
Dopenssl.txt803 EVP_F_EVP_PKEY_VERIFY:142:EVP_PKEY_verify
/third_party/node/src/
Dnode_crypto.cc4931 const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len); in VerifyFinal()
/third_party/openssl/util/
Dlibcrypto.num1083 EVP_PKEY_verify 1077 1_1_0 EXIST::FUNCTION:
/third_party/openssl/
DCHANGES968 *) Added EVP_PKEY_sign() and EVP_PKEY_verify() for EdDSA