| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| rsa.h | 65 #define RSA_verify hc_RSA_verify 99 int (*rsa_verify)(int, const unsigned char *, unsigned int, member in struct:RSA_METHOD 175 int RSA_verify(int, const unsigned char *, unsigned int,
|
| rsa.c | 394 RSA_verify(int type, const unsigned char *from, unsigned int flen, 397 if (rsa->meth->rsa_verify) 398 return rsa->meth->rsa_verify(type, from, flen, sigbuf, siglen, rsa);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_local.h | 95 * *NOT* be used RSA_sign(), RSA_verify() should be used instead. 101 int (*rsa_verify) (int dtype, const unsigned char *m, member in struct:rsa_meth_st
|
| rsa_meth.c | 247 return meth->rsa_verify; 256 meth->rsa_verify = verify;
|
| rsa_sign.c | 239 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 243 if (rsa->meth->rsa_verify) { 244 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa);
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_meth.c | 241 return meth->rsa_verify; 250 meth->rsa_verify = verify;
|
| rsa_sign.c | 460 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 464 if (rsa->meth->rsa_verify != NULL) 465 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa);
|
| rsa_local.h | 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead. 136 int (*rsa_verify)(int dtype, const unsigned char *m, member in struct:rsa_meth_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_meth.c | 253 return meth->rsa_verify; 262 meth->rsa_verify = verify;
|
| rsa_sign.c | 449 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 453 if (rsa->meth->rsa_verify != NULL) 454 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa);
|
| rsa_local.h | 130 * *NOT* be used. RSA_sign(), RSA_verify() should be used instead. 136 int (*rsa_verify) (int dtype, const unsigned char *m, member in struct:rsa_meth_st
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 42 static OSSL_FUNC_signature_verify_fn rsa_verify; variable 761 static int rsa_verify(void *vprsactx, const unsigned char *sig, size_t siglen, function 772 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, 963 return rsa_verify(vprsactx, sig, siglen, digest, (size_t)dlen); 1444 { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))rsa_verify },
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 45 static OSSL_FUNC_signature_verify_fn rsa_verify; variable 1033 if (!RSA_verify(prsactx->mdnid, tbs, tbslen, sig, siglen, 1158 static int rsa_verify(void *vprsactx, function 1861 { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))rsa_verify }, 2097 (void (*)(void))rsa_verify }, \
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| signature.c | 319 rsa_verify(pgp_hash_alg_t type, function 338 (void) fprintf(stderr, "rsa_verify: keysize too big\n"); 342 (void) fprintf(stderr, "rsa_verify: BN_numbits too big\n"); 490 ret = rsa_verify(sig->info.hash_alg, hash, length,
|
| /src/crypto/external/bsd/netpgp/dist/src/libverify/ |
| libverify.c | 1551 rsa_verify(uint8_t *calculated, unsigned calclen, uint8_t hashalg, pgpv_bignum_t *bn, pgpv_pubkey_t *pubkey) function 1568 printf("rsa_verify: unknown hash algorithm: %d\n", hashalg); 1580 printf("rsa_verify: wrong hash algorithm\n"); 2148 match = rsa_verify(calculated, calclen, signature->hashalg, signature->bn, pubkey); 2161 match = rsa_verify(calculated, calclen, signature->hashalg, signature->bn, pubkey);
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| libverify.c | 2011 rsa_verify(uint8_t *calculated, unsigned calclen, uint8_t hashalg, pgpv_bignum_t *bn, pgpv_pubkey_t *pubkey) function 2028 printf("rsa_verify: unknown hash algorithm: %d\n", hashalg); 2040 printf("rsa_verify: wrong hash algorithm\n"); 2853 match = rsa_verify(calculated, calclen, signature->hashalg, signature->bn, pubkey); 2866 match = rsa_verify(calculated, calclen, signature->hashalg, signature->bn, pubkey);
|