/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
rsa_test.c | 303 if (!RSA_verify(NID_md5, kDummyHash, sizeof(kDummyHash), buf, buf_len, key)) { 304 fprintf(stderr, "RSA_verify failed with only d given.\n"); 371 if (!RSA_verify(NID_md5, kDummyHash, sizeof(kDummyHash), buf, buf_len, 373 fprintf(stderr, "RSA_verify failed with recovered key.\n");
|
rsa.c | 442 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 456 OPENSSL_PUT_ERROR(RSA, RSA_verify, RSA_R_WRONG_SIGNATURE_LENGTH); 461 OPENSSL_PUT_ERROR(RSA, RSA_verify, RSA_R_INVALID_MESSAGE_LENGTH); 467 OPENSSL_PUT_ERROR(RSA, RSA_verify, ERR_R_MALLOC_FAILURE); 482 OPENSSL_PUT_ERROR(RSA, RSA_verify, RSA_R_BAD_SIGNATURE);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
rsa.h | 205 /* RSA_verify verifies that |sig_len| bytes from |sig| are a valid, PKCS#1 216 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len,
|
/external/chromium_org/third_party/boringssl/src/tool/ |
speed.cc | 153 return RSA_verify(NID_sha256, fake_sha256_hash, 156 fprintf(stderr, "RSA_verify failed.\n");
|
/external/openssl/crypto/rsa/ |
rsa_sign.c | 325 int RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, 330 if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_verify) 332 return rsa->meth->rsa_verify(dtype, m, m_len,
|
rsa.h | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards 118 int (*rsa_verify)(int dtype, member in struct:rsa_meth_st 190 /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. 364 int RSA_verify(int type, const unsigned char *m, unsigned int m_length,
|
rsa_pmeth.c | 371 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen,
|
/bootable/recovery/ |
verifier.cpp | 259 if (!RSA_verify(pKeys[i].rsa, sig_der, RSANUMBYTES,
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa.c | 235 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa);
|
/external/openssl/include/openssl/ |
rsa.h | 111 * RSA_sign(), RSA_verify() should be used instead. Note: for backwards 118 int (*rsa_verify)(int dtype, member in struct:rsa_meth_st 190 /* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. 364 int RSA_verify(int type, const unsigned char *m, unsigned int m_length,
|
evp.h | 252 (evp_verify_method *)RSA_verify, \ [all...] |
/external/openssl/apps/ |
speed.c | [all...] |
/external/openssl/crypto/evp/ |
evp.h | 252 (evp_verify_method *)RSA_verify, \ [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_clnt.c | [all...] |
/external/openssl/ssl/ |
s3_clnt.c | [all...] |
s3_srvr.c | [all...] |