Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
e54e1235
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
接近 2 年 前同步成功
通知
12
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
e54e1235
编写于
1月 12, 2013
作者:
B
Ben Laurie
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Correct EVP_PKEY_verifyrecover to EVP_PKEY_verify_recover (RT 2955).
上级
abd01ea2
变更
9
隐藏空白更改
内联
并排
Showing
9 changed file
with
19 addition
and
19 deletion
+19
-19
doc/crypto/EVP_PKEY_CTX_ctrl.pod
doc/crypto/EVP_PKEY_CTX_ctrl.pod
+1
-1
doc/crypto/EVP_PKEY_decrypt.pod
doc/crypto/EVP_PKEY_decrypt.pod
+1
-1
doc/crypto/EVP_PKEY_derive.pod
doc/crypto/EVP_PKEY_derive.pod
+1
-1
doc/crypto/EVP_PKEY_encrypt.pod
doc/crypto/EVP_PKEY_encrypt.pod
+1
-1
doc/crypto/EVP_PKEY_get_default_digest.pod
doc/crypto/EVP_PKEY_get_default_digest.pod
+1
-1
doc/crypto/EVP_PKEY_keygen.pod
doc/crypto/EVP_PKEY_keygen.pod
+1
-1
doc/crypto/EVP_PKEY_sign.pod
doc/crypto/EVP_PKEY_sign.pod
+1
-1
doc/crypto/EVP_PKEY_verify.pod
doc/crypto/EVP_PKEY_verify.pod
+1
-1
doc/crypto/EVP_PKEY_verify_recover.pod
doc/crypto/EVP_PKEY_verify_recover.pod
+11
-11
未找到文件。
doc/crypto/EVP_PKEY_CTX_ctrl.pod
浏览文件 @
e54e1235
...
...
@@ -117,7 +117,7 @@ L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
L<EVP_PKEY_keygen(3)|EVP_PKEY_keygen(3)>
...
...
doc/crypto/EVP_PKEY_decrypt.pod
浏览文件 @
e54e1235
...
...
@@ -83,7 +83,7 @@ L<EVP_PKEY_CTX_new(3)|EVP_PKEY_CTX_new(3)>,
L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_derive.pod
浏览文件 @
e54e1235
...
...
@@ -84,7 +84,7 @@ L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_encrypt.pod
浏览文件 @
e54e1235
...
...
@@ -83,7 +83,7 @@ L<EVP_PKEY_CTX_new(3)|EVP_PKEY_CTX_new(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_get_default_digest.pod
浏览文件 @
e54e1235
...
...
@@ -32,7 +32,7 @@ public key algorithm.
L<EVP_PKEY_CTX_new(3)|EVP_PKEY_CTX_new(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_keygen.pod
浏览文件 @
e54e1235
...
...
@@ -151,7 +151,7 @@ L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_sign.pod
浏览文件 @
e54e1235
...
...
@@ -86,7 +86,7 @@ L<EVP_PKEY_CTX_new(3)|EVP_PKEY_CTX_new(3)>,
L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_verify.pod
浏览文件 @
e54e1235
...
...
@@ -81,7 +81,7 @@ L<EVP_PKEY_CTX_new(3)|EVP_PKEY_CTX_new(3)>,
L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify
recover(3)|EVP_PKEY_verify
recover(3)>,
L<EVP_PKEY_verify
_recover(3)|EVP_PKEY_verify_
recover(3)>,
L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
=head1 HISTORY
...
...
doc/crypto/EVP_PKEY_verifyrecover.pod
→
doc/crypto/EVP_PKEY_verify
_
recover.pod
浏览文件 @
e54e1235
...
...
@@ -2,23 +2,23 @@
=head1 NAME
EVP_PKEY_verify
recover_init, EVP_PKEY_verify
recover - recover signature using a public key algorithm
EVP_PKEY_verify
_recover_init, EVP_PKEY_verify_
recover - recover signature using a public key algorithm
=head1 SYNOPSIS
#include <openssl/evp.h>
int EVP_PKEY_verifyrecover_init(EVP_PKEY_CTX *ctx);
int EVP_PKEY_verifyrecover(EVP_PKEY_CTX *ctx,
int EVP_PKEY_verify
_
recover_init(EVP_PKEY_CTX *ctx);
int EVP_PKEY_verify
_
recover(EVP_PKEY_CTX *ctx,
unsigned char *rout, size_t *routlen,
const unsigned char *sig, size_t siglen);
=head1 DESCRIPTION
The EVP_PKEY_verifyrecover_init() function initializes a public key algorithm
The EVP_PKEY_verify
_
recover_init() function initializes a public key algorithm
context using key B<pkey> for a verify recover operation.
The EVP_PKEY_verifyrecover() function recovers signed data
The EVP_PKEY_verify
_
recover() function recovers signed data
using B<ctx>. The signature is specified using the B<sig> and
B<siglen> parameters. If B<rout> is B<NULL> then the maximum size of the output
buffer is written to the B<routlen> parameter. If B<rout> is not B<NULL> then
...
...
@@ -36,16 +36,16 @@ Sometimes however it is useful to obtain the data originally signed using a
signing operation. Only certain public key algorithms can recover a signature
in this way (for example RSA in PKCS padding mode).
After the call to EVP_PKEY_verifyrecover_init() algorithm specific control
After the call to EVP_PKEY_verify
_
recover_init() algorithm specific control
operations can be performed to set any appropriate parameters for the
operation.
The function EVP_PKEY_verifyrecover() can be called more than once on the same
The function EVP_PKEY_verify
_
recover() can be called more than once on the same
context if several operations are performed using the same parameters.
=head1 RETURN VALUES
EVP_PKEY_verify
recover_init() and EVP_PKEY_verify
recover() return 1 for success
EVP_PKEY_verify
_recover_init() and EVP_PKEY_verify_
recover() return 1 for success
and 0 or a negative value for failure. In particular a return value of -2
indicates the operation is not supported by the public key algorithm.
...
...
@@ -66,7 +66,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest:
ctx = EVP_PKEY_CTX_new(verify_key);
if (!ctx)
/* Error occurred */
if (EVP_PKEY_verifyrecover_init(ctx) <= 0)
if (EVP_PKEY_verify
_
recover_init(ctx) <= 0)
/* Error */
if (EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) <= 0)
/* Error */
...
...
@@ -74,7 +74,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest:
/* Error */
/* Determine buffer length */
if (EVP_PKEY_verifyrecover(ctx, NULL, &routlen, sig, siglen) <= 0)
if (EVP_PKEY_verify
_
recover(ctx, NULL, &routlen, sig, siglen) <= 0)
/* Error */
rout = OPENSSL_malloc(routlen);
...
...
@@ -82,7 +82,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest:
if (!rout)
/* malloc failure */
if (EVP_PKEY_verifyrecover(ctx, rout, &routlen, sig, siglen) <= 0)
if (EVP_PKEY_verify
_
recover(ctx, rout, &routlen, sig, siglen) <= 0)
/* Error */
/* Recovered data is routlen bytes written to buffer rout */
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录