Lines Matching +full:one +full:- +full:shot
7 EVP_PKEY_verify_message_final, EVP_PKEY_CTX_set_signature - signature
42 A context I<ctx> without a pre-loaded key cannot be used with this function.
44 treatment of the input to EVP_PKEY_verify() may be pre-determined, and in that
52 Passing the message is supported both in a one-shot fashion using
56 length, such as ED25519, RSA-SHA256 and similar.
74 EVP_PKEY_verify() is a one-shot function that performs the same thing as
100 to produce the digest internally, and while RSA-SHA256 can be expected to
107 L<EVP_PKEY_CTX_set_rsa_padding(3)> and similar others), while an RSA-SHA256
108 implementation usually has these details pre-set and immutable.
114 words, it's not possible to specify a I<ctx> pre-loaded with an RSA pkey, or
116 functionality of RSA-SHA256. If combining algorithms in that manner is
124 several one-shot operations performed using the same parameters.
149 In particular a return value of -2 indicates the operation is not supported by
195 =head2 RSA-SHA256 with a pre-computed digest
197 Verify a digest with RSA-SHA256 using one-shot functions. To be noted is that
198 RSA-SHA256 is assumed to be an implementation of C<sha256WithRSAEncryption>,
199 for which the padding is pre-determined to be B<RSA_PKCS1_PADDING>, and the
206 /* md is a SHA-256 digest in this example. */
216 alg = EVP_SIGNATURE_fetch(NULL, "RSA-SHA256", NULL);
235 =head2 RSA-SHA256, one-shot
237 Verify a document with RSA-SHA256 using one-shot functions.
238 To be noted is that RSA-SHA256 is assumed to be an implementation of
239 C<sha256WithRSAEncryption>, for which the padding is pre-determined to be
260 alg = EVP_SIGNATURE_fetch(NULL, "RSA-SHA256", NULL);
275 =head2 RSA-SHA256, using update and final
277 This is the same as the previous example, but allowing stream-like
298 alg = EVP_SIGNATURE_fetch(NULL, "RSA-SHA256", NULL);
313 inlen -= 256;
349 Copyright 2006-2024 The OpenSSL Project Authors. All Rights Reserved.