Lines Matching refs:signature

194     ECDSA_SIG *signature = NULL;
212 /* create the signature */
214 signature = ECDSA_do_sign(digest, 20, key);
215 if (signature == NULL)
219 /* compare the created signature with the expected signature */
224 if (BN_cmp(signature->r, r) || BN_cmp(signature->s, s))
228 /* verify the signature */
229 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
241 if (signature)
242 ECDSA_SIG_free(signature);
298 unsigned char *signature = NULL;
313 * create and verify a ecdsa signature with every availble curve (with )
333 /* now create and verify a signature for every curve */
386 /* create signature */
388 if ((signature = OPENSSL_malloc(sig_len)) == NULL)
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) {
396 /* verify signature */
397 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) {
403 /* verify signature with the wrong key */
404 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) {
411 if (ECDSA_verify(0, wrong_digest, 20, signature, sig_len, eckey) == 1) {
418 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) {
426 * Modify a single byte of the signature: to ensure we don't garble
427 * the ASN1 structure, we read the raw signature and modify a byte in
430 sig_ptr = signature;
461 sig_ptr2 = signature;
463 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1) {
468 * Sanity check: undo the modification and verify signature.
475 sig_ptr2 = signature;
477 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) {
488 OPENSSL_free(signature);
489 signature = NULL;
508 if (signature)
509 OPENSSL_free(signature);