Lines Matching defs:signature
84 ECDSA_SIG *signature = NULL;
129 /* create the signature via ECDSA_sign_setup to avoid use of ECDSA nonces */
132 || !TEST_ptr(signature = ECDSA_do_sign_ex(digest, dgst_len,
134 /* verify the signature */
135 || !TEST_int_eq(ECDSA_do_verify(digest, dgst_len, signature, key), 1))
138 /* compare the created signature with the expected signature */
139 ECDSA_SIG_get0(signature, &sig_r, &sig_s);
151 ECDSA_SIG_free(signature);
167 * - create a signature
168 * - accept that signature
169 * - reject that signature with a different public key
170 * - reject that signature if its length is not correct
171 * - reject that signature after modifying the message
172 * - accept that signature after un-modifying the message
173 * - reject that signature after modifying the signature
174 * - accept that signature after un-modifying the signature
248 /* create a signature */
259 /* negative test, verify with wrong signature length, -1 return */
287 * Muck with the ECDSA signature. The DER encoding is one of:
292 * in that case, DER-parsing of the whole signature should fail.
301 * in that case, the signature verification should fail.
304 * in that case, the signature verification should fail.
307 * Because the ratio of DER overhead to signature bytes is small.