From: Niels Möller Date: Sun, 25 Jul 2010 09:18:17 +0000 (+0200) Subject: Added missing functions rsa_sha512_verify and rsa_sha512_verify_digest. X-Git-Tag: nettle_2.1_release_20100725~7 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=dc792d22eb3f8f5c5e68c1c27f194b606f9fc2cb;p=thirdparty%2Fnettle.git Added missing functions rsa_sha512_verify and rsa_sha512_verify_digest. Rev: nettle/nettle.texinfo:1.14 --- diff --git a/nettle.texinfo b/nettle.texinfo index 780f6600..2ed25056 100644 --- a/nettle.texinfo +++ b/nettle.texinfo @@ -1961,6 +1961,7 @@ signature is stored in @var{signature} (which must have been @deftypefun int rsa_md5_verify (const struct rsa_public_key *@var{key}, struct md5_ctx *@var{hash}, const mpz_t @var{signature}) @deftypefunx int rsa_sha1_verify (const struct rsa_public_key *@var{key}, struct sha1_ctx *@var{hash}, const mpz_t @var{signature}) @deftypefunx int rsa_sha256_verify (const struct rsa_public_key *@var{key}, struct sha256_ctx *@var{hash}, const mpz_t @var{signature}) +@deftypefunx int rsa_sha512_verify (const struct rsa_public_key *@var{key}, struct sha512_ctx *@var{hash}, const mpz_t @var{signature}) Returns 1 if the signature is valid, or 0 if it isn't. In either case, the hash context is reset so that it can be used for new messages. @end deftypefun @@ -1968,6 +1969,7 @@ the hash context is reset so that it can be used for new messages. @deftypefun int rsa_md5_verify_digest (const struct rsa_public_key *@var{key}, const uint8_t *@var{digest}, const mpz_t @var{signature}) @deftypefunx int rsa_sha1_verify_digest (const struct rsa_public_key *@var{key}, const uint8_t *@var{digest}, const mpz_t @var{signature}) @deftypefunx int rsa_sha256_verify_digest (const struct rsa_public_key *@var{key}, const uint8_t *@var{digest}, const mpz_t @var{signature}) +@deftypefunx int rsa_sha512_verify_digest (const struct rsa_public_key *@var{key}, const uint8_t *@var{digest}, const mpz_t @var{signature}) Returns 1 if the signature is valid, or 0 if it isn't. @var{digest} should point to a digest of size @code{MD5_DIGEST_SIZE}, @code{SHA1_DIGEST_SIZE}, or @code{SHA256_DIGEST_SIZE}, respectively.