def verify(s, sig): global x509 if x509 == None: x509 = X509.load_cert('/etc/myemsl/keys/item/local.crt') pubkey = x509.get_pubkey() pubkey.reset_context(md="sha256") pubkey.verify_init() pubkey.verify_update(s) return m2.verify_final(pubkey.ctx, sig, pubkey.pkey)
def verify_final(self, sign): # type: (bytes) -> int """ Return result of verification. @param sign: Signature to use for verification @return: Result of verification: 1 for success, 0 for failure, -1 on other error. """ return m2.verify_final(self.ctx, sign, self.pkey)
def verify_final(self, sign): """ Return result of verification. @param sign: Signature to use for verification @rtype: int @return: Result of verification: 1 for success, 0 for failure, -1 on other error. """ return m2.verify_final(self.ctx, sign, self.pkey)
def _check_signature(self, pubkey, signature): """ Workaround for RHEL5 with ancient version of M2Crypto """ if LooseVersion(M2Crypto.version) < StrictVersion("0.18"): return m2.verify_final(pubkey.ctx, signature, pubkey.pkey) else: return pubkey.verify_final(signature)