HEX
Server: Apache
System: Windows NT MAGNETO-ARM 10.0 build 22000 (Windows 10) AMD64
User: Michel (0)
PHP: 7.4.7
Disabled: NONE
Upload Files
File: C:/Ruby27-x64/share/ri/2.7.0/system/OpenSSL/PKey/RSA/verify_pss-i.ri
U:RDoc::AnyMethod[iI"verify_pss:ETI""OpenSSL::PKey::RSA#verify_pss;TF:publico:RDoc::Markup::Document:@parts[
o:RDoc::Markup::Paragraph;	[I"HVerifies _data_ using the Probabilistic Signature Scheme (RSA-PSS).;To:RDoc::Markup::BlankLineo;
;	[I"NThe return value is +true+ if the signature is valid, +false+ otherwise. ;TI"0RSAError will be raised if an error occurs.;T@o;
;	[I"ASee #sign_pss for the signing operation and an example code.;T@S:RDoc::Markup::Heading:
leveli:	textI"Parameters;To:RDoc::Markup::List:
@type:	NOTE:@items[	o:RDoc::Markup::ListItem:@label[I"
_digest_;T;	[o;
;	[I";A String containing the message digest algorithm name.;To;;[I"_data_;T;	[o;
;	[I"%A String. The data to be signed.;To;;[I"_salt_length_;T;	[o;
;	[I"HThe length in octets of the salt. Two special values are reserved: ;TI"H+:digest+ means the digest length, and +:auto+ means automatically ;TI"3determining the length based on the signature.;To;;[I"_mgf1_hash_;T;	[o;
;	[I"%The hash algorithm used in MGF1.;T:
@fileI" ext/openssl/ossl_pkey_rsa.c;T:0@omit_headings_from_table_of_contents_below0I"Wrsa.verify_pss(digest, signature, data, salt_length:, mgf1_hash:) -> true | false
;T0[I"(p1, p2, p3, p4 = {});T@8FI"RSA;TcRDoc::NormalClass00