.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_verify" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_verify \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_verify(Shishi * " handle ", Shishi_key * " key ", int " keyusage ", int " cksumtype ", const char * " in ", size_t " inlen ", const char * " cksum ", size_t " cksumlen ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle as allocated by \fBshishi_init()\fP. .IP "Shishi_key * key" 12 key to verify checksum with. .IP "int keyusage" 12 integer specifying what this key is used for. .IP "int cksumtype" 12 the checksum algorithm to use. .IP "const char * in" 12 input array with data that was integrity protected. .IP "size_t inlen" 12 size of input array with data that was integrity protected. .IP "const char * cksum" 12 input array with alleged checksum of data. .IP "size_t cksumlen" 12 size of input array with alleged checksum of data. .SH "DESCRIPTION" Verify checksum of data using key, possibly altered by supplied key usage. If key usage is 0, no key derivation is used. .SH "RETURN VALUE" Returns \fBSHISHI_OK\fP iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.