diff options
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod index 23a28a9c43..00d53db783 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod | |||
| @@ -29,7 +29,7 @@ B<rout> and the amount of data written to B<routlen>. | |||
| 29 | =head1 NOTES | 29 | =head1 NOTES |
| 30 | 30 | ||
| 31 | Normally an application is only interested in whether a signature verification | 31 | Normally an application is only interested in whether a signature verification |
| 32 | operation is successful in those cases the EVP_verify() function should be | 32 | operation is successful in those cases the EVP_verify() function should be |
| 33 | used. | 33 | used. |
| 34 | 34 | ||
| 35 | Sometimes however it is useful to obtain the data originally signed using a | 35 | Sometimes however it is useful to obtain the data originally signed using a |
| @@ -58,7 +58,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest: | |||
| 58 | 58 | ||
| 59 | EVP_PKEY_CTX *ctx; | 59 | EVP_PKEY_CTX *ctx; |
| 60 | unsigned char *rout, *sig; | 60 | unsigned char *rout, *sig; |
| 61 | size_t routlen, siglen; | 61 | size_t routlen, siglen; |
| 62 | EVP_PKEY *verify_key; | 62 | EVP_PKEY *verify_key; |
| 63 | /* NB: assumes verify_key, sig and siglen are already set up | 63 | /* NB: assumes verify_key, sig and siglen are already set up |
| 64 | * and that verify_key is an RSA public key | 64 | * and that verify_key is an RSA public key |
| @@ -81,7 +81,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest: | |||
| 81 | 81 | ||
| 82 | if (!rout) | 82 | if (!rout) |
| 83 | /* malloc failure */ | 83 | /* malloc failure */ |
| 84 | 84 | ||
| 85 | if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0) | 85 | if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0) |
| 86 | /* Error */ | 86 | /* Error */ |
| 87 | 87 | ||
| @@ -94,7 +94,7 @@ L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>, | |||
| 94 | L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>, | 94 | L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>, |
| 95 | L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>, | 95 | L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>, |
| 96 | L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>, | 96 | L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>, |
| 97 | L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)> | 97 | L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)> |
| 98 | 98 | ||
| 99 | =head1 HISTORY | 99 | =head1 HISTORY |
| 100 | 100 | ||
