summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod')
-rw-r--r--src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod
index 23a28a9c43..00d53db783 100644
--- a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod
+++ b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod
@@ -29,7 +29,7 @@ B<rout> and the amount of data written to B<routlen>.
29=head1 NOTES 29=head1 NOTES
30 30
31Normally an application is only interested in whether a signature verification 31Normally an application is only interested in whether a signature verification
32operation is successful in those cases the EVP_verify() function should be 32operation is successful in those cases the EVP_verify() function should be
33used. 33used.
34 34
35Sometimes however it is useful to obtain the data originally signed using a 35Sometimes however it is useful to obtain the data originally signed using a
@@ -58,7 +58,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest:
58 58
59 EVP_PKEY_CTX *ctx; 59 EVP_PKEY_CTX *ctx;
60 unsigned char *rout, *sig; 60 unsigned char *rout, *sig;
61 size_t routlen, siglen; 61 size_t routlen, siglen;
62 EVP_PKEY *verify_key; 62 EVP_PKEY *verify_key;
63 /* NB: assumes verify_key, sig and siglen are already set up 63 /* NB: assumes verify_key, sig and siglen are already set up
64 * and that verify_key is an RSA public key 64 * and that verify_key is an RSA public key
@@ -81,7 +81,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest:
81 81
82 if (!rout) 82 if (!rout)
83 /* malloc failure */ 83 /* malloc failure */
84 84
85 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0) 85 if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0)
86 /* Error */ 86 /* Error */
87 87
@@ -94,7 +94,7 @@ L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
94L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>, 94L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
95L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>, 95L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
96L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>, 96L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
97L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)> 97L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
98 98
99=head1 HISTORY 99=head1 HISTORY
100 100