Typo fixes to evp documentation.
This patch was submitted by user "Kox" via the wiki Reviewed-by: Tim Hudson <tjh@openssl.org>
This commit is contained in:
parent
be0477a8e9
commit
2dd8cb3b95
@ -38,7 +38,7 @@ or a negative value for failure. In particular a return value of -2 indicates
|
|||||||
the operation is not supported by the public key algorithm.
|
the operation is not supported by the public key algorithm.
|
||||||
|
|
||||||
Unlike other functions the return value 0 from EVP_DigestVerifyFinal() only
|
Unlike other functions the return value 0 from EVP_DigestVerifyFinal() only
|
||||||
indicates that the signature did not not verify successfully (that is tbs did
|
indicates that the signature did not verify successfully (that is tbs did
|
||||||
not match the original data or the signature was of invalid form) it is not an
|
not match the original data or the signature was of invalid form) it is not an
|
||||||
indication of a more serious error.
|
indication of a more serious error.
|
||||||
|
|
||||||
@ -59,7 +59,7 @@ For some key types and parameters the random number generator must be seeded
|
|||||||
or the operation will fail.
|
or the operation will fail.
|
||||||
|
|
||||||
The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest
|
The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest
|
||||||
context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can
|
context. This means that EVP_VerifyUpdate() and EVP_VerifyFinal() can
|
||||||
be called later to digest and verify additional data.
|
be called later to digest and verify additional data.
|
||||||
|
|
||||||
Since only a copy of the digest context is ever finalized the context must
|
Since only a copy of the digest context is ever finalized the context must
|
||||||
|
@ -37,7 +37,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and
|
|||||||
EVP_PKEY_get1_EC_KEY() return the referenced key in B<pkey> or
|
EVP_PKEY_get1_EC_KEY() return the referenced key in B<pkey> or
|
||||||
B<NULL> if the key is not of the correct type.
|
B<NULL> if the key is not of the correct type.
|
||||||
|
|
||||||
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
||||||
and EVP_PKEY_assign_EC_KEY() also set the referenced key to B<key>
|
and EVP_PKEY_assign_EC_KEY() also set the referenced key to B<key>
|
||||||
however these use the supplied B<key> internally and so B<key>
|
however these use the supplied B<key> internally and so B<key>
|
||||||
will be freed when the parent B<pkey> is freed.
|
will be freed when the parent B<pkey> is freed.
|
||||||
@ -54,8 +54,8 @@ In accordance with the OpenSSL naming convention the key obtained
|
|||||||
from or assigned to the B<pkey> using the B<1> functions must be
|
from or assigned to the B<pkey> using the B<1> functions must be
|
||||||
freed as well as B<pkey>.
|
freed as well as B<pkey>.
|
||||||
|
|
||||||
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
||||||
EVP_PKEY_assign_EC_KEY() are implemented as macros.
|
and EVP_PKEY_assign_EC_KEY() are implemented as macros.
|
||||||
|
|
||||||
=head1 RETURN VALUES
|
=head1 RETURN VALUES
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and
|
|||||||
EVP_PKEY_get1_EC_KEY() return the referenced key or B<NULL> if
|
EVP_PKEY_get1_EC_KEY() return the referenced key or B<NULL> if
|
||||||
an error occurred.
|
an error occurred.
|
||||||
|
|
||||||
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
|
||||||
and EVP_PKEY_assign_EC_KEY() return 1 for success and 0 for failure.
|
and EVP_PKEY_assign_EC_KEY() return 1 for success and 0 for failure.
|
||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
Loading…
x
Reference in New Issue
Block a user