提交 2dd8cb3b 编写于 作者: M Matt Caswell

Typo fixes to evp documentation.

This patch was submitted by user "Kox" via the wiki
Reviewed-by: NTim Hudson <tjh@openssl.org>
上级 be0477a8
...@@ -38,7 +38,7 @@ or a negative value for failure. In particular a return value of -2 indicates ...@@ -38,7 +38,7 @@ or a negative value for failure. In particular a return value of -2 indicates
the operation is not supported by the public key algorithm. the operation is not supported by the public key algorithm.
Unlike other functions the return value 0 from EVP_DigestVerifyFinal() only Unlike other functions the return value 0 from EVP_DigestVerifyFinal() only
indicates that the signature did not not verify successfully (that is tbs did indicates that the signature did not verify successfully (that is tbs did
not match the original data or the signature was of invalid form) it is not an not match the original data or the signature was of invalid form) it is not an
indication of a more serious error. indication of a more serious error.
...@@ -59,7 +59,7 @@ For some key types and parameters the random number generator must be seeded ...@@ -59,7 +59,7 @@ For some key types and parameters the random number generator must be seeded
or the operation will fail. or the operation will fail.
The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest
context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can context. This means that EVP_VerifyUpdate() and EVP_VerifyFinal() can
be called later to digest and verify additional data. be called later to digest and verify additional data.
Since only a copy of the digest context is ever finalized the context must Since only a copy of the digest context is ever finalized the context must
......
...@@ -37,7 +37,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and ...@@ -37,7 +37,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and
EVP_PKEY_get1_EC_KEY() return the referenced key in B<pkey> or EVP_PKEY_get1_EC_KEY() return the referenced key in B<pkey> or
B<NULL> if the key is not of the correct type. B<NULL> if the key is not of the correct type.
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH() EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
and EVP_PKEY_assign_EC_KEY() also set the referenced key to B<key> and EVP_PKEY_assign_EC_KEY() also set the referenced key to B<key>
however these use the supplied B<key> internally and so B<key> however these use the supplied B<key> internally and so B<key>
will be freed when the parent B<pkey> is freed. will be freed when the parent B<pkey> is freed.
...@@ -54,8 +54,8 @@ In accordance with the OpenSSL naming convention the key obtained ...@@ -54,8 +54,8 @@ In accordance with the OpenSSL naming convention the key obtained
from or assigned to the B<pkey> using the B<1> functions must be from or assigned to the B<pkey> using the B<1> functions must be
freed as well as B<pkey>. freed as well as B<pkey>.
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH() EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
EVP_PKEY_assign_EC_KEY() are implemented as macros. and EVP_PKEY_assign_EC_KEY() are implemented as macros.
=head1 RETURN VALUES =head1 RETURN VALUES
...@@ -66,7 +66,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and ...@@ -66,7 +66,7 @@ EVP_PKEY_get1_RSA(), EVP_PKEY_get1_DSA(), EVP_PKEY_get1_DH() and
EVP_PKEY_get1_EC_KEY() return the referenced key or B<NULL> if EVP_PKEY_get1_EC_KEY() return the referenced key or B<NULL> if
an error occurred. an error occurred.
EVP_PKEY_assign_RSA() EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH() EVP_PKEY_assign_RSA(), EVP_PKEY_assign_DSA(), EVP_PKEY_assign_DH()
and EVP_PKEY_assign_EC_KEY() return 1 for success and 0 for failure. and EVP_PKEY_assign_EC_KEY() return 1 for success and 0 for failure.
=head1 SEE ALSO =head1 SEE ALSO
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册