projects
/
oweals
/
openssl.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Remove indentation in the NAME section. There's really no need to
[oweals/openssl.git]
/
doc
/
crypto
/
RSA_sign.pod
diff --git
a/doc/crypto/RSA_sign.pod
b/doc/crypto/RSA_sign.pod
index 81771ba574d7a183b3e7b0fe027e53adf971e281..f0bf6eea1b358ed0ae2a2fe2cd8747916f6eb21f 100644
(file)
--- a/
doc/crypto/RSA_sign.pod
+++ b/
doc/crypto/RSA_sign.pod
@@
-19,16
+19,14
@@
RSA_sign, RSA_verify - RSA signatures
RSA_sign() signs the message digest B<m> of size B<m_len> using the
private key B<rsa> as specified in PKCS #1 v2.0. It stores the
signature in B<sigret> and the signature size in B<siglen>. B<sigret>
RSA_sign() signs the message digest B<m> of size B<m_len> using the
private key B<rsa> as specified in PKCS #1 v2.0. It stores the
signature in B<sigret> and the signature size in B<siglen>. B<sigret>
-must point to
B<RSA_size(rsa)>
bytes of memory.
+must point to
RSA_size(B<rsa>)
bytes of memory.
B<type> denotes the message digest algorithm that was used to generate
B<type> denotes the message digest algorithm that was used to generate
-B<m>. It usually is one of B<NID_sha1>, B<NID_ripemd160> and
-
B<NID_md5>; see L<objects
> for details. If B<type> is B<NID_md5_sha1>,
+B<m>. It usually is one of B<NID_sha1>, B<NID_ripemd160> and
B<NID_md5>;
+
see L<objects(3)|objects(3)
> for details. If B<type> is B<NID_md5_sha1>,
an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
and no algorithm identifier) is created.
an SSL signature (MD5 and SHA1 message digests with PKCS #1 padding
and no algorithm identifier) is created.
-The random number generator must be seeded prior to calling RSA_sign().
-
RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
matches a given message digest B<m> of size B<m_len>. B<type> denotes
the message digest algorithm that was used to generate the signature.
RSA_verify() verifies that the signature B<sigbuf> of size B<siglen>
matches a given message digest B<m> of size B<m_len>. B<type> denotes
the message digest algorithm that was used to generate the signature.
@@
-39,7
+37,7
@@
B<rsa> is the signer's public key.
RSA_sign() returns 1 on success, 0 otherwise. RSA_verify() returns 1
on successful verification, 0 otherwise.
RSA_sign() returns 1 on success, 0 otherwise. RSA_verify() returns 1
on successful verification, 0 otherwise.
-The error codes can be obtained by
ERR_get_error(3)
.
+The error codes can be obtained by
L<ERR_get_error(3)|ERR_get_error(3)>
.
=head1 BUGS
=head1 BUGS
@@
-52,8
+50,9
@@
SSL, PKCS #1 v2.0
=head1 SEE ALSO
=head1 SEE ALSO
-err(3), objects(3), rand(3), rsa(3), RSA_private_encrypt(3),
-RSA_public_decrypt(3)
+L<err(3)|err(3)>, L<objects(3)|objects(3)>, L<rsa(3)|rsa(3)>,
+L<RSA_private_encrypt(3)|RSA_private_encrypt(3)>,
+L<RSA_public_decrypt(3)|RSA_public_decrypt(3)>
=head1 HISTORY
=head1 HISTORY