Loading doc/crypto/EVP_PKEY_verify.pod +1 −1 Original line number Diff line number Diff line Loading @@ -69,7 +69,7 @@ Verify signature using PKCS#1 and SHA256 digest: /* Error */ /* Perform operation */ ret = EVP_PKEY_verify(ctx, md, mdlen, sig, siglen); ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen); /* ret == 1 indicates success, 0 verify failure and < 0 for some * other error. Loading doc/crypto/EVP_PKEY_verifyrecover.pod +1 −1 Original line number Diff line number Diff line Loading @@ -74,7 +74,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest: /* Error */ /* Determine buffer length */ if (EVP_PKEY_verifyrecover(ctx, rout, &routlen, sig, siglen) <= 0) if (EVP_PKEY_verifyrecover(ctx, NULL, &routlen, sig, siglen) <= 0) /* Error */ rout = OPENSSL_malloc(routlen); Loading Loading
doc/crypto/EVP_PKEY_verify.pod +1 −1 Original line number Diff line number Diff line Loading @@ -69,7 +69,7 @@ Verify signature using PKCS#1 and SHA256 digest: /* Error */ /* Perform operation */ ret = EVP_PKEY_verify(ctx, md, mdlen, sig, siglen); ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen); /* ret == 1 indicates success, 0 verify failure and < 0 for some * other error. Loading
doc/crypto/EVP_PKEY_verifyrecover.pod +1 −1 Original line number Diff line number Diff line Loading @@ -74,7 +74,7 @@ Recover digest originally signed using PKCS#1 and SHA256 digest: /* Error */ /* Determine buffer length */ if (EVP_PKEY_verifyrecover(ctx, rout, &routlen, sig, siglen) <= 0) if (EVP_PKEY_verifyrecover(ctx, NULL, &routlen, sig, siglen) <= 0) /* Error */ rout = OPENSSL_malloc(routlen); Loading