projects
/
openssl.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Update DTLSv1_listen documentation
[openssl.git]
/
doc
/
crypto
/
ecdsa.pod
diff --git
a/doc/crypto/ecdsa.pod
b/doc/crypto/ecdsa.pod
index 20edff97ffd66a62747af2901617ab6f11f93cad..be0f4826c279efff97cca19ad58799e434b3a0d9 100644
(file)
--- a/
doc/crypto/ecdsa.pod
+++ b/
doc/crypto/ecdsa.pod
@@
-2,7
+2,7
@@
=head1 NAME
=head1 NAME
-
ecdsa
- Elliptic Curve Digital Signature Algorithm
+
ECDSA_SIG_new, ECDSA_SIG_free, i2d_ECDSA_SIG, d2i_ECDSA_SIG, ECDSA_size, ECDSA_sign_setup, ECDSA_sign, ECDSA_sign_ex, ECDSA_verify, ECDSA_do_sign, ECDSA_do_sign_ex, ECDSA_do_verify
- Elliptic Curve Digital Signature Algorithm
=head1 SYNOPSIS
=head1 SYNOPSIS
@@
-40,13
+40,6
@@
ecdsa - Elliptic Curve Digital Signature Algorithm
const ECDSA_METHOD* ECDSA_get_default_method(void);
int ECDSA_set_method(EC_KEY *eckey,const ECDSA_METHOD *meth);
const ECDSA_METHOD* ECDSA_get_default_method(void);
int ECDSA_set_method(EC_KEY *eckey,const ECDSA_METHOD *meth);
- int ECDSA_get_ex_new_index(long argl, void *argp,
- CRYPTO_EX_new *new_func,
- CRYPTO_EX_dup *dup_func,
- CRYPTO_EX_free *free_func);
- int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg);
- void* ECDSA_get_ex_data(EC_KEY *d, int idx);
-
=head1 DESCRIPTION
The B<ECDSA_SIG> structure consists of two BIGNUMs for the
=head1 DESCRIPTION
The B<ECDSA_SIG> structure consists of two BIGNUMs for the
@@
-95,7
+88,7
@@
is ignored.
ECDSA_verify() verifies that the signature in B<sig> of size
B<siglen> is a valid ECDSA signature of the hash value
ECDSA_verify() verifies that the signature in B<sig> of size
B<siglen> is a valid ECDSA signature of the hash value
-
value
B<dgst> of size B<dgstlen> using the public key B<eckey>.
+B<dgst> of size B<dgstlen> using the public key B<eckey>.
The parameter B<type> is ignored.
ECDSA_do_sign() is wrapper function for ECDSA_do_sign_ex with B<kinv>
The parameter B<type> is ignored.
ECDSA_do_sign() is wrapper function for ECDSA_do_sign_ex with B<kinv>
@@
-119,7
+112,7
@@
on error.
ECDSA_verify() and ECDSA_do_verify() return 1 for a valid
signature, 0 for an invalid signature and -1 on error.
ECDSA_verify() and ECDSA_do_verify() return 1 for a valid
signature, 0 for an invalid signature and -1 on error.
-The error codes can be obtained by L<ERR_get_error(3)
|ERR_get_error(3)
>.
+The error codes can be obtained by L<ERR_get_error(3)>.
=head1 EXAMPLES
=head1 EXAMPLES
@@
-131,16
+124,12
@@
specific)
int ret;
ECDSA_SIG *sig;
int ret;
ECDSA_SIG *sig;
- EC_KEY *eckey = EC_KEY_new();
+ EC_KEY *eckey;
+ eckey = EC_KEY_new_by_curve_name(NID_secp192k1);
if (eckey == NULL)
{
/* error */
}
if (eckey == NULL)
{
/* error */
}
- key->group = EC_GROUP_new_by_nid(NID_secp192k1);
- if (key->group == NULL)
- {
- /* error */
- }
if (!EC_KEY_generate_key(eckey))
{
/* error */
if (!EC_KEY_generate_key(eckey))
{
/* error */
@@
-197,14
+186,6
@@
ANSI X9.62, US Federal Information Processing Standard FIPS 186-2
=head1 SEE ALSO
=head1 SEE ALSO
-L<dsa(3)|dsa(3)>, L<rsa(3)|rsa(3)>
-
-=head1 HISTORY
-
-The ecdsa implementation was first introduced in OpenSSL 0.9.8
-
-=head1 AUTHOR
-
-Nils Larsch for the OpenSSL project (http://www.openssl.org).
+L<dsa(3)>, L<rsa(3)>
=cut
=cut