The documentation doesn't reflect current behaviour. The "type" parameter to DSA_sign and DSA_verify is currently ignored, it should arguably check the length is consistent with the passed digest type.
The actual algorithm implementation is OK though. The supplied digest will be truncated if it exceeds the size of the q parameter as mentioned in FIPS 186-3 for example. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org