The documentation doesn't reflect current behaviour. The "type"
parameter to DSA_sign and DSA_verify is currently ignored, it should
arguably check the length is consistent with the passed digest type.

The actual algorithm implementation is OK though. The supplied digest
will be truncated if it exceeds the size of the q parameter as mentioned
in FIPS 186-3 for example.

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to