diff options
| author | jmc <> | 2021-06-12 17:04:41 +0000 |
|---|---|---|
| committer | jmc <> | 2021-06-12 17:04:41 +0000 |
| commit | 0d0d6635c4d19108e726878f9f88a0793fd3f32f (patch) | |
| tree | 442f88900f01383a92b178bcc9c4581f6274ecff | |
| parent | 7895cae9ea7277b3786272c80f490f95334d741f (diff) | |
| download | openbsd-0d0d6635c4d19108e726878f9f88a0793fd3f32f.tar.gz openbsd-0d0d6635c4d19108e726878f9f88a0793fd3f32f.tar.bz2 openbsd-0d0d6635c4d19108e726878f9f88a0793fd3f32f.zip | |
space between macro args and punctuation;
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/man/X509_check_purpose.3 | 6 | ||||
| -rw-r--r-- | src/lib/libssl/man/SSL_CTX_set_verify.3 | 20 |
2 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/man/X509_check_purpose.3 b/src/lib/libcrypto/man/X509_check_purpose.3 index b74ea50bef..8e98a62239 100644 --- a/src/lib/libcrypto/man/X509_check_purpose.3 +++ b/src/lib/libcrypto/man/X509_check_purpose.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_check_purpose.3,v 1.1 2019/08/22 15:15:35 schwarze Exp $ | 1 | .\" $OpenBSD: X509_check_purpose.3,v 1.2 2021/06/12 17:04:41 jmc Exp $ |
| 2 | .\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org> | 2 | .\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org> |
| 3 | .\" | 3 | .\" |
| 4 | .\" Permission to use, copy, modify, and distribute this software for any | 4 | .\" Permission to use, copy, modify, and distribute this software for any |
| @@ -13,7 +13,7 @@ | |||
| 13 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 13 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 14 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 14 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 15 | .\" | 15 | .\" |
| 16 | .Dd $Mdocdate: August 22 2019 $ | 16 | .Dd $Mdocdate: June 12 2021 $ |
| 17 | .Dt X509_CHECK_PURPOSE 3 | 17 | .Dt X509_CHECK_PURPOSE 3 |
| 18 | .Os | 18 | .Os |
| 19 | .Sh NAME | 19 | .Sh NAME |
| @@ -362,7 +362,7 @@ is non-zero, the following values can also be returned: | |||
| 362 | .Fa certificate | 362 | .Fa certificate |
| 363 | can be used as a CA for the | 363 | can be used as a CA for the |
| 364 | .Fa purpose . | 364 | .Fa purpose . |
| 365 | .It 3 Ta Success Ta The Fa certificate No is a version 1 CA. | 365 | .It 3 Ta Success Ta The Fa certificate No is a version 1 CA . |
| 366 | .It 4 Ta Success Ta The Key Usage allows Dv keyCertSign . | 366 | .It 4 Ta Success Ta The Key Usage allows Dv keyCertSign . |
| 367 | .It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA. | 367 | .It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA. |
| 368 | .El | 368 | .El |
diff --git a/src/lib/libssl/man/SSL_CTX_set_verify.3 b/src/lib/libssl/man/SSL_CTX_set_verify.3 index 5b137358ab..1ed86407e9 100644 --- a/src/lib/libssl/man/SSL_CTX_set_verify.3 +++ b/src/lib/libssl/man/SSL_CTX_set_verify.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: SSL_CTX_set_verify.3,v 1.8 2020/09/17 08:04:22 schwarze Exp $ | 1 | .\" $OpenBSD: SSL_CTX_set_verify.3,v 1.9 2021/06/12 16:59:53 jmc Exp $ |
| 2 | .\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
| 3 | .\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100 | 3 | .\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100 |
| 4 | .\" | 4 | .\" |
| @@ -50,7 +50,7 @@ | |||
| 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 52 | .\" | 52 | .\" |
| 53 | .Dd $Mdocdate: September 17 2020 $ | 53 | .Dd $Mdocdate: June 12 2021 $ |
| 54 | .Dt SSL_CTX_SET_VERIFY 3 | 54 | .Dt SSL_CTX_SET_VERIFY 3 |
| 55 | .Os | 55 | .Os |
| 56 | .Sh NAME | 56 | .Sh NAME |
| @@ -146,11 +146,11 @@ The verification of certificates can be controlled by a set of bitwise ORed | |||
| 146 | flags: | 146 | flags: |
| 147 | .Bl -tag -width Ds | 147 | .Bl -tag -width Ds |
| 148 | .It Dv SSL_VERIFY_NONE | 148 | .It Dv SSL_VERIFY_NONE |
| 149 | .Em Server mode: | 149 | .Em Server mode : |
| 150 | the server will not send a client certificate request to the client, | 150 | the server will not send a client certificate request to the client, |
| 151 | so the client will not send a certificate. | 151 | so the client will not send a certificate. |
| 152 | .Pp | 152 | .Pp |
| 153 | .Em Client mode: | 153 | .Em Client mode : |
| 154 | if not using an anonymous cipher (by default disabled), | 154 | if not using an anonymous cipher (by default disabled), |
| 155 | the server will send a certificate which will be checked. | 155 | the server will send a certificate which will be checked. |
| 156 | The result of the certificate verification process can be checked after the | 156 | The result of the certificate verification process can be checked after the |
| @@ -159,7 +159,7 @@ TLS/SSL handshake using the | |||
| 159 | function. | 159 | function. |
| 160 | The handshake will be continued regardless of the verification result. | 160 | The handshake will be continued regardless of the verification result. |
| 161 | .It Dv SSL_VERIFY_PEER | 161 | .It Dv SSL_VERIFY_PEER |
| 162 | .Em Server mode: | 162 | .Em Server mode : |
| 163 | the server sends a client certificate request to the client. | 163 | the server sends a client certificate request to the client. |
| 164 | The certificate returned (if any) is checked. | 164 | The certificate returned (if any) is checked. |
| 165 | If the verification process fails, | 165 | If the verification process fails, |
| @@ -171,7 +171,7 @@ and | |||
| 171 | .Dv SSL_VERIFY_CLIENT_ONCE | 171 | .Dv SSL_VERIFY_CLIENT_ONCE |
| 172 | flags. | 172 | flags. |
| 173 | .Pp | 173 | .Pp |
| 174 | .Em Client mode: | 174 | .Em Client mode : |
| 175 | the server certificate is verified. | 175 | the server certificate is verified. |
| 176 | If the verification process fails, | 176 | If the verification process fails, |
| 177 | the TLS/SSL handshake is immediately terminated with an alert message | 177 | the TLS/SSL handshake is immediately terminated with an alert message |
| @@ -180,7 +180,7 @@ If no server certificate is sent, because an anonymous cipher is used, | |||
| 180 | .Dv SSL_VERIFY_PEER | 180 | .Dv SSL_VERIFY_PEER |
| 181 | is ignored. | 181 | is ignored. |
| 182 | .It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT | 182 | .It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
| 183 | .Em Server mode: | 183 | .Em Server mode : |
| 184 | if the client did not return a certificate, the TLS/SSL | 184 | if the client did not return a certificate, the TLS/SSL |
| 185 | handshake is immediately terminated with a | 185 | handshake is immediately terminated with a |
| 186 | .Dq handshake failure | 186 | .Dq handshake failure |
| @@ -188,16 +188,16 @@ alert. | |||
| 188 | This flag must be used together with | 188 | This flag must be used together with |
| 189 | .Dv SSL_VERIFY_PEER . | 189 | .Dv SSL_VERIFY_PEER . |
| 190 | .Pp | 190 | .Pp |
| 191 | .Em Client mode: | 191 | .Em Client mode : |
| 192 | ignored | 192 | ignored |
| 193 | .It Dv SSL_VERIFY_CLIENT_ONCE | 193 | .It Dv SSL_VERIFY_CLIENT_ONCE |
| 194 | .Em Server mode: | 194 | .Em Server mode : |
| 195 | only request a client certificate on the initial TLS/SSL handshake. | 195 | only request a client certificate on the initial TLS/SSL handshake. |
| 196 | Do not ask for a client certificate again in case of a renegotiation. | 196 | Do not ask for a client certificate again in case of a renegotiation. |
| 197 | This flag must be used together with | 197 | This flag must be used together with |
| 198 | .Dv SSL_VERIFY_PEER . | 198 | .Dv SSL_VERIFY_PEER . |
| 199 | .Pp | 199 | .Pp |
| 200 | .Em Client mode: | 200 | .Em Client mode : |
| 201 | ignored | 201 | ignored |
| 202 | .El | 202 | .El |
| 203 | .Pp | 203 | .Pp |
