diff options
author | jmc <> | 2021-06-12 17:04:41 +0000 |
---|---|---|
committer | jmc <> | 2021-06-12 17:04:41 +0000 |
commit | dd7ab33558af2512e14a4aa8fbb164c785e2d754 (patch) | |
tree | 442f88900f01383a92b178bcc9c4581f6274ecff | |
parent | 0b460c88bfc9e0a3108d0f7e625d8f3cd081815a (diff) | |
download | openbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.tar.gz openbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.tar.bz2 openbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.zip |
space between macro args and punctuation;
-rw-r--r-- | src/lib/libcrypto/man/X509_check_purpose.3 | 6 | ||||
-rw-r--r-- | src/lib/libssl/man/SSL_CTX_set_verify.3 | 20 |
2 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/man/X509_check_purpose.3 b/src/lib/libcrypto/man/X509_check_purpose.3 index b74ea50bef..8e98a62239 100644 --- a/src/lib/libcrypto/man/X509_check_purpose.3 +++ b/src/lib/libcrypto/man/X509_check_purpose.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_check_purpose.3,v 1.1 2019/08/22 15:15:35 schwarze Exp $ | 1 | .\" $OpenBSD: X509_check_purpose.3,v 1.2 2021/06/12 17:04:41 jmc Exp $ |
2 | .\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org> | 2 | .\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org> |
3 | .\" | 3 | .\" |
4 | .\" Permission to use, copy, modify, and distribute this software for any | 4 | .\" Permission to use, copy, modify, and distribute this software for any |
@@ -13,7 +13,7 @@ | |||
13 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 13 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
14 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 14 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
15 | .\" | 15 | .\" |
16 | .Dd $Mdocdate: August 22 2019 $ | 16 | .Dd $Mdocdate: June 12 2021 $ |
17 | .Dt X509_CHECK_PURPOSE 3 | 17 | .Dt X509_CHECK_PURPOSE 3 |
18 | .Os | 18 | .Os |
19 | .Sh NAME | 19 | .Sh NAME |
@@ -362,7 +362,7 @@ is non-zero, the following values can also be returned: | |||
362 | .Fa certificate | 362 | .Fa certificate |
363 | can be used as a CA for the | 363 | can be used as a CA for the |
364 | .Fa purpose . | 364 | .Fa purpose . |
365 | .It 3 Ta Success Ta The Fa certificate No is a version 1 CA. | 365 | .It 3 Ta Success Ta The Fa certificate No is a version 1 CA . |
366 | .It 4 Ta Success Ta The Key Usage allows Dv keyCertSign . | 366 | .It 4 Ta Success Ta The Key Usage allows Dv keyCertSign . |
367 | .It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA. | 367 | .It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA. |
368 | .El | 368 | .El |
diff --git a/src/lib/libssl/man/SSL_CTX_set_verify.3 b/src/lib/libssl/man/SSL_CTX_set_verify.3 index 5b137358ab..1ed86407e9 100644 --- a/src/lib/libssl/man/SSL_CTX_set_verify.3 +++ b/src/lib/libssl/man/SSL_CTX_set_verify.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: SSL_CTX_set_verify.3,v 1.8 2020/09/17 08:04:22 schwarze Exp $ | 1 | .\" $OpenBSD: SSL_CTX_set_verify.3,v 1.9 2021/06/12 16:59:53 jmc Exp $ |
2 | .\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
3 | .\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100 | 3 | .\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100 |
4 | .\" | 4 | .\" |
@@ -50,7 +50,7 @@ | |||
50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | .\" | 52 | .\" |
53 | .Dd $Mdocdate: September 17 2020 $ | 53 | .Dd $Mdocdate: June 12 2021 $ |
54 | .Dt SSL_CTX_SET_VERIFY 3 | 54 | .Dt SSL_CTX_SET_VERIFY 3 |
55 | .Os | 55 | .Os |
56 | .Sh NAME | 56 | .Sh NAME |
@@ -146,11 +146,11 @@ The verification of certificates can be controlled by a set of bitwise ORed | |||
146 | flags: | 146 | flags: |
147 | .Bl -tag -width Ds | 147 | .Bl -tag -width Ds |
148 | .It Dv SSL_VERIFY_NONE | 148 | .It Dv SSL_VERIFY_NONE |
149 | .Em Server mode: | 149 | .Em Server mode : |
150 | the server will not send a client certificate request to the client, | 150 | the server will not send a client certificate request to the client, |
151 | so the client will not send a certificate. | 151 | so the client will not send a certificate. |
152 | .Pp | 152 | .Pp |
153 | .Em Client mode: | 153 | .Em Client mode : |
154 | if not using an anonymous cipher (by default disabled), | 154 | if not using an anonymous cipher (by default disabled), |
155 | the server will send a certificate which will be checked. | 155 | the server will send a certificate which will be checked. |
156 | The result of the certificate verification process can be checked after the | 156 | The result of the certificate verification process can be checked after the |
@@ -159,7 +159,7 @@ TLS/SSL handshake using the | |||
159 | function. | 159 | function. |
160 | The handshake will be continued regardless of the verification result. | 160 | The handshake will be continued regardless of the verification result. |
161 | .It Dv SSL_VERIFY_PEER | 161 | .It Dv SSL_VERIFY_PEER |
162 | .Em Server mode: | 162 | .Em Server mode : |
163 | the server sends a client certificate request to the client. | 163 | the server sends a client certificate request to the client. |
164 | The certificate returned (if any) is checked. | 164 | The certificate returned (if any) is checked. |
165 | If the verification process fails, | 165 | If the verification process fails, |
@@ -171,7 +171,7 @@ and | |||
171 | .Dv SSL_VERIFY_CLIENT_ONCE | 171 | .Dv SSL_VERIFY_CLIENT_ONCE |
172 | flags. | 172 | flags. |
173 | .Pp | 173 | .Pp |
174 | .Em Client mode: | 174 | .Em Client mode : |
175 | the server certificate is verified. | 175 | the server certificate is verified. |
176 | If the verification process fails, | 176 | If the verification process fails, |
177 | the TLS/SSL handshake is immediately terminated with an alert message | 177 | the TLS/SSL handshake is immediately terminated with an alert message |
@@ -180,7 +180,7 @@ If no server certificate is sent, because an anonymous cipher is used, | |||
180 | .Dv SSL_VERIFY_PEER | 180 | .Dv SSL_VERIFY_PEER |
181 | is ignored. | 181 | is ignored. |
182 | .It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT | 182 | .It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
183 | .Em Server mode: | 183 | .Em Server mode : |
184 | if the client did not return a certificate, the TLS/SSL | 184 | if the client did not return a certificate, the TLS/SSL |
185 | handshake is immediately terminated with a | 185 | handshake is immediately terminated with a |
186 | .Dq handshake failure | 186 | .Dq handshake failure |
@@ -188,16 +188,16 @@ alert. | |||
188 | This flag must be used together with | 188 | This flag must be used together with |
189 | .Dv SSL_VERIFY_PEER . | 189 | .Dv SSL_VERIFY_PEER . |
190 | .Pp | 190 | .Pp |
191 | .Em Client mode: | 191 | .Em Client mode : |
192 | ignored | 192 | ignored |
193 | .It Dv SSL_VERIFY_CLIENT_ONCE | 193 | .It Dv SSL_VERIFY_CLIENT_ONCE |
194 | .Em Server mode: | 194 | .Em Server mode : |
195 | only request a client certificate on the initial TLS/SSL handshake. | 195 | only request a client certificate on the initial TLS/SSL handshake. |
196 | Do not ask for a client certificate again in case of a renegotiation. | 196 | Do not ask for a client certificate again in case of a renegotiation. |
197 | This flag must be used together with | 197 | This flag must be used together with |
198 | .Dv SSL_VERIFY_PEER . | 198 | .Dv SSL_VERIFY_PEER . |
199 | .Pp | 199 | .Pp |
200 | .Em Client mode: | 200 | .Em Client mode : |
201 | ignored | 201 | ignored |
202 | .El | 202 | .El |
203 | .Pp | 203 | .Pp |