summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjmc <>2021-06-12 17:04:41 +0000
committerjmc <>2021-06-12 17:04:41 +0000
commitdd7ab33558af2512e14a4aa8fbb164c785e2d754 (patch)
tree442f88900f01383a92b178bcc9c4581f6274ecff
parent0b460c88bfc9e0a3108d0f7e625d8f3cd081815a (diff)
downloadopenbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.tar.gz
openbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.tar.bz2
openbsd-dd7ab33558af2512e14a4aa8fbb164c785e2d754.zip
space between macro args and punctuation;
-rw-r--r--src/lib/libcrypto/man/X509_check_purpose.36
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_verify.320
2 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/man/X509_check_purpose.3 b/src/lib/libcrypto/man/X509_check_purpose.3
index b74ea50bef..8e98a62239 100644
--- a/src/lib/libcrypto/man/X509_check_purpose.3
+++ b/src/lib/libcrypto/man/X509_check_purpose.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: X509_check_purpose.3,v 1.1 2019/08/22 15:15:35 schwarze Exp $ 1.\" $OpenBSD: X509_check_purpose.3,v 1.2 2021/06/12 17:04:41 jmc Exp $
2.\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org> 2.\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org>
3.\" 3.\"
4.\" Permission to use, copy, modify, and distribute this software for any 4.\" Permission to use, copy, modify, and distribute this software for any
@@ -13,7 +13,7 @@
13.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 13.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 14.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15.\" 15.\"
16.Dd $Mdocdate: August 22 2019 $ 16.Dd $Mdocdate: June 12 2021 $
17.Dt X509_CHECK_PURPOSE 3 17.Dt X509_CHECK_PURPOSE 3
18.Os 18.Os
19.Sh NAME 19.Sh NAME
@@ -362,7 +362,7 @@ is non-zero, the following values can also be returned:
362.Fa certificate 362.Fa certificate
363can be used as a CA for the 363can be used as a CA for the
364.Fa purpose . 364.Fa purpose .
365.It 3 Ta Success Ta The Fa certificate No is a version 1 CA. 365.It 3 Ta Success Ta The Fa certificate No is a version 1 CA .
366.It 4 Ta Success Ta The Key Usage allows Dv keyCertSign . 366.It 4 Ta Success Ta The Key Usage allows Dv keyCertSign .
367.It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA. 367.It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA.
368.El 368.El
diff --git a/src/lib/libssl/man/SSL_CTX_set_verify.3 b/src/lib/libssl/man/SSL_CTX_set_verify.3
index 5b137358ab..1ed86407e9 100644
--- a/src/lib/libssl/man/SSL_CTX_set_verify.3
+++ b/src/lib/libssl/man/SSL_CTX_set_verify.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: SSL_CTX_set_verify.3,v 1.8 2020/09/17 08:04:22 schwarze Exp $ 1.\" $OpenBSD: SSL_CTX_set_verify.3,v 1.9 2021/06/12 16:59:53 jmc Exp $
2.\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 2.\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400
3.\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100 3.\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100
4.\" 4.\"
@@ -50,7 +50,7 @@
50.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51.\" OF THE POSSIBILITY OF SUCH DAMAGE. 51.\" OF THE POSSIBILITY OF SUCH DAMAGE.
52.\" 52.\"
53.Dd $Mdocdate: September 17 2020 $ 53.Dd $Mdocdate: June 12 2021 $
54.Dt SSL_CTX_SET_VERIFY 3 54.Dt SSL_CTX_SET_VERIFY 3
55.Os 55.Os
56.Sh NAME 56.Sh NAME
@@ -146,11 +146,11 @@ The verification of certificates can be controlled by a set of bitwise ORed
146flags: 146flags:
147.Bl -tag -width Ds 147.Bl -tag -width Ds
148.It Dv SSL_VERIFY_NONE 148.It Dv SSL_VERIFY_NONE
149.Em Server mode: 149.Em Server mode :
150the server will not send a client certificate request to the client, 150the server will not send a client certificate request to the client,
151so the client will not send a certificate. 151so the client will not send a certificate.
152.Pp 152.Pp
153.Em Client mode: 153.Em Client mode :
154if not using an anonymous cipher (by default disabled), 154if not using an anonymous cipher (by default disabled),
155the server will send a certificate which will be checked. 155the server will send a certificate which will be checked.
156The result of the certificate verification process can be checked after the 156The result of the certificate verification process can be checked after the
@@ -159,7 +159,7 @@ TLS/SSL handshake using the
159function. 159function.
160The handshake will be continued regardless of the verification result. 160The handshake will be continued regardless of the verification result.
161.It Dv SSL_VERIFY_PEER 161.It Dv SSL_VERIFY_PEER
162.Em Server mode: 162.Em Server mode :
163the server sends a client certificate request to the client. 163the server sends a client certificate request to the client.
164The certificate returned (if any) is checked. 164The certificate returned (if any) is checked.
165If the verification process fails, 165If the verification process fails,
@@ -171,7 +171,7 @@ and
171.Dv SSL_VERIFY_CLIENT_ONCE 171.Dv SSL_VERIFY_CLIENT_ONCE
172flags. 172flags.
173.Pp 173.Pp
174.Em Client mode: 174.Em Client mode :
175the server certificate is verified. 175the server certificate is verified.
176If the verification process fails, 176If the verification process fails,
177the TLS/SSL handshake is immediately terminated with an alert message 177the TLS/SSL handshake is immediately terminated with an alert message
@@ -180,7 +180,7 @@ If no server certificate is sent, because an anonymous cipher is used,
180.Dv SSL_VERIFY_PEER 180.Dv SSL_VERIFY_PEER
181is ignored. 181is ignored.
182.It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT 182.It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT
183.Em Server mode: 183.Em Server mode :
184if the client did not return a certificate, the TLS/SSL 184if the client did not return a certificate, the TLS/SSL
185handshake is immediately terminated with a 185handshake is immediately terminated with a
186.Dq handshake failure 186.Dq handshake failure
@@ -188,16 +188,16 @@ alert.
188This flag must be used together with 188This flag must be used together with
189.Dv SSL_VERIFY_PEER . 189.Dv SSL_VERIFY_PEER .
190.Pp 190.Pp
191.Em Client mode: 191.Em Client mode :
192ignored 192ignored
193.It Dv SSL_VERIFY_CLIENT_ONCE 193.It Dv SSL_VERIFY_CLIENT_ONCE
194.Em Server mode: 194.Em Server mode :
195only request a client certificate on the initial TLS/SSL handshake. 195only request a client certificate on the initial TLS/SSL handshake.
196Do not ask for a client certificate again in case of a renegotiation. 196Do not ask for a client certificate again in case of a renegotiation.
197This flag must be used together with 197This flag must be used together with
198.Dv SSL_VERIFY_PEER . 198.Dv SSL_VERIFY_PEER .
199.Pp 199.Pp
200.Em Client mode: 200.Em Client mode :
201ignored 201ignored
202.El 202.El
203.Pp 203.Pp