diff options
author | jim <> | 2014-05-04 21:46:36 +0000 |
---|---|---|
committer | jim <> | 2014-05-04 21:46:36 +0000 |
commit | adc2a0a37a306f738da40a5a46f14e7fc9f1f571 (patch) | |
tree | a8892de8fd6e54fc93e929516a1ed1c754ef77fd /src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |
parent | c247b29180fe4c94ba872da4fd237eab43c0df48 (diff) | |
download | openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.gz openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.bz2 openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.zip |
Remove trailing whitespace.
fine jmc@
Diffstat (limited to 'src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod')
-rw-r--r-- | src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod index 46cac2bea2..e5da5bec08 100644 --- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |||
@@ -2,7 +2,7 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters | 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters |
6 | 6 | ||
7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS |
8 | 8 | ||
@@ -20,7 +20,7 @@ X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_ge | |||
20 | 20 | ||
21 | int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, | 21 | int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, |
22 | ASN1_OBJECT *policy); | 22 | ASN1_OBJECT *policy); |
23 | int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | 23 | int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
24 | STACK_OF(ASN1_OBJECT) *policies); | 24 | STACK_OF(ASN1_OBJECT) *policies); |
25 | 25 | ||
26 | void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); | 26 | void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); |
@@ -29,7 +29,7 @@ X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_ge | |||
29 | =head1 DESCRIPTION | 29 | =head1 DESCRIPTION |
30 | 30 | ||
31 | These functions manipulate the B<X509_VERIFY_PARAM> structure associated with | 31 | These functions manipulate the B<X509_VERIFY_PARAM> structure associated with |
32 | a certificate verification operation. | 32 | a certificate verification operation. |
33 | 33 | ||
34 | The X509_VERIFY_PARAM_set_flags() function sets the flags in B<param> by oring | 34 | The X509_VERIFY_PARAM_set_flags() function sets the flags in B<param> by oring |
35 | it with B<flags>. See the B<VERIFICATION FLAGS> section for a complete | 35 | it with B<flags>. See the B<VERIFICATION FLAGS> section for a complete |
@@ -43,7 +43,7 @@ X509_VERIFY_PARAM_set_purpose() sets the verification purpose in B<param> | |||
43 | to B<purpose>. This determines the acceptable purpose of the certificate | 43 | to B<purpose>. This determines the acceptable purpose of the certificate |
44 | chain, for example SSL client or SSL server. | 44 | chain, for example SSL client or SSL server. |
45 | 45 | ||
46 | X509_VERIFY_PARAM_set_trust() sets the trust setting in B<param> to | 46 | X509_VERIFY_PARAM_set_trust() sets the trust setting in B<param> to |
47 | B<trust>. | 47 | B<trust>. |
48 | 48 | ||
49 | X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to | 49 | X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to |
@@ -63,10 +63,10 @@ chain. | |||
63 | 63 | ||
64 | =head1 RETURN VALUES | 64 | =head1 RETURN VALUES |
65 | 65 | ||
66 | X509_VERIFY_PARAM_set_flags(), X509_VERIFY_PARAM_clear_flags(), | 66 | X509_VERIFY_PARAM_set_flags(), X509_VERIFY_PARAM_clear_flags(), |
67 | X509_VERIFY_PARAM_set_purpose(), X509_VERIFY_PARAM_set_trust(), | 67 | X509_VERIFY_PARAM_set_purpose(), X509_VERIFY_PARAM_set_trust(), |
68 | X509_VERIFY_PARAM_add0_policy() and X509_VERIFY_PARAM_set1_policies() return 1 | 68 | X509_VERIFY_PARAM_add0_policy() and X509_VERIFY_PARAM_set1_policies() return 1 |
69 | for success and 0 for failure. | 69 | for success and 0 for failure. |
70 | 70 | ||
71 | X509_VERIFY_PARAM_get_flags() returns the current verification flags. | 71 | X509_VERIFY_PARAM_get_flags() returns the current verification flags. |
72 | 72 | ||
@@ -81,7 +81,7 @@ The verification flags consists of zero or more of the following flags | |||
81 | ored together. | 81 | ored together. |
82 | 82 | ||
83 | B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf | 83 | B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf |
84 | certificate. An error occurs if a suitable CRL cannot be found. | 84 | certificate. An error occurs if a suitable CRL cannot be found. |
85 | 85 | ||
86 | B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate | 86 | B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate |
87 | chain. | 87 | chain. |
@@ -99,7 +99,7 @@ certificates and makes the verification strictly apply B<X509> rules. | |||
99 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. | 99 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. |
100 | 100 | ||
101 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default | 101 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default |
102 | no policy checking is peformed. Additional information is sent to the | 102 | no policy checking is peformed. Additional information is sent to the |
103 | verification callback relating to policy checking. | 103 | verification callback relating to policy checking. |
104 | 104 | ||
105 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and | 105 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and |
@@ -142,7 +142,7 @@ X509_STORE_CTX_set_flags(). | |||
142 | =head1 BUGS | 142 | =head1 BUGS |
143 | 143 | ||
144 | Delta CRL checking is currently primitive. Only a single delta can be used and | 144 | Delta CRL checking is currently primitive. Only a single delta can be used and |
145 | (partly due to limitations of B<X509_STORE>) constructed CRLs are not | 145 | (partly due to limitations of B<X509_STORE>) constructed CRLs are not |
146 | maintained. | 146 | maintained. |
147 | 147 | ||
148 | If CRLs checking is enable CRLs are expected to be available in the | 148 | If CRLs checking is enable CRLs are expected to be available in the |
@@ -151,7 +151,7 @@ CRLs from the CRL distribution points extension. | |||
151 | 151 | ||
152 | =head1 EXAMPLE | 152 | =head1 EXAMPLE |
153 | 153 | ||
154 | Enable CRL checking when performing certificate verification during SSL | 154 | Enable CRL checking when performing certificate verification during SSL |
155 | connections associated with an B<SSL_CTX> structure B<ctx>: | 155 | connections associated with an B<SSL_CTX> structure B<ctx>: |
156 | 156 | ||
157 | X509_VERIFY_PARAM *param; | 157 | X509_VERIFY_PARAM *param; |