summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
diff options
context:
space:
mode:
authorjim <>2014-05-04 21:46:36 +0000
committerjim <>2014-05-04 21:46:36 +0000
commitadc2a0a37a306f738da40a5a46f14e7fc9f1f571 (patch)
treea8892de8fd6e54fc93e929516a1ed1c754ef77fd /src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
parentc247b29180fe4c94ba872da4fd237eab43c0df48 (diff)
downloadopenbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.gz
openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.bz2
openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.zip
Remove trailing whitespace.
fine jmc@
Diffstat (limited to 'src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod')
-rw-r--r--src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod20
1 files changed, 10 insertions, 10 deletions
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
index 46cac2bea2..e5da5bec08 100644
--- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
+++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
@@ -2,7 +2,7 @@
2 2
3=head1 NAME 3=head1 NAME
4 4
5X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters 5X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters
6 6
7=head1 SYNOPSIS 7=head1 SYNOPSIS
8 8
@@ -20,7 +20,7 @@ X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_ge
20 20
21 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, 21 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param,
22 ASN1_OBJECT *policy); 22 ASN1_OBJECT *policy);
23 int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, 23 int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param,
24 STACK_OF(ASN1_OBJECT) *policies); 24 STACK_OF(ASN1_OBJECT) *policies);
25 25
26 void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); 26 void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth);
@@ -29,7 +29,7 @@ X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_ge
29=head1 DESCRIPTION 29=head1 DESCRIPTION
30 30
31These functions manipulate the B<X509_VERIFY_PARAM> structure associated with 31These functions manipulate the B<X509_VERIFY_PARAM> structure associated with
32a certificate verification operation. 32a certificate verification operation.
33 33
34The X509_VERIFY_PARAM_set_flags() function sets the flags in B<param> by oring 34The X509_VERIFY_PARAM_set_flags() function sets the flags in B<param> by oring
35it with B<flags>. See the B<VERIFICATION FLAGS> section for a complete 35it with B<flags>. See the B<VERIFICATION FLAGS> section for a complete
@@ -43,7 +43,7 @@ X509_VERIFY_PARAM_set_purpose() sets the verification purpose in B<param>
43to B<purpose>. This determines the acceptable purpose of the certificate 43to B<purpose>. This determines the acceptable purpose of the certificate
44chain, for example SSL client or SSL server. 44chain, for example SSL client or SSL server.
45 45
46X509_VERIFY_PARAM_set_trust() sets the trust setting in B<param> to 46X509_VERIFY_PARAM_set_trust() sets the trust setting in B<param> to
47B<trust>. 47B<trust>.
48 48
49X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to 49X509_VERIFY_PARAM_set_time() sets the verification time in B<param> to
@@ -63,10 +63,10 @@ chain.
63 63
64=head1 RETURN VALUES 64=head1 RETURN VALUES
65 65
66X509_VERIFY_PARAM_set_flags(), X509_VERIFY_PARAM_clear_flags(), 66X509_VERIFY_PARAM_set_flags(), X509_VERIFY_PARAM_clear_flags(),
67X509_VERIFY_PARAM_set_purpose(), X509_VERIFY_PARAM_set_trust(), 67X509_VERIFY_PARAM_set_purpose(), X509_VERIFY_PARAM_set_trust(),
68X509_VERIFY_PARAM_add0_policy() and X509_VERIFY_PARAM_set1_policies() return 1 68X509_VERIFY_PARAM_add0_policy() and X509_VERIFY_PARAM_set1_policies() return 1
69for success and 0 for failure. 69for success and 0 for failure.
70 70
71X509_VERIFY_PARAM_get_flags() returns the current verification flags. 71X509_VERIFY_PARAM_get_flags() returns the current verification flags.
72 72
@@ -81,7 +81,7 @@ The verification flags consists of zero or more of the following flags
81ored together. 81ored together.
82 82
83B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf 83B<X509_V_FLAG_CRL_CHECK> enables CRL checking for the certificate chain leaf
84certificate. An error occurs if a suitable CRL cannot be found. 84certificate. An error occurs if a suitable CRL cannot be found.
85 85
86B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate 86B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate
87chain. 87chain.
@@ -99,7 +99,7 @@ certificates and makes the verification strictly apply B<X509> rules.
99B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. 99B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification.
100 100
101B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default 101B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default
102no policy checking is peformed. Additional information is sent to the 102no policy checking is peformed. Additional information is sent to the
103verification callback relating to policy checking. 103verification callback relating to policy checking.
104 104
105B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and 105B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and
@@ -142,7 +142,7 @@ X509_STORE_CTX_set_flags().
142=head1 BUGS 142=head1 BUGS
143 143
144Delta CRL checking is currently primitive. Only a single delta can be used and 144Delta CRL checking is currently primitive. Only a single delta can be used and
145(partly due to limitations of B<X509_STORE>) constructed CRLs are not 145(partly due to limitations of B<X509_STORE>) constructed CRLs are not
146maintained. 146maintained.
147 147
148If CRLs checking is enable CRLs are expected to be available in the 148If CRLs checking is enable CRLs are expected to be available in the
@@ -151,7 +151,7 @@ CRLs from the CRL distribution points extension.
151 151
152=head1 EXAMPLE 152=head1 EXAMPLE
153 153
154Enable CRL checking when performing certificate verification during SSL 154Enable CRL checking when performing certificate verification during SSL
155connections associated with an B<SSL_CTX> structure B<ctx>: 155connections associated with an B<SSL_CTX> structure B<ctx>:
156 156
157 X509_VERIFY_PARAM *param; 157 X509_VERIFY_PARAM *param;