diff options
| author | schwarze <> | 2019-06-14 13:59:32 +0000 |
|---|---|---|
| committer | schwarze <> | 2019-06-14 13:59:32 +0000 |
| commit | cff95e5bdef5339a84855d7ce45dab9e7c3b196d (patch) | |
| tree | aeff19eacb059a018b39fa7c9e2ecbdd6a89ce7f /src/lib/libcrypto/man/PKCS12_newpass.3 | |
| parent | d342104b3f35ddd0a6581d33f40a3e26852d29d3 (diff) | |
| download | openbsd-cff95e5bdef5339a84855d7ce45dab9e7c3b196d.tar.gz openbsd-cff95e5bdef5339a84855d7ce45dab9e7c3b196d.tar.bz2 openbsd-cff95e5bdef5339a84855d7ce45dab9e7c3b196d.zip | |
Improve pages that briefly mentioned ERR - usually below SEE ALSO -
but failed to provide any real information.
OK tb@ jmc@
Diffstat (limited to 'src/lib/libcrypto/man/PKCS12_newpass.3')
| -rw-r--r-- | src/lib/libcrypto/man/PKCS12_newpass.3 | 13 |
1 files changed, 4 insertions, 9 deletions
diff --git a/src/lib/libcrypto/man/PKCS12_newpass.3 b/src/lib/libcrypto/man/PKCS12_newpass.3 index b8e56124eb..b5642c96ea 100644 --- a/src/lib/libcrypto/man/PKCS12_newpass.3 +++ b/src/lib/libcrypto/man/PKCS12_newpass.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKCS12_newpass.3,v 1.3 2019/06/06 01:06:58 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_newpass.3,v 1.4 2019/06/14 13:59:32 schwarze Exp $ |
| 2 | .\" OpenSSL c95a8b4e May 5 14:26:26 2016 +0100 | 2 | .\" OpenSSL c95a8b4e May 5 14:26:26 2016 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Jeffrey Walton <noloader@gmail.com>. | 4 | .\" This file was written by Jeffrey Walton <noloader@gmail.com>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: June 6 2019 $ | 51 | .Dd $Mdocdate: June 14 2019 $ |
| 52 | .Dt PKCS12_NEWPASS 3 | 52 | .Dt PKCS12_NEWPASS 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -92,12 +92,8 @@ the function will fail with a MAC verification error. | |||
| 92 | In rare cases, the PKCS#12 structure does not contain a MAC: | 92 | In rare cases, the PKCS#12 structure does not contain a MAC: |
| 93 | in this case it will usually fail with a decryption padding error. | 93 | in this case it will usually fail with a decryption padding error. |
| 94 | .Sh RETURN VALUES | 94 | .Sh RETURN VALUES |
| 95 | .Fn PKCS12_newpass | 95 | Upon successful completion, 1 is returned; |
| 96 | returns 1 on success or 0 on failure. | 96 | otherwise 0 is returned and an error code can be retrieved with |
| 97 | .Pp | ||
| 98 | Applications can retrieve the most recent error from | ||
| 99 | .Fn PKCS12_newpass | ||
| 100 | with | ||
| 101 | .Xr ERR_get_error 3 . | 97 | .Xr ERR_get_error 3 . |
| 102 | .Sh EXAMPLES | 98 | .Sh EXAMPLES |
| 103 | This example loads a PKCS#12 file, changes its password, | 99 | This example loads a PKCS#12 file, changes its password, |
| @@ -147,7 +143,6 @@ int main(int argc, char **argv) | |||
| 147 | } | 143 | } |
| 148 | .Ed | 144 | .Ed |
| 149 | .Sh SEE ALSO | 145 | .Sh SEE ALSO |
| 150 | .Xr ERR_get_error 3 , | ||
| 151 | .Xr PKCS12_create 3 , | 146 | .Xr PKCS12_create 3 , |
| 152 | .Xr PKCS12_new 3 | 147 | .Xr PKCS12_new 3 |
| 153 | .Sh HISTORY | 148 | .Sh HISTORY |
