diff options
author | schwarze <> | 2016-12-23 17:41:29 +0000 |
---|---|---|
committer | schwarze <> | 2016-12-23 17:41:29 +0000 |
commit | 6f08751e5891d92bd46f6a3e3985cc414a7326cb (patch) | |
tree | 505904361395693d948d573e47c27538053c2af9 /src/lib | |
parent | bb637e97b251f6a6f057ccc3095a4ba9581ac8d9 (diff) | |
download | openbsd-6f08751e5891d92bd46f6a3e3985cc414a7326cb.tar.gz openbsd-6f08751e5891d92bd46f6a3e3985cc414a7326cb.tar.bz2 openbsd-6f08751e5891d92bd46f6a3e3985cc414a7326cb.zip |
Write new NAME_CONSTRAINTS_new(3) manual page from scratch.
These functions are listed in <openssl/x509v3.h>
and in OpenSSL doc/man3/X509_dup.pod.
OpenSSL documentation specifies the wrong header file.
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/man/Makefile | 3 | ||||
-rw-r--r-- | src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | 87 |
2 files changed, 89 insertions, 1 deletions
diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile index 0aed9e0fad..e715e8bf2d 100644 --- a/src/lib/libcrypto/man/Makefile +++ b/src/lib/libcrypto/man/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.93 2016/12/23 17:02:41 schwarze Exp $ | 1 | # $OpenBSD: Makefile,v 1.94 2016/12/23 17:41:29 schwarze Exp $ |
2 | 2 | ||
3 | .include <bsd.own.mk> | 3 | .include <bsd.own.mk> |
4 | 4 | ||
@@ -126,6 +126,7 @@ MAN= \ | |||
126 | GENERAL_NAME_new.3 \ | 126 | GENERAL_NAME_new.3 \ |
127 | HMAC.3 \ | 127 | HMAC.3 \ |
128 | MD5.3 \ | 128 | MD5.3 \ |
129 | NAME_CONSTRAINTS_new.3 \ | ||
129 | OBJ_nid2obj.3 \ | 130 | OBJ_nid2obj.3 \ |
130 | OCSP_CRLID_new.3 \ | 131 | OCSP_CRLID_new.3 \ |
131 | OCSP_REQUEST_new.3 \ | 132 | OCSP_REQUEST_new.3 \ |
diff --git a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 new file mode 100644 index 0000000000..1105bead0b --- /dev/null +++ b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | |||
@@ -0,0 +1,87 @@ | |||
1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $ | ||
2 | .\" | ||
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | ||
4 | .\" | ||
5 | .\" Permission to use, copy, modify, and distribute this software for any | ||
6 | .\" purpose with or without fee is hereby granted, provided that the above | ||
7 | .\" copyright notice and this permission notice appear in all copies. | ||
8 | .\" | ||
9 | .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | .\" | ||
17 | .Dd $Mdocdate: December 23 2016 $ | ||
18 | .Dt NAME_CONSTRAINTS_NEW 3 | ||
19 | .Os | ||
20 | .Sh NAME | ||
21 | .Nm NAME_CONSTRAINTS_new , | ||
22 | .Nm NAME_CONSTRAINTS_free , | ||
23 | .Nm GENERAL_SUBTREE_new , | ||
24 | .Nm GENERAL_SUBTREE_free | ||
25 | .Nd X.509 CA name constraints extension | ||
26 | .Sh SYNOPSIS | ||
27 | .In openssl/x509v3.h | ||
28 | .Ft NAME_CONSTRAINTS * | ||
29 | .Fn NAME_CONSTRAINTS_new void | ||
30 | .Ft void | ||
31 | .Fn NAME_CONSTRAINTS_free "NAME_CONSTRAINTS *names" | ||
32 | .Ft GENERAL_SUBTREE * | ||
33 | .Fn GENERAL_SUBTREE_new void | ||
34 | .Ft void | ||
35 | .Fn GENERAL_SUBTREE_free "GENERAL_SUBTREE *name" | ||
36 | .Sh DESCRIPTION | ||
37 | X.509 CA certificates can use the name constraints extension | ||
38 | to restrict the subject names of subsequent certificates in a | ||
39 | certification path. | ||
40 | .Pp | ||
41 | .Fn NAME_CONSTRAINTS_new | ||
42 | allocates and initializes an empty | ||
43 | .Vt NAME_CONSTRAINTS | ||
44 | object, representing an ASN.1 NameConstraints structure | ||
45 | defined in RFC 5280 section 4.2.1.10. | ||
46 | It consists of two | ||
47 | .Vt STACK_OF(GENERAL_SUBTREE) | ||
48 | objects, one specifying permitted names, the other excluded names. | ||
49 | .Fn NAME_CONSTRAINTS_free | ||
50 | frees | ||
51 | .Fa names . | ||
52 | .Pp | ||
53 | .Fn GENERAL_SUBTREE_new | ||
54 | allocates and initializes an empty | ||
55 | .Vt GENERAL_SUBTREE | ||
56 | object, representing an ASN.1 GeneralSubtree structure | ||
57 | defined in RFC 5280 section 4.2.1.10. | ||
58 | It is a trivial wrapper around the | ||
59 | .Vt GENERAL_NAME | ||
60 | object documented in | ||
61 | .Xr GENERAL_NAME_new 3 . | ||
62 | The standard requires the other fields of | ||
63 | .Vt GENERAL_SUBTREE | ||
64 | to be ignored. | ||
65 | .Fn GENERAL_SUBTREE_free | ||
66 | frees | ||
67 | .Fa name . | ||
68 | .Sh RETURN VALUES | ||
69 | .Fn NAME_CONSTRAINTS_new | ||
70 | and | ||
71 | .Fn GENERAL_SUBTREE_new | ||
72 | return the new | ||
73 | .Vt NAME_CONSTRAINTS | ||
74 | or | ||
75 | .Vt GENERAL_SUBTREE | ||
76 | object, respectively, or | ||
77 | .Dv NULL | ||
78 | if an error occurs. | ||
79 | .Sh SEE ALSO | ||
80 | .Xr BASIC_CONSTRAINTS_new 3 , | ||
81 | .Xr GENERAL_NAMES_new 3 , | ||
82 | .Xr X509_EXTENSION_new 3 , | ||
83 | .Xr X509_new 3 | ||
84 | .Sh STANDARDS | ||
85 | RFC 5280: Internet X.509 Public Key Infrastructure Certificate and | ||
86 | Certificate Revocation List (CRL) Profile, | ||
87 | section 4.2.1.10: Name Constraints | ||