diff options
author | schwarze <> | 2016-12-25 22:15:10 +0000 |
---|---|---|
committer | schwarze <> | 2016-12-25 22:15:10 +0000 |
commit | 899a1058abcbe6fe59592ed5d46cc4b55cf12326 (patch) | |
tree | 90a8fcb1d550495e918efcdbf187d897e1c021f7 /src/lib | |
parent | 5667f2b73d8867280a0e2b3dd1d8068478634723 (diff) | |
download | openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.tar.gz openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.tar.bz2 openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.zip |
Consistently mark up various ASN.1 type names defined in standards
related to X.509 with .Vt such that they can be searched for.
Diffstat (limited to 'src/lib')
48 files changed, 481 insertions, 315 deletions
diff --git a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 index 18e50e24c0..8a829a5e2d 100644 --- a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 +++ b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.1 2016/12/23 22:21:40 schwarze Exp $ | 1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt ACCESS_DESCRIPTION_NEW 3 | 18 | .Dt ACCESS_DESCRIPTION_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -42,8 +42,9 @@ policy data. | |||
42 | .Fn ACCESS_DESCRIPTION_new | 42 | .Fn ACCESS_DESCRIPTION_new |
43 | allocates and initializes an empty | 43 | allocates and initializes an empty |
44 | .Vt ACCESS_DESCRIPTION | 44 | .Vt ACCESS_DESCRIPTION |
45 | object, representing an ASN.1 AccessDescription structure | 45 | object, representing an ASN.1 |
46 | defined in RFC 5280 section 4.2.2.1. | 46 | .Vt AccessDescription |
47 | structure defined in RFC 5280 section 4.2.2.1. | ||
47 | It can hold a pointer to a | 48 | It can hold a pointer to a |
48 | .Vt GENERAL_NAME | 49 | .Vt GENERAL_NAME |
49 | object documented in | 50 | object documented in |
@@ -90,8 +91,9 @@ allocates and initializes an empty | |||
90 | .Vt AUTHORITY_INFO_ACCESS | 91 | .Vt AUTHORITY_INFO_ACCESS |
91 | object, which is a | 92 | object, which is a |
92 | .Vt STACK_OF(ACCESS_DESCRIPTION) | 93 | .Vt STACK_OF(ACCESS_DESCRIPTION) |
93 | and represents an ASN.1 AuthorityInfoAccessSyntax structure | 94 | and represents an ASN.1 |
94 | defined in RFC 5280 section 4.2.2.1. | 95 | .Vt AuthorityInfoAccessSyntax |
96 | structure defined in RFC 5280 section 4.2.2.1. | ||
95 | If can be used for the authority information access extension of | 97 | If can be used for the authority information access extension of |
96 | certificates and certificate revocation lists and for the subject | 98 | certificates and certificate revocation lists and for the subject |
97 | information access extension of certificates. | 99 | information access extension of certificates. |
diff --git a/src/lib/libcrypto/man/ASN1_STRING_length.3 b/src/lib/libcrypto/man/ASN1_STRING_length.3 index f43d61819f..2c797481d7 100644 --- a/src/lib/libcrypto/man/ASN1_STRING_length.3 +++ b/src/lib/libcrypto/man/ASN1_STRING_length.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.5 2016/11/10 11:44:52 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 10 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt ASN1_STRING_LENGTH 3 | 53 | .Dt ASN1_STRING_LENGTH 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -182,12 +182,11 @@ and the functions call the | |||
182 | .Vt ASN1_STRING | 182 | .Vt ASN1_STRING |
183 | equivalents. | 183 | equivalents. |
184 | .Vt ASN1_STRING | 184 | .Vt ASN1_STRING |
185 | is also used for some | 185 | is also used for some CHOICE types which consist entirely of primitive |
186 | .Sy CHOICE | 186 | string types such as |
187 | types which consist entirely of primitive string types such as | 187 | .Vt DirectoryString |
188 | .Sy DirectoryString | ||
189 | and | 188 | and |
190 | .Sy Time . | 189 | .Vt Time . |
191 | .Pp | 190 | .Pp |
192 | These functions should | 191 | These functions should |
193 | .Em not | 192 | .Em not |
@@ -195,19 +194,20 @@ be used to examine or modify | |||
195 | .Vt ASN1_INTEGER | 194 | .Vt ASN1_INTEGER |
196 | or | 195 | or |
197 | .Vt ASN1_ENUMERATED | 196 | .Vt ASN1_ENUMERATED |
198 | types: the relevant | 197 | types: the relevant INTEGER or ENUMERATED utility functions should |
199 | .Sy INTEGER | 198 | be used instead. |
200 | or | ||
201 | .Sy ENUMERATED | ||
202 | utility functions should be used instead. | ||
203 | .Pp | 199 | .Pp |
204 | In general it cannot be assumed that the data returned by | 200 | In general it cannot be assumed that the data returned by |
205 | .Fn ASN1_STRING_data | 201 | .Fn ASN1_STRING_data |
206 | is NUL terminated, and it may contain embedded NUL characters. | 202 | is NUL terminated, and it may contain embedded NUL characters. |
207 | The actual format of the data will depend on the actual string type itself: | 203 | The actual format of the data will depend on the actual string type itself: |
208 | for example for an IA5String the data will be ASCII, | 204 | for example for an |
209 | for a BMPString two bytes per character in big endian format, | 205 | .Vt IA5String |
210 | UTF8String will be in UTF8 format. | 206 | the data will be ASCII, for a |
207 | .Vt BMPString | ||
208 | two bytes per character in big endian format, and a | ||
209 | .Vt UTF8String | ||
210 | will be in UTF8 format. | ||
211 | .Pp | 211 | .Pp |
212 | Similar care should be take to ensure the data is in the correct format | 212 | Similar care should be take to ensure the data is in the correct format |
213 | when calling | 213 | when calling |
diff --git a/src/lib/libcrypto/man/ASN1_generate_nconf.3 b/src/lib/libcrypto/man/ASN1_generate_nconf.3 index bcf55d724b..5e1ba0a817 100644 --- a/src/lib/libcrypto/man/ASN1_generate_nconf.3 +++ b/src/lib/libcrypto/man/ASN1_generate_nconf.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.8 2016/12/11 18:06:09 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.9 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 | 2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 11 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt ASN1_GENERATE_NCONF 3 | 53 | .Dt ASN1_GENERATE_NCONF 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -285,15 +285,20 @@ if an error occurred. | |||
285 | The error codes can be obtained by | 285 | The error codes can be obtained by |
286 | .Xr ERR_get_error 3 . | 286 | .Xr ERR_get_error 3 . |
287 | .Sh EXAMPLES | 287 | .Sh EXAMPLES |
288 | A simple IA5String: | 288 | A simple |
289 | .Vt IA5String : | ||
289 | .Pp | 290 | .Pp |
290 | .Dl IA5STRING:Hello World | 291 | .Dl IA5STRING:Hello World |
291 | .Pp | 292 | .Pp |
292 | An IA5String explicitly tagged: | 293 | An |
294 | .Vt IA5String | ||
295 | explicitly tagged: | ||
293 | .Pp | 296 | .Pp |
294 | .Dl EXPLICIT:0,IA5STRING:Hello World | 297 | .Dl EXPLICIT:0,IA5STRING:Hello World |
295 | .Pp | 298 | .Pp |
296 | An IA5String explicitly tagged using APPLICATION tagging: | 299 | An |
300 | .Vt IA5String | ||
301 | explicitly tagged using APPLICATION tagging: | ||
297 | .Pp | 302 | .Pp |
298 | .Dl EXPLICIT:0A,IA5STRING:Hello World | 303 | .Dl EXPLICIT:0A,IA5STRING:Hello World |
299 | .Pp | 304 | .Pp |
@@ -302,7 +307,8 @@ A BITSTRING with bits 1 and 5 set and all others zero: | |||
302 | .Dl FORMAT:BITLIST,BITSTRING:1,5 | 307 | .Dl FORMAT:BITLIST,BITSTRING:1,5 |
303 | .Pp | 308 | .Pp |
304 | A more complex example using a config file to produce a | 309 | A more complex example using a config file to produce a |
305 | SEQUENCE consisting of a BOOL an OID and a UTF8String: | 310 | SEQUENCE consisting of a BOOL an OID and a |
311 | .Vt UTF8String : | ||
306 | .Bd -literal -offset indent | 312 | .Bd -literal -offset indent |
307 | asn1 = SEQUENCE:seq_section | 313 | asn1 = SEQUENCE:seq_section |
308 | 314 | ||
@@ -313,7 +319,9 @@ field2 = OID:commonName | |||
313 | field3 = UTF8:Third field | 319 | field3 = UTF8:Third field |
314 | .Ed | 320 | .Ed |
315 | .Pp | 321 | .Pp |
316 | This example produces an RSAPrivateKey structure. | 322 | This example produces an |
323 | .Vt RSAPrivateKey | ||
324 | structure. | ||
317 | This is the key contained in the file | 325 | This is the key contained in the file |
318 | .Pa client.pem | 326 | .Pa client.pem |
319 | in all OpenSSL distributions. | 327 | in all OpenSSL distributions. |
@@ -349,7 +357,8 @@ coeff=INTEGER:0x30B9E4F2AFA5AC679F920FC83F1F2DF1BAF1779CF989447FABC2F5\e | |||
349 | 628657053A | 357 | 628657053A |
350 | .Ed | 358 | .Ed |
351 | .Pp | 359 | .Pp |
352 | This example is the corresponding public key in a SubjectPublicKeyInfo | 360 | This example is the corresponding public key in an ASN.1 |
361 | .Vt SubjectPublicKeyInfo | ||
353 | structure: | 362 | structure: |
354 | .Bd -literal -offset 2n | 363 | .Bd -literal -offset 2n |
355 | # Start with a SEQUENCE | 364 | # Start with a SEQUENCE |
diff --git a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 index 5186fea0f3..94d6e14abb 100644 --- a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 +++ b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.1 2016/12/23 14:37:08 schwarze Exp $ | 1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt AUTHORITY_KEYID_NEW 3 | 18 | .Dt AUTHORITY_KEYID_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -35,8 +35,9 @@ for signing it. | |||
35 | .Fn AUTHORITY_KEYID_new | 35 | .Fn AUTHORITY_KEYID_new |
36 | allocates and initializes an empty | 36 | allocates and initializes an empty |
37 | .Vt AUTHORITY_KEYID | 37 | .Vt AUTHORITY_KEYID |
38 | object, representing an ASN.1 AuthorityKeyIdentifier structure | 38 | object, representing an ASN.1 |
39 | defined in RFC 5280 section 4.2.1.1. | 39 | .Vt AuthorityKeyIdentifier |
40 | structure defined in RFC 5280 section 4.2.1.1. | ||
40 | It can hold an issuer name, a serial number, and a key identifier. | 41 | It can hold an issuer name, a serial number, and a key identifier. |
41 | .Pp | 42 | .Pp |
42 | .Fn AUTHORITY_KEYID_free | 43 | .Fn AUTHORITY_KEYID_free |
diff --git a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 index 1293be0050..c133bb1c35 100644 --- a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:02:41 schwarze Exp $ | 1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt BASIC_CONSTRAINTS_NEW 3 | 18 | .Dt BASIC_CONSTRAINTS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn BASIC_CONSTRAINTS_new | 31 | .Fn BASIC_CONSTRAINTS_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt BASIC_CONSTRAINTS | 33 | .Vt BASIC_CONSTRAINTS |
34 | object, representing an ASN.1 BasicConstraints structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 5280 section 4.2.1.9. | 35 | .Vt BasicConstraints |
36 | structure defined in RFC 5280 section 4.2.1.9. | ||
36 | .Pp | 37 | .Pp |
37 | This object contains two fields. | 38 | This object contains two fields. |
38 | The field | 39 | The field |
diff --git a/src/lib/libcrypto/man/DIST_POINT_new.3 b/src/lib/libcrypto/man/DIST_POINT_new.3 index 8498e5a7d0..bbd4855e11 100644 --- a/src/lib/libcrypto/man/DIST_POINT_new.3 +++ b/src/lib/libcrypto/man/DIST_POINT_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.1 2016/12/23 15:25:19 schwarze Exp $ | 1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt DIST_POINT_NEW 3 | 18 | .Dt DIST_POINT_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -52,8 +52,9 @@ where to obtain certificate revocation lists that might later revoke it. | |||
52 | .Fn DIST_POINT_new | 52 | .Fn DIST_POINT_new |
53 | allocates and initializes an empty | 53 | allocates and initializes an empty |
54 | .Vt DIST_POINT | 54 | .Vt DIST_POINT |
55 | object, representing an ASN.1 DistributionPoint structure | 55 | object, representing an ASN.1 |
56 | defined in RFC 5280 section 4.2.1.13. | 56 | .Vt DistributionPoint |
57 | structure defined in RFC 5280 section 4.2.1.13. | ||
57 | It can hold issuer names, distribution point names, and reason flags. | 58 | It can hold issuer names, distribution point names, and reason flags. |
58 | .Fn DIST_POINT_free | 59 | .Fn DIST_POINT_free |
59 | frees | 60 | frees |
@@ -64,8 +65,9 @@ allocates and initializes an empty | |||
64 | .Vt CRL_DIST_POINTS | 65 | .Vt CRL_DIST_POINTS |
65 | object, which is a | 66 | object, which is a |
66 | .Vt STACK_OF(DIST_POINT) | 67 | .Vt STACK_OF(DIST_POINT) |
67 | and represents the ASN.1 CRLDistributionPoints structure | 68 | and represents the ASN.1 |
68 | defined in RFC 5280 section 4.2.1.13. | 69 | .Vt CRLDistributionPoints |
70 | structure defined in RFC 5280 section 4.2.1.13. | ||
69 | It can be used as an extension in | 71 | It can be used as an extension in |
70 | .Vt X509 | 72 | .Vt X509 |
71 | and in | 73 | and in |
@@ -78,8 +80,9 @@ frees | |||
78 | .Fn DIST_POINT_NAME_new | 80 | .Fn DIST_POINT_NAME_new |
79 | allocates and initializes an empty | 81 | allocates and initializes an empty |
80 | .Vt DIST_POINT_NAME | 82 | .Vt DIST_POINT_NAME |
81 | object, representing an ASN.1 DistributionPointName structure | 83 | object, representing an ASN.1 |
82 | defined in RFC 5280 section 4.2.1.13. | 84 | .Vt DistributionPointName |
85 | structure defined in RFC 5280 section 4.2.1.13. | ||
83 | It is used by the | 86 | It is used by the |
84 | .Vt DIST_POINT | 87 | .Vt DIST_POINT |
85 | and | 88 | and |
@@ -93,8 +96,9 @@ frees | |||
93 | .Fn ISSUING_DIST_POINT_new | 96 | .Fn ISSUING_DIST_POINT_new |
94 | allocates and initializes an empty | 97 | allocates and initializes an empty |
95 | .Vt ISSUING_DIST_POINT | 98 | .Vt ISSUING_DIST_POINT |
96 | object, representing an ASN.1 IssuingDistributionPoint structure | 99 | object, representing an ASN.1 |
97 | defined in RFC 5280 section 5.2.5. | 100 | .Vt IssuingDistributionPoint |
101 | structure defined in RFC 5280 section 5.2.5. | ||
98 | Using this extension, a CRL can specify which distribution point | 102 | Using this extension, a CRL can specify which distribution point |
99 | it was issued from and which kinds of certificates and revocation | 103 | it was issued from and which kinds of certificates and revocation |
100 | reasons it covers. | 104 | reasons it covers. |
diff --git a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 index 2e55f6cbed..ae23b46c15 100644 --- a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 +++ b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.2 2016/12/14 07:00:35 jmc Exp $ | 1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 14 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt ESS_SIGNING_CERT_NEW 3 | 18 | .Dt ESS_SIGNING_CERT_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,14 +41,16 @@ | |||
41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" | 41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" |
42 | .Sh DESCRIPTION | 42 | .Sh DESCRIPTION |
43 | The signing certificate may be included in the signedAttributes | 43 | The signing certificate may be included in the signedAttributes |
44 | field of a SignerInfo structure to mitigate simple substitution and | 44 | field of a |
45 | re-issue attacks. | 45 | .Vt SignerInfo |
46 | structure to mitigate simple substitution and re-issue attacks. | ||
46 | .Pp | 47 | .Pp |
47 | .Fn ESS_SIGNING_CERT_new | 48 | .Fn ESS_SIGNING_CERT_new |
48 | allocates and initializes an empty | 49 | allocates and initializes an empty |
49 | .Vt ESS_SIGNING_CERT | 50 | .Vt ESS_SIGNING_CERT |
50 | object, representing an ASN.1 SigningCertificate structure | 51 | object, representing an ASN.1 |
51 | defined in RFC 2634 section 5.4. | 52 | .Vt SigningCertificate |
53 | structure defined in RFC 2634 section 5.4. | ||
52 | It can hold the certificate used for signing the data, | 54 | It can hold the certificate used for signing the data, |
53 | additional authorization certificates that can be used during | 55 | additional authorization certificates that can be used during |
54 | validation, and policies applying to the certificate. | 56 | validation, and policies applying to the certificate. |
@@ -59,8 +61,9 @@ frees | |||
59 | .Fn ESS_CERT_ID_new | 61 | .Fn ESS_CERT_ID_new |
60 | allocates and initializes an empty | 62 | allocates and initializes an empty |
61 | .Vt ESS_CERT_ID | 63 | .Vt ESS_CERT_ID |
62 | object, representing an ASN.1 ESSCertID structure | 64 | object, representing an ASN.1 |
63 | defined in RFC 2634 section 5.4.1. | 65 | .Vt ESSCertID |
66 | structure defined in RFC 2634 section 5.4.1. | ||
64 | Such objects can be used inside | 67 | Such objects can be used inside |
65 | .Vt ESS_SIGNING_CERT | 68 | .Vt ESS_SIGNING_CERT |
66 | objects, and each one can hold a SHA1 hash of one certificate. | 69 | objects, and each one can hold a SHA1 hash of one certificate. |
@@ -71,8 +74,9 @@ frees | |||
71 | .Fn ESS_ISSUER_SERIAL_new | 74 | .Fn ESS_ISSUER_SERIAL_new |
72 | allocates and initializes an empty | 75 | allocates and initializes an empty |
73 | .Vt ESS_ISSUER_SERIAL | 76 | .Vt ESS_ISSUER_SERIAL |
74 | object, representing an ASN.1 IssuerSerial structure | 77 | object, representing an ASN.1 |
75 | defined in RFC 2634 section 5.4.1. | 78 | .Vt IssuerSerial |
79 | structure defined in RFC 2634 section 5.4.1. | ||
76 | It can hold an issuer name and a serial number and can be included in an | 80 | It can hold an issuer name and a serial number and can be included in an |
77 | .Vt ESS_CERT_ID | 81 | .Vt ESS_CERT_ID |
78 | object, which is useful for additional authorization certificates, | 82 | object, which is useful for additional authorization certificates, |
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3 index 1a7fe40a66..c328edf4f6 100644 --- a/src/lib/libcrypto/man/EVP_EncryptInit.3 +++ b/src/lib/libcrypto/man/EVP_EncryptInit.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.4 2016/11/26 20:26:25 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 | 2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 26 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt EVP_ENCRYPTINIT 3 | 53 | .Dt EVP_ENCRYPTINIT 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -664,7 +664,9 @@ If the cipher is a stream cipher then | |||
664 | is returned. | 664 | is returned. |
665 | .Pp | 665 | .Pp |
666 | .Fn EVP_CIPHER_param_to_asn1 | 666 | .Fn EVP_CIPHER_param_to_asn1 |
667 | sets the AlgorithmIdentifier "parameter" based on the passed cipher. | 667 | sets the ASN.1 |
668 | .Vt AlgorithmIdentifier | ||
669 | parameter based on the passed cipher. | ||
668 | This will typically include any parameters and an IV. | 670 | This will typically include any parameters and an IV. |
669 | The cipher IV (if any) must be set when this call is made. | 671 | The cipher IV (if any) must be set when this call is made. |
670 | This call should be made before the cipher is actually "used" (before any | 672 | This call should be made before the cipher is actually "used" (before any |
@@ -675,8 +677,9 @@ calls, for example). | |||
675 | This function may fail if the cipher does not have any ASN.1 support. | 677 | This function may fail if the cipher does not have any ASN.1 support. |
676 | .Pp | 678 | .Pp |
677 | .Fn EVP_CIPHER_asn1_to_param | 679 | .Fn EVP_CIPHER_asn1_to_param |
678 | sets the cipher parameters based on an ASN.1 AlgorithmIdentifier | 680 | sets the cipher parameters based on an ASN.1 |
679 | "parameter". | 681 | .Vt AlgorithmIdentifier |
682 | parameter. | ||
680 | The precise effect depends on the cipher. | 683 | The precise effect depends on the cipher. |
681 | In the case of RC2, for example, it will set the IV and effective | 684 | In the case of RC2, for example, it will set the IV and effective |
682 | key length. | 685 | key length. |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 index 0ed3678a99..0c30fcb5ef 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.5 2016/11/27 15:27:19 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 | 2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 27 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt EVP_PKEY_CTX_CTRL 3 | 53 | .Dt EVP_PKEY_CTX_CTRL 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -205,9 +205,10 @@ Two RSA padding modes behave differently if | |||
205 | .Fn EVP_PKEY_CTX_set_signature_md | 205 | .Fn EVP_PKEY_CTX_set_signature_md |
206 | is used. | 206 | is used. |
207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an | 207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an |
208 | actual digest value and is encapsulated in a DigestInfo structure | 208 | actual digest value and is encapsulated in a |
209 | according to PKCS#1 when signing and this structure is expected (and | 209 | .Vt DigestInfo |
210 | stripped off) when verifying. | 210 | structure according to PKCS#1 when signing and this structure is |
211 | expected (and stripped off) when verifying. | ||
211 | If this control is not used with RSA and PKCS#1 padding then the | 212 | If this control is not used with RSA and PKCS#1 padding then the |
212 | supplied data is used directly and not encapsulated. | 213 | supplied data is used directly and not encapsulated. |
213 | In the case of X9.31 padding for RSA the algorithm identifier byte is | 214 | In the case of X9.31 padding for RSA the algorithm identifier byte is |
diff --git a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 index ae986839fb..8910fb58f8 100644 --- a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 +++ b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.1 2016/12/23 20:43:02 schwarze Exp $ | 1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt EXTENDED_KEY_USAGE_NEW 3 | 18 | .Dt EXTENDED_KEY_USAGE_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,8 +41,9 @@ allocates and initializes an empty | |||
41 | .Vt EXTENDED_KEY_USAGE | 41 | .Vt EXTENDED_KEY_USAGE |
42 | object, which is a | 42 | object, which is a |
43 | .Vt STACK_OF(ASN1_OBJECT) | 43 | .Vt STACK_OF(ASN1_OBJECT) |
44 | and represents an ASN.1 ExtKeyUsageSyntax structure | 44 | and represents an ASN.1 |
45 | defined in RFC 5280 section 4.2.1.12. | 45 | .Vt ExtKeyUsageSyntax |
46 | structure defined in RFC 5280 section 4.2.1.12. | ||
46 | It can hold key purpose identifiers. | 47 | It can hold key purpose identifiers. |
47 | .Pp | 48 | .Pp |
48 | .Fn EXTENDED_KEY_USAGE_free | 49 | .Fn EXTENDED_KEY_USAGE_free |
diff --git a/src/lib/libcrypto/man/GENERAL_NAME_new.3 b/src/lib/libcrypto/man/GENERAL_NAME_new.3 index c4e8fce764..a5537323ae 100644 --- a/src/lib/libcrypto/man/GENERAL_NAME_new.3 +++ b/src/lib/libcrypto/man/GENERAL_NAME_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.1 2016/12/23 00:40:16 schwarze Exp $ | 1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt GENERAL_NAME_NEW 3 | 18 | .Dt GENERAL_NAME_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -46,21 +46,26 @@ | |||
46 | .Ft void | 46 | .Ft void |
47 | .Fn OTHERNAME_free "OTHERNAME *name" | 47 | .Fn OTHERNAME_free "OTHERNAME *name" |
48 | .Sh DESCRIPTION | 48 | .Sh DESCRIPTION |
49 | Even though the X.501 Name documented in | 49 | Even though the X.501 |
50 | .Vt Name | ||
51 | documented in | ||
50 | .Xr X509_NAME_new 3 | 52 | .Xr X509_NAME_new 3 |
51 | is a complicated multi-layered structure, it is very rigid and not | 53 | is a complicated multi-layered structure, it is very rigid and not |
52 | flexible enough to represent various entities that many people want | 54 | flexible enough to represent various entities that many people want |
53 | to use as names in certificates. | 55 | to use as names in certificates. |
54 | For that reason, X.509 extensions use the X.509 GeneralName | 56 | For that reason, X.509 extensions use the X.509 |
55 | wrapper structure rather than using the X.501 Name structure | 57 | .Vt GeneralName |
56 | directly, at the expense of adding one or two additional layers | 58 | wrapper structure rather than using the X.501 |
57 | of indirection. | 59 | .Vt Name |
60 | structure directly, at the expense of adding one or two additional | ||
61 | layers of indirection. | ||
58 | .Pp | 62 | .Pp |
59 | .Fn GENERAL_NAME_new | 63 | .Fn GENERAL_NAME_new |
60 | allocates and initializes an empty | 64 | allocates and initializes an empty |
61 | .Vt GENERAL_NAME | 65 | .Vt GENERAL_NAME |
62 | object, representing the ASN.1 GeneralName structure | 66 | object, representing the ASN.1 |
63 | defined in RFC 5280 section 4.2.1.6. | 67 | .Vt GeneralName |
68 | structure defined in RFC 5280 section 4.2.1.6. | ||
64 | It can for example hold an | 69 | It can for example hold an |
65 | .Vt X509_name | 70 | .Vt X509_name |
66 | object, an IP address, a DNS host name, a uniform resource identifier, | 71 | object, an IP address, a DNS host name, a uniform resource identifier, |
@@ -78,8 +83,9 @@ allocates and initializes an empty | |||
78 | .Vt GENERAL_NAMES | 83 | .Vt GENERAL_NAMES |
79 | object, which is a | 84 | object, which is a |
80 | .Vt STACK_OF(GENERAL_NAME) | 85 | .Vt STACK_OF(GENERAL_NAME) |
81 | and represents the ASN.1 GeneralNames structure | 86 | and represents the ASN.1 |
82 | defined in RFC 5280 section 4.2.1.6. | 87 | .Vt GeneralNames |
88 | structure defined in RFC 5280 section 4.2.1.6. | ||
83 | It is used by extension structures that can contain multiple names, | 89 | It is used by extension structures that can contain multiple names, |
84 | for example key identifier, alternative name, and distribution point | 90 | for example key identifier, alternative name, and distribution point |
85 | extensions. | 91 | extensions. |
@@ -90,8 +96,9 @@ frees | |||
90 | .Fn EDIPARTYNAME_new | 96 | .Fn EDIPARTYNAME_new |
91 | allocates and initializes an empty | 97 | allocates and initializes an empty |
92 | .Vt EDIPARTYNAME | 98 | .Vt EDIPARTYNAME |
93 | object, representing the ASN.1 EDIPartyName structure | 99 | object, representing the ASN.1 |
94 | defined in RFC 5280 section 4.2.1.6, where | 100 | .Vt EDIPartyName |
101 | structure defined in RFC 5280 section 4.2.1.6, where | ||
95 | .Dq EDI | 102 | .Dq EDI |
96 | stands for | 103 | stands for |
97 | .Dq electronic data identifier . | 104 | .Dq electronic data identifier . |
@@ -104,8 +111,9 @@ frees | |||
104 | .Fn OTHERNAME_new | 111 | .Fn OTHERNAME_new |
105 | allocates and initializes an empty | 112 | allocates and initializes an empty |
106 | .Vt OTHERNAME | 113 | .Vt OTHERNAME |
107 | object, representing the ASN.1 OtherName structure | 114 | object, representing the ASN.1 |
108 | defined in RFC 5280 section 4.2.1.6. | 115 | .Vt OtherName |
116 | structure defined in RFC 5280 section 4.2.1.6. | ||
109 | It can hold data of any | 117 | It can hold data of any |
110 | .Vt ASN1_TYPE | 118 | .Vt ASN1_TYPE |
111 | together with a type identifier. | 119 | together with a type identifier. |
diff --git a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 index 1105bead0b..5ef737cb4e 100644 --- a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $ | 1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt NAME_CONSTRAINTS_NEW 3 | 18 | .Dt NAME_CONSTRAINTS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,8 +41,9 @@ certification path. | |||
41 | .Fn NAME_CONSTRAINTS_new | 41 | .Fn NAME_CONSTRAINTS_new |
42 | allocates and initializes an empty | 42 | allocates and initializes an empty |
43 | .Vt NAME_CONSTRAINTS | 43 | .Vt NAME_CONSTRAINTS |
44 | object, representing an ASN.1 NameConstraints structure | 44 | object, representing an ASN.1 |
45 | defined in RFC 5280 section 4.2.1.10. | 45 | .Vt NameConstraints |
46 | structure defined in RFC 5280 section 4.2.1.10. | ||
46 | It consists of two | 47 | It consists of two |
47 | .Vt STACK_OF(GENERAL_SUBTREE) | 48 | .Vt STACK_OF(GENERAL_SUBTREE) |
48 | objects, one specifying permitted names, the other excluded names. | 49 | objects, one specifying permitted names, the other excluded names. |
@@ -53,8 +54,9 @@ frees | |||
53 | .Fn GENERAL_SUBTREE_new | 54 | .Fn GENERAL_SUBTREE_new |
54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
55 | .Vt GENERAL_SUBTREE | 56 | .Vt GENERAL_SUBTREE |
56 | object, representing an ASN.1 GeneralSubtree structure | 57 | object, representing an ASN.1 |
57 | defined in RFC 5280 section 4.2.1.10. | 58 | .Vt GeneralSubtree |
59 | structure defined in RFC 5280 section 4.2.1.10. | ||
58 | It is a trivial wrapper around the | 60 | It is a trivial wrapper around the |
59 | .Vt GENERAL_NAME | 61 | .Vt GENERAL_NAME |
60 | object documented in | 62 | object documented in |
diff --git a/src/lib/libcrypto/man/OCSP_CRLID_new.3 b/src/lib/libcrypto/man/OCSP_CRLID_new.3 index fbc54ec71a..450b57c93e 100644 --- a/src/lib/libcrypto/man/OCSP_CRLID_new.3 +++ b/src/lib/libcrypto/man/OCSP_CRLID_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.2 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt OCSP_CRLID_NEW 3 | 18 | .Dt OCSP_CRLID_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -38,9 +38,14 @@ | |||
38 | If a client asks about the validity of a certificate and it turns | 38 | If a client asks about the validity of a certificate and it turns |
39 | out to be invalid, the responder may optionally communicate which | 39 | out to be invalid, the responder may optionally communicate which |
40 | certificate revocation list the certificate was found on. | 40 | certificate revocation list the certificate was found on. |
41 | The required data is stored as an ASN.1 CrlID structure in the | 41 | The required data is stored as an ASN.1 |
42 | singleExtensions field of the SingleResponse structure. | 42 | .Vt CrlID |
43 | The CrlID is represented by an | 43 | structure in the singleExtensions field of the |
44 | .Vt SingleResponse | ||
45 | structure. | ||
46 | The | ||
47 | .Vt CrlID | ||
48 | is represented by an | ||
44 | .Vt OCSP_CRLID | 49 | .Vt OCSP_CRLID |
45 | object, which will be stored inside the | 50 | object, which will be stored inside the |
46 | .Vt OCSP_SINGLERESP | 51 | .Vt OCSP_SINGLERESP |
@@ -66,7 +71,9 @@ at which the CRL was created. | |||
66 | Each argument can be | 71 | Each argument can be |
67 | .Dv NULL , | 72 | .Dv NULL , |
68 | in which case the respective field is omitted. | 73 | in which case the respective field is omitted. |
69 | The resulting CrlID structure is encoded in ASN.1 using | 74 | The resulting |
75 | .Vt CrlID | ||
76 | structure is encoded in ASN.1 using | ||
70 | .Xr X509V3_EXT_i2d 3 | 77 | .Xr X509V3_EXT_i2d 3 |
71 | with criticality 0. | 78 | with criticality 0. |
72 | .Sh RETURN VALUES | 79 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 index 0d0009186a..664a750665 100644 --- a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 +++ b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.6 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_REQUEST_NEW 3 | 69 | .Dt OCSP_REQUEST_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -133,7 +133,9 @@ | |||
133 | .Fn OCSP_REQUEST_new | 133 | .Fn OCSP_REQUEST_new |
134 | allocates and initializes an empty | 134 | allocates and initializes an empty |
135 | .Vt OCSP_REQUEST | 135 | .Vt OCSP_REQUEST |
136 | object, representing an ASN.1 OCSPRequest structure defined in RFC 6960. | 136 | object, representing an ASN.1 |
137 | .Vt OCSPRequest | ||
138 | structure defined in RFC 6960. | ||
137 | .Fn OCSP_REQUEST_free | 139 | .Fn OCSP_REQUEST_free |
138 | frees | 140 | frees |
139 | .Fa req . | 141 | .Fa req . |
@@ -141,7 +143,9 @@ frees | |||
141 | .Fn OCSP_SIGNATURE_new | 143 | .Fn OCSP_SIGNATURE_new |
142 | allocates and initializes an empty | 144 | allocates and initializes an empty |
143 | .Vt OCSP_SIGNATURE | 145 | .Vt OCSP_SIGNATURE |
144 | object, representing an ASN.1 Signature structure defined in RFC 6960. | 146 | object, representing an ASN.1 |
147 | .Vt Signature | ||
148 | structure defined in RFC 6960. | ||
145 | Such an object is used inside | 149 | Such an object is used inside |
146 | .Vt OCSP_REQUEST . | 150 | .Vt OCSP_REQUEST . |
147 | .Fn OCSP_SIGNATURE_free | 151 | .Fn OCSP_SIGNATURE_free |
@@ -151,7 +155,9 @@ frees | |||
151 | .Fn OCSP_REQINFO_new | 155 | .Fn OCSP_REQINFO_new |
152 | allocates and initializes an empty | 156 | allocates and initializes an empty |
153 | .Vt OCSP_REQINFO | 157 | .Vt OCSP_REQINFO |
154 | object, representing an ASN.1 TBSRequest structure defined in RFC 6960. | 158 | object, representing an ASN.1 |
159 | .Vt TBSRequest | ||
160 | structure defined in RFC 6960. | ||
155 | Such an object is used inside | 161 | Such an object is used inside |
156 | .Vt OCSP_REQUEST . | 162 | .Vt OCSP_REQUEST . |
157 | It asks about the validity of one or more certificates. | 163 | It asks about the validity of one or more certificates. |
@@ -162,7 +168,9 @@ frees | |||
162 | .Fn OCSP_ONEREQ_new | 168 | .Fn OCSP_ONEREQ_new |
163 | allocates and initializes an empty | 169 | allocates and initializes an empty |
164 | .Vt OCSP_ONEREQ | 170 | .Vt OCSP_ONEREQ |
165 | object, representing an ASN.1 Request structure defined in RFC 6960. | 171 | object, representing an ASN.1 |
172 | .Vt Request | ||
173 | structure defined in RFC 6960. | ||
166 | Such objects are used inside | 174 | Such objects are used inside |
167 | .Vt OCSP_REQINFO . | 175 | .Vt OCSP_REQINFO . |
168 | Each one asks about the validity of one certificiate. | 176 | Each one asks about the validity of one certificiate. |
diff --git a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 index 6179da3a5b..5f42c781fd 100644 --- a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 +++ b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.4 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt OCSP_SERVICELOC_NEW 3 | 18 | .Dt OCSP_SERVICELOC_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -38,10 +38,14 @@ Due to restrictions of network routing, a client may be unable to | |||
38 | directly contact the authoritative OCSP server for a certificate | 38 | directly contact the authoritative OCSP server for a certificate |
39 | that needs to be checked. | 39 | that needs to be checked. |
40 | In that case, the request can be sent via a proxy server. | 40 | In that case, the request can be sent via a proxy server. |
41 | An ASN.1 ServiceLocator structure is included in the | 41 | An ASN.1 |
42 | singleRequestExtensions field of the Request structure to indicate | 42 | .Vt ServiceLocator |
43 | where to forward the request. | 43 | structure is included in the singleRequestExtensions field of the |
44 | The ServiceLocator is represented by a | 44 | .Vt Request |
45 | structure to indicate where to forward the request. | ||
46 | The | ||
47 | .Vt ServiceLocator | ||
48 | is represented by a | ||
45 | .Vt OCSP_SERVICELOC | 49 | .Vt OCSP_SERVICELOC |
46 | object, which will be stored inside the | 50 | object, which will be stored inside the |
47 | .Vt OCSP_ONEREQ | 51 | .Vt OCSP_ONEREQ |
@@ -65,9 +69,12 @@ If | |||
65 | .Fa urls | 69 | .Fa urls |
66 | or its first element is | 70 | or its first element is |
67 | .Dv NULL , | 71 | .Dv NULL , |
68 | the locator field is omitted from the ServiceLocator structure | 72 | the locator field is omitted from the |
69 | and only the issuer is included. | 73 | .Vt ServiceLocator |
70 | The resulting ServiceLocator structure is encoded in ASN.1 using | 74 | structure and only the issuer is included. |
75 | The resulting | ||
76 | .Vt ServiceLocator | ||
77 | structure is encoded in ASN.1 using | ||
71 | .Xr X509V3_EXT_i2d 3 | 78 | .Xr X509V3_EXT_i2d 3 |
72 | with criticality 0. | 79 | with criticality 0. |
73 | .Sh RETURN VALUES | 80 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_cert_to_id.3 b/src/lib/libcrypto/man/OCSP_cert_to_id.3 index 103b9a4a9f..77559ba469 100644 --- a/src/lib/libcrypto/man/OCSP_cert_to_id.3 +++ b/src/lib/libcrypto/man/OCSP_cert_to_id.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_CERT_TO_ID 3 | 69 | .Dt OCSP_CERT_TO_ID 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -118,7 +118,9 @@ | |||
118 | .Fn OCSP_CERTID_new | 118 | .Fn OCSP_CERTID_new |
119 | allocates and initializes an empty | 119 | allocates and initializes an empty |
120 | .Vt OCSP_CERTID | 120 | .Vt OCSP_CERTID |
121 | object, representing an ASN.1 CertID structure defined in RFC 6960. | 121 | object, representing an ASN.1 |
122 | .Vt CertID | ||
123 | structure defined in RFC 6960. | ||
122 | It can store hashes of an issuer's distinguished name and public | 124 | It can store hashes of an issuer's distinguished name and public |
123 | key together with a serial number of a certificate. | 125 | key together with a serial number of a certificate. |
124 | It is used by the | 126 | It is used by the |
diff --git a/src/lib/libcrypto/man/OCSP_resp_find_status.3 b/src/lib/libcrypto/man/OCSP_resp_find_status.3 index 23aaa26e38..d06540d716 100644 --- a/src/lib/libcrypto/man/OCSP_resp_find_status.3 +++ b/src/lib/libcrypto/man/OCSP_resp_find_status.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.4 2016/12/12 22:48:02 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_RESP_FIND_STATUS 3 | 69 | .Dt OCSP_RESP_FIND_STATUS 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -140,7 +140,9 @@ | |||
140 | .Fn OCSP_SINGLERESP_new | 140 | .Fn OCSP_SINGLERESP_new |
141 | allocates and initializes an empty | 141 | allocates and initializes an empty |
142 | .Vt OCSP_SINGLERESP | 142 | .Vt OCSP_SINGLERESP |
143 | object, representing an ASN.1 SingleResponse structure defined in RFC 6960. | 143 | object, representing an ASN.1 |
144 | .Vt SingleResponse | ||
145 | structure defined in RFC 6960. | ||
144 | Each such object can store the server's answer regarding the validity | 146 | Each such object can store the server's answer regarding the validity |
145 | of one individual certificate. | 147 | of one individual certificate. |
146 | Such objects are used inside the | 148 | Such objects are used inside the |
@@ -156,7 +158,9 @@ frees | |||
156 | .Fn OCSP_CERTSTATUS_new | 158 | .Fn OCSP_CERTSTATUS_new |
157 | allocates and initializes an empty | 159 | allocates and initializes an empty |
158 | .Vt OCSP_CERTSTATUS | 160 | .Vt OCSP_CERTSTATUS |
159 | object, representing an ASN.1 CertStatus structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
162 | .Vt CertStatus | ||
163 | structure defined in RFC 6960. | ||
160 | Such an object is used inside | 164 | Such an object is used inside |
161 | .Vt OCSP_SINGLERESP . | 165 | .Vt OCSP_SINGLERESP . |
162 | .Fn OCSP_CERTSTATUS_free | 166 | .Fn OCSP_CERTSTATUS_free |
@@ -166,7 +170,9 @@ frees | |||
166 | .Fn OCSP_REVOKEDINFO_new | 170 | .Fn OCSP_REVOKEDINFO_new |
167 | allocates and initializes an empty | 171 | allocates and initializes an empty |
168 | .Vt OCSP_REVOKEDINFO | 172 | .Vt OCSP_REVOKEDINFO |
169 | object, representing an ASN.1 RevokedInfo structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
174 | .Vt RevokedInfo | ||
175 | structure defined in RFC 6960. | ||
170 | Such an object is used inside | 176 | Such an object is used inside |
171 | .Vt OCSP_CERTSTATUS . | 177 | .Vt OCSP_CERTSTATUS . |
172 | .Fn OCSP_REVOKEDINFO_free | 178 | .Fn OCSP_REVOKEDINFO_free |
diff --git a/src/lib/libcrypto/man/OCSP_response_status.3 b/src/lib/libcrypto/man/OCSP_response_status.3 index 33a9dfb1a2..1ffa8a728e 100644 --- a/src/lib/libcrypto/man/OCSP_response_status.3 +++ b/src/lib/libcrypto/man/OCSP_response_status.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_response_status.3,v 1.3 2016/12/12 18:45:29 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_response_status.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_RESPONSE_STATUS 3 | 69 | .Dt OCSP_RESPONSE_STATUS 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -122,7 +122,9 @@ | |||
122 | .Fn OCSP_RESPONSE_new | 122 | .Fn OCSP_RESPONSE_new |
123 | allocates and initializes an empty | 123 | allocates and initializes an empty |
124 | .Vt OCSP_RESPONSE | 124 | .Vt OCSP_RESPONSE |
125 | object, representing an ASN.1 OCSPResponse structure defined in RFC 6960. | 125 | object, representing an ASN.1 |
126 | .Vt OCSPResponse | ||
127 | structure defined in RFC 6960. | ||
126 | .Fn OCSP_RESPONSE_free | 128 | .Fn OCSP_RESPONSE_free |
127 | frees | 129 | frees |
128 | .Fa resp . | 130 | .Fa resp . |
@@ -130,7 +132,9 @@ frees | |||
130 | .Fn OCSP_RESPBYTES_new | 132 | .Fn OCSP_RESPBYTES_new |
131 | allocates and initializes an empty | 133 | allocates and initializes an empty |
132 | .Vt OCSP_RESPBYTES | 134 | .Vt OCSP_RESPBYTES |
133 | object, representing an ASN.1 ResponseBytes structure defined in RFC 6960. | 135 | object, representing an ASN.1 |
136 | .Vt ResponseBytes | ||
137 | structure defined in RFC 6960. | ||
134 | Such an object is used inside | 138 | Such an object is used inside |
135 | .Vt OCSP_RESPONSE . | 139 | .Vt OCSP_RESPONSE . |
136 | .Fn OCSP_RESPBYTES_free | 140 | .Fn OCSP_RESPBYTES_free |
@@ -140,7 +144,9 @@ frees | |||
140 | .Fn OCSP_BASICRESP_new | 144 | .Fn OCSP_BASICRESP_new |
141 | allocates and initializes an empty | 145 | allocates and initializes an empty |
142 | .Vt OCSP_BASICRESP | 146 | .Vt OCSP_BASICRESP |
143 | object, representing an ASN.1 BasicOCSPResponse structure defined in RFC 6960. | 147 | object, representing an ASN.1 |
148 | .Vt BasicOCSPResponse | ||
149 | structure defined in RFC 6960. | ||
144 | .Vt OCSP_RESPBYTES | 150 | .Vt OCSP_RESPBYTES |
145 | contains the DER-encoded form of an | 151 | contains the DER-encoded form of an |
146 | .Vt OCSP_BASICRESP | 152 | .Vt OCSP_BASICRESP |
@@ -152,7 +158,9 @@ frees | |||
152 | .Fn OCSP_RESPDATA_new | 158 | .Fn OCSP_RESPDATA_new |
153 | allocates and initializes an empty | 159 | allocates and initializes an empty |
154 | .Vt OCSP_RESPDATA | 160 | .Vt OCSP_RESPDATA |
155 | object, representing an ASN.1 ResponseData structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
162 | .Vt ResponseData | ||
163 | structure defined in RFC 6960. | ||
156 | Such an object is used inside | 164 | Such an object is used inside |
157 | .Vt OCSP_BASICRESP . | 165 | .Vt OCSP_BASICRESP . |
158 | .Fn OCSP_RESPDATA_free | 166 | .Fn OCSP_RESPDATA_free |
@@ -162,7 +170,9 @@ frees | |||
162 | .Fn OCSP_RESPID_new | 170 | .Fn OCSP_RESPID_new |
163 | allocates and initializes an empty | 171 | allocates and initializes an empty |
164 | .Vt OCSP_RESPID | 172 | .Vt OCSP_RESPID |
165 | object, representing an ASN.1 ResponderID structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
174 | .Vt ResponderID | ||
175 | structure defined in RFC 6960. | ||
166 | Such an object is used inside | 176 | Such an object is used inside |
167 | .Vt OCSP_RESPDATA . | 177 | .Vt OCSP_RESPDATA . |
168 | .Fn OCSP_RESPID_free | 178 | .Fn OCSP_RESPID_free |
diff --git a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 index 6d3ede45c2..5d0852be25 100644 --- a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 +++ b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.6 2016/12/06 14:45:08 schwarze Exp $ | 1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 6 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 | 53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -747,8 +747,9 @@ and | |||
747 | .Fn PEM_write_PKCS8PrivateKey | 747 | .Fn PEM_write_PKCS8PrivateKey |
748 | write a private key in an | 748 | write a private key in an |
749 | .Vt EVP_PKEY | 749 | .Vt EVP_PKEY |
750 | structure in PKCS#8 EncryptedPrivateKeyInfo format using PKCS#5 | 750 | structure in PKCS#8 |
751 | v2.0 password based encryption algorithms. | 751 | .Vt EncryptedPrivateKeyInfo |
752 | format using PKCS#5 v2.0 password based encryption algorithms. | ||
752 | The | 753 | The |
753 | .Fa enc | 754 | .Fa enc |
754 | argument specifies the encryption algorithm to use: unlike all other PEM | 755 | argument specifies the encryption algorithm to use: unlike all other PEM |
@@ -758,13 +759,15 @@ If | |||
758 | .Fa enc | 759 | .Fa enc |
759 | is | 760 | is |
760 | .Dv NULL , | 761 | .Dv NULL , |
761 | then no encryption is used and a PKCS#8 PrivateKeyInfo structure | 762 | then no encryption is used and a PKCS#8 |
762 | is used instead. | 763 | .Vt PrivateKeyInfo |
764 | structure is used instead. | ||
763 | .Pp | 765 | .Pp |
764 | .Fn PEM_write_bio_PKCS8PrivateKey_nid | 766 | .Fn PEM_write_bio_PKCS8PrivateKey_nid |
765 | and | 767 | and |
766 | .Fn PEM_write_PKCS8PrivateKey_nid | 768 | .Fn PEM_write_PKCS8PrivateKey_nid |
767 | also write out a private key as a PKCS#8 EncryptedPrivateKeyInfo. | 769 | also write out a private key as a PKCS#8 |
770 | .Vt EncryptedPrivateKeyInfo . | ||
768 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. | 771 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. |
769 | The algorithm to use is specified in the | 772 | The algorithm to use is specified in the |
770 | .Fa nid | 773 | .Fa nid |
@@ -789,7 +792,9 @@ The | |||
789 | functions process a public key using an | 792 | functions process a public key using an |
790 | .Vt EVP_PKEY | 793 | .Vt EVP_PKEY |
791 | structure. | 794 | structure. |
792 | The public key is encoded as a SubjectPublicKeyInfo structure. | 795 | The public key is encoded as an ASN.1 |
796 | .Vt SubjectPublicKeyInfo | ||
797 | structure. | ||
793 | .Pp | 798 | .Pp |
794 | The | 799 | The |
795 | .Sy RSAPrivateKey | 800 | .Sy RSAPrivateKey |
@@ -805,15 +810,18 @@ The | |||
805 | functions process an RSA public key using an | 810 | functions process an RSA public key using an |
806 | .Vt RSA | 811 | .Vt RSA |
807 | structure. | 812 | structure. |
808 | The public key is encoded using a PKCS#1 RSAPublicKey structure. | 813 | The public key is encoded using a PKCS#1 |
814 | .Vt RSAPublicKey | ||
815 | structure. | ||
809 | .Pp | 816 | .Pp |
810 | The | 817 | The |
811 | .Sy RSA_PUBKEY | 818 | .Sy RSA_PUBKEY |
812 | functions also process an RSA public key using an | 819 | functions also process an RSA public key using an |
813 | .Vt RSA | 820 | .Vt RSA |
814 | structure. | 821 | structure. |
815 | However the public key is encoded using a SubjectPublicKeyInfo structure | 822 | However the public key is encoded using an ASN.1 |
816 | and an error occurs if the public key is not RSA. | 823 | .Vt SubjectPublicKeyInfo |
824 | structure and an error occurs if the public key is not RSA. | ||
817 | .Pp | 825 | .Pp |
818 | The | 826 | The |
819 | .Sy DSAPrivateKey | 827 | .Sy DSAPrivateKey |
@@ -829,8 +837,9 @@ The | |||
829 | functions process a DSA public key using a | 837 | functions process a DSA public key using a |
830 | .Vt DSA | 838 | .Vt DSA |
831 | structure. | 839 | structure. |
832 | The public key is encoded using a SubjectPublicKeyInfo structure and an | 840 | The public key is encoded using an ASN.1 |
833 | error occurs if the public key is not DSA. | 841 | .Vt SubjectPublicKeyInfo |
842 | structure and an error occurs if the public key is not DSA. | ||
834 | .Pp | 843 | .Pp |
835 | The | 844 | The |
836 | .Sy DSAparams | 845 | .Sy DSAparams |
@@ -906,7 +915,9 @@ structure. | |||
906 | .Pp | 915 | .Pp |
907 | The | 916 | The |
908 | .Sy PKCS7 | 917 | .Sy PKCS7 |
909 | functions process a PKCS#7 ContentInfo using a | 918 | functions process a PKCS#7 |
919 | .Vt ContentInfo | ||
920 | using a | ||
910 | .Vt PKCS7 | 921 | .Vt PKCS7 |
911 | structure. | 922 | structure. |
912 | .Pp | 923 | .Pp |
diff --git a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 index 8cb6835194..603c27bed1 100644 --- a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 +++ b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS12_SAFEBAG_NEW 3 | 18 | .Dt PKCS12_SAFEBAG_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn PKCS12_SAFEBAG_new | 37 | .Fn PKCS12_SAFEBAG_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt PKCS12_SAFEBAG | 39 | .Vt PKCS12_SAFEBAG |
40 | object, representing an ASN.1 SafeBag structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 7292 section 4.2. | 41 | .Vt SafeBag |
42 | structure defined in RFC 7292 section 4.2. | ||
42 | It can hold a pointer to a | 43 | It can hold a pointer to a |
43 | .Vt PKCS12_BAGS | 44 | .Vt PKCS12_BAGS |
44 | object together with a type identifier and optional attributes. | 45 | object together with a type identifier and optional attributes. |
@@ -49,7 +50,9 @@ frees | |||
49 | .Fn PKCS12_BAGS_new | 50 | .Fn PKCS12_BAGS_new |
50 | allocates and initializes an empty | 51 | allocates and initializes an empty |
51 | .Vt PKCS12_BAGS | 52 | .Vt PKCS12_BAGS |
52 | object, representing the bagValue field of an ASN.1 SafeBag structure. | 53 | object, representing the bagValue field of an ASN.1 |
54 | .Vt SafeBag | ||
55 | structure. | ||
53 | It is used in | 56 | It is used in |
54 | .Vt PKCS12_SAFEBAG | 57 | .Vt PKCS12_SAFEBAG |
55 | and can hold a DER-encoded X.509 certificate, | 58 | and can hold a DER-encoded X.509 certificate, |
diff --git a/src/lib/libcrypto/man/PKCS12_new.3 b/src/lib/libcrypto/man/PKCS12_new.3 index 426074c9b1..0f54048724 100644 --- a/src/lib/libcrypto/man/PKCS12_new.3 +++ b/src/lib/libcrypto/man/PKCS12_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS12_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS12_NEW 3 | 18 | .Dt PKCS12_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,7 +37,9 @@ | |||
37 | .Fn PKCS12_new | 37 | .Fn PKCS12_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt PKCS12 | 39 | .Vt PKCS12 |
40 | object, representing an ASN.1 PFX (personal information exchange) | 40 | object, representing an ASN.1 |
41 | .Vt PFX | ||
42 | .Pq personal information exchange | ||
41 | structure defined in RFC 7292 section 4. | 43 | structure defined in RFC 7292 section 4. |
42 | It can hold a pointer to a | 44 | It can hold a pointer to a |
43 | .Vt PKCS7 | 45 | .Vt PKCS7 |
@@ -53,8 +55,9 @@ frees | |||
53 | .Fn PKCS12_MAC_DATA_new | 55 | .Fn PKCS12_MAC_DATA_new |
54 | allocates and initializes an empty | 56 | allocates and initializes an empty |
55 | .Vt PKCS12_MAC_DATA | 57 | .Vt PKCS12_MAC_DATA |
56 | object, representing an ASN.1 MacData structure | 58 | object, representing an ASN.1 |
57 | defined in RFC 7292 section 4. | 59 | .Vt MacData |
60 | structure defined in RFC 7292 section 4. | ||
58 | It is used inside | 61 | It is used inside |
59 | .Vt PKCS12 | 62 | .Vt PKCS12 |
60 | and can hold a pointer to an | 63 | and can hold a pointer to an |
diff --git a/src/lib/libcrypto/man/PKCS7_new.3 b/src/lib/libcrypto/man/PKCS7_new.3 index 9feecbb88b..7f8cffd881 100644 --- a/src/lib/libcrypto/man/PKCS7_new.3 +++ b/src/lib/libcrypto/man/PKCS7_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS7_new.3,v 1.1 2016/12/13 14:31:55 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS7_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS7_NEW 3 | 18 | .Dt PKCS7_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -88,8 +88,9 @@ cryptography applied to it, in particular signed and encrypted data. | |||
88 | .Fn PKCS7_new | 88 | .Fn PKCS7_new |
89 | allocates and initializes an empty | 89 | allocates and initializes an empty |
90 | .Vt PKCS7 | 90 | .Vt PKCS7 |
91 | object, representing an ASN.1 ContentInfo structure | 91 | object, representing an ASN.1 |
92 | defined in RFC 2315 section 7. | 92 | .Vt ContentInfo |
93 | structure defined in RFC 2315 section 7. | ||
93 | It is the top-level data structure able to hold any kind of content | 94 | It is the top-level data structure able to hold any kind of content |
94 | that can be transmitted using PKCS#7. | 95 | that can be transmitted using PKCS#7. |
95 | It can be used recursively in | 96 | It can be used recursively in |
@@ -104,8 +105,9 @@ frees | |||
104 | .Fn PKCS7_SIGNED_new | 105 | .Fn PKCS7_SIGNED_new |
105 | allocates and initializes an empty | 106 | allocates and initializes an empty |
106 | .Vt PKCS7_SIGNED | 107 | .Vt PKCS7_SIGNED |
107 | object, representing an ASN.1 SignedData structure | 108 | object, representing an ASN.1 |
108 | defined in RFC 2315 section 9. | 109 | .Vt SignedData |
110 | structure defined in RFC 2315 section 9. | ||
109 | It can be used inside | 111 | It can be used inside |
110 | .Vt PKCS7 | 112 | .Vt PKCS7 |
111 | objects and holds any kind of content together with signatures by | 113 | objects and holds any kind of content together with signatures by |
@@ -118,8 +120,9 @@ frees | |||
118 | .Fn PKCS7_ENVELOPE_new | 120 | .Fn PKCS7_ENVELOPE_new |
119 | allocates and initializes an empty | 121 | allocates and initializes an empty |
120 | .Vt PKCS7_ENVELOPE | 122 | .Vt PKCS7_ENVELOPE |
121 | object, representing an ASN.1 EnvelopedData structure | 123 | object, representing an ASN.1 |
122 | defined in RFC 2315 section 10. | 124 | .Vt EnvelopedData |
125 | structure defined in RFC 2315 section 10. | ||
123 | It can be used inside | 126 | It can be used inside |
124 | .Vt PKCS7 | 127 | .Vt PKCS7 |
125 | objects and holds any kind of encrypted content together with | 128 | objects and holds any kind of encrypted content together with |
@@ -131,8 +134,9 @@ frees | |||
131 | .Fn PKCS7_SIGN_ENVELOPE_new | 134 | .Fn PKCS7_SIGN_ENVELOPE_new |
132 | allocates and initializes an empty | 135 | allocates and initializes an empty |
133 | .Vt PKCS7_SIGN_ENVELOPE | 136 | .Vt PKCS7_SIGN_ENVELOPE |
134 | object, representing an ASN.1 SignedAndEnvelopedData structure | 137 | object, representing an ASN.1 |
135 | defined in RFC 2315 section 11. | 138 | .Vt SignedAndEnvelopedData |
139 | structure defined in RFC 2315 section 11. | ||
136 | It can be used inside | 140 | It can be used inside |
137 | .Vt PKCS7 | 141 | .Vt PKCS7 |
138 | objects and holds any kind of encrypted content together with | 142 | objects and holds any kind of encrypted content together with |
@@ -146,8 +150,9 @@ frees | |||
146 | .Fn PKCS7_DIGEST_new | 150 | .Fn PKCS7_DIGEST_new |
147 | allocates and initializes an empty | 151 | allocates and initializes an empty |
148 | .Vt PKCS7_DIGEST | 152 | .Vt PKCS7_DIGEST |
149 | object, representing an ASN.1 DigestedData structure | 153 | object, representing an ASN.1 |
150 | defined in RFC 2315 section 12. | 154 | .Vt DigestedData |
155 | structure defined in RFC 2315 section 12. | ||
151 | It can be used inside | 156 | It can be used inside |
152 | .Vt PKCS7 | 157 | .Vt PKCS7 |
153 | objects and holds any kind of content together with a message digest | 158 | objects and holds any kind of content together with a message digest |
@@ -159,8 +164,9 @@ frees | |||
159 | .Fn PKCS7_ENCRYPT_new | 164 | .Fn PKCS7_ENCRYPT_new |
160 | allocates and initializes an empty | 165 | allocates and initializes an empty |
161 | .Vt PKCS7_ENCRYPT | 166 | .Vt PKCS7_ENCRYPT |
162 | object, representing an ASN.1 EncryptedData structure | 167 | object, representing an ASN.1 |
163 | defined in RFC 2315 section 13. | 168 | .Vt EncryptedData |
169 | structure defined in RFC 2315 section 13. | ||
164 | It can be used inside | 170 | It can be used inside |
165 | .Vt PKCS7 | 171 | .Vt PKCS7 |
166 | objects and holds any kind of encrypted content. | 172 | objects and holds any kind of encrypted content. |
@@ -172,8 +178,9 @@ frees | |||
172 | .Fn PKCS7_ENC_CONTENT_new | 178 | .Fn PKCS7_ENC_CONTENT_new |
173 | allocates and initializes an empty | 179 | allocates and initializes an empty |
174 | .Vt PKCS7_ENC_CONTENT | 180 | .Vt PKCS7_ENC_CONTENT |
175 | object, representing an ASN.1 EncryptedContentInfo structure | 181 | object, representing an ASN.1 |
176 | defined in RFC 2315 section 10.1. | 182 | .Vt EncryptedContentInfo |
183 | structure defined in RFC 2315 section 10.1. | ||
177 | It can be used inside | 184 | It can be used inside |
178 | .Vt PKCS7_ENVELOPE , | 185 | .Vt PKCS7_ENVELOPE , |
179 | .Vt PKCS7_SIGN_ENVELOPE , | 186 | .Vt PKCS7_SIGN_ENVELOPE , |
@@ -188,8 +195,9 @@ frees | |||
188 | .Fn PKCS7_SIGNER_INFO_new | 195 | .Fn PKCS7_SIGNER_INFO_new |
189 | allocates and initializes an empty | 196 | allocates and initializes an empty |
190 | .Vt PKCS7_SIGNER_INFO | 197 | .Vt PKCS7_SIGNER_INFO |
191 | object, representing an ASN.1 SignerInfo structure | 198 | object, representing an ASN.1 |
192 | defined in RFC 2315 section 9.2. | 199 | .Vt SignerInfo |
200 | structure defined in RFC 2315 section 9.2. | ||
193 | It can be used inside | 201 | It can be used inside |
194 | .Vt PKCS7_SIGNED | 202 | .Vt PKCS7_SIGNED |
195 | and | 203 | and |
@@ -203,8 +211,9 @@ frees | |||
203 | .Fn PKCS7_RECIP_INFO_new | 211 | .Fn PKCS7_RECIP_INFO_new |
204 | allocates and initializes an empty | 212 | allocates and initializes an empty |
205 | .Vt PKCS7_RECIP_INFO | 213 | .Vt PKCS7_RECIP_INFO |
206 | object, representing an ASN.1 RecipientInfo structure | 214 | object, representing an ASN.1 |
207 | defined in RFC 2315 section 10.2. | 215 | .Vt RecipientInfo |
216 | structure defined in RFC 2315 section 10.2. | ||
208 | It can be used inside | 217 | It can be used inside |
209 | .Vt PKCS7_ENVELOPE | 218 | .Vt PKCS7_ENVELOPE |
210 | and | 219 | and |
@@ -218,8 +227,9 @@ frees | |||
218 | .Fn PKCS7_ISSUER_AND_SERIAL_new | 227 | .Fn PKCS7_ISSUER_AND_SERIAL_new |
219 | allocates and initializes an empty | 228 | allocates and initializes an empty |
220 | .Vt PKCS7_ISSUER_AND_SERIAL | 229 | .Vt PKCS7_ISSUER_AND_SERIAL |
221 | object, representing an ASN.1 IssuerAndSerialNumber structure | 230 | object, representing an ASN.1 |
222 | defined in RFC 2315 section 6.7. | 231 | .Vt IssuerAndSerialNumber |
232 | structure defined in RFC 2315 section 6.7. | ||
223 | It can be used inside | 233 | It can be used inside |
224 | .Vt PKCS7_SIGNER_INFO | 234 | .Vt PKCS7_SIGNER_INFO |
225 | and | 235 | and |
diff --git a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 index d522dab9f8..8c6dba3514 100644 --- a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 +++ b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.1 2016/12/22 12:10:06 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 | 18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn PKCS8_PRIV_KEY_INFO_new | 31 | .Fn PKCS8_PRIV_KEY_INFO_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt PKCS8_PRIV_KEY_INFO | 33 | .Vt PKCS8_PRIV_KEY_INFO |
34 | object, representing an ASN.1 PrivateKeyInfo structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 5208 section 5. | 35 | .Vt PrivateKeyInfo |
36 | structure defined in RFC 5208 section 5. | ||
36 | It can hold a private key together with information about the | 37 | It can hold a private key together with information about the |
37 | algorithm to be used with it and optional attributes. | 38 | algorithm to be used with it and optional attributes. |
38 | .Pp | 39 | .Pp |
diff --git a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 index 3200b85fb4..888859b1e6 100644 --- a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 +++ b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.2 2016/12/24 08:19:04 jmc Exp $ | 1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKEY_USAGE_PERIOD_NEW 3 | 18 | .Dt PKEY_USAGE_PERIOD_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn PKEY_USAGE_PERIOD_new | 31 | .Fn PKEY_USAGE_PERIOD_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt PKEY_USAGE_PERIOD | 33 | .Vt PKEY_USAGE_PERIOD |
34 | object, representing an ASN.1 PrivateKeyUsagePeriod structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 3280 section 4.2.1.4. | 35 | .Vt PrivateKeyUsagePeriod |
36 | structure defined in RFC 3280 section 4.2.1.4. | ||
36 | It could be used in | 37 | It could be used in |
37 | .Vt X509 | 38 | .Vt X509 |
38 | certificates to specify a validity period for the private key | 39 | certificates to specify a validity period for the private key |
@@ -59,7 +60,8 @@ Certificate Revocation List (CRL) Profile, | |||
59 | section 4.2.1.4: Private Key Usage Period | 60 | section 4.2.1.4: Private Key Usage Period |
60 | .Pp | 61 | .Pp |
61 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 | 62 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 |
62 | in RFC 3280, which specified the PrivateKeyUsagePeriod certificate | 63 | in RFC 3280, which specified the |
63 | extension but deprecated its use, was removed. | 64 | .Vt PrivateKeyUsagePeriod |
65 | certificate extension but deprecated its use, was removed. | ||
64 | Use of this ISO standard extension is neither deprecated | 66 | Use of this ISO standard extension is neither deprecated |
65 | nor recommended for use in the Internet PKI." | 67 | nor recommended for use in the Internet PKI." |
diff --git a/src/lib/libcrypto/man/POLICYINFO_new.3 b/src/lib/libcrypto/man/POLICYINFO_new.3 index a76385fc6b..ea225a2d03 100644 --- a/src/lib/libcrypto/man/POLICYINFO_new.3 +++ b/src/lib/libcrypto/man/POLICYINFO_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.1 2016/12/23 18:50:23 schwarze Exp $ | 1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt POLICYINFO_NEW 3 | 18 | .Dt POLICYINFO_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -70,8 +70,9 @@ restrictions on their intended use. | |||
70 | .Fn POLICYINFO_new | 70 | .Fn POLICYINFO_new |
71 | allocates and initializes an empty | 71 | allocates and initializes an empty |
72 | .Vt POLICYINFO | 72 | .Vt POLICYINFO |
73 | object, representing an ASN.1 PolicyInformation structure | 73 | object, representing an ASN.1 |
74 | defined in RFC 5280 section 4.2.1.4. | 74 | .Vt PolicyInformation |
75 | structure defined in RFC 5280 section 4.2.1.4. | ||
75 | It can hold a policy identifier and optional advisory qualifiers. | 76 | It can hold a policy identifier and optional advisory qualifiers. |
76 | .Fn POLICYINFO_free | 77 | .Fn POLICYINFO_free |
77 | frees | 78 | frees |
@@ -94,8 +95,9 @@ frees | |||
94 | .Fn POLICYQUALINFO_new | 95 | .Fn POLICYQUALINFO_new |
95 | allocates and initializes an empty | 96 | allocates and initializes an empty |
96 | .Vt POLICYQUALINFO | 97 | .Vt POLICYQUALINFO |
97 | object, representing an ASN.1 PolicyQualifierInfo structure | 98 | object, representing an ASN.1 |
98 | defined in RFC 5280 section 4.2.1.4. | 99 | .Vt PolicyQualifierInfo |
100 | structure defined in RFC 5280 section 4.2.1.4. | ||
99 | It can be used in | 101 | It can be used in |
100 | .Vt POLICYINFO | 102 | .Vt POLICYINFO |
101 | and it can hold either a uniform resource identifier of a certification | 103 | and it can hold either a uniform resource identifier of a certification |
@@ -109,8 +111,9 @@ frees | |||
109 | .Fn USERNOTICE_new | 111 | .Fn USERNOTICE_new |
110 | allocates and initializes an empty | 112 | allocates and initializes an empty |
111 | .Vt USERNOTICE | 113 | .Vt USERNOTICE |
112 | object, representing an ASN.1 UserNotice structure | 114 | object, representing an ASN.1 |
113 | defined in RFC 5280 section 4.2.1.4. | 115 | .Vt UserNotice |
116 | structure defined in RFC 5280 section 4.2.1.4. | ||
114 | It can be used in | 117 | It can be used in |
115 | .Vt POLICYQUALINFO | 118 | .Vt POLICYQUALINFO |
116 | and it can hold either an | 119 | and it can hold either an |
@@ -125,8 +128,9 @@ frees | |||
125 | .Fn NOTICEREF_new | 128 | .Fn NOTICEREF_new |
126 | allocates and initializes an empty | 129 | allocates and initializes an empty |
127 | .Vt NOTICEREF | 130 | .Vt NOTICEREF |
128 | object, representing an ASN.1 NoticeReference structure | 131 | object, representing an ASN.1 |
129 | defined in RFC 5280 section 4.2.1.4. | 132 | .Vt NoticeReference |
133 | structure defined in RFC 5280 section 4.2.1.4. | ||
130 | It can be used in | 134 | It can be used in |
131 | .Vt USERNOTICE | 135 | .Vt USERNOTICE |
132 | and can hold an organization name and a stack of notice numbers. | 136 | and can hold an organization name and a stack of notice numbers. |
@@ -137,8 +141,9 @@ frees | |||
137 | .Fn POLICY_MAPPING_new | 141 | .Fn POLICY_MAPPING_new |
138 | allocates and initializes an empty | 142 | allocates and initializes an empty |
139 | .Vt POLICY_MAPPING | 143 | .Vt POLICY_MAPPING |
140 | object, representing an ASN.1 PolicyMappings structure | 144 | object, representing an ASN.1 |
141 | defined in RFC 5280 section 4.2.1.5. | 145 | .Vt PolicyMappings |
146 | structure defined in RFC 5280 section 4.2.1.5. | ||
142 | It can be used in | 147 | It can be used in |
143 | .Vt X509 | 148 | .Vt X509 |
144 | CA certificates and can hold a list of pairs of policy identifiers, | 149 | CA certificates and can hold a list of pairs of policy identifiers, |
@@ -151,8 +156,9 @@ frees | |||
151 | .Fn POLICY_CONSTRAINTS_new | 156 | .Fn POLICY_CONSTRAINTS_new |
152 | allocates and initializes an empty | 157 | allocates and initializes an empty |
153 | .Vt POLICY_CONSTRAINTS | 158 | .Vt POLICY_CONSTRAINTS |
154 | object, representing an ASN.1 PolicyConstraints structure | 159 | object, representing an ASN.1 |
155 | defined in RFC 5280 section 4.2.1.11. | 160 | .Vt PolicyConstraints |
161 | structure defined in RFC 5280 section 4.2.1.11. | ||
156 | It can be used in | 162 | It can be used in |
157 | .Vt X509 | 163 | .Vt X509 |
158 | CA certificates to restrict policy mapping and/or to require explicit | 164 | CA certificates to restrict policy mapping and/or to require explicit |
diff --git a/src/lib/libcrypto/man/PROXY_POLICY_new.3 b/src/lib/libcrypto/man/PROXY_POLICY_new.3 index eb4e963033..387ee3fb7f 100644 --- a/src/lib/libcrypto/man/PROXY_POLICY_new.3 +++ b/src/lib/libcrypto/man/PROXY_POLICY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.1 2016/12/23 23:19:57 schwarze Exp $ | 1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PROXY_POLICY_NEW 3 | 18 | .Dt PROXY_POLICY_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -43,8 +43,9 @@ privileges on behalf of the subject of the original certificate. | |||
43 | .Fn PROXY_POLICY_new | 43 | .Fn PROXY_POLICY_new |
44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
45 | .Vt PROXY_POLICY | 45 | .Vt PROXY_POLICY |
46 | object, representing an ASN.1 ProxyPolicy structure | 46 | object, representing an ASN.1 |
47 | defined in RFC 3820 section 3.8. | 47 | .Vt ProxyPolicy |
48 | structure defined in RFC 3820 section 3.8. | ||
48 | It defines which privileges are to be delegated. | 49 | It defines which privileges are to be delegated. |
49 | .Fn PROXY_POLICY_free | 50 | .Fn PROXY_POLICY_free |
50 | frees | 51 | frees |
@@ -53,8 +54,9 @@ frees | |||
53 | .Fn PROXY_CERT_INFO_EXTENSION_new | 54 | .Fn PROXY_CERT_INFO_EXTENSION_new |
54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
55 | .Vt PROXY_CERT_INFO_EXTENSION | 56 | .Vt PROXY_CERT_INFO_EXTENSION |
56 | object, representing an ASN.1 ProxyCertInfo structure | 57 | object, representing an ASN.1 |
57 | defined in RFC 3820 section 3.8. | 58 | .Vt ProxyCertInfo |
59 | structure defined in RFC 3820 section 3.8. | ||
58 | It can contain a | 60 | It can contain a |
59 | .Vt PROXY_POLICY | 61 | .Vt PROXY_POLICY |
60 | object, and it can additionally restrict the maximum depth of the | 62 | object, and it can additionally restrict the maximum depth of the |
diff --git a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 index 8d6817b8bd..25a1c25ed3 100644 --- a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 +++ b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.1 2016/12/13 20:41:35 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt RSA_PSS_PARAMS_NEW 3 | 18 | .Dt RSA_PSS_PARAMS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn RSA_PSS_PARAMS_new | 31 | .Fn RSA_PSS_PARAMS_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt RSA_PSS_PARAMS | 33 | .Vt RSA_PSS_PARAMS |
34 | object, representing an ASN.1 RSASSA-PSS-params structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 8017 appendix A.2.3. | 35 | .Vt RSASSA-PSS-params |
36 | structure defined in RFC 8017 appendix A.2.3. | ||
36 | It references the hash function and the mask generation function | 37 | It references the hash function and the mask generation function |
37 | and stores the length of the salt and the trailer field number. | 38 | and stores the length of the salt and the trailer field number. |
38 | .Fn RSA_PSS_PARAMS_free | 39 | .Fn RSA_PSS_PARAMS_free |
diff --git a/src/lib/libcrypto/man/TS_REQ_new.3 b/src/lib/libcrypto/man/TS_REQ_new.3 index d1a0e90f21..35da948436 100644 --- a/src/lib/libcrypto/man/TS_REQ_new.3 +++ b/src/lib/libcrypto/man/TS_REQ_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: TS_REQ_new.3,v 1.3 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: TS_REQ_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt TS_REQ_NEW 3 | 18 | .Dt TS_REQ_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -67,8 +67,9 @@ which returns time-stamp tokens to the clients. | |||
67 | .Fn TS_REQ_new | 67 | .Fn TS_REQ_new |
68 | allocates and initializes an empty | 68 | allocates and initializes an empty |
69 | .Vt TS_REQ | 69 | .Vt TS_REQ |
70 | object, representing an ASN.1 TimeStampReq structure | 70 | object, representing an ASN.1 |
71 | defined in RFC 3161 section 2.4.1. | 71 | .Vt TimeStampReq |
72 | structure defined in RFC 3161 section 2.4.1. | ||
72 | It can hold a hash of the datum to be time-stamped and some | 73 | It can hold a hash of the datum to be time-stamped and some |
73 | auxiliary, optional information. | 74 | auxiliary, optional information. |
74 | .Fn TS_REQ_free | 75 | .Fn TS_REQ_free |
@@ -78,8 +79,9 @@ frees | |||
78 | .Fn TS_RESP_new | 79 | .Fn TS_RESP_new |
79 | allocates and initializes an empty | 80 | allocates and initializes an empty |
80 | .Vt TS_RESP | 81 | .Vt TS_RESP |
81 | object, representing an ASN.1 TimeStampResp structure | 82 | object, representing an ASN.1 |
82 | defined in RFC 3161 section 2.4.2. | 83 | .Vt TimeStampResp |
84 | structure defined in RFC 3161 section 2.4.2. | ||
83 | It can hold status information and a time-stamp token. | 85 | It can hold status information and a time-stamp token. |
84 | .Fn TS_RESP_free | 86 | .Fn TS_RESP_free |
85 | frees | 87 | frees |
@@ -88,8 +90,9 @@ frees | |||
88 | .Fn TS_STATUS_INFO_new | 90 | .Fn TS_STATUS_INFO_new |
89 | allocates and initializes an empty | 91 | allocates and initializes an empty |
90 | .Vt TS_STATUS_INFO | 92 | .Vt TS_STATUS_INFO |
91 | object, representing an ASN.1 PKIStatusInfo structure | 93 | object, representing an ASN.1 |
92 | defined in RFC 3161 section 2.4.2. | 94 | .Vt PKIStatusInfo |
95 | structure defined in RFC 3161 section 2.4.2. | ||
93 | It is used inside | 96 | It is used inside |
94 | .Vt TS_RESP | 97 | .Vt TS_RESP |
95 | and describes the outcome of one time-stamp request. | 98 | and describes the outcome of one time-stamp request. |
@@ -100,8 +103,9 @@ frees | |||
100 | .Fn TS_TST_INFO_new | 103 | .Fn TS_TST_INFO_new |
101 | allocates and initializes an empty | 104 | allocates and initializes an empty |
102 | .Vt TS_TST_INFO | 105 | .Vt TS_TST_INFO |
103 | object, representing an ASN.1 TSTInfo structure | 106 | object, representing an ASN.1 |
104 | defined in RFC 3161 section 2.4.2. | 107 | .Vt TSTInfo |
108 | structure defined in RFC 3161 section 2.4.2. | ||
105 | It is the time-stamp token included in a | 109 | It is the time-stamp token included in a |
106 | .Vt TS_RESP | 110 | .Vt TS_RESP |
107 | object in case of success, and it can hold the hash of the datum | 111 | object in case of success, and it can hold the hash of the datum |
@@ -114,8 +118,9 @@ frees | |||
114 | .Fn TS_ACCURACY_new | 118 | .Fn TS_ACCURACY_new |
115 | allocates and initializes an empty | 119 | allocates and initializes an empty |
116 | .Vt TS_ACCURACY | 120 | .Vt TS_ACCURACY |
117 | object, representing an ASN.1 Accuracy structure | 121 | object, representing an ASN.1 |
118 | defined in RFC 3161 section 2.4.2. | 122 | .Vt Accuracy |
123 | structure defined in RFC 3161 section 2.4.2. | ||
119 | It can be used inside a | 124 | It can be used inside a |
120 | .Vt TS_TST_INFO | 125 | .Vt TS_TST_INFO |
121 | object and indicates the maximum error of the time stated in the token. | 126 | object and indicates the maximum error of the time stated in the token. |
@@ -126,8 +131,9 @@ frees | |||
126 | .Fn TS_MSG_IMPRINT_new | 131 | .Fn TS_MSG_IMPRINT_new |
127 | allocates and initializes an empty | 132 | allocates and initializes an empty |
128 | .Vt TS_MSG_IMPRINT | 133 | .Vt TS_MSG_IMPRINT |
129 | object, representing an ASN.1 MessageImprint structure | 134 | object, representing an ASN.1 |
130 | defined in RFC 3161 section 2.4.1. | 135 | .Vt MessageImprint |
136 | structure defined in RFC 3161 section 2.4.1. | ||
131 | It is used inside | 137 | It is used inside |
132 | .Vt TS_REQ | 138 | .Vt TS_REQ |
133 | and | 139 | and |
diff --git a/src/lib/libcrypto/man/X509_ALGOR_dup.3 b/src/lib/libcrypto/man/X509_ALGOR_dup.3 index 7a46b372c2..b1a28e11ba 100644 --- a/src/lib/libcrypto/man/X509_ALGOR_dup.3 +++ b/src/lib/libcrypto/man/X509_ALGOR_dup.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.4 2016/12/15 23:29:38 jmc Exp $ | 1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 | 2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 15 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_ALGOR_DUP 3 | 69 | .Dt X509_ALGOR_DUP 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -115,8 +115,9 @@ | |||
115 | .Fn X509_ALGOR_new | 115 | .Fn X509_ALGOR_new |
116 | allocates and initializes an empty | 116 | allocates and initializes an empty |
117 | .Vt X509_ALGOR | 117 | .Vt X509_ALGOR |
118 | object, representing an ASN.1 AlgorithmIdentifier structure | 118 | object, representing an ASN.1 |
119 | defined in RFC 5280 section 4.1.1.2. | 119 | .Vt AlgorithmIdentifier |
120 | structure defined in RFC 5280 section 4.1.1.2. | ||
120 | Such objects can specify a cryptographic algorithm together | 121 | Such objects can specify a cryptographic algorithm together |
121 | with algorithm-specific parameters. | 122 | with algorithm-specific parameters. |
122 | They are used by many other objects, for example certificates, | 123 | They are used by many other objects, for example certificates, |
diff --git a/src/lib/libcrypto/man/X509_CINF_new.3 b/src/lib/libcrypto/man/X509_CINF_new.3 index fdfc4c8c7b..7ac86b6d36 100644 --- a/src/lib/libcrypto/man/X509_CINF_new.3 +++ b/src/lib/libcrypto/man/X509_CINF_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_CINF_new.3,v 1.1 2016/12/16 09:17:59 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CINF_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 16 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_CINF_NEW 3 | 18 | .Dt X509_CINF_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -43,8 +43,9 @@ | |||
43 | .Fn X509_CINF_new | 43 | .Fn X509_CINF_new |
44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
45 | .Vt X509_CINF | 45 | .Vt X509_CINF |
46 | object, representing an ASN.1 TBSCertificate structure | 46 | object, representing an ASN.1 |
47 | defined in RFC 5280 section 4.1. | 47 | .Vt TBSCertificate |
48 | structure defined in RFC 5280 section 4.1. | ||
48 | It is used inside the | 49 | It is used inside the |
49 | .Vt X509 | 50 | .Vt X509 |
50 | object and holds the main information contained in the X.509 | 51 | object and holds the main information contained in the X.509 |
@@ -57,8 +58,9 @@ frees | |||
57 | .Fn X509_VAL_new | 58 | .Fn X509_VAL_new |
58 | allocates and initializes an empty | 59 | allocates and initializes an empty |
59 | .Vt X509_VAL | 60 | .Vt X509_VAL |
60 | object, representing an ASN.1 Validity structure | 61 | object, representing an ASN.1 |
61 | defined in RFC 5280 section 4.1. | 62 | .Vt Validity |
63 | structure defined in RFC 5280 section 4.1. | ||
62 | It is used inside the | 64 | It is used inside the |
63 | .Vt X509_CINF | 65 | .Vt X509_CINF |
64 | object and holds the validity period of the certificate. | 66 | object and holds the validity period of the certificate. |
diff --git a/src/lib/libcrypto/man/X509_CRL_new.3 b/src/lib/libcrypto/man/X509_CRL_new.3 index 03a0caa5be..2f35b100cb 100644 --- a/src/lib/libcrypto/man/X509_CRL_new.3 +++ b/src/lib/libcrypto/man/X509_CRL_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_CRL_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CRL_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_CRL_NEW 3 | 18 | .Dt X509_CRL_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn X509_CRL_new | 37 | .Fn X509_CRL_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt X509_CRL | 39 | .Vt X509_CRL |
40 | object, representing an ASN.1 CertificateList structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 5280 section 5.1. | 41 | .Vt CertificateList |
42 | structure defined in RFC 5280 section 5.1. | ||
42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
43 | .Vt X509_CRL_INFO | 44 | .Vt X509_CRL_INFO |
44 | object discussed below together with a cryptographic signature | 45 | object discussed below together with a cryptographic signature |
@@ -50,8 +51,9 @@ frees | |||
50 | .Fn X509_CRL_INFO_new | 51 | .Fn X509_CRL_INFO_new |
51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
52 | .Vt X509_CRL_INFO | 53 | .Vt X509_CRL_INFO |
53 | object, representing an ASN.1 TBSCertList structure | 54 | object, representing an ASN.1 |
54 | defined in RFC 5280 section 5.1. | 55 | .Vt TBSCertList |
56 | structure defined in RFC 5280 section 5.1. | ||
55 | It is used inside the | 57 | It is used inside the |
56 | .Vt X509_CRL | 58 | .Vt X509_CRL |
57 | object and can hold a list of revoked certificates, an issuer name, | 59 | object and can hold a list of revoked certificates, an issuer name, |
diff --git a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 index b9a33ce137..850be6e66b 100644 --- a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 +++ b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.4 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_EXTENSION_SET_OBJECT 3 | 69 | .Dt X509_EXTENSION_SET_OBJECT 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -131,8 +131,9 @@ | |||
131 | .Fn X509_EXTENSION_new | 131 | .Fn X509_EXTENSION_new |
132 | allocates and initializes an empty | 132 | allocates and initializes an empty |
133 | .Vt X509_EXTENSION | 133 | .Vt X509_EXTENSION |
134 | object, representing an ASN.1 Extension structure | 134 | object, representing an ASN.1 |
135 | defined in RFC 5280 section 4.1. | 135 | .Vt Extension |
136 | structure defined in RFC 5280 section 4.1. | ||
136 | It is a wrapper object around specific extension objects of different | 137 | It is a wrapper object around specific extension objects of different |
137 | types and stores an extension type identifier and a criticality | 138 | types and stores an extension type identifier and a criticality |
138 | flag in addition to the DER-encoded form of the wrapped object. | 139 | flag in addition to the DER-encoded form of the wrapped object. |
diff --git a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 index bfd4fb2536..e11a4b7708 100644 --- a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 +++ b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.5 2016/12/14 21:22:06 jmc Exp $ | 1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 | 69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -134,9 +134,12 @@ | |||
134 | .Fa "int len" | 134 | .Fa "int len" |
135 | .Fc | 135 | .Fc |
136 | .Sh DESCRIPTION | 136 | .Sh DESCRIPTION |
137 | An X.501 RelativeDistinguishedName is a set of field type and | 137 | An X.501 |
138 | value pairs. | 138 | .Vt RelativeDistinguishedName |
139 | It is the building block for constructing X.501 Name objects. | 139 | is a set of field type and value pairs. |
140 | It is the building block for constructing X.501 | ||
141 | .Vt Name | ||
142 | objects. | ||
140 | This implementation only supports sets with one element, so an | 143 | This implementation only supports sets with one element, so an |
141 | .Vt X509_NAME_ENTRY | 144 | .Vt X509_NAME_ENTRY |
142 | object contains only one field type and one value. | 145 | object contains only one field type and one value. |
@@ -144,8 +147,9 @@ object contains only one field type and one value. | |||
144 | .Fn X509_NAME_ENTRY_new | 147 | .Fn X509_NAME_ENTRY_new |
145 | allocates and initializes an empty | 148 | allocates and initializes an empty |
146 | .Vt X509_NAME_ENTRY | 149 | .Vt X509_NAME_ENTRY |
147 | object, representing an ASN.1 RelativeDistinguishedName structure | 150 | object, representing an ASN.1 |
148 | defined in RFC 5280 section 4.1.2.4. | 151 | .Vt RelativeDistinguishedName |
152 | structure defined in RFC 5280 section 4.1.2.4. | ||
149 | .Pp | 153 | .Pp |
150 | .Fn X509_NAME_ENTRY_free | 154 | .Fn X509_NAME_ENTRY_free |
151 | frees | 155 | frees |
diff --git a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 index 6260e5f345..50e23829bd 100644 --- a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 +++ b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 | 53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -197,7 +197,9 @@ can be set to -1 and | |||
197 | to 0. | 197 | to 0. |
198 | This adds a new entry to the end of | 198 | This adds a new entry to the end of |
199 | .Fa name | 199 | .Fa name |
200 | as a single valued RelativeDistinguishedName (RDN). | 200 | as a single valued |
201 | .Vt RelativeDistinguishedName | ||
202 | (RDN). | ||
201 | .Pp | 203 | .Pp |
202 | .Fa loc | 204 | .Fa loc |
203 | actually determines the index where the new entry is inserted: | 205 | actually determines the index where the new entry is inserted: |
diff --git a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 index 6da0661831..b6571ccc1d 100644 --- a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 +++ b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 | 53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -103,8 +103,8 @@ These functions allow an | |||
103 | structure to be examined. | 103 | structure to be examined. |
104 | The | 104 | The |
105 | .Vt X509_NAME | 105 | .Vt X509_NAME |
106 | structure is the same as the | 106 | structure is the same as the ASN.1 |
107 | .Sy Name | 107 | .Vt Name |
108 | type defined in RFC 2459 (and elsewhere) and used, for example, | 108 | type defined in RFC 2459 (and elsewhere) and used, for example, |
109 | in certificate subject and issuer names. | 109 | in certificate subject and issuer names. |
110 | .Pp | 110 | .Pp |
@@ -235,7 +235,10 @@ are legacy functions which have various limitations which make them of | |||
235 | minimal use in practice. | 235 | minimal use in practice. |
236 | They can only find the first matching entry and will copy the contents | 236 | They can only find the first matching entry and will copy the contents |
237 | of the field verbatim: this can be highly confusing if the target is a | 237 | of the field verbatim: this can be highly confusing if the target is a |
238 | multicharacter string type like a BMPString or a UTF8String. | 238 | multicharacter string type like a |
239 | .Vt BMPString | ||
240 | or a | ||
241 | .Vt UTF8String . | ||
239 | .Pp | 242 | .Pp |
240 | For a more general solution, | 243 | For a more general solution, |
241 | .Fn X509_NAME_get_index_by_NID | 244 | .Fn X509_NAME_get_index_by_NID |
diff --git a/src/lib/libcrypto/man/X509_NAME_new.3 b/src/lib/libcrypto/man/X509_NAME_new.3 index 5666635198..c4efab7784 100644 --- a/src/lib/libcrypto/man/X509_NAME_new.3 +++ b/src/lib/libcrypto/man/X509_NAME_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_NAME_NEW 3 | 18 | .Dt X509_NAME_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,12 +31,16 @@ | |||
31 | .Ft void | 31 | .Ft void |
32 | .Fn X509_NAME_free "X509_NAME *name" | 32 | .Fn X509_NAME_free "X509_NAME *name" |
33 | .Sh DESCRIPTION | 33 | .Sh DESCRIPTION |
34 | An X.501 Name is an ordered sequence of relative distinguished names. | 34 | An X.501 |
35 | .Vt Name | ||
36 | is an ordered sequence of relative distinguished names. | ||
35 | A relative distinguished name is a set of key-value pairs; see | 37 | A relative distinguished name is a set of key-value pairs; see |
36 | .Xr X509_NAME_ENTRY_new 3 | 38 | .Xr X509_NAME_ENTRY_new 3 |
37 | for details. | 39 | for details. |
38 | .Pp | 40 | .Pp |
39 | Various X.509 structures contain X.501 Name substructures. | 41 | Various X.509 structures contain X.501 |
42 | .Vt Name | ||
43 | substructures. | ||
40 | They are for example used for the issuers of certificates and | 44 | They are for example used for the issuers of certificates and |
41 | certificate revocation lists and for the subjects of certificates | 45 | certificate revocation lists and for the subjects of certificates |
42 | and certificate requests. | 46 | and certificate requests. |
@@ -44,8 +48,9 @@ and certificate requests. | |||
44 | .Fn X509_NAME_new | 48 | .Fn X509_NAME_new |
45 | allocates and initializes an empty | 49 | allocates and initializes an empty |
46 | .Vt X509_NAME | 50 | .Vt X509_NAME |
47 | object, representing an ASN.1 Name structure | 51 | object, representing an ASN.1 |
48 | defined in RFC 5280 section 4.1.2.4. | 52 | .Vt Name |
53 | structure defined in RFC 5280 section 4.1.2.4. | ||
49 | Data can be added to such objects with the functions described in | 54 | Data can be added to such objects with the functions described in |
50 | .Xr X509_NAME_add_entry_by_txt 3 , | 55 | .Xr X509_NAME_add_entry_by_txt 3 , |
51 | and they can be inspected with the functions described in | 56 | and they can be inspected with the functions described in |
diff --git a/src/lib/libcrypto/man/X509_NAME_print_ex.3 b/src/lib/libcrypto/man/X509_NAME_print_ex.3 index 0e3ef11284..1342a200ad 100644 --- a/src/lib/libcrypto/man/X509_NAME_print_ex.3 +++ b/src/lib/libcrypto/man/X509_NAME_print_ex.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_PRINT_EX 3 | 53 | .Dt X509_NAME_PRINT_EX 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -174,8 +174,8 @@ and | |||
174 | .Dv XN_FLAG_SEP_MULTILINE | 174 | .Dv XN_FLAG_SEP_MULTILINE |
175 | determine the field separators to use. | 175 | determine the field separators to use. |
176 | Two distinct separators are used between distinct | 176 | Two distinct separators are used between distinct |
177 | RelativeDistinguishedName components and separate values in the same RDN | 177 | .Vt RelativeDistinguishedName |
178 | for a multi-valued RDN. | 178 | components and separate values in the same RDN for a multi-valued RDN. |
179 | Multi-valued RDNs are currently very rare so the second separator | 179 | Multi-valued RDNs are currently very rare so the second separator |
180 | will hardly ever be used. | 180 | will hardly ever be used. |
181 | .Pp | 181 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_PUBKEY_new.3 b/src/lib/libcrypto/man/X509_PUBKEY_new.3 index cd178a1ee0..0475fe65b2 100644 --- a/src/lib/libcrypto/man/X509_PUBKEY_new.3 +++ b/src/lib/libcrypto/man/X509_PUBKEY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.3 2016/12/15 22:24:45 schwarze Exp $ | 1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt X509_PUBKEY_NEW 3 | 52 | .Dt X509_PUBKEY_NEW 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -133,9 +133,10 @@ | |||
133 | .Sh DESCRIPTION | 133 | .Sh DESCRIPTION |
134 | The | 134 | The |
135 | .Vt X509_PUBKEY | 135 | .Vt X509_PUBKEY |
136 | structure represents the ASN.1 SubjectPublicKeyInfo structure defined | 136 | structure represents the ASN.1 |
137 | in RFC 5280 section 4.1 and used in certificates and certificate | 137 | .Vt SubjectPublicKeyInfo |
138 | requests. | 138 | structure defined in RFC 5280 section 4.1 and used in certificates |
139 | and certificate requests. | ||
139 | .Pp | 140 | .Pp |
140 | .Fn X509_PUBKEY_new | 141 | .Fn X509_PUBKEY_new |
141 | allocates and initializes an | 142 | allocates and initializes an |
@@ -179,7 +180,9 @@ and | |||
179 | .Fn i2d_PUBKEY | 180 | .Fn i2d_PUBKEY |
180 | decode and encode an | 181 | decode and encode an |
181 | .Vt EVP_PKEY | 182 | .Vt EVP_PKEY |
182 | structure using SubjectPublicKeyInfo format. | 183 | structure using |
184 | .Vt SubjectPublicKeyInfo | ||
185 | format. | ||
183 | They otherwise follow the conventions of other ASN.1 functions such as | 186 | They otherwise follow the conventions of other ASN.1 functions such as |
184 | .Xr d2i_X509 3 . | 187 | .Xr d2i_X509 3 . |
185 | .Pp | 188 | .Pp |
@@ -225,7 +228,9 @@ bytes at | |||
225 | .Pf * Fa pk , | 228 | .Pf * Fa pk , |
226 | and | 229 | and |
227 | .Pf * Fa pa | 230 | .Pf * Fa pa |
228 | is set to the associated AlgorithmIdentifier for the public key. | 231 | is set to the associated |
232 | .Vt AlgorithmIdentifier | ||
233 | for the public key. | ||
229 | If the value of any of these parameters is not required, | 234 | If the value of any of these parameters is not required, |
230 | it can be set to | 235 | it can be set to |
231 | .Dv NULL . | 236 | .Dv NULL . |
diff --git a/src/lib/libcrypto/man/X509_REQ_new.3 b/src/lib/libcrypto/man/X509_REQ_new.3 index f4089ba2a2..76da125898 100644 --- a/src/lib/libcrypto/man/X509_REQ_new.3 +++ b/src/lib/libcrypto/man/X509_REQ_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_REQ_new.3,v 1.1 2016/12/17 01:08:14 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REQ_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 17 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_REQ_NEW 3 | 18 | .Dt X509_REQ_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn X509_REQ_new | 37 | .Fn X509_REQ_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt X509_REQ | 39 | .Vt X509_REQ |
40 | object, representing an ASN.1 CertificationRequest structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 2986 section 4.2. | 41 | .Vt CertificationRequest |
42 | structure defined in RFC 2986 section 4.2. | ||
42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
43 | .Vt X509_REQ_INFO | 44 | .Vt X509_REQ_INFO |
44 | object discussed below together with a cryptographic signature and | 45 | object discussed below together with a cryptographic signature and |
@@ -50,8 +51,9 @@ frees | |||
50 | .Fn X509_REQ_INFO_new | 51 | .Fn X509_REQ_INFO_new |
51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
52 | .Vt X509_REQ_INFO | 53 | .Vt X509_REQ_INFO |
53 | object, representing an ASN.1 CertificationRequestInfo structure | 54 | object, representing an ASN.1 |
54 | defined in RFC 2986 section 4.1. | 55 | .Vt CertificationRequestInfo |
56 | structure defined in RFC 2986 section 4.1. | ||
55 | It is used inside the | 57 | It is used inside the |
56 | .Vt X509_REQ | 58 | .Vt X509_REQ |
57 | object and can hold the subject and the public key of the requested | 59 | object and can hold the subject and the public key of the requested |
diff --git a/src/lib/libcrypto/man/X509_REVOKED_new.3 b/src/lib/libcrypto/man/X509_REVOKED_new.3 index 2303f9caf2..f06075fcc2 100644 --- a/src/lib/libcrypto/man/X509_REVOKED_new.3 +++ b/src/lib/libcrypto/man/X509_REVOKED_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.1 2016/12/16 14:50:58 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 16 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_REVOKED_NEW 3 | 69 | .Dt X509_REVOKED_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -95,8 +95,9 @@ | |||
95 | allocates and initializes an empty | 95 | allocates and initializes an empty |
96 | .Vt X509_REVOKED | 96 | .Vt X509_REVOKED |
97 | object, representing one of the elements of | 97 | object, representing one of the elements of |
98 | the revokedCertificates field of the ASN.1 TBSCertList structure | 98 | the revokedCertificates field of the ASN.1 |
99 | defined in RFC 5280 section 5.1. | 99 | .Vt TBSCertList |
100 | structure defined in RFC 5280 section 5.1. | ||
100 | It is used by | 101 | It is used by |
101 | .Vt X509_CRL | 102 | .Vt X509_CRL |
102 | objects and can hold information about one revoked certificate | 103 | objects and can hold information about one revoked certificate |
diff --git a/src/lib/libcrypto/man/X509_SIG_new.3 b/src/lib/libcrypto/man/X509_SIG_new.3 index e4ad5b0085..6d41ababc6 100644 --- a/src/lib/libcrypto/man/X509_SIG_new.3 +++ b/src/lib/libcrypto/man/X509_SIG_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_SIG_new.3,v 1.1 2016/12/22 14:06:51 schwarze Exp $ | 1 | .\" $OpenBSD: X509_SIG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_SIG_NEW 3 | 18 | .Dt X509_SIG_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,10 @@ | |||
31 | .Fn X509_SIG_new | 31 | .Fn X509_SIG_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt X509_SIG | 33 | .Vt X509_SIG |
34 | object, representing an ASN.1 DigestInfo structure defined | 34 | object, representing an ASN.1 |
35 | in RFC 2315 section 9.4 and equivalently in RFC 8017 section 9.2. | 35 | .Vt DigestInfo |
36 | structure defined in RFC 2315 section 9.4 | ||
37 | and equivalently in RFC 8017 section 9.2. | ||
36 | It can hold a message digest together with information about | 38 | It can hold a message digest together with information about |
37 | the algorithm used. | 39 | the algorithm used. |
38 | .Pp | 40 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 index 2f0924c209..3a871ef307 100644 --- a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 +++ b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.4 2016/12/05 13:38:05 schwarze Exp $ | 1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 5 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_STORE_CTX_GET_ERROR 3 | 53 | .Dt X509_STORE_CTX_GET_ERROR 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -202,7 +202,9 @@ expected value. | |||
202 | Unused. | 202 | Unused. |
203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ | 203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ |
204 | No unable to decode issuer public key | 204 | No unable to decode issuer public key |
205 | The public key in the certificate SubjectPublicKeyInfo could not be read. | 205 | The public key in the certificate |
206 | .Vt SubjectPublicKeyInfo | ||
207 | could not be read. | ||
206 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure | 208 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure |
207 | The signature of the certificate is invalid. | 209 | The signature of the certificate is invalid. |
208 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure | 210 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure |
diff --git a/src/lib/libcrypto/man/X509_new.3 b/src/lib/libcrypto/man/X509_new.3 index 1294ae3edd..dbf82bc974 100644 --- a/src/lib/libcrypto/man/X509_new.3 +++ b/src/lib/libcrypto/man/X509_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_new.3,v 1.9 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_new.3,v 1.10 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 | 2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 24 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt X509_NEW 3 | 52 | .Dt X509_NEW 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -73,8 +73,9 @@ | |||
73 | allocates and initializes an empty | 73 | allocates and initializes an empty |
74 | .Vt X509 | 74 | .Vt X509 |
75 | object with reference count 1. | 75 | object with reference count 1. |
76 | It represents an ASN.1 Certificate structure | 76 | It represents an ASN.1 |
77 | defined in RFC 5280 section 4.1. | 77 | .Vt Certificate |
78 | structure defined in RFC 5280 section 4.1. | ||
78 | It can hold a public key together with information about the person, | 79 | It can hold a public key together with information about the person, |
79 | organization, device, or function the associated private key belongs to. | 80 | organization, device, or function the associated private key belongs to. |
80 | .Pp | 81 | .Pp |
diff --git a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 index 6f51229ec7..22d904157f 100644 --- a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 +++ b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.5 2016/12/11 12:21:48 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and |
@@ -50,7 +50,7 @@ | |||
50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | .\" | 52 | .\" |
53 | .Dd $Mdocdate: December 11 2016 $ | 53 | .Dd $Mdocdate: December 25 2016 $ |
54 | .Dt D2I_RSAPUBLICKEY 3 | 54 | .Dt D2I_RSAPUBLICKEY 3 |
55 | .Os | 55 | .Os |
56 | .Sh NAME | 56 | .Sh NAME |
@@ -140,12 +140,15 @@ | |||
140 | .Fn d2i_RSAPublicKey | 140 | .Fn d2i_RSAPublicKey |
141 | and | 141 | and |
142 | .Fn i2d_RSAPublicKey | 142 | .Fn i2d_RSAPublicKey |
143 | decode and encode a PKCS#1 RSAPublicKey structure. | 143 | decode and encode a PKCS#1 |
144 | .Vt RSAPublicKey | ||
145 | structure. | ||
144 | .Pp | 146 | .Pp |
145 | .Fn d2i_RSA_PUBKEY | 147 | .Fn d2i_RSA_PUBKEY |
146 | and | 148 | and |
147 | .Fn i2d_RSA_PUBKEY | 149 | .Fn i2d_RSA_PUBKEY |
148 | decode and encode an RSA public key using a SubjectPublicKeyInfo | 150 | decode and encode an RSA public key using an ASN.1 |
151 | .Vt SubjectPublicKeyInfo | ||
149 | (certificate public key) structure. | 152 | (certificate public key) structure. |
150 | .Pp | 153 | .Pp |
151 | .Fn d2i_RSA_PUBKEY_bio , | 154 | .Fn d2i_RSA_PUBKEY_bio , |
@@ -165,7 +168,9 @@ pointer. | |||
165 | .Pp | 168 | .Pp |
166 | .Fn d2i_RSAPrivateKey , | 169 | .Fn d2i_RSAPrivateKey , |
167 | .Fn i2d_RSAPrivateKey | 170 | .Fn i2d_RSAPrivateKey |
168 | decode and encode a PKCS#1 RSAPrivateKey structure. | 171 | decode and encode a PKCS#1 |
172 | .Vt RSAPrivateKey | ||
173 | structure. | ||
169 | .Pp | 174 | .Pp |
170 | .Fn d2i_Netscape_RSA , | 175 | .Fn d2i_Netscape_RSA , |
171 | .Fn i2d_Netscape_RSA | 176 | .Fn i2d_Netscape_RSA |
diff --git a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 index 858396f5fe..7514e5fac5 100644 --- a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 +++ b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.5 2016/12/15 22:09:22 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 | 2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt D2I_X509_ALGOR 3 | 52 | .Dt D2I_X509_ALGOR 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -71,8 +71,8 @@ | |||
71 | .Sh DESCRIPTION | 71 | .Sh DESCRIPTION |
72 | These functions decode and encode an | 72 | These functions decode and encode an |
73 | .Vt X509_ALGOR | 73 | .Vt X509_ALGOR |
74 | structure which is equivalent to the | 74 | structure which is equivalent to the ASN.1 |
75 | .Sy AlgorithmIdentifier | 75 | .Vt AlgorithmIdentifier |
76 | structure. | 76 | structure. |
77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/d2i_X509_NAME.3 b/src/lib/libcrypto/man/d2i_X509_NAME.3 index 0dacb648c7..d3c085784e 100644 --- a/src/lib/libcrypto/man/d2i_X509_NAME.3 +++ b/src/lib/libcrypto/man/d2i_X509_NAME.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.6 2016/12/14 17:26:35 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 | 2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 |
3 | .\" | 3 | .\" |
4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
@@ -15,7 +15,7 @@ | |||
15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
17 | .\" | 17 | .\" |
18 | .Dd $Mdocdate: December 14 2016 $ | 18 | .Dd $Mdocdate: December 25 2016 $ |
19 | .Dt D2I_X509_NAME 3 | 19 | .Dt D2I_X509_NAME 3 |
20 | .Os | 20 | .Os |
21 | .Sh NAME | 21 | .Sh NAME |
@@ -67,7 +67,9 @@ decodes | |||
67 | .Fa length | 67 | .Fa length |
68 | bytes of the DER-encoded string | 68 | bytes of the DER-encoded string |
69 | .Pf * Fa in | 69 | .Pf * Fa in |
70 | and stores the resulting Name object in | 70 | and stores the resulting |
71 | .Vt Name | ||
72 | object in | ||
71 | .Pf * Fa name . | 73 | .Pf * Fa name . |
72 | .Pp | 74 | .Pp |
73 | .Fn i2d_X509_NAME | 75 | .Fn i2d_X509_NAME |
@@ -89,7 +91,9 @@ decodes | |||
89 | .Fa length | 91 | .Fa length |
90 | bytes of the DER-encoded string | 92 | bytes of the DER-encoded string |
91 | .Pf * Fa in | 93 | .Pf * Fa in |
92 | and stores the resulting RelativeDistinguishedName object in | 94 | and stores the resulting |
95 | .Vt RelativeDistinguishedName | ||
96 | object in | ||
93 | .Pf * Fa ne . | 97 | .Pf * Fa ne . |
94 | .Pp | 98 | .Pp |
95 | .Fn i2d_X509_NAME_ENTRY | 99 | .Fn i2d_X509_NAME_ENTRY |
diff --git a/src/lib/libcrypto/man/d2i_X509_SIG.3 b/src/lib/libcrypto/man/d2i_X509_SIG.3 index 8466ccfe7f..33676b6df0 100644 --- a/src/lib/libcrypto/man/d2i_X509_SIG.3 +++ b/src/lib/libcrypto/man/d2i_X509_SIG.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.4 2016/12/08 20:22:08 jmc Exp $ | 1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 8 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt D2I_X509_SIG 3 | 52 | .Dt D2I_X509_SIG 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -72,7 +72,7 @@ | |||
72 | These functions decode and encode an | 72 | These functions decode and encode an |
73 | .Vt X509_SIG | 73 | .Vt X509_SIG |
74 | structure, which is equivalent to the | 74 | structure, which is equivalent to the |
75 | .Sy DigestInfo | 75 | .Vt DigestInfo |
76 | structure defined in PKCS#1 and PKCS#7. | 76 | structure defined in PKCS#1 and PKCS#7. |
77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/x509v3.cnf.5 b/src/lib/libcrypto/man/x509v3.cnf.5 index 1fd4c0cc9f..19608697e3 100644 --- a/src/lib/libcrypto/man/x509v3.cnf.5 +++ b/src/lib/libcrypto/man/x509v3.cnf.5 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: x509v3.cnf.5,v 1.2 2016/12/12 22:02:55 jmc Exp $ | 1 | .\" $OpenBSD: x509v3.cnf.5,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 12 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509V3.CNF 5 | 53 | .Dt X509V3.CNF 5 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -530,8 +530,11 @@ The | |||
530 | option changes the type of the | 530 | option changes the type of the |
531 | .Ic organization | 531 | .Ic organization |
532 | field. | 532 | field. |
533 | In RFC 2459, it can only be of type DisplayText. | 533 | In RFC 2459, it can only be of type |
534 | In RFC 3280, IA5Strring is also permissible. | 534 | .Vt DisplayText . |
535 | In RFC 3280, | ||
536 | .Vt IA5String | ||
537 | is also permissible. | ||
535 | Some software (for example some versions of MSIE) may require | 538 | Some software (for example some versions of MSIE) may require |
536 | .Ic ia5org . | 539 | .Ic ia5org . |
537 | .Ss Policy constraints | 540 | .Ss Policy constraints |