diff options
| author | schwarze <> | 2019-08-18 12:06:51 +0000 |
|---|---|---|
| committer | schwarze <> | 2019-08-18 12:06:51 +0000 |
| commit | 0fc04f9f313a0675c6689b0b146c615e2005c6d8 (patch) | |
| tree | c07653e3f91a7205f7af074ddae021ab713bba90 /src | |
| parent | 8287ed3c26f4dba696df881277cbd91ece5196fb (diff) | |
| download | openbsd-0fc04f9f313a0675c6689b0b146c615e2005c6d8.tar.gz openbsd-0fc04f9f313a0675c6689b0b146c615e2005c6d8.tar.bz2 openbsd-0fc04f9f313a0675c6689b0b146c615e2005c6d8.zip | |
minor cleanup:
* add the missing STANDARDS sections
* mark up ASN.1 type names
* GOST does not need an ENGINE in LibreSSL, so don't use it as an example
* and minor wording improvements and typo fixes
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/man/CMS_sign.3 | 49 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_sign_receipt.3 | 21 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_verify.3 | 38 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_verify_receipt.3 | 20 |
4 files changed, 74 insertions, 54 deletions
diff --git a/src/lib/libcrypto/man/CMS_sign.3 b/src/lib/libcrypto/man/CMS_sign.3 index 1ef0f2d48a..1dfd153ee2 100644 --- a/src/lib/libcrypto/man/CMS_sign.3 +++ b/src/lib/libcrypto/man/CMS_sign.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_sign.3,v 1.5 2019/08/12 16:17:50 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_sign.3,v 1.6 2019/08/18 12:06:51 schwarze Exp $ |
| 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: August 12 2019 $ | 51 | .Dd $Mdocdate: August 18 2019 $ |
| 52 | .Dt CMS_SIGN 3 | 52 | .Dt CMS_SIGN 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -66,7 +66,9 @@ | |||
| 66 | .Fc | 66 | .Fc |
| 67 | .Sh DESCRIPTION | 67 | .Sh DESCRIPTION |
| 68 | .Fn CMS_sign | 68 | .Fn CMS_sign |
| 69 | creates and returns a CMS SignedData structure. | 69 | creates and returns a CMS |
| 70 | .Vt SignedData | ||
| 71 | structure. | ||
| 70 | .Fa signcert | 72 | .Fa signcert |
| 71 | is the certificate to sign with, | 73 | is the certificate to sign with, |
| 72 | .Fa pkey | 74 | .Fa pkey |
| @@ -80,12 +82,9 @@ Any or all of these parameters can be | |||
| 80 | The data to be signed is read from | 82 | The data to be signed is read from |
| 81 | .Fa data . | 83 | .Fa data . |
| 82 | .Pp | 84 | .Pp |
| 83 | .Fa flags | ||
| 84 | is an optional set of flags. | ||
| 85 | .Pp | ||
| 86 | Any of the following flags (OR'ed together) can be passed in the | 85 | Any of the following flags (OR'ed together) can be passed in the |
| 87 | .Fa flags | 86 | .Fa flags |
| 88 | parameter: | 87 | argument: |
| 89 | .Bl -tag -width Ds | 88 | .Bl -tag -width Ds |
| 90 | .It Dv CMS_TEXT | 89 | .It Dv CMS_TEXT |
| 91 | Prepend MIME headers for the type text/plain to the data. | 90 | Prepend MIME headers for the type text/plain to the data. |
| @@ -98,8 +97,8 @@ structure. | |||
| 98 | The signer's certificate must still be supplied in the | 97 | The signer's certificate must still be supplied in the |
| 99 | .Fa signcert | 98 | .Fa signcert |
| 100 | parameter though. | 99 | parameter though. |
| 101 | This can reduce the size of the signature if the signers certificate can | 100 | This can reduce the size of the signature if the signer's certificate can |
| 102 | be obtained by other means: for example a previously signed message. | 101 | be obtained by other means, for example from a previously signed message. |
| 103 | .It Dv CMS_DETACHED | 102 | .It Dv CMS_DETACHED |
| 104 | Omit the data being signed from the | 103 | Omit the data being signed from the |
| 105 | .Vt CMS_ContentInfo | 104 | .Vt CMS_ContentInfo |
| @@ -114,19 +113,25 @@ even though that is required by the S/MIME specifications. | |||
| 114 | This option should be used if the supplied data is in binary format. | 113 | This option should be used if the supplied data is in binary format. |
| 115 | Otherwise the translation will corrupt it. | 114 | Otherwise the translation will corrupt it. |
| 116 | .It Dv CMS_NOATTR | 115 | .It Dv CMS_NOATTR |
| 117 | Do not use any signedAttributes. | 116 | Do not add any |
| 118 | By default, the SignedData structure includes several CMS | 117 | .Vt SignedAttributes . |
| 119 | signedAttributes including the signing time, the CMS content type, | 118 | By default, the |
| 120 | and the supported list of ciphers in an SMIMECapabilities attribute. | 119 | .Fa signerInfos |
| 120 | field includes several CMS | ||
| 121 | .Vt SignedAttributes | ||
| 122 | including the signing time, the CMS content type, | ||
| 123 | and the supported list of ciphers in an | ||
| 124 | .Vt SMIMECapabilities | ||
| 125 | attribute. | ||
| 121 | .It Dv CMS_NOSMIMECAP | 126 | .It Dv CMS_NOSMIMECAP |
| 122 | Omit just the SMIMECapabilities. | 127 | Omit just the |
| 128 | .Vt SMIMECapabilities . | ||
| 123 | If present, the SMIMECapabilities attribute indicates support for the | 129 | If present, the SMIMECapabilities attribute indicates support for the |
| 124 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | 130 | following algorithms in preference order: 256 bit AES, Gost R3411-94, |
| 125 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | 131 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit |
| 126 | RC2, DES and 40 bit RC2. | 132 | RC2, DES and 40 bit RC2. |
| 127 | If any of these algorithms is not available, then it will not be | 133 | If any of these algorithms is not available, then it will not be |
| 128 | included: for example the GOST algorithms will not be included if | 134 | included. |
| 129 | the GOST ENGINE is not loaded. | ||
| 130 | .It Dv CMS_USE_KEYID | 135 | .It Dv CMS_USE_KEYID |
| 131 | Use the subject key identifier value to identify signing certificates. | 136 | Use the subject key identifier value to identify signing certificates. |
| 132 | An error occurs if the signing certificate does not have a subject key | 137 | An error occurs if the signing certificate does not have a subject key |
| @@ -212,6 +217,18 @@ The error can be obtained from | |||
| 212 | .Xr ERR_get_error 3 . | 217 | .Xr ERR_get_error 3 . |
| 213 | .Sh SEE ALSO | 218 | .Sh SEE ALSO |
| 214 | .Xr CMS_verify 3 | 219 | .Xr CMS_verify 3 |
| 220 | .Sh STANDARDS | ||
| 221 | RFC 5652: Cryptographic Message Syntax (CMS) | ||
| 222 | .Bl -dash -compact -offset indent | ||
| 223 | .It | ||
| 224 | section 5.1: SignedData Type | ||
| 225 | .It | ||
| 226 | section 5.3: SignerInfo Type | ||
| 227 | .El | ||
| 228 | .Pp | ||
| 229 | RFC 8551: Secure/Multipurpose Internet Mail Extensions (S/MIME) | ||
| 230 | Version\ 4.0 Message Specification, | ||
| 231 | section 2.5.2: SMIMECapabilities Attribute | ||
| 215 | .Sh HISTORY | 232 | .Sh HISTORY |
| 216 | .Fn CMS_sign | 233 | .Fn CMS_sign |
| 217 | first appeared in OpenSSL 0.9.8h | 234 | first appeared in OpenSSL 0.9.8h |
diff --git a/src/lib/libcrypto/man/CMS_sign_receipt.3 b/src/lib/libcrypto/man/CMS_sign_receipt.3 index 88d03d79db..e827900a84 100644 --- a/src/lib/libcrypto/man/CMS_sign_receipt.3 +++ b/src/lib/libcrypto/man/CMS_sign_receipt.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_sign_receipt.3,v 1.4 2019/08/11 12:46:38 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_sign_receipt.3,v 1.5 2019/08/18 12:06:51 schwarze Exp $ |
| 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: August 11 2019 $ | 51 | .Dd $Mdocdate: August 18 2019 $ |
| 52 | .Dt CMS_SIGN_RECEIPT 3 | 52 | .Dt CMS_SIGN_RECEIPT 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -66,10 +66,14 @@ | |||
| 66 | .Fc | 66 | .Fc |
| 67 | .Sh DESCRIPTION | 67 | .Sh DESCRIPTION |
| 68 | .Fn CMS_sign_receipt | 68 | .Fn CMS_sign_receipt |
| 69 | creates and returns a CMS signed receipt structure. | 69 | creates a new CMS |
| 70 | .Vt SignedData | ||
| 71 | structure containing a signed | ||
| 72 | .Vt Receipt | ||
| 73 | as its embedded content. | ||
| 70 | .Fa si | 74 | .Fa si |
| 71 | is the | 75 | is the |
| 72 | .Vt CMS_SignerInfo | 76 | .Vt SignerInfo |
| 73 | structure containing the signed receipt request. | 77 | structure containing the signed receipt request. |
| 74 | .Fa signcert | 78 | .Fa signcert |
| 75 | is the certificate to sign with, | 79 | is the certificate to sign with, |
| @@ -79,12 +83,11 @@ is the corresponding private key. | |||
| 79 | is an optional additional set of certificates to include in the CMS | 83 | is an optional additional set of certificates to include in the CMS |
| 80 | structure (for example any intermediate CAs in the chain). | 84 | structure (for example any intermediate CAs in the chain). |
| 81 | .Pp | 85 | .Pp |
| 82 | .Fa flags | ||
| 83 | is an optional set of flags. | ||
| 84 | .Pp | ||
| 85 | This functions behaves in a similar way to | 86 | This functions behaves in a similar way to |
| 86 | .Xr CMS_sign 3 | 87 | .Xr CMS_sign 3 |
| 87 | except the flag values | 88 | except that the |
| 89 | .Fa flags | ||
| 90 | values | ||
| 88 | .Dv CMS_DETACHED , | 91 | .Dv CMS_DETACHED , |
| 89 | .Dv CMS_BINARY , | 92 | .Dv CMS_BINARY , |
| 90 | .Dv CMS_NOATTR , | 93 | .Dv CMS_NOATTR , |
| @@ -105,6 +108,8 @@ The error can be obtained from | |||
| 105 | .Sh SEE ALSO | 108 | .Sh SEE ALSO |
| 106 | .Xr CMS_sign 3 , | 109 | .Xr CMS_sign 3 , |
| 107 | .Xr CMS_verify_receipt 3 | 110 | .Xr CMS_verify_receipt 3 |
| 111 | .Sh STANDARDS | ||
| 112 | RFC 2634: Enhanced Security Services for S/MIME, section 2.8: Receipt Syntax | ||
| 108 | .Sh HISTORY | 113 | .Sh HISTORY |
| 109 | .Fn CMS_sign_receipt | 114 | .Fn CMS_sign_receipt |
| 110 | first appeared in OpenSSL 0.9.8h | 115 | first appeared in OpenSSL 0.9.8h |
diff --git a/src/lib/libcrypto/man/CMS_verify.3 b/src/lib/libcrypto/man/CMS_verify.3 index 5b17a75ca0..ae489933de 100644 --- a/src/lib/libcrypto/man/CMS_verify.3 +++ b/src/lib/libcrypto/man/CMS_verify.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_verify.3,v 1.4 2019/08/11 12:46:38 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_verify.3,v 1.5 2019/08/18 12:06:51 schwarze Exp $ |
| 2 | .\" full merge up to: OpenSSL 35fd9953 May 28 14:49:38 2019 +0200 | 2 | .\" full merge up to: OpenSSL 35fd9953 May 28 14:49:38 2019 +0200 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: August 11 2019 $ | 51 | .Dd $Mdocdate: August 18 2019 $ |
| 52 | .Dt CMS_VERIFY 3 | 52 | .Dt CMS_VERIFY 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -72,11 +72,10 @@ | |||
| 72 | .Fc | 72 | .Fc |
| 73 | .Sh DESCRIPTION | 73 | .Sh DESCRIPTION |
| 74 | .Fn CMS_verify | 74 | .Fn CMS_verify |
| 75 | verifies a CMS SignedData structure. | 75 | verifies the CMS |
| 76 | .Fa cms | 76 | .Vt SignedData |
| 77 | is the | 77 | structure |
| 78 | .Vt CMS_ContentInfo | 78 | .Fa cms . |
| 79 | structure to verify. | ||
| 80 | .Fa certs | 79 | .Fa certs |
| 81 | is a set of certificates in which to search for the signing | 80 | is a set of certificates in which to search for the signing |
| 82 | certificate(s). | 81 | certificate(s). |
| @@ -90,10 +89,6 @@ The content is written to | |||
| 90 | if it is not | 89 | if it is not |
| 91 | .Dv NULL . | 90 | .Dv NULL . |
| 92 | .Pp | 91 | .Pp |
| 93 | .Fa flags | ||
| 94 | is an optional set of flags, which can be used to modify the verify | ||
| 95 | operation. | ||
| 96 | .Pp | ||
| 97 | .Fn CMS_get0_signers | 92 | .Fn CMS_get0_signers |
| 98 | retrieves the signing certificate(s) from | 93 | retrieves the signing certificate(s) from |
| 99 | .Fa cms . | 94 | .Fa cms . |
| @@ -105,11 +100,8 @@ Normally the verify process proceeds as follows. | |||
| 105 | .Pp | 100 | .Pp |
| 106 | Initially some sanity checks are performed on | 101 | Initially some sanity checks are performed on |
| 107 | .Fa cms . | 102 | .Fa cms . |
| 108 | The type of | 103 | There must be at least one signature on the data. |
| 109 | .Fa cms | 104 | If the content is detached, |
| 110 | must be SignedData. | ||
| 111 | There must be at least one signature on the data and if the content is | ||
| 112 | detached; | ||
| 113 | .Fa indata | 105 | .Fa indata |
| 114 | cannot be | 106 | cannot be |
| 115 | .Dv NULL . | 107 | .Dv NULL . |
| @@ -126,7 +118,8 @@ If any signing certificate cannot be located, the operation fails. | |||
| 126 | .Pp | 118 | .Pp |
| 127 | Each signing certificate is chain verified using the | 119 | Each signing certificate is chain verified using the |
| 128 | .Sy smimesign | 120 | .Sy smimesign |
| 129 | purpose and the supplied trusted certificate store. | 121 | purpose and the supplied trusted certificate |
| 122 | .Fa store . | ||
| 130 | Any internal certificates in the message are used as untrusted CAs. | 123 | Any internal certificates in the message are used as untrusted CAs. |
| 131 | If CRL checking is enabled in | 124 | If CRL checking is enabled in |
| 132 | .Fa store , | 125 | .Fa store , |
| @@ -142,9 +135,9 @@ and the signature is checked. | |||
| 142 | .Pp | 135 | .Pp |
| 143 | If all signatures verify correctly, then the function is successful. | 136 | If all signatures verify correctly, then the function is successful. |
| 144 | .Pp | 137 | .Pp |
| 145 | Any of the following flags (OR'ed together) can be passed in the | 138 | Any of the following |
| 146 | .Fa flags | 139 | .Fa flags |
| 147 | parameter to change the default verify behaviour: | 140 | (OR'ed together) can be passed to change the default verify behaviour: |
| 148 | .Bl -tag -width Ds | 141 | .Bl -tag -width Ds |
| 149 | .It Dv CMS_NOINTERN | 142 | .It Dv CMS_NOINTERN |
| 150 | Do not use the certificates in the message itself when | 143 | Do not use the certificates in the message itself when |
| @@ -156,7 +149,7 @@ parameter. | |||
| 156 | If CRL checking is enabled in | 149 | If CRL checking is enabled in |
| 157 | .Fa store , | 150 | .Fa store , |
| 158 | then any CRLs in the message itself are ignored. | 151 | then any CRLs in the message itself are ignored. |
| 159 | It Dv CMS_TEXT | 152 | .It Dv CMS_TEXT |
| 160 | MIME headers for type text/plain are deleted from the content. | 153 | MIME headers for type text/plain are deleted from the content. |
| 161 | If the content is not of type text/plain, an error is returned. | 154 | If the content is not of type text/plain, an error is returned. |
| 162 | .It Dv CMS_NO_SIGNER_CERT_VERIFY | 155 | .It Dv CMS_NO_SIGNER_CERT_VERIFY |
| @@ -199,7 +192,7 @@ However since the signing time is supplied by the signer it cannot be | |||
| 199 | trusted without additional evidence (such as a trusted timestamp). | 192 | trusted without additional evidence (such as a trusted timestamp). |
| 200 | .Sh RETURN VALUES | 193 | .Sh RETURN VALUES |
| 201 | .Fn CMS_verify | 194 | .Fn CMS_verify |
| 202 | returns 1 for a successful verification or zero if an error occurred. | 195 | returns 1 for a successful verification or 0 if an error occurred. |
| 203 | .Pp | 196 | .Pp |
| 204 | .Fn CMS_get0_signers | 197 | .Fn CMS_get0_signers |
| 205 | returns all signers or | 198 | returns all signers or |
| @@ -210,6 +203,9 @@ The error can be obtained from | |||
| 210 | .Xr ERR_get_error 3 . | 203 | .Xr ERR_get_error 3 . |
| 211 | .Sh SEE ALSO | 204 | .Sh SEE ALSO |
| 212 | .Xr CMS_sign 3 | 205 | .Xr CMS_sign 3 |
| 206 | .Sh STANDARDS | ||
| 207 | RFC 5652: Cryptographic Message Syntax (CMS), | ||
| 208 | section 5.1: SignedData Type | ||
| 213 | .Sh HISTORY | 209 | .Sh HISTORY |
| 214 | These functions first appeared in OpenSSL 0.9.8h | 210 | These functions first appeared in OpenSSL 0.9.8h |
| 215 | and have been available since | 211 | and have been available since |
diff --git a/src/lib/libcrypto/man/CMS_verify_receipt.3 b/src/lib/libcrypto/man/CMS_verify_receipt.3 index 7e74faa3e2..8f9a86f128 100644 --- a/src/lib/libcrypto/man/CMS_verify_receipt.3 +++ b/src/lib/libcrypto/man/CMS_verify_receipt.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_verify_receipt.3,v 1.4 2019/08/11 12:46:38 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_verify_receipt.3,v 1.5 2019/08/18 12:06:51 schwarze Exp $ |
| 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: August 11 2019 $ | 51 | .Dd $Mdocdate: August 18 2019 $ |
| 52 | .Dt CMS_VERIFY_RECEIPT 3 | 52 | .Dt CMS_VERIFY_RECEIPT 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -70,19 +70,19 @@ verifies a CMS signed receipt. | |||
| 70 | .Fa rcms | 70 | .Fa rcms |
| 71 | is the signed receipt to verify. | 71 | is the signed receipt to verify. |
| 72 | .Fa ocms | 72 | .Fa ocms |
| 73 | is the original SignedData structure containing the receipt request. | 73 | is the original |
| 74 | .Vt SignedData | ||
| 75 | structure containing the receipt request. | ||
| 74 | .Fa certs | 76 | .Fa certs |
| 75 | is a set of certificates in which to search for the signing certificate. | 77 | is a set of certificates in which to search for the signing certificate. |
| 76 | .Fa store | 78 | .Fa store |
| 77 | is a trusted certificate store (used for chain verification). | 79 | is a trusted certificate store (used for chain verification). |
| 78 | .Pp | 80 | .Pp |
| 79 | .Fa flags | ||
| 80 | is an optional set of flags, which can be used to modify the verify | ||
| 81 | operation. | ||
| 82 | .Pp | ||
| 83 | This functions behaves in a similar way to | 81 | This functions behaves in a similar way to |
| 84 | .Xr CMS_verify 3 | 82 | .Xr CMS_verify 3 |
| 85 | except the flag values | 83 | except that the |
| 84 | .Fa flags | ||
| 85 | values | ||
| 86 | .Dv CMS_DETACHED , | 86 | .Dv CMS_DETACHED , |
| 87 | .Dv CMS_BINARY , | 87 | .Dv CMS_BINARY , |
| 88 | .Dv CMS_TEXT , | 88 | .Dv CMS_TEXT , |
| @@ -92,13 +92,15 @@ are not supported since they do not make sense in the context of signed | |||
| 92 | receipts. | 92 | receipts. |
| 93 | .Sh RETURN VALUES | 93 | .Sh RETURN VALUES |
| 94 | .Fn CMS_verify_receipt | 94 | .Fn CMS_verify_receipt |
| 95 | returns 1 for a successful verification or zero if an error occurred. | 95 | returns 1 for a successful verification or 0 if an error occurred. |
| 96 | .Pp | 96 | .Pp |
| 97 | The error can be obtained from | 97 | The error can be obtained from |
| 98 | .Xr ERR_get_error 3 . | 98 | .Xr ERR_get_error 3 . |
| 99 | .Sh SEE ALSO | 99 | .Sh SEE ALSO |
| 100 | .Xr CMS_sign_receipt 3 , | 100 | .Xr CMS_sign_receipt 3 , |
| 101 | .Xr CMS_verify 3 | 101 | .Xr CMS_verify 3 |
| 102 | .Sh STANDARDS | ||
| 103 | RFC 2634: Enhanced Security Services for S/MIME, section 2.8: Receipt Syntax | ||
| 102 | .Sh HISTORY | 104 | .Sh HISTORY |
| 103 | .Fn CMS_verify_receipt | 105 | .Fn CMS_verify_receipt |
| 104 | first appeared in OpenSSL 0.9.8h | 106 | first appeared in OpenSSL 0.9.8h |
