summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2018-04-07 13:57:43 +0000
committerjmc <>2018-04-07 13:57:43 +0000
commit17090ee069575edabdb214399223ac32ebe4fa6b (patch)
tree6a191b6106e617dffc464e1d326fdc278d65b889 /src
parent4608af0736dc60b5c3961e69526d193a03fb7f16 (diff)
downloadopenbsd-17090ee069575edabdb214399223ac32ebe4fa6b.tar.gz
openbsd-17090ee069575edabdb214399223ac32ebe4fa6b.tar.bz2
openbsd-17090ee069575edabdb214399223ac32ebe4fa6b.zip
tweak previous;
Diffstat (limited to 'src')
-rw-r--r--src/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.316
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 b/src/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3
index 9c0150700d..5e45278604 100644
--- a/src/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3
+++ b/src/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.13 2018/04/06 07:08:20 beck Exp $ 1.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.14 2018/04/07 13:57:43 jmc Exp $
2.\" full merge up to: OpenSSL d33def66 Feb 9 14:17:13 2016 -0500 2.\" full merge up to: OpenSSL d33def66 Feb 9 14:17:13 2016 -0500
3.\" selective merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 3.\" selective merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100
4.\" 4.\"
@@ -68,7 +68,7 @@
68.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 68.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
69.\" OF THE POSSIBILITY OF SUCH DAMAGE. 69.\" OF THE POSSIBILITY OF SUCH DAMAGE.
70.\" 70.\"
71.Dd $Mdocdate: April 6 2018 $ 71.Dd $Mdocdate: April 7 2018 $
72.Dt X509_VERIFY_PARAM_SET_FLAGS 3 72.Dt X509_VERIFY_PARAM_SET_FLAGS 3
73.Os 73.Os
74.Sh NAME 74.Sh NAME
@@ -347,7 +347,7 @@ performed on the peer certificate.
347.Fa namelen 347.Fa namelen
348should be set to the length of 348should be set to the length of
349.Fa name . 349.Fa name .
350For historical compatibility, if 350For historical compatibility, if
351.Fa name 351.Fa name
352is NUL-terminated, 352is NUL-terminated,
353.Fa namelen 353.Fa namelen
@@ -383,7 +383,7 @@ or empty.
383.Fa namelen 383.Fa namelen
384should be set to the length of 384should be set to the length of
385.Fa name . 385.Fa name .
386For historical compatibility, if 386For historical compatibility, if
387.Fa name 387.Fa name
388is NUL-terminated, 388is NUL-terminated,
389.Fa namelen 389.Fa namelen
@@ -409,7 +409,7 @@ sets the expected RFC822 email address to
409.Fa emaillen 409.Fa emaillen
410should be set to the length of 410should be set to the length of
411.Fa email . 411.Fa email .
412For historical compatibility, if 412For historical compatibility, if
413.Fa email 413.Fa email
414is NUL-terminated, 414is NUL-terminated,
415.Fa emaillen 415.Fa emaillen
@@ -431,7 +431,7 @@ argument is in binary format, in network byte-order, and
431.Fa iplen 431.Fa iplen
432must be set to 4 for IPv4 and 16 for IPv6. 432must be set to 4 for IPv4 and 16 for IPv6.
433.Fn X509_VERIFY_PARAM_set1_ip 433.Fn X509_VERIFY_PARAM_set1_ip
434will fail if 434will fail if
435.Fa ip 435.Fa ip
436is NULL or if 436is NULL or if
437.Fa iplen 437.Fa iplen
@@ -521,8 +521,8 @@ A failure from these routines will poison
521the 521the
522.Vt X509_VERIFY_PARAM 522.Vt X509_VERIFY_PARAM
523object so that future calls to 523object so that future calls to
524.Xr X509_verify_cert 524.Xr X509_verify_cert 3
525using the poisoned object will fail. 525using the poisoned object will fail.
526.Pp 526.Pp
527.Fn X509_VERIFY_PARAM_get_flags 527.Fn X509_VERIFY_PARAM_get_flags
528returns the current verification flags. 528returns the current verification flags.