diff options
author | schwarze <> | 2016-12-25 22:15:10 +0000 |
---|---|---|
committer | schwarze <> | 2016-12-25 22:15:10 +0000 |
commit | 899a1058abcbe6fe59592ed5d46cc4b55cf12326 (patch) | |
tree | 90a8fcb1d550495e918efcdbf187d897e1c021f7 /src | |
parent | 5667f2b73d8867280a0e2b3dd1d8068478634723 (diff) | |
download | openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.tar.gz openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.tar.bz2 openbsd-899a1058abcbe6fe59592ed5d46cc4b55cf12326.zip |
Consistently mark up various ASN.1 type names defined in standards
related to X.509 with .Vt such that they can be searched for.
Diffstat (limited to 'src')
48 files changed, 481 insertions, 315 deletions
diff --git a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 index 18e50e24c0..8a829a5e2d 100644 --- a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 +++ b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.1 2016/12/23 22:21:40 schwarze Exp $ | 1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt ACCESS_DESCRIPTION_NEW 3 | 18 | .Dt ACCESS_DESCRIPTION_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -42,8 +42,9 @@ policy data. | |||
42 | .Fn ACCESS_DESCRIPTION_new | 42 | .Fn ACCESS_DESCRIPTION_new |
43 | allocates and initializes an empty | 43 | allocates and initializes an empty |
44 | .Vt ACCESS_DESCRIPTION | 44 | .Vt ACCESS_DESCRIPTION |
45 | object, representing an ASN.1 AccessDescription structure | 45 | object, representing an ASN.1 |
46 | defined in RFC 5280 section 4.2.2.1. | 46 | .Vt AccessDescription |
47 | structure defined in RFC 5280 section 4.2.2.1. | ||
47 | It can hold a pointer to a | 48 | It can hold a pointer to a |
48 | .Vt GENERAL_NAME | 49 | .Vt GENERAL_NAME |
49 | object documented in | 50 | object documented in |
@@ -90,8 +91,9 @@ allocates and initializes an empty | |||
90 | .Vt AUTHORITY_INFO_ACCESS | 91 | .Vt AUTHORITY_INFO_ACCESS |
91 | object, which is a | 92 | object, which is a |
92 | .Vt STACK_OF(ACCESS_DESCRIPTION) | 93 | .Vt STACK_OF(ACCESS_DESCRIPTION) |
93 | and represents an ASN.1 AuthorityInfoAccessSyntax structure | 94 | and represents an ASN.1 |
94 | defined in RFC 5280 section 4.2.2.1. | 95 | .Vt AuthorityInfoAccessSyntax |
96 | structure defined in RFC 5280 section 4.2.2.1. | ||
95 | If can be used for the authority information access extension of | 97 | If can be used for the authority information access extension of |
96 | certificates and certificate revocation lists and for the subject | 98 | certificates and certificate revocation lists and for the subject |
97 | information access extension of certificates. | 99 | information access extension of certificates. |
diff --git a/src/lib/libcrypto/man/ASN1_STRING_length.3 b/src/lib/libcrypto/man/ASN1_STRING_length.3 index f43d61819f..2c797481d7 100644 --- a/src/lib/libcrypto/man/ASN1_STRING_length.3 +++ b/src/lib/libcrypto/man/ASN1_STRING_length.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.5 2016/11/10 11:44:52 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 10 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt ASN1_STRING_LENGTH 3 | 53 | .Dt ASN1_STRING_LENGTH 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -182,12 +182,11 @@ and the functions call the | |||
182 | .Vt ASN1_STRING | 182 | .Vt ASN1_STRING |
183 | equivalents. | 183 | equivalents. |
184 | .Vt ASN1_STRING | 184 | .Vt ASN1_STRING |
185 | is also used for some | 185 | is also used for some CHOICE types which consist entirely of primitive |
186 | .Sy CHOICE | 186 | string types such as |
187 | types which consist entirely of primitive string types such as | 187 | .Vt DirectoryString |
188 | .Sy DirectoryString | ||
189 | and | 188 | and |
190 | .Sy Time . | 189 | .Vt Time . |
191 | .Pp | 190 | .Pp |
192 | These functions should | 191 | These functions should |
193 | .Em not | 192 | .Em not |
@@ -195,19 +194,20 @@ be used to examine or modify | |||
195 | .Vt ASN1_INTEGER | 194 | .Vt ASN1_INTEGER |
196 | or | 195 | or |
197 | .Vt ASN1_ENUMERATED | 196 | .Vt ASN1_ENUMERATED |
198 | types: the relevant | 197 | types: the relevant INTEGER or ENUMERATED utility functions should |
199 | .Sy INTEGER | 198 | be used instead. |
200 | or | ||
201 | .Sy ENUMERATED | ||
202 | utility functions should be used instead. | ||
203 | .Pp | 199 | .Pp |
204 | In general it cannot be assumed that the data returned by | 200 | In general it cannot be assumed that the data returned by |
205 | .Fn ASN1_STRING_data | 201 | .Fn ASN1_STRING_data |
206 | is NUL terminated, and it may contain embedded NUL characters. | 202 | is NUL terminated, and it may contain embedded NUL characters. |
207 | The actual format of the data will depend on the actual string type itself: | 203 | The actual format of the data will depend on the actual string type itself: |
208 | for example for an IA5String the data will be ASCII, | 204 | for example for an |
209 | for a BMPString two bytes per character in big endian format, | 205 | .Vt IA5String |
210 | UTF8String will be in UTF8 format. | 206 | the data will be ASCII, for a |
207 | .Vt BMPString | ||
208 | two bytes per character in big endian format, and a | ||
209 | .Vt UTF8String | ||
210 | will be in UTF8 format. | ||
211 | .Pp | 211 | .Pp |
212 | Similar care should be take to ensure the data is in the correct format | 212 | Similar care should be take to ensure the data is in the correct format |
213 | when calling | 213 | when calling |
diff --git a/src/lib/libcrypto/man/ASN1_generate_nconf.3 b/src/lib/libcrypto/man/ASN1_generate_nconf.3 index bcf55d724b..5e1ba0a817 100644 --- a/src/lib/libcrypto/man/ASN1_generate_nconf.3 +++ b/src/lib/libcrypto/man/ASN1_generate_nconf.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.8 2016/12/11 18:06:09 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.9 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 | 2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 11 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt ASN1_GENERATE_NCONF 3 | 53 | .Dt ASN1_GENERATE_NCONF 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -285,15 +285,20 @@ if an error occurred. | |||
285 | The error codes can be obtained by | 285 | The error codes can be obtained by |
286 | .Xr ERR_get_error 3 . | 286 | .Xr ERR_get_error 3 . |
287 | .Sh EXAMPLES | 287 | .Sh EXAMPLES |
288 | A simple IA5String: | 288 | A simple |
289 | .Vt IA5String : | ||
289 | .Pp | 290 | .Pp |
290 | .Dl IA5STRING:Hello World | 291 | .Dl IA5STRING:Hello World |
291 | .Pp | 292 | .Pp |
292 | An IA5String explicitly tagged: | 293 | An |
294 | .Vt IA5String | ||
295 | explicitly tagged: | ||
293 | .Pp | 296 | .Pp |
294 | .Dl EXPLICIT:0,IA5STRING:Hello World | 297 | .Dl EXPLICIT:0,IA5STRING:Hello World |
295 | .Pp | 298 | .Pp |
296 | An IA5String explicitly tagged using APPLICATION tagging: | 299 | An |
300 | .Vt IA5String | ||
301 | explicitly tagged using APPLICATION tagging: | ||
297 | .Pp | 302 | .Pp |
298 | .Dl EXPLICIT:0A,IA5STRING:Hello World | 303 | .Dl EXPLICIT:0A,IA5STRING:Hello World |
299 | .Pp | 304 | .Pp |
@@ -302,7 +307,8 @@ A BITSTRING with bits 1 and 5 set and all others zero: | |||
302 | .Dl FORMAT:BITLIST,BITSTRING:1,5 | 307 | .Dl FORMAT:BITLIST,BITSTRING:1,5 |
303 | .Pp | 308 | .Pp |
304 | A more complex example using a config file to produce a | 309 | A more complex example using a config file to produce a |
305 | SEQUENCE consisting of a BOOL an OID and a UTF8String: | 310 | SEQUENCE consisting of a BOOL an OID and a |
311 | .Vt UTF8String : | ||
306 | .Bd -literal -offset indent | 312 | .Bd -literal -offset indent |
307 | asn1 = SEQUENCE:seq_section | 313 | asn1 = SEQUENCE:seq_section |
308 | 314 | ||
@@ -313,7 +319,9 @@ field2 = OID:commonName | |||
313 | field3 = UTF8:Third field | 319 | field3 = UTF8:Third field |
314 | .Ed | 320 | .Ed |
315 | .Pp | 321 | .Pp |
316 | This example produces an RSAPrivateKey structure. | 322 | This example produces an |
323 | .Vt RSAPrivateKey | ||
324 | structure. | ||
317 | This is the key contained in the file | 325 | This is the key contained in the file |
318 | .Pa client.pem | 326 | .Pa client.pem |
319 | in all OpenSSL distributions. | 327 | in all OpenSSL distributions. |
@@ -349,7 +357,8 @@ coeff=INTEGER:0x30B9E4F2AFA5AC679F920FC83F1F2DF1BAF1779CF989447FABC2F5\e | |||
349 | 628657053A | 357 | 628657053A |
350 | .Ed | 358 | .Ed |
351 | .Pp | 359 | .Pp |
352 | This example is the corresponding public key in a SubjectPublicKeyInfo | 360 | This example is the corresponding public key in an ASN.1 |
361 | .Vt SubjectPublicKeyInfo | ||
353 | structure: | 362 | structure: |
354 | .Bd -literal -offset 2n | 363 | .Bd -literal -offset 2n |
355 | # Start with a SEQUENCE | 364 | # Start with a SEQUENCE |
diff --git a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 index 5186fea0f3..94d6e14abb 100644 --- a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 +++ b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.1 2016/12/23 14:37:08 schwarze Exp $ | 1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt AUTHORITY_KEYID_NEW 3 | 18 | .Dt AUTHORITY_KEYID_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -35,8 +35,9 @@ for signing it. | |||
35 | .Fn AUTHORITY_KEYID_new | 35 | .Fn AUTHORITY_KEYID_new |
36 | allocates and initializes an empty | 36 | allocates and initializes an empty |
37 | .Vt AUTHORITY_KEYID | 37 | .Vt AUTHORITY_KEYID |
38 | object, representing an ASN.1 AuthorityKeyIdentifier structure | 38 | object, representing an ASN.1 |
39 | defined in RFC 5280 section 4.2.1.1. | 39 | .Vt AuthorityKeyIdentifier |
40 | structure defined in RFC 5280 section 4.2.1.1. | ||
40 | It can hold an issuer name, a serial number, and a key identifier. | 41 | It can hold an issuer name, a serial number, and a key identifier. |
41 | .Pp | 42 | .Pp |
42 | .Fn AUTHORITY_KEYID_free | 43 | .Fn AUTHORITY_KEYID_free |
diff --git a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 index 1293be0050..c133bb1c35 100644 --- a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:02:41 schwarze Exp $ | 1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt BASIC_CONSTRAINTS_NEW 3 | 18 | .Dt BASIC_CONSTRAINTS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn BASIC_CONSTRAINTS_new | 31 | .Fn BASIC_CONSTRAINTS_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt BASIC_CONSTRAINTS | 33 | .Vt BASIC_CONSTRAINTS |
34 | object, representing an ASN.1 BasicConstraints structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 5280 section 4.2.1.9. | 35 | .Vt BasicConstraints |
36 | structure defined in RFC 5280 section 4.2.1.9. | ||
36 | .Pp | 37 | .Pp |
37 | This object contains two fields. | 38 | This object contains two fields. |
38 | The field | 39 | The field |
diff --git a/src/lib/libcrypto/man/DIST_POINT_new.3 b/src/lib/libcrypto/man/DIST_POINT_new.3 index 8498e5a7d0..bbd4855e11 100644 --- a/src/lib/libcrypto/man/DIST_POINT_new.3 +++ b/src/lib/libcrypto/man/DIST_POINT_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.1 2016/12/23 15:25:19 schwarze Exp $ | 1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt DIST_POINT_NEW 3 | 18 | .Dt DIST_POINT_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -52,8 +52,9 @@ where to obtain certificate revocation lists that might later revoke it. | |||
52 | .Fn DIST_POINT_new | 52 | .Fn DIST_POINT_new |
53 | allocates and initializes an empty | 53 | allocates and initializes an empty |
54 | .Vt DIST_POINT | 54 | .Vt DIST_POINT |
55 | object, representing an ASN.1 DistributionPoint structure | 55 | object, representing an ASN.1 |
56 | defined in RFC 5280 section 4.2.1.13. | 56 | .Vt DistributionPoint |
57 | structure defined in RFC 5280 section 4.2.1.13. | ||
57 | It can hold issuer names, distribution point names, and reason flags. | 58 | It can hold issuer names, distribution point names, and reason flags. |
58 | .Fn DIST_POINT_free | 59 | .Fn DIST_POINT_free |
59 | frees | 60 | frees |
@@ -64,8 +65,9 @@ allocates and initializes an empty | |||
64 | .Vt CRL_DIST_POINTS | 65 | .Vt CRL_DIST_POINTS |
65 | object, which is a | 66 | object, which is a |
66 | .Vt STACK_OF(DIST_POINT) | 67 | .Vt STACK_OF(DIST_POINT) |
67 | and represents the ASN.1 CRLDistributionPoints structure | 68 | and represents the ASN.1 |
68 | defined in RFC 5280 section 4.2.1.13. | 69 | .Vt CRLDistributionPoints |
70 | structure defined in RFC 5280 section 4.2.1.13. | ||
69 | It can be used as an extension in | 71 | It can be used as an extension in |
70 | .Vt X509 | 72 | .Vt X509 |
71 | and in | 73 | and in |
@@ -78,8 +80,9 @@ frees | |||
78 | .Fn DIST_POINT_NAME_new | 80 | .Fn DIST_POINT_NAME_new |
79 | allocates and initializes an empty | 81 | allocates and initializes an empty |
80 | .Vt DIST_POINT_NAME | 82 | .Vt DIST_POINT_NAME |
81 | object, representing an ASN.1 DistributionPointName structure | 83 | object, representing an ASN.1 |
82 | defined in RFC 5280 section 4.2.1.13. | 84 | .Vt DistributionPointName |
85 | structure defined in RFC 5280 section 4.2.1.13. | ||
83 | It is used by the | 86 | It is used by the |
84 | .Vt DIST_POINT | 87 | .Vt DIST_POINT |
85 | and | 88 | and |
@@ -93,8 +96,9 @@ frees | |||
93 | .Fn ISSUING_DIST_POINT_new | 96 | .Fn ISSUING_DIST_POINT_new |
94 | allocates and initializes an empty | 97 | allocates and initializes an empty |
95 | .Vt ISSUING_DIST_POINT | 98 | .Vt ISSUING_DIST_POINT |
96 | object, representing an ASN.1 IssuingDistributionPoint structure | 99 | object, representing an ASN.1 |
97 | defined in RFC 5280 section 5.2.5. | 100 | .Vt IssuingDistributionPoint |
101 | structure defined in RFC 5280 section 5.2.5. | ||
98 | Using this extension, a CRL can specify which distribution point | 102 | Using this extension, a CRL can specify which distribution point |
99 | it was issued from and which kinds of certificates and revocation | 103 | it was issued from and which kinds of certificates and revocation |
100 | reasons it covers. | 104 | reasons it covers. |
diff --git a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 index 2e55f6cbed..ae23b46c15 100644 --- a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 +++ b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.2 2016/12/14 07:00:35 jmc Exp $ | 1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 14 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt ESS_SIGNING_CERT_NEW 3 | 18 | .Dt ESS_SIGNING_CERT_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,14 +41,16 @@ | |||
41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" | 41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" |
42 | .Sh DESCRIPTION | 42 | .Sh DESCRIPTION |
43 | The signing certificate may be included in the signedAttributes | 43 | The signing certificate may be included in the signedAttributes |
44 | field of a SignerInfo structure to mitigate simple substitution and | 44 | field of a |
45 | re-issue attacks. | 45 | .Vt SignerInfo |
46 | structure to mitigate simple substitution and re-issue attacks. | ||
46 | .Pp | 47 | .Pp |
47 | .Fn ESS_SIGNING_CERT_new | 48 | .Fn ESS_SIGNING_CERT_new |
48 | allocates and initializes an empty | 49 | allocates and initializes an empty |
49 | .Vt ESS_SIGNING_CERT | 50 | .Vt ESS_SIGNING_CERT |
50 | object, representing an ASN.1 SigningCertificate structure | 51 | object, representing an ASN.1 |
51 | defined in RFC 2634 section 5.4. | 52 | .Vt SigningCertificate |
53 | structure defined in RFC 2634 section 5.4. | ||
52 | It can hold the certificate used for signing the data, | 54 | It can hold the certificate used for signing the data, |
53 | additional authorization certificates that can be used during | 55 | additional authorization certificates that can be used during |
54 | validation, and policies applying to the certificate. | 56 | validation, and policies applying to the certificate. |
@@ -59,8 +61,9 @@ frees | |||
59 | .Fn ESS_CERT_ID_new | 61 | .Fn ESS_CERT_ID_new |
60 | allocates and initializes an empty | 62 | allocates and initializes an empty |
61 | .Vt ESS_CERT_ID | 63 | .Vt ESS_CERT_ID |
62 | object, representing an ASN.1 ESSCertID structure | 64 | object, representing an ASN.1 |
63 | defined in RFC 2634 section 5.4.1. | 65 | .Vt ESSCertID |
66 | structure defined in RFC 2634 section 5.4.1. | ||
64 | Such objects can be used inside | 67 | Such objects can be used inside |
65 | .Vt ESS_SIGNING_CERT | 68 | .Vt ESS_SIGNING_CERT |
66 | objects, and each one can hold a SHA1 hash of one certificate. | 69 | objects, and each one can hold a SHA1 hash of one certificate. |
@@ -71,8 +74,9 @@ frees | |||
71 | .Fn ESS_ISSUER_SERIAL_new | 74 | .Fn ESS_ISSUER_SERIAL_new |
72 | allocates and initializes an empty | 75 | allocates and initializes an empty |
73 | .Vt ESS_ISSUER_SERIAL | 76 | .Vt ESS_ISSUER_SERIAL |
74 | object, representing an ASN.1 IssuerSerial structure | 77 | object, representing an ASN.1 |
75 | defined in RFC 2634 section 5.4.1. | 78 | .Vt IssuerSerial |
79 | structure defined in RFC 2634 section 5.4.1. | ||
76 | It can hold an issuer name and a serial number and can be included in an | 80 | It can hold an issuer name and a serial number and can be included in an |
77 | .Vt ESS_CERT_ID | 81 | .Vt ESS_CERT_ID |
78 | object, which is useful for additional authorization certificates, | 82 | object, which is useful for additional authorization certificates, |
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3 index 1a7fe40a66..c328edf4f6 100644 --- a/src/lib/libcrypto/man/EVP_EncryptInit.3 +++ b/src/lib/libcrypto/man/EVP_EncryptInit.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.4 2016/11/26 20:26:25 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 | 2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 26 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt EVP_ENCRYPTINIT 3 | 53 | .Dt EVP_ENCRYPTINIT 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -664,7 +664,9 @@ If the cipher is a stream cipher then | |||
664 | is returned. | 664 | is returned. |
665 | .Pp | 665 | .Pp |
666 | .Fn EVP_CIPHER_param_to_asn1 | 666 | .Fn EVP_CIPHER_param_to_asn1 |
667 | sets the AlgorithmIdentifier "parameter" based on the passed cipher. | 667 | sets the ASN.1 |
668 | .Vt AlgorithmIdentifier | ||
669 | parameter based on the passed cipher. | ||
668 | This will typically include any parameters and an IV. | 670 | This will typically include any parameters and an IV. |
669 | The cipher IV (if any) must be set when this call is made. | 671 | The cipher IV (if any) must be set when this call is made. |
670 | This call should be made before the cipher is actually "used" (before any | 672 | This call should be made before the cipher is actually "used" (before any |
@@ -675,8 +677,9 @@ calls, for example). | |||
675 | This function may fail if the cipher does not have any ASN.1 support. | 677 | This function may fail if the cipher does not have any ASN.1 support. |
676 | .Pp | 678 | .Pp |
677 | .Fn EVP_CIPHER_asn1_to_param | 679 | .Fn EVP_CIPHER_asn1_to_param |
678 | sets the cipher parameters based on an ASN.1 AlgorithmIdentifier | 680 | sets the cipher parameters based on an ASN.1 |
679 | "parameter". | 681 | .Vt AlgorithmIdentifier |
682 | parameter. | ||
680 | The precise effect depends on the cipher. | 683 | The precise effect depends on the cipher. |
681 | In the case of RC2, for example, it will set the IV and effective | 684 | In the case of RC2, for example, it will set the IV and effective |
682 | key length. | 685 | key length. |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 index 0ed3678a99..0c30fcb5ef 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.5 2016/11/27 15:27:19 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 | 2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 27 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt EVP_PKEY_CTX_CTRL 3 | 53 | .Dt EVP_PKEY_CTX_CTRL 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -205,9 +205,10 @@ Two RSA padding modes behave differently if | |||
205 | .Fn EVP_PKEY_CTX_set_signature_md | 205 | .Fn EVP_PKEY_CTX_set_signature_md |
206 | is used. | 206 | is used. |
207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an | 207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an |
208 | actual digest value and is encapsulated in a DigestInfo structure | 208 | actual digest value and is encapsulated in a |
209 | according to PKCS#1 when signing and this structure is expected (and | 209 | .Vt DigestInfo |
210 | stripped off) when verifying. | 210 | structure according to PKCS#1 when signing and this structure is |
211 | expected (and stripped off) when verifying. | ||
211 | If this control is not used with RSA and PKCS#1 padding then the | 212 | If this control is not used with RSA and PKCS#1 padding then the |
212 | supplied data is used directly and not encapsulated. | 213 | supplied data is used directly and not encapsulated. |
213 | In the case of X9.31 padding for RSA the algorithm identifier byte is | 214 | In the case of X9.31 padding for RSA the algorithm identifier byte is |
diff --git a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 index ae986839fb..8910fb58f8 100644 --- a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 +++ b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.1 2016/12/23 20:43:02 schwarze Exp $ | 1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt EXTENDED_KEY_USAGE_NEW 3 | 18 | .Dt EXTENDED_KEY_USAGE_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,8 +41,9 @@ allocates and initializes an empty | |||
41 | .Vt EXTENDED_KEY_USAGE | 41 | .Vt EXTENDED_KEY_USAGE |
42 | object, which is a | 42 | object, which is a |
43 | .Vt STACK_OF(ASN1_OBJECT) | 43 | .Vt STACK_OF(ASN1_OBJECT) |
44 | and represents an ASN.1 ExtKeyUsageSyntax structure | 44 | and represents an ASN.1 |
45 | defined in RFC 5280 section 4.2.1.12. | 45 | .Vt ExtKeyUsageSyntax |
46 | structure defined in RFC 5280 section 4.2.1.12. | ||
46 | It can hold key purpose identifiers. | 47 | It can hold key purpose identifiers. |
47 | .Pp | 48 | .Pp |
48 | .Fn EXTENDED_KEY_USAGE_free | 49 | .Fn EXTENDED_KEY_USAGE_free |
diff --git a/src/lib/libcrypto/man/GENERAL_NAME_new.3 b/src/lib/libcrypto/man/GENERAL_NAME_new.3 index c4e8fce764..a5537323ae 100644 --- a/src/lib/libcrypto/man/GENERAL_NAME_new.3 +++ b/src/lib/libcrypto/man/GENERAL_NAME_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.1 2016/12/23 00:40:16 schwarze Exp $ | 1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt GENERAL_NAME_NEW 3 | 18 | .Dt GENERAL_NAME_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -46,21 +46,26 @@ | |||
46 | .Ft void | 46 | .Ft void |
47 | .Fn OTHERNAME_free "OTHERNAME *name" | 47 | .Fn OTHERNAME_free "OTHERNAME *name" |
48 | .Sh DESCRIPTION | 48 | .Sh DESCRIPTION |
49 | Even though the X.501 Name documented in | 49 | Even though the X.501 |
50 | .Vt Name | ||
51 | documented in | ||
50 | .Xr X509_NAME_new 3 | 52 | .Xr X509_NAME_new 3 |
51 | is a complicated multi-layered structure, it is very rigid and not | 53 | is a complicated multi-layered structure, it is very rigid and not |
52 | flexible enough to represent various entities that many people want | 54 | flexible enough to represent various entities that many people want |
53 | to use as names in certificates. | 55 | to use as names in certificates. |
54 | For that reason, X.509 extensions use the X.509 GeneralName | 56 | For that reason, X.509 extensions use the X.509 |
55 | wrapper structure rather than using the X.501 Name structure | 57 | .Vt GeneralName |
56 | directly, at the expense of adding one or two additional layers | 58 | wrapper structure rather than using the X.501 |
57 | of indirection. | 59 | .Vt Name |
60 | structure directly, at the expense of adding one or two additional | ||
61 | layers of indirection. | ||
58 | .Pp | 62 | .Pp |
59 | .Fn GENERAL_NAME_new | 63 | .Fn GENERAL_NAME_new |
60 | allocates and initializes an empty | 64 | allocates and initializes an empty |
61 | .Vt GENERAL_NAME | 65 | .Vt GENERAL_NAME |
62 | object, representing the ASN.1 GeneralName structure | 66 | object, representing the ASN.1 |
63 | defined in RFC 5280 section 4.2.1.6. | 67 | .Vt GeneralName |
68 | structure defined in RFC 5280 section 4.2.1.6. | ||
64 | It can for example hold an | 69 | It can for example hold an |
65 | .Vt X509_name | 70 | .Vt X509_name |
66 | object, an IP address, a DNS host name, a uniform resource identifier, | 71 | object, an IP address, a DNS host name, a uniform resource identifier, |
@@ -78,8 +83,9 @@ allocates and initializes an empty | |||
78 | .Vt GENERAL_NAMES | 83 | .Vt GENERAL_NAMES |
79 | object, which is a | 84 | object, which is a |
80 | .Vt STACK_OF(GENERAL_NAME) | 85 | .Vt STACK_OF(GENERAL_NAME) |
81 | and represents the ASN.1 GeneralNames structure | 86 | and represents the ASN.1 |
82 | defined in RFC 5280 section 4.2.1.6. | 87 | .Vt GeneralNames |
88 | structure defined in RFC 5280 section 4.2.1.6. | ||
83 | It is used by extension structures that can contain multiple names, | 89 | It is used by extension structures that can contain multiple names, |
84 | for example key identifier, alternative name, and distribution point | 90 | for example key identifier, alternative name, and distribution point |
85 | extensions. | 91 | extensions. |
@@ -90,8 +96,9 @@ frees | |||
90 | .Fn EDIPARTYNAME_new | 96 | .Fn EDIPARTYNAME_new |
91 | allocates and initializes an empty | 97 | allocates and initializes an empty |
92 | .Vt EDIPARTYNAME | 98 | .Vt EDIPARTYNAME |
93 | object, representing the ASN.1 EDIPartyName structure | 99 | object, representing the ASN.1 |
94 | defined in RFC 5280 section 4.2.1.6, where | 100 | .Vt EDIPartyName |
101 | structure defined in RFC 5280 section 4.2.1.6, where | ||
95 | .Dq EDI | 102 | .Dq EDI |
96 | stands for | 103 | stands for |
97 | .Dq electronic data identifier . | 104 | .Dq electronic data identifier . |
@@ -104,8 +111,9 @@ frees | |||
104 | .Fn OTHERNAME_new | 111 | .Fn OTHERNAME_new |
105 | allocates and initializes an empty | 112 | allocates and initializes an empty |
106 | .Vt OTHERNAME | 113 | .Vt OTHERNAME |
107 | object, representing the ASN.1 OtherName structure | 114 | object, representing the ASN.1 |
108 | defined in RFC 5280 section 4.2.1.6. | 115 | .Vt OtherName |
116 | structure defined in RFC 5280 section 4.2.1.6. | ||
109 | It can hold data of any | 117 | It can hold data of any |
110 | .Vt ASN1_TYPE | 118 | .Vt ASN1_TYPE |
111 | together with a type identifier. | 119 | together with a type identifier. |
diff --git a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 index 1105bead0b..5ef737cb4e 100644 --- a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $ | 1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt NAME_CONSTRAINTS_NEW 3 | 18 | .Dt NAME_CONSTRAINTS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -41,8 +41,9 @@ certification path. | |||
41 | .Fn NAME_CONSTRAINTS_new | 41 | .Fn NAME_CONSTRAINTS_new |
42 | allocates and initializes an empty | 42 | allocates and initializes an empty |
43 | .Vt NAME_CONSTRAINTS | 43 | .Vt NAME_CONSTRAINTS |
44 | object, representing an ASN.1 NameConstraints structure | 44 | object, representing an ASN.1 |
45 | defined in RFC 5280 section 4.2.1.10. | 45 | .Vt NameConstraints |
46 | structure defined in RFC 5280 section 4.2.1.10. | ||
46 | It consists of two | 47 | It consists of two |
47 | .Vt STACK_OF(GENERAL_SUBTREE) | 48 | .Vt STACK_OF(GENERAL_SUBTREE) |
48 | objects, one specifying permitted names, the other excluded names. | 49 | objects, one specifying permitted names, the other excluded names. |
@@ -53,8 +54,9 @@ frees | |||
53 | .Fn GENERAL_SUBTREE_new | 54 | .Fn GENERAL_SUBTREE_new |
54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
55 | .Vt GENERAL_SUBTREE | 56 | .Vt GENERAL_SUBTREE |
56 | object, representing an ASN.1 GeneralSubtree structure | 57 | object, representing an ASN.1 |
57 | defined in RFC 5280 section 4.2.1.10. | 58 | .Vt GeneralSubtree |
59 | structure defined in RFC 5280 section 4.2.1.10. | ||
58 | It is a trivial wrapper around the | 60 | It is a trivial wrapper around the |
59 | .Vt GENERAL_NAME | 61 | .Vt GENERAL_NAME |
60 | object documented in | 62 | object documented in |
diff --git a/src/lib/libcrypto/man/OCSP_CRLID_new.3 b/src/lib/libcrypto/man/OCSP_CRLID_new.3 index fbc54ec71a..450b57c93e 100644 --- a/src/lib/libcrypto/man/OCSP_CRLID_new.3 +++ b/src/lib/libcrypto/man/OCSP_CRLID_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.2 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt OCSP_CRLID_NEW 3 | 18 | .Dt OCSP_CRLID_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -38,9 +38,14 @@ | |||
38 | If a client asks about the validity of a certificate and it turns | 38 | If a client asks about the validity of a certificate and it turns |
39 | out to be invalid, the responder may optionally communicate which | 39 | out to be invalid, the responder may optionally communicate which |
40 | certificate revocation list the certificate was found on. | 40 | certificate revocation list the certificate was found on. |
41 | The required data is stored as an ASN.1 CrlID structure in the | 41 | The required data is stored as an ASN.1 |
42 | singleExtensions field of the SingleResponse structure. | 42 | .Vt CrlID |
43 | The CrlID is represented by an | 43 | structure in the singleExtensions field of the |
44 | .Vt SingleResponse | ||
45 | structure. | ||
46 | The | ||
47 | .Vt CrlID | ||
48 | is represented by an | ||
44 | .Vt OCSP_CRLID | 49 | .Vt OCSP_CRLID |
45 | object, which will be stored inside the | 50 | object, which will be stored inside the |
46 | .Vt OCSP_SINGLERESP | 51 | .Vt OCSP_SINGLERESP |
@@ -66,7 +71,9 @@ at which the CRL was created. | |||
66 | Each argument can be | 71 | Each argument can be |
67 | .Dv NULL , | 72 | .Dv NULL , |
68 | in which case the respective field is omitted. | 73 | in which case the respective field is omitted. |
69 | The resulting CrlID structure is encoded in ASN.1 using | 74 | The resulting |
75 | .Vt CrlID | ||
76 | structure is encoded in ASN.1 using | ||
70 | .Xr X509V3_EXT_i2d 3 | 77 | .Xr X509V3_EXT_i2d 3 |
71 | with criticality 0. | 78 | with criticality 0. |
72 | .Sh RETURN VALUES | 79 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 index 0d0009186a..664a750665 100644 --- a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 +++ b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.6 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_REQUEST_NEW 3 | 69 | .Dt OCSP_REQUEST_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -133,7 +133,9 @@ | |||
133 | .Fn OCSP_REQUEST_new | 133 | .Fn OCSP_REQUEST_new |
134 | allocates and initializes an empty | 134 | allocates and initializes an empty |
135 | .Vt OCSP_REQUEST | 135 | .Vt OCSP_REQUEST |
136 | object, representing an ASN.1 OCSPRequest structure defined in RFC 6960. | 136 | object, representing an ASN.1 |
137 | .Vt OCSPRequest | ||
138 | structure defined in RFC 6960. | ||
137 | .Fn OCSP_REQUEST_free | 139 | .Fn OCSP_REQUEST_free |
138 | frees | 140 | frees |
139 | .Fa req . | 141 | .Fa req . |
@@ -141,7 +143,9 @@ frees | |||
141 | .Fn OCSP_SIGNATURE_new | 143 | .Fn OCSP_SIGNATURE_new |
142 | allocates and initializes an empty | 144 | allocates and initializes an empty |
143 | .Vt OCSP_SIGNATURE | 145 | .Vt OCSP_SIGNATURE |
144 | object, representing an ASN.1 Signature structure defined in RFC 6960. | 146 | object, representing an ASN.1 |
147 | .Vt Signature | ||
148 | structure defined in RFC 6960. | ||
145 | Such an object is used inside | 149 | Such an object is used inside |
146 | .Vt OCSP_REQUEST . | 150 | .Vt OCSP_REQUEST . |
147 | .Fn OCSP_SIGNATURE_free | 151 | .Fn OCSP_SIGNATURE_free |
@@ -151,7 +155,9 @@ frees | |||
151 | .Fn OCSP_REQINFO_new | 155 | .Fn OCSP_REQINFO_new |
152 | allocates and initializes an empty | 156 | allocates and initializes an empty |
153 | .Vt OCSP_REQINFO | 157 | .Vt OCSP_REQINFO |
154 | object, representing an ASN.1 TBSRequest structure defined in RFC 6960. | 158 | object, representing an ASN.1 |
159 | .Vt TBSRequest | ||
160 | structure defined in RFC 6960. | ||
155 | Such an object is used inside | 161 | Such an object is used inside |
156 | .Vt OCSP_REQUEST . | 162 | .Vt OCSP_REQUEST . |
157 | It asks about the validity of one or more certificates. | 163 | It asks about the validity of one or more certificates. |
@@ -162,7 +168,9 @@ frees | |||
162 | .Fn OCSP_ONEREQ_new | 168 | .Fn OCSP_ONEREQ_new |
163 | allocates and initializes an empty | 169 | allocates and initializes an empty |
164 | .Vt OCSP_ONEREQ | 170 | .Vt OCSP_ONEREQ |
165 | object, representing an ASN.1 Request structure defined in RFC 6960. | 171 | object, representing an ASN.1 |
172 | .Vt Request | ||
173 | structure defined in RFC 6960. | ||
166 | Such objects are used inside | 174 | Such objects are used inside |
167 | .Vt OCSP_REQINFO . | 175 | .Vt OCSP_REQINFO . |
168 | Each one asks about the validity of one certificiate. | 176 | Each one asks about the validity of one certificiate. |
diff --git a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 index 6179da3a5b..5f42c781fd 100644 --- a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 +++ b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.4 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt OCSP_SERVICELOC_NEW 3 | 18 | .Dt OCSP_SERVICELOC_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -38,10 +38,14 @@ Due to restrictions of network routing, a client may be unable to | |||
38 | directly contact the authoritative OCSP server for a certificate | 38 | directly contact the authoritative OCSP server for a certificate |
39 | that needs to be checked. | 39 | that needs to be checked. |
40 | In that case, the request can be sent via a proxy server. | 40 | In that case, the request can be sent via a proxy server. |
41 | An ASN.1 ServiceLocator structure is included in the | 41 | An ASN.1 |
42 | singleRequestExtensions field of the Request structure to indicate | 42 | .Vt ServiceLocator |
43 | where to forward the request. | 43 | structure is included in the singleRequestExtensions field of the |
44 | The ServiceLocator is represented by a | 44 | .Vt Request |
45 | structure to indicate where to forward the request. | ||
46 | The | ||
47 | .Vt ServiceLocator | ||
48 | is represented by a | ||
45 | .Vt OCSP_SERVICELOC | 49 | .Vt OCSP_SERVICELOC |
46 | object, which will be stored inside the | 50 | object, which will be stored inside the |
47 | .Vt OCSP_ONEREQ | 51 | .Vt OCSP_ONEREQ |
@@ -65,9 +69,12 @@ If | |||
65 | .Fa urls | 69 | .Fa urls |
66 | or its first element is | 70 | or its first element is |
67 | .Dv NULL , | 71 | .Dv NULL , |
68 | the locator field is omitted from the ServiceLocator structure | 72 | the locator field is omitted from the |
69 | and only the issuer is included. | 73 | .Vt ServiceLocator |
70 | The resulting ServiceLocator structure is encoded in ASN.1 using | 74 | structure and only the issuer is included. |
75 | The resulting | ||
76 | .Vt ServiceLocator | ||
77 | structure is encoded in ASN.1 using | ||
71 | .Xr X509V3_EXT_i2d 3 | 78 | .Xr X509V3_EXT_i2d 3 |
72 | with criticality 0. | 79 | with criticality 0. |
73 | .Sh RETURN VALUES | 80 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_cert_to_id.3 b/src/lib/libcrypto/man/OCSP_cert_to_id.3 index 103b9a4a9f..77559ba469 100644 --- a/src/lib/libcrypto/man/OCSP_cert_to_id.3 +++ b/src/lib/libcrypto/man/OCSP_cert_to_id.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_CERT_TO_ID 3 | 69 | .Dt OCSP_CERT_TO_ID 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -118,7 +118,9 @@ | |||
118 | .Fn OCSP_CERTID_new | 118 | .Fn OCSP_CERTID_new |
119 | allocates and initializes an empty | 119 | allocates and initializes an empty |
120 | .Vt OCSP_CERTID | 120 | .Vt OCSP_CERTID |
121 | object, representing an ASN.1 CertID structure defined in RFC 6960. | 121 | object, representing an ASN.1 |
122 | .Vt CertID | ||
123 | structure defined in RFC 6960. | ||
122 | It can store hashes of an issuer's distinguished name and public | 124 | It can store hashes of an issuer's distinguished name and public |
123 | key together with a serial number of a certificate. | 125 | key together with a serial number of a certificate. |
124 | It is used by the | 126 | It is used by the |
diff --git a/src/lib/libcrypto/man/OCSP_resp_find_status.3 b/src/lib/libcrypto/man/OCSP_resp_find_status.3 index 23aaa26e38..d06540d716 100644 --- a/src/lib/libcrypto/man/OCSP_resp_find_status.3 +++ b/src/lib/libcrypto/man/OCSP_resp_find_status.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.4 2016/12/12 22:48:02 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_RESP_FIND_STATUS 3 | 69 | .Dt OCSP_RESP_FIND_STATUS 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -140,7 +140,9 @@ | |||
140 | .Fn OCSP_SINGLERESP_new | 140 | .Fn OCSP_SINGLERESP_new |
141 | allocates and initializes an empty | 141 | allocates and initializes an empty |
142 | .Vt OCSP_SINGLERESP | 142 | .Vt OCSP_SINGLERESP |
143 | object, representing an ASN.1 SingleResponse structure defined in RFC 6960. | 143 | object, representing an ASN.1 |
144 | .Vt SingleResponse | ||
145 | structure defined in RFC 6960. | ||
144 | Each such object can store the server's answer regarding the validity | 146 | Each such object can store the server's answer regarding the validity |
145 | of one individual certificate. | 147 | of one individual certificate. |
146 | Such objects are used inside the | 148 | Such objects are used inside the |
@@ -156,7 +158,9 @@ frees | |||
156 | .Fn OCSP_CERTSTATUS_new | 158 | .Fn OCSP_CERTSTATUS_new |
157 | allocates and initializes an empty | 159 | allocates and initializes an empty |
158 | .Vt OCSP_CERTSTATUS | 160 | .Vt OCSP_CERTSTATUS |
159 | object, representing an ASN.1 CertStatus structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
162 | .Vt CertStatus | ||
163 | structure defined in RFC 6960. | ||
160 | Such an object is used inside | 164 | Such an object is used inside |
161 | .Vt OCSP_SINGLERESP . | 165 | .Vt OCSP_SINGLERESP . |
162 | .Fn OCSP_CERTSTATUS_free | 166 | .Fn OCSP_CERTSTATUS_free |
@@ -166,7 +170,9 @@ frees | |||
166 | .Fn OCSP_REVOKEDINFO_new | 170 | .Fn OCSP_REVOKEDINFO_new |
167 | allocates and initializes an empty | 171 | allocates and initializes an empty |
168 | .Vt OCSP_REVOKEDINFO | 172 | .Vt OCSP_REVOKEDINFO |
169 | object, representing an ASN.1 RevokedInfo structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
174 | .Vt RevokedInfo | ||
175 | structure defined in RFC 6960. | ||
170 | Such an object is used inside | 176 | Such an object is used inside |
171 | .Vt OCSP_CERTSTATUS . | 177 | .Vt OCSP_CERTSTATUS . |
172 | .Fn OCSP_REVOKEDINFO_free | 178 | .Fn OCSP_REVOKEDINFO_free |
diff --git a/src/lib/libcrypto/man/OCSP_response_status.3 b/src/lib/libcrypto/man/OCSP_response_status.3 index 33a9dfb1a2..1ffa8a728e 100644 --- a/src/lib/libcrypto/man/OCSP_response_status.3 +++ b/src/lib/libcrypto/man/OCSP_response_status.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OCSP_response_status.3,v 1.3 2016/12/12 18:45:29 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_response_status.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt OCSP_RESPONSE_STATUS 3 | 69 | .Dt OCSP_RESPONSE_STATUS 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -122,7 +122,9 @@ | |||
122 | .Fn OCSP_RESPONSE_new | 122 | .Fn OCSP_RESPONSE_new |
123 | allocates and initializes an empty | 123 | allocates and initializes an empty |
124 | .Vt OCSP_RESPONSE | 124 | .Vt OCSP_RESPONSE |
125 | object, representing an ASN.1 OCSPResponse structure defined in RFC 6960. | 125 | object, representing an ASN.1 |
126 | .Vt OCSPResponse | ||
127 | structure defined in RFC 6960. | ||
126 | .Fn OCSP_RESPONSE_free | 128 | .Fn OCSP_RESPONSE_free |
127 | frees | 129 | frees |
128 | .Fa resp . | 130 | .Fa resp . |
@@ -130,7 +132,9 @@ frees | |||
130 | .Fn OCSP_RESPBYTES_new | 132 | .Fn OCSP_RESPBYTES_new |
131 | allocates and initializes an empty | 133 | allocates and initializes an empty |
132 | .Vt OCSP_RESPBYTES | 134 | .Vt OCSP_RESPBYTES |
133 | object, representing an ASN.1 ResponseBytes structure defined in RFC 6960. | 135 | object, representing an ASN.1 |
136 | .Vt ResponseBytes | ||
137 | structure defined in RFC 6960. | ||
134 | Such an object is used inside | 138 | Such an object is used inside |
135 | .Vt OCSP_RESPONSE . | 139 | .Vt OCSP_RESPONSE . |
136 | .Fn OCSP_RESPBYTES_free | 140 | .Fn OCSP_RESPBYTES_free |
@@ -140,7 +144,9 @@ frees | |||
140 | .Fn OCSP_BASICRESP_new | 144 | .Fn OCSP_BASICRESP_new |
141 | allocates and initializes an empty | 145 | allocates and initializes an empty |
142 | .Vt OCSP_BASICRESP | 146 | .Vt OCSP_BASICRESP |
143 | object, representing an ASN.1 BasicOCSPResponse structure defined in RFC 6960. | 147 | object, representing an ASN.1 |
148 | .Vt BasicOCSPResponse | ||
149 | structure defined in RFC 6960. | ||
144 | .Vt OCSP_RESPBYTES | 150 | .Vt OCSP_RESPBYTES |
145 | contains the DER-encoded form of an | 151 | contains the DER-encoded form of an |
146 | .Vt OCSP_BASICRESP | 152 | .Vt OCSP_BASICRESP |
@@ -152,7 +158,9 @@ frees | |||
152 | .Fn OCSP_RESPDATA_new | 158 | .Fn OCSP_RESPDATA_new |
153 | allocates and initializes an empty | 159 | allocates and initializes an empty |
154 | .Vt OCSP_RESPDATA | 160 | .Vt OCSP_RESPDATA |
155 | object, representing an ASN.1 ResponseData structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
162 | .Vt ResponseData | ||
163 | structure defined in RFC 6960. | ||
156 | Such an object is used inside | 164 | Such an object is used inside |
157 | .Vt OCSP_BASICRESP . | 165 | .Vt OCSP_BASICRESP . |
158 | .Fn OCSP_RESPDATA_free | 166 | .Fn OCSP_RESPDATA_free |
@@ -162,7 +170,9 @@ frees | |||
162 | .Fn OCSP_RESPID_new | 170 | .Fn OCSP_RESPID_new |
163 | allocates and initializes an empty | 171 | allocates and initializes an empty |
164 | .Vt OCSP_RESPID | 172 | .Vt OCSP_RESPID |
165 | object, representing an ASN.1 ResponderID structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
174 | .Vt ResponderID | ||
175 | structure defined in RFC 6960. | ||
166 | Such an object is used inside | 176 | Such an object is used inside |
167 | .Vt OCSP_RESPDATA . | 177 | .Vt OCSP_RESPDATA . |
168 | .Fn OCSP_RESPID_free | 178 | .Fn OCSP_RESPID_free |
diff --git a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 index 6d3ede45c2..5d0852be25 100644 --- a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 +++ b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.6 2016/12/06 14:45:08 schwarze Exp $ | 1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 6 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 | 53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -747,8 +747,9 @@ and | |||
747 | .Fn PEM_write_PKCS8PrivateKey | 747 | .Fn PEM_write_PKCS8PrivateKey |
748 | write a private key in an | 748 | write a private key in an |
749 | .Vt EVP_PKEY | 749 | .Vt EVP_PKEY |
750 | structure in PKCS#8 EncryptedPrivateKeyInfo format using PKCS#5 | 750 | structure in PKCS#8 |
751 | v2.0 password based encryption algorithms. | 751 | .Vt EncryptedPrivateKeyInfo |
752 | format using PKCS#5 v2.0 password based encryption algorithms. | ||
752 | The | 753 | The |
753 | .Fa enc | 754 | .Fa enc |
754 | argument specifies the encryption algorithm to use: unlike all other PEM | 755 | argument specifies the encryption algorithm to use: unlike all other PEM |
@@ -758,13 +759,15 @@ If | |||
758 | .Fa enc | 759 | .Fa enc |
759 | is | 760 | is |
760 | .Dv NULL , | 761 | .Dv NULL , |
761 | then no encryption is used and a PKCS#8 PrivateKeyInfo structure | 762 | then no encryption is used and a PKCS#8 |
762 | is used instead. | 763 | .Vt PrivateKeyInfo |
764 | structure is used instead. | ||
763 | .Pp | 765 | .Pp |
764 | .Fn PEM_write_bio_PKCS8PrivateKey_nid | 766 | .Fn PEM_write_bio_PKCS8PrivateKey_nid |
765 | and | 767 | and |
766 | .Fn PEM_write_PKCS8PrivateKey_nid | 768 | .Fn PEM_write_PKCS8PrivateKey_nid |
767 | also write out a private key as a PKCS#8 EncryptedPrivateKeyInfo. | 769 | also write out a private key as a PKCS#8 |
770 | .Vt EncryptedPrivateKeyInfo . | ||
768 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. | 771 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. |
769 | The algorithm to use is specified in the | 772 | The algorithm to use is specified in the |
770 | .Fa nid | 773 | .Fa nid |
@@ -789,7 +792,9 @@ The | |||
789 | functions process a public key using an | 792 | functions process a public key using an |
790 | .Vt EVP_PKEY | 793 | .Vt EVP_PKEY |
791 | structure. | 794 | structure. |
792 | The public key is encoded as a SubjectPublicKeyInfo structure. | 795 | The public key is encoded as an ASN.1 |
796 | .Vt SubjectPublicKeyInfo | ||
797 | structure. | ||
793 | .Pp | 798 | .Pp |
794 | The | 799 | The |
795 | .Sy RSAPrivateKey | 800 | .Sy RSAPrivateKey |
@@ -805,15 +810,18 @@ The | |||
805 | functions process an RSA public key using an | 810 | functions process an RSA public key using an |
806 | .Vt RSA | 811 | .Vt RSA |
807 | structure. | 812 | structure. |
808 | The public key is encoded using a PKCS#1 RSAPublicKey structure. | 813 | The public key is encoded using a PKCS#1 |
814 | .Vt RSAPublicKey | ||
815 | structure. | ||
809 | .Pp | 816 | .Pp |
810 | The | 817 | The |
811 | .Sy RSA_PUBKEY | 818 | .Sy RSA_PUBKEY |
812 | functions also process an RSA public key using an | 819 | functions also process an RSA public key using an |
813 | .Vt RSA | 820 | .Vt RSA |
814 | structure. | 821 | structure. |
815 | However the public key is encoded using a SubjectPublicKeyInfo structure | 822 | However the public key is encoded using an ASN.1 |
816 | and an error occurs if the public key is not RSA. | 823 | .Vt SubjectPublicKeyInfo |
824 | structure and an error occurs if the public key is not RSA. | ||
817 | .Pp | 825 | .Pp |
818 | The | 826 | The |
819 | .Sy DSAPrivateKey | 827 | .Sy DSAPrivateKey |
@@ -829,8 +837,9 @@ The | |||
829 | functions process a DSA public key using a | 837 | functions process a DSA public key using a |
830 | .Vt DSA | 838 | .Vt DSA |
831 | structure. | 839 | structure. |
832 | The public key is encoded using a SubjectPublicKeyInfo structure and an | 840 | The public key is encoded using an ASN.1 |
833 | error occurs if the public key is not DSA. | 841 | .Vt SubjectPublicKeyInfo |
842 | structure and an error occurs if the public key is not DSA. | ||
834 | .Pp | 843 | .Pp |
835 | The | 844 | The |
836 | .Sy DSAparams | 845 | .Sy DSAparams |
@@ -906,7 +915,9 @@ structure. | |||
906 | .Pp | 915 | .Pp |
907 | The | 916 | The |
908 | .Sy PKCS7 | 917 | .Sy PKCS7 |
909 | functions process a PKCS#7 ContentInfo using a | 918 | functions process a PKCS#7 |
919 | .Vt ContentInfo | ||
920 | using a | ||
910 | .Vt PKCS7 | 921 | .Vt PKCS7 |
911 | structure. | 922 | structure. |
912 | .Pp | 923 | .Pp |
diff --git a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 index 8cb6835194..603c27bed1 100644 --- a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 +++ b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS12_SAFEBAG_NEW 3 | 18 | .Dt PKCS12_SAFEBAG_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn PKCS12_SAFEBAG_new | 37 | .Fn PKCS12_SAFEBAG_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt PKCS12_SAFEBAG | 39 | .Vt PKCS12_SAFEBAG |
40 | object, representing an ASN.1 SafeBag structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 7292 section 4.2. | 41 | .Vt SafeBag |
42 | structure defined in RFC 7292 section 4.2. | ||
42 | It can hold a pointer to a | 43 | It can hold a pointer to a |
43 | .Vt PKCS12_BAGS | 44 | .Vt PKCS12_BAGS |
44 | object together with a type identifier and optional attributes. | 45 | object together with a type identifier and optional attributes. |
@@ -49,7 +50,9 @@ frees | |||
49 | .Fn PKCS12_BAGS_new | 50 | .Fn PKCS12_BAGS_new |
50 | allocates and initializes an empty | 51 | allocates and initializes an empty |
51 | .Vt PKCS12_BAGS | 52 | .Vt PKCS12_BAGS |
52 | object, representing the bagValue field of an ASN.1 SafeBag structure. | 53 | object, representing the bagValue field of an ASN.1 |
54 | .Vt SafeBag | ||
55 | structure. | ||
53 | It is used in | 56 | It is used in |
54 | .Vt PKCS12_SAFEBAG | 57 | .Vt PKCS12_SAFEBAG |
55 | and can hold a DER-encoded X.509 certificate, | 58 | and can hold a DER-encoded X.509 certificate, |
diff --git a/src/lib/libcrypto/man/PKCS12_new.3 b/src/lib/libcrypto/man/PKCS12_new.3 index 426074c9b1..0f54048724 100644 --- a/src/lib/libcrypto/man/PKCS12_new.3 +++ b/src/lib/libcrypto/man/PKCS12_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS12_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS12_NEW 3 | 18 | .Dt PKCS12_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,7 +37,9 @@ | |||
37 | .Fn PKCS12_new | 37 | .Fn PKCS12_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt PKCS12 | 39 | .Vt PKCS12 |
40 | object, representing an ASN.1 PFX (personal information exchange) | 40 | object, representing an ASN.1 |
41 | .Vt PFX | ||
42 | .Pq personal information exchange | ||
41 | structure defined in RFC 7292 section 4. | 43 | structure defined in RFC 7292 section 4. |
42 | It can hold a pointer to a | 44 | It can hold a pointer to a |
43 | .Vt PKCS7 | 45 | .Vt PKCS7 |
@@ -53,8 +55,9 @@ frees | |||
53 | .Fn PKCS12_MAC_DATA_new | 55 | .Fn PKCS12_MAC_DATA_new |
54 | allocates and initializes an empty | 56 | allocates and initializes an empty |
55 | .Vt PKCS12_MAC_DATA | 57 | .Vt PKCS12_MAC_DATA |
56 | object, representing an ASN.1 MacData structure | 58 | object, representing an ASN.1 |
57 | defined in RFC 7292 section 4. | 59 | .Vt MacData |
60 | structure defined in RFC 7292 section 4. | ||
58 | It is used inside | 61 | It is used inside |
59 | .Vt PKCS12 | 62 | .Vt PKCS12 |
60 | and can hold a pointer to an | 63 | and can hold a pointer to an |
diff --git a/src/lib/libcrypto/man/PKCS7_new.3 b/src/lib/libcrypto/man/PKCS7_new.3 index 9feecbb88b..7f8cffd881 100644 --- a/src/lib/libcrypto/man/PKCS7_new.3 +++ b/src/lib/libcrypto/man/PKCS7_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS7_new.3,v 1.1 2016/12/13 14:31:55 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS7_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS7_NEW 3 | 18 | .Dt PKCS7_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -88,8 +88,9 @@ cryptography applied to it, in particular signed and encrypted data. | |||
88 | .Fn PKCS7_new | 88 | .Fn PKCS7_new |
89 | allocates and initializes an empty | 89 | allocates and initializes an empty |
90 | .Vt PKCS7 | 90 | .Vt PKCS7 |
91 | object, representing an ASN.1 ContentInfo structure | 91 | object, representing an ASN.1 |
92 | defined in RFC 2315 section 7. | 92 | .Vt ContentInfo |
93 | structure defined in RFC 2315 section 7. | ||
93 | It is the top-level data structure able to hold any kind of content | 94 | It is the top-level data structure able to hold any kind of content |
94 | that can be transmitted using PKCS#7. | 95 | that can be transmitted using PKCS#7. |
95 | It can be used recursively in | 96 | It can be used recursively in |
@@ -104,8 +105,9 @@ frees | |||
104 | .Fn PKCS7_SIGNED_new | 105 | .Fn PKCS7_SIGNED_new |
105 | allocates and initializes an empty | 106 | allocates and initializes an empty |
106 | .Vt PKCS7_SIGNED | 107 | .Vt PKCS7_SIGNED |
107 | object, representing an ASN.1 SignedData structure | 108 | object, representing an ASN.1 |
108 | defined in RFC 2315 section 9. | 109 | .Vt SignedData |
110 | structure defined in RFC 2315 section 9. | ||
109 | It can be used inside | 111 | It can be used inside |
110 | .Vt PKCS7 | 112 | .Vt PKCS7 |
111 | objects and holds any kind of content together with signatures by | 113 | objects and holds any kind of content together with signatures by |
@@ -118,8 +120,9 @@ frees | |||
118 | .Fn PKCS7_ENVELOPE_new | 120 | .Fn PKCS7_ENVELOPE_new |
119 | allocates and initializes an empty | 121 | allocates and initializes an empty |
120 | .Vt PKCS7_ENVELOPE | 122 | .Vt PKCS7_ENVELOPE |
121 | object, representing an ASN.1 EnvelopedData structure | 123 | object, representing an ASN.1 |
122 | defined in RFC 2315 section 10. | 124 | .Vt EnvelopedData |
125 | structure defined in RFC 2315 section 10. | ||
123 | It can be used inside | 126 | It can be used inside |
124 | .Vt PKCS7 | 127 | .Vt PKCS7 |
125 | objects and holds any kind of encrypted content together with | 128 | objects and holds any kind of encrypted content together with |
@@ -131,8 +134,9 @@ frees | |||
131 | .Fn PKCS7_SIGN_ENVELOPE_new | 134 | .Fn PKCS7_SIGN_ENVELOPE_new |
132 | allocates and initializes an empty | 135 | allocates and initializes an empty |
133 | .Vt PKCS7_SIGN_ENVELOPE | 136 | .Vt PKCS7_SIGN_ENVELOPE |
134 | object, representing an ASN.1 SignedAndEnvelopedData structure | 137 | object, representing an ASN.1 |
135 | defined in RFC 2315 section 11. | 138 | .Vt SignedAndEnvelopedData |
139 | structure defined in RFC 2315 section 11. | ||
136 | It can be used inside | 140 | It can be used inside |
137 | .Vt PKCS7 | 141 | .Vt PKCS7 |
138 | objects and holds any kind of encrypted content together with | 142 | objects and holds any kind of encrypted content together with |
@@ -146,8 +150,9 @@ frees | |||
146 | .Fn PKCS7_DIGEST_new | 150 | .Fn PKCS7_DIGEST_new |
147 | allocates and initializes an empty | 151 | allocates and initializes an empty |
148 | .Vt PKCS7_DIGEST | 152 | .Vt PKCS7_DIGEST |
149 | object, representing an ASN.1 DigestedData structure | 153 | object, representing an ASN.1 |
150 | defined in RFC 2315 section 12. | 154 | .Vt DigestedData |
155 | structure defined in RFC 2315 section 12. | ||
151 | It can be used inside | 156 | It can be used inside |
152 | .Vt PKCS7 | 157 | .Vt PKCS7 |
153 | objects and holds any kind of content together with a message digest | 158 | objects and holds any kind of content together with a message digest |
@@ -159,8 +164,9 @@ frees | |||
159 | .Fn PKCS7_ENCRYPT_new | 164 | .Fn PKCS7_ENCRYPT_new |
160 | allocates and initializes an empty | 165 | allocates and initializes an empty |
161 | .Vt PKCS7_ENCRYPT | 166 | .Vt PKCS7_ENCRYPT |
162 | object, representing an ASN.1 EncryptedData structure | 167 | object, representing an ASN.1 |
163 | defined in RFC 2315 section 13. | 168 | .Vt EncryptedData |
169 | structure defined in RFC 2315 section 13. | ||
164 | It can be used inside | 170 | It can be used inside |
165 | .Vt PKCS7 | 171 | .Vt PKCS7 |
166 | objects and holds any kind of encrypted content. | 172 | objects and holds any kind of encrypted content. |
@@ -172,8 +178,9 @@ frees | |||
172 | .Fn PKCS7_ENC_CONTENT_new | 178 | .Fn PKCS7_ENC_CONTENT_new |
173 | allocates and initializes an empty | 179 | allocates and initializes an empty |
174 | .Vt PKCS7_ENC_CONTENT | 180 | .Vt PKCS7_ENC_CONTENT |
175 | object, representing an ASN.1 EncryptedContentInfo structure | 181 | object, representing an ASN.1 |
176 | defined in RFC 2315 section 10.1. | 182 | .Vt EncryptedContentInfo |
183 | structure defined in RFC 2315 section 10.1. | ||
177 | It can be used inside | 184 | It can be used inside |
178 | .Vt PKCS7_ENVELOPE , | 185 | .Vt PKCS7_ENVELOPE , |
179 | .Vt PKCS7_SIGN_ENVELOPE , | 186 | .Vt PKCS7_SIGN_ENVELOPE , |
@@ -188,8 +195,9 @@ frees | |||
188 | .Fn PKCS7_SIGNER_INFO_new | 195 | .Fn PKCS7_SIGNER_INFO_new |
189 | allocates and initializes an empty | 196 | allocates and initializes an empty |
190 | .Vt PKCS7_SIGNER_INFO | 197 | .Vt PKCS7_SIGNER_INFO |
191 | object, representing an ASN.1 SignerInfo structure | 198 | object, representing an ASN.1 |
192 | defined in RFC 2315 section 9.2. | 199 | .Vt SignerInfo |
200 | structure defined in RFC 2315 section 9.2. | ||
193 | It can be used inside | 201 | It can be used inside |
194 | .Vt PKCS7_SIGNED | 202 | .Vt PKCS7_SIGNED |
195 | and | 203 | and |
@@ -203,8 +211,9 @@ frees | |||
203 | .Fn PKCS7_RECIP_INFO_new | 211 | .Fn PKCS7_RECIP_INFO_new |
204 | allocates and initializes an empty | 212 | allocates and initializes an empty |
205 | .Vt PKCS7_RECIP_INFO | 213 | .Vt PKCS7_RECIP_INFO |
206 | object, representing an ASN.1 RecipientInfo structure | 214 | object, representing an ASN.1 |
207 | defined in RFC 2315 section 10.2. | 215 | .Vt RecipientInfo |
216 | structure defined in RFC 2315 section 10.2. | ||
208 | It can be used inside | 217 | It can be used inside |
209 | .Vt PKCS7_ENVELOPE | 218 | .Vt PKCS7_ENVELOPE |
210 | and | 219 | and |
@@ -218,8 +227,9 @@ frees | |||
218 | .Fn PKCS7_ISSUER_AND_SERIAL_new | 227 | .Fn PKCS7_ISSUER_AND_SERIAL_new |
219 | allocates and initializes an empty | 228 | allocates and initializes an empty |
220 | .Vt PKCS7_ISSUER_AND_SERIAL | 229 | .Vt PKCS7_ISSUER_AND_SERIAL |
221 | object, representing an ASN.1 IssuerAndSerialNumber structure | 230 | object, representing an ASN.1 |
222 | defined in RFC 2315 section 6.7. | 231 | .Vt IssuerAndSerialNumber |
232 | structure defined in RFC 2315 section 6.7. | ||
223 | It can be used inside | 233 | It can be used inside |
224 | .Vt PKCS7_SIGNER_INFO | 234 | .Vt PKCS7_SIGNER_INFO |
225 | and | 235 | and |
diff --git a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 index d522dab9f8..8c6dba3514 100644 --- a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 +++ b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.1 2016/12/22 12:10:06 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 | 18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn PKCS8_PRIV_KEY_INFO_new | 31 | .Fn PKCS8_PRIV_KEY_INFO_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt PKCS8_PRIV_KEY_INFO | 33 | .Vt PKCS8_PRIV_KEY_INFO |
34 | object, representing an ASN.1 PrivateKeyInfo structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 5208 section 5. | 35 | .Vt PrivateKeyInfo |
36 | structure defined in RFC 5208 section 5. | ||
36 | It can hold a private key together with information about the | 37 | It can hold a private key together with information about the |
37 | algorithm to be used with it and optional attributes. | 38 | algorithm to be used with it and optional attributes. |
38 | .Pp | 39 | .Pp |
diff --git a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 index 3200b85fb4..888859b1e6 100644 --- a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 +++ b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.2 2016/12/24 08:19:04 jmc Exp $ | 1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PKEY_USAGE_PERIOD_NEW 3 | 18 | .Dt PKEY_USAGE_PERIOD_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn PKEY_USAGE_PERIOD_new | 31 | .Fn PKEY_USAGE_PERIOD_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt PKEY_USAGE_PERIOD | 33 | .Vt PKEY_USAGE_PERIOD |
34 | object, representing an ASN.1 PrivateKeyUsagePeriod structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 3280 section 4.2.1.4. | 35 | .Vt PrivateKeyUsagePeriod |
36 | structure defined in RFC 3280 section 4.2.1.4. | ||
36 | It could be used in | 37 | It could be used in |
37 | .Vt X509 | 38 | .Vt X509 |
38 | certificates to specify a validity period for the private key | 39 | certificates to specify a validity period for the private key |
@@ -59,7 +60,8 @@ Certificate Revocation List (CRL) Profile, | |||
59 | section 4.2.1.4: Private Key Usage Period | 60 | section 4.2.1.4: Private Key Usage Period |
60 | .Pp | 61 | .Pp |
61 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 | 62 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 |
62 | in RFC 3280, which specified the PrivateKeyUsagePeriod certificate | 63 | in RFC 3280, which specified the |
63 | extension but deprecated its use, was removed. | 64 | .Vt PrivateKeyUsagePeriod |
65 | certificate extension but deprecated its use, was removed. | ||
64 | Use of this ISO standard extension is neither deprecated | 66 | Use of this ISO standard extension is neither deprecated |
65 | nor recommended for use in the Internet PKI." | 67 | nor recommended for use in the Internet PKI." |
diff --git a/src/lib/libcrypto/man/POLICYINFO_new.3 b/src/lib/libcrypto/man/POLICYINFO_new.3 index a76385fc6b..ea225a2d03 100644 --- a/src/lib/libcrypto/man/POLICYINFO_new.3 +++ b/src/lib/libcrypto/man/POLICYINFO_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.1 2016/12/23 18:50:23 schwarze Exp $ | 1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt POLICYINFO_NEW 3 | 18 | .Dt POLICYINFO_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -70,8 +70,9 @@ restrictions on their intended use. | |||
70 | .Fn POLICYINFO_new | 70 | .Fn POLICYINFO_new |
71 | allocates and initializes an empty | 71 | allocates and initializes an empty |
72 | .Vt POLICYINFO | 72 | .Vt POLICYINFO |
73 | object, representing an ASN.1 PolicyInformation structure | 73 | object, representing an ASN.1 |
74 | defined in RFC 5280 section 4.2.1.4. | 74 | .Vt PolicyInformation |
75 | structure defined in RFC 5280 section 4.2.1.4. | ||
75 | It can hold a policy identifier and optional advisory qualifiers. | 76 | It can hold a policy identifier and optional advisory qualifiers. |
76 | .Fn POLICYINFO_free | 77 | .Fn POLICYINFO_free |
77 | frees | 78 | frees |
@@ -94,8 +95,9 @@ frees | |||
94 | .Fn POLICYQUALINFO_new | 95 | .Fn POLICYQUALINFO_new |
95 | allocates and initializes an empty | 96 | allocates and initializes an empty |
96 | .Vt POLICYQUALINFO | 97 | .Vt POLICYQUALINFO |
97 | object, representing an ASN.1 PolicyQualifierInfo structure | 98 | object, representing an ASN.1 |
98 | defined in RFC 5280 section 4.2.1.4. | 99 | .Vt PolicyQualifierInfo |
100 | structure defined in RFC 5280 section 4.2.1.4. | ||
99 | It can be used in | 101 | It can be used in |
100 | .Vt POLICYINFO | 102 | .Vt POLICYINFO |
101 | and it can hold either a uniform resource identifier of a certification | 103 | and it can hold either a uniform resource identifier of a certification |
@@ -109,8 +111,9 @@ frees | |||
109 | .Fn USERNOTICE_new | 111 | .Fn USERNOTICE_new |
110 | allocates and initializes an empty | 112 | allocates and initializes an empty |
111 | .Vt USERNOTICE | 113 | .Vt USERNOTICE |
112 | object, representing an ASN.1 UserNotice structure | 114 | object, representing an ASN.1 |
113 | defined in RFC 5280 section 4.2.1.4. | 115 | .Vt UserNotice |
116 | structure defined in RFC 5280 section 4.2.1.4. | ||
114 | It can be used in | 117 | It can be used in |
115 | .Vt POLICYQUALINFO | 118 | .Vt POLICYQUALINFO |
116 | and it can hold either an | 119 | and it can hold either an |
@@ -125,8 +128,9 @@ frees | |||
125 | .Fn NOTICEREF_new | 128 | .Fn NOTICEREF_new |
126 | allocates and initializes an empty | 129 | allocates and initializes an empty |
127 | .Vt NOTICEREF | 130 | .Vt NOTICEREF |
128 | object, representing an ASN.1 NoticeReference structure | 131 | object, representing an ASN.1 |
129 | defined in RFC 5280 section 4.2.1.4. | 132 | .Vt NoticeReference |
133 | structure defined in RFC 5280 section 4.2.1.4. | ||
130 | It can be used in | 134 | It can be used in |
131 | .Vt USERNOTICE | 135 | .Vt USERNOTICE |
132 | and can hold an organization name and a stack of notice numbers. | 136 | and can hold an organization name and a stack of notice numbers. |
@@ -137,8 +141,9 @@ frees | |||
137 | .Fn POLICY_MAPPING_new | 141 | .Fn POLICY_MAPPING_new |
138 | allocates and initializes an empty | 142 | allocates and initializes an empty |
139 | .Vt POLICY_MAPPING | 143 | .Vt POLICY_MAPPING |
140 | object, representing an ASN.1 PolicyMappings structure | 144 | object, representing an ASN.1 |
141 | defined in RFC 5280 section 4.2.1.5. | 145 | .Vt PolicyMappings |
146 | structure defined in RFC 5280 section 4.2.1.5. | ||
142 | It can be used in | 147 | It can be used in |
143 | .Vt X509 | 148 | .Vt X509 |
144 | CA certificates and can hold a list of pairs of policy identifiers, | 149 | CA certificates and can hold a list of pairs of policy identifiers, |
@@ -151,8 +156,9 @@ frees | |||
151 | .Fn POLICY_CONSTRAINTS_new | 156 | .Fn POLICY_CONSTRAINTS_new |
152 | allocates and initializes an empty | 157 | allocates and initializes an empty |
153 | .Vt POLICY_CONSTRAINTS | 158 | .Vt POLICY_CONSTRAINTS |
154 | object, representing an ASN.1 PolicyConstraints structure | 159 | object, representing an ASN.1 |
155 | defined in RFC 5280 section 4.2.1.11. | 160 | .Vt PolicyConstraints |
161 | structure defined in RFC 5280 section 4.2.1.11. | ||
156 | It can be used in | 162 | It can be used in |
157 | .Vt X509 | 163 | .Vt X509 |
158 | CA certificates to restrict policy mapping and/or to require explicit | 164 | CA certificates to restrict policy mapping and/or to require explicit |
diff --git a/src/lib/libcrypto/man/PROXY_POLICY_new.3 b/src/lib/libcrypto/man/PROXY_POLICY_new.3 index eb4e963033..387ee3fb7f 100644 --- a/src/lib/libcrypto/man/PROXY_POLICY_new.3 +++ b/src/lib/libcrypto/man/PROXY_POLICY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.1 2016/12/23 23:19:57 schwarze Exp $ | 1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt PROXY_POLICY_NEW 3 | 18 | .Dt PROXY_POLICY_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -43,8 +43,9 @@ privileges on behalf of the subject of the original certificate. | |||
43 | .Fn PROXY_POLICY_new | 43 | .Fn PROXY_POLICY_new |
44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
45 | .Vt PROXY_POLICY | 45 | .Vt PROXY_POLICY |
46 | object, representing an ASN.1 ProxyPolicy structure | 46 | object, representing an ASN.1 |
47 | defined in RFC 3820 section 3.8. | 47 | .Vt ProxyPolicy |
48 | structure defined in RFC 3820 section 3.8. | ||
48 | It defines which privileges are to be delegated. | 49 | It defines which privileges are to be delegated. |
49 | .Fn PROXY_POLICY_free | 50 | .Fn PROXY_POLICY_free |
50 | frees | 51 | frees |
@@ -53,8 +54,9 @@ frees | |||
53 | .Fn PROXY_CERT_INFO_EXTENSION_new | 54 | .Fn PROXY_CERT_INFO_EXTENSION_new |
54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
55 | .Vt PROXY_CERT_INFO_EXTENSION | 56 | .Vt PROXY_CERT_INFO_EXTENSION |
56 | object, representing an ASN.1 ProxyCertInfo structure | 57 | object, representing an ASN.1 |
57 | defined in RFC 3820 section 3.8. | 58 | .Vt ProxyCertInfo |
59 | structure defined in RFC 3820 section 3.8. | ||
58 | It can contain a | 60 | It can contain a |
59 | .Vt PROXY_POLICY | 61 | .Vt PROXY_POLICY |
60 | object, and it can additionally restrict the maximum depth of the | 62 | object, and it can additionally restrict the maximum depth of the |
diff --git a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 index 8d6817b8bd..25a1c25ed3 100644 --- a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 +++ b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.1 2016/12/13 20:41:35 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt RSA_PSS_PARAMS_NEW 3 | 18 | .Dt RSA_PSS_PARAMS_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,9 @@ | |||
31 | .Fn RSA_PSS_PARAMS_new | 31 | .Fn RSA_PSS_PARAMS_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt RSA_PSS_PARAMS | 33 | .Vt RSA_PSS_PARAMS |
34 | object, representing an ASN.1 RSASSA-PSS-params structure | 34 | object, representing an ASN.1 |
35 | defined in RFC 8017 appendix A.2.3. | 35 | .Vt RSASSA-PSS-params |
36 | structure defined in RFC 8017 appendix A.2.3. | ||
36 | It references the hash function and the mask generation function | 37 | It references the hash function and the mask generation function |
37 | and stores the length of the salt and the trailer field number. | 38 | and stores the length of the salt and the trailer field number. |
38 | .Fn RSA_PSS_PARAMS_free | 39 | .Fn RSA_PSS_PARAMS_free |
diff --git a/src/lib/libcrypto/man/TS_REQ_new.3 b/src/lib/libcrypto/man/TS_REQ_new.3 index d1a0e90f21..35da948436 100644 --- a/src/lib/libcrypto/man/TS_REQ_new.3 +++ b/src/lib/libcrypto/man/TS_REQ_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: TS_REQ_new.3,v 1.3 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: TS_REQ_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt TS_REQ_NEW 3 | 18 | .Dt TS_REQ_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -67,8 +67,9 @@ which returns time-stamp tokens to the clients. | |||
67 | .Fn TS_REQ_new | 67 | .Fn TS_REQ_new |
68 | allocates and initializes an empty | 68 | allocates and initializes an empty |
69 | .Vt TS_REQ | 69 | .Vt TS_REQ |
70 | object, representing an ASN.1 TimeStampReq structure | 70 | object, representing an ASN.1 |
71 | defined in RFC 3161 section 2.4.1. | 71 | .Vt TimeStampReq |
72 | structure defined in RFC 3161 section 2.4.1. | ||
72 | It can hold a hash of the datum to be time-stamped and some | 73 | It can hold a hash of the datum to be time-stamped and some |
73 | auxiliary, optional information. | 74 | auxiliary, optional information. |
74 | .Fn TS_REQ_free | 75 | .Fn TS_REQ_free |
@@ -78,8 +79,9 @@ frees | |||
78 | .Fn TS_RESP_new | 79 | .Fn TS_RESP_new |
79 | allocates and initializes an empty | 80 | allocates and initializes an empty |
80 | .Vt TS_RESP | 81 | .Vt TS_RESP |
81 | object, representing an ASN.1 TimeStampResp structure | 82 | object, representing an ASN.1 |
82 | defined in RFC 3161 section 2.4.2. | 83 | .Vt TimeStampResp |
84 | structure defined in RFC 3161 section 2.4.2. | ||
83 | It can hold status information and a time-stamp token. | 85 | It can hold status information and a time-stamp token. |
84 | .Fn TS_RESP_free | 86 | .Fn TS_RESP_free |
85 | frees | 87 | frees |
@@ -88,8 +90,9 @@ frees | |||
88 | .Fn TS_STATUS_INFO_new | 90 | .Fn TS_STATUS_INFO_new |
89 | allocates and initializes an empty | 91 | allocates and initializes an empty |
90 | .Vt TS_STATUS_INFO | 92 | .Vt TS_STATUS_INFO |
91 | object, representing an ASN.1 PKIStatusInfo structure | 93 | object, representing an ASN.1 |
92 | defined in RFC 3161 section 2.4.2. | 94 | .Vt PKIStatusInfo |
95 | structure defined in RFC 3161 section 2.4.2. | ||
93 | It is used inside | 96 | It is used inside |
94 | .Vt TS_RESP | 97 | .Vt TS_RESP |
95 | and describes the outcome of one time-stamp request. | 98 | and describes the outcome of one time-stamp request. |
@@ -100,8 +103,9 @@ frees | |||
100 | .Fn TS_TST_INFO_new | 103 | .Fn TS_TST_INFO_new |
101 | allocates and initializes an empty | 104 | allocates and initializes an empty |
102 | .Vt TS_TST_INFO | 105 | .Vt TS_TST_INFO |
103 | object, representing an ASN.1 TSTInfo structure | 106 | object, representing an ASN.1 |
104 | defined in RFC 3161 section 2.4.2. | 107 | .Vt TSTInfo |
108 | structure defined in RFC 3161 section 2.4.2. | ||
105 | It is the time-stamp token included in a | 109 | It is the time-stamp token included in a |
106 | .Vt TS_RESP | 110 | .Vt TS_RESP |
107 | object in case of success, and it can hold the hash of the datum | 111 | object in case of success, and it can hold the hash of the datum |
@@ -114,8 +118,9 @@ frees | |||
114 | .Fn TS_ACCURACY_new | 118 | .Fn TS_ACCURACY_new |
115 | allocates and initializes an empty | 119 | allocates and initializes an empty |
116 | .Vt TS_ACCURACY | 120 | .Vt TS_ACCURACY |
117 | object, representing an ASN.1 Accuracy structure | 121 | object, representing an ASN.1 |
118 | defined in RFC 3161 section 2.4.2. | 122 | .Vt Accuracy |
123 | structure defined in RFC 3161 section 2.4.2. | ||
119 | It can be used inside a | 124 | It can be used inside a |
120 | .Vt TS_TST_INFO | 125 | .Vt TS_TST_INFO |
121 | object and indicates the maximum error of the time stated in the token. | 126 | object and indicates the maximum error of the time stated in the token. |
@@ -126,8 +131,9 @@ frees | |||
126 | .Fn TS_MSG_IMPRINT_new | 131 | .Fn TS_MSG_IMPRINT_new |
127 | allocates and initializes an empty | 132 | allocates and initializes an empty |
128 | .Vt TS_MSG_IMPRINT | 133 | .Vt TS_MSG_IMPRINT |
129 | object, representing an ASN.1 MessageImprint structure | 134 | object, representing an ASN.1 |
130 | defined in RFC 3161 section 2.4.1. | 135 | .Vt MessageImprint |
136 | structure defined in RFC 3161 section 2.4.1. | ||
131 | It is used inside | 137 | It is used inside |
132 | .Vt TS_REQ | 138 | .Vt TS_REQ |
133 | and | 139 | and |
diff --git a/src/lib/libcrypto/man/X509_ALGOR_dup.3 b/src/lib/libcrypto/man/X509_ALGOR_dup.3 index 7a46b372c2..b1a28e11ba 100644 --- a/src/lib/libcrypto/man/X509_ALGOR_dup.3 +++ b/src/lib/libcrypto/man/X509_ALGOR_dup.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.4 2016/12/15 23:29:38 jmc Exp $ | 1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 | 2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 15 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_ALGOR_DUP 3 | 69 | .Dt X509_ALGOR_DUP 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -115,8 +115,9 @@ | |||
115 | .Fn X509_ALGOR_new | 115 | .Fn X509_ALGOR_new |
116 | allocates and initializes an empty | 116 | allocates and initializes an empty |
117 | .Vt X509_ALGOR | 117 | .Vt X509_ALGOR |
118 | object, representing an ASN.1 AlgorithmIdentifier structure | 118 | object, representing an ASN.1 |
119 | defined in RFC 5280 section 4.1.1.2. | 119 | .Vt AlgorithmIdentifier |
120 | structure defined in RFC 5280 section 4.1.1.2. | ||
120 | Such objects can specify a cryptographic algorithm together | 121 | Such objects can specify a cryptographic algorithm together |
121 | with algorithm-specific parameters. | 122 | with algorithm-specific parameters. |
122 | They are used by many other objects, for example certificates, | 123 | They are used by many other objects, for example certificates, |
diff --git a/src/lib/libcrypto/man/X509_CINF_new.3 b/src/lib/libcrypto/man/X509_CINF_new.3 index fdfc4c8c7b..7ac86b6d36 100644 --- a/src/lib/libcrypto/man/X509_CINF_new.3 +++ b/src/lib/libcrypto/man/X509_CINF_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_CINF_new.3,v 1.1 2016/12/16 09:17:59 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CINF_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 16 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_CINF_NEW 3 | 18 | .Dt X509_CINF_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -43,8 +43,9 @@ | |||
43 | .Fn X509_CINF_new | 43 | .Fn X509_CINF_new |
44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
45 | .Vt X509_CINF | 45 | .Vt X509_CINF |
46 | object, representing an ASN.1 TBSCertificate structure | 46 | object, representing an ASN.1 |
47 | defined in RFC 5280 section 4.1. | 47 | .Vt TBSCertificate |
48 | structure defined in RFC 5280 section 4.1. | ||
48 | It is used inside the | 49 | It is used inside the |
49 | .Vt X509 | 50 | .Vt X509 |
50 | object and holds the main information contained in the X.509 | 51 | object and holds the main information contained in the X.509 |
@@ -57,8 +58,9 @@ frees | |||
57 | .Fn X509_VAL_new | 58 | .Fn X509_VAL_new |
58 | allocates and initializes an empty | 59 | allocates and initializes an empty |
59 | .Vt X509_VAL | 60 | .Vt X509_VAL |
60 | object, representing an ASN.1 Validity structure | 61 | object, representing an ASN.1 |
61 | defined in RFC 5280 section 4.1. | 62 | .Vt Validity |
63 | structure defined in RFC 5280 section 4.1. | ||
62 | It is used inside the | 64 | It is used inside the |
63 | .Vt X509_CINF | 65 | .Vt X509_CINF |
64 | object and holds the validity period of the certificate. | 66 | object and holds the validity period of the certificate. |
diff --git a/src/lib/libcrypto/man/X509_CRL_new.3 b/src/lib/libcrypto/man/X509_CRL_new.3 index 03a0caa5be..2f35b100cb 100644 --- a/src/lib/libcrypto/man/X509_CRL_new.3 +++ b/src/lib/libcrypto/man/X509_CRL_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_CRL_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CRL_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_CRL_NEW 3 | 18 | .Dt X509_CRL_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn X509_CRL_new | 37 | .Fn X509_CRL_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt X509_CRL | 39 | .Vt X509_CRL |
40 | object, representing an ASN.1 CertificateList structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 5280 section 5.1. | 41 | .Vt CertificateList |
42 | structure defined in RFC 5280 section 5.1. | ||
42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
43 | .Vt X509_CRL_INFO | 44 | .Vt X509_CRL_INFO |
44 | object discussed below together with a cryptographic signature | 45 | object discussed below together with a cryptographic signature |
@@ -50,8 +51,9 @@ frees | |||
50 | .Fn X509_CRL_INFO_new | 51 | .Fn X509_CRL_INFO_new |
51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
52 | .Vt X509_CRL_INFO | 53 | .Vt X509_CRL_INFO |
53 | object, representing an ASN.1 TBSCertList structure | 54 | object, representing an ASN.1 |
54 | defined in RFC 5280 section 5.1. | 55 | .Vt TBSCertList |
56 | structure defined in RFC 5280 section 5.1. | ||
55 | It is used inside the | 57 | It is used inside the |
56 | .Vt X509_CRL | 58 | .Vt X509_CRL |
57 | object and can hold a list of revoked certificates, an issuer name, | 59 | object and can hold a list of revoked certificates, an issuer name, |
diff --git a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 index b9a33ce137..850be6e66b 100644 --- a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 +++ b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.4 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_EXTENSION_SET_OBJECT 3 | 69 | .Dt X509_EXTENSION_SET_OBJECT 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -131,8 +131,9 @@ | |||
131 | .Fn X509_EXTENSION_new | 131 | .Fn X509_EXTENSION_new |
132 | allocates and initializes an empty | 132 | allocates and initializes an empty |
133 | .Vt X509_EXTENSION | 133 | .Vt X509_EXTENSION |
134 | object, representing an ASN.1 Extension structure | 134 | object, representing an ASN.1 |
135 | defined in RFC 5280 section 4.1. | 135 | .Vt Extension |
136 | structure defined in RFC 5280 section 4.1. | ||
136 | It is a wrapper object around specific extension objects of different | 137 | It is a wrapper object around specific extension objects of different |
137 | types and stores an extension type identifier and a criticality | 138 | types and stores an extension type identifier and a criticality |
138 | flag in addition to the DER-encoded form of the wrapped object. | 139 | flag in addition to the DER-encoded form of the wrapped object. |
diff --git a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 index bfd4fb2536..e11a4b7708 100644 --- a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 +++ b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.5 2016/12/14 21:22:06 jmc Exp $ | 1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 | 69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -134,9 +134,12 @@ | |||
134 | .Fa "int len" | 134 | .Fa "int len" |
135 | .Fc | 135 | .Fc |
136 | .Sh DESCRIPTION | 136 | .Sh DESCRIPTION |
137 | An X.501 RelativeDistinguishedName is a set of field type and | 137 | An X.501 |
138 | value pairs. | 138 | .Vt RelativeDistinguishedName |
139 | It is the building block for constructing X.501 Name objects. | 139 | is a set of field type and value pairs. |
140 | It is the building block for constructing X.501 | ||
141 | .Vt Name | ||
142 | objects. | ||
140 | This implementation only supports sets with one element, so an | 143 | This implementation only supports sets with one element, so an |
141 | .Vt X509_NAME_ENTRY | 144 | .Vt X509_NAME_ENTRY |
142 | object contains only one field type and one value. | 145 | object contains only one field type and one value. |
@@ -144,8 +147,9 @@ object contains only one field type and one value. | |||
144 | .Fn X509_NAME_ENTRY_new | 147 | .Fn X509_NAME_ENTRY_new |
145 | allocates and initializes an empty | 148 | allocates and initializes an empty |
146 | .Vt X509_NAME_ENTRY | 149 | .Vt X509_NAME_ENTRY |
147 | object, representing an ASN.1 RelativeDistinguishedName structure | 150 | object, representing an ASN.1 |
148 | defined in RFC 5280 section 4.1.2.4. | 151 | .Vt RelativeDistinguishedName |
152 | structure defined in RFC 5280 section 4.1.2.4. | ||
149 | .Pp | 153 | .Pp |
150 | .Fn X509_NAME_ENTRY_free | 154 | .Fn X509_NAME_ENTRY_free |
151 | frees | 155 | frees |
diff --git a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 index 6260e5f345..50e23829bd 100644 --- a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 +++ b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 | 53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -197,7 +197,9 @@ can be set to -1 and | |||
197 | to 0. | 197 | to 0. |
198 | This adds a new entry to the end of | 198 | This adds a new entry to the end of |
199 | .Fa name | 199 | .Fa name |
200 | as a single valued RelativeDistinguishedName (RDN). | 200 | as a single valued |
201 | .Vt RelativeDistinguishedName | ||
202 | (RDN). | ||
201 | .Pp | 203 | .Pp |
202 | .Fa loc | 204 | .Fa loc |
203 | actually determines the index where the new entry is inserted: | 205 | actually determines the index where the new entry is inserted: |
diff --git a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 index 6da0661831..b6571ccc1d 100644 --- a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 +++ b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 | 53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -103,8 +103,8 @@ These functions allow an | |||
103 | structure to be examined. | 103 | structure to be examined. |
104 | The | 104 | The |
105 | .Vt X509_NAME | 105 | .Vt X509_NAME |
106 | structure is the same as the | 106 | structure is the same as the ASN.1 |
107 | .Sy Name | 107 | .Vt Name |
108 | type defined in RFC 2459 (and elsewhere) and used, for example, | 108 | type defined in RFC 2459 (and elsewhere) and used, for example, |
109 | in certificate subject and issuer names. | 109 | in certificate subject and issuer names. |
110 | .Pp | 110 | .Pp |
@@ -235,7 +235,10 @@ are legacy functions which have various limitations which make them of | |||
235 | minimal use in practice. | 235 | minimal use in practice. |
236 | They can only find the first matching entry and will copy the contents | 236 | They can only find the first matching entry and will copy the contents |
237 | of the field verbatim: this can be highly confusing if the target is a | 237 | of the field verbatim: this can be highly confusing if the target is a |
238 | multicharacter string type like a BMPString or a UTF8String. | 238 | multicharacter string type like a |
239 | .Vt BMPString | ||
240 | or a | ||
241 | .Vt UTF8String . | ||
239 | .Pp | 242 | .Pp |
240 | For a more general solution, | 243 | For a more general solution, |
241 | .Fn X509_NAME_get_index_by_NID | 244 | .Fn X509_NAME_get_index_by_NID |
diff --git a/src/lib/libcrypto/man/X509_NAME_new.3 b/src/lib/libcrypto/man/X509_NAME_new.3 index 5666635198..c4efab7784 100644 --- a/src/lib/libcrypto/man/X509_NAME_new.3 +++ b/src/lib/libcrypto/man/X509_NAME_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_NAME_NEW 3 | 18 | .Dt X509_NAME_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,12 +31,16 @@ | |||
31 | .Ft void | 31 | .Ft void |
32 | .Fn X509_NAME_free "X509_NAME *name" | 32 | .Fn X509_NAME_free "X509_NAME *name" |
33 | .Sh DESCRIPTION | 33 | .Sh DESCRIPTION |
34 | An X.501 Name is an ordered sequence of relative distinguished names. | 34 | An X.501 |
35 | .Vt Name | ||
36 | is an ordered sequence of relative distinguished names. | ||
35 | A relative distinguished name is a set of key-value pairs; see | 37 | A relative distinguished name is a set of key-value pairs; see |
36 | .Xr X509_NAME_ENTRY_new 3 | 38 | .Xr X509_NAME_ENTRY_new 3 |
37 | for details. | 39 | for details. |
38 | .Pp | 40 | .Pp |
39 | Various X.509 structures contain X.501 Name substructures. | 41 | Various X.509 structures contain X.501 |
42 | .Vt Name | ||
43 | substructures. | ||
40 | They are for example used for the issuers of certificates and | 44 | They are for example used for the issuers of certificates and |
41 | certificate revocation lists and for the subjects of certificates | 45 | certificate revocation lists and for the subjects of certificates |
42 | and certificate requests. | 46 | and certificate requests. |
@@ -44,8 +48,9 @@ and certificate requests. | |||
44 | .Fn X509_NAME_new | 48 | .Fn X509_NAME_new |
45 | allocates and initializes an empty | 49 | allocates and initializes an empty |
46 | .Vt X509_NAME | 50 | .Vt X509_NAME |
47 | object, representing an ASN.1 Name structure | 51 | object, representing an ASN.1 |
48 | defined in RFC 5280 section 4.1.2.4. | 52 | .Vt Name |
53 | structure defined in RFC 5280 section 4.1.2.4. | ||
49 | Data can be added to such objects with the functions described in | 54 | Data can be added to such objects with the functions described in |
50 | .Xr X509_NAME_add_entry_by_txt 3 , | 55 | .Xr X509_NAME_add_entry_by_txt 3 , |
51 | and they can be inspected with the functions described in | 56 | and they can be inspected with the functions described in |
diff --git a/src/lib/libcrypto/man/X509_NAME_print_ex.3 b/src/lib/libcrypto/man/X509_NAME_print_ex.3 index 0e3ef11284..1342a200ad 100644 --- a/src/lib/libcrypto/man/X509_NAME_print_ex.3 +++ b/src/lib/libcrypto/man/X509_NAME_print_ex.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_NAME_PRINT_EX 3 | 53 | .Dt X509_NAME_PRINT_EX 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -174,8 +174,8 @@ and | |||
174 | .Dv XN_FLAG_SEP_MULTILINE | 174 | .Dv XN_FLAG_SEP_MULTILINE |
175 | determine the field separators to use. | 175 | determine the field separators to use. |
176 | Two distinct separators are used between distinct | 176 | Two distinct separators are used between distinct |
177 | RelativeDistinguishedName components and separate values in the same RDN | 177 | .Vt RelativeDistinguishedName |
178 | for a multi-valued RDN. | 178 | components and separate values in the same RDN for a multi-valued RDN. |
179 | Multi-valued RDNs are currently very rare so the second separator | 179 | Multi-valued RDNs are currently very rare so the second separator |
180 | will hardly ever be used. | 180 | will hardly ever be used. |
181 | .Pp | 181 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_PUBKEY_new.3 b/src/lib/libcrypto/man/X509_PUBKEY_new.3 index cd178a1ee0..0475fe65b2 100644 --- a/src/lib/libcrypto/man/X509_PUBKEY_new.3 +++ b/src/lib/libcrypto/man/X509_PUBKEY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.3 2016/12/15 22:24:45 schwarze Exp $ | 1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt X509_PUBKEY_NEW 3 | 52 | .Dt X509_PUBKEY_NEW 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -133,9 +133,10 @@ | |||
133 | .Sh DESCRIPTION | 133 | .Sh DESCRIPTION |
134 | The | 134 | The |
135 | .Vt X509_PUBKEY | 135 | .Vt X509_PUBKEY |
136 | structure represents the ASN.1 SubjectPublicKeyInfo structure defined | 136 | structure represents the ASN.1 |
137 | in RFC 5280 section 4.1 and used in certificates and certificate | 137 | .Vt SubjectPublicKeyInfo |
138 | requests. | 138 | structure defined in RFC 5280 section 4.1 and used in certificates |
139 | and certificate requests. | ||
139 | .Pp | 140 | .Pp |
140 | .Fn X509_PUBKEY_new | 141 | .Fn X509_PUBKEY_new |
141 | allocates and initializes an | 142 | allocates and initializes an |
@@ -179,7 +180,9 @@ and | |||
179 | .Fn i2d_PUBKEY | 180 | .Fn i2d_PUBKEY |
180 | decode and encode an | 181 | decode and encode an |
181 | .Vt EVP_PKEY | 182 | .Vt EVP_PKEY |
182 | structure using SubjectPublicKeyInfo format. | 183 | structure using |
184 | .Vt SubjectPublicKeyInfo | ||
185 | format. | ||
183 | They otherwise follow the conventions of other ASN.1 functions such as | 186 | They otherwise follow the conventions of other ASN.1 functions such as |
184 | .Xr d2i_X509 3 . | 187 | .Xr d2i_X509 3 . |
185 | .Pp | 188 | .Pp |
@@ -225,7 +228,9 @@ bytes at | |||
225 | .Pf * Fa pk , | 228 | .Pf * Fa pk , |
226 | and | 229 | and |
227 | .Pf * Fa pa | 230 | .Pf * Fa pa |
228 | is set to the associated AlgorithmIdentifier for the public key. | 231 | is set to the associated |
232 | .Vt AlgorithmIdentifier | ||
233 | for the public key. | ||
229 | If the value of any of these parameters is not required, | 234 | If the value of any of these parameters is not required, |
230 | it can be set to | 235 | it can be set to |
231 | .Dv NULL . | 236 | .Dv NULL . |
diff --git a/src/lib/libcrypto/man/X509_REQ_new.3 b/src/lib/libcrypto/man/X509_REQ_new.3 index f4089ba2a2..76da125898 100644 --- a/src/lib/libcrypto/man/X509_REQ_new.3 +++ b/src/lib/libcrypto/man/X509_REQ_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_REQ_new.3,v 1.1 2016/12/17 01:08:14 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REQ_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 17 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_REQ_NEW 3 | 18 | .Dt X509_REQ_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -37,8 +37,9 @@ | |||
37 | .Fn X509_REQ_new | 37 | .Fn X509_REQ_new |
38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
39 | .Vt X509_REQ | 39 | .Vt X509_REQ |
40 | object, representing an ASN.1 CertificationRequest structure | 40 | object, representing an ASN.1 |
41 | defined in RFC 2986 section 4.2. | 41 | .Vt CertificationRequest |
42 | structure defined in RFC 2986 section 4.2. | ||
42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
43 | .Vt X509_REQ_INFO | 44 | .Vt X509_REQ_INFO |
44 | object discussed below together with a cryptographic signature and | 45 | object discussed below together with a cryptographic signature and |
@@ -50,8 +51,9 @@ frees | |||
50 | .Fn X509_REQ_INFO_new | 51 | .Fn X509_REQ_INFO_new |
51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
52 | .Vt X509_REQ_INFO | 53 | .Vt X509_REQ_INFO |
53 | object, representing an ASN.1 CertificationRequestInfo structure | 54 | object, representing an ASN.1 |
54 | defined in RFC 2986 section 4.1. | 55 | .Vt CertificationRequestInfo |
56 | structure defined in RFC 2986 section 4.1. | ||
55 | It is used inside the | 57 | It is used inside the |
56 | .Vt X509_REQ | 58 | .Vt X509_REQ |
57 | object and can hold the subject and the public key of the requested | 59 | object and can hold the subject and the public key of the requested |
diff --git a/src/lib/libcrypto/man/X509_REVOKED_new.3 b/src/lib/libcrypto/man/X509_REVOKED_new.3 index 2303f9caf2..f06075fcc2 100644 --- a/src/lib/libcrypto/man/X509_REVOKED_new.3 +++ b/src/lib/libcrypto/man/X509_REVOKED_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.1 2016/12/16 14:50:58 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: December 16 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
69 | .Dt X509_REVOKED_NEW 3 | 69 | .Dt X509_REVOKED_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -95,8 +95,9 @@ | |||
95 | allocates and initializes an empty | 95 | allocates and initializes an empty |
96 | .Vt X509_REVOKED | 96 | .Vt X509_REVOKED |
97 | object, representing one of the elements of | 97 | object, representing one of the elements of |
98 | the revokedCertificates field of the ASN.1 TBSCertList structure | 98 | the revokedCertificates field of the ASN.1 |
99 | defined in RFC 5280 section 5.1. | 99 | .Vt TBSCertList |
100 | structure defined in RFC 5280 section 5.1. | ||
100 | It is used by | 101 | It is used by |
101 | .Vt X509_CRL | 102 | .Vt X509_CRL |
102 | objects and can hold information about one revoked certificate | 103 | objects and can hold information about one revoked certificate |
diff --git a/src/lib/libcrypto/man/X509_SIG_new.3 b/src/lib/libcrypto/man/X509_SIG_new.3 index e4ad5b0085..6d41ababc6 100644 --- a/src/lib/libcrypto/man/X509_SIG_new.3 +++ b/src/lib/libcrypto/man/X509_SIG_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_SIG_new.3,v 1.1 2016/12/22 14:06:51 schwarze Exp $ | 1 | .\" $OpenBSD: X509_SIG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
18 | .Dt X509_SIG_NEW 3 | 18 | .Dt X509_SIG_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,8 +31,10 @@ | |||
31 | .Fn X509_SIG_new | 31 | .Fn X509_SIG_new |
32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
33 | .Vt X509_SIG | 33 | .Vt X509_SIG |
34 | object, representing an ASN.1 DigestInfo structure defined | 34 | object, representing an ASN.1 |
35 | in RFC 2315 section 9.4 and equivalently in RFC 8017 section 9.2. | 35 | .Vt DigestInfo |
36 | structure defined in RFC 2315 section 9.4 | ||
37 | and equivalently in RFC 8017 section 9.2. | ||
36 | It can hold a message digest together with information about | 38 | It can hold a message digest together with information about |
37 | the algorithm used. | 39 | the algorithm used. |
38 | .Pp | 40 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 index 2f0924c209..3a871ef307 100644 --- a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 +++ b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.4 2016/12/05 13:38:05 schwarze Exp $ | 1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 5 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509_STORE_CTX_GET_ERROR 3 | 53 | .Dt X509_STORE_CTX_GET_ERROR 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -202,7 +202,9 @@ expected value. | |||
202 | Unused. | 202 | Unused. |
203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ | 203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ |
204 | No unable to decode issuer public key | 204 | No unable to decode issuer public key |
205 | The public key in the certificate SubjectPublicKeyInfo could not be read. | 205 | The public key in the certificate |
206 | .Vt SubjectPublicKeyInfo | ||
207 | could not be read. | ||
206 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure | 208 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure |
207 | The signature of the certificate is invalid. | 209 | The signature of the certificate is invalid. |
208 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure | 210 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure |
diff --git a/src/lib/libcrypto/man/X509_new.3 b/src/lib/libcrypto/man/X509_new.3 index 1294ae3edd..dbf82bc974 100644 --- a/src/lib/libcrypto/man/X509_new.3 +++ b/src/lib/libcrypto/man/X509_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_new.3,v 1.9 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_new.3,v 1.10 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 | 2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 24 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt X509_NEW 3 | 52 | .Dt X509_NEW 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -73,8 +73,9 @@ | |||
73 | allocates and initializes an empty | 73 | allocates and initializes an empty |
74 | .Vt X509 | 74 | .Vt X509 |
75 | object with reference count 1. | 75 | object with reference count 1. |
76 | It represents an ASN.1 Certificate structure | 76 | It represents an ASN.1 |
77 | defined in RFC 5280 section 4.1. | 77 | .Vt Certificate |
78 | structure defined in RFC 5280 section 4.1. | ||
78 | It can hold a public key together with information about the person, | 79 | It can hold a public key together with information about the person, |
79 | organization, device, or function the associated private key belongs to. | 80 | organization, device, or function the associated private key belongs to. |
80 | .Pp | 81 | .Pp |
diff --git a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 index 6f51229ec7..22d904157f 100644 --- a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 +++ b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.5 2016/12/11 12:21:48 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and |
@@ -50,7 +50,7 @@ | |||
50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | .\" | 52 | .\" |
53 | .Dd $Mdocdate: December 11 2016 $ | 53 | .Dd $Mdocdate: December 25 2016 $ |
54 | .Dt D2I_RSAPUBLICKEY 3 | 54 | .Dt D2I_RSAPUBLICKEY 3 |
55 | .Os | 55 | .Os |
56 | .Sh NAME | 56 | .Sh NAME |
@@ -140,12 +140,15 @@ | |||
140 | .Fn d2i_RSAPublicKey | 140 | .Fn d2i_RSAPublicKey |
141 | and | 141 | and |
142 | .Fn i2d_RSAPublicKey | 142 | .Fn i2d_RSAPublicKey |
143 | decode and encode a PKCS#1 RSAPublicKey structure. | 143 | decode and encode a PKCS#1 |
144 | .Vt RSAPublicKey | ||
145 | structure. | ||
144 | .Pp | 146 | .Pp |
145 | .Fn d2i_RSA_PUBKEY | 147 | .Fn d2i_RSA_PUBKEY |
146 | and | 148 | and |
147 | .Fn i2d_RSA_PUBKEY | 149 | .Fn i2d_RSA_PUBKEY |
148 | decode and encode an RSA public key using a SubjectPublicKeyInfo | 150 | decode and encode an RSA public key using an ASN.1 |
151 | .Vt SubjectPublicKeyInfo | ||
149 | (certificate public key) structure. | 152 | (certificate public key) structure. |
150 | .Pp | 153 | .Pp |
151 | .Fn d2i_RSA_PUBKEY_bio , | 154 | .Fn d2i_RSA_PUBKEY_bio , |
@@ -165,7 +168,9 @@ pointer. | |||
165 | .Pp | 168 | .Pp |
166 | .Fn d2i_RSAPrivateKey , | 169 | .Fn d2i_RSAPrivateKey , |
167 | .Fn i2d_RSAPrivateKey | 170 | .Fn i2d_RSAPrivateKey |
168 | decode and encode a PKCS#1 RSAPrivateKey structure. | 171 | decode and encode a PKCS#1 |
172 | .Vt RSAPrivateKey | ||
173 | structure. | ||
169 | .Pp | 174 | .Pp |
170 | .Fn d2i_Netscape_RSA , | 175 | .Fn d2i_Netscape_RSA , |
171 | .Fn i2d_Netscape_RSA | 176 | .Fn i2d_Netscape_RSA |
diff --git a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 index 858396f5fe..7514e5fac5 100644 --- a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 +++ b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.5 2016/12/15 22:09:22 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 | 2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt D2I_X509_ALGOR 3 | 52 | .Dt D2I_X509_ALGOR 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -71,8 +71,8 @@ | |||
71 | .Sh DESCRIPTION | 71 | .Sh DESCRIPTION |
72 | These functions decode and encode an | 72 | These functions decode and encode an |
73 | .Vt X509_ALGOR | 73 | .Vt X509_ALGOR |
74 | structure which is equivalent to the | 74 | structure which is equivalent to the ASN.1 |
75 | .Sy AlgorithmIdentifier | 75 | .Vt AlgorithmIdentifier |
76 | structure. | 76 | structure. |
77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/d2i_X509_NAME.3 b/src/lib/libcrypto/man/d2i_X509_NAME.3 index 0dacb648c7..d3c085784e 100644 --- a/src/lib/libcrypto/man/d2i_X509_NAME.3 +++ b/src/lib/libcrypto/man/d2i_X509_NAME.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.6 2016/12/14 17:26:35 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 | 2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 |
3 | .\" | 3 | .\" |
4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
@@ -15,7 +15,7 @@ | |||
15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
17 | .\" | 17 | .\" |
18 | .Dd $Mdocdate: December 14 2016 $ | 18 | .Dd $Mdocdate: December 25 2016 $ |
19 | .Dt D2I_X509_NAME 3 | 19 | .Dt D2I_X509_NAME 3 |
20 | .Os | 20 | .Os |
21 | .Sh NAME | 21 | .Sh NAME |
@@ -67,7 +67,9 @@ decodes | |||
67 | .Fa length | 67 | .Fa length |
68 | bytes of the DER-encoded string | 68 | bytes of the DER-encoded string |
69 | .Pf * Fa in | 69 | .Pf * Fa in |
70 | and stores the resulting Name object in | 70 | and stores the resulting |
71 | .Vt Name | ||
72 | object in | ||
71 | .Pf * Fa name . | 73 | .Pf * Fa name . |
72 | .Pp | 74 | .Pp |
73 | .Fn i2d_X509_NAME | 75 | .Fn i2d_X509_NAME |
@@ -89,7 +91,9 @@ decodes | |||
89 | .Fa length | 91 | .Fa length |
90 | bytes of the DER-encoded string | 92 | bytes of the DER-encoded string |
91 | .Pf * Fa in | 93 | .Pf * Fa in |
92 | and stores the resulting RelativeDistinguishedName object in | 94 | and stores the resulting |
95 | .Vt RelativeDistinguishedName | ||
96 | object in | ||
93 | .Pf * Fa ne . | 97 | .Pf * Fa ne . |
94 | .Pp | 98 | .Pp |
95 | .Fn i2d_X509_NAME_ENTRY | 99 | .Fn i2d_X509_NAME_ENTRY |
diff --git a/src/lib/libcrypto/man/d2i_X509_SIG.3 b/src/lib/libcrypto/man/d2i_X509_SIG.3 index 8466ccfe7f..33676b6df0 100644 --- a/src/lib/libcrypto/man/d2i_X509_SIG.3 +++ b/src/lib/libcrypto/man/d2i_X509_SIG.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.4 2016/12/08 20:22:08 jmc Exp $ | 1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: December 8 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
52 | .Dt D2I_X509_SIG 3 | 52 | .Dt D2I_X509_SIG 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -72,7 +72,7 @@ | |||
72 | These functions decode and encode an | 72 | These functions decode and encode an |
73 | .Vt X509_SIG | 73 | .Vt X509_SIG |
74 | structure, which is equivalent to the | 74 | structure, which is equivalent to the |
75 | .Sy DigestInfo | 75 | .Vt DigestInfo |
76 | structure defined in PKCS#1 and PKCS#7. | 76 | structure defined in PKCS#1 and PKCS#7. |
77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/x509v3.cnf.5 b/src/lib/libcrypto/man/x509v3.cnf.5 index 1fd4c0cc9f..19608697e3 100644 --- a/src/lib/libcrypto/man/x509v3.cnf.5 +++ b/src/lib/libcrypto/man/x509v3.cnf.5 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: x509v3.cnf.5,v 1.2 2016/12/12 22:02:55 jmc Exp $ | 1 | .\" $OpenBSD: x509v3.cnf.5,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: December 12 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
53 | .Dt X509V3.CNF 5 | 53 | .Dt X509V3.CNF 5 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -530,8 +530,11 @@ The | |||
530 | option changes the type of the | 530 | option changes the type of the |
531 | .Ic organization | 531 | .Ic organization |
532 | field. | 532 | field. |
533 | In RFC 2459, it can only be of type DisplayText. | 533 | In RFC 2459, it can only be of type |
534 | In RFC 3280, IA5Strring is also permissible. | 534 | .Vt DisplayText . |
535 | In RFC 3280, | ||
536 | .Vt IA5String | ||
537 | is also permissible. | ||
535 | Some software (for example some versions of MSIE) may require | 538 | Some software (for example some versions of MSIE) may require |
536 | .Ic ia5org . | 539 | .Ic ia5org . |
537 | .Ss Policy constraints | 540 | .Ss Policy constraints |