diff options
Diffstat (limited to 'src/lib')
48 files changed, 481 insertions, 315 deletions
diff --git a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 index 18e50e24c0..8a829a5e2d 100644 --- a/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 +++ b/src/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.1 2016/12/23 22:21:40 schwarze Exp $ | 1 | .\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt ACCESS_DESCRIPTION_NEW 3 | 18 | .Dt ACCESS_DESCRIPTION_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -42,8 +42,9 @@ policy data. | |||
| 42 | .Fn ACCESS_DESCRIPTION_new | 42 | .Fn ACCESS_DESCRIPTION_new |
| 43 | allocates and initializes an empty | 43 | allocates and initializes an empty |
| 44 | .Vt ACCESS_DESCRIPTION | 44 | .Vt ACCESS_DESCRIPTION |
| 45 | object, representing an ASN.1 AccessDescription structure | 45 | object, representing an ASN.1 |
| 46 | defined in RFC 5280 section 4.2.2.1. | 46 | .Vt AccessDescription |
| 47 | structure defined in RFC 5280 section 4.2.2.1. | ||
| 47 | It can hold a pointer to a | 48 | It can hold a pointer to a |
| 48 | .Vt GENERAL_NAME | 49 | .Vt GENERAL_NAME |
| 49 | object documented in | 50 | object documented in |
| @@ -90,8 +91,9 @@ allocates and initializes an empty | |||
| 90 | .Vt AUTHORITY_INFO_ACCESS | 91 | .Vt AUTHORITY_INFO_ACCESS |
| 91 | object, which is a | 92 | object, which is a |
| 92 | .Vt STACK_OF(ACCESS_DESCRIPTION) | 93 | .Vt STACK_OF(ACCESS_DESCRIPTION) |
| 93 | and represents an ASN.1 AuthorityInfoAccessSyntax structure | 94 | and represents an ASN.1 |
| 94 | defined in RFC 5280 section 4.2.2.1. | 95 | .Vt AuthorityInfoAccessSyntax |
| 96 | structure defined in RFC 5280 section 4.2.2.1. | ||
| 95 | If can be used for the authority information access extension of | 97 | If can be used for the authority information access extension of |
| 96 | certificates and certificate revocation lists and for the subject | 98 | certificates and certificate revocation lists and for the subject |
| 97 | information access extension of certificates. | 99 | information access extension of certificates. |
diff --git a/src/lib/libcrypto/man/ASN1_STRING_length.3 b/src/lib/libcrypto/man/ASN1_STRING_length.3 index f43d61819f..2c797481d7 100644 --- a/src/lib/libcrypto/man/ASN1_STRING_length.3 +++ b/src/lib/libcrypto/man/ASN1_STRING_length.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.5 2016/11/10 11:44:52 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_STRING_length.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: November 10 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt ASN1_STRING_LENGTH 3 | 53 | .Dt ASN1_STRING_LENGTH 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -182,12 +182,11 @@ and the functions call the | |||
| 182 | .Vt ASN1_STRING | 182 | .Vt ASN1_STRING |
| 183 | equivalents. | 183 | equivalents. |
| 184 | .Vt ASN1_STRING | 184 | .Vt ASN1_STRING |
| 185 | is also used for some | 185 | is also used for some CHOICE types which consist entirely of primitive |
| 186 | .Sy CHOICE | 186 | string types such as |
| 187 | types which consist entirely of primitive string types such as | 187 | .Vt DirectoryString |
| 188 | .Sy DirectoryString | ||
| 189 | and | 188 | and |
| 190 | .Sy Time . | 189 | .Vt Time . |
| 191 | .Pp | 190 | .Pp |
| 192 | These functions should | 191 | These functions should |
| 193 | .Em not | 192 | .Em not |
| @@ -195,19 +194,20 @@ be used to examine or modify | |||
| 195 | .Vt ASN1_INTEGER | 194 | .Vt ASN1_INTEGER |
| 196 | or | 195 | or |
| 197 | .Vt ASN1_ENUMERATED | 196 | .Vt ASN1_ENUMERATED |
| 198 | types: the relevant | 197 | types: the relevant INTEGER or ENUMERATED utility functions should |
| 199 | .Sy INTEGER | 198 | be used instead. |
| 200 | or | ||
| 201 | .Sy ENUMERATED | ||
| 202 | utility functions should be used instead. | ||
| 203 | .Pp | 199 | .Pp |
| 204 | In general it cannot be assumed that the data returned by | 200 | In general it cannot be assumed that the data returned by |
| 205 | .Fn ASN1_STRING_data | 201 | .Fn ASN1_STRING_data |
| 206 | is NUL terminated, and it may contain embedded NUL characters. | 202 | is NUL terminated, and it may contain embedded NUL characters. |
| 207 | The actual format of the data will depend on the actual string type itself: | 203 | The actual format of the data will depend on the actual string type itself: |
| 208 | for example for an IA5String the data will be ASCII, | 204 | for example for an |
| 209 | for a BMPString two bytes per character in big endian format, | 205 | .Vt IA5String |
| 210 | UTF8String will be in UTF8 format. | 206 | the data will be ASCII, for a |
| 207 | .Vt BMPString | ||
| 208 | two bytes per character in big endian format, and a | ||
| 209 | .Vt UTF8String | ||
| 210 | will be in UTF8 format. | ||
| 211 | .Pp | 211 | .Pp |
| 212 | Similar care should be take to ensure the data is in the correct format | 212 | Similar care should be take to ensure the data is in the correct format |
| 213 | when calling | 213 | when calling |
diff --git a/src/lib/libcrypto/man/ASN1_generate_nconf.3 b/src/lib/libcrypto/man/ASN1_generate_nconf.3 index bcf55d724b..5e1ba0a817 100644 --- a/src/lib/libcrypto/man/ASN1_generate_nconf.3 +++ b/src/lib/libcrypto/man/ASN1_generate_nconf.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.8 2016/12/11 18:06:09 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_generate_nconf.3,v 1.9 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 | 2 | .\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson. | 4 | .\" This file was written by Dr. Stephen Henson. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 11 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt ASN1_GENERATE_NCONF 3 | 53 | .Dt ASN1_GENERATE_NCONF 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -285,15 +285,20 @@ if an error occurred. | |||
| 285 | The error codes can be obtained by | 285 | The error codes can be obtained by |
| 286 | .Xr ERR_get_error 3 . | 286 | .Xr ERR_get_error 3 . |
| 287 | .Sh EXAMPLES | 287 | .Sh EXAMPLES |
| 288 | A simple IA5String: | 288 | A simple |
| 289 | .Vt IA5String : | ||
| 289 | .Pp | 290 | .Pp |
| 290 | .Dl IA5STRING:Hello World | 291 | .Dl IA5STRING:Hello World |
| 291 | .Pp | 292 | .Pp |
| 292 | An IA5String explicitly tagged: | 293 | An |
| 294 | .Vt IA5String | ||
| 295 | explicitly tagged: | ||
| 293 | .Pp | 296 | .Pp |
| 294 | .Dl EXPLICIT:0,IA5STRING:Hello World | 297 | .Dl EXPLICIT:0,IA5STRING:Hello World |
| 295 | .Pp | 298 | .Pp |
| 296 | An IA5String explicitly tagged using APPLICATION tagging: | 299 | An |
| 300 | .Vt IA5String | ||
| 301 | explicitly tagged using APPLICATION tagging: | ||
| 297 | .Pp | 302 | .Pp |
| 298 | .Dl EXPLICIT:0A,IA5STRING:Hello World | 303 | .Dl EXPLICIT:0A,IA5STRING:Hello World |
| 299 | .Pp | 304 | .Pp |
| @@ -302,7 +307,8 @@ A BITSTRING with bits 1 and 5 set and all others zero: | |||
| 302 | .Dl FORMAT:BITLIST,BITSTRING:1,5 | 307 | .Dl FORMAT:BITLIST,BITSTRING:1,5 |
| 303 | .Pp | 308 | .Pp |
| 304 | A more complex example using a config file to produce a | 309 | A more complex example using a config file to produce a |
| 305 | SEQUENCE consisting of a BOOL an OID and a UTF8String: | 310 | SEQUENCE consisting of a BOOL an OID and a |
| 311 | .Vt UTF8String : | ||
| 306 | .Bd -literal -offset indent | 312 | .Bd -literal -offset indent |
| 307 | asn1 = SEQUENCE:seq_section | 313 | asn1 = SEQUENCE:seq_section |
| 308 | 314 | ||
| @@ -313,7 +319,9 @@ field2 = OID:commonName | |||
| 313 | field3 = UTF8:Third field | 319 | field3 = UTF8:Third field |
| 314 | .Ed | 320 | .Ed |
| 315 | .Pp | 321 | .Pp |
| 316 | This example produces an RSAPrivateKey structure. | 322 | This example produces an |
| 323 | .Vt RSAPrivateKey | ||
| 324 | structure. | ||
| 317 | This is the key contained in the file | 325 | This is the key contained in the file |
| 318 | .Pa client.pem | 326 | .Pa client.pem |
| 319 | in all OpenSSL distributions. | 327 | in all OpenSSL distributions. |
| @@ -349,7 +357,8 @@ coeff=INTEGER:0x30B9E4F2AFA5AC679F920FC83F1F2DF1BAF1779CF989447FABC2F5\e | |||
| 349 | 628657053A | 357 | 628657053A |
| 350 | .Ed | 358 | .Ed |
| 351 | .Pp | 359 | .Pp |
| 352 | This example is the corresponding public key in a SubjectPublicKeyInfo | 360 | This example is the corresponding public key in an ASN.1 |
| 361 | .Vt SubjectPublicKeyInfo | ||
| 353 | structure: | 362 | structure: |
| 354 | .Bd -literal -offset 2n | 363 | .Bd -literal -offset 2n |
| 355 | # Start with a SEQUENCE | 364 | # Start with a SEQUENCE |
diff --git a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 index 5186fea0f3..94d6e14abb 100644 --- a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 +++ b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.1 2016/12/23 14:37:08 schwarze Exp $ | 1 | .\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt AUTHORITY_KEYID_NEW 3 | 18 | .Dt AUTHORITY_KEYID_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -35,8 +35,9 @@ for signing it. | |||
| 35 | .Fn AUTHORITY_KEYID_new | 35 | .Fn AUTHORITY_KEYID_new |
| 36 | allocates and initializes an empty | 36 | allocates and initializes an empty |
| 37 | .Vt AUTHORITY_KEYID | 37 | .Vt AUTHORITY_KEYID |
| 38 | object, representing an ASN.1 AuthorityKeyIdentifier structure | 38 | object, representing an ASN.1 |
| 39 | defined in RFC 5280 section 4.2.1.1. | 39 | .Vt AuthorityKeyIdentifier |
| 40 | structure defined in RFC 5280 section 4.2.1.1. | ||
| 40 | It can hold an issuer name, a serial number, and a key identifier. | 41 | It can hold an issuer name, a serial number, and a key identifier. |
| 41 | .Pp | 42 | .Pp |
| 42 | .Fn AUTHORITY_KEYID_free | 43 | .Fn AUTHORITY_KEYID_free |
diff --git a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 index 1293be0050..c133bb1c35 100644 --- a/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:02:41 schwarze Exp $ | 1 | .\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt BASIC_CONSTRAINTS_NEW 3 | 18 | .Dt BASIC_CONSTRAINTS_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,8 +31,9 @@ | |||
| 31 | .Fn BASIC_CONSTRAINTS_new | 31 | .Fn BASIC_CONSTRAINTS_new |
| 32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
| 33 | .Vt BASIC_CONSTRAINTS | 33 | .Vt BASIC_CONSTRAINTS |
| 34 | object, representing an ASN.1 BasicConstraints structure | 34 | object, representing an ASN.1 |
| 35 | defined in RFC 5280 section 4.2.1.9. | 35 | .Vt BasicConstraints |
| 36 | structure defined in RFC 5280 section 4.2.1.9. | ||
| 36 | .Pp | 37 | .Pp |
| 37 | This object contains two fields. | 38 | This object contains two fields. |
| 38 | The field | 39 | The field |
diff --git a/src/lib/libcrypto/man/DIST_POINT_new.3 b/src/lib/libcrypto/man/DIST_POINT_new.3 index 8498e5a7d0..bbd4855e11 100644 --- a/src/lib/libcrypto/man/DIST_POINT_new.3 +++ b/src/lib/libcrypto/man/DIST_POINT_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.1 2016/12/23 15:25:19 schwarze Exp $ | 1 | .\" $OpenBSD: DIST_POINT_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt DIST_POINT_NEW 3 | 18 | .Dt DIST_POINT_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -52,8 +52,9 @@ where to obtain certificate revocation lists that might later revoke it. | |||
| 52 | .Fn DIST_POINT_new | 52 | .Fn DIST_POINT_new |
| 53 | allocates and initializes an empty | 53 | allocates and initializes an empty |
| 54 | .Vt DIST_POINT | 54 | .Vt DIST_POINT |
| 55 | object, representing an ASN.1 DistributionPoint structure | 55 | object, representing an ASN.1 |
| 56 | defined in RFC 5280 section 4.2.1.13. | 56 | .Vt DistributionPoint |
| 57 | structure defined in RFC 5280 section 4.2.1.13. | ||
| 57 | It can hold issuer names, distribution point names, and reason flags. | 58 | It can hold issuer names, distribution point names, and reason flags. |
| 58 | .Fn DIST_POINT_free | 59 | .Fn DIST_POINT_free |
| 59 | frees | 60 | frees |
| @@ -64,8 +65,9 @@ allocates and initializes an empty | |||
| 64 | .Vt CRL_DIST_POINTS | 65 | .Vt CRL_DIST_POINTS |
| 65 | object, which is a | 66 | object, which is a |
| 66 | .Vt STACK_OF(DIST_POINT) | 67 | .Vt STACK_OF(DIST_POINT) |
| 67 | and represents the ASN.1 CRLDistributionPoints structure | 68 | and represents the ASN.1 |
| 68 | defined in RFC 5280 section 4.2.1.13. | 69 | .Vt CRLDistributionPoints |
| 70 | structure defined in RFC 5280 section 4.2.1.13. | ||
| 69 | It can be used as an extension in | 71 | It can be used as an extension in |
| 70 | .Vt X509 | 72 | .Vt X509 |
| 71 | and in | 73 | and in |
| @@ -78,8 +80,9 @@ frees | |||
| 78 | .Fn DIST_POINT_NAME_new | 80 | .Fn DIST_POINT_NAME_new |
| 79 | allocates and initializes an empty | 81 | allocates and initializes an empty |
| 80 | .Vt DIST_POINT_NAME | 82 | .Vt DIST_POINT_NAME |
| 81 | object, representing an ASN.1 DistributionPointName structure | 83 | object, representing an ASN.1 |
| 82 | defined in RFC 5280 section 4.2.1.13. | 84 | .Vt DistributionPointName |
| 85 | structure defined in RFC 5280 section 4.2.1.13. | ||
| 83 | It is used by the | 86 | It is used by the |
| 84 | .Vt DIST_POINT | 87 | .Vt DIST_POINT |
| 85 | and | 88 | and |
| @@ -93,8 +96,9 @@ frees | |||
| 93 | .Fn ISSUING_DIST_POINT_new | 96 | .Fn ISSUING_DIST_POINT_new |
| 94 | allocates and initializes an empty | 97 | allocates and initializes an empty |
| 95 | .Vt ISSUING_DIST_POINT | 98 | .Vt ISSUING_DIST_POINT |
| 96 | object, representing an ASN.1 IssuingDistributionPoint structure | 99 | object, representing an ASN.1 |
| 97 | defined in RFC 5280 section 5.2.5. | 100 | .Vt IssuingDistributionPoint |
| 101 | structure defined in RFC 5280 section 5.2.5. | ||
| 98 | Using this extension, a CRL can specify which distribution point | 102 | Using this extension, a CRL can specify which distribution point |
| 99 | it was issued from and which kinds of certificates and revocation | 103 | it was issued from and which kinds of certificates and revocation |
| 100 | reasons it covers. | 104 | reasons it covers. |
diff --git a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 index 2e55f6cbed..ae23b46c15 100644 --- a/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 +++ b/src/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.2 2016/12/14 07:00:35 jmc Exp $ | 1 | .\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 14 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt ESS_SIGNING_CERT_NEW 3 | 18 | .Dt ESS_SIGNING_CERT_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -41,14 +41,16 @@ | |||
| 41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" | 41 | .Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial" |
| 42 | .Sh DESCRIPTION | 42 | .Sh DESCRIPTION |
| 43 | The signing certificate may be included in the signedAttributes | 43 | The signing certificate may be included in the signedAttributes |
| 44 | field of a SignerInfo structure to mitigate simple substitution and | 44 | field of a |
| 45 | re-issue attacks. | 45 | .Vt SignerInfo |
| 46 | structure to mitigate simple substitution and re-issue attacks. | ||
| 46 | .Pp | 47 | .Pp |
| 47 | .Fn ESS_SIGNING_CERT_new | 48 | .Fn ESS_SIGNING_CERT_new |
| 48 | allocates and initializes an empty | 49 | allocates and initializes an empty |
| 49 | .Vt ESS_SIGNING_CERT | 50 | .Vt ESS_SIGNING_CERT |
| 50 | object, representing an ASN.1 SigningCertificate structure | 51 | object, representing an ASN.1 |
| 51 | defined in RFC 2634 section 5.4. | 52 | .Vt SigningCertificate |
| 53 | structure defined in RFC 2634 section 5.4. | ||
| 52 | It can hold the certificate used for signing the data, | 54 | It can hold the certificate used for signing the data, |
| 53 | additional authorization certificates that can be used during | 55 | additional authorization certificates that can be used during |
| 54 | validation, and policies applying to the certificate. | 56 | validation, and policies applying to the certificate. |
| @@ -59,8 +61,9 @@ frees | |||
| 59 | .Fn ESS_CERT_ID_new | 61 | .Fn ESS_CERT_ID_new |
| 60 | allocates and initializes an empty | 62 | allocates and initializes an empty |
| 61 | .Vt ESS_CERT_ID | 63 | .Vt ESS_CERT_ID |
| 62 | object, representing an ASN.1 ESSCertID structure | 64 | object, representing an ASN.1 |
| 63 | defined in RFC 2634 section 5.4.1. | 65 | .Vt ESSCertID |
| 66 | structure defined in RFC 2634 section 5.4.1. | ||
| 64 | Such objects can be used inside | 67 | Such objects can be used inside |
| 65 | .Vt ESS_SIGNING_CERT | 68 | .Vt ESS_SIGNING_CERT |
| 66 | objects, and each one can hold a SHA1 hash of one certificate. | 69 | objects, and each one can hold a SHA1 hash of one certificate. |
| @@ -71,8 +74,9 @@ frees | |||
| 71 | .Fn ESS_ISSUER_SERIAL_new | 74 | .Fn ESS_ISSUER_SERIAL_new |
| 72 | allocates and initializes an empty | 75 | allocates and initializes an empty |
| 73 | .Vt ESS_ISSUER_SERIAL | 76 | .Vt ESS_ISSUER_SERIAL |
| 74 | object, representing an ASN.1 IssuerSerial structure | 77 | object, representing an ASN.1 |
| 75 | defined in RFC 2634 section 5.4.1. | 78 | .Vt IssuerSerial |
| 79 | structure defined in RFC 2634 section 5.4.1. | ||
| 76 | It can hold an issuer name and a serial number and can be included in an | 80 | It can hold an issuer name and a serial number and can be included in an |
| 77 | .Vt ESS_CERT_ID | 81 | .Vt ESS_CERT_ID |
| 78 | object, which is useful for additional authorization certificates, | 82 | object, which is useful for additional authorization certificates, |
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3 index 1a7fe40a66..c328edf4f6 100644 --- a/src/lib/libcrypto/man/EVP_EncryptInit.3 +++ b/src/lib/libcrypto/man/EVP_EncryptInit.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.4 2016/11/26 20:26:25 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 | 2 | .\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: November 26 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt EVP_ENCRYPTINIT 3 | 53 | .Dt EVP_ENCRYPTINIT 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -664,7 +664,9 @@ If the cipher is a stream cipher then | |||
| 664 | is returned. | 664 | is returned. |
| 665 | .Pp | 665 | .Pp |
| 666 | .Fn EVP_CIPHER_param_to_asn1 | 666 | .Fn EVP_CIPHER_param_to_asn1 |
| 667 | sets the AlgorithmIdentifier "parameter" based on the passed cipher. | 667 | sets the ASN.1 |
| 668 | .Vt AlgorithmIdentifier | ||
| 669 | parameter based on the passed cipher. | ||
| 668 | This will typically include any parameters and an IV. | 670 | This will typically include any parameters and an IV. |
| 669 | The cipher IV (if any) must be set when this call is made. | 671 | The cipher IV (if any) must be set when this call is made. |
| 670 | This call should be made before the cipher is actually "used" (before any | 672 | This call should be made before the cipher is actually "used" (before any |
| @@ -675,8 +677,9 @@ calls, for example). | |||
| 675 | This function may fail if the cipher does not have any ASN.1 support. | 677 | This function may fail if the cipher does not have any ASN.1 support. |
| 676 | .Pp | 678 | .Pp |
| 677 | .Fn EVP_CIPHER_asn1_to_param | 679 | .Fn EVP_CIPHER_asn1_to_param |
| 678 | sets the cipher parameters based on an ASN.1 AlgorithmIdentifier | 680 | sets the cipher parameters based on an ASN.1 |
| 679 | "parameter". | 681 | .Vt AlgorithmIdentifier |
| 682 | parameter. | ||
| 680 | The precise effect depends on the cipher. | 683 | The precise effect depends on the cipher. |
| 681 | In the case of RC2, for example, it will set the IV and effective | 684 | In the case of RC2, for example, it will set the IV and effective |
| 682 | key length. | 685 | key length. |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 index 0ed3678a99..0c30fcb5ef 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.5 2016/11/27 15:27:19 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 | 2 | .\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: November 27 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt EVP_PKEY_CTX_CTRL 3 | 53 | .Dt EVP_PKEY_CTX_CTRL 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -205,9 +205,10 @@ Two RSA padding modes behave differently if | |||
| 205 | .Fn EVP_PKEY_CTX_set_signature_md | 205 | .Fn EVP_PKEY_CTX_set_signature_md |
| 206 | is used. | 206 | is used. |
| 207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an | 207 | If this macro is called for PKCS#1 padding, the plaintext buffer is an |
| 208 | actual digest value and is encapsulated in a DigestInfo structure | 208 | actual digest value and is encapsulated in a |
| 209 | according to PKCS#1 when signing and this structure is expected (and | 209 | .Vt DigestInfo |
| 210 | stripped off) when verifying. | 210 | structure according to PKCS#1 when signing and this structure is |
| 211 | expected (and stripped off) when verifying. | ||
| 211 | If this control is not used with RSA and PKCS#1 padding then the | 212 | If this control is not used with RSA and PKCS#1 padding then the |
| 212 | supplied data is used directly and not encapsulated. | 213 | supplied data is used directly and not encapsulated. |
| 213 | In the case of X9.31 padding for RSA the algorithm identifier byte is | 214 | In the case of X9.31 padding for RSA the algorithm identifier byte is |
diff --git a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 index ae986839fb..8910fb58f8 100644 --- a/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 +++ b/src/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.1 2016/12/23 20:43:02 schwarze Exp $ | 1 | .\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt EXTENDED_KEY_USAGE_NEW 3 | 18 | .Dt EXTENDED_KEY_USAGE_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -41,8 +41,9 @@ allocates and initializes an empty | |||
| 41 | .Vt EXTENDED_KEY_USAGE | 41 | .Vt EXTENDED_KEY_USAGE |
| 42 | object, which is a | 42 | object, which is a |
| 43 | .Vt STACK_OF(ASN1_OBJECT) | 43 | .Vt STACK_OF(ASN1_OBJECT) |
| 44 | and represents an ASN.1 ExtKeyUsageSyntax structure | 44 | and represents an ASN.1 |
| 45 | defined in RFC 5280 section 4.2.1.12. | 45 | .Vt ExtKeyUsageSyntax |
| 46 | structure defined in RFC 5280 section 4.2.1.12. | ||
| 46 | It can hold key purpose identifiers. | 47 | It can hold key purpose identifiers. |
| 47 | .Pp | 48 | .Pp |
| 48 | .Fn EXTENDED_KEY_USAGE_free | 49 | .Fn EXTENDED_KEY_USAGE_free |
diff --git a/src/lib/libcrypto/man/GENERAL_NAME_new.3 b/src/lib/libcrypto/man/GENERAL_NAME_new.3 index c4e8fce764..a5537323ae 100644 --- a/src/lib/libcrypto/man/GENERAL_NAME_new.3 +++ b/src/lib/libcrypto/man/GENERAL_NAME_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.1 2016/12/23 00:40:16 schwarze Exp $ | 1 | .\" $OpenBSD: GENERAL_NAME_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt GENERAL_NAME_NEW 3 | 18 | .Dt GENERAL_NAME_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -46,21 +46,26 @@ | |||
| 46 | .Ft void | 46 | .Ft void |
| 47 | .Fn OTHERNAME_free "OTHERNAME *name" | 47 | .Fn OTHERNAME_free "OTHERNAME *name" |
| 48 | .Sh DESCRIPTION | 48 | .Sh DESCRIPTION |
| 49 | Even though the X.501 Name documented in | 49 | Even though the X.501 |
| 50 | .Vt Name | ||
| 51 | documented in | ||
| 50 | .Xr X509_NAME_new 3 | 52 | .Xr X509_NAME_new 3 |
| 51 | is a complicated multi-layered structure, it is very rigid and not | 53 | is a complicated multi-layered structure, it is very rigid and not |
| 52 | flexible enough to represent various entities that many people want | 54 | flexible enough to represent various entities that many people want |
| 53 | to use as names in certificates. | 55 | to use as names in certificates. |
| 54 | For that reason, X.509 extensions use the X.509 GeneralName | 56 | For that reason, X.509 extensions use the X.509 |
| 55 | wrapper structure rather than using the X.501 Name structure | 57 | .Vt GeneralName |
| 56 | directly, at the expense of adding one or two additional layers | 58 | wrapper structure rather than using the X.501 |
| 57 | of indirection. | 59 | .Vt Name |
| 60 | structure directly, at the expense of adding one or two additional | ||
| 61 | layers of indirection. | ||
| 58 | .Pp | 62 | .Pp |
| 59 | .Fn GENERAL_NAME_new | 63 | .Fn GENERAL_NAME_new |
| 60 | allocates and initializes an empty | 64 | allocates and initializes an empty |
| 61 | .Vt GENERAL_NAME | 65 | .Vt GENERAL_NAME |
| 62 | object, representing the ASN.1 GeneralName structure | 66 | object, representing the ASN.1 |
| 63 | defined in RFC 5280 section 4.2.1.6. | 67 | .Vt GeneralName |
| 68 | structure defined in RFC 5280 section 4.2.1.6. | ||
| 64 | It can for example hold an | 69 | It can for example hold an |
| 65 | .Vt X509_name | 70 | .Vt X509_name |
| 66 | object, an IP address, a DNS host name, a uniform resource identifier, | 71 | object, an IP address, a DNS host name, a uniform resource identifier, |
| @@ -78,8 +83,9 @@ allocates and initializes an empty | |||
| 78 | .Vt GENERAL_NAMES | 83 | .Vt GENERAL_NAMES |
| 79 | object, which is a | 84 | object, which is a |
| 80 | .Vt STACK_OF(GENERAL_NAME) | 85 | .Vt STACK_OF(GENERAL_NAME) |
| 81 | and represents the ASN.1 GeneralNames structure | 86 | and represents the ASN.1 |
| 82 | defined in RFC 5280 section 4.2.1.6. | 87 | .Vt GeneralNames |
| 88 | structure defined in RFC 5280 section 4.2.1.6. | ||
| 83 | It is used by extension structures that can contain multiple names, | 89 | It is used by extension structures that can contain multiple names, |
| 84 | for example key identifier, alternative name, and distribution point | 90 | for example key identifier, alternative name, and distribution point |
| 85 | extensions. | 91 | extensions. |
| @@ -90,8 +96,9 @@ frees | |||
| 90 | .Fn EDIPARTYNAME_new | 96 | .Fn EDIPARTYNAME_new |
| 91 | allocates and initializes an empty | 97 | allocates and initializes an empty |
| 92 | .Vt EDIPARTYNAME | 98 | .Vt EDIPARTYNAME |
| 93 | object, representing the ASN.1 EDIPartyName structure | 99 | object, representing the ASN.1 |
| 94 | defined in RFC 5280 section 4.2.1.6, where | 100 | .Vt EDIPartyName |
| 101 | structure defined in RFC 5280 section 4.2.1.6, where | ||
| 95 | .Dq EDI | 102 | .Dq EDI |
| 96 | stands for | 103 | stands for |
| 97 | .Dq electronic data identifier . | 104 | .Dq electronic data identifier . |
| @@ -104,8 +111,9 @@ frees | |||
| 104 | .Fn OTHERNAME_new | 111 | .Fn OTHERNAME_new |
| 105 | allocates and initializes an empty | 112 | allocates and initializes an empty |
| 106 | .Vt OTHERNAME | 113 | .Vt OTHERNAME |
| 107 | object, representing the ASN.1 OtherName structure | 114 | object, representing the ASN.1 |
| 108 | defined in RFC 5280 section 4.2.1.6. | 115 | .Vt OtherName |
| 116 | structure defined in RFC 5280 section 4.2.1.6. | ||
| 109 | It can hold data of any | 117 | It can hold data of any |
| 110 | .Vt ASN1_TYPE | 118 | .Vt ASN1_TYPE |
| 111 | together with a type identifier. | 119 | together with a type identifier. |
diff --git a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 index 1105bead0b..5ef737cb4e 100644 --- a/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 +++ b/src/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $ | 1 | .\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt NAME_CONSTRAINTS_NEW 3 | 18 | .Dt NAME_CONSTRAINTS_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -41,8 +41,9 @@ certification path. | |||
| 41 | .Fn NAME_CONSTRAINTS_new | 41 | .Fn NAME_CONSTRAINTS_new |
| 42 | allocates and initializes an empty | 42 | allocates and initializes an empty |
| 43 | .Vt NAME_CONSTRAINTS | 43 | .Vt NAME_CONSTRAINTS |
| 44 | object, representing an ASN.1 NameConstraints structure | 44 | object, representing an ASN.1 |
| 45 | defined in RFC 5280 section 4.2.1.10. | 45 | .Vt NameConstraints |
| 46 | structure defined in RFC 5280 section 4.2.1.10. | ||
| 46 | It consists of two | 47 | It consists of two |
| 47 | .Vt STACK_OF(GENERAL_SUBTREE) | 48 | .Vt STACK_OF(GENERAL_SUBTREE) |
| 48 | objects, one specifying permitted names, the other excluded names. | 49 | objects, one specifying permitted names, the other excluded names. |
| @@ -53,8 +54,9 @@ frees | |||
| 53 | .Fn GENERAL_SUBTREE_new | 54 | .Fn GENERAL_SUBTREE_new |
| 54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
| 55 | .Vt GENERAL_SUBTREE | 56 | .Vt GENERAL_SUBTREE |
| 56 | object, representing an ASN.1 GeneralSubtree structure | 57 | object, representing an ASN.1 |
| 57 | defined in RFC 5280 section 4.2.1.10. | 58 | .Vt GeneralSubtree |
| 59 | structure defined in RFC 5280 section 4.2.1.10. | ||
| 58 | It is a trivial wrapper around the | 60 | It is a trivial wrapper around the |
| 59 | .Vt GENERAL_NAME | 61 | .Vt GENERAL_NAME |
| 60 | object documented in | 62 | object documented in |
diff --git a/src/lib/libcrypto/man/OCSP_CRLID_new.3 b/src/lib/libcrypto/man/OCSP_CRLID_new.3 index fbc54ec71a..450b57c93e 100644 --- a/src/lib/libcrypto/man/OCSP_CRLID_new.3 +++ b/src/lib/libcrypto/man/OCSP_CRLID_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.2 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_CRLID_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt OCSP_CRLID_NEW 3 | 18 | .Dt OCSP_CRLID_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -38,9 +38,14 @@ | |||
| 38 | If a client asks about the validity of a certificate and it turns | 38 | If a client asks about the validity of a certificate and it turns |
| 39 | out to be invalid, the responder may optionally communicate which | 39 | out to be invalid, the responder may optionally communicate which |
| 40 | certificate revocation list the certificate was found on. | 40 | certificate revocation list the certificate was found on. |
| 41 | The required data is stored as an ASN.1 CrlID structure in the | 41 | The required data is stored as an ASN.1 |
| 42 | singleExtensions field of the SingleResponse structure. | 42 | .Vt CrlID |
| 43 | The CrlID is represented by an | 43 | structure in the singleExtensions field of the |
| 44 | .Vt SingleResponse | ||
| 45 | structure. | ||
| 46 | The | ||
| 47 | .Vt CrlID | ||
| 48 | is represented by an | ||
| 44 | .Vt OCSP_CRLID | 49 | .Vt OCSP_CRLID |
| 45 | object, which will be stored inside the | 50 | object, which will be stored inside the |
| 46 | .Vt OCSP_SINGLERESP | 51 | .Vt OCSP_SINGLERESP |
| @@ -66,7 +71,9 @@ at which the CRL was created. | |||
| 66 | Each argument can be | 71 | Each argument can be |
| 67 | .Dv NULL , | 72 | .Dv NULL , |
| 68 | in which case the respective field is omitted. | 73 | in which case the respective field is omitted. |
| 69 | The resulting CrlID structure is encoded in ASN.1 using | 74 | The resulting |
| 75 | .Vt CrlID | ||
| 76 | structure is encoded in ASN.1 using | ||
| 70 | .Xr X509V3_EXT_i2d 3 | 77 | .Xr X509V3_EXT_i2d 3 |
| 71 | with criticality 0. | 78 | with criticality 0. |
| 72 | .Sh RETURN VALUES | 79 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 index 0d0009186a..664a750665 100644 --- a/src/lib/libcrypto/man/OCSP_REQUEST_new.3 +++ b/src/lib/libcrypto/man/OCSP_REQUEST_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.6 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_REQUEST_new.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt OCSP_REQUEST_NEW 3 | 69 | .Dt OCSP_REQUEST_NEW 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -133,7 +133,9 @@ | |||
| 133 | .Fn OCSP_REQUEST_new | 133 | .Fn OCSP_REQUEST_new |
| 134 | allocates and initializes an empty | 134 | allocates and initializes an empty |
| 135 | .Vt OCSP_REQUEST | 135 | .Vt OCSP_REQUEST |
| 136 | object, representing an ASN.1 OCSPRequest structure defined in RFC 6960. | 136 | object, representing an ASN.1 |
| 137 | .Vt OCSPRequest | ||
| 138 | structure defined in RFC 6960. | ||
| 137 | .Fn OCSP_REQUEST_free | 139 | .Fn OCSP_REQUEST_free |
| 138 | frees | 140 | frees |
| 139 | .Fa req . | 141 | .Fa req . |
| @@ -141,7 +143,9 @@ frees | |||
| 141 | .Fn OCSP_SIGNATURE_new | 143 | .Fn OCSP_SIGNATURE_new |
| 142 | allocates and initializes an empty | 144 | allocates and initializes an empty |
| 143 | .Vt OCSP_SIGNATURE | 145 | .Vt OCSP_SIGNATURE |
| 144 | object, representing an ASN.1 Signature structure defined in RFC 6960. | 146 | object, representing an ASN.1 |
| 147 | .Vt Signature | ||
| 148 | structure defined in RFC 6960. | ||
| 145 | Such an object is used inside | 149 | Such an object is used inside |
| 146 | .Vt OCSP_REQUEST . | 150 | .Vt OCSP_REQUEST . |
| 147 | .Fn OCSP_SIGNATURE_free | 151 | .Fn OCSP_SIGNATURE_free |
| @@ -151,7 +155,9 @@ frees | |||
| 151 | .Fn OCSP_REQINFO_new | 155 | .Fn OCSP_REQINFO_new |
| 152 | allocates and initializes an empty | 156 | allocates and initializes an empty |
| 153 | .Vt OCSP_REQINFO | 157 | .Vt OCSP_REQINFO |
| 154 | object, representing an ASN.1 TBSRequest structure defined in RFC 6960. | 158 | object, representing an ASN.1 |
| 159 | .Vt TBSRequest | ||
| 160 | structure defined in RFC 6960. | ||
| 155 | Such an object is used inside | 161 | Such an object is used inside |
| 156 | .Vt OCSP_REQUEST . | 162 | .Vt OCSP_REQUEST . |
| 157 | It asks about the validity of one or more certificates. | 163 | It asks about the validity of one or more certificates. |
| @@ -162,7 +168,9 @@ frees | |||
| 162 | .Fn OCSP_ONEREQ_new | 168 | .Fn OCSP_ONEREQ_new |
| 163 | allocates and initializes an empty | 169 | allocates and initializes an empty |
| 164 | .Vt OCSP_ONEREQ | 170 | .Vt OCSP_ONEREQ |
| 165 | object, representing an ASN.1 Request structure defined in RFC 6960. | 171 | object, representing an ASN.1 |
| 172 | .Vt Request | ||
| 173 | structure defined in RFC 6960. | ||
| 166 | Such objects are used inside | 174 | Such objects are used inside |
| 167 | .Vt OCSP_REQINFO . | 175 | .Vt OCSP_REQINFO . |
| 168 | Each one asks about the validity of one certificiate. | 176 | Each one asks about the validity of one certificiate. |
diff --git a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 index 6179da3a5b..5f42c781fd 100644 --- a/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 +++ b/src/lib/libcrypto/man/OCSP_SERVICELOC_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.4 2016/12/15 15:22:17 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 15 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt OCSP_SERVICELOC_NEW 3 | 18 | .Dt OCSP_SERVICELOC_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -38,10 +38,14 @@ Due to restrictions of network routing, a client may be unable to | |||
| 38 | directly contact the authoritative OCSP server for a certificate | 38 | directly contact the authoritative OCSP server for a certificate |
| 39 | that needs to be checked. | 39 | that needs to be checked. |
| 40 | In that case, the request can be sent via a proxy server. | 40 | In that case, the request can be sent via a proxy server. |
| 41 | An ASN.1 ServiceLocator structure is included in the | 41 | An ASN.1 |
| 42 | singleRequestExtensions field of the Request structure to indicate | 42 | .Vt ServiceLocator |
| 43 | where to forward the request. | 43 | structure is included in the singleRequestExtensions field of the |
| 44 | The ServiceLocator is represented by a | 44 | .Vt Request |
| 45 | structure to indicate where to forward the request. | ||
| 46 | The | ||
| 47 | .Vt ServiceLocator | ||
| 48 | is represented by a | ||
| 45 | .Vt OCSP_SERVICELOC | 49 | .Vt OCSP_SERVICELOC |
| 46 | object, which will be stored inside the | 50 | object, which will be stored inside the |
| 47 | .Vt OCSP_ONEREQ | 51 | .Vt OCSP_ONEREQ |
| @@ -65,9 +69,12 @@ If | |||
| 65 | .Fa urls | 69 | .Fa urls |
| 66 | or its first element is | 70 | or its first element is |
| 67 | .Dv NULL , | 71 | .Dv NULL , |
| 68 | the locator field is omitted from the ServiceLocator structure | 72 | the locator field is omitted from the |
| 69 | and only the issuer is included. | 73 | .Vt ServiceLocator |
| 70 | The resulting ServiceLocator structure is encoded in ASN.1 using | 74 | structure and only the issuer is included. |
| 75 | The resulting | ||
| 76 | .Vt ServiceLocator | ||
| 77 | structure is encoded in ASN.1 using | ||
| 71 | .Xr X509V3_EXT_i2d 3 | 78 | .Xr X509V3_EXT_i2d 3 |
| 72 | with criticality 0. | 79 | with criticality 0. |
| 73 | .Sh RETURN VALUES | 80 | .Sh RETURN VALUES |
diff --git a/src/lib/libcrypto/man/OCSP_cert_to_id.3 b/src/lib/libcrypto/man/OCSP_cert_to_id.3 index 103b9a4a9f..77559ba469 100644 --- a/src/lib/libcrypto/man/OCSP_cert_to_id.3 +++ b/src/lib/libcrypto/man/OCSP_cert_to_id.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_cert_to_id.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 | 2 | .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt OCSP_CERT_TO_ID 3 | 69 | .Dt OCSP_CERT_TO_ID 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -118,7 +118,9 @@ | |||
| 118 | .Fn OCSP_CERTID_new | 118 | .Fn OCSP_CERTID_new |
| 119 | allocates and initializes an empty | 119 | allocates and initializes an empty |
| 120 | .Vt OCSP_CERTID | 120 | .Vt OCSP_CERTID |
| 121 | object, representing an ASN.1 CertID structure defined in RFC 6960. | 121 | object, representing an ASN.1 |
| 122 | .Vt CertID | ||
| 123 | structure defined in RFC 6960. | ||
| 122 | It can store hashes of an issuer's distinguished name and public | 124 | It can store hashes of an issuer's distinguished name and public |
| 123 | key together with a serial number of a certificate. | 125 | key together with a serial number of a certificate. |
| 124 | It is used by the | 126 | It is used by the |
diff --git a/src/lib/libcrypto/man/OCSP_resp_find_status.3 b/src/lib/libcrypto/man/OCSP_resp_find_status.3 index 23aaa26e38..d06540d716 100644 --- a/src/lib/libcrypto/man/OCSP_resp_find_status.3 +++ b/src/lib/libcrypto/man/OCSP_resp_find_status.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.4 2016/12/12 22:48:02 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_resp_find_status.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 | 2 | .\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt OCSP_RESP_FIND_STATUS 3 | 69 | .Dt OCSP_RESP_FIND_STATUS 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -140,7 +140,9 @@ | |||
| 140 | .Fn OCSP_SINGLERESP_new | 140 | .Fn OCSP_SINGLERESP_new |
| 141 | allocates and initializes an empty | 141 | allocates and initializes an empty |
| 142 | .Vt OCSP_SINGLERESP | 142 | .Vt OCSP_SINGLERESP |
| 143 | object, representing an ASN.1 SingleResponse structure defined in RFC 6960. | 143 | object, representing an ASN.1 |
| 144 | .Vt SingleResponse | ||
| 145 | structure defined in RFC 6960. | ||
| 144 | Each such object can store the server's answer regarding the validity | 146 | Each such object can store the server's answer regarding the validity |
| 145 | of one individual certificate. | 147 | of one individual certificate. |
| 146 | Such objects are used inside the | 148 | Such objects are used inside the |
| @@ -156,7 +158,9 @@ frees | |||
| 156 | .Fn OCSP_CERTSTATUS_new | 158 | .Fn OCSP_CERTSTATUS_new |
| 157 | allocates and initializes an empty | 159 | allocates and initializes an empty |
| 158 | .Vt OCSP_CERTSTATUS | 160 | .Vt OCSP_CERTSTATUS |
| 159 | object, representing an ASN.1 CertStatus structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
| 162 | .Vt CertStatus | ||
| 163 | structure defined in RFC 6960. | ||
| 160 | Such an object is used inside | 164 | Such an object is used inside |
| 161 | .Vt OCSP_SINGLERESP . | 165 | .Vt OCSP_SINGLERESP . |
| 162 | .Fn OCSP_CERTSTATUS_free | 166 | .Fn OCSP_CERTSTATUS_free |
| @@ -166,7 +170,9 @@ frees | |||
| 166 | .Fn OCSP_REVOKEDINFO_new | 170 | .Fn OCSP_REVOKEDINFO_new |
| 167 | allocates and initializes an empty | 171 | allocates and initializes an empty |
| 168 | .Vt OCSP_REVOKEDINFO | 172 | .Vt OCSP_REVOKEDINFO |
| 169 | object, representing an ASN.1 RevokedInfo structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
| 174 | .Vt RevokedInfo | ||
| 175 | structure defined in RFC 6960. | ||
| 170 | Such an object is used inside | 176 | Such an object is used inside |
| 171 | .Vt OCSP_CERTSTATUS . | 177 | .Vt OCSP_CERTSTATUS . |
| 172 | .Fn OCSP_REVOKEDINFO_free | 178 | .Fn OCSP_REVOKEDINFO_free |
diff --git a/src/lib/libcrypto/man/OCSP_response_status.3 b/src/lib/libcrypto/man/OCSP_response_status.3 index 33a9dfb1a2..1ffa8a728e 100644 --- a/src/lib/libcrypto/man/OCSP_response_status.3 +++ b/src/lib/libcrypto/man/OCSP_response_status.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: OCSP_response_status.3,v 1.3 2016/12/12 18:45:29 schwarze Exp $ | 1 | .\" $OpenBSD: OCSP_response_status.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 12 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt OCSP_RESPONSE_STATUS 3 | 69 | .Dt OCSP_RESPONSE_STATUS 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -122,7 +122,9 @@ | |||
| 122 | .Fn OCSP_RESPONSE_new | 122 | .Fn OCSP_RESPONSE_new |
| 123 | allocates and initializes an empty | 123 | allocates and initializes an empty |
| 124 | .Vt OCSP_RESPONSE | 124 | .Vt OCSP_RESPONSE |
| 125 | object, representing an ASN.1 OCSPResponse structure defined in RFC 6960. | 125 | object, representing an ASN.1 |
| 126 | .Vt OCSPResponse | ||
| 127 | structure defined in RFC 6960. | ||
| 126 | .Fn OCSP_RESPONSE_free | 128 | .Fn OCSP_RESPONSE_free |
| 127 | frees | 129 | frees |
| 128 | .Fa resp . | 130 | .Fa resp . |
| @@ -130,7 +132,9 @@ frees | |||
| 130 | .Fn OCSP_RESPBYTES_new | 132 | .Fn OCSP_RESPBYTES_new |
| 131 | allocates and initializes an empty | 133 | allocates and initializes an empty |
| 132 | .Vt OCSP_RESPBYTES | 134 | .Vt OCSP_RESPBYTES |
| 133 | object, representing an ASN.1 ResponseBytes structure defined in RFC 6960. | 135 | object, representing an ASN.1 |
| 136 | .Vt ResponseBytes | ||
| 137 | structure defined in RFC 6960. | ||
| 134 | Such an object is used inside | 138 | Such an object is used inside |
| 135 | .Vt OCSP_RESPONSE . | 139 | .Vt OCSP_RESPONSE . |
| 136 | .Fn OCSP_RESPBYTES_free | 140 | .Fn OCSP_RESPBYTES_free |
| @@ -140,7 +144,9 @@ frees | |||
| 140 | .Fn OCSP_BASICRESP_new | 144 | .Fn OCSP_BASICRESP_new |
| 141 | allocates and initializes an empty | 145 | allocates and initializes an empty |
| 142 | .Vt OCSP_BASICRESP | 146 | .Vt OCSP_BASICRESP |
| 143 | object, representing an ASN.1 BasicOCSPResponse structure defined in RFC 6960. | 147 | object, representing an ASN.1 |
| 148 | .Vt BasicOCSPResponse | ||
| 149 | structure defined in RFC 6960. | ||
| 144 | .Vt OCSP_RESPBYTES | 150 | .Vt OCSP_RESPBYTES |
| 145 | contains the DER-encoded form of an | 151 | contains the DER-encoded form of an |
| 146 | .Vt OCSP_BASICRESP | 152 | .Vt OCSP_BASICRESP |
| @@ -152,7 +158,9 @@ frees | |||
| 152 | .Fn OCSP_RESPDATA_new | 158 | .Fn OCSP_RESPDATA_new |
| 153 | allocates and initializes an empty | 159 | allocates and initializes an empty |
| 154 | .Vt OCSP_RESPDATA | 160 | .Vt OCSP_RESPDATA |
| 155 | object, representing an ASN.1 ResponseData structure defined in RFC 6960. | 161 | object, representing an ASN.1 |
| 162 | .Vt ResponseData | ||
| 163 | structure defined in RFC 6960. | ||
| 156 | Such an object is used inside | 164 | Such an object is used inside |
| 157 | .Vt OCSP_BASICRESP . | 165 | .Vt OCSP_BASICRESP . |
| 158 | .Fn OCSP_RESPDATA_free | 166 | .Fn OCSP_RESPDATA_free |
| @@ -162,7 +170,9 @@ frees | |||
| 162 | .Fn OCSP_RESPID_new | 170 | .Fn OCSP_RESPID_new |
| 163 | allocates and initializes an empty | 171 | allocates and initializes an empty |
| 164 | .Vt OCSP_RESPID | 172 | .Vt OCSP_RESPID |
| 165 | object, representing an ASN.1 ResponderID structure defined in RFC 6960. | 173 | object, representing an ASN.1 |
| 174 | .Vt ResponderID | ||
| 175 | structure defined in RFC 6960. | ||
| 166 | Such an object is used inside | 176 | Such an object is used inside |
| 167 | .Vt OCSP_RESPDATA . | 177 | .Vt OCSP_RESPDATA . |
| 168 | .Fn OCSP_RESPID_free | 178 | .Fn OCSP_RESPID_free |
diff --git a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 index 6d3ede45c2..5d0852be25 100644 --- a/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 +++ b/src/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.6 2016/12/06 14:45:08 schwarze Exp $ | 1 | .\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 6 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 | 53 | .Dt PEM_READ_BIO_PRIVATEKEY 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -747,8 +747,9 @@ and | |||
| 747 | .Fn PEM_write_PKCS8PrivateKey | 747 | .Fn PEM_write_PKCS8PrivateKey |
| 748 | write a private key in an | 748 | write a private key in an |
| 749 | .Vt EVP_PKEY | 749 | .Vt EVP_PKEY |
| 750 | structure in PKCS#8 EncryptedPrivateKeyInfo format using PKCS#5 | 750 | structure in PKCS#8 |
| 751 | v2.0 password based encryption algorithms. | 751 | .Vt EncryptedPrivateKeyInfo |
| 752 | format using PKCS#5 v2.0 password based encryption algorithms. | ||
| 752 | The | 753 | The |
| 753 | .Fa enc | 754 | .Fa enc |
| 754 | argument specifies the encryption algorithm to use: unlike all other PEM | 755 | argument specifies the encryption algorithm to use: unlike all other PEM |
| @@ -758,13 +759,15 @@ If | |||
| 758 | .Fa enc | 759 | .Fa enc |
| 759 | is | 760 | is |
| 760 | .Dv NULL , | 761 | .Dv NULL , |
| 761 | then no encryption is used and a PKCS#8 PrivateKeyInfo structure | 762 | then no encryption is used and a PKCS#8 |
| 762 | is used instead. | 763 | .Vt PrivateKeyInfo |
| 764 | structure is used instead. | ||
| 763 | .Pp | 765 | .Pp |
| 764 | .Fn PEM_write_bio_PKCS8PrivateKey_nid | 766 | .Fn PEM_write_bio_PKCS8PrivateKey_nid |
| 765 | and | 767 | and |
| 766 | .Fn PEM_write_PKCS8PrivateKey_nid | 768 | .Fn PEM_write_PKCS8PrivateKey_nid |
| 767 | also write out a private key as a PKCS#8 EncryptedPrivateKeyInfo. | 769 | also write out a private key as a PKCS#8 |
| 770 | .Vt EncryptedPrivateKeyInfo . | ||
| 768 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. | 771 | However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead. |
| 769 | The algorithm to use is specified in the | 772 | The algorithm to use is specified in the |
| 770 | .Fa nid | 773 | .Fa nid |
| @@ -789,7 +792,9 @@ The | |||
| 789 | functions process a public key using an | 792 | functions process a public key using an |
| 790 | .Vt EVP_PKEY | 793 | .Vt EVP_PKEY |
| 791 | structure. | 794 | structure. |
| 792 | The public key is encoded as a SubjectPublicKeyInfo structure. | 795 | The public key is encoded as an ASN.1 |
| 796 | .Vt SubjectPublicKeyInfo | ||
| 797 | structure. | ||
| 793 | .Pp | 798 | .Pp |
| 794 | The | 799 | The |
| 795 | .Sy RSAPrivateKey | 800 | .Sy RSAPrivateKey |
| @@ -805,15 +810,18 @@ The | |||
| 805 | functions process an RSA public key using an | 810 | functions process an RSA public key using an |
| 806 | .Vt RSA | 811 | .Vt RSA |
| 807 | structure. | 812 | structure. |
| 808 | The public key is encoded using a PKCS#1 RSAPublicKey structure. | 813 | The public key is encoded using a PKCS#1 |
| 814 | .Vt RSAPublicKey | ||
| 815 | structure. | ||
| 809 | .Pp | 816 | .Pp |
| 810 | The | 817 | The |
| 811 | .Sy RSA_PUBKEY | 818 | .Sy RSA_PUBKEY |
| 812 | functions also process an RSA public key using an | 819 | functions also process an RSA public key using an |
| 813 | .Vt RSA | 820 | .Vt RSA |
| 814 | structure. | 821 | structure. |
| 815 | However the public key is encoded using a SubjectPublicKeyInfo structure | 822 | However the public key is encoded using an ASN.1 |
| 816 | and an error occurs if the public key is not RSA. | 823 | .Vt SubjectPublicKeyInfo |
| 824 | structure and an error occurs if the public key is not RSA. | ||
| 817 | .Pp | 825 | .Pp |
| 818 | The | 826 | The |
| 819 | .Sy DSAPrivateKey | 827 | .Sy DSAPrivateKey |
| @@ -829,8 +837,9 @@ The | |||
| 829 | functions process a DSA public key using a | 837 | functions process a DSA public key using a |
| 830 | .Vt DSA | 838 | .Vt DSA |
| 831 | structure. | 839 | structure. |
| 832 | The public key is encoded using a SubjectPublicKeyInfo structure and an | 840 | The public key is encoded using an ASN.1 |
| 833 | error occurs if the public key is not DSA. | 841 | .Vt SubjectPublicKeyInfo |
| 842 | structure and an error occurs if the public key is not DSA. | ||
| 834 | .Pp | 843 | .Pp |
| 835 | The | 844 | The |
| 836 | .Sy DSAparams | 845 | .Sy DSAparams |
| @@ -906,7 +915,9 @@ structure. | |||
| 906 | .Pp | 915 | .Pp |
| 907 | The | 916 | The |
| 908 | .Sy PKCS7 | 917 | .Sy PKCS7 |
| 909 | functions process a PKCS#7 ContentInfo using a | 918 | functions process a PKCS#7 |
| 919 | .Vt ContentInfo | ||
| 920 | using a | ||
| 910 | .Vt PKCS7 | 921 | .Vt PKCS7 |
| 911 | structure. | 922 | structure. |
| 912 | .Pp | 923 | .Pp |
diff --git a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 index 8cb6835194..603c27bed1 100644 --- a/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 +++ b/src/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PKCS12_SAFEBAG_NEW 3 | 18 | .Dt PKCS12_SAFEBAG_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -37,8 +37,9 @@ | |||
| 37 | .Fn PKCS12_SAFEBAG_new | 37 | .Fn PKCS12_SAFEBAG_new |
| 38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
| 39 | .Vt PKCS12_SAFEBAG | 39 | .Vt PKCS12_SAFEBAG |
| 40 | object, representing an ASN.1 SafeBag structure | 40 | object, representing an ASN.1 |
| 41 | defined in RFC 7292 section 4.2. | 41 | .Vt SafeBag |
| 42 | structure defined in RFC 7292 section 4.2. | ||
| 42 | It can hold a pointer to a | 43 | It can hold a pointer to a |
| 43 | .Vt PKCS12_BAGS | 44 | .Vt PKCS12_BAGS |
| 44 | object together with a type identifier and optional attributes. | 45 | object together with a type identifier and optional attributes. |
| @@ -49,7 +50,9 @@ frees | |||
| 49 | .Fn PKCS12_BAGS_new | 50 | .Fn PKCS12_BAGS_new |
| 50 | allocates and initializes an empty | 51 | allocates and initializes an empty |
| 51 | .Vt PKCS12_BAGS | 52 | .Vt PKCS12_BAGS |
| 52 | object, representing the bagValue field of an ASN.1 SafeBag structure. | 53 | object, representing the bagValue field of an ASN.1 |
| 54 | .Vt SafeBag | ||
| 55 | structure. | ||
| 53 | It is used in | 56 | It is used in |
| 54 | .Vt PKCS12_SAFEBAG | 57 | .Vt PKCS12_SAFEBAG |
| 55 | and can hold a DER-encoded X.509 certificate, | 58 | and can hold a DER-encoded X.509 certificate, |
diff --git a/src/lib/libcrypto/man/PKCS12_new.3 b/src/lib/libcrypto/man/PKCS12_new.3 index 426074c9b1..0f54048724 100644 --- a/src/lib/libcrypto/man/PKCS12_new.3 +++ b/src/lib/libcrypto/man/PKCS12_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKCS12_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS12_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PKCS12_NEW 3 | 18 | .Dt PKCS12_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -37,7 +37,9 @@ | |||
| 37 | .Fn PKCS12_new | 37 | .Fn PKCS12_new |
| 38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
| 39 | .Vt PKCS12 | 39 | .Vt PKCS12 |
| 40 | object, representing an ASN.1 PFX (personal information exchange) | 40 | object, representing an ASN.1 |
| 41 | .Vt PFX | ||
| 42 | .Pq personal information exchange | ||
| 41 | structure defined in RFC 7292 section 4. | 43 | structure defined in RFC 7292 section 4. |
| 42 | It can hold a pointer to a | 44 | It can hold a pointer to a |
| 43 | .Vt PKCS7 | 45 | .Vt PKCS7 |
| @@ -53,8 +55,9 @@ frees | |||
| 53 | .Fn PKCS12_MAC_DATA_new | 55 | .Fn PKCS12_MAC_DATA_new |
| 54 | allocates and initializes an empty | 56 | allocates and initializes an empty |
| 55 | .Vt PKCS12_MAC_DATA | 57 | .Vt PKCS12_MAC_DATA |
| 56 | object, representing an ASN.1 MacData structure | 58 | object, representing an ASN.1 |
| 57 | defined in RFC 7292 section 4. | 59 | .Vt MacData |
| 60 | structure defined in RFC 7292 section 4. | ||
| 58 | It is used inside | 61 | It is used inside |
| 59 | .Vt PKCS12 | 62 | .Vt PKCS12 |
| 60 | and can hold a pointer to an | 63 | and can hold a pointer to an |
diff --git a/src/lib/libcrypto/man/PKCS7_new.3 b/src/lib/libcrypto/man/PKCS7_new.3 index 9feecbb88b..7f8cffd881 100644 --- a/src/lib/libcrypto/man/PKCS7_new.3 +++ b/src/lib/libcrypto/man/PKCS7_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKCS7_new.3,v 1.1 2016/12/13 14:31:55 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS7_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PKCS7_NEW 3 | 18 | .Dt PKCS7_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -88,8 +88,9 @@ cryptography applied to it, in particular signed and encrypted data. | |||
| 88 | .Fn PKCS7_new | 88 | .Fn PKCS7_new |
| 89 | allocates and initializes an empty | 89 | allocates and initializes an empty |
| 90 | .Vt PKCS7 | 90 | .Vt PKCS7 |
| 91 | object, representing an ASN.1 ContentInfo structure | 91 | object, representing an ASN.1 |
| 92 | defined in RFC 2315 section 7. | 92 | .Vt ContentInfo |
| 93 | structure defined in RFC 2315 section 7. | ||
| 93 | It is the top-level data structure able to hold any kind of content | 94 | It is the top-level data structure able to hold any kind of content |
| 94 | that can be transmitted using PKCS#7. | 95 | that can be transmitted using PKCS#7. |
| 95 | It can be used recursively in | 96 | It can be used recursively in |
| @@ -104,8 +105,9 @@ frees | |||
| 104 | .Fn PKCS7_SIGNED_new | 105 | .Fn PKCS7_SIGNED_new |
| 105 | allocates and initializes an empty | 106 | allocates and initializes an empty |
| 106 | .Vt PKCS7_SIGNED | 107 | .Vt PKCS7_SIGNED |
| 107 | object, representing an ASN.1 SignedData structure | 108 | object, representing an ASN.1 |
| 108 | defined in RFC 2315 section 9. | 109 | .Vt SignedData |
| 110 | structure defined in RFC 2315 section 9. | ||
| 109 | It can be used inside | 111 | It can be used inside |
| 110 | .Vt PKCS7 | 112 | .Vt PKCS7 |
| 111 | objects and holds any kind of content together with signatures by | 113 | objects and holds any kind of content together with signatures by |
| @@ -118,8 +120,9 @@ frees | |||
| 118 | .Fn PKCS7_ENVELOPE_new | 120 | .Fn PKCS7_ENVELOPE_new |
| 119 | allocates and initializes an empty | 121 | allocates and initializes an empty |
| 120 | .Vt PKCS7_ENVELOPE | 122 | .Vt PKCS7_ENVELOPE |
| 121 | object, representing an ASN.1 EnvelopedData structure | 123 | object, representing an ASN.1 |
| 122 | defined in RFC 2315 section 10. | 124 | .Vt EnvelopedData |
| 125 | structure defined in RFC 2315 section 10. | ||
| 123 | It can be used inside | 126 | It can be used inside |
| 124 | .Vt PKCS7 | 127 | .Vt PKCS7 |
| 125 | objects and holds any kind of encrypted content together with | 128 | objects and holds any kind of encrypted content together with |
| @@ -131,8 +134,9 @@ frees | |||
| 131 | .Fn PKCS7_SIGN_ENVELOPE_new | 134 | .Fn PKCS7_SIGN_ENVELOPE_new |
| 132 | allocates and initializes an empty | 135 | allocates and initializes an empty |
| 133 | .Vt PKCS7_SIGN_ENVELOPE | 136 | .Vt PKCS7_SIGN_ENVELOPE |
| 134 | object, representing an ASN.1 SignedAndEnvelopedData structure | 137 | object, representing an ASN.1 |
| 135 | defined in RFC 2315 section 11. | 138 | .Vt SignedAndEnvelopedData |
| 139 | structure defined in RFC 2315 section 11. | ||
| 136 | It can be used inside | 140 | It can be used inside |
| 137 | .Vt PKCS7 | 141 | .Vt PKCS7 |
| 138 | objects and holds any kind of encrypted content together with | 142 | objects and holds any kind of encrypted content together with |
| @@ -146,8 +150,9 @@ frees | |||
| 146 | .Fn PKCS7_DIGEST_new | 150 | .Fn PKCS7_DIGEST_new |
| 147 | allocates and initializes an empty | 151 | allocates and initializes an empty |
| 148 | .Vt PKCS7_DIGEST | 152 | .Vt PKCS7_DIGEST |
| 149 | object, representing an ASN.1 DigestedData structure | 153 | object, representing an ASN.1 |
| 150 | defined in RFC 2315 section 12. | 154 | .Vt DigestedData |
| 155 | structure defined in RFC 2315 section 12. | ||
| 151 | It can be used inside | 156 | It can be used inside |
| 152 | .Vt PKCS7 | 157 | .Vt PKCS7 |
| 153 | objects and holds any kind of content together with a message digest | 158 | objects and holds any kind of content together with a message digest |
| @@ -159,8 +164,9 @@ frees | |||
| 159 | .Fn PKCS7_ENCRYPT_new | 164 | .Fn PKCS7_ENCRYPT_new |
| 160 | allocates and initializes an empty | 165 | allocates and initializes an empty |
| 161 | .Vt PKCS7_ENCRYPT | 166 | .Vt PKCS7_ENCRYPT |
| 162 | object, representing an ASN.1 EncryptedData structure | 167 | object, representing an ASN.1 |
| 163 | defined in RFC 2315 section 13. | 168 | .Vt EncryptedData |
| 169 | structure defined in RFC 2315 section 13. | ||
| 164 | It can be used inside | 170 | It can be used inside |
| 165 | .Vt PKCS7 | 171 | .Vt PKCS7 |
| 166 | objects and holds any kind of encrypted content. | 172 | objects and holds any kind of encrypted content. |
| @@ -172,8 +178,9 @@ frees | |||
| 172 | .Fn PKCS7_ENC_CONTENT_new | 178 | .Fn PKCS7_ENC_CONTENT_new |
| 173 | allocates and initializes an empty | 179 | allocates and initializes an empty |
| 174 | .Vt PKCS7_ENC_CONTENT | 180 | .Vt PKCS7_ENC_CONTENT |
| 175 | object, representing an ASN.1 EncryptedContentInfo structure | 181 | object, representing an ASN.1 |
| 176 | defined in RFC 2315 section 10.1. | 182 | .Vt EncryptedContentInfo |
| 183 | structure defined in RFC 2315 section 10.1. | ||
| 177 | It can be used inside | 184 | It can be used inside |
| 178 | .Vt PKCS7_ENVELOPE , | 185 | .Vt PKCS7_ENVELOPE , |
| 179 | .Vt PKCS7_SIGN_ENVELOPE , | 186 | .Vt PKCS7_SIGN_ENVELOPE , |
| @@ -188,8 +195,9 @@ frees | |||
| 188 | .Fn PKCS7_SIGNER_INFO_new | 195 | .Fn PKCS7_SIGNER_INFO_new |
| 189 | allocates and initializes an empty | 196 | allocates and initializes an empty |
| 190 | .Vt PKCS7_SIGNER_INFO | 197 | .Vt PKCS7_SIGNER_INFO |
| 191 | object, representing an ASN.1 SignerInfo structure | 198 | object, representing an ASN.1 |
| 192 | defined in RFC 2315 section 9.2. | 199 | .Vt SignerInfo |
| 200 | structure defined in RFC 2315 section 9.2. | ||
| 193 | It can be used inside | 201 | It can be used inside |
| 194 | .Vt PKCS7_SIGNED | 202 | .Vt PKCS7_SIGNED |
| 195 | and | 203 | and |
| @@ -203,8 +211,9 @@ frees | |||
| 203 | .Fn PKCS7_RECIP_INFO_new | 211 | .Fn PKCS7_RECIP_INFO_new |
| 204 | allocates and initializes an empty | 212 | allocates and initializes an empty |
| 205 | .Vt PKCS7_RECIP_INFO | 213 | .Vt PKCS7_RECIP_INFO |
| 206 | object, representing an ASN.1 RecipientInfo structure | 214 | object, representing an ASN.1 |
| 207 | defined in RFC 2315 section 10.2. | 215 | .Vt RecipientInfo |
| 216 | structure defined in RFC 2315 section 10.2. | ||
| 208 | It can be used inside | 217 | It can be used inside |
| 209 | .Vt PKCS7_ENVELOPE | 218 | .Vt PKCS7_ENVELOPE |
| 210 | and | 219 | and |
| @@ -218,8 +227,9 @@ frees | |||
| 218 | .Fn PKCS7_ISSUER_AND_SERIAL_new | 227 | .Fn PKCS7_ISSUER_AND_SERIAL_new |
| 219 | allocates and initializes an empty | 228 | allocates and initializes an empty |
| 220 | .Vt PKCS7_ISSUER_AND_SERIAL | 229 | .Vt PKCS7_ISSUER_AND_SERIAL |
| 221 | object, representing an ASN.1 IssuerAndSerialNumber structure | 230 | object, representing an ASN.1 |
| 222 | defined in RFC 2315 section 6.7. | 231 | .Vt IssuerAndSerialNumber |
| 232 | structure defined in RFC 2315 section 6.7. | ||
| 223 | It can be used inside | 233 | It can be used inside |
| 224 | .Vt PKCS7_SIGNER_INFO | 234 | .Vt PKCS7_SIGNER_INFO |
| 225 | and | 235 | and |
diff --git a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 index d522dab9f8..8c6dba3514 100644 --- a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 +++ b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.1 2016/12/22 12:10:06 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 | 18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,8 +31,9 @@ | |||
| 31 | .Fn PKCS8_PRIV_KEY_INFO_new | 31 | .Fn PKCS8_PRIV_KEY_INFO_new |
| 32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
| 33 | .Vt PKCS8_PRIV_KEY_INFO | 33 | .Vt PKCS8_PRIV_KEY_INFO |
| 34 | object, representing an ASN.1 PrivateKeyInfo structure | 34 | object, representing an ASN.1 |
| 35 | defined in RFC 5208 section 5. | 35 | .Vt PrivateKeyInfo |
| 36 | structure defined in RFC 5208 section 5. | ||
| 36 | It can hold a private key together with information about the | 37 | It can hold a private key together with information about the |
| 37 | algorithm to be used with it and optional attributes. | 38 | algorithm to be used with it and optional attributes. |
| 38 | .Pp | 39 | .Pp |
diff --git a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 index 3200b85fb4..888859b1e6 100644 --- a/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 +++ b/src/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.2 2016/12/24 08:19:04 jmc Exp $ | 1 | .\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PKEY_USAGE_PERIOD_NEW 3 | 18 | .Dt PKEY_USAGE_PERIOD_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,8 +31,9 @@ | |||
| 31 | .Fn PKEY_USAGE_PERIOD_new | 31 | .Fn PKEY_USAGE_PERIOD_new |
| 32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
| 33 | .Vt PKEY_USAGE_PERIOD | 33 | .Vt PKEY_USAGE_PERIOD |
| 34 | object, representing an ASN.1 PrivateKeyUsagePeriod structure | 34 | object, representing an ASN.1 |
| 35 | defined in RFC 3280 section 4.2.1.4. | 35 | .Vt PrivateKeyUsagePeriod |
| 36 | structure defined in RFC 3280 section 4.2.1.4. | ||
| 36 | It could be used in | 37 | It could be used in |
| 37 | .Vt X509 | 38 | .Vt X509 |
| 38 | certificates to specify a validity period for the private key | 39 | certificates to specify a validity period for the private key |
| @@ -59,7 +60,8 @@ Certificate Revocation List (CRL) Profile, | |||
| 59 | section 4.2.1.4: Private Key Usage Period | 60 | section 4.2.1.4: Private Key Usage Period |
| 60 | .Pp | 61 | .Pp |
| 61 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 | 62 | RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4 |
| 62 | in RFC 3280, which specified the PrivateKeyUsagePeriod certificate | 63 | in RFC 3280, which specified the |
| 63 | extension but deprecated its use, was removed. | 64 | .Vt PrivateKeyUsagePeriod |
| 65 | certificate extension but deprecated its use, was removed. | ||
| 64 | Use of this ISO standard extension is neither deprecated | 66 | Use of this ISO standard extension is neither deprecated |
| 65 | nor recommended for use in the Internet PKI." | 67 | nor recommended for use in the Internet PKI." |
diff --git a/src/lib/libcrypto/man/POLICYINFO_new.3 b/src/lib/libcrypto/man/POLICYINFO_new.3 index a76385fc6b..ea225a2d03 100644 --- a/src/lib/libcrypto/man/POLICYINFO_new.3 +++ b/src/lib/libcrypto/man/POLICYINFO_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.1 2016/12/23 18:50:23 schwarze Exp $ | 1 | .\" $OpenBSD: POLICYINFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt POLICYINFO_NEW 3 | 18 | .Dt POLICYINFO_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -70,8 +70,9 @@ restrictions on their intended use. | |||
| 70 | .Fn POLICYINFO_new | 70 | .Fn POLICYINFO_new |
| 71 | allocates and initializes an empty | 71 | allocates and initializes an empty |
| 72 | .Vt POLICYINFO | 72 | .Vt POLICYINFO |
| 73 | object, representing an ASN.1 PolicyInformation structure | 73 | object, representing an ASN.1 |
| 74 | defined in RFC 5280 section 4.2.1.4. | 74 | .Vt PolicyInformation |
| 75 | structure defined in RFC 5280 section 4.2.1.4. | ||
| 75 | It can hold a policy identifier and optional advisory qualifiers. | 76 | It can hold a policy identifier and optional advisory qualifiers. |
| 76 | .Fn POLICYINFO_free | 77 | .Fn POLICYINFO_free |
| 77 | frees | 78 | frees |
| @@ -94,8 +95,9 @@ frees | |||
| 94 | .Fn POLICYQUALINFO_new | 95 | .Fn POLICYQUALINFO_new |
| 95 | allocates and initializes an empty | 96 | allocates and initializes an empty |
| 96 | .Vt POLICYQUALINFO | 97 | .Vt POLICYQUALINFO |
| 97 | object, representing an ASN.1 PolicyQualifierInfo structure | 98 | object, representing an ASN.1 |
| 98 | defined in RFC 5280 section 4.2.1.4. | 99 | .Vt PolicyQualifierInfo |
| 100 | structure defined in RFC 5280 section 4.2.1.4. | ||
| 99 | It can be used in | 101 | It can be used in |
| 100 | .Vt POLICYINFO | 102 | .Vt POLICYINFO |
| 101 | and it can hold either a uniform resource identifier of a certification | 103 | and it can hold either a uniform resource identifier of a certification |
| @@ -109,8 +111,9 @@ frees | |||
| 109 | .Fn USERNOTICE_new | 111 | .Fn USERNOTICE_new |
| 110 | allocates and initializes an empty | 112 | allocates and initializes an empty |
| 111 | .Vt USERNOTICE | 113 | .Vt USERNOTICE |
| 112 | object, representing an ASN.1 UserNotice structure | 114 | object, representing an ASN.1 |
| 113 | defined in RFC 5280 section 4.2.1.4. | 115 | .Vt UserNotice |
| 116 | structure defined in RFC 5280 section 4.2.1.4. | ||
| 114 | It can be used in | 117 | It can be used in |
| 115 | .Vt POLICYQUALINFO | 118 | .Vt POLICYQUALINFO |
| 116 | and it can hold either an | 119 | and it can hold either an |
| @@ -125,8 +128,9 @@ frees | |||
| 125 | .Fn NOTICEREF_new | 128 | .Fn NOTICEREF_new |
| 126 | allocates and initializes an empty | 129 | allocates and initializes an empty |
| 127 | .Vt NOTICEREF | 130 | .Vt NOTICEREF |
| 128 | object, representing an ASN.1 NoticeReference structure | 131 | object, representing an ASN.1 |
| 129 | defined in RFC 5280 section 4.2.1.4. | 132 | .Vt NoticeReference |
| 133 | structure defined in RFC 5280 section 4.2.1.4. | ||
| 130 | It can be used in | 134 | It can be used in |
| 131 | .Vt USERNOTICE | 135 | .Vt USERNOTICE |
| 132 | and can hold an organization name and a stack of notice numbers. | 136 | and can hold an organization name and a stack of notice numbers. |
| @@ -137,8 +141,9 @@ frees | |||
| 137 | .Fn POLICY_MAPPING_new | 141 | .Fn POLICY_MAPPING_new |
| 138 | allocates and initializes an empty | 142 | allocates and initializes an empty |
| 139 | .Vt POLICY_MAPPING | 143 | .Vt POLICY_MAPPING |
| 140 | object, representing an ASN.1 PolicyMappings structure | 144 | object, representing an ASN.1 |
| 141 | defined in RFC 5280 section 4.2.1.5. | 145 | .Vt PolicyMappings |
| 146 | structure defined in RFC 5280 section 4.2.1.5. | ||
| 142 | It can be used in | 147 | It can be used in |
| 143 | .Vt X509 | 148 | .Vt X509 |
| 144 | CA certificates and can hold a list of pairs of policy identifiers, | 149 | CA certificates and can hold a list of pairs of policy identifiers, |
| @@ -151,8 +156,9 @@ frees | |||
| 151 | .Fn POLICY_CONSTRAINTS_new | 156 | .Fn POLICY_CONSTRAINTS_new |
| 152 | allocates and initializes an empty | 157 | allocates and initializes an empty |
| 153 | .Vt POLICY_CONSTRAINTS | 158 | .Vt POLICY_CONSTRAINTS |
| 154 | object, representing an ASN.1 PolicyConstraints structure | 159 | object, representing an ASN.1 |
| 155 | defined in RFC 5280 section 4.2.1.11. | 160 | .Vt PolicyConstraints |
| 161 | structure defined in RFC 5280 section 4.2.1.11. | ||
| 156 | It can be used in | 162 | It can be used in |
| 157 | .Vt X509 | 163 | .Vt X509 |
| 158 | CA certificates to restrict policy mapping and/or to require explicit | 164 | CA certificates to restrict policy mapping and/or to require explicit |
diff --git a/src/lib/libcrypto/man/PROXY_POLICY_new.3 b/src/lib/libcrypto/man/PROXY_POLICY_new.3 index eb4e963033..387ee3fb7f 100644 --- a/src/lib/libcrypto/man/PROXY_POLICY_new.3 +++ b/src/lib/libcrypto/man/PROXY_POLICY_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.1 2016/12/23 23:19:57 schwarze Exp $ | 1 | .\" $OpenBSD: PROXY_POLICY_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 23 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt PROXY_POLICY_NEW 3 | 18 | .Dt PROXY_POLICY_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -43,8 +43,9 @@ privileges on behalf of the subject of the original certificate. | |||
| 43 | .Fn PROXY_POLICY_new | 43 | .Fn PROXY_POLICY_new |
| 44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
| 45 | .Vt PROXY_POLICY | 45 | .Vt PROXY_POLICY |
| 46 | object, representing an ASN.1 ProxyPolicy structure | 46 | object, representing an ASN.1 |
| 47 | defined in RFC 3820 section 3.8. | 47 | .Vt ProxyPolicy |
| 48 | structure defined in RFC 3820 section 3.8. | ||
| 48 | It defines which privileges are to be delegated. | 49 | It defines which privileges are to be delegated. |
| 49 | .Fn PROXY_POLICY_free | 50 | .Fn PROXY_POLICY_free |
| 50 | frees | 51 | frees |
| @@ -53,8 +54,9 @@ frees | |||
| 53 | .Fn PROXY_CERT_INFO_EXTENSION_new | 54 | .Fn PROXY_CERT_INFO_EXTENSION_new |
| 54 | allocates and initializes an empty | 55 | allocates and initializes an empty |
| 55 | .Vt PROXY_CERT_INFO_EXTENSION | 56 | .Vt PROXY_CERT_INFO_EXTENSION |
| 56 | object, representing an ASN.1 ProxyCertInfo structure | 57 | object, representing an ASN.1 |
| 57 | defined in RFC 3820 section 3.8. | 58 | .Vt ProxyCertInfo |
| 59 | structure defined in RFC 3820 section 3.8. | ||
| 58 | It can contain a | 60 | It can contain a |
| 59 | .Vt PROXY_POLICY | 61 | .Vt PROXY_POLICY |
| 60 | object, and it can additionally restrict the maximum depth of the | 62 | object, and it can additionally restrict the maximum depth of the |
diff --git a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 index 8d6817b8bd..25a1c25ed3 100644 --- a/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 +++ b/src/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.1 2016/12/13 20:41:35 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 13 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt RSA_PSS_PARAMS_NEW 3 | 18 | .Dt RSA_PSS_PARAMS_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,8 +31,9 @@ | |||
| 31 | .Fn RSA_PSS_PARAMS_new | 31 | .Fn RSA_PSS_PARAMS_new |
| 32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
| 33 | .Vt RSA_PSS_PARAMS | 33 | .Vt RSA_PSS_PARAMS |
| 34 | object, representing an ASN.1 RSASSA-PSS-params structure | 34 | object, representing an ASN.1 |
| 35 | defined in RFC 8017 appendix A.2.3. | 35 | .Vt RSASSA-PSS-params |
| 36 | structure defined in RFC 8017 appendix A.2.3. | ||
| 36 | It references the hash function and the mask generation function | 37 | It references the hash function and the mask generation function |
| 37 | and stores the length of the salt and the trailer field number. | 38 | and stores the length of the salt and the trailer field number. |
| 38 | .Fn RSA_PSS_PARAMS_free | 39 | .Fn RSA_PSS_PARAMS_free |
diff --git a/src/lib/libcrypto/man/TS_REQ_new.3 b/src/lib/libcrypto/man/TS_REQ_new.3 index d1a0e90f21..35da948436 100644 --- a/src/lib/libcrypto/man/TS_REQ_new.3 +++ b/src/lib/libcrypto/man/TS_REQ_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: TS_REQ_new.3,v 1.3 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: TS_REQ_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt TS_REQ_NEW 3 | 18 | .Dt TS_REQ_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -67,8 +67,9 @@ which returns time-stamp tokens to the clients. | |||
| 67 | .Fn TS_REQ_new | 67 | .Fn TS_REQ_new |
| 68 | allocates and initializes an empty | 68 | allocates and initializes an empty |
| 69 | .Vt TS_REQ | 69 | .Vt TS_REQ |
| 70 | object, representing an ASN.1 TimeStampReq structure | 70 | object, representing an ASN.1 |
| 71 | defined in RFC 3161 section 2.4.1. | 71 | .Vt TimeStampReq |
| 72 | structure defined in RFC 3161 section 2.4.1. | ||
| 72 | It can hold a hash of the datum to be time-stamped and some | 73 | It can hold a hash of the datum to be time-stamped and some |
| 73 | auxiliary, optional information. | 74 | auxiliary, optional information. |
| 74 | .Fn TS_REQ_free | 75 | .Fn TS_REQ_free |
| @@ -78,8 +79,9 @@ frees | |||
| 78 | .Fn TS_RESP_new | 79 | .Fn TS_RESP_new |
| 79 | allocates and initializes an empty | 80 | allocates and initializes an empty |
| 80 | .Vt TS_RESP | 81 | .Vt TS_RESP |
| 81 | object, representing an ASN.1 TimeStampResp structure | 82 | object, representing an ASN.1 |
| 82 | defined in RFC 3161 section 2.4.2. | 83 | .Vt TimeStampResp |
| 84 | structure defined in RFC 3161 section 2.4.2. | ||
| 83 | It can hold status information and a time-stamp token. | 85 | It can hold status information and a time-stamp token. |
| 84 | .Fn TS_RESP_free | 86 | .Fn TS_RESP_free |
| 85 | frees | 87 | frees |
| @@ -88,8 +90,9 @@ frees | |||
| 88 | .Fn TS_STATUS_INFO_new | 90 | .Fn TS_STATUS_INFO_new |
| 89 | allocates and initializes an empty | 91 | allocates and initializes an empty |
| 90 | .Vt TS_STATUS_INFO | 92 | .Vt TS_STATUS_INFO |
| 91 | object, representing an ASN.1 PKIStatusInfo structure | 93 | object, representing an ASN.1 |
| 92 | defined in RFC 3161 section 2.4.2. | 94 | .Vt PKIStatusInfo |
| 95 | structure defined in RFC 3161 section 2.4.2. | ||
| 93 | It is used inside | 96 | It is used inside |
| 94 | .Vt TS_RESP | 97 | .Vt TS_RESP |
| 95 | and describes the outcome of one time-stamp request. | 98 | and describes the outcome of one time-stamp request. |
| @@ -100,8 +103,9 @@ frees | |||
| 100 | .Fn TS_TST_INFO_new | 103 | .Fn TS_TST_INFO_new |
| 101 | allocates and initializes an empty | 104 | allocates and initializes an empty |
| 102 | .Vt TS_TST_INFO | 105 | .Vt TS_TST_INFO |
| 103 | object, representing an ASN.1 TSTInfo structure | 106 | object, representing an ASN.1 |
| 104 | defined in RFC 3161 section 2.4.2. | 107 | .Vt TSTInfo |
| 108 | structure defined in RFC 3161 section 2.4.2. | ||
| 105 | It is the time-stamp token included in a | 109 | It is the time-stamp token included in a |
| 106 | .Vt TS_RESP | 110 | .Vt TS_RESP |
| 107 | object in case of success, and it can hold the hash of the datum | 111 | object in case of success, and it can hold the hash of the datum |
| @@ -114,8 +118,9 @@ frees | |||
| 114 | .Fn TS_ACCURACY_new | 118 | .Fn TS_ACCURACY_new |
| 115 | allocates and initializes an empty | 119 | allocates and initializes an empty |
| 116 | .Vt TS_ACCURACY | 120 | .Vt TS_ACCURACY |
| 117 | object, representing an ASN.1 Accuracy structure | 121 | object, representing an ASN.1 |
| 118 | defined in RFC 3161 section 2.4.2. | 122 | .Vt Accuracy |
| 123 | structure defined in RFC 3161 section 2.4.2. | ||
| 119 | It can be used inside a | 124 | It can be used inside a |
| 120 | .Vt TS_TST_INFO | 125 | .Vt TS_TST_INFO |
| 121 | object and indicates the maximum error of the time stated in the token. | 126 | object and indicates the maximum error of the time stated in the token. |
| @@ -126,8 +131,9 @@ frees | |||
| 126 | .Fn TS_MSG_IMPRINT_new | 131 | .Fn TS_MSG_IMPRINT_new |
| 127 | allocates and initializes an empty | 132 | allocates and initializes an empty |
| 128 | .Vt TS_MSG_IMPRINT | 133 | .Vt TS_MSG_IMPRINT |
| 129 | object, representing an ASN.1 MessageImprint structure | 134 | object, representing an ASN.1 |
| 130 | defined in RFC 3161 section 2.4.1. | 135 | .Vt MessageImprint |
| 136 | structure defined in RFC 3161 section 2.4.1. | ||
| 131 | It is used inside | 137 | It is used inside |
| 132 | .Vt TS_REQ | 138 | .Vt TS_REQ |
| 133 | and | 139 | and |
diff --git a/src/lib/libcrypto/man/X509_ALGOR_dup.3 b/src/lib/libcrypto/man/X509_ALGOR_dup.3 index 7a46b372c2..b1a28e11ba 100644 --- a/src/lib/libcrypto/man/X509_ALGOR_dup.3 +++ b/src/lib/libcrypto/man/X509_ALGOR_dup.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.4 2016/12/15 23:29:38 jmc Exp $ | 1 | .\" $OpenBSD: X509_ALGOR_dup.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 | 2 | .\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 15 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt X509_ALGOR_DUP 3 | 69 | .Dt X509_ALGOR_DUP 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -115,8 +115,9 @@ | |||
| 115 | .Fn X509_ALGOR_new | 115 | .Fn X509_ALGOR_new |
| 116 | allocates and initializes an empty | 116 | allocates and initializes an empty |
| 117 | .Vt X509_ALGOR | 117 | .Vt X509_ALGOR |
| 118 | object, representing an ASN.1 AlgorithmIdentifier structure | 118 | object, representing an ASN.1 |
| 119 | defined in RFC 5280 section 4.1.1.2. | 119 | .Vt AlgorithmIdentifier |
| 120 | structure defined in RFC 5280 section 4.1.1.2. | ||
| 120 | Such objects can specify a cryptographic algorithm together | 121 | Such objects can specify a cryptographic algorithm together |
| 121 | with algorithm-specific parameters. | 122 | with algorithm-specific parameters. |
| 122 | They are used by many other objects, for example certificates, | 123 | They are used by many other objects, for example certificates, |
diff --git a/src/lib/libcrypto/man/X509_CINF_new.3 b/src/lib/libcrypto/man/X509_CINF_new.3 index fdfc4c8c7b..7ac86b6d36 100644 --- a/src/lib/libcrypto/man/X509_CINF_new.3 +++ b/src/lib/libcrypto/man/X509_CINF_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_CINF_new.3,v 1.1 2016/12/16 09:17:59 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CINF_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 16 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt X509_CINF_NEW 3 | 18 | .Dt X509_CINF_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -43,8 +43,9 @@ | |||
| 43 | .Fn X509_CINF_new | 43 | .Fn X509_CINF_new |
| 44 | allocates and initializes an empty | 44 | allocates and initializes an empty |
| 45 | .Vt X509_CINF | 45 | .Vt X509_CINF |
| 46 | object, representing an ASN.1 TBSCertificate structure | 46 | object, representing an ASN.1 |
| 47 | defined in RFC 5280 section 4.1. | 47 | .Vt TBSCertificate |
| 48 | structure defined in RFC 5280 section 4.1. | ||
| 48 | It is used inside the | 49 | It is used inside the |
| 49 | .Vt X509 | 50 | .Vt X509 |
| 50 | object and holds the main information contained in the X.509 | 51 | object and holds the main information contained in the X.509 |
| @@ -57,8 +58,9 @@ frees | |||
| 57 | .Fn X509_VAL_new | 58 | .Fn X509_VAL_new |
| 58 | allocates and initializes an empty | 59 | allocates and initializes an empty |
| 59 | .Vt X509_VAL | 60 | .Vt X509_VAL |
| 60 | object, representing an ASN.1 Validity structure | 61 | object, representing an ASN.1 |
| 61 | defined in RFC 5280 section 4.1. | 62 | .Vt Validity |
| 63 | structure defined in RFC 5280 section 4.1. | ||
| 62 | It is used inside the | 64 | It is used inside the |
| 63 | .Vt X509_CINF | 65 | .Vt X509_CINF |
| 64 | object and holds the validity period of the certificate. | 66 | object and holds the validity period of the certificate. |
diff --git a/src/lib/libcrypto/man/X509_CRL_new.3 b/src/lib/libcrypto/man/X509_CRL_new.3 index 03a0caa5be..2f35b100cb 100644 --- a/src/lib/libcrypto/man/X509_CRL_new.3 +++ b/src/lib/libcrypto/man/X509_CRL_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_CRL_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_CRL_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt X509_CRL_NEW 3 | 18 | .Dt X509_CRL_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -37,8 +37,9 @@ | |||
| 37 | .Fn X509_CRL_new | 37 | .Fn X509_CRL_new |
| 38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
| 39 | .Vt X509_CRL | 39 | .Vt X509_CRL |
| 40 | object, representing an ASN.1 CertificateList structure | 40 | object, representing an ASN.1 |
| 41 | defined in RFC 5280 section 5.1. | 41 | .Vt CertificateList |
| 42 | structure defined in RFC 5280 section 5.1. | ||
| 42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
| 43 | .Vt X509_CRL_INFO | 44 | .Vt X509_CRL_INFO |
| 44 | object discussed below together with a cryptographic signature | 45 | object discussed below together with a cryptographic signature |
| @@ -50,8 +51,9 @@ frees | |||
| 50 | .Fn X509_CRL_INFO_new | 51 | .Fn X509_CRL_INFO_new |
| 51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
| 52 | .Vt X509_CRL_INFO | 53 | .Vt X509_CRL_INFO |
| 53 | object, representing an ASN.1 TBSCertList structure | 54 | object, representing an ASN.1 |
| 54 | defined in RFC 5280 section 5.1. | 55 | .Vt TBSCertList |
| 56 | structure defined in RFC 5280 section 5.1. | ||
| 55 | It is used inside the | 57 | It is used inside the |
| 56 | .Vt X509_CRL | 58 | .Vt X509_CRL |
| 57 | object and can hold a list of revoked certificates, an issuer name, | 59 | object and can hold a list of revoked certificates, an issuer name, |
diff --git a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 index b9a33ce137..850be6e66b 100644 --- a/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 +++ b/src/lib/libcrypto/man/X509_EXTENSION_set_object.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.4 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 24 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt X509_EXTENSION_SET_OBJECT 3 | 69 | .Dt X509_EXTENSION_SET_OBJECT 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -131,8 +131,9 @@ | |||
| 131 | .Fn X509_EXTENSION_new | 131 | .Fn X509_EXTENSION_new |
| 132 | allocates and initializes an empty | 132 | allocates and initializes an empty |
| 133 | .Vt X509_EXTENSION | 133 | .Vt X509_EXTENSION |
| 134 | object, representing an ASN.1 Extension structure | 134 | object, representing an ASN.1 |
| 135 | defined in RFC 5280 section 4.1. | 135 | .Vt Extension |
| 136 | structure defined in RFC 5280 section 4.1. | ||
| 136 | It is a wrapper object around specific extension objects of different | 137 | It is a wrapper object around specific extension objects of different |
| 137 | types and stores an extension type identifier and a criticality | 138 | types and stores an extension type identifier and a criticality |
| 138 | flag in addition to the DER-encoded form of the wrapped object. | 139 | flag in addition to the DER-encoded form of the wrapped object. |
diff --git a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 index bfd4fb2536..e11a4b7708 100644 --- a/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 +++ b/src/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.5 2016/12/14 21:22:06 jmc Exp $ | 1 | .\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 14 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 | 69 | .Dt X509_NAME_ENTRY_GET_OBJECT 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -134,9 +134,12 @@ | |||
| 134 | .Fa "int len" | 134 | .Fa "int len" |
| 135 | .Fc | 135 | .Fc |
| 136 | .Sh DESCRIPTION | 136 | .Sh DESCRIPTION |
| 137 | An X.501 RelativeDistinguishedName is a set of field type and | 137 | An X.501 |
| 138 | value pairs. | 138 | .Vt RelativeDistinguishedName |
| 139 | It is the building block for constructing X.501 Name objects. | 139 | is a set of field type and value pairs. |
| 140 | It is the building block for constructing X.501 | ||
| 141 | .Vt Name | ||
| 142 | objects. | ||
| 140 | This implementation only supports sets with one element, so an | 143 | This implementation only supports sets with one element, so an |
| 141 | .Vt X509_NAME_ENTRY | 144 | .Vt X509_NAME_ENTRY |
| 142 | object contains only one field type and one value. | 145 | object contains only one field type and one value. |
| @@ -144,8 +147,9 @@ object contains only one field type and one value. | |||
| 144 | .Fn X509_NAME_ENTRY_new | 147 | .Fn X509_NAME_ENTRY_new |
| 145 | allocates and initializes an empty | 148 | allocates and initializes an empty |
| 146 | .Vt X509_NAME_ENTRY | 149 | .Vt X509_NAME_ENTRY |
| 147 | object, representing an ASN.1 RelativeDistinguishedName structure | 150 | object, representing an ASN.1 |
| 148 | defined in RFC 5280 section 4.1.2.4. | 151 | .Vt RelativeDistinguishedName |
| 152 | structure defined in RFC 5280 section 4.1.2.4. | ||
| 149 | .Pp | 153 | .Pp |
| 150 | .Fn X509_NAME_ENTRY_free | 154 | .Fn X509_NAME_ENTRY_free |
| 151 | frees | 155 | frees |
diff --git a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 index 6260e5f345..50e23829bd 100644 --- a/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 +++ b/src/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 | 53 | .Dt X509_NAME_ADD_ENTRY_BY_TXT 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -197,7 +197,9 @@ can be set to -1 and | |||
| 197 | to 0. | 197 | to 0. |
| 198 | This adds a new entry to the end of | 198 | This adds a new entry to the end of |
| 199 | .Fa name | 199 | .Fa name |
| 200 | as a single valued RelativeDistinguishedName (RDN). | 200 | as a single valued |
| 201 | .Vt RelativeDistinguishedName | ||
| 202 | (RDN). | ||
| 201 | .Pp | 203 | .Pp |
| 202 | .Fa loc | 204 | .Fa loc |
| 203 | actually determines the index where the new entry is inserted: | 205 | actually determines the index where the new entry is inserted: |
diff --git a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 index 6da0661831..b6571ccc1d 100644 --- a/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 +++ b/src/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 | 53 | .Dt X509_NAME_GET_INDEX_BY_NID 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -103,8 +103,8 @@ These functions allow an | |||
| 103 | structure to be examined. | 103 | structure to be examined. |
| 104 | The | 104 | The |
| 105 | .Vt X509_NAME | 105 | .Vt X509_NAME |
| 106 | structure is the same as the | 106 | structure is the same as the ASN.1 |
| 107 | .Sy Name | 107 | .Vt Name |
| 108 | type defined in RFC 2459 (and elsewhere) and used, for example, | 108 | type defined in RFC 2459 (and elsewhere) and used, for example, |
| 109 | in certificate subject and issuer names. | 109 | in certificate subject and issuer names. |
| 110 | .Pp | 110 | .Pp |
| @@ -235,7 +235,10 @@ are legacy functions which have various limitations which make them of | |||
| 235 | minimal use in practice. | 235 | minimal use in practice. |
| 236 | They can only find the first matching entry and will copy the contents | 236 | They can only find the first matching entry and will copy the contents |
| 237 | of the field verbatim: this can be highly confusing if the target is a | 237 | of the field verbatim: this can be highly confusing if the target is a |
| 238 | multicharacter string type like a BMPString or a UTF8String. | 238 | multicharacter string type like a |
| 239 | .Vt BMPString | ||
| 240 | or a | ||
| 241 | .Vt UTF8String . | ||
| 239 | .Pp | 242 | .Pp |
| 240 | For a more general solution, | 243 | For a more general solution, |
| 241 | .Fn X509_NAME_get_index_by_NID | 244 | .Fn X509_NAME_get_index_by_NID |
diff --git a/src/lib/libcrypto/man/X509_NAME_new.3 b/src/lib/libcrypto/man/X509_NAME_new.3 index 5666635198..c4efab7784 100644 --- a/src/lib/libcrypto/man/X509_NAME_new.3 +++ b/src/lib/libcrypto/man/X509_NAME_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_NAME_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 24 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt X509_NAME_NEW 3 | 18 | .Dt X509_NAME_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,12 +31,16 @@ | |||
| 31 | .Ft void | 31 | .Ft void |
| 32 | .Fn X509_NAME_free "X509_NAME *name" | 32 | .Fn X509_NAME_free "X509_NAME *name" |
| 33 | .Sh DESCRIPTION | 33 | .Sh DESCRIPTION |
| 34 | An X.501 Name is an ordered sequence of relative distinguished names. | 34 | An X.501 |
| 35 | .Vt Name | ||
| 36 | is an ordered sequence of relative distinguished names. | ||
| 35 | A relative distinguished name is a set of key-value pairs; see | 37 | A relative distinguished name is a set of key-value pairs; see |
| 36 | .Xr X509_NAME_ENTRY_new 3 | 38 | .Xr X509_NAME_ENTRY_new 3 |
| 37 | for details. | 39 | for details. |
| 38 | .Pp | 40 | .Pp |
| 39 | Various X.509 structures contain X.501 Name substructures. | 41 | Various X.509 structures contain X.501 |
| 42 | .Vt Name | ||
| 43 | substructures. | ||
| 40 | They are for example used for the issuers of certificates and | 44 | They are for example used for the issuers of certificates and |
| 41 | certificate revocation lists and for the subjects of certificates | 45 | certificate revocation lists and for the subjects of certificates |
| 42 | and certificate requests. | 46 | and certificate requests. |
| @@ -44,8 +48,9 @@ and certificate requests. | |||
| 44 | .Fn X509_NAME_new | 48 | .Fn X509_NAME_new |
| 45 | allocates and initializes an empty | 49 | allocates and initializes an empty |
| 46 | .Vt X509_NAME | 50 | .Vt X509_NAME |
| 47 | object, representing an ASN.1 Name structure | 51 | object, representing an ASN.1 |
| 48 | defined in RFC 5280 section 4.1.2.4. | 52 | .Vt Name |
| 53 | structure defined in RFC 5280 section 4.1.2.4. | ||
| 49 | Data can be added to such objects with the functions described in | 54 | Data can be added to such objects with the functions described in |
| 50 | .Xr X509_NAME_add_entry_by_txt 3 , | 55 | .Xr X509_NAME_add_entry_by_txt 3 , |
| 51 | and they can be inspected with the functions described in | 56 | and they can be inspected with the functions described in |
diff --git a/src/lib/libcrypto/man/X509_NAME_print_ex.3 b/src/lib/libcrypto/man/X509_NAME_print_ex.3 index 0e3ef11284..1342a200ad 100644 --- a/src/lib/libcrypto/man/X509_NAME_print_ex.3 +++ b/src/lib/libcrypto/man/X509_NAME_print_ex.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $ | 1 | .\" $OpenBSD: X509_NAME_print_ex.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 | 2 | .\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 14 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt X509_NAME_PRINT_EX 3 | 53 | .Dt X509_NAME_PRINT_EX 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -174,8 +174,8 @@ and | |||
| 174 | .Dv XN_FLAG_SEP_MULTILINE | 174 | .Dv XN_FLAG_SEP_MULTILINE |
| 175 | determine the field separators to use. | 175 | determine the field separators to use. |
| 176 | Two distinct separators are used between distinct | 176 | Two distinct separators are used between distinct |
| 177 | RelativeDistinguishedName components and separate values in the same RDN | 177 | .Vt RelativeDistinguishedName |
| 178 | for a multi-valued RDN. | 178 | components and separate values in the same RDN for a multi-valued RDN. |
| 179 | Multi-valued RDNs are currently very rare so the second separator | 179 | Multi-valued RDNs are currently very rare so the second separator |
| 180 | will hardly ever be used. | 180 | will hardly ever be used. |
| 181 | .Pp | 181 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_PUBKEY_new.3 b/src/lib/libcrypto/man/X509_PUBKEY_new.3 index cd178a1ee0..0475fe65b2 100644 --- a/src/lib/libcrypto/man/X509_PUBKEY_new.3 +++ b/src/lib/libcrypto/man/X509_PUBKEY_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.3 2016/12/15 22:24:45 schwarze Exp $ | 1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
| 52 | .Dt X509_PUBKEY_NEW 3 | 52 | .Dt X509_PUBKEY_NEW 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -133,9 +133,10 @@ | |||
| 133 | .Sh DESCRIPTION | 133 | .Sh DESCRIPTION |
| 134 | The | 134 | The |
| 135 | .Vt X509_PUBKEY | 135 | .Vt X509_PUBKEY |
| 136 | structure represents the ASN.1 SubjectPublicKeyInfo structure defined | 136 | structure represents the ASN.1 |
| 137 | in RFC 5280 section 4.1 and used in certificates and certificate | 137 | .Vt SubjectPublicKeyInfo |
| 138 | requests. | 138 | structure defined in RFC 5280 section 4.1 and used in certificates |
| 139 | and certificate requests. | ||
| 139 | .Pp | 140 | .Pp |
| 140 | .Fn X509_PUBKEY_new | 141 | .Fn X509_PUBKEY_new |
| 141 | allocates and initializes an | 142 | allocates and initializes an |
| @@ -179,7 +180,9 @@ and | |||
| 179 | .Fn i2d_PUBKEY | 180 | .Fn i2d_PUBKEY |
| 180 | decode and encode an | 181 | decode and encode an |
| 181 | .Vt EVP_PKEY | 182 | .Vt EVP_PKEY |
| 182 | structure using SubjectPublicKeyInfo format. | 183 | structure using |
| 184 | .Vt SubjectPublicKeyInfo | ||
| 185 | format. | ||
| 183 | They otherwise follow the conventions of other ASN.1 functions such as | 186 | They otherwise follow the conventions of other ASN.1 functions such as |
| 184 | .Xr d2i_X509 3 . | 187 | .Xr d2i_X509 3 . |
| 185 | .Pp | 188 | .Pp |
| @@ -225,7 +228,9 @@ bytes at | |||
| 225 | .Pf * Fa pk , | 228 | .Pf * Fa pk , |
| 226 | and | 229 | and |
| 227 | .Pf * Fa pa | 230 | .Pf * Fa pa |
| 228 | is set to the associated AlgorithmIdentifier for the public key. | 231 | is set to the associated |
| 232 | .Vt AlgorithmIdentifier | ||
| 233 | for the public key. | ||
| 229 | If the value of any of these parameters is not required, | 234 | If the value of any of these parameters is not required, |
| 230 | it can be set to | 235 | it can be set to |
| 231 | .Dv NULL . | 236 | .Dv NULL . |
diff --git a/src/lib/libcrypto/man/X509_REQ_new.3 b/src/lib/libcrypto/man/X509_REQ_new.3 index f4089ba2a2..76da125898 100644 --- a/src/lib/libcrypto/man/X509_REQ_new.3 +++ b/src/lib/libcrypto/man/X509_REQ_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_REQ_new.3,v 1.1 2016/12/17 01:08:14 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REQ_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 17 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt X509_REQ_NEW 3 | 18 | .Dt X509_REQ_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -37,8 +37,9 @@ | |||
| 37 | .Fn X509_REQ_new | 37 | .Fn X509_REQ_new |
| 38 | allocates and initializes an empty | 38 | allocates and initializes an empty |
| 39 | .Vt X509_REQ | 39 | .Vt X509_REQ |
| 40 | object, representing an ASN.1 CertificationRequest structure | 40 | object, representing an ASN.1 |
| 41 | defined in RFC 2986 section 4.2. | 41 | .Vt CertificationRequest |
| 42 | structure defined in RFC 2986 section 4.2. | ||
| 42 | It can hold a pointer to an | 43 | It can hold a pointer to an |
| 43 | .Vt X509_REQ_INFO | 44 | .Vt X509_REQ_INFO |
| 44 | object discussed below together with a cryptographic signature and | 45 | object discussed below together with a cryptographic signature and |
| @@ -50,8 +51,9 @@ frees | |||
| 50 | .Fn X509_REQ_INFO_new | 51 | .Fn X509_REQ_INFO_new |
| 51 | allocates and initializes an empty | 52 | allocates and initializes an empty |
| 52 | .Vt X509_REQ_INFO | 53 | .Vt X509_REQ_INFO |
| 53 | object, representing an ASN.1 CertificationRequestInfo structure | 54 | object, representing an ASN.1 |
| 54 | defined in RFC 2986 section 4.1. | 55 | .Vt CertificationRequestInfo |
| 56 | structure defined in RFC 2986 section 4.1. | ||
| 55 | It is used inside the | 57 | It is used inside the |
| 56 | .Vt X509_REQ | 58 | .Vt X509_REQ |
| 57 | object and can hold the subject and the public key of the requested | 59 | object and can hold the subject and the public key of the requested |
diff --git a/src/lib/libcrypto/man/X509_REVOKED_new.3 b/src/lib/libcrypto/man/X509_REVOKED_new.3 index 2303f9caf2..f06075fcc2 100644 --- a/src/lib/libcrypto/man/X509_REVOKED_new.3 +++ b/src/lib/libcrypto/man/X509_REVOKED_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.1 2016/12/16 14:50:58 schwarze Exp $ | 1 | .\" $OpenBSD: X509_REVOKED_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 16 2016 $ | 68 | .Dd $Mdocdate: December 25 2016 $ |
| 69 | .Dt X509_REVOKED_NEW 3 | 69 | .Dt X509_REVOKED_NEW 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -95,8 +95,9 @@ | |||
| 95 | allocates and initializes an empty | 95 | allocates and initializes an empty |
| 96 | .Vt X509_REVOKED | 96 | .Vt X509_REVOKED |
| 97 | object, representing one of the elements of | 97 | object, representing one of the elements of |
| 98 | the revokedCertificates field of the ASN.1 TBSCertList structure | 98 | the revokedCertificates field of the ASN.1 |
| 99 | defined in RFC 5280 section 5.1. | 99 | .Vt TBSCertList |
| 100 | structure defined in RFC 5280 section 5.1. | ||
| 100 | It is used by | 101 | It is used by |
| 101 | .Vt X509_CRL | 102 | .Vt X509_CRL |
| 102 | objects and can hold information about one revoked certificate | 103 | objects and can hold information about one revoked certificate |
diff --git a/src/lib/libcrypto/man/X509_SIG_new.3 b/src/lib/libcrypto/man/X509_SIG_new.3 index e4ad5b0085..6d41ababc6 100644 --- a/src/lib/libcrypto/man/X509_SIG_new.3 +++ b/src/lib/libcrypto/man/X509_SIG_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_SIG_new.3,v 1.1 2016/12/22 14:06:51 schwarze Exp $ | 1 | .\" $OpenBSD: X509_SIG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 22 2016 $ | 17 | .Dd $Mdocdate: December 25 2016 $ |
| 18 | .Dt X509_SIG_NEW 3 | 18 | .Dt X509_SIG_NEW 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -31,8 +31,10 @@ | |||
| 31 | .Fn X509_SIG_new | 31 | .Fn X509_SIG_new |
| 32 | allocates and initializes an empty | 32 | allocates and initializes an empty |
| 33 | .Vt X509_SIG | 33 | .Vt X509_SIG |
| 34 | object, representing an ASN.1 DigestInfo structure defined | 34 | object, representing an ASN.1 |
| 35 | in RFC 2315 section 9.4 and equivalently in RFC 8017 section 9.2. | 35 | .Vt DigestInfo |
| 36 | structure defined in RFC 2315 section 9.4 | ||
| 37 | and equivalently in RFC 8017 section 9.2. | ||
| 36 | It can hold a message digest together with information about | 38 | It can hold a message digest together with information about |
| 37 | the algorithm used. | 39 | the algorithm used. |
| 38 | .Pp | 40 | .Pp |
diff --git a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 index 2f0924c209..3a871ef307 100644 --- a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 +++ b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.4 2016/12/05 13:38:05 schwarze Exp $ | 1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 5 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt X509_STORE_CTX_GET_ERROR 3 | 53 | .Dt X509_STORE_CTX_GET_ERROR 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -202,7 +202,9 @@ expected value. | |||
| 202 | Unused. | 202 | Unused. |
| 203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ | 203 | .It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \ |
| 204 | No unable to decode issuer public key | 204 | No unable to decode issuer public key |
| 205 | The public key in the certificate SubjectPublicKeyInfo could not be read. | 205 | The public key in the certificate |
| 206 | .Vt SubjectPublicKeyInfo | ||
| 207 | could not be read. | ||
| 206 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure | 208 | .It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure |
| 207 | The signature of the certificate is invalid. | 209 | The signature of the certificate is invalid. |
| 208 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure | 210 | .It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure |
diff --git a/src/lib/libcrypto/man/X509_new.3 b/src/lib/libcrypto/man/X509_new.3 index 1294ae3edd..dbf82bc974 100644 --- a/src/lib/libcrypto/man/X509_new.3 +++ b/src/lib/libcrypto/man/X509_new.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: X509_new.3,v 1.9 2016/12/24 01:29:40 schwarze Exp $ | 1 | .\" $OpenBSD: X509_new.3,v 1.10 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 | 2 | .\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: December 24 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
| 52 | .Dt X509_NEW 3 | 52 | .Dt X509_NEW 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -73,8 +73,9 @@ | |||
| 73 | allocates and initializes an empty | 73 | allocates and initializes an empty |
| 74 | .Vt X509 | 74 | .Vt X509 |
| 75 | object with reference count 1. | 75 | object with reference count 1. |
| 76 | It represents an ASN.1 Certificate structure | 76 | It represents an ASN.1 |
| 77 | defined in RFC 5280 section 4.1. | 77 | .Vt Certificate |
| 78 | structure defined in RFC 5280 section 4.1. | ||
| 78 | It can hold a public key together with information about the person, | 79 | It can hold a public key together with information about the person, |
| 79 | organization, device, or function the associated private key belongs to. | 80 | organization, device, or function the associated private key belongs to. |
| 80 | .Pp | 81 | .Pp |
diff --git a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 index 6f51229ec7..22d904157f 100644 --- a/src/lib/libcrypto/man/d2i_RSAPublicKey.3 +++ b/src/lib/libcrypto/man/d2i_RSAPublicKey.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.5 2016/12/11 12:21:48 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_RSAPublicKey.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 | 2 | .\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and |
| @@ -50,7 +50,7 @@ | |||
| 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 52 | .\" | 52 | .\" |
| 53 | .Dd $Mdocdate: December 11 2016 $ | 53 | .Dd $Mdocdate: December 25 2016 $ |
| 54 | .Dt D2I_RSAPUBLICKEY 3 | 54 | .Dt D2I_RSAPUBLICKEY 3 |
| 55 | .Os | 55 | .Os |
| 56 | .Sh NAME | 56 | .Sh NAME |
| @@ -140,12 +140,15 @@ | |||
| 140 | .Fn d2i_RSAPublicKey | 140 | .Fn d2i_RSAPublicKey |
| 141 | and | 141 | and |
| 142 | .Fn i2d_RSAPublicKey | 142 | .Fn i2d_RSAPublicKey |
| 143 | decode and encode a PKCS#1 RSAPublicKey structure. | 143 | decode and encode a PKCS#1 |
| 144 | .Vt RSAPublicKey | ||
| 145 | structure. | ||
| 144 | .Pp | 146 | .Pp |
| 145 | .Fn d2i_RSA_PUBKEY | 147 | .Fn d2i_RSA_PUBKEY |
| 146 | and | 148 | and |
| 147 | .Fn i2d_RSA_PUBKEY | 149 | .Fn i2d_RSA_PUBKEY |
| 148 | decode and encode an RSA public key using a SubjectPublicKeyInfo | 150 | decode and encode an RSA public key using an ASN.1 |
| 151 | .Vt SubjectPublicKeyInfo | ||
| 149 | (certificate public key) structure. | 152 | (certificate public key) structure. |
| 150 | .Pp | 153 | .Pp |
| 151 | .Fn d2i_RSA_PUBKEY_bio , | 154 | .Fn d2i_RSA_PUBKEY_bio , |
| @@ -165,7 +168,9 @@ pointer. | |||
| 165 | .Pp | 168 | .Pp |
| 166 | .Fn d2i_RSAPrivateKey , | 169 | .Fn d2i_RSAPrivateKey , |
| 167 | .Fn i2d_RSAPrivateKey | 170 | .Fn i2d_RSAPrivateKey |
| 168 | decode and encode a PKCS#1 RSAPrivateKey structure. | 171 | decode and encode a PKCS#1 |
| 172 | .Vt RSAPrivateKey | ||
| 173 | structure. | ||
| 169 | .Pp | 174 | .Pp |
| 170 | .Fn d2i_Netscape_RSA , | 175 | .Fn d2i_Netscape_RSA , |
| 171 | .Fn i2d_Netscape_RSA | 176 | .Fn i2d_Netscape_RSA |
diff --git a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 index 858396f5fe..7514e5fac5 100644 --- a/src/lib/libcrypto/man/d2i_X509_ALGOR.3 +++ b/src/lib/libcrypto/man/d2i_X509_ALGOR.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.5 2016/12/15 22:09:22 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_ALGOR.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 | 2 | .\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: December 15 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
| 52 | .Dt D2I_X509_ALGOR 3 | 52 | .Dt D2I_X509_ALGOR 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -71,8 +71,8 @@ | |||
| 71 | .Sh DESCRIPTION | 71 | .Sh DESCRIPTION |
| 72 | These functions decode and encode an | 72 | These functions decode and encode an |
| 73 | .Vt X509_ALGOR | 73 | .Vt X509_ALGOR |
| 74 | structure which is equivalent to the | 74 | structure which is equivalent to the ASN.1 |
| 75 | .Sy AlgorithmIdentifier | 75 | .Vt AlgorithmIdentifier |
| 76 | structure. | 76 | structure. |
| 77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
| 78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/d2i_X509_NAME.3 b/src/lib/libcrypto/man/d2i_X509_NAME.3 index 0dacb648c7..d3c085784e 100644 --- a/src/lib/libcrypto/man/d2i_X509_NAME.3 +++ b/src/lib/libcrypto/man/d2i_X509_NAME.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.6 2016/12/14 17:26:35 schwarze Exp $ | 1 | .\" $OpenBSD: d2i_X509_NAME.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 | 2 | .\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200 |
| 3 | .\" | 3 | .\" |
| 4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 4 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
| @@ -15,7 +15,7 @@ | |||
| 15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 15 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 16 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | .\" | 17 | .\" |
| 18 | .Dd $Mdocdate: December 14 2016 $ | 18 | .Dd $Mdocdate: December 25 2016 $ |
| 19 | .Dt D2I_X509_NAME 3 | 19 | .Dt D2I_X509_NAME 3 |
| 20 | .Os | 20 | .Os |
| 21 | .Sh NAME | 21 | .Sh NAME |
| @@ -67,7 +67,9 @@ decodes | |||
| 67 | .Fa length | 67 | .Fa length |
| 68 | bytes of the DER-encoded string | 68 | bytes of the DER-encoded string |
| 69 | .Pf * Fa in | 69 | .Pf * Fa in |
| 70 | and stores the resulting Name object in | 70 | and stores the resulting |
| 71 | .Vt Name | ||
| 72 | object in | ||
| 71 | .Pf * Fa name . | 73 | .Pf * Fa name . |
| 72 | .Pp | 74 | .Pp |
| 73 | .Fn i2d_X509_NAME | 75 | .Fn i2d_X509_NAME |
| @@ -89,7 +91,9 @@ decodes | |||
| 89 | .Fa length | 91 | .Fa length |
| 90 | bytes of the DER-encoded string | 92 | bytes of the DER-encoded string |
| 91 | .Pf * Fa in | 93 | .Pf * Fa in |
| 92 | and stores the resulting RelativeDistinguishedName object in | 94 | and stores the resulting |
| 95 | .Vt RelativeDistinguishedName | ||
| 96 | object in | ||
| 93 | .Pf * Fa ne . | 97 | .Pf * Fa ne . |
| 94 | .Pp | 98 | .Pp |
| 95 | .Fn i2d_X509_NAME_ENTRY | 99 | .Fn i2d_X509_NAME_ENTRY |
diff --git a/src/lib/libcrypto/man/d2i_X509_SIG.3 b/src/lib/libcrypto/man/d2i_X509_SIG.3 index 8466ccfe7f..33676b6df0 100644 --- a/src/lib/libcrypto/man/d2i_X509_SIG.3 +++ b/src/lib/libcrypto/man/d2i_X509_SIG.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.4 2016/12/08 20:22:08 jmc Exp $ | 1 | .\" $OpenBSD: d2i_X509_SIG.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 | 2 | .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: December 8 2016 $ | 51 | .Dd $Mdocdate: December 25 2016 $ |
| 52 | .Dt D2I_X509_SIG 3 | 52 | .Dt D2I_X509_SIG 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -72,7 +72,7 @@ | |||
| 72 | These functions decode and encode an | 72 | These functions decode and encode an |
| 73 | .Vt X509_SIG | 73 | .Vt X509_SIG |
| 74 | structure, which is equivalent to the | 74 | structure, which is equivalent to the |
| 75 | .Sy DigestInfo | 75 | .Vt DigestInfo |
| 76 | structure defined in PKCS#1 and PKCS#7. | 76 | structure defined in PKCS#1 and PKCS#7. |
| 77 | They otherwise behave in a way similar to | 77 | They otherwise behave in a way similar to |
| 78 | .Xr d2i_X509 3 | 78 | .Xr d2i_X509 3 |
diff --git a/src/lib/libcrypto/man/x509v3.cnf.5 b/src/lib/libcrypto/man/x509v3.cnf.5 index 1fd4c0cc9f..19608697e3 100644 --- a/src/lib/libcrypto/man/x509v3.cnf.5 +++ b/src/lib/libcrypto/man/x509v3.cnf.5 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: x509v3.cnf.5,v 1.2 2016/12/12 22:02:55 jmc Exp $ | 1 | .\" $OpenBSD: x509v3.cnf.5,v 1.3 2016/12/25 22:15:10 schwarze Exp $ |
| 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: December 12 2016 $ | 52 | .Dd $Mdocdate: December 25 2016 $ |
| 53 | .Dt X509V3.CNF 5 | 53 | .Dt X509V3.CNF 5 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -530,8 +530,11 @@ The | |||
| 530 | option changes the type of the | 530 | option changes the type of the |
| 531 | .Ic organization | 531 | .Ic organization |
| 532 | field. | 532 | field. |
| 533 | In RFC 2459, it can only be of type DisplayText. | 533 | In RFC 2459, it can only be of type |
| 534 | In RFC 3280, IA5Strring is also permissible. | 534 | .Vt DisplayText . |
| 535 | In RFC 3280, | ||
| 536 | .Vt IA5String | ||
| 537 | is also permissible. | ||
| 535 | Some software (for example some versions of MSIE) may require | 538 | Some software (for example some versions of MSIE) may require |
| 536 | .Ic ia5org . | 539 | .Ic ia5org . |
| 537 | .Ss Policy constraints | 540 | .Ss Policy constraints |
