From 788eca241b97bf022d91dbb9398142320c76d807 Mon Sep 17 00:00:00 2001 From: schwarze <> Date: Sat, 8 Jun 2019 15:25:43 +0000 Subject: remove pointless NOTES section header lines --- src/lib/libssl/man/SSL_CTX_set_cert_verify_callback.3 | 6 +++--- src/lib/libssl/man/SSL_CTX_set_max_cert_list.3 | 6 +++--- src/lib/libssl/man/SSL_CTX_set_quiet_shutdown.3 | 6 +++--- src/lib/libssl/man/SSL_CTX_set_session_id_context.3 | 6 +++--- src/lib/libssl/man/SSL_CTX_use_certificate.3 | 6 +++--- src/lib/libssl/man/SSL_SESSION_get_time.3 | 6 +++--- src/lib/libssl/man/SSL_accept.3 | 6 +++--- src/lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 | 6 +++--- src/lib/libssl/man/d2i_SSL_SESSION.3 | 6 +++--- 9 files changed, 27 insertions(+), 27 deletions(-) (limited to 'src') diff --git a/src/lib/libssl/man/SSL_CTX_set_cert_verify_callback.3 b/src/lib/libssl/man/SSL_CTX_set_cert_verify_callback.3 index e3ca5ff4ff..0e12b48c78 100644 --- a/src/lib/libssl/man/SSL_CTX_set_cert_verify_callback.3 +++ b/src/lib/libssl/man/SSL_CTX_set_cert_verify_callback.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_set_cert_verify_callback.3,v 1.4 2018/03/27 17:35:50 schwarze Exp $ +.\" $OpenBSD: SSL_CTX_set_cert_verify_callback.3,v 1.5 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 27 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_CTX_SET_CERT_VERIFY_CALLBACK 3 .Os .Sh NAME @@ -72,7 +72,7 @@ objects that are created from inherit the setting valid at the time when .Xr SSL_new 3 is called. -.Sh NOTES +.Pp Whenever a certificate is verified during a SSL/TLS handshake, a verification function is called. If the application does not explicitly specify a verification callback diff --git a/src/lib/libssl/man/SSL_CTX_set_max_cert_list.3 b/src/lib/libssl/man/SSL_CTX_set_max_cert_list.3 index 7714e1d10e..1a7690a6d6 100644 --- a/src/lib/libssl/man/SSL_CTX_set_max_cert_list.3 +++ b/src/lib/libssl/man/SSL_CTX_set_max_cert_list.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_set_max_cert_list.3,v 1.4 2018/03/22 21:09:18 schwarze Exp $ +.\" $OpenBSD: SSL_CTX_set_max_cert_list.3,v 1.5 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 22 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_CTX_SET_MAX_CERT_LIST 3 .Os .Sh NAME @@ -99,7 +99,7 @@ This setting stays valid until a new value is set. .Fn SSL_get_max_cert_list returns the currently set maximum size for .Fa ssl . -.Sh NOTES +.Pp During the handshake process, the peer may send a certificate chain. The TLS/SSL standard does not give any maximum size of the certificate chain. The OpenSSL library handles incoming data by a dynamically allocated buffer. diff --git a/src/lib/libssl/man/SSL_CTX_set_quiet_shutdown.3 b/src/lib/libssl/man/SSL_CTX_set_quiet_shutdown.3 index feea399bca..98a37d7636 100644 --- a/src/lib/libssl/man/SSL_CTX_set_quiet_shutdown.3 +++ b/src/lib/libssl/man/SSL_CTX_set_quiet_shutdown.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_set_quiet_shutdown.3,v 1.4 2018/03/27 17:35:50 schwarze Exp $ +.\" $OpenBSD: SSL_CTX_set_quiet_shutdown.3,v 1.5 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 27 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_CTX_SET_QUIET_SHUTDOWN 3 .Os .Sh NAME @@ -117,7 +117,7 @@ returns the .Dq quiet shutdown setting of .Fa ssl . -.Sh NOTES +.Pp Normally when a SSL connection is finished, the parties must send out .Dq close notify alert messages using diff --git a/src/lib/libssl/man/SSL_CTX_set_session_id_context.3 b/src/lib/libssl/man/SSL_CTX_set_session_id_context.3 index bbc0102ad8..06fd9348ae 100644 --- a/src/lib/libssl/man/SSL_CTX_set_session_id_context.3 +++ b/src/lib/libssl/man/SSL_CTX_set_session_id_context.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_set_session_id_context.3,v 1.5 2018/03/21 17:58:58 schwarze Exp $ +.\" $OpenBSD: SSL_CTX_set_session_id_context.3,v 1.6 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 21 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_CTX_SET_SESSION_ID_CONTEXT 3 .Os .Sh NAME @@ -87,7 +87,7 @@ of length within which a session can be reused for the .Fa ssl object. -.Sh NOTES +.Pp Sessions are generated within a certain context. When exporting/importing sessions with .Xr i2d_SSL_SESSION 3 diff --git a/src/lib/libssl/man/SSL_CTX_use_certificate.3 b/src/lib/libssl/man/SSL_CTX_use_certificate.3 index 17b7ef54e9..cdf6067f16 100644 --- a/src/lib/libssl/man/SSL_CTX_use_certificate.3 +++ b/src/lib/libssl/man/SSL_CTX_use_certificate.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_CTX_use_certificate.3,v 1.12 2019/05/20 06:04:45 jmc Exp $ +.\" $OpenBSD: SSL_CTX_use_certificate.3,v 1.13 2019/06/08 15:25:43 schwarze Exp $ .\" full merge up to: OpenSSL 3aaa1bd0 Mar 28 16:35:25 2017 +1000 .\" selective merge up to: OpenSSL d1f7a1e6 Apr 26 14:05:40 2018 +0100 .\" @@ -50,7 +50,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: May 20 2019 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_CTX_USE_CERTIFICATE 3 .Os .Sh NAME @@ -206,7 +206,7 @@ loads the certificate from into .Fa ssl . See the -.Sx NOTES +.Pp section on why .Fn SSL_CTX_use_certificate_chain_file should be preferred. diff --git a/src/lib/libssl/man/SSL_SESSION_get_time.3 b/src/lib/libssl/man/SSL_SESSION_get_time.3 index fe6f0858ba..aaadec5137 100644 --- a/src/lib/libssl/man/SSL_SESSION_get_time.3 +++ b/src/lib/libssl/man/SSL_SESSION_get_time.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_SESSION_get_time.3,v 1.7 2018/03/27 17:35:50 schwarze Exp $ +.\" $OpenBSD: SSL_SESSION_get_time.3,v 1.8 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -49,7 +49,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 27 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_SESSION_GET_TIME 3 .Os .Sh NAME @@ -117,7 +117,7 @@ and functions are synonyms for the .Fn SSL_SESSION_* counterparts. -.Sh NOTES +.Pp Sessions are expired by examining the creation time and the timeout value. Both are set at creation time of the session to the actual time and the default timeout value at creation, respectively, as set by diff --git a/src/lib/libssl/man/SSL_accept.3 b/src/lib/libssl/man/SSL_accept.3 index 4d36e536bc..fb1d89eb57 100644 --- a/src/lib/libssl/man/SSL_accept.3 +++ b/src/lib/libssl/man/SSL_accept.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_accept.3,v 1.5 2018/03/27 17:35:50 schwarze Exp $ +.\" $OpenBSD: SSL_accept.3,v 1.6 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -49,7 +49,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 27 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_ACCEPT 3 .Os .Sh NAME @@ -66,7 +66,7 @@ The communication channel must already have been set and assigned to the .Fa ssl object by setting an underlying .Vt BIO . -.Sh NOTES +.Pp The behaviour of .Fn SSL_accept depends on the underlying diff --git a/src/lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 b/src/lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 index 632ee01caa..e30e4de84f 100644 --- a/src/lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 +++ b/src/lib/libssl/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.3 2018/03/21 09:05:04 schwarze Exp $ +.\" $OpenBSD: SSL_get_ex_data_X509_STORE_CTX_idx.3,v 1.4 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 21 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt SSL_GET_EX_DATA_X509_STORE_CTX_IDX 3 .Os .Sh NAME @@ -65,7 +65,7 @@ returns the index number under which the pointer to the object is stored into the .Vt X509_STORE_CTX object. -.Sh NOTES +.Pp Whenever a .Vt X509_STORE_CTX object is created for the verification of the peer's certificate during a diff --git a/src/lib/libssl/man/d2i_SSL_SESSION.3 b/src/lib/libssl/man/d2i_SSL_SESSION.3 index 9c5c2285fa..7a2bc529ab 100644 --- a/src/lib/libssl/man/d2i_SSL_SESSION.3 +++ b/src/lib/libssl/man/d2i_SSL_SESSION.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: d2i_SSL_SESSION.3,v 1.6 2018/08/27 15:42:39 jsing Exp $ +.\" $OpenBSD: d2i_SSL_SESSION.3,v 1.7 2019/06/08 15:25:43 schwarze Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Lutz Jaenicke . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: August 27 2018 $ +.Dd $Mdocdate: June 8 2019 $ .Dt D2I_SSL_SESSION 3 .Os .Sh NAME @@ -87,7 +87,7 @@ If is the .Dv NULL pointer, only the length is calculated and returned. -.Sh NOTES +.Pp The .Vt SSL_SESSION object is built from several -- cgit v1.2.3-55-g6feb