From ecc1a96a4ea756a28768a463b46816210f6e9239 Mon Sep 17 00:00:00 2001 From: schwarze <> Date: Fri, 23 Dec 2016 14:37:08 +0000 Subject: Write new AUTHORITY_KEYID_new(3) manual page from scratch. Both functions are listed in and in OpenSSL doc/man3/X509_dup.pod. OpenSSL documentation specifies the wrong header file. --- src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 | 65 +++++++++++++++++++++++++++++ src/lib/libcrypto/man/Makefile | 3 +- 2 files changed, 67 insertions(+), 1 deletion(-) create mode 100644 src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 (limited to 'src') diff --git a/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 new file mode 100644 index 0000000000..5186fea0f3 --- /dev/null +++ b/src/lib/libcrypto/man/AUTHORITY_KEYID_new.3 @@ -0,0 +1,65 @@ +.\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.1 2016/12/23 14:37:08 schwarze Exp $ +.\" +.\" Copyright (c) 2016 Ingo Schwarze +.\" +.\" Permission to use, copy, modify, and distribute this software for any +.\" purpose with or without fee is hereby granted, provided that the above +.\" copyright notice and this permission notice appear in all copies. +.\" +.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES +.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF +.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR +.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES +.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN +.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF +.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. +.\" +.Dd $Mdocdate: December 23 2016 $ +.Dt AUTHORITY_KEYID_NEW 3 +.Os +.Sh NAME +.Nm AUTHORITY_KEYID_new , +.Nm AUTHORITY_KEYID_free +.Nd X.509 authority key identifier extension +.Sh SYNOPSIS +.In openssl/x509v3.h +.Ft AUTHORITY_KEYID * +.Fn AUTHORITY_KEYID_new void +.Ft void +.Fn AUTHORITY_KEYID_free "AUTHORITY_KEYID *id" +.Sh DESCRIPTION +Using the authority key identifier extension, an X.509 certificate +or certificate revocation list can specify which key pair was used +for signing it. +.Pp +.Fn AUTHORITY_KEYID_new +allocates and initializes an empty +.Vt AUTHORITY_KEYID +object, representing an ASN.1 AuthorityKeyIdentifier structure +defined in RFC 5280 section 4.2.1.1. +It can hold an issuer name, a serial number, and a key identifier. +.Pp +.Fn AUTHORITY_KEYID_free +frees +.Fa id . +.Sh RETURN VALUES +.Fn AUTHORITY_KEYID_new +returns the new +.Vt AUTHORITY_KEYID +object or +.Dv NULL +if an error occurs. +.Sh SEE ALSO +.Xr GENERAL_NAMES_new 3 , +.Xr X509_CRL_new 3 , +.Xr X509_EXTENSION_new 3 , +.Xr X509_new 3 +.Sh STANDARDS +RFC 5280: Internet X.509 Public Key Infrastructure Certificate and +Certificate Revocation List (CRL) Profile: +.Bl -dash -compact +.It +section 4.2.1.1: Certificate Extensions: Authority Key Identifier +.It +section 5.2.1: CRL Extensions: Authority Key Identifier +.El diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile index f3910f74dd..97593fc86f 100644 --- a/src/lib/libcrypto/man/Makefile +++ b/src/lib/libcrypto/man/Makefile @@ -1,4 +1,4 @@ -# $OpenBSD: Makefile,v 1.90 2016/12/23 00:40:16 schwarze Exp $ +# $OpenBSD: Makefile,v 1.91 2016/12/23 14:37:08 schwarze Exp $ .include @@ -11,6 +11,7 @@ MAN= \ ASN1_TYPE_get.3 \ ASN1_generate_nconf.3 \ ASN1_time_parse.3 \ + AUTHORITY_KEYID_new.3 \ BF_set_key.3 \ BIO_ctrl.3 \ BIO_f_base64.3 \ -- cgit v1.2.3-55-g6feb