diff options
author | 2018-04-07 13:57:43 +0000 | |
---|---|---|
committer | 2018-04-07 13:57:43 +0000 | |
commit | d46a546744f16e05ac9289488ffe1c1b98c18071 (patch) | |
tree | 61ba19e9df899a2c45f53119f54b5b26b6be9ba4 | |
parent | test X509_NAME_add_entry_by_txt(3); feedback and OK jsing@ (diff) | |
download | wireguard-openbsd-d46a546744f16e05ac9289488ffe1c1b98c18071.tar.xz wireguard-openbsd-d46a546744f16e05ac9289488ffe1c1b98c18071.zip |
tweak previous;
-rw-r--r-- | lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 b/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 index 9c0150700de..5e45278604c 100644 --- a/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 +++ b/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.13 2018/04/06 07:08:20 beck Exp $ +.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.14 2018/04/07 13:57:43 jmc Exp $ .\" full merge up to: OpenSSL d33def66 Feb 9 14:17:13 2016 -0500 .\" selective merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 .\" @@ -68,7 +68,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: April 6 2018 $ +.Dd $Mdocdate: April 7 2018 $ .Dt X509_VERIFY_PARAM_SET_FLAGS 3 .Os .Sh NAME @@ -347,7 +347,7 @@ performed on the peer certificate. .Fa namelen should be set to the length of .Fa name . -For historical compatibility, if +For historical compatibility, if .Fa name is NUL-terminated, .Fa namelen @@ -383,7 +383,7 @@ or empty. .Fa namelen should be set to the length of .Fa name . -For historical compatibility, if +For historical compatibility, if .Fa name is NUL-terminated, .Fa namelen @@ -409,7 +409,7 @@ sets the expected RFC822 email address to .Fa emaillen should be set to the length of .Fa email . -For historical compatibility, if +For historical compatibility, if .Fa email is NUL-terminated, .Fa emaillen @@ -431,7 +431,7 @@ argument is in binary format, in network byte-order, and .Fa iplen must be set to 4 for IPv4 and 16 for IPv6. .Fn X509_VERIFY_PARAM_set1_ip -will fail if +will fail if .Fa ip is NULL or if .Fa iplen @@ -521,8 +521,8 @@ A failure from these routines will poison the .Vt X509_VERIFY_PARAM object so that future calls to -.Xr X509_verify_cert -using the poisoned object will fail. +.Xr X509_verify_cert 3 +using the poisoned object will fail. .Pp .Fn X509_VERIFY_PARAM_get_flags returns the current verification flags. |