diff options
author | Jason McIntyre <jmc@cvs.openbsd.org> | 2018-04-07 13:57:44 +0000 |
---|---|---|
committer | Jason McIntyre <jmc@cvs.openbsd.org> | 2018-04-07 13:57:44 +0000 |
commit | 2767235674069f659377a533f3a2bd2c0d3ab5b1 (patch) | |
tree | 71ccf87526b1875f4ae54cffbfbe072750f432ed | |
parent | c9233cd2fe641997bae768f002b72325c294753e (diff) |
tweak previous;
-rw-r--r-- | lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 b/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 index 9c0150700de..5e45278604c 100644 --- a/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 +++ b/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.13 2018/04/06 07:08:20 beck Exp $ +.\" $OpenBSD: X509_VERIFY_PARAM_set_flags.3,v 1.14 2018/04/07 13:57:43 jmc Exp $ .\" full merge up to: OpenSSL d33def66 Feb 9 14:17:13 2016 -0500 .\" selective merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 .\" @@ -68,7 +68,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: April 6 2018 $ +.Dd $Mdocdate: April 7 2018 $ .Dt X509_VERIFY_PARAM_SET_FLAGS 3 .Os .Sh NAME @@ -347,7 +347,7 @@ performed on the peer certificate. .Fa namelen should be set to the length of .Fa name . -For historical compatibility, if +For historical compatibility, if .Fa name is NUL-terminated, .Fa namelen @@ -383,7 +383,7 @@ or empty. .Fa namelen should be set to the length of .Fa name . -For historical compatibility, if +For historical compatibility, if .Fa name is NUL-terminated, .Fa namelen @@ -409,7 +409,7 @@ sets the expected RFC822 email address to .Fa emaillen should be set to the length of .Fa email . -For historical compatibility, if +For historical compatibility, if .Fa email is NUL-terminated, .Fa emaillen @@ -431,7 +431,7 @@ argument is in binary format, in network byte-order, and .Fa iplen must be set to 4 for IPv4 and 16 for IPv6. .Fn X509_VERIFY_PARAM_set1_ip -will fail if +will fail if .Fa ip is NULL or if .Fa iplen @@ -521,8 +521,8 @@ A failure from these routines will poison the .Vt X509_VERIFY_PARAM object so that future calls to -.Xr X509_verify_cert -using the poisoned object will fail. +.Xr X509_verify_cert 3 +using the poisoned object will fail. .Pp .Fn X509_VERIFY_PARAM_get_flags returns the current verification flags. |