summaryrefslogtreecommitdiff
path: root/lib/libcrypto/man
diff options
context:
space:
mode:
authorIngo Schwarze <schwarze@cvs.openbsd.org>2016-12-25 22:15:11 +0000
committerIngo Schwarze <schwarze@cvs.openbsd.org>2016-12-25 22:15:11 +0000
commit350a306838dd302c93523554d6af8e60ad70d1a9 (patch)
treea970b55b53f8821fd1ef06dbfe010f4fccf9d39d /lib/libcrypto/man
parent77e27bced3de71323a97c3e37554d024afe23b49 (diff)
Consistently mark up various ASN.1 type names defined in standards
related to X.509 with .Vt such that they can be searched for.
Diffstat (limited to 'lib/libcrypto/man')
-rw-r--r--lib/libcrypto/man/ACCESS_DESCRIPTION_new.314
-rw-r--r--lib/libcrypto/man/ASN1_STRING_length.330
-rw-r--r--lib/libcrypto/man/ASN1_generate_nconf.325
-rw-r--r--lib/libcrypto/man/AUTHORITY_KEYID_new.39
-rw-r--r--lib/libcrypto/man/BASIC_CONSTRAINTS_new.39
-rw-r--r--lib/libcrypto/man/DIST_POINT_new.324
-rw-r--r--lib/libcrypto/man/ESS_SIGNING_CERT_new.324
-rw-r--r--lib/libcrypto/man/EVP_EncryptInit.313
-rw-r--r--lib/libcrypto/man/EVP_PKEY_CTX_ctrl.311
-rw-r--r--lib/libcrypto/man/EXTENDED_KEY_USAGE_new.39
-rw-r--r--lib/libcrypto/man/GENERAL_NAME_new.338
-rw-r--r--lib/libcrypto/man/NAME_CONSTRAINTS_new.314
-rw-r--r--lib/libcrypto/man/OCSP_CRLID_new.319
-rw-r--r--lib/libcrypto/man/OCSP_REQUEST_new.320
-rw-r--r--lib/libcrypto/man/OCSP_SERVICELOC_new.325
-rw-r--r--lib/libcrypto/man/OCSP_cert_to_id.38
-rw-r--r--lib/libcrypto/man/OCSP_resp_find_status.316
-rw-r--r--lib/libcrypto/man/OCSP_response_status.324
-rw-r--r--lib/libcrypto/man/PEM_read_bio_PrivateKey.339
-rw-r--r--lib/libcrypto/man/PKCS12_SAFEBAG_new.313
-rw-r--r--lib/libcrypto/man/PKCS12_new.313
-rw-r--r--lib/libcrypto/man/PKCS7_new.354
-rw-r--r--lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.39
-rw-r--r--lib/libcrypto/man/PKEY_USAGE_PERIOD_new.314
-rw-r--r--lib/libcrypto/man/POLICYINFO_new.334
-rw-r--r--lib/libcrypto/man/PROXY_POLICY_new.314
-rw-r--r--lib/libcrypto/man/RSA_PSS_PARAMS_new.39
-rw-r--r--lib/libcrypto/man/TS_REQ_new.334
-rw-r--r--lib/libcrypto/man/X509_ALGOR_dup.39
-rw-r--r--lib/libcrypto/man/X509_CINF_new.314
-rw-r--r--lib/libcrypto/man/X509_CRL_new.314
-rw-r--r--lib/libcrypto/man/X509_EXTENSION_set_object.39
-rw-r--r--lib/libcrypto/man/X509_NAME_ENTRY_get_object.318
-rw-r--r--lib/libcrypto/man/X509_NAME_add_entry_by_txt.38
-rw-r--r--lib/libcrypto/man/X509_NAME_get_index_by_NID.313
-rw-r--r--lib/libcrypto/man/X509_NAME_new.317
-rw-r--r--lib/libcrypto/man/X509_NAME_print_ex.38
-rw-r--r--lib/libcrypto/man/X509_PUBKEY_new.319
-rw-r--r--lib/libcrypto/man/X509_REQ_new.314
-rw-r--r--lib/libcrypto/man/X509_REVOKED_new.39
-rw-r--r--lib/libcrypto/man/X509_SIG_new.310
-rw-r--r--lib/libcrypto/man/X509_STORE_CTX_get_error.38
-rw-r--r--lib/libcrypto/man/X509_new.39
-rw-r--r--lib/libcrypto/man/d2i_RSAPublicKey.315
-rw-r--r--lib/libcrypto/man/d2i_X509_ALGOR.38
-rw-r--r--lib/libcrypto/man/d2i_X509_NAME.312
-rw-r--r--lib/libcrypto/man/d2i_X509_SIG.36
-rw-r--r--lib/libcrypto/man/x509v3.cnf.511
48 files changed, 481 insertions, 315 deletions
diff --git a/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3 b/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3
index 18e50e24c0f..8a829a5e2dd 100644
--- a/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3
+++ b/lib/libcrypto/man/ACCESS_DESCRIPTION_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.1 2016/12/23 22:21:40 schwarze Exp $
+.\" $OpenBSD: ACCESS_DESCRIPTION_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt ACCESS_DESCRIPTION_NEW 3
.Os
.Sh NAME
@@ -42,8 +42,9 @@ policy data.
.Fn ACCESS_DESCRIPTION_new
allocates and initializes an empty
.Vt ACCESS_DESCRIPTION
-object, representing an ASN.1 AccessDescription structure
-defined in RFC 5280 section 4.2.2.1.
+object, representing an ASN.1
+.Vt AccessDescription
+structure defined in RFC 5280 section 4.2.2.1.
It can hold a pointer to a
.Vt GENERAL_NAME
object documented in
@@ -90,8 +91,9 @@ allocates and initializes an empty
.Vt AUTHORITY_INFO_ACCESS
object, which is a
.Vt STACK_OF(ACCESS_DESCRIPTION)
-and represents an ASN.1 AuthorityInfoAccessSyntax structure
-defined in RFC 5280 section 4.2.2.1.
+and represents an ASN.1
+.Vt AuthorityInfoAccessSyntax
+structure defined in RFC 5280 section 4.2.2.1.
If can be used for the authority information access extension of
certificates and certificate revocation lists and for the subject
information access extension of certificates.
diff --git a/lib/libcrypto/man/ASN1_STRING_length.3 b/lib/libcrypto/man/ASN1_STRING_length.3
index f43d61819f0..2c797481d71 100644
--- a/lib/libcrypto/man/ASN1_STRING_length.3
+++ b/lib/libcrypto/man/ASN1_STRING_length.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ASN1_STRING_length.3,v 1.5 2016/11/10 11:44:52 schwarze Exp $
+.\" $OpenBSD: ASN1_STRING_length.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 99d63d46 Tue Jun 21 07:03:34 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: November 10 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt ASN1_STRING_LENGTH 3
.Os
.Sh NAME
@@ -182,12 +182,11 @@ and the functions call the
.Vt ASN1_STRING
equivalents.
.Vt ASN1_STRING
-is also used for some
-.Sy CHOICE
-types which consist entirely of primitive string types such as
-.Sy DirectoryString
+is also used for some CHOICE types which consist entirely of primitive
+string types such as
+.Vt DirectoryString
and
-.Sy Time .
+.Vt Time .
.Pp
These functions should
.Em not
@@ -195,19 +194,20 @@ be used to examine or modify
.Vt ASN1_INTEGER
or
.Vt ASN1_ENUMERATED
-types: the relevant
-.Sy INTEGER
-or
-.Sy ENUMERATED
-utility functions should be used instead.
+types: the relevant INTEGER or ENUMERATED utility functions should
+be used instead.
.Pp
In general it cannot be assumed that the data returned by
.Fn ASN1_STRING_data
is NUL terminated, and it may contain embedded NUL characters.
The actual format of the data will depend on the actual string type itself:
-for example for an IA5String the data will be ASCII,
-for a BMPString two bytes per character in big endian format,
-UTF8String will be in UTF8 format.
+for example for an
+.Vt IA5String
+the data will be ASCII, for a
+.Vt BMPString
+two bytes per character in big endian format, and a
+.Vt UTF8String
+will be in UTF8 format.
.Pp
Similar care should be take to ensure the data is in the correct format
when calling
diff --git a/lib/libcrypto/man/ASN1_generate_nconf.3 b/lib/libcrypto/man/ASN1_generate_nconf.3
index bcf55d724b0..5e1ba0a8179 100644
--- a/lib/libcrypto/man/ASN1_generate_nconf.3
+++ b/lib/libcrypto/man/ASN1_generate_nconf.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ASN1_generate_nconf.3,v 1.8 2016/12/11 18:06:09 schwarze Exp $
+.\" $OpenBSD: ASN1_generate_nconf.3,v 1.9 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 05ea606a Fri May 20 20:52:46 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 11 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt ASN1_GENERATE_NCONF 3
.Os
.Sh NAME
@@ -285,15 +285,20 @@ if an error occurred.
The error codes can be obtained by
.Xr ERR_get_error 3 .
.Sh EXAMPLES
-A simple IA5String:
+A simple
+.Vt IA5String :
.Pp
.Dl IA5STRING:Hello World
.Pp
-An IA5String explicitly tagged:
+An
+.Vt IA5String
+explicitly tagged:
.Pp
.Dl EXPLICIT:0,IA5STRING:Hello World
.Pp
-An IA5String explicitly tagged using APPLICATION tagging:
+An
+.Vt IA5String
+explicitly tagged using APPLICATION tagging:
.Pp
.Dl EXPLICIT:0A,IA5STRING:Hello World
.Pp
@@ -302,7 +307,8 @@ A BITSTRING with bits 1 and 5 set and all others zero:
.Dl FORMAT:BITLIST,BITSTRING:1,5
.Pp
A more complex example using a config file to produce a
-SEQUENCE consisting of a BOOL an OID and a UTF8String:
+SEQUENCE consisting of a BOOL an OID and a
+.Vt UTF8String :
.Bd -literal -offset indent
asn1 = SEQUENCE:seq_section
@@ -313,7 +319,9 @@ field2 = OID:commonName
field3 = UTF8:Third field
.Ed
.Pp
-This example produces an RSAPrivateKey structure.
+This example produces an
+.Vt RSAPrivateKey
+structure.
This is the key contained in the file
.Pa client.pem
in all OpenSSL distributions.
@@ -349,7 +357,8 @@ coeff=INTEGER:0x30B9E4F2AFA5AC679F920FC83F1F2DF1BAF1779CF989447FABC2F5\e
628657053A
.Ed
.Pp
-This example is the corresponding public key in a SubjectPublicKeyInfo
+This example is the corresponding public key in an ASN.1
+.Vt SubjectPublicKeyInfo
structure:
.Bd -literal -offset 2n
# Start with a SEQUENCE
diff --git a/lib/libcrypto/man/AUTHORITY_KEYID_new.3 b/lib/libcrypto/man/AUTHORITY_KEYID_new.3
index 5186fea0f31..94d6e14abb7 100644
--- a/lib/libcrypto/man/AUTHORITY_KEYID_new.3
+++ b/lib/libcrypto/man/AUTHORITY_KEYID_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.1 2016/12/23 14:37:08 schwarze Exp $
+.\" $OpenBSD: AUTHORITY_KEYID_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt AUTHORITY_KEYID_NEW 3
.Os
.Sh NAME
@@ -35,8 +35,9 @@ for signing it.
.Fn AUTHORITY_KEYID_new
allocates and initializes an empty
.Vt AUTHORITY_KEYID
-object, representing an ASN.1 AuthorityKeyIdentifier structure
-defined in RFC 5280 section 4.2.1.1.
+object, representing an ASN.1
+.Vt AuthorityKeyIdentifier
+structure defined in RFC 5280 section 4.2.1.1.
It can hold an issuer name, a serial number, and a key identifier.
.Pp
.Fn AUTHORITY_KEYID_free
diff --git a/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3 b/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3
index 1293be0050c..c133bb1c35f 100644
--- a/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3
+++ b/lib/libcrypto/man/BASIC_CONSTRAINTS_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:02:41 schwarze Exp $
+.\" $OpenBSD: BASIC_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt BASIC_CONSTRAINTS_NEW 3
.Os
.Sh NAME
@@ -31,8 +31,9 @@
.Fn BASIC_CONSTRAINTS_new
allocates and initializes an empty
.Vt BASIC_CONSTRAINTS
-object, representing an ASN.1 BasicConstraints structure
-defined in RFC 5280 section 4.2.1.9.
+object, representing an ASN.1
+.Vt BasicConstraints
+structure defined in RFC 5280 section 4.2.1.9.
.Pp
This object contains two fields.
The field
diff --git a/lib/libcrypto/man/DIST_POINT_new.3 b/lib/libcrypto/man/DIST_POINT_new.3
index 8498e5a7d0b..bbd4855e117 100644
--- a/lib/libcrypto/man/DIST_POINT_new.3
+++ b/lib/libcrypto/man/DIST_POINT_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: DIST_POINT_new.3,v 1.1 2016/12/23 15:25:19 schwarze Exp $
+.\" $OpenBSD: DIST_POINT_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt DIST_POINT_NEW 3
.Os
.Sh NAME
@@ -52,8 +52,9 @@ where to obtain certificate revocation lists that might later revoke it.
.Fn DIST_POINT_new
allocates and initializes an empty
.Vt DIST_POINT
-object, representing an ASN.1 DistributionPoint structure
-defined in RFC 5280 section 4.2.1.13.
+object, representing an ASN.1
+.Vt DistributionPoint
+structure defined in RFC 5280 section 4.2.1.13.
It can hold issuer names, distribution point names, and reason flags.
.Fn DIST_POINT_free
frees
@@ -64,8 +65,9 @@ allocates and initializes an empty
.Vt CRL_DIST_POINTS
object, which is a
.Vt STACK_OF(DIST_POINT)
-and represents the ASN.1 CRLDistributionPoints structure
-defined in RFC 5280 section 4.2.1.13.
+and represents the ASN.1
+.Vt CRLDistributionPoints
+structure defined in RFC 5280 section 4.2.1.13.
It can be used as an extension in
.Vt X509
and in
@@ -78,8 +80,9 @@ frees
.Fn DIST_POINT_NAME_new
allocates and initializes an empty
.Vt DIST_POINT_NAME
-object, representing an ASN.1 DistributionPointName structure
-defined in RFC 5280 section 4.2.1.13.
+object, representing an ASN.1
+.Vt DistributionPointName
+structure defined in RFC 5280 section 4.2.1.13.
It is used by the
.Vt DIST_POINT
and
@@ -93,8 +96,9 @@ frees
.Fn ISSUING_DIST_POINT_new
allocates and initializes an empty
.Vt ISSUING_DIST_POINT
-object, representing an ASN.1 IssuingDistributionPoint structure
-defined in RFC 5280 section 5.2.5.
+object, representing an ASN.1
+.Vt IssuingDistributionPoint
+structure defined in RFC 5280 section 5.2.5.
Using this extension, a CRL can specify which distribution point
it was issued from and which kinds of certificates and revocation
reasons it covers.
diff --git a/lib/libcrypto/man/ESS_SIGNING_CERT_new.3 b/lib/libcrypto/man/ESS_SIGNING_CERT_new.3
index 2e55f6cbed2..ae23b46c159 100644
--- a/lib/libcrypto/man/ESS_SIGNING_CERT_new.3
+++ b/lib/libcrypto/man/ESS_SIGNING_CERT_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.2 2016/12/14 07:00:35 jmc Exp $
+.\" $OpenBSD: ESS_SIGNING_CERT_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt ESS_SIGNING_CERT_NEW 3
.Os
.Sh NAME
@@ -41,14 +41,16 @@
.Fn ESS_ISSUER_SERIAL_free "ESS_ISSUER_SERIAL *issuer_serial"
.Sh DESCRIPTION
The signing certificate may be included in the signedAttributes
-field of a SignerInfo structure to mitigate simple substitution and
-re-issue attacks.
+field of a
+.Vt SignerInfo
+structure to mitigate simple substitution and re-issue attacks.
.Pp
.Fn ESS_SIGNING_CERT_new
allocates and initializes an empty
.Vt ESS_SIGNING_CERT
-object, representing an ASN.1 SigningCertificate structure
-defined in RFC 2634 section 5.4.
+object, representing an ASN.1
+.Vt SigningCertificate
+structure defined in RFC 2634 section 5.4.
It can hold the certificate used for signing the data,
additional authorization certificates that can be used during
validation, and policies applying to the certificate.
@@ -59,8 +61,9 @@ frees
.Fn ESS_CERT_ID_new
allocates and initializes an empty
.Vt ESS_CERT_ID
-object, representing an ASN.1 ESSCertID structure
-defined in RFC 2634 section 5.4.1.
+object, representing an ASN.1
+.Vt ESSCertID
+structure defined in RFC 2634 section 5.4.1.
Such objects can be used inside
.Vt ESS_SIGNING_CERT
objects, and each one can hold a SHA1 hash of one certificate.
@@ -71,8 +74,9 @@ frees
.Fn ESS_ISSUER_SERIAL_new
allocates and initializes an empty
.Vt ESS_ISSUER_SERIAL
-object, representing an ASN.1 IssuerSerial structure
-defined in RFC 2634 section 5.4.1.
+object, representing an ASN.1
+.Vt IssuerSerial
+structure defined in RFC 2634 section 5.4.1.
It can hold an issuer name and a serial number and can be included in an
.Vt ESS_CERT_ID
object, which is useful for additional authorization certificates,
diff --git a/lib/libcrypto/man/EVP_EncryptInit.3 b/lib/libcrypto/man/EVP_EncryptInit.3
index 1a7fe40a66b..c328edf4f6d 100644
--- a/lib/libcrypto/man/EVP_EncryptInit.3
+++ b/lib/libcrypto/man/EVP_EncryptInit.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: EVP_EncryptInit.3,v 1.4 2016/11/26 20:26:25 schwarze Exp $
+.\" $OpenBSD: EVP_EncryptInit.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: November 26 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt EVP_ENCRYPTINIT 3
.Os
.Sh NAME
@@ -664,7 +664,9 @@ If the cipher is a stream cipher then
is returned.
.Pp
.Fn EVP_CIPHER_param_to_asn1
-sets the AlgorithmIdentifier "parameter" based on the passed cipher.
+sets the ASN.1
+.Vt AlgorithmIdentifier
+parameter based on the passed cipher.
This will typically include any parameters and an IV.
The cipher IV (if any) must be set when this call is made.
This call should be made before the cipher is actually "used" (before any
@@ -675,8 +677,9 @@ calls, for example).
This function may fail if the cipher does not have any ASN.1 support.
.Pp
.Fn EVP_CIPHER_asn1_to_param
-sets the cipher parameters based on an ASN.1 AlgorithmIdentifier
-"parameter".
+sets the cipher parameters based on an ASN.1
+.Vt AlgorithmIdentifier
+parameter.
The precise effect depends on the cipher.
In the case of RC2, for example, it will set the IV and effective
key length.
diff --git a/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
index 0ed3678a99d..0c30fcb5ef0 100644
--- a/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
+++ b/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.5 2016/11/27 15:27:19 schwarze Exp $
+.\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL e03af178 Dec 11 17:05:57 2014 -0500
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: November 27 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt EVP_PKEY_CTX_CTRL 3
.Os
.Sh NAME
@@ -205,9 +205,10 @@ Two RSA padding modes behave differently if
.Fn EVP_PKEY_CTX_set_signature_md
is used.
If this macro is called for PKCS#1 padding, the plaintext buffer is an
-actual digest value and is encapsulated in a DigestInfo structure
-according to PKCS#1 when signing and this structure is expected (and
-stripped off) when verifying.
+actual digest value and is encapsulated in a
+.Vt DigestInfo
+structure according to PKCS#1 when signing and this structure is
+expected (and stripped off) when verifying.
If this control is not used with RSA and PKCS#1 padding then the
supplied data is used directly and not encapsulated.
In the case of X9.31 padding for RSA the algorithm identifier byte is
diff --git a/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3 b/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3
index ae986839fb5..8910fb58f80 100644
--- a/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3
+++ b/lib/libcrypto/man/EXTENDED_KEY_USAGE_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.1 2016/12/23 20:43:02 schwarze Exp $
+.\" $OpenBSD: EXTENDED_KEY_USAGE_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt EXTENDED_KEY_USAGE_NEW 3
.Os
.Sh NAME
@@ -41,8 +41,9 @@ allocates and initializes an empty
.Vt EXTENDED_KEY_USAGE
object, which is a
.Vt STACK_OF(ASN1_OBJECT)
-and represents an ASN.1 ExtKeyUsageSyntax structure
-defined in RFC 5280 section 4.2.1.12.
+and represents an ASN.1
+.Vt ExtKeyUsageSyntax
+structure defined in RFC 5280 section 4.2.1.12.
It can hold key purpose identifiers.
.Pp
.Fn EXTENDED_KEY_USAGE_free
diff --git a/lib/libcrypto/man/GENERAL_NAME_new.3 b/lib/libcrypto/man/GENERAL_NAME_new.3
index c4e8fce764c..a5537323aef 100644
--- a/lib/libcrypto/man/GENERAL_NAME_new.3
+++ b/lib/libcrypto/man/GENERAL_NAME_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: GENERAL_NAME_new.3,v 1.1 2016/12/23 00:40:16 schwarze Exp $
+.\" $OpenBSD: GENERAL_NAME_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt GENERAL_NAME_NEW 3
.Os
.Sh NAME
@@ -46,21 +46,26 @@
.Ft void
.Fn OTHERNAME_free "OTHERNAME *name"
.Sh DESCRIPTION
-Even though the X.501 Name documented in
+Even though the X.501
+.Vt Name
+documented in
.Xr X509_NAME_new 3
is a complicated multi-layered structure, it is very rigid and not
flexible enough to represent various entities that many people want
to use as names in certificates.
-For that reason, X.509 extensions use the X.509 GeneralName
-wrapper structure rather than using the X.501 Name structure
-directly, at the expense of adding one or two additional layers
-of indirection.
+For that reason, X.509 extensions use the X.509
+.Vt GeneralName
+wrapper structure rather than using the X.501
+.Vt Name
+structure directly, at the expense of adding one or two additional
+layers of indirection.
.Pp
.Fn GENERAL_NAME_new
allocates and initializes an empty
.Vt GENERAL_NAME
-object, representing the ASN.1 GeneralName structure
-defined in RFC 5280 section 4.2.1.6.
+object, representing the ASN.1
+.Vt GeneralName
+structure defined in RFC 5280 section 4.2.1.6.
It can for example hold an
.Vt X509_name
object, an IP address, a DNS host name, a uniform resource identifier,
@@ -78,8 +83,9 @@ allocates and initializes an empty
.Vt GENERAL_NAMES
object, which is a
.Vt STACK_OF(GENERAL_NAME)
-and represents the ASN.1 GeneralNames structure
-defined in RFC 5280 section 4.2.1.6.
+and represents the ASN.1
+.Vt GeneralNames
+structure defined in RFC 5280 section 4.2.1.6.
It is used by extension structures that can contain multiple names,
for example key identifier, alternative name, and distribution point
extensions.
@@ -90,8 +96,9 @@ frees
.Fn EDIPARTYNAME_new
allocates and initializes an empty
.Vt EDIPARTYNAME
-object, representing the ASN.1 EDIPartyName structure
-defined in RFC 5280 section 4.2.1.6, where
+object, representing the ASN.1
+.Vt EDIPartyName
+structure defined in RFC 5280 section 4.2.1.6, where
.Dq EDI
stands for
.Dq electronic data identifier .
@@ -104,8 +111,9 @@ frees
.Fn OTHERNAME_new
allocates and initializes an empty
.Vt OTHERNAME
-object, representing the ASN.1 OtherName structure
-defined in RFC 5280 section 4.2.1.6.
+object, representing the ASN.1
+.Vt OtherName
+structure defined in RFC 5280 section 4.2.1.6.
It can hold data of any
.Vt ASN1_TYPE
together with a type identifier.
diff --git a/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/lib/libcrypto/man/NAME_CONSTRAINTS_new.3
index 1105bead0bf..5ef737cb4ed 100644
--- a/lib/libcrypto/man/NAME_CONSTRAINTS_new.3
+++ b/lib/libcrypto/man/NAME_CONSTRAINTS_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $
+.\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt NAME_CONSTRAINTS_NEW 3
.Os
.Sh NAME
@@ -41,8 +41,9 @@ certification path.
.Fn NAME_CONSTRAINTS_new
allocates and initializes an empty
.Vt NAME_CONSTRAINTS
-object, representing an ASN.1 NameConstraints structure
-defined in RFC 5280 section 4.2.1.10.
+object, representing an ASN.1
+.Vt NameConstraints
+structure defined in RFC 5280 section 4.2.1.10.
It consists of two
.Vt STACK_OF(GENERAL_SUBTREE)
objects, one specifying permitted names, the other excluded names.
@@ -53,8 +54,9 @@ frees
.Fn GENERAL_SUBTREE_new
allocates and initializes an empty
.Vt GENERAL_SUBTREE
-object, representing an ASN.1 GeneralSubtree structure
-defined in RFC 5280 section 4.2.1.10.
+object, representing an ASN.1
+.Vt GeneralSubtree
+structure defined in RFC 5280 section 4.2.1.10.
It is a trivial wrapper around the
.Vt GENERAL_NAME
object documented in
diff --git a/lib/libcrypto/man/OCSP_CRLID_new.3 b/lib/libcrypto/man/OCSP_CRLID_new.3
index fbc54ec71aa..450b57c93ef 100644
--- a/lib/libcrypto/man/OCSP_CRLID_new.3
+++ b/lib/libcrypto/man/OCSP_CRLID_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_CRLID_new.3,v 1.2 2016/12/15 15:22:17 schwarze Exp $
+.\" $OpenBSD: OCSP_CRLID_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 15 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_CRLID_NEW 3
.Os
.Sh NAME
@@ -38,9 +38,14 @@
If a client asks about the validity of a certificate and it turns
out to be invalid, the responder may optionally communicate which
certificate revocation list the certificate was found on.
-The required data is stored as an ASN.1 CrlID structure in the
-singleExtensions field of the SingleResponse structure.
-The CrlID is represented by an
+The required data is stored as an ASN.1
+.Vt CrlID
+structure in the singleExtensions field of the
+.Vt SingleResponse
+structure.
+The
+.Vt CrlID
+is represented by an
.Vt OCSP_CRLID
object, which will be stored inside the
.Vt OCSP_SINGLERESP
@@ -66,7 +71,9 @@ at which the CRL was created.
Each argument can be
.Dv NULL ,
in which case the respective field is omitted.
-The resulting CrlID structure is encoded in ASN.1 using
+The resulting
+.Vt CrlID
+structure is encoded in ASN.1 using
.Xr X509V3_EXT_i2d 3
with criticality 0.
.Sh RETURN VALUES
diff --git a/lib/libcrypto/man/OCSP_REQUEST_new.3 b/lib/libcrypto/man/OCSP_REQUEST_new.3
index 0d0009186aa..664a7506650 100644
--- a/lib/libcrypto/man/OCSP_REQUEST_new.3
+++ b/lib/libcrypto/man/OCSP_REQUEST_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_REQUEST_new.3,v 1.6 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: OCSP_REQUEST_new.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_REQUEST_NEW 3
.Os
.Sh NAME
@@ -133,7 +133,9 @@
.Fn OCSP_REQUEST_new
allocates and initializes an empty
.Vt OCSP_REQUEST
-object, representing an ASN.1 OCSPRequest structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt OCSPRequest
+structure defined in RFC 6960.
.Fn OCSP_REQUEST_free
frees
.Fa req .
@@ -141,7 +143,9 @@ frees
.Fn OCSP_SIGNATURE_new
allocates and initializes an empty
.Vt OCSP_SIGNATURE
-object, representing an ASN.1 Signature structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt Signature
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_REQUEST .
.Fn OCSP_SIGNATURE_free
@@ -151,7 +155,9 @@ frees
.Fn OCSP_REQINFO_new
allocates and initializes an empty
.Vt OCSP_REQINFO
-object, representing an ASN.1 TBSRequest structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt TBSRequest
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_REQUEST .
It asks about the validity of one or more certificates.
@@ -162,7 +168,9 @@ frees
.Fn OCSP_ONEREQ_new
allocates and initializes an empty
.Vt OCSP_ONEREQ
-object, representing an ASN.1 Request structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt Request
+structure defined in RFC 6960.
Such objects are used inside
.Vt OCSP_REQINFO .
Each one asks about the validity of one certificiate.
diff --git a/lib/libcrypto/man/OCSP_SERVICELOC_new.3 b/lib/libcrypto/man/OCSP_SERVICELOC_new.3
index 6179da3a5bc..5f42c781fd9 100644
--- a/lib/libcrypto/man/OCSP_SERVICELOC_new.3
+++ b/lib/libcrypto/man/OCSP_SERVICELOC_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.4 2016/12/15 15:22:17 schwarze Exp $
+.\" $OpenBSD: OCSP_SERVICELOC_new.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 15 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_SERVICELOC_NEW 3
.Os
.Sh NAME
@@ -38,10 +38,14 @@ Due to restrictions of network routing, a client may be unable to
directly contact the authoritative OCSP server for a certificate
that needs to be checked.
In that case, the request can be sent via a proxy server.
-An ASN.1 ServiceLocator structure is included in the
-singleRequestExtensions field of the Request structure to indicate
-where to forward the request.
-The ServiceLocator is represented by a
+An ASN.1
+.Vt ServiceLocator
+structure is included in the singleRequestExtensions field of the
+.Vt Request
+structure to indicate where to forward the request.
+The
+.Vt ServiceLocator
+is represented by a
.Vt OCSP_SERVICELOC
object, which will be stored inside the
.Vt OCSP_ONEREQ
@@ -65,9 +69,12 @@ If
.Fa urls
or its first element is
.Dv NULL ,
-the locator field is omitted from the ServiceLocator structure
-and only the issuer is included.
-The resulting ServiceLocator structure is encoded in ASN.1 using
+the locator field is omitted from the
+.Vt ServiceLocator
+structure and only the issuer is included.
+The resulting
+.Vt ServiceLocator
+structure is encoded in ASN.1 using
.Xr X509V3_EXT_i2d 3
with criticality 0.
.Sh RETURN VALUES
diff --git a/lib/libcrypto/man/OCSP_cert_to_id.3 b/lib/libcrypto/man/OCSP_cert_to_id.3
index 103b9a4a9f7..77559ba4696 100644
--- a/lib/libcrypto/man/OCSP_cert_to_id.3
+++ b/lib/libcrypto/man/OCSP_cert_to_id.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_cert_to_id.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $
+.\" $OpenBSD: OCSP_cert_to_id.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_CERT_TO_ID 3
.Os
.Sh NAME
@@ -118,7 +118,9 @@
.Fn OCSP_CERTID_new
allocates and initializes an empty
.Vt OCSP_CERTID
-object, representing an ASN.1 CertID structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt CertID
+structure defined in RFC 6960.
It can store hashes of an issuer's distinguished name and public
key together with a serial number of a certificate.
It is used by the
diff --git a/lib/libcrypto/man/OCSP_resp_find_status.3 b/lib/libcrypto/man/OCSP_resp_find_status.3
index 23aaa26e387..d06540d7167 100644
--- a/lib/libcrypto/man/OCSP_resp_find_status.3
+++ b/lib/libcrypto/man/OCSP_resp_find_status.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_resp_find_status.3,v 1.4 2016/12/12 22:48:02 schwarze Exp $
+.\" $OpenBSD: OCSP_resp_find_status.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL c952780c Jun 21 07:03:34 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 12 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_RESP_FIND_STATUS 3
.Os
.Sh NAME
@@ -140,7 +140,9 @@
.Fn OCSP_SINGLERESP_new
allocates and initializes an empty
.Vt OCSP_SINGLERESP
-object, representing an ASN.1 SingleResponse structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt SingleResponse
+structure defined in RFC 6960.
Each such object can store the server's answer regarding the validity
of one individual certificate.
Such objects are used inside the
@@ -156,7 +158,9 @@ frees
.Fn OCSP_CERTSTATUS_new
allocates and initializes an empty
.Vt OCSP_CERTSTATUS
-object, representing an ASN.1 CertStatus structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt CertStatus
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_SINGLERESP .
.Fn OCSP_CERTSTATUS_free
@@ -166,7 +170,9 @@ frees
.Fn OCSP_REVOKEDINFO_new
allocates and initializes an empty
.Vt OCSP_REVOKEDINFO
-object, representing an ASN.1 RevokedInfo structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt RevokedInfo
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_CERTSTATUS .
.Fn OCSP_REVOKEDINFO_free
diff --git a/lib/libcrypto/man/OCSP_response_status.3 b/lib/libcrypto/man/OCSP_response_status.3
index 33a9dfb1a20..1ffa8a728ed 100644
--- a/lib/libcrypto/man/OCSP_response_status.3
+++ b/lib/libcrypto/man/OCSP_response_status.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: OCSP_response_status.3,v 1.3 2016/12/12 18:45:29 schwarze Exp $
+.\" $OpenBSD: OCSP_response_status.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 12 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt OCSP_RESPONSE_STATUS 3
.Os
.Sh NAME
@@ -122,7 +122,9 @@
.Fn OCSP_RESPONSE_new
allocates and initializes an empty
.Vt OCSP_RESPONSE
-object, representing an ASN.1 OCSPResponse structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt OCSPResponse
+structure defined in RFC 6960.
.Fn OCSP_RESPONSE_free
frees
.Fa resp .
@@ -130,7 +132,9 @@ frees
.Fn OCSP_RESPBYTES_new
allocates and initializes an empty
.Vt OCSP_RESPBYTES
-object, representing an ASN.1 ResponseBytes structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt ResponseBytes
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_RESPONSE .
.Fn OCSP_RESPBYTES_free
@@ -140,7 +144,9 @@ frees
.Fn OCSP_BASICRESP_new
allocates and initializes an empty
.Vt OCSP_BASICRESP
-object, representing an ASN.1 BasicOCSPResponse structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt BasicOCSPResponse
+structure defined in RFC 6960.
.Vt OCSP_RESPBYTES
contains the DER-encoded form of an
.Vt OCSP_BASICRESP
@@ -152,7 +158,9 @@ frees
.Fn OCSP_RESPDATA_new
allocates and initializes an empty
.Vt OCSP_RESPDATA
-object, representing an ASN.1 ResponseData structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt ResponseData
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_BASICRESP .
.Fn OCSP_RESPDATA_free
@@ -162,7 +170,9 @@ frees
.Fn OCSP_RESPID_new
allocates and initializes an empty
.Vt OCSP_RESPID
-object, representing an ASN.1 ResponderID structure defined in RFC 6960.
+object, representing an ASN.1
+.Vt ResponderID
+structure defined in RFC 6960.
Such an object is used inside
.Vt OCSP_RESPDATA .
.Fn OCSP_RESPID_free
diff --git a/lib/libcrypto/man/PEM_read_bio_PrivateKey.3 b/lib/libcrypto/man/PEM_read_bio_PrivateKey.3
index 6d3ede45c22..5d0852be25c 100644
--- a/lib/libcrypto/man/PEM_read_bio_PrivateKey.3
+++ b/lib/libcrypto/man/PEM_read_bio_PrivateKey.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.6 2016/12/06 14:45:08 schwarze Exp $
+.\" $OpenBSD: PEM_read_bio_PrivateKey.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 6 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PEM_READ_BIO_PRIVATEKEY 3
.Os
.Sh NAME
@@ -747,8 +747,9 @@ and
.Fn PEM_write_PKCS8PrivateKey
write a private key in an
.Vt EVP_PKEY
-structure in PKCS#8 EncryptedPrivateKeyInfo format using PKCS#5
-v2.0 password based encryption algorithms.
+structure in PKCS#8
+.Vt EncryptedPrivateKeyInfo
+format using PKCS#5 v2.0 password based encryption algorithms.
The
.Fa enc
argument specifies the encryption algorithm to use: unlike all other PEM
@@ -758,13 +759,15 @@ If
.Fa enc
is
.Dv NULL ,
-then no encryption is used and a PKCS#8 PrivateKeyInfo structure
-is used instead.
+then no encryption is used and a PKCS#8
+.Vt PrivateKeyInfo
+structure is used instead.
.Pp
.Fn PEM_write_bio_PKCS8PrivateKey_nid
and
.Fn PEM_write_PKCS8PrivateKey_nid
-also write out a private key as a PKCS#8 EncryptedPrivateKeyInfo.
+also write out a private key as a PKCS#8
+.Vt EncryptedPrivateKeyInfo .
However they use PKCS#5 v1.5 or PKCS#12 encryption algorithms instead.
The algorithm to use is specified in the
.Fa nid
@@ -789,7 +792,9 @@ The
functions process a public key using an
.Vt EVP_PKEY
structure.
-The public key is encoded as a SubjectPublicKeyInfo structure.
+The public key is encoded as an ASN.1
+.Vt SubjectPublicKeyInfo
+structure.
.Pp
The
.Sy RSAPrivateKey
@@ -805,15 +810,18 @@ The
functions process an RSA public key using an
.Vt RSA
structure.
-The public key is encoded using a PKCS#1 RSAPublicKey structure.
+The public key is encoded using a PKCS#1
+.Vt RSAPublicKey
+structure.
.Pp
The
.Sy RSA_PUBKEY
functions also process an RSA public key using an
.Vt RSA
structure.
-However the public key is encoded using a SubjectPublicKeyInfo structure
-and an error occurs if the public key is not RSA.
+However the public key is encoded using an ASN.1
+.Vt SubjectPublicKeyInfo
+structure and an error occurs if the public key is not RSA.
.Pp
The
.Sy DSAPrivateKey
@@ -829,8 +837,9 @@ The
functions process a DSA public key using a
.Vt DSA
structure.
-The public key is encoded using a SubjectPublicKeyInfo structure and an
-error occurs if the public key is not DSA.
+The public key is encoded using an ASN.1
+.Vt SubjectPublicKeyInfo
+structure and an error occurs if the public key is not DSA.
.Pp
The
.Sy DSAparams
@@ -906,7 +915,9 @@ structure.
.Pp
The
.Sy PKCS7
-functions process a PKCS#7 ContentInfo using a
+functions process a PKCS#7
+.Vt ContentInfo
+using a
.Vt PKCS7
structure.
.Pp
diff --git a/lib/libcrypto/man/PKCS12_SAFEBAG_new.3 b/lib/libcrypto/man/PKCS12_SAFEBAG_new.3
index 8cb68351944..603c27bed1d 100644
--- a/lib/libcrypto/man/PKCS12_SAFEBAG_new.3
+++ b/lib/libcrypto/man/PKCS12_SAFEBAG_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $
+.\" $OpenBSD: PKCS12_SAFEBAG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 22 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PKCS12_SAFEBAG_NEW 3
.Os
.Sh NAME
@@ -37,8 +37,9 @@
.Fn PKCS12_SAFEBAG_new
allocates and initializes an empty
.Vt PKCS12_SAFEBAG
-object, representing an ASN.1 SafeBag structure
-defined in RFC 7292 section 4.2.
+object, representing an ASN.1
+.Vt SafeBag
+structure defined in RFC 7292 section 4.2.
It can hold a pointer to a
.Vt PKCS12_BAGS
object together with a type identifier and optional attributes.
@@ -49,7 +50,9 @@ frees
.Fn PKCS12_BAGS_new
allocates and initializes an empty
.Vt PKCS12_BAGS
-object, representing the bagValue field of an ASN.1 SafeBag structure.
+object, representing the bagValue field of an ASN.1
+.Vt SafeBag
+structure.
It is used in
.Vt PKCS12_SAFEBAG
and can hold a DER-encoded X.509 certificate,
diff --git a/lib/libcrypto/man/PKCS12_new.3 b/lib/libcrypto/man/PKCS12_new.3
index 426074c9b1b..0f540487242 100644
--- a/lib/libcrypto/man/PKCS12_new.3
+++ b/lib/libcrypto/man/PKCS12_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PKCS12_new.3,v 1.1 2016/12/22 16:05:22 schwarze Exp $
+.\" $OpenBSD: PKCS12_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 22 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PKCS12_NEW 3
.Os
.Sh NAME
@@ -37,7 +37,9 @@
.Fn PKCS12_new
allocates and initializes an empty
.Vt PKCS12
-object, representing an ASN.1 PFX (personal information exchange)
+object, representing an ASN.1
+.Vt PFX
+.Pq personal information exchange
structure defined in RFC 7292 section 4.
It can hold a pointer to a
.Vt PKCS7
@@ -53,8 +55,9 @@ frees
.Fn PKCS12_MAC_DATA_new
allocates and initializes an empty
.Vt PKCS12_MAC_DATA
-object, representing an ASN.1 MacData structure
-defined in RFC 7292 section 4.
+object, representing an ASN.1
+.Vt MacData
+structure defined in RFC 7292 section 4.
It is used inside
.Vt PKCS12
and can hold a pointer to an
diff --git a/lib/libcrypto/man/PKCS7_new.3 b/lib/libcrypto/man/PKCS7_new.3
index 9feecbb88b8..7f8cffd8817 100644
--- a/lib/libcrypto/man/PKCS7_new.3
+++ b/lib/libcrypto/man/PKCS7_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PKCS7_new.3,v 1.1 2016/12/13 14:31:55 schwarze Exp $
+.\" $OpenBSD: PKCS7_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 13 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PKCS7_NEW 3
.Os
.Sh NAME
@@ -88,8 +88,9 @@ cryptography applied to it, in particular signed and encrypted data.
.Fn PKCS7_new
allocates and initializes an empty
.Vt PKCS7
-object, representing an ASN.1 ContentInfo structure
-defined in RFC 2315 section 7.
+object, representing an ASN.1
+.Vt ContentInfo
+structure defined in RFC 2315 section 7.
It is the top-level data structure able to hold any kind of content
that can be transmitted using PKCS#7.
It can be used recursively in
@@ -104,8 +105,9 @@ frees
.Fn PKCS7_SIGNED_new
allocates and initializes an empty
.Vt PKCS7_SIGNED
-object, representing an ASN.1 SignedData structure
-defined in RFC 2315 section 9.
+object, representing an ASN.1
+.Vt SignedData
+structure defined in RFC 2315 section 9.
It can be used inside
.Vt PKCS7
objects and holds any kind of content together with signatures by
@@ -118,8 +120,9 @@ frees
.Fn PKCS7_ENVELOPE_new
allocates and initializes an empty
.Vt PKCS7_ENVELOPE
-object, representing an ASN.1 EnvelopedData structure
-defined in RFC 2315 section 10.
+object, representing an ASN.1
+.Vt EnvelopedData
+structure defined in RFC 2315 section 10.
It can be used inside
.Vt PKCS7
objects and holds any kind of encrypted content together with
@@ -131,8 +134,9 @@ frees
.Fn PKCS7_SIGN_ENVELOPE_new
allocates and initializes an empty
.Vt PKCS7_SIGN_ENVELOPE
-object, representing an ASN.1 SignedAndEnvelopedData structure
-defined in RFC 2315 section 11.
+object, representing an ASN.1
+.Vt SignedAndEnvelopedData
+structure defined in RFC 2315 section 11.
It can be used inside
.Vt PKCS7
objects and holds any kind of encrypted content together with
@@ -146,8 +150,9 @@ frees
.Fn PKCS7_DIGEST_new
allocates and initializes an empty
.Vt PKCS7_DIGEST
-object, representing an ASN.1 DigestedData structure
-defined in RFC 2315 section 12.
+object, representing an ASN.1
+.Vt DigestedData
+structure defined in RFC 2315 section 12.
It can be used inside
.Vt PKCS7
objects and holds any kind of content together with a message digest
@@ -159,8 +164,9 @@ frees
.Fn PKCS7_ENCRYPT_new
allocates and initializes an empty
.Vt PKCS7_ENCRYPT
-object, representing an ASN.1 EncryptedData structure
-defined in RFC 2315 section 13.
+object, representing an ASN.1
+.Vt EncryptedData
+structure defined in RFC 2315 section 13.
It can be used inside
.Vt PKCS7
objects and holds any kind of encrypted content.
@@ -172,8 +178,9 @@ frees
.Fn PKCS7_ENC_CONTENT_new
allocates and initializes an empty
.Vt PKCS7_ENC_CONTENT
-object, representing an ASN.1 EncryptedContentInfo structure
-defined in RFC 2315 section 10.1.
+object, representing an ASN.1
+.Vt EncryptedContentInfo
+structure defined in RFC 2315 section 10.1.
It can be used inside
.Vt PKCS7_ENVELOPE ,
.Vt PKCS7_SIGN_ENVELOPE ,
@@ -188,8 +195,9 @@ frees
.Fn PKCS7_SIGNER_INFO_new
allocates and initializes an empty
.Vt PKCS7_SIGNER_INFO
-object, representing an ASN.1 SignerInfo structure
-defined in RFC 2315 section 9.2.
+object, representing an ASN.1
+.Vt SignerInfo
+structure defined in RFC 2315 section 9.2.
It can be used inside
.Vt PKCS7_SIGNED
and
@@ -203,8 +211,9 @@ frees
.Fn PKCS7_RECIP_INFO_new
allocates and initializes an empty
.Vt PKCS7_RECIP_INFO
-object, representing an ASN.1 RecipientInfo structure
-defined in RFC 2315 section 10.2.
+object, representing an ASN.1
+.Vt RecipientInfo
+structure defined in RFC 2315 section 10.2.
It can be used inside
.Vt PKCS7_ENVELOPE
and
@@ -218,8 +227,9 @@ frees
.Fn PKCS7_ISSUER_AND_SERIAL_new
allocates and initializes an empty
.Vt PKCS7_ISSUER_AND_SERIAL
-object, representing an ASN.1 IssuerAndSerialNumber structure
-defined in RFC 2315 section 6.7.
+object, representing an ASN.1
+.Vt IssuerAndSerialNumber
+structure defined in RFC 2315 section 6.7.
It can be used inside
.Vt PKCS7_SIGNER_INFO
and
diff --git a/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
index d522dab9f8c..8c6dba35140 100644
--- a/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
+++ b/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.1 2016/12/22 12:10:06 schwarze Exp $
+.\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 22 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PKCS8_PRIV_KEY_INFO_NEW 3
.Os
.Sh NAME
@@ -31,8 +31,9 @@
.Fn PKCS8_PRIV_KEY_INFO_new
allocates and initializes an empty
.Vt PKCS8_PRIV_KEY_INFO
-object, representing an ASN.1 PrivateKeyInfo structure
-defined in RFC 5208 section 5.
+object, representing an ASN.1
+.Vt PrivateKeyInfo
+structure defined in RFC 5208 section 5.
It can hold a private key together with information about the
algorithm to be used with it and optional attributes.
.Pp
diff --git a/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3 b/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3
index 3200b85fb42..888859b1e6a 100644
--- a/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3
+++ b/lib/libcrypto/man/PKEY_USAGE_PERIOD_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.2 2016/12/24 08:19:04 jmc Exp $
+.\" $OpenBSD: PKEY_USAGE_PERIOD_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PKEY_USAGE_PERIOD_NEW 3
.Os
.Sh NAME
@@ -31,8 +31,9 @@
.Fn PKEY_USAGE_PERIOD_new
allocates and initializes an empty
.Vt PKEY_USAGE_PERIOD
-object, representing an ASN.1 PrivateKeyUsagePeriod structure
-defined in RFC 3280 section 4.2.1.4.
+object, representing an ASN.1
+.Vt PrivateKeyUsagePeriod
+structure defined in RFC 3280 section 4.2.1.4.
It could be used in
.Vt X509
certificates to specify a validity period for the private key
@@ -59,7 +60,8 @@ Certificate Revocation List (CRL) Profile,
section 4.2.1.4: Private Key Usage Period
.Pp
RFC 3280 was obsoleted by RFC 5280, which says: "Section 4.2.1.4
-in RFC 3280, which specified the PrivateKeyUsagePeriod certificate
-extension but deprecated its use, was removed.
+in RFC 3280, which specified the
+.Vt PrivateKeyUsagePeriod
+certificate extension but deprecated its use, was removed.
Use of this ISO standard extension is neither deprecated
nor recommended for use in the Internet PKI."
diff --git a/lib/libcrypto/man/POLICYINFO_new.3 b/lib/libcrypto/man/POLICYINFO_new.3
index a76385fc6b7..ea225a2d034 100644
--- a/lib/libcrypto/man/POLICYINFO_new.3
+++ b/lib/libcrypto/man/POLICYINFO_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: POLICYINFO_new.3,v 1.1 2016/12/23 18:50:23 schwarze Exp $
+.\" $OpenBSD: POLICYINFO_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt POLICYINFO_NEW 3
.Os
.Sh NAME
@@ -70,8 +70,9 @@ restrictions on their intended use.
.Fn POLICYINFO_new
allocates and initializes an empty
.Vt POLICYINFO
-object, representing an ASN.1 PolicyInformation structure
-defined in RFC 5280 section 4.2.1.4.
+object, representing an ASN.1
+.Vt PolicyInformation
+structure defined in RFC 5280 section 4.2.1.4.
It can hold a policy identifier and optional advisory qualifiers.
.Fn POLICYINFO_free
frees
@@ -94,8 +95,9 @@ frees
.Fn POLICYQUALINFO_new
allocates and initializes an empty
.Vt POLICYQUALINFO
-object, representing an ASN.1 PolicyQualifierInfo structure
-defined in RFC 5280 section 4.2.1.4.
+object, representing an ASN.1
+.Vt PolicyQualifierInfo
+structure defined in RFC 5280 section 4.2.1.4.
It can be used in
.Vt POLICYINFO
and it can hold either a uniform resource identifier of a certification
@@ -109,8 +111,9 @@ frees
.Fn USERNOTICE_new
allocates and initializes an empty
.Vt USERNOTICE
-object, representing an ASN.1 UserNotice structure
-defined in RFC 5280 section 4.2.1.4.
+object, representing an ASN.1
+.Vt UserNotice
+structure defined in RFC 5280 section 4.2.1.4.
It can be used in
.Vt POLICYQUALINFO
and it can hold either an
@@ -125,8 +128,9 @@ frees
.Fn NOTICEREF_new
allocates and initializes an empty
.Vt NOTICEREF
-object, representing an ASN.1 NoticeReference structure
-defined in RFC 5280 section 4.2.1.4.
+object, representing an ASN.1
+.Vt NoticeReference
+structure defined in RFC 5280 section 4.2.1.4.
It can be used in
.Vt USERNOTICE
and can hold an organization name and a stack of notice numbers.
@@ -137,8 +141,9 @@ frees
.Fn POLICY_MAPPING_new
allocates and initializes an empty
.Vt POLICY_MAPPING
-object, representing an ASN.1 PolicyMappings structure
-defined in RFC 5280 section 4.2.1.5.
+object, representing an ASN.1
+.Vt PolicyMappings
+structure defined in RFC 5280 section 4.2.1.5.
It can be used in
.Vt X509
CA certificates and can hold a list of pairs of policy identifiers,
@@ -151,8 +156,9 @@ frees
.Fn POLICY_CONSTRAINTS_new
allocates and initializes an empty
.Vt POLICY_CONSTRAINTS
-object, representing an ASN.1 PolicyConstraints structure
-defined in RFC 5280 section 4.2.1.11.
+object, representing an ASN.1
+.Vt PolicyConstraints
+structure defined in RFC 5280 section 4.2.1.11.
It can be used in
.Vt X509
CA certificates to restrict policy mapping and/or to require explicit
diff --git a/lib/libcrypto/man/PROXY_POLICY_new.3 b/lib/libcrypto/man/PROXY_POLICY_new.3
index eb4e963033d..387ee3fb7fb 100644
--- a/lib/libcrypto/man/PROXY_POLICY_new.3
+++ b/lib/libcrypto/man/PROXY_POLICY_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: PROXY_POLICY_new.3,v 1.1 2016/12/23 23:19:57 schwarze Exp $
+.\" $OpenBSD: PROXY_POLICY_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 23 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt PROXY_POLICY_NEW 3
.Os
.Sh NAME
@@ -43,8 +43,9 @@ privileges on behalf of the subject of the original certificate.
.Fn PROXY_POLICY_new
allocates and initializes an empty
.Vt PROXY_POLICY
-object, representing an ASN.1 ProxyPolicy structure
-defined in RFC 3820 section 3.8.
+object, representing an ASN.1
+.Vt ProxyPolicy
+structure defined in RFC 3820 section 3.8.
It defines which privileges are to be delegated.
.Fn PROXY_POLICY_free
frees
@@ -53,8 +54,9 @@ frees
.Fn PROXY_CERT_INFO_EXTENSION_new
allocates and initializes an empty
.Vt PROXY_CERT_INFO_EXTENSION
-object, representing an ASN.1 ProxyCertInfo structure
-defined in RFC 3820 section 3.8.
+object, representing an ASN.1
+.Vt ProxyCertInfo
+structure defined in RFC 3820 section 3.8.
It can contain a
.Vt PROXY_POLICY
object, and it can additionally restrict the maximum depth of the
diff --git a/lib/libcrypto/man/RSA_PSS_PARAMS_new.3 b/lib/libcrypto/man/RSA_PSS_PARAMS_new.3
index 8d6817b8bd4..25a1c25ed32 100644
--- a/lib/libcrypto/man/RSA_PSS_PARAMS_new.3
+++ b/lib/libcrypto/man/RSA_PSS_PARAMS_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.1 2016/12/13 20:41:35 schwarze Exp $
+.\" $OpenBSD: RSA_PSS_PARAMS_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 13 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt RSA_PSS_PARAMS_NEW 3
.Os
.Sh NAME
@@ -31,8 +31,9 @@
.Fn RSA_PSS_PARAMS_new
allocates and initializes an empty
.Vt RSA_PSS_PARAMS
-object, representing an ASN.1 RSASSA-PSS-params structure
-defined in RFC 8017 appendix A.2.3.
+object, representing an ASN.1
+.Vt RSASSA-PSS-params
+structure defined in RFC 8017 appendix A.2.3.
It references the hash function and the mask generation function
and stores the length of the salt and the trailer field number.
.Fn RSA_PSS_PARAMS_free
diff --git a/lib/libcrypto/man/TS_REQ_new.3 b/lib/libcrypto/man/TS_REQ_new.3
index d1a0e90f214..35da9484361 100644
--- a/lib/libcrypto/man/TS_REQ_new.3
+++ b/lib/libcrypto/man/TS_REQ_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: TS_REQ_new.3,v 1.3 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: TS_REQ_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt TS_REQ_NEW 3
.Os
.Sh NAME
@@ -67,8 +67,9 @@ which returns time-stamp tokens to the clients.
.Fn TS_REQ_new
allocates and initializes an empty
.Vt TS_REQ
-object, representing an ASN.1 TimeStampReq structure
-defined in RFC 3161 section 2.4.1.
+object, representing an ASN.1
+.Vt TimeStampReq
+structure defined in RFC 3161 section 2.4.1.
It can hold a hash of the datum to be time-stamped and some
auxiliary, optional information.
.Fn TS_REQ_free
@@ -78,8 +79,9 @@ frees
.Fn TS_RESP_new
allocates and initializes an empty
.Vt TS_RESP
-object, representing an ASN.1 TimeStampResp structure
-defined in RFC 3161 section 2.4.2.
+object, representing an ASN.1
+.Vt TimeStampResp
+structure defined in RFC 3161 section 2.4.2.
It can hold status information and a time-stamp token.
.Fn TS_RESP_free
frees
@@ -88,8 +90,9 @@ frees
.Fn TS_STATUS_INFO_new
allocates and initializes an empty
.Vt TS_STATUS_INFO
-object, representing an ASN.1 PKIStatusInfo structure
-defined in RFC 3161 section 2.4.2.
+object, representing an ASN.1
+.Vt PKIStatusInfo
+structure defined in RFC 3161 section 2.4.2.
It is used inside
.Vt TS_RESP
and describes the outcome of one time-stamp request.
@@ -100,8 +103,9 @@ frees
.Fn TS_TST_INFO_new
allocates and initializes an empty
.Vt TS_TST_INFO
-object, representing an ASN.1 TSTInfo structure
-defined in RFC 3161 section 2.4.2.
+object, representing an ASN.1
+.Vt TSTInfo
+structure defined in RFC 3161 section 2.4.2.
It is the time-stamp token included in a
.Vt TS_RESP
object in case of success, and it can hold the hash of the datum
@@ -114,8 +118,9 @@ frees
.Fn TS_ACCURACY_new
allocates and initializes an empty
.Vt TS_ACCURACY
-object, representing an ASN.1 Accuracy structure
-defined in RFC 3161 section 2.4.2.
+object, representing an ASN.1
+.Vt Accuracy
+structure defined in RFC 3161 section 2.4.2.
It can be used inside a
.Vt TS_TST_INFO
object and indicates the maximum error of the time stated in the token.
@@ -126,8 +131,9 @@ frees
.Fn TS_MSG_IMPRINT_new
allocates and initializes an empty
.Vt TS_MSG_IMPRINT
-object, representing an ASN.1 MessageImprint structure
-defined in RFC 3161 section 2.4.1.
+object, representing an ASN.1
+.Vt MessageImprint
+structure defined in RFC 3161 section 2.4.1.
It is used inside
.Vt TS_REQ
and
diff --git a/lib/libcrypto/man/X509_ALGOR_dup.3 b/lib/libcrypto/man/X509_ALGOR_dup.3
index 7a46b372c29..b1a28e11ba0 100644
--- a/lib/libcrypto/man/X509_ALGOR_dup.3
+++ b/lib/libcrypto/man/X509_ALGOR_dup.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_ALGOR_dup.3,v 1.4 2016/12/15 23:29:38 jmc Exp $
+.\" $OpenBSD: X509_ALGOR_dup.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 4692340e Jun 7 15:49:08 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 15 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_ALGOR_DUP 3
.Os
.Sh NAME
@@ -115,8 +115,9 @@
.Fn X509_ALGOR_new
allocates and initializes an empty
.Vt X509_ALGOR
-object, representing an ASN.1 AlgorithmIdentifier structure
-defined in RFC 5280 section 4.1.1.2.
+object, representing an ASN.1
+.Vt AlgorithmIdentifier
+structure defined in RFC 5280 section 4.1.1.2.
Such objects can specify a cryptographic algorithm together
with algorithm-specific parameters.
They are used by many other objects, for example certificates,
diff --git a/lib/libcrypto/man/X509_CINF_new.3 b/lib/libcrypto/man/X509_CINF_new.3
index fdfc4c8c7b5..7ac86b6d36a 100644
--- a/lib/libcrypto/man/X509_CINF_new.3
+++ b/lib/libcrypto/man/X509_CINF_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_CINF_new.3,v 1.1 2016/12/16 09:17:59 schwarze Exp $
+.\" $OpenBSD: X509_CINF_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 16 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_CINF_NEW 3
.Os
.Sh NAME
@@ -43,8 +43,9 @@
.Fn X509_CINF_new
allocates and initializes an empty
.Vt X509_CINF
-object, representing an ASN.1 TBSCertificate structure
-defined in RFC 5280 section 4.1.
+object, representing an ASN.1
+.Vt TBSCertificate
+structure defined in RFC 5280 section 4.1.
It is used inside the
.Vt X509
object and holds the main information contained in the X.509
@@ -57,8 +58,9 @@ frees
.Fn X509_VAL_new
allocates and initializes an empty
.Vt X509_VAL
-object, representing an ASN.1 Validity structure
-defined in RFC 5280 section 4.1.
+object, representing an ASN.1
+.Vt Validity
+structure defined in RFC 5280 section 4.1.
It is used inside the
.Vt X509_CINF
object and holds the validity period of the certificate.
diff --git a/lib/libcrypto/man/X509_CRL_new.3 b/lib/libcrypto/man/X509_CRL_new.3
index 03a0caa5beb..2f35b100cb5 100644
--- a/lib/libcrypto/man/X509_CRL_new.3
+++ b/lib/libcrypto/man/X509_CRL_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_CRL_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: X509_CRL_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_CRL_NEW 3
.Os
.Sh NAME
@@ -37,8 +37,9 @@
.Fn X509_CRL_new
allocates and initializes an empty
.Vt X509_CRL
-object, representing an ASN.1 CertificateList structure
-defined in RFC 5280 section 5.1.
+object, representing an ASN.1
+.Vt CertificateList
+structure defined in RFC 5280 section 5.1.
It can hold a pointer to an
.Vt X509_CRL_INFO
object discussed below together with a cryptographic signature
@@ -50,8 +51,9 @@ frees
.Fn X509_CRL_INFO_new
allocates and initializes an empty
.Vt X509_CRL_INFO
-object, representing an ASN.1 TBSCertList structure
-defined in RFC 5280 section 5.1.
+object, representing an ASN.1
+.Vt TBSCertList
+structure defined in RFC 5280 section 5.1.
It is used inside the
.Vt X509_CRL
object and can hold a list of revoked certificates, an issuer name,
diff --git a/lib/libcrypto/man/X509_EXTENSION_set_object.3 b/lib/libcrypto/man/X509_EXTENSION_set_object.3
index b9a33ce137a..850be6e66b8 100644
--- a/lib/libcrypto/man/X509_EXTENSION_set_object.3
+++ b/lib/libcrypto/man/X509_EXTENSION_set_object.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.4 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: X509_EXTENSION_set_object.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_EXTENSION_SET_OBJECT 3
.Os
.Sh NAME
@@ -131,8 +131,9 @@
.Fn X509_EXTENSION_new
allocates and initializes an empty
.Vt X509_EXTENSION
-object, representing an ASN.1 Extension structure
-defined in RFC 5280 section 4.1.
+object, representing an ASN.1
+.Vt Extension
+structure defined in RFC 5280 section 4.1.
It is a wrapper object around specific extension objects of different
types and stores an extension type identifier and a criticality
flag in addition to the DER-encoded form of the wrapped object.
diff --git a/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 b/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3
index bfd4fb25368..e11a4b77082 100644
--- a/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3
+++ b/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.5 2016/12/14 21:22:06 jmc Exp $
+.\" $OpenBSD: X509_NAME_ENTRY_get_object.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NAME_ENTRY_GET_OBJECT 3
.Os
.Sh NAME
@@ -134,9 +134,12 @@
.Fa "int len"
.Fc
.Sh DESCRIPTION
-An X.501 RelativeDistinguishedName is a set of field type and
-value pairs.
-It is the building block for constructing X.501 Name objects.
+An X.501
+.Vt RelativeDistinguishedName
+is a set of field type and value pairs.
+It is the building block for constructing X.501
+.Vt Name
+objects.
This implementation only supports sets with one element, so an
.Vt X509_NAME_ENTRY
object contains only one field type and one value.
@@ -144,8 +147,9 @@ object contains only one field type and one value.
.Fn X509_NAME_ENTRY_new
allocates and initializes an empty
.Vt X509_NAME_ENTRY
-object, representing an ASN.1 RelativeDistinguishedName structure
-defined in RFC 5280 section 4.1.2.4.
+object, representing an ASN.1
+.Vt RelativeDistinguishedName
+structure defined in RFC 5280 section 4.1.2.4.
.Pp
.Fn X509_NAME_ENTRY_free
frees
diff --git a/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 b/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3
index 6260e5f3455..50e23829bdd 100644
--- a/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3
+++ b/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $
+.\" $OpenBSD: X509_NAME_add_entry_by_txt.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NAME_ADD_ENTRY_BY_TXT 3
.Os
.Sh NAME
@@ -197,7 +197,9 @@ can be set to -1 and
to 0.
This adds a new entry to the end of
.Fa name
-as a single valued RelativeDistinguishedName (RDN).
+as a single valued
+.Vt RelativeDistinguishedName
+(RDN).
.Pp
.Fa loc
actually determines the index where the new entry is inserted:
diff --git a/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 b/lib/libcrypto/man/X509_NAME_get_index_by_NID.3
index 6da06618312..b6571ccc1d8 100644
--- a/lib/libcrypto/man/X509_NAME_get_index_by_NID.3
+++ b/lib/libcrypto/man/X509_NAME_get_index_by_NID.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $
+.\" $OpenBSD: X509_NAME_get_index_by_NID.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NAME_GET_INDEX_BY_NID 3
.Os
.Sh NAME
@@ -103,8 +103,8 @@ These functions allow an
structure to be examined.
The
.Vt X509_NAME
-structure is the same as the
-.Sy Name
+structure is the same as the ASN.1
+.Vt Name
type defined in RFC 2459 (and elsewhere) and used, for example,
in certificate subject and issuer names.
.Pp
@@ -235,7 +235,10 @@ are legacy functions which have various limitations which make them of
minimal use in practice.
They can only find the first matching entry and will copy the contents
of the field verbatim: this can be highly confusing if the target is a
-multicharacter string type like a BMPString or a UTF8String.
+multicharacter string type like a
+.Vt BMPString
+or a
+.Vt UTF8String .
.Pp
For a more general solution,
.Fn X509_NAME_get_index_by_NID
diff --git a/lib/libcrypto/man/X509_NAME_new.3 b/lib/libcrypto/man/X509_NAME_new.3
index 56666351987..c4efab77849 100644
--- a/lib/libcrypto/man/X509_NAME_new.3
+++ b/lib/libcrypto/man/X509_NAME_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_NAME_new.3,v 1.2 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: X509_NAME_new.3,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NAME_NEW 3
.Os
.Sh NAME
@@ -31,12 +31,16 @@
.Ft void
.Fn X509_NAME_free "X509_NAME *name"
.Sh DESCRIPTION
-An X.501 Name is an ordered sequence of relative distinguished names.
+An X.501
+.Vt Name
+is an ordered sequence of relative distinguished names.
A relative distinguished name is a set of key-value pairs; see
.Xr X509_NAME_ENTRY_new 3
for details.
.Pp
-Various X.509 structures contain X.501 Name substructures.
+Various X.509 structures contain X.501
+.Vt Name
+substructures.
They are for example used for the issuers of certificates and
certificate revocation lists and for the subjects of certificates
and certificate requests.
@@ -44,8 +48,9 @@ and certificate requests.
.Fn X509_NAME_new
allocates and initializes an empty
.Vt X509_NAME
-object, representing an ASN.1 Name structure
-defined in RFC 5280 section 4.1.2.4.
+object, representing an ASN.1
+.Vt Name
+structure defined in RFC 5280 section 4.1.2.4.
Data can be added to such objects with the functions described in
.Xr X509_NAME_add_entry_by_txt 3 ,
and they can be inspected with the functions described in
diff --git a/lib/libcrypto/man/X509_NAME_print_ex.3 b/lib/libcrypto/man/X509_NAME_print_ex.3
index 0e3ef112842..1342a200adc 100644
--- a/lib/libcrypto/man/X509_NAME_print_ex.3
+++ b/lib/libcrypto/man/X509_NAME_print_ex.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_NAME_print_ex.3,v 1.5 2016/12/14 16:20:28 schwarze Exp $
+.\" $OpenBSD: X509_NAME_print_ex.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL aebb9aac Jul 19 09:27:53 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NAME_PRINT_EX 3
.Os
.Sh NAME
@@ -174,8 +174,8 @@ and
.Dv XN_FLAG_SEP_MULTILINE
determine the field separators to use.
Two distinct separators are used between distinct
-RelativeDistinguishedName components and separate values in the same RDN
-for a multi-valued RDN.
+.Vt RelativeDistinguishedName
+components and separate values in the same RDN for a multi-valued RDN.
Multi-valued RDNs are currently very rare so the second separator
will hardly ever be used.
.Pp
diff --git a/lib/libcrypto/man/X509_PUBKEY_new.3 b/lib/libcrypto/man/X509_PUBKEY_new.3
index cd178a1ee0a..0475fe65b22 100644
--- a/lib/libcrypto/man/X509_PUBKEY_new.3
+++ b/lib/libcrypto/man/X509_PUBKEY_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_PUBKEY_new.3,v 1.3 2016/12/15 22:24:45 schwarze Exp $
+.\" $OpenBSD: X509_PUBKEY_new.3,v 1.4 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -48,7 +48,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 15 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_PUBKEY_NEW 3
.Os
.Sh NAME
@@ -133,9 +133,10 @@
.Sh DESCRIPTION
The
.Vt X509_PUBKEY
-structure represents the ASN.1 SubjectPublicKeyInfo structure defined
-in RFC 5280 section 4.1 and used in certificates and certificate
-requests.
+structure represents the ASN.1
+.Vt SubjectPublicKeyInfo
+structure defined in RFC 5280 section 4.1 and used in certificates
+and certificate requests.
.Pp
.Fn X509_PUBKEY_new
allocates and initializes an
@@ -179,7 +180,9 @@ and
.Fn i2d_PUBKEY
decode and encode an
.Vt EVP_PKEY
-structure using SubjectPublicKeyInfo format.
+structure using
+.Vt SubjectPublicKeyInfo
+format.
They otherwise follow the conventions of other ASN.1 functions such as
.Xr d2i_X509 3 .
.Pp
@@ -225,7 +228,9 @@ bytes at
.Pf * Fa pk ,
and
.Pf * Fa pa
-is set to the associated AlgorithmIdentifier for the public key.
+is set to the associated
+.Vt AlgorithmIdentifier
+for the public key.
If the value of any of these parameters is not required,
it can be set to
.Dv NULL .
diff --git a/lib/libcrypto/man/X509_REQ_new.3 b/lib/libcrypto/man/X509_REQ_new.3
index f4089ba2a21..76da1258989 100644
--- a/lib/libcrypto/man/X509_REQ_new.3
+++ b/lib/libcrypto/man/X509_REQ_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_REQ_new.3,v 1.1 2016/12/17 01:08:14 schwarze Exp $
+.\" $OpenBSD: X509_REQ_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 17 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_REQ_NEW 3
.Os
.Sh NAME
@@ -37,8 +37,9 @@
.Fn X509_REQ_new
allocates and initializes an empty
.Vt X509_REQ
-object, representing an ASN.1 CertificationRequest structure
-defined in RFC 2986 section 4.2.
+object, representing an ASN.1
+.Vt CertificationRequest
+structure defined in RFC 2986 section 4.2.
It can hold a pointer to an
.Vt X509_REQ_INFO
object discussed below together with a cryptographic signature and
@@ -50,8 +51,9 @@ frees
.Fn X509_REQ_INFO_new
allocates and initializes an empty
.Vt X509_REQ_INFO
-object, representing an ASN.1 CertificationRequestInfo structure
-defined in RFC 2986 section 4.1.
+object, representing an ASN.1
+.Vt CertificationRequestInfo
+structure defined in RFC 2986 section 4.1.
It is used inside the
.Vt X509_REQ
object and can hold the subject and the public key of the requested
diff --git a/lib/libcrypto/man/X509_REVOKED_new.3 b/lib/libcrypto/man/X509_REVOKED_new.3
index 2303f9caf20..f06075fcc22 100644
--- a/lib/libcrypto/man/X509_REVOKED_new.3
+++ b/lib/libcrypto/man/X509_REVOKED_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_REVOKED_new.3,v 1.1 2016/12/16 14:50:58 schwarze Exp $
+.\" $OpenBSD: X509_REVOKED_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL X509_CRL_get0_by_serial.pod 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" This file is a derived work.
@@ -65,7 +65,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 16 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_REVOKED_NEW 3
.Os
.Sh NAME
@@ -95,8 +95,9 @@
allocates and initializes an empty
.Vt X509_REVOKED
object, representing one of the elements of
-the revokedCertificates field of the ASN.1 TBSCertList structure
-defined in RFC 5280 section 5.1.
+the revokedCertificates field of the ASN.1
+.Vt TBSCertList
+structure defined in RFC 5280 section 5.1.
It is used by
.Vt X509_CRL
objects and can hold information about one revoked certificate
diff --git a/lib/libcrypto/man/X509_SIG_new.3 b/lib/libcrypto/man/X509_SIG_new.3
index e4ad5b0085b..6d41ababc6d 100644
--- a/lib/libcrypto/man/X509_SIG_new.3
+++ b/lib/libcrypto/man/X509_SIG_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_SIG_new.3,v 1.1 2016/12/22 14:06:51 schwarze Exp $
+.\" $OpenBSD: X509_SIG_new.3,v 1.2 2016/12/25 22:15:10 schwarze Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 22 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_SIG_NEW 3
.Os
.Sh NAME
@@ -31,8 +31,10 @@
.Fn X509_SIG_new
allocates and initializes an empty
.Vt X509_SIG
-object, representing an ASN.1 DigestInfo structure defined
-in RFC 2315 section 9.4 and equivalently in RFC 8017 section 9.2.
+object, representing an ASN.1
+.Vt DigestInfo
+structure defined in RFC 2315 section 9.4
+and equivalently in RFC 8017 section 9.2.
It can hold a message digest together with information about
the algorithm used.
.Pp
diff --git a/lib/libcrypto/man/X509_STORE_CTX_get_error.3 b/lib/libcrypto/man/X509_STORE_CTX_get_error.3
index 2f0924c209a..3a871ef3075 100644
--- a/lib/libcrypto/man/X509_STORE_CTX_get_error.3
+++ b/lib/libcrypto/man/X509_STORE_CTX_get_error.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.4 2016/12/05 13:38:05 schwarze Exp $
+.\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 5 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_STORE_CTX_GET_ERROR 3
.Os
.Sh NAME
@@ -202,7 +202,9 @@ expected value.
Unused.
.It Dv X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY : \
No unable to decode issuer public key
-The public key in the certificate SubjectPublicKeyInfo could not be read.
+The public key in the certificate
+.Vt SubjectPublicKeyInfo
+could not be read.
.It Dv X509_V_ERR_CERT_SIGNATURE_FAILURE : No certificate signature failure
The signature of the certificate is invalid.
.It Dv X509_V_ERR_CRL_SIGNATURE_FAILURE : No CRL signature failure
diff --git a/lib/libcrypto/man/X509_new.3 b/lib/libcrypto/man/X509_new.3
index 1294ae3edd6..dbf82bc9742 100644
--- a/lib/libcrypto/man/X509_new.3
+++ b/lib/libcrypto/man/X509_new.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_new.3,v 1.9 2016/12/24 01:29:40 schwarze Exp $
+.\" $OpenBSD: X509_new.3,v 1.10 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 3a59ad98 Dec 11 00:36:06 2015 +0000
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -48,7 +48,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 24 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509_NEW 3
.Os
.Sh NAME
@@ -73,8 +73,9 @@
allocates and initializes an empty
.Vt X509
object with reference count 1.
-It represents an ASN.1 Certificate structure
-defined in RFC 5280 section 4.1.
+It represents an ASN.1
+.Vt Certificate
+structure defined in RFC 5280 section 4.1.
It can hold a public key together with information about the person,
organization, device, or function the associated private key belongs to.
.Pp
diff --git a/lib/libcrypto/man/d2i_RSAPublicKey.3 b/lib/libcrypto/man/d2i_RSAPublicKey.3
index 6f51229ec74..22d904157ff 100644
--- a/lib/libcrypto/man/d2i_RSAPublicKey.3
+++ b/lib/libcrypto/man/d2i_RSAPublicKey.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: d2i_RSAPublicKey.3,v 1.5 2016/12/11 12:21:48 schwarze Exp $
+.\" $OpenBSD: d2i_RSAPublicKey.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL bb9ad09e Jun 6 00:43:05 2016 -0400
.\"
.\" This file was written by Ulf Moeller <ulf@openssl.org> and
@@ -50,7 +50,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 11 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt D2I_RSAPUBLICKEY 3
.Os
.Sh NAME
@@ -140,12 +140,15 @@
.Fn d2i_RSAPublicKey
and
.Fn i2d_RSAPublicKey
-decode and encode a PKCS#1 RSAPublicKey structure.
+decode and encode a PKCS#1
+.Vt RSAPublicKey
+structure.
.Pp
.Fn d2i_RSA_PUBKEY
and
.Fn i2d_RSA_PUBKEY
-decode and encode an RSA public key using a SubjectPublicKeyInfo
+decode and encode an RSA public key using an ASN.1
+.Vt SubjectPublicKeyInfo
(certificate public key) structure.
.Pp
.Fn d2i_RSA_PUBKEY_bio ,
@@ -165,7 +168,9 @@ pointer.
.Pp
.Fn d2i_RSAPrivateKey ,
.Fn i2d_RSAPrivateKey
-decode and encode a PKCS#1 RSAPrivateKey structure.
+decode and encode a PKCS#1
+.Vt RSAPrivateKey
+structure.
.Pp
.Fn d2i_Netscape_RSA ,
.Fn i2d_Netscape_RSA
diff --git a/lib/libcrypto/man/d2i_X509_ALGOR.3 b/lib/libcrypto/man/d2i_X509_ALGOR.3
index 858396f5fe1..7514e5fac5f 100644
--- a/lib/libcrypto/man/d2i_X509_ALGOR.3
+++ b/lib/libcrypto/man/d2i_X509_ALGOR.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: d2i_X509_ALGOR.3,v 1.5 2016/12/15 22:09:22 schwarze Exp $
+.\" $OpenBSD: d2i_X509_ALGOR.3,v 1.6 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 186bb907 Apr 13 11:05:13 2015 -0700
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -48,7 +48,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 15 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt D2I_X509_ALGOR 3
.Os
.Sh NAME
@@ -71,8 +71,8 @@
.Sh DESCRIPTION
These functions decode and encode an
.Vt X509_ALGOR
-structure which is equivalent to the
-.Sy AlgorithmIdentifier
+structure which is equivalent to the ASN.1
+.Vt AlgorithmIdentifier
structure.
They otherwise behave in a way similar to
.Xr d2i_X509 3
diff --git a/lib/libcrypto/man/d2i_X509_NAME.3 b/lib/libcrypto/man/d2i_X509_NAME.3
index 0dacb648c75..d3c085784e2 100644
--- a/lib/libcrypto/man/d2i_X509_NAME.3
+++ b/lib/libcrypto/man/d2i_X509_NAME.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: d2i_X509_NAME.3,v 1.6 2016/12/14 17:26:35 schwarze Exp $
+.\" $OpenBSD: d2i_X509_NAME.3,v 1.7 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL d900a015 Oct 8 14:40:42 2015 +0200
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
@@ -15,7 +15,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 14 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt D2I_X509_NAME 3
.Os
.Sh NAME
@@ -67,7 +67,9 @@ decodes
.Fa length
bytes of the DER-encoded string
.Pf * Fa in
-and stores the resulting Name object in
+and stores the resulting
+.Vt Name
+object in
.Pf * Fa name .
.Pp
.Fn i2d_X509_NAME
@@ -89,7 +91,9 @@ decodes
.Fa length
bytes of the DER-encoded string
.Pf * Fa in
-and stores the resulting RelativeDistinguishedName object in
+and stores the resulting
+.Vt RelativeDistinguishedName
+object in
.Pf * Fa ne .
.Pp
.Fn i2d_X509_NAME_ENTRY
diff --git a/lib/libcrypto/man/d2i_X509_SIG.3 b/lib/libcrypto/man/d2i_X509_SIG.3
index 8466ccfe7f2..33676b6df0a 100644
--- a/lib/libcrypto/man/d2i_X509_SIG.3
+++ b/lib/libcrypto/man/d2i_X509_SIG.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: d2i_X509_SIG.3,v 1.4 2016/12/08 20:22:08 jmc Exp $
+.\" $OpenBSD: d2i_X509_SIG.3,v 1.5 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -48,7 +48,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 8 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt D2I_X509_SIG 3
.Os
.Sh NAME
@@ -72,7 +72,7 @@
These functions decode and encode an
.Vt X509_SIG
structure, which is equivalent to the
-.Sy DigestInfo
+.Vt DigestInfo
structure defined in PKCS#1 and PKCS#7.
They otherwise behave in a way similar to
.Xr d2i_X509 3
diff --git a/lib/libcrypto/man/x509v3.cnf.5 b/lib/libcrypto/man/x509v3.cnf.5
index 1fd4c0cc9f5..19608697e36 100644
--- a/lib/libcrypto/man/x509v3.cnf.5
+++ b/lib/libcrypto/man/x509v3.cnf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: x509v3.cnf.5,v 1.2 2016/12/12 22:02:55 jmc Exp $
+.\" $OpenBSD: x509v3.cnf.5,v 1.3 2016/12/25 22:15:10 schwarze Exp $
.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: December 12 2016 $
+.Dd $Mdocdate: December 25 2016 $
.Dt X509V3.CNF 5
.Os
.Sh NAME
@@ -530,8 +530,11 @@ The
option changes the type of the
.Ic organization
field.
-In RFC 2459, it can only be of type DisplayText.
-In RFC 3280, IA5Strring is also permissible.
+In RFC 2459, it can only be of type
+.Vt DisplayText .
+In RFC 3280,
+.Vt IA5String
+is also permissible.
Some software (for example some versions of MSIE) may require
.Ic ia5org .
.Ss Policy constraints