diff options
author | Ingo Schwarze <schwarze@cvs.openbsd.org> | 2016-12-23 17:41:30 +0000 |
---|---|---|
committer | Ingo Schwarze <schwarze@cvs.openbsd.org> | 2016-12-23 17:41:30 +0000 |
commit | 10666c9bee4981983623dcc25420af13c3136667 (patch) | |
tree | d5badf4ef15570597a71a3fb9f3d59244a220358 /lib/libcrypto | |
parent | a602748f863cf4b12364d46ec9e520f37f9b7447 (diff) |
Write new NAME_CONSTRAINTS_new(3) manual page from scratch.
These functions are listed in <openssl/x509v3.h>
and in OpenSSL doc/man3/X509_dup.pod.
OpenSSL documentation specifies the wrong header file.
Diffstat (limited to 'lib/libcrypto')
-rw-r--r-- | lib/libcrypto/man/Makefile | 3 | ||||
-rw-r--r-- | lib/libcrypto/man/NAME_CONSTRAINTS_new.3 | 87 |
2 files changed, 89 insertions, 1 deletions
diff --git a/lib/libcrypto/man/Makefile b/lib/libcrypto/man/Makefile index 0aed9e0fadb..e715e8bf2d7 100644 --- a/lib/libcrypto/man/Makefile +++ b/lib/libcrypto/man/Makefile @@ -1,4 +1,4 @@ -# $OpenBSD: Makefile,v 1.93 2016/12/23 17:02:41 schwarze Exp $ +# $OpenBSD: Makefile,v 1.94 2016/12/23 17:41:29 schwarze Exp $ .include <bsd.own.mk> @@ -126,6 +126,7 @@ MAN= \ GENERAL_NAME_new.3 \ HMAC.3 \ MD5.3 \ + NAME_CONSTRAINTS_new.3 \ OBJ_nid2obj.3 \ OCSP_CRLID_new.3 \ OCSP_REQUEST_new.3 \ diff --git a/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 b/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 new file mode 100644 index 00000000000..1105bead0bf --- /dev/null +++ b/lib/libcrypto/man/NAME_CONSTRAINTS_new.3 @@ -0,0 +1,87 @@ +.\" $OpenBSD: NAME_CONSTRAINTS_new.3,v 1.1 2016/12/23 17:41:29 schwarze Exp $ +.\" +.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> +.\" +.\" Permission to use, copy, modify, and distribute this software for any +.\" purpose with or without fee is hereby granted, provided that the above +.\" copyright notice and this permission notice appear in all copies. +.\" +.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES +.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF +.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR +.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES +.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN +.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF +.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. +.\" +.Dd $Mdocdate: December 23 2016 $ +.Dt NAME_CONSTRAINTS_NEW 3 +.Os +.Sh NAME +.Nm NAME_CONSTRAINTS_new , +.Nm NAME_CONSTRAINTS_free , +.Nm GENERAL_SUBTREE_new , +.Nm GENERAL_SUBTREE_free +.Nd X.509 CA name constraints extension +.Sh SYNOPSIS +.In openssl/x509v3.h +.Ft NAME_CONSTRAINTS * +.Fn NAME_CONSTRAINTS_new void +.Ft void +.Fn NAME_CONSTRAINTS_free "NAME_CONSTRAINTS *names" +.Ft GENERAL_SUBTREE * +.Fn GENERAL_SUBTREE_new void +.Ft void +.Fn GENERAL_SUBTREE_free "GENERAL_SUBTREE *name" +.Sh DESCRIPTION +X.509 CA certificates can use the name constraints extension +to restrict the subject names of subsequent certificates in a +certification path. +.Pp +.Fn NAME_CONSTRAINTS_new +allocates and initializes an empty +.Vt NAME_CONSTRAINTS +object, representing an ASN.1 NameConstraints structure +defined in RFC 5280 section 4.2.1.10. +It consists of two +.Vt STACK_OF(GENERAL_SUBTREE) +objects, one specifying permitted names, the other excluded names. +.Fn NAME_CONSTRAINTS_free +frees +.Fa names . +.Pp +.Fn GENERAL_SUBTREE_new +allocates and initializes an empty +.Vt GENERAL_SUBTREE +object, representing an ASN.1 GeneralSubtree structure +defined in RFC 5280 section 4.2.1.10. +It is a trivial wrapper around the +.Vt GENERAL_NAME +object documented in +.Xr GENERAL_NAME_new 3 . +The standard requires the other fields of +.Vt GENERAL_SUBTREE +to be ignored. +.Fn GENERAL_SUBTREE_free +frees +.Fa name . +.Sh RETURN VALUES +.Fn NAME_CONSTRAINTS_new +and +.Fn GENERAL_SUBTREE_new +return the new +.Vt NAME_CONSTRAINTS +or +.Vt GENERAL_SUBTREE +object, respectively, or +.Dv NULL +if an error occurs. +.Sh SEE ALSO +.Xr BASIC_CONSTRAINTS_new 3 , +.Xr GENERAL_NAMES_new 3 , +.Xr X509_EXTENSION_new 3 , +.Xr X509_new 3 +.Sh STANDARDS +RFC 5280: Internet X.509 Public Key Infrastructure Certificate and +Certificate Revocation List (CRL) Profile, +section 4.2.1.10: Name Constraints |