summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-10-16 11:41:36 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-10-16 13:48:16 +0200
commitb0a5786f4a01900f2704db64be1323fb6771f331 (patch)
tree5e7e9a5a86931e152e7f331d88018575fb666fa2
parentf56541b06bf16744123580dc007447da9ea76110 (diff)
downloadgnutls-b0a5786f4a01900f2704db64be1323fb6771f331.tar.gz
doc update [ci skip]
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--lib/cert.c4
-rw-r--r--lib/ext/status_request.c20
2 files changed, 16 insertions, 8 deletions
diff --git a/lib/cert.c b/lib/cert.c
index 10a646c493..dbb8edf982 100644
--- a/lib/cert.c
+++ b/lib/cert.c
@@ -275,7 +275,7 @@ gnutls_certificate_server_set_request(gnutls_session_t session,
* by one of these CAs. These names, when available, are DER encoded. To get a more
* meaningful value use the function gnutls_x509_rdn_get().
*
- * @pk_algos contains a list with server's acceptable signature algorithms.
+ * @pk_algos contains a list with server's acceptable public key algorithms.
* The certificate returned should support the server's given algorithms.
*
* @st should contain the certificates and private keys.
@@ -321,7 +321,7 @@ void gnutls_certificate_set_retrieve_function
* by one of these CAs. These names, when available, are DER encoded. To get a more
* meaningful value use the function gnutls_x509_rdn_get().
*
- * @pk_algos contains a list with server's acceptable signature algorithms.
+ * @pk_algos contains a list with server's acceptable public key algorithms.
* The certificate returned should support the server's given algorithms.
*
* @pcert should contain a single certificate and public key or a list of them.
diff --git a/lib/ext/status_request.c b/lib/ext/status_request.c
index 41482de488..f07ca7d4b9 100644
--- a/lib/ext/status_request.c
+++ b/lib/ext/status_request.c
@@ -384,7 +384,7 @@ gnutls_status_request_ocsp_func ocsp_func, void *ptr)
* @ptr: opaque pointer passed to callback function
*
* This function is to be used by server to register a callback to
- * handle OCSP status requests that correspond to the indexed certificate
+ * provide OCSP status requests that correspond to the indexed certificate chain
* from the client. The callback will be invoked if the client supplied a
* status-request OCSP extension.
*
@@ -400,6 +400,12 @@ gnutls_status_request_ocsp_func ocsp_func, void *ptr)
* OCSP response. The response must be a value allocated using gnutls_malloc(),
* and will be deinitialized by the caller.
*
+ * Note: the ability to set multiple OCSP responses per credential
+ * structure via the index @idx was added in version 3.5.6. To keep
+ * backwards compatibility, it requires using gnutls_certificate_set_flags()
+ * with the %GNUTLS_CERTIFICATE_API_V2 flag to make the set certificate
+ * functions return an index usable by this function.
+ *
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned,
* otherwise a negative error code is returned.
*
@@ -447,8 +453,10 @@ static int file_ocsp_func(gnutls_session_t session, void *ptr,
* file accesses.
*
* Note: the ability to set multiple OCSP responses per credential
- * structure via @idx was added in version 3.5.6 with the
- * %GNUTLS_CERTIFICATE_API_V2 flag.
+ * structure via the index @idx was added in version 3.5.6. To keep
+ * backwards compatibility, it requires using gnutls_certificate_set_flags()
+ * with the %GNUTLS_CERTIFICATE_API_V2 flag to make the set certificate
+ * functions return an index usable by this function.
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned,
* otherwise a negative error code is returned.
@@ -456,9 +464,9 @@ static int file_ocsp_func(gnutls_session_t session, void *ptr,
* Since: 3.1.3
**/
int
-gnutls_certificate_set_ocsp_status_request_file
-(gnutls_certificate_credentials_t sc, const char *response_file,
- unsigned idx)
+gnutls_certificate_set_ocsp_status_request_file(gnutls_certificate_credentials_t sc,
+ const char *response_file,
+ unsigned idx)
{
if (idx >= sc->ncerts)
return gnutls_assert_val(GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE);