diff options
author | Matt Caswell <matt@openssl.org> | 2020-09-24 10:42:23 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2020-10-01 09:25:20 +0100 |
commit | d8652be06e2778e8898453a391deb7253e1a35a2 (patch) | |
tree | fe40e22edb39642aa7ae633320c1900388f2e7ee /doc/man3/X509_verify.pod | |
parent | aedac96c1172ca9a9efe72e027e935504b599e2f (diff) | |
download | openssl-new-d8652be06e2778e8898453a391deb7253e1a35a2.tar.gz |
Run the withlibctx.pl script
Automatically rename all instances of _with_libctx() to _ex() as per
our coding style.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12970)
Diffstat (limited to 'doc/man3/X509_verify.pod')
-rw-r--r-- | doc/man3/X509_verify.pod | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/man3/X509_verify.pod b/doc/man3/X509_verify.pod index 2c8fb0059e..15719090bb 100644 --- a/doc/man3/X509_verify.pod +++ b/doc/man3/X509_verify.pod @@ -3,7 +3,7 @@ =head1 NAME X509_verify, X509_self_signed, -X509_REQ_verify_with_libctx, X509_REQ_verify, +X509_REQ_verify_ex, X509_REQ_verify, X509_CRL_verify - verify certificate, certificate request, or CRL signature @@ -14,8 +14,8 @@ verify certificate, certificate request, or CRL signature int X509_verify(X509 *x, EVP_PKEY *pkey); int X509_self_signed(X509 *cert, int verify_signature); - int X509_REQ_verify_with_libctx(X509_REQ *a, EVP_PKEY *pkey, - OPENSSL_CTX *libctx, const char *propq); + int X509_REQ_verify_ex(X509_REQ *a, EVP_PKEY *pkey, OPENSSL_CTX *libctx, + const char *propq); int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r); int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r); @@ -31,13 +31,13 @@ authority key identifier (if present) must match the subject key identifier etc. The signature itself is actually verified only if B<verify_signature> is 1, as for explicitly trusted certificates this verification is not worth the effort. -X509_REQ_verify_with_libctx(), X509_REQ_verify() and X509_CRL_verify() +X509_REQ_verify_ex(), X509_REQ_verify() and X509_CRL_verify() verify the signatures of certificate requests and CRLs, respectively. =head1 RETURN VALUES X509_verify(), -X509_REQ_verify_with_libctx(), X509_REQ_verify() and X509_CRL_verify() +X509_REQ_verify_ex(), X509_REQ_verify() and X509_CRL_verify() return 1 if the signature is valid and 0 if the signature check fails. If the signature could not be checked at all because it was ill-formed or some other error occurred then -1 is returned. @@ -68,7 +68,7 @@ L<OPENSSL_CTX(3)> The X509_verify(), X509_REQ_verify(), and X509_CRL_verify() functions are available in all versions of OpenSSL. -X509_REQ_verify_with_libctx(), and X509_self_signed() were added in OpenSSL 3.0. +X509_REQ_verify_ex(), and X509_self_signed() were added in OpenSSL 3.0. =head1 COPYRIGHT |