diff options
author | Shane Lontis <shane.lontis@oracle.com> | 2021-03-31 15:10:22 +1000 |
---|---|---|
committer | Shane Lontis <shane.lontis@oracle.com> | 2021-04-08 11:30:44 +1000 |
commit | e6c2f96489fc0c006845c8597f8ceed2f01f76ee (patch) | |
tree | 87b519bbf7cf1a1966d44fbd70121e1ba77d550d /doc/man3/X509_dup.pod | |
parent | 09fba0b44032c2f66d5e7e8c732869e031ce74c8 (diff) | |
download | openssl-e6c2f96489fc0c006845c8597f8ceed2f01f76ee.zip openssl-e6c2f96489fc0c006845c8597f8ceed2f01f76ee.tar.gz openssl-e6c2f96489fc0c006845c8597f8ceed2f01f76ee.tar.bz2 |
Fix more certificate related lib_ctx settings.
Fixes #13732
Fix a few places that were not using the '_ex' variants of
ASN1_item_sign/verify.
Added X509_CRL_new_ex().
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14752)
Diffstat (limited to 'doc/man3/X509_dup.pod')
-rw-r--r-- | doc/man3/X509_dup.pod | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/doc/man3/X509_dup.pod b/doc/man3/X509_dup.pod index 66668d0..9629082 100644 --- a/doc/man3/X509_dup.pod +++ b/doc/man3/X509_dup.pod @@ -274,6 +274,7 @@ X509_CRL_INFO_free, X509_CRL_INFO_new, X509_CRL_dup, X509_CRL_free, +X509_CRL_new_ex, X509_CRL_new, X509_EXTENSION_dup, X509_EXTENSION_free, @@ -349,7 +350,8 @@ The object returned must be released by calling B<I<TYPE>_free>(). B<I<TYPE>_new_ex>() is similiar to B<I<TYPE>_new>() but also passes the library context I<libctx> and the property query I<propq> to use when retrieving -algorithms from providers. +algorithms from providers. This created object can then be used when loading +binary data using B<d2i_I<TYPE>>(). B<I<TYPE>_dup>() copies an existing object, leaving it untouched. @@ -371,8 +373,8 @@ B<I<TYPE>_print_ctx>() returns 1 on success or zero on failure. =head1 HISTORY -The functions PKCS7_new_ex() and CMS_ContentInfo_new_ex() were -added in OpenSSL 3.0. +The functions X509_REQ_new_ex(), X509_CRL_new_ex(), PKCS7_new_ex() and +CMS_ContentInfo_new_ex() were added in OpenSSL 3.0. The functions DSAparams_dup(), RSAPrivateKey_dup() and RSAPublicKey_dup() were deprecated in 3.0. |