=head1 NAME
-CT_POLICY_EVAL_CTX -
+CT_POLICY_EVAL_CTX_new, CT_POLICY_EVAL_CTX_free,
+CT_POLICY_EVAL_CTX_get0_cert, CT_POLICY_EVAL_CTX_set0_cert,
+CT_POLICY_EVAL_CTX_get0_issuer, CT_POLICY_EVAL_CTX_set0_issuer,
+CT_POLICY_EVAL_CTX_get0_log_store, CT_POLICY_EVAL_CTX_set0_log_store -
Encapsulates the data required to evaluate whether SCTs meet a Certificate Transparency policy
=head1 SYNOPSIS
The above requirements are met using the setters described below.
-B<CT_POLICY_EVAL_CTX_new>() creates an empty policy evaluation context. This
+CT_POLICY_EVAL_CTX_new() creates an empty policy evaluation context. This
should then be populated using:
=over
-=item * B<CT_POLICY_EVAL_CTX_set0_cert>() to provide the certificate the SCTs were issued for
+=item * CT_POLICY_EVAL_CTX_set0_cert() to provide the certificate the SCTs were issued for
-=item * B<CT_POLICY_EVAL_CTX_set0_issuer>() to provide the issuer certificate
+=item * CT_POLICY_EVAL_CTX_set0_issuer() to provide the issuer certificate
-=item * B<CT_POLICY_EVAL_CTX_set0_log_store>() to provide a list of logs that are trusted as sources of SCTs
+=item * CT_POLICY_EVAL_CTX_set0_log_store() to provide a list of logs that are trusted as sources of SCTs
=back
The getters do not transfer ownership either.
When no longer required, the B<CT_POLICY_EVAL_CTX> should be passed to
-B<CT_POLICY_EVAL_CTX_free>() to delete it.
+CT_POLICY_EVAL_CTX_free() to delete it.
=head1 NOTES
=head1 RETURN VALUES
-B<CT_POLICY_EVAL_CTX_new>() will return NULL if malloc fails.
+CT_POLICY_EVAL_CTX_new() will return NULL if malloc fails.
=head1 SEE ALSO
in the file LICENSE in the source distribution or at
L<https://www.openssl.org/source/license.html>.
-=cut
\ No newline at end of file
+=cut