From: Viktor Dukhovni Date: Sun, 22 Jun 2014 05:31:00 +0000 (-0400) Subject: More complete X509_check_host documentation. X-Git-Tag: master-post-reformat~680 X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff_plain;h=d241b804099ce28c053ba988eb5532b1a32dd51e More complete X509_check_host documentation. --- diff --git a/doc/crypto/X509_VERIFY_PARAM_set_flags.pod b/doc/crypto/X509_VERIFY_PARAM_set_flags.pod index 29f48bd978..7b1f294e89 100644 --- a/doc/crypto/X509_VERIFY_PARAM_set_flags.pod +++ b/doc/crypto/X509_VERIFY_PARAM_set_flags.pod @@ -2,7 +2,7 @@ =head1 NAME -X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters +X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies, X509_VERIFY_PARAM_set1_host, X509_VERIFY_PARAM_set_hostflags, X509_VERIFY_PARAM_set1_email, X509_VERIFY_PARAM_set1_ip, X509_VERIFY_PARAM_set1_ip_asc - X509 verification parameters =head1 SYNOPSIS @@ -204,7 +204,10 @@ connections associated with an B structure B: =head1 SEE ALSO -L +L, +L, +L, +L =head1 HISTORY diff --git a/doc/crypto/X509_check_host.pod b/doc/crypto/X509_check_host.pod index 7f6adf6424..001b845957 100644 --- a/doc/crypto/X509_check_host.pod +++ b/doc/crypto/X509_check_host.pod @@ -25,12 +25,18 @@ be checked by other means. X509_check_host() checks if the certificate matches the specified host name, which must be encoded in the preferred name syntax -described in section 3.5 of RFC 1034. The B argument must be -the number of characters in the name string or zero in which case the -length is calculated with strlen(name). When B starts with -a dot (e.g ".example.com"), it will be matched by a certificate -valid for any sub-domain of B, (see also -B below). +described in section 3.5 of RFC 1034. Per section 6.4.2 of RFC 6125, +B values representing international domain names must be given +in A-label form. The B argument must be the number of +characters in the name string or zero in which case the length is +calculated with strlen(name). When B starts with a dot (e.g +".example.com"), it will be matched by a certificate valid for any +sub-domain of B, (see also B +below). Applications are strongly advised to use +X509_VERIFY_PARAM_set1_host() in preference to explicitly calling +L, hostname checks are out of scope with the +DANE-EE(3) certificate usage, and the internal check will be +suppressed as appropriate when DANE support is added to OpenSSL. X509_check_email() checks if the certificate matches the specified email address. Only the mailbox syntax of RFC 822 is supported, @@ -101,7 +107,11 @@ X509_check_ip_asc() can also return -2 if the IP address string is malformed. =head1 SEE ALSO -L +L, +L, +L, +L, +L =head1 HISTORY