[openssl] master update
Dr. Paul Dale
pauli at openssl.org
Thu Feb 24 00:22:12 UTC 2022
The branch master has been updated
via cbb6f4dbf0ce42b4cc4385d7b95236710504068d (commit)
from 632e8be2b570959dc3781c6956171e7e49f1aa58 (commit)
- Log -----------------------------------------------------------------
commit cbb6f4dbf0ce42b4cc4385d7b95236710504068d
Author: Carlo Teubner <435950+c4rlo at users.noreply.github.com>
Date: Fri Feb 18 10:00:52 2022 +0000
X509_VERIFY_PARAM_set_flags.pod: fix typos
CLA: trivial
Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Paul Dale <pauli at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/17731)
-----------------------------------------------------------------------
Summary of changes:
doc/man3/X509_VERIFY_PARAM_set_flags.pod | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/man3/X509_VERIFY_PARAM_set_flags.pod b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
index 4437b93fd6..62ef00bc33 100644
--- a/doc/man3/X509_VERIFY_PARAM_set_flags.pod
+++ b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
@@ -249,8 +249,8 @@ certificate. An error occurs if a suitable CRL cannot be found.
B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate
chain.
-B<X509_V_FLAG_IGNORE_CRITICAL> disabled critical extension checking. By default
-any unhandled critical extensions in certificates or (if checked) CRLs results
+B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default
+any unhandled critical extensions in certificates or (if checked) CRLs result
in a fatal error. If this flag is set unhandled critical extensions are
ignored. B<WARNING> setting this option for anything other than debugging
purposes can be a security risk. Finer control over which extensions are
More information about the openssl-commits
mailing list