[openssl] openssl-3.0 update
Dr. Paul Dale
pauli at openssl.org
Thu Feb 24 00:22:40 UTC 2022
The branch openssl-3.0 has been updated
via e19edf7361b952674135b8500144df6afec18319 (commit)
from 6f4a98ce2157aca169709c80ea579e80e39011b6 (commit)
- Log -----------------------------------------------------------------
commit e19edf7361b952674135b8500144df6afec18319
Author: Carlo Teubner <435950+c4rlo at users.noreply.github.com>
Date: Fri Feb 18 10:00:52 2022 +0000
X509_VERIFY_PARAM_set_flags.pod: fix typos
CLA: trivial
Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Paul Dale <pauli at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/17731)
(cherry picked from commit cbb6f4dbf0ce42b4cc4385d7b95236710504068d)
-----------------------------------------------------------------------
Summary of changes:
doc/man3/X509_VERIFY_PARAM_set_flags.pod | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/man3/X509_VERIFY_PARAM_set_flags.pod b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
index 1213627be7..55bdf877b3 100644
--- a/doc/man3/X509_VERIFY_PARAM_set_flags.pod
+++ b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
@@ -249,8 +249,8 @@ certificate. An error occurs if a suitable CRL cannot be found.
B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate
chain.
-B<X509_V_FLAG_IGNORE_CRITICAL> disabled critical extension checking. By default
-any unhandled critical extensions in certificates or (if checked) CRLs results
+B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default
+any unhandled critical extensions in certificates or (if checked) CRLs result
in a fatal error. If this flag is set unhandled critical extensions are
ignored. B<WARNING> setting this option for anything other than debugging
purposes can be a security risk. Finer control over which extensions are
More information about the openssl-commits
mailing list