Index: openssl/doc/apps/verify.pod |
=================================================================== |
--- openssl/doc/apps/verify.pod (revision 105093) |
+++ openssl/doc/apps/verify.pod (working copy) |
@@ -10,6 +10,18 @@ |
[B<-CApath directory>] |
[B<-CAfile file>] |
[B<-purpose purpose>] |
+[B<-policy arg>] |
+[B<-ignore_critical>] |
+[B<-crl_check>] |
+[B<-crl_check_all>] |
+[B<-policy_check>] |
+[B<-explicit_policy>] |
+[B<-inhibit_any>] |
+[B<-inhibit_map>] |
+[B<-x509_strict>] |
+[B<-extended_crl>] |
+[B<-use_deltas>] |
+[B<-policy_print>] |
[B<-untrusted file>] |
[B<-help>] |
[B<-issuer_checks>] |
@@ -66,6 +78,63 @@ |
does not itself imply that anything is wrong: during the normal |
verify process several rejections may take place. |
+=item B<-policy arg> |
+ |
+Enable policy processing and add B<arg> to the user-initial-policy-set |
+(see RFC3280 et al). The policy B<arg> can be an object name an OID in numeric |
+form. This argument can appear more than once. |
+ |
+=item B<-policy_check> |
+ |
+Enables certificate policy processing. |
+ |
+=item B<-explicit_policy> |
+ |
+Set policy variable require-explicit-policy (see RFC3280 et al). |
+ |
+=item B<-inhibit_any> |
+ |
+Set policy variable inhibit-any-policy (see RFC3280 et al). |
+ |
+=item B<-inhibit_map> |
+ |
+Set policy variable inhibit-policy-mapping (see RFC3280 et al). |
+ |
+=item B<-policy_print> |
+ |
+Print out diagnostics, related to policy checking |
+ |
+=item B<-crl_check> |
+ |
+Checks end entity certificate validity by attempting to lookup a valid CRL. |
+If a valid CRL cannot be found an error occurs. |
+ |
+=item B<-crl_check_all> |
+ |
+Checks the validity of B<all> certificates in the chain by attempting |
+to lookup valid CRLs. |
+ |
+=item B<-ignore_critical> |
+ |
+Normally if an unhandled critical extension is present which is not |
+supported by OpenSSL the certificate is rejected (as required by |
+RFC3280 et al). If this option is set critical extensions are |
+ignored. |
+ |
+=item B<-x509_strict> |
+ |
+Disable workarounds for broken certificates which have to be disabled |
+for strict X.509 compliance. |
+ |
+=item B<-extended_crl> |
+ |
+Enable extended CRL features such as indirect CRLs and alternate CRL |
+signing keys. |
+ |
+=item B<-use_deltas> |
+ |
+Enable support for delta CRLs. |
+ |
=item B<-check_ss_sig> |
Verify the signature on the self-signed root CA. This is disabled by default |
@@ -176,7 +245,7 @@ |
=item B<3 X509_V_ERR_UNABLE_TO_GET_CRL: unable to get certificate CRL> |
-the CRL of a certificate could not be found. Unused. |
+the CRL of a certificate could not be found. |
=item B<4 X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt certificate's signature> |
@@ -199,7 +268,7 @@ |
=item B<8 X509_V_ERR_CRL_SIGNATURE_FAILURE: CRL signature failure> |
-the signature of the certificate is invalid. Unused. |
+the signature of the certificate is invalid. |
=item B<9 X509_V_ERR_CERT_NOT_YET_VALID: certificate is not yet valid> |
@@ -211,11 +280,11 @@ |
=item B<11 X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> |
-the CRL is not yet valid. Unused. |
+the CRL is not yet valid. |
=item B<12 X509_V_ERR_CRL_HAS_EXPIRED: CRL has expired> |
-the CRL has expired. Unused. |
+the CRL has expired. |
=item B<13 X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in certificate's notBefore field> |
@@ -227,11 +296,11 @@ |
=item B<15 X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's lastUpdate field> |
-the CRL lastUpdate field contains an invalid time. Unused. |
+the CRL lastUpdate field contains an invalid time. |
=item B<16 X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's nextUpdate field> |
-the CRL nextUpdate field contains an invalid time. Unused. |
+the CRL nextUpdate field contains an invalid time. |
=item B<17 X509_V_ERR_OUT_OF_MEM: out of memory> |
@@ -263,7 +332,7 @@ |
=item B<23 X509_V_ERR_CERT_REVOKED: certificate revoked> |
-the certificate has been revoked. Unused. |
+the certificate has been revoked. |
=item B<24 X509_V_ERR_INVALID_CA: invalid CA certificate> |