From: Dr. David von Oheimb Date: Tue, 22 Sep 2020 06:31:17 +0000 (+0200) Subject: OCSP_resp_find_status.pod: Slightly improve the documentation of various flags X-Git-Tag: openssl-3.0.0-alpha7~106 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=37326895b75297071560eb09d167f3ac90af71b4;p=thirdparty%2Fopenssl.git OCSP_resp_find_status.pod: Slightly improve the documentation of various flags Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/12947) --- diff --git a/doc/man3/OCSP_resp_find_status.pod b/doc/man3/OCSP_resp_find_status.pod index 00b14c7052d..708bbd17652 100644 --- a/doc/man3/OCSP_resp_find_status.pod +++ b/doc/man3/OCSP_resp_find_status.pod @@ -121,24 +121,25 @@ signed and that the signer certificate can be validated. It takes I as the trusted store and I as a set of untrusted intermediate certificates. The function first tries to find the signer certificate of the response in I. It then searches the certificates the responder may have included -in I unless the I contain B. +in I unless I contains B. It fails if the signer certificate cannot be found. -Next, unless the I contain B, the function checks +Next, unless I contains B, the function checks the signature of I and fails on error. Then the function already returns -success if the I contain B or if the signer certificate -was found in I and the I contain B. +success if I contains B or if the signer certificate +was found in I and I contains B. Otherwise the function continues by validating the signer certificate. -If I contains B, intermediate CA certificates -in I are trust anchors. +If I contains B it takes intermediate CA +certificates in I as trust anchors. For more details, see the description of B in L. -To this end, all certificates in I and in I are considered as -untrusted certificates for the construction of the validation path for the -signer certificate unless the B flag is set. After successful path +If I contains B it ignores all certificates in I +and in I, else it takes them as untrusted intermediate CA certificates +and uses them for constructing the validation path for the signer certificate. +After successful path validation the function returns success if the B flag is set. Otherwise it verifies that the signer certificate meets the OCSP issuer criteria including potential delegation. If this does not succeed and the -I do not contain B the function checks for explicit +B flag is not set the function checks for explicit trust for OCSP signing in the root CA certificate. =head1 RETURN VALUES