c03726ca41
Make all mention of digest algorithm use "any supported algorithm" RT2071, some new manpages from Victor B. Wagner <vitus@cryptocom.ru>: X509_LOOKUP_hash_dir.pod X509_check_ca.pod X509_check_issued.pod RT 1600: Remove references to non-existant objects(3) Add RETURN VALUES to BIO_do_accept page. RT1818: RSA_sign Can return values other than 0 on failure. RT3634: Fix AES CBC aliases (Steffen Nurpmeso <sdaoden@yandex.com>) RT3678: Some clarifications to BIO_new_pair (Devchandra L Meetei <dlmeetei@gmail.com>) RT3787: Fix some EVP_ function return values (Laetitia Baudoin <lbaudoin@google.com>) Reviewed-by: Tim Hudson <tjh@openssl.org>
36 lines
899 B
Text
36 lines
899 B
Text
=pod
|
|
|
|
=head1 NAME
|
|
|
|
X509_check_ca - check if given certificate is CA certificate
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
#include <openssl/x509v3.h>
|
|
|
|
int X509_check_ca(X509 *cert);
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
This function checks if given certificate is CA certificate (can be used
|
|
to sign other certificates).
|
|
|
|
=head1 RETURN VALUE
|
|
|
|
Function return 0, if it is not CA certificate, 1 if it is proper X509v3
|
|
CA certificate with B<basicConstraints> extension CA:TRUE,
|
|
3, if it is selfsigned X509 v1 certificate, 4, if it is certificate with
|
|
B<keyUsage> extension with bit B<keyCertSign> set, but without
|
|
B<basicConstraints>, and 5 if it has outdated Netscape Certificate Type
|
|
extension telling that it is CA certificate.
|
|
|
|
Actually, any non-zero value means that this certificate could have been
|
|
used to sign other certificates.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<X509_verify_cert(3)>,
|
|
L<X509_check_issued(3)>,
|
|
L<X509_check_purpose(3)>
|
|
|
|
=cut
|