From 20cc39d443d1a2c364b0fb778c7813ae7b5a1dd6 Mon Sep 17 00:00:00 2001 From: Sverker Eriksson Date: Tue, 11 Dec 2018 17:42:39 +0100 Subject: Add "since" attributes in xml for new functions and modules introduced after OTP_R13B03. --- lib/public_key/doc/src/public_key.xml | 102 +++++++++++++++++----------------- 1 file changed, 51 insertions(+), 51 deletions(-) (limited to 'lib/public_key') diff --git a/lib/public_key/doc/src/public_key.xml b/lib/public_key/doc/src/public_key.xml index ee3877ddd0..5259cb9dd3 100644 --- a/lib/public_key/doc/src/public_key.xml +++ b/lib/public_key/doc/src/public_key.xml @@ -176,7 +176,7 @@ - + Computes shared secret.

Computes shared secret.

@@ -184,7 +184,7 @@
- + Computes shared secret.

Computes shared secret.

@@ -192,8 +192,8 @@
- - + + Public-key decryption.

Public-key decryption using the private key. See also - - + + Public-key decryption.

Public-key decryption using the public key. See also - + Decodes a public-key ASN.1 DER encoded entity.

Decodes a public-key ASN.1 DER encoded entity.

@@ -220,7 +220,7 @@
- + Encodes a public-key entity with ASN.1 DER encoding.

Encodes a public-key entity with ASN.1 DER encoding.

@@ -228,7 +228,7 @@
- + Selects a group for Diffie-Hellman key exchange

Selects a group for Diffie-Hellman key exchange with the key size in the range MinSize...MaxSize @@ -249,8 +249,8 @@ - - + + Public-key encryption using the private key.

Public-key encryption using the private key. @@ -260,8 +260,8 @@ - - + + Public-key encryption using the public key.

Public-key encryption using the public key. See also - + Generates a new keypair.

Generates a new keypair. Note that except for Diffie-Hellman @@ -281,7 +281,7 @@ - + Decodes PEM binary data and returns entries as ASN.1 DER encoded entities. @@ -291,7 +291,7 @@ - + Creates a PEM binary.

Creates a PEM binary.

@@ -299,8 +299,8 @@
- - + + Decodes a PEM entry.

Decodes a PEM entry. pem_decode/1 returns a list of PEM @@ -311,8 +311,8 @@ - - + + Creates a PEM entry that can be fed to pem_encode/1.

Creates a PEM entry that can be feed to pem_encode/1.

@@ -337,7 +337,7 @@
- + DER encodes a PKIX x509 certificate or part of such a certificate. @@ -349,7 +349,7 @@ - + Checks if IssuerCert issued Cert.

Checks if IssuerCert issued Cert.

@@ -357,7 +357,7 @@
- + Checks if a certificate is a fixed Diffie-Hellman certificate.

Checks if a certificate is a fixed Diffie-Hellman certificate.

@@ -365,7 +365,7 @@
- + Checks if a certificate is self-signed.

Checks if a certificate is self-signed.

@@ -373,7 +373,7 @@
- + Returns the issuer id.

Returns the issuer id.

@@ -381,7 +381,7 @@
- + Normalizes an issuer name so that it can be easily compared to another issuer name. @@ -391,7 +391,7 @@ - pkix_path_validation(TrustedCert, CertChain, Options) -> {ok, {PublicKeyInfo, PolicyTree}} | {error, {bad_cert, Reason}} + pkix_path_validation(TrustedCert, CertChain, Options) -> {ok, {PublicKeyInfo, PolicyTree}} | {error, {bad_cert, Reason}} Performs a basic path validation according to RFC 5280. TrustedCert = #'OTPCertificate'{} | der_encoded() | atom() @@ -491,7 +491,7 @@ fun(OtpCert :: #'OTPCertificate'{}, - + Returns the issuer of the CRL.

Returns the issuer of the CRL.

@@ -499,7 +499,7 @@ fun(OtpCert :: #'OTPCertificate'{},
- + Performs CRL validation.

Performs CRL validation. It is intended to be called from @@ -551,7 +551,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - + Verify that Cert is the CRL signer.

Verify that Cert is the CRL signer.

@@ -559,7 +559,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{},
- + Creates a distribution point for CRLs issued by the same issuer as Cert.

Creates a distribution point for CRLs issued by the same issuer as Cert. @@ -570,7 +570,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - + Extracts distribution points from the certificates extensions.

Extracts distribution points from the certificates extensions.

@@ -578,7 +578,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{},
- + Checks whether the given distribution point matches the Issuing Distribution Point of the CRL. @@ -590,7 +590,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - + Signs certificate.

Signs an 'OTPTBSCertificate'. Returns the corresponding @@ -599,7 +599,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - + Translates signature algorithm OID to Erlang digest and signature algorithm types.

Translates signature algorithm OID to Erlang digest and signature types. @@ -609,8 +609,8 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - pkix_test_data(Options) -> Config - pkix_test_data([chain_opts()]) -> [conf_opt()] + pkix_test_data(Options) -> Config + pkix_test_data([chain_opts()]) -> [conf_opt()] Creates certificate test data. Options = #{chain_type() := chain_opts()} @@ -742,7 +742,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - pkix_test_root_cert(Name, Options) -> RootCert + pkix_test_root_cert(Name, Options) -> RootCert Generates a test data root cert. Name = string() @@ -772,7 +772,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{}, - + Verifies PKIX x.509 certificate signature.

Verifies PKIX x.509 certificate signature.

@@ -780,8 +780,8 @@ fun(#'DistributionPoint'{}, #'CertificateList'{},
- pkix_verify_hostname(Cert, ReferenceIDs) -> boolean() - pkix_verify_hostname(Cert, ReferenceIDs, Opts) -> boolean() + pkix_verify_hostname(Cert, ReferenceIDs) -> boolean() + pkix_verify_hostname(Cert, ReferenceIDs, Opts) -> boolean() Verifies that a PKIX x.509 certificate presented identifier (e.g hostname) is an expected one. @@ -864,7 +864,7 @@ end - pkix_verify_hostname_match_fun(Protcol) -> fun(RefId | FQDN::string(), PresentedID) -> boolean() | default + pkix_verify_hostname_match_fun(Protcol) -> fun(RefId | FQDN::string(), PresentedID) -> boolean() | default Returns a fun that is intendended as argument to the match_fun option in pkix_verify_hostname/3. @@ -890,7 +890,7 @@ end - + Creates a digital signature.

Creates a digital signature.

@@ -901,7 +901,7 @@ end
- + Decodes an SSH file-binary.

Decodes an SSH file-binary. In the case of known_hosts or @@ -933,7 +933,7 @@ end - + Encodes a list of SSH file entries to a binary.

Encodes a list of SSH file entries (public keys and attributes) to a binary. Possible @@ -947,9 +947,9 @@ end - ssh_hostkey_fingerprint(HostKey) -> string() - ssh_hostkey_fingerprint(DigestType, HostKey) -> string() - ssh_hostkey_fingerprint([DigestType], HostKey) -> [string()] + ssh_hostkey_fingerprint(HostKey) -> string() + ssh_hostkey_fingerprint(DigestType, HostKey) -> string() + ssh_hostkey_fingerprint([DigestType], HostKey) -> [string()] Calculates a ssh fingerprint for a hostkey. HostKey = public_key() @@ -982,8 +982,8 @@ end - - + + Verifies a digital signature.

Verifies a digital signature.

@@ -993,7 +993,7 @@ end
- + Generates a short hash of an issuer name.

Generates a short hash of an issuer name. The hash is -- cgit v1.2.3 From 50f64c60b87e8d03fedc3f9f4e655aff8ca9f16c Mon Sep 17 00:00:00 2001 From: Sverker Eriksson Date: Wed, 12 Dec 2018 19:32:24 +0100 Subject: Add empty 'since' attribute for old modules and functions --- lib/public_key/doc/src/public_key.xml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'lib/public_key') diff --git a/lib/public_key/doc/src/public_key.xml b/lib/public_key/doc/src/public_key.xml index 5259cb9dd3..76dbe008ef 100644 --- a/lib/public_key/doc/src/public_key.xml +++ b/lib/public_key/doc/src/public_key.xml @@ -31,7 +31,7 @@ - public_key + public_key API module for public-key infrastructure.

Provides functions to handle public-key infrastructure, @@ -326,7 +326,7 @@ - + Decodes an ASN.1 DER-encoded PKIX x509 certificate.

Decodes an ASN.1 DER-encoded PKIX certificate. Option otp @@ -889,7 +889,7 @@ end - + Creates a digital signature. -- cgit v1.2.3