|
|
a5ef24 |
diff -up openssl-1.0.0d/apps/ca.c.dgst openssl-1.0.0d/apps/ca.c
|
|
|
a5ef24 |
--- openssl-1.0.0d/apps/ca.c.dgst 2009-12-02 15:41:24.000000000 +0100
|
|
|
a5ef24 |
+++ openssl-1.0.0d/apps/ca.c 2011-04-05 21:09:42.000000000 +0200
|
|
|
a5ef24 |
@@ -157,7 +157,7 @@ static const char *ca_usage[]={
|
|
|
a5ef24 |
" -startdate YYMMDDHHMMSSZ - certificate validity notBefore\n",
|
|
|
a5ef24 |
" -enddate YYMMDDHHMMSSZ - certificate validity notAfter (overrides -days)\n",
|
|
|
a5ef24 |
" -days arg - number of days to certify the certificate for\n",
|
|
|
a5ef24 |
-" -md arg - md to use, one of md2, md5, sha or sha1\n",
|
|
|
a5ef24 |
+" -md arg - md to use, see openssl dgst -h for list\n",
|
|
|
a5ef24 |
" -policy arg - The CA 'policy' to support\n",
|
|
|
a5ef24 |
" -keyfile arg - private key file\n",
|
|
|
a5ef24 |
" -keyform arg - private key file format (PEM or ENGINE)\n",
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/apps/enc.c.dgst openssl-1.0.0d/apps/enc.c
|
|
|
a5ef24 |
--- openssl-1.0.0d/apps/enc.c.dgst 2010-06-15 19:25:02.000000000 +0200
|
|
|
a5ef24 |
+++ openssl-1.0.0d/apps/enc.c 2011-04-05 21:11:54.000000000 +0200
|
|
|
a5ef24 |
@@ -302,7 +302,7 @@ bad:
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s passphrase is the next argument\n","-k");
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
|
|
|
a5ef24 |
- BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
|
|
a5ef24 |
+ BIO_printf(bio_err,"%-14s from a passphrase. See openssl dgst -h for list.\n","");
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
|
|
|
a5ef24 |
BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/apps/req.c.dgst openssl-1.0.0d/apps/req.c
|
|
|
a5ef24 |
--- openssl-1.0.0d/apps/req.c.dgst 2010-03-10 14:48:21.000000000 +0100
|
|
|
a5ef24 |
+++ openssl-1.0.0d/apps/req.c 2011-04-05 21:12:33.000000000 +0200
|
|
|
a5ef24 |
@@ -421,7 +421,7 @@ bad:
|
|
|
a5ef24 |
#ifndef OPENSSL_NO_ECDSA
|
|
|
a5ef24 |
BIO_printf(bio_err," -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
|
|
|
a5ef24 |
#endif
|
|
|
a5ef24 |
- BIO_printf(bio_err," -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
|
|
|
a5ef24 |
+ BIO_printf(bio_err," -[digest] Digest to sign with (see openssl dgst -h for list)\n");
|
|
|
a5ef24 |
BIO_printf(bio_err," -config file request template file.\n");
|
|
|
a5ef24 |
BIO_printf(bio_err," -subj arg set or modify request subject\n");
|
|
|
a5ef24 |
BIO_printf(bio_err," -multivalue-rdn enable support for multivalued RDNs\n");
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/apps/ts.c.dgst openssl-1.0.0d/apps/ts.c
|
|
|
a5ef24 |
--- openssl-1.0.0d/apps/ts.c.dgst 2009-10-18 16:42:26.000000000 +0200
|
|
|
a5ef24 |
+++ openssl-1.0.0d/apps/ts.c 2011-04-05 21:16:07.000000000 +0200
|
|
|
a5ef24 |
@@ -368,7 +368,7 @@ int MAIN(int argc, char **argv)
|
|
|
a5ef24 |
BIO_printf(bio_err, "usage:\n"
|
|
|
a5ef24 |
"ts -query [-rand file%cfile%c...] [-config configfile] "
|
|
|
a5ef24 |
"[-data file_to_hash] [-digest digest_bytes]"
|
|
|
a5ef24 |
- "[-md2|-md4|-md5|-sha|-sha1|-mdc2|-ripemd160] "
|
|
|
a5ef24 |
+ "[-<hashalg>] "
|
|
|
a5ef24 |
"[-policy object_id] [-no_nonce] [-cert] "
|
|
|
a5ef24 |
"[-in request.tsq] [-out request.tsq] [-text]\n",
|
|
|
a5ef24 |
LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/apps/x509.c.dgst openssl-1.0.0d/apps/x509.c
|
|
|
a5ef24 |
--- openssl-1.0.0d/apps/x509.c.dgst 2011-04-05 21:13:42.000000000 +0200
|
|
|
a5ef24 |
+++ openssl-1.0.0d/apps/x509.c 2011-04-05 21:13:17.000000000 +0200
|
|
|
a5ef24 |
@@ -141,7 +141,7 @@ static const char *x509_usage[]={
|
|
|
a5ef24 |
" -set_serial - serial number to use\n",
|
|
|
a5ef24 |
" -text - print the certificate in text form\n",
|
|
|
a5ef24 |
" -C - print out C code forms\n",
|
|
|
a5ef24 |
-" -md2/-md5/-sha1/-mdc2 - digest to use\n",
|
|
|
a5ef24 |
+" -<dgst> - digest to use, see openssl dgst -h output for list\n",
|
|
|
a5ef24 |
" -extfile - configuration file with X509V3 extensions to add\n",
|
|
|
a5ef24 |
" -extensions - section from config file with X509V3 extensions to add\n",
|
|
|
a5ef24 |
" -clrext - delete extensions before signing and input certificate\n",
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/doc/apps/ca.pod.dgst openssl-1.0.0d/doc/apps/ca.pod
|
|
|
a5ef24 |
--- openssl-1.0.0d/doc/apps/ca.pod.dgst 2009-04-10 13:25:53.000000000 +0200
|
|
|
a5ef24 |
+++ openssl-1.0.0d/doc/apps/ca.pod 2011-04-05 21:16:39.000000000 +0200
|
|
|
a5ef24 |
@@ -160,7 +160,8 @@ the number of days to certify the certif
|
|
|
a5ef24 |
=item B<-md alg>
|
|
|
a5ef24 |
|
|
|
a5ef24 |
the message digest to use. Possible values include md5, sha1 and mdc2.
|
|
|
a5ef24 |
-This option also applies to CRLs.
|
|
|
a5ef24 |
+For full list of digests see openssl dgst -h output. This option also
|
|
|
a5ef24 |
+applies to CRLs.
|
|
|
a5ef24 |
|
|
|
a5ef24 |
=item B<-policy arg>
|
|
|
a5ef24 |
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/doc/apps/ocsp.pod.dgst openssl-1.0.0d/doc/apps/ocsp.pod
|
|
|
a5ef24 |
--- openssl-1.0.0d/doc/apps/ocsp.pod.dgst 2008-02-25 19:11:47.000000000 +0100
|
|
|
a5ef24 |
+++ openssl-1.0.0d/doc/apps/ocsp.pod 2011-04-05 21:18:17.000000000 +0200
|
|
|
a5ef24 |
@@ -210,7 +210,8 @@ check is not performed.
|
|
|
a5ef24 |
=item B<-md5|-sha1|-sha256|-ripemod160|...>
|
|
|
a5ef24 |
|
|
|
a5ef24 |
this option sets digest algorithm to use for certificate identification
|
|
|
a5ef24 |
-in the OCSP request. By default SHA-1 is used.
|
|
|
a5ef24 |
+in the OCSP request. By default SHA-1 is used. See openssl dgst -h output for
|
|
|
a5ef24 |
+the list of available algorithms.
|
|
|
a5ef24 |
|
|
|
a5ef24 |
=back
|
|
|
a5ef24 |
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/doc/apps/req.pod.dgst openssl-1.0.0d/doc/apps/req.pod
|
|
|
a5ef24 |
--- openssl-1.0.0d/doc/apps/req.pod.dgst 2009-04-10 18:42:28.000000000 +0200
|
|
|
a5ef24 |
+++ openssl-1.0.0d/doc/apps/req.pod 2011-04-05 21:20:47.000000000 +0200
|
|
|
a5ef24 |
@@ -201,7 +201,8 @@ will not be encrypted.
|
|
|
a5ef24 |
|
|
|
a5ef24 |
this specifies the message digest to sign the request with (such as
|
|
|
a5ef24 |
B<-md5>, B<-sha1>). This overrides the digest algorithm specified in
|
|
|
a5ef24 |
-the configuration file.
|
|
|
a5ef24 |
+the configuration file. For full list of possible digests see openssl
|
|
|
a5ef24 |
+dgst -h output.
|
|
|
a5ef24 |
|
|
|
a5ef24 |
Some public key algorithms may override this choice. For instance, DSA
|
|
|
a5ef24 |
signatures always use SHA1, GOST R 34.10 signatures always use
|
|
|
a5ef24 |
diff -up openssl-1.0.0d/doc/apps/x509.pod.dgst openssl-1.0.0d/doc/apps/x509.pod
|
|
|
a5ef24 |
--- openssl-1.0.0d/doc/apps/x509.pod.dgst 2010-01-12 18:27:11.000000000 +0100
|
|
|
a5ef24 |
+++ openssl-1.0.0d/doc/apps/x509.pod 2011-04-05 21:19:56.000000000 +0200
|
|
|
a5ef24 |
@@ -101,6 +101,7 @@ the digest to use. This affects any sign
|
|
|
a5ef24 |
digest, such as the B<-fingerprint>, B<-signkey> and B<-CA> options. If not
|
|
|
a5ef24 |
specified then SHA1 is used. If the key being used to sign with is a DSA key
|
|
|
a5ef24 |
then this option has no effect: SHA1 is always used with DSA keys.
|
|
|
a5ef24 |
+For full list of digests see openssl dgst -h output.
|
|
|
a5ef24 |
|
|
|
a5ef24 |
=item B<-engine id>
|
|
|
a5ef24 |
|