FreeBSD Bugzilla – Attachment 202698 Details for
Bug 236237
Port security/openssl polluted man page namespace
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
svn diff for security/openssl
patch-security_openssl-manprefix (text/plain), 78.09 KB, created by
Bernard Spil
on 2019-03-07 18:35:17 UTC
(
hide
)
Description:
svn diff for security/openssl
Filename:
MIME Type:
Creator:
Bernard Spil
Created:
2019-03-07 18:35:17 UTC
Size:
78.09 KB
patch
obsolete
>Index: Makefile >=================================================================== >--- Makefile (revision 494568) >+++ Makefile (working copy) >@@ -121,6 +121,14 @@ > BROKEN_sparc64= option ASM generates illegal instructions > .endif > >+pre-patch: >+.for m in asn1parse ca ciphers cms crl crl2pkcs7 dgst dhparam dsa dsaparam ec \ >+ ecparam enc errstr gendsa genpkey genrsa nseq ocsp passwd pkcs12 pkcs7 \ >+ pkcs8 pkey pkeyparam pkeyutl rand req rsa rsautl s_client s_server \ >+ s_time sess_id smime speed spkac ts tsget verify version x509 >+ ${MV} ${WRKSRC}/doc/apps/${m}.pod ${WRKSRC}/doc/apps/openssl-${m}.pod >+.endfor >+ > post-patch: > ${REINPLACE_CMD} -e 's|m4 -B 8192|m4|g' \ > ${WRKSRC}/crypto/des/Makefile >Index: files/patch-openssl-cmd-prefix >=================================================================== >--- files/patch-openssl-cmd-prefix (nonexistent) >+++ files/patch-openssl-cmd-prefix (working copy) >@@ -0,0 +1,2153 @@ >+--- doc/apps/CA.pl.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/CA.pl.pod >+@@ -117,7 +117,7 @@ the request and finally create a PKCS#12 file containi >+ =head1 DSA CERTIFICATES >+ >+ Although the B<CA.pl> creates RSA CAs and requests it is still possible to >+-use it with DSA certificates and requests using the L<req(1)|req(1)> command >++use it with DSA certificates and requests using the L<openssl-req(1)|openssl-req(1)> command >+ directly. The following example shows the steps that would typically be taken. >+ >+ Create some DSA parameters: >+@@ -173,7 +173,7 @@ configuration file, not just its directory. >+ >+ =head1 SEE ALSO >+ >+-L<x509(1)|x509(1)>, L<ca(1)|ca(1)>, L<req(1)|req(1)>, L<pkcs12(1)|pkcs12(1)>, >++L<openssl-x509(1)|openssl-x509(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-req(1)|openssl-req(1)>, L<openssl-pkcs12(1)|openssl-pkcs12(1)>, >+ L<config(5)|config(5)> >+ >+ =cut >+--- doc/apps/c_rehash.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/c_rehash.pod >+@@ -110,5 +110,5 @@ Ignored if directories are listed on the command line. >+ =head1 SEE ALSO >+ >+ L<openssl(1)|openssl(1)>, >+-L<crl(1)|crl(1)>. >+-L<x509(1)|x509(1)>. >++L<openssl-crl(1)|openssl-crl(1)>. >++L<openssl-x509(1)|openssl-x509(1)>. >+--- doc/apps/config.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/config.pod >+@@ -346,6 +346,6 @@ file. >+ >+ =head1 SEE ALSO >+ >+-L<x509(1)|x509(1)>, L<req(1)|req(1)>, L<ca(1)|ca(1)> >++L<openssl-x509(1)|openssl-x509(1)>, L<openssl-req(1)|openssl-req(1)>, L<openssl-ca(1)|openssl-ca(1)> >+ >+ =cut >+--- doc/apps/openssl-asn1parse.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-asn1parse.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-asn1parse, >+-asn1parse - ASN.1 parsing tool >++openssl-asn1parse - ASN.1 parsing tool >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-ca.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ca.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ca, >+-ca - sample minimal CA application >++openssl-ca - sample minimal CA application >+ >+ =head1 SYNOPSIS >+ >+@@ -215,7 +214,7 @@ to be added when a certificate is issued (defaults to >+ unless the B<-extfile> option is used). If no extension section is >+ present then, a V1 certificate is created. If the extension section >+ is present (even if it is empty), then a V3 certificate is created. See the >+-L<x509v3_config(5)|x509v3_config(5)> manual page for details of the >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> manual page for details of the >+ extension section format. >+ >+ =item B<-extfile file> >+@@ -320,7 +319,7 @@ created, if the CRL extension section is present (even >+ empty) then a V2 CRL is created. The CRL extensions specified are >+ CRL extensions and B<not> CRL entry extensions. It should be noted >+ that some software (for example Netscape) can't handle V2 CRLs. See >+-L<x509v3_config(5)|x509v3_config(5)> manual page for details of the >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> manual page for details of the >+ extension section format. >+ >+ =back >+@@ -695,7 +694,7 @@ then even if a certificate is issued with CA:TRUE it w >+ >+ =head1 SEE ALSO >+ >+-L<req(1)|req(1)>, L<spkac(1)|spkac(1)>, L<x509(1)|x509(1)>, L<CA.pl(1)|CA.pl(1)>, >+-L<config(5)|config(5)>, L<x509v3_config(5)|x509v3_config(5)> >++L<openssl-req(1)|openssl-req(1)>, L<openssl-spkac(1)|openssl-spkac(1)>, L<openssl-x509(1)|openssl-x509(1)>, L<CA.pl(1)|CA.pl(1)>, >++L<config(5)|config(5)>, L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> >+ >+ =cut >+--- doc/apps/openssl-ciphers.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ciphers.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ciphers, >+-ciphers - SSL cipher display and cipher list tool. >++openssl-ciphers - SSL cipher display and cipher list tool. >+ >+ =head1 SYNOPSIS >+ >+@@ -636,7 +635,7 @@ encryption. >+ >+ =head1 SEE ALSO >+ >+-L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ssl(3)|ssl(3)> >++L<openssl-s_client(1)|openssl-s_client(1)>, L<openssl-s_server(1)|openssl-s_server(1)>, L<ssl(3)|ssl(3)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-cms.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-cms.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-cms, >+-cms - CMS utility >++openssl-cms - CMS utility >+ >+ =head1 SYNOPSIS >+ >+@@ -259,7 +258,7 @@ default digest algorithm for the signing key will be u >+ the encryption algorithm to use. For example triple DES (168 bits) - B<-des3> >+ or 256 bit AES - B<-aes256>. Any standard algorithm name (as used by the >+ EVP_get_cipherbyname() function) can also be used preceded by a dash, for >+-example B<-aes_128_cbc>. See L<B<enc>|enc(1)> for a list of ciphers >++example B<-aes_128_cbc>. See L<B<enc>|openssl-enc(1)> for a list of ciphers >+ supported by your version of OpenSSL. >+ >+ If not specified triple DES is used. Only used with B<-encrypt> and >+@@ -430,7 +429,7 @@ address matches that specified in the From: address. >+ =item B<-purpose, -ignore_critical, -issuer_checks, -crl_check, -crl_check_all, -policy_check, -extended_crl, -x509_strict, -policy -check_ss_sig -no_alt_chains> >+ >+ Set various certificate chain valiadition option. See the >+-L<B<verify>|verify(1)> manual page for details. >++L<B<verify>|openssl-verify(1)> manual page for details. >+ >+ =back >+ >+--- doc/apps/openssl-crl.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-crl.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-crl, >+-crl - CRL utility >++openssl-crl - CRL utility >+ >+ =head1 SYNOPSIS >+ >+@@ -58,7 +57,7 @@ print out the CRL in text form. >+ =item B<-nameopt option> >+ >+ option which determines how the subject or issuer names are displayed. See >+-the description of B<-nameopt> in L<x509(1)|x509(1)>. >++the description of B<-nameopt> in L<openssl-x509(1)|openssl-x509(1)>. >+ >+ =item B<-noout> >+ >+@@ -124,6 +123,6 @@ and files too. >+ >+ =head1 SEE ALSO >+ >+-L<crl2pkcs7(1)|crl2pkcs7(1)>, L<ca(1)|ca(1)>, L<x509(1)|x509(1)> >++L<openssl-crl2pkcs7(1)|openssl-crl2pkcs7(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-x509(1)|openssl-x509(1)> >+ >+ =cut >+--- doc/apps/openssl-crl2pkcs7.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-crl2pkcs7.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-crl2pkcs7, >+-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates. >++openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates. >+ >+ =head1 SYNOPSIS >+ >+@@ -87,6 +86,6 @@ install user certificates and CAs in MSIE using the Xe >+ >+ =head1 SEE ALSO >+ >+-L<pkcs7(1)|pkcs7(1)> >++L<openssl-pkcs7(1)|openssl-pkcs7(1)> >+ >+ =cut >+--- doc/apps/openssl-dgst.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-dgst.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-dgst, >+-dgst, sha, sha1, mdc2, ripemd160, sha224, sha256, sha384, sha512, md2, md4, md5, dss1 - message digests >++openssl-dgst, openssl-sha, openssl-sha1, openssl-mdc2, openssl-ripemd160, openssl-sha224, openssl-sha256, openssl-sha384, openssl-sha512, openssl-md2, openssl-md4, openssl-md5, openssl-dss1 - message digests >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-dhparam.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-dhparam.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-dhparam, >+-dhparam - DH parameter manipulation and generation >++openssl-dhparam - DH parameter manipulation and generation >+ >+ =head1 SYNOPSIS >+ >+@@ -140,7 +139,7 @@ There should be a way to generate and manipulate DH ke >+ >+ =head1 SEE ALSO >+ >+-L<dsaparam(1)|dsaparam(1)> >++L<openssl-dsaparam(1)|openssl-dsaparam(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-dsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-dsa.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-dsa, >+-dsa - DSA key processing >++openssl-dsa - DSA key processing >+ >+ =head1 SYNOPSIS >+ >+@@ -159,7 +158,7 @@ To just output the public part of a private key: >+ >+ =head1 SEE ALSO >+ >+-L<dsaparam(1)|dsaparam(1)>, L<gendsa(1)|gendsa(1)>, L<rsa(1)|rsa(1)>, >+-L<genrsa(1)|genrsa(1)> >++L<openssl-dsaparam(1)|openssl-dsaparam(1)>, L<openssl-gendsa(1)|openssl-gendsa(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, >++L<openssl-genrsa(1)|openssl-genrsa(1)> >+ >+ =cut >+--- doc/apps/openssl-dsaparam.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-dsaparam.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-dsaparam, >+-dsaparam - DSA parameter manipulation and generation >++openssl-dsaparam - DSA parameter manipulation and generation >+ >+ =head1 SYNOPSIS >+ >+@@ -105,7 +104,7 @@ DSA parameters is often used to generate several disti >+ >+ =head1 SEE ALSO >+ >+-L<gendsa(1)|gendsa(1)>, L<dsa(1)|dsa(1)>, L<genrsa(1)|genrsa(1)>, >+-L<rsa(1)|rsa(1)> >++L<openssl-gendsa(1)|openssl-gendsa(1)>, L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-rsa(1)|openssl-rsa(1)> >+ >+ =cut >+--- doc/apps/openssl-ec.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ec.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ec, >+-ec - EC key processing >++openssl-ec - EC key processing >+ >+ =head1 SYNOPSIS >+ >+@@ -178,7 +177,7 @@ To change the point conversion form to B<compressed>: >+ >+ =head1 SEE ALSO >+ >+-L<ecparam(1)|ecparam(1)>, L<dsa(1)|dsa(1)>, L<rsa(1)|rsa(1)> >++L<openssl-ecparam(1)|openssl-ecparam(1)>, L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-rsa(1)|openssl-rsa(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-ecparam.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ecparam.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ecparam, >+-ecparam - EC parameter manipulation and generation >++openssl-ecparam - EC parameter manipulation and generation >+ >+ =head1 SYNOPSIS >+ >+@@ -167,7 +166,7 @@ To print out the EC parameters to standard output: >+ >+ =head1 SEE ALSO >+ >+-L<ec(1)|ec(1)>, L<dsaparam(1)|dsaparam(1)> >++L<openssl-ec(1)|openssl-ec(1)>, L<openssl-dsaparam(1)|openssl-dsaparam(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-enc.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-enc.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-enc, >+-enc - symmetric cipher routines >++openssl-enc - symmetric cipher routines >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-errstr.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-errstr.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-errstr, >+-errstr - lookup error codes >++openssl-errstr - lookup error codes >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-gendsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-gendsa.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-gendsa, >+-gendsa - generate a DSA private key from a set of parameters >++openssl-gendsa - generate a DSA private key from a set of parameters >+ >+ =head1 SYNOPSIS >+ >+@@ -67,7 +66,7 @@ much quicker that RSA key generation for example. >+ >+ =head1 SEE ALSO >+ >+-L<dsaparam(1)|dsaparam(1)>, L<dsa(1)|dsa(1)>, L<genrsa(1)|genrsa(1)>, >+-L<rsa(1)|rsa(1)> >++L<openssl-dsaparam(1)|openssl-dsaparam(1)>, L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-rsa(1)|openssl-rsa(1)> >+ >+ =cut >+--- doc/apps/openssl-genpkey.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-genpkey.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-genpkey, >+-genpkey - generate a private key >++openssl-genpkey - generate a private key >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-genrsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-genrsa.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-genrsa, >+-genrsa - generate an RSA private key >++openssl-genrsa - generate an RSA private key >+ >+ =head1 SYNOPSIS >+ >+@@ -105,7 +104,7 @@ be much larger (typically 1024 bits). >+ >+ =head1 SEE ALSO >+ >+-L<gendsa(1)> >++L<openssl-gendsa(1)> >+ >+ =head1 COPYRIGHT >+ >+--- doc/apps/openssl-nseq.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-nseq.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-nseq, >+-nseq - create or examine a netscape certificate sequence >++openssl-nseq - create or examine a netscape certificate sequence >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-ocsp.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ocsp.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ocsp, >+-ocsp - Online Certificate Status Protocol utility >++openssl-ocsp - Online Certificate Status Protocol utility >+ >+ =head1 SYNOPSIS >+ >+@@ -156,7 +155,7 @@ the signature on the OCSP response. >+ >+ =item B<-no_alt_chains> >+ >+-See L<B<verify>|verify(1)> manual page for details. >++See L<B<verify>|openssl-verify(1)> manual page for details. >+ >+ =item B<-verify_other file> >+ >+--- doc/apps/openssl-passwd.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-passwd.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-passwd, >+-passwd - compute password hashes >++openssl-passwd - compute password hashes >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-pkcs12.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkcs12.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkcs12, >+-pkcs12 - PKCS#12 file utility >++openssl-pkcs12 - PKCS#12 file utility >+ >+ =head1 SYNOPSIS >+ >+@@ -365,5 +364,5 @@ file from the keys and certificates using a newer vers >+ >+ =head1 SEE ALSO >+ >+-L<pkcs8(1)|pkcs8(1)> >++L<openssl-pkcs8(1)|openssl-pkcs8(1)> >+ >+--- doc/apps/openssl-pkcs7.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkcs7.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkcs7, >+-pkcs7 - PKCS#7 utility >++openssl-pkcs7 - PKCS#7 utility >+ >+ =head1 SYNOPSIS >+ >+@@ -101,6 +100,6 @@ cannot currently parse, for example, the new CMS as de >+ >+ =head1 SEE ALSO >+ >+-L<crl2pkcs7(1)|crl2pkcs7(1)> >++L<openssl-crl2pkcs7(1)|openssl-crl2pkcs7(1)> >+ >+ =cut >+--- doc/apps/openssl-pkcs8.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkcs8.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkcs8, >+-pkcs8 - PKCS#8 format private key conversion tool >++openssl-pkcs8 - PKCS#8 format private key conversion tool >+ >+ =head1 SYNOPSIS >+ >+@@ -250,7 +249,7 @@ the old format at present. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(1)|dsa(1)>, L<rsa(1)|rsa(1)>, L<genrsa(1)|genrsa(1)>, >+-L<gendsa(1)|gendsa(1)> >++L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-gendsa(1)|openssl-gendsa(1)> >+ >+ =cut >+--- doc/apps/openssl-pkey.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkey.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkey, >+-pkey - public or private key processing tool >++openssl-pkey - public or private key processing tool >+ >+ =head1 SYNOPSIS >+ >+@@ -130,7 +129,7 @@ To just output the public part of a private key: >+ >+ =head1 SEE ALSO >+ >+-L<genpkey(1)|genpkey(1)>, L<rsa(1)|rsa(1)>, L<pkcs8(1)|pkcs8(1)>, >+-L<dsa(1)|dsa(1)>, L<genrsa(1)|genrsa(1)>, L<gendsa(1)|gendsa(1)> >++L<openssl-genpkey(1)|openssl-genpkey(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, L<openssl-pkcs8(1)|openssl-pkcs8(1)>, >++L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, L<openssl-gendsa(1)|openssl-gendsa(1)> >+ >+ =cut >+--- doc/apps/openssl-pkeyparam.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkeyparam.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkeyparam, >+-pkeyparam - public key algorithm parameter processing tool >++openssl-pkeyparam - public key algorithm parameter processing tool >+ >+ =head1 SYNOPSIS >+ >+@@ -64,7 +63,7 @@ PEM format is supported because the key type is determ >+ >+ =head1 SEE ALSO >+ >+-L<genpkey(1)|genpkey(1)>, L<rsa(1)|rsa(1)>, L<pkcs8(1)|pkcs8(1)>, >+-L<dsa(1)|dsa(1)>, L<genrsa(1)|genrsa(1)>, L<gendsa(1)|gendsa(1)> >++L<openssl-genpkey(1)|openssl-genpkey(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, L<openssl-pkcs8(1)|openssl-pkcs8(1)>, >++L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, L<openssl-gendsa(1)|openssl-gendsa(1)> >+ >+ =cut >+--- doc/apps/openssl-pkeyutl.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-pkeyutl.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-pkeyutl, >+-pkeyutl - public key algorithm utility >++openssl-pkeyutl - public key algorithm utility >+ >+ =head1 SYNOPSIS >+ >+@@ -232,5 +231,5 @@ Derive a shared secret value: >+ >+ =head1 SEE ALSO >+ >+-L<genpkey(1)|genpkey(1)>, L<pkey(1)|pkey(1)>, L<rsautl(1)|rsautl(1)> >+-L<dgst(1)|dgst(1)>, L<rsa(1)|rsa(1)>, L<genrsa(1)|genrsa(1)> >++L<openssl-genpkey(1)|openssl-genpkey(1)>, L<openssl-pkey(1)|openssl-pkey(1)>, L<openssl-rsautl(1)|openssl-rsautl(1)> >++L<openssl-dgst(1)|openssl-dgst(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)> >+--- doc/apps/openssl-rand.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-rand.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-rand, >+-rand - generate pseudo-random bytes >++openssl-rand - generate pseudo-random bytes >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-req.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-req.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-req, >+-req - PKCS#10 certificate request and certificate generating utility. >++openssl-req - PKCS#10 certificate request and certificate generating utility. >+ >+ =head1 SYNOPSIS >+ >+@@ -274,14 +273,14 @@ configuration file, must be valid UTF8 strings. >+ option which determines how the subject or issuer names are displayed. The >+ B<option> argument can be a single option or multiple options separated by >+ commas. Alternatively the B<-nameopt> switch may be used more than once to >+-set multiple options. See the L<x509(1)|x509(1)> manual page for details. >++set multiple options. See the L<openssl-x509(1)|openssl-x509(1)> manual page for details. >+ >+ =item B<-reqopt> >+ >+ customise the output format used with B<-text>. The B<option> argument can be >+ a single option or multiple options separated by commas. >+ >+-See discission of the B<-certopt> parameter in the L<B<x509>|x509(1)> >++See discission of the B<-certopt> parameter in the L<B<x509>|openssl-x509(1)> >+ command. >+ >+ >+@@ -414,7 +413,7 @@ problems with BMPStrings and UTF8Strings: in particula >+ this specifies the configuration file section containing a list of >+ extensions to add to the certificate request. It can be overridden >+ by the B<-reqexts> command line switch. See the >+-L<x509v3_config(5)|x509v3_config(5)> manual page for details of the >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> manual page for details of the >+ extension section format. >+ >+ =item B<x509_extensions> >+@@ -676,8 +675,8 @@ address in subjectAltName should be input by the user. >+ >+ =head1 SEE ALSO >+ >+-L<x509(1)|x509(1)>, L<ca(1)|ca(1)>, L<genrsa(1)|genrsa(1)>, >+-L<gendsa(1)|gendsa(1)>, L<config(5)|config(5)>, >+-L<x509v3_config(5)|x509v3_config(5)> >++L<openssl-x509(1)|openssl-x509(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-gendsa(1)|openssl-gendsa(1)>, L<config(5)|config(5)>, >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> >+ >+ =cut >+--- doc/apps/openssl-rsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-rsa.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-rsa, >+-rsa - RSA key processing tool >++openssl-rsa - RSA key processing tool >+ >+ =head1 SYNOPSIS >+ >+@@ -205,7 +204,7 @@ without having to manually edit them. >+ >+ =head1 SEE ALSO >+ >+-L<pkcs8(1)|pkcs8(1)>, L<dsa(1)|dsa(1)>, L<genrsa(1)|genrsa(1)>, >+-L<gendsa(1)|gendsa(1)> >++L<openssl-pkcs8(1)|openssl-pkcs8(1)>, L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-gendsa(1)|openssl-gendsa(1)> >+ >+ =cut >+--- doc/apps/openssl-rsautl.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-rsautl.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-rsautl, >+-rsautl - RSA utility >++openssl-rsautl - RSA utility >+ >+ =head1 SYNOPSIS >+ >+@@ -181,4 +180,4 @@ which it can be seen agrees with the recovered value a >+ >+ =head1 SEE ALSO >+ >+-L<dgst(1)|dgst(1)>, L<rsa(1)|rsa(1)>, L<genrsa(1)|genrsa(1)> >++L<openssl-dgst(1)|openssl-dgst(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)> >+--- doc/apps/openssl-s_client.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-s_client.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-s_client, >+-s_client - SSL/TLS client program >++openssl-s_client - SSL/TLS client program >+ >+ =head1 SYNOPSIS >+ >+@@ -128,7 +127,7 @@ and to use when attempting to build the client certifi >+ =item B<-purpose, -ignore_critical, -issuer_checks, -crl_check, -crl_check_all, -policy_check, -extended_crl, -x509_strict, -policy -check_ss_sig -no_alt_chains> >+ >+ Set various certificate chain valiadition option. See the >+-L<B<verify>|verify(1)> manual page for details. >++L<B<verify>|openssl-verify(1)> manual page for details. >+ >+ =item B<-reconnect> >+ >+@@ -381,7 +380,7 @@ information whenever a session is renegotiated. >+ >+ =head1 SEE ALSO >+ >+-L<sess_id(1)|sess_id(1)>, L<s_server(1)|s_server(1)>, L<ciphers(1)|ciphers(1)> >++L<openssl-sess_id(1)|openssl-sess_id(1)>, L<openssl-s_server(1)|openssl-s_server(1)>, L<openssl-ciphers(1)|openssl-ciphers(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-s_server.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-s_server.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-s_server, >+-s_server - SSL/TLS server program >++openssl-s_server - SSL/TLS server program >+ >+ =head1 SYNOPSIS >+ >+@@ -187,7 +186,7 @@ a certificate is requested. >+ >+ =item B<-no_alt_chains> >+ >+-See the L<B<verify>|verify(1)> manual page for details. >++See the L<B<verify>|openssl-verify(1)> manual page for details. >+ >+ =item B<-state> >+ >+@@ -432,7 +431,7 @@ unknown cipher suites a client says it supports. >+ >+ =head1 SEE ALSO >+ >+-L<sess_id(1)|sess_id(1)>, L<s_client(1)|s_client(1)>, L<ciphers(1)|ciphers(1)> >++L<openssl-sess_id(1)|openssl-sess_id(1)>, L<openssl-s_client(1)|openssl-s_client(1)>, L<openssl-ciphers(1)|openssl-ciphers(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-s_time.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-s_time.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-s_time, >+-s_time - SSL/TLS performance timing program >++openssl-s_time - SSL/TLS performance timing program >+ >+ =head1 SYNOPSIS >+ >+@@ -99,7 +98,7 @@ these options disable the use of certain SSL or TLS pr >+ the initial handshake uses a method which should be compatible with all >+ servers and permit them to use SSL v3, SSL v2 or TLS as appropriate. >+ The timing program is not as rich in options to turn protocols on and off as >+-the L<s_client(1)|s_client(1)> program and may not connect to all servers. >++the L<openssl-s_client(1)|openssl-s_client(1)> program and may not connect to all servers. >+ >+ Unfortunately there are a lot of ancient and broken servers in use which >+ cannot handle this technique and will fail to connect. Some servers only >+@@ -116,7 +115,7 @@ option enables various workarounds. >+ this allows the cipher list sent by the client to be modified. Although >+ the server determines which cipher suite is used it should take the first >+ supported cipher in the list sent by the client. >+-See the L<ciphers(1)|ciphers(1)> command for more information. >++See the L<openssl-ciphers(1)|openssl-ciphers(1)> command for more information. >+ >+ =item B<-time length> >+ >+@@ -134,7 +133,7 @@ To connect to an SSL HTTP server and get the default p >+ openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3] >+ >+ would typically be used (https uses port 443). 'commoncipher' is a cipher to >+-which both client and server can agree, see the L<ciphers(1)|ciphers(1)> command >++which both client and server can agree, see the L<openssl-ciphers(1)|openssl-ciphers(1)> command >+ for details. >+ >+ If the handshake fails then there are several possible causes, if it is >+@@ -147,10 +146,10 @@ A frequent problem when attempting to get client certi >+ is that a web client complains it has no certificates or gives an empty >+ list to choose from. This is normally because the server is not sending >+ the clients certificate authority in its "acceptable CA list" when it >+-requests a certificate. By using L<s_client(1)|s_client(1)> the CA list can be >++requests a certificate. By using L<openssl-s_client(1)|openssl-s_client(1)> the CA list can be >+ viewed and checked. However some servers only request client authentication >+ after a specific URL is requested. To obtain the list in this case it >+-is necessary to use the B<-prexit> option of L<s_client(1)|s_client(1)> and >++is necessary to use the B<-prexit> option of L<openssl-s_client(1)|openssl-s_client(1)> and >+ send an HTTP request for an appropriate page. >+ >+ If a certificate is specified on the command line using the B<-cert> >+@@ -161,7 +160,7 @@ on the command line is no guarantee that the certifica >+ =head1 BUGS >+ >+ Because this program does not have all the options of the >+-L<s_client(1)|s_client(1)> program to turn protocols on and off, you may not be >++L<openssl-s_client(1)|openssl-s_client(1)> program to turn protocols on and off, you may not be >+ able to measure the performance of all protocols with all servers. >+ >+ The B<-verify> option should really exit if the server verification >+@@ -169,6 +168,6 @@ fails. >+ >+ =head1 SEE ALSO >+ >+-L<s_client(1)|s_client(1)>, L<s_server(1)|s_server(1)>, L<ciphers(1)|ciphers(1)> >++L<openssl-s_client(1)|openssl-s_client(1)>, L<openssl-s_server(1)|openssl-s_server(1)>, L<openssl-ciphers(1)|openssl-ciphers(1)> >+ >+ =cut >+--- doc/apps/openssl-sess_id.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-sess_id.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-sess_id, >+-sess_id - SSL/TLS session handling utility >++openssl-sess_id - SSL/TLS session handling utility >+ >+ =head1 SYNOPSIS >+ >+@@ -147,6 +146,6 @@ The cipher and start time should be printed out in hum >+ >+ =head1 SEE ALSO >+ >+-L<ciphers(1)|ciphers(1)>, L<s_server(1)|s_server(1)> >++L<openssl-ciphers(1)|openssl-ciphers(1)>, L<openssl-s_server(1)|openssl-s_server(1)> >+ >+ =cut >+--- doc/apps/openssl-smime.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-smime.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-smime, >+-smime - S/MIME utility >++openssl-smime - S/MIME utility >+ >+ =head1 SYNOPSIS >+ >+@@ -161,7 +160,7 @@ default digest algorithm for the signing key will be u >+ the encryption algorithm to use. For example DES (56 bits) - B<-des>, >+ triple DES (168 bits) - B<-des3>, >+ EVP_get_cipherbyname() function) can also be used preceded by a dash, for >+-example B<-aes_128_cbc>. See L<B<enc>|enc(1)> for list of ciphers >++example B<-aes_128_cbc>. See L<B<enc>|openssl-enc(1)> for list of ciphers >+ supported by your version of OpenSSL. >+ >+ If not specified triple DES is used. Only used with B<-encrypt>. >+@@ -267,7 +266,7 @@ address matches that specified in the From: address. >+ =item B<-purpose, -ignore_critical, -issuer_checks, -crl_check, -crl_check_all, -policy_check, -extended_crl, -x509_strict, -policy -check_ss_sig -no_alt_chains> >+ >+ Set various options of certificate chain verification. See >+-L<B<verify>|verify(1)> manual page for details. >++L<B<verify>|openssl-verify(1)> manual page for details. >+ >+ =back >+ >+--- doc/apps/openssl-speed.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-speed.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-speed, >+-speed - test library performance >++openssl-speed - test library performance >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-spkac.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-spkac.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-spkac, >+-spkac - SPKAC printing and generating utility >++openssl-spkac - SPKAC printing and generating utility >+ >+ =head1 SYNOPSIS >+ >+@@ -129,6 +128,6 @@ to be used in a "replay attack". >+ >+ =head1 SEE ALSO >+ >+-L<ca(1)|ca(1)> >++L<openssl-ca(1)|openssl-ca(1)> >+ >+ =cut >+--- doc/apps/openssl-ts.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-ts.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-ts, >+-ts - Time Stamping Authority tool (client/server) >++openssl-ts - Time Stamping Authority tool (client/server) >+ >+ =head1 SYNOPSIS >+ >+@@ -313,7 +312,7 @@ of a time stamp response (TimeStampResp). (Optional) >+ =item B<-CApath> trusted_cert_path >+ >+ The name of the directory containing the trused CA certificates of the >+-client. See the similar option of L<verify(1)|verify(1)> for additional >++client. See the similar option of L<openssl-verify(1)|openssl-verify(1)> for additional >+ details. Either this option or B<-CAfile> must be specified. (Optional) >+ >+ >+@@ -321,7 +320,7 @@ details. Either this option or B<-CAfile> must be spec >+ >+ The name of the file containing a set of trusted self-signed CA >+ certificates in PEM format. See the similar option of >+-L<verify(1)|verify(1)> for additional details. Either this option >++L<openssl-verify(1)|openssl-verify(1)> for additional details. Either this option >+ or B<-CApath> must be specified. >+ (Optional) >+ >+@@ -357,15 +356,15 @@ section can be overridden with the B<-section> command >+ >+ =item B<oid_file> >+ >+-See L<ca(1)|ca(1)> for description. (Optional) >++See L<openssl-ca(1)|openssl-ca(1)> for description. (Optional) >+ >+ =item B<oid_section> >+ >+-See L<ca(1)|ca(1)> for description. (Optional) >++See L<openssl-ca(1)|openssl-ca(1)> for description. (Optional) >+ >+ =item B<RANDFILE> >+ >+-See L<ca(1)|ca(1)> for description. (Optional) >++See L<openssl-ca(1)|openssl-ca(1)> for description. (Optional) >+ >+ =item B<serial> >+ >+@@ -494,8 +493,8 @@ Before generating a response a signing certificate mus >+ the TSA that contains the B<timeStamping> critical extended key usage extension >+ without any other key usage extensions. You can add the >+ 'extendedKeyUsage = critical,timeStamping' line to the user certificate section >+-of the config file to generate a proper certificate. See L<req(1)|req(1)>, >+-L<ca(1)|ca(1)>, L<x509(1)|x509(1)> for instructions. The examples >++of the config file to generate a proper certificate. See L<openssl-req(1)|openssl-req(1)>, >++L<openssl-ca(1)|openssl-ca(1)>, L<openssl-x509(1)|openssl-x509(1)> for instructions. The examples >+ below assume that cacert.pem contains the certificate of the CA, >+ tsacert.pem is the signing certificate issued by cacert.pem and >+ tsakey.pem is the private key of the TSA. >+@@ -563,7 +562,7 @@ Zoltan Glozik <zglozik@opentsa.org>. Known issues: >+ to implement an automatic e-mail based TSA with L<procmail(1)|procmail(1)> >+ and L<perl(1)|perl(1)>. HTTP server support is provided in the form of >+ a separate apache module. HTTP client support is provided by >+-L<tsget(1)|tsget(1)>. Pure TCP/IP protocol is not supported. >++L<openssl-tsget(1)|openssl-tsget(1)>. Pure TCP/IP protocol is not supported. >+ >+ =item * The file containing the last serial number of the TSA is not >+ locked when being read or written. This is a problem if more than one >+@@ -588,8 +587,8 @@ Zoltan Glozik <zglozik@opentsa.org>, OpenTSA project ( >+ >+ =head1 SEE ALSO >+ >+-L<tsget(1)|tsget(1)>, L<openssl(1)|openssl(1)>, L<req(1)|req(1)>, >+-L<x509(1)|x509(1)>, L<ca(1)|ca(1)>, L<genrsa(1)|genrsa(1)>, >++L<openssl-tsget(1)|openssl-tsget(1)>, L<openssl(1)|openssl(1)>, L<openssl-req(1)|openssl-req(1)>, >++L<openssl-x509(1)|openssl-x509(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >+ L<config(5)|config(5)> >+ >+ =cut >+--- doc/apps/openssl-tsget.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-tsget.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-tsget, >+-tsget - Time Stamping HTTP/HTTPS client >++openssl-tsget - Time Stamping HTTP/HTTPS client >+ >+ =head1 SYNOPSIS >+ >+@@ -189,7 +188,7 @@ Zoltan Glozik <zglozik@opentsa.org>, OpenTSA project ( >+ >+ =head1 SEE ALSO >+ >+-L<openssl(1)|openssl(1)>, L<ts(1)|ts(1)>, L<curl(1)|curl(1)>, >++L<openssl(1)|openssl(1)>, L<openssl-ts(1)|openssl-ts(1)>, L<curl(1)|curl(1)>, >+ B<RFC 3161> >+ >+ =cut >+--- doc/apps/openssl-verify.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-verify.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-verify, >+-verify - Utility to verify certificates. >++openssl-verify - Utility to verify certificates. >+ >+ =head1 SYNOPSIS >+ >+@@ -449,7 +448,7 @@ B<20 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY> err >+ >+ =head1 SEE ALSO >+ >+-L<x509(1)|x509(1)> >++L<openssl-x509(1)|openssl-x509(1)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl-version.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-version.pod >+@@ -2,8 +2,7 @@ >+ >+ =head1 NAME >+ >+-openssl-version, >+-version - print OpenSSL version information >++openssl-version - print OpenSSL version information >+ >+ =head1 SYNOPSIS >+ >+--- doc/apps/openssl-x509.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl-x509.pod >+@@ -3,8 +3,7 @@ >+ >+ =head1 NAME >+ >+-openssl-x509, >+-x509 - Certificate display and signing utility >++openssl-x509 - Certificate display and signing utility >+ >+ =head1 SYNOPSIS >+ >+@@ -420,7 +419,7 @@ the section to add certificate extensions from. If thi >+ specified then the extensions should either be contained in the unnamed >+ (default) section or the default section should contain a variable called >+ "extensions" which contains the section to use. See the >+-L<x509v3_config(5)|x509v3_config(5)> manual page for details of the >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> manual page for details of the >+ extension section format. >+ >+ =item B<-force_pubkey key> >+@@ -866,9 +865,9 @@ OpenSSL 0.9.5 and later. >+ >+ =head1 SEE ALSO >+ >+-L<req(1)|req(1)>, L<ca(1)|ca(1)>, L<genrsa(1)|genrsa(1)>, >+-L<gendsa(1)|gendsa(1)>, L<verify(1)|verify(1)>, >+-L<x509v3_config(5)|x509v3_config(5)> >++L<openssl-req(1)|openssl-req(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-genrsa(1)|openssl-genrsa(1)>, >++L<openssl-gendsa(1)|openssl-gendsa(1)>, L<openssl-verify(1)|openssl-verify(1)>, >++L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/openssl.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/openssl.pod >+@@ -69,63 +69,63 @@ B<list->I<...>B<-commands>, or B<no->I<XXX> itself.) >+ >+ =over 10 >+ >+-=item L<B<asn1parse>|asn1parse(1)> >++=item L<B<asn1parse>|openssl-asn1parse(1)> >+ >+ Parse an ASN.1 sequence. >+ >+-=item L<B<ca>|ca(1)> >++=item L<B<ca>|openssl-ca(1)> >+ >+ Certificate Authority (CA) Management. >+ >+-=item L<B<ciphers>|ciphers(1)> >++=item L<B<ciphers>|openssl-ciphers(1)> >+ >+ Cipher Suite Description Determination. >+ >+-=item L<B<cms>|cms(1)> >++=item L<B<cms>|openssl-cms(1)> >+ >+ CMS (Cryptographic Message Syntax) utility >+ >+-=item L<B<crl>|crl(1)> >++=item L<B<crl>|openssl-crl(1)> >+ >+ Certificate Revocation List (CRL) Management. >+ >+-=item L<B<crl2pkcs7>|crl2pkcs7(1)> >++=item L<B<crl2pkcs7>|openssl-crl2pkcs7(1)> >+ >+ CRL to PKCS#7 Conversion. >+ >+-=item L<B<dgst>|dgst(1)> >++=item L<B<dgst>|openssl-dgst(1)> >+ >+ Message Digest Calculation. >+ >+ =item B<dh> >+ >+ Diffie-Hellman Parameter Management. >+-Obsoleted by L<B<dhparam>|dhparam(1)>. >++Obsoleted by L<B<dhparam>|openssl-dhparam(1)>. >+ >+-=item L<B<dhparam>|dhparam(1)> >++=item L<B<dhparam>|openssl-dhparam(1)> >+ >+ Generation and Management of Diffie-Hellman Parameters. Superseded by >+-L<B<genpkey>|genpkey(1)> and L<B<pkeyparam>|pkeyparam(1)> >++L<B<genpkey>|openssl-genpkey(1)> and L<B<pkeyparam>|openssl-pkeyparam(1)> >+ >+ >+-=item L<B<dsa>|dsa(1)> >++=item L<B<dsa>|openssl-dsa(1)> >+ >+ DSA Data Management. >+ >+-=item L<B<dsaparam>|dsaparam(1)> >++=item L<B<dsaparam>|openssl-dsaparam(1)> >+ >+ DSA Parameter Generation and Management. Superseded by >+-L<B<genpkey>|genpkey(1)> and L<B<pkeyparam>|pkeyparam(1)> >++L<B<genpkey>|openssl-genpkey(1)> and L<B<pkeyparam>|openssl-pkeyparam(1)> >+ >+-=item L<B<ec>|ec(1)> >++=item L<B<ec>|openssl-ec(1)> >+ >+ EC (Elliptic curve) key processing >+ >+-=item L<B<ecparam>|ecparam(1)> >++=item L<B<ecparam>|openssl-ecparam(1)> >+ >+ EC parameter manipulation and generation >+ >+-=item L<B<enc>|enc(1)> >++=item L<B<enc>|openssl-enc(1)> >+ >+ Encoding with Ciphers. >+ >+@@ -133,86 +133,86 @@ Encoding with Ciphers. >+ >+ Engine (loadble module) information and manipulation. >+ >+-=item L<B<errstr>|errstr(1)> >++=item L<B<errstr>|openssl-errstr(1)> >+ >+ Error Number to Error String Conversion. >+ >+ =item B<gendh> >+ >+ Generation of Diffie-Hellman Parameters. >+-Obsoleted by L<B<dhparam>|dhparam(1)>. >++Obsoleted by L<B<dhparam>|openssl-dhparam(1)>. >+ >+-=item L<B<gendsa>|gendsa(1)> >++=item L<B<gendsa>|openssl-gendsa(1)> >+ >+ Generation of DSA Private Key from Parameters. Superseded by >+-L<B<genpkey>|genpkey(1)> and L<B<pkey>|pkey(1)> >++L<B<genpkey>|openssl-genpkey(1)> and L<B<pkey>|openssl-pkey(1)> >+ >+-=item L<B<genpkey>|genpkey(1)> >++=item L<B<genpkey>|openssl-genpkey(1)> >+ >+ Generation of Private Key or Parameters. >+ >+-=item L<B<genrsa>|genrsa(1)> >++=item L<B<genrsa>|openssl-genrsa(1)> >+ >+-Generation of RSA Private Key. Superceded by L<B<genpkey>|genpkey(1)>. >++Generation of RSA Private Key. Superceded by L<B<genpkey>|openssl-genpkey(1)>. >+ >+-=item L<B<nseq>|nseq(1)> >++=item L<B<nseq>|openssl-nseq(1)> >+ >+ Create or examine a netscape certificate sequence >+ >+-=item L<B<ocsp>|ocsp(1)> >++=item L<B<ocsp>|openssl-ocsp(1)> >+ >+ Online Certificate Status Protocol utility. >+ >+-=item L<B<passwd>|passwd(1)> >++=item L<B<passwd>|openssl-passwd(1)> >+ >+ Generation of hashed passwords. >+ >+-=item L<B<pkcs12>|pkcs12(1)> >++=item L<B<pkcs12>|openssl-pkcs12(1)> >+ >+ PKCS#12 Data Management. >+ >+-=item L<B<pkcs7>|pkcs7(1)> >++=item L<B<pkcs7>|openssl-pkcs7(1)> >+ >+ PKCS#7 Data Management. >+ >+-=item L<B<pkey>|pkey(1)> >++=item L<B<pkey>|openssl-pkey(1)> >+ >+ Public and private key management. >+ >+-=item L<B<pkeyparam>|pkeyparam(1)> >++=item L<B<pkeyparam>|openssl-pkeyparam(1)> >+ >+ Public key algorithm parameter management. >+ >+-=item L<B<pkeyutl>|pkeyutl(1)> >++=item L<B<pkeyutl>|openssl-pkeyutl(1)> >+ >+ Public key algorithm cryptographic operation utility. >+ >+-=item L<B<rand>|rand(1)> >++=item L<B<rand>|openssl-rand(1)> >+ >+ Generate pseudo-random bytes. >+ >+-=item L<B<req>|req(1)> >++=item L<B<req>|openssl-req(1)> >+ >+ PKCS#10 X.509 Certificate Signing Request (CSR) Management. >+ >+-=item L<B<rsa>|rsa(1)> >++=item L<B<rsa>|openssl-rsa(1)> >+ >+ RSA key management. >+ >+ >+-=item L<B<rsautl>|rsautl(1)> >++=item L<B<rsautl>|openssl-rsautl(1)> >+ >+ RSA utility for signing, verification, encryption, and decryption. Superseded >+-by L<B<pkeyutl>|pkeyutl(1)> >++by L<B<pkeyutl>|openssl-pkeyutl(1)> >+ >+-=item L<B<s_client>|s_client(1)> >++=item L<B<s_client>|openssl-s_client(1)> >+ >+ This implements a generic SSL/TLS client which can establish a transparent >+ connection to a remote server speaking SSL/TLS. It's intended for testing >+ purposes only and provides only rudimentary interface functionality but >+ internally uses mostly all functionality of the OpenSSL B<ssl> library. >+ >+-=item L<B<s_server>|s_server(1)> >++=item L<B<s_server>|openssl-s_server(1)> >+ >+ This implements a generic SSL/TLS server which accepts connections from remote >+ clients speaking SSL/TLS. It's intended for testing purposes only and provides >+@@ -221,39 +221,39 @@ functionality of the OpenSSL B<ssl> library. It provi >+ line oriented protocol for testing SSL functions and a simple HTTP response >+ facility to emulate an SSL/TLS-aware webserver. >+ >+-=item L<B<s_time>|s_time(1)> >++=item L<B<s_time>|openssl-s_time(1)> >+ >+ SSL Connection Timer. >+ >+-=item L<B<sess_id>|sess_id(1)> >++=item L<B<sess_id>|openssl-sess_id(1)> >+ >+ SSL Session Data Management. >+ >+-=item L<B<smime>|smime(1)> >++=item L<B<smime>|openssl-smime(1)> >+ >+ S/MIME mail processing. >+ >+-=item L<B<speed>|speed(1)> >++=item L<B<speed>|openssl-speed(1)> >+ >+ Algorithm Speed Measurement. >+ >+-=item L<B<spkac>|spkac(1)> >++=item L<B<spkac>|openssl-spkac(1)> >+ >+ SPKAC printing and generating utility >+ >+-=item L<B<ts>|ts(1)> >++=item L<B<ts>|openssl-ts(1)> >+ >+ Time Stamping Authority tool (client/server) >+ >+-=item L<B<verify>|verify(1)> >++=item L<B<verify>|openssl-verify(1)> >+ >+ X.509 Certificate Verification. >+ >+-=item L<B<version>|version(1)> >++=item L<B<version>|openssl-version(1)> >+ >+ OpenSSL Version Information. >+ >+-=item L<B<x509>|x509(1)> >++=item L<B<x509>|openssl-x509(1)> >+ >+ X.509 Certificate Data Management. >+ >+@@ -396,19 +396,19 @@ read the password from standard input. >+ >+ =head1 SEE ALSO >+ >+-L<asn1parse(1)|asn1parse(1)>, L<ca(1)|ca(1)>, L<config(5)|config(5)>, >+-L<crl(1)|crl(1)>, L<crl2pkcs7(1)|crl2pkcs7(1)>, L<dgst(1)|dgst(1)>, >+-L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>, >+-L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>, >+-L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>, >+-L<passwd(1)|passwd(1)>, >+-L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>, >+-L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>, >+-L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>, >+-L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>, >+-L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>, >+-L<verify(1)|verify(1)>, L<version(1)|version(1)>, L<x509(1)|x509(1)>, >+-L<crypto(3)|crypto(3)>, L<ssl(3)|ssl(3)>, L<x509v3_config(5)|x509v3_config(5)> >++L<openssl-asn1parse(1)|openssl-asn1parse(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<config(5)|config(5)>, >++L<openssl-crl(1)|openssl-crl(1)>, L<openssl-crl2pkcs7(1)|openssl-crl2pkcs7(1)>, L<openssl-dgst(1)|openssl-dgst(1)>, >++L<openssl-dhparam(1)|openssl-dhparam(1)>, L<openssl-dsa(1)|openssl-dsa(1)>, L<openssl-dsaparam(1)|openssl-dsaparam(1)>, >++L<openssl-enc(1)|openssl-enc(1)>, L<openssl-gendsa(1)|openssl-gendsa(1)>, L<openssl-genpkey(1)|openssl-genpkey(1)>, >++L<openssl-genrsa(1)|openssl-genrsa(1)>, L<openssl-nseq(1)|openssl-nseq(1)>, L<openssl(1)|openssl(1)>, >++L<openssl-passwd(1)|openssl-passwd(1)>, >++L<openssl-pkcs12(1)|openssl-pkcs12(1)>, L<openssl-pkcs7(1)|openssl-pkcs7(1)>, L<openssl-pkcs8(1)|openssl-pkcs8(1)>, >++L<openssl-rand(1)|openssl-rand(1)>, L<openssl-req(1)|openssl-req(1)>, L<openssl-rsa(1)|openssl-rsa(1)>, >++L<openssl-rsautl(1)|openssl-rsautl(1)>, L<openssl-s_client(1)|openssl-s_client(1)>, >++L<openssl-s_server(1)|openssl-s_server(1)>, L<openssl-s_time(1)|openssl-s_time(1)>, >++L<openssl-smime(1)|openssl-smime(1)>, L<openssl-spkac(1)|openssl-spkac(1)>, >++L<openssl-verify(1)|openssl-verify(1)>, L<openssl-version(1)|openssl-version(1)>, L<openssl-x509(1)|openssl-x509(1)>, >++L<crypto(3)|crypto(3)>, L<ssl(3)|ssl(3)>, L<openssl-x509v3_config(5)|openssl-x509v3_config(5)> >+ >+ =head1 HISTORY >+ >+--- doc/apps/x509v3_config.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/apps/x509v3_config.pod >+@@ -522,7 +522,7 @@ for arbitrary extensions was added in OpenSSL 0.9.8 >+ >+ =head1 SEE ALSO >+ >+-L<req(1)|req(1)>, L<ca(1)|ca(1)>, L<x509(1)|x509(1)>, >++L<openssl-req(1)|openssl-req(1)>, L<openssl-ca(1)|openssl-ca(1)>, L<openssl-x509(1)|openssl-x509(1)>, >+ L<ASN1_generate_nconf(3)|ASN1_generate_nconf(3)> >+ >+ >+--- doc/crypto/BN_generate_prime.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/BN_generate_prime.pod >+@@ -148,7 +148,7 @@ The error codes can be obtained by L<ERR_get_error(3)| >+ >+ =head1 SEE ALSO >+ >+-L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)> >++L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/BN_rand.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/BN_rand.pod >+@@ -50,7 +50,7 @@ The error codes can be obtained by L<ERR_get_error(3)| >+ >+ =head1 SEE ALSO >+ >+-L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DH_generate_key.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DH_generate_key.pod >+@@ -40,7 +40,7 @@ The error codes can be obtained by L<ERR_get_error(3)| >+ >+ =head1 SEE ALSO >+ >+-L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DH_size(3)|DH_size(3)> >++L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, L<DH_size(3)|DH_size(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/DH_generate_parameters.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DH_generate_parameters.pod >+@@ -68,7 +68,7 @@ a usable generator. >+ >+ =head1 SEE ALSO >+ >+-L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<DH_free(3)|DH_free(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DSA_SIG_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_SIG_new.pod >+@@ -30,7 +30,7 @@ DSA_SIG_free() returns no value. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >+ L<DSA_do_sign(3)|DSA_do_sign(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DSA_do_sign.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_do_sign.pod >+@@ -36,7 +36,7 @@ L<ERR_get_error(3)|ERR_get_error(3)>. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<DSA_SIG_new(3)|DSA_SIG_new(3)>, >+ L<DSA_sign(3)|DSA_sign(3)> >+ >+--- doc/crypto/DSA_dup_DH.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_dup_DH.pod >+@@ -27,7 +27,7 @@ Be careful to avoid small subgroup attacks when using >+ >+ =head1 SEE ALSO >+ >+-L<dh(3)|dh(3)>, L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)> >++L<dh(3)|dh(3)>, L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/DSA_generate_key.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_generate_key.pod >+@@ -24,7 +24,7 @@ The error codes can be obtained by L<ERR_get_error(3)| >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<DSA_generate_parameters(3)|DSA_generate_parameters(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DSA_generate_parameters.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_generate_parameters.pod >+@@ -106,7 +106,7 @@ Seed lengths E<gt> 20 are not supported. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<DSA_free(3)|DSA_free(3)>, L<BN_generate_prime(3)|BN_generate_prime(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DSA_get_ex_new_index.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_get_ex_new_index.pod >+@@ -26,7 +26,7 @@ as described in L<RSA_get_ex_new_index(3)>. >+ >+ =head1 SEE ALSO >+ >+-L<RSA_get_ex_new_index(3)|RSA_get_ex_new_index(3)>, L<dsa(3)|dsa(3)> >++L<RSA_get_ex_new_index(3)|RSA_get_ex_new_index(3)>, L<openssl-dsa(3)|openssl-dsa(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/DSA_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_new.pod >+@@ -31,7 +31,7 @@ DSA_free() returns no value. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >+ L<DSA_generate_parameters(3)|DSA_generate_parameters(3)>, >+ L<DSA_generate_key(3)|DSA_generate_key(3)> >+ >+--- doc/crypto/DSA_set_method.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_set_method.pod >+@@ -123,7 +123,7 @@ algorithms. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<DSA_new(3)|DSA_new(3)> >++L<openssl-dsa(3)|openssl-dsa(3)>, L<DSA_new(3)|DSA_new(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/DSA_sign.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_sign.pod >+@@ -59,7 +59,7 @@ Standard, DSS), ANSI X9.30 >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, >++L<openssl-dsa(3)|openssl-dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<DSA_do_sign(3)|DSA_do_sign(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/DSA_size.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/DSA_size.pod >+@@ -24,7 +24,7 @@ The size in bytes. >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<DSA_sign(3)|DSA_sign(3)> >++L<openssl-dsa(3)|openssl-dsa(3)>, L<DSA_sign(3)|DSA_sign(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/EC_GFp_simple_method.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_GFp_simple_method.pod >+@@ -52,7 +52,7 @@ EC_METHOD_get_field_type returns an integer that ident >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >+ L<EC_POINT_new(3)|EC_POINT_new(3)>, L<EC_POINT_add(3)|EC_POINT_add(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<d2i_ECPKParameters(3)|d2i_ECPKParameters(3)>, >+ L<BN_mod_mul_montgomery(3)|BN_mod_mul_montgomery(3)> >+--- doc/crypto/EC_GROUP_copy.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_GROUP_copy.pod >+@@ -167,7 +167,7 @@ trinomial or pentanomial respectively. Alternatively i >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >+ L<EC_POINT_new(3)|EC_POINT_new(3)>, L<EC_POINT_add(3)|EC_POINT_add(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)|d2i_ECPKParameters(3)> >+ >+--- doc/crypto/EC_GROUP_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_GROUP_new.pod >+@@ -88,7 +88,7 @@ EC_GROUP_set_curve_GFp, EC_GROUP_get_curve_GFp, EC_GRO >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >+ L<EC_POINT_new(3)|EC_POINT_new(3)>, L<EC_POINT_add(3)|EC_POINT_add(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)|d2i_ECPKParameters(3)> >+ >+--- doc/crypto/EC_KEY_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_KEY_new.pod >+@@ -99,7 +99,7 @@ EC_KEY_get_conv_form return the point_conversion_form >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >+ L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, L<EC_POINT_new(3)|EC_POINT_new(3)>, >+ L<EC_POINT_add(3)|EC_POINT_add(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, >+--- doc/crypto/EC_POINT_add.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_POINT_add.pod >+@@ -65,7 +65,7 @@ EC_GROUP_have_precompute_mult return 1 if a precomputa >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >+ L<EC_POINT_new(3)|EC_POINT_new(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)|d2i_ECPKParameters(3)> >+ >+--- doc/crypto/EC_POINT_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EC_POINT_new.pod >+@@ -121,7 +121,7 @@ EC_POINT_hex2point returns the pointer to the EC_POINT >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >+ L<EC_POINT_add(3)|EC_POINT_add(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, L<d2i_ECPKParameters(3)|d2i_ECPKParameters(3)> >+ >+--- doc/crypto/EVP_BytesToKey.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_BytesToKey.pod >+@@ -62,7 +62,7 @@ or 0 on error. >+ >+ =head1 SEE ALSO >+ >+-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, >++L<evp(3)|evp(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/EVP_DigestInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_DigestInit.pod >+@@ -256,7 +256,7 @@ digest name passed on the command line. >+ >+ =head1 SEE ALSO >+ >+-L<dgst(1)|dgst(1)>, >++L<openssl-dgst(1)|openssl-dgst(1)>, >+ L<evp(3)|evp(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/EVP_DigestSignInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_DigestSignInit.pod >+@@ -80,7 +80,7 @@ L<EVP_DigestVerifyInit(3)|EVP_DigestVerifyInit(3)>, >+ L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, >+ L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, >+ L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, >+-L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> >++L<sha(3)|sha(3)>, L<openssl-dgst(1)|openssl-dgst(1)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/EVP_DigestVerifyInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_DigestVerifyInit.pod >+@@ -76,7 +76,7 @@ L<EVP_DigestSignInit(3)|EVP_DigestSignInit(3)>, >+ L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, >+ L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, >+ L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, >+-L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> >++L<sha(3)|sha(3)>, L<openssl-dgst(1)|openssl-dgst(1)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/EVP_OpenInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_OpenInit.pod >+@@ -54,7 +54,7 @@ EVP_OpenFinal() returns 0 if the decrypt failed or 1 f >+ >+ =head1 SEE ALSO >+ >+-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, >++L<evp(3)|evp(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, >+ L<EVP_SealInit(3)|EVP_SealInit(3)> >+ >+--- doc/crypto/EVP_SealInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_SealInit.pod >+@@ -74,7 +74,7 @@ with B<type> set to NULL. >+ >+ =head1 SEE ALSO >+ >+-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, >++L<evp(3)|evp(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, >+ L<EVP_OpenInit(3)|EVP_OpenInit(3)> >+ >+--- doc/crypto/EVP_SignInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_SignInit.pod >+@@ -95,7 +95,7 @@ L<EVP_VerifyInit(3)|EVP_VerifyInit(3)>, >+ L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, >+ L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, >+ L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, >+-L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> >++L<sha(3)|sha(3)>, L<openssl-dgst(1)|openssl-dgst(1)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/EVP_VerifyInit.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/EVP_VerifyInit.pod >+@@ -83,7 +83,7 @@ L<EVP_SignInit(3)|EVP_SignInit(3)>, >+ L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, >+ L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, >+ L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, >+-L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> >++L<sha(3)|sha(3)>, L<openssl-dgst(1)|openssl-dgst(1)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RAND_add.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_add.pod >+@@ -65,7 +65,7 @@ The other functions do not return values. >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, >+ L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RAND_bytes.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_bytes.pod >+@@ -38,7 +38,7 @@ method. >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, >+ L<RAND_add(3)|RAND_add(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RAND_cleanup.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_cleanup.pod >+@@ -20,7 +20,7 @@ RAND_cleanup() returns no value. >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)> >++L<openssl-rand(3)|openssl-rand(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RAND_egd.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_egd.pod >+@@ -72,7 +72,7 @@ success, and -1 if the connection failed. The PRNG sta >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<RAND_add(3)|RAND_add(3)>, >+ L<RAND_cleanup(3)|RAND_cleanup(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RAND_load_file.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_load_file.pod >+@@ -43,7 +43,7 @@ error. >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> >++L<openssl-rand(3)|openssl-rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RAND_set_rand_method.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RAND_set_rand_method.pod >+@@ -67,7 +67,7 @@ algorithms. >+ >+ =head1 SEE ALSO >+ >+-L<rand(3)|rand(3)>, L<engine(3)|engine(3)> >++L<openssl-rand(3)|openssl-rand(3)>, L<engine(3)|engine(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_blinding_on.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_blinding_on.pod >+@@ -34,7 +34,7 @@ RSA_blinding_off() returns no value. >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)>, L<rand(3)|rand(3)> >++L<openssl-rsa(3)|openssl-rsa(3)>, L<openssl-rand(3)|openssl-rand(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_check_key.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_check_key.pod >+@@ -58,7 +58,7 @@ provide their own verifiers. >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)> >++L<openssl-rsa(3)|openssl-rsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_generate_key.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_generate_key.pod >+@@ -70,7 +70,7 @@ RSA_generate_key() goes into an infinite loop for ille >+ >+ =head1 SEE ALSO >+ >+-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, >++L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, >+ L<RSA_free(3)|RSA_free(3)>, L<BN_generate_prime(3)|BN_generate_prime(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RSA_get_ex_new_index.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_get_ex_new_index.pod >+@@ -110,7 +110,7 @@ present in the parent RSA structure when it is called. >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)>, L<CRYPTO_set_ex_data(3)|CRYPTO_set_ex_data(3)> >++L<openssl-rsa(3)|openssl-rsa(3)>, L<CRYPTO_set_ex_data(3)|CRYPTO_set_ex_data(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_new.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_new.pod >+@@ -30,7 +30,7 @@ RSA_free() returns no value. >+ >+ =head1 SEE ALSO >+ >+-L<ERR_get_error(3)|ERR_get_error(3)>, L<rsa(3)|rsa(3)>, >++L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, >+ L<RSA_generate_key(3)|RSA_generate_key(3)>, >+ L<RSA_new_method(3)|RSA_new_method(3)> >+ >+--- doc/crypto/RSA_print.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_print.pod >+@@ -38,7 +38,7 @@ These functions return 1 on success, 0 on error. >+ >+ =head1 SEE ALSO >+ >+-L<dh(3)|dh(3)>, L<dsa(3)|dsa(3)>, L<rsa(3)|rsa(3)>, L<BN_bn2bin(3)|BN_bn2bin(3)> >++L<dh(3)|dh(3)>, L<openssl-dsa(3)|openssl-dsa(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, L<BN_bn2bin(3)|BN_bn2bin(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_private_encrypt.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_private_encrypt.pod >+@@ -59,7 +59,7 @@ obtained by L<ERR_get_error(3)|ERR_get_error(3)>. >+ >+ =head1 SEE ALSO >+ >+-L<ERR_get_error(3)|ERR_get_error(3)>, L<rsa(3)|rsa(3)>, >++L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, >+ L<RSA_sign(3)|RSA_sign(3)>, L<RSA_verify(3)|RSA_verify(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RSA_public_encrypt.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_public_encrypt.pod >+@@ -80,7 +80,7 @@ SSL, PKCS #1 v2.0 >+ >+ =head1 SEE ALSO >+ >+-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, >++L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl-rand(3)|openssl-rand(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, >+ L<RSA_size(3)|RSA_size(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RSA_set_method.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_set_method.pod >+@@ -183,7 +183,7 @@ not currently exist). >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)>, L<RSA_new(3)|RSA_new(3)> >++L<openssl-rsa(3)|openssl-rsa(3)>, L<RSA_new(3)|RSA_new(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/RSA_sign.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_sign.pod >+@@ -55,7 +55,7 @@ SSL, PKCS #1 v2.0 >+ =head1 SEE ALSO >+ >+ L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, >+-L<rsa(3)|rsa(3)>, L<RSA_private_encrypt(3)|RSA_private_encrypt(3)>, >++L<openssl-rsa(3)|openssl-rsa(3)>, L<RSA_private_encrypt(3)|RSA_private_encrypt(3)>, >+ L<RSA_public_decrypt(3)|RSA_public_decrypt(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod >+@@ -48,7 +48,7 @@ These functions serve no recognizable purpose. >+ =head1 SEE ALSO >+ >+ L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, >+-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, >+ L<RSA_verify(3)|RSA_verify(3)> >+ >+ =head1 HISTORY >+--- doc/crypto/RSA_size.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/RSA_size.pod >+@@ -24,7 +24,7 @@ The size in bytes. >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)> >++L<openssl-rsa(3)|openssl-rsa(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/X509_VERIFY_PARAM_set_flags.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/X509_VERIFY_PARAM_set_flags.pod >+@@ -211,7 +211,7 @@ set this flag. >+ Local issuer certificates are often more likely to satisfy local security >+ requirements and lead to a locally trusted root. >+ This is especially important When some certificates in the trust store have >+-explicit trust settings (see "TRUST SETTINGS" in L<x509(1)>). >++explicit trust settings (see "TRUST SETTINGS" in L<openssl-x509(1)>). >+ >+ The B<X509_V_FLAG_PARTIAL_CHAIN> flag causes intermediate certificates in the >+ trust store to be treated as trust-anchors, in the same way as the self-signed >+@@ -257,7 +257,7 @@ L<X509_verify_cert(3)|X509_verify_cert(3)>, >+ L<X509_check_host(3)|X509_check_host(3)>, >+ L<X509_check_email(3)|X509_check_email(3)>, >+ L<X509_check_ip(3)|X509_check_ip(3)>, >+-L<x509(1)|x509(1)> >++L<openssl-x509(1)|openssl-x509(1)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/X509_verify_cert.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/X509_verify_cert.pod >+@@ -14,7 +14,7 @@ X509_verify_cert - discover and verify X509 certificte >+ >+ The X509_verify_cert() function attempts to discover and validate a >+ certificate chain based on parameters in B<ctx>. A complete description of >+-the process is contained in the L<verify(1)|verify(1)> manual page. >++the process is contained in the L<openssl-verify(1)|openssl-verify(1)> manual page. >+ >+ =head1 RETURN VALUES >+ >+--- doc/crypto/bn.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/bn.pod >+@@ -167,7 +167,7 @@ of B<BIGNUM>s to external formats is described in L<BN >+ =head1 SEE ALSO >+ >+ L<bn_internal(3)|bn_internal(3)>, >+-L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, >++L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<openssl-rand(3)|openssl-rand(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, >+ L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, >+ L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, >+ L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, >+--- doc/crypto/crypto.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/crypto.pod >+@@ -27,16 +27,16 @@ hash functions and a cryptographic pseudo-random numbe >+ >+ =item SYMMETRIC CIPHERS >+ >+-L<blowfish(3)|blowfish(3)>, L<cast(3)|cast(3)>, L<des(3)|des(3)>, >++L<blowfish(3)|blowfish(3)>, L<openssl-cast(3)|openssl-cast(3)>, L<des(3)|des(3)>, >+ L<idea(3)|idea(3)>, L<rc2(3)|rc2(3)>, L<rc4(3)|rc4(3)>, L<rc5(3)|rc5(3)> >+ >+ =item PUBLIC KEY CRYPTOGRAPHY AND KEY AGREEMENT >+ >+-L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<rsa(3)|rsa(3)> >++L<openssl-dsa(3)|openssl-dsa(3)>, L<dh(3)|dh(3)>, L<openssl-rsa(3)|openssl-rsa(3)> >+ >+ =item CERTIFICATES >+ >+-L<x509(3)|x509(3)>, L<x509v3(3)|x509v3(3)> >++L<openssl-x509(3)|openssl-x509(3)>, L<openssl-x509v3(3)|openssl-x509v3(3)> >+ >+ =item AUTHENTICATION CODES, HASH FUNCTIONS >+ >+@@ -46,17 +46,17 @@ L<sha(3)|sha(3)> >+ >+ =item AUXILIARY FUNCTIONS >+ >+-L<err(3)|err(3)>, L<threads(3)|threads(3)>, L<rand(3)|rand(3)>, >++L<err(3)|err(3)>, L<threads(3)|threads(3)>, L<openssl-rand(3)|openssl-rand(3)>, >+ L<OPENSSL_VERSION_NUMBER(3)|OPENSSL_VERSION_NUMBER(3)> >+ >+ =item INPUT/OUTPUT, DATA ENCODING >+ >+ L<asn1(3)|asn1(3)>, L<bio(3)|bio(3)>, L<evp(3)|evp(3)>, L<pem(3)|pem(3)>, >+-L<pkcs7(3)|pkcs7(3)>, L<pkcs12(3)|pkcs12(3)> >++L<openssl-pkcs7(3)|openssl-pkcs7(3)>, L<openssl-pkcs12(3)|openssl-pkcs12(3)> >+ >+ =item INTERNAL FUNCTIONS >+ >+-L<bn(3)|bn(3)>, L<buffer(3)|buffer(3)>, L<ec(3)|ec(3)>, L<lhash(3)|lhash(3)>, >++L<bn(3)|bn(3)>, L<buffer(3)|buffer(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<lhash(3)|lhash(3)>, >+ L<objects(3)|objects(3)>, L<stack(3)|stack(3)>, >+ L<txt_db(3)|txt_db(3)> >+ >+--- doc/crypto/d2i_ECPKParameters.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/d2i_ECPKParameters.pod >+@@ -77,7 +77,7 @@ return 1 for success and 0 if an error occurs. >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, >+ L<EC_POINT_new(3)|EC_POINT_new(3)>, L<EC_POINT_add(3)|EC_POINT_add(3)>, L<EC_KEY_new(3)|EC_KEY_new(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, L<d2i_X509(3)|d2i_X509(3)> >+ >+--- doc/crypto/d2i_ECPrivateKey.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/d2i_ECPrivateKey.pod >+@@ -57,7 +57,7 @@ EC_KEY. >+ >+ =head1 SEE ALSO >+ >+-L<crypto(3)|crypto(3)>, L<ec(3)|ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >++L<crypto(3)|crypto(3)>, L<openssl-ec(3)|openssl-ec(3)>, L<EC_GROUP_new(3)|EC_GROUP_new(3)>, >+ L<EC_GROUP_copy(3)|EC_GROUP_copy(3)>, L<EC_POINT_new(3)|EC_POINT_new(3)>, >+ L<EC_POINT_add(3)|EC_POINT_add(3)>, >+ L<EC_GFp_simple_method(3)|EC_GFp_simple_method(3)>, >+--- doc/crypto/des.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/des.pod >+@@ -115,7 +115,7 @@ each byte is the parity bit. The key schedule is an e >+ the key; it is used to speed the encryption process. >+ >+ DES_random_key() generates a random key. The PRNG must be seeded >+-prior to using this function (see L<rand(3)|rand(3)>). If the PRNG >++prior to using this function (see L<openssl-rand(3)|openssl-rand(3)>). If the PRNG >+ could not generate a secure key, 0 is returned. >+ >+ Before a DES key can be used, it must be converted into the >+@@ -316,7 +316,7 @@ the MIT Kerberos library. >+ >+ =head1 SEE ALSO >+ >+-crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<rand(3)|rand(3)> >++crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<openssl-rand(3)|openssl-rand(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/dh.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/dh.pod >+@@ -67,8 +67,8 @@ modify keys. >+ >+ =head1 SEE ALSO >+ >+-L<dhparam(1)|dhparam(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<err(3)|err(3)>, >+-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<engine(3)|engine(3)>, >++L<openssl-dhparam(1)|openssl-dhparam(1)>, L<bn(3)|bn(3)>, L<openssl-dsa(3)|openssl-dsa(3)>, L<err(3)|err(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<openssl-rsa(3)|openssl-rsa(3)>, L<engine(3)|engine(3)>, >+ L<DH_set_method(3)|DH_set_method(3)>, L<DH_new(3)|DH_new(3)>, >+ L<DH_get_ex_new_index(3)|DH_get_ex_new_index(3)>, >+ L<DH_generate_parameters(3)|DH_generate_parameters(3)>, >+--- doc/crypto/dsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/dsa.pod >+@@ -100,8 +100,8 @@ Standard, DSS), ANSI X9.30 >+ >+ =head1 SEE ALSO >+ >+-L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, >+-L<rsa(3)|rsa(3)>, L<sha(3)|sha(3)>, L<engine(3)|engine(3)>, >++L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<openssl-rand(3)|openssl-rand(3)>, >++L<openssl-rsa(3)|openssl-rsa(3)>, L<sha(3)|sha(3)>, L<engine(3)|engine(3)>, >+ L<DSA_new(3)|DSA_new(3)>, >+ L<DSA_size(3)|DSA_size(3)>, >+ L<DSA_generate_parameters(3)|DSA_generate_parameters(3)>, >+--- doc/crypto/ecdsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/ecdsa.pod >+@@ -195,7 +195,7 @@ ANSI X9.62, US Federal Information Processing Standard >+ >+ =head1 SEE ALSO >+ >+-L<dsa(3)|dsa(3)>, L<rsa(3)|rsa(3)> >++L<openssl-dsa(3)|openssl-dsa(3)>, L<openssl-rsa(3)|openssl-rsa(3)> >+ >+ =head1 HISTORY >+ >+--- doc/crypto/engine.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/engine.pod >+@@ -594,6 +594,6 @@ implementations. >+ >+ =head1 SEE ALSO >+ >+-L<rsa(3)|rsa(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<rand(3)|rand(3)> >++L<openssl-rsa(3)|openssl-rsa(3)>, L<openssl-dsa(3)|openssl-dsa(3)>, L<dh(3)|dh(3)>, L<openssl-rand(3)|openssl-rand(3)> >+ >+ =cut >+--- doc/crypto/rsa.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/rsa.pod >+@@ -107,8 +107,8 @@ RSA was covered by a US patent which expired in Septem >+ >+ =head1 SEE ALSO >+ >+-L<rsa(1)|rsa(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, >+-L<rand(3)|rand(3)>, L<engine(3)|engine(3)>, L<RSA_new(3)|RSA_new(3)>, >++L<openssl-rsa(1)|openssl-rsa(1)>, L<bn(3)|bn(3)>, L<openssl-dsa(3)|openssl-dsa(3)>, L<dh(3)|dh(3)>, >++L<openssl-rand(3)|openssl-rand(3)>, L<engine(3)|engine(3)>, L<RSA_new(3)|RSA_new(3)>, >+ L<RSA_public_encrypt(3)|RSA_public_encrypt(3)>, >+ L<RSA_sign(3)|RSA_sign(3)>, L<RSA_size(3)|RSA_size(3)>, >+ L<RSA_generate_key(3)|RSA_generate_key(3)>, >+--- doc/crypto/x509.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/crypto/x509.pod >+@@ -59,6 +59,6 @@ L<d2i_X509_NAME(3)|d2i_X509_NAME(3)>, >+ L<d2i_X509_REQ(3)|d2i_X509_REQ(3)>, >+ L<d2i_X509_SIG(3)|d2i_X509_SIG(3)>, >+ L<crypto(3)|crypto(3)>, >+-L<x509v3(3)|x509v3(3)> >++L<openssl-x509v3(3)|openssl-x509v3(3)> >+ >+ =cut >+--- doc/ssl/SSL_CIPHER_get_name.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_CIPHER_get_name.pod >+@@ -126,7 +126,7 @@ See DESCRIPTION >+ =head1 SEE ALSO >+ >+ L<ssl(3)|ssl(3)>, L<SSL_get_current_cipher(3)|SSL_get_current_cipher(3)>, >+-L<SSL_get_ciphers(3)|SSL_get_ciphers(3)>, L<ciphers(1)|ciphers(1)>, >++L<SSL_get_ciphers(3)|SSL_get_ciphers(3)>, L<openssl-ciphers(1)|openssl-ciphers(1)>, >+ L<SSL_CTX_set_cipher_list(3)|SSL_CTX_set_cipher_list(3)> >+ >+ =cut >+--- doc/ssl/SSL_CTX_set_cipher_list.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_CTX_set_cipher_list.pod >+@@ -15,7 +15,7 @@ SSL_CTX_set_cipher_list, SSL_set_cipher_list - choose >+ >+ SSL_CTX_set_cipher_list() sets the list of available ciphers for B<ctx> >+ using the control string B<str>. The format of the string is described >+-in L<ciphers(1)|ciphers(1)>. The list of ciphers is inherited by all >++in L<openssl-ciphers(1)|openssl-ciphers(1)>. The list of ciphers is inherited by all >+ B<ssl> objects created from B<ctx>. >+ >+ SSL_set_cipher_list() sets the list of ciphers only for B<ssl>. >+@@ -69,6 +69,6 @@ L<ssl(3)|ssl(3)>, L<SSL_get_ciphers(3)|SSL_get_ciphers >+ L<SSL_CTX_use_certificate(3)|SSL_CTX_use_certificate(3)>, >+ L<SSL_CTX_set_tmp_rsa_callback(3)|SSL_CTX_set_tmp_rsa_callback(3)>, >+ L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>, >+-L<ciphers(1)|ciphers(1)> >++L<openssl-ciphers(1)|openssl-ciphers(1)> >+ >+ =cut >+--- doc/ssl/SSL_CTX_set_options.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_CTX_set_options.pod >+@@ -150,7 +150,7 @@ Always create a new key when using temporary/ephemeral >+ (see L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>). >+ This option must be used to prevent small subgroup attacks, when >+ the DH parameters were not generated using "strong" primes >+-(e.g. when using DSA-parameters, see L<dhparam(1)|dhparam(1)>). >++(e.g. when using DSA-parameters, see L<openssl-dhparam(1)|openssl-dhparam(1)>). >+ If "strong" primes were used, it is not strictly necessary to generate >+ a new DH key during each handshake but it is also recommended. >+ B<SSL_OP_SINGLE_DH_USE> should therefore be enabled whenever >+@@ -328,7 +328,7 @@ secure renegotiation and 0 if it does not. >+ L<ssl(3)|ssl(3)>, L<SSL_new(3)|SSL_new(3)>, L<SSL_clear(3)|SSL_clear(3)>, >+ L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>, >+ L<SSL_CTX_set_tmp_rsa_callback(3)|SSL_CTX_set_tmp_rsa_callback(3)>, >+-L<dhparam(1)|dhparam(1)> >++L<openssl-dhparam(1)|openssl-dhparam(1)> >+ >+ =head1 HISTORY >+ >+--- doc/ssl/SSL_CTX_set_tmp_dh_callback.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_CTX_set_tmp_dh_callback.pod >+@@ -57,14 +57,14 @@ DH parameters can be reused, as the actual key is newl >+ the negotiation. The risk in reusing DH parameters is that an attacker >+ may specialize on a very often used DH group. Applications should therefore >+ generate their own DH parameters during the installation process using the >+-openssl L<dhparam(1)|dhparam(1)> application. This application >++openssl L<openssl-dhparam(1)|openssl-dhparam(1)> application. This application >+ guarantees that "strong" primes are used. >+ >+ Files dh2048.pem, and dh4096.pem in the 'apps' directory of the current >+ version of the OpenSSL distribution contain the 'SKIP' DH parameters, >+ which use safe primes and were generated verifiably pseudo-randomly. >+ These files can be converted into C code using the B<-C> option of the >+-L<dhparam(1)|dhparam(1)> application. Generation of custom DH >++L<openssl-dhparam(1)|openssl-dhparam(1)> application. Generation of custom DH >+ parameters during installation should still be preferred to stop an >+ attacker from specializing on a commonly used group. Files dh1024.pem >+ and dh512.pem contain old parameters that must not be used by >+@@ -125,6 +125,6 @@ on failure. Check the error queue to find out the reas >+ L<ssl(3)|ssl(3)>, L<SSL_CTX_set_cipher_list(3)|SSL_CTX_set_cipher_list(3)>, >+ L<SSL_CTX_set_tmp_rsa_callback(3)|SSL_CTX_set_tmp_rsa_callback(3)>, >+ L<SSL_CTX_set_options(3)|SSL_CTX_set_options(3)>, >+-L<ciphers(1)|ciphers(1)>, L<dhparam(1)|dhparam(1)> >++L<openssl-ciphers(1)|openssl-ciphers(1)>, L<openssl-dhparam(1)|openssl-dhparam(1)> >+ >+ =cut >+--- doc/ssl/SSL_CTX_set_tmp_rsa_callback.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_CTX_set_tmp_rsa_callback.pod >+@@ -154,6 +154,6 @@ RSA key is needed and 0 otherwise. >+ L<ssl(3)|ssl(3)>, L<SSL_CTX_set_cipher_list(3)|SSL_CTX_set_cipher_list(3)>, >+ L<SSL_CTX_set_options(3)|SSL_CTX_set_options(3)>, >+ L<SSL_CTX_set_tmp_dh_callback(3)|SSL_CTX_set_tmp_dh_callback(3)>, >+-L<SSL_new(3)|SSL_new(3)>, L<ciphers(1)|ciphers(1)> >++L<SSL_new(3)|SSL_new(3)>, L<openssl-ciphers(1)|openssl-ciphers(1)> >+ >+ =cut >+--- doc/ssl/SSL_get_verify_result.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_get_verify_result.pod >+@@ -44,7 +44,7 @@ The verification succeeded or no peer certificate was >+ >+ =item Any other value >+ >+-Documented in L<verify(1)|verify(1)>. >++Documented in L<openssl-verify(1)|openssl-verify(1)>. >+ >+ =back >+ >+@@ -52,6 +52,6 @@ Documented in L<verify(1)|verify(1)>. >+ >+ L<ssl(3)|ssl(3)>, L<SSL_set_verify_result(3)|SSL_set_verify_result(3)>, >+ L<SSL_get_peer_certificate(3)|SSL_get_peer_certificate(3)>, >+-L<verify(1)|verify(1)> >++L<openssl-verify(1)|openssl-verify(1)> >+ >+ =cut >+--- doc/ssl/SSL_set_verify_result.pod.orig 2019-02-26 14:20:20 UTC >++++ doc/ssl/SSL_set_verify_result.pod >+@@ -23,7 +23,7 @@ the verification result of the B<ssl> object. It does >+ established session, so if the session is to be reused later, the original >+ value will reappear. >+ >+-The valid codes for B<verify_result> are documented in L<verify(1)|verify(1)>. >++The valid codes for B<verify_result> are documented in L<openssl-verify(1)|openssl-verify(1)>. >+ >+ =head1 RETURN VALUES >+ >+@@ -33,6 +33,6 @@ SSL_set_verify_result() does not provide a return valu >+ >+ L<ssl(3)|ssl(3)>, L<SSL_get_verify_result(3)|SSL_get_verify_result(3)>, >+ L<SSL_get_peer_certificate(3)|SSL_get_peer_certificate(3)>, >+-L<verify(1)|verify(1)> >++L<openssl-verify(1)|openssl-verify(1)> >+ >+ =cut > >Property changes on: files/patch-openssl-cmd-prefix >___________________________________________________________________ >Added: fbsd:nokeywords >## -0,0 +1 ## >+yes >\ No newline at end of property >Added: svn:eol-style >## -0,0 +1 ## >+native >\ No newline at end of property >Added: svn:mime-type >## -0,0 +1 ## >+text/plain >\ No newline at end of property >Index: pkg-plist >=================================================================== >--- pkg-plist (revision 494568) >+++ pkg-plist (working copy) >@@ -99,31 +99,7 @@ > libdata/pkgconfig/libssl.pc > libdata/pkgconfig/openssl.pc > man/man1/CA.pl.1.gz >-man/man1/asn1parse.1.gz > man/man1/c_rehash.1.gz >-man/man1/ca.1.gz >-man/man1/ciphers.1.gz >-man/man1/cms.1.gz >-man/man1/crl.1.gz >-man/man1/crl2pkcs7.1.gz >-man/man1/dgst.1.gz >-man/man1/dhparam.1.gz >-man/man1/dsa.1.gz >-man/man1/dsaparam.1.gz >-man/man1/dss1.1.gz >-man/man1/ec.1.gz >-man/man1/ecparam.1.gz >-man/man1/enc.1.gz >-man/man1/errstr.1.gz >-man/man1/gendsa.1.gz >-man/man1/genpkey.1.gz >-man/man1/genrsa.1.gz >-man/man1/md2.1.gz >-man/man1/md4.1.gz >-man/man1/md5.1.gz >-man/man1/mdc2.1.gz >-man/man1/nseq.1.gz >-man/man1/ocsp.1.gz > man/man1/openssl.1.gz > man/man1/openssl-asn1parse.1.gz > man/man1/openssl-ca.1.gz >@@ -135,6 +111,7 @@ > man/man1/openssl-dhparam.1.gz > man/man1/openssl-dsa.1.gz > man/man1/openssl-dsaparam.1.gz >+man/man1/openssl-dss1.1.gz > man/man1/openssl-ec.1.gz > man/man1/openssl-ecparam.1.gz > man/man1/openssl-enc.1.gz >@@ -142,6 +119,10 @@ > man/man1/openssl-gendsa.1.gz > man/man1/openssl-genpkey.1.gz > man/man1/openssl-genrsa.1.gz >+man/man1/openssl-md2.1.gz >+man/man1/openssl-md4.1.gz >+man/man1/openssl-md5.1.gz >+man/man1/openssl-mdc2.1.gz > man/man1/openssl-nseq.1.gz > man/man1/openssl-ocsp.1.gz > man/man1/openssl-passwd.1.gz >@@ -153,6 +134,7 @@ > man/man1/openssl-pkeyutl.1.gz > man/man1/openssl-rand.1.gz > man/man1/openssl-req.1.gz >+man/man1/openssl-ripemd160.1.gz > man/man1/openssl-rsa.1.gz > man/man1/openssl-rsautl.1.gz > man/man1/openssl-s_client.1.gz >@@ -159,6 +141,12 @@ > man/man1/openssl-s_server.1.gz > man/man1/openssl-s_time.1.gz > man/man1/openssl-sess_id.1.gz >+man/man1/openssl-sha.1.gz >+man/man1/openssl-sha1.1.gz >+man/man1/openssl-sha224.1.gz >+man/man1/openssl-sha256.1.gz >+man/man1/openssl-sha384.1.gz >+man/man1/openssl-sha512.1.gz > man/man1/openssl-smime.1.gz > man/man1/openssl-speed.1.gz > man/man1/openssl-spkac.1.gz >@@ -167,36 +155,6 @@ > man/man1/openssl-verify.1.gz > man/man1/openssl-version.1.gz > man/man1/openssl-x509.1.gz >-man/man1/passwd.1.gz >-man/man1/pkcs12.1.gz >-man/man1/pkcs7.1.gz >-man/man1/pkcs8.1.gz >-man/man1/pkey.1.gz >-man/man1/pkeyparam.1.gz >-man/man1/pkeyutl.1.gz >-man/man1/rand.1.gz >-man/man1/req.1.gz >-man/man1/ripemd160.1.gz >-man/man1/rsa.1.gz >-man/man1/rsautl.1.gz >-man/man1/s_client.1.gz >-man/man1/s_server.1.gz >-man/man1/s_time.1.gz >-man/man1/sess_id.1.gz >-man/man1/sha.1.gz >-man/man1/sha1.1.gz >-man/man1/sha224.1.gz >-man/man1/sha256.1.gz >-man/man1/sha384.1.gz >-man/man1/sha512.1.gz >-man/man1/smime.1.gz >-man/man1/speed.1.gz >-man/man1/spkac.1.gz >-man/man1/ts.1.gz >-man/man1/tsget.1.gz >-man/man1/verify.1.gz >-man/man1/version.1.gz >-man/man1/x509.1.gz > %%MAN3%%man/man3/ASN1_OBJECT_free.3.gz > %%MAN3%%man/man3/ASN1_OBJECT_new.3.gz > %%MAN3%%man/man3/ASN1_STRING_cmp.3.gz
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 236237
:
202568
| 202698 |
202699