]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
man: introduce openssl as man page provider and use it for ukify.1
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Wed, 28 May 2025 13:23:03 +0000 (15:23 +0200)
committerLuca Boccassi <luca.boccassi@gmail.com>
Wed, 25 Jun 2025 12:36:10 +0000 (13:36 +0100)
(cherry picked from commit 001ae86a739b13e987419af1e3e13a3caaafa8c3)

man/custom-html.xsl
man/ukify.xml

index e5551fc798a2e0c73113df26a85e8de054122f18..98ec95303d7928f33771373737d581acedf681f1 100644 (file)
   </a>
 </xsl:template>
 
+<xsl:template match="citerefentry[@project='openssl']">
+  <a>
+    <xsl:attribute name="href">
+      <xsl:text>https://docs.openssl.org/master/man</xsl:text>
+      <xsl:value-of select="manvolnum"/>
+      <xsl:text>/</xsl:text>
+      <xsl:value-of select="refentrytitle"/>
+    </xsl:attribute>
+    <xsl:call-template name="inline.charseq"/>
+  </a>
+</xsl:template>
+
 <xsl:template match="citerefentry[@project='archlinux']">
   <a>
     <xsl:attribute name="href">
index fc68d837720714169c0cc10fe25c01ab395cf0c3..15cd35bcf5a47127b7035d8e7de423cb4afdbdd5 100644 (file)
       describing separate boot phases. If one of
       <varname>SigningEngine=</varname>/<option>--signing-engine=</option> or
       <varname>SigningProvider=</varname>/<option>--signing-provider=</option> is specified, then the private
-      key arguments will be passed verbatim to OpenSSL as URIs, and the public key arguments will be loaded
-      as X.509 certificates, so that signing can be performed with an OpenSSL engine or provider
-      respectively.</para>
+      key arguments will be passed verbatim to
+      <citerefentry project='openssl'><refentrytitle>openssl</refentrytitle><manvolnum>1</manvolnum></citerefentry>
+      as URIs, and the public key arguments will be loaded as X.509 certificates, so that signing can be
+      performed with an OpenSSL engine or provider respectively.</para>
 
       <para>If a SecureBoot signing key is provided via the
       <varname>SecureBootPrivateKey=</varname>/<option>--secureboot-private-key=</option> option, the resulting
           <term><varname>SigningEngine=<replaceable>ENGINE</replaceable></varname></term>
           <term><option>--signing-engine=<replaceable>ENGINE</replaceable></option></term>
 
-          <listitem><para>An OpenSSL engine to be used for signing the resulting binary and PCR measurements.
+          <listitem><para>An OpenSSL engine to be used for signing the resulting binary and PCR measurements,
+          see
+          <citerefentry project='openssl'><refentrytitle>openssl-engine</refentrytitle><manvolnum>1</manvolnum></citerefentry>.
           </para>
 
           <xi:include href="version-info.xml" xpointer="v253"/></listitem>
           <term><option>--signing-provider=<replaceable>PROVIDER</replaceable></option></term>
 
           <listitem><para>An OpenSSL provider to be used for signing the resulting binary and PCR
-          measurements. This option can only be used when using <command>systemd-sbsign</command> as the
-          signing tool.</para>
+          measurements, see
+          <citerefentry project='openssl'><refentrytitle>provider</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+          This option can only be used when <command>systemd-sbsign</command> is used as the signing
+          tool.</para>
 
           <xi:include href="version-info.xml" xpointer="v257"/></listitem>
         </varlistentry>
           <term><option>--certificate-provider=<replaceable>PROVIDER</replaceable></option></term>
 
           <listitem><para>An OpenSSL provider to be used for loading the certificate used to sign the
-          resulting binary and PCR measurements. This option can only be used when using
-          <command>systemd-sbsign</command> as the signing tool.</para>
+          resulting binary and PCR measurements, see
+          <citerefentry project='openssl'><refentrytitle>provider</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
+          This option can only be used when <command>systemd-sbsign</command> is used as the signing
+          tool.</para>
 
           <xi:include href="version-info.xml" xpointer="v257"/></listitem>
         </varlistentry>
@@ -788,7 +795,7 @@ Writing public key for PCR signing to /etc/systemd/tpm2-pcr-public-key-system.pe
       <programlisting>$ ukify build \
       --profile='TITLE=Boot into Storage Target Mode
 ID=storagetm' \
-      --cmdline='quiet rw rd.systemd.unit=stroage-target-mode.target' \
+      --cmdline='quiet rw rd.systemd.unit=storage-target-mode.target' \
       --output=profile1.efi
 </programlisting>