From: Dr. David von Oheimb Date: Mon, 17 May 2021 09:38:01 +0000 (+0200) Subject: DOC: Fix nits found by improved find-doc-nits -c X-Git-Tag: openssl-3.0.0-alpha17~67 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=78c44e4f819721eb80ad95fddc360a34f9e93118;p=thirdparty%2Fopenssl.git DOC: Fix nits found by improved find-doc-nits -c Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/15298) --- diff --git a/apps/list.c b/apps/list.c index bf7c9b10495..37e363ebd1f 100644 --- a/apps/list.c +++ b/apps/list.c @@ -1470,7 +1470,7 @@ const OPTIONS list_options[] = { {"kdf-algorithms", OPT_KDF_ALGORITHMS, '-', "List of key derivation and pseudo random function algorithms"}, {"random-instances", OPT_RANDOM_INSTANCES, '-', - "List the primary, pubic and private random number generator details"}, + "List the primary, public and private random number generator details"}, {"random-generators", OPT_RANDOM_GENERATORS, '-', "List of random number generators"}, {"mac-algorithms", OPT_MAC_ALGORITHMS, '-', @@ -1490,7 +1490,7 @@ const OPTIONS list_options[] = { "List of key encapsulation mechanism algorithms" }, {"signature-algorithms", OPT_SIGNATURE_ALGORITHMS, '-', "List of signature algorithms" }, - { "asymcipher-algorithms", OPT_ASYM_CIPHER_ALGORITHMS, '-', + {"asymcipher-algorithms", OPT_ASYM_CIPHER_ALGORITHMS, '-', "List of asymmetric cipher algorithms" }, {"public-key-algorithms", OPT_PK_ALGORITHMS, '-', "List of public key algorithms"}, diff --git a/doc/man1/openssl-cms.pod.in b/doc/man1/openssl-cms.pod.in index 0ec906cbc11..5263a5d5be7 100644 --- a/doc/man1/openssl-cms.pod.in +++ b/doc/man1/openssl-cms.pod.in @@ -48,6 +48,10 @@ B B [B<-md> I] [B<-I>] [B<-wrap> I] +[B<-aes128-wrap>] +[B<-aes192-wrap>] +[B<-aes256-wrap>] +[B<-des3-wrap>] [B<-nointern>] [B<-noverify>] [B<-nocerts>] @@ -322,6 +326,10 @@ Cipher algorithm to use for key wrap when encrypting the message using Key Agreement for key transport. The algorithm specified should be suitable for key wrap. +=item B<-aes128-wrap>, B<-aes192-wrap>, B<-aes256-wrap>, B<-des3-wrap> + +Use AES128, AES192, AES256, or 3DES-EDE, respectively, to wrap key. + =item B<-nointern> When verifying a message normally certificates (if any) included in diff --git a/doc/man1/openssl-dsa.pod.in b/doc/man1/openssl-dsa.pod.in index 3450ebf4f48..494cfe86354 100644 --- a/doc/man1/openssl-dsa.pod.in +++ b/doc/man1/openssl-dsa.pod.in @@ -36,6 +36,9 @@ B B [B<-modulus>] [B<-pubin>] [B<-pubout>] +[B<-pvk-strong>] +[B<-pvk-weak>] +[B<-pvk-none>] {- $OpenSSL::safe::opt_engine_synopsis -}{- $OpenSSL::safe::opt_provider_synopsis -} =for openssl ifdef pvk-strong pvk-weak pvk-none engine @@ -123,6 +126,18 @@ By default, a private key is output. With this option a public key will be output instead. This option is automatically set if the input is a public key. +=item B<-pvk-strong> + +Enable 'Strong' PVK encoding level (default). + +=item B<-pvk-weak> + +Enable 'Weak' PVK encoding level. + +=item B<-pvk-none> + +Don't enforce PVK encoding. + {- $OpenSSL::safe::opt_engine_item -} {- $OpenSSL::safe::opt_provider_item -} diff --git a/doc/man1/openssl-list.pod.in b/doc/man1/openssl-list.pod.in index 74389dca233..2b05fa74d4f 100644 --- a/doc/man1/openssl-list.pod.in +++ b/doc/man1/openssl-list.pod.in @@ -13,12 +13,14 @@ B [B<-select> I] [B<-1>] [B<-commands>] +[B<-standard-commands>] [B<-digest-algorithms>] {- output_off() if $disabled{"deprecated-3.0"}; "" -}[B<-digest-commands>] {- output_on() if $disabled{"deprecated-3.0"}; "" -}[B<-kdf-algorithms>] [B<-mac-algorithms>] +[B<-random-instances>] [B<-random-generators>] [B<-cipher-algorithms>] {- output_off() if $disabled{"deprecated-3.0"}; "" @@ -38,6 +40,7 @@ B -}[B<-engines>] {- output_on() if $disabled{"deprecated-3.0"}; "" -}[B<-disabled>] +[B<-missing-help>] [B<-objects>] [B<-options> I] {- $OpenSSL::safe::opt_provider_synopsis -} @@ -73,6 +76,10 @@ If used, this option must be given first. Display a list of standard commands. +=item B<-standard-commands> + +List of standard commands. + =item B<-digest-commands> This option is deprecated. Use B instead. @@ -97,6 +104,10 @@ displayed. In verbose mode, the algorithms provided by a provider will get additional information on what parameters each implementation supports. +=item B<-random-instances> + +List the primary, public and private random number generator details. + =item B<-random-generators> Display a list of random number generators. @@ -171,6 +182,10 @@ Display a list of loaded engines. Display a list of disabled features, those that were compiled out of the installation. +=item B<-missing-help> + +List missing detailed help strings. + =item B<-objects> Display a list of built in objects, i.e. OIDs with names. They're listed in the diff --git a/doc/man1/openssl-rsa.pod.in b/doc/man1/openssl-rsa.pod.in index fab6408f148..286766e72f4 100644 --- a/doc/man1/openssl-rsa.pod.in +++ b/doc/man1/openssl-rsa.pod.in @@ -40,6 +40,9 @@ B B [B<-pubout>] [B<-RSAPublicKey_in>] [B<-RSAPublicKey_out>] +[B<-pvk-strong>] +[B<-pvk-weak>] +[B<-pvk-none>] {- $OpenSSL::safe::opt_engine_synopsis -}{- $OpenSSL::safe::opt_provider_synopsis -} =for openssl ifdef pvk-strong pvk-weak pvk-none engine @@ -133,6 +136,18 @@ the input is a public key. Like B<-pubin> and B<-pubout> except B format is used instead. +=item B<-pvk-strong> + +Enable 'Strong' PVK encoding level (default). + +=item B<-pvk-weak> + +Enable 'Weak' PVK encoding level. + +=item B<-pvk-none> + +Don't enforce PVK encoding. + {- $OpenSSL::safe::opt_engine_item -} {- $OpenSSL::safe::opt_provider_item -}