Blame SOURCES/openssl-1.0.1e-manfix.patch

a5ef24
diff -up openssl-1.0.1e/doc/apps/cms.pod.manfix openssl-1.0.1e/doc/apps/cms.pod
a5ef24
--- openssl-1.0.1e/doc/apps/cms.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/cms.pod	2013-09-12 11:17:42.147092310 +0200
a5ef24
@@ -450,28 +450,28 @@ remains DER.
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 the operation was completely successfully.
a5ef24
 
a5ef24
-=item 1 
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 an error occurred parsing the command options.
a5ef24
 
a5ef24
-=item 2
a5ef24
+=item C<2>
a5ef24
 
a5ef24
 one of the input files could not be read.
a5ef24
 
a5ef24
-=item 3
a5ef24
+=item C<3>
a5ef24
 
a5ef24
 an error occurred creating the CMS file or when reading the MIME
a5ef24
 message.
a5ef24
 
a5ef24
-=item 4
a5ef24
+=item C<4>
a5ef24
 
a5ef24
 an error occurred decrypting or verifying the message.
a5ef24
 
a5ef24
-=item 5
a5ef24
+=item C<5>
a5ef24
 
a5ef24
 the message was verified correctly but an error occurred writing out
a5ef24
 the signers certificates.
a5ef24
diff -up openssl-1.0.1e/doc/apps/ec.pod.manfix openssl-1.0.1e/doc/apps/ec.pod
a5ef24
--- openssl-1.0.1e/doc/apps/ec.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/ec.pod	2013-09-12 11:17:42.147092310 +0200
a5ef24
@@ -93,10 +93,6 @@ prints out the public, private key compo
a5ef24
 
a5ef24
 this option prevents output of the encoded version of the key.
a5ef24
 
a5ef24
-=item B<-modulus>
a5ef24
-
a5ef24
-this option prints out the value of the public key component of the key.
a5ef24
-
a5ef24
 =item B<-pubin>
a5ef24
 
a5ef24
 by default a private key is read from the input file: with this option a
a5ef24
diff -up openssl-1.0.1e/doc/apps/openssl.pod.manfix openssl-1.0.1e/doc/apps/openssl.pod
a5ef24
--- openssl-1.0.1e/doc/apps/openssl.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/openssl.pod	2013-09-12 11:17:42.148092331 +0200
a5ef24
@@ -163,7 +163,7 @@ Create or examine a netscape certificate
a5ef24
 
a5ef24
 Online Certificate Status Protocol utility.
a5ef24
 
a5ef24
-=item L<B<passwd>|passwd(1)>
a5ef24
+=item L<B<passwd>|sslpasswd(1)>
a5ef24
 
a5ef24
 Generation of hashed passwords.
a5ef24
 
a5ef24
@@ -187,7 +187,7 @@ Public key algorithm parameter managemen
a5ef24
 
a5ef24
 Public key algorithm cryptographic operation utility.
a5ef24
 
a5ef24
-=item L<B<rand>|rand(1)>
a5ef24
+=item L<B<rand>|sslrand(1)>
a5ef24
 
a5ef24
 Generate pseudo-random bytes.
a5ef24
 
a5ef24
@@ -401,9 +401,9 @@ L<crl(1)|crl(1)>, L
a5ef24
 L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>,
a5ef24
 L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>,
a5ef24
 L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>,
a5ef24
-L<passwd(1)|passwd(1)>,
a5ef24
+L<sslpasswd(1)|sslpasswd(1)>,
a5ef24
 L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>,
a5ef24
-L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
a5ef24
+L<sslrand(1)|sslrand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
a5ef24
 L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>,
a5ef24
 L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>,
a5ef24
 L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>,
a5ef24
diff -up openssl-1.0.1e/doc/apps/s_client.pod.manfix openssl-1.0.1e/doc/apps/s_client.pod
a5ef24
--- openssl-1.0.1e/doc/apps/s_client.pod.manfix	2013-09-12 11:17:41.517078502 +0200
a5ef24
+++ openssl-1.0.1e/doc/apps/s_client.pod	2013-09-12 11:17:42.149092353 +0200
a5ef24
@@ -32,9 +32,14 @@ B<openssl> B<s_client>
a5ef24
 [B<-ssl2>]
a5ef24
 [B<-ssl3>]
a5ef24
 [B<-tls1>]
a5ef24
+[B<-tls1_1>]
a5ef24
+[B<-tls1_2>]
a5ef24
+[B<-dtls1>]
a5ef24
 [B<-no_ssl2>]
a5ef24
 [B<-no_ssl3>]
a5ef24
 [B<-no_tls1>]
a5ef24
+[B<-no_tls1_1>]
a5ef24
+[B<-no_tls1_2>]
a5ef24
 [B<-bugs>]
a5ef24
 [B<-cipher cipherlist>]
a5ef24
 [B<-starttls protocol>]
a5ef24
@@ -44,6 +49,7 @@ B<openssl> B<s_client>
a5ef24
 [B<-sess_out filename>]
a5ef24
 [B<-sess_in filename>]
a5ef24
 [B<-rand file(s)>]
a5ef24
+[B<-nextprotoneg protocols>]
a5ef24
 
a5ef24
 =head1 DESCRIPTION
a5ef24
 
a5ef24
@@ -182,7 +188,7 @@ Use the PSK key B<key> when using a PSK
a5ef24
 given as a hexadecimal number without leading 0x, for example -psk
a5ef24
 1a2b3c4d.
a5ef24
 
a5ef24
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>
a5ef24
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
a5ef24
 
a5ef24
 these options disable the use of certain SSL or TLS protocols. By default
a5ef24
 the initial handshake uses a method which should be compatible with all
a5ef24
@@ -243,6 +249,17 @@ Multiple files can be specified separate
a5ef24
 The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
a5ef24
 all others.
a5ef24
 
a5ef24
+=item B<-nextprotoneg protocols>
a5ef24
+
a5ef24
+enable Next Protocol Negotiation TLS extension and provide a list of
a5ef24
+comma-separated protocol names that the client should advertise
a5ef24
+support for. The list should contain most wanted protocols first.
a5ef24
+Protocol names are printable ASCII strings, for example "http/1.1" or
a5ef24
+"spdy/3".
a5ef24
+Empty list of protocols is treated specially and will cause the client to
a5ef24
+advertise support for the TLS extension but disconnect just after
a5ef24
+reciving ServerHello with a list of server supported protocols.
a5ef24
+
a5ef24
 =back
a5ef24
 
a5ef24
 =head1 CONNECTED COMMANDS
a5ef24
diff -up openssl-1.0.1e/doc/apps/smime.pod.manfix openssl-1.0.1e/doc/apps/smime.pod
a5ef24
--- openssl-1.0.1e/doc/apps/smime.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/smime.pod	2013-09-12 11:17:42.150092375 +0200
a5ef24
@@ -308,28 +308,28 @@ remains DER.
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 the operation was completely successfully.
a5ef24
 
a5ef24
-=item 1 
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 an error occurred parsing the command options.
a5ef24
 
a5ef24
-=item 2
a5ef24
+=item C<2>
a5ef24
 
a5ef24
 one of the input files could not be read.
a5ef24
 
a5ef24
-=item 3
a5ef24
+=item C<3>
a5ef24
 
a5ef24
 an error occurred creating the PKCS#7 file or when reading the MIME
a5ef24
 message.
a5ef24
 
a5ef24
-=item 4
a5ef24
+=item C<4>
a5ef24
 
a5ef24
 an error occurred decrypting or verifying the message.
a5ef24
 
a5ef24
-=item 5
a5ef24
+=item C<5>
a5ef24
 
a5ef24
 the message was verified correctly but an error occurred writing out
a5ef24
 the signers certificates.
a5ef24
diff -up openssl-1.0.1e/doc/apps/s_server.pod.manfix openssl-1.0.1e/doc/apps/s_server.pod
a5ef24
--- openssl-1.0.1e/doc/apps/s_server.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/s_server.pod	2013-09-12 11:17:42.150092375 +0200
a5ef24
@@ -40,10 +40,16 @@ B<openssl> B<s_server>
a5ef24
 [B<-ssl2>]
a5ef24
 [B<-ssl3>]
a5ef24
 [B<-tls1>]
a5ef24
+[B<-tls1_1>]
a5ef24
+[B<-tls1_2>]
a5ef24
+[B<-dtls1>]
a5ef24
 [B<-no_ssl2>]
a5ef24
 [B<-no_ssl3>]
a5ef24
 [B<-no_tls1>]
a5ef24
+[B<-no_tls1_1>]
a5ef24
+[B<-no_tls1_2>]
a5ef24
 [B<-no_dhe>]
a5ef24
+[B<-no_ecdhe>]
a5ef24
 [B<-bugs>]
a5ef24
 [B<-hack>]
a5ef24
 [B<-www>]
a5ef24
@@ -54,6 +60,7 @@ B<openssl> B<s_server>
a5ef24
 [B<-no_ticket>]
a5ef24
 [B<-id_prefix arg>]
a5ef24
 [B<-rand file(s)>]
a5ef24
+[B<-nextprotoneg protocols>]
a5ef24
 
a5ef24
 =head1 DESCRIPTION
a5ef24
 
a5ef24
@@ -131,6 +138,10 @@ a static set of parameters hard coded in
a5ef24
 if this option is set then no DH parameters will be loaded effectively
a5ef24
 disabling the ephemeral DH cipher suites.
a5ef24
 
a5ef24
+=item B<-no_ecdhe>
a5ef24
+
a5ef24
+if this option is set then ephemeral ECDH cipher suites will be disabled.
a5ef24
+
a5ef24
 =item B<-no_tmp_rsa>
a5ef24
 
a5ef24
 certain export cipher suites sometimes use a temporary RSA key, this option
a5ef24
@@ -201,7 +212,7 @@ Use the PSK key B<key> when using a PSK
a5ef24
 given as a hexadecimal number without leading 0x, for example -psk
a5ef24
 1a2b3c4d.
a5ef24
 
a5ef24
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>
a5ef24
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
a5ef24
 
a5ef24
 these options disable the use of certain SSL or TLS protocols. By default
a5ef24
 the initial handshake uses a method which should be compatible with all
a5ef24
@@ -276,6 +287,14 @@ Multiple files can be specified separate
a5ef24
 The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
a5ef24
 all others.
a5ef24
 
a5ef24
+=item B<-nextprotoneg protocols>
a5ef24
+
a5ef24
+enable Next Protocol Negotiation TLS extension and provide a
a5ef24
+comma-separated list of supported protocol names.
a5ef24
+The list should contain most wanted protocols first.
a5ef24
+Protocol names are printable ASCII strings, for example "http/1.1" or
a5ef24
+"spdy/3".
a5ef24
+
a5ef24
 =back
a5ef24
 
a5ef24
 =head1 CONNECTED COMMANDS
a5ef24
diff -up openssl-1.0.1e/doc/apps/verify.pod.manfix openssl-1.0.1e/doc/apps/verify.pod
a5ef24
--- openssl-1.0.1e/doc/apps/verify.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/apps/verify.pod	2013-09-12 11:25:13.994994992 +0200
a5ef24
@@ -25,6 +25,7 @@ B<openssl> B<verify>
a5ef24
 [B<-untrusted file>]
a5ef24
 [B<-help>]
a5ef24
 [B<-issuer_checks>]
a5ef24
+[B<-attime timestamp>]
a5ef24
 [B<-verbose>]
a5ef24
 [B<->]
a5ef24
 [certificates]
a5ef24
@@ -80,6 +81,12 @@ rejected. The presence of rejection mess
a5ef24
 anything is wrong; during the normal verification process, several
a5ef24
 rejections may take place.
a5ef24
 
a5ef24
+=item B<-attime timestamp>
a5ef24
+
a5ef24
+Perform validation checks using the time specified by B<timestamp> and not
a5ef24
+the current system time. B<timestamp> is the number of seconds since
a5ef24
+01.01.1970 (UNIX time).
a5ef24
+
a5ef24
 =item B<-policy arg>
a5ef24
 
a5ef24
 Enable policy processing and add B<arg> to the user-initial-policy-set (see
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_accept.pod.manfix openssl-1.0.1e/doc/ssl/SSL_accept.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_accept.pod.manfix	2013-09-12 11:17:42.129091915 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_accept.pod	2013-09-12 11:17:42.156092507 +0200
a5ef24
@@ -44,13 +44,13 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The TLS/SSL handshake was not successful but was shut down controlled and
a5ef24
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
a5ef24
 return value B<ret> to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
a5ef24
 established.
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_clear.pod.manfix openssl-1.0.1e/doc/ssl/SSL_clear.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_clear.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_clear.pod	2013-09-12 11:17:42.158092551 +0200
a5ef24
@@ -56,12 +56,12 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The SSL_clear() operation could not be performed. Check the error stack to
a5ef24
 find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The SSL_clear() operation was successful.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod.manfix openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod.manfix	2013-09-12 11:17:42.049090162 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod	2013-09-12 11:17:42.159092573 +0200
a5ef24
@@ -60,11 +60,11 @@ SSL_COMP_add_compression_method() may re
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation failed. Check the error queue to find out the reason.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_connect.pod.manfix openssl-1.0.1e/doc/ssl/SSL_connect.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_connect.pod.manfix	2013-09-12 11:17:42.130091937 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_connect.pod	2013-09-12 11:17:42.161092616 +0200
a5ef24
@@ -41,13 +41,13 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The TLS/SSL handshake was not successful but was shut down controlled and
a5ef24
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
a5ef24
 return value B<ret> to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
a5ef24
 established.
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod	2013-09-12 11:17:42.162092638 +0200
a5ef24
@@ -52,13 +52,13 @@ The following values are returned by all
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
  The operation failed. In case of the add operation, it was tried to add
a5ef24
  the same (identical) session twice. In case of the remove operation, the
a5ef24
  session was not found in the cache.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
  
a5ef24
  The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod	2013-09-12 11:17:42.163092660 +0200
a5ef24
@@ -100,13 +100,13 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The operation failed because B<CAfile> and B<CApath> are NULL or the
a5ef24
 processing at one of the locations specified failed. Check the error
a5ef24
 stack to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod.manfix	2013-09-12 11:17:42.132091981 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod	2013-09-12 11:17:42.164092682 +0200
a5ef24
@@ -66,13 +66,13 @@ values:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 A failure while manipulating the STACK_OF(X509_NAME) object occurred or
a5ef24
 the X509_NAME could not be extracted from B<cacert>. Check the error stack
a5ef24
 to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod	2013-09-12 11:17:42.166092726 +0200
a5ef24
@@ -64,13 +64,13 @@ return the following values:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The length B<sid_ctx_len> of the session id context B<sid_ctx> exceeded
a5ef24
 the maximum allowed length of B<SSL_MAX_SSL_SESSION_ID_LENGTH>. The error
a5ef24
 is logged to the error stack.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod.manfix	2013-02-11 16:26:04.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod	2013-09-12 11:17:42.167092748 +0200
a5ef24
@@ -42,11 +42,11 @@ and SSL_set_ssl_method():
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The new choice failed, check the error stack to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod.manfix	2013-09-12 11:17:42.133092003 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod	2013-09-12 11:17:42.168092770 +0200
a5ef24
@@ -96,7 +96,7 @@ data to B<psk> and return the length of
a5ef24
 connection will fail with decryption_error before it will be finished
a5ef24
 completely.
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 PSK identity was not found. An "unknown_psk_identity" alert message
a5ef24
 will be sent and the connection setup fails.
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod.manfix openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod.manfix	2013-09-12 11:17:42.135092047 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod	2013-09-12 11:17:42.170092814 +0200
a5ef24
@@ -45,13 +45,13 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The TLS/SSL handshake was not successful but was shut down controlled and
a5ef24
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
a5ef24
 return value B<ret> to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
a5ef24
 established.
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_read.pod.manfix openssl-1.0.1e/doc/ssl/SSL_read.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_read.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_read.pod	2013-09-12 11:17:42.171092836 +0200
a5ef24
@@ -86,7 +86,7 @@ The following return values can occur:
a5ef24
 The read operation was successful; the return value is the number of
a5ef24
 bytes actually read from the TLS/SSL connection.
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The read operation was not successful. The reason may either be a clean
a5ef24
 shutdown due to a "close notify" alert sent by the peer (in which case
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_session_reused.pod.manfix openssl-1.0.1e/doc/ssl/SSL_session_reused.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_session_reused.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_session_reused.pod	2013-09-12 11:17:42.172092857 +0200
a5ef24
@@ -27,11 +27,11 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 A new session was negotiated.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 A session was reused.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_set_fd.pod.manfix openssl-1.0.1e/doc/ssl/SSL_set_fd.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_set_fd.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_set_fd.pod	2013-09-12 11:17:42.174092901 +0200
a5ef24
@@ -35,11 +35,11 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The operation failed. Check the error stack to find out why.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_set_session.pod.manfix openssl-1.0.1e/doc/ssl/SSL_set_session.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_set_session.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_set_session.pod	2013-09-12 11:17:42.175092923 +0200
a5ef24
@@ -37,11 +37,11 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The operation failed; check the error stack to find out the reason.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The operation succeeded.
a5ef24
 
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_shutdown.pod.manfix openssl-1.0.1e/doc/ssl/SSL_shutdown.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_shutdown.pod.manfix	2013-09-12 11:17:42.137092090 +0200
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_shutdown.pod	2013-09-12 11:17:42.177092967 +0200
a5ef24
@@ -92,14 +92,14 @@ The following return values can occur:
a5ef24
 
a5ef24
 =over 4
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The shutdown is not yet finished. Call SSL_shutdown() for a second time,
a5ef24
 if a bidirectional shutdown shall be performed.
a5ef24
 The output of L<SSL_get_error(3)|SSL_get_error(3)> may be misleading, as an
a5ef24
 erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
a5ef24
 
a5ef24
-=item 1
a5ef24
+=item C<1>
a5ef24
 
a5ef24
 The shutdown was successfully completed. The "close notify" alert was sent
a5ef24
 and the peer's "close notify" alert was received.
a5ef24
diff -up openssl-1.0.1e/doc/ssl/SSL_write.pod.manfix openssl-1.0.1e/doc/ssl/SSL_write.pod
a5ef24
--- openssl-1.0.1e/doc/ssl/SSL_write.pod.manfix	2013-02-11 16:02:48.000000000 +0100
a5ef24
+++ openssl-1.0.1e/doc/ssl/SSL_write.pod	2013-09-12 11:17:42.177092967 +0200
a5ef24
@@ -79,7 +79,7 @@ The following return values can occur:
a5ef24
 The write operation was successful, the return value is the number of
a5ef24
 bytes actually written to the TLS/SSL connection.
a5ef24
 
a5ef24
-=item 0
a5ef24
+=item C<0>
a5ef24
 
a5ef24
 The write operation was not successful. Probably the underlying connection
a5ef24
 was closed. Call SSL_get_error() with the return value B<ret> to find out,