fd2893
diff -up openssl-1.0.2a/apps/ca.c.dgst openssl-1.0.2a/apps/ca.c
fd2893
--- openssl-1.0.2a/apps/ca.c.dgst	2015-03-19 14:30:36.000000000 +0100
fd2893
+++ openssl-1.0.2a/apps/ca.c	2015-04-21 17:01:38.841551616 +0200
fd2893
@@ -157,7 +157,7 @@ static const char *ca_usage[] = {
fd2893
     " -startdate YYMMDDHHMMSSZ  - certificate validity notBefore\n",
fd2893
     " -enddate YYMMDDHHMMSSZ    - certificate validity notAfter (overrides -days)\n",
fd2893
     " -days arg       - number of days to certify the certificate for\n",
fd2893
-    " -md arg         - md to use, one of md2, md5, sha or sha1\n",
fd2893
+    " -md arg         - md to use, see openssl dgst -h for list\n",
fd2893
     " -policy arg     - The CA 'policy' to support\n",
fd2893
     " -keyfile arg    - private key file\n",
fd2893
     " -keyform arg    - private key file format (PEM or ENGINE)\n",
fd2893
diff -up openssl-1.0.2a/apps/enc.c.dgst openssl-1.0.2a/apps/enc.c
fd2893
--- openssl-1.0.2a/apps/enc.c.dgst	2015-03-19 14:19:00.000000000 +0100
fd2893
+++ openssl-1.0.2a/apps/enc.c	2015-04-21 17:01:38.841551616 +0200
fd2893
@@ -294,7 +294,7 @@ int MAIN(int argc, char **argv)
fd2893
                        "%-14s the next argument is the md to use to create a key\n",
fd2893
                        "-md");
fd2893
             BIO_printf(bio_err,
fd2893
-                       "%-14s   from a passphrase.  One of md2, md5, sha or sha1\n",
fd2893
+                       "%-14s   from a passphrase. See openssl dgst -h for list.\n",
fd2893
                        "");
fd2893
             BIO_printf(bio_err, "%-14s salt in hex is the next argument\n",
fd2893
                        "-S");
fd2893
diff -up openssl-1.0.2a/apps/req.c.dgst openssl-1.0.2a/apps/req.c
fd2893
--- openssl-1.0.2a/apps/req.c.dgst	2015-03-19 14:19:00.000000000 +0100
fd2893
+++ openssl-1.0.2a/apps/req.c	2015-04-21 17:01:38.842551640 +0200
fd2893
@@ -414,7 +414,7 @@ int MAIN(int argc, char **argv)
fd2893
                    " -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
fd2893
 #endif
fd2893
         BIO_printf(bio_err,
fd2893
-                   " -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
fd2893
+                   " -[digest]      Digest to sign with (see openssl dgst -h for list)\n");
fd2893
         BIO_printf(bio_err, " -config file   request template file.\n");
fd2893
         BIO_printf(bio_err,
fd2893
                    " -subj arg      set or modify request subject\n");
fd2893
diff -up openssl-1.0.2a/apps/ts.c.dgst openssl-1.0.2a/apps/ts.c
fd2893
--- openssl-1.0.2a/apps/ts.c.dgst	2015-03-19 14:19:00.000000000 +0100
fd2893
+++ openssl-1.0.2a/apps/ts.c	2015-04-21 17:01:38.842551640 +0200
fd2893
@@ -337,7 +337,7 @@ int MAIN(int argc, char **argv)
fd2893
     BIO_printf(bio_err, "usage:\n"
fd2893
                "ts -query [-rand file%cfile%c...] [-config configfile] "
fd2893
                "[-data file_to_hash] [-digest digest_bytes]"
fd2893
-               "[-md2|-md4|-md5|-sha|-sha1|-mdc2|-ripemd160] "
fd2893
+               "[-<hashalg>] "
fd2893
                "[-policy object_id] [-no_nonce] [-cert] "
fd2893
                "[-in request.tsq] [-out request.tsq] [-text]\n",
fd2893
                LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
fd2893
diff -up openssl-1.0.2a/apps/x509.c.dgst openssl-1.0.2a/apps/x509.c
fd2893
--- openssl-1.0.2a/apps/x509.c.dgst	2015-03-19 14:30:36.000000000 +0100
fd2893
+++ openssl-1.0.2a/apps/x509.c	2015-04-21 17:01:38.842551640 +0200
fd2893
@@ -141,7 +141,7 @@ static const char *x509_usage[] = {
fd2893
     " -set_serial     - serial number to use\n",
fd2893
     " -text           - print the certificate in text form\n",
fd2893
     " -C              - print out C code forms\n",
fd2893
-    " -md2/-md5/-sha1/-mdc2 - digest to use\n",
fd2893
+    " -<dgst>         - digest to use, see openssl dgst -h output for list\n",
fd2893
     " -extfile        - configuration file with X509V3 extensions to add\n",
fd2893
     " -extensions     - section from config file with X509V3 extensions to add\n",
fd2893
     " -clrext         - delete extensions before signing and input certificate\n",
fd2893
diff -up openssl-1.0.2a/doc/apps/ca.pod.dgst openssl-1.0.2a/doc/apps/ca.pod
fd2893
--- openssl-1.0.2a/doc/apps/ca.pod.dgst	2015-01-20 13:33:36.000000000 +0100
fd2893
+++ openssl-1.0.2a/doc/apps/ca.pod	2015-04-21 17:01:38.842551640 +0200
fd2893
@@ -168,7 +168,8 @@ the number of days to certify the certif
fd2893
 =item B<-md alg>
fd2893
 
fd2893
 the message digest to use. Possible values include md5, sha1 and mdc2.
fd2893
-This option also applies to CRLs.
fd2893
+For full list of digests see openssl dgst -h output. This option also
fd2893
+applies to CRLs.
fd2893
 
fd2893
 =item B<-policy arg>
fd2893
 
fd2893
diff -up openssl-1.0.2a/doc/apps/ocsp.pod.dgst openssl-1.0.2a/doc/apps/ocsp.pod
fd2893
--- openssl-1.0.2a/doc/apps/ocsp.pod.dgst	2015-03-19 14:19:00.000000000 +0100
fd2893
+++ openssl-1.0.2a/doc/apps/ocsp.pod	2015-04-21 17:01:38.842551640 +0200
fd2893
@@ -219,7 +219,8 @@ check is not performed.
fd2893
 =item B<-md5|-sha1|-sha256|-ripemod160|...>
fd2893
 
fd2893
 this option sets digest algorithm to use for certificate identification
fd2893
-in the OCSP request. By default SHA-1 is used. 
fd2893
+in the OCSP request. By default SHA-1 is used. See openssl dgst -h output for
fd2893
+the list of available algorithms.
fd2893
 
fd2893
 =back
fd2893
 
fd2893
diff -up openssl-1.0.2a/doc/apps/req.pod.dgst openssl-1.0.2a/doc/apps/req.pod
fd2893
--- openssl-1.0.2a/doc/apps/req.pod.dgst	2015-03-19 14:30:36.000000000 +0100
fd2893
+++ openssl-1.0.2a/doc/apps/req.pod	2015-04-21 17:01:38.843551664 +0200
fd2893
@@ -201,7 +201,8 @@ will not be encrypted.
fd2893
 
fd2893
 this specifies the message digest to sign the request with (such as
fd2893
 B<-md5>, B<-sha1>). This overrides the digest algorithm specified in
fd2893
-the configuration file.
fd2893
+the configuration file. For full list of possible digests see openssl
fd2893
+dgst -h output.
fd2893
 
fd2893
 Some public key algorithms may override this choice. For instance, DSA
fd2893
 signatures always use SHA1, GOST R 34.10 signatures always use
fd2893
diff -up openssl-1.0.2a/doc/apps/x509.pod.dgst openssl-1.0.2a/doc/apps/x509.pod
fd2893
--- openssl-1.0.2a/doc/apps/x509.pod.dgst	2015-03-19 14:30:36.000000000 +0100
fd2893
+++ openssl-1.0.2a/doc/apps/x509.pod	2015-04-21 17:01:38.843551664 +0200
fd2893
@@ -107,6 +107,7 @@ the digest to use. This affects any sign
fd2893
 digest, such as the B<-fingerprint>, B<-signkey> and B<-CA> options. If not
fd2893
 specified then SHA1 is used. If the key being used to sign with is a DSA key
fd2893
 then this option has no effect: SHA1 is always used with DSA keys.
fd2893
+For full list of digests see openssl dgst -h output.
fd2893
 
fd2893
 =item B<-engine id>
fd2893