Blame SOURCES/openssl-1.0.2g-manfix.patch

cfec1a
diff -up openssl-1.0.2g/doc/apps/ec.pod.manfix openssl-1.0.2g/doc/apps/ec.pod
cfec1a
--- openssl-1.0.2g/doc/apps/ec.pod.manfix	2016-03-01 14:35:05.000000000 +0100
cfec1a
+++ openssl-1.0.2g/doc/apps/ec.pod	2016-03-01 16:47:35.331568290 +0100
cfec1a
@@ -93,10 +93,6 @@ prints out the public, private key compo
cfec1a
 
cfec1a
 this option prevents output of the encoded version of the key.
cfec1a
 
cfec1a
-=item B<-modulus>
cfec1a
-
cfec1a
-this option prints out the value of the public key component of the key.
cfec1a
-
cfec1a
 =item B<-pubin>
cfec1a
 
cfec1a
 by default a private key is read from the input file: with this option a
cfec1a
diff -up openssl-1.0.2g/doc/apps/openssl.pod.manfix openssl-1.0.2g/doc/apps/openssl.pod
cfec1a
--- openssl-1.0.2g/doc/apps/openssl.pod.manfix	2016-03-01 14:35:05.000000000 +0100
cfec1a
+++ openssl-1.0.2g/doc/apps/openssl.pod	2016-03-01 16:47:35.331568290 +0100
cfec1a
@@ -163,7 +163,7 @@ Create or examine a netscape certificate
cfec1a
 
cfec1a
 Online Certificate Status Protocol utility.
cfec1a
 
cfec1a
-=item L<B<passwd>|passwd(1)>
cfec1a
+=item L<B<passwd>|sslpasswd(1)>
cfec1a
 
cfec1a
 Generation of hashed passwords.
cfec1a
 
cfec1a
@@ -187,7 +187,7 @@ Public key algorithm parameter managemen
cfec1a
 
cfec1a
 Public key algorithm cryptographic operation utility.
cfec1a
 
cfec1a
-=item L<B<rand>|rand(1)>
cfec1a
+=item L<B<rand>|sslrand(1)>
cfec1a
 
cfec1a
 Generate pseudo-random bytes.
cfec1a
 
cfec1a
@@ -401,9 +401,9 @@ L<crl(1)|crl(1)>, L
cfec1a
 L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>,
cfec1a
 L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>,
cfec1a
 L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>,
cfec1a
-L<passwd(1)|passwd(1)>,
cfec1a
+L<sslpasswd(1)|sslpasswd(1)>,
cfec1a
 L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>,
cfec1a
-L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
cfec1a
+L<sslrand(1)|sslrand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
cfec1a
 L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>,
cfec1a
 L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>,
cfec1a
 L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>,
cfec1a
diff -up openssl-1.0.2g/doc/apps/s_client.pod.manfix openssl-1.0.2g/doc/apps/s_client.pod
cfec1a
--- openssl-1.0.2g/doc/apps/s_client.pod.manfix	2016-03-01 14:35:53.000000000 +0100
cfec1a
+++ openssl-1.0.2g/doc/apps/s_client.pod	2016-03-01 16:47:35.358568902 +0100
cfec1a
@@ -35,6 +35,9 @@ B<openssl> B<s_client>
cfec1a
 [B<-ssl2>]
cfec1a
 [B<-ssl3>]
cfec1a
 [B<-tls1>]
cfec1a
+[B<-tls1_1>]
cfec1a
+[B<-tls1_2>]
cfec1a
+[B<-dtls1>]
cfec1a
 [B<-no_ssl2>]
cfec1a
 [B<-no_ssl3>]
cfec1a
 [B<-no_tls1>]
cfec1a
@@ -201,7 +204,7 @@ Use the PSK key B<key> when using a PSK
cfec1a
 given as a hexadecimal number without leading 0x, for example -psk
cfec1a
 1a2b3c4d.
cfec1a
 
cfec1a
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
cfec1a
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
cfec1a
 
cfec1a
 These options require or disable the use of the specified SSL or TLS protocols.
cfec1a
 By default the initial handshake uses a I<version-flexible> method which will
cfec1a
diff -up openssl-1.0.2g/doc/apps/s_server.pod.manfix openssl-1.0.2g/doc/apps/s_server.pod
cfec1a
--- openssl-1.0.2g/doc/apps/s_server.pod.manfix	2016-03-01 14:35:53.000000000 +0100
cfec1a
+++ openssl-1.0.2g/doc/apps/s_server.pod	2016-03-01 16:47:35.359568925 +0100
cfec1a
@@ -42,6 +42,8 @@ B<openssl> B<s_server>
cfec1a
 [B<-ssl2>]
cfec1a
 [B<-ssl3>]
cfec1a
 [B<-tls1>]
cfec1a
+[B<-tls1_1>]
cfec1a
+[B<-tls1_2>]
cfec1a
 [B<-no_ssl2>]
cfec1a
 [B<-no_ssl3>]
cfec1a
 [B<-no_tls1>]
cfec1a
@@ -217,7 +219,7 @@ Use the PSK key B<key> when using a PSK
cfec1a
 given as a hexadecimal number without leading 0x, for example -psk
cfec1a
 1a2b3c4d.
cfec1a
 
cfec1a
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
cfec1a
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
cfec1a
 
cfec1a
 These options require or disable the use of the specified SSL or TLS protocols.
cfec1a
 By default the initial handshake uses a I<version-flexible> method which will