Blame SOURCES/openssl-fips-0.9.8e-apps-dgst.patch

5820f5
diff -up openssl-fips-0.9.8e/apps/ca.c.dgst openssl-fips-0.9.8e/apps/ca.c
5820f5
--- openssl-fips-0.9.8e/apps/ca.c.dgst	2006-11-27 14:36:52.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/apps/ca.c	2011-04-04 14:36:24.000000000 +0200
5820f5
@@ -158,7 +158,7 @@ static const char *ca_usage[]={
5820f5
 " -startdate YYMMDDHHMMSSZ  - certificate validity notBefore\n",
5820f5
 " -enddate YYMMDDHHMMSSZ    - certificate validity notAfter (overrides -days)\n",
5820f5
 " -days arg       - number of days to certify the certificate for\n",
5820f5
-" -md arg         - md to use, one of md2, md5, sha or sha1\n",
5820f5
+" -md arg         - md to use, see openssl dgst -h for list\n",
5820f5
 " -policy arg     - The CA 'policy' to support\n",
5820f5
 " -keyfile arg    - private key file\n",
5820f5
 " -keyform arg    - private key file format (PEM or ENGINE)\n",
5820f5
diff -up openssl-fips-0.9.8e/apps/dgst.c.dgst openssl-fips-0.9.8e/apps/dgst.c
5820f5
--- openssl-fips-0.9.8e/apps/dgst.c.dgst	2007-09-19 02:02:10.000000000 +0200
5820f5
+++ openssl-fips-0.9.8e/apps/dgst.c	2011-04-04 14:41:31.000000000 +0200
5820f5
@@ -280,10 +280,14 @@ ERR_load_crypto_strings();
5820f5
 			LN_sha512,LN_sha512);
5820f5
 #endif
5820f5
 #endif
5820f5
+#ifndef OPENSSL_NO_MDC2
5820f5
 		BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
5820f5
 			LN_mdc2,LN_mdc2);
5820f5
+#endif
5820f5
+#ifndef OPENSSL_NO_RIPEMD
5820f5
 		BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
5820f5
 			LN_ripemd160,LN_ripemd160);
5820f5
+#endif
5820f5
 		err=1;
5820f5
 		goto end;
5820f5
 		}
5820f5
diff -up openssl-fips-0.9.8e/apps/enc.c.dgst openssl-fips-0.9.8e/apps/enc.c
5820f5
--- openssl-fips-0.9.8e/apps/enc.c.dgst	2007-03-22 01:37:43.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/apps/enc.c	2011-04-04 14:39:17.000000000 +0200
5820f5
@@ -285,7 +285,7 @@ bad:
5820f5
 			BIO_printf(bio_err,"%-14s passphrase is the next argument\n","-k");
5820f5
 			BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
5820f5
 			BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
5820f5
-			BIO_printf(bio_err,"%-14s   from a passphrase.  One of md2, md5, sha or sha1\n","");
5820f5
+			BIO_printf(bio_err,"%-14s   from a passphrase. See openssl dgst -h for list.\n","");
5820f5
 			BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
5820f5
 			BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
5820f5
 			BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
5820f5
diff -up openssl-fips-0.9.8e/apps/req.c.dgst openssl-fips-0.9.8e/apps/req.c
5820f5
--- openssl-fips-0.9.8e/apps/req.c.dgst	2005-07-16 13:13:03.000000000 +0200
5820f5
+++ openssl-fips-0.9.8e/apps/req.c	2011-04-04 14:40:46.000000000 +0200
5820f5
@@ -523,7 +523,7 @@ bad:
5820f5
 #ifndef OPENSSL_NO_ECDSA
5820f5
 		BIO_printf(bio_err," -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
5820f5
 #endif
5820f5
-		BIO_printf(bio_err," -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
5820f5
+		BIO_printf(bio_err," -[digest]      Digest to sign with (see openssl dgst -h for list)\n");
5820f5
 		BIO_printf(bio_err," -config file   request template file.\n");
5820f5
 		BIO_printf(bio_err," -subj arg      set or modify request subject\n");
5820f5
 		BIO_printf(bio_err," -multivalue-rdn enable support for multivalued RDNs\n");
5820f5
diff -up openssl-fips-0.9.8e/apps/x509.c.dgst openssl-fips-0.9.8e/apps/x509.c
5820f5
--- openssl-fips-0.9.8e/apps/x509.c.dgst	2011-04-04 14:18:34.000000000 +0200
5820f5
+++ openssl-fips-0.9.8e/apps/x509.c	2011-04-04 14:35:05.000000000 +0200
5820f5
@@ -134,7 +134,7 @@ static const char *x509_usage[]={
5820f5
 " -set_serial     - serial number to use\n",
5820f5
 " -text           - print the certificate in text form\n",
5820f5
 " -C              - print out C code forms\n",
5820f5
-" -md2/-md5/-sha1/-mdc2 - digest to use\n",
5820f5
+" -<dgst>         - digest to use, see openssl dgst -h output for list\n",
5820f5
 " -extfile        - configuration file with X509V3 extensions to add\n",
5820f5
 " -extensions     - section from config file with X509V3 extensions to add\n",
5820f5
 " -clrext         - delete extensions before signing and input certificate\n",
5820f5
diff -up openssl-fips-0.9.8e/doc/apps/ca.pod.dgst openssl-fips-0.9.8e/doc/apps/ca.pod
5820f5
--- openssl-fips-0.9.8e/doc/apps/ca.pod.dgst	2005-07-15 11:50:38.000000000 +0200
5820f5
+++ openssl-fips-0.9.8e/doc/apps/ca.pod	2011-04-04 15:03:07.000000000 +0200
5820f5
@@ -160,7 +160,8 @@ the number of days to certify the certif
5820f5
 =item B<-md alg>
5820f5
 
5820f5
 the message digest to use. Possible values include md5, sha1 and mdc2.
5820f5
-This option also applies to CRLs.
5820f5
+For full list of digests see openssl dgst -h output. This option also
5820f5
+applies to CRLs.
5820f5
 
5820f5
 =item B<-policy arg>
5820f5
 
5820f5
diff -up openssl-fips-0.9.8e/doc/apps/req.pod.dgst openssl-fips-0.9.8e/doc/apps/req.pod
5820f5
--- openssl-fips-0.9.8e/doc/apps/req.pod.dgst	2005-07-15 11:50:38.000000000 +0200
5820f5
+++ openssl-fips-0.9.8e/doc/apps/req.pod	2011-04-04 15:05:22.000000000 +0200
5820f5
@@ -160,6 +160,7 @@ will not be encrypted.
5820f5
 this specifies the message digest to sign the request with. This
5820f5
 overrides the digest algorithm specified in the configuration file.
5820f5
 This option is ignored for DSA requests: they always use SHA1.
5820f5
+For full list of possible digests see openssl dgst -h output.
5820f5
 
5820f5
 =item B<-config filename>
5820f5
 
5820f5
diff -up openssl-fips-0.9.8e/doc/apps/x509.pod.dgst openssl-fips-0.9.8e/doc/apps/x509.pod
5820f5
--- openssl-fips-0.9.8e/doc/apps/x509.pod.dgst	2007-02-03 11:27:31.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/doc/apps/x509.pod	2011-04-04 15:06:14.000000000 +0200
5820f5
@@ -100,6 +100,7 @@ the digest to use. This affects any sign
5820f5
 digest, such as the B<-fingerprint>, B<-signkey> and B<-CA> options. If not
5820f5
 specified then SHA1 is used. If the key being used to sign with is a DSA key
5820f5
 then this option has no effect: SHA1 is always used with DSA keys.
5820f5
+For full list of digests see openssl dgst -h output.
5820f5
 
5820f5
 =item B<-engine id>
5820f5