summaryrefslogtreecommitdiff
path: root/doc/apps
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2007-09-19 00:02:49 +0000
committerDr. Stephen Henson <steve@openssl.org>2007-09-19 00:02:49 +0000
commitf36a8c2060e3a81747fb963f01987f70754f52a2 (patch)
tree1bdd2456837d9dd9b6eba04523e6a76e43eff13d /doc/apps
parent90ac9ec2643b655fce3b8d9581baafb5d648fc18 (diff)
downloadopenssl-new-f36a8c2060e3a81747fb963f01987f70754f52a2.tar.gz
Include some fixes from 0.9.8-stable branch.
Diffstat (limited to 'doc/apps')
-rw-r--r--doc/apps/enc.pod8
-rw-r--r--doc/apps/openssl.pod16
-rw-r--r--doc/apps/rsautl.pod2
3 files changed, 25 insertions, 1 deletions
diff --git a/doc/apps/enc.pod b/doc/apps/enc.pod
index c43da5b3f1..4391c93360 100644
--- a/doc/apps/enc.pod
+++ b/doc/apps/enc.pod
@@ -227,6 +227,14 @@ Blowfish and RC5 algorithms use a 128 bit key.
rc5-ecb RC5 cipher in ECB mode
rc5-ofb RC5 cipher in OFB mode
+ aes-[128|192|256]-cbc 128/192/256 bit AES in CBC mode
+ aes-[128|192|256] Alias for aes-[128|192|256]-cbc
+ aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode
+ aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode
+ aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode
+ aes-[128|192|256]-ecb 128/192/256 bit AES in ECB mode
+ aes-[128|192|256]-ofb 128/192/256 bit AES in OFB mode
+
=head1 EXAMPLES
Just base64 encode a binary file:
diff --git a/doc/apps/openssl.pod b/doc/apps/openssl.pod
index dc0f49ddca..964cdf0f02 100644
--- a/doc/apps/openssl.pod
+++ b/doc/apps/openssl.pod
@@ -227,6 +227,22 @@ SHA Digest
SHA-1 Digest
+=item B<sha224>
+
+SHA-224 Digest
+
+=item B<sha256>
+
+SHA-256 Digest
+
+=item B<sha384>
+
+SHA-384 Digest
+
+=item B<sha512>
+
+SHA-512 Digest
+
=back
=head2 ENCODING AND CIPHER COMMANDS
diff --git a/doc/apps/rsautl.pod b/doc/apps/rsautl.pod
index a7c1681d98..1a498c2f62 100644
--- a/doc/apps/rsautl.pod
+++ b/doc/apps/rsautl.pod
@@ -152,7 +152,7 @@ The final BIT STRING contains the actual signature. It can be extracted with:
The certificate public key can be extracted with:
- openssl x509 -in test/testx509.pem -pubout -noout >pubkey.pem
+ openssl x509 -in test/testx509.pem -pubkey -noout >pubkey.pem
The signature can be analysed with: