=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/openssl/openssl.1,v retrieving revision 1.50 retrieving revision 1.51 diff -c -r1.50 -r1.51 *** src/usr.bin/openssl/openssl.1 2016/08/12 06:21:12 1.50 --- src/usr.bin/openssl/openssl.1 2016/08/13 18:23:39 1.51 *************** *** 1,4 **** ! .\" $OpenBSD: openssl.1,v 1.50 2016/08/12 06:21:12 jmc Exp $ .\" ==================================================================== .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. .\" --- 1,4 ---- ! .\" $OpenBSD: openssl.1,v 1.51 2016/08/13 18:23:39 jmc Exp $ .\" ==================================================================== .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. .\" *************** *** 112,118 **** .\" .\" OPENSSL .\" ! .Dd $Mdocdate: August 12 2016 $ .Dt OPENSSL 1 .Os .Sh NAME --- 112,118 ---- .\" .\" OPENSSL .\" ! .Dd $Mdocdate: August 13 2016 $ .Dt OPENSSL 1 .Os .Sh NAME *************** *** 1800,1806 **** since it makes it possible to perform efficient dictionary attacks on the password and to attack stream cipher encrypted data. .It Fl out Ar file ! The output file to read from, or standard output if none is specified. .It Fl P Print out the salt, key, and IV used, then immediately exit; --- 1800,1806 ---- since it makes it possible to perform efficient dictionary attacks on the password and to attack stream cipher encrypted data. .It Fl out Ar file ! The output file to write to, or standard output if none is specified. .It Fl P Print out the salt, key, and IV used, then immediately exit; *************** *** 1851,1878 **** .It Fl stats Print debugging statistics about various aspects of the hash table. .El - .\" - .\" GENDSA - .\" .Sh GENDSA .nr nS 1 .Nm "openssl gendsa" - .Bk -words .Oo .Fl aes128 | aes192 | aes256 | .Fl des | des3 .Oc .Op Fl out Ar file .Op Ar paramfile - .Ek .nr nS 0 .Pp The .Nm gendsa command generates a DSA private key from a DSA parameter file ! (which will typically be generated by the .Nm openssl dsaparam command). .Pp The options are as follows: .Bl -tag -width Ds --- 1851,1877 ---- .It Fl stats Print debugging statistics about various aspects of the hash table. .El .Sh GENDSA .nr nS 1 .Nm "openssl gendsa" .Oo .Fl aes128 | aes192 | aes256 | .Fl des | des3 .Oc .Op Fl out Ar file .Op Ar paramfile .nr nS 0 .Pp The .Nm gendsa command generates a DSA private key from a DSA parameter file ! (typically generated by the .Nm openssl dsaparam command). + DSA key generation is little more than random number generation so it is + much quicker than, + for example, + RSA key generation. .Pp The options are as follows: .Bl -tag -width Ds *************** *** 1880,1903 **** .Fl aes128 | aes192 | aes256 | .Fl des | des3 .Xc ! These options encrypt the private key with the AES, DES, or the triple DES ciphers, respectively, before outputting it. A pass phrase is prompted for. If none of these options are specified, no encryption is used. .It Fl out Ar file ! The output ! .Ar file . ! If this argument is not specified, standard output is used. .It Ar paramfile ! This option specifies the DSA parameter file to use. The parameters in this file determine the size of the private key. - DSA parameters can be generated and examined using the - .Nm openssl dsaparam - command. .El - .Sh GENDSA NOTES - DSA key generation is little more than random number generation so it is - much quicker than RSA key generation, for example. .\" .\" GENPKEY .\" --- 1879,1895 ---- .Fl aes128 | aes192 | aes256 | .Fl des | des3 .Xc ! Encrypt the private key with the AES, DES, or the triple DES ciphers, respectively, before outputting it. A pass phrase is prompted for. If none of these options are specified, no encryption is used. .It Fl out Ar file ! The output file to write to, ! or standard output if none is specified. .It Ar paramfile ! Specify the DSA parameter file to use. The parameters in this file determine the size of the private key. .El .\" .\" GENPKEY .\"