X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/fe6657c961b01ec72e9f35f4c3d96b11b31cf09c..45c0fd363937c6e9b05da04a9167e9912c05ca0c:/catsign.1 diff --git a/catsign.1 b/catsign.1 index 3f1cd5e..93fe70d 100644 --- a/catsign.1 +++ b/catsign.1 @@ -62,7 +62,7 @@ is one of: .RB [ \-t .IR time ] .br - + .RB [ \-o .IR output ] .RI [ file @@ -81,7 +81,7 @@ is one of: .RB [ \-F .IR format ] .br - + .RB [ \-m .IR file ] .RB [ \-o @@ -148,7 +148,7 @@ on the key, or its type. The .B catsign command deals with signing keys. (Note that .B catsign -uses signing keys in the same way as +uses signing keys in the same way as .BR catcrypt (1).) .PP A @@ -176,7 +176,7 @@ for a list of supported signature algorithms. .B rsapkcs1 This is almost the same as the RSASSA-PKCS1-v1_5 algorithm described in RFC3447; the difference is that the hash is left bare rather than being -wrapped in a DER-encoded +wrapped in a DER-encoded .B DigestInfo structure. This doesn't affect security since the key can only be used with the one hash function anyway, and dropping the DER wrapping permits @@ -201,7 +201,7 @@ command (see to generate the key. .TP .B dsa -This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the +This is the DSA algorithm described in FIPS180-1 and FIPS180-2. Use the .B dsa algorithm of the .B key add @@ -278,7 +278,7 @@ the default hash function is .BR sha . .hP \*o For -.BR kcdsa +.BR kcdsa and .BR eckcdsa , the default hash function is @@ -373,7 +373,7 @@ The hash functions which can be used in a key's attribute. .TP .B enc -The encodings which can be applied to encrypted messages; see +The encodings which can be applied to encrypted messages; see .B ENCODINGS above. .SS sign @@ -430,7 +430,7 @@ command checks a signature's validity, producing as output information about the signature and the signed message. .PP The first non-option argument is the name of the file containing the -signature data; this may be omitted or +signature data; this may be omitted or .RB ` \- ' to indicate that the signature be read from standard input. The second non-option argument, if any, is the name of the file to read the message @@ -533,7 +533,7 @@ All messages. .B Warning! All output written has been checked for authenticity. However, output can fail madway through for many reasons, and the resulting message may -therefore be truncated. Don't rely on the output being complete until +therefore be truncated. Don't rely on the output being complete until .B OK is printed or .B catsign verify @@ -621,7 +621,7 @@ This is a (slightly) more complex operation than re-encoding, though it does not require any cryptographic operations. .PP The first non-option argument is the name of the file containing the -signature data; this may be omitted or +signature data; this may be omitted or .RB ` \- ' to indicate that the signature be read from standard input. The second non-option argument, if any, is the name of the file to read the message @@ -688,7 +688,7 @@ The command encodes an input file according to one of the encodings described above in .BR ENCODINGS . -The input is read from the +The input is read from the .I file given on the command line, or from standard input if none is specified. Options provided are: @@ -722,7 +722,7 @@ The command decodes an input file encoded according to one of the encodings described above in .BR ENCODINGS . -The input is read from the +The input is read from the .I file given on the command line, or from standard input if none is specified. Options provided are: @@ -740,7 +740,7 @@ Set the PEM boundary string to i.e., assuming we're encoding in PEM format, start processing input between .BI "\-\-\-\-\-BEGIN " label "\-\-\-\-\-" -and +and .BI "\-\-\-\-\-END " label "\-\-\-\-\-" lines. Without this option, .B catsign