Upstream for mcrypt is effectively dead so incorporate patches from other OSS packaging systems. These patches address the following: * CVE-2012-4409 (fix) * CVE-2012-4527 (fix) * Spelling and grammar fixes for man page * Fix potential format-string attacks (no vulnerability Id) * Fix potential buffer overflows (no vulnerability Id) * Make native format default as in Debian, Red Hat, and SUSE since openpgp format handling is seriously broken. * Fix ARM build [unclear if this is necessary for non-Linux systems] * Correct include file for OSX
70 lines
2.8 KiB
Groff
70 lines
2.8 KiB
Groff
$NetBSD: patch-doc_mcrypt.1,v 1.1 2018/05/30 14:58:03 ginsbach Exp $
|
|
|
|
* Spelling and grammar fixes.
|
|
|
|
From: Red Hat, SUSE
|
|
|
|
--- doc/mcrypt.1.orig 2003-09-08 17:25:41.000000000 +0000
|
|
+++ doc/mcrypt.1
|
|
@@ -81,7 +81,7 @@ two blocks in CBC and CFB modes, but onl
|
|
Mcrypt uses a 32 bit CRC to check for errors in the encrypted files.
|
|
.PP
|
|
.B Extra security:
|
|
-For the very paranoid, if mcrypt is executed with superuser priviledges it
|
|
+For the very paranoid, if mcrypt is executed with superuser privileges it
|
|
ensures that no important data (keys etc.) are written to disk, as swap etc.
|
|
Keep in mind that mcrypt was not designed to be a setuid program, so you
|
|
shouldn't make it one.
|
|
@@ -165,11 +165,11 @@ license and quit.
|
|
.TP
|
|
.B \-o --keymode MODE
|
|
MODE may be one of the keymodes listed by the --list-keymodes parameter.
|
|
-It actually is the convertion to the key before it is fed to the algorithm.
|
|
+It actually is the conversion to the key before it is fed to the algorithm.
|
|
It is recommended to leave it as is, if you do not know what it is.
|
|
However if you still want to use this option, you might want to
|
|
use the 'hex' mode which allows you to specify the key in hex
|
|
-(and no convertion will by applied).
|
|
+(and no conversion will be applied).
|
|
.TP
|
|
.B \-h --hash HASH_ALGORITHM
|
|
HASH_ALGORITHM may be one of the algorithms listed by the --list-hash parameter.
|
|
@@ -194,10 +194,10 @@ The security lies on the algorithm not o
|
|
default. This flag must also be specified when decrypting a bare encrypted
|
|
file.
|
|
When the bare flag is specified decryption and encryption are faster. This
|
|
-may be usefull when using mcrypt to encrypt a link or something like that.
|
|
+may be useful when using mcrypt to encrypt a link or something like that.
|
|
.TP
|
|
.B --flush
|
|
-Flushes the output (ciphertext or plaintext) immediately. Usefull if mcrypt
|
|
+Flushes the output (ciphertext or plaintext) immediately. Useful if mcrypt
|
|
is used with pipes.
|
|
.TP
|
|
.B --time
|
|
@@ -205,7 +205,7 @@ Prints some timing information (encrypti
|
|
.TP
|
|
.B --nodelete
|
|
When this option is specified mcrypt does not delete the output file, even
|
|
-if decryption failed. This is usefull if you want to decrypt a corrupted
|
|
+if decryption failed. This is useful if you want to decrypt a corrupted
|
|
file.
|
|
.TP
|
|
.B \-q --quiet
|
|
@@ -217,13 +217,13 @@ succeeds. This is not the default in ord
|
|
to remove sensitive data.
|
|
.TP
|
|
.B \ --list
|
|
-Lists all the algorithms current supported.
|
|
+Lists all the algorithms currently supported.
|
|
.TP
|
|
.B \ --list-keymodes
|
|
-Lists all the key modes current supported.
|
|
+Lists all the key modes currently supported.
|
|
.TP
|
|
.B \ --list-hash
|
|
-Lists all the hash algorithms current supported.
|
|
+Lists all the hash algorithms currently supported.
|
|
.TP
|
|
.B \-r --random
|
|
Use /dev/(s)random instead of /dev/urandom. This may need some key input
|