dad6e3
diff -up openssl-1.0.1e/doc/apps/cms.pod.manfix openssl-1.0.1e/doc/apps/cms.pod
dad6e3
--- openssl-1.0.1e/doc/apps/cms.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/cms.pod	2013-09-12 11:17:42.147092310 +0200
dad6e3
@@ -450,28 +450,28 @@ remains DER.
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 the operation was completely successfully.
dad6e3
 
dad6e3
-=item 1 
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 an error occurred parsing the command options.
dad6e3
 
dad6e3
-=item 2
dad6e3
+=item C<2>
dad6e3
 
dad6e3
 one of the input files could not be read.
dad6e3
 
dad6e3
-=item 3
dad6e3
+=item C<3>
dad6e3
 
dad6e3
 an error occurred creating the CMS file or when reading the MIME
dad6e3
 message.
dad6e3
 
dad6e3
-=item 4
dad6e3
+=item C<4>
dad6e3
 
dad6e3
 an error occurred decrypting or verifying the message.
dad6e3
 
dad6e3
-=item 5
dad6e3
+=item C<5>
dad6e3
 
dad6e3
 the message was verified correctly but an error occurred writing out
dad6e3
 the signers certificates.
9b36f0
diff -up openssl-1.0.1e/doc/apps/ec.pod.manfix openssl-1.0.1e/doc/apps/ec.pod
9b36f0
--- openssl-1.0.1e/doc/apps/ec.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/ec.pod	2013-09-12 11:17:42.147092310 +0200
9b36f0
@@ -93,10 +93,6 @@ prints out the public, private key compo
9b36f0
 
9b36f0
 this option prevents output of the encoded version of the key.
9b36f0
 
9b36f0
-=item B<-modulus>
9b36f0
-
9b36f0
-this option prints out the value of the public key component of the key.
9b36f0
-
9b36f0
 =item B<-pubin>
9b36f0
 
9b36f0
 by default a private key is read from the input file: with this option a
6a0a35
diff -up openssl-1.0.1e/doc/apps/openssl.pod.manfix openssl-1.0.1e/doc/apps/openssl.pod
6a0a35
--- openssl-1.0.1e/doc/apps/openssl.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/openssl.pod	2013-09-12 11:17:42.148092331 +0200
6a0a35
@@ -163,7 +163,7 @@ Create or examine a netscape certificate
6a0a35
 
6a0a35
 Online Certificate Status Protocol utility.
6a0a35
 
6a0a35
-=item L<b<passwd>|passwd(1)>
6a0a35
+=item L<b<passwd>|sslpasswd(1)>
6a0a35
 
6a0a35
 Generation of hashed passwords.
6a0a35
 
6a0a35
@@ -187,7 +187,7 @@ Public key algorithm parameter managemen
6a0a35
 
6a0a35
 Public key algorithm cryptographic operation utility.
6a0a35
 
6a0a35
-=item L<b<rand>|rand(1)>
6a0a35
+=item L<b<rand>|sslrand(1)>
6a0a35
 
6a0a35
 Generate pseudo-random bytes.
6a0a35
 
6a0a35
@@ -401,9 +401,9 @@ L<crl(1)|crl(1)>, L
6a0a35
 L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>,
6a0a35
 L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>,
6a0a35
 L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>,
6a0a35
-L<passwd(1)|passwd(1)>,
6a0a35
+L<sslpasswd(1)|sslpasswd(1)>,
6a0a35
 L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>,
6a0a35
-L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
6a0a35
+L<sslrand(1)|sslrand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
6a0a35
 L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>,
6a0a35
 L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>,
6a0a35
 L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>,
9b36f0
diff -up openssl-1.0.1e/doc/apps/s_client.pod.manfix openssl-1.0.1e/doc/apps/s_client.pod
fa93b6
--- openssl-1.0.1e/doc/apps/s_client.pod.manfix	2013-09-12 11:17:41.517078502 +0200
fa93b6
+++ openssl-1.0.1e/doc/apps/s_client.pod	2013-09-12 11:17:42.149092353 +0200
9b36f0
@@ -32,9 +32,14 @@ B<openssl> B<s_client>
9b36f0
 [B<-ssl2>]
9b36f0
 [B<-ssl3>]
9b36f0
 [B<-tls1>]
9b36f0
+[B<-tls1_1>]
9b36f0
+[B<-tls1_2>]
9b36f0
+[B<-dtls1>]
9b36f0
 [B<-no_ssl2>]
9b36f0
 [B<-no_ssl3>]
9b36f0
 [B<-no_tls1>]
9b36f0
+[B<-no_tls1_1>]
9b36f0
+[B<-no_tls1_2>]
9b36f0
 [B<-bugs>]
9b36f0
 [B<-cipher cipherlist>]
9b36f0
 [B<-starttls protocol>]
ae08b1
@@ -44,6 +49,7 @@ B<openssl> B<s_client>
ae08b1
 [B<-sess_out filename>]
ae08b1
 [B<-sess_in filename>]
ae08b1
 [B<-rand file(s)>]
ae08b1
+[B<-nextprotoneg protocols>]
ae08b1
 
ae08b1
 =head1 DESCRIPTION
ae08b1
 
ae08b1
@@ -182,7 +188,7 @@ Use the PSK key B<key> when using a PSK
9b36f0
 given as a hexadecimal number without leading 0x, for example -psk
9b36f0
 1a2b3c4d.
9b36f0
 
9b36f0
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>
9b36f0
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
9b36f0
 
9b36f0
 these options disable the use of certain SSL or TLS protocols. By default
9b36f0
 the initial handshake uses a method which should be compatible with all
ae08b1
@@ -243,6 +249,17 @@ Multiple files can be specified separate
ae08b1
 The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
ae08b1
 all others.
ae08b1
 
ae08b1
+=item B<-nextprotoneg protocols>
ae08b1
+
ae08b1
+enable Next Protocol Negotiation TLS extension and provide a list of
ae08b1
+comma-separated protocol names that the client should advertise
ae08b1
+support for. The list should contain most wanted protocols first.
ae08b1
+Protocol names are printable ASCII strings, for example "http/1.1" or
ae08b1
+"spdy/3".
ae08b1
+Empty list of protocols is treated specially and will cause the client to
ae08b1
+advertise support for the TLS extension but disconnect just after
ae08b1
+reciving ServerHello with a list of server supported protocols.
ae08b1
+
ae08b1
 =back
ae08b1
 
ae08b1
 =head1 CONNECTED COMMANDS
dad6e3
diff -up openssl-1.0.1e/doc/apps/smime.pod.manfix openssl-1.0.1e/doc/apps/smime.pod
dad6e3
--- openssl-1.0.1e/doc/apps/smime.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/smime.pod	2013-09-12 11:17:42.150092375 +0200
dad6e3
@@ -308,28 +308,28 @@ remains DER.
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 the operation was completely successfully.
dad6e3
 
dad6e3
-=item 1 
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 an error occurred parsing the command options.
dad6e3
 
dad6e3
-=item 2
dad6e3
+=item C<2>
dad6e3
 
dad6e3
 one of the input files could not be read.
dad6e3
 
dad6e3
-=item 3
dad6e3
+=item C<3>
dad6e3
 
dad6e3
 an error occurred creating the PKCS#7 file or when reading the MIME
dad6e3
 message.
dad6e3
 
dad6e3
-=item 4
dad6e3
+=item C<4>
dad6e3
 
dad6e3
 an error occurred decrypting or verifying the message.
dad6e3
 
dad6e3
-=item 5
dad6e3
+=item C<5>
dad6e3
 
dad6e3
 the message was verified correctly but an error occurred writing out
dad6e3
 the signers certificates.
9b36f0
diff -up openssl-1.0.1e/doc/apps/s_server.pod.manfix openssl-1.0.1e/doc/apps/s_server.pod
9b36f0
--- openssl-1.0.1e/doc/apps/s_server.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/s_server.pod	2013-09-12 11:17:42.150092375 +0200
9c324d
@@ -40,10 +40,16 @@ B<openssl> B<s_server>
9b36f0
 [B<-ssl2>]
9b36f0
 [B<-ssl3>]
9b36f0
 [B<-tls1>]
9b36f0
+[B<-tls1_1>]
9b36f0
+[B<-tls1_2>]
9b36f0
+[B<-dtls1>]
9b36f0
 [B<-no_ssl2>]
9b36f0
 [B<-no_ssl3>]
9b36f0
 [B<-no_tls1>]
9b36f0
+[B<-no_tls1_1>]
9b36f0
+[B<-no_tls1_2>]
9b36f0
 [B<-no_dhe>]
9c324d
+[B<-no_ecdhe>]
9b36f0
 [B<-bugs>]
9b36f0
 [B<-hack>]
9c324d
 [B<-www>]
ae08b1
@@ -54,6 +60,7 @@ B<openssl> B<s_server>
ae08b1
 [B<-no_ticket>]
ae08b1
 [B<-id_prefix arg>]
ae08b1
 [B<-rand file(s)>]
ae08b1
+[B<-nextprotoneg protocols>]
ae08b1
 
ae08b1
 =head1 DESCRIPTION
ae08b1
 
ae08b1
@@ -131,6 +138,10 @@ a static set of parameters hard coded in
9c324d
 if this option is set then no DH parameters will be loaded effectively
9c324d
 disabling the ephemeral DH cipher suites.
9c324d
 
9c324d
+=item B<-no_ecdhe>
9c324d
+
9c324d
+if this option is set then ephemeral ECDH cipher suites will be disabled.
9c324d
+
9c324d
 =item B<-no_tmp_rsa>
9c324d
 
9c324d
 certain export cipher suites sometimes use a temporary RSA key, this option
ae08b1
@@ -201,7 +212,7 @@ Use the PSK key B<key> when using a PSK
9b36f0
 given as a hexadecimal number without leading 0x, for example -psk
9b36f0
 1a2b3c4d.
9b36f0
 
9b36f0
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>
9b36f0
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
9b36f0
 
9b36f0
 these options disable the use of certain SSL or TLS protocols. By default
9b36f0
 the initial handshake uses a method which should be compatible with all
ae08b1
@@ -276,6 +287,14 @@ Multiple files can be specified separate
ae08b1
 The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
ae08b1
 all others.
ae08b1
 
ae08b1
+=item B<-nextprotoneg protocols>
ae08b1
+
ae08b1
+enable Next Protocol Negotiation TLS extension and provide a
ae08b1
+comma-separated list of supported protocol names.
ae08b1
+The list should contain most wanted protocols first.
ae08b1
+Protocol names are printable ASCII strings, for example "http/1.1" or
ae08b1
+"spdy/3".
ae08b1
+
ae08b1
 =back
ae08b1
 
ae08b1
 =head1 CONNECTED COMMANDS
fa93b6
diff -up openssl-1.0.1e/doc/apps/verify.pod.manfix openssl-1.0.1e/doc/apps/verify.pod
fa93b6
--- openssl-1.0.1e/doc/apps/verify.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/apps/verify.pod	2013-09-12 11:25:13.994994992 +0200
fa93b6
@@ -25,6 +25,7 @@ B<openssl> B<verify>
fa93b6
 [B<-untrusted file>]
fa93b6
 [B<-help>]
fa93b6
 [B<-issuer_checks>]
fa93b6
+[B<-attime timestamp>]
fa93b6
 [B<-verbose>]
fa93b6
 [B<->]
fa93b6
 [certificates]
fa93b6
@@ -80,6 +81,12 @@ rejected. The presence of rejection mess
fa93b6
 anything is wrong; during the normal verification process, several
fa93b6
 rejections may take place.
fa93b6
 
fa93b6
+=item B<-attime timestamp>
fa93b6
+
fa93b6
+Perform validation checks using the time specified by B<timestamp> and not
fa93b6
+the current system time. B<timestamp> is the number of seconds since
fa93b6
+01.01.1970 (UNIX time).
fa93b6
+
fa93b6
 =item B<-policy arg>
fa93b6
 
fa93b6
 Enable policy processing and add B<arg> to the user-initial-policy-set (see
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_accept.pod.manfix openssl-1.0.1e/doc/ssl/SSL_accept.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_accept.pod.manfix	2013-09-12 11:17:42.129091915 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_accept.pod	2013-09-12 11:17:42.156092507 +0200
dad6e3
@@ -44,13 +44,13 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The TLS/SSL handshake was not successful but was shut down controlled and
dad6e3
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
dad6e3
 return value B<ret> to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
dad6e3
 established.
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_clear.pod.manfix openssl-1.0.1e/doc/ssl/SSL_clear.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_clear.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_clear.pod	2013-09-12 11:17:42.158092551 +0200
dad6e3
@@ -56,12 +56,12 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The SSL_clear() operation could not be performed. Check the error stack to
dad6e3
 find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The SSL_clear() operation was successful.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod.manfix openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod.manfix	2013-09-12 11:17:42.049090162 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod	2013-09-12 11:17:42.159092573 +0200
6a0a35
@@ -60,11 +60,11 @@ SSL_COMP_add_compression_method() may re
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation failed. Check the error queue to find out the reason.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_connect.pod.manfix openssl-1.0.1e/doc/ssl/SSL_connect.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_connect.pod.manfix	2013-09-12 11:17:42.130091937 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_connect.pod	2013-09-12 11:17:42.161092616 +0200
dad6e3
@@ -41,13 +41,13 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The TLS/SSL handshake was not successful but was shut down controlled and
dad6e3
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
dad6e3
 return value B<ret> to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
dad6e3
 established.
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_add_session.pod	2013-09-12 11:17:42.162092638 +0200
dad6e3
@@ -52,13 +52,13 @@ The following values are returned by all
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
  The operation failed. In case of the add operation, it was tried to add
dad6e3
  the same (identical) session twice. In case of the remove operation, the
dad6e3
  session was not found in the cache.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
  
dad6e3
  The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_load_verify_locations.pod	2013-09-12 11:17:42.163092660 +0200
dad6e3
@@ -100,13 +100,13 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The operation failed because B<cafile> and B<capath> are NULL or the
dad6e3
 processing at one of the locations specified failed. Check the error
dad6e3
 stack to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod.manfix	2013-09-12 11:17:42.132091981 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_client_CA_list.pod	2013-09-12 11:17:42.164092682 +0200
dad6e3
@@ -66,13 +66,13 @@ values:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 A failure while manipulating the STACK_OF(X509_NAME) object occurred or
dad6e3
 the X509_NAME could not be extracted from B<cacert>. Check the error stack
dad6e3
 to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_session_id_context.pod	2013-09-12 11:17:42.166092726 +0200
dad6e3
@@ -64,13 +64,13 @@ return the following values:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The length B<sid_ctx_len> of the session id context B<sid_ctx> exceeded
dad6e3
 the maximum allowed length of B<ssl_max_ssl_session_id_length>. The error
dad6e3
 is logged to the error stack.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod.manfix	2013-02-11 16:26:04.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_set_ssl_version.pod	2013-09-12 11:17:42.167092748 +0200
dad6e3
@@ -42,11 +42,11 @@ and SSL_set_ssl_method():
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The new choice failed, check the error stack to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod.manfix openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod.manfix	2013-09-12 11:17:42.133092003 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_CTX_use_psk_identity_hint.pod	2013-09-12 11:17:42.168092770 +0200
dad6e3
@@ -96,7 +96,7 @@ data to B<psk> and return the length of
dad6e3
 connection will fail with decryption_error before it will be finished
dad6e3
 completely.
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 PSK identity was not found. An "unknown_psk_identity" alert message
dad6e3
 will be sent and the connection setup fails.
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod.manfix openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod.manfix	2013-09-12 11:17:42.135092047 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_do_handshake.pod	2013-09-12 11:17:42.170092814 +0200
dad6e3
@@ -45,13 +45,13 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The TLS/SSL handshake was not successful but was shut down controlled and
dad6e3
 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
dad6e3
 return value B<ret> to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
dad6e3
 established.
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_read.pod.manfix openssl-1.0.1e/doc/ssl/SSL_read.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_read.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_read.pod	2013-09-12 11:17:42.171092836 +0200
dad6e3
@@ -86,7 +86,7 @@ The following return values can occur:
dad6e3
 The read operation was successful; the return value is the number of
dad6e3
 bytes actually read from the TLS/SSL connection.
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The read operation was not successful. The reason may either be a clean
dad6e3
 shutdown due to a "close notify" alert sent by the peer (in which case
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_session_reused.pod.manfix openssl-1.0.1e/doc/ssl/SSL_session_reused.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_session_reused.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_session_reused.pod	2013-09-12 11:17:42.172092857 +0200
dad6e3
@@ -27,11 +27,11 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 A new session was negotiated.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 A session was reused.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_set_fd.pod.manfix openssl-1.0.1e/doc/ssl/SSL_set_fd.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_set_fd.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_set_fd.pod	2013-09-12 11:17:42.174092901 +0200
dad6e3
@@ -35,11 +35,11 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The operation failed. Check the error stack to find out why.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_set_session.pod.manfix openssl-1.0.1e/doc/ssl/SSL_set_session.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_set_session.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_set_session.pod	2013-09-12 11:17:42.175092923 +0200
dad6e3
@@ -37,11 +37,11 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The operation failed; check the error stack to find out the reason.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The operation succeeded.
dad6e3
 
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_shutdown.pod.manfix openssl-1.0.1e/doc/ssl/SSL_shutdown.pod
fa93b6
--- openssl-1.0.1e/doc/ssl/SSL_shutdown.pod.manfix	2013-09-12 11:17:42.137092090 +0200
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_shutdown.pod	2013-09-12 11:17:42.177092967 +0200
dad6e3
@@ -92,14 +92,14 @@ The following return values can occur:
dad6e3
 
dad6e3
 =over 4
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The shutdown is not yet finished. Call SSL_shutdown() for a second time,
dad6e3
 if a bidirectional shutdown shall be performed.
dad6e3
 The output of L<ssl_get_error(3)|ssl_get_error(3)> may be misleading, as an
dad6e3
 erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
dad6e3
 
dad6e3
-=item 1
dad6e3
+=item C<1>
dad6e3
 
dad6e3
 The shutdown was successfully completed. The "close notify" alert was sent
dad6e3
 and the peer's "close notify" alert was received.
dad6e3
diff -up openssl-1.0.1e/doc/ssl/SSL_write.pod.manfix openssl-1.0.1e/doc/ssl/SSL_write.pod
dad6e3
--- openssl-1.0.1e/doc/ssl/SSL_write.pod.manfix	2013-02-11 16:02:48.000000000 +0100
fa93b6
+++ openssl-1.0.1e/doc/ssl/SSL_write.pod	2013-09-12 11:17:42.177092967 +0200
dad6e3
@@ -79,7 +79,7 @@ The following return values can occur:
dad6e3
 The write operation was successful, the return value is the number of
dad6e3
 bytes actually written to the TLS/SSL connection.
dad6e3
 
dad6e3
-=item 0
dad6e3
+=item C<0>
dad6e3
 
dad6e3
 The write operation was not successful. Probably the underlying connection
dad6e3
 was closed. Call SSL_get_error() with the return value B<ret> to find out,