Module Name:    src
Committed By:   agc
Date:           Mon Jun  8 06:15:51 UTC 2009

Added Files:
        src/crypto/external/bsd/netpgp/dist/src/bin: netpgpverify.1

Log Message:
Add a manual page for netpgpverify(1).


To generate a diff of this commit:
cvs rdiff -u -r0 -r1.1 \
    src/crypto/external/bsd/netpgp/dist/src/bin/netpgpverify.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Added files:

Index: src/crypto/external/bsd/netpgp/dist/src/bin/netpgpverify.1
diff -u /dev/null src/crypto/external/bsd/netpgp/dist/src/bin/netpgpverify.1:1.1
--- /dev/null	Mon Jun  8 06:15:51 2009
+++ src/crypto/external/bsd/netpgp/dist/src/bin/netpgpverify.1	Mon Jun  8 06:15:51 2009
@@ -0,0 +1,174 @@
+.\" $NetBSD: netpgpverify.1,v 1.1 2009/06/08 06:15:51 agc Exp $
+.\"
+.\" Copyright (c) 2009 The NetBSD Foundation, Inc.
+.\" All rights reserved.
+.\"
+.\" This manual page is derived from software contributed to
+.\" The NetBSD Foundation by Alistair Crooks (a...@netbsd.org).
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\"    notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\"    notice, this list of conditions and the following disclaimer in the
+.\"    documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+.\" PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+.\" POSSIBILITY OF SUCH DAMAGE.
+.\"
+.Dd June 6, 2009
+.Dt NETPGPVERIFY 1
+.Os
+.Sh NAME
+.Nm netpgpverify
+.Nd standalone program for digital signature verification
+.Sh SYNOPSIS
+.Nm
+.Fl Fl verify
+.Op Fl Fl output Ns = Ns Ar filename
+.Op options
+.Ar file ...
+.Pp
+where the options for all commands are:
+.Pp
+.Op Fl Fl coredumps
+.br
+.Op Fl Fl homedir Ns = Ns Ar home-directory
+.br
+.Op Fl Fl keyring Ns = Ns Ar keyring
+.br
+.Op Fl Fl userid Ns = Ns Ar userid
+.br
+.Op Fl Fl verbose
+.Sh DESCRIPTION
+The
+.Nm
+complements the
+.Xr netpgp 1
+program, and duplicates its verification functionality in
+a single standalone program.
+The reason for this duplication is simply because verification
+of digital signatures
+is such a common operation that a single, much smaller,
+standalone program can be used.
+.Pp
+The following commands are used to sign and verify signatures:
+.Bl -tag -width Ar
+.It Fl Fl homedir Ar home-directory
+Keyrings are normally located, for historical reasons, within
+the user's home directory in a subdirectory called
+.Dq Pa .gnupg
+and this option specifies an alternative location in which to
+find that sub-directory.
+.It Fl Fl keyring Ar keyring
+This option specifies an alternative keyring to be used.
+All keyring operations will be relative to this alternative keyring.
+.It Fl Fl output
+specifies a filename to which verified output from a signed file
+may be redirected.
+The default is to send the verified output to stdout,
+and this may also be specified using the
+.Dq -
+value.
+.It Fl Fl verbose
+This option can be used to view information during
+the process of the
+.Nm
+requests.
+.It Fl Fl coredumps
+in normal processing,
+if an error occurs, the contents of memory are saved to disk, and can
+be read using tools to analyse behaviour.
+Unfortuinately this can disclose information to people viewing
+the core dump, such as secret keys, and passphrases protecting
+those keys.
+In normal operation,
+.Nm
+will turn off the ability to save core dumps on persistent storage,
+but selecting this option will allow core dumps to be written to disk.
+This option should be used wisely, and any core dumps should
+be deleted in a secure manner when no longer needed.
+.El
+.Sh SIGNING AND VERIFICATION
+Signing and verification of a file is best viewed using the following example:
+.Bd -literal
+% netpgp --sign --userid=...@netbsd.org a
+pub 2048/RSA (Encrypt or Sign) 1b68dcfcc0596823 2004-01-12
+Key fingerprint: d415 9deb 336d e4cc cdfa 00cd 1b68 dcfc c059 6823
+uid              Alistair Crooks \*[lt]...@netbsd.org\*[gt]
+uid              Alistair Crooks \*[lt]...@pkgsrc.org\*[gt]
+uid              Alistair Crooks \*[lt]...@alistaircrooks.com\*[gt]
+uid              Alistair Crooks \*[lt]alist...@hockley-crooks.com\*[gt]
+netpgp passphrase:
+% netpgpverify a.gpg
+Good signature for a.gpg made Thu Jan 29 03:06:00 2009
+using RSA (Encrypt or Sign) key 1B68DCFCC0596823
+pub 2048/RSA (Encrypt or Sign) 1b68dcfcc0596823 2004-01-12
+Key fingerprint: d415 9deb 336d e4cc cdfa 00cd 1b68 dcfc c059 6823
+uid              Alistair Crooks \*[lt]alist...@hockley-crooks.com\*[gt]
+uid              Alistair Crooks \*[lt]...@pkgsrc.org\*[gt]
+uid              Alistair Crooks \*[lt]...@netbsd.org\*[gt]
+uid              Alistair Crooks \*[lt]...@alistaircrooks.com\*[gt]
+%
+.Ed
+.Pp
+In the example above, a signature is made on a single file called
+.Dq Pa a
+using a user identity corresponding to
+.Dq a...@netbsd.org
+and using the
+.Xr netpgp 1
+program.
+The key located for the user identity is displayed, and
+the user is prompted to type in their passphrase.
+The resulting file, called
+.Dq Pa a.gpg
+is placed in the same directory.
+The second part of the example shows a verification
+using
+.Nm
+of the signed file
+taking place.
+The time and user identity of the signatory is displayed, followed
+by a fuller description of the public key of the signatory.
+In both cases, the exit value from the utility was a successful one.
+.Sh RETURN VALUES
+The
+.Nm
+utility will return 0 for success,
+1 if the file's signature does not match what was expected,
+or 2 if any other error occurs.
+.Sh SEE ALSO
+.Xr netpgp 1 ,
+.\" .Xr libbz2 3 ,
+.Xr libnetpgp 3 ,
+.Xr ssl 3 ,
+.Xr zlib 3
+.Sh STANDARDS
+The
+.Nm
+utility is designed to conform to IETF RFC 4880.
+.Sh HISTORY
+The
+.Nm
+command first appeared in
+.Nx 6.0 .
+.Sh AUTHORS
+.An -nosplit
+.An Ben Laurie ,
+.An Rachel Willmer ,
+and was overhauled and rewritten by
+.An Alistair Crooks Aq a...@netbsd.org .
+This manual page was written by
+.An Alistair Crooks .

Reply via email to