mirror of https://github.com/openssl/openssl.git
Command docs: replacables are in italics, options always start with a dash
Quite a lot of replacables were still bold, and some options were mentioned without a beginning dash. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10065)
This commit is contained in:
parent
fed8bd90e4
commit
2f0ea93658
|
|
@ -120,7 +120,7 @@ Verifies certificates against the CA certificate for "demoCA". If no
|
|||
certificates are specified on the command line it tries to verify the file
|
||||
"newcert.pem". Invokes B<openssl verify> command.
|
||||
|
||||
=item B<-extra-req> | B<-extra-ca> | B<-extra-pkcs12> | B<-extra-x509> | B<-extra-verify> <extra-params>
|
||||
=item B<-extra-req> | B<-extra-ca> | B<-extra-pkcs12> | B<-extra-x509> | B<-extra-verify> I<extra-params>
|
||||
|
||||
The purpose of these parameters is to allow optional parameters to be supplied
|
||||
to B<openssl> that this command executes. The B<-extra-cmd> are specific to the
|
||||
|
|
|
|||
|
|
@ -39,7 +39,7 @@ Print out a usage message.
|
|||
|
||||
=item B<-inform> B<DER>|B<PEM>
|
||||
|
||||
The input format. I<DER> is binary format and I<PEM> (the default) is base64
|
||||
The input format. B<DER> is binary format and B<PEM> (the default) is base64
|
||||
encoded.
|
||||
|
||||
=item B<-in> I<filename>
|
||||
|
|
@ -88,12 +88,12 @@ option can be used multiple times to "drill down" into a nested structure.
|
|||
|
||||
=item B<-genstr> I<string>, B<-genconf> I<file>
|
||||
|
||||
Generate encoded data based on B<string>, B<file> or both using
|
||||
L<ASN1_generate_nconf(3)> format. If B<file> only is
|
||||
Generate encoded data based on I<string>, I<file> or both using
|
||||
L<ASN1_generate_nconf(3)> format. If I<file> only is
|
||||
present then the string is obtained from the default section using the name
|
||||
B<asn1>. The encoded data is passed through the ASN1 parser and printed out as
|
||||
though it came from a file, the contents can thus be examined and written to a
|
||||
file using the B<out> option.
|
||||
file using the B<-out> option.
|
||||
|
||||
=item B<-strictpem>
|
||||
|
||||
|
|
@ -105,8 +105,8 @@ END marker in a PEM file.
|
|||
|
||||
=item B<-item> I<name>
|
||||
|
||||
Attempt to decode and print the data as B<ASN1_ITEM name>. This can be used to
|
||||
print out the fields of any supported ASN.1 structure if the type is known.
|
||||
Attempt to decode and print the data as B<ASN1_ITEM> I<name>. This can be used
|
||||
to print out the fields of any supported ASN.1 structure if the type is known.
|
||||
|
||||
=back
|
||||
|
||||
|
|
|
|||
|
|
@ -251,7 +251,7 @@ used).
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<ca>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<ca>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -259,7 +259,7 @@ for all available algorithms.
|
|||
=item B<-subj> I<arg>
|
||||
|
||||
Supersedes subject name given in the request.
|
||||
The arg must be formatted as I</type0=value0/type1=value1/type2=...>.
|
||||
The arg must be formatted as C</type0=value0/type1=value1/type2=...>.
|
||||
Keyword characters may be escaped by \ (backslash), and whitespace is retained.
|
||||
Empty values are permitted, but the corresponding type will not be included
|
||||
in the resulting certificate.
|
||||
|
|
@ -291,7 +291,7 @@ support for multivalued RDNs. Example:
|
|||
|
||||
I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
|
||||
|
||||
If -multi-rdn is not used then the UID value is I<123456+CN=John Doe>.
|
||||
If B<-multi-rdn> is not used then the UID value is I<123456+CN=John Doe>.
|
||||
|
||||
=item B<-rand> I<files>
|
||||
|
||||
|
|
@ -353,9 +353,9 @@ Updates the database index to purge expired certificates.
|
|||
|
||||
=item B<-crl_reason> I<reason>
|
||||
|
||||
Revocation reason, where B<reason> is one of: B<unspecified>, B<keyCompromise>,
|
||||
Revocation reason, where I<reason> is one of: B<unspecified>, B<keyCompromise>,
|
||||
B<CACompromise>, B<affiliationChanged>, B<superseded>, B<cessationOfOperation>,
|
||||
B<certificateHold> or B<removeFromCRL>. The matching of B<reason> is case
|
||||
B<certificateHold> or B<removeFromCRL>. The matching of I<reason> is case
|
||||
insensitive. Setting any revocation reason will make the CRL v2.
|
||||
|
||||
In practice B<removeFromCRL> is not particularly useful because it is only used
|
||||
|
|
@ -364,14 +364,14 @@ in delta CRLs which are not currently implemented.
|
|||
=item B<-crl_hold> I<instruction>
|
||||
|
||||
This sets the CRL revocation reason code to B<certificateHold> and the hold
|
||||
instruction to B<instruction> which must be an OID. Although any OID can be
|
||||
instruction to I<instruction> which must be an OID. Although any OID can be
|
||||
used only B<holdInstructionNone> (the use of which is discouraged by RFC2459)
|
||||
B<holdInstructionCallIssuer> or B<holdInstructionReject> will normally be used.
|
||||
|
||||
=item B<-crl_compromise> I<time>
|
||||
|
||||
This sets the revocation reason to B<keyCompromise> and the compromise time to
|
||||
B<time>. B<time> should be in GeneralizedTime format that is B<YYYYMMDDHHMMSSZ>.
|
||||
I<time>. I<time> should be in GeneralizedTime format that is I<YYYYMMDDHHMMSSZ>.
|
||||
|
||||
=item B<-crl_CA_compromise> I<time>
|
||||
|
||||
|
|
|
|||
|
|
@ -22,7 +22,7 @@ B<openssl> B<ciphers>
|
|||
[B<-stdname>]
|
||||
[B<-convert> I<name>]
|
||||
[B<-ciphersuites> I<val>]
|
||||
[B<cipherlist>]
|
||||
[I<cipherlist>]
|
||||
|
||||
=for comment ifdef ssl3 tls1 tls1_1 tls1_2 tls1_3 psk srp
|
||||
|
||||
|
|
@ -87,7 +87,7 @@ Precede each cipher suite by its standard name.
|
|||
|
||||
=item B<-convert> I<name>
|
||||
|
||||
Convert a standard cipher B<name> to its OpenSSL name.
|
||||
Convert a standard cipher I<name> to its OpenSSL name.
|
||||
|
||||
=item B<-ciphersuites> I<val>
|
||||
|
||||
|
|
@ -147,8 +147,8 @@ will not moved to the end of the list.
|
|||
The cipher string B<@STRENGTH> can be used at any point to sort the current
|
||||
cipher list in order of encryption algorithm key length.
|
||||
|
||||
The cipher string B<@SECLEVEL=n> can be used at any point to set the security
|
||||
level to B<n>, which should be a number between zero and five, inclusive.
|
||||
The cipher string B<@SECLEVEL>=I<n> can be used at any point to set the security
|
||||
level to I<n>, which should be a number between zero and five, inclusive.
|
||||
See L<SSL_CTX_set_security_level> for a description of what each level means.
|
||||
|
||||
The cipher list can be prefixed with the B<DEFAULT> keyword, which enables
|
||||
|
|
|
|||
|
|
@ -57,13 +57,13 @@ x509
|
|||
|
||||
=for comment generic
|
||||
|
||||
B<openssl> B<cmd> [B<-help>] [B<...>]
|
||||
B<openssl> I<cmd> B<-help> | [I<-option> | I<-option> I<arg>] ... [I<arg>] ...
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
Every B<cmd> listed above is a (sub-)command of the L<openssl(1)> application.
|
||||
It has its own detailed manual page at B<openssl-cmd(1)>. For example, to view
|
||||
the manual page for the B<openssl dgst> command, type B<man openssl-dgst>.
|
||||
Every I<cmd> listed above is a (sub-)command of the L<openssl(1)> application.
|
||||
It has its own detailed manual page at B<openssl-I<cmd>>(1). For example, to
|
||||
view the manual page for the B<openssl dgst> command, type C<man openssl-dgst>.
|
||||
|
||||
=head1 OPTIONS
|
||||
|
||||
|
|
@ -132,8 +132,8 @@ L<openssl-x509(1)>,
|
|||
|
||||
=head1 HISTORY
|
||||
|
||||
Initially, the manual page entry for the B<openssl cmd> command used
|
||||
to be available at B<cmd(1)>. Later, the alias B<openssl-cmd(1)> was
|
||||
Initially, the manual page entry for the C<openssl I<cmd>> command used
|
||||
to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was
|
||||
introduced, which made it easier to group the openssl commands using
|
||||
the L<apropos(1)> command or the shell's tab completion.
|
||||
|
||||
|
|
|
|||
|
|
@ -385,7 +385,7 @@ the signers certificates. The certificates should be in PEM format.
|
|||
|
||||
=item B<-certsout> I<file>
|
||||
|
||||
Any certificates contained in the message are written to B<file>.
|
||||
Any certificates contained in the message are written to I<file>.
|
||||
|
||||
=item B<-signer> I<file>
|
||||
|
||||
|
|
@ -446,14 +446,14 @@ content encryption key using an AES key in the B<KEKRecipientInfo> type.
|
|||
|
||||
The key identifier for the supplied symmetric key for B<KEKRecipientInfo> type.
|
||||
This option B<must> be present if the B<-secretkey> option is used with
|
||||
B<-encrypt>. With B<-decrypt> operations the B<id> is used to locate the
|
||||
B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the
|
||||
relevant key if it is not supplied then an attempt is used to decrypt any
|
||||
B<KEKRecipientInfo> structures.
|
||||
|
||||
=item B<-econtent_type> I<type>
|
||||
|
||||
Set the encapsulated content type to B<type> if not supplied the B<Data> type
|
||||
is used. The B<type> argument can be any valid OID name in either text or
|
||||
Set the encapsulated content type to I<type> if not supplied the B<Data> type
|
||||
is used. The I<type> argument can be any valid OID name in either text or
|
||||
numerical format.
|
||||
|
||||
=item B<-inkey> I<file>
|
||||
|
|
@ -766,7 +766,7 @@ No revocation checking is done on the signer's certificate.
|
|||
The use of multiple B<-signer> options and the B<-resign> command were first
|
||||
added in OpenSSL 1.0.0.
|
||||
|
||||
The B<keyopt> option was added in OpenSSL 1.0.2.
|
||||
The B<-keyopt> option was added in OpenSSL 1.0.2.
|
||||
|
||||
Support for RSA-OAEP and RSA-PSS was added in OpenSSL 1.0.2.
|
||||
|
||||
|
|
|
|||
|
|
@ -95,12 +95,12 @@ Output the nextUpdate field.
|
|||
=item B<-CAfile> I<file>
|
||||
|
||||
Verify the signature on a CRL by looking up the issuing certificate in
|
||||
B<file>.
|
||||
I<file>.
|
||||
|
||||
=item B<-CApath> I<dir>
|
||||
|
||||
Verify the signature on a CRL by looking up the issuing certificate in
|
||||
B<dir>. This directory must be a standard certificate directory: that
|
||||
I<dir>. This directory must be a standard certificate directory: that
|
||||
is a hash of each subject name (using B<x509 -hash>) should be linked
|
||||
to each certificate.
|
||||
|
||||
|
|
|
|||
|
|
@ -39,7 +39,7 @@ signatures using message digests.
|
|||
|
||||
The generic name, B<dgst>, may be used with an option specifying the
|
||||
algorithm to be used.
|
||||
The default digest is I<sha256>.
|
||||
The default digest is B<sha256>.
|
||||
A supported I<digest> name may also be used as the command name.
|
||||
To see the list of supported algorithms, use the I<list --digest-commands>
|
||||
command.
|
||||
|
|
@ -60,7 +60,7 @@ supported digests, use the command C<list --digest-commands>.
|
|||
=item B<-c>
|
||||
|
||||
Print out the digest in two digit groups separated by colons, only relevant if
|
||||
B<hex> format output is used.
|
||||
the B<-hex> option is given as well.
|
||||
|
||||
=item B<-d>
|
||||
|
||||
|
|
@ -103,7 +103,7 @@ Names and values of these options are algorithm-specific.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The private key password source. For more information about the format of B<arg>
|
||||
The private key password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-verify> I<filename>
|
||||
|
|
@ -144,13 +144,13 @@ Following options are supported by both by B<HMAC> and B<gost-mac>:
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<key:string>
|
||||
=item B<key>:I<string>
|
||||
|
||||
Specifies MAC key as alphanumeric string (use if key contain printable
|
||||
characters only). String length must conform to any restrictions of
|
||||
the MAC algorithm for example exactly 32 chars for gost-mac.
|
||||
|
||||
=item B<hexkey:string>
|
||||
=item B<hexkey>:I<string>
|
||||
|
||||
Specifies MAC key in hexadecimal form (two hex digits per byte).
|
||||
Key length must conform to any restrictions of the MAC algorithm
|
||||
|
|
@ -179,7 +179,7 @@ Compute HMAC using a specific key for certain OpenSSL-FIPS operations.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Use engine B<id> for operations (including private key storage).
|
||||
Use engine I<id> for operations (including private key storage).
|
||||
This engine is not used as source for digest algorithms, unless it is
|
||||
also specified in the configuration file or B<-engine_impl> is also
|
||||
specified.
|
||||
|
|
@ -187,7 +187,7 @@ specified.
|
|||
=item B<-engine_impl>
|
||||
|
||||
When used with the B<-engine> option, it specifies to also use
|
||||
engine B<id> for digest operations.
|
||||
engine I<id> for digest operations.
|
||||
|
||||
=item I<file> ...
|
||||
|
||||
|
|
|
|||
|
|
@ -83,7 +83,7 @@ displays a warning if not.
|
|||
|
||||
The generator to use, either 2, 3 or 5. If present then the
|
||||
input file is ignored and parameters are generated instead. If not
|
||||
present but B<numbits> is present, parameters are generated with the
|
||||
present but I<numbits> is present, parameters are generated with the
|
||||
default generator 2.
|
||||
|
||||
=item B<-rand> I<files>
|
||||
|
|
@ -122,7 +122,7 @@ be loaded by calling the get_dhNNNN() function.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<dhparam>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<dhparam>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ prompted for.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -87,7 +87,7 @@ filename.
|
|||
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea>
|
||||
|
|
@ -125,7 +125,7 @@ a public key.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<dsa>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<dsa>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ as the B<-inform> option.
|
|||
=item B<-in> I<filename>
|
||||
|
||||
This specifies the input filename to read parameters from or standard input if
|
||||
this option is not specified. If the B<numbits> parameter is included then
|
||||
this option is not specified. If the I<numbits> parameter is included then
|
||||
this option will be ignored.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -90,7 +90,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<dsaparam>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<dsaparam>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -99,10 +99,10 @@ for all available algorithms.
|
|||
|
||||
Print extra details about the operations being performed.
|
||||
|
||||
=item B<numbits>
|
||||
=item I<numbits>
|
||||
|
||||
This option specifies that a parameter set should be generated of size
|
||||
B<numbits>. It must be the last option. If this option is included then
|
||||
I<numbits>. It must be the last option. If this option is included then
|
||||
the input file (if any) is ignored.
|
||||
|
||||
=back
|
||||
|
|
|
|||
|
|
@ -68,7 +68,7 @@ prompted for.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -80,7 +80,7 @@ filename.
|
|||
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-des>|B<-des3>|B<-idea>
|
||||
|
|
@ -113,7 +113,7 @@ By default a private key is output. With this option a public
|
|||
key will be output instead. This option is automatically set if the input is
|
||||
a public key.
|
||||
|
||||
=item B<-conv_form>
|
||||
=item B<-conv_form> I<arg>
|
||||
|
||||
This specifies how the points on the elliptic curve are converted
|
||||
into octet strings. Possible values are: B<compressed> (the default
|
||||
|
|
@ -143,7 +143,7 @@ This option checks the consistency of an EC private or public key.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<ec>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<ec>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -96,7 +96,7 @@ to get a list of all currently implemented EC parameters.
|
|||
If this options is specified B<ecparam> will print out a list of all
|
||||
currently implemented EC parameters names and exit.
|
||||
|
||||
=item B<-conv_form>
|
||||
=item B<-conv_form> I<arg>
|
||||
|
||||
This specifies how the points on the elliptic curve are converted
|
||||
into octet strings. Possible values are: B<compressed>, B<uncompressed> (the
|
||||
|
|
@ -139,7 +139,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<ecparam>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<ecparam>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -72,7 +72,7 @@ The output filename, standard output by default.
|
|||
|
||||
=item B<-pass> I<arg>
|
||||
|
||||
The password source. For more information about the format of B<arg>
|
||||
The password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-e>
|
||||
|
|
@ -104,7 +104,7 @@ versions of OpenSSL. Superseded by the B<-pass> argument.
|
|||
|
||||
=item B<-kfile> I<filename>
|
||||
|
||||
Read the password to derive the key from the first line of B<filename>.
|
||||
Read the password to derive the key from the first line of I<filename>.
|
||||
This is for compatibility with previous versions of OpenSSL. Superseded by
|
||||
the B<-pass> argument.
|
||||
|
||||
|
|
@ -202,7 +202,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
=head1 NOTES
|
||||
|
||||
The program can be called either as B<openssl cipher> or
|
||||
B<openssl enc -cipher>. The first form doesn't work with
|
||||
B<openssl enc -I<cipher>>. The first form doesn't work with
|
||||
engine-provided ciphers, because this form is processed before the
|
||||
configuration file is read and any ENGINEs loaded.
|
||||
Use the B<list> command to get a list of supported ciphers.
|
||||
|
|
@ -251,7 +251,7 @@ Blowfish and RC5 algorithms use a 128 bit key.
|
|||
Note that some of these ciphers can be disabled at compile time
|
||||
and some are available only if an appropriate engine is configured
|
||||
in the configuration file. The output of the B<enc> command run with
|
||||
the B<-ciphers> option (that is B<openssl enc -ciphers>) produces a
|
||||
the B<-I<ciphers>> option (that is B<openssl enc -I<ciphers>>) produces a
|
||||
list of ciphers, supported by your version of OpenSSL, including
|
||||
ones provided by configured engines.
|
||||
|
||||
|
|
|
|||
|
|
@ -15,14 +15,14 @@ B<openssl engine>
|
|||
[B<-c>]
|
||||
[B<-t>]
|
||||
[B<-tt>]
|
||||
[B<-pre> I<command>]
|
||||
[B<-post> I<command>]
|
||||
[B<-pre> I<command>] ...
|
||||
[B<-post> I<command>] ...
|
||||
[I<engine> ...]
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
The B<engine> command is used to query the status and capabilities
|
||||
of the specified B<engine>'s.
|
||||
of the specified I<engine>'s.
|
||||
Engines may be specified before and after all other command-line flags.
|
||||
Only those specified are queried.
|
||||
|
||||
|
|
@ -56,10 +56,13 @@ Displays an error trace for any unavailable engine.
|
|||
Command-line configuration of engines.
|
||||
The B<-pre> command is given to the engine before it is loaded and
|
||||
the B<-post> command is given after the engine is loaded.
|
||||
The I<command> is of the form I<cmd:val> where I<cmd> is the command,
|
||||
The I<command> is of the form I<cmd>:I<val> where I<cmd> is the command,
|
||||
and I<val> is the value for the command.
|
||||
See the example below.
|
||||
|
||||
These two options are cumulative, so they may be given more than once in the
|
||||
same command.
|
||||
|
||||
=back
|
||||
|
||||
=head1 EXAMPLES
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@ openssl-errstr - lookup error codes
|
|||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
B<openssl errstr error_code>
|
||||
B<openssl errstr> I<error_code>
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
|
|
|
|||
|
|
@ -83,20 +83,20 @@ Common control strings used for fipsinstall are:
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<key:string>
|
||||
=item B<key>:I<string>
|
||||
|
||||
Specifies the MAC key as an alphanumeric string (use if the key contains
|
||||
printable characters only).
|
||||
The string length must conform to any restrictions of the MAC algorithm.
|
||||
A key must be specified for every MAC algorithm.
|
||||
|
||||
=item B<hexkey:string>
|
||||
=item B<hexkey>:I<string>
|
||||
|
||||
Specifies the MAC key in hexadecimal form (two hex digits per byte).
|
||||
The key length must conform to any restrictions of the MAC algorithm.
|
||||
A key must be specified for every MAC algorithm.
|
||||
|
||||
=item B<digest:string>
|
||||
=item B<digest>:I<string>
|
||||
|
||||
Used by HMAC as an alphanumeric string (use if the key contains printable
|
||||
characters only).
|
||||
|
|
|
|||
|
|
@ -25,7 +25,7 @@ B<openssl> B<gendsa>
|
|||
[B<-writerand> I<file>]
|
||||
[B<-engine> I<id>]
|
||||
[B<-verbose>]
|
||||
[B<paramfile>]
|
||||
[I<paramfile>]
|
||||
|
||||
=for comment ifdef engine
|
||||
|
||||
|
|
@ -67,7 +67,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<gendsa>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<gendsa>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -76,11 +76,11 @@ for all available algorithms.
|
|||
|
||||
Print extra details about the operations being performed.
|
||||
|
||||
=item B<paramfile>
|
||||
=item I<paramfile>
|
||||
|
||||
This option specifies the DSA parameter file to use. The parameters in this
|
||||
file determine the size of the private key. DSA parameters can be generated
|
||||
and examined using the B<openssl dsaparam> command.
|
||||
The DSA parameter file to use. The parameters in this file determine
|
||||
the size of the private key. DSA parameters can be generated and
|
||||
examined using the B<openssl dsaparam> command.
|
||||
|
||||
=back
|
||||
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@ B<openssl> B<genpkey>
|
|||
[B<-engine> I<id>]
|
||||
[B<-paramfile> I<file>]
|
||||
[B<-algorithm> I<alg>]
|
||||
[B<-pkeyopt> I<opt:value>]
|
||||
[B<-pkeyopt> I<opt>:I<value>]
|
||||
[B<-genparam>]
|
||||
[B<-text>]
|
||||
|
||||
|
|
@ -44,7 +44,7 @@ This specifies the output format DER or PEM. The default format is PEM.
|
|||
|
||||
=item B<-pass> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-I<cipher>>
|
||||
|
|
@ -54,7 +54,7 @@ name accepted by EVP_get_cipherbyname() is acceptable such as B<des3>.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<genpkey>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<genpkey>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms. If used this option should precede all other
|
||||
|
|
@ -79,9 +79,9 @@ will be generated. Use the B<dh_paramgen_type> option to indicate whether PKCS#3
|
|||
or X9.42 DH parameters are required. See L<DH Parameter Generation Options>
|
||||
below for more details.
|
||||
|
||||
=item B<-pkeyopt> I<opt:value>
|
||||
=item B<-pkeyopt> I<opt>:I<value>
|
||||
|
||||
Set the public key algorithm option B<opt> to B<value>. The precise set of
|
||||
Set the public key algorithm option I<opt> to I<value>. The precise set of
|
||||
options supported depends on the public key algorithm used and its
|
||||
implementation. See L<KEY GENERATION OPTIONS> and
|
||||
L<PARAMETER GENERATION OPTIONS> below for more details.
|
||||
|
|
@ -138,22 +138,23 @@ Note: by default an B<RSA-PSS> key has no parameter restrictions.
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<rsa_keygen_bits:numbits>, B<rsa_keygen_primes:numprimes>, B<rsa_keygen_pubexp:value>
|
||||
=item B<rsa_keygen_bits>:I<numbits>, B<rsa_keygen_primes>:I<numprimes>,
|
||||
B<rsa_keygen_pubexp>:I<value>
|
||||
|
||||
These options have the same meaning as the B<RSA> algorithm.
|
||||
|
||||
=item B<rsa_pss_keygen_md:digest>
|
||||
=item B<rsa_pss_keygen_md>:I<digest>
|
||||
|
||||
If set the key is restricted and can only use B<digest> for signing.
|
||||
If set the key is restricted and can only use I<digest> for signing.
|
||||
|
||||
=item B<rsa_pss_keygen_mgf1_md:digest>
|
||||
=item B<rsa_pss_keygen_mgf1_md>:I<digest>
|
||||
|
||||
If set the key is restricted and can only use B<digest> as it's MGF1
|
||||
If set the key is restricted and can only use I<digest> as it's MGF1
|
||||
parameter.
|
||||
|
||||
=item B<rsa_pss_keygen_saltlen:len>
|
||||
=item B<rsa_pss_keygen_saltlen>:I<len>
|
||||
|
||||
If set the key is restricted and B<len> specifies the minimum salt length.
|
||||
If set the key is restricted and I<len> specifies the minimum salt length.
|
||||
|
||||
=back
|
||||
|
||||
|
|
@ -163,14 +164,14 @@ The EC key generation options can also be used for parameter generation.
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<ec_paramgen_curve:curve>
|
||||
=item B<ec_paramgen_curve>:I<curve>
|
||||
|
||||
The EC curve to use. OpenSSL supports NIST curve names such as "P-256".
|
||||
|
||||
=item B<ec_param_enc:encoding>
|
||||
=item B<ec_param_enc>:I<encoding>
|
||||
|
||||
The encoding to use for parameters. The "encoding" parameter must be either
|
||||
"named_curve" or "explicit". The default value is "named_curve".
|
||||
The encoding to use for parameters. The I<encoding> parameter must be either
|
||||
B<named_curve> or B<explicit>. The default value is B<named_curve>.
|
||||
|
||||
=back
|
||||
|
||||
|
|
@ -184,16 +185,16 @@ below.
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<dsa_paramgen_bits:numbits>
|
||||
=item B<dsa_paramgen_bits>:I<numbits>
|
||||
|
||||
The number of bits in the generated prime. If not specified 2048 is used.
|
||||
|
||||
=item B<dsa_paramgen_q_bits:numbits>
|
||||
=item B<dsa_paramgen_q_bits>:I<numbits>
|
||||
|
||||
The number of bits in the q parameter. Must be one of 160, 224 or 256. If not
|
||||
specified 224 is used.
|
||||
|
||||
=item B<dsa_paramgen_md:digest>
|
||||
=item B<dsa_paramgen_md>:I<digest>
|
||||
|
||||
The digest to use during parameter generation. Must be one of B<sha1>, B<sha224>
|
||||
or B<sha256>. If set, then the number of bits in B<q> will match the output size
|
||||
|
|
@ -208,30 +209,30 @@ or B<sha256> if it is 256.
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<dh_paramgen_prime_len:numbits>
|
||||
=item B<dh_paramgen_prime_len>:I<numbits>
|
||||
|
||||
The number of bits in the prime parameter B<p>. The default is 2048.
|
||||
The number of bits in the prime parameter I<p>. The default is 2048.
|
||||
|
||||
=item B<dh_paramgen_subprime_len:numbits>
|
||||
=item B<dh_paramgen_subprime_len>:I<numbits>
|
||||
|
||||
The number of bits in the sub prime parameter B<q>. The default is 256 if the
|
||||
The number of bits in the sub prime parameter I<q>. The default is 256 if the
|
||||
prime is at least 2048 bits long or 160 otherwise. Only relevant if used in
|
||||
conjunction with the B<dh_paramgen_type> option to generate X9.42 DH parameters.
|
||||
|
||||
=item B<dh_paramgen_generator:value>
|
||||
=item B<dh_paramgen_generator>:I<value>
|
||||
|
||||
The value to use for the generator B<g>. The default is 2.
|
||||
The value to use for the generator I<g>. The default is 2.
|
||||
|
||||
=item B<dh_paramgen_type:value>
|
||||
=item B<dh_paramgen_type>:I<value>
|
||||
|
||||
The type of DH parameters to generate. Use 0 for PKCS#3 DH and 1 for X9.42 DH.
|
||||
The default is 0.
|
||||
|
||||
=item B<dh_rfc5114:num>
|
||||
=item B<dh_rfc5114>:I<num>
|
||||
|
||||
If this option is set, then the appropriate RFC5114 parameters are used
|
||||
instead of generating new parameters. The value B<num> can take the
|
||||
values 1, 2 or 3 corresponding to RFC5114 DH parameters consisting of
|
||||
instead of generating new parameters. The value I<num> can be one of
|
||||
1, 2 or 3 corresponding to RFC5114 DH parameters consisting of
|
||||
1024 bit group with 160 bit subgroup, 2048 bit group with 224 bit subgroup
|
||||
and 2048 bit group with 256 bit subgroup as mentioned in RFC5114 sections
|
||||
2.1, 2.2 and 2.3 respectively. If present this overrides all other DH parameter
|
||||
|
|
|
|||
|
|
@ -22,8 +22,7 @@ B<openssl> B<genrsa>
|
|||
[B<-des>]
|
||||
[B<-des3>]
|
||||
[B<-idea>]
|
||||
[B<-f4>]
|
||||
[B<-3>]
|
||||
[B<-f4>|B<-3>]
|
||||
[B<-rand> I<files>]
|
||||
[B<-writerand> I<file>]
|
||||
[B<-engine> I<id>]
|
||||
|
|
@ -80,16 +79,16 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<genrsa>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<genrsa>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
||||
=item B<-primes> I<num>
|
||||
|
||||
Specify the number of primes to use while generating the RSA key. The B<num>
|
||||
Specify the number of primes to use while generating the RSA key. The I<num>
|
||||
parameter must be a positive integer that is greater than 1 and less than 16.
|
||||
If B<num> is greater than 2, then the generated key is called a 'multi-prime'
|
||||
If I<num> is greater than 2, then the generated key is called a 'multi-prime'
|
||||
RSA key, which is defined in RFC 8017.
|
||||
|
||||
=item B<-verbose>
|
||||
|
|
|
|||
|
|
@ -12,7 +12,7 @@ B<openssl mac>
|
|||
[B<-in> I<filename>]
|
||||
[B<-out> I<filename>]
|
||||
[B<-binary>]
|
||||
B<mac_name>
|
||||
I<mac_name>
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
|
|
@ -51,55 +51,55 @@ Common parameter names used by EVP_MAC_CTX_get_params() are:
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<key:string>
|
||||
=item B<key:>I<string>
|
||||
|
||||
Specifies the MAC key as an alphanumeric string (use if the key contains
|
||||
printable characters only).
|
||||
The string length must conform to any restrictions of the MAC algorithm.
|
||||
A key must be specified for every MAC algorithm.
|
||||
|
||||
=item B<hexkey:string>
|
||||
=item B<hexkey:>I<string>
|
||||
|
||||
Specifies the MAC key in hexadecimal form (two hex digits per byte).
|
||||
The key length must conform to any restrictions of the MAC algorithm.
|
||||
A key must be specified for every MAC algorithm.
|
||||
|
||||
=item B<digest:string>
|
||||
=item B<digest:>I<string>
|
||||
|
||||
Used by HMAC as an alphanumeric string (use if the key contains printable
|
||||
characters only).
|
||||
The string length must conform to any restrictions of the MAC algorithm.
|
||||
To see the list of supported digests, use the command I<list -digest-commands>.
|
||||
|
||||
=item B<cipher:string>
|
||||
=item B<cipher:>I<string>
|
||||
|
||||
Used by CMAC and GMAC to specify the cipher algorithm.
|
||||
For CMAC it must be one of AES-128-CBC, AES-192-CBC, AES-256-CBC or
|
||||
DES-EDE3-CBC.
|
||||
For GMAC it should be a GCM mode cipher e.g. AES-128-GCM.
|
||||
|
||||
=item B<iv:string>
|
||||
=item B<iv:>I<string>
|
||||
|
||||
Used by GMAC to specify an IV as an alphanumeric string (use if the IV contains
|
||||
printable characters only).
|
||||
|
||||
=item B<hexiv:string>
|
||||
=item B<hexiv:>I<string>
|
||||
|
||||
Used by GMAC to specify an IV in hexadecimal form (two hex digits per byte).
|
||||
|
||||
=item B<outlen:int>
|
||||
=item B<outlen:>I<int>
|
||||
|
||||
Used by KMAC128 or KMAC256 to specify an output length.
|
||||
The default sizes are 32 or 64 bytes respectively.
|
||||
|
||||
=item B<custom:string>
|
||||
=item B<custom:>I<string>
|
||||
|
||||
Used by KMAC128 or KMAC256 to specify a customization string.
|
||||
The default is the empty string "".
|
||||
|
||||
=back
|
||||
|
||||
=item B<mac_name>
|
||||
=item I<mac_name>
|
||||
|
||||
Specifies the name of a supported MAC algorithm which will be used.
|
||||
To see the list of supported MAC's use the command I<list -mac-algorithms>.
|
||||
|
|
|
|||
|
|
@ -26,7 +26,7 @@ B<openssl> B<ocsp>
|
|||
[B<-nonce>]
|
||||
[B<-no_nonce>]
|
||||
[B<-url> I<URL>]
|
||||
[B<-host> I<host:port>]
|
||||
[B<-host> I<host>:I<port>]
|
||||
[B<-multi> I<process-count>]
|
||||
[B<-header>]
|
||||
[B<-path>]
|
||||
|
|
@ -121,27 +121,27 @@ specify output filename, default is standard output.
|
|||
=item B<-issuer> I<filename>
|
||||
|
||||
This specifies the current issuer certificate. This option can be used
|
||||
multiple times. The certificate specified in B<filename> must be in
|
||||
multiple times. The certificate specified in I<filename> must be in
|
||||
PEM format. This option B<MUST> come before any B<-cert> options.
|
||||
|
||||
=item B<-cert> I<filename>
|
||||
|
||||
Add the certificate B<filename> to the request. The issuer certificate
|
||||
is taken from the previous B<issuer> option, or an error occurs if no
|
||||
Add the certificate I<filename> to the request. The issuer certificate
|
||||
is taken from the previous B<-issuer> option, or an error occurs if no
|
||||
issuer certificate is specified.
|
||||
|
||||
=item B<-serial> I<num>
|
||||
|
||||
Same as the B<cert> option except the certificate with serial number
|
||||
Same as the B<-cert> option except the certificate with serial number
|
||||
B<num> is added to the request. The serial number is interpreted as a
|
||||
decimal integer unless preceded by B<0x>. Negative integers can also
|
||||
be specified by preceding the value by a B<-> sign.
|
||||
|
||||
=item B<-signer> I<filename>, B<-signkey> I<filename>
|
||||
|
||||
Sign the OCSP request using the certificate specified in the B<signer>
|
||||
option and the private key specified by the B<signkey> option. If
|
||||
the B<signkey> option is not present then the private key is read
|
||||
Sign the OCSP request using the certificate specified in the B<-signer>
|
||||
option and the private key specified by the B<-signkey> option. If
|
||||
the B<-signkey> option is not present then the private key is read
|
||||
from the same file as the certificate. If neither option is specified then
|
||||
the OCSP request is not signed.
|
||||
|
||||
|
|
@ -152,10 +152,10 @@ Additional certificates to include in the signed request.
|
|||
=item B<-nonce>, B<-no_nonce>
|
||||
|
||||
Add an OCSP nonce extension to a request or disable OCSP nonce addition.
|
||||
Normally if an OCSP request is input using the B<reqin> option no
|
||||
nonce is added: using the B<nonce> option will force addition of a nonce.
|
||||
If an OCSP request is being created (using B<cert> and B<serial> options)
|
||||
a nonce is automatically added specifying B<no_nonce> overrides this.
|
||||
Normally if an OCSP request is input using the B<-reqin> option no
|
||||
nonce is added: using the B<-nonce> option will force addition of a nonce.
|
||||
If an OCSP request is being created (using B<-cert> and B<-serial> options)
|
||||
a nonce is automatically added specifying B<-no_nonce> overrides this.
|
||||
|
||||
=item B<-req_text>, B<-resp_text>, B<-text>
|
||||
|
||||
|
|
@ -163,28 +163,28 @@ Print out the text form of the OCSP request, response or both respectively.
|
|||
|
||||
=item B<-reqout> I<file>, B<-respout> I<file>
|
||||
|
||||
Write out the DER encoded certificate request or response to B<file>.
|
||||
Write out the DER encoded certificate request or response to I<file>.
|
||||
|
||||
=item B<-reqin> I<file>, B<-respin> I<file>
|
||||
|
||||
Read OCSP request or response file from B<file>. These option are ignored
|
||||
Read OCSP request or response file from I<file>. These option are ignored
|
||||
if OCSP request or response creation is implied by other options (for example
|
||||
with B<serial>, B<cert> and B<host> options).
|
||||
with B<-serial>, B<-cert> and B<-host> options).
|
||||
|
||||
=item B<-url> I<responder_url>
|
||||
|
||||
Specify the responder URL. Both HTTP and HTTPS (SSL/TLS) URLs can be specified.
|
||||
|
||||
=item B<-host> I<hostname:port>, B<-path> I<pathname>
|
||||
=item B<-host> I<hostname>:I<port>, B<-path> I<pathname>
|
||||
|
||||
If the B<host> option is present then the OCSP request is sent to the host
|
||||
B<hostname> on port B<port>. B<path> specifies the HTTP pathname to use
|
||||
or "/" by default. This is equivalent to specifying B<-url> with scheme
|
||||
If the B<-host> option is present then the OCSP request is sent to the host
|
||||
I<hostname> on port I<port>. The B<-path> option specifies the HTTP pathname
|
||||
to use or "/" by default. This is equivalent to specifying B<-url> with scheme
|
||||
http:// and the given hostname, port, and pathname.
|
||||
|
||||
=item B<-header> I<name=value>
|
||||
=item B<-header> I<name>=I<value>
|
||||
|
||||
Adds the header B<name> with the specified B<value> to the OCSP request
|
||||
Adds the header I<name> with the specified I<value> to the OCSP request
|
||||
that is sent to the responder.
|
||||
This may be repeated.
|
||||
|
||||
|
|
@ -303,7 +303,7 @@ seconds, the default value is 5 minutes.
|
|||
|
||||
If the B<notAfter> time is omitted from a response then this means that new
|
||||
status information is immediately available. In this case the age of the
|
||||
B<notBefore> field is checked to see it is not older than B<age> seconds old.
|
||||
B<notBefore> field is checked to see it is not older than I<age> seconds old.
|
||||
By default this additional check is not performed.
|
||||
|
||||
=item B<-rcid> I<digest>
|
||||
|
|
@ -327,21 +327,22 @@ digest used by subsequent certificate identifiers.
|
|||
|
||||
=item B<-index> I<indexfile>
|
||||
|
||||
The B<indexfile> parameter is the name of a text index file in B<ca>
|
||||
The I<indexfile> parameter is the name of a text index file in B<ca>
|
||||
format containing certificate revocation information.
|
||||
|
||||
If the B<index> option is specified the B<ocsp> utility is in responder
|
||||
If the B<-index> option is specified the B<ocsp> utility is in responder
|
||||
mode, otherwise it is in client mode. The request(s) the responder
|
||||
processes can be either specified on the command line (using B<issuer>
|
||||
and B<serial> options), supplied in a file (using the B<reqin> option)
|
||||
or via external OCSP clients (if B<port> or B<url> is specified).
|
||||
processes can be either specified on the command line (using B<-issuer>
|
||||
and B<-serial> options), supplied in a file (using the B<-reqin> option)
|
||||
or via external OCSP clients (if B<-port> or B<-url> is specified).
|
||||
|
||||
If the B<index> option is present then the B<CA> and B<rsigner> options
|
||||
If the B<-index> option is present then the B<-CA> and B<-rsigner> options
|
||||
must also be present.
|
||||
|
||||
=item B<-CA> I<file>
|
||||
|
||||
CA certificate corresponding to the revocation information in B<indexfile>.
|
||||
CA certificate corresponding to the revocation information in the index
|
||||
file given with B<-index>.
|
||||
|
||||
=item B<-rsigner> I<file>
|
||||
|
||||
|
|
@ -363,7 +364,7 @@ subject name.
|
|||
=item B<-rkey> I<file>
|
||||
|
||||
The private key to sign OCSP responses with: if not present the file
|
||||
specified in the B<rsigner> option is used.
|
||||
specified in the B<-rsigner> option is used.
|
||||
|
||||
=item B<-rsigopt> I<nm>:I<v>
|
||||
|
||||
|
|
@ -383,7 +384,7 @@ running instead of terminating upon receiving a malformed request.
|
|||
|
||||
=item B<-nrequest> I<number>
|
||||
|
||||
The OCSP server will exit after receiving B<number> requests, default unlimited.
|
||||
The OCSP server will exit after receiving I<number> requests, default unlimited.
|
||||
|
||||
=item B<-nmin> I<minutes>, B<-ndays> I<days>
|
||||
|
||||
|
|
@ -403,8 +404,8 @@ the OCSP request checked using the responder certificate's public key.
|
|||
|
||||
Then a normal certificate verify is performed on the OCSP responder certificate
|
||||
building up a certificate chain in the process. The locations of the trusted
|
||||
certificates used to build the chain can be specified by the B<CAfile>
|
||||
and B<CApath> options or they will be looked for in the standard OpenSSL
|
||||
certificates used to build the chain can be specified by the B<-CAfile>
|
||||
and B<-CApath> options or they will be looked for in the standard OpenSSL
|
||||
certificates directory.
|
||||
|
||||
If the initial verify fails then the OCSP verify process halts with an
|
||||
|
|
@ -452,7 +453,7 @@ format of revocation is also inefficient for large quantities of revocation
|
|||
data.
|
||||
|
||||
It is possible to run the B<ocsp> application in responder mode via a CGI
|
||||
script using the B<reqin> and B<respout> options.
|
||||
script using the B<-reqin> and B<-respout> options.
|
||||
|
||||
=head1 EXAMPLES
|
||||
|
||||
|
|
|
|||
|
|
@ -32,8 +32,9 @@ The B<passwd> command computes the hash of a password typed at
|
|||
run-time or the hash of each password in a list. The password list is
|
||||
taken from the named file for option B<-in>, from stdin for
|
||||
option B<-stdin>, or from the command line, or from the terminal otherwise.
|
||||
The Unix standard algorithm B<crypt> and the MD5-based BSD password
|
||||
algorithm B<1>, its Apache variant B<apr1>, and its AIX variant are available.
|
||||
The Unix standard algorithm B<-crypt> and the MD5-based BSD password
|
||||
algorithm B<-1>, its Apache variant B<-apr1>, and its AIX variant are
|
||||
available.
|
||||
|
||||
=head1 OPTIONS
|
||||
|
||||
|
|
|
|||
|
|
@ -79,13 +79,13 @@ default. They are all written in PEM format.
|
|||
=item B<-passin> I<arg>
|
||||
|
||||
The PKCS#12 file (i.e. input file) password source. For more information about
|
||||
the format of B<arg>
|
||||
the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
Pass phrase source to encrypt any outputted private keys with. For more
|
||||
information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
|
||||
information about the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section
|
||||
in L<openssl(1)>.
|
||||
|
||||
=item B<-password> I<arg>
|
||||
|
|
@ -207,13 +207,13 @@ displays them.
|
|||
=item B<-pass> I<arg>, B<-passout> I<arg>
|
||||
|
||||
The PKCS#12 file (i.e. output file) password source. For more information about
|
||||
the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
||||
the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
||||
L<openssl(1)>.
|
||||
|
||||
=item B<-passin> I<password>
|
||||
|
||||
Pass phrase source to decrypt any input private keys with. For more information
|
||||
about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
||||
about the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
||||
L<openssl(1)>.
|
||||
|
||||
=item B<-chain>
|
||||
|
|
@ -312,7 +312,7 @@ Do not load the trusted CA certificates from the default directory location.
|
|||
|
||||
=item B<-CSP> I<name>
|
||||
|
||||
Write B<name> as a Microsoft CSP name.
|
||||
Write I<name> as a Microsoft CSP name.
|
||||
|
||||
=back
|
||||
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ prompted for.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -87,7 +87,7 @@ filename.
|
|||
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-iter> I<count>
|
||||
|
|
@ -121,7 +121,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
This option sets the PKCS#5 v2.0 algorithm.
|
||||
|
||||
The B<alg> argument is the encryption algorithm to use, valid values include
|
||||
The I<alg> argument is the encryption algorithm to use, valid values include
|
||||
B<aes128>, B<aes256> and B<des3>. If this option isn't specified then B<aes256>
|
||||
is used.
|
||||
|
||||
|
|
@ -142,7 +142,7 @@ If not specified PKCS#5 v2.0 form is used.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<pkcs8>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<pkcs8>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -156,7 +156,7 @@ B<-scrypt_p> and B<-v2> options.
|
|||
|
||||
=item B<-scrypt_N> I<N>, B<-scrypt_r> I<r>, B<-scrypt_p> I<p>
|
||||
|
||||
Sets the scrypt B<N>, B<r> or B<p> parameters.
|
||||
Sets the scrypt I<N>, I<r> or I<p> parameters.
|
||||
|
||||
=back
|
||||
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ prompted for.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -67,9 +67,9 @@ option is not specified. If any encryption options are set then a pass phrase
|
|||
will be prompted for. The output filename should B<not> be the same as the input
|
||||
filename.
|
||||
|
||||
=item B<-passout> I<password>
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-traditional>
|
||||
|
|
@ -109,7 +109,7 @@ the input is a public key.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<pkey>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<pkey>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -50,7 +50,7 @@ Do not output the encoded version of the parameters.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<pkeyparam>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<pkeyparam>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -29,8 +29,8 @@ B<openssl> B<pkeyutl>
|
|||
[B<-derive>]
|
||||
[B<-kdf> I<algorithm>]
|
||||
[B<-kdflen> I<length>]
|
||||
[B<-pkeyopt> I<opt:value>]
|
||||
[B<-pkeyopt_passin> I<opt:passarg>]
|
||||
[B<-pkeyopt> I<opt>:I<value>]
|
||||
[B<-pkeyopt_passin> I<opt>[:I<passarg>]]
|
||||
[B<-hexdump>]
|
||||
[B<-asn1parse>]
|
||||
[B<-rand> I<files>]
|
||||
|
|
@ -82,7 +82,7 @@ default.
|
|||
|
||||
=item B<-sigfile> I<file>
|
||||
|
||||
Signature file, required for B<verify> operations only
|
||||
Signature file, required for B<-verify> operations only
|
||||
|
||||
=item B<-inkey> I<file>
|
||||
|
||||
|
|
@ -94,7 +94,7 @@ The key format PEM, DER or ENGINE. Default is PEM.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input key password source. For more information about the format of B<arg>
|
||||
The input key password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-peerkey> I<file>
|
||||
|
|
@ -103,7 +103,7 @@ The peer key file, used by key derivation (agreement) operations.
|
|||
|
||||
=item B<-peerform> B<DER>|B<PEM>|B<ENGINE>
|
||||
|
||||
The peer key format PEM, DER or ENGINE. Default is PEM.
|
||||
The peer key format B<PEM>, B<DER> or B<ENGINE>. Default is B<PEM>.
|
||||
|
||||
=item B<-pubin>
|
||||
|
||||
|
|
@ -146,7 +146,7 @@ Derive a shared secret using the peer key.
|
|||
|
||||
=item B<-kdf> I<algorithm>
|
||||
|
||||
Use key derivation function B<algorithm>. The supported algorithms are
|
||||
Use key derivation function I<algorithm>. The supported algorithms are
|
||||
at present B<TLS1-PRF> and B<HKDF>.
|
||||
Note: additional parameters and the KDF output length will normally have to be
|
||||
set for this to work.
|
||||
|
|
@ -157,16 +157,16 @@ for the supported string parameters of each algorithm.
|
|||
|
||||
Set the output length for KDF.
|
||||
|
||||
=item B<-pkeyopt> I<opt:value>
|
||||
=item B<-pkeyopt> I<opt>:I<value>
|
||||
|
||||
Public key options specified as opt:value. See NOTES below for more details.
|
||||
|
||||
=item B<-pkeyopt_passin> I<opt:passarg>
|
||||
=item B<-pkeyopt_passin> I<opt>[:I<passarg>]
|
||||
|
||||
Allows reading a public key option B<opt> from stdin or a password source. If
|
||||
only opt is specified, the user will be prompted to enter the value on stdin.
|
||||
Alternatively, passarg can be specified which can be any value supported by
|
||||
B<PASS PHRASE ARGUMENTS> in L<openssl(1)>.
|
||||
Allows reading a public key option I<opt> from stdin or a password source.
|
||||
If only I<opt> is specified, the user will be prompted to enter a password on
|
||||
stdin. Alternatively, I<passarg> can be specified which can be any value
|
||||
supported by B<PASS PHRASE ARGUMENTS> in L<openssl(1)>.
|
||||
|
||||
=item B<-hexdump>
|
||||
|
||||
|
|
@ -191,7 +191,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<pkeyutl>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<pkeyutl>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -199,7 +199,7 @@ for all available algorithms.
|
|||
=item B<-engine_impl>
|
||||
|
||||
When used with the B<-engine> option, it specifies to also use
|
||||
engine B<id> for crypto operations.
|
||||
engine I<id> for crypto operations.
|
||||
|
||||
=back
|
||||
|
||||
|
|
@ -208,9 +208,9 @@ engine B<id> for crypto operations.
|
|||
The operations and options supported vary according to the key algorithm
|
||||
and its implementation. The OpenSSL operations and options are indicated below.
|
||||
|
||||
Unless otherwise mentioned all algorithms support the B<digest:alg> option
|
||||
Unless otherwise mentioned all algorithms support the B<digest:>I<alg> option
|
||||
which specifies the digest in use for sign, verify and verifyrecover operations.
|
||||
The value B<alg> should represent a digest name as used in the
|
||||
The value I<alg> should represent a digest name as used in the
|
||||
EVP_get_digestbyname() function for example B<sha1>. This value is not used to
|
||||
hash the input data. It is used (by some algorithms) for sanity-checking the
|
||||
lengths of data passed in to the B<pkeyutl> and for creating the structures that
|
||||
|
|
@ -237,9 +237,9 @@ B<pkeyopt> values are supported:
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<rsa_padding_mode:mode>
|
||||
=item B<rsa_padding_mode:>I<mode>
|
||||
|
||||
This sets the RSA padding mode. Acceptable values for B<mode> are B<pkcs1> for
|
||||
This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for
|
||||
PKCS#1 padding, B<sslv23> for SSLv23 padding, B<none> for no padding, B<oaep>
|
||||
for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS.
|
||||
|
||||
|
|
@ -257,15 +257,15 @@ verify and verifyrecover are can be performed in this mode.
|
|||
For B<pss> mode only sign and verify are supported and the digest type must be
|
||||
specified.
|
||||
|
||||
=item B<rsa_pss_saltlen:len>
|
||||
=item B<rsa_pss_saltlen:>I<len>
|
||||
|
||||
For B<pss> mode only this option specifies the salt length. Three special
|
||||
values are supported: "digest" sets the salt length to the digest length,
|
||||
"max" sets the salt length to the maximum permissible value. When verifying
|
||||
"auto" causes the salt length to be automatically determined based on the
|
||||
values are supported: B<digest> sets the salt length to the digest length,
|
||||
B<max> sets the salt length to the maximum permissible value. When verifying
|
||||
B<auto> causes the salt length to be automatically determined based on the
|
||||
B<PSS> block structure.
|
||||
|
||||
=item B<rsa_mgf1_md:digest>
|
||||
=item B<rsa_mgf1_md:>I<digest>
|
||||
|
||||
For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not
|
||||
explicitly set in PSS mode then the signing digest is used.
|
||||
|
|
@ -276,11 +276,12 @@ explicitly set in PSS mode then the signing digest is used.
|
|||
|
||||
The RSA-PSS algorithm is a restricted version of the RSA algorithm which only
|
||||
supports the sign and verify operations with PSS padding. The following
|
||||
additional B<pkeyopt> values are supported:
|
||||
additional B<-pkeyopt> values are supported:
|
||||
|
||||
=over 4
|
||||
|
||||
=item B<rsa_padding_mode:mode>, B<rsa_pss_saltlen:len>, B<rsa_mgf1_md:digest>
|
||||
=item B<rsa_padding_mode:>I<mode>, B<rsa_pss_saltlen:>I<len>,
|
||||
B<rsa_mgf1_md:>I<digest>
|
||||
|
||||
These have the same meaning as the B<RSA> algorithm with some additional
|
||||
restrictions. The padding mode can only be set to B<pss> which is the
|
||||
|
|
@ -319,8 +320,8 @@ no additional options.
|
|||
|
||||
These algorithms only support signing and verifying. OpenSSL only implements the
|
||||
"pure" variants of these algorithms so raw data can be passed directly to them
|
||||
without hashing them first. The option "-rawin" must be used with these
|
||||
algorithms with no "-digest" specified. Additionally OpenSSL only supports
|
||||
without hashing them first. The option B<-rawin> must be used with these
|
||||
algorithms with no B<-digest> specified. Additionally OpenSSL only supports
|
||||
"oneshot" operation with these algorithms. This means that the entire file to
|
||||
be signed/verified must be read into memory before processing it. Signing or
|
||||
Verifying very large files should be avoided. Additionally the size of the file
|
||||
|
|
@ -331,17 +332,17 @@ must be known for this to work. If the size of the file cannot be determined
|
|||
|
||||
The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For
|
||||
the sign and verify operations, SM2 requires an ID string to be passed in. The
|
||||
following B<pkeyopt> value is supported:
|
||||
following B<-pkeyopt> value is supported:
|
||||
|
||||
=over 4
|
||||
|
||||
=item B<sm2_id:string>
|
||||
=item B<sm2_id:>I<string>
|
||||
|
||||
This sets the ID string used in SM2 sign or verify operations. While verifying
|
||||
an SM2 signature, the ID string must be the same one used when signing the data.
|
||||
Otherwise the verification will fail.
|
||||
|
||||
=item B<sm2_hex_id:hex_string>
|
||||
=item B<sm2_hex_id:>I<hex_string>
|
||||
|
||||
This sets the ID string used in SM2 sign or verify operations. While verifying
|
||||
an SM2 signature, the ID string must be the same one used when signing the data.
|
||||
|
|
|
|||
|
|
@ -41,16 +41,16 @@ Generate a prime number.
|
|||
|
||||
=item B<-bits> I<num>
|
||||
|
||||
Generate a prime with B<num> bits.
|
||||
Generate a prime with I<num> bits.
|
||||
|
||||
=item B<-safe>
|
||||
|
||||
When used with B<-generate>, generates a "safe" prime. If the number
|
||||
generated is B<n>, then check that B<(n-1)/2> is also prime.
|
||||
generated is I<n>, then check that C<(I<n>-1)/2> is also prime.
|
||||
|
||||
=item B<-checks> I<num>
|
||||
|
||||
Perform the checks B<num> times to see that the generated number
|
||||
Perform the checks I<num> times to see that the generated number
|
||||
is prime. The default is 20.
|
||||
|
||||
=back
|
||||
|
|
|
|||
|
|
@ -45,17 +45,17 @@ but often B</usr/local/ssl/certs>) is processed.
|
|||
In order for a directory to be processed, the user must have write
|
||||
permissions on that directory, otherwise an error will be generated.
|
||||
|
||||
The links created are of the form C<HHHHHHHH.D>, where each B<H>
|
||||
is a hexadecimal character and B<D> is a single decimal digit.
|
||||
The links created are of the form I<HHHHHHHH.D>, where each I<H>
|
||||
is a hexadecimal character and I<D> is a single decimal digit.
|
||||
When processing a directory, B<rehash> will first remove all links
|
||||
that have a name in that syntax, even if they are being used for some
|
||||
other purpose.
|
||||
To skip the removal step, use the B<-n> flag.
|
||||
Hashes for CRL's look similar except the letter B<r> appears after
|
||||
the period, like this: C<HHHHHHHH.rD>.
|
||||
the period, like this: I<HHHHHHHH.>B<r>I<D>.
|
||||
|
||||
Multiple objects may have the same hash; they will be indicated by
|
||||
incrementing the B<D> value. Duplicates are found by comparing the
|
||||
incrementing the I<D> value. Duplicates are found by comparing the
|
||||
full SHA-1 fingerprint. A warning will be displayed if a duplicate
|
||||
is found.
|
||||
|
||||
|
|
@ -75,7 +75,7 @@ a certificate or CRL:
|
|||
$OPENSSL x509 -hash -fingerprint -noout -in FILENAME
|
||||
$OPENSSL crl -hash -fingerprint -noout -in FILENAME
|
||||
|
||||
where B<FILENAME> is the filename. It must output the hash of the
|
||||
where I<FILENAME> is the filename. It must output the hash of the
|
||||
file on the first line, and the fingerprint on the second,
|
||||
optionally prefixed with some text and an equals sign.
|
||||
|
||||
|
|
|
|||
|
|
@ -22,8 +22,7 @@ B<openssl> B<req>
|
|||
[B<-new>]
|
||||
[B<-rand> I<files>]
|
||||
[B<-writerand> I<file>]
|
||||
[B<-newkey> I<rsa:bits>]
|
||||
[B<-newkey> I<alg:file>]
|
||||
[B<-newkey> I<arg>]
|
||||
[B<-nodes>]
|
||||
[B<-key> I<filename>]
|
||||
[B<-keyform> B<DER>|B<PEM>]
|
||||
|
|
@ -103,7 +102,7 @@ default.
|
|||
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-text>
|
||||
|
|
@ -157,32 +156,33 @@ This can be used with a subsequent B<-rand> flag.
|
|||
=item B<-newkey> I<arg>
|
||||
|
||||
This option creates a new certificate request and a new private
|
||||
key. The argument takes one of several forms. B<rsa:nbits>, where
|
||||
B<nbits> is the number of bits, generates an RSA key B<nbits>
|
||||
in size. If B<nbits> is omitted, i.e. B<-newkey> I<rsa> specified,
|
||||
key. The argument takes one of several forms.
|
||||
|
||||
B<rsa:>I<nbits>, where
|
||||
I<nbits> is the number of bits, generates an RSA key I<nbits>
|
||||
in size. If I<nbits> is omitted, i.e. B<-newkey> I<rsa> specified,
|
||||
the default key size, specified in the configuration file is used.
|
||||
|
||||
All other algorithms support the B<-newkey> I<alg:file> form, where file may be
|
||||
an algorithm parameter file, created by the B<genpkey -genparam> command
|
||||
or and X.509 certificate for a key with appropriate algorithm.
|
||||
All other algorithms support the B<-newkey> I<alg>:I<file> form, where file
|
||||
may be an algorithm parameter file, created with B<genpkey -genparam>
|
||||
or an X.509 certificate for a key with appropriate algorithm.
|
||||
|
||||
B<param:file> generates a key using the parameter file or certificate B<file>,
|
||||
the algorithm is determined by the parameters. B<algname:file> use algorithm
|
||||
B<algname> and parameter file B<file>: the two algorithms must match or an
|
||||
error occurs. B<algname> just uses algorithm B<algname>, and parameters,
|
||||
if necessary should be specified via B<-pkeyopt> parameter.
|
||||
B<param:>I<file> generates a key using the parameter file or certificate
|
||||
I<file>, the algorithm is determined by the parameters. I<algname>:I<file>
|
||||
use algorithm I<algname> and parameter file I<file>: the two algorithms must
|
||||
match or an error occurs. I<algname> just uses algorithm I<algname>, and
|
||||
parameters, if necessary should be specified via B<-pkeyopt> parameter.
|
||||
|
||||
B<dsa:filename> generates a DSA key using the parameters
|
||||
in the file B<filename>. B<ec:filename> generates EC key (usable both with
|
||||
ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R
|
||||
34.10-2001 key (requires B<ccgost> engine configured in the configuration
|
||||
B<dsa:>I<filename> generates a DSA key using the parameters
|
||||
in the file I<filename>. B<ec:>I<filename> generates EC key (usable both with
|
||||
ECDSA or ECDH algorithms), B<gost2001:>I<filename> generates GOST R
|
||||
34.10-2001 key (requires B<gost> engine configured in the configuration
|
||||
file). If just B<gost2001> is specified a parameter set should be
|
||||
specified by B<-pkeyopt> I<paramset:X>
|
||||
|
||||
=item B<-pkeyopt> I<opt>:I<value>
|
||||
|
||||
=item B<-pkeyopt> I<opt:value>
|
||||
|
||||
Set the public key algorithm option B<opt> to B<value>. The precise set of
|
||||
Set the public key algorithm option I<opt> to I<value>. The precise set of
|
||||
options supported depends on the public key algorithm used and its
|
||||
implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page
|
||||
for more details.
|
||||
|
|
@ -249,7 +249,7 @@ This option outputs a self signed certificate instead of a certificate
|
|||
request. This is typically used to generate a test certificate or
|
||||
a self signed root CA. The extensions added to the certificate
|
||||
(if any) are specified in the configuration file. Unless specified
|
||||
using the B<set_serial> option, a large random number will be used for
|
||||
using the B<-set_serial> option, a large random number will be used for
|
||||
the serial number.
|
||||
|
||||
If existing request is specified with the B<-in> option, it is converted
|
||||
|
|
@ -258,7 +258,7 @@ to the self signed certificate otherwise new request is created.
|
|||
=item B<-days> I<n>
|
||||
|
||||
When the B<-x509> option is being used this specifies the number of
|
||||
days to certify the certificate for, otherwise it is ignored. B<n> should
|
||||
days to certify the certificate for, otherwise it is ignored. I<n> should
|
||||
be a positive integer. The default is 30 days.
|
||||
|
||||
=item B<-set_serial> I<n>
|
||||
|
|
@ -304,13 +304,13 @@ configuration file, must be valid UTF8 strings.
|
|||
=item B<-nameopt> I<option>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<option> argument can be a single option or multiple options separated by
|
||||
I<option> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the L<x509(1)> manual page for details.
|
||||
|
||||
=item B<-reqopt>
|
||||
=item B<-reqopt> I<option>
|
||||
|
||||
Customise the output format used with B<-text>. The B<option> argument can be
|
||||
Customise the output format used with B<-text>. The I<option> argument can be
|
||||
a single option or multiple options separated by commas.
|
||||
|
||||
See discussion of the B<-certopt> parameter in the L<x509(1)>
|
||||
|
|
@ -331,14 +331,14 @@ Print extra details about the operations being performed.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<req>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<req>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
||||
=item B<-keygen_engine> I<id>
|
||||
|
||||
Specifies an engine (by its unique B<id> string) which would be used
|
||||
Specifies an engine (by its unique I<id> string) which would be used
|
||||
for key generation operations.
|
||||
|
||||
=item B<-sm2-id>
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ prompted for.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-out> I<filename>
|
||||
|
|
@ -85,9 +85,9 @@ option is not specified. If any encryption options are set then a pass phrase
|
|||
will be prompted for. The output filename should B<not> be the same as the input
|
||||
filename.
|
||||
|
||||
=item B<-passout> I<password>
|
||||
=item B<-passout> I<arg>
|
||||
|
||||
The output file password source. For more information about the format of B<arg>
|
||||
The output file password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea>
|
||||
|
|
@ -134,7 +134,7 @@ Like B<-pubin> and B<-pubout> except B<RSAPublicKey> format is used instead.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<rsa>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<rsa>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -283,7 +283,7 @@ Extra certificate and private key format respectively.
|
|||
|
||||
=item B<-pass> I<arg>
|
||||
|
||||
the private key password source. For more information about the format of B<arg>
|
||||
the private key password source. For more information about the format of I<arg>
|
||||
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
||||
|
||||
=item B<-verify> I<depth>
|
||||
|
|
@ -302,7 +302,7 @@ abort the handshake with a fatal error.
|
|||
=item B<-nameopt> I<option>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<option> argument can be a single option or multiple options separated by
|
||||
I<option> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the L<x509(1)> manual page for details.
|
||||
|
||||
|
|
@ -360,7 +360,7 @@ at a positive depth or else "matched EE certificate" at depth 0.
|
|||
=item B<-dane_tlsa_rrdata> I<rrdata>
|
||||
|
||||
Use one or more times to specify the RRDATA fields of the DANE TLSA
|
||||
RRset associated with the target service. The B<rrdata> value is
|
||||
RRset associated with the target service. The I<rrdata> value is
|
||||
specied in "presentation form", that is four whitespace separated
|
||||
fields that specify the usage, selector, matching type and associated
|
||||
data, with the last of these encoded in hexadecimal. Optional
|
||||
|
|
@ -481,19 +481,19 @@ Can be used to override the implicit B<-ign_eof> after B<-quiet>.
|
|||
|
||||
=item B<-psk_identity> I<identity>
|
||||
|
||||
Use the PSK identity B<identity> when using a PSK cipher suite.
|
||||
Use the PSK identity I<identity> when using a PSK cipher suite.
|
||||
The default value is "Client_identity" (without the quotes).
|
||||
|
||||
=item B<-psk> I<key>
|
||||
|
||||
Use the PSK key B<key> when using a PSK cipher suite. The key is
|
||||
Use the PSK key I<key> when using a PSK cipher suite. The key is
|
||||
given as a hexadecimal number without leading 0x, for example -psk
|
||||
1a2b3c4d.
|
||||
This option must be provided in order to use a PSK cipher.
|
||||
|
||||
=item B<-psk_session> I<file>
|
||||
|
||||
Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK.
|
||||
Use the pem encoded SSL_SESSION data stored in I<file> as the basis of a PSK.
|
||||
Note that this will only work if TLSv1.3 is negotiated.
|
||||
|
||||
=item B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-tls1_3>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3>
|
||||
|
|
@ -622,7 +622,7 @@ colon (":") separated list of TLSv1.3 ciphersuite names.
|
|||
=item B<-starttls> I<protocol>
|
||||
|
||||
Send the protocol-specific message(s) to switch to TLS for communication.
|
||||
B<protocol> is a keyword for the intended protocol. Currently, the only
|
||||
I<protocol> is a keyword for the intended protocol. Currently, the only
|
||||
supported keywords are "smtp", "pop3", "imap", "ftp", "xmpp", "xmpp-server",
|
||||
"irc", "postgres", "mysql", "lmtp", "nntp", "sieve" and "ldap".
|
||||
|
||||
|
|
@ -659,16 +659,16 @@ Disable RFC4507bis session ticket support.
|
|||
|
||||
=item B<-sess_out> I<filename>
|
||||
|
||||
Output SSL session to B<filename>.
|
||||
Output SSL session to I<filename>.
|
||||
|
||||
=item B<-sess_in> I<sess.pem>
|
||||
=item B<-sess_in> I<filename>
|
||||
|
||||
Load SSL session from B<filename>. The client will attempt to resume a
|
||||
Load SSL session from I<filename>. The client will attempt to resume a
|
||||
connection from this session.
|
||||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<s_client>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<s_client>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -702,7 +702,7 @@ response (if any) is printed out.
|
|||
These flags enable the Enable the Application-Layer Protocol Negotiation
|
||||
or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
|
||||
IETF standard and replaces NPN.
|
||||
The B<protocols> list is a comma-separated list of protocol names that
|
||||
The I<protocols> list is a comma-separated list of protocol names that
|
||||
the client should advertise support for. The list should contain the most
|
||||
desirable protocols first. Protocol names are printable ASCII strings,
|
||||
for example "http/1.1" or "spdy/3".
|
||||
|
|
|
|||
|
|
@ -274,7 +274,7 @@ provided to the client.
|
|||
=item B<-nameopt> I<val>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<val> argument can be a single option or multiple options separated by
|
||||
I<val> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the L<x509(1)> manual page for details.
|
||||
|
||||
|
|
@ -441,7 +441,7 @@ used in conjunction with B<-early_data>.
|
|||
|
||||
=item B<-id_prefix> I<val>
|
||||
|
||||
Generate SSL/TLS session IDs prefixed by B<val>. This is mostly useful
|
||||
Generate SSL/TLS session IDs prefixed by I<val>. This is mostly useful
|
||||
for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple
|
||||
servers, when each of which might be generating a unique range of session
|
||||
IDs (eg. with a certain prefix).
|
||||
|
|
@ -475,7 +475,7 @@ a verbose printout of the OCSP response.
|
|||
|
||||
=item B<-status_timeout> I<int>
|
||||
|
||||
Sets the timeout for OCSP response to B<int> seconds.
|
||||
Sets the timeout for OCSP response to I<int> seconds.
|
||||
|
||||
=item B<-status_url> I<val>
|
||||
|
||||
|
|
@ -652,24 +652,24 @@ Turns on non blocking I/O.
|
|||
|
||||
=item B<-psk_identity> I<val>
|
||||
|
||||
Expect the client to send PSK identity B<val> when using a PSK
|
||||
Expect the client to send PSK identity I<val> when using a PSK
|
||||
cipher suite, and warn if they do not. By default, the expected PSK
|
||||
identity is the string "Client_identity".
|
||||
|
||||
=item B<-psk_hint> I<val>
|
||||
|
||||
Use the PSK identity hint B<val> when using a PSK cipher suite.
|
||||
Use the PSK identity hint I<val> when using a PSK cipher suite.
|
||||
|
||||
=item B<-psk> I<val>
|
||||
|
||||
Use the PSK key B<val> when using a PSK cipher suite. The key is
|
||||
Use the PSK key I<val> when using a PSK cipher suite. The key is
|
||||
given as a hexadecimal number without leading 0x, for example -psk
|
||||
1a2b3c4d.
|
||||
This option must be provided in order to use a PSK cipher.
|
||||
|
||||
=item B<-psk_session> I<file>
|
||||
|
||||
Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK.
|
||||
Use the pem encoded SSL_SESSION data stored in I<file> as the basis of a PSK.
|
||||
Note that this will only work if TLSv1.3 is negotiated.
|
||||
|
||||
=item B<-listen>
|
||||
|
|
@ -713,7 +713,7 @@ disabling the ephemeral DH cipher suites.
|
|||
These flags enable the Enable the Application-Layer Protocol Negotiation
|
||||
or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
|
||||
IETF standard and replaces NPN.
|
||||
The B<val> list is a comma-separated list of supported protocol
|
||||
The I<val> list is a comma-separated list of supported protocol
|
||||
names. The list should contain the most desirable protocols first.
|
||||
Protocol names are printable ASCII strings, for example "http/1.1" or
|
||||
"spdy/3".
|
||||
|
|
@ -721,7 +721,7 @@ The flag B<-nextprotoneg> cannot be specified if B<-tls1_3> is used.
|
|||
|
||||
=item B<-engine> I<val>
|
||||
|
||||
Specifying an engine (by its unique id string in B<val>) will cause B<s_server>
|
||||
Specifying an engine (by its unique id string in I<val>) will cause B<s_server>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -8,7 +8,7 @@ openssl-s_time - SSL/TLS performance timing program
|
|||
|
||||
B<openssl> B<s_time>
|
||||
[B<-help>]
|
||||
[B<-connect> I<host:port>]
|
||||
[B<-connect> I<host>:I<port>]
|
||||
[B<-www> I<page>]
|
||||
[B<-cert> I<filename>]
|
||||
[B<-key> I<filename>]
|
||||
|
|
@ -48,7 +48,7 @@ transferred (if any), and calculates the average time spent for one connection.
|
|||
|
||||
Print out a usage message.
|
||||
|
||||
=item B<-connect> I<host:port>
|
||||
=item B<-connect> I<host>:I<port>
|
||||
|
||||
This specifies the host and optional port to connect to.
|
||||
|
||||
|
|
@ -80,7 +80,7 @@ will never fail due to a server certificate verify failure.
|
|||
=item B<-nameopt> I<option>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<option> argument can be a single option or multiple options separated by
|
||||
I<option> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the L<x509(1)> manual page for details.
|
||||
|
||||
|
|
@ -161,7 +161,7 @@ To connect to an SSL HTTP server and get the default page the command
|
|||
|
||||
openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3]
|
||||
|
||||
would typically be used (https uses port 443). 'commoncipher' is a cipher to
|
||||
would typically be used (https uses port 443). I<commoncipher> is a cipher to
|
||||
which both client and server can agree, see the L<ciphers(1)> command
|
||||
for details.
|
||||
|
||||
|
|
|
|||
|
|
@ -9,7 +9,7 @@ openssl-sess_id - SSL/TLS session handling utility
|
|||
B<openssl> B<sess_id>
|
||||
[B<-help>]
|
||||
[B<-inform> B<DER>|B<PEM>]
|
||||
[B<-outform> B<DER>|B<PEM>|B<MSS>]
|
||||
[B<-outform> B<DER>|B<PEM>|B<NSS>]
|
||||
[B<-in> I<filename>]
|
||||
[B<-out> I<filename>]
|
||||
[B<-text>]
|
||||
|
|
@ -41,9 +41,9 @@ format base64 encoded with additional header and footer lines.
|
|||
|
||||
=item B<-outform> B<DER>|B<PEM>|B<NSS>
|
||||
|
||||
This specifies the output format. The B<PEM> and B<DER> options have the same meaning
|
||||
and default as the B<-inform> option. The B<NSS> option outputs the session id and
|
||||
the master key in NSS keylog format.
|
||||
This specifies the output format. The B<PEM> and B<DER> options have the same
|
||||
meaning and default as the B<-inform> option. The B<NSS> option outputs the
|
||||
session id and the master key in NSS keylog format.
|
||||
|
||||
=item B<-in> I<filename>
|
||||
|
||||
|
|
|
|||
|
|
@ -295,7 +295,7 @@ specified, the argument is given to the engine as a key identifier.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The private key password source. For more information about the format of B<arg>
|
||||
The private key password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-rand> I<files>
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ B<openssl speed>
|
|||
This command is used to test the performance of cryptographic algorithms.
|
||||
To see the list of supported algorithms, use the I<list --digest-commands>
|
||||
or I<list --cipher-commands> command. The global CSPRNG is denoted by
|
||||
the I<rand> algorithm name.
|
||||
the B<rand> algorithm name.
|
||||
|
||||
=head1 OPTIONS
|
||||
|
||||
|
|
@ -40,7 +40,7 @@ Print out a usage message.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<speed>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<speed>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -54,8 +54,8 @@ of hardware engines.
|
|||
=item B<-evp> I<algo>
|
||||
|
||||
Use the specified cipher or message digest algorithm via the EVP interface.
|
||||
If B<algo> is an AEAD cipher, then you can pass <-aead> to benchmark a
|
||||
TLS-like sequence. And if B<algo> is a multi-buffer capable cipher, e.g.
|
||||
If I<algo> is an AEAD cipher, then you can pass B<-aead> to benchmark a
|
||||
TLS-like sequence. And if I<algo> is a multi-buffer capable cipher, e.g.
|
||||
aes-128-cbc-hmac-sha1, then B<-mb> will time multi-buffer operation.
|
||||
|
||||
=item B<-hmac> I<digest>
|
||||
|
|
@ -84,16 +84,16 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-primes> I<num>
|
||||
|
||||
Generate a B<num>-prime RSA key and use it to run the benchmarks. This option
|
||||
Generate a I<num>-prime RSA key and use it to run the benchmarks. This option
|
||||
is only effective if RSA algorithm is specified to test.
|
||||
|
||||
=item B<-seconds> I<num>
|
||||
|
||||
Run benchmarks for B<num> seconds.
|
||||
Run benchmarks for I<num> seconds.
|
||||
|
||||
=item B<-bytes> I<num>
|
||||
|
||||
Run benchmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
|
||||
Run benchmarks on I<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
|
||||
|
||||
=item I<algorithm> ...
|
||||
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ default.
|
|||
|
||||
=item B<-key> I<keyfile>
|
||||
|
||||
Create an SPKAC file using the private key in B<keyfile>. The
|
||||
Create an SPKAC file using the private key in I<keyfile>. The
|
||||
B<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored if
|
||||
present.
|
||||
|
||||
|
|
@ -58,9 +58,9 @@ present.
|
|||
Whether the key format is PEM, DER, or an engine-backed key.
|
||||
The default is PEM.
|
||||
|
||||
=item B<-passin> I<password>
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The input file password source. For more information about the format of B<arg>
|
||||
The input file password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-challenge> I<string>
|
||||
|
|
@ -94,7 +94,7 @@ Verifies the digital signature on the supplied SPKAC.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<spkac>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<spkac>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ At most one of the B<-add>, B<-modify>, B<-delete>, and B<-list> options
|
|||
can be specified.
|
||||
These options take zero or more usernames as parameters and perform the
|
||||
appropriate operation on the SRP file.
|
||||
For B<-list>, if no B<user> is given then all users are displayed.
|
||||
For B<-list>, if no I<user> is given then all users are displayed.
|
||||
|
||||
The configuration file to use, and the section within the file, can be
|
||||
specified with the B<-config> and B<-name> flags, respectively.
|
||||
|
|
@ -42,7 +42,7 @@ just specify the file to operate on.
|
|||
The B<-userinfo> option specifies additional information to add when
|
||||
adding or modifying a user.
|
||||
|
||||
The B<-gn> flag specifies the B<g> and B<N> values, using one of
|
||||
The B<-gn> flag specifies the I<g> and I<N> values, using one of
|
||||
the strengths defined in IETF RFC 5054.
|
||||
|
||||
The B<-passin> and B<-passout> arguments are parsed as described in
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ this option prevents output of the PEM data.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
the key password source. For more information about the format of B<arg>
|
||||
the key password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-text>
|
||||
|
|
@ -59,7 +59,7 @@ B<openssl x509>, B<openssl pkey>, etc.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
specifying an engine (by its unique B<id> string) will cause B<storeutl>
|
||||
specifying an engine (by its unique I<id> string) will cause B<storeutl>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed.
|
||||
The engine will then be set as the default for all available algorithms.
|
||||
|
|
@ -80,7 +80,7 @@ returned.
|
|||
|
||||
=item B<-subject> I<arg>
|
||||
|
||||
Search for an object having the subject name B<arg>.
|
||||
Search for an object having the subject name I<arg>.
|
||||
The arg must be formatted as I</type0=value0/type1=value1/type2=...>.
|
||||
Keyword characters may be escaped by \ (backslash), and whitespace is retained.
|
||||
Empty values are permitted but are ignored for the search. That is,
|
||||
|
|
|
|||
|
|
@ -314,7 +314,7 @@ instead of DER. (Optional)
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<ts>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<ts>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms. Default is built-in. (Optional)
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@ B<openssl> B<verify>
|
|||
[B<-sm2-id> I<string>]
|
||||
[B<-sm2-hex-id> I<hex-string>]
|
||||
[B<-->]
|
||||
[certificates]
|
||||
[I<certificate> ...]
|
||||
|
||||
=for comment ifdef engine sm2-id sm2-hex-id
|
||||
|
||||
|
|
@ -70,14 +70,14 @@ Print out a usage message.
|
|||
|
||||
=item B<-CAfile> I<file>
|
||||
|
||||
A B<file> of trusted certificates.
|
||||
A I<file> of trusted certificates.
|
||||
The file should contain one or more certificates in PEM format.
|
||||
|
||||
=item B<-CApath> I<directory>
|
||||
|
||||
A directory of trusted certificates. The certificates should have names
|
||||
of the form: hash.0 or have symbolic links to them of this
|
||||
form ("hash" is the hashed certificate subject name: see the B<-hash> option
|
||||
of the form: F<I<hash>.0> or have symbolic links to them of this
|
||||
form (I<hash> is the hashed certificate subject name: see the B<-hash> option
|
||||
of the B<x509> utility). Under Unix the B<c_rehash> script will automatically
|
||||
create symbolic links to a directory of certificates.
|
||||
|
||||
|
|
@ -95,8 +95,8 @@ Allow the verification of proxy certificates.
|
|||
|
||||
=item B<-attime> I<timestamp>
|
||||
|
||||
Perform validation checks using time specified by B<timestamp> and not
|
||||
current system time. B<timestamp> is the number of seconds since
|
||||
Perform validation checks using time specified by I<timestamp> and not
|
||||
current system time. I<timestamp> is the number of seconds since
|
||||
01.01.1970 (UNIX time).
|
||||
|
||||
=item B<-check_ss_sig>
|
||||
|
|
@ -106,9 +106,9 @@ because it doesn't add any security.
|
|||
|
||||
=item B<-CRLfile> I<file>
|
||||
|
||||
The B<file> should contain one or more CRLs in PEM format.
|
||||
The I<file> should contain one or more CRLs in PEM format.
|
||||
This option can be specified more than once to include CRLs from multiple
|
||||
B<files>.
|
||||
I<file>s.
|
||||
|
||||
=item B<-crl_download>
|
||||
|
||||
|
|
@ -126,7 +126,7 @@ to look up valid CRLs.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine B<id> will cause L<verify(1)> to attempt to load the
|
||||
Specifying an engine I<id> will cause L<verify(1)> to attempt to load the
|
||||
specified engine.
|
||||
The engine will then be set as the default for all its supported algorithms.
|
||||
If you want to load certificates or CRLs that require engine support via any of
|
||||
|
|
@ -159,7 +159,7 @@ Set policy variable inhibit-policy-mapping (see RFC5280).
|
|||
=item B<-nameopt> I<option>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<option> argument can be a single option or multiple options separated by
|
||||
I<option> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the L<x509(1)> manual page for details.
|
||||
|
||||
|
|
@ -177,8 +177,8 @@ trusted certificate that might not be self-signed.
|
|||
|
||||
=item B<-policy> I<arg>
|
||||
|
||||
Enable policy processing and add B<arg> to the user-initial-policy-set (see
|
||||
RFC5280). The policy B<arg> can be an object name an OID in numeric form.
|
||||
Enable policy processing and add I<arg> to the user-initial-policy-set (see
|
||||
RFC5280). The policy I<arg> can be an object name an OID in numeric form.
|
||||
This argument can appear more than once.
|
||||
|
||||
=item B<-policy_check>
|
||||
|
|
@ -224,22 +224,22 @@ effect.
|
|||
|
||||
=item B<-untrusted> I<file>
|
||||
|
||||
A B<file> of additional untrusted certificates (intermediate issuer CAs) used
|
||||
A I<file> of additional untrusted certificates (intermediate issuer CAs) used
|
||||
to construct a certificate chain from the subject certificate to a trust-anchor.
|
||||
The B<file> should contain one or more certificates in PEM format.
|
||||
The I<file> should contain one or more certificates in PEM format.
|
||||
This option can be specified more than once to include untrusted certificates
|
||||
from multiple B<files>.
|
||||
from multiple I<file>s.
|
||||
|
||||
=item B<-trusted> I<file>
|
||||
|
||||
A B<file> of trusted certificates, which must be self-signed, unless the
|
||||
A I<file> of trusted certificates, which must be self-signed, unless the
|
||||
B<-partial_chain> option is specified.
|
||||
The B<file> contains one or more certificates in PEM format.
|
||||
The I<file> contains one or more certificates in PEM format.
|
||||
With this option, no additional (e.g., default) certificate lists are
|
||||
consulted.
|
||||
That is, the only trust-anchors are those listed in B<file>.
|
||||
That is, the only trust-anchors are those listed in I<file>.
|
||||
This option can be specified more than once to include trusted certificates
|
||||
from multiple B<files>.
|
||||
from multiple I<file>s.
|
||||
This option implies the B<-no-CAfile> and B<-no-CApath> options.
|
||||
This option cannot be used in combination with either of the B<-CAfile> or
|
||||
B<-CApath> options.
|
||||
|
|
@ -254,11 +254,11 @@ Print extra information about the operations being performed.
|
|||
|
||||
=item B<-auth_level> I<level>
|
||||
|
||||
Set the certificate chain authentication security level to B<level>.
|
||||
Set the certificate chain authentication security level to I<level>.
|
||||
The authentication security level determines the acceptable signature and
|
||||
public key strength when verifying certificate chains.
|
||||
For a certificate chain to validate, the public keys of all the certificates
|
||||
must meet the specified security B<level>.
|
||||
must meet the specified security I<level>.
|
||||
The signature algorithm security level is enforced for all the certificates in
|
||||
the chain except for the chain's I<trust anchor>, which is either directly
|
||||
trusted or validated by means other than its signature.
|
||||
|
|
@ -272,30 +272,30 @@ shorter than 1024 bits.
|
|||
|
||||
=item B<-verify_depth> I<num>
|
||||
|
||||
Limit the certificate chain to B<num> intermediate CA certificates.
|
||||
A maximal depth chain can have up to B<num+2> certificates, since neither the
|
||||
Limit the certificate chain to I<num> intermediate CA certificates.
|
||||
A maximal depth chain can have up to I<num>+2 certificates, since neither the
|
||||
end-entity certificate nor the trust-anchor certificate count against the
|
||||
B<-verify_depth> limit.
|
||||
|
||||
=item B<-verify_email> I<email>
|
||||
|
||||
Verify if the B<email> matches the email address in Subject Alternative Name or
|
||||
Verify if I<email> matches the email address in Subject Alternative Name or
|
||||
the email in the subject Distinguished Name.
|
||||
|
||||
=item B<-verify_hostname> I<hostname>
|
||||
|
||||
Verify if the B<hostname> matches DNS name in Subject Alternative Name or
|
||||
Verify if I<hostname> matches DNS name in Subject Alternative Name or
|
||||
Common Name in the subject certificate.
|
||||
|
||||
=item B<-verify_ip> I<ip>
|
||||
|
||||
Verify if the B<ip> matches the IP address in Subject Alternative Name of
|
||||
Verify if I<ip> matches the IP address in Subject Alternative Name of
|
||||
the subject certificate.
|
||||
|
||||
=item B<-verify_name> I<name>
|
||||
|
||||
Use default verification policies like trust model and required certificate
|
||||
policies identified by B<name>.
|
||||
policies identified by I<name>.
|
||||
The trust model determines which auxiliary trust or reject OIDs are applicable
|
||||
to verifying the given certificate chain.
|
||||
See the B<-addtrust> and B<-addreject> options of the L<x509(1)> command-line
|
||||
|
|
@ -335,7 +335,7 @@ Indicates the last option. All arguments following this are assumed to be
|
|||
certificate files. This is useful if the first certificate filename begins
|
||||
with a B<->.
|
||||
|
||||
=item B<certificates>
|
||||
=item I<certificate> ...
|
||||
|
||||
One or more certificates to verify. If no certificates are given, B<verify>
|
||||
will attempt to read a certificate from standard input. Certificates must be
|
||||
|
|
|
|||
|
|
@ -136,7 +136,7 @@ This can be used with a subsequent B<-rand> flag.
|
|||
|
||||
=item B<-engine> I<id>
|
||||
|
||||
Specifying an engine (by its unique B<id> string) will cause B<x509>
|
||||
Specifying an engine (by its unique I<id> string) will cause B<x509>
|
||||
to attempt to obtain a functional reference to the specified engine,
|
||||
thus initialising it if needed. The engine will then be set as the default
|
||||
for all available algorithms.
|
||||
|
|
@ -170,7 +170,7 @@ See the L<x509v3_config(5)> manual page for the extension names.
|
|||
|
||||
=item B<-certopt> I<option>
|
||||
|
||||
Customise the output format used with B<-text>. The B<option> argument
|
||||
Customise the output format used with B<-text>. The I<option> argument
|
||||
can be a single option or multiple options separated by commas. The
|
||||
B<-certopt> switch may be also be used more than once to set multiple
|
||||
options. See the B<TEXT OPTIONS> section for more information.
|
||||
|
|
@ -231,7 +231,7 @@ Outputs the issuer name.
|
|||
=item B<-nameopt> I<option>
|
||||
|
||||
Option which determines how the subject or issuer names are displayed. The
|
||||
B<option> argument can be a single option or multiple options separated by
|
||||
I<option> argument can be a single option or multiple options separated by
|
||||
commas. Alternatively the B<-nameopt> switch may be used more than once to
|
||||
set multiple options. See the B<NAME OPTIONS> section for more information.
|
||||
|
||||
|
|
@ -257,7 +257,7 @@ Prints out the start and expiry dates of a certificate.
|
|||
|
||||
=item B<-checkend> I<arg>
|
||||
|
||||
Checks if the certificate expires within the next B<arg> seconds and exits
|
||||
Checks if the certificate expires within the next I<arg> seconds and exits
|
||||
nonzero if yes it will expire or zero if not.
|
||||
|
||||
=item B<-fingerprint>
|
||||
|
|
@ -372,7 +372,7 @@ Names and values of these options are algorithm-specific.
|
|||
|
||||
=item B<-passin> I<arg>
|
||||
|
||||
The key password source. For more information about the format of B<arg>
|
||||
The key password source. For more information about the format of I<arg>
|
||||
see L<openssl(1)/Pass phrase options>.
|
||||
|
||||
=item B<-clrext>
|
||||
|
|
@ -470,7 +470,7 @@ Instead, the B<-subj> and <-force_pubkey> options need to be given.
|
|||
|
||||
=item B<-force_pubkey> I<filename>
|
||||
|
||||
When a certificate is created set its public key to the key in B<filename>
|
||||
When a certificate is created set its public key to the key in I<filename>
|
||||
instead of the key contained in the input or given with the B<-signkey> option.
|
||||
|
||||
This option is useful for creating self-issued certificates that are not
|
||||
|
|
@ -499,8 +499,8 @@ or certificate request.
|
|||
|
||||
=head2 Name Options
|
||||
|
||||
The B<nameopt> command line switch determines how the subject and issuer
|
||||
names are displayed. If no B<nameopt> switch is present the default "oneline"
|
||||
The B<-nameopt> command line switch determines how the subject and issuer
|
||||
names are displayed. If no B<-nameopt> switch is present the default "oneline"
|
||||
format is used which is compatible with previous versions of OpenSSL.
|
||||
Each option is described in detail below, all options can be preceded by
|
||||
a B<-> to turn the option off. Only the first four will normally be used.
|
||||
|
|
|
|||
|
|
@ -8,10 +8,10 @@ openssl - OpenSSL command line tool
|
|||
|
||||
B<openssl>
|
||||
I<command>
|
||||
[ I<command_opts> ]
|
||||
[ I<command_args> ]
|
||||
[ I<command_opts> ... ]
|
||||
[ I<command_args> ... ]
|
||||
|
||||
B<openssl> B<list> [ B<standard-commands> | B<digest-commands> | B<cipher-commands> | B<cipher-algorithms> | B<digest-algorithms> | B<mac-algorithms> | B<public-key-algorithms>]
|
||||
B<openssl> B<list> [ B<-standard-commands> | B<-digest-commands> | B<-cipher-commands> | B<-cipher-algorithms> | B<-digest-algorithms> | B<-mac-algorithms> | B<-public-key-algorithms>]
|
||||
|
||||
B<openssl> B<no->I<XXX> [ I<arbitrary options> ]
|
||||
|
||||
|
|
@ -52,18 +52,18 @@ B<openssl.cnf> in the default certificate storage area, whose value
|
|||
depends on the configuration flags specified when the OpenSSL
|
||||
was built.
|
||||
|
||||
The list parameters B<standard-commands>, B<digest-commands>,
|
||||
and B<cipher-commands> output a list (one entry per line) of the names
|
||||
The list options B<-standard-commands>, B<-digest-commands>,
|
||||
and B<-cipher-commands> output a list (one entry per line) of the names
|
||||
of all standard commands, message digest commands, or cipher commands,
|
||||
respectively, that are available in the present B<openssl> utility.
|
||||
|
||||
The list parameters B<cipher-algorithms>, B<digest-algorithms>,
|
||||
and B<mac-algorithms> list all cipher, message digest, and message
|
||||
The list parameters B<-cipher-algorithms>, B<-digest-algorithms>,
|
||||
and B<-mac-algorithms> list all cipher, message digest, and message
|
||||
authentication code names, one entry per line. Aliases are listed as:
|
||||
|
||||
from => to
|
||||
|
||||
The list parameter B<public-key-algorithms> lists all supported public
|
||||
The list parameter B<-public-key-algorithms> lists all supported public
|
||||
key algorithms.
|
||||
|
||||
The command B<no->I<XXX> tests whether a command of the
|
||||
|
|
@ -514,29 +514,29 @@ L<passphrase-encoding(7)>.
|
|||
|
||||
=over 4
|
||||
|
||||
=item B<pass:password>
|
||||
=item B<pass:>I<password>
|
||||
|
||||
The actual password is B<password>. Since the password is visible
|
||||
The actual password is I<password>. Since the password is visible
|
||||
to utilities (like 'ps' under Unix) this form should only be used
|
||||
where security is not important.
|
||||
|
||||
=item B<env:var>
|
||||
=item B<env:>I<var>
|
||||
|
||||
Obtain the password from the environment variable B<var>. Since
|
||||
Obtain the password from the environment variable I<var>. Since
|
||||
the environment of other processes is visible on certain platforms
|
||||
(e.g. ps under certain Unix OSes) this option should be used with caution.
|
||||
|
||||
=item B<file:pathname>
|
||||
=item B<file:>I<pathname>
|
||||
|
||||
The first line of B<pathname> is the password. If the same B<pathname>
|
||||
The first line of I<pathname> is the password. If the same I<pathname>
|
||||
argument is supplied to B<-passin> and B<-passout> arguments then the first
|
||||
line will be used for the input password and the next line for the output
|
||||
password. B<pathname> need not refer to a regular file: it could for example
|
||||
password. I<pathname> need not refer to a regular file: it could for example
|
||||
refer to a device or named pipe.
|
||||
|
||||
=item B<fd:number>
|
||||
=item B<fd:>I<number>
|
||||
|
||||
Read the password from the file descriptor B<number>. This can be used to
|
||||
Read the password from the file descriptor I<number>. This can be used to
|
||||
send the data via a pipe for example.
|
||||
|
||||
=item B<stdin>
|
||||
|
|
@ -671,7 +671,7 @@ L<x509v3_config(5)>
|
|||
|
||||
=head1 HISTORY
|
||||
|
||||
The B<list->I<XXX>B<-algorithms> pseudo-commands were added in OpenSSL 1.0.0;
|
||||
The B<list> -I<XXX>B<-algorithms> options were added in OpenSSL 1.0.0;
|
||||
For notes on the availability of other commands, see their individual
|
||||
manual pages.
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue