diff options
| author | jmc <> | 2016-08-27 20:43:05 +0000 |
|---|---|---|
| committer | jmc <> | 2016-08-27 20:43:05 +0000 |
| commit | 5266ad13ae9abdad6c6bec889b1d966a7fedfdbb (patch) | |
| tree | 06b13e9537424ad354263d3356506f618769ec60 | |
| parent | 7170280a51bd1f5464f8c64a065e1a7c1185cec0 (diff) | |
| download | openbsd-5266ad13ae9abdad6c6bec889b1d966a7fedfdbb.tar.gz openbsd-5266ad13ae9abdad6c6bec889b1d966a7fedfdbb.tar.bz2 openbsd-5266ad13ae9abdad6c6bec889b1d966a7fedfdbb.zip | |
shorten the req text;
| -rw-r--r-- | src/usr.bin/openssl/openssl.1 | 641 |
1 files changed, 189 insertions, 452 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1 index 9fabe16cd9..7a416e74f2 100644 --- a/src/usr.bin/openssl/openssl.1 +++ b/src/usr.bin/openssl/openssl.1 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: openssl.1,v 1.62 2016/08/25 14:37:28 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.63 2016/08/27 20:43:05 jmc Exp $ |
| 2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
| 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
| 4 | .\" | 4 | .\" |
| @@ -112,7 +112,7 @@ | |||
| 112 | .\" | 112 | .\" |
| 113 | .\" OPENSSL | 113 | .\" OPENSSL |
| 114 | .\" | 114 | .\" |
| 115 | .Dd $Mdocdate: August 25 2016 $ | 115 | .Dd $Mdocdate: August 27 2016 $ |
| 116 | .Dt OPENSSL 1 | 116 | .Dt OPENSSL 1 |
| 117 | .Os | 117 | .Os |
| 118 | .Sh NAME | 118 | .Sh NAME |
| @@ -3089,9 +3089,6 @@ verification succeeded or failed. | |||
| 3089 | .It Fl verifyrecover | 3089 | .It Fl verifyrecover |
| 3090 | Verify the input data and output the recovered data. | 3090 | Verify the input data and output the recovered data. |
| 3091 | .El | 3091 | .El |
| 3092 | .\" | ||
| 3093 | .\" PRIME | ||
| 3094 | .\" | ||
| 3095 | .Sh PRIME | 3092 | .Sh PRIME |
| 3096 | .Cm openssl prime | 3093 | .Cm openssl prime |
| 3097 | .Op Fl bits Ar n | 3094 | .Op Fl bits Ar n |
| @@ -3136,9 +3133,6 @@ Test if number | |||
| 3136 | .Ar p | 3133 | .Ar p |
| 3137 | is prime. | 3134 | is prime. |
| 3138 | .El | 3135 | .El |
| 3139 | .\" | ||
| 3140 | .\" RAND | ||
| 3141 | .\" | ||
| 3142 | .Sh RAND | 3136 | .Sh RAND |
| 3143 | .nr nS 1 | 3137 | .nr nS 1 |
| 3144 | .Nm "openssl rand" | 3138 | .Nm "openssl rand" |
| @@ -3163,26 +3157,21 @@ encoding on the output. | |||
| 3163 | .It Fl hex | 3157 | .It Fl hex |
| 3164 | Specify hexadecimal output. | 3158 | Specify hexadecimal output. |
| 3165 | .It Fl out Ar file | 3159 | .It Fl out Ar file |
| 3166 | Write to | 3160 | The output file to write to, |
| 3167 | .Ar file | 3161 | or standard output if not specified. |
| 3168 | instead of standard output. | ||
| 3169 | .El | 3162 | .El |
| 3170 | .\" | ||
| 3171 | .\" REQ | ||
| 3172 | .\" | ||
| 3173 | .Sh REQ | 3163 | .Sh REQ |
| 3174 | .nr nS 1 | 3164 | .nr nS 1 |
| 3175 | .Nm "openssl req" | 3165 | .Nm "openssl req" |
| 3176 | .Bk -words | ||
| 3177 | .Op Fl asn1-kludge | 3166 | .Op Fl asn1-kludge |
| 3178 | .Op Fl batch | 3167 | .Op Fl batch |
| 3179 | .Op Fl config Ar file | 3168 | .Op Fl config Ar file |
| 3180 | .Op Fl days Ar n | 3169 | .Op Fl days Ar n |
| 3181 | .Op Fl extensions Ar section | 3170 | .Op Fl extensions Ar section |
| 3182 | .Op Fl in Ar file | 3171 | .Op Fl in Ar file |
| 3183 | .Op Fl inform Ar DER | PEM | 3172 | .Op Fl inform Cm der | pem |
| 3184 | .Op Fl key Ar keyfile | 3173 | .Op Fl key Ar keyfile |
| 3185 | .Op Fl keyform Ar DER | PEM | 3174 | .Op Fl keyform Cm der | pem |
| 3186 | .Op Fl keyout Ar file | 3175 | .Op Fl keyout Ar file |
| 3187 | .Op Fl md4 | md5 | sha1 | 3176 | .Op Fl md4 | md5 | sha1 |
| 3188 | .Op Fl modulus | 3177 | .Op Fl modulus |
| @@ -3194,7 +3183,7 @@ instead of standard output. | |||
| 3194 | .Op Fl nodes | 3183 | .Op Fl nodes |
| 3195 | .Op Fl noout | 3184 | .Op Fl noout |
| 3196 | .Op Fl out Ar file | 3185 | .Op Fl out Ar file |
| 3197 | .Op Fl outform Ar DER | PEM | 3186 | .Op Fl outform Cm der | pem |
| 3198 | .Op Fl passin Ar arg | 3187 | .Op Fl passin Ar arg |
| 3199 | .Op Fl passout Ar arg | 3188 | .Op Fl passout Ar arg |
| 3200 | .Op Fl pubkey | 3189 | .Op Fl pubkey |
| @@ -3208,7 +3197,6 @@ instead of standard output. | |||
| 3208 | .Op Fl verbose | 3197 | .Op Fl verbose |
| 3209 | .Op Fl verify | 3198 | .Op Fl verify |
| 3210 | .Op Fl x509 | 3199 | .Op Fl x509 |
| 3211 | .Ek | ||
| 3212 | .nr nS 0 | 3200 | .nr nS 0 |
| 3213 | .Pp | 3201 | .Pp |
| 3214 | The | 3202 | The |
| @@ -3221,103 +3209,71 @@ for use as root CAs, for example. | |||
| 3221 | The options are as follows: | 3209 | The options are as follows: |
| 3222 | .Bl -tag -width Ds | 3210 | .Bl -tag -width Ds |
| 3223 | .It Fl asn1-kludge | 3211 | .It Fl asn1-kludge |
| 3224 | By default, the | 3212 | Produce requests in an invalid format for certain picky CAs. |
| 3225 | .Nm req | 3213 | Very few CAs still require the use of this option. |
| 3226 | command outputs certificate requests containing | ||
| 3227 | no attributes in the correct PKCS#10 format. | ||
| 3228 | However certain CAs will only | ||
| 3229 | accept requests containing no attributes in an invalid form: this | ||
| 3230 | option produces this invalid format. | ||
| 3231 | .Pp | ||
| 3232 | More precisely, the | ||
| 3233 | .Em Attributes | ||
| 3234 | in a PKCS#10 certificate request are defined as a SET OF Attribute. | ||
| 3235 | They are | ||
| 3236 | .Em not | ||
| 3237 | optional, so if no attributes are present then they should be encoded as an | ||
| 3238 | empty SET OF. | ||
| 3239 | The invalid form does not include the empty | ||
| 3240 | SET OF, whereas the correct form does. | ||
| 3241 | .Pp | ||
| 3242 | It should be noted that very few CAs still require the use of this option. | ||
| 3243 | .It Fl batch | 3214 | .It Fl batch |
| 3244 | Non-interactive mode. | 3215 | Non-interactive mode. |
| 3245 | .It Fl config Ar file | 3216 | .It Fl config Ar file |
| 3246 | This allows an alternative configuration file to be specified; | 3217 | Specify an alternative configuration file. |
| 3247 | this overrides the compile time filename or any specified in | ||
| 3248 | the | ||
| 3249 | .Ev OPENSSL_CONF | ||
| 3250 | environment variable. | ||
| 3251 | .It Fl days Ar n | 3218 | .It Fl days Ar n |
| 3252 | When the | 3219 | Specify the number of days to certify the certificate for. |
| 3253 | .Fl x509 | ||
| 3254 | option is being used, this specifies the number of | ||
| 3255 | days to certify the certificate for. | ||
| 3256 | The default is 30 days. | 3220 | The default is 30 days. |
| 3257 | .It Fl extensions Ar section , Fl reqexts Ar section | 3221 | Used with the |
| 3258 | These options specify alternative sections to include certificate | ||
| 3259 | extensions (if the | ||
| 3260 | .Fl x509 | 3222 | .Fl x509 |
| 3261 | option is present) or certificate request extensions. | 3223 | option. |
| 3262 | This allows several different sections to | 3224 | .It Fl extensions Ar section , Fl reqexts Ar section |
| 3263 | be used in the same configuration file to specify requests for | 3225 | Specify alternative sections to include certificate |
| 3264 | a variety of purposes. | 3226 | extensions (with |
| 3227 | .Fl x509 ) | ||
| 3228 | or certificate request extensions, | ||
| 3229 | allowing several different sections to be used in the same configuration file. | ||
| 3265 | .It Fl in Ar file | 3230 | .It Fl in Ar file |
| 3266 | This specifies the input | 3231 | The input file to read a request from, |
| 3267 | .Ar file | 3232 | or standard input if not specified. |
| 3268 | to read a request from, or standard input | ||
| 3269 | if this option is not specified. | ||
| 3270 | A request is only read if the creation options | 3233 | A request is only read if the creation options |
| 3271 | .Fl new | 3234 | .Fl new |
| 3272 | and | 3235 | and |
| 3273 | .Fl newkey | 3236 | .Fl newkey |
| 3274 | are not specified. | 3237 | are not specified. |
| 3275 | .It Fl inform Ar DER | PEM | 3238 | .It Fl inform Cm der | pem |
| 3276 | This specifies the input format. | 3239 | The input format. |
| 3277 | The | 3240 | .Cm der |
| 3278 | .Ar DER | 3241 | uses an ASN1 DER-encoded form compatible with the PKCS#10. |
| 3279 | argument uses an ASN1 DER-encoded form compatible with the PKCS#10. | 3242 | .Cm pem |
| 3280 | The | 3243 | is the default format: |
| 3281 | .Ar PEM | ||
| 3282 | form is the default format: | ||
| 3283 | it consists of the DER format base64-encoded with additional header and | 3244 | it consists of the DER format base64-encoded with additional header and |
| 3284 | footer lines. | 3245 | footer lines. |
| 3285 | .It Fl key Ar keyfile | 3246 | .It Fl key Ar keyfile |
| 3286 | This specifies the file to read the private key from. | 3247 | The file to read the private key from. |
| 3287 | It also accepts PKCS#8 format private keys for PEM format files. | 3248 | It also accepts PKCS#8 format private keys for PEM format files. |
| 3288 | .It Fl keyform Ar DER | PEM | 3249 | .It Fl keyform Cm der | pem |
| 3289 | The format of the private key file specified in the | 3250 | The format of the private key file specified in the |
| 3290 | .Fl key | 3251 | .Fl key |
| 3291 | argument. | 3252 | argument. |
| 3292 | .Ar PEM | 3253 | The default is PEM. |
| 3293 | is the default. | ||
| 3294 | .It Fl keyout Ar file | 3254 | .It Fl keyout Ar file |
| 3295 | This gives the | 3255 | The file to write the newly created private key to. |
| 3296 | .Ar file | 3256 | If this option is not specified, |
| 3297 | to write the newly created private key to. | 3257 | the filename present in the configuration file is used. |
| 3298 | If this option is not specified, the filename present in the | ||
| 3299 | configuration file is used. | ||
| 3300 | .It Fl md5 | sha1 | sha256 | 3258 | .It Fl md5 | sha1 | sha256 |
| 3301 | This specifies the message digest to sign the request with. | 3259 | The message digest to sign the request with. |
| 3302 | This overrides the digest algorithm specified in the configuration file. | 3260 | This overrides the digest algorithm specified in the configuration file. |
| 3303 | .Pp | 3261 | .Pp |
| 3304 | Some public key algorithms may override this choice. | 3262 | Some public key algorithms may override this choice. |
| 3305 | For instance, DSA signatures always use SHA1. | 3263 | For instance, DSA signatures always use SHA1. |
| 3306 | .It Fl modulus | 3264 | .It Fl modulus |
| 3307 | This option prints out the value of the modulus of the public key | 3265 | Print the value of the modulus of the public key contained in the request. |
| 3308 | contained in the request. | ||
| 3309 | .It Fl nameopt Ar option , Fl reqopt Ar option | 3266 | .It Fl nameopt Ar option , Fl reqopt Ar option |
| 3310 | These options determine how the subject or issuer names are displayed. | 3267 | Determine how the subject or issuer names are displayed. |
| 3311 | The | ||
| 3312 | .Ar option | 3268 | .Ar option |
| 3313 | argument can be a single option or multiple options separated by commas. | 3269 | can be a single option or multiple options separated by commas. |
| 3314 | Alternatively, these options may be used more than once to set multiple options. | 3270 | Alternatively, these options may be used more than once to set multiple options. |
| 3315 | See the | 3271 | See the |
| 3316 | .Sx X509 | 3272 | .Sx X509 |
| 3317 | section below for details. | 3273 | section below for details. |
| 3318 | .It Fl new | 3274 | .It Fl new |
| 3319 | This option generates a new certificate request. | 3275 | Generate a new certificate request. |
| 3320 | It will prompt the user for the relevant field values. | 3276 | The user is prompted for the relevant field values. |
| 3321 | The actual fields prompted for and their maximum and minimum sizes | 3277 | The actual fields prompted for and their maximum and minimum sizes |
| 3322 | are specified in the configuration file and any requested extensions. | 3278 | are specified in the configuration file and any requested extensions. |
| 3323 | .Pp | 3279 | .Pp |
| @@ -3326,88 +3282,68 @@ If the | |||
| 3326 | option is not used, it will generate a new RSA private | 3282 | option is not used, it will generate a new RSA private |
| 3327 | key using information specified in the configuration file. | 3283 | key using information specified in the configuration file. |
| 3328 | .It Fl newhdr | 3284 | .It Fl newhdr |
| 3329 | Adds the word NEW to the PEM file header and footer lines | 3285 | Add the word NEW to the PEM file header and footer lines |
| 3330 | on the outputed request. | 3286 | on the outputed request. |
| 3331 | Some software | 3287 | Some software and CAs need this. |
| 3332 | .Pq Netscape certificate server | ||
| 3333 | and some CAs need this. | ||
| 3334 | .It Fl newkey Ar arg | 3288 | .It Fl newkey Ar arg |
| 3335 | This option creates a new certificate request and a new private key. | 3289 | Create a new certificate request and a new private key. |
| 3336 | The argument takes one of several forms. | 3290 | The argument takes one of several forms. |
| 3337 | .Ar rsa : Ns Ar nbits , | 3291 | .Pp |
| 3338 | where | 3292 | .No rsa : Ns Ar nbits |
| 3339 | .Ar nbits | 3293 | generates an RSA key |
| 3340 | is the number of bits, generates an RSA key | ||
| 3341 | .Ar nbits | 3294 | .Ar nbits |
| 3342 | in size. | 3295 | in size. |
| 3343 | If | 3296 | If |
| 3344 | .Ar nbits | 3297 | .Ar nbits |
| 3345 | is omitted, i.e.\& | 3298 | is omitted |
| 3346 | .Cm -newkey rsa | 3299 | the default key size is used. |
| 3347 | specified, | 3300 | .Pp |
| 3348 | the default key size, specified in the configuration file, is used. | 3301 | .No dsa : Ns Ar file |
| 3349 | .Pp | 3302 | generates a DSA key using the parameters in |
| 3350 | All other algorithms support the | 3303 | .Ar file . |
| 3351 | .Ar alg : Ns Ar file | 3304 | .Pp |
| 3352 | form, | 3305 | .No param : Ns Ar file |
| 3306 | generates a key using the parameters or certificate in | ||
| 3307 | .Ar file . | ||
| 3308 | .Pp | ||
| 3309 | All other algorithms support the form | ||
| 3310 | .Ar algorithm : Ns Ar file , | ||
| 3353 | where file may be an algorithm parameter file, | 3311 | where file may be an algorithm parameter file, |
| 3354 | created by the | 3312 | created by the |
| 3355 | .Cm genpkey -genparam | 3313 | .Cm genpkey -genparam |
| 3356 | command or an X.509 certificate for a key with appropriate algorithm. | 3314 | command or an X.509 certificate for a key with appropriate algorithm. |
| 3357 | .Pp | 3315 | .Ar file |
| 3358 | .Ar param : Ns Ar file | 3316 | can be omitted, |
| 3359 | generates a key using the parameter file or certificate | 3317 | in which case any parameters can be specified via the |
| 3360 | .Ar file ; | ||
| 3361 | the algorithm is determined by the parameters. | ||
| 3362 | .Ar algname : Ns Ar file | ||
| 3363 | use algorithm | ||
| 3364 | .Ar algname | ||
| 3365 | and parameter file | ||
| 3366 | .Ar file : | ||
| 3367 | the two algorithms must match or an error occurs. | ||
| 3368 | .Ar algname | ||
| 3369 | just uses algorithm | ||
| 3370 | .Ar algname , | ||
| 3371 | and parameters, if necessary, | ||
| 3372 | should be specified via the | ||
| 3373 | .Fl pkeyopt | 3318 | .Fl pkeyopt |
| 3374 | option. | 3319 | option. |
| 3375 | .Pp | ||
| 3376 | .Ar dsa : Ns Ar file | ||
| 3377 | generates a DSA key using the parameters in the file | ||
| 3378 | .Ar file . | ||
| 3379 | .It Fl no-asn1-kludge | 3320 | .It Fl no-asn1-kludge |
| 3380 | Reverses the effect of | 3321 | Reverse the effect of |
| 3381 | .Fl asn1-kludge . | 3322 | .Fl asn1-kludge . |
| 3382 | .It Fl nodes | 3323 | .It Fl nodes |
| 3383 | If this option is specified and a private key is created, it | 3324 | Do not encrypt the private key. |
| 3384 | will not be encrypted. | ||
| 3385 | .It Fl noout | 3325 | .It Fl noout |
| 3386 | This option prevents output of the encoded version of the request. | 3326 | Do not output the encoded version of the request. |
| 3387 | .It Fl out Ar file | 3327 | .It Fl out Ar file |
| 3388 | This specifies the output | 3328 | The output file to write to, |
| 3389 | .Ar file | 3329 | or standard output if not spceified. |
| 3390 | to write to, or standard output by default. | 3330 | .It Fl outform Cm der | pem |
| 3391 | .It Fl outform Ar DER | PEM | 3331 | The output format. |
| 3392 | This specifies the output format; the options have the same meaning as the | ||
| 3393 | .Fl inform | ||
| 3394 | option. | ||
| 3395 | .It Fl passin Ar arg | 3332 | .It Fl passin Ar arg |
| 3396 | The key password source. | 3333 | The key password source. |
| 3397 | .It Fl passout Ar arg | 3334 | .It Fl passout Ar arg |
| 3398 | The output file password source. | 3335 | The output file password source. |
| 3399 | .It Fl pubkey | 3336 | .It Fl pubkey |
| 3400 | Outputs the public key. | 3337 | Output the public key. |
| 3401 | .It Fl reqopt Ar option | 3338 | .It Fl reqopt Ar option |
| 3402 | Customise the output format used with | 3339 | Customise the output format used with |
| 3403 | .Fl text . | 3340 | .Fl text . |
| 3404 | The | 3341 | The |
| 3405 | .Ar option | 3342 | .Ar option |
| 3406 | argument can be a single option or multiple options separated by commas. | 3343 | argument can be a single option or multiple options separated by commas. |
| 3407 | .Pp | 3344 | See also the discussion of |
| 3408 | See the discussion of the | ||
| 3409 | .Fl certopt | 3345 | .Fl certopt |
| 3410 | option in the | 3346 | in the |
| 3411 | .Nm x509 | 3347 | .Nm x509 |
| 3412 | command. | 3348 | command. |
| 3413 | .It Fl set_serial Ar n | 3349 | .It Fl set_serial Ar n |
| @@ -3416,219 +3352,180 @@ This may be specified as a decimal value or a hex value if preceded by | |||
| 3416 | .Sq 0x . | 3352 | .Sq 0x . |
| 3417 | It is possible to use negative serial numbers but this is not recommended. | 3353 | It is possible to use negative serial numbers but this is not recommended. |
| 3418 | .It Fl subj Ar arg | 3354 | .It Fl subj Ar arg |
| 3419 | Replaces subject field of input request with specified data and outputs | 3355 | Replaces the subject field of an input request |
| 3420 | modified request. | 3356 | with the specified data and output the modified request. |
| 3421 | The arg must be formatted as | 3357 | .Ar arg |
| 3422 | .Em /type0=value0/type1=value1/type2=... ; | 3358 | must be formatted as /type0=value0/type1=value1/type2=...; |
| 3423 | characters may be escaped by | 3359 | characters may be escaped by |
| 3424 | .Sq \e | 3360 | .Sq \e |
| 3425 | .Pq backslash ; | 3361 | (backslash); |
| 3426 | no spaces are skipped. | 3362 | no spaces are skipped. |
| 3427 | .It Fl subject | 3363 | .It Fl subject |
| 3428 | Prints out the request subject (or certificate subject if | 3364 | Print the request subject (or certificate subject if |
| 3429 | .Fl x509 | 3365 | .Fl x509 |
| 3430 | is specified. | 3366 | is specified). |
| 3431 | .It Fl text | 3367 | .It Fl text |
| 3432 | Prints out the certificate request in text form. | 3368 | Print the certificate request in text form. |
| 3433 | .It Fl utf8 | 3369 | .It Fl utf8 |
| 3434 | This option causes field values to be interpreted as UTF8 strings; | 3370 | Interpret field values as UTF8 strings, not ASCII. |
| 3435 | by default they are interpreted as ASCII. | ||
| 3436 | This means that the field values, whether prompted from a terminal or | ||
| 3437 | obtained from a configuration file, must be valid UTF8 strings. | ||
| 3438 | .It Fl verbose | 3371 | .It Fl verbose |
| 3439 | Print extra details about the operations being performed. | 3372 | Print extra details about the operations being performed. |
| 3440 | .It Fl verify | 3373 | .It Fl verify |
| 3441 | Verifies the signature on the request. | 3374 | Verify the signature on the request. |
| 3442 | .It Fl x509 | 3375 | .It Fl x509 |
| 3443 | This option outputs a self-signed certificate instead of a certificate | 3376 | Output a self-signed certificate instead of a certificate request. |
| 3444 | request. | 3377 | This is typically used to generate a test certificate or a self-signed root CA. |
| 3445 | This is typically used to generate a test certificate or | 3378 | The extensions added to the certificate (if any) |
| 3446 | a self-signed root CA. | ||
| 3447 | The extensions added to the certificate | ||
| 3448 | .Pq if any | ||
| 3449 | are specified in the configuration file. | 3379 | are specified in the configuration file. |
| 3450 | Unless specified using the | 3380 | Unless specified using the |
| 3451 | .Fl set_serial | 3381 | .Fl set_serial |
| 3452 | option, 0 will be used for the serial number. | 3382 | option, 0 is used for the serial number. |
| 3453 | .El | 3383 | .El |
| 3454 | .Sh REQ CONFIGURATION FILE FORMAT | 3384 | .Pp |
| 3455 | The configuration options are specified in the | 3385 | The configuration options are specified in the |
| 3456 | .Em req | 3386 | .Qq req |
| 3457 | section of the configuration file. | 3387 | section of the configuration file. |
| 3458 | As with all configuration files, if no value is specified in the specific | 3388 | As with all configuration files, if no value is specified in the specific |
| 3459 | section (i.e.\& | 3389 | section then the initial unnamed or default section is searched too. |
| 3460 | .Em req ) | ||
| 3461 | then the initial unnamed or | ||
| 3462 | .Em default | ||
| 3463 | section is searched too. | ||
| 3464 | .Pp | 3390 | .Pp |
| 3465 | The options available are described in detail below. | 3391 | The options available are as follows: |
| 3466 | .Bl -tag -width "XXXX" | 3392 | .Bl -tag -width "XXXX" |
| 3467 | .It Ar attributes | 3393 | .It Cm attributes |
| 3468 | This specifies the section containing any request attributes: its format | 3394 | The section containing any request attributes: its format |
| 3469 | is the same as | 3395 | is the same as |
| 3470 | .Ar distinguished_name . | 3396 | .Cm distinguished_name . |
| 3471 | Typically these may contain the | 3397 | Typically these may contain the challengePassword or unstructuredName types. |
| 3472 | .Em challengePassword | 3398 | They are currently ignored by the |
| 3473 | or | 3399 | .Nm openssl |
| 3474 | .Em unstructuredName | ||
| 3475 | types. | ||
| 3476 | They are currently ignored by | ||
| 3477 | .Nm OpenSSL Ns Li 's | ||
| 3478 | request signing utilities, but some CAs might want them. | 3400 | request signing utilities, but some CAs might want them. |
| 3479 | .It Ar default_bits | 3401 | .It Cm default_bits |
| 3480 | This specifies the default key size in bits. | 3402 | The default key size, in bits. |
| 3481 | If not specified, 2048 is used. | 3403 | The default is 2048. |
| 3482 | It is used if the | 3404 | It is used if the |
| 3483 | .Fl new | 3405 | .Fl new |
| 3484 | option is used. | 3406 | option is used and can be overridden by using the |
| 3485 | It can be overridden by using the | ||
| 3486 | .Fl newkey | 3407 | .Fl newkey |
| 3487 | option. | 3408 | option. |
| 3488 | .It Ar default_keyfile | 3409 | .It Cm default_keyfile |
| 3489 | This is the default file to write a private key to. | 3410 | The default file to write a private key to, |
| 3490 | If not specified, the key is written to standard output. | 3411 | or standard output if not specified. |
| 3491 | This can be overridden by the | 3412 | It can be overridden by the |
| 3492 | .Fl keyout | 3413 | .Fl keyout |
| 3493 | option. | 3414 | option. |
| 3494 | .It Ar default_md | 3415 | .It Cm default_md |
| 3495 | This option specifies the digest algorithm to use. | 3416 | The digest algorithm to use. |
| 3496 | Possible values include | 3417 | Possible values include |
| 3497 | .Ar md5 , | 3418 | .Cm md5 , |
| 3498 | .Ar sha1 | 3419 | .Cm sha1 |
| 3499 | and | 3420 | and |
| 3500 | .Ar sha256 . | 3421 | .Cm sha256 |
| 3501 | If not present, SHA256 is used. | 3422 | (the default). |
| 3502 | This option can be overridden on the command line. | 3423 | It can be overridden on the command line. |
| 3503 | .It Ar distinguished_name | 3424 | .It Cm distinguished_name |
| 3504 | This specifies the section containing the distinguished name fields to | 3425 | The section containing the distinguished name fields to |
| 3505 | prompt for when generating a certificate or certificate request. | 3426 | prompt for when generating a certificate or certificate request. |
| 3506 | The format is described in the next section. | 3427 | The format is described below. |
| 3507 | .It Ar encrypt_key | 3428 | .It Cm encrypt_key |
| 3508 | If this is set to | 3429 | If set to |
| 3509 | .Em no | 3430 | .Qq no |
| 3510 | and a private key is generated, it is | 3431 | and a private key is generated, it is not encrypted. |
| 3511 | .Em not | 3432 | It is equivalent to the |
| 3512 | encrypted. | ||
| 3513 | This is equivalent to the | ||
| 3514 | .Fl nodes | 3433 | .Fl nodes |
| 3515 | command line option. | 3434 | option. |
| 3516 | For compatibility, | 3435 | For compatibility, |
| 3517 | .Ar encrypt_rsa_key | 3436 | .Cm encrypt_rsa_key |
| 3518 | is an equivalent option. | 3437 | is an equivalent option. |
| 3519 | .It Ar input_password | output_password | 3438 | .It Cm input_password | output_password |
| 3520 | The passwords for the input private key file | 3439 | The passwords for the input private key file (if present) |
| 3521 | .Pq if present | 3440 | and the output private key file (if one will be created). |
| 3522 | and the output private key file | ||
| 3523 | .Pq if one will be created . | ||
| 3524 | The command line options | 3441 | The command line options |
| 3525 | .Fl passin | 3442 | .Fl passin |
| 3526 | and | 3443 | and |
| 3527 | .Fl passout | 3444 | .Fl passout |
| 3528 | override the configuration file values. | 3445 | override the configuration file values. |
| 3529 | .It Ar oid_file | 3446 | .It Cm oid_file |
| 3530 | This specifies a file containing additional OBJECT IDENTIFIERS. | 3447 | A file containing additional OBJECT IDENTIFIERS. |
| 3531 | Each line of the file should consist of the numerical form of the | 3448 | Each line of the file should consist of the numerical form of the |
| 3532 | object identifier, followed by whitespace, then the short name followed | 3449 | object identifier, followed by whitespace, then the short name followed |
| 3533 | by whitespace and finally the long name. | 3450 | by whitespace and finally the long name. |
| 3534 | .It Ar oid_section | 3451 | .It Cm oid_section |
| 3535 | This specifies a section in the configuration file containing extra | 3452 | Specify a section in the configuration file containing extra |
| 3536 | object identifiers. | 3453 | object identifiers. |
| 3537 | Each line should consist of the short name of the | 3454 | Each line should consist of the short name of the |
| 3538 | object identifier followed by | 3455 | object identifier followed by |
| 3539 | .Sq = | 3456 | .Sq = |
| 3540 | and the numerical form. | 3457 | and the numerical form. |
| 3541 | The short and long names are the same when this option is used. | 3458 | The short and long names are the same when this option is used. |
| 3542 | .It Ar prompt | 3459 | .It Cm prompt |
| 3543 | If set to the value | 3460 | If set to |
| 3544 | .Em no , | 3461 | .Qq no , |
| 3545 | this disables prompting of certificate fields | 3462 | it disables prompting of certificate fields |
| 3546 | and just takes values from the config file directly. | 3463 | and just takes values from the config file directly. |
| 3547 | It also changes the expected format of the | 3464 | It also changes the expected format of the |
| 3548 | .Em distinguished_name | 3465 | .Cm distinguished_name |
| 3549 | and | 3466 | and |
| 3550 | .Em attributes | 3467 | .Cm attributes |
| 3551 | sections. | 3468 | sections. |
| 3552 | .It Ar req_extensions | 3469 | .It Cm req_extensions |
| 3553 | This specifies the configuration file section containing a list of | 3470 | The configuration file section containing a list of |
| 3554 | extensions to add to the certificate request. | 3471 | extensions to add to the certificate request. |
| 3555 | It can be overridden by the | 3472 | It can be overridden by the |
| 3556 | .Fl reqexts | 3473 | .Fl reqexts |
| 3557 | command line switch. | 3474 | option. |
| 3558 | .It Ar string_mask | 3475 | .It Cm string_mask |
| 3559 | This option limits the string types for encoding certain | 3476 | Limit the string types for encoding certain fields. |
| 3560 | fields. | ||
| 3561 | The following values may be used, limiting strings to the indicated types: | 3477 | The following values may be used, limiting strings to the indicated types: |
| 3562 | .Bl -tag -width "MASK:number" | 3478 | .Bl -tag -width "MASK:number" |
| 3563 | .It Ar utf8only | 3479 | .It Cm utf8only |
| 3564 | .Em UTF8String. | 3480 | UTF8String. |
| 3565 | This is the default, as recommended by PKIX in RFC 2459. | 3481 | This is the default, as recommended by PKIX in RFC 2459. |
| 3566 | .It Ar default | 3482 | .It Cm default |
| 3567 | .Em PrintableString , IA5String , T61String , BMPString , UTF8String . | 3483 | PrintableString, IA5String, T61String, BMPString, UTF8String. |
| 3568 | .It Ar pkix | 3484 | .It Cm pkix |
| 3569 | .Em PrintableString , IA5String , BMPString , UTF8String . | 3485 | PrintableString, IA5String, BMPString, UTF8String. |
| 3570 | This was inspired by the PKIX recommendation in RFC 2459 for certificates | 3486 | Inspired by the PKIX recommendation in RFC 2459 for certificates |
| 3571 | generated before 2004, but differs by also permitting | 3487 | generated before 2004, but differs by also permitting IA5String. |
| 3572 | .Em IA5String . | 3488 | .It Cm nombstr |
| 3573 | .It Ar nombstr | 3489 | PrintableString, IA5String, T61String, UniversalString. |
| 3574 | .Em PrintableString , IA5String , T61String , UniversalString . | 3490 | A workaround for some ancient software that had problems |
| 3575 | This was a workaround for some ancient software that had problems | 3491 | with the variable-sized BMPString and UTF8String types. |
| 3576 | with the variable-sized | ||
| 3577 | .Em BMPString | ||
| 3578 | and | ||
| 3579 | .Em UTF8String | ||
| 3580 | types. | ||
| 3581 | .It Cm MASK : Ns Ar number | 3492 | .It Cm MASK : Ns Ar number |
| 3582 | This is an explicit bitmask of permitted types, where | 3493 | An explicit bitmask of permitted types, where |
| 3583 | .Ar number | 3494 | .Ar number |
| 3584 | is a C-style hex, decimal, or octal number that's a bit-wise OR of | 3495 | is a C-style hex, decimal, or octal number that's a bit-wise OR of |
| 3585 | .Dv B_ASN1_* | 3496 | .Dv B_ASN1_* |
| 3586 | values from | 3497 | values from |
| 3587 | .In openssl/asn1.h . | 3498 | .In openssl/asn1.h . |
| 3588 | .El | 3499 | .El |
| 3589 | .It Ar utf8 | 3500 | .It Cm utf8 |
| 3590 | If set to the value | 3501 | If set to |
| 3591 | .Em yes , | 3502 | .Qq yes , |
| 3592 | then field values are interpreted as UTF8 strings; | 3503 | field values are interpreted as UTF8 strings, not ASCII. |
| 3593 | by default they are interpreted as ASCII. | 3504 | .It Cm x509_extensions |
| 3594 | This means that the field values, whether prompted from a terminal or | 3505 | The configuration file section containing a list of |
| 3595 | obtained from a configuration file, must be valid UTF8 strings. | ||
| 3596 | .It Ar x509_extensions | ||
| 3597 | This specifies the configuration file section containing a list of | ||
| 3598 | extensions to add to a certificate generated when the | 3506 | extensions to add to a certificate generated when the |
| 3599 | .Fl x509 | 3507 | .Fl x509 |
| 3600 | switch is used. | 3508 | switch is used. |
| 3601 | It can be overridden by the | 3509 | It can be overridden by the |
| 3602 | .Fl extensions | 3510 | .Fl extensions |
| 3603 | command line switch. | 3511 | option. |
| 3604 | .El | 3512 | .El |
| 3605 | .Sh REQ DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT | 3513 | .Pp |
| 3606 | There are two separate formats for the distinguished name and attribute | 3514 | There are two separate formats for the distinguished name and attribute |
| 3607 | sections. | 3515 | sections. |
| 3608 | If the | 3516 | If the |
| 3609 | .Fl prompt | 3517 | .Fl prompt |
| 3610 | option is set to | 3518 | option is set to |
| 3611 | .Em no , | 3519 | .Qq no , |
| 3612 | then these sections just consist of field names and values: for example, | 3520 | the sections consist of just field names and values, |
| 3613 | .Bd -unfilled -offset indent | 3521 | which allows external programs to generate a template file |
| 3614 | CN=My Name | 3522 | with all the field names and values and just pass it to |
| 3615 | OU=My Organization | ||
| 3616 | emailAddress=someone@somewhere.org | ||
| 3617 | .Ed | ||
| 3618 | .Pp | ||
| 3619 | This allows external programs | ||
| 3620 | .Pq e.g. GUI based | ||
| 3621 | to generate a template file with all the field names and values | ||
| 3622 | and just pass it to | ||
| 3623 | .Nm req . | 3523 | .Nm req . |
| 3624 | An example of this kind of configuration file is contained in the | ||
| 3625 | .Sx REQ EXAMPLES | ||
| 3626 | section. | ||
| 3627 | .Pp | 3524 | .Pp |
| 3628 | Alternatively if the | 3525 | Alternatively if the |
| 3629 | .Fl prompt | 3526 | .Fl prompt |
| 3630 | option is absent or not set to | 3527 | option is absent or not set to |
| 3631 | .Em no , | 3528 | .Qq no , |
| 3632 | then the file contains field prompting information. | 3529 | then the file contains field prompting information. |
| 3633 | It consists of lines of the form: | 3530 | It consists of lines of the form: |
| 3634 | .Bd -unfilled -offset indent | 3531 | .Bd -unfilled -offset indent |
| @@ -3640,8 +3537,8 @@ fieldName_max= 4 | |||
| 3640 | .Pp | 3537 | .Pp |
| 3641 | .Qq fieldName | 3538 | .Qq fieldName |
| 3642 | is the field name being used, for example | 3539 | is the field name being used, for example |
| 3643 | .Em commonName | 3540 | .Cm commonName |
| 3644 | .Pq or CN . | 3541 | (or CN). |
| 3645 | The | 3542 | The |
| 3646 | .Qq prompt | 3543 | .Qq prompt |
| 3647 | string is used to ask the user to enter the relevant details. | 3544 | string is used to ask the user to enter the relevant details. |
| @@ -3653,197 +3550,72 @@ if the user just enters the | |||
| 3653 | character. | 3550 | character. |
| 3654 | .Pp | 3551 | .Pp |
| 3655 | The number of characters entered must be between the | 3552 | The number of characters entered must be between the |
| 3656 | .Em fieldName_min | 3553 | fieldName_min and fieldName_max limits: |
| 3657 | and | ||
| 3658 | .Em fieldName_max | ||
| 3659 | limits: | ||
| 3660 | there may be additional restrictions based on the field being used | 3554 | there may be additional restrictions based on the field being used |
| 3661 | (for example | 3555 | (for example |
| 3662 | .Em countryName | 3556 | .Cm countryName |
| 3663 | can only ever be two characters long and must fit in a | 3557 | can only ever be two characters long and must fit in a |
| 3664 | .Em PrintableString ) . | 3558 | .Cm PrintableString ) . |
| 3665 | .Pp | 3559 | .Pp |
| 3666 | Some fields (such as | 3560 | Some fields (such as |
| 3667 | .Em organizationName ) | 3561 | .Cm organizationName ) |
| 3668 | can be used more than once in a DN. | 3562 | can be used more than once in a DN. |
| 3669 | This presents a problem because configuration files will | 3563 | This presents a problem because configuration files will |
| 3670 | not recognize the same name occurring twice. | 3564 | not recognize the same name occurring twice. |
| 3671 | To avoid this problem, if the | 3565 | To avoid this problem, if the |
| 3672 | .Em fieldName | 3566 | .Cm fieldName |
| 3673 | contains some characters followed by a full stop, they will be ignored. | 3567 | contains some characters followed by a full stop, they will be ignored. |
| 3674 | So, for example, a second | 3568 | So, for example, a second |
| 3675 | .Em organizationName | 3569 | .Cm organizationName |
| 3676 | can be input by calling it | 3570 | can be input by calling it |
| 3677 | .Qq 1.organizationName . | 3571 | .Qq 1.organizationName . |
| 3678 | .Pp | 3572 | .Pp |
| 3679 | The actual permitted field names are any object identifier short or | 3573 | The actual permitted field names are any object identifier short or |
| 3680 | long names. | 3574 | long names. |
| 3681 | These are compiled into | 3575 | These are compiled into |
| 3682 | .Nm OpenSSL | 3576 | .Nm openssl |
| 3683 | and include the usual values such as | 3577 | and include the usual values such as |
| 3684 | .Em commonName , countryName , localityName , organizationName , | 3578 | .Cm commonName , countryName , localityName , organizationName , |
| 3685 | .Em organizationUnitName , stateOrProvinceName . | 3579 | .Cm organizationUnitName , stateOrProvinceName . |
| 3686 | Additionally, | 3580 | Additionally, |
| 3687 | .Em emailAddress | 3581 | .Cm emailAddress |
| 3688 | is included as well as | 3582 | is included as well as |
| 3689 | .Em name , surname , givenName initials | 3583 | .Cm name , surname , givenName , initials |
| 3690 | and | 3584 | and |
| 3691 | .Em dnQualifier . | 3585 | .Cm dnQualifier . |
| 3692 | .Pp | 3586 | .Pp |
| 3693 | Additional object identifiers can be defined with the | 3587 | Additional object identifiers can be defined with the |
| 3694 | .Ar oid_file | 3588 | .Cm oid_file |
| 3695 | or | 3589 | or |
| 3696 | .Ar oid_section | 3590 | .Cm oid_section |
| 3697 | options in the configuration file. | 3591 | options in the configuration file. |
| 3698 | Any additional fields will be treated as though they were a | 3592 | Any additional fields will be treated as though they were a |
| 3699 | .Em DirectoryString . | 3593 | .Cm DirectoryString . |
| 3700 | .Sh REQ EXAMPLES | ||
| 3701 | Examine and verify a certificate request: | ||
| 3702 | .Pp | ||
| 3703 | .Dl $ openssl req -in req.pem -text -verify -noout | ||
| 3704 | .Pp | ||
| 3705 | Create a private key and then generate a certificate request from it: | ||
| 3706 | .Bd -literal -offset indent | ||
| 3707 | $ openssl genrsa -out key.pem 2048 | ||
| 3708 | $ openssl req -new -key key.pem -out req.pem | ||
| 3709 | .Ed | ||
| 3710 | .Pp | ||
| 3711 | The same but just using req: | ||
| 3712 | .Pp | ||
| 3713 | .Dl $ openssl req -newkey rsa:2048 -keyout key.pem -out req.pem | ||
| 3714 | .Pp | ||
| 3715 | Generate a self-signed root certificate: | ||
| 3716 | .Pp | ||
| 3717 | .Dl "$ openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem" | ||
| 3718 | .Pp | ||
| 3719 | Example of a file pointed to by the | ||
| 3720 | .Ar oid_file | ||
| 3721 | option: | ||
| 3722 | .Bd -unfilled -offset indent | ||
| 3723 | 1.2.3.4 shortName A longer Name | ||
| 3724 | 1.2.3.6 otherName Other longer Name | ||
| 3725 | .Ed | ||
| 3726 | .Pp | ||
| 3727 | Example of a section pointed to by | ||
| 3728 | .Ar oid_section | ||
| 3729 | making use of variable expansion: | ||
| 3730 | .Bd -unfilled -offset indent | ||
| 3731 | testoid1=1.2.3.5 | ||
| 3732 | testoid2=${testoid1}.6 | ||
| 3733 | .Ed | ||
| 3734 | .Pp | 3594 | .Pp |
| 3735 | Sample configuration file prompting for field values: | ||
| 3736 | .Bd -literal | ||
| 3737 | \& [ req ] | ||
| 3738 | \& default_bits = 1024 | ||
| 3739 | \& default_keyfile = privkey.pem | ||
| 3740 | \& distinguished_name = req_distinguished_name | ||
| 3741 | \& attributes = req_attributes | ||
| 3742 | \& x509_extensions = v3_ca | ||
| 3743 | |||
| 3744 | \& dirstring_type = nobmp | ||
| 3745 | |||
| 3746 | \& [ req_distinguished_name ] | ||
| 3747 | \& countryName = Country Name (2 letter code) | ||
| 3748 | \& countryName_default = AU | ||
| 3749 | \& countryName_min = 2 | ||
| 3750 | \& countryName_max = 2 | ||
| 3751 | |||
| 3752 | \& localityName = Locality Name (eg, city) | ||
| 3753 | |||
| 3754 | \& organizationalUnitName = Organizational Unit Name (eg, section) | ||
| 3755 | |||
| 3756 | \& commonName = Common Name (eg, YOUR name) | ||
| 3757 | \& commonName_max = 64 | ||
| 3758 | |||
| 3759 | \& emailAddress = Email Address | ||
| 3760 | \& emailAddress_max = 40 | ||
| 3761 | |||
| 3762 | \& [ req_attributes ] | ||
| 3763 | \& challengePassword = A challenge password | ||
| 3764 | \& challengePassword_min = 4 | ||
| 3765 | \& challengePassword_max = 20 | ||
| 3766 | |||
| 3767 | \& [ v3_ca ] | ||
| 3768 | |||
| 3769 | \& subjectKeyIdentifier=hash | ||
| 3770 | \& authorityKeyIdentifier=keyid:always,issuer:always | ||
| 3771 | \& basicConstraints = CA:true | ||
| 3772 | .Ed | ||
| 3773 | .Pp | ||
| 3774 | Sample configuration containing all field values: | ||
| 3775 | .Bd -literal | ||
| 3776 | |||
| 3777 | \& [ req ] | ||
| 3778 | \& default_bits = 1024 | ||
| 3779 | \& default_keyfile = keyfile.pem | ||
| 3780 | \& distinguished_name = req_distinguished_name | ||
| 3781 | \& attributes = req_attributes | ||
| 3782 | \& prompt = no | ||
| 3783 | \& output_password = mypass | ||
| 3784 | |||
| 3785 | \& [ req_distinguished_name ] | ||
| 3786 | \& C = GB | ||
| 3787 | \& ST = Test State or Province | ||
| 3788 | \& L = Test Locality | ||
| 3789 | \& O = Organization Name | ||
| 3790 | \& OU = Organizational Unit Name | ||
| 3791 | \& CN = Common Name | ||
| 3792 | \& emailAddress = test@email.address | ||
| 3793 | |||
| 3794 | \& [ req_attributes ] | ||
| 3795 | \& challengePassword = A challenge password | ||
| 3796 | .Ed | ||
| 3797 | .Sh REQ NOTES | ||
| 3798 | The header and footer lines in the PEM format are normally: | 3595 | The header and footer lines in the PEM format are normally: |
| 3799 | .Bd -unfilled -offset indent | 3596 | .Bd -unfilled -offset indent |
| 3800 | -----BEGIN CERTIFICATE REQUEST----- | 3597 | -----BEGIN CERTIFICATE REQUEST----- |
| 3801 | -----END CERTIFICATE REQUEST----- | 3598 | -----END CERTIFICATE REQUEST----- |
| 3802 | .Ed | 3599 | .Ed |
| 3803 | .Pp | 3600 | .Pp |
| 3804 | Some software | 3601 | Some software instead needs: |
| 3805 | .Pq some versions of Netscape certificate server | ||
| 3806 | instead needs: | ||
| 3807 | .Bd -unfilled -offset indent | 3602 | .Bd -unfilled -offset indent |
| 3808 | -----BEGIN NEW CERTIFICATE REQUEST----- | 3603 | -----BEGIN NEW CERTIFICATE REQUEST----- |
| 3809 | -----END NEW CERTIFICATE REQUEST----- | 3604 | -----END NEW CERTIFICATE REQUEST----- |
| 3810 | .Ed | 3605 | .Ed |
| 3811 | .Pp | 3606 | .Pp |
| 3812 | which is produced with the | ||
| 3813 | .Fl newhdr | ||
| 3814 | option but is otherwise compatible. | ||
| 3815 | Either form is accepted transparently on input. | ||
| 3816 | .Pp | ||
| 3817 | The certificate requests generated by Xenroll with MSIE have extensions added. | ||
| 3818 | It includes the | ||
| 3819 | .Em keyUsage | ||
| 3820 | extension which determines the type of key | ||
| 3821 | .Pq signature only or general purpose | ||
| 3822 | and any additional OIDs entered by the script in an | ||
| 3823 | .Em extendedKeyUsage | ||
| 3824 | extension. | ||
| 3825 | .Sh REQ DIAGNOSTICS | ||
| 3826 | The following messages are frequently asked about: | 3607 | The following messages are frequently asked about: |
| 3827 | .Bd -unfilled -offset indent | 3608 | .Bd -unfilled -offset indent |
| 3828 | Using configuration from /some/path/openssl.cnf | 3609 | Using configuration from /some/path/openssl.cnf |
| 3829 | Unable to load config info | 3610 | Unable to load config info |
| 3830 | .Ed | 3611 | \&... |
| 3831 | .Pp | ||
| 3832 | This is followed some time later by... | ||
| 3833 | .Bd -unfilled -offset indent | ||
| 3834 | unable to find 'distinguished_name' in config | 3612 | unable to find 'distinguished_name' in config |
| 3835 | problems making Certificate Request | 3613 | problems making Certificate Request |
| 3836 | .Ed | 3614 | .Ed |
| 3837 | .Pp | 3615 | .Pp |
| 3838 | The first error message is the clue: it can't find the configuration | 3616 | In this case it can't find the configuration file! |
| 3839 | file! | ||
| 3840 | Certain operations | ||
| 3841 | .Pq like examining a certificate request | ||
| 3842 | don't need a configuration file so its use isn't enforced. | ||
| 3843 | Generation of certificates or requests, however, do need a configuration file. | ||
| 3844 | This could be regarded as a bug. | ||
| 3845 | .Pp | 3617 | .Pp |
| 3846 | Another puzzling message is this: | 3618 | Another puzzling message is: |
| 3847 | .Bd -unfilled -offset indent | 3619 | .Bd -unfilled -offset indent |
| 3848 | Attributes: | 3620 | Attributes: |
| 3849 | a0:00 | 3621 | a0:00 |
| @@ -3851,51 +3623,16 @@ Attributes: | |||
| 3851 | .Pp | 3623 | .Pp |
| 3852 | This is displayed when no attributes are present and the request includes | 3624 | This is displayed when no attributes are present and the request includes |
| 3853 | the correct empty SET OF structure | 3625 | the correct empty SET OF structure |
| 3854 | .Pq the DER encoding of which is 0xa0 0x00 . | 3626 | (the DER encoding of which is 0xa0 0x00). |
| 3855 | If you just see: | 3627 | If the message is instead: |
| 3856 | .Pp | 3628 | .Pp |
| 3857 | .D1 Attributes: | 3629 | .D1 Attributes: |
| 3858 | .Pp | 3630 | .Pp |
| 3859 | then the SET OF is missing and the encoding is technically invalid | 3631 | then the SET OF is missing and the encoding is technically invalid |
| 3860 | .Pq but it is tolerated . | 3632 | (but it is tolerated). |
| 3861 | See the description of the command line option | 3633 | See the description |
| 3862 | .Fl asn1-kludge | 3634 | .Fl asn1-kludge |
| 3863 | for more information. | 3635 | for more information. |
| 3864 | .Sh REQ ENVIRONMENT VARIABLES | ||
| 3865 | The variable | ||
| 3866 | .Ev OPENSSL_CONF , | ||
| 3867 | if defined, allows an alternative configuration | ||
| 3868 | file location to be specified; it will be overridden by the | ||
| 3869 | .Fl config | ||
| 3870 | command line switch if it is present. | ||
| 3871 | .Sh REQ BUGS | ||
| 3872 | .Nm OpenSSL Ns Li 's | ||
| 3873 | handling of T61Strings | ||
| 3874 | .Pq aka TeletexStrings | ||
| 3875 | is broken: it effectively treats them as ISO 8859-1 | ||
| 3876 | .Pq Latin 1 ; | ||
| 3877 | Netscape and MSIE have similar behaviour. | ||
| 3878 | This can cause problems if you need characters that aren't available in | ||
| 3879 | .Em PrintableStrings | ||
| 3880 | and you don't want to or can't use | ||
| 3881 | .Em BMPStrings . | ||
| 3882 | .Pp | ||
| 3883 | As a consequence of the T61String handling, the only correct way to represent | ||
| 3884 | accented characters in | ||
| 3885 | .Nm OpenSSL | ||
| 3886 | is to use a | ||
| 3887 | .Em BMPString : | ||
| 3888 | unfortunately Netscape currently chokes on these. | ||
| 3889 | If you have to use accented characters with Netscape | ||
| 3890 | and MSIE then you currently need to use the invalid T61String form. | ||
| 3891 | .Pp | ||
| 3892 | The current prompting is not very friendly. | ||
| 3893 | It doesn't allow you to confirm what you've just entered. | ||
| 3894 | Other things, like extensions in certificate requests, are | ||
| 3895 | statically defined in the configuration file. | ||
| 3896 | Some of these, like an email address in | ||
| 3897 | .Em subjectAltName , | ||
| 3898 | should be input by the user. | ||
| 3899 | .\" | 3636 | .\" |
| 3900 | .\" RSA | 3637 | .\" RSA |
| 3901 | .\" | 3638 | .\" |
