summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjmc <>2016-07-16 07:27:53 +0000
committerjmc <>2016-07-16 07:27:53 +0000
commit192dbc22894bbc343ebfe1487e1179b38c13f7d8 (patch)
tree17f84aab791f019096014aaf81283d066f105c9b
parentb5fe48fb6c0a46375c817cf66a0fd7d6f5f3619c (diff)
downloadopenbsd-192dbc22894bbc343ebfe1487e1179b38c13f7d8.tar.gz
openbsd-192dbc22894bbc343ebfe1487e1179b38c13f7d8.tar.bz2
openbsd-192dbc22894bbc343ebfe1487e1179b38c13f7d8.zip
since we no longer pull source directly from openssl, the time is
right to try and trim some of the excess from this page. begin now by cutting some of the fluff from the start. the section on pass phrase arguments goes to the end of the page: it;s in the way for now.
-rw-r--r--src/usr.bin/openssl/openssl.1484
1 files changed, 57 insertions, 427 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index 8c3140de68..cad60f2670 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.32 2016/02/12 13:03:19 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.33 2016/07/16 07:27:53 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -112,7 +112,7 @@
112.\" 112.\"
113.\" OPENSSL 113.\" OPENSSL
114.\" 114.\"
115.Dd $Mdocdate: February 12 2016 $ 115.Dd $Mdocdate: July 16 2016 $
116.Dt OPENSSL 1 116.Dt OPENSSL 1
117.Os 117.Os
118.Sh NAME 118.Sh NAME
@@ -147,43 +147,8 @@ The
147.Nm 147.Nm
148program is a command line tool for using the various 148program is a command line tool for using the various
149cryptography functions of 149cryptography functions of
150.Nm OpenSSL Ns Li 's 150.Nm OpenSSL Ns 's
151.Em crypto 151crypto library from the shell.
152library from the shell.
153It can be used for
154.Pp
155.Bl -bullet -offset indent -compact
156.It
157Creation and management of private keys, public keys, and parameters
158.It
159Public key cryptographic operations
160.It
161Creation of X.509 certificates, CSRs and CRLs
162.It
163Calculation of Message Digests
164.It
165Encryption and Decryption with Ciphers
166.It
167SSL/TLS Client and Server Tests
168.It
169Handling of S/MIME signed or encrypted mail
170.It
171Time stamp requests, generation, and verification
172.El
173.Sh COMMAND SUMMARY
174The
175.Nm
176program provides a rich variety of commands
177.Pf ( Cm command
178in the
179.Sx SYNOPSIS
180above),
181each of which often has a wealth of options and arguments
182.Pf ( Ar command_opts
183and
184.Ar command_args
185in the
186.Sx SYNOPSIS ) .
187.Pp 152.Pp
188The pseudo-commands 153The pseudo-commands
189.Cm list-standard-commands , list-message-digest-commands , 154.Cm list-standard-commands , list-message-digest-commands ,
@@ -204,7 +169,7 @@ list all cipher and message digest names,
204one entry per line. 169one entry per line.
205Aliases are listed as: 170Aliases are listed as:
206.Pp 171.Pp
207.D1 from =\*(Gt to 172.D1 from => to
208.Pp 173.Pp
209The pseudo-command 174The pseudo-command
210.Cm list-public-key-algorithms 175.Cm list-public-key-algorithms
@@ -242,263 +207,6 @@ is not able to detect pseudo-commands such as
242or 207or
243.Cm no- Ns Ar XXX 208.Cm no- Ns Ar XXX
244itself. 209itself.
245.Sh STANDARD COMMANDS
246.Bl -tag -width "asn1parse"
247.It Cm asn1parse
248Parse an ASN.1 sequence.
249.It Cm ca
250Certificate Authority
251.Pq CA
252management.
253.It Cm ciphers
254Cipher suite description determination.
255.It Cm crl
256Certificate Revocation List
257.Pq CRL
258management.
259.It Cm crl2pkcs7
260CRL to PKCS#7 conversion.
261.It Cm dgst
262Message digest calculation.
263.It Cm dh
264Diffie-Hellman parameter management.
265Obsoleted by
266.Cm dhparam .
267.It Cm dhparam
268Generation and management of Diffie-Hellman parameters.
269Superseded by
270.Cm genpkey
271and
272.Cm pkeyparam .
273.It Cm dsa
274DSA data management.
275.It Cm dsaparam
276DSA parameter generation and management.
277Superseded by
278.Cm genpkey
279and
280.Cm pkeyparam .
281.It Cm ec
282Elliptic curve (EC) key processing.
283.It Cm ecparam
284EC parameter manipulation and generation.
285.It Cm enc
286Encoding with ciphers.
287.It Cm errstr
288Error number to error string conversion.
289.It Cm gendh
290Generation of Diffie-Hellman parameters.
291Obsoleted by
292.Cm dhparam .
293.It Cm gendsa
294Generation of DSA private key from parameters.
295Superseded by
296.Cm genpkey
297and
298.Cm pkey .
299.It Cm genpkey
300Generation of private keys or parameters.
301.It Cm genrsa
302Generation of RSA private key.
303Superseded by
304.Cm genpkey .
305.It Cm nseq
306Create or examine a Netscape certificate sequence.
307.It Cm ocsp
308Online Certificate Status Protocol utility.
309.It Cm passwd
310Generation of hashed passwords.
311.It Cm pkcs7
312PKCS#7 data management.
313.It Cm pkcs8
314PKCS#8 data management.
315.It Cm pkcs12
316PKCS#12 data management.
317.It Cm pkey
318Public and private key management.
319.It Cm pkeyparam
320Public key algorithm parameter management.
321.It Cm pkeyutl
322Public key algorithm cryptographic operation utility.
323.It Cm prime
324Generate prime numbers or test numbers for primality.
325.It Cm rand
326Generate pseudo-random bytes.
327.It Cm req
328PKCS#10 X.509 Certificate Signing Request
329.Pq CSR
330management.
331.It Cm rsa
332RSA key management.
333.It Cm rsautl
334RSA utility for signing, verification, encryption, and decryption.
335Superseded by
336.Cm pkeyutl .
337.It Cm s_client
338This implements a generic SSL/TLS client which can establish a transparent
339connection to a remote server speaking SSL/TLS.
340It's intended for testing purposes only and provides only rudimentary
341interface functionality but internally uses mostly all functionality of the
342.Nm OpenSSL
343.Em ssl
344library.
345.It Cm s_server
346This implements a generic SSL/TLS server which accepts connections from remote
347clients speaking SSL/TLS.
348It's intended for testing purposes only and provides only rudimentary
349interface functionality but internally uses mostly all functionality of the
350.Nm OpenSSL
351.Em ssl
352library.
353It provides both an own command line oriented protocol for testing
354SSL functions and a simple HTTP response
355facility to emulate an SSL/TLS-aware webserver.
356.It Cm s_time
357SSL connection timer.
358.It Cm sess_id
359SSL session data management.
360.It Cm smime
361S/MIME mail processing.
362.It Cm speed
363Algorithm speed measurement.
364.It Cm spkac
365SPKAC printing and generating utility.
366.It Cm ts
367Time stamping authority tool (client/server).
368.It Cm verify
369X.509 certificate verification.
370.It Cm version
371.Nm OpenSSL
372version information.
373.It Cm x509
374X.509 certificate data management.
375.El
376.Sh MESSAGE DIGEST COMMANDS
377.Bl -tag -width "streebog512"
378.It Cm gost-mac
379GOST-MAC digest.
380.It Cm streebog256
381Streebog-256 digest.
382.It Cm streebog512
383Streebog-512 digest.
384.It Cm md_gost94
385GOST R 34.11-94 digest.
386.It Cm md4
387MD4 digest.
388.It Cm md5
389MD5 digest.
390.It Cm ripemd160
391RIPEMD-160 digest.
392.It Cm sha
393SHA digest.
394.It Cm sha1
395SHA-1 digest.
396.It Cm sha224
397SHA-224 digest.
398.It Cm sha256
399SHA-256 digest.
400.It Cm sha384
401SHA-384 digest.
402.It Cm sha512
403SHA-512 digest.
404.It Cm whirlpool
405Whirlpool digest.
406.El
407.Sh ENCODING AND CIPHER COMMANDS
408.Bl -tag -width Ds -compact
409.It Cm aes-128-cbc | aes-128-ecb | aes-192-cbc | aes-192-ecb
410.It Cm aes-256-cbc | aes-256-ecb
411AES cipher.
412.Pp
413.It Cm base64
414Base64 encoding.
415.Pp
416.It Xo
417.Cm bf | bf-cbc | bf-cfb |
418.Cm bf-ecb | bf-ofb
419.Xc
420Blowfish cipher.
421.Pp
422.It Cm cast | cast-cbc
423CAST cipher.
424.Pp
425.It Cm cast5-cbc | cast5-cfb | cast5-ecb | cast5-ofb
426CAST5 cipher.
427.Pp
428.It Xo
429.Cm des | des-cbc | des-cfb | des-ecb |
430.Cm des-ede | des-ede-cbc
431.Xc
432.It Cm des-ede-cfb | des-ede-ofb | des-ofb
433DES cipher.
434.Pp
435.It Xo
436.Cm des3 | desx | des-ede3 |
437.Cm des-ede3-cbc | des-ede3-cfb | des-ede3-ofb
438.Xc
439Triple DES cipher.
440.Pp
441.It Xo
442.Cm rc2 | rc2-40-cbc | rc2-64-cbc | rc2-cbc |
443.Cm rc2-cfb | rc2-ecb | rc2-ofb
444.Xc
445RC2 cipher.
446.Pp
447.It Cm rc4 | rc4-40
448RC4 cipher.
449.El
450.Sh PASS PHRASE ARGUMENTS
451Several commands accept password arguments, typically using
452.Fl passin
453and
454.Fl passout
455for input and output passwords, respectively.
456These allow the password to be obtained from a variety of sources.
457Both of these options take a single argument whose format is described below.
458If no password argument is given and a password is required,
459then the user is prompted to enter one:
460this will typically be read from the current terminal with echoing turned off.
461.Bl -tag -width "fd:number"
462.It Ar pass : Ns Ar password
463The actual password is
464.Ar password .
465Since the password is visible to utilities
466(like
467.Xr ps 1
468under
469.Ux )
470this form should only be used where security is not important.
471.It Ar env : Ns Ar var
472Obtain the password from the environment variable
473.Ar var .
474Since the environment of other processes is visible on certain platforms
475(e.g.\&
476.Xr ps 1
477under certain
478.Ux
479OSes) this option should be used with caution.
480.It Ar file : Ns Ar path
481The first line of
482.Ar path
483is the password.
484If the same
485.Ar path
486argument is supplied to
487.Fl passin
488and
489.Fl passout ,
490then the first line will be used for the input password and the next line
491for the output password.
492.Ar path
493need not refer to a regular file:
494it could, for example, refer to a device or named pipe.
495.It Ar fd : Ns Ar number
496Read the password from the file descriptor
497.Ar number .
498This can be used to send the data via a pipe for example.
499.It Ar stdin
500Read the password from standard input.
501.El
502.\" 210.\"
503.\" ASN1PARSE 211.\" ASN1PARSE
504.\" 212.\"
@@ -844,11 +552,6 @@ serial number in hex with
844appended. 552appended.
845.It Fl passin Ar arg 553.It Fl passin Ar arg
846The key password source. 554The key password source.
847For more information about the format of
848.Ar arg ,
849see the
850.Sx PASS PHRASE ARGUMENTS
851section above.
852.It Fl policy Ar arg 555.It Fl policy Ar arg
853This option defines the CA 556This option defines the CA
854.Qq policy 557.Qq policy
@@ -1875,11 +1578,6 @@ Key length must conform to any restrictions of the MAC algorithm.
1875The file to output to, or standard output by default. 1578The file to output to, or standard output by default.
1876.It Fl passin Ar arg 1579.It Fl passin Ar arg
1877The key password source. 1580The key password source.
1878For more information about the format of
1879.Ar arg ,
1880see the
1881.Sx PASS PHRASE ARGUMENTS
1882section above.
1883.It Fl prverify Ar file 1581.It Fl prverify Ar file
1884Verify the signature using the private key in 1582Verify the signature using the private key in
1885.Ar file . 1583.Ar file .
@@ -2165,18 +1863,8 @@ This specifies the output format; the options have the same meaning as the
2165option. 1863option.
2166.It Fl passin Ar arg 1864.It Fl passin Ar arg
2167The key password source. 1865The key password source.
2168For more information about the format of
2169.Ar arg ,
2170see the
2171.Sx PASS PHRASE ARGUMENTS
2172section above.
2173.It Fl passout Ar arg 1866.It Fl passout Ar arg
2174The output file password source. 1867The output file password source.
2175For more information about the format of
2176.Ar arg ,
2177see the
2178.Sx PASS PHRASE ARGUMENTS
2179section above.
2180.It Fl pubin 1868.It Fl pubin
2181By default, a private key is read from the input file. 1869By default, a private key is read from the input file.
2182With this option a public key is read instead. 1870With this option a public key is read instead.
@@ -2425,18 +2113,8 @@ is currently not implemented in
2425.Nm OpenSSL . 2113.Nm OpenSSL .
2426.It Fl passin Ar arg 2114.It Fl passin Ar arg
2427The key password source. 2115The key password source.
2428For more information about the format of
2429.Ar arg ,
2430see the
2431.Sx PASS PHRASE ARGUMENTS
2432section above.
2433.It Fl passout Ar arg 2116.It Fl passout Ar arg
2434The output file password source. 2117The output file password source.
2435For more information about the format of
2436.Ar arg ,
2437see the
2438.Sx PASS PHRASE ARGUMENTS
2439section above.
2440.It Fl pubin 2118.It Fl pubin
2441By default a private key is read from the input file; 2119By default a private key is read from the input file;
2442with this option a public key is read instead. 2120with this option a public key is read instead.
@@ -2819,11 +2497,6 @@ and
2819used. 2497used.
2820.It Fl pass Ar arg 2498.It Fl pass Ar arg
2821The password source. 2499The password source.
2822For more information about the format of
2823.Ar arg ,
2824see the
2825.Sx PASS PHRASE ARGUMENTS
2826section above.
2827.It Fl S Ar salt 2500.It Fl S Ar salt
2828The actual 2501The actual
2829.Ar salt 2502.Ar salt
@@ -3154,11 +2827,6 @@ and
3154are mutually exclusive. 2827are mutually exclusive.
3155.It Fl pass Ar arg 2828.It Fl pass Ar arg
3156The output file password source. 2829The output file password source.
3157For more information about the format of
3158.Ar arg ,
3159see the
3160.Sx PASS PHRASE ARGUMENTS
3161section above.
3162.It Fl pkeyopt Ar opt : Ns Ar value 2830.It Fl pkeyopt Ar opt : Ns Ar value
3163Set the public key algorithm option 2831Set the public key algorithm option
3164.Ar opt 2832.Ar opt
@@ -3288,11 +2956,6 @@ The output
3288If this argument is not specified, standard output is used. 2956If this argument is not specified, standard output is used.
3289.It Fl passout Ar arg 2957.It Fl passout Ar arg
3290The output file password source. 2958The output file password source.
3291For more information about the format of
3292.Ar arg ,
3293see the
3294.Sx PASS PHRASE ARGUMENTS
3295section above.
3296.It Ar numbits 2959.It Ar numbits
3297The size of the private key to generate in bits. 2960The size of the private key to generate in bits.
3298This must be the last option specified. 2961This must be the last option specified.
@@ -4122,18 +3785,8 @@ This specifies the output format; the options have the same meaning as the
4122option. 3785option.
4123.It Fl passin Ar arg 3786.It Fl passin Ar arg
4124The key password source. 3787The key password source.
4125For more information about the format of
4126.Ar arg ,
4127see the
4128.Sx PASS PHRASE ARGUMENTS
4129section above.
4130.It Fl passout Ar arg 3788.It Fl passout Ar arg
4131The output file password source. 3789The output file password source.
4132For more information about the format of
4133.Ar arg ,
4134see the
4135.Sx PASS PHRASE ARGUMENTS
4136section above.
4137.It Fl topk8 3790.It Fl topk8
4138Normally, a PKCS#8 private key is expected on input and a traditional format 3791Normally, a PKCS#8 private key is expected on input and a traditional format
4139private key will be written. 3792private key will be written.
@@ -4372,18 +4025,8 @@ to write certificates and private keys to, standard output by default.
4372They are all written in PEM format. 4025They are all written in PEM format.
4373.It Fl passin Ar arg 4026.It Fl passin Ar arg
4374The key password source. 4027The key password source.
4375For more information about the format of
4376.Ar arg ,
4377see the
4378.Sx PASS PHRASE ARGUMENTS
4379section above.
4380.It Fl passout Ar arg 4028.It Fl passout Ar arg
4381The output file password source. 4029The output file password source.
4382For more information about the format of
4383.Ar arg ,
4384see the
4385.Sx PASS PHRASE ARGUMENTS
4386section above.
4387.It Fl twopass 4030.It Fl twopass
4388Prompt for separate integrity and encryption passwords: most software 4031Prompt for separate integrity and encryption passwords: most software
4389always assumes these are the same so this option will render such 4032always assumes these are the same so this option will render such
@@ -4506,18 +4149,8 @@ to write the PKCS#12 file to.
4506Standard output is used by default. 4149Standard output is used by default.
4507.It Fl passin Ar arg 4150.It Fl passin Ar arg
4508The key password source. 4151The key password source.
4509For more information about the format of
4510.Ar arg ,
4511see the
4512.Sx PASS PHRASE ARGUMENTS
4513section above.
4514.It Fl passout Ar arg 4152.It Fl passout Ar arg
4515The output file password source. 4153The output file password source.
4516For more information about the format of
4517.Ar arg ,
4518see the
4519.Sx PASS PHRASE ARGUMENTS
4520section above.
4521.El 4154.El
4522.Sh PKCS12 NOTES 4155.Sh PKCS12 NOTES
4523Although there are a large number of options, 4156Although there are a large number of options,
@@ -4693,18 +4326,8 @@ the options have the same meaning as the
4693option. 4326option.
4694.It Fl passin Ar arg 4327.It Fl passin Ar arg
4695The key password source. 4328The key password source.
4696For more information about the format of
4697.Ar arg ,
4698see the
4699.Sx PASS PHRASE ARGUMENTS
4700section above.
4701.It Fl passout Ar arg 4329.It Fl passout Ar arg
4702The output file password source. 4330The output file password source.
4703For more information about the format of
4704.Ar arg
4705see the
4706.Sx PASS PHRASE ARGUMENTS
4707section above.
4708.It Fl pubin 4331.It Fl pubin
4709By default a private key is read from the input file: 4332By default a private key is read from the input file:
4710with this option a public key is read instead. 4333with this option a public key is read instead.
@@ -4855,11 +4478,6 @@ Specify the output filename to write to,
4855or standard output by default. 4478or standard output by default.
4856.It Fl passin Ar arg 4479.It Fl passin Ar arg
4857The key password source. 4480The key password source.
4858For more information about the format of
4859.Ar arg ,
4860see the
4861.Sx PASS PHRASE ARGUMENTS
4862section above.
4863.It Fl peerform Ar DER | PEM 4481.It Fl peerform Ar DER | PEM
4864The peer key format DER or PEM. 4482The peer key format DER or PEM.
4865.It Fl peerkey Ar file 4483.It Fl peerkey Ar file
@@ -5293,18 +4911,8 @@ This specifies the output format; the options have the same meaning as the
5293option. 4911option.
5294.It Fl passin Ar arg 4912.It Fl passin Ar arg
5295The key password source. 4913The key password source.
5296For more information about the format of
5297.Ar arg ,
5298see the
5299.Sx PASS PHRASE ARGUMENTS
5300section above.
5301.It Fl passout Ar arg 4914.It Fl passout Ar arg
5302The output file password source. 4915The output file password source.
5303For more information about the format of
5304.Ar arg ,
5305see the
5306.Sx PASS PHRASE ARGUMENTS
5307section above.
5308.It Fl pubkey 4916.It Fl pubkey
5309Outputs the public key. 4917Outputs the public key.
5310.It Fl reqopt Ar option 4918.It Fl reqopt Ar option
@@ -5904,18 +5512,8 @@ This specifies the output format; the options have the same meaning as the
5904option. 5512option.
5905.It Fl passin Ar arg 5513.It Fl passin Ar arg
5906The key password source. 5514The key password source.
5907For more information about the format of
5908.Ar arg ,
5909see the
5910.Sx PASS PHRASE ARGUMENTS
5911section above.
5912.It Fl passout Ar arg 5515.It Fl passout Ar arg
5913The output file password source. 5516The output file password source.
5914For more information about the format of
5915.Ar arg ,
5916see the
5917.Sx PASS PHRASE ARGUMENTS
5918section above.
5919.It Fl pubin 5517.It Fl pubin
5920By default, a private key is read from the input file; with this 5518By default, a private key is read from the input file; with this
5921option a public key is read instead. 5519option a public key is read instead.
@@ -7384,11 +6982,6 @@ or
7384this option has no effect. 6982this option has no effect.
7385.It Fl passin Ar arg 6983.It Fl passin Ar arg
7386The key password source. 6984The key password source.
7387For more information about the format of
7388.Ar arg ,
7389see the
7390.Sx PASS PHRASE ARGUMENTS
7391section above.
7392.It Fl recip Ar file 6985.It Fl recip Ar file
7393The recipients certificate when decrypting a message. 6986The recipients certificate when decrypting a message.
7394This certificate 6987This certificate
@@ -7922,11 +7515,6 @@ and
7922The default is stdout. 7515The default is stdout.
7923.It Fl passin Ar arg 7516.It Fl passin Ar arg
7924The key password source. 7517The key password source.
7925For more information about the format of
7926.Ar arg ,
7927see the
7928.Sx PASS PHRASE ARGUMENTS
7929section above.
7930.It Fl policy Ar object_id 7518.It Fl policy Ar object_id
7931The default policy to use for the response unless the client 7519The default policy to use for the response unless the client
7932explicitly requires a particular TSA policy. 7520explicitly requires a particular TSA policy.
@@ -8348,11 +7936,6 @@ Specifies the output
8348to write to, or standard output by default. 7936to write to, or standard output by default.
8349.It Fl passin Ar arg 7937.It Fl passin Ar arg
8350The key password source. 7938The key password source.
8351For more information about the format of
8352.Ar arg ,
8353see the
8354.Sx PASS PHRASE ARGUMENTS
8355section above.
8356.It Fl pubkey 7939.It Fl pubkey
8357Output the public key of an SPKAC 7940Output the public key of an SPKAC
8358.Pq not used if an SPKAC is being created . 7941.Pq not used if an SPKAC is being created .
@@ -8940,11 +8523,6 @@ This specifies the output format; the options have the same meaning as the
8940option. 8523option.
8941.It Fl passin Ar arg 8524.It Fl passin Ar arg
8942The key password source. 8525The key password source.
8943For more information about the format of
8944.Ar arg ,
8945see the
8946.Sx PASS PHRASE ARGUMENTS
8947section above.
8948.El 8526.El
8949.Sh X509 DISPLAY OPTIONS 8527.Sh X509 DISPLAY OPTIONS
8950.Sy Note : 8528.Sy Note :
@@ -9803,6 +9381,58 @@ This means that any directories using the old form
9803must have their links rebuilt using 9381must have their links rebuilt using
9804.Ar c_rehash 9382.Ar c_rehash
9805or similar. 9383or similar.
9384.Sh NOTES
9385Several commands accept password arguments, typically using
9386.Fl passin
9387and
9388.Fl passout
9389for input and output passwords, respectively.
9390These allow the password to be obtained from a variety of sources.
9391Both of these options take a single argument whose format is described below.
9392If no password argument is given and a password is required,
9393then the user is prompted to enter one:
9394this will typically be read from the current terminal with echoing turned off.
9395.Bl -tag -width "fd:number"
9396.It Ar pass : Ns Ar password
9397The actual password is
9398.Ar password .
9399Since the password is visible to utilities
9400(like
9401.Xr ps 1
9402under
9403.Ux )
9404this form should only be used where security is not important.
9405.It Ar env : Ns Ar var
9406Obtain the password from the environment variable
9407.Ar var .
9408Since the environment of other processes is visible on certain platforms
9409(e.g.\&
9410.Xr ps 1
9411under certain
9412.Ux
9413OSes) this option should be used with caution.
9414.It Ar file : Ns Ar path
9415The first line of
9416.Ar path
9417is the password.
9418If the same
9419.Ar path
9420argument is supplied to
9421.Fl passin
9422and
9423.Fl passout ,
9424then the first line will be used for the input password and the next line
9425for the output password.
9426.Ar path
9427need not refer to a regular file:
9428it could, for example, refer to a device or named pipe.
9429.It Ar fd : Ns Ar number
9430Read the password from the file descriptor
9431.Ar number .
9432This can be used to send the data via a pipe for example.
9433.It Ar stdin
9434Read the password from standard input.
9435.El
9806.\" 9436.\"
9807.\" FILES 9437.\" FILES
9808.\" 9438.\"