diff options
author | jmc <> | 2003-10-22 16:05:06 +0000 |
---|---|---|
committer | jmc <> | 2003-10-22 16:05:06 +0000 |
commit | 21155d355a017a5944ad5021c96db75ed391d2b6 (patch) | |
tree | 94d11c472337ef321a3e210b9b37744cb33ff57a | |
parent | b11a92fd88ced12b88d3eead4558371673708169 (diff) | |
download | openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.gz openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.bz2 openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.zip |
- slight update and sort options for CA section
- remove some unnecessary .Ns's
- typos
-rw-r--r-- | src/usr.sbin/openssl/openssl.1 | 534 |
1 files changed, 267 insertions, 267 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1 index dc60a2857a..cd6ba71ffa 100644 --- a/src/usr.sbin/openssl/openssl.1 +++ b/src/usr.sbin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.17 2003/10/08 08:37:50 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.18 2003/10/22 16:05:06 jmc Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -592,45 +592,45 @@ The output of some ASN.1 types is not well handled | |||
592 | .Sh CA | 592 | .Sh CA |
593 | .Nm openssl ca | 593 | .Nm openssl ca |
594 | .Bk -words | 594 | .Bk -words |
595 | .Op Fl batch | ||
596 | .Op Fl gencrl | ||
597 | .Op Fl infiles | ||
598 | .Op Fl msie_hack | ||
599 | .Op Fl noemailDN | ||
600 | .Op Fl notext | ||
601 | .Op Fl preserveDN | ||
602 | .Op Fl updatedb | ||
595 | .Op Fl verbose | 603 | .Op Fl verbose |
604 | .Op Fl cert Ar file | ||
596 | .Op Fl config Ar filename | 605 | .Op Fl config Ar filename |
597 | .Op Fl name Ar section | ||
598 | .Op Fl gencrl | ||
599 | .Op Fl revoke Ar file | ||
600 | .Op Fl crl_reason Ar reason | ||
601 | .Op Fl crl_hold Ar instruction | ||
602 | .Op Fl crl_compromise Ar time | ||
603 | .Op Fl crl_CA_compromise Ar time | 606 | .Op Fl crl_CA_compromise Ar time |
604 | .Op Fl subj Ar arg | 607 | .Op Fl crl_compromise Ar time |
608 | .Op Fl crl_hold Ar instruction | ||
609 | .Op Fl crl_reason Ar reason | ||
605 | .Op Fl crldays Ar days | 610 | .Op Fl crldays Ar days |
606 | .Op Fl crlhours Ar hours | ||
607 | .Op Fl crlexts Ar section | 611 | .Op Fl crlexts Ar section |
608 | .Op Fl startdate Ar date | 612 | .Op Fl crlhours Ar hours |
609 | .Op Fl enddate Ar date | ||
610 | .Op Fl days Ar arg | 613 | .Op Fl days Ar arg |
611 | .Op Fl md Ar arg | 614 | .Op Fl enddate Ar date |
612 | .Op Fl policy Ar arg | 615 | .Op Fl engine Ar id |
616 | .Op Fl extensions Ar section | ||
617 | .Op Fl extfile Ar section | ||
618 | .Op Fl in Ar file | ||
619 | .Op Fl key Ar arg | ||
613 | .Op Fl keyfile Ar arg | 620 | .Op Fl keyfile Ar arg |
614 | .Op Fl keyform Ar PEM | ENGINE | 621 | .Op Fl keyform Ar PEM | ENGINE |
615 | .Op Fl key Ar arg | 622 | .Op Fl md Ar arg |
616 | .Op Fl passin Ar arg | 623 | .Op Fl name Ar section |
617 | .Op Fl cert Ar file | ||
618 | .Op Fl in Ar file | ||
619 | .Op Fl out Ar file | 624 | .Op Fl out Ar file |
620 | .Op Fl notext | ||
621 | .Op Fl outdir Ar dir | 625 | .Op Fl outdir Ar dir |
622 | .Op Fl infiles | 626 | .Op Fl passin Ar arg |
627 | .Op Fl policy Ar arg | ||
628 | .Op Fl revoke Ar file | ||
623 | .Op Fl spkac Ar file | 629 | .Op Fl spkac Ar file |
624 | .Op Fl ss_cert Ar file | 630 | .Op Fl ss_cert Ar file |
625 | .Op Fl preserveDN | 631 | .Op Fl startdate Ar date |
626 | .Op Fl noemailDN | ||
627 | .Op Fl batch | ||
628 | .Op Fl msie_hack | ||
629 | .Op Fl extensions Ar section | ||
630 | .Op Fl extfile Ar section | ||
631 | .Op Fl status Ar serial | 632 | .Op Fl status Ar serial |
632 | .Op Fl updatedb | 633 | .Op Fl subj Ar arg |
633 | .Op Fl engine Ar id | ||
634 | .Ek | 634 | .Ek |
635 | .Pp | 635 | .Pp |
636 | The | 636 | The |
@@ -643,49 +643,53 @@ It also maintains a text database of issued certificates and their status. | |||
643 | The options descriptions will be divided into each purpose. | 643 | The options descriptions will be divided into each purpose. |
644 | .Sh CA OPTIONS | 644 | .Sh CA OPTIONS |
645 | .Bl -tag -width "XXXX" | 645 | .Bl -tag -width "XXXX" |
646 | .It Fl batch | ||
647 | This sets the batch mode. | ||
648 | In this mode no questions will be asked | ||
649 | and all certificates will be certified automatically. | ||
650 | .It Fl cert Ar file | ||
651 | The CA certificate file. | ||
646 | .It Fl config Ar filename | 652 | .It Fl config Ar filename |
647 | Specifies the configuration file to use. | 653 | Specifies the configuration file to use. |
648 | .It Fl name Ar section | 654 | .It Fl days Ar arg |
649 | Specifies the configuration file | 655 | The number of days to certify the certificate for. |
650 | .Ar section | 656 | .It Fl enddate Ar date |
651 | to use (overrides | 657 | This allows the expiry date to be explicitly set. |
652 | .Cm default_ca | 658 | The format of the date is YYMMDDHHMMSSZ |
653 | in the | 659 | .Pq the same as an ASN1 UTCTime structure . |
654 | .Cm ca | 660 | .It Fl engine Ar id |
655 | section). | 661 | Specifying an engine (by it's unique |
662 | .Ar id | ||
663 | string) will cause | ||
664 | .Nm ca | ||
665 | to attempt to obtain a functional reference to the specified engine, | ||
666 | thus initialising it if needed. | ||
667 | The engine will then be set as the default for all available algorithms. | ||
668 | .It Fl extensions Ar section | ||
669 | The section of the configuration file containing certificate extensions | ||
670 | to be added when a certificate is issued (defaults to | ||
671 | .Em x509_extensions | ||
672 | unless the | ||
673 | .Fl extfile | ||
674 | option is used). | ||
675 | If no extension section is present, then a V1 certificate is created. | ||
676 | If the extension section is present | ||
677 | .Pq even if it is empty , | ||
678 | then a V3 certificate is created. | ||
679 | .It Fl extfile Ar file | ||
680 | An additional configuration | ||
681 | .Ar file | ||
682 | to read certificate extensions from | ||
683 | (using the default section unless the | ||
684 | .Fl extensions | ||
685 | option is also used). | ||
656 | .It Fl in Ar filename | 686 | .It Fl in Ar filename |
657 | An input | 687 | An input |
658 | .Ar filename | 688 | .Ar filename |
659 | containing a single certificate request to be signed by the CA. | 689 | containing a single certificate request to be signed by the CA. |
660 | .It Fl ss_cert Ar filename | ||
661 | A single self-signed certificate to be signed by the CA. | ||
662 | .It Fl spkac Ar filename | ||
663 | A file containing a single Netscape signed public key and challenge, | ||
664 | and additional field values to be signed by the CA. | ||
665 | See the | ||
666 | .Sx SPKAC FORMAT | ||
667 | section for information on the required format. | ||
668 | .It Fl infiles | 690 | .It Fl infiles |
669 | If present, this should be the last option; all subsequent arguments | 691 | If present, this should be the last option; all subsequent arguments |
670 | are assumed to be the names of files containing certificate requests. | 692 | are assumed to be the names of files containing certificate requests. |
671 | .It Fl out Ar filename | ||
672 | The output file to output certificates to. | ||
673 | The default is standard output. | ||
674 | The certificate details will also be printed out to this file. | ||
675 | .It Fl outdir Ar directory | ||
676 | The | ||
677 | .Ar directory | ||
678 | to output certificates to. | ||
679 | The certificate will be written to a filename consisting of the | ||
680 | serial number in hex with | ||
681 | .Qq .pem | ||
682 | appended. | ||
683 | .It Fl cert | ||
684 | The CA certificate file. | ||
685 | .It Fl keyfile Ar filename | ||
686 | The private key to sign requests with. | ||
687 | .It Fl keyform Ar PEM | ENGINE | ||
688 | Private key file format. | ||
689 | .It Fl key Ar password | 693 | .It Fl key Ar password |
690 | The password used to encrypt the private key. | 694 | The password used to encrypt the private key. |
691 | Since on some systems the command line arguments are visible | 695 | Since on some systems the command line arguments are visible |
@@ -694,27 +698,10 @@ Since on some systems the command line arguments are visible | |||
694 | with the | 698 | with the |
695 | .Xr ps 1 | 699 | .Xr ps 1 |
696 | utility) this option should be used with caution. | 700 | utility) this option should be used with caution. |
697 | .It Fl passin Ar arg | 701 | .It Fl keyfile Ar filename |
698 | The key password source. | 702 | The private key to sign requests with. |
699 | For more information about the format of | 703 | .It Fl keyform Ar PEM | ENGINE |
700 | .Ar arg , | 704 | Private key file format. |
701 | see the | ||
702 | .Sx PASS PHRASE ARGUMENTS | ||
703 | section above. | ||
704 | .It Fl verbose | ||
705 | This prints extra details about the operations being performed. | ||
706 | .It Fl notext | ||
707 | Don't output the text form of a certificate to the output file. | ||
708 | .It Fl startdate Ar date | ||
709 | This allows the start date to be explicitly set. | ||
710 | The format of the date is YYMMDDHHMMSSZ | ||
711 | .Pq the same as an ASN1 UTCTime structure . | ||
712 | .It Fl enddate Ar date | ||
713 | This allows the expiry date to be explicitly set. | ||
714 | The format of the date is YYMMDDHHMMSSZ | ||
715 | .Pq the same as an ASN1 UTCTime structure . | ||
716 | .It Fl days Ar arg | ||
717 | The number of days to certify the certificate for. | ||
718 | .It Fl md Ar alg | 705 | .It Fl md Ar alg |
719 | The message digest to use. | 706 | The message digest to use. |
720 | Possible values include | 707 | Possible values include |
@@ -722,15 +709,6 @@ Possible values include | |||
722 | and | 709 | and |
723 | .Ar sha1 . | 710 | .Ar sha1 . |
724 | This option also applies to CRLs. | 711 | This option also applies to CRLs. |
725 | .It Fl policy Ar arg | ||
726 | This option defines the CA | ||
727 | .Qq policy | ||
728 | to use. | ||
729 | This is a section in the configuration file which decides which fields | ||
730 | should be mandatory or match the CA certificate. | ||
731 | Check out the | ||
732 | .Sx CA POLICY FORMAT | ||
733 | section for more information. | ||
734 | .It Fl msie_hack | 712 | .It Fl msie_hack |
735 | This is a legacy option to make | 713 | This is a legacy option to make |
736 | .Nm ca | 714 | .Nm ca |
@@ -742,14 +720,14 @@ its use is strongly discouraged. | |||
742 | The newer control | 720 | The newer control |
743 | .Qq Xenroll | 721 | .Qq Xenroll |
744 | does not need this option. | 722 | does not need this option. |
745 | .It Fl preserveDN | 723 | .It Fl name Ar section |
746 | Normally, the DN order of a certificate is the same as the order of the | 724 | Specifies the configuration file |
747 | fields in the relevant policy section. | 725 | .Ar section |
748 | When this option is set, the order is the same as the request. | 726 | to use (overrides |
749 | This is largely for compatibility with the older IE enrollment control | 727 | .Cm default_ca |
750 | which would only accept certificates if their DNs matched the order of the | 728 | in the |
751 | request. | 729 | .Cm ca |
752 | This is not needed for Xenroll. | 730 | section). |
753 | .It Fl noemailDN | 731 | .It Fl noemailDN |
754 | The DN of a certificate can contain the EMAIL field if present in the | 732 | The DN of a certificate can contain the EMAIL field if present in the |
755 | request DN, however it is good policy just having the e-mail set into | 733 | request DN, however it is good policy just having the e-mail set into |
@@ -761,57 +739,83 @@ subject and set only in the, eventually present, extensions. | |||
761 | The | 739 | The |
762 | .Ar email_in_dn | 740 | .Ar email_in_dn |
763 | keyword can be used in the configuration file to enable this behaviour. | 741 | keyword can be used in the configuration file to enable this behaviour. |
764 | .It Fl batch | 742 | .It Fl notext |
765 | This sets the batch mode. | 743 | Don't output the text form of a certificate to the output file. |
766 | In this mode no questions will be asked | 744 | .It Fl out Ar filename |
767 | and all certificates will be certified automatically. | 745 | The output file to output certificates to. |
768 | .It Fl extensions Ar section | 746 | The default is standard output. |
769 | The section of the configuration file containing certificate extensions | 747 | The certificate details will also be printed out to this file. |
770 | to be added when a certificate is issued (defaults to | 748 | .It Fl outdir Ar directory |
771 | .Em x509_extensions | 749 | The |
772 | unless the | 750 | .Ar directory |
773 | .Fl extfile | 751 | to output certificates to. |
774 | option is used). | 752 | The certificate will be written to a filename consisting of the |
775 | If no extension section is present, then a V1 certificate is created. | 753 | serial number in hex with |
776 | If the extension section is present | 754 | .Qq .pem |
777 | .Pq even if it is empty , | 755 | appended. |
778 | then a V3 certificate is created. | 756 | .It Fl passin Ar arg |
779 | .It Fl extfile Ar file | 757 | The key password source. |
780 | An additional configuration | 758 | For more information about the format of |
781 | .Ar file | 759 | .Ar arg , |
782 | to read certificate extensions from | 760 | see the |
783 | (using the default section unless the | 761 | .Sx PASS PHRASE ARGUMENTS |
784 | .Fl extensions | 762 | section above. |
785 | option is also used). | 763 | .It Fl policy Ar arg |
764 | This option defines the CA | ||
765 | .Qq policy | ||
766 | to use. | ||
767 | This is a section in the configuration file which decides which fields | ||
768 | should be mandatory or match the CA certificate. | ||
769 | Check out the | ||
770 | .Sx CA POLICY FORMAT | ||
771 | section for more information. | ||
772 | .It Fl preserveDN | ||
773 | Normally, the DN order of a certificate is the same as the order of the | ||
774 | fields in the relevant policy section. | ||
775 | When this option is set, the order is the same as the request. | ||
776 | This is largely for compatibility with the older IE enrollment control | ||
777 | which would only accept certificates if their DNs matched the order of the | ||
778 | request. | ||
779 | This is not needed for Xenroll. | ||
780 | .It Fl spkac Ar filename | ||
781 | A file containing a single Netscape signed public key and challenge, | ||
782 | and additional field values to be signed by the CA. | ||
783 | See the | ||
784 | .Sx SPKAC FORMAT | ||
785 | section for information on the required format. | ||
786 | .It Fl ss_cert Ar filename | ||
787 | A single self-signed certificate to be signed by the CA. | ||
788 | .It Fl startdate Ar date | ||
789 | This allows the start date to be explicitly set. | ||
790 | The format of the date is YYMMDDHHMMSSZ | ||
791 | .Pq the same as an ASN1 UTCTime structure . | ||
786 | .It Fl status Ar serial | 792 | .It Fl status Ar serial |
787 | Show status of certificate with serial number | 793 | Show status of certificate with serial number |
788 | .Ar serial . | 794 | .Ar serial . |
789 | .It Fl updatedb | 795 | .It Fl updatedb |
790 | Update database for expired certificates. | 796 | Update database for expired certificates. |
791 | .It Fl engine Ar id | 797 | .It Fl verbose |
792 | Specifying an engine (by it's unique | 798 | This prints extra details about the operations being performed. |
793 | .Ar id | ||
794 | string) will cause | ||
795 | .Nm ca | ||
796 | to attempt to obtain a functional reference to the specified engine, | ||
797 | thus initialising it if needed. | ||
798 | The engine will then be set as the default for all available algorithms. | ||
799 | .El | 799 | .El |
800 | .Sh CRL OPTIONS | 800 | .Sh CRL OPTIONS |
801 | .Bl -tag -width "XXXX" | 801 | .Bl -tag -width "XXXX" |
802 | .It Fl gencrl | 802 | .It Fl crl_CA_compromise Ar time |
803 | This option generates a CRL based on information in the index file. | 803 | This is the same as |
804 | .It Fl crldays Ar num | 804 | .Fl crl_compromise , |
805 | The number of days before the next CRL is due. | 805 | except the revocation reason is set to CACompromise. |
806 | This is the days from now to place in the CRL | 806 | .It Fl crl_compromise Ar time |
807 | .Em nextUpdate | 807 | This sets the revocation reason to keyCompromise and the compromise time to |
808 | field. | 808 | .Ar time . |
809 | .It Fl crlhours Ar num | 809 | .Ar time |
810 | The number of hours before the next CRL is due. | 810 | should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ. |
811 | .It Fl revoke Ar filename | 811 | .It Fl crl_hold Ar instruction |
812 | A | 812 | This sets the CRL revocation reason code to certificateHold and the hold |
813 | .Ar filename | 813 | instruction to |
814 | containing a certificate to revoke. | 814 | .Ar instruction |
815 | which must be an OID. | ||
816 | Although any OID can be used, only holdInstructionNone | ||
817 | (the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or | ||
818 | holdInstructionReject will normally be used. | ||
815 | .It Fl crl_reason Ar reason | 819 | .It Fl crl_reason Ar reason |
816 | Revocation reason, where | 820 | Revocation reason, where |
817 | .Ar reason | 821 | .Ar reason |
@@ -824,33 +828,11 @@ is case insensitive. | |||
824 | Setting any revocation reason will make the CRL v2. | 828 | Setting any revocation reason will make the CRL v2. |
825 | In practice, removeFromCRL is not particularly useful because it is only used | 829 | In practice, removeFromCRL is not particularly useful because it is only used |
826 | in delta CRLs which are not currently implemented. | 830 | in delta CRLs which are not currently implemented. |
827 | .It Fl crl_hold Ar instruction | 831 | .It Fl crldays Ar num |
828 | This sets the CRL revocation reason code to certificateHold and the hold | 832 | The number of days before the next CRL is due. |
829 | instruction to | 833 | This is the days from now to place in the CRL |
830 | .Ar instruction | 834 | .Em nextUpdate |
831 | which must be an OID. | 835 | field. |
832 | Although any OID can be used, only holdInstructionNone | ||
833 | (the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or | ||
834 | holdInstructionReject will normally be used. | ||
835 | .It Fl crl_compromise Ar time | ||
836 | This sets the revocation reason to keyCompromise and the compromise time to | ||
837 | .Ar time . | ||
838 | .Ar time | ||
839 | should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ. | ||
840 | .It Fl crl_CA_compromise Ar time | ||
841 | This is the same as | ||
842 | .Fl crl_compromise , | ||
843 | except the revocation reason is set to CACompromise. | ||
844 | .It Fl subj Ar arg | ||
845 | Supersedes the subject name given in the request. | ||
846 | The | ||
847 | .Ar arg | ||
848 | must be formatted as | ||
849 | .Ar /type0=value0/type1=value1/type2=... ; | ||
850 | characters may be escaped by | ||
851 | .Sq \e | ||
852 | .Pq backslash , | ||
853 | no spaces are skipped. | ||
854 | .It Fl crlexts Ar section | 836 | .It Fl crlexts Ar section |
855 | The | 837 | The |
856 | .Ar section | 838 | .Ar section |
@@ -865,6 +847,24 @@ CRL entry extensions. | |||
865 | It should be noted that some software | 847 | It should be noted that some software |
866 | .Pq for example Netscape | 848 | .Pq for example Netscape |
867 | can't handle V2 CRLs. | 849 | can't handle V2 CRLs. |
850 | .It Fl crlhours Ar num | ||
851 | The number of hours before the next CRL is due. | ||
852 | .It Fl gencrl | ||
853 | This option generates a CRL based on information in the index file. | ||
854 | .It Fl revoke Ar filename | ||
855 | A | ||
856 | .Ar filename | ||
857 | containing a certificate to revoke. | ||
858 | .It Fl subj Ar arg | ||
859 | Supersedes the subject name given in the request. | ||
860 | The | ||
861 | .Ar arg | ||
862 | must be formatted as | ||
863 | .Ar /type0=value0/type1=value1/type2=... ; | ||
864 | characters may be escaped by | ||
865 | .Sq \e | ||
866 | .Pq backslash , | ||
867 | no spaces are skipped. | ||
868 | .El | 868 | .El |
869 | .Sh CA CONFIGURATION FILE OPTIONS | 869 | .Sh CA CONFIGURATION FILE OPTIONS |
870 | The section of the configuration file containing options for | 870 | The section of the configuration file containing options for |
@@ -903,51 +903,52 @@ the configuration file or the command line equivalent | |||
903 | .Pq if any | 903 | .Pq if any |
904 | used. | 904 | used. |
905 | .Bl -tag -width "XXXX" | 905 | .Bl -tag -width "XXXX" |
906 | .It Ar oid_file | ||
907 | This specifies a file containing additional OBJECT IDENTIFIERS. | ||
908 | Each line of the file should consist of the numerical form of the | ||
909 | object identifier followed by whitespace, then the short name followed | ||
910 | by whitespace and finally the long name. | ||
911 | .It Ar oid_section | ||
912 | This specifies a section in the configuration file containing extra | ||
913 | object identifiers. | ||
914 | Each line should consist of the short name of the object identifier | ||
915 | followed by | ||
916 | .Sq = | ||
917 | and the numerical form. | ||
918 | The short and long names are the same when this option is used. | ||
919 | .It Ar new_certs_dir | ||
920 | The same as the | ||
921 | .Fl outdir | ||
922 | command line option. | ||
923 | It specifies the directory where new certificates will be placed. | ||
924 | Mandatory. | ||
925 | .It Ar certificate | 906 | .It Ar certificate |
926 | The same as | 907 | The same as |
927 | .Fl cert . | 908 | .Fl cert . |
928 | It gives the file containing the CA certificate. | 909 | It gives the file containing the CA certificate. |
929 | Mandatory. | 910 | Mandatory. |
930 | .It Ar private_key | 911 | .It Ar copy_extensions |
931 | Same as the | 912 | Determines how extensions in certificate requests should be handled. |
932 | .Fl keyfile | 913 | If set to |
933 | option. | 914 | .Ar none |
934 | The file containing the CA private key. | 915 | or this option is not present, then extensions are |
916 | ignored and not copied to the certificate. | ||
917 | If set to | ||
918 | .Ar copy , | ||
919 | then any extensions present in the request that are not already present | ||
920 | are copied to the certificate. | ||
921 | If set to | ||
922 | .Ar copyall , | ||
923 | then all extensions in the request are copied to the certificate: | ||
924 | if the extension is already present in the certificate it is deleted first. | ||
925 | See the | ||
926 | .Sx CA WARNINGS | ||
927 | section before using this option. | ||
928 | .Pp | ||
929 | The main use of this option is to allow a certificate request to supply | ||
930 | values for certain extensions such as | ||
931 | .Em subjectAltName . | ||
932 | .It Ar crl_extensions | ||
933 | The same as | ||
934 | .Fl crlexts . | ||
935 | .It Ar database | ||
936 | The text database file to use. | ||
935 | Mandatory. | 937 | Mandatory. |
936 | .It Ar RANDFILE | 938 | This file must be present, though initially it will be empty. |
937 | A file used to read and write random number seed information, | 939 | .It Ar default_crl_hours , default_crl_days |
938 | or an EGD socket (see | 940 | The same as the |
939 | .Xr RAND_egd 3 ) . | 941 | .Fl crlhours |
942 | and | ||
943 | .Fl crldays | ||
944 | options. | ||
945 | These will only be used if neither command line option is present. | ||
946 | At least one of these must be present to generate a CRL. | ||
940 | .It Ar default_days | 947 | .It Ar default_days |
941 | The same as the | 948 | The same as the |
942 | .Fl days | 949 | .Fl days |
943 | option. | 950 | option. |
944 | The number of days to certify a certificate for. | 951 | The number of days to certify a certificate for. |
945 | .It Ar default_startdate | ||
946 | The same as the | ||
947 | .Fl startdate | ||
948 | option. | ||
949 | The start date to certify a certificate for. | ||
950 | If not set, the current time is used. | ||
951 | .It Ar default_enddate | 952 | .It Ar default_enddate |
952 | The same as the | 953 | The same as the |
953 | .Fl enddate | 954 | .Fl enddate |
@@ -956,37 +957,18 @@ Either this option or | |||
956 | .Ar default_days | 957 | .Ar default_days |
957 | .Pq or the command line equivalents | 958 | .Pq or the command line equivalents |
958 | must be present. | 959 | must be present. |
959 | .It Ar default_crl_hours default_crl_days | ||
960 | The same as the | ||
961 | .Fl crlhours | ||
962 | and the | ||
963 | .Fl crldays | ||
964 | options. | ||
965 | These will only be used if neither command line option is present. | ||
966 | At least one of these must be present to generate a CRL. | ||
967 | .It Ar default_md | 960 | .It Ar default_md |
968 | The same as the | 961 | The same as the |
969 | .Fl md | 962 | .Fl md |
970 | option. | 963 | option. |
971 | The message digest to use. | 964 | The message digest to use. |
972 | Mandatory. | 965 | Mandatory. |
973 | .It Ar database | 966 | .It Ar default_startdate |
974 | The text database file to use. | 967 | The same as the |
975 | Mandatory. | 968 | .Fl startdate |
976 | This file must be present, though initially it will be empty. | 969 | option. |
977 | .It Ar serial | 970 | The start date to certify a certificate for. |
978 | A text file containing the next serial number to use in hex. | 971 | If not set, the current time is used. |
979 | Mandatory. | ||
980 | This file must be present and contain a valid serial number. | ||
981 | .It Ar x509_extensions | ||
982 | The same as | ||
983 | .Fl extensions . | ||
984 | .It Ar crl_extensions | ||
985 | the same as | ||
986 | .Fl crlexts . | ||
987 | .It Ar preserve | ||
988 | The same as | ||
989 | .Fl preserveDN . | ||
990 | .It Ar email_in_dn | 972 | .It Ar email_in_dn |
991 | The same as | 973 | The same as |
992 | .Fl noemailDN . | 974 | .Fl noemailDN . |
@@ -998,13 +980,6 @@ certificate's DN. | |||
998 | .It Ar msie_hack | 980 | .It Ar msie_hack |
999 | The same as | 981 | The same as |
1000 | .Fl msie_hack . | 982 | .Fl msie_hack . |
1001 | .It Ar policy | ||
1002 | The same as | ||
1003 | .Fl policy . | ||
1004 | Mandatory. | ||
1005 | See the | ||
1006 | .Sx CA POLICY FORMAT | ||
1007 | section for more information. | ||
1008 | .It Ar nameopt , certopt | 983 | .It Ar nameopt , certopt |
1009 | These options allow the format used to display the certificate details | 984 | These options allow the format used to display the certificate details |
1010 | when asking the user to confirm signing. | 985 | when asking the user to confirm signing. |
@@ -1035,27 +1010,52 @@ discouraged because it only displays fields mentioned in the | |||
1035 | .Ar policy | 1010 | .Ar policy |
1036 | section, | 1011 | section, |
1037 | mishandles multicharacter string types and does not display extensions. | 1012 | mishandles multicharacter string types and does not display extensions. |
1038 | .It Ar copy_extensions | 1013 | .It Ar new_certs_dir |
1039 | Determines how extensions in certificate requests should be handled. | 1014 | The same as the |
1040 | If set to | 1015 | .Fl outdir |
1041 | .Ar none | 1016 | command line option. |
1042 | or this option is not present, then extensions are | 1017 | It specifies the directory where new certificates will be placed. |
1043 | ignored and not copied to the certificate. | 1018 | Mandatory. |
1044 | If set to | 1019 | .It Ar oid_file |
1045 | .Ar copy , | 1020 | This specifies a file containing additional object identifiers. |
1046 | then any extensions present in the request that are not already present | 1021 | Each line of the file should consist of the numerical form of the |
1047 | are copied to the certificate. | 1022 | object identifier followed by whitespace, then the short name followed |
1048 | If set to | 1023 | by whitespace and finally the long name. |
1049 | .Ar copyall , | 1024 | .It Ar oid_section |
1050 | then all extensions in the request are copied to the certificate: | 1025 | This specifies a section in the configuration file containing extra |
1051 | if the extension is already present in the certificate it is deleted first. | 1026 | object identifiers. |
1027 | Each line should consist of the short name of the object identifier | ||
1028 | followed by | ||
1029 | .Sq = | ||
1030 | and the numerical form. | ||
1031 | The short and long names are the same when this option is used. | ||
1032 | .It Ar policy | ||
1033 | The same as | ||
1034 | .Fl policy . | ||
1035 | Mandatory. | ||
1052 | See the | 1036 | See the |
1053 | .Sx CA WARNINGS | 1037 | .Sx CA POLICY FORMAT |
1054 | section before using this option. | 1038 | section for more information. |
1055 | .Pp | 1039 | .It Ar preserve |
1056 | The main use of this option is to allow a certificate request to supply | 1040 | The same as |
1057 | values for certain extensions such as | 1041 | .Fl preserveDN . |
1058 | .Em subjectAltName . | 1042 | .It Ar private_key |
1043 | Same as the | ||
1044 | .Fl keyfile | ||
1045 | option. | ||
1046 | The file containing the CA private key. | ||
1047 | Mandatory. | ||
1048 | .It Ar RANDFILE | ||
1049 | A file used to read and write random number seed information, | ||
1050 | or an EGD socket (see | ||
1051 | .Xr RAND_egd 3 ) . | ||
1052 | .It Ar serial | ||
1053 | A text file containing the next serial number to use in hex. | ||
1054 | Mandatory. | ||
1055 | This file must be present and contain a valid serial number. | ||
1056 | .It Ar x509_extensions | ||
1057 | The same as | ||
1058 | .Fl extensions . | ||
1059 | .El | 1059 | .El |
1060 | .Sh CA POLICY FORMAT | 1060 | .Sh CA POLICY FORMAT |
1061 | The policy section consists of a set of variables corresponding to | 1061 | The policy section consists of a set of variables corresponding to |
@@ -1189,7 +1189,7 @@ the location of all files can change either by compile time options, | |||
1189 | configuration file entries, environment variables, or command line options. | 1189 | configuration file entries, environment variables, or command line options. |
1190 | The values below reflect the default values. | 1190 | The values below reflect the default values. |
1191 | .Bd -literal -offset indent | 1191 | .Bd -literal -offset indent |
1192 | /usr/local/ssl/lib/openssl.cnf - master configuration file | 1192 | /etc/ssl/openssl.cnf - master configuration file |
1193 | \&./demoCA - main CA directory | 1193 | \&./demoCA - main CA directory |
1194 | \&./demoCA/cacert.pem - CA certificate | 1194 | \&./demoCA/cacert.pem - CA certificate |
1195 | \&./demoCA/private/cakey.pem - CA private key | 1195 | \&./demoCA/private/cakey.pem - CA private key |
@@ -1726,7 +1726,7 @@ Print out the CRL in text form. | |||
1726 | Don't output the encoded version of the CRL. | 1726 | Don't output the encoded version of the CRL. |
1727 | .It Fl hash | 1727 | .It Fl hash |
1728 | Output a hash of the issuer name. | 1728 | Output a hash of the issuer name. |
1729 | This can be used to lookup CRLs in a directory by issuer name. | 1729 | This can be used to look up CRLs in a directory by issuer name. |
1730 | .It Fl fingerprint | 1730 | .It Fl fingerprint |
1731 | Print the CRL fingerprint. | 1731 | Print the CRL fingerprint. |
1732 | .It Fl issuer | 1732 | .It Fl issuer |
@@ -2984,7 +2984,7 @@ input and output files and allowing multiple certificate files to be used. | |||
2984 | .Op Fl url Ar URL | 2984 | .Op Fl url Ar URL |
2985 | .Oo | 2985 | .Oo |
2986 | .Fl host | 2986 | .Fl host |
2987 | .Ar hostname Ns : Ns Ar port | 2987 | .Ar hostname : Ns Ar port |
2988 | .Oc | 2988 | .Oc |
2989 | .Op Fl path | 2989 | .Op Fl path |
2990 | .Op Fl CApath Ar dir | 2990 | .Op Fl CApath Ar dir |
@@ -3118,7 +3118,7 @@ Both HTTP and HTTPS | |||
3118 | .Pq SSL/TLS | 3118 | .Pq SSL/TLS |
3119 | URLs can be specified. | 3119 | URLs can be specified. |
3120 | .It Xo | 3120 | .It Xo |
3121 | .Fl host Ar hostname Ns : Ns Ar port , | 3121 | .Fl host Ar hostname : Ns Ar port , |
3122 | .Fl path Ar pathname | 3122 | .Fl path Ar pathname |
3123 | .Xc | 3123 | .Xc |
3124 | If the | 3124 | If the |
@@ -4311,12 +4311,12 @@ The engine will then be set as the default for all available algorithms. | |||
4311 | .Op Fl rand Ar file ... | 4311 | .Op Fl rand Ar file ... |
4312 | .Oo Xo | 4312 | .Oo Xo |
4313 | .Fl newkey | 4313 | .Fl newkey |
4314 | .Ar rsa Ns : Ns Ar bits | 4314 | .Ar rsa : Ns Ar bits |
4315 | .Xc | 4315 | .Xc |
4316 | .Oc | 4316 | .Oc |
4317 | .Oo Xo | 4317 | .Oo Xo |
4318 | .Fl newkey | 4318 | .Fl newkey |
4319 | .Ar dsa Ns : Ns Ar file | 4319 | .Ar dsa : Ns Ar file |
4320 | .Xc | 4320 | .Xc |
4321 | .Oc | 4321 | .Oc |
4322 | .Op Fl nodes | 4322 | .Op Fl nodes |
@@ -4423,13 +4423,13 @@ Multiple files can be specified separated by a | |||
4423 | .It Fl newkey Ar arg | 4423 | .It Fl newkey Ar arg |
4424 | This option creates a new certificate request and a new private key. | 4424 | This option creates a new certificate request and a new private key. |
4425 | The argument takes one of two forms: | 4425 | The argument takes one of two forms: |
4426 | .Ar rsa Ns : Ns Ar nbits , | 4426 | .Ar rsa : Ns Ar nbits , |
4427 | where | 4427 | where |
4428 | .Ar nbits | 4428 | .Ar nbits |
4429 | is the number of bits, generates an RSA key | 4429 | is the number of bits, generates an RSA key |
4430 | .Ar nbits | 4430 | .Ar nbits |
4431 | in size. | 4431 | in size. |
4432 | .Ar dsa Ns : Ns Ar filename | 4432 | .Ar dsa : Ns Ar filename |
4433 | generates a DSA key using the parameters in the file | 4433 | generates a DSA key using the parameters in the file |
4434 | .Ar filename . | 4434 | .Ar filename . |
4435 | .It Fl key Ar filename | 4435 | .It Fl key Ar filename |
@@ -5412,7 +5412,7 @@ which it can be seen agrees with the recovered value above. | |||
5412 | .Nm openssl s_client | 5412 | .Nm openssl s_client |
5413 | .Bk -words | 5413 | .Bk -words |
5414 | .Oo | 5414 | .Oo |
5415 | .Fl connect Ar host Ns : Ns Ar port | 5415 | .Fl connect Ar host : Ns Ar port |
5416 | .Oc | 5416 | .Oc |
5417 | .Op Fl verify Ar depth | 5417 | .Op Fl verify Ar depth |
5418 | .Op Fl cert Ar filename | 5418 | .Op Fl cert Ar filename |
@@ -5456,7 +5456,7 @@ useful diagnostic tool for SSL servers. | |||
5456 | The options are as follows: | 5456 | The options are as follows: |
5457 | .Bl -tag -width "XXXX" | 5457 | .Bl -tag -width "XXXX" |
5458 | .It Xo | 5458 | .It Xo |
5459 | .Fl connect Ar host Ns : Ns Ar port | 5459 | .Fl connect Ar host : Ns Ar port |
5460 | .Xc | 5460 | .Xc |
5461 | This specifies the | 5461 | This specifies the |
5462 | .Ar host | 5462 | .Ar host |
@@ -6617,7 +6617,7 @@ Use EVP | |||
6617 | Time decryption instead of encryption | 6617 | Time decryption instead of encryption |
6618 | .Pq only EVP . | 6618 | .Pq only EVP . |
6619 | .It Fl mr | 6619 | .It Fl mr |
6620 | Produce machine readable ouput. | 6620 | Produce machine readable output. |
6621 | .It Fl multi Ar number | 6621 | .It Fl multi Ar number |
6622 | Run | 6622 | Run |
6623 | .Ar number | 6623 | .Ar number |
@@ -7305,7 +7305,7 @@ Print OCSP hash values for the subject name and public key. | |||
7305 | This option prints out the value of the modulus of the public key | 7305 | This option prints out the value of the modulus of the public key |
7306 | contained in the certificate. | 7306 | contained in the certificate. |
7307 | .It Fl pubkey | 7307 | .It Fl pubkey |
7308 | Ouput the public key. | 7308 | Output the public key. |
7309 | .It Fl serial | 7309 | .It Fl serial |
7310 | Outputs the certificate serial number. | 7310 | Outputs the certificate serial number. |
7311 | .It Fl hash | 7311 | .It Fl hash |