summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjmc <>2003-10-22 16:05:06 +0000
committerjmc <>2003-10-22 16:05:06 +0000
commit21155d355a017a5944ad5021c96db75ed391d2b6 (patch)
tree94d11c472337ef321a3e210b9b37744cb33ff57a
parentb11a92fd88ced12b88d3eead4558371673708169 (diff)
downloadopenbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.gz
openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.bz2
openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.zip
- slight update and sort options for CA section
- remove some unnecessary .Ns's - typos
-rw-r--r--src/usr.sbin/openssl/openssl.1534
1 files changed, 267 insertions, 267 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1
index dc60a2857a..cd6ba71ffa 100644
--- a/src/usr.sbin/openssl/openssl.1
+++ b/src/usr.sbin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.17 2003/10/08 08:37:50 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.18 2003/10/22 16:05:06 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -592,45 +592,45 @@ The output of some ASN.1 types is not well handled
592.Sh CA 592.Sh CA
593.Nm openssl ca 593.Nm openssl ca
594.Bk -words 594.Bk -words
595.Op Fl batch
596.Op Fl gencrl
597.Op Fl infiles
598.Op Fl msie_hack
599.Op Fl noemailDN
600.Op Fl notext
601.Op Fl preserveDN
602.Op Fl updatedb
595.Op Fl verbose 603.Op Fl verbose
604.Op Fl cert Ar file
596.Op Fl config Ar filename 605.Op Fl config Ar filename
597.Op Fl name Ar section
598.Op Fl gencrl
599.Op Fl revoke Ar file
600.Op Fl crl_reason Ar reason
601.Op Fl crl_hold Ar instruction
602.Op Fl crl_compromise Ar time
603.Op Fl crl_CA_compromise Ar time 606.Op Fl crl_CA_compromise Ar time
604.Op Fl subj Ar arg 607.Op Fl crl_compromise Ar time
608.Op Fl crl_hold Ar instruction
609.Op Fl crl_reason Ar reason
605.Op Fl crldays Ar days 610.Op Fl crldays Ar days
606.Op Fl crlhours Ar hours
607.Op Fl crlexts Ar section 611.Op Fl crlexts Ar section
608.Op Fl startdate Ar date 612.Op Fl crlhours Ar hours
609.Op Fl enddate Ar date
610.Op Fl days Ar arg 613.Op Fl days Ar arg
611.Op Fl md Ar arg 614.Op Fl enddate Ar date
612.Op Fl policy Ar arg 615.Op Fl engine Ar id
616.Op Fl extensions Ar section
617.Op Fl extfile Ar section
618.Op Fl in Ar file
619.Op Fl key Ar arg
613.Op Fl keyfile Ar arg 620.Op Fl keyfile Ar arg
614.Op Fl keyform Ar PEM | ENGINE 621.Op Fl keyform Ar PEM | ENGINE
615.Op Fl key Ar arg 622.Op Fl md Ar arg
616.Op Fl passin Ar arg 623.Op Fl name Ar section
617.Op Fl cert Ar file
618.Op Fl in Ar file
619.Op Fl out Ar file 624.Op Fl out Ar file
620.Op Fl notext
621.Op Fl outdir Ar dir 625.Op Fl outdir Ar dir
622.Op Fl infiles 626.Op Fl passin Ar arg
627.Op Fl policy Ar arg
628.Op Fl revoke Ar file
623.Op Fl spkac Ar file 629.Op Fl spkac Ar file
624.Op Fl ss_cert Ar file 630.Op Fl ss_cert Ar file
625.Op Fl preserveDN 631.Op Fl startdate Ar date
626.Op Fl noemailDN
627.Op Fl batch
628.Op Fl msie_hack
629.Op Fl extensions Ar section
630.Op Fl extfile Ar section
631.Op Fl status Ar serial 632.Op Fl status Ar serial
632.Op Fl updatedb 633.Op Fl subj Ar arg
633.Op Fl engine Ar id
634.Ek 634.Ek
635.Pp 635.Pp
636The 636The
@@ -643,49 +643,53 @@ It also maintains a text database of issued certificates and their status.
643The options descriptions will be divided into each purpose. 643The options descriptions will be divided into each purpose.
644.Sh CA OPTIONS 644.Sh CA OPTIONS
645.Bl -tag -width "XXXX" 645.Bl -tag -width "XXXX"
646.It Fl batch
647This sets the batch mode.
648In this mode no questions will be asked
649and all certificates will be certified automatically.
650.It Fl cert Ar file
651The CA certificate file.
646.It Fl config Ar filename 652.It Fl config Ar filename
647Specifies the configuration file to use. 653Specifies the configuration file to use.
648.It Fl name Ar section 654.It Fl days Ar arg
649Specifies the configuration file 655The number of days to certify the certificate for.
650.Ar section 656.It Fl enddate Ar date
651to use (overrides 657This allows the expiry date to be explicitly set.
652.Cm default_ca 658The format of the date is YYMMDDHHMMSSZ
653in the 659.Pq the same as an ASN1 UTCTime structure .
654.Cm ca 660.It Fl engine Ar id
655section). 661Specifying an engine (by it's unique
662.Ar id
663string) will cause
664.Nm ca
665to attempt to obtain a functional reference to the specified engine,
666thus initialising it if needed.
667The engine will then be set as the default for all available algorithms.
668.It Fl extensions Ar section
669The section of the configuration file containing certificate extensions
670to be added when a certificate is issued (defaults to
671.Em x509_extensions
672unless the
673.Fl extfile
674option is used).
675If no extension section is present, then a V1 certificate is created.
676If the extension section is present
677.Pq even if it is empty ,
678then a V3 certificate is created.
679.It Fl extfile Ar file
680An additional configuration
681.Ar file
682to read certificate extensions from
683(using the default section unless the
684.Fl extensions
685option is also used).
656.It Fl in Ar filename 686.It Fl in Ar filename
657An input 687An input
658.Ar filename 688.Ar filename
659containing a single certificate request to be signed by the CA. 689containing a single certificate request to be signed by the CA.
660.It Fl ss_cert Ar filename
661A single self-signed certificate to be signed by the CA.
662.It Fl spkac Ar filename
663A file containing a single Netscape signed public key and challenge,
664and additional field values to be signed by the CA.
665See the
666.Sx SPKAC FORMAT
667section for information on the required format.
668.It Fl infiles 690.It Fl infiles
669If present, this should be the last option; all subsequent arguments 691If present, this should be the last option; all subsequent arguments
670are assumed to be the names of files containing certificate requests. 692are assumed to be the names of files containing certificate requests.
671.It Fl out Ar filename
672The output file to output certificates to.
673The default is standard output.
674The certificate details will also be printed out to this file.
675.It Fl outdir Ar directory
676The
677.Ar directory
678to output certificates to.
679The certificate will be written to a filename consisting of the
680serial number in hex with
681.Qq .pem
682appended.
683.It Fl cert
684The CA certificate file.
685.It Fl keyfile Ar filename
686The private key to sign requests with.
687.It Fl keyform Ar PEM | ENGINE
688Private key file format.
689.It Fl key Ar password 693.It Fl key Ar password
690The password used to encrypt the private key. 694The password used to encrypt the private key.
691Since on some systems the command line arguments are visible 695Since on some systems the command line arguments are visible
@@ -694,27 +698,10 @@ Since on some systems the command line arguments are visible
694with the 698with the
695.Xr ps 1 699.Xr ps 1
696utility) this option should be used with caution. 700utility) this option should be used with caution.
697.It Fl passin Ar arg 701.It Fl keyfile Ar filename
698The key password source. 702The private key to sign requests with.
699For more information about the format of 703.It Fl keyform Ar PEM | ENGINE
700.Ar arg , 704Private key file format.
701see the
702.Sx PASS PHRASE ARGUMENTS
703section above.
704.It Fl verbose
705This prints extra details about the operations being performed.
706.It Fl notext
707Don't output the text form of a certificate to the output file.
708.It Fl startdate Ar date
709This allows the start date to be explicitly set.
710The format of the date is YYMMDDHHMMSSZ
711.Pq the same as an ASN1 UTCTime structure .
712.It Fl enddate Ar date
713This allows the expiry date to be explicitly set.
714The format of the date is YYMMDDHHMMSSZ
715.Pq the same as an ASN1 UTCTime structure .
716.It Fl days Ar arg
717The number of days to certify the certificate for.
718.It Fl md Ar alg 705.It Fl md Ar alg
719The message digest to use. 706The message digest to use.
720Possible values include 707Possible values include
@@ -722,15 +709,6 @@ Possible values include
722and 709and
723.Ar sha1 . 710.Ar sha1 .
724This option also applies to CRLs. 711This option also applies to CRLs.
725.It Fl policy Ar arg
726This option defines the CA
727.Qq policy
728to use.
729This is a section in the configuration file which decides which fields
730should be mandatory or match the CA certificate.
731Check out the
732.Sx CA POLICY FORMAT
733section for more information.
734.It Fl msie_hack 712.It Fl msie_hack
735This is a legacy option to make 713This is a legacy option to make
736.Nm ca 714.Nm ca
@@ -742,14 +720,14 @@ its use is strongly discouraged.
742The newer control 720The newer control
743.Qq Xenroll 721.Qq Xenroll
744does not need this option. 722does not need this option.
745.It Fl preserveDN 723.It Fl name Ar section
746Normally, the DN order of a certificate is the same as the order of the 724Specifies the configuration file
747fields in the relevant policy section. 725.Ar section
748When this option is set, the order is the same as the request. 726to use (overrides
749This is largely for compatibility with the older IE enrollment control 727.Cm default_ca
750which would only accept certificates if their DNs matched the order of the 728in the
751request. 729.Cm ca
752This is not needed for Xenroll. 730section).
753.It Fl noemailDN 731.It Fl noemailDN
754The DN of a certificate can contain the EMAIL field if present in the 732The DN of a certificate can contain the EMAIL field if present in the
755request DN, however it is good policy just having the e-mail set into 733request DN, however it is good policy just having the e-mail set into
@@ -761,57 +739,83 @@ subject and set only in the, eventually present, extensions.
761The 739The
762.Ar email_in_dn 740.Ar email_in_dn
763keyword can be used in the configuration file to enable this behaviour. 741keyword can be used in the configuration file to enable this behaviour.
764.It Fl batch 742.It Fl notext
765This sets the batch mode. 743Don't output the text form of a certificate to the output file.
766In this mode no questions will be asked 744.It Fl out Ar filename
767and all certificates will be certified automatically. 745The output file to output certificates to.
768.It Fl extensions Ar section 746The default is standard output.
769The section of the configuration file containing certificate extensions 747The certificate details will also be printed out to this file.
770to be added when a certificate is issued (defaults to 748.It Fl outdir Ar directory
771.Em x509_extensions 749The
772unless the 750.Ar directory
773.Fl extfile 751to output certificates to.
774option is used). 752The certificate will be written to a filename consisting of the
775If no extension section is present, then a V1 certificate is created. 753serial number in hex with
776If the extension section is present 754.Qq .pem
777.Pq even if it is empty , 755appended.
778then a V3 certificate is created. 756.It Fl passin Ar arg
779.It Fl extfile Ar file 757The key password source.
780An additional configuration 758For more information about the format of
781.Ar file 759.Ar arg ,
782to read certificate extensions from 760see the
783(using the default section unless the 761.Sx PASS PHRASE ARGUMENTS
784.Fl extensions 762section above.
785option is also used). 763.It Fl policy Ar arg
764This option defines the CA
765.Qq policy
766to use.
767This is a section in the configuration file which decides which fields
768should be mandatory or match the CA certificate.
769Check out the
770.Sx CA POLICY FORMAT
771section for more information.
772.It Fl preserveDN
773Normally, the DN order of a certificate is the same as the order of the
774fields in the relevant policy section.
775When this option is set, the order is the same as the request.
776This is largely for compatibility with the older IE enrollment control
777which would only accept certificates if their DNs matched the order of the
778request.
779This is not needed for Xenroll.
780.It Fl spkac Ar filename
781A file containing a single Netscape signed public key and challenge,
782and additional field values to be signed by the CA.
783See the
784.Sx SPKAC FORMAT
785section for information on the required format.
786.It Fl ss_cert Ar filename
787A single self-signed certificate to be signed by the CA.
788.It Fl startdate Ar date
789This allows the start date to be explicitly set.
790The format of the date is YYMMDDHHMMSSZ
791.Pq the same as an ASN1 UTCTime structure .
786.It Fl status Ar serial 792.It Fl status Ar serial
787Show status of certificate with serial number 793Show status of certificate with serial number
788.Ar serial . 794.Ar serial .
789.It Fl updatedb 795.It Fl updatedb
790Update database for expired certificates. 796Update database for expired certificates.
791.It Fl engine Ar id 797.It Fl verbose
792Specifying an engine (by it's unique 798This prints extra details about the operations being performed.
793.Ar id
794string) will cause
795.Nm ca
796to attempt to obtain a functional reference to the specified engine,
797thus initialising it if needed.
798The engine will then be set as the default for all available algorithms.
799.El 799.El
800.Sh CRL OPTIONS 800.Sh CRL OPTIONS
801.Bl -tag -width "XXXX" 801.Bl -tag -width "XXXX"
802.It Fl gencrl 802.It Fl crl_CA_compromise Ar time
803This option generates a CRL based on information in the index file. 803This is the same as
804.It Fl crldays Ar num 804.Fl crl_compromise ,
805The number of days before the next CRL is due. 805except the revocation reason is set to CACompromise.
806This is the days from now to place in the CRL 806.It Fl crl_compromise Ar time
807.Em nextUpdate 807This sets the revocation reason to keyCompromise and the compromise time to
808field. 808.Ar time .
809.It Fl crlhours Ar num 809.Ar time
810The number of hours before the next CRL is due. 810should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ.
811.It Fl revoke Ar filename 811.It Fl crl_hold Ar instruction
812A 812This sets the CRL revocation reason code to certificateHold and the hold
813.Ar filename 813instruction to
814containing a certificate to revoke. 814.Ar instruction
815which must be an OID.
816Although any OID can be used, only holdInstructionNone
817(the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or
818holdInstructionReject will normally be used.
815.It Fl crl_reason Ar reason 819.It Fl crl_reason Ar reason
816Revocation reason, where 820Revocation reason, where
817.Ar reason 821.Ar reason
@@ -824,33 +828,11 @@ is case insensitive.
824Setting any revocation reason will make the CRL v2. 828Setting any revocation reason will make the CRL v2.
825In practice, removeFromCRL is not particularly useful because it is only used 829In practice, removeFromCRL is not particularly useful because it is only used
826in delta CRLs which are not currently implemented. 830in delta CRLs which are not currently implemented.
827.It Fl crl_hold Ar instruction 831.It Fl crldays Ar num
828This sets the CRL revocation reason code to certificateHold and the hold 832The number of days before the next CRL is due.
829instruction to 833This is the days from now to place in the CRL
830.Ar instruction 834.Em nextUpdate
831which must be an OID. 835field.
832Although any OID can be used, only holdInstructionNone
833(the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or
834holdInstructionReject will normally be used.
835.It Fl crl_compromise Ar time
836This sets the revocation reason to keyCompromise and the compromise time to
837.Ar time .
838.Ar time
839should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ.
840.It Fl crl_CA_compromise Ar time
841This is the same as
842.Fl crl_compromise ,
843except the revocation reason is set to CACompromise.
844.It Fl subj Ar arg
845Supersedes the subject name given in the request.
846The
847.Ar arg
848must be formatted as
849.Ar /type0=value0/type1=value1/type2=... ;
850characters may be escaped by
851.Sq \e
852.Pq backslash ,
853no spaces are skipped.
854.It Fl crlexts Ar section 836.It Fl crlexts Ar section
855The 837The
856.Ar section 838.Ar section
@@ -865,6 +847,24 @@ CRL entry extensions.
865It should be noted that some software 847It should be noted that some software
866.Pq for example Netscape 848.Pq for example Netscape
867can't handle V2 CRLs. 849can't handle V2 CRLs.
850.It Fl crlhours Ar num
851The number of hours before the next CRL is due.
852.It Fl gencrl
853This option generates a CRL based on information in the index file.
854.It Fl revoke Ar filename
855A
856.Ar filename
857containing a certificate to revoke.
858.It Fl subj Ar arg
859Supersedes the subject name given in the request.
860The
861.Ar arg
862must be formatted as
863.Ar /type0=value0/type1=value1/type2=... ;
864characters may be escaped by
865.Sq \e
866.Pq backslash ,
867no spaces are skipped.
868.El 868.El
869.Sh CA CONFIGURATION FILE OPTIONS 869.Sh CA CONFIGURATION FILE OPTIONS
870The section of the configuration file containing options for 870The section of the configuration file containing options for
@@ -903,51 +903,52 @@ the configuration file or the command line equivalent
903.Pq if any 903.Pq if any
904used. 904used.
905.Bl -tag -width "XXXX" 905.Bl -tag -width "XXXX"
906.It Ar oid_file
907This specifies a file containing additional OBJECT IDENTIFIERS.
908Each line of the file should consist of the numerical form of the
909object identifier followed by whitespace, then the short name followed
910by whitespace and finally the long name.
911.It Ar oid_section
912This specifies a section in the configuration file containing extra
913object identifiers.
914Each line should consist of the short name of the object identifier
915followed by
916.Sq =
917and the numerical form.
918The short and long names are the same when this option is used.
919.It Ar new_certs_dir
920The same as the
921.Fl outdir
922command line option.
923It specifies the directory where new certificates will be placed.
924Mandatory.
925.It Ar certificate 906.It Ar certificate
926The same as 907The same as
927.Fl cert . 908.Fl cert .
928It gives the file containing the CA certificate. 909It gives the file containing the CA certificate.
929Mandatory. 910Mandatory.
930.It Ar private_key 911.It Ar copy_extensions
931Same as the 912Determines how extensions in certificate requests should be handled.
932.Fl keyfile 913If set to
933option. 914.Ar none
934The file containing the CA private key. 915or this option is not present, then extensions are
916ignored and not copied to the certificate.
917If set to
918.Ar copy ,
919then any extensions present in the request that are not already present
920are copied to the certificate.
921If set to
922.Ar copyall ,
923then all extensions in the request are copied to the certificate:
924if the extension is already present in the certificate it is deleted first.
925See the
926.Sx CA WARNINGS
927section before using this option.
928.Pp
929The main use of this option is to allow a certificate request to supply
930values for certain extensions such as
931.Em subjectAltName .
932.It Ar crl_extensions
933The same as
934.Fl crlexts .
935.It Ar database
936The text database file to use.
935Mandatory. 937Mandatory.
936.It Ar RANDFILE 938This file must be present, though initially it will be empty.
937A file used to read and write random number seed information, 939.It Ar default_crl_hours , default_crl_days
938or an EGD socket (see 940The same as the
939.Xr RAND_egd 3 ) . 941.Fl crlhours
942and
943.Fl crldays
944options.
945These will only be used if neither command line option is present.
946At least one of these must be present to generate a CRL.
940.It Ar default_days 947.It Ar default_days
941The same as the 948The same as the
942.Fl days 949.Fl days
943option. 950option.
944The number of days to certify a certificate for. 951The number of days to certify a certificate for.
945.It Ar default_startdate
946The same as the
947.Fl startdate
948option.
949The start date to certify a certificate for.
950If not set, the current time is used.
951.It Ar default_enddate 952.It Ar default_enddate
952The same as the 953The same as the
953.Fl enddate 954.Fl enddate
@@ -956,37 +957,18 @@ Either this option or
956.Ar default_days 957.Ar default_days
957.Pq or the command line equivalents 958.Pq or the command line equivalents
958must be present. 959must be present.
959.It Ar default_crl_hours default_crl_days
960The same as the
961.Fl crlhours
962and the
963.Fl crldays
964options.
965These will only be used if neither command line option is present.
966At least one of these must be present to generate a CRL.
967.It Ar default_md 960.It Ar default_md
968The same as the 961The same as the
969.Fl md 962.Fl md
970option. 963option.
971The message digest to use. 964The message digest to use.
972Mandatory. 965Mandatory.
973.It Ar database 966.It Ar default_startdate
974The text database file to use. 967The same as the
975Mandatory. 968.Fl startdate
976This file must be present, though initially it will be empty. 969option.
977.It Ar serial 970The start date to certify a certificate for.
978A text file containing the next serial number to use in hex. 971If not set, the current time is used.
979Mandatory.
980This file must be present and contain a valid serial number.
981.It Ar x509_extensions
982The same as
983.Fl extensions .
984.It Ar crl_extensions
985the same as
986.Fl crlexts .
987.It Ar preserve
988The same as
989.Fl preserveDN .
990.It Ar email_in_dn 972.It Ar email_in_dn
991The same as 973The same as
992.Fl noemailDN . 974.Fl noemailDN .
@@ -998,13 +980,6 @@ certificate's DN.
998.It Ar msie_hack 980.It Ar msie_hack
999The same as 981The same as
1000.Fl msie_hack . 982.Fl msie_hack .
1001.It Ar policy
1002The same as
1003.Fl policy .
1004Mandatory.
1005See the
1006.Sx CA POLICY FORMAT
1007section for more information.
1008.It Ar nameopt , certopt 983.It Ar nameopt , certopt
1009These options allow the format used to display the certificate details 984These options allow the format used to display the certificate details
1010when asking the user to confirm signing. 985when asking the user to confirm signing.
@@ -1035,27 +1010,52 @@ discouraged because it only displays fields mentioned in the
1035.Ar policy 1010.Ar policy
1036section, 1011section,
1037mishandles multicharacter string types and does not display extensions. 1012mishandles multicharacter string types and does not display extensions.
1038.It Ar copy_extensions 1013.It Ar new_certs_dir
1039Determines how extensions in certificate requests should be handled. 1014The same as the
1040If set to 1015.Fl outdir
1041.Ar none 1016command line option.
1042or this option is not present, then extensions are 1017It specifies the directory where new certificates will be placed.
1043ignored and not copied to the certificate. 1018Mandatory.
1044If set to 1019.It Ar oid_file
1045.Ar copy , 1020This specifies a file containing additional object identifiers.
1046then any extensions present in the request that are not already present 1021Each line of the file should consist of the numerical form of the
1047are copied to the certificate. 1022object identifier followed by whitespace, then the short name followed
1048If set to 1023by whitespace and finally the long name.
1049.Ar copyall , 1024.It Ar oid_section
1050then all extensions in the request are copied to the certificate: 1025This specifies a section in the configuration file containing extra
1051if the extension is already present in the certificate it is deleted first. 1026object identifiers.
1027Each line should consist of the short name of the object identifier
1028followed by
1029.Sq =
1030and the numerical form.
1031The short and long names are the same when this option is used.
1032.It Ar policy
1033The same as
1034.Fl policy .
1035Mandatory.
1052See the 1036See the
1053.Sx CA WARNINGS 1037.Sx CA POLICY FORMAT
1054section before using this option. 1038section for more information.
1055.Pp 1039.It Ar preserve
1056The main use of this option is to allow a certificate request to supply 1040The same as
1057values for certain extensions such as 1041.Fl preserveDN .
1058.Em subjectAltName . 1042.It Ar private_key
1043Same as the
1044.Fl keyfile
1045option.
1046The file containing the CA private key.
1047Mandatory.
1048.It Ar RANDFILE
1049A file used to read and write random number seed information,
1050or an EGD socket (see
1051.Xr RAND_egd 3 ) .
1052.It Ar serial
1053A text file containing the next serial number to use in hex.
1054Mandatory.
1055This file must be present and contain a valid serial number.
1056.It Ar x509_extensions
1057The same as
1058.Fl extensions .
1059.El 1059.El
1060.Sh CA POLICY FORMAT 1060.Sh CA POLICY FORMAT
1061The policy section consists of a set of variables corresponding to 1061The policy section consists of a set of variables corresponding to
@@ -1189,7 +1189,7 @@ the location of all files can change either by compile time options,
1189configuration file entries, environment variables, or command line options. 1189configuration file entries, environment variables, or command line options.
1190The values below reflect the default values. 1190The values below reflect the default values.
1191.Bd -literal -offset indent 1191.Bd -literal -offset indent
1192/usr/local/ssl/lib/openssl.cnf - master configuration file 1192/etc/ssl/openssl.cnf - master configuration file
1193\&./demoCA - main CA directory 1193\&./demoCA - main CA directory
1194\&./demoCA/cacert.pem - CA certificate 1194\&./demoCA/cacert.pem - CA certificate
1195\&./demoCA/private/cakey.pem - CA private key 1195\&./demoCA/private/cakey.pem - CA private key
@@ -1726,7 +1726,7 @@ Print out the CRL in text form.
1726Don't output the encoded version of the CRL. 1726Don't output the encoded version of the CRL.
1727.It Fl hash 1727.It Fl hash
1728Output a hash of the issuer name. 1728Output a hash of the issuer name.
1729This can be used to lookup CRLs in a directory by issuer name. 1729This can be used to look up CRLs in a directory by issuer name.
1730.It Fl fingerprint 1730.It Fl fingerprint
1731Print the CRL fingerprint. 1731Print the CRL fingerprint.
1732.It Fl issuer 1732.It Fl issuer
@@ -2984,7 +2984,7 @@ input and output files and allowing multiple certificate files to be used.
2984.Op Fl url Ar URL 2984.Op Fl url Ar URL
2985.Oo 2985.Oo
2986.Fl host 2986.Fl host
2987.Ar hostname Ns : Ns Ar port 2987.Ar hostname : Ns Ar port
2988.Oc 2988.Oc
2989.Op Fl path 2989.Op Fl path
2990.Op Fl CApath Ar dir 2990.Op Fl CApath Ar dir
@@ -3118,7 +3118,7 @@ Both HTTP and HTTPS
3118.Pq SSL/TLS 3118.Pq SSL/TLS
3119URLs can be specified. 3119URLs can be specified.
3120.It Xo 3120.It Xo
3121.Fl host Ar hostname Ns : Ns Ar port , 3121.Fl host Ar hostname : Ns Ar port ,
3122.Fl path Ar pathname 3122.Fl path Ar pathname
3123.Xc 3123.Xc
3124If the 3124If the
@@ -4311,12 +4311,12 @@ The engine will then be set as the default for all available algorithms.
4311.Op Fl rand Ar file ... 4311.Op Fl rand Ar file ...
4312.Oo Xo 4312.Oo Xo
4313.Fl newkey 4313.Fl newkey
4314.Ar rsa Ns : Ns Ar bits 4314.Ar rsa : Ns Ar bits
4315.Xc 4315.Xc
4316.Oc 4316.Oc
4317.Oo Xo 4317.Oo Xo
4318.Fl newkey 4318.Fl newkey
4319.Ar dsa Ns : Ns Ar file 4319.Ar dsa : Ns Ar file
4320.Xc 4320.Xc
4321.Oc 4321.Oc
4322.Op Fl nodes 4322.Op Fl nodes
@@ -4423,13 +4423,13 @@ Multiple files can be specified separated by a
4423.It Fl newkey Ar arg 4423.It Fl newkey Ar arg
4424This option creates a new certificate request and a new private key. 4424This option creates a new certificate request and a new private key.
4425The argument takes one of two forms: 4425The argument takes one of two forms:
4426.Ar rsa Ns : Ns Ar nbits , 4426.Ar rsa : Ns Ar nbits ,
4427where 4427where
4428.Ar nbits 4428.Ar nbits
4429is the number of bits, generates an RSA key 4429is the number of bits, generates an RSA key
4430.Ar nbits 4430.Ar nbits
4431in size. 4431in size.
4432.Ar dsa Ns : Ns Ar filename 4432.Ar dsa : Ns Ar filename
4433generates a DSA key using the parameters in the file 4433generates a DSA key using the parameters in the file
4434.Ar filename . 4434.Ar filename .
4435.It Fl key Ar filename 4435.It Fl key Ar filename
@@ -5412,7 +5412,7 @@ which it can be seen agrees with the recovered value above.
5412.Nm openssl s_client 5412.Nm openssl s_client
5413.Bk -words 5413.Bk -words
5414.Oo 5414.Oo
5415.Fl connect Ar host Ns : Ns Ar port 5415.Fl connect Ar host : Ns Ar port
5416.Oc 5416.Oc
5417.Op Fl verify Ar depth 5417.Op Fl verify Ar depth
5418.Op Fl cert Ar filename 5418.Op Fl cert Ar filename
@@ -5456,7 +5456,7 @@ useful diagnostic tool for SSL servers.
5456The options are as follows: 5456The options are as follows:
5457.Bl -tag -width "XXXX" 5457.Bl -tag -width "XXXX"
5458.It Xo 5458.It Xo
5459.Fl connect Ar host Ns : Ns Ar port 5459.Fl connect Ar host : Ns Ar port
5460.Xc 5460.Xc
5461This specifies the 5461This specifies the
5462.Ar host 5462.Ar host
@@ -6617,7 +6617,7 @@ Use EVP
6617Time decryption instead of encryption 6617Time decryption instead of encryption
6618.Pq only EVP . 6618.Pq only EVP .
6619.It Fl mr 6619.It Fl mr
6620Produce machine readable ouput. 6620Produce machine readable output.
6621.It Fl multi Ar number 6621.It Fl multi Ar number
6622Run 6622Run
6623.Ar number 6623.Ar number
@@ -7305,7 +7305,7 @@ Print OCSP hash values for the subject name and public key.
7305This option prints out the value of the modulus of the public key 7305This option prints out the value of the modulus of the public key
7306contained in the certificate. 7306contained in the certificate.
7307.It Fl pubkey 7307.It Fl pubkey
7308Ouput the public key. 7308Output the public key.
7309.It Fl serial 7309.It Fl serial
7310Outputs the certificate serial number. 7310Outputs the certificate serial number.
7311.It Fl hash 7311.It Fl hash