diff options
| author | jmc <> | 2003-10-22 16:05:06 +0000 |
|---|---|---|
| committer | jmc <> | 2003-10-22 16:05:06 +0000 |
| commit | 21155d355a017a5944ad5021c96db75ed391d2b6 (patch) | |
| tree | 94d11c472337ef321a3e210b9b37744cb33ff57a /src | |
| parent | b11a92fd88ced12b88d3eead4558371673708169 (diff) | |
| download | openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.gz openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.tar.bz2 openbsd-21155d355a017a5944ad5021c96db75ed391d2b6.zip | |
- slight update and sort options for CA section
- remove some unnecessary .Ns's
- typos
Diffstat (limited to '')
| -rw-r--r-- | src/usr.sbin/openssl/openssl.1 | 534 |
1 files changed, 267 insertions, 267 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1 index dc60a2857a..cd6ba71ffa 100644 --- a/src/usr.sbin/openssl/openssl.1 +++ b/src/usr.sbin/openssl/openssl.1 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: openssl.1,v 1.17 2003/10/08 08:37:50 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.18 2003/10/22 16:05:06 jmc Exp $ |
| 2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
| 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
| 4 | .\" | 4 | .\" |
| @@ -592,45 +592,45 @@ The output of some ASN.1 types is not well handled | |||
| 592 | .Sh CA | 592 | .Sh CA |
| 593 | .Nm openssl ca | 593 | .Nm openssl ca |
| 594 | .Bk -words | 594 | .Bk -words |
| 595 | .Op Fl batch | ||
| 596 | .Op Fl gencrl | ||
| 597 | .Op Fl infiles | ||
| 598 | .Op Fl msie_hack | ||
| 599 | .Op Fl noemailDN | ||
| 600 | .Op Fl notext | ||
| 601 | .Op Fl preserveDN | ||
| 602 | .Op Fl updatedb | ||
| 595 | .Op Fl verbose | 603 | .Op Fl verbose |
| 604 | .Op Fl cert Ar file | ||
| 596 | .Op Fl config Ar filename | 605 | .Op Fl config Ar filename |
| 597 | .Op Fl name Ar section | ||
| 598 | .Op Fl gencrl | ||
| 599 | .Op Fl revoke Ar file | ||
| 600 | .Op Fl crl_reason Ar reason | ||
| 601 | .Op Fl crl_hold Ar instruction | ||
| 602 | .Op Fl crl_compromise Ar time | ||
| 603 | .Op Fl crl_CA_compromise Ar time | 606 | .Op Fl crl_CA_compromise Ar time |
| 604 | .Op Fl subj Ar arg | 607 | .Op Fl crl_compromise Ar time |
| 608 | .Op Fl crl_hold Ar instruction | ||
| 609 | .Op Fl crl_reason Ar reason | ||
| 605 | .Op Fl crldays Ar days | 610 | .Op Fl crldays Ar days |
| 606 | .Op Fl crlhours Ar hours | ||
| 607 | .Op Fl crlexts Ar section | 611 | .Op Fl crlexts Ar section |
| 608 | .Op Fl startdate Ar date | 612 | .Op Fl crlhours Ar hours |
| 609 | .Op Fl enddate Ar date | ||
| 610 | .Op Fl days Ar arg | 613 | .Op Fl days Ar arg |
| 611 | .Op Fl md Ar arg | 614 | .Op Fl enddate Ar date |
| 612 | .Op Fl policy Ar arg | 615 | .Op Fl engine Ar id |
| 616 | .Op Fl extensions Ar section | ||
| 617 | .Op Fl extfile Ar section | ||
| 618 | .Op Fl in Ar file | ||
| 619 | .Op Fl key Ar arg | ||
| 613 | .Op Fl keyfile Ar arg | 620 | .Op Fl keyfile Ar arg |
| 614 | .Op Fl keyform Ar PEM | ENGINE | 621 | .Op Fl keyform Ar PEM | ENGINE |
| 615 | .Op Fl key Ar arg | 622 | .Op Fl md Ar arg |
| 616 | .Op Fl passin Ar arg | 623 | .Op Fl name Ar section |
| 617 | .Op Fl cert Ar file | ||
| 618 | .Op Fl in Ar file | ||
| 619 | .Op Fl out Ar file | 624 | .Op Fl out Ar file |
| 620 | .Op Fl notext | ||
| 621 | .Op Fl outdir Ar dir | 625 | .Op Fl outdir Ar dir |
| 622 | .Op Fl infiles | 626 | .Op Fl passin Ar arg |
| 627 | .Op Fl policy Ar arg | ||
| 628 | .Op Fl revoke Ar file | ||
| 623 | .Op Fl spkac Ar file | 629 | .Op Fl spkac Ar file |
| 624 | .Op Fl ss_cert Ar file | 630 | .Op Fl ss_cert Ar file |
| 625 | .Op Fl preserveDN | 631 | .Op Fl startdate Ar date |
| 626 | .Op Fl noemailDN | ||
| 627 | .Op Fl batch | ||
| 628 | .Op Fl msie_hack | ||
| 629 | .Op Fl extensions Ar section | ||
| 630 | .Op Fl extfile Ar section | ||
| 631 | .Op Fl status Ar serial | 632 | .Op Fl status Ar serial |
| 632 | .Op Fl updatedb | 633 | .Op Fl subj Ar arg |
| 633 | .Op Fl engine Ar id | ||
| 634 | .Ek | 634 | .Ek |
| 635 | .Pp | 635 | .Pp |
| 636 | The | 636 | The |
| @@ -643,49 +643,53 @@ It also maintains a text database of issued certificates and their status. | |||
| 643 | The options descriptions will be divided into each purpose. | 643 | The options descriptions will be divided into each purpose. |
| 644 | .Sh CA OPTIONS | 644 | .Sh CA OPTIONS |
| 645 | .Bl -tag -width "XXXX" | 645 | .Bl -tag -width "XXXX" |
| 646 | .It Fl batch | ||
| 647 | This sets the batch mode. | ||
| 648 | In this mode no questions will be asked | ||
| 649 | and all certificates will be certified automatically. | ||
| 650 | .It Fl cert Ar file | ||
| 651 | The CA certificate file. | ||
| 646 | .It Fl config Ar filename | 652 | .It Fl config Ar filename |
| 647 | Specifies the configuration file to use. | 653 | Specifies the configuration file to use. |
| 648 | .It Fl name Ar section | 654 | .It Fl days Ar arg |
| 649 | Specifies the configuration file | 655 | The number of days to certify the certificate for. |
| 650 | .Ar section | 656 | .It Fl enddate Ar date |
| 651 | to use (overrides | 657 | This allows the expiry date to be explicitly set. |
| 652 | .Cm default_ca | 658 | The format of the date is YYMMDDHHMMSSZ |
| 653 | in the | 659 | .Pq the same as an ASN1 UTCTime structure . |
| 654 | .Cm ca | 660 | .It Fl engine Ar id |
| 655 | section). | 661 | Specifying an engine (by it's unique |
| 662 | .Ar id | ||
| 663 | string) will cause | ||
| 664 | .Nm ca | ||
| 665 | to attempt to obtain a functional reference to the specified engine, | ||
| 666 | thus initialising it if needed. | ||
| 667 | The engine will then be set as the default for all available algorithms. | ||
| 668 | .It Fl extensions Ar section | ||
| 669 | The section of the configuration file containing certificate extensions | ||
| 670 | to be added when a certificate is issued (defaults to | ||
| 671 | .Em x509_extensions | ||
| 672 | unless the | ||
| 673 | .Fl extfile | ||
| 674 | option is used). | ||
| 675 | If no extension section is present, then a V1 certificate is created. | ||
| 676 | If the extension section is present | ||
| 677 | .Pq even if it is empty , | ||
| 678 | then a V3 certificate is created. | ||
| 679 | .It Fl extfile Ar file | ||
| 680 | An additional configuration | ||
| 681 | .Ar file | ||
| 682 | to read certificate extensions from | ||
| 683 | (using the default section unless the | ||
| 684 | .Fl extensions | ||
| 685 | option is also used). | ||
| 656 | .It Fl in Ar filename | 686 | .It Fl in Ar filename |
| 657 | An input | 687 | An input |
| 658 | .Ar filename | 688 | .Ar filename |
| 659 | containing a single certificate request to be signed by the CA. | 689 | containing a single certificate request to be signed by the CA. |
| 660 | .It Fl ss_cert Ar filename | ||
| 661 | A single self-signed certificate to be signed by the CA. | ||
| 662 | .It Fl spkac Ar filename | ||
| 663 | A file containing a single Netscape signed public key and challenge, | ||
| 664 | and additional field values to be signed by the CA. | ||
| 665 | See the | ||
| 666 | .Sx SPKAC FORMAT | ||
| 667 | section for information on the required format. | ||
| 668 | .It Fl infiles | 690 | .It Fl infiles |
| 669 | If present, this should be the last option; all subsequent arguments | 691 | If present, this should be the last option; all subsequent arguments |
| 670 | are assumed to be the names of files containing certificate requests. | 692 | are assumed to be the names of files containing certificate requests. |
| 671 | .It Fl out Ar filename | ||
| 672 | The output file to output certificates to. | ||
| 673 | The default is standard output. | ||
| 674 | The certificate details will also be printed out to this file. | ||
| 675 | .It Fl outdir Ar directory | ||
| 676 | The | ||
| 677 | .Ar directory | ||
| 678 | to output certificates to. | ||
| 679 | The certificate will be written to a filename consisting of the | ||
| 680 | serial number in hex with | ||
| 681 | .Qq .pem | ||
| 682 | appended. | ||
| 683 | .It Fl cert | ||
| 684 | The CA certificate file. | ||
| 685 | .It Fl keyfile Ar filename | ||
| 686 | The private key to sign requests with. | ||
| 687 | .It Fl keyform Ar PEM | ENGINE | ||
| 688 | Private key file format. | ||
| 689 | .It Fl key Ar password | 693 | .It Fl key Ar password |
| 690 | The password used to encrypt the private key. | 694 | The password used to encrypt the private key. |
| 691 | Since on some systems the command line arguments are visible | 695 | Since on some systems the command line arguments are visible |
| @@ -694,27 +698,10 @@ Since on some systems the command line arguments are visible | |||
| 694 | with the | 698 | with the |
| 695 | .Xr ps 1 | 699 | .Xr ps 1 |
| 696 | utility) this option should be used with caution. | 700 | utility) this option should be used with caution. |
| 697 | .It Fl passin Ar arg | 701 | .It Fl keyfile Ar filename |
| 698 | The key password source. | 702 | The private key to sign requests with. |
| 699 | For more information about the format of | 703 | .It Fl keyform Ar PEM | ENGINE |
| 700 | .Ar arg , | 704 | Private key file format. |
| 701 | see the | ||
| 702 | .Sx PASS PHRASE ARGUMENTS | ||
| 703 | section above. | ||
| 704 | .It Fl verbose | ||
| 705 | This prints extra details about the operations being performed. | ||
| 706 | .It Fl notext | ||
| 707 | Don't output the text form of a certificate to the output file. | ||
| 708 | .It Fl startdate Ar date | ||
| 709 | This allows the start date to be explicitly set. | ||
| 710 | The format of the date is YYMMDDHHMMSSZ | ||
| 711 | .Pq the same as an ASN1 UTCTime structure . | ||
| 712 | .It Fl enddate Ar date | ||
| 713 | This allows the expiry date to be explicitly set. | ||
| 714 | The format of the date is YYMMDDHHMMSSZ | ||
| 715 | .Pq the same as an ASN1 UTCTime structure . | ||
| 716 | .It Fl days Ar arg | ||
| 717 | The number of days to certify the certificate for. | ||
| 718 | .It Fl md Ar alg | 705 | .It Fl md Ar alg |
| 719 | The message digest to use. | 706 | The message digest to use. |
| 720 | Possible values include | 707 | Possible values include |
| @@ -722,15 +709,6 @@ Possible values include | |||
| 722 | and | 709 | and |
| 723 | .Ar sha1 . | 710 | .Ar sha1 . |
| 724 | This option also applies to CRLs. | 711 | This option also applies to CRLs. |
| 725 | .It Fl policy Ar arg | ||
| 726 | This option defines the CA | ||
| 727 | .Qq policy | ||
| 728 | to use. | ||
| 729 | This is a section in the configuration file which decides which fields | ||
| 730 | should be mandatory or match the CA certificate. | ||
| 731 | Check out the | ||
| 732 | .Sx CA POLICY FORMAT | ||
| 733 | section for more information. | ||
| 734 | .It Fl msie_hack | 712 | .It Fl msie_hack |
| 735 | This is a legacy option to make | 713 | This is a legacy option to make |
| 736 | .Nm ca | 714 | .Nm ca |
| @@ -742,14 +720,14 @@ its use is strongly discouraged. | |||
| 742 | The newer control | 720 | The newer control |
| 743 | .Qq Xenroll | 721 | .Qq Xenroll |
| 744 | does not need this option. | 722 | does not need this option. |
| 745 | .It Fl preserveDN | 723 | .It Fl name Ar section |
| 746 | Normally, the DN order of a certificate is the same as the order of the | 724 | Specifies the configuration file |
| 747 | fields in the relevant policy section. | 725 | .Ar section |
| 748 | When this option is set, the order is the same as the request. | 726 | to use (overrides |
| 749 | This is largely for compatibility with the older IE enrollment control | 727 | .Cm default_ca |
| 750 | which would only accept certificates if their DNs matched the order of the | 728 | in the |
| 751 | request. | 729 | .Cm ca |
| 752 | This is not needed for Xenroll. | 730 | section). |
| 753 | .It Fl noemailDN | 731 | .It Fl noemailDN |
| 754 | The DN of a certificate can contain the EMAIL field if present in the | 732 | The DN of a certificate can contain the EMAIL field if present in the |
| 755 | request DN, however it is good policy just having the e-mail set into | 733 | request DN, however it is good policy just having the e-mail set into |
| @@ -761,57 +739,83 @@ subject and set only in the, eventually present, extensions. | |||
| 761 | The | 739 | The |
| 762 | .Ar email_in_dn | 740 | .Ar email_in_dn |
| 763 | keyword can be used in the configuration file to enable this behaviour. | 741 | keyword can be used in the configuration file to enable this behaviour. |
| 764 | .It Fl batch | 742 | .It Fl notext |
| 765 | This sets the batch mode. | 743 | Don't output the text form of a certificate to the output file. |
| 766 | In this mode no questions will be asked | 744 | .It Fl out Ar filename |
| 767 | and all certificates will be certified automatically. | 745 | The output file to output certificates to. |
| 768 | .It Fl extensions Ar section | 746 | The default is standard output. |
| 769 | The section of the configuration file containing certificate extensions | 747 | The certificate details will also be printed out to this file. |
| 770 | to be added when a certificate is issued (defaults to | 748 | .It Fl outdir Ar directory |
| 771 | .Em x509_extensions | 749 | The |
| 772 | unless the | 750 | .Ar directory |
| 773 | .Fl extfile | 751 | to output certificates to. |
| 774 | option is used). | 752 | The certificate will be written to a filename consisting of the |
| 775 | If no extension section is present, then a V1 certificate is created. | 753 | serial number in hex with |
| 776 | If the extension section is present | 754 | .Qq .pem |
| 777 | .Pq even if it is empty , | 755 | appended. |
| 778 | then a V3 certificate is created. | 756 | .It Fl passin Ar arg |
| 779 | .It Fl extfile Ar file | 757 | The key password source. |
| 780 | An additional configuration | 758 | For more information about the format of |
| 781 | .Ar file | 759 | .Ar arg , |
| 782 | to read certificate extensions from | 760 | see the |
| 783 | (using the default section unless the | 761 | .Sx PASS PHRASE ARGUMENTS |
| 784 | .Fl extensions | 762 | section above. |
| 785 | option is also used). | 763 | .It Fl policy Ar arg |
| 764 | This option defines the CA | ||
| 765 | .Qq policy | ||
| 766 | to use. | ||
| 767 | This is a section in the configuration file which decides which fields | ||
| 768 | should be mandatory or match the CA certificate. | ||
| 769 | Check out the | ||
| 770 | .Sx CA POLICY FORMAT | ||
| 771 | section for more information. | ||
| 772 | .It Fl preserveDN | ||
| 773 | Normally, the DN order of a certificate is the same as the order of the | ||
| 774 | fields in the relevant policy section. | ||
| 775 | When this option is set, the order is the same as the request. | ||
| 776 | This is largely for compatibility with the older IE enrollment control | ||
| 777 | which would only accept certificates if their DNs matched the order of the | ||
| 778 | request. | ||
| 779 | This is not needed for Xenroll. | ||
| 780 | .It Fl spkac Ar filename | ||
| 781 | A file containing a single Netscape signed public key and challenge, | ||
| 782 | and additional field values to be signed by the CA. | ||
| 783 | See the | ||
| 784 | .Sx SPKAC FORMAT | ||
| 785 | section for information on the required format. | ||
| 786 | .It Fl ss_cert Ar filename | ||
| 787 | A single self-signed certificate to be signed by the CA. | ||
| 788 | .It Fl startdate Ar date | ||
| 789 | This allows the start date to be explicitly set. | ||
| 790 | The format of the date is YYMMDDHHMMSSZ | ||
| 791 | .Pq the same as an ASN1 UTCTime structure . | ||
| 786 | .It Fl status Ar serial | 792 | .It Fl status Ar serial |
| 787 | Show status of certificate with serial number | 793 | Show status of certificate with serial number |
| 788 | .Ar serial . | 794 | .Ar serial . |
| 789 | .It Fl updatedb | 795 | .It Fl updatedb |
| 790 | Update database for expired certificates. | 796 | Update database for expired certificates. |
| 791 | .It Fl engine Ar id | 797 | .It Fl verbose |
| 792 | Specifying an engine (by it's unique | 798 | This prints extra details about the operations being performed. |
| 793 | .Ar id | ||
| 794 | string) will cause | ||
| 795 | .Nm ca | ||
| 796 | to attempt to obtain a functional reference to the specified engine, | ||
| 797 | thus initialising it if needed. | ||
| 798 | The engine will then be set as the default for all available algorithms. | ||
| 799 | .El | 799 | .El |
| 800 | .Sh CRL OPTIONS | 800 | .Sh CRL OPTIONS |
| 801 | .Bl -tag -width "XXXX" | 801 | .Bl -tag -width "XXXX" |
| 802 | .It Fl gencrl | 802 | .It Fl crl_CA_compromise Ar time |
| 803 | This option generates a CRL based on information in the index file. | 803 | This is the same as |
| 804 | .It Fl crldays Ar num | 804 | .Fl crl_compromise , |
| 805 | The number of days before the next CRL is due. | 805 | except the revocation reason is set to CACompromise. |
| 806 | This is the days from now to place in the CRL | 806 | .It Fl crl_compromise Ar time |
| 807 | .Em nextUpdate | 807 | This sets the revocation reason to keyCompromise and the compromise time to |
| 808 | field. | 808 | .Ar time . |
| 809 | .It Fl crlhours Ar num | 809 | .Ar time |
| 810 | The number of hours before the next CRL is due. | 810 | should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ. |
| 811 | .It Fl revoke Ar filename | 811 | .It Fl crl_hold Ar instruction |
| 812 | A | 812 | This sets the CRL revocation reason code to certificateHold and the hold |
| 813 | .Ar filename | 813 | instruction to |
| 814 | containing a certificate to revoke. | 814 | .Ar instruction |
| 815 | which must be an OID. | ||
| 816 | Although any OID can be used, only holdInstructionNone | ||
| 817 | (the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or | ||
| 818 | holdInstructionReject will normally be used. | ||
| 815 | .It Fl crl_reason Ar reason | 819 | .It Fl crl_reason Ar reason |
| 816 | Revocation reason, where | 820 | Revocation reason, where |
| 817 | .Ar reason | 821 | .Ar reason |
| @@ -824,33 +828,11 @@ is case insensitive. | |||
| 824 | Setting any revocation reason will make the CRL v2. | 828 | Setting any revocation reason will make the CRL v2. |
| 825 | In practice, removeFromCRL is not particularly useful because it is only used | 829 | In practice, removeFromCRL is not particularly useful because it is only used |
| 826 | in delta CRLs which are not currently implemented. | 830 | in delta CRLs which are not currently implemented. |
| 827 | .It Fl crl_hold Ar instruction | 831 | .It Fl crldays Ar num |
| 828 | This sets the CRL revocation reason code to certificateHold and the hold | 832 | The number of days before the next CRL is due. |
| 829 | instruction to | 833 | This is the days from now to place in the CRL |
| 830 | .Ar instruction | 834 | .Em nextUpdate |
| 831 | which must be an OID. | 835 | field. |
| 832 | Although any OID can be used, only holdInstructionNone | ||
| 833 | (the use of which is discouraged by RFC 2459), holdInstructionCallIssuer or | ||
| 834 | holdInstructionReject will normally be used. | ||
| 835 | .It Fl crl_compromise Ar time | ||
| 836 | This sets the revocation reason to keyCompromise and the compromise time to | ||
| 837 | .Ar time . | ||
| 838 | .Ar time | ||
| 839 | should be in GeneralizedTime format, i.e. YYYYMMDDHHMMSSZ. | ||
| 840 | .It Fl crl_CA_compromise Ar time | ||
| 841 | This is the same as | ||
| 842 | .Fl crl_compromise , | ||
| 843 | except the revocation reason is set to CACompromise. | ||
| 844 | .It Fl subj Ar arg | ||
| 845 | Supersedes the subject name given in the request. | ||
| 846 | The | ||
| 847 | .Ar arg | ||
| 848 | must be formatted as | ||
| 849 | .Ar /type0=value0/type1=value1/type2=... ; | ||
| 850 | characters may be escaped by | ||
| 851 | .Sq \e | ||
| 852 | .Pq backslash , | ||
| 853 | no spaces are skipped. | ||
| 854 | .It Fl crlexts Ar section | 836 | .It Fl crlexts Ar section |
| 855 | The | 837 | The |
| 856 | .Ar section | 838 | .Ar section |
| @@ -865,6 +847,24 @@ CRL entry extensions. | |||
| 865 | It should be noted that some software | 847 | It should be noted that some software |
| 866 | .Pq for example Netscape | 848 | .Pq for example Netscape |
| 867 | can't handle V2 CRLs. | 849 | can't handle V2 CRLs. |
| 850 | .It Fl crlhours Ar num | ||
| 851 | The number of hours before the next CRL is due. | ||
| 852 | .It Fl gencrl | ||
| 853 | This option generates a CRL based on information in the index file. | ||
| 854 | .It Fl revoke Ar filename | ||
| 855 | A | ||
| 856 | .Ar filename | ||
| 857 | containing a certificate to revoke. | ||
| 858 | .It Fl subj Ar arg | ||
| 859 | Supersedes the subject name given in the request. | ||
| 860 | The | ||
| 861 | .Ar arg | ||
| 862 | must be formatted as | ||
| 863 | .Ar /type0=value0/type1=value1/type2=... ; | ||
| 864 | characters may be escaped by | ||
| 865 | .Sq \e | ||
| 866 | .Pq backslash , | ||
| 867 | no spaces are skipped. | ||
| 868 | .El | 868 | .El |
| 869 | .Sh CA CONFIGURATION FILE OPTIONS | 869 | .Sh CA CONFIGURATION FILE OPTIONS |
| 870 | The section of the configuration file containing options for | 870 | The section of the configuration file containing options for |
| @@ -903,51 +903,52 @@ the configuration file or the command line equivalent | |||
| 903 | .Pq if any | 903 | .Pq if any |
| 904 | used. | 904 | used. |
| 905 | .Bl -tag -width "XXXX" | 905 | .Bl -tag -width "XXXX" |
| 906 | .It Ar oid_file | ||
| 907 | This specifies a file containing additional OBJECT IDENTIFIERS. | ||
| 908 | Each line of the file should consist of the numerical form of the | ||
| 909 | object identifier followed by whitespace, then the short name followed | ||
| 910 | by whitespace and finally the long name. | ||
| 911 | .It Ar oid_section | ||
| 912 | This specifies a section in the configuration file containing extra | ||
| 913 | object identifiers. | ||
| 914 | Each line should consist of the short name of the object identifier | ||
| 915 | followed by | ||
| 916 | .Sq = | ||
| 917 | and the numerical form. | ||
| 918 | The short and long names are the same when this option is used. | ||
| 919 | .It Ar new_certs_dir | ||
| 920 | The same as the | ||
| 921 | .Fl outdir | ||
| 922 | command line option. | ||
| 923 | It specifies the directory where new certificates will be placed. | ||
| 924 | Mandatory. | ||
| 925 | .It Ar certificate | 906 | .It Ar certificate |
| 926 | The same as | 907 | The same as |
| 927 | .Fl cert . | 908 | .Fl cert . |
| 928 | It gives the file containing the CA certificate. | 909 | It gives the file containing the CA certificate. |
| 929 | Mandatory. | 910 | Mandatory. |
| 930 | .It Ar private_key | 911 | .It Ar copy_extensions |
| 931 | Same as the | 912 | Determines how extensions in certificate requests should be handled. |
| 932 | .Fl keyfile | 913 | If set to |
| 933 | option. | 914 | .Ar none |
| 934 | The file containing the CA private key. | 915 | or this option is not present, then extensions are |
| 916 | ignored and not copied to the certificate. | ||
| 917 | If set to | ||
| 918 | .Ar copy , | ||
| 919 | then any extensions present in the request that are not already present | ||
| 920 | are copied to the certificate. | ||
| 921 | If set to | ||
| 922 | .Ar copyall , | ||
| 923 | then all extensions in the request are copied to the certificate: | ||
| 924 | if the extension is already present in the certificate it is deleted first. | ||
| 925 | See the | ||
| 926 | .Sx CA WARNINGS | ||
| 927 | section before using this option. | ||
| 928 | .Pp | ||
| 929 | The main use of this option is to allow a certificate request to supply | ||
| 930 | values for certain extensions such as | ||
| 931 | .Em subjectAltName . | ||
| 932 | .It Ar crl_extensions | ||
| 933 | The same as | ||
| 934 | .Fl crlexts . | ||
| 935 | .It Ar database | ||
| 936 | The text database file to use. | ||
| 935 | Mandatory. | 937 | Mandatory. |
| 936 | .It Ar RANDFILE | 938 | This file must be present, though initially it will be empty. |
| 937 | A file used to read and write random number seed information, | 939 | .It Ar default_crl_hours , default_crl_days |
| 938 | or an EGD socket (see | 940 | The same as the |
| 939 | .Xr RAND_egd 3 ) . | 941 | .Fl crlhours |
| 942 | and | ||
| 943 | .Fl crldays | ||
| 944 | options. | ||
| 945 | These will only be used if neither command line option is present. | ||
| 946 | At least one of these must be present to generate a CRL. | ||
| 940 | .It Ar default_days | 947 | .It Ar default_days |
| 941 | The same as the | 948 | The same as the |
| 942 | .Fl days | 949 | .Fl days |
| 943 | option. | 950 | option. |
| 944 | The number of days to certify a certificate for. | 951 | The number of days to certify a certificate for. |
| 945 | .It Ar default_startdate | ||
| 946 | The same as the | ||
| 947 | .Fl startdate | ||
| 948 | option. | ||
| 949 | The start date to certify a certificate for. | ||
| 950 | If not set, the current time is used. | ||
| 951 | .It Ar default_enddate | 952 | .It Ar default_enddate |
| 952 | The same as the | 953 | The same as the |
| 953 | .Fl enddate | 954 | .Fl enddate |
| @@ -956,37 +957,18 @@ Either this option or | |||
| 956 | .Ar default_days | 957 | .Ar default_days |
| 957 | .Pq or the command line equivalents | 958 | .Pq or the command line equivalents |
| 958 | must be present. | 959 | must be present. |
| 959 | .It Ar default_crl_hours default_crl_days | ||
| 960 | The same as the | ||
| 961 | .Fl crlhours | ||
| 962 | and the | ||
| 963 | .Fl crldays | ||
| 964 | options. | ||
| 965 | These will only be used if neither command line option is present. | ||
| 966 | At least one of these must be present to generate a CRL. | ||
| 967 | .It Ar default_md | 960 | .It Ar default_md |
| 968 | The same as the | 961 | The same as the |
| 969 | .Fl md | 962 | .Fl md |
| 970 | option. | 963 | option. |
| 971 | The message digest to use. | 964 | The message digest to use. |
| 972 | Mandatory. | 965 | Mandatory. |
| 973 | .It Ar database | 966 | .It Ar default_startdate |
| 974 | The text database file to use. | 967 | The same as the |
| 975 | Mandatory. | 968 | .Fl startdate |
| 976 | This file must be present, though initially it will be empty. | 969 | option. |
| 977 | .It Ar serial | 970 | The start date to certify a certificate for. |
| 978 | A text file containing the next serial number to use in hex. | 971 | If not set, the current time is used. |
| 979 | Mandatory. | ||
| 980 | This file must be present and contain a valid serial number. | ||
| 981 | .It Ar x509_extensions | ||
| 982 | The same as | ||
| 983 | .Fl extensions . | ||
| 984 | .It Ar crl_extensions | ||
| 985 | the same as | ||
| 986 | .Fl crlexts . | ||
| 987 | .It Ar preserve | ||
| 988 | The same as | ||
| 989 | .Fl preserveDN . | ||
| 990 | .It Ar email_in_dn | 972 | .It Ar email_in_dn |
| 991 | The same as | 973 | The same as |
| 992 | .Fl noemailDN . | 974 | .Fl noemailDN . |
| @@ -998,13 +980,6 @@ certificate's DN. | |||
| 998 | .It Ar msie_hack | 980 | .It Ar msie_hack |
| 999 | The same as | 981 | The same as |
| 1000 | .Fl msie_hack . | 982 | .Fl msie_hack . |
| 1001 | .It Ar policy | ||
| 1002 | The same as | ||
| 1003 | .Fl policy . | ||
| 1004 | Mandatory. | ||
| 1005 | See the | ||
| 1006 | .Sx CA POLICY FORMAT | ||
| 1007 | section for more information. | ||
| 1008 | .It Ar nameopt , certopt | 983 | .It Ar nameopt , certopt |
| 1009 | These options allow the format used to display the certificate details | 984 | These options allow the format used to display the certificate details |
| 1010 | when asking the user to confirm signing. | 985 | when asking the user to confirm signing. |
| @@ -1035,27 +1010,52 @@ discouraged because it only displays fields mentioned in the | |||
| 1035 | .Ar policy | 1010 | .Ar policy |
| 1036 | section, | 1011 | section, |
| 1037 | mishandles multicharacter string types and does not display extensions. | 1012 | mishandles multicharacter string types and does not display extensions. |
| 1038 | .It Ar copy_extensions | 1013 | .It Ar new_certs_dir |
| 1039 | Determines how extensions in certificate requests should be handled. | 1014 | The same as the |
| 1040 | If set to | 1015 | .Fl outdir |
| 1041 | .Ar none | 1016 | command line option. |
| 1042 | or this option is not present, then extensions are | 1017 | It specifies the directory where new certificates will be placed. |
| 1043 | ignored and not copied to the certificate. | 1018 | Mandatory. |
| 1044 | If set to | 1019 | .It Ar oid_file |
| 1045 | .Ar copy , | 1020 | This specifies a file containing additional object identifiers. |
| 1046 | then any extensions present in the request that are not already present | 1021 | Each line of the file should consist of the numerical form of the |
| 1047 | are copied to the certificate. | 1022 | object identifier followed by whitespace, then the short name followed |
| 1048 | If set to | 1023 | by whitespace and finally the long name. |
| 1049 | .Ar copyall , | 1024 | .It Ar oid_section |
| 1050 | then all extensions in the request are copied to the certificate: | 1025 | This specifies a section in the configuration file containing extra |
| 1051 | if the extension is already present in the certificate it is deleted first. | 1026 | object identifiers. |
| 1027 | Each line should consist of the short name of the object identifier | ||
| 1028 | followed by | ||
| 1029 | .Sq = | ||
| 1030 | and the numerical form. | ||
| 1031 | The short and long names are the same when this option is used. | ||
| 1032 | .It Ar policy | ||
| 1033 | The same as | ||
| 1034 | .Fl policy . | ||
| 1035 | Mandatory. | ||
| 1052 | See the | 1036 | See the |
| 1053 | .Sx CA WARNINGS | 1037 | .Sx CA POLICY FORMAT |
| 1054 | section before using this option. | 1038 | section for more information. |
| 1055 | .Pp | 1039 | .It Ar preserve |
| 1056 | The main use of this option is to allow a certificate request to supply | 1040 | The same as |
| 1057 | values for certain extensions such as | 1041 | .Fl preserveDN . |
| 1058 | .Em subjectAltName . | 1042 | .It Ar private_key |
| 1043 | Same as the | ||
| 1044 | .Fl keyfile | ||
| 1045 | option. | ||
| 1046 | The file containing the CA private key. | ||
| 1047 | Mandatory. | ||
| 1048 | .It Ar RANDFILE | ||
| 1049 | A file used to read and write random number seed information, | ||
| 1050 | or an EGD socket (see | ||
| 1051 | .Xr RAND_egd 3 ) . | ||
| 1052 | .It Ar serial | ||
| 1053 | A text file containing the next serial number to use in hex. | ||
| 1054 | Mandatory. | ||
| 1055 | This file must be present and contain a valid serial number. | ||
| 1056 | .It Ar x509_extensions | ||
| 1057 | The same as | ||
| 1058 | .Fl extensions . | ||
| 1059 | .El | 1059 | .El |
| 1060 | .Sh CA POLICY FORMAT | 1060 | .Sh CA POLICY FORMAT |
| 1061 | The policy section consists of a set of variables corresponding to | 1061 | The policy section consists of a set of variables corresponding to |
| @@ -1189,7 +1189,7 @@ the location of all files can change either by compile time options, | |||
| 1189 | configuration file entries, environment variables, or command line options. | 1189 | configuration file entries, environment variables, or command line options. |
| 1190 | The values below reflect the default values. | 1190 | The values below reflect the default values. |
| 1191 | .Bd -literal -offset indent | 1191 | .Bd -literal -offset indent |
| 1192 | /usr/local/ssl/lib/openssl.cnf - master configuration file | 1192 | /etc/ssl/openssl.cnf - master configuration file |
| 1193 | \&./demoCA - main CA directory | 1193 | \&./demoCA - main CA directory |
| 1194 | \&./demoCA/cacert.pem - CA certificate | 1194 | \&./demoCA/cacert.pem - CA certificate |
| 1195 | \&./demoCA/private/cakey.pem - CA private key | 1195 | \&./demoCA/private/cakey.pem - CA private key |
| @@ -1726,7 +1726,7 @@ Print out the CRL in text form. | |||
| 1726 | Don't output the encoded version of the CRL. | 1726 | Don't output the encoded version of the CRL. |
| 1727 | .It Fl hash | 1727 | .It Fl hash |
| 1728 | Output a hash of the issuer name. | 1728 | Output a hash of the issuer name. |
| 1729 | This can be used to lookup CRLs in a directory by issuer name. | 1729 | This can be used to look up CRLs in a directory by issuer name. |
| 1730 | .It Fl fingerprint | 1730 | .It Fl fingerprint |
| 1731 | Print the CRL fingerprint. | 1731 | Print the CRL fingerprint. |
| 1732 | .It Fl issuer | 1732 | .It Fl issuer |
| @@ -2984,7 +2984,7 @@ input and output files and allowing multiple certificate files to be used. | |||
| 2984 | .Op Fl url Ar URL | 2984 | .Op Fl url Ar URL |
| 2985 | .Oo | 2985 | .Oo |
| 2986 | .Fl host | 2986 | .Fl host |
| 2987 | .Ar hostname Ns : Ns Ar port | 2987 | .Ar hostname : Ns Ar port |
| 2988 | .Oc | 2988 | .Oc |
| 2989 | .Op Fl path | 2989 | .Op Fl path |
| 2990 | .Op Fl CApath Ar dir | 2990 | .Op Fl CApath Ar dir |
| @@ -3118,7 +3118,7 @@ Both HTTP and HTTPS | |||
| 3118 | .Pq SSL/TLS | 3118 | .Pq SSL/TLS |
| 3119 | URLs can be specified. | 3119 | URLs can be specified. |
| 3120 | .It Xo | 3120 | .It Xo |
| 3121 | .Fl host Ar hostname Ns : Ns Ar port , | 3121 | .Fl host Ar hostname : Ns Ar port , |
| 3122 | .Fl path Ar pathname | 3122 | .Fl path Ar pathname |
| 3123 | .Xc | 3123 | .Xc |
| 3124 | If the | 3124 | If the |
| @@ -4311,12 +4311,12 @@ The engine will then be set as the default for all available algorithms. | |||
| 4311 | .Op Fl rand Ar file ... | 4311 | .Op Fl rand Ar file ... |
| 4312 | .Oo Xo | 4312 | .Oo Xo |
| 4313 | .Fl newkey | 4313 | .Fl newkey |
| 4314 | .Ar rsa Ns : Ns Ar bits | 4314 | .Ar rsa : Ns Ar bits |
| 4315 | .Xc | 4315 | .Xc |
| 4316 | .Oc | 4316 | .Oc |
| 4317 | .Oo Xo | 4317 | .Oo Xo |
| 4318 | .Fl newkey | 4318 | .Fl newkey |
| 4319 | .Ar dsa Ns : Ns Ar file | 4319 | .Ar dsa : Ns Ar file |
| 4320 | .Xc | 4320 | .Xc |
| 4321 | .Oc | 4321 | .Oc |
| 4322 | .Op Fl nodes | 4322 | .Op Fl nodes |
| @@ -4423,13 +4423,13 @@ Multiple files can be specified separated by a | |||
| 4423 | .It Fl newkey Ar arg | 4423 | .It Fl newkey Ar arg |
| 4424 | This option creates a new certificate request and a new private key. | 4424 | This option creates a new certificate request and a new private key. |
| 4425 | The argument takes one of two forms: | 4425 | The argument takes one of two forms: |
| 4426 | .Ar rsa Ns : Ns Ar nbits , | 4426 | .Ar rsa : Ns Ar nbits , |
| 4427 | where | 4427 | where |
| 4428 | .Ar nbits | 4428 | .Ar nbits |
| 4429 | is the number of bits, generates an RSA key | 4429 | is the number of bits, generates an RSA key |
| 4430 | .Ar nbits | 4430 | .Ar nbits |
| 4431 | in size. | 4431 | in size. |
| 4432 | .Ar dsa Ns : Ns Ar filename | 4432 | .Ar dsa : Ns Ar filename |
| 4433 | generates a DSA key using the parameters in the file | 4433 | generates a DSA key using the parameters in the file |
| 4434 | .Ar filename . | 4434 | .Ar filename . |
| 4435 | .It Fl key Ar filename | 4435 | .It Fl key Ar filename |
| @@ -5412,7 +5412,7 @@ which it can be seen agrees with the recovered value above. | |||
| 5412 | .Nm openssl s_client | 5412 | .Nm openssl s_client |
| 5413 | .Bk -words | 5413 | .Bk -words |
| 5414 | .Oo | 5414 | .Oo |
| 5415 | .Fl connect Ar host Ns : Ns Ar port | 5415 | .Fl connect Ar host : Ns Ar port |
| 5416 | .Oc | 5416 | .Oc |
| 5417 | .Op Fl verify Ar depth | 5417 | .Op Fl verify Ar depth |
| 5418 | .Op Fl cert Ar filename | 5418 | .Op Fl cert Ar filename |
| @@ -5456,7 +5456,7 @@ useful diagnostic tool for SSL servers. | |||
| 5456 | The options are as follows: | 5456 | The options are as follows: |
| 5457 | .Bl -tag -width "XXXX" | 5457 | .Bl -tag -width "XXXX" |
| 5458 | .It Xo | 5458 | .It Xo |
| 5459 | .Fl connect Ar host Ns : Ns Ar port | 5459 | .Fl connect Ar host : Ns Ar port |
| 5460 | .Xc | 5460 | .Xc |
| 5461 | This specifies the | 5461 | This specifies the |
| 5462 | .Ar host | 5462 | .Ar host |
| @@ -6617,7 +6617,7 @@ Use EVP | |||
| 6617 | Time decryption instead of encryption | 6617 | Time decryption instead of encryption |
| 6618 | .Pq only EVP . | 6618 | .Pq only EVP . |
| 6619 | .It Fl mr | 6619 | .It Fl mr |
| 6620 | Produce machine readable ouput. | 6620 | Produce machine readable output. |
| 6621 | .It Fl multi Ar number | 6621 | .It Fl multi Ar number |
| 6622 | Run | 6622 | Run |
| 6623 | .Ar number | 6623 | .Ar number |
| @@ -7305,7 +7305,7 @@ Print OCSP hash values for the subject name and public key. | |||
| 7305 | This option prints out the value of the modulus of the public key | 7305 | This option prints out the value of the modulus of the public key |
| 7306 | contained in the certificate. | 7306 | contained in the certificate. |
| 7307 | .It Fl pubkey | 7307 | .It Fl pubkey |
| 7308 | Ouput the public key. | 7308 | Output the public key. |
| 7309 | .It Fl serial | 7309 | .It Fl serial |
| 7310 | Outputs the certificate serial number. | 7310 | Outputs the certificate serial number. |
| 7311 | .It Fl hash | 7311 | .It Fl hash |
