diff options
| author | jmc <> | 2003-07-16 09:05:58 +0000 |
|---|---|---|
| committer | jmc <> | 2003-07-16 09:05:58 +0000 |
| commit | 532c18f1f3c2b718b6845205aa5dc0ea3c873efc (patch) | |
| tree | 4734d781124434e97451a5fe3207a539d3d6c536 /src | |
| parent | 19f7f066e726b9057c4d22f7ea855a2eec1a6826 (diff) | |
| download | openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.gz openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.bz2 openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.zip | |
kill a rake of .br's and .Pp's that worked around the spacing bug. should
help postscript output too.
Diffstat (limited to 'src')
| -rw-r--r-- | src/usr.sbin/openssl/openssl.1 | 101 |
1 files changed, 1 insertions, 100 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1 index b115397bad..0be74bd25e 100644 --- a/src/usr.sbin/openssl/openssl.1 +++ b/src/usr.sbin/openssl/openssl.1 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: openssl.1,v 1.9 2003/06/12 12:59:51 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.10 2003/07/16 09:05:58 jmc Exp $ |
| 2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
| 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
| 4 | .\" | 4 | .\" |
| @@ -459,7 +459,6 @@ This option can be used multiple times to "drill down" into a nested structure. | |||
| 459 | .El | 459 | .El |
| 460 | .Sh ASN1PARSE OUTPUT | 460 | .Sh ASN1PARSE OUTPUT |
| 461 | The output will typically contain lines like this: | 461 | The output will typically contain lines like this: |
| 462 | .Pp | ||
| 463 | .Bd -literal | 462 | .Bd -literal |
| 464 | 0:d=0 hl=4 l= 681 cons: SEQUENCE | 463 | 0:d=0 hl=4 l= 681 cons: SEQUENCE |
| 465 | 464 | ||
| @@ -500,7 +499,6 @@ The contents octets of this will contain the public key information. | |||
| 500 | This can be examined using the option | 499 | This can be examined using the option |
| 501 | .Fl strparse Cm 229 | 500 | .Fl strparse Cm 229 |
| 502 | to yield: | 501 | to yield: |
| 503 | .Pp | ||
| 504 | .Bd -literal | 502 | .Bd -literal |
| 505 | \& 0:d=0 hl=3 l= 137 cons: SEQUENCE | 503 | \& 0:d=0 hl=3 l= 137 cons: SEQUENCE |
| 506 | \& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 | 504 | \& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 |
| @@ -816,7 +814,6 @@ Where the option is present in the configuration file and the command line, | |||
| 816 | the command line value is used. | 814 | the command line value is used. |
| 817 | Where an option is described as mandatory, then it must be present in | 815 | Where an option is described as mandatory, then it must be present in |
| 818 | the configuration file or the command line equivalent (if any) used. | 816 | the configuration file or the command line equivalent (if any) used. |
| 819 | .Pp | ||
| 820 | .Bl -tag -width "XXXX" | 817 | .Bl -tag -width "XXXX" |
| 821 | .It Ar oid_file | 818 | .It Ar oid_file |
| 822 | This specifies a file containing additional OBJECT IDENTIFIERS. | 819 | This specifies a file containing additional OBJECT IDENTIFIERS. |
| @@ -1043,7 +1040,6 @@ Certify a Netscape SPKAC: | |||
| 1043 | \& $ openssl ca -spkac spkac.txt | 1040 | \& $ openssl ca -spkac spkac.txt |
| 1044 | .Pp | 1041 | .Pp |
| 1045 | A sample SPKAC file (the SPKAC line has been truncated for clarity): | 1042 | A sample SPKAC file (the SPKAC line has been truncated for clarity): |
| 1046 | .Pp | ||
| 1047 | .Bd -literal | 1043 | .Bd -literal |
| 1048 | \& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5 | 1044 | \& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5 |
| 1049 | \& CN=Steve Test | 1045 | \& CN=Steve Test |
| @@ -1054,7 +1050,6 @@ A sample SPKAC file (the SPKAC line has been truncated for clarity): | |||
| 1054 | .Pp | 1050 | .Pp |
| 1055 | A sample configuration file with the relevant sections for | 1051 | A sample configuration file with the relevant sections for |
| 1056 | .Nm ca : | 1052 | .Nm ca : |
| 1057 | .Pp | ||
| 1058 | .Bd -literal | 1053 | .Bd -literal |
| 1059 | \& [ ca ] | 1054 | \& [ ca ] |
| 1060 | \& default_ca = CA_default # The default ca section | 1055 | \& default_ca = CA_default # The default ca section |
| @@ -1094,7 +1089,6 @@ A sample configuration file with the relevant sections for | |||
| 1094 | the location of all files can change either by compile time options, | 1089 | the location of all files can change either by compile time options, |
| 1095 | configuration file entries, environment variables or command line options. | 1090 | configuration file entries, environment variables or command line options. |
| 1096 | The values below reflect the default values. | 1091 | The values below reflect the default values. |
| 1097 | .Pp | ||
| 1098 | .Bd -literal | 1092 | .Bd -literal |
| 1099 | /usr/local/ssl/lib/openssl.cnf - master configuration file | 1093 | /usr/local/ssl/lib/openssl.cnf - master configuration file |
| 1100 | \&./demoCA - main CA directory | 1094 | \&./demoCA - main CA directory |
| @@ -1307,7 +1301,6 @@ If | |||
| 1307 | .Cm - | 1301 | .Cm - |
| 1308 | is used, then the ciphers are deleted from the list, but some or | 1302 | is used, then the ciphers are deleted from the list, but some or |
| 1309 | all of the ciphers can be added again by later options. | 1303 | all of the ciphers can be added again by later options. |
| 1310 | .br | ||
| 1311 | .Pp | 1304 | .Pp |
| 1312 | If | 1305 | If |
| 1313 | .Cm + | 1306 | .Cm + |
| @@ -1432,7 +1425,6 @@ authentication used, e.g. DES-CBC3-SHA. | |||
| 1432 | In these cases, RSA authentication is used. | 1425 | In these cases, RSA authentication is used. |
| 1433 | .Pp | 1426 | .Pp |
| 1434 | .Sy "SSL v3.0 cipher suites" | 1427 | .Sy "SSL v3.0 cipher suites" |
| 1435 | .Pp | ||
| 1436 | .Bd -literal | 1428 | .Bd -literal |
| 1437 | SSL_RSA_WITH_NULL_MD5 NULL-MD5 | 1429 | SSL_RSA_WITH_NULL_MD5 NULL-MD5 |
| 1438 | SSL_RSA_WITH_NULL_SHA NULL-SHA | 1430 | SSL_RSA_WITH_NULL_SHA NULL-SHA |
| @@ -1445,7 +1437,6 @@ In these cases, RSA authentication is used. | |||
| 1445 | SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA | 1437 | SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA |
| 1446 | SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA | 1438 | SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA |
| 1447 | .Ed | 1439 | .Ed |
| 1448 | .Pp | ||
| 1449 | .Bd -literal | 1440 | .Bd -literal |
| 1450 | SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. | 1441 | SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. |
| 1451 | SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented. | 1442 | SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented. |
| @@ -1460,7 +1451,6 @@ In these cases, RSA authentication is used. | |||
| 1460 | SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA | 1451 | SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA |
| 1461 | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA | 1452 | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA |
| 1462 | .Ed | 1453 | .Ed |
| 1463 | .Pp | ||
| 1464 | .Bd -literal | 1454 | .Bd -literal |
| 1465 | SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 | 1455 | SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 |
| 1466 | SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 | 1456 | SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 |
| @@ -1468,7 +1458,6 @@ In these cases, RSA authentication is used. | |||
| 1468 | SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA | 1458 | SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA |
| 1469 | SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA | 1459 | SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA |
| 1470 | .Ed | 1460 | .Ed |
| 1471 | .Pp | ||
| 1472 | .Bd -literal | 1461 | .Bd -literal |
| 1473 | SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented. | 1462 | SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented. |
| 1474 | SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented. | 1463 | SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented. |
| @@ -1476,7 +1465,6 @@ In these cases, RSA authentication is used. | |||
| 1476 | .Ed | 1465 | .Ed |
| 1477 | .Pp | 1466 | .Pp |
| 1478 | .Sy "TLS v1.0 cipher suites" | 1467 | .Sy "TLS v1.0 cipher suites" |
| 1479 | .Pp | ||
| 1480 | .Bd -literal | 1468 | .Bd -literal |
| 1481 | TLS_RSA_WITH_NULL_MD5 NULL-MD5 | 1469 | TLS_RSA_WITH_NULL_MD5 NULL-MD5 |
| 1482 | TLS_RSA_WITH_NULL_SHA NULL-SHA | 1470 | TLS_RSA_WITH_NULL_SHA NULL-SHA |
| @@ -1489,7 +1477,6 @@ In these cases, RSA authentication is used. | |||
| 1489 | TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA | 1477 | TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA |
| 1490 | TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA | 1478 | TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA |
| 1491 | .Ed | 1479 | .Ed |
| 1492 | .Pp | ||
| 1493 | .Bd -literal | 1480 | .Bd -literal |
| 1494 | TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. | 1481 | TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. |
| 1495 | TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented. | 1482 | TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented. |
| @@ -1504,7 +1491,6 @@ In these cases, RSA authentication is used. | |||
| 1504 | TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA | 1491 | TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA |
| 1505 | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA | 1492 | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA |
| 1506 | .Ed | 1493 | .Ed |
| 1507 | .Pp | ||
| 1508 | .Bd -literal | 1494 | .Bd -literal |
| 1509 | TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 | 1495 | TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 |
| 1510 | TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 | 1496 | TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 |
| @@ -1536,7 +1522,6 @@ In these cases, RSA authentication is used. | |||
| 1536 | .Pp | 1522 | .Pp |
| 1537 | .Sy Note : | 1523 | .Sy Note : |
| 1538 | These ciphers can also be used in SSL v3. | 1524 | These ciphers can also be used in SSL v3. |
| 1539 | .Pp | ||
| 1540 | .Bd -literal | 1525 | .Bd -literal |
| 1541 | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA | 1526 | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA |
| 1542 | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA | 1527 | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA |
| @@ -1546,7 +1531,6 @@ These ciphers can also be used in SSL v3. | |||
| 1546 | .Ed | 1531 | .Ed |
| 1547 | .Pp | 1532 | .Pp |
| 1548 | .Sy "SSL v2.0 cipher suites" | 1533 | .Sy "SSL v2.0 cipher suites" |
| 1549 | .Pp | ||
| 1550 | .Bd -literal | 1534 | .Bd -literal |
| 1551 | SSL_CK_RC4_128_WITH_MD5 RC4-MD5 | 1535 | SSL_CK_RC4_128_WITH_MD5 RC4-MD5 |
| 1552 | SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 | 1536 | SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 |
| @@ -1670,7 +1654,6 @@ should be linked to each certificate. | |||
| 1670 | .El | 1654 | .El |
| 1671 | .Sh CRL NOTES | 1655 | .Sh CRL NOTES |
| 1672 | The PEM CRL format uses the header and footer lines: | 1656 | The PEM CRL format uses the header and footer lines: |
| 1673 | .Pp | ||
| 1674 | .Bd -literal | 1657 | .Bd -literal |
| 1675 | \& -----BEGIN X509 CRL----- | 1658 | \& -----BEGIN X509 CRL----- |
| 1676 | \& -----END X509 CRL----- | 1659 | \& -----END X509 CRL----- |
| @@ -1756,7 +1739,6 @@ Creates a PKCS#7 structure in | |||
| 1756 | .Ar DER | 1739 | .Ar DER |
| 1757 | format with no CRL from several | 1740 | format with no CRL from several |
| 1758 | different certificates: | 1741 | different certificates: |
| 1759 | .Pp | ||
| 1760 | .Bd -literal | 1742 | .Bd -literal |
| 1761 | \& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem | 1743 | \& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem |
| 1762 | \& -certfile demoCA/cacert.pem -outform DER -out p7.der | 1744 | \& -certfile demoCA/cacert.pem -outform DER -out p7.der |
| @@ -2010,7 +1992,6 @@ versions of | |||
| 2010 | .Sh DHPARAM NOTES | 1992 | .Sh DHPARAM NOTES |
| 2011 | .Ar PEM | 1993 | .Ar PEM |
| 2012 | format DH parameters use the header and footer lines: | 1994 | format DH parameters use the header and footer lines: |
| 2013 | .Pp | ||
| 2014 | .Bd -literal | 1995 | .Bd -literal |
| 2015 | \& -----BEGIN DH PARAMETERS----- | 1996 | \& -----BEGIN DH PARAMETERS----- |
| 2016 | \& -----END DH PARAMETERS----- | 1997 | \& -----END DH PARAMETERS----- |
| @@ -2162,7 +2143,6 @@ The engine will then be set as the default for all available algorithms. | |||
| 2162 | The | 2143 | The |
| 2163 | .Ar PEM | 2144 | .Ar PEM |
| 2164 | private key format uses the header and footer lines: | 2145 | private key format uses the header and footer lines: |
| 2165 | .Pp | ||
| 2166 | .Bd -literal | 2146 | .Bd -literal |
| 2167 | \& -----BEGIN DSA PRIVATE KEY----- | 2147 | \& -----BEGIN DSA PRIVATE KEY----- |
| 2168 | \& -----END DSA PRIVATE KEY----- | 2148 | \& -----END DSA PRIVATE KEY----- |
| @@ -2171,7 +2151,6 @@ private key format uses the header and footer lines: | |||
| 2171 | The | 2151 | The |
| 2172 | .Ar PEM | 2152 | .Ar PEM |
| 2173 | public key format uses the header and footer lines: | 2153 | public key format uses the header and footer lines: |
| 2174 | .Pp | ||
| 2175 | .Bd -literal | 2154 | .Bd -literal |
| 2176 | \& -----BEGIN PUBLIC KEY----- | 2155 | \& -----BEGIN PUBLIC KEY----- |
| 2177 | \& -----END PUBLIC KEY----- | 2156 | \& -----END PUBLIC KEY----- |
| @@ -2296,7 +2275,6 @@ The engine will then be set as the default for all available algorithms. | |||
| 2296 | .Sh DSAPARAM NOTES | 2275 | .Sh DSAPARAM NOTES |
| 2297 | .Ar PEM | 2276 | .Ar PEM |
| 2298 | format DSA parameters use the header and footer lines: | 2277 | format DSA parameters use the header and footer lines: |
| 2299 | .Pp | ||
| 2300 | .Bd -literal | 2278 | .Bd -literal |
| 2301 | \& -----BEGIN DSA PARAMETERS----- | 2279 | \& -----BEGIN DSA PARAMETERS----- |
| 2302 | \& -----END DSA PARAMETERS----- | 2280 | \& -----END DSA PARAMETERS----- |
| @@ -2525,7 +2503,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2525 | .Bd -literal | 2503 | .Bd -literal |
| 2526 | \& base64 Base 64 | 2504 | \& base64 Base 64 |
| 2527 | .Ed | 2505 | .Ed |
| 2528 | .Pp | ||
| 2529 | .Bd -literal | 2506 | .Bd -literal |
| 2530 | \& bf-cbc Blowfish in CBC mode | 2507 | \& bf-cbc Blowfish in CBC mode |
| 2531 | \& bf Alias for bf-cbc | 2508 | \& bf Alias for bf-cbc |
| @@ -2533,7 +2510,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2533 | \& bf-ecb Blowfish in ECB mode | 2510 | \& bf-ecb Blowfish in ECB mode |
| 2534 | \& bf-ofb Blowfish in OFB mode | 2511 | \& bf-ofb Blowfish in OFB mode |
| 2535 | .Ed | 2512 | .Ed |
| 2536 | .Pp | ||
| 2537 | .Bd -literal | 2513 | .Bd -literal |
| 2538 | \& cast-cbc CAST in CBC mode | 2514 | \& cast-cbc CAST in CBC mode |
| 2539 | \& cast Alias for cast-cbc | 2515 | \& cast Alias for cast-cbc |
| @@ -2542,7 +2518,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2542 | \& cast5-ecb CAST5 in ECB mode | 2518 | \& cast5-ecb CAST5 in ECB mode |
| 2543 | \& cast5-ofb CAST5 in OFB mode | 2519 | \& cast5-ofb CAST5 in OFB mode |
| 2544 | .Ed | 2520 | .Ed |
| 2545 | .Pp | ||
| 2546 | .Bd -literal | 2521 | .Bd -literal |
| 2547 | \& des-cbc DES in CBC mode | 2522 | \& des-cbc DES in CBC mode |
| 2548 | \& des Alias for des-cbc | 2523 | \& des Alias for des-cbc |
| @@ -2550,14 +2525,12 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2550 | \& des-ofb DES in OFB mode | 2525 | \& des-ofb DES in OFB mode |
| 2551 | \& des-ecb DES in ECB mode | 2526 | \& des-ecb DES in ECB mode |
| 2552 | .Ed | 2527 | .Ed |
| 2553 | .Pp | ||
| 2554 | .Bd -literal | 2528 | .Bd -literal |
| 2555 | \& des-ede-cbc Two key triple DES EDE in CBC mode | 2529 | \& des-ede-cbc Two key triple DES EDE in CBC mode |
| 2556 | \& des-ede Alias for des-ede | 2530 | \& des-ede Alias for des-ede |
| 2557 | \& des-ede-cfb Two key triple DES EDE in CFB mode | 2531 | \& des-ede-cfb Two key triple DES EDE in CFB mode |
| 2558 | \& des-ede-ofb Two key triple DES EDE in OFB mode | 2532 | \& des-ede-ofb Two key triple DES EDE in OFB mode |
| 2559 | .Ed | 2533 | .Ed |
| 2560 | .Pp | ||
| 2561 | .Bd -literal | 2534 | .Bd -literal |
| 2562 | \& des-ede3-cbc Three key triple DES EDE in CBC mode | 2535 | \& des-ede3-cbc Three key triple DES EDE in CBC mode |
| 2563 | \& des-ede3 Alias for des-ede3-cbc | 2536 | \& des-ede3 Alias for des-ede3-cbc |
| @@ -2565,11 +2538,9 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2565 | \& des-ede3-cfb Three key triple DES EDE CFB mode | 2538 | \& des-ede3-cfb Three key triple DES EDE CFB mode |
| 2566 | \& des-ede3-ofb Three key triple DES EDE in OFB mode | 2539 | \& des-ede3-ofb Three key triple DES EDE in OFB mode |
| 2567 | .Ed | 2540 | .Ed |
| 2568 | .Pp | ||
| 2569 | .Bd -literal | 2541 | .Bd -literal |
| 2570 | \& desx DESX algorithm. | 2542 | \& desx DESX algorithm. |
| 2571 | .Ed | 2543 | .Ed |
| 2572 | .Pp | ||
| 2573 | .Bd -literal | 2544 | .Bd -literal |
| 2574 | \& idea-cbc IDEA algorithm in CBC mode | 2545 | \& idea-cbc IDEA algorithm in CBC mode |
| 2575 | \& idea same as idea-cbc | 2546 | \& idea same as idea-cbc |
| @@ -2577,7 +2548,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2577 | \& idea-ecb IDEA in ECB mode | 2548 | \& idea-ecb IDEA in ECB mode |
| 2578 | \& idea-ofb IDEA in OFB mode | 2549 | \& idea-ofb IDEA in OFB mode |
| 2579 | .Ed | 2550 | .Ed |
| 2580 | .Pp | ||
| 2581 | .Bd -literal | 2551 | .Bd -literal |
| 2582 | \& rc2-cbc 128 bit RC2 in CBC mode | 2552 | \& rc2-cbc 128 bit RC2 in CBC mode |
| 2583 | \& rc2 Alias for rc2-cbc | 2553 | \& rc2 Alias for rc2-cbc |
| @@ -2587,13 +2557,11 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
| 2587 | \& rc2-64-cbc 64 bit RC2 in CBC mode | 2557 | \& rc2-64-cbc 64 bit RC2 in CBC mode |
| 2588 | \& rc2-40-cbc 40 bit RC2 in CBC mode | 2558 | \& rc2-40-cbc 40 bit RC2 in CBC mode |
| 2589 | .Ed | 2559 | .Ed |
| 2590 | .Pp | ||
| 2591 | .Bd -literal | 2560 | .Bd -literal |
| 2592 | \& rc4 128 bit RC4 | 2561 | \& rc4 128 bit RC4 |
| 2593 | \& rc4-64 64 bit RC4 | 2562 | \& rc4-64 64 bit RC4 |
| 2594 | \& rc4-40 40 bit RC4 | 2563 | \& rc4-40 40 bit RC4 |
| 2595 | .Ed | 2564 | .Ed |
| 2596 | .Pp | ||
| 2597 | .Bd -literal | 2565 | .Bd -literal |
| 2598 | \& rc5-cbc RC5 cipher in CBC mode | 2566 | \& rc5-cbc RC5 cipher in CBC mode |
| 2599 | \& rc5 Alias for rc5-cbc | 2567 | \& rc5 Alias for rc5-cbc |
| @@ -2854,7 +2822,6 @@ Output the certificates in a Netscape certificate sequence: | |||
| 2854 | .Ed | 2822 | .Ed |
| 2855 | .Pp | 2823 | .Pp |
| 2856 | Create a Netscape certificate sequence: | 2824 | Create a Netscape certificate sequence: |
| 2857 | .Pp | ||
| 2858 | .Bd -literal | 2825 | .Bd -literal |
| 2859 | \& $ openssl nseq -in certs.pem -toseq -out nseq.pem | 2826 | \& $ openssl nseq -in certs.pem -toseq -out nseq.pem |
| 2860 | .Ed | 2827 | .Ed |
| @@ -2862,7 +2829,6 @@ Create a Netscape certificate sequence: | |||
| 2862 | The | 2829 | The |
| 2863 | .Em PEM | 2830 | .Em PEM |
| 2864 | encoded form uses the same headers and footers as a certificate: | 2831 | encoded form uses the same headers and footers as a certificate: |
| 2865 | .Pp | ||
| 2866 | .Bd -literal | 2832 | .Bd -literal |
| 2867 | \& -----BEGIN CERTIFICATE----- | 2833 | \& -----BEGIN CERTIFICATE----- |
| 2868 | \& -----END CERTIFICATE----- | 2834 | \& -----END CERTIFICATE----- |
| @@ -2931,7 +2897,6 @@ input and output files and allowing multiple certificate files to be used. | |||
| 2931 | .Op Fl resp_key_id | 2897 | .Op Fl resp_key_id |
| 2932 | .Op Fl nrequest Ar n | 2898 | .Op Fl nrequest Ar n |
| 2933 | .Ek | 2899 | .Ek |
| 2934 | .br | ||
| 2935 | .Pp | 2900 | .Pp |
| 2936 | The Online Certificate Status Protocol (OCSP) enables applications to | 2901 | The Online Certificate Status Protocol (OCSP) enables applications to |
| 2937 | determine the (revocation) state of an identified certificate (RFC 2560). | 2902 | determine the (revocation) state of an identified certificate (RFC 2560). |
| @@ -3242,7 +3207,6 @@ If the OCSP responder is a | |||
| 3242 | which can give details about multiple CAs and has its own separate | 3207 | which can give details about multiple CAs and has its own separate |
| 3243 | certificate chain, then its root CA can be trusted for OCSP signing. | 3208 | certificate chain, then its root CA can be trusted for OCSP signing. |
| 3244 | For example: | 3209 | For example: |
| 3245 | .Pp | ||
| 3246 | .Bd -literal | 3210 | .Bd -literal |
| 3247 | \& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem | 3211 | \& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem |
| 3248 | .Ed | 3212 | .Ed |
| @@ -3279,7 +3243,6 @@ and | |||
| 3279 | options. | 3243 | options. |
| 3280 | .Sh OCSP EXAMPLES | 3244 | .Sh OCSP EXAMPLES |
| 3281 | Create an OCSP request and write it to a file: | 3245 | Create an OCSP request and write it to a file: |
| 3282 | .Pp | ||
| 3283 | .Bd -literal | 3246 | .Bd -literal |
| 3284 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e | 3247 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e |
| 3285 | req.der | 3248 | req.der |
| @@ -3288,14 +3251,12 @@ Create an OCSP request and write it to a file: | |||
| 3288 | Send a query to an OCSP responder with URL | 3251 | Send a query to an OCSP responder with URL |
| 3289 | .Pa http://ocsp.myhost.com/ , | 3252 | .Pa http://ocsp.myhost.com/ , |
| 3290 | save the response to a file and print it out in text form: | 3253 | save the response to a file and print it out in text form: |
| 3291 | .Pp | ||
| 3292 | .Bd -literal | 3254 | .Bd -literal |
| 3293 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e | 3255 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e |
| 3294 | \& -url http://ocsp.myhost.com/ -resp_text -respout resp.der | 3256 | \& -url http://ocsp.myhost.com/ -resp_text -respout resp.der |
| 3295 | .Ed | 3257 | .Ed |
| 3296 | .Pp | 3258 | .Pp |
| 3297 | Read in an OCSP response and print out text form: | 3259 | Read in an OCSP response and print out text form: |
| 3298 | .Pp | ||
| 3299 | .Bd -literal | 3260 | .Bd -literal |
| 3300 | \& $ openssl ocsp -respin resp.der -text | 3261 | \& $ openssl ocsp -respin resp.der -text |
| 3301 | .Ed | 3262 | .Ed |
| @@ -3304,21 +3265,18 @@ OCSP server on port 8888 using a standard | |||
| 3304 | .Nm ca | 3265 | .Nm ca |
| 3305 | configuration, and a separate responder certificate. | 3266 | configuration, and a separate responder certificate. |
| 3306 | All requests and responses are printed to a file: | 3267 | All requests and responses are printed to a file: |
| 3307 | .Pp | ||
| 3308 | .Bd -literal | 3268 | .Bd -literal |
| 3309 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e | 3269 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e |
| 3310 | -CA demoCA/cacert.pem -text -out log.txt | 3270 | -CA demoCA/cacert.pem -text -out log.txt |
| 3311 | .Ed | 3271 | .Ed |
| 3312 | .Pp | 3272 | .Pp |
| 3313 | As above, but exit after processing one request: | 3273 | As above, but exit after processing one request: |
| 3314 | .Pp | ||
| 3315 | .Bd -literal | 3274 | .Bd -literal |
| 3316 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e | 3275 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e |
| 3317 | -CA demoCA/cacert.pem -nrequest 1 | 3276 | -CA demoCA/cacert.pem -nrequest 1 |
| 3318 | .Ed | 3277 | .Ed |
| 3319 | .Pp | 3278 | .Pp |
| 3320 | Query status information using internally generated request: | 3279 | Query status information using internally generated request: |
| 3321 | .Pp | ||
| 3322 | .Bd -literal | 3280 | .Bd -literal |
| 3323 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e | 3281 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e |
| 3324 | demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1 | 3282 | demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1 |
| @@ -3326,7 +3284,6 @@ Query status information using internally generated request: | |||
| 3326 | .Pp | 3284 | .Pp |
| 3327 | Query status information using request read from a file, write response to a | 3285 | Query status information using request read from a file, write response to a |
| 3328 | second file: | 3286 | second file: |
| 3329 | .Pp | ||
| 3330 | .Bd -literal | 3287 | .Bd -literal |
| 3331 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e | 3288 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e |
| 3332 | demoCA/cacert.pem -reqin req.der -respout resp.der | 3289 | demoCA/cacert.pem -reqin req.der -respout resp.der |
| @@ -3425,7 +3382,6 @@ prints | |||
| 3425 | .Op Fl noout | 3382 | .Op Fl noout |
| 3426 | .Op Fl engine Ar id | 3383 | .Op Fl engine Ar id |
| 3427 | .Ek | 3384 | .Ek |
| 3428 | .br | ||
| 3429 | .Pp | 3385 | .Pp |
| 3430 | The | 3386 | The |
| 3431 | .Nm pkcs7 | 3387 | .Nm pkcs7 |
| @@ -3491,14 +3447,12 @@ Output all certificates in a file: | |||
| 3491 | The | 3447 | The |
| 3492 | .Em PEM | 3448 | .Em PEM |
| 3493 | PKCS#7 format uses the header and footer lines: | 3449 | PKCS#7 format uses the header and footer lines: |
| 3494 | .Pp | ||
| 3495 | .Bd -literal | 3450 | .Bd -literal |
| 3496 | \& -----BEGIN PKCS7----- | 3451 | \& -----BEGIN PKCS7----- |
| 3497 | \& -----END PKCS7----- | 3452 | \& -----END PKCS7----- |
| 3498 | .Ed | 3453 | .Ed |
| 3499 | .Pp | 3454 | .Pp |
| 3500 | For compatibility with some CAs it will also accept: | 3455 | For compatibility with some CAs it will also accept: |
| 3501 | .Pp | ||
| 3502 | .Bd -literal | 3456 | .Bd -literal |
| 3503 | \& -----BEGIN CERTIFICATE----- | 3457 | \& -----BEGIN CERTIFICATE----- |
| 3504 | \& -----END CERTIFICATE----- | 3458 | \& -----END CERTIFICATE----- |
| @@ -3665,14 +3619,12 @@ The encrypted form of a | |||
| 3665 | .Em PEM | 3619 | .Em PEM |
| 3666 | encoded PKCS#8 file uses the following | 3620 | encoded PKCS#8 file uses the following |
| 3667 | headers and footers: | 3621 | headers and footers: |
| 3668 | .Pp | ||
| 3669 | .Bd -literal | 3622 | .Bd -literal |
| 3670 | \& -----BEGIN ENCRYPTED PRIVATE KEY----- | 3623 | \& -----BEGIN ENCRYPTED PRIVATE KEY----- |
| 3671 | \& -----END ENCRYPTED PRIVATE KEY----- | 3624 | \& -----END ENCRYPTED PRIVATE KEY----- |
| 3672 | .Ed | 3625 | .Ed |
| 3673 | .Pp | 3626 | .Pp |
| 3674 | The unencrypted form uses: | 3627 | The unencrypted form uses: |
| 3675 | .Pp | ||
| 3676 | .Bd -literal | 3628 | .Bd -literal |
| 3677 | \& -----BEGIN PRIVATE KEY----- | 3629 | \& -----BEGIN PRIVATE KEY----- |
| 3678 | \& -----END PRIVATE KEY----- | 3630 | \& -----END PRIVATE KEY----- |
| @@ -3703,7 +3655,6 @@ Various algorithms can be used with the | |||
| 3703 | .Fl v1 | 3655 | .Fl v1 |
| 3704 | command line option, including PKCS#5 v1.5 and PKCS#12. | 3656 | command line option, including PKCS#5 v1.5 and PKCS#12. |
| 3705 | These are described in more detail below. | 3657 | These are described in more detail below. |
| 3706 | .Pp | ||
| 3707 | .Bl -tag -width "XXXX" | 3658 | .Bl -tag -width "XXXX" |
| 3708 | .It Ar PBE-MD2-DES PBE-MD5-DES | 3659 | .It Ar PBE-MD2-DES PBE-MD5-DES |
| 3709 | These algorithms were included in the original PKCS#5 v1.5 specification. | 3660 | These algorithms were included in the original PKCS#5 v1.5 specification. |
| @@ -4044,21 +3995,18 @@ Output only client certificates to a file: | |||
| 4044 | Don't encrypt the private key: | 3995 | Don't encrypt the private key: |
| 4045 | .Pp | 3996 | .Pp |
| 4046 | \& $ openssl pkcs12 -in file.p12 -out file.pem -nodes | 3997 | \& $ openssl pkcs12 -in file.p12 -out file.pem -nodes |
| 4047 | .br | ||
| 4048 | .Pp | 3998 | .Pp |
| 4049 | Print some info about a PKCS#12 file: | 3999 | Print some info about a PKCS#12 file: |
| 4050 | .Pp | 4000 | .Pp |
| 4051 | \& $ openssl pkcs12 -in file.p12 -info -noout | 4001 | \& $ openssl pkcs12 -in file.p12 -info -noout |
| 4052 | .Pp | 4002 | .Pp |
| 4053 | Create a PKCS#12 file: | 4003 | Create a PKCS#12 file: |
| 4054 | .Pp | ||
| 4055 | .Bd -literal | 4004 | .Bd -literal |
| 4056 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e | 4005 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e |
| 4057 | -name "My Certificate" | 4006 | -name "My Certificate" |
| 4058 | .Ed | 4007 | .Ed |
| 4059 | .Pp | 4008 | .Pp |
| 4060 | Include some extra certificates: | 4009 | Include some extra certificates: |
| 4061 | .Pp | ||
| 4062 | .Bd -literal | 4010 | .Bd -literal |
| 4063 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e | 4011 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e |
| 4064 | -name "My Certificate" -certfile othercerts.pem | 4012 | -name "My Certificate" -certfile othercerts.pem |
| @@ -4095,7 +4043,6 @@ and recreating | |||
| 4095 | the PKCS#12 file from the keys and certificates using a newer version of | 4043 | the PKCS#12 file from the keys and certificates using a newer version of |
| 4096 | .Nm OpenSSL . | 4044 | .Nm OpenSSL . |
| 4097 | For example: | 4045 | For example: |
| 4098 | .Pp | ||
| 4099 | .Bd -literal | 4046 | .Bd -literal |
| 4100 | \& $ old-openssl -in bad.p12 -out keycerts.pem | 4047 | \& $ old-openssl -in bad.p12 -out keycerts.pem |
| 4101 | \& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12 | 4048 | \& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12 |
| @@ -4586,7 +4533,6 @@ If the | |||
| 4586 | option is set to | 4533 | option is set to |
| 4587 | .Em no | 4534 | .Em no |
| 4588 | then these sections just consist of field names and values: for example, | 4535 | then these sections just consist of field names and values: for example, |
| 4589 | .Pp | ||
| 4590 | .Bd -literal | 4536 | .Bd -literal |
| 4591 | \& CN=My Name | 4537 | \& CN=My Name |
| 4592 | \& OU=My Organization | 4538 | \& OU=My Organization |
| @@ -4606,7 +4552,6 @@ option is absent or not set to | |||
| 4606 | .Em no , | 4552 | .Em no , |
| 4607 | then the file contains field prompting information. | 4553 | then the file contains field prompting information. |
| 4608 | It consists of lines of the form: | 4554 | It consists of lines of the form: |
| 4609 | .Pp | ||
| 4610 | .Bd -literal | 4555 | .Bd -literal |
| 4611 | \& fieldName="prompt" | 4556 | \& fieldName="prompt" |
| 4612 | \& fieldName_default="default field value" | 4557 | \& fieldName_default="default field value" |
| @@ -4673,7 +4618,6 @@ Examine and verify certificate request: | |||
| 4673 | \& $ openssl req -in req.pem -text -verify -noout | 4618 | \& $ openssl req -in req.pem -text -verify -noout |
| 4674 | .Pp | 4619 | .Pp |
| 4675 | Create a private key and then generate a certificate request from it: | 4620 | Create a private key and then generate a certificate request from it: |
| 4676 | .Pp | ||
| 4677 | .Bd -literal | 4621 | .Bd -literal |
| 4678 | \& $ openssl genrsa -out key.pem 1024 | 4622 | \& $ openssl genrsa -out key.pem 1024 |
| 4679 | \& $ openssl req -new -key key.pem -out req.pem | 4623 | \& $ openssl req -new -key key.pem -out req.pem |
| @@ -4686,12 +4630,10 @@ The same but just using req: | |||
| 4686 | Generate a self-signed root certificate: | 4630 | Generate a self-signed root certificate: |
| 4687 | .Pp | 4631 | .Pp |
| 4688 | \& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem | 4632 | \& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem |
| 4689 | .br | ||
| 4690 | .Pp | 4633 | .Pp |
| 4691 | Example of a file pointed to by the | 4634 | Example of a file pointed to by the |
| 4692 | .Ar oid_file | 4635 | .Ar oid_file |
| 4693 | option: | 4636 | option: |
| 4694 | .Pp | ||
| 4695 | .Bd -literal | 4637 | .Bd -literal |
| 4696 | \& 1.2.3.4 shortName A longer Name | 4638 | \& 1.2.3.4 shortName A longer Name |
| 4697 | \& 1.2.3.6 otherName Other longer Name | 4639 | \& 1.2.3.6 otherName Other longer Name |
| @@ -4700,14 +4642,12 @@ option: | |||
| 4700 | Example of a section pointed to by | 4642 | Example of a section pointed to by |
| 4701 | .Ar oid_section | 4643 | .Ar oid_section |
| 4702 | making use of variable expansion: | 4644 | making use of variable expansion: |
| 4703 | .Pp | ||
| 4704 | .Bd -literal | 4645 | .Bd -literal |
| 4705 | \& testoid1=1.2.3.5 | 4646 | \& testoid1=1.2.3.5 |
| 4706 | \& testoid2=${testoid1}.6 | 4647 | \& testoid2=${testoid1}.6 |
| 4707 | .Ed | 4648 | .Ed |
| 4708 | .Pp | 4649 | .Pp |
| 4709 | Sample configuration file prompting for field values: | 4650 | Sample configuration file prompting for field values: |
| 4710 | .Pp | ||
| 4711 | .Bd -literal | 4651 | .Bd -literal |
| 4712 | \& [ req ] | 4652 | \& [ req ] |
| 4713 | \& default_bits = 1024 | 4653 | \& default_bits = 1024 |
| @@ -4747,7 +4687,6 @@ Sample configuration file prompting for field values: | |||
| 4747 | .Ed | 4687 | .Ed |
| 4748 | .Pp | 4688 | .Pp |
| 4749 | Sample configuration containing all field values: | 4689 | Sample configuration containing all field values: |
| 4750 | .Pp | ||
| 4751 | .Bd -literal | 4690 | .Bd -literal |
| 4752 | \& RANDFILE = $ENV::HOME/.rnd | 4691 | \& RANDFILE = $ENV::HOME/.rnd |
| 4753 | .Pp | 4692 | .Pp |
| @@ -4775,14 +4714,12 @@ Sample configuration containing all field values: | |||
| 4775 | The header and footer lines in the | 4714 | The header and footer lines in the |
| 4776 | .Ar PEM | 4715 | .Ar PEM |
| 4777 | format are normally: | 4716 | format are normally: |
| 4778 | .Pp | ||
| 4779 | .Bd -literal | 4717 | .Bd -literal |
| 4780 | \& -----BEGIN CERTIFICATE REQUEST----- | 4718 | \& -----BEGIN CERTIFICATE REQUEST----- |
| 4781 | \& -----END CERTIFICATE REQUEST----- | 4719 | \& -----END CERTIFICATE REQUEST----- |
| 4782 | .Ed | 4720 | .Ed |
| 4783 | .Pp | 4721 | .Pp |
| 4784 | Some software (some versions of Netscape certificate server) instead needs: | 4722 | Some software (some versions of Netscape certificate server) instead needs: |
| 4785 | .Pp | ||
| 4786 | .Bd -literal | 4723 | .Bd -literal |
| 4787 | \& -----BEGIN NEW CERTIFICATE REQUEST----- | 4724 | \& -----BEGIN NEW CERTIFICATE REQUEST----- |
| 4788 | \& -----END NEW CERTIFICATE REQUEST----- | 4725 | \& -----END NEW CERTIFICATE REQUEST----- |
| @@ -4803,14 +4740,12 @@ by the script in an | |||
| 4803 | extension. | 4740 | extension. |
| 4804 | .Sh REQ DIAGNOSTICS | 4741 | .Sh REQ DIAGNOSTICS |
| 4805 | The following messages are frequently asked about: | 4742 | The following messages are frequently asked about: |
| 4806 | .Pp | ||
| 4807 | .Bd -literal | 4743 | .Bd -literal |
| 4808 | \& Using configuration from /some/path/openssl.cnf | 4744 | \& Using configuration from /some/path/openssl.cnf |
| 4809 | \& Unable to load config info | 4745 | \& Unable to load config info |
| 4810 | .Ed | 4746 | .Ed |
| 4811 | .Pp | 4747 | .Pp |
| 4812 | This is followed some time later by... | 4748 | This is followed some time later by... |
| 4813 | .Pp | ||
| 4814 | .Bd -literal | 4749 | .Bd -literal |
| 4815 | \& unable to find 'distinguished_name' in config | 4750 | \& unable to find 'distinguished_name' in config |
| 4816 | \& problems making Certificate Request | 4751 | \& problems making Certificate Request |
| @@ -4824,7 +4759,6 @@ Generation of certificates or requests, however, do need a configuration file. | |||
| 4824 | This could be regarded as a bug. | 4759 | This could be regarded as a bug. |
| 4825 | .Pp | 4760 | .Pp |
| 4826 | Another puzzling message is this: | 4761 | Another puzzling message is this: |
| 4827 | .Pp | ||
| 4828 | .Bd -literal | 4762 | .Bd -literal |
| 4829 | \& Attributes: | 4763 | \& Attributes: |
| 4830 | \& a0:00 | 4764 | \& a0:00 |
| @@ -5012,7 +4946,6 @@ The engine will then be set as the default for all available algorithms. | |||
| 5012 | The | 4946 | The |
| 5013 | .Em PEM | 4947 | .Em PEM |
| 5014 | private key format uses the header and footer lines: | 4948 | private key format uses the header and footer lines: |
| 5015 | .Pp | ||
| 5016 | .Bd -literal | 4949 | .Bd -literal |
| 5017 | \& -----BEGIN RSA PRIVATE KEY----- | 4950 | \& -----BEGIN RSA PRIVATE KEY----- |
| 5018 | \& -----END RSA PRIVATE KEY----- | 4951 | \& -----END RSA PRIVATE KEY----- |
| @@ -5021,7 +4954,6 @@ private key format uses the header and footer lines: | |||
| 5021 | The | 4954 | The |
| 5022 | .Em PEM | 4955 | .Em PEM |
| 5023 | public key format uses the header and footer lines: | 4956 | public key format uses the header and footer lines: |
| 5024 | .Pp | ||
| 5025 | .Bd -literal | 4957 | .Bd -literal |
| 5026 | \& -----BEGIN PUBLIC KEY----- | 4958 | \& -----BEGIN PUBLIC KEY----- |
| 5027 | \& -----END PUBLIC KEY----- | 4959 | \& -----END PUBLIC KEY----- |
| @@ -5064,7 +4996,6 @@ to | |||
| 5064 | format: | 4996 | format: |
| 5065 | .Pp | 4997 | .Pp |
| 5066 | \& $ openssl rsa -in key.pem -outform DER -out keyout.der | 4998 | \& $ openssl rsa -in key.pem -outform DER -out keyout.der |
| 5067 | .br | ||
| 5068 | .Pp | 4999 | .Pp |
| 5069 | To print out the components of a private key to standard output: | 5000 | To print out the components of a private key to standard output: |
| 5070 | .Pp | 5001 | .Pp |
| @@ -5164,7 +5095,6 @@ Recover the signed data: | |||
| 5164 | Examine the raw signed data: | 5095 | Examine the raw signed data: |
| 5165 | .Pp | 5096 | .Pp |
| 5166 | \& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump | 5097 | \& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump |
| 5167 | .Pp | ||
| 5168 | .Bd -literal | 5098 | .Bd -literal |
| 5169 | \& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ | 5099 | \& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ |
| 5170 | \& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ | 5100 | \& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ |
| @@ -5190,7 +5120,6 @@ Running | |||
| 5190 | as follows yields: | 5120 | as follows yields: |
| 5191 | .Pp | 5121 | .Pp |
| 5192 | \& $ openssl asn1parse -in pca-cert.pem | 5122 | \& $ openssl asn1parse -in pca-cert.pem |
| 5193 | .Pp | ||
| 5194 | .Bd -literal | 5123 | .Bd -literal |
| 5195 | \& 0:d=0 hl=4 l= 742 cons: SEQUENCE | 5124 | \& 0:d=0 hl=4 l= 742 cons: SEQUENCE |
| 5196 | \& 4:d=1 hl=4 l= 591 cons: SEQUENCE | 5125 | \& 4:d=1 hl=4 l= 591 cons: SEQUENCE |
| @@ -5224,7 +5153,6 @@ The certificate public key can be extracted with: | |||
| 5224 | The signature can be analysed with: | 5153 | The signature can be analysed with: |
| 5225 | .Pp | 5154 | .Pp |
| 5226 | \& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin | 5155 | \& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin |
| 5227 | .Pp | ||
| 5228 | .Bd -literal | 5156 | .Bd -literal |
| 5229 | \& 0:d=0 hl=2 l= 32 cons: SEQUENCE | 5157 | \& 0:d=0 hl=2 l= 32 cons: SEQUENCE |
| 5230 | \& 2:d=1 hl=2 l= 12 cons: SEQUENCE | 5158 | \& 2:d=1 hl=2 l= 12 cons: SEQUENCE |
| @@ -5243,7 +5171,6 @@ The actual part of the certificate that was signed can be extracted with: | |||
| 5243 | \& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 | 5171 | \& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 |
| 5244 | .Pp | 5172 | .Pp |
| 5245 | and its digest computed with: | 5173 | and its digest computed with: |
| 5246 | .Pp | ||
| 5247 | .Bd -literal | 5174 | .Bd -literal |
| 5248 | \& $ openssl md5 -c tbs | 5175 | \& $ openssl md5 -c tbs |
| 5249 | \& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5 | 5176 | \& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5 |
| @@ -5735,7 +5662,6 @@ from the client is displayed and any key presses will be sent to the client. | |||
| 5735 | .Pp | 5662 | .Pp |
| 5736 | Certain single letter commands are also recognized which perform special | 5663 | Certain single letter commands are also recognized which perform special |
| 5737 | operations: these are listed below. | 5664 | operations: these are listed below. |
| 5738 | .Pp | ||
| 5739 | .Bl -tag -width "XXXX" | 5665 | .Bl -tag -width "XXXX" |
| 5740 | .It Ar q | 5666 | .It Ar q |
| 5741 | End the current SSL connection, but still accept new connections. | 5667 | End the current SSL connection, but still accept new connections. |
| @@ -5867,7 +5793,6 @@ This option won't normally be used. | |||
| 5867 | .El | 5793 | .El |
| 5868 | .Sh SESS_ID OUTPUT | 5794 | .Sh SESS_ID OUTPUT |
| 5869 | Typical output: | 5795 | Typical output: |
| 5870 | .Pp | ||
| 5871 | .Bd -literal | 5796 | .Bd -literal |
| 5872 | \& SSL-Session: | 5797 | \& SSL-Session: |
| 5873 | \& Protocol : TLSv1 | 5798 | \& Protocol : TLSv1 |
| @@ -5908,7 +5833,6 @@ This is the return code when an SSL client certificate is verified. | |||
| 5908 | The | 5833 | The |
| 5909 | .Em PEM | 5834 | .Em PEM |
| 5910 | encoded session format uses the header and footer lines: | 5835 | encoded session format uses the header and footer lines: |
| 5911 | .Pp | ||
| 5912 | .Bd -literal | 5836 | .Bd -literal |
| 5913 | \& -----BEGIN SSL SESSION PARAMETERS----- | 5837 | \& -----BEGIN SSL SESSION PARAMETERS----- |
| 5914 | \& -----END SSL SESSION PARAMETERS----- | 5838 | \& -----END SSL SESSION PARAMETERS----- |
| @@ -6247,14 +6171,12 @@ the signers certificates. | |||
| 6247 | .El | 6171 | .El |
| 6248 | .Sh SMIME EXAMPLES | 6172 | .Sh SMIME EXAMPLES |
| 6249 | Create a cleartext signed message: | 6173 | Create a cleartext signed message: |
| 6250 | .Pp | ||
| 6251 | .Bd -literal | 6174 | .Bd -literal |
| 6252 | \& $ openssl smime -sign -in message.txt -text -out mail.msg \e | 6175 | \& $ openssl smime -sign -in message.txt -text -out mail.msg \e |
| 6253 | \& -signer mycert.pem | 6176 | \& -signer mycert.pem |
| 6254 | .Ed | 6177 | .Ed |
| 6255 | .Pp | 6178 | .Pp |
| 6256 | Create an opaque signed message: | 6179 | Create an opaque signed message: |
| 6257 | .Pp | ||
| 6258 | .Bd -literal | 6180 | .Bd -literal |
| 6259 | \& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e | 6181 | \& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e |
| 6260 | \& -signer mycert.pem | 6182 | \& -signer mycert.pem |
| @@ -6262,7 +6184,6 @@ Create an opaque signed message: | |||
| 6262 | .Pp | 6184 | .Pp |
| 6263 | Create a signed message, include some additional certificates and | 6185 | Create a signed message, include some additional certificates and |
| 6264 | read the private key from another file: | 6186 | read the private key from another file: |
| 6265 | .Pp | ||
| 6266 | .Bd -literal | 6187 | .Bd -literal |
| 6267 | \& $ openssl smime -sign -in in.txt -text -out mail.msg \e | 6188 | \& $ openssl smime -sign -in in.txt -text -out mail.msg \e |
| 6268 | \& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem | 6189 | \& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem |
| @@ -6271,7 +6192,6 @@ read the private key from another file: | |||
| 6271 | Send a signed message under Unix directly to | 6192 | Send a signed message under Unix directly to |
| 6272 | .Xr sendmail 8 , | 6193 | .Xr sendmail 8 , |
| 6273 | including headers: | 6194 | including headers: |
| 6274 | .Pp | ||
| 6275 | .Bd -literal | 6195 | .Bd -literal |
| 6276 | \& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e | 6196 | \& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e |
| 6277 | \& -from steve@openssl.org -to someone@somewhere \e | 6197 | \& -from steve@openssl.org -to someone@somewhere \e |
| @@ -6279,14 +6199,12 @@ including headers: | |||
| 6279 | .Ed | 6199 | .Ed |
| 6280 | .Pp | 6200 | .Pp |
| 6281 | Verify a message and extract the signer's certificate if successful: | 6201 | Verify a message and extract the signer's certificate if successful: |
| 6282 | .Pp | ||
| 6283 | .Bd -literal | 6202 | .Bd -literal |
| 6284 | \& $ openssl smime -verify -in mail.msg -signer user.pem \e | 6203 | \& $ openssl smime -verify -in mail.msg -signer user.pem \e |
| 6285 | \& -out signedtext.txt | 6204 | \& -out signedtext.txt |
| 6286 | .Ed | 6205 | .Ed |
| 6287 | .Pp | 6206 | .Pp |
| 6288 | Send encrypted mail using triple DES: | 6207 | Send encrypted mail using triple DES: |
| 6289 | .Pp | ||
| 6290 | .Bd -literal | 6208 | .Bd -literal |
| 6291 | \& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e | 6209 | \& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e |
| 6292 | \& -to someone@somewhere -subject "Encrypted message" \e | 6210 | \& -to someone@somewhere -subject "Encrypted message" \e |
| @@ -6294,7 +6212,6 @@ Send encrypted mail using triple DES: | |||
| 6294 | .Ed | 6212 | .Ed |
| 6295 | .Pp | 6213 | .Pp |
| 6296 | Sign and encrypt mail: | 6214 | Sign and encrypt mail: |
| 6297 | .Pp | ||
| 6298 | .Bd -literal | 6215 | .Bd -literal |
| 6299 | \& $ openssl smime -sign -in ml.txt -signer my.pem -text \e | 6216 | \& $ openssl smime -sign -in ml.txt -signer my.pem -text \e |
| 6300 | \& | openssl smime -encrypt -out mail.msg \e | 6217 | \& | openssl smime -encrypt -out mail.msg \e |
| @@ -6317,22 +6234,18 @@ The output from Netscape form signing is a PKCS#7 structure with the | |||
| 6317 | detached signature format. | 6234 | detached signature format. |
| 6318 | You can use this program to verify the signature by line wrapping the | 6235 | You can use this program to verify the signature by line wrapping the |
| 6319 | base64 encoded structure and surrounding it with: | 6236 | base64 encoded structure and surrounding it with: |
| 6320 | .Pp | ||
| 6321 | .Bd -literal | 6237 | .Bd -literal |
| 6322 | \& -----BEGIN PKCS7----- | 6238 | \& -----BEGIN PKCS7----- |
| 6323 | \& -----END PKCS7----- | 6239 | \& -----END PKCS7----- |
| 6324 | .Ed | 6240 | .Ed |
| 6325 | .Pp | 6241 | .Pp |
| 6326 | and using the command: | 6242 | and using the command: |
| 6327 | .br | ||
| 6328 | .Pp | ||
| 6329 | .Bd -literal | 6243 | .Bd -literal |
| 6330 | \& $ openssl smime -verify -inform PEM -in signature.pem | 6244 | \& $ openssl smime -verify -inform PEM -in signature.pem |
| 6331 | \& -content content.txt | 6245 | \& -content content.txt |
| 6332 | .Ed | 6246 | .Ed |
| 6333 | .Pp | 6247 | .Pp |
| 6334 | Alternatively, you can base64 decode the signature and use: | 6248 | Alternatively, you can base64 decode the signature and use: |
| 6335 | .Pp | ||
| 6336 | .Bd -literal | 6249 | .Bd -literal |
| 6337 | \& $ openssl smime -verify -inform DER -in signature.der | 6250 | \& $ openssl smime -verify -inform DER -in signature.der |
| 6338 | \& -content content.txt | 6251 | \& -content content.txt |
| @@ -6401,7 +6314,6 @@ v3 structures may cause parsing errors. | |||
| 6401 | The | 6314 | The |
| 6402 | .Nm speed | 6315 | .Nm speed |
| 6403 | command is used to test the performance of cryptographic algorithms. | 6316 | command is used to test the performance of cryptographic algorithms. |
| 6404 | .Pp | ||
| 6405 | .Bl -tag -width "XXXX" | 6317 | .Bl -tag -width "XXXX" |
| 6406 | .It Fl engine Ar id | 6318 | .It Fl engine Ar id |
| 6407 | Specifying an engine (by it's unique | 6319 | Specifying an engine (by it's unique |
| @@ -6511,7 +6423,6 @@ Create an SPKAC using the challenge string "hello": | |||
| 6511 | \& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf | 6423 | \& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf |
| 6512 | .Pp | 6424 | .Pp |
| 6513 | Example of an SPKAC, (long lines split up for clarity): | 6425 | Example of an SPKAC, (long lines split up for clarity): |
| 6514 | .Pp | ||
| 6515 | .Bd -literal | 6426 | .Bd -literal |
| 6516 | \& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e | 6427 | \& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e |
| 6517 | \& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e | 6428 | \& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e |
| @@ -6709,7 +6620,6 @@ If any operation fails then the certificate is not valid. | |||
| 6709 | .Sh VERIFY DIAGNOSTICS | 6620 | .Sh VERIFY DIAGNOSTICS |
| 6710 | When a verify operation fails, the output messages can be somewhat cryptic. | 6621 | When a verify operation fails, the output messages can be somewhat cryptic. |
| 6711 | The general form of the error message is: | 6622 | The general form of the error message is: |
| 6712 | .Pp | ||
| 6713 | .Bd -literal | 6623 | .Bd -literal |
| 6714 | \& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) | 6624 | \& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) |
| 6715 | \& error 24 at 1 depth lookup:invalid CA certificate | 6625 | \& error 24 at 1 depth lookup:invalid CA certificate |
| @@ -6728,7 +6638,6 @@ includes the name of the error code as defined in the header file | |||
| 6728 | .Aq Pa x509_vfy.h . | 6638 | .Aq Pa x509_vfy.h . |
| 6729 | Some of the error codes are defined but never returned: these are described | 6639 | Some of the error codes are defined but never returned: these are described |
| 6730 | as "unused". | 6640 | as "unused". |
| 6731 | .Pp | ||
| 6732 | .Bl -tag -width "XXXX" | 6641 | .Bl -tag -width "XXXX" |
| 6733 | .It Ar "0 X509_V_OK: ok" | 6642 | .It Ar "0 X509_V_OK: ok" |
| 6734 | The operation was successful. | 6643 | The operation was successful. |
| @@ -7188,7 +7097,6 @@ The | |||
| 7188 | .Nm x509 | 7097 | .Nm x509 |
| 7189 | utility can be used to sign certificates and requests: it | 7098 | utility can be used to sign certificates and requests: it |
| 7190 | can thus behave like a "mini CA". | 7099 | can thus behave like a "mini CA". |
| 7191 | .Pp | ||
| 7192 | .Bl -tag -width "XXXX" | 7100 | .Bl -tag -width "XXXX" |
| 7193 | .It Fl signkey Ar filename | 7101 | .It Fl signkey Ar filename |
| 7194 | This option causes the input file to be self-signed using the supplied | 7102 | This option causes the input file to be self-signed using the supplied |
| @@ -7557,7 +7465,6 @@ Convert a certificate to a certificate request: | |||
| 7557 | .Pp | 7465 | .Pp |
| 7558 | Convert a certificate request into a self-signed certificate using | 7466 | Convert a certificate request into a self-signed certificate using |
| 7559 | extensions for a CA: | 7467 | extensions for a CA: |
| 7560 | .Pp | ||
| 7561 | .Bd -literal | 7468 | .Bd -literal |
| 7562 | \& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e | 7469 | \& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e |
| 7563 | \& v3_ca -signkey key.pem -out cacert.pem | 7470 | \& v3_ca -signkey key.pem -out cacert.pem |
| @@ -7565,7 +7472,6 @@ extensions for a CA: | |||
| 7565 | .Pp | 7472 | .Pp |
| 7566 | Sign a certificate request using the CA certificate above and add user | 7473 | Sign a certificate request using the CA certificate above and add user |
| 7567 | certificate extensions: | 7474 | certificate extensions: |
| 7568 | .Pp | ||
| 7569 | .Bd -literal | 7475 | .Bd -literal |
| 7570 | \& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e | 7476 | \& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e |
| 7571 | v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial | 7477 | v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial |
| @@ -7573,7 +7479,6 @@ certificate extensions: | |||
| 7573 | .Pp | 7479 | .Pp |
| 7574 | Set a certificate to be trusted for SSL | 7480 | Set a certificate to be trusted for SSL |
| 7575 | client use and set its alias to "Steve's Class 1 CA": | 7481 | client use and set its alias to "Steve's Class 1 CA": |
| 7576 | .Pp | ||
| 7577 | .Bd -literal | 7482 | .Bd -literal |
| 7578 | \& $ openssl x509 -in cert.pem -addtrust clientAuth \e | 7483 | \& $ openssl x509 -in cert.pem -addtrust clientAuth \e |
| 7579 | \& -setalias "Steve's Class 1 CA" -out trust.pem | 7484 | \& -setalias "Steve's Class 1 CA" -out trust.pem |
| @@ -7582,21 +7487,18 @@ client use and set its alias to "Steve's Class 1 CA": | |||
| 7582 | The | 7487 | The |
| 7583 | .Em PEM | 7488 | .Em PEM |
| 7584 | format uses the header and footer lines: | 7489 | format uses the header and footer lines: |
| 7585 | .Pp | ||
| 7586 | .Bd -literal | 7490 | .Bd -literal |
| 7587 | \& -----BEGIN CERTIFICATE----- | 7491 | \& -----BEGIN CERTIFICATE----- |
| 7588 | \& -----END CERTIFICATE----- | 7492 | \& -----END CERTIFICATE----- |
| 7589 | .Ed | 7493 | .Ed |
| 7590 | .Pp | 7494 | .Pp |
| 7591 | It will also handle files containing: | 7495 | It will also handle files containing: |
| 7592 | .Pp | ||
| 7593 | .Bd -literal | 7496 | .Bd -literal |
| 7594 | \& -----BEGIN X509 CERTIFICATE----- | 7497 | \& -----BEGIN X509 CERTIFICATE----- |
| 7595 | \& -----END X509 CERTIFICATE----- | 7498 | \& -----END X509 CERTIFICATE----- |
| 7596 | .Ed | 7499 | .Ed |
| 7597 | .Pp | 7500 | .Pp |
| 7598 | Trusted certificates have the lines: | 7501 | Trusted certificates have the lines: |
| 7599 | .Pp | ||
| 7600 | .Bd -literal | 7502 | .Bd -literal |
| 7601 | \& -----BEGIN TRUSTED CERTIFICATE----- | 7503 | \& -----BEGIN TRUSTED CERTIFICATE----- |
| 7602 | \& -----END TRUSTED CERTIFICATE----- | 7504 | \& -----END TRUSTED CERTIFICATE----- |
| @@ -7684,7 +7586,6 @@ and | |||
| 7684 | and V1 certificates above apply to | 7586 | and V1 certificates above apply to |
| 7685 | .Em all | 7587 | .Em all |
| 7686 | CA certificates. | 7588 | CA certificates. |
| 7687 | .Pp | ||
| 7688 | .Bl -tag -width "XXXX" | 7589 | .Bl -tag -width "XXXX" |
| 7689 | .It Ar SSL Client | 7590 | .It Ar SSL Client |
| 7690 | The extended key usage extension must be absent or include the | 7591 | The extended key usage extension must be absent or include the |
