diff options
author | jmc <> | 2003-07-16 09:05:58 +0000 |
---|---|---|
committer | jmc <> | 2003-07-16 09:05:58 +0000 |
commit | 532c18f1f3c2b718b6845205aa5dc0ea3c873efc (patch) | |
tree | 4734d781124434e97451a5fe3207a539d3d6c536 /src | |
parent | 19f7f066e726b9057c4d22f7ea855a2eec1a6826 (diff) | |
download | openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.gz openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.bz2 openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.zip |
kill a rake of .br's and .Pp's that worked around the spacing bug. should
help postscript output too.
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.sbin/openssl/openssl.1 | 101 |
1 files changed, 1 insertions, 100 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1 index b115397bad..0be74bd25e 100644 --- a/src/usr.sbin/openssl/openssl.1 +++ b/src/usr.sbin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.9 2003/06/12 12:59:51 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.10 2003/07/16 09:05:58 jmc Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -459,7 +459,6 @@ This option can be used multiple times to "drill down" into a nested structure. | |||
459 | .El | 459 | .El |
460 | .Sh ASN1PARSE OUTPUT | 460 | .Sh ASN1PARSE OUTPUT |
461 | The output will typically contain lines like this: | 461 | The output will typically contain lines like this: |
462 | .Pp | ||
463 | .Bd -literal | 462 | .Bd -literal |
464 | 0:d=0 hl=4 l= 681 cons: SEQUENCE | 463 | 0:d=0 hl=4 l= 681 cons: SEQUENCE |
465 | 464 | ||
@@ -500,7 +499,6 @@ The contents octets of this will contain the public key information. | |||
500 | This can be examined using the option | 499 | This can be examined using the option |
501 | .Fl strparse Cm 229 | 500 | .Fl strparse Cm 229 |
502 | to yield: | 501 | to yield: |
503 | .Pp | ||
504 | .Bd -literal | 502 | .Bd -literal |
505 | \& 0:d=0 hl=3 l= 137 cons: SEQUENCE | 503 | \& 0:d=0 hl=3 l= 137 cons: SEQUENCE |
506 | \& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 | 504 | \& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 |
@@ -816,7 +814,6 @@ Where the option is present in the configuration file and the command line, | |||
816 | the command line value is used. | 814 | the command line value is used. |
817 | Where an option is described as mandatory, then it must be present in | 815 | Where an option is described as mandatory, then it must be present in |
818 | the configuration file or the command line equivalent (if any) used. | 816 | the configuration file or the command line equivalent (if any) used. |
819 | .Pp | ||
820 | .Bl -tag -width "XXXX" | 817 | .Bl -tag -width "XXXX" |
821 | .It Ar oid_file | 818 | .It Ar oid_file |
822 | This specifies a file containing additional OBJECT IDENTIFIERS. | 819 | This specifies a file containing additional OBJECT IDENTIFIERS. |
@@ -1043,7 +1040,6 @@ Certify a Netscape SPKAC: | |||
1043 | \& $ openssl ca -spkac spkac.txt | 1040 | \& $ openssl ca -spkac spkac.txt |
1044 | .Pp | 1041 | .Pp |
1045 | A sample SPKAC file (the SPKAC line has been truncated for clarity): | 1042 | A sample SPKAC file (the SPKAC line has been truncated for clarity): |
1046 | .Pp | ||
1047 | .Bd -literal | 1043 | .Bd -literal |
1048 | \& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5 | 1044 | \& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5 |
1049 | \& CN=Steve Test | 1045 | \& CN=Steve Test |
@@ -1054,7 +1050,6 @@ A sample SPKAC file (the SPKAC line has been truncated for clarity): | |||
1054 | .Pp | 1050 | .Pp |
1055 | A sample configuration file with the relevant sections for | 1051 | A sample configuration file with the relevant sections for |
1056 | .Nm ca : | 1052 | .Nm ca : |
1057 | .Pp | ||
1058 | .Bd -literal | 1053 | .Bd -literal |
1059 | \& [ ca ] | 1054 | \& [ ca ] |
1060 | \& default_ca = CA_default # The default ca section | 1055 | \& default_ca = CA_default # The default ca section |
@@ -1094,7 +1089,6 @@ A sample configuration file with the relevant sections for | |||
1094 | the location of all files can change either by compile time options, | 1089 | the location of all files can change either by compile time options, |
1095 | configuration file entries, environment variables or command line options. | 1090 | configuration file entries, environment variables or command line options. |
1096 | The values below reflect the default values. | 1091 | The values below reflect the default values. |
1097 | .Pp | ||
1098 | .Bd -literal | 1092 | .Bd -literal |
1099 | /usr/local/ssl/lib/openssl.cnf - master configuration file | 1093 | /usr/local/ssl/lib/openssl.cnf - master configuration file |
1100 | \&./demoCA - main CA directory | 1094 | \&./demoCA - main CA directory |
@@ -1307,7 +1301,6 @@ If | |||
1307 | .Cm - | 1301 | .Cm - |
1308 | is used, then the ciphers are deleted from the list, but some or | 1302 | is used, then the ciphers are deleted from the list, but some or |
1309 | all of the ciphers can be added again by later options. | 1303 | all of the ciphers can be added again by later options. |
1310 | .br | ||
1311 | .Pp | 1304 | .Pp |
1312 | If | 1305 | If |
1313 | .Cm + | 1306 | .Cm + |
@@ -1432,7 +1425,6 @@ authentication used, e.g. DES-CBC3-SHA. | |||
1432 | In these cases, RSA authentication is used. | 1425 | In these cases, RSA authentication is used. |
1433 | .Pp | 1426 | .Pp |
1434 | .Sy "SSL v3.0 cipher suites" | 1427 | .Sy "SSL v3.0 cipher suites" |
1435 | .Pp | ||
1436 | .Bd -literal | 1428 | .Bd -literal |
1437 | SSL_RSA_WITH_NULL_MD5 NULL-MD5 | 1429 | SSL_RSA_WITH_NULL_MD5 NULL-MD5 |
1438 | SSL_RSA_WITH_NULL_SHA NULL-SHA | 1430 | SSL_RSA_WITH_NULL_SHA NULL-SHA |
@@ -1445,7 +1437,6 @@ In these cases, RSA authentication is used. | |||
1445 | SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA | 1437 | SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA |
1446 | SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA | 1438 | SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA |
1447 | .Ed | 1439 | .Ed |
1448 | .Pp | ||
1449 | .Bd -literal | 1440 | .Bd -literal |
1450 | SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. | 1441 | SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. |
1451 | SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented. | 1442 | SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented. |
@@ -1460,7 +1451,6 @@ In these cases, RSA authentication is used. | |||
1460 | SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA | 1451 | SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA |
1461 | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA | 1452 | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA |
1462 | .Ed | 1453 | .Ed |
1463 | .Pp | ||
1464 | .Bd -literal | 1454 | .Bd -literal |
1465 | SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 | 1455 | SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 |
1466 | SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 | 1456 | SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 |
@@ -1468,7 +1458,6 @@ In these cases, RSA authentication is used. | |||
1468 | SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA | 1458 | SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA |
1469 | SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA | 1459 | SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA |
1470 | .Ed | 1460 | .Ed |
1471 | .Pp | ||
1472 | .Bd -literal | 1461 | .Bd -literal |
1473 | SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented. | 1462 | SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented. |
1474 | SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented. | 1463 | SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented. |
@@ -1476,7 +1465,6 @@ In these cases, RSA authentication is used. | |||
1476 | .Ed | 1465 | .Ed |
1477 | .Pp | 1466 | .Pp |
1478 | .Sy "TLS v1.0 cipher suites" | 1467 | .Sy "TLS v1.0 cipher suites" |
1479 | .Pp | ||
1480 | .Bd -literal | 1468 | .Bd -literal |
1481 | TLS_RSA_WITH_NULL_MD5 NULL-MD5 | 1469 | TLS_RSA_WITH_NULL_MD5 NULL-MD5 |
1482 | TLS_RSA_WITH_NULL_SHA NULL-SHA | 1470 | TLS_RSA_WITH_NULL_SHA NULL-SHA |
@@ -1489,7 +1477,6 @@ In these cases, RSA authentication is used. | |||
1489 | TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA | 1477 | TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA |
1490 | TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA | 1478 | TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA |
1491 | .Ed | 1479 | .Ed |
1492 | .Pp | ||
1493 | .Bd -literal | 1480 | .Bd -literal |
1494 | TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. | 1481 | TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. |
1495 | TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented. | 1482 | TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented. |
@@ -1504,7 +1491,6 @@ In these cases, RSA authentication is used. | |||
1504 | TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA | 1491 | TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA |
1505 | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA | 1492 | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA |
1506 | .Ed | 1493 | .Ed |
1507 | .Pp | ||
1508 | .Bd -literal | 1494 | .Bd -literal |
1509 | TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 | 1495 | TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 |
1510 | TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 | 1496 | TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 |
@@ -1536,7 +1522,6 @@ In these cases, RSA authentication is used. | |||
1536 | .Pp | 1522 | .Pp |
1537 | .Sy Note : | 1523 | .Sy Note : |
1538 | These ciphers can also be used in SSL v3. | 1524 | These ciphers can also be used in SSL v3. |
1539 | .Pp | ||
1540 | .Bd -literal | 1525 | .Bd -literal |
1541 | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA | 1526 | TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA |
1542 | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA | 1527 | TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA |
@@ -1546,7 +1531,6 @@ These ciphers can also be used in SSL v3. | |||
1546 | .Ed | 1531 | .Ed |
1547 | .Pp | 1532 | .Pp |
1548 | .Sy "SSL v2.0 cipher suites" | 1533 | .Sy "SSL v2.0 cipher suites" |
1549 | .Pp | ||
1550 | .Bd -literal | 1534 | .Bd -literal |
1551 | SSL_CK_RC4_128_WITH_MD5 RC4-MD5 | 1535 | SSL_CK_RC4_128_WITH_MD5 RC4-MD5 |
1552 | SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 | 1536 | SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 |
@@ -1670,7 +1654,6 @@ should be linked to each certificate. | |||
1670 | .El | 1654 | .El |
1671 | .Sh CRL NOTES | 1655 | .Sh CRL NOTES |
1672 | The PEM CRL format uses the header and footer lines: | 1656 | The PEM CRL format uses the header and footer lines: |
1673 | .Pp | ||
1674 | .Bd -literal | 1657 | .Bd -literal |
1675 | \& -----BEGIN X509 CRL----- | 1658 | \& -----BEGIN X509 CRL----- |
1676 | \& -----END X509 CRL----- | 1659 | \& -----END X509 CRL----- |
@@ -1756,7 +1739,6 @@ Creates a PKCS#7 structure in | |||
1756 | .Ar DER | 1739 | .Ar DER |
1757 | format with no CRL from several | 1740 | format with no CRL from several |
1758 | different certificates: | 1741 | different certificates: |
1759 | .Pp | ||
1760 | .Bd -literal | 1742 | .Bd -literal |
1761 | \& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem | 1743 | \& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem |
1762 | \& -certfile demoCA/cacert.pem -outform DER -out p7.der | 1744 | \& -certfile demoCA/cacert.pem -outform DER -out p7.der |
@@ -2010,7 +1992,6 @@ versions of | |||
2010 | .Sh DHPARAM NOTES | 1992 | .Sh DHPARAM NOTES |
2011 | .Ar PEM | 1993 | .Ar PEM |
2012 | format DH parameters use the header and footer lines: | 1994 | format DH parameters use the header and footer lines: |
2013 | .Pp | ||
2014 | .Bd -literal | 1995 | .Bd -literal |
2015 | \& -----BEGIN DH PARAMETERS----- | 1996 | \& -----BEGIN DH PARAMETERS----- |
2016 | \& -----END DH PARAMETERS----- | 1997 | \& -----END DH PARAMETERS----- |
@@ -2162,7 +2143,6 @@ The engine will then be set as the default for all available algorithms. | |||
2162 | The | 2143 | The |
2163 | .Ar PEM | 2144 | .Ar PEM |
2164 | private key format uses the header and footer lines: | 2145 | private key format uses the header and footer lines: |
2165 | .Pp | ||
2166 | .Bd -literal | 2146 | .Bd -literal |
2167 | \& -----BEGIN DSA PRIVATE KEY----- | 2147 | \& -----BEGIN DSA PRIVATE KEY----- |
2168 | \& -----END DSA PRIVATE KEY----- | 2148 | \& -----END DSA PRIVATE KEY----- |
@@ -2171,7 +2151,6 @@ private key format uses the header and footer lines: | |||
2171 | The | 2151 | The |
2172 | .Ar PEM | 2152 | .Ar PEM |
2173 | public key format uses the header and footer lines: | 2153 | public key format uses the header and footer lines: |
2174 | .Pp | ||
2175 | .Bd -literal | 2154 | .Bd -literal |
2176 | \& -----BEGIN PUBLIC KEY----- | 2155 | \& -----BEGIN PUBLIC KEY----- |
2177 | \& -----END PUBLIC KEY----- | 2156 | \& -----END PUBLIC KEY----- |
@@ -2296,7 +2275,6 @@ The engine will then be set as the default for all available algorithms. | |||
2296 | .Sh DSAPARAM NOTES | 2275 | .Sh DSAPARAM NOTES |
2297 | .Ar PEM | 2276 | .Ar PEM |
2298 | format DSA parameters use the header and footer lines: | 2277 | format DSA parameters use the header and footer lines: |
2299 | .Pp | ||
2300 | .Bd -literal | 2278 | .Bd -literal |
2301 | \& -----BEGIN DSA PARAMETERS----- | 2279 | \& -----BEGIN DSA PARAMETERS----- |
2302 | \& -----END DSA PARAMETERS----- | 2280 | \& -----END DSA PARAMETERS----- |
@@ -2525,7 +2503,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2525 | .Bd -literal | 2503 | .Bd -literal |
2526 | \& base64 Base 64 | 2504 | \& base64 Base 64 |
2527 | .Ed | 2505 | .Ed |
2528 | .Pp | ||
2529 | .Bd -literal | 2506 | .Bd -literal |
2530 | \& bf-cbc Blowfish in CBC mode | 2507 | \& bf-cbc Blowfish in CBC mode |
2531 | \& bf Alias for bf-cbc | 2508 | \& bf Alias for bf-cbc |
@@ -2533,7 +2510,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2533 | \& bf-ecb Blowfish in ECB mode | 2510 | \& bf-ecb Blowfish in ECB mode |
2534 | \& bf-ofb Blowfish in OFB mode | 2511 | \& bf-ofb Blowfish in OFB mode |
2535 | .Ed | 2512 | .Ed |
2536 | .Pp | ||
2537 | .Bd -literal | 2513 | .Bd -literal |
2538 | \& cast-cbc CAST in CBC mode | 2514 | \& cast-cbc CAST in CBC mode |
2539 | \& cast Alias for cast-cbc | 2515 | \& cast Alias for cast-cbc |
@@ -2542,7 +2518,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2542 | \& cast5-ecb CAST5 in ECB mode | 2518 | \& cast5-ecb CAST5 in ECB mode |
2543 | \& cast5-ofb CAST5 in OFB mode | 2519 | \& cast5-ofb CAST5 in OFB mode |
2544 | .Ed | 2520 | .Ed |
2545 | .Pp | ||
2546 | .Bd -literal | 2521 | .Bd -literal |
2547 | \& des-cbc DES in CBC mode | 2522 | \& des-cbc DES in CBC mode |
2548 | \& des Alias for des-cbc | 2523 | \& des Alias for des-cbc |
@@ -2550,14 +2525,12 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2550 | \& des-ofb DES in OFB mode | 2525 | \& des-ofb DES in OFB mode |
2551 | \& des-ecb DES in ECB mode | 2526 | \& des-ecb DES in ECB mode |
2552 | .Ed | 2527 | .Ed |
2553 | .Pp | ||
2554 | .Bd -literal | 2528 | .Bd -literal |
2555 | \& des-ede-cbc Two key triple DES EDE in CBC mode | 2529 | \& des-ede-cbc Two key triple DES EDE in CBC mode |
2556 | \& des-ede Alias for des-ede | 2530 | \& des-ede Alias for des-ede |
2557 | \& des-ede-cfb Two key triple DES EDE in CFB mode | 2531 | \& des-ede-cfb Two key triple DES EDE in CFB mode |
2558 | \& des-ede-ofb Two key triple DES EDE in OFB mode | 2532 | \& des-ede-ofb Two key triple DES EDE in OFB mode |
2559 | .Ed | 2533 | .Ed |
2560 | .Pp | ||
2561 | .Bd -literal | 2534 | .Bd -literal |
2562 | \& des-ede3-cbc Three key triple DES EDE in CBC mode | 2535 | \& des-ede3-cbc Three key triple DES EDE in CBC mode |
2563 | \& des-ede3 Alias for des-ede3-cbc | 2536 | \& des-ede3 Alias for des-ede3-cbc |
@@ -2565,11 +2538,9 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2565 | \& des-ede3-cfb Three key triple DES EDE CFB mode | 2538 | \& des-ede3-cfb Three key triple DES EDE CFB mode |
2566 | \& des-ede3-ofb Three key triple DES EDE in OFB mode | 2539 | \& des-ede3-ofb Three key triple DES EDE in OFB mode |
2567 | .Ed | 2540 | .Ed |
2568 | .Pp | ||
2569 | .Bd -literal | 2541 | .Bd -literal |
2570 | \& desx DESX algorithm. | 2542 | \& desx DESX algorithm. |
2571 | .Ed | 2543 | .Ed |
2572 | .Pp | ||
2573 | .Bd -literal | 2544 | .Bd -literal |
2574 | \& idea-cbc IDEA algorithm in CBC mode | 2545 | \& idea-cbc IDEA algorithm in CBC mode |
2575 | \& idea same as idea-cbc | 2546 | \& idea same as idea-cbc |
@@ -2577,7 +2548,6 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2577 | \& idea-ecb IDEA in ECB mode | 2548 | \& idea-ecb IDEA in ECB mode |
2578 | \& idea-ofb IDEA in OFB mode | 2549 | \& idea-ofb IDEA in OFB mode |
2579 | .Ed | 2550 | .Ed |
2580 | .Pp | ||
2581 | .Bd -literal | 2551 | .Bd -literal |
2582 | \& rc2-cbc 128 bit RC2 in CBC mode | 2552 | \& rc2-cbc 128 bit RC2 in CBC mode |
2583 | \& rc2 Alias for rc2-cbc | 2553 | \& rc2 Alias for rc2-cbc |
@@ -2587,13 +2557,11 @@ Blowfish and RC5 algorithms use a 128 bit key. | |||
2587 | \& rc2-64-cbc 64 bit RC2 in CBC mode | 2557 | \& rc2-64-cbc 64 bit RC2 in CBC mode |
2588 | \& rc2-40-cbc 40 bit RC2 in CBC mode | 2558 | \& rc2-40-cbc 40 bit RC2 in CBC mode |
2589 | .Ed | 2559 | .Ed |
2590 | .Pp | ||
2591 | .Bd -literal | 2560 | .Bd -literal |
2592 | \& rc4 128 bit RC4 | 2561 | \& rc4 128 bit RC4 |
2593 | \& rc4-64 64 bit RC4 | 2562 | \& rc4-64 64 bit RC4 |
2594 | \& rc4-40 40 bit RC4 | 2563 | \& rc4-40 40 bit RC4 |
2595 | .Ed | 2564 | .Ed |
2596 | .Pp | ||
2597 | .Bd -literal | 2565 | .Bd -literal |
2598 | \& rc5-cbc RC5 cipher in CBC mode | 2566 | \& rc5-cbc RC5 cipher in CBC mode |
2599 | \& rc5 Alias for rc5-cbc | 2567 | \& rc5 Alias for rc5-cbc |
@@ -2854,7 +2822,6 @@ Output the certificates in a Netscape certificate sequence: | |||
2854 | .Ed | 2822 | .Ed |
2855 | .Pp | 2823 | .Pp |
2856 | Create a Netscape certificate sequence: | 2824 | Create a Netscape certificate sequence: |
2857 | .Pp | ||
2858 | .Bd -literal | 2825 | .Bd -literal |
2859 | \& $ openssl nseq -in certs.pem -toseq -out nseq.pem | 2826 | \& $ openssl nseq -in certs.pem -toseq -out nseq.pem |
2860 | .Ed | 2827 | .Ed |
@@ -2862,7 +2829,6 @@ Create a Netscape certificate sequence: | |||
2862 | The | 2829 | The |
2863 | .Em PEM | 2830 | .Em PEM |
2864 | encoded form uses the same headers and footers as a certificate: | 2831 | encoded form uses the same headers and footers as a certificate: |
2865 | .Pp | ||
2866 | .Bd -literal | 2832 | .Bd -literal |
2867 | \& -----BEGIN CERTIFICATE----- | 2833 | \& -----BEGIN CERTIFICATE----- |
2868 | \& -----END CERTIFICATE----- | 2834 | \& -----END CERTIFICATE----- |
@@ -2931,7 +2897,6 @@ input and output files and allowing multiple certificate files to be used. | |||
2931 | .Op Fl resp_key_id | 2897 | .Op Fl resp_key_id |
2932 | .Op Fl nrequest Ar n | 2898 | .Op Fl nrequest Ar n |
2933 | .Ek | 2899 | .Ek |
2934 | .br | ||
2935 | .Pp | 2900 | .Pp |
2936 | The Online Certificate Status Protocol (OCSP) enables applications to | 2901 | The Online Certificate Status Protocol (OCSP) enables applications to |
2937 | determine the (revocation) state of an identified certificate (RFC 2560). | 2902 | determine the (revocation) state of an identified certificate (RFC 2560). |
@@ -3242,7 +3207,6 @@ If the OCSP responder is a | |||
3242 | which can give details about multiple CAs and has its own separate | 3207 | which can give details about multiple CAs and has its own separate |
3243 | certificate chain, then its root CA can be trusted for OCSP signing. | 3208 | certificate chain, then its root CA can be trusted for OCSP signing. |
3244 | For example: | 3209 | For example: |
3245 | .Pp | ||
3246 | .Bd -literal | 3210 | .Bd -literal |
3247 | \& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem | 3211 | \& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem |
3248 | .Ed | 3212 | .Ed |
@@ -3279,7 +3243,6 @@ and | |||
3279 | options. | 3243 | options. |
3280 | .Sh OCSP EXAMPLES | 3244 | .Sh OCSP EXAMPLES |
3281 | Create an OCSP request and write it to a file: | 3245 | Create an OCSP request and write it to a file: |
3282 | .Pp | ||
3283 | .Bd -literal | 3246 | .Bd -literal |
3284 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e | 3247 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e |
3285 | req.der | 3248 | req.der |
@@ -3288,14 +3251,12 @@ Create an OCSP request and write it to a file: | |||
3288 | Send a query to an OCSP responder with URL | 3251 | Send a query to an OCSP responder with URL |
3289 | .Pa http://ocsp.myhost.com/ , | 3252 | .Pa http://ocsp.myhost.com/ , |
3290 | save the response to a file and print it out in text form: | 3253 | save the response to a file and print it out in text form: |
3291 | .Pp | ||
3292 | .Bd -literal | 3254 | .Bd -literal |
3293 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e | 3255 | \& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e |
3294 | \& -url http://ocsp.myhost.com/ -resp_text -respout resp.der | 3256 | \& -url http://ocsp.myhost.com/ -resp_text -respout resp.der |
3295 | .Ed | 3257 | .Ed |
3296 | .Pp | 3258 | .Pp |
3297 | Read in an OCSP response and print out text form: | 3259 | Read in an OCSP response and print out text form: |
3298 | .Pp | ||
3299 | .Bd -literal | 3260 | .Bd -literal |
3300 | \& $ openssl ocsp -respin resp.der -text | 3261 | \& $ openssl ocsp -respin resp.der -text |
3301 | .Ed | 3262 | .Ed |
@@ -3304,21 +3265,18 @@ OCSP server on port 8888 using a standard | |||
3304 | .Nm ca | 3265 | .Nm ca |
3305 | configuration, and a separate responder certificate. | 3266 | configuration, and a separate responder certificate. |
3306 | All requests and responses are printed to a file: | 3267 | All requests and responses are printed to a file: |
3307 | .Pp | ||
3308 | .Bd -literal | 3268 | .Bd -literal |
3309 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e | 3269 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e |
3310 | -CA demoCA/cacert.pem -text -out log.txt | 3270 | -CA demoCA/cacert.pem -text -out log.txt |
3311 | .Ed | 3271 | .Ed |
3312 | .Pp | 3272 | .Pp |
3313 | As above, but exit after processing one request: | 3273 | As above, but exit after processing one request: |
3314 | .Pp | ||
3315 | .Bd -literal | 3274 | .Bd -literal |
3316 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e | 3275 | \& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e |
3317 | -CA demoCA/cacert.pem -nrequest 1 | 3276 | -CA demoCA/cacert.pem -nrequest 1 |
3318 | .Ed | 3277 | .Ed |
3319 | .Pp | 3278 | .Pp |
3320 | Query status information using internally generated request: | 3279 | Query status information using internally generated request: |
3321 | .Pp | ||
3322 | .Bd -literal | 3280 | .Bd -literal |
3323 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e | 3281 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e |
3324 | demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1 | 3282 | demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1 |
@@ -3326,7 +3284,6 @@ Query status information using internally generated request: | |||
3326 | .Pp | 3284 | .Pp |
3327 | Query status information using request read from a file, write response to a | 3285 | Query status information using request read from a file, write response to a |
3328 | second file: | 3286 | second file: |
3329 | .Pp | ||
3330 | .Bd -literal | 3287 | .Bd -literal |
3331 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e | 3288 | \& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e |
3332 | demoCA/cacert.pem -reqin req.der -respout resp.der | 3289 | demoCA/cacert.pem -reqin req.der -respout resp.der |
@@ -3425,7 +3382,6 @@ prints | |||
3425 | .Op Fl noout | 3382 | .Op Fl noout |
3426 | .Op Fl engine Ar id | 3383 | .Op Fl engine Ar id |
3427 | .Ek | 3384 | .Ek |
3428 | .br | ||
3429 | .Pp | 3385 | .Pp |
3430 | The | 3386 | The |
3431 | .Nm pkcs7 | 3387 | .Nm pkcs7 |
@@ -3491,14 +3447,12 @@ Output all certificates in a file: | |||
3491 | The | 3447 | The |
3492 | .Em PEM | 3448 | .Em PEM |
3493 | PKCS#7 format uses the header and footer lines: | 3449 | PKCS#7 format uses the header and footer lines: |
3494 | .Pp | ||
3495 | .Bd -literal | 3450 | .Bd -literal |
3496 | \& -----BEGIN PKCS7----- | 3451 | \& -----BEGIN PKCS7----- |
3497 | \& -----END PKCS7----- | 3452 | \& -----END PKCS7----- |
3498 | .Ed | 3453 | .Ed |
3499 | .Pp | 3454 | .Pp |
3500 | For compatibility with some CAs it will also accept: | 3455 | For compatibility with some CAs it will also accept: |
3501 | .Pp | ||
3502 | .Bd -literal | 3456 | .Bd -literal |
3503 | \& -----BEGIN CERTIFICATE----- | 3457 | \& -----BEGIN CERTIFICATE----- |
3504 | \& -----END CERTIFICATE----- | 3458 | \& -----END CERTIFICATE----- |
@@ -3665,14 +3619,12 @@ The encrypted form of a | |||
3665 | .Em PEM | 3619 | .Em PEM |
3666 | encoded PKCS#8 file uses the following | 3620 | encoded PKCS#8 file uses the following |
3667 | headers and footers: | 3621 | headers and footers: |
3668 | .Pp | ||
3669 | .Bd -literal | 3622 | .Bd -literal |
3670 | \& -----BEGIN ENCRYPTED PRIVATE KEY----- | 3623 | \& -----BEGIN ENCRYPTED PRIVATE KEY----- |
3671 | \& -----END ENCRYPTED PRIVATE KEY----- | 3624 | \& -----END ENCRYPTED PRIVATE KEY----- |
3672 | .Ed | 3625 | .Ed |
3673 | .Pp | 3626 | .Pp |
3674 | The unencrypted form uses: | 3627 | The unencrypted form uses: |
3675 | .Pp | ||
3676 | .Bd -literal | 3628 | .Bd -literal |
3677 | \& -----BEGIN PRIVATE KEY----- | 3629 | \& -----BEGIN PRIVATE KEY----- |
3678 | \& -----END PRIVATE KEY----- | 3630 | \& -----END PRIVATE KEY----- |
@@ -3703,7 +3655,6 @@ Various algorithms can be used with the | |||
3703 | .Fl v1 | 3655 | .Fl v1 |
3704 | command line option, including PKCS#5 v1.5 and PKCS#12. | 3656 | command line option, including PKCS#5 v1.5 and PKCS#12. |
3705 | These are described in more detail below. | 3657 | These are described in more detail below. |
3706 | .Pp | ||
3707 | .Bl -tag -width "XXXX" | 3658 | .Bl -tag -width "XXXX" |
3708 | .It Ar PBE-MD2-DES PBE-MD5-DES | 3659 | .It Ar PBE-MD2-DES PBE-MD5-DES |
3709 | These algorithms were included in the original PKCS#5 v1.5 specification. | 3660 | These algorithms were included in the original PKCS#5 v1.5 specification. |
@@ -4044,21 +3995,18 @@ Output only client certificates to a file: | |||
4044 | Don't encrypt the private key: | 3995 | Don't encrypt the private key: |
4045 | .Pp | 3996 | .Pp |
4046 | \& $ openssl pkcs12 -in file.p12 -out file.pem -nodes | 3997 | \& $ openssl pkcs12 -in file.p12 -out file.pem -nodes |
4047 | .br | ||
4048 | .Pp | 3998 | .Pp |
4049 | Print some info about a PKCS#12 file: | 3999 | Print some info about a PKCS#12 file: |
4050 | .Pp | 4000 | .Pp |
4051 | \& $ openssl pkcs12 -in file.p12 -info -noout | 4001 | \& $ openssl pkcs12 -in file.p12 -info -noout |
4052 | .Pp | 4002 | .Pp |
4053 | Create a PKCS#12 file: | 4003 | Create a PKCS#12 file: |
4054 | .Pp | ||
4055 | .Bd -literal | 4004 | .Bd -literal |
4056 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e | 4005 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e |
4057 | -name "My Certificate" | 4006 | -name "My Certificate" |
4058 | .Ed | 4007 | .Ed |
4059 | .Pp | 4008 | .Pp |
4060 | Include some extra certificates: | 4009 | Include some extra certificates: |
4061 | .Pp | ||
4062 | .Bd -literal | 4010 | .Bd -literal |
4063 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e | 4011 | \& $ openssl pkcs12 -export -in file.pem -out file.p12 \e |
4064 | -name "My Certificate" -certfile othercerts.pem | 4012 | -name "My Certificate" -certfile othercerts.pem |
@@ -4095,7 +4043,6 @@ and recreating | |||
4095 | the PKCS#12 file from the keys and certificates using a newer version of | 4043 | the PKCS#12 file from the keys and certificates using a newer version of |
4096 | .Nm OpenSSL . | 4044 | .Nm OpenSSL . |
4097 | For example: | 4045 | For example: |
4098 | .Pp | ||
4099 | .Bd -literal | 4046 | .Bd -literal |
4100 | \& $ old-openssl -in bad.p12 -out keycerts.pem | 4047 | \& $ old-openssl -in bad.p12 -out keycerts.pem |
4101 | \& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12 | 4048 | \& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12 |
@@ -4586,7 +4533,6 @@ If the | |||
4586 | option is set to | 4533 | option is set to |
4587 | .Em no | 4534 | .Em no |
4588 | then these sections just consist of field names and values: for example, | 4535 | then these sections just consist of field names and values: for example, |
4589 | .Pp | ||
4590 | .Bd -literal | 4536 | .Bd -literal |
4591 | \& CN=My Name | 4537 | \& CN=My Name |
4592 | \& OU=My Organization | 4538 | \& OU=My Organization |
@@ -4606,7 +4552,6 @@ option is absent or not set to | |||
4606 | .Em no , | 4552 | .Em no , |
4607 | then the file contains field prompting information. | 4553 | then the file contains field prompting information. |
4608 | It consists of lines of the form: | 4554 | It consists of lines of the form: |
4609 | .Pp | ||
4610 | .Bd -literal | 4555 | .Bd -literal |
4611 | \& fieldName="prompt" | 4556 | \& fieldName="prompt" |
4612 | \& fieldName_default="default field value" | 4557 | \& fieldName_default="default field value" |
@@ -4673,7 +4618,6 @@ Examine and verify certificate request: | |||
4673 | \& $ openssl req -in req.pem -text -verify -noout | 4618 | \& $ openssl req -in req.pem -text -verify -noout |
4674 | .Pp | 4619 | .Pp |
4675 | Create a private key and then generate a certificate request from it: | 4620 | Create a private key and then generate a certificate request from it: |
4676 | .Pp | ||
4677 | .Bd -literal | 4621 | .Bd -literal |
4678 | \& $ openssl genrsa -out key.pem 1024 | 4622 | \& $ openssl genrsa -out key.pem 1024 |
4679 | \& $ openssl req -new -key key.pem -out req.pem | 4623 | \& $ openssl req -new -key key.pem -out req.pem |
@@ -4686,12 +4630,10 @@ The same but just using req: | |||
4686 | Generate a self-signed root certificate: | 4630 | Generate a self-signed root certificate: |
4687 | .Pp | 4631 | .Pp |
4688 | \& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem | 4632 | \& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem |
4689 | .br | ||
4690 | .Pp | 4633 | .Pp |
4691 | Example of a file pointed to by the | 4634 | Example of a file pointed to by the |
4692 | .Ar oid_file | 4635 | .Ar oid_file |
4693 | option: | 4636 | option: |
4694 | .Pp | ||
4695 | .Bd -literal | 4637 | .Bd -literal |
4696 | \& 1.2.3.4 shortName A longer Name | 4638 | \& 1.2.3.4 shortName A longer Name |
4697 | \& 1.2.3.6 otherName Other longer Name | 4639 | \& 1.2.3.6 otherName Other longer Name |
@@ -4700,14 +4642,12 @@ option: | |||
4700 | Example of a section pointed to by | 4642 | Example of a section pointed to by |
4701 | .Ar oid_section | 4643 | .Ar oid_section |
4702 | making use of variable expansion: | 4644 | making use of variable expansion: |
4703 | .Pp | ||
4704 | .Bd -literal | 4645 | .Bd -literal |
4705 | \& testoid1=1.2.3.5 | 4646 | \& testoid1=1.2.3.5 |
4706 | \& testoid2=${testoid1}.6 | 4647 | \& testoid2=${testoid1}.6 |
4707 | .Ed | 4648 | .Ed |
4708 | .Pp | 4649 | .Pp |
4709 | Sample configuration file prompting for field values: | 4650 | Sample configuration file prompting for field values: |
4710 | .Pp | ||
4711 | .Bd -literal | 4651 | .Bd -literal |
4712 | \& [ req ] | 4652 | \& [ req ] |
4713 | \& default_bits = 1024 | 4653 | \& default_bits = 1024 |
@@ -4747,7 +4687,6 @@ Sample configuration file prompting for field values: | |||
4747 | .Ed | 4687 | .Ed |
4748 | .Pp | 4688 | .Pp |
4749 | Sample configuration containing all field values: | 4689 | Sample configuration containing all field values: |
4750 | .Pp | ||
4751 | .Bd -literal | 4690 | .Bd -literal |
4752 | \& RANDFILE = $ENV::HOME/.rnd | 4691 | \& RANDFILE = $ENV::HOME/.rnd |
4753 | .Pp | 4692 | .Pp |
@@ -4775,14 +4714,12 @@ Sample configuration containing all field values: | |||
4775 | The header and footer lines in the | 4714 | The header and footer lines in the |
4776 | .Ar PEM | 4715 | .Ar PEM |
4777 | format are normally: | 4716 | format are normally: |
4778 | .Pp | ||
4779 | .Bd -literal | 4717 | .Bd -literal |
4780 | \& -----BEGIN CERTIFICATE REQUEST----- | 4718 | \& -----BEGIN CERTIFICATE REQUEST----- |
4781 | \& -----END CERTIFICATE REQUEST----- | 4719 | \& -----END CERTIFICATE REQUEST----- |
4782 | .Ed | 4720 | .Ed |
4783 | .Pp | 4721 | .Pp |
4784 | Some software (some versions of Netscape certificate server) instead needs: | 4722 | Some software (some versions of Netscape certificate server) instead needs: |
4785 | .Pp | ||
4786 | .Bd -literal | 4723 | .Bd -literal |
4787 | \& -----BEGIN NEW CERTIFICATE REQUEST----- | 4724 | \& -----BEGIN NEW CERTIFICATE REQUEST----- |
4788 | \& -----END NEW CERTIFICATE REQUEST----- | 4725 | \& -----END NEW CERTIFICATE REQUEST----- |
@@ -4803,14 +4740,12 @@ by the script in an | |||
4803 | extension. | 4740 | extension. |
4804 | .Sh REQ DIAGNOSTICS | 4741 | .Sh REQ DIAGNOSTICS |
4805 | The following messages are frequently asked about: | 4742 | The following messages are frequently asked about: |
4806 | .Pp | ||
4807 | .Bd -literal | 4743 | .Bd -literal |
4808 | \& Using configuration from /some/path/openssl.cnf | 4744 | \& Using configuration from /some/path/openssl.cnf |
4809 | \& Unable to load config info | 4745 | \& Unable to load config info |
4810 | .Ed | 4746 | .Ed |
4811 | .Pp | 4747 | .Pp |
4812 | This is followed some time later by... | 4748 | This is followed some time later by... |
4813 | .Pp | ||
4814 | .Bd -literal | 4749 | .Bd -literal |
4815 | \& unable to find 'distinguished_name' in config | 4750 | \& unable to find 'distinguished_name' in config |
4816 | \& problems making Certificate Request | 4751 | \& problems making Certificate Request |
@@ -4824,7 +4759,6 @@ Generation of certificates or requests, however, do need a configuration file. | |||
4824 | This could be regarded as a bug. | 4759 | This could be regarded as a bug. |
4825 | .Pp | 4760 | .Pp |
4826 | Another puzzling message is this: | 4761 | Another puzzling message is this: |
4827 | .Pp | ||
4828 | .Bd -literal | 4762 | .Bd -literal |
4829 | \& Attributes: | 4763 | \& Attributes: |
4830 | \& a0:00 | 4764 | \& a0:00 |
@@ -5012,7 +4946,6 @@ The engine will then be set as the default for all available algorithms. | |||
5012 | The | 4946 | The |
5013 | .Em PEM | 4947 | .Em PEM |
5014 | private key format uses the header and footer lines: | 4948 | private key format uses the header and footer lines: |
5015 | .Pp | ||
5016 | .Bd -literal | 4949 | .Bd -literal |
5017 | \& -----BEGIN RSA PRIVATE KEY----- | 4950 | \& -----BEGIN RSA PRIVATE KEY----- |
5018 | \& -----END RSA PRIVATE KEY----- | 4951 | \& -----END RSA PRIVATE KEY----- |
@@ -5021,7 +4954,6 @@ private key format uses the header and footer lines: | |||
5021 | The | 4954 | The |
5022 | .Em PEM | 4955 | .Em PEM |
5023 | public key format uses the header and footer lines: | 4956 | public key format uses the header and footer lines: |
5024 | .Pp | ||
5025 | .Bd -literal | 4957 | .Bd -literal |
5026 | \& -----BEGIN PUBLIC KEY----- | 4958 | \& -----BEGIN PUBLIC KEY----- |
5027 | \& -----END PUBLIC KEY----- | 4959 | \& -----END PUBLIC KEY----- |
@@ -5064,7 +4996,6 @@ to | |||
5064 | format: | 4996 | format: |
5065 | .Pp | 4997 | .Pp |
5066 | \& $ openssl rsa -in key.pem -outform DER -out keyout.der | 4998 | \& $ openssl rsa -in key.pem -outform DER -out keyout.der |
5067 | .br | ||
5068 | .Pp | 4999 | .Pp |
5069 | To print out the components of a private key to standard output: | 5000 | To print out the components of a private key to standard output: |
5070 | .Pp | 5001 | .Pp |
@@ -5164,7 +5095,6 @@ Recover the signed data: | |||
5164 | Examine the raw signed data: | 5095 | Examine the raw signed data: |
5165 | .Pp | 5096 | .Pp |
5166 | \& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump | 5097 | \& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump |
5167 | .Pp | ||
5168 | .Bd -literal | 5098 | .Bd -literal |
5169 | \& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ | 5099 | \& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ |
5170 | \& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ | 5100 | \& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ |
@@ -5190,7 +5120,6 @@ Running | |||
5190 | as follows yields: | 5120 | as follows yields: |
5191 | .Pp | 5121 | .Pp |
5192 | \& $ openssl asn1parse -in pca-cert.pem | 5122 | \& $ openssl asn1parse -in pca-cert.pem |
5193 | .Pp | ||
5194 | .Bd -literal | 5123 | .Bd -literal |
5195 | \& 0:d=0 hl=4 l= 742 cons: SEQUENCE | 5124 | \& 0:d=0 hl=4 l= 742 cons: SEQUENCE |
5196 | \& 4:d=1 hl=4 l= 591 cons: SEQUENCE | 5125 | \& 4:d=1 hl=4 l= 591 cons: SEQUENCE |
@@ -5224,7 +5153,6 @@ The certificate public key can be extracted with: | |||
5224 | The signature can be analysed with: | 5153 | The signature can be analysed with: |
5225 | .Pp | 5154 | .Pp |
5226 | \& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin | 5155 | \& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin |
5227 | .Pp | ||
5228 | .Bd -literal | 5156 | .Bd -literal |
5229 | \& 0:d=0 hl=2 l= 32 cons: SEQUENCE | 5157 | \& 0:d=0 hl=2 l= 32 cons: SEQUENCE |
5230 | \& 2:d=1 hl=2 l= 12 cons: SEQUENCE | 5158 | \& 2:d=1 hl=2 l= 12 cons: SEQUENCE |
@@ -5243,7 +5171,6 @@ The actual part of the certificate that was signed can be extracted with: | |||
5243 | \& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 | 5171 | \& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 |
5244 | .Pp | 5172 | .Pp |
5245 | and its digest computed with: | 5173 | and its digest computed with: |
5246 | .Pp | ||
5247 | .Bd -literal | 5174 | .Bd -literal |
5248 | \& $ openssl md5 -c tbs | 5175 | \& $ openssl md5 -c tbs |
5249 | \& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5 | 5176 | \& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5 |
@@ -5735,7 +5662,6 @@ from the client is displayed and any key presses will be sent to the client. | |||
5735 | .Pp | 5662 | .Pp |
5736 | Certain single letter commands are also recognized which perform special | 5663 | Certain single letter commands are also recognized which perform special |
5737 | operations: these are listed below. | 5664 | operations: these are listed below. |
5738 | .Pp | ||
5739 | .Bl -tag -width "XXXX" | 5665 | .Bl -tag -width "XXXX" |
5740 | .It Ar q | 5666 | .It Ar q |
5741 | End the current SSL connection, but still accept new connections. | 5667 | End the current SSL connection, but still accept new connections. |
@@ -5867,7 +5793,6 @@ This option won't normally be used. | |||
5867 | .El | 5793 | .El |
5868 | .Sh SESS_ID OUTPUT | 5794 | .Sh SESS_ID OUTPUT |
5869 | Typical output: | 5795 | Typical output: |
5870 | .Pp | ||
5871 | .Bd -literal | 5796 | .Bd -literal |
5872 | \& SSL-Session: | 5797 | \& SSL-Session: |
5873 | \& Protocol : TLSv1 | 5798 | \& Protocol : TLSv1 |
@@ -5908,7 +5833,6 @@ This is the return code when an SSL client certificate is verified. | |||
5908 | The | 5833 | The |
5909 | .Em PEM | 5834 | .Em PEM |
5910 | encoded session format uses the header and footer lines: | 5835 | encoded session format uses the header and footer lines: |
5911 | .Pp | ||
5912 | .Bd -literal | 5836 | .Bd -literal |
5913 | \& -----BEGIN SSL SESSION PARAMETERS----- | 5837 | \& -----BEGIN SSL SESSION PARAMETERS----- |
5914 | \& -----END SSL SESSION PARAMETERS----- | 5838 | \& -----END SSL SESSION PARAMETERS----- |
@@ -6247,14 +6171,12 @@ the signers certificates. | |||
6247 | .El | 6171 | .El |
6248 | .Sh SMIME EXAMPLES | 6172 | .Sh SMIME EXAMPLES |
6249 | Create a cleartext signed message: | 6173 | Create a cleartext signed message: |
6250 | .Pp | ||
6251 | .Bd -literal | 6174 | .Bd -literal |
6252 | \& $ openssl smime -sign -in message.txt -text -out mail.msg \e | 6175 | \& $ openssl smime -sign -in message.txt -text -out mail.msg \e |
6253 | \& -signer mycert.pem | 6176 | \& -signer mycert.pem |
6254 | .Ed | 6177 | .Ed |
6255 | .Pp | 6178 | .Pp |
6256 | Create an opaque signed message: | 6179 | Create an opaque signed message: |
6257 | .Pp | ||
6258 | .Bd -literal | 6180 | .Bd -literal |
6259 | \& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e | 6181 | \& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e |
6260 | \& -signer mycert.pem | 6182 | \& -signer mycert.pem |
@@ -6262,7 +6184,6 @@ Create an opaque signed message: | |||
6262 | .Pp | 6184 | .Pp |
6263 | Create a signed message, include some additional certificates and | 6185 | Create a signed message, include some additional certificates and |
6264 | read the private key from another file: | 6186 | read the private key from another file: |
6265 | .Pp | ||
6266 | .Bd -literal | 6187 | .Bd -literal |
6267 | \& $ openssl smime -sign -in in.txt -text -out mail.msg \e | 6188 | \& $ openssl smime -sign -in in.txt -text -out mail.msg \e |
6268 | \& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem | 6189 | \& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem |
@@ -6271,7 +6192,6 @@ read the private key from another file: | |||
6271 | Send a signed message under Unix directly to | 6192 | Send a signed message under Unix directly to |
6272 | .Xr sendmail 8 , | 6193 | .Xr sendmail 8 , |
6273 | including headers: | 6194 | including headers: |
6274 | .Pp | ||
6275 | .Bd -literal | 6195 | .Bd -literal |
6276 | \& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e | 6196 | \& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e |
6277 | \& -from steve@openssl.org -to someone@somewhere \e | 6197 | \& -from steve@openssl.org -to someone@somewhere \e |
@@ -6279,14 +6199,12 @@ including headers: | |||
6279 | .Ed | 6199 | .Ed |
6280 | .Pp | 6200 | .Pp |
6281 | Verify a message and extract the signer's certificate if successful: | 6201 | Verify a message and extract the signer's certificate if successful: |
6282 | .Pp | ||
6283 | .Bd -literal | 6202 | .Bd -literal |
6284 | \& $ openssl smime -verify -in mail.msg -signer user.pem \e | 6203 | \& $ openssl smime -verify -in mail.msg -signer user.pem \e |
6285 | \& -out signedtext.txt | 6204 | \& -out signedtext.txt |
6286 | .Ed | 6205 | .Ed |
6287 | .Pp | 6206 | .Pp |
6288 | Send encrypted mail using triple DES: | 6207 | Send encrypted mail using triple DES: |
6289 | .Pp | ||
6290 | .Bd -literal | 6208 | .Bd -literal |
6291 | \& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e | 6209 | \& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e |
6292 | \& -to someone@somewhere -subject "Encrypted message" \e | 6210 | \& -to someone@somewhere -subject "Encrypted message" \e |
@@ -6294,7 +6212,6 @@ Send encrypted mail using triple DES: | |||
6294 | .Ed | 6212 | .Ed |
6295 | .Pp | 6213 | .Pp |
6296 | Sign and encrypt mail: | 6214 | Sign and encrypt mail: |
6297 | .Pp | ||
6298 | .Bd -literal | 6215 | .Bd -literal |
6299 | \& $ openssl smime -sign -in ml.txt -signer my.pem -text \e | 6216 | \& $ openssl smime -sign -in ml.txt -signer my.pem -text \e |
6300 | \& | openssl smime -encrypt -out mail.msg \e | 6217 | \& | openssl smime -encrypt -out mail.msg \e |
@@ -6317,22 +6234,18 @@ The output from Netscape form signing is a PKCS#7 structure with the | |||
6317 | detached signature format. | 6234 | detached signature format. |
6318 | You can use this program to verify the signature by line wrapping the | 6235 | You can use this program to verify the signature by line wrapping the |
6319 | base64 encoded structure and surrounding it with: | 6236 | base64 encoded structure and surrounding it with: |
6320 | .Pp | ||
6321 | .Bd -literal | 6237 | .Bd -literal |
6322 | \& -----BEGIN PKCS7----- | 6238 | \& -----BEGIN PKCS7----- |
6323 | \& -----END PKCS7----- | 6239 | \& -----END PKCS7----- |
6324 | .Ed | 6240 | .Ed |
6325 | .Pp | 6241 | .Pp |
6326 | and using the command: | 6242 | and using the command: |
6327 | .br | ||
6328 | .Pp | ||
6329 | .Bd -literal | 6243 | .Bd -literal |
6330 | \& $ openssl smime -verify -inform PEM -in signature.pem | 6244 | \& $ openssl smime -verify -inform PEM -in signature.pem |
6331 | \& -content content.txt | 6245 | \& -content content.txt |
6332 | .Ed | 6246 | .Ed |
6333 | .Pp | 6247 | .Pp |
6334 | Alternatively, you can base64 decode the signature and use: | 6248 | Alternatively, you can base64 decode the signature and use: |
6335 | .Pp | ||
6336 | .Bd -literal | 6249 | .Bd -literal |
6337 | \& $ openssl smime -verify -inform DER -in signature.der | 6250 | \& $ openssl smime -verify -inform DER -in signature.der |
6338 | \& -content content.txt | 6251 | \& -content content.txt |
@@ -6401,7 +6314,6 @@ v3 structures may cause parsing errors. | |||
6401 | The | 6314 | The |
6402 | .Nm speed | 6315 | .Nm speed |
6403 | command is used to test the performance of cryptographic algorithms. | 6316 | command is used to test the performance of cryptographic algorithms. |
6404 | .Pp | ||
6405 | .Bl -tag -width "XXXX" | 6317 | .Bl -tag -width "XXXX" |
6406 | .It Fl engine Ar id | 6318 | .It Fl engine Ar id |
6407 | Specifying an engine (by it's unique | 6319 | Specifying an engine (by it's unique |
@@ -6511,7 +6423,6 @@ Create an SPKAC using the challenge string "hello": | |||
6511 | \& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf | 6423 | \& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf |
6512 | .Pp | 6424 | .Pp |
6513 | Example of an SPKAC, (long lines split up for clarity): | 6425 | Example of an SPKAC, (long lines split up for clarity): |
6514 | .Pp | ||
6515 | .Bd -literal | 6426 | .Bd -literal |
6516 | \& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e | 6427 | \& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e |
6517 | \& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e | 6428 | \& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e |
@@ -6709,7 +6620,6 @@ If any operation fails then the certificate is not valid. | |||
6709 | .Sh VERIFY DIAGNOSTICS | 6620 | .Sh VERIFY DIAGNOSTICS |
6710 | When a verify operation fails, the output messages can be somewhat cryptic. | 6621 | When a verify operation fails, the output messages can be somewhat cryptic. |
6711 | The general form of the error message is: | 6622 | The general form of the error message is: |
6712 | .Pp | ||
6713 | .Bd -literal | 6623 | .Bd -literal |
6714 | \& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) | 6624 | \& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) |
6715 | \& error 24 at 1 depth lookup:invalid CA certificate | 6625 | \& error 24 at 1 depth lookup:invalid CA certificate |
@@ -6728,7 +6638,6 @@ includes the name of the error code as defined in the header file | |||
6728 | .Aq Pa x509_vfy.h . | 6638 | .Aq Pa x509_vfy.h . |
6729 | Some of the error codes are defined but never returned: these are described | 6639 | Some of the error codes are defined but never returned: these are described |
6730 | as "unused". | 6640 | as "unused". |
6731 | .Pp | ||
6732 | .Bl -tag -width "XXXX" | 6641 | .Bl -tag -width "XXXX" |
6733 | .It Ar "0 X509_V_OK: ok" | 6642 | .It Ar "0 X509_V_OK: ok" |
6734 | The operation was successful. | 6643 | The operation was successful. |
@@ -7188,7 +7097,6 @@ The | |||
7188 | .Nm x509 | 7097 | .Nm x509 |
7189 | utility can be used to sign certificates and requests: it | 7098 | utility can be used to sign certificates and requests: it |
7190 | can thus behave like a "mini CA". | 7099 | can thus behave like a "mini CA". |
7191 | .Pp | ||
7192 | .Bl -tag -width "XXXX" | 7100 | .Bl -tag -width "XXXX" |
7193 | .It Fl signkey Ar filename | 7101 | .It Fl signkey Ar filename |
7194 | This option causes the input file to be self-signed using the supplied | 7102 | This option causes the input file to be self-signed using the supplied |
@@ -7557,7 +7465,6 @@ Convert a certificate to a certificate request: | |||
7557 | .Pp | 7465 | .Pp |
7558 | Convert a certificate request into a self-signed certificate using | 7466 | Convert a certificate request into a self-signed certificate using |
7559 | extensions for a CA: | 7467 | extensions for a CA: |
7560 | .Pp | ||
7561 | .Bd -literal | 7468 | .Bd -literal |
7562 | \& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e | 7469 | \& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e |
7563 | \& v3_ca -signkey key.pem -out cacert.pem | 7470 | \& v3_ca -signkey key.pem -out cacert.pem |
@@ -7565,7 +7472,6 @@ extensions for a CA: | |||
7565 | .Pp | 7472 | .Pp |
7566 | Sign a certificate request using the CA certificate above and add user | 7473 | Sign a certificate request using the CA certificate above and add user |
7567 | certificate extensions: | 7474 | certificate extensions: |
7568 | .Pp | ||
7569 | .Bd -literal | 7475 | .Bd -literal |
7570 | \& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e | 7476 | \& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e |
7571 | v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial | 7477 | v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial |
@@ -7573,7 +7479,6 @@ certificate extensions: | |||
7573 | .Pp | 7479 | .Pp |
7574 | Set a certificate to be trusted for SSL | 7480 | Set a certificate to be trusted for SSL |
7575 | client use and set its alias to "Steve's Class 1 CA": | 7481 | client use and set its alias to "Steve's Class 1 CA": |
7576 | .Pp | ||
7577 | .Bd -literal | 7482 | .Bd -literal |
7578 | \& $ openssl x509 -in cert.pem -addtrust clientAuth \e | 7483 | \& $ openssl x509 -in cert.pem -addtrust clientAuth \e |
7579 | \& -setalias "Steve's Class 1 CA" -out trust.pem | 7484 | \& -setalias "Steve's Class 1 CA" -out trust.pem |
@@ -7582,21 +7487,18 @@ client use and set its alias to "Steve's Class 1 CA": | |||
7582 | The | 7487 | The |
7583 | .Em PEM | 7488 | .Em PEM |
7584 | format uses the header and footer lines: | 7489 | format uses the header and footer lines: |
7585 | .Pp | ||
7586 | .Bd -literal | 7490 | .Bd -literal |
7587 | \& -----BEGIN CERTIFICATE----- | 7491 | \& -----BEGIN CERTIFICATE----- |
7588 | \& -----END CERTIFICATE----- | 7492 | \& -----END CERTIFICATE----- |
7589 | .Ed | 7493 | .Ed |
7590 | .Pp | 7494 | .Pp |
7591 | It will also handle files containing: | 7495 | It will also handle files containing: |
7592 | .Pp | ||
7593 | .Bd -literal | 7496 | .Bd -literal |
7594 | \& -----BEGIN X509 CERTIFICATE----- | 7497 | \& -----BEGIN X509 CERTIFICATE----- |
7595 | \& -----END X509 CERTIFICATE----- | 7498 | \& -----END X509 CERTIFICATE----- |
7596 | .Ed | 7499 | .Ed |
7597 | .Pp | 7500 | .Pp |
7598 | Trusted certificates have the lines: | 7501 | Trusted certificates have the lines: |
7599 | .Pp | ||
7600 | .Bd -literal | 7502 | .Bd -literal |
7601 | \& -----BEGIN TRUSTED CERTIFICATE----- | 7503 | \& -----BEGIN TRUSTED CERTIFICATE----- |
7602 | \& -----END TRUSTED CERTIFICATE----- | 7504 | \& -----END TRUSTED CERTIFICATE----- |
@@ -7684,7 +7586,6 @@ and | |||
7684 | and V1 certificates above apply to | 7586 | and V1 certificates above apply to |
7685 | .Em all | 7587 | .Em all |
7686 | CA certificates. | 7588 | CA certificates. |
7687 | .Pp | ||
7688 | .Bl -tag -width "XXXX" | 7589 | .Bl -tag -width "XXXX" |
7689 | .It Ar SSL Client | 7590 | .It Ar SSL Client |
7690 | The extended key usage extension must be absent or include the | 7591 | The extended key usage extension must be absent or include the |