summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2003-07-16 09:05:58 +0000
committerjmc <>2003-07-16 09:05:58 +0000
commit532c18f1f3c2b718b6845205aa5dc0ea3c873efc (patch)
tree4734d781124434e97451a5fe3207a539d3d6c536 /src
parent19f7f066e726b9057c4d22f7ea855a2eec1a6826 (diff)
downloadopenbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.gz
openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.tar.bz2
openbsd-532c18f1f3c2b718b6845205aa5dc0ea3c873efc.zip
kill a rake of .br's and .Pp's that worked around the spacing bug. should
help postscript output too.
Diffstat (limited to 'src')
-rw-r--r--src/usr.sbin/openssl/openssl.1101
1 files changed, 1 insertions, 100 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1
index b115397bad..0be74bd25e 100644
--- a/src/usr.sbin/openssl/openssl.1
+++ b/src/usr.sbin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.9 2003/06/12 12:59:51 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.10 2003/07/16 09:05:58 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -459,7 +459,6 @@ This option can be used multiple times to "drill down" into a nested structure.
459.El 459.El
460.Sh ASN1PARSE OUTPUT 460.Sh ASN1PARSE OUTPUT
461The output will typically contain lines like this: 461The output will typically contain lines like this:
462.Pp
463.Bd -literal 462.Bd -literal
464 0:d=0 hl=4 l= 681 cons: SEQUENCE 463 0:d=0 hl=4 l= 681 cons: SEQUENCE
465 464
@@ -500,7 +499,6 @@ The contents octets of this will contain the public key information.
500This can be examined using the option 499This can be examined using the option
501.Fl strparse Cm 229 500.Fl strparse Cm 229
502to yield: 501to yield:
503.Pp
504.Bd -literal 502.Bd -literal
505\& 0:d=0 hl=3 l= 137 cons: SEQUENCE 503\& 0:d=0 hl=3 l= 137 cons: SEQUENCE
506\& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 504\& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897
@@ -816,7 +814,6 @@ Where the option is present in the configuration file and the command line,
816the command line value is used. 814the command line value is used.
817Where an option is described as mandatory, then it must be present in 815Where an option is described as mandatory, then it must be present in
818the configuration file or the command line equivalent (if any) used. 816the configuration file or the command line equivalent (if any) used.
819.Pp
820.Bl -tag -width "XXXX" 817.Bl -tag -width "XXXX"
821.It Ar oid_file 818.It Ar oid_file
822This specifies a file containing additional OBJECT IDENTIFIERS. 819This specifies a file containing additional OBJECT IDENTIFIERS.
@@ -1043,7 +1040,6 @@ Certify a Netscape SPKAC:
1043\& $ openssl ca -spkac spkac.txt 1040\& $ openssl ca -spkac spkac.txt
1044.Pp 1041.Pp
1045A sample SPKAC file (the SPKAC line has been truncated for clarity): 1042A sample SPKAC file (the SPKAC line has been truncated for clarity):
1046.Pp
1047.Bd -literal 1043.Bd -literal
1048\& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5 1044\& SPKAC=MIG0MGAwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAn7PDhCeV/xIxUg8V70YRxK2A5
1049\& CN=Steve Test 1045\& CN=Steve Test
@@ -1054,7 +1050,6 @@ A sample SPKAC file (the SPKAC line has been truncated for clarity):
1054.Pp 1050.Pp
1055A sample configuration file with the relevant sections for 1051A sample configuration file with the relevant sections for
1056.Nm ca : 1052.Nm ca :
1057.Pp
1058.Bd -literal 1053.Bd -literal
1059\& [ ca ] 1054\& [ ca ]
1060\& default_ca = CA_default # The default ca section 1055\& default_ca = CA_default # The default ca section
@@ -1094,7 +1089,6 @@ A sample configuration file with the relevant sections for
1094the location of all files can change either by compile time options, 1089the location of all files can change either by compile time options,
1095configuration file entries, environment variables or command line options. 1090configuration file entries, environment variables or command line options.
1096The values below reflect the default values. 1091The values below reflect the default values.
1097.Pp
1098.Bd -literal 1092.Bd -literal
1099/usr/local/ssl/lib/openssl.cnf - master configuration file 1093/usr/local/ssl/lib/openssl.cnf - master configuration file
1100\&./demoCA - main CA directory 1094\&./demoCA - main CA directory
@@ -1307,7 +1301,6 @@ If
1307.Cm - 1301.Cm -
1308is used, then the ciphers are deleted from the list, but some or 1302is used, then the ciphers are deleted from the list, but some or
1309all of the ciphers can be added again by later options. 1303all of the ciphers can be added again by later options.
1310.br
1311.Pp 1304.Pp
1312If 1305If
1313.Cm + 1306.Cm +
@@ -1432,7 +1425,6 @@ authentication used, e.g. DES-CBC3-SHA.
1432In these cases, RSA authentication is used. 1425In these cases, RSA authentication is used.
1433.Pp 1426.Pp
1434.Sy "SSL v3.0 cipher suites" 1427.Sy "SSL v3.0 cipher suites"
1435.Pp
1436.Bd -literal 1428.Bd -literal
1437 SSL_RSA_WITH_NULL_MD5 NULL-MD5 1429 SSL_RSA_WITH_NULL_MD5 NULL-MD5
1438 SSL_RSA_WITH_NULL_SHA NULL-SHA 1430 SSL_RSA_WITH_NULL_SHA NULL-SHA
@@ -1445,7 +1437,6 @@ In these cases, RSA authentication is used.
1445 SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA 1437 SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
1446 SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA 1438 SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
1447.Ed 1439.Ed
1448.Pp
1449.Bd -literal 1440.Bd -literal
1450 SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. 1441 SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented.
1451 SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented. 1442 SSL_DH_DSS_WITH_DES_CBC_SHA Not implemented.
@@ -1460,7 +1451,6 @@ In these cases, RSA authentication is used.
1460 SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA 1451 SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA
1461 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA 1452 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA
1462.Ed 1453.Ed
1463.Pp
1464.Bd -literal 1454.Bd -literal
1465 SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 1455 SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
1466 SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 1456 SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
@@ -1468,7 +1458,6 @@ In these cases, RSA authentication is used.
1468 SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA 1458 SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA
1469 SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA 1459 SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
1470.Ed 1460.Ed
1471.Pp
1472.Bd -literal 1461.Bd -literal
1473 SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented. 1462 SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented.
1474 SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented. 1463 SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented.
@@ -1476,7 +1465,6 @@ In these cases, RSA authentication is used.
1476.Ed 1465.Ed
1477.Pp 1466.Pp
1478.Sy "TLS v1.0 cipher suites" 1467.Sy "TLS v1.0 cipher suites"
1479.Pp
1480.Bd -literal 1468.Bd -literal
1481 TLS_RSA_WITH_NULL_MD5 NULL-MD5 1469 TLS_RSA_WITH_NULL_MD5 NULL-MD5
1482 TLS_RSA_WITH_NULL_SHA NULL-SHA 1470 TLS_RSA_WITH_NULL_SHA NULL-SHA
@@ -1489,7 +1477,6 @@ In these cases, RSA authentication is used.
1489 TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA 1477 TLS_RSA_WITH_DES_CBC_SHA DES-CBC-SHA
1490 TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA 1478 TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
1491.Ed 1479.Ed
1492.Pp
1493.Bd -literal 1480.Bd -literal
1494 TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented. 1481 TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA Not implemented.
1495 TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented. 1482 TLS_DH_DSS_WITH_DES_CBC_SHA Not implemented.
@@ -1504,7 +1491,6 @@ In these cases, RSA authentication is used.
1504 TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA 1491 TLS_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA
1505 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA 1492 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA
1506.Ed 1493.Ed
1507.Pp
1508.Bd -literal 1494.Bd -literal
1509 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5 1495 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5
1510 TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 1496 TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
@@ -1536,7 +1522,6 @@ In these cases, RSA authentication is used.
1536.Pp 1522.Pp
1537.Sy Note : 1523.Sy Note :
1538These ciphers can also be used in SSL v3. 1524These ciphers can also be used in SSL v3.
1539.Pp
1540.Bd -literal 1525.Bd -literal
1541 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA 1526 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA
1542 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA 1527 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA
@@ -1546,7 +1531,6 @@ These ciphers can also be used in SSL v3.
1546.Ed 1531.Ed
1547.Pp 1532.Pp
1548.Sy "SSL v2.0 cipher suites" 1533.Sy "SSL v2.0 cipher suites"
1549.Pp
1550.Bd -literal 1534.Bd -literal
1551 SSL_CK_RC4_128_WITH_MD5 RC4-MD5 1535 SSL_CK_RC4_128_WITH_MD5 RC4-MD5
1552 SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 1536 SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5
@@ -1670,7 +1654,6 @@ should be linked to each certificate.
1670.El 1654.El
1671.Sh CRL NOTES 1655.Sh CRL NOTES
1672The PEM CRL format uses the header and footer lines: 1656The PEM CRL format uses the header and footer lines:
1673.Pp
1674.Bd -literal 1657.Bd -literal
1675\& -----BEGIN X509 CRL----- 1658\& -----BEGIN X509 CRL-----
1676\& -----END X509 CRL----- 1659\& -----END X509 CRL-----
@@ -1756,7 +1739,6 @@ Creates a PKCS#7 structure in
1756.Ar DER 1739.Ar DER
1757format with no CRL from several 1740format with no CRL from several
1758different certificates: 1741different certificates:
1759.Pp
1760.Bd -literal 1742.Bd -literal
1761\& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem 1743\& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem
1762\& -certfile demoCA/cacert.pem -outform DER -out p7.der 1744\& -certfile demoCA/cacert.pem -outform DER -out p7.der
@@ -2010,7 +1992,6 @@ versions of
2010.Sh DHPARAM NOTES 1992.Sh DHPARAM NOTES
2011.Ar PEM 1993.Ar PEM
2012format DH parameters use the header and footer lines: 1994format DH parameters use the header and footer lines:
2013.Pp
2014.Bd -literal 1995.Bd -literal
2015\& -----BEGIN DH PARAMETERS----- 1996\& -----BEGIN DH PARAMETERS-----
2016\& -----END DH PARAMETERS----- 1997\& -----END DH PARAMETERS-----
@@ -2162,7 +2143,6 @@ The engine will then be set as the default for all available algorithms.
2162The 2143The
2163.Ar PEM 2144.Ar PEM
2164private key format uses the header and footer lines: 2145private key format uses the header and footer lines:
2165.Pp
2166.Bd -literal 2146.Bd -literal
2167\& -----BEGIN DSA PRIVATE KEY----- 2147\& -----BEGIN DSA PRIVATE KEY-----
2168\& -----END DSA PRIVATE KEY----- 2148\& -----END DSA PRIVATE KEY-----
@@ -2171,7 +2151,6 @@ private key format uses the header and footer lines:
2171The 2151The
2172.Ar PEM 2152.Ar PEM
2173public key format uses the header and footer lines: 2153public key format uses the header and footer lines:
2174.Pp
2175.Bd -literal 2154.Bd -literal
2176\& -----BEGIN PUBLIC KEY----- 2155\& -----BEGIN PUBLIC KEY-----
2177\& -----END PUBLIC KEY----- 2156\& -----END PUBLIC KEY-----
@@ -2296,7 +2275,6 @@ The engine will then be set as the default for all available algorithms.
2296.Sh DSAPARAM NOTES 2275.Sh DSAPARAM NOTES
2297.Ar PEM 2276.Ar PEM
2298format DSA parameters use the header and footer lines: 2277format DSA parameters use the header and footer lines:
2299.Pp
2300.Bd -literal 2278.Bd -literal
2301\& -----BEGIN DSA PARAMETERS----- 2279\& -----BEGIN DSA PARAMETERS-----
2302\& -----END DSA PARAMETERS----- 2280\& -----END DSA PARAMETERS-----
@@ -2525,7 +2503,6 @@ Blowfish and RC5 algorithms use a 128 bit key.
2525.Bd -literal 2503.Bd -literal
2526\& base64 Base 64 2504\& base64 Base 64
2527.Ed 2505.Ed
2528.Pp
2529.Bd -literal 2506.Bd -literal
2530\& bf-cbc Blowfish in CBC mode 2507\& bf-cbc Blowfish in CBC mode
2531\& bf Alias for bf-cbc 2508\& bf Alias for bf-cbc
@@ -2533,7 +2510,6 @@ Blowfish and RC5 algorithms use a 128 bit key.
2533\& bf-ecb Blowfish in ECB mode 2510\& bf-ecb Blowfish in ECB mode
2534\& bf-ofb Blowfish in OFB mode 2511\& bf-ofb Blowfish in OFB mode
2535.Ed 2512.Ed
2536.Pp
2537.Bd -literal 2513.Bd -literal
2538\& cast-cbc CAST in CBC mode 2514\& cast-cbc CAST in CBC mode
2539\& cast Alias for cast-cbc 2515\& cast Alias for cast-cbc
@@ -2542,7 +2518,6 @@ Blowfish and RC5 algorithms use a 128 bit key.
2542\& cast5-ecb CAST5 in ECB mode 2518\& cast5-ecb CAST5 in ECB mode
2543\& cast5-ofb CAST5 in OFB mode 2519\& cast5-ofb CAST5 in OFB mode
2544.Ed 2520.Ed
2545.Pp
2546.Bd -literal 2521.Bd -literal
2547\& des-cbc DES in CBC mode 2522\& des-cbc DES in CBC mode
2548\& des Alias for des-cbc 2523\& des Alias for des-cbc
@@ -2550,14 +2525,12 @@ Blowfish and RC5 algorithms use a 128 bit key.
2550\& des-ofb DES in OFB mode 2525\& des-ofb DES in OFB mode
2551\& des-ecb DES in ECB mode 2526\& des-ecb DES in ECB mode
2552.Ed 2527.Ed
2553.Pp
2554.Bd -literal 2528.Bd -literal
2555\& des-ede-cbc Two key triple DES EDE in CBC mode 2529\& des-ede-cbc Two key triple DES EDE in CBC mode
2556\& des-ede Alias for des-ede 2530\& des-ede Alias for des-ede
2557\& des-ede-cfb Two key triple DES EDE in CFB mode 2531\& des-ede-cfb Two key triple DES EDE in CFB mode
2558\& des-ede-ofb Two key triple DES EDE in OFB mode 2532\& des-ede-ofb Two key triple DES EDE in OFB mode
2559.Ed 2533.Ed
2560.Pp
2561.Bd -literal 2534.Bd -literal
2562\& des-ede3-cbc Three key triple DES EDE in CBC mode 2535\& des-ede3-cbc Three key triple DES EDE in CBC mode
2563\& des-ede3 Alias for des-ede3-cbc 2536\& des-ede3 Alias for des-ede3-cbc
@@ -2565,11 +2538,9 @@ Blowfish and RC5 algorithms use a 128 bit key.
2565\& des-ede3-cfb Three key triple DES EDE CFB mode 2538\& des-ede3-cfb Three key triple DES EDE CFB mode
2566\& des-ede3-ofb Three key triple DES EDE in OFB mode 2539\& des-ede3-ofb Three key triple DES EDE in OFB mode
2567.Ed 2540.Ed
2568.Pp
2569.Bd -literal 2541.Bd -literal
2570\& desx DESX algorithm. 2542\& desx DESX algorithm.
2571.Ed 2543.Ed
2572.Pp
2573.Bd -literal 2544.Bd -literal
2574\& idea-cbc IDEA algorithm in CBC mode 2545\& idea-cbc IDEA algorithm in CBC mode
2575\& idea same as idea-cbc 2546\& idea same as idea-cbc
@@ -2577,7 +2548,6 @@ Blowfish and RC5 algorithms use a 128 bit key.
2577\& idea-ecb IDEA in ECB mode 2548\& idea-ecb IDEA in ECB mode
2578\& idea-ofb IDEA in OFB mode 2549\& idea-ofb IDEA in OFB mode
2579.Ed 2550.Ed
2580.Pp
2581.Bd -literal 2551.Bd -literal
2582\& rc2-cbc 128 bit RC2 in CBC mode 2552\& rc2-cbc 128 bit RC2 in CBC mode
2583\& rc2 Alias for rc2-cbc 2553\& rc2 Alias for rc2-cbc
@@ -2587,13 +2557,11 @@ Blowfish and RC5 algorithms use a 128 bit key.
2587\& rc2-64-cbc 64 bit RC2 in CBC mode 2557\& rc2-64-cbc 64 bit RC2 in CBC mode
2588\& rc2-40-cbc 40 bit RC2 in CBC mode 2558\& rc2-40-cbc 40 bit RC2 in CBC mode
2589.Ed 2559.Ed
2590.Pp
2591.Bd -literal 2560.Bd -literal
2592\& rc4 128 bit RC4 2561\& rc4 128 bit RC4
2593\& rc4-64 64 bit RC4 2562\& rc4-64 64 bit RC4
2594\& rc4-40 40 bit RC4 2563\& rc4-40 40 bit RC4
2595.Ed 2564.Ed
2596.Pp
2597.Bd -literal 2565.Bd -literal
2598\& rc5-cbc RC5 cipher in CBC mode 2566\& rc5-cbc RC5 cipher in CBC mode
2599\& rc5 Alias for rc5-cbc 2567\& rc5 Alias for rc5-cbc
@@ -2854,7 +2822,6 @@ Output the certificates in a Netscape certificate sequence:
2854.Ed 2822.Ed
2855.Pp 2823.Pp
2856Create a Netscape certificate sequence: 2824Create a Netscape certificate sequence:
2857.Pp
2858.Bd -literal 2825.Bd -literal
2859\& $ openssl nseq -in certs.pem -toseq -out nseq.pem 2826\& $ openssl nseq -in certs.pem -toseq -out nseq.pem
2860.Ed 2827.Ed
@@ -2862,7 +2829,6 @@ Create a Netscape certificate sequence:
2862The 2829The
2863.Em PEM 2830.Em PEM
2864encoded form uses the same headers and footers as a certificate: 2831encoded form uses the same headers and footers as a certificate:
2865.Pp
2866.Bd -literal 2832.Bd -literal
2867\& -----BEGIN CERTIFICATE----- 2833\& -----BEGIN CERTIFICATE-----
2868\& -----END CERTIFICATE----- 2834\& -----END CERTIFICATE-----
@@ -2931,7 +2897,6 @@ input and output files and allowing multiple certificate files to be used.
2931.Op Fl resp_key_id 2897.Op Fl resp_key_id
2932.Op Fl nrequest Ar n 2898.Op Fl nrequest Ar n
2933.Ek 2899.Ek
2934.br
2935.Pp 2900.Pp
2936The Online Certificate Status Protocol (OCSP) enables applications to 2901The Online Certificate Status Protocol (OCSP) enables applications to
2937determine the (revocation) state of an identified certificate (RFC 2560). 2902determine the (revocation) state of an identified certificate (RFC 2560).
@@ -3242,7 +3207,6 @@ If the OCSP responder is a
3242which can give details about multiple CAs and has its own separate 3207which can give details about multiple CAs and has its own separate
3243certificate chain, then its root CA can be trusted for OCSP signing. 3208certificate chain, then its root CA can be trusted for OCSP signing.
3244For example: 3209For example:
3245.Pp
3246.Bd -literal 3210.Bd -literal
3247\& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem 3211\& $ openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem
3248.Ed 3212.Ed
@@ -3279,7 +3243,6 @@ and
3279options. 3243options.
3280.Sh OCSP EXAMPLES 3244.Sh OCSP EXAMPLES
3281Create an OCSP request and write it to a file: 3245Create an OCSP request and write it to a file:
3282.Pp
3283.Bd -literal 3246.Bd -literal
3284\& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e 3247\& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout \e
3285 req.der 3248 req.der
@@ -3288,14 +3251,12 @@ Create an OCSP request and write it to a file:
3288Send a query to an OCSP responder with URL 3251Send a query to an OCSP responder with URL
3289.Pa http://ocsp.myhost.com/ , 3252.Pa http://ocsp.myhost.com/ ,
3290save the response to a file and print it out in text form: 3253save the response to a file and print it out in text form:
3291.Pp
3292.Bd -literal 3254.Bd -literal
3293\& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e 3255\& $ openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \e
3294\& -url http://ocsp.myhost.com/ -resp_text -respout resp.der 3256\& -url http://ocsp.myhost.com/ -resp_text -respout resp.der
3295.Ed 3257.Ed
3296.Pp 3258.Pp
3297Read in an OCSP response and print out text form: 3259Read in an OCSP response and print out text form:
3298.Pp
3299.Bd -literal 3260.Bd -literal
3300\& $ openssl ocsp -respin resp.der -text 3261\& $ openssl ocsp -respin resp.der -text
3301.Ed 3262.Ed
@@ -3304,21 +3265,18 @@ OCSP server on port 8888 using a standard
3304.Nm ca 3265.Nm ca
3305configuration, and a separate responder certificate. 3266configuration, and a separate responder certificate.
3306All requests and responses are printed to a file: 3267All requests and responses are printed to a file:
3307.Pp
3308.Bd -literal 3268.Bd -literal
3309\& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e 3269\& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e
3310 -CA demoCA/cacert.pem -text -out log.txt 3270 -CA demoCA/cacert.pem -text -out log.txt
3311.Ed 3271.Ed
3312.Pp 3272.Pp
3313As above, but exit after processing one request: 3273As above, but exit after processing one request:
3314.Pp
3315.Bd -literal 3274.Bd -literal
3316\& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e 3275\& $ openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem \e
3317 -CA demoCA/cacert.pem -nrequest 1 3276 -CA demoCA/cacert.pem -nrequest 1
3318.Ed 3277.Ed
3319.Pp 3278.Pp
3320Query status information using internally generated request: 3279Query status information using internally generated request:
3321.Pp
3322.Bd -literal 3280.Bd -literal
3323\& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e 3281\& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e
3324 demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1 3282 demoCA/cacert.pem -issuer demoCA/cacert.pem -serial 1
@@ -3326,7 +3284,6 @@ Query status information using internally generated request:
3326.Pp 3284.Pp
3327Query status information using request read from a file, write response to a 3285Query status information using request read from a file, write response to a
3328second file: 3286second file:
3329.Pp
3330.Bd -literal 3287.Bd -literal
3331\& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e 3288\& $ openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA \e
3332 demoCA/cacert.pem -reqin req.der -respout resp.der 3289 demoCA/cacert.pem -reqin req.der -respout resp.der
@@ -3425,7 +3382,6 @@ prints
3425.Op Fl noout 3382.Op Fl noout
3426.Op Fl engine Ar id 3383.Op Fl engine Ar id
3427.Ek 3384.Ek
3428.br
3429.Pp 3385.Pp
3430The 3386The
3431.Nm pkcs7 3387.Nm pkcs7
@@ -3491,14 +3447,12 @@ Output all certificates in a file:
3491The 3447The
3492.Em PEM 3448.Em PEM
3493PKCS#7 format uses the header and footer lines: 3449PKCS#7 format uses the header and footer lines:
3494.Pp
3495.Bd -literal 3450.Bd -literal
3496\& -----BEGIN PKCS7----- 3451\& -----BEGIN PKCS7-----
3497\& -----END PKCS7----- 3452\& -----END PKCS7-----
3498.Ed 3453.Ed
3499.Pp 3454.Pp
3500For compatibility with some CAs it will also accept: 3455For compatibility with some CAs it will also accept:
3501.Pp
3502.Bd -literal 3456.Bd -literal
3503\& -----BEGIN CERTIFICATE----- 3457\& -----BEGIN CERTIFICATE-----
3504\& -----END CERTIFICATE----- 3458\& -----END CERTIFICATE-----
@@ -3665,14 +3619,12 @@ The encrypted form of a
3665.Em PEM 3619.Em PEM
3666encoded PKCS#8 file uses the following 3620encoded PKCS#8 file uses the following
3667headers and footers: 3621headers and footers:
3668.Pp
3669.Bd -literal 3622.Bd -literal
3670\& -----BEGIN ENCRYPTED PRIVATE KEY----- 3623\& -----BEGIN ENCRYPTED PRIVATE KEY-----
3671\& -----END ENCRYPTED PRIVATE KEY----- 3624\& -----END ENCRYPTED PRIVATE KEY-----
3672.Ed 3625.Ed
3673.Pp 3626.Pp
3674The unencrypted form uses: 3627The unencrypted form uses:
3675.Pp
3676.Bd -literal 3628.Bd -literal
3677\& -----BEGIN PRIVATE KEY----- 3629\& -----BEGIN PRIVATE KEY-----
3678\& -----END PRIVATE KEY----- 3630\& -----END PRIVATE KEY-----
@@ -3703,7 +3655,6 @@ Various algorithms can be used with the
3703.Fl v1 3655.Fl v1
3704command line option, including PKCS#5 v1.5 and PKCS#12. 3656command line option, including PKCS#5 v1.5 and PKCS#12.
3705These are described in more detail below. 3657These are described in more detail below.
3706.Pp
3707.Bl -tag -width "XXXX" 3658.Bl -tag -width "XXXX"
3708.It Ar PBE-MD2-DES PBE-MD5-DES 3659.It Ar PBE-MD2-DES PBE-MD5-DES
3709These algorithms were included in the original PKCS#5 v1.5 specification. 3660These algorithms were included in the original PKCS#5 v1.5 specification.
@@ -4044,21 +3995,18 @@ Output only client certificates to a file:
4044Don't encrypt the private key: 3995Don't encrypt the private key:
4045.Pp 3996.Pp
4046\& $ openssl pkcs12 -in file.p12 -out file.pem -nodes 3997\& $ openssl pkcs12 -in file.p12 -out file.pem -nodes
4047.br
4048.Pp 3998.Pp
4049Print some info about a PKCS#12 file: 3999Print some info about a PKCS#12 file:
4050.Pp 4000.Pp
4051\& $ openssl pkcs12 -in file.p12 -info -noout 4001\& $ openssl pkcs12 -in file.p12 -info -noout
4052.Pp 4002.Pp
4053Create a PKCS#12 file: 4003Create a PKCS#12 file:
4054.Pp
4055.Bd -literal 4004.Bd -literal
4056\& $ openssl pkcs12 -export -in file.pem -out file.p12 \e 4005\& $ openssl pkcs12 -export -in file.pem -out file.p12 \e
4057 -name "My Certificate" 4006 -name "My Certificate"
4058.Ed 4007.Ed
4059.Pp 4008.Pp
4060Include some extra certificates: 4009Include some extra certificates:
4061.Pp
4062.Bd -literal 4010.Bd -literal
4063\& $ openssl pkcs12 -export -in file.pem -out file.p12 \e 4011\& $ openssl pkcs12 -export -in file.pem -out file.p12 \e
4064 -name "My Certificate" -certfile othercerts.pem 4012 -name "My Certificate" -certfile othercerts.pem
@@ -4095,7 +4043,6 @@ and recreating
4095the PKCS#12 file from the keys and certificates using a newer version of 4043the PKCS#12 file from the keys and certificates using a newer version of
4096.Nm OpenSSL . 4044.Nm OpenSSL .
4097For example: 4045For example:
4098.Pp
4099.Bd -literal 4046.Bd -literal
4100\& $ old-openssl -in bad.p12 -out keycerts.pem 4047\& $ old-openssl -in bad.p12 -out keycerts.pem
4101\& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12 4048\& $ openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12
@@ -4586,7 +4533,6 @@ If the
4586option is set to 4533option is set to
4587.Em no 4534.Em no
4588then these sections just consist of field names and values: for example, 4535then these sections just consist of field names and values: for example,
4589.Pp
4590.Bd -literal 4536.Bd -literal
4591\& CN=My Name 4537\& CN=My Name
4592\& OU=My Organization 4538\& OU=My Organization
@@ -4606,7 +4552,6 @@ option is absent or not set to
4606.Em no , 4552.Em no ,
4607then the file contains field prompting information. 4553then the file contains field prompting information.
4608It consists of lines of the form: 4554It consists of lines of the form:
4609.Pp
4610.Bd -literal 4555.Bd -literal
4611\& fieldName="prompt" 4556\& fieldName="prompt"
4612\& fieldName_default="default field value" 4557\& fieldName_default="default field value"
@@ -4673,7 +4618,6 @@ Examine and verify certificate request:
4673\& $ openssl req -in req.pem -text -verify -noout 4618\& $ openssl req -in req.pem -text -verify -noout
4674.Pp 4619.Pp
4675Create a private key and then generate a certificate request from it: 4620Create a private key and then generate a certificate request from it:
4676.Pp
4677.Bd -literal 4621.Bd -literal
4678\& $ openssl genrsa -out key.pem 1024 4622\& $ openssl genrsa -out key.pem 1024
4679\& $ openssl req -new -key key.pem -out req.pem 4623\& $ openssl req -new -key key.pem -out req.pem
@@ -4686,12 +4630,10 @@ The same but just using req:
4686Generate a self-signed root certificate: 4630Generate a self-signed root certificate:
4687.Pp 4631.Pp
4688\& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem 4632\& $ openssl req -x509 -newkey rsa:1024 -keyout key.pem -out req.pem
4689.br
4690.Pp 4633.Pp
4691Example of a file pointed to by the 4634Example of a file pointed to by the
4692.Ar oid_file 4635.Ar oid_file
4693option: 4636option:
4694.Pp
4695.Bd -literal 4637.Bd -literal
4696\& 1.2.3.4 shortName A longer Name 4638\& 1.2.3.4 shortName A longer Name
4697\& 1.2.3.6 otherName Other longer Name 4639\& 1.2.3.6 otherName Other longer Name
@@ -4700,14 +4642,12 @@ option:
4700Example of a section pointed to by 4642Example of a section pointed to by
4701.Ar oid_section 4643.Ar oid_section
4702making use of variable expansion: 4644making use of variable expansion:
4703.Pp
4704.Bd -literal 4645.Bd -literal
4705\& testoid1=1.2.3.5 4646\& testoid1=1.2.3.5
4706\& testoid2=${testoid1}.6 4647\& testoid2=${testoid1}.6
4707.Ed 4648.Ed
4708.Pp 4649.Pp
4709Sample configuration file prompting for field values: 4650Sample configuration file prompting for field values:
4710.Pp
4711.Bd -literal 4651.Bd -literal
4712\& [ req ] 4652\& [ req ]
4713\& default_bits = 1024 4653\& default_bits = 1024
@@ -4747,7 +4687,6 @@ Sample configuration file prompting for field values:
4747.Ed 4687.Ed
4748.Pp 4688.Pp
4749Sample configuration containing all field values: 4689Sample configuration containing all field values:
4750.Pp
4751.Bd -literal 4690.Bd -literal
4752\& RANDFILE = $ENV::HOME/.rnd 4691\& RANDFILE = $ENV::HOME/.rnd
4753.Pp 4692.Pp
@@ -4775,14 +4714,12 @@ Sample configuration containing all field values:
4775The header and footer lines in the 4714The header and footer lines in the
4776.Ar PEM 4715.Ar PEM
4777format are normally: 4716format are normally:
4778.Pp
4779.Bd -literal 4717.Bd -literal
4780\& -----BEGIN CERTIFICATE REQUEST----- 4718\& -----BEGIN CERTIFICATE REQUEST-----
4781\& -----END CERTIFICATE REQUEST----- 4719\& -----END CERTIFICATE REQUEST-----
4782.Ed 4720.Ed
4783.Pp 4721.Pp
4784Some software (some versions of Netscape certificate server) instead needs: 4722Some software (some versions of Netscape certificate server) instead needs:
4785.Pp
4786.Bd -literal 4723.Bd -literal
4787\& -----BEGIN NEW CERTIFICATE REQUEST----- 4724\& -----BEGIN NEW CERTIFICATE REQUEST-----
4788\& -----END NEW CERTIFICATE REQUEST----- 4725\& -----END NEW CERTIFICATE REQUEST-----
@@ -4803,14 +4740,12 @@ by the script in an
4803extension. 4740extension.
4804.Sh REQ DIAGNOSTICS 4741.Sh REQ DIAGNOSTICS
4805The following messages are frequently asked about: 4742The following messages are frequently asked about:
4806.Pp
4807.Bd -literal 4743.Bd -literal
4808\& Using configuration from /some/path/openssl.cnf 4744\& Using configuration from /some/path/openssl.cnf
4809\& Unable to load config info 4745\& Unable to load config info
4810.Ed 4746.Ed
4811.Pp 4747.Pp
4812This is followed some time later by... 4748This is followed some time later by...
4813.Pp
4814.Bd -literal 4749.Bd -literal
4815\& unable to find 'distinguished_name' in config 4750\& unable to find 'distinguished_name' in config
4816\& problems making Certificate Request 4751\& problems making Certificate Request
@@ -4824,7 +4759,6 @@ Generation of certificates or requests, however, do need a configuration file.
4824This could be regarded as a bug. 4759This could be regarded as a bug.
4825.Pp 4760.Pp
4826Another puzzling message is this: 4761Another puzzling message is this:
4827.Pp
4828.Bd -literal 4762.Bd -literal
4829\& Attributes: 4763\& Attributes:
4830\& a0:00 4764\& a0:00
@@ -5012,7 +4946,6 @@ The engine will then be set as the default for all available algorithms.
5012The 4946The
5013.Em PEM 4947.Em PEM
5014private key format uses the header and footer lines: 4948private key format uses the header and footer lines:
5015.Pp
5016.Bd -literal 4949.Bd -literal
5017\& -----BEGIN RSA PRIVATE KEY----- 4950\& -----BEGIN RSA PRIVATE KEY-----
5018\& -----END RSA PRIVATE KEY----- 4951\& -----END RSA PRIVATE KEY-----
@@ -5021,7 +4954,6 @@ private key format uses the header and footer lines:
5021The 4954The
5022.Em PEM 4955.Em PEM
5023public key format uses the header and footer lines: 4956public key format uses the header and footer lines:
5024.Pp
5025.Bd -literal 4957.Bd -literal
5026\& -----BEGIN PUBLIC KEY----- 4958\& -----BEGIN PUBLIC KEY-----
5027\& -----END PUBLIC KEY----- 4959\& -----END PUBLIC KEY-----
@@ -5064,7 +4996,6 @@ to
5064format: 4996format:
5065.Pp 4997.Pp
5066\& $ openssl rsa -in key.pem -outform DER -out keyout.der 4998\& $ openssl rsa -in key.pem -outform DER -out keyout.der
5067.br
5068.Pp 4999.Pp
5069To print out the components of a private key to standard output: 5000To print out the components of a private key to standard output:
5070.Pp 5001.Pp
@@ -5164,7 +5095,6 @@ Recover the signed data:
5164Examine the raw signed data: 5095Examine the raw signed data:
5165.Pp 5096.Pp
5166\& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump 5097\& $ openssl rsautl -verify -in file -inkey key.pem -raw -hexdump
5167.Pp
5168.Bd -literal 5098.Bd -literal
5169\& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ 5099\& 0000 - 00 01 ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................
5170\& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................ 5100\& 0010 - ff ff ff ff ff ff ff ff-ff ff ff ff ff ff ff ff ................
@@ -5190,7 +5120,6 @@ Running
5190as follows yields: 5120as follows yields:
5191.Pp 5121.Pp
5192\& $ openssl asn1parse -in pca-cert.pem 5122\& $ openssl asn1parse -in pca-cert.pem
5193.Pp
5194.Bd -literal 5123.Bd -literal
5195\& 0:d=0 hl=4 l= 742 cons: SEQUENCE 5124\& 0:d=0 hl=4 l= 742 cons: SEQUENCE
5196\& 4:d=1 hl=4 l= 591 cons: SEQUENCE 5125\& 4:d=1 hl=4 l= 591 cons: SEQUENCE
@@ -5224,7 +5153,6 @@ The certificate public key can be extracted with:
5224The signature can be analysed with: 5153The signature can be analysed with:
5225.Pp 5154.Pp
5226\& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin 5155\& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
5227.Pp
5228.Bd -literal 5156.Bd -literal
5229\& 0:d=0 hl=2 l= 32 cons: SEQUENCE 5157\& 0:d=0 hl=2 l= 32 cons: SEQUENCE
5230\& 2:d=1 hl=2 l= 12 cons: SEQUENCE 5158\& 2:d=1 hl=2 l= 12 cons: SEQUENCE
@@ -5243,7 +5171,6 @@ The actual part of the certificate that was signed can be extracted with:
5243\& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4 5171\& $ openssl asn1parse -in pca-cert.pem -out tbs -noout -strparse 4
5244.Pp 5172.Pp
5245and its digest computed with: 5173and its digest computed with:
5246.Pp
5247.Bd -literal 5174.Bd -literal
5248\& $ openssl md5 -c tbs 5175\& $ openssl md5 -c tbs
5249\& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5 5176\& MD5(tbs)= f3:46:9e:aa:1a:4a:73:c9:37:ea:93:00:48:25:08:b5
@@ -5735,7 +5662,6 @@ from the client is displayed and any key presses will be sent to the client.
5735.Pp 5662.Pp
5736Certain single letter commands are also recognized which perform special 5663Certain single letter commands are also recognized which perform special
5737operations: these are listed below. 5664operations: these are listed below.
5738.Pp
5739.Bl -tag -width "XXXX" 5665.Bl -tag -width "XXXX"
5740.It Ar q 5666.It Ar q
5741End the current SSL connection, but still accept new connections. 5667End the current SSL connection, but still accept new connections.
@@ -5867,7 +5793,6 @@ This option won't normally be used.
5867.El 5793.El
5868.Sh SESS_ID OUTPUT 5794.Sh SESS_ID OUTPUT
5869Typical output: 5795Typical output:
5870.Pp
5871.Bd -literal 5796.Bd -literal
5872\& SSL-Session: 5797\& SSL-Session:
5873\& Protocol : TLSv1 5798\& Protocol : TLSv1
@@ -5908,7 +5833,6 @@ This is the return code when an SSL client certificate is verified.
5908The 5833The
5909.Em PEM 5834.Em PEM
5910encoded session format uses the header and footer lines: 5835encoded session format uses the header and footer lines:
5911.Pp
5912.Bd -literal 5836.Bd -literal
5913\& -----BEGIN SSL SESSION PARAMETERS----- 5837\& -----BEGIN SSL SESSION PARAMETERS-----
5914\& -----END SSL SESSION PARAMETERS----- 5838\& -----END SSL SESSION PARAMETERS-----
@@ -6247,14 +6171,12 @@ the signers certificates.
6247.El 6171.El
6248.Sh SMIME EXAMPLES 6172.Sh SMIME EXAMPLES
6249Create a cleartext signed message: 6173Create a cleartext signed message:
6250.Pp
6251.Bd -literal 6174.Bd -literal
6252\& $ openssl smime -sign -in message.txt -text -out mail.msg \e 6175\& $ openssl smime -sign -in message.txt -text -out mail.msg \e
6253\& -signer mycert.pem 6176\& -signer mycert.pem
6254.Ed 6177.Ed
6255.Pp 6178.Pp
6256Create an opaque signed message: 6179Create an opaque signed message:
6257.Pp
6258.Bd -literal 6180.Bd -literal
6259\& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e 6181\& $ openssl smime -sign -in message.txt -text -out mail.msg -nodetach \e
6260\& -signer mycert.pem 6182\& -signer mycert.pem
@@ -6262,7 +6184,6 @@ Create an opaque signed message:
6262.Pp 6184.Pp
6263Create a signed message, include some additional certificates and 6185Create a signed message, include some additional certificates and
6264read the private key from another file: 6186read the private key from another file:
6265.Pp
6266.Bd -literal 6187.Bd -literal
6267\& $ openssl smime -sign -in in.txt -text -out mail.msg \e 6188\& $ openssl smime -sign -in in.txt -text -out mail.msg \e
6268\& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 6189\& -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
@@ -6271,7 +6192,6 @@ read the private key from another file:
6271Send a signed message under Unix directly to 6192Send a signed message under Unix directly to
6272.Xr sendmail 8 , 6193.Xr sendmail 8 ,
6273including headers: 6194including headers:
6274.Pp
6275.Bd -literal 6195.Bd -literal
6276\& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e 6196\& $ openssl smime -sign -in in.txt -text -signer mycert.pem \e
6277\& -from steve@openssl.org -to someone@somewhere \e 6197\& -from steve@openssl.org -to someone@somewhere \e
@@ -6279,14 +6199,12 @@ including headers:
6279.Ed 6199.Ed
6280.Pp 6200.Pp
6281Verify a message and extract the signer's certificate if successful: 6201Verify a message and extract the signer's certificate if successful:
6282.Pp
6283.Bd -literal 6202.Bd -literal
6284\& $ openssl smime -verify -in mail.msg -signer user.pem \e 6203\& $ openssl smime -verify -in mail.msg -signer user.pem \e
6285\& -out signedtext.txt 6204\& -out signedtext.txt
6286.Ed 6205.Ed
6287.Pp 6206.Pp
6288Send encrypted mail using triple DES: 6207Send encrypted mail using triple DES:
6289.Pp
6290.Bd -literal 6208.Bd -literal
6291\& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e 6209\& $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e
6292\& -to someone@somewhere -subject "Encrypted message" \e 6210\& -to someone@somewhere -subject "Encrypted message" \e
@@ -6294,7 +6212,6 @@ Send encrypted mail using triple DES:
6294.Ed 6212.Ed
6295.Pp 6213.Pp
6296Sign and encrypt mail: 6214Sign and encrypt mail:
6297.Pp
6298.Bd -literal 6215.Bd -literal
6299\& $ openssl smime -sign -in ml.txt -signer my.pem -text \e 6216\& $ openssl smime -sign -in ml.txt -signer my.pem -text \e
6300\& | openssl smime -encrypt -out mail.msg \e 6217\& | openssl smime -encrypt -out mail.msg \e
@@ -6317,22 +6234,18 @@ The output from Netscape form signing is a PKCS#7 structure with the
6317detached signature format. 6234detached signature format.
6318You can use this program to verify the signature by line wrapping the 6235You can use this program to verify the signature by line wrapping the
6319base64 encoded structure and surrounding it with: 6236base64 encoded structure and surrounding it with:
6320.Pp
6321.Bd -literal 6237.Bd -literal
6322\& -----BEGIN PKCS7----- 6238\& -----BEGIN PKCS7-----
6323\& -----END PKCS7----- 6239\& -----END PKCS7-----
6324.Ed 6240.Ed
6325.Pp 6241.Pp
6326and using the command: 6242and using the command:
6327.br
6328.Pp
6329.Bd -literal 6243.Bd -literal
6330\& $ openssl smime -verify -inform PEM -in signature.pem 6244\& $ openssl smime -verify -inform PEM -in signature.pem
6331\& -content content.txt 6245\& -content content.txt
6332.Ed 6246.Ed
6333.Pp 6247.Pp
6334Alternatively, you can base64 decode the signature and use: 6248Alternatively, you can base64 decode the signature and use:
6335.Pp
6336.Bd -literal 6249.Bd -literal
6337\& $ openssl smime -verify -inform DER -in signature.der 6250\& $ openssl smime -verify -inform DER -in signature.der
6338\& -content content.txt 6251\& -content content.txt
@@ -6401,7 +6314,6 @@ v3 structures may cause parsing errors.
6401The 6314The
6402.Nm speed 6315.Nm speed
6403command is used to test the performance of cryptographic algorithms. 6316command is used to test the performance of cryptographic algorithms.
6404.Pp
6405.Bl -tag -width "XXXX" 6317.Bl -tag -width "XXXX"
6406.It Fl engine Ar id 6318.It Fl engine Ar id
6407Specifying an engine (by it's unique 6319Specifying an engine (by it's unique
@@ -6511,7 +6423,6 @@ Create an SPKAC using the challenge string "hello":
6511\& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf 6423\& $ openssl spkac -key key.pem -challenge hello -out spkac.cnf
6512.Pp 6424.Pp
6513Example of an SPKAC, (long lines split up for clarity): 6425Example of an SPKAC, (long lines split up for clarity):
6514.Pp
6515.Bd -literal 6426.Bd -literal
6516\& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e 6427\& SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\e
6517\& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e 6428\& PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\e
@@ -6709,7 +6620,6 @@ If any operation fails then the certificate is not valid.
6709.Sh VERIFY DIAGNOSTICS 6620.Sh VERIFY DIAGNOSTICS
6710When a verify operation fails, the output messages can be somewhat cryptic. 6621When a verify operation fails, the output messages can be somewhat cryptic.
6711The general form of the error message is: 6622The general form of the error message is:
6712.Pp
6713.Bd -literal 6623.Bd -literal
6714\& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 6624\& server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
6715\& error 24 at 1 depth lookup:invalid CA certificate 6625\& error 24 at 1 depth lookup:invalid CA certificate
@@ -6728,7 +6638,6 @@ includes the name of the error code as defined in the header file
6728.Aq Pa x509_vfy.h . 6638.Aq Pa x509_vfy.h .
6729Some of the error codes are defined but never returned: these are described 6639Some of the error codes are defined but never returned: these are described
6730as "unused". 6640as "unused".
6731.Pp
6732.Bl -tag -width "XXXX" 6641.Bl -tag -width "XXXX"
6733.It Ar "0 X509_V_OK: ok" 6642.It Ar "0 X509_V_OK: ok"
6734The operation was successful. 6643The operation was successful.
@@ -7188,7 +7097,6 @@ The
7188.Nm x509 7097.Nm x509
7189utility can be used to sign certificates and requests: it 7098utility can be used to sign certificates and requests: it
7190can thus behave like a "mini CA". 7099can thus behave like a "mini CA".
7191.Pp
7192.Bl -tag -width "XXXX" 7100.Bl -tag -width "XXXX"
7193.It Fl signkey Ar filename 7101.It Fl signkey Ar filename
7194This option causes the input file to be self-signed using the supplied 7102This option causes the input file to be self-signed using the supplied
@@ -7557,7 +7465,6 @@ Convert a certificate to a certificate request:
7557.Pp 7465.Pp
7558Convert a certificate request into a self-signed certificate using 7466Convert a certificate request into a self-signed certificate using
7559extensions for a CA: 7467extensions for a CA:
7560.Pp
7561.Bd -literal 7468.Bd -literal
7562\& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e 7469\& $ openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions \e
7563\& v3_ca -signkey key.pem -out cacert.pem 7470\& v3_ca -signkey key.pem -out cacert.pem
@@ -7565,7 +7472,6 @@ extensions for a CA:
7565.Pp 7472.Pp
7566Sign a certificate request using the CA certificate above and add user 7473Sign a certificate request using the CA certificate above and add user
7567certificate extensions: 7474certificate extensions:
7568.Pp
7569.Bd -literal 7475.Bd -literal
7570\& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e 7476\& $ openssl x509 -req -in req.pem -extfile openssl.cnf -extensions \e
7571 v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial 7477 v3_usr -CA cacert.pem -CAkey key.pem -CAcreateserial
@@ -7573,7 +7479,6 @@ certificate extensions:
7573.Pp 7479.Pp
7574Set a certificate to be trusted for SSL 7480Set a certificate to be trusted for SSL
7575client use and set its alias to "Steve's Class 1 CA": 7481client use and set its alias to "Steve's Class 1 CA":
7576.Pp
7577.Bd -literal 7482.Bd -literal
7578\& $ openssl x509 -in cert.pem -addtrust clientAuth \e 7483\& $ openssl x509 -in cert.pem -addtrust clientAuth \e
7579\& -setalias "Steve's Class 1 CA" -out trust.pem 7484\& -setalias "Steve's Class 1 CA" -out trust.pem
@@ -7582,21 +7487,18 @@ client use and set its alias to "Steve's Class 1 CA":
7582The 7487The
7583.Em PEM 7488.Em PEM
7584format uses the header and footer lines: 7489format uses the header and footer lines:
7585.Pp
7586.Bd -literal 7490.Bd -literal
7587\& -----BEGIN CERTIFICATE----- 7491\& -----BEGIN CERTIFICATE-----
7588\& -----END CERTIFICATE----- 7492\& -----END CERTIFICATE-----
7589.Ed 7493.Ed
7590.Pp 7494.Pp
7591It will also handle files containing: 7495It will also handle files containing:
7592.Pp
7593.Bd -literal 7496.Bd -literal
7594\& -----BEGIN X509 CERTIFICATE----- 7497\& -----BEGIN X509 CERTIFICATE-----
7595\& -----END X509 CERTIFICATE----- 7498\& -----END X509 CERTIFICATE-----
7596.Ed 7499.Ed
7597.Pp 7500.Pp
7598Trusted certificates have the lines: 7501Trusted certificates have the lines:
7599.Pp
7600.Bd -literal 7502.Bd -literal
7601\& -----BEGIN TRUSTED CERTIFICATE----- 7503\& -----BEGIN TRUSTED CERTIFICATE-----
7602\& -----END TRUSTED CERTIFICATE----- 7504\& -----END TRUSTED CERTIFICATE-----
@@ -7684,7 +7586,6 @@ and
7684and V1 certificates above apply to 7586and V1 certificates above apply to
7685.Em all 7587.Em all
7686CA certificates. 7588CA certificates.
7687.Pp
7688.Bl -tag -width "XXXX" 7589.Bl -tag -width "XXXX"
7689.It Ar SSL Client 7590.It Ar SSL Client
7690The extended key usage extension must be absent or include the 7591The extended key usage extension must be absent or include the