summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2003-04-25 12:43:10 +0000
committerjmc <>2003-04-25 12:43:10 +0000
commit7f7aa15f5be4823b7a344578e769349a2e1d0235 (patch)
tree66f3488100321ffa9c46118c60e80b10dfe708cf /src
parent8f1420b571676cc4a8a863fa689bb24e55d24f7d (diff)
downloadopenbsd-7f7aa15f5be4823b7a344578e769349a2e1d0235.tar.gz
openbsd-7f7aa15f5be4823b7a344578e769349a2e1d0235.tar.bz2
openbsd-7f7aa15f5be4823b7a344578e769349a2e1d0235.zip
- add missing .El macros (7 of them!)
- use .Bl not .Bd for lists - whitespace at EOL killed - typos in macros - .El -width shortened Ds -> XXXX
Diffstat (limited to 'src')
-rw-r--r--src/usr.sbin/openssl/openssl.1328
1 files changed, 168 insertions, 160 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1
index c17d026e74..30685260bb 100644
--- a/src/usr.sbin/openssl/openssl.1
+++ b/src/usr.sbin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.5 2003/03/22 08:02:03 david Exp $ 1.\" $OpenBSD: openssl.1,v 1.6 2003/04/25 12:43:10 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -7,7 +7,7 @@
7.\" are met: 7.\" are met:
8.\" 8.\"
9.\" 1. Redistributions of source code must retain the above copyright 9.\" 1. Redistributions of source code must retain the above copyright
10.\" notice, this list of conditions and the following disclaimer. 10.\" notice, this list of conditions and the following disclaimer.
11.\" 11.\"
12.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\" notice, this list of conditions and the following disclaimer in 13.\" notice, this list of conditions and the following disclaimer in
@@ -51,28 +51,28 @@
51.\" (eay@cryptsoft.com). This product includes software written by Tim 51.\" (eay@cryptsoft.com). This product includes software written by Tim
52.\" Hudson (tjh@cryptsoft.com). 52.\" Hudson (tjh@cryptsoft.com).
53.\" 53.\"
54.\" 54.\"
55.\" Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 55.\" Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
56.\" All rights reserved. 56.\" All rights reserved.
57.\" 57.\"
58.\" This package is an SSL implementation written 58.\" This package is an SSL implementation written
59.\" by Eric Young (eay@cryptsoft.com). 59.\" by Eric Young (eay@cryptsoft.com).
60.\" The implementation was written so as to conform with Netscapes SSL. 60.\" The implementation was written so as to conform with Netscapes SSL.
61.\" 61.\"
62.\" This library is free for commercial and non-commercial use as long as 62.\" This library is free for commercial and non-commercial use as long as
63.\" the following conditions are aheared to. The following conditions 63.\" the following conditions are aheared to. The following conditions
64.\" apply to all code found in this distribution, be it the RC4, RSA, 64.\" apply to all code found in this distribution, be it the RC4, RSA,
65.\" lhash, DES, etc., code; not just the SSL code. The SSL documentation 65.\" lhash, DES, etc., code; not just the SSL code. The SSL documentation
66.\" included with this distribution is covered by the same copyright terms 66.\" included with this distribution is covered by the same copyright terms
67.\" except that the holder is Tim Hudson (tjh@cryptsoft.com). 67.\" except that the holder is Tim Hudson (tjh@cryptsoft.com).
68.\" 68.\"
69.\" Copyright remains Eric Young's, and as such any Copyright notices in 69.\" Copyright remains Eric Young's, and as such any Copyright notices in
70.\" the code are not to be removed. 70.\" the code are not to be removed.
71.\" If this package is used in a product, Eric Young should be given attribution 71.\" If this package is used in a product, Eric Young should be given attribution
72.\" as the author of the parts of the library used. 72.\" as the author of the parts of the library used.
73.\" This can be in the form of a textual message at program startup or 73.\" This can be in the form of a textual message at program startup or
74.\" in documentation (online or textual) provided with the package. 74.\" in documentation (online or textual) provided with the package.
75.\" 75.\"
76.\" Redistribution and use in source and binary forms, with or without 76.\" Redistribution and use in source and binary forms, with or without
77.\" modification, are permitted provided that the following conditions 77.\" modification, are permitted provided that the following conditions
78.\" are met: 78.\" are met:
@@ -87,12 +87,12 @@
87.\" Eric Young (eay@cryptsoft.com)" 87.\" Eric Young (eay@cryptsoft.com)"
88.\" The word 'cryptographic' can be left out if the rouines from the library 88.\" The word 'cryptographic' can be left out if the rouines from the library
89.\" being used are not cryptographic related :-). 89.\" being used are not cryptographic related :-).
90.\" 4. If you include any Windows specific code (or a derivative thereof) from 90.\" 4. If you include any Windows specific code (or a derivative thereof) from
91.\" the apps directory (application code) you must include an 91.\" the apps directory (application code) you must include an
92.\" acknowledgement: 92.\" acknowledgement:
93.\" "This product includes software written by Tim Hudson 93.\" "This product includes software written by Tim Hudson
94.\" (tjh@cryptsoft.com)" 94.\" (tjh@cryptsoft.com)"
95.\" 95.\"
96.\" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 96.\" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
97.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 97.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
98.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 98.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -104,7 +104,7 @@
104.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 104.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
105.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 105.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
106.\" SUCH DAMAGE. 106.\" SUCH DAMAGE.
107.\" 107.\"
108.\" The licence and distribution terms for any publically available version or 108.\" The licence and distribution terms for any publically available version or
109.\" derivative of this code cannot be changed. i.e. this code cannot simply be 109.\" derivative of this code cannot be changed. i.e. this code cannot simply be
110.\" copied and put under another distribution licence 110.\" copied and put under another distribution licence
@@ -148,14 +148,14 @@ program is a command line tool for using the various
148cryptography functions of 148cryptography functions of
149.Nm OpenSSL Ns Li 's 149.Nm OpenSSL Ns Li 's
150.Em crypto 150.Em crypto
151library from the shell. 151library from the shell.
152It can be used for 152It can be used for
153.Pp 153.Pp
154.Bl -bullet -compact 154.Bl -bullet -compact
155.It 155.It
156Creation of RSA, DH and DSA key parameters 156Creation of RSA, DH and DSA key parameters
157.It 157.It
158Creation of X.509 certificates, CSRs and CRLs 158Creation of X.509 certificates, CSRs and CRLs
159.It 159.It
160Calculation of Message Digests 160Calculation of Message Digests
161.It 161.It
@@ -401,6 +401,7 @@ Read the password from the file descriptor
401This can be used to send the data via a pipe for example. 401This can be used to send the data via a pipe for example.
402.It Ar stdin 402.It Ar stdin
403Read the password from standard input. 403Read the password from standard input.
404.El
404.\" 405.\"
405.\" ASN1PARSE 406.\" ASN1PARSE
406.\" 407.\"
@@ -423,7 +424,7 @@ command is a diagnostic utility that can parse ASN.1 structures.
423It can also be used to extract data from ASN.1 formatted data. 424It can also be used to extract data from ASN.1 formatted data.
424.Pp 425.Pp
425The options are as follows: 426The options are as follows:
426.Bl -tag -width Ds 427.Bl -tag -width "XXXX"
427.It Fl inform Ar DER|PEM 428.It Fl inform Ar DER|PEM
428The input format. 429The input format.
429.Ar DER 430.Ar DER
@@ -457,25 +458,26 @@ section below.
457Parse the contents octets of the ASN.1 object starting at 458Parse the contents octets of the ASN.1 object starting at
458.Ar offset . 459.Ar offset .
459This option can be used multiple times to "drill down" into a nested structure. 460This option can be used multiple times to "drill down" into a nested structure.
461.El
460.Sh ASN1PARSE OUTPUT 462.Sh ASN1PARSE OUTPUT
461The output will typically contain lines like this: 463The output will typically contain lines like this:
462.Pp 464.Pp
463.Bd -literal 465.Bd -literal
464 0:d=0 hl=4 l= 681 cons: SEQUENCE 466 0:d=0 hl=4 l= 681 cons: SEQUENCE
465.Pp 467
466\&..... 468\&.....
467.Pp 469
468 229:d=3 hl=3 l= 141 prim: BIT STRING 470 229:d=3 hl=3 l= 141 prim: BIT STRING
469 373:d=2 hl=3 l= 162 cons: cont [ 3 ] 471 373:d=2 hl=3 l= 162 cons: cont [ 3 ]
470 376:d=3 hl=3 l= 159 cons: SEQUENCE 472 376:d=3 hl=3 l= 159 cons: SEQUENCE
471 379:d=4 hl=2 l= 29 cons: SEQUENCE 473 379:d=4 hl=2 l= 29 cons: SEQUENCE
472 381:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Subject Key Identifier 474 381:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Subject Key Identifier
473 386:d=5 hl=2 l= 22 prim: OCTET STRING 475 386:d=5 hl=2 l= 22 prim: OCTET STRING
474 410:d=4 hl=2 l= 112 cons: SEQUENCE 476 410:d=4 hl=2 l= 112 cons: SEQUENCE
475 412:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Authority Key Identifier 477 412:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Authority Key Identifier
476 417:d=5 hl=2 l= 105 prim: OCTET STRING 478 417:d=5 hl=2 l= 105 prim: OCTET STRING
477 524:d=4 hl=2 l= 12 cons: SEQUENCE 479 524:d=4 hl=2 l= 12 cons: SEQUENCE
478.Pp 480
479\&..... 481\&.....
480.Ed 482.Ed
481.Pp 483.Pp
@@ -493,7 +495,7 @@ The
493.Fl i 495.Fl i
494option can be used to make the output more readable. 496option can be used to make the output more readable.
495.Pp 497.Pp
496Some knowledge of the ASN.1 structure is needed to interpret the output. 498Some knowledge of the ASN.1 structure is needed to interpret the output.
497.Pp 499.Pp
498In this example the BIT STRING at offset 229 is the certificate public key. 500In this example the BIT STRING at offset 229 is the certificate public key.
499The contents octets of this will contain the public key information. 501The contents octets of this will contain the public key information.
@@ -502,9 +504,10 @@ This can be examined using the option
502to yield: 504to yield:
503.Pp 505.Pp
504.Bd -literal 506.Bd -literal
505\& 0:d=0 hl=3 l= 137 cons: SEQUENCE 507\& 0:d=0 hl=3 l= 137 cons: SEQUENCE
506\& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897 508\& 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897
507\& 135:d=1 hl=2 l= 3 prim: INTEGER :010001 509\& 135:d=1 hl=2 l= 3 prim: INTEGER :010001
510.Ed
508.Sh ASN1PARSE NOTES 511.Sh ASN1PARSE NOTES
509If an OID is not part of 512If an OID is not part of
510.Nm OpenSSL Ns Li 's 513.Nm OpenSSL Ns Li 's
@@ -575,7 +578,7 @@ It also maintains a text database of issued certificates and their status.
575.Pp 578.Pp
576The options descriptions will be divided into each purpose. 579The options descriptions will be divided into each purpose.
577.Sh CA OPTIONS 580.Sh CA OPTIONS
578.Bl -tag -width Ds 581.Bl -tag -width "XXXX"
579.It Fl config Ar filename 582.It Fl config Ar filename
580Specifies the configuration file to use. 583Specifies the configuration file to use.
581.It Fl name Ar section 584.It Fl name Ar section
@@ -600,7 +603,7 @@ See the
600section for information on the required format. 603section for information on the required format.
601.It Fl infiles 604.It Fl infiles
602If present, this should be the last option; all subsequent arguments 605If present, this should be the last option; all subsequent arguments
603are assumed to be the names of files containing certificate requests. 606are assumed to be the names of files containing certificate requests.
604.It Fl out Ar filename 607.It Fl out Ar filename
605The output file to output certificates to. 608The output file to output certificates to.
606The default is standard output. 609The default is standard output.
@@ -707,7 +710,7 @@ to read certificate extensions from
707option is also used). 710option is also used).
708.El 711.El
709.Sh CRL OPTIONS 712.Sh CRL OPTIONS
710.Bl -tag -width Ds 713.Bl -tag -width "XXXX"
711.It Fl gencrl 714.It Fl gencrl
712This option generates a CRL based on information in the index file. 715This option generates a CRL based on information in the index file.
713.It Fl crldays Ar num 716.It Fl crldays Ar num
@@ -739,7 +742,7 @@ The CRL extensions specified are CRL extensions and
739.Em not 742.Em not
740CRL entry extensions. 743CRL entry extensions.
741It should be noted that some software (for example Netscape) 744It should be noted that some software (for example Netscape)
742can't handle V2 CRLs. 745can't handle V2 CRLs.
743.El 746.El
744.Sh CA CONFIGURATION FILE OPTIONS 747.Sh CA CONFIGURATION FILE OPTIONS
745The section of the configuration file containing options for 748The section of the configuration file containing options for
@@ -774,12 +777,12 @@ the command line value is used.
774Where an option is described as mandatory, then it must be present in 777Where an option is described as mandatory, then it must be present in
775the configuration file or the command line equivalent (if any) used. 778the configuration file or the command line equivalent (if any) used.
776.Pp 779.Pp
777.Bl -tag -width Ds 780.Bl -tag -width "XXXX"
778.It Ar oid_file 781.It Ar oid_file
779This specifies a file containing additional OBJECT IDENTIFIERS. 782This specifies a file containing additional OBJECT IDENTIFIERS.
780Each line of the file should consist of the numerical form of the 783Each line of the file should consist of the numerical form of the
781object identifier followed by whitespace, then the short name followed 784object identifier followed by whitespace, then the short name followed
782by whitespace and finally the long name. 785by whitespace and finally the long name.
783.It Ar oid_section 786.It Ar oid_section
784This specifies a section in the configuration file containing extra 787This specifies a section in the configuration file containing extra
785object identifiers. 788object identifiers.
@@ -813,7 +816,7 @@ or an EGD socket (see
813The same as the 816The same as the
814.Fl days 817.Fl days
815option. 818option.
816The number of days to certify a certificate for. 819The number of days to certify a certificate for.
817.It Ar default_startdate 820.It Ar default_startdate
818The same as the 821The same as the
819.Fl startdate 822.Fl startdate
@@ -945,7 +948,7 @@ The input to the
945command line option is a Netscape signed public key and challenge. 948command line option is a Netscape signed public key and challenge.
946This will usually come from the 949This will usually come from the
947.Em KEYGEN 950.Em KEYGEN
948tag in an HTML form to create a new private key. 951tag in an HTML form to create a new private key.
949It is, however, possible to create SPKACs using the 952It is, however, possible to create SPKACs using the
950.Nm spkac 953.Nm spkac
951utility. 954utility.
@@ -1192,7 +1195,7 @@ cipher lists into ordered SSL cipher preference lists.
1192It can be used as a test tool to determine the appropriate cipherlist. 1195It can be used as a test tool to determine the appropriate cipherlist.
1193.Pp 1196.Pp
1194The options are as follows: 1197The options are as follows:
1195.Bl -tag -width -Ds 1198.Bl -tag -width "XXXX"
1196.It Fl v 1199.It Fl v
1197Verbose option. 1200Verbose option.
1198List ciphers with a complete description of protocol version 1201List ciphers with a complete description of protocol version
@@ -1285,7 +1288,7 @@ can be used at any point to sort the current cipher list in order of
1285encryption algorithm key length. 1288encryption algorithm key length.
1286.Sh CIPHERS STRINGS 1289.Sh CIPHERS STRINGS
1287The following is a list of all permitted cipher strings and their meanings. 1290The following is a list of all permitted cipher strings and their meanings.
1288.Bl -tag -width Ds 1291.Bl -tag -width "XXXX"
1289.It Ar DEFAULT 1292.It Ar DEFAULT
1290The default cipher list. 1293The default cipher list.
1291This is determined at compile time and is normally 1294This is determined at compile time and is normally
@@ -1482,8 +1485,8 @@ These ciphers can also be used in SSL v3.
1482.Ed 1485.Ed
1483.Pp 1486.Pp
1484.Cm SSL v2.0 cipher suites 1487.Cm SSL v2.0 cipher suites
1485.Bd -literal
1486.Pp 1488.Pp
1489.Bd -literal
1487\& SSL_CK_RC4_128_WITH_MD5 RC4-MD5 1490\& SSL_CK_RC4_128_WITH_MD5 RC4-MD5
1488\& SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5 1491\& SSL_CK_RC4_128_EXPORT40_WITH_MD5 EXP-RC4-MD5
1489\& SSL_CK_RC2_128_CBC_WITH_MD5 RC2-MD5 1492\& SSL_CK_RC2_128_CBC_WITH_MD5 RC2-MD5
@@ -1559,7 +1562,7 @@ or
1559format. 1562format.
1560.Pp 1563.Pp
1561The options are as follows: 1564The options are as follows:
1562.Bl -tag -width Ds 1565.Bl -tag -width "XXXX"
1563.It Fl inform Ar DER|PEM 1566.It Fl inform Ar DER|PEM
1564This specifies the input format. 1567This specifies the input format.
1565.Ar DER 1568.Ar DER
@@ -1568,7 +1571,7 @@ format is DER encoded CRL structure.
1568(the default) is a base64 encoded version of the DER form with header 1571(the default) is a base64 encoded version of the DER form with header
1569and footer lines. 1572and footer lines.
1570.It Fl outform Ar DER|PEM 1573.It Fl outform Ar DER|PEM
1571This specifies the output format; the options have the same meaning as the 1574This specifies the output format; the options have the same meaning as the
1572.Fl inform 1575.Fl inform
1573option. 1576option.
1574.It Fl in Ar filename 1577.It Fl in Ar filename
@@ -1647,7 +1650,7 @@ certificates and converts them into a PKCS#7 degenerate
1647"certificates only" structure. 1650"certificates only" structure.
1648.Pp 1651.Pp
1649The options are as follows: 1652The options are as follows:
1650.Bl -tag -width Ds 1653.Bl -tag -width "XXXX"
1651.It Fl inform Ar DER|PEM 1654.It Fl inform Ar DER|PEM
1652This specifies the CRL input format. 1655This specifies the CRL input format.
1653.Ar DER 1656.Ar DER
@@ -1695,7 +1698,7 @@ format with no CRL from several
1695different certificates: 1698different certificates:
1696.Pp 1699.Pp
1697.Bd -literal 1700.Bd -literal
1698\& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem 1701\& $ openssl crl2pkcs7 -nocrl -certfile newcert.pem
1699\& -certfile demoCA/cacert.pem -outform DER -out p7.der 1702\& -certfile demoCA/cacert.pem -outform DER -out p7.der
1700.Ed 1703.Ed
1701.Sh CRL2PKCS7 NOTES 1704.Sh CRL2PKCS7 NOTES
@@ -1743,7 +1746,7 @@ in hexadecimal form.
1743They can also be used for digital signing and verification. 1746They can also be used for digital signing and verification.
1744.Pp 1747.Pp
1745The options are as follows: 1748The options are as follows:
1746.Bl -tag -width Ds 1749.Bl -tag -width "XXXX"
1747.It Fl c 1750.It Fl c
1748Print out the digest in two digit groups separated by colons, only relevant if 1751Print out the digest in two digit groups separated by colons, only relevant if
1749.Em hex 1752.Em hex
@@ -1783,7 +1786,7 @@ for MS-Windows,
1783.Cm \&, 1786.Cm \&,
1784for OpenVMS, and 1787for OpenVMS, and
1785.Cm \&: 1788.Cm \&:
1786for all others. 1789for all others.
1787.It Fl signature Ar filename 1790.It Fl signature Ar filename
1788The actual signature to verify. 1791The actual signature to verify.
1789.It Ar file ... 1792.It Ar file ...
@@ -1838,7 +1841,7 @@ The
1838command is used to manipulate DH parameter files. 1841command is used to manipulate DH parameter files.
1839.Pp 1842.Pp
1840The options are as follows: 1843The options are as follows:
1841.Bl -tag -width Ds 1844.Bl -tag -width "XXXX"
1842.It Fl inform Ar DER|PEM 1845.It Fl inform Ar DER|PEM
1843This specifies the input format. 1846This specifies the input format.
1844The argument 1847The argument
@@ -1851,7 +1854,7 @@ form is the default format:
1851it consists of the DER format base64 encoded with 1854it consists of the DER format base64 encoded with
1852additional header and footer lines. 1855additional header and footer lines.
1853.It Fl outform Ar DER|PEM 1856.It Fl outform Ar DER|PEM
1854This specifies the output format, the options have the same meaning as the 1857This specifies the output format, the options have the same meaning as the
1855.Fl inform 1858.Fl inform
1856option. 1859option.
1857.It Fl in Ar filename 1860.It Fl in Ar filename
@@ -1905,7 +1908,7 @@ This argument specifies that a parameter set should be generated of size
1905.Ar numbits . 1908.Ar numbits .
1906It must be the last option. 1909It must be the last option.
1907If not present, then a value of 512 is used. 1910If not present, then a value of 512 is used.
1908If this value is present then the input file is ignored and 1911If this value is present then the input file is ignored and
1909parameters are generated instead. 1912parameters are generated instead.
1910.It Fl noout 1913.It Fl noout
1911This option inhibits the output of the encoded version of the parameters. 1914This option inhibits the output of the encoded version of the parameters.
@@ -1916,6 +1919,7 @@ This option converts the parameters into C code.
1916The parameters can then be loaded by calling the 1919The parameters can then be loaded by calling the
1917.Cm get_dh Ns Ar numbits Ns Li () 1920.Cm get_dh Ns Ar numbits Ns Li ()
1918function. 1921function.
1922.El
1919.Sh DHPARAM WARNINGS 1923.Sh DHPARAM WARNINGS
1920The program 1924The program
1921.Nm dhparam 1925.Nm dhparam
@@ -1931,7 +1935,7 @@ The
1931.Nm dh 1935.Nm dh
1932and 1936and
1933.Nm gendh 1937.Nm gendh
1934programs are retained for now, but may have different purposes in future 1938programs are retained for now, but may have different purposes in future
1935versions of 1939versions of
1936.Nm OpenSSL . 1940.Nm OpenSSL .
1937.Sh DHPARAM NOTES 1941.Sh DHPARAM NOTES
@@ -1997,7 +2001,7 @@ newer applications should use the more secure PKCS#8 format using the
1997command. 2001command.
1998.Pp 2002.Pp
1999The options are as follows: 2003The options are as follows:
2000.Bl -tag -width Ds 2004.Bl -tag -width "XXXX"
2001.It Fl inform Ar DER|PEM 2005.It Fl inform Ar DER|PEM
2002This specifies the input format. 2006This specifies the input format.
2003The 2007The
@@ -2017,7 +2021,7 @@ It consists of the DER format base64
2017encoded with additional header and footer lines. 2021encoded with additional header and footer lines.
2018In the case of a private key, PKCS#8 format is also accepted. 2022In the case of a private key, PKCS#8 format is also accepted.
2019.It Fl outform Ar DER|PEM 2023.It Fl outform Ar DER|PEM
2020This specifies the output format, the options have the same meaning as the 2024This specifies the output format, the options have the same meaning as the
2021.Fl inform 2025.Fl inform
2022option. 2026option.
2023.It Fl in Ar filename 2027.It Fl in Ar filename
@@ -2049,7 +2053,7 @@ see the
2049.Sx PASS PHRASE ARGUMENTS 2053.Sx PASS PHRASE ARGUMENTS
2050section above. 2054section above.
2051.It Cm -des|-des3|-idea 2055.It Cm -des|-des3|-idea
2052These options encrypt the private key with the DES, triple DES, or the 2056These options encrypt the private key with the DES, triple DES, or the
2053IDEA ciphers, respectively, before outputting it. 2057IDEA ciphers, respectively, before outputting it.
2054A pass phrase is prompted for. 2058A pass phrase is prompted for.
2055If none of these options is specified, the key is written in plain text. 2059If none of these options is specified, the key is written in plain text.
@@ -2075,6 +2079,7 @@ With this option a public key is read instead.
2075By default a private key is output. 2079By default a private key is output.
2076With this option a public key will be output instead. 2080With this option a public key will be output instead.
2077This option is automatically set if the input is a public key. 2081This option is automatically set if the input is a public key.
2082.El
2078.Sh DSA NOTES 2083.Sh DSA NOTES
2079The 2084The
2080.Ar PEM 2085.Ar PEM
@@ -2102,7 +2107,7 @@ To encrypt a private key using triple DES:
2102.Pp 2107.Pp
2103\& $ openssl dsa -in key.pem -des3 -out keyout.pem 2108\& $ openssl dsa -in key.pem -des3 -out keyout.pem
2104.Pp 2109.Pp
2105To convert a private key from PEM to DER format: 2110To convert a private key from PEM to DER format:
2106.Pp 2111.Pp
2107\& $ openssl dsa -in key.pem -outform DER -out keyout.der 2112\& $ openssl dsa -in key.pem -outform DER -out keyout.der
2108.Pp 2113.Pp
@@ -2134,7 +2139,7 @@ The
2134command is used to manipulate or generate \s-1DSA\s0 parameter files. 2139command is used to manipulate or generate \s-1DSA\s0 parameter files.
2135.Pp 2140.Pp
2136The options are as follows: 2141The options are as follows:
2137.Bl -tag -width Ds 2142.Bl -tag -width "XXXX"
2138.It Fl inform Ar DER|PEM 2143.It Fl inform Ar DER|PEM
2139This specifies the input format. 2144This specifies the input format.
2140The 2145The
@@ -2147,7 +2152,7 @@ form is the default format:
2147it consists of the DER format base64 encoded with additional header 2152it consists of the DER format base64 encoded with additional header
2148and footer lines. 2153and footer lines.
2149.It Fl outform Ar DER|PEM 2154.It Fl outform Ar DER|PEM
2150This specifies the output format; the options have the same meaning as the 2155This specifies the output format; the options have the same meaning as the
2151.Fl inform 2156.Fl inform
2152option. 2157option.
2153.It Fl in Ar filename 2158.It Fl in Ar filename
@@ -2239,7 +2244,7 @@ or explicitly provided. Base64 encoding or decoding can also be performed
2239either by itself or in addition to the encryption or decryption. 2244either by itself or in addition to the encryption or decryption.
2240.Pp 2245.Pp
2241The options are as follows: 2246The options are as follows:
2242.Bl -tag -width Ds 2247.Bl -tag -width "XXXX"
2243.It Fl in Ar filename 2248.It Fl in Ar filename
2244The input 2249The input
2245.Ar filename , 2250.Ar filename ,
@@ -2584,7 +2589,7 @@ command generates a DSA private key from a DSA parameter file
2584command). 2589command).
2585.Pp 2590.Pp
2586The options are as follows: 2591The options are as follows:
2587.Bl -tag -width Ds 2592.Bl -tag -width "XXXX"
2588.It Cm -des|-des3|-idea 2593.It Cm -des|-des3|-idea
2589These options encrypt the private key with the DES, triple DES, 2594These options encrypt the private key with the DES, triple DES,
2590or the IDEA ciphers, respectively, before outputting it. 2595or the IDEA ciphers, respectively, before outputting it.
@@ -2612,6 +2617,7 @@ The parameters in this file determine the size of the private key.
2612DSA parameters can be generated and examined using the 2617DSA parameters can be generated and examined using the
2613.Nm openssl dsaparam 2618.Nm openssl dsaparam
2614command. 2619command.
2620.El
2615.Sh GENDSA NOTES 2621.Sh GENDSA NOTES
2616DSA key generation is little more than random number generation so it is 2622DSA key generation is little more than random number generation so it is
2617much quicker that RSA key generation for example. 2623much quicker that RSA key generation for example.
@@ -2635,7 +2641,7 @@ The
2635command generates an RSA private key. 2641command generates an RSA private key.
2636.Pp 2642.Pp
2637The options are as follows: 2643The options are as follows:
2638.Bl -tag -width Ds 2644.Bl -tag -width "XXXX"
2639.It Fl out Ar filename 2645.It Fl out Ar filename
2640The output 2646The output
2641.Ar filename . 2647.Ar filename .
@@ -2648,7 +2654,7 @@ see the
2648.Sx PASS PHRASE ARGUMENTS 2654.Sx PASS PHRASE ARGUMENTS
2649section above. 2655section above.
2650.It Cm -des|-des3|-idea 2656.It Cm -des|-des3|-idea
2651These options encrypt the private key with the DES, triple DES, or the 2657These options encrypt the private key with the DES, triple DES, or the
2652IDEA ciphers, respectively, before outputting it. 2658IDEA ciphers, respectively, before outputting it.
2653If none of these options is specified, no encryption is used. 2659If none of these options is specified, no encryption is used.
2654If encryption is used a pass phrase is prompted for, 2660If encryption is used a pass phrase is prompted for,
@@ -2678,6 +2684,7 @@ for all others.
2678The size of the private key to generate in bits. 2684The size of the private key to generate in bits.
2679This must be the last option specified. 2685This must be the last option specified.
2680The default is 512. 2686The default is 512.
2687.El
2681.Sh GENRSA NOTES 2688.Sh GENRSA NOTES
2682RSA private key generation essentially involves the generation of two prime 2689RSA private key generation essentially involves the generation of two prime
2683numbers. 2690numbers.
@@ -2716,7 +2723,7 @@ file of certificates and converts it into a Netscape certificate
2716sequence. 2723sequence.
2717.Pp 2724.Pp
2718The options are as follows: 2725The options are as follows:
2719.Bl -tag -width Ds 2726.Bl -tag -width "XXXX"
2720.It Fl in Ar filename 2727.It Fl in Ar filename
2721This specifies the input 2728This specifies the input
2722.Ar filename 2729.Ar filename
@@ -2818,7 +2825,7 @@ create requests and send queries to an OCSP responder and behave like
2818a mini OCSP server itself. 2825a mini OCSP server itself.
2819.Pp 2826.Pp
2820The options are as follows: 2827The options are as follows:
2821.Bl -tag -width Ds 2828.Bl -tag -width "XXXX"
2822.It Fl out Ar filename 2829.It Fl out Ar filename
2823Specify output 2830Specify output
2824.Ar filename , 2831.Ar filename ,
@@ -2997,7 +3004,7 @@ By default this additional check is not performed.
2997.El 3004.El
2998.Sh OCSP SERVER OPTIONS 3005.Sh OCSP SERVER OPTIONS
2999.Pp 3006.Pp
3000.Bl -tag -with DS 3007.Bl -tag -width "XXXX"
3001.It Fl index Ar indexfile 3008.It Fl index Ar indexfile
3002.Ar indexfile 3009.Ar indexfile
3003is a text index file in 3010is a text index file in
@@ -3058,7 +3065,7 @@ option.
3058.It Fl nrequest Ar number 3065.It Fl nrequest Ar number
3059The OCSP server will exit after receiving 3066The OCSP server will exit after receiving
3060.Ar number 3067.Ar number
3061requests, default unlimited. 3068requests, default unlimited.
3062.It Fl nmin Ar minutes , Fl ndays Ar days 3069.It Fl nmin Ar minutes , Fl ndays Ar days
3063Number of 3070Number of
3064.Ar minutes 3071.Ar minutes
@@ -3240,7 +3247,7 @@ and its Apache variant
3240are available. 3247are available.
3241.Pp 3248.Pp
3242The options are as follows: 3249The options are as follows:
3243.Bl -tag -width Ds 3250.Bl -tag -width "XXXX"
3244.It Fl crypt 3251.It Fl crypt
3245Use the 3252Use the
3246.Em crypt 3253.Em crypt
@@ -3273,7 +3280,7 @@ to each password hash.
3273.El 3280.El
3274.Sh PASSWD EXAMPLES 3281.Sh PASSWD EXAMPLES
3275.Pp 3282.Pp
3276.Bl -tag -width Ds 3283.Bl -tag -width "XXXX"
3277.It $ openssl passwd -crypt -salt xx password 3284.It $ openssl passwd -crypt -salt xx password
3278prints 3285prints
3279.Em xxj31ZMTZzkVA . 3286.Em xxj31ZMTZzkVA .
@@ -3283,6 +3290,7 @@ prints
3283.It $ openssl passwd -apr1 -salt xxxxxxxx password 3290.It $ openssl passwd -apr1 -salt xxxxxxxx password
3284prints 3291prints
3285.Em $apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0 . 3292.Em $apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0 .
3293.El
3286.\" 3294.\"
3287.\" PKCS7 3295.\" PKCS7
3288.\" 3296.\"
@@ -3308,7 +3316,7 @@ or
3308format. 3316format.
3309.Pp 3317.Pp
3310The options are as follows: 3318The options are as follows:
3311.Bl -tag -width Ds 3319.Bl -tag -width "XXXX"
3312.It Fl inform Ar DER|PEM 3320.It Fl inform Ar DER|PEM
3313This specifies the input format. 3321This specifies the input format.
3314.Ar DER 3322.Ar DER
@@ -3317,7 +3325,7 @@ format is DER encoded PKCS#7 v1.5 structure.
3317(the default) is a base64 encoded version of the DER form with header 3325(the default) is a base64 encoded version of the DER form with header
3318and footer lines. 3326and footer lines.
3319.It Fl outform Ar DER|PEM 3327.It Fl outform Ar DER|PEM
3320This specifies the output format, the options have the same meaning as the 3328This specifies the output format, the options have the same meaning as the
3321.Fl inform 3329.Fl inform
3322option. 3330option.
3323.It Fl in Ar filename 3331.It Fl in Ar filename
@@ -3339,6 +3347,7 @@ Don't output the encoded version of the PKCS#7 structure
3339(or certificates if 3347(or certificates if
3340.Fl print_certs 3348.Fl print_certs
3341is set). 3349is set).
3350.El
3342.Sh PKCS7 EXAMPLES 3351.Sh PKCS7 EXAMPLES
3343Convert a PKCS#7 file from 3352Convert a PKCS#7 file from
3344.Em PEM 3353.Em PEM
@@ -3401,7 +3410,7 @@ and EncryptedPrivateKeyInfo format with a variety of PKCS#5
3401(v1.5 and v2.0) and PKCS#12 algorithms. 3410(v1.5 and v2.0) and PKCS#12 algorithms.
3402.Pp 3411.Pp
3403The options are as follows: 3412The options are as follows:
3404.Bl -tag -width Ds 3413.Bl -tag -width "XXXX"
3405.It Fl topk8 3414.It Fl topk8
3406Normally a PKCS#8 private key is expected on input and a traditional format 3415Normally a PKCS#8 private key is expected on input and a traditional format
3407private key will be written. 3416private key will be written.
@@ -3423,7 +3432,7 @@ or
3423.Em PEM 3432.Em PEM
3424format of the traditional format private key is used. 3433format of the traditional format private key is used.
3425.It Fl outform Ar DER|PEM 3434.It Fl outform Ar DER|PEM
3426This specifies the output format, the options have the same meaning as the 3435This specifies the output format, the options have the same meaning as the
3427.Fl inform 3436.Fl inform
3428option. 3437option.
3429.It Fl in Ar filename 3438.It Fl in Ar filename
@@ -3513,6 +3522,7 @@ is used.
3513.It Fl v1 Ar alg 3522.It Fl v1 Ar alg
3514This option specifies a PKCS#5 v1.5 or PKCS#12 algorithm to use. 3523This option specifies a PKCS#5 v1.5 or PKCS#12 algorithm to use.
3515A complete list of possible algorithms is included below. 3524A complete list of possible algorithms is included below.
3525.El
3516.Sh PKCS8 NOTES 3526.Sh PKCS8 NOTES
3517The encrypted form of a 3527The encrypted form of a
3518.Em PEM 3528.Em PEM
@@ -3557,23 +3567,20 @@ Various algorithms can be used with the
3557command line option, including PKCS#5 v1.5 and PKCS#12. 3567command line option, including PKCS#5 v1.5 and PKCS#12.
3558These are described in more detail below. 3568These are described in more detail below.
3559.Pp 3569.Pp
3560.Bd -literal -offset indent 3570.Bl -tag -width "XXXX"
3561.It Ar \ \ PBE-MD2-DES PBE-MD5-DES 3571.It Ar PBE-MD2-DES PBE-MD5-DES
3562.br
3563These algorithms were included in the original PKCS#5 v1.5 specification. 3572These algorithms were included in the original PKCS#5 v1.5 specification.
3564They only offer 56 bits of protection since they both use DES. 3573They only offer 56 bits of protection since they both use DES.
3565.It Ar \ \ PBE-SHA1-RC2-64 PBE-MD2-RC2-64 PBE-MD5-RC2-64 PBE-SHA1-DES 3574.It Ar PBE-SHA1-RC2-64 PBE-MD2-RC2-64 PBE-MD5-RC2-64 PBE-SHA1-DES
3566.br
3567These algorithms are not mentioned in the original PKCS#5 v1.5 specification 3575These algorithms are not mentioned in the original PKCS#5 v1.5 specification
3568but they use the same key derivation algorithm and are supported by some 3576but they use the same key derivation algorithm and are supported by some
3569software. 3577software.
3570They are mentioned in PKCS#5 v2.0. 3578They are mentioned in PKCS#5 v2.0.
3571They use either 64 bit RC2 or 56 bit DES. 3579They use either 64 bit RC2 or 56 bit DES.
3572.It Ar \ \ PBE-SHA1-RC4-128 PBE-SHA1-RC4-40 PBE-SHA1-3DES PBE-SHA1-2DES PBE-SHA1-RC2-128 PBE-SHA1-RC2-40 3580.It Ar PBE-SHA1-RC4-128 PBE-SHA1-RC4-40 PBE-SHA1-3DES PBE-SHA1-2DES PBE-SHA1-RC2-128 PBE-SHA1-RC2-40
3573.br
3574These algorithms use the PKCS#12 password based encryption algorithm and 3581These algorithms use the PKCS#12 password based encryption algorithm and
3575allow strong encryption algorithms like triple DES or 128 bit RC2 to be used. 3582allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
3576.Ed 3583.El
3577.Sh PKCS8 EXAMPLES 3584.Sh PKCS8 EXAMPLES
3578Convert a private from traditional to PKCS#5 v2.0 format using triple DES: 3585Convert a private from traditional to PKCS#5 v2.0 format using triple DES:
3579.Pp 3586.Pp
@@ -3665,7 +3672,7 @@ a PKCS#12 file can be created by using the
3665.Fl export 3672.Fl export
3666option (see below). 3673option (see below).
3667.Sh PKCS12 PARSING OPTIONS 3674.Sh PKCS12 PARSING OPTIONS
3668.Bd -ragged -offset indent 3675.Bl -tag -width "XXXX"
3669.It Fl in Ar filename 3676.It Fl in Ar filename
3670This specifies the 3677This specifies the
3671.Ar filename 3678.Ar filename
@@ -3720,9 +3727,9 @@ Don't attempt to verify the integrity MAC before reading the file.
3720Prompt for separate integrity and encryption passwords: most software 3727Prompt for separate integrity and encryption passwords: most software
3721always assumes these are the same so this option will render such 3728always assumes these are the same so this option will render such
3722PKCS#12 files unreadable. 3729PKCS#12 files unreadable.
3723.Ed 3730.El
3724.Sh PKCS12 FILE CREATION OPTIONS 3731.Sh PKCS12 FILE CREATION OPTIONS
3725.Bd -ragged -offset indent 3732.Bl -tag -width "XXXX"
3726.It Fl export 3733.It Fl export
3727This option specifies that a PKCS#12 file will be created rather than 3734This option specifies that a PKCS#12 file will be created rather than
3728parsed. 3735parsed.
@@ -3838,7 +3845,7 @@ for MS-Windows,
3838for OpenVMS, and 3845for OpenVMS, and
3839.Cm \&: 3846.Cm \&:
3840for all others. 3847for all others.
3841.Ed 3848.El
3842.Sh PKCS12 NOTES 3849.Sh PKCS12 NOTES
3843Although there are a large number of options, 3850Although there are a large number of options,
3844most of them are very rarely used. 3851most of them are very rarely used.
@@ -3989,7 +3996,7 @@ file will be written back if enough
3989seeding was obtained from these sources. 3996seeding was obtained from these sources.
3990.Pp 3997.Pp
3991The options are as follows: 3998The options are as follows:
3992.Bd -ragged -offset indent 3999.Bl -tag -width "XXXX"
3993.It Fl out Ar file 4000.It Fl out Ar file
3994Write to 4001Write to
3995.Ar file 4002.Ar file
@@ -4064,7 +4071,7 @@ It can additionally create self-signed certificates,
4064for use as root CAs, for example. 4071for use as root CAs, for example.
4065.Pp 4072.Pp
4066The options are as follows: 4073The options are as follows:
4067.Bd -ragged -offset indent 4074.Bl -tag -width "XXXX"
4068.It Fl inform Ar DER|PEM 4075.It Fl inform Ar DER|PEM
4069This specifies the input format. 4076This specifies the input format.
4070The 4077The
@@ -4077,7 +4084,7 @@ form is the default format:
4077it consists of the DER format base64 encoded with additional header and 4084it consists of the DER format base64 encoded with additional header and
4078footer lines. 4085footer lines.
4079.It Fl outform Ar DER|PEM 4086.It Fl outform Ar DER|PEM
4080This specifies the output format, the options have the same meaning as the 4087This specifies the output format, the options have the same meaning as the
4081.Fl inform 4088.Fl inform
4082option. 4089option.
4083.It Fl in Ar filename 4090.It Fl in Ar filename
@@ -4223,7 +4230,7 @@ This allows several different sections to
4223be used in the same configuration file to specify requests for 4230be used in the same configuration file to specify requests for
4224a variety of purposes. 4231a variety of purposes.
4225.It Fl utf8 4232.It Fl utf8
4226This option causes field values to be interpreted as UTF8 strings, by 4233This option causes field values to be interpreted as UTF8 strings, by
4227default they are interpreted as ASCII. 4234default they are interpreted as ASCII.
4228This means that the field values, whether prompted from a terminal or 4235This means that the field values, whether prompted from a terminal or
4229obtained from a configuration file, must be valid UTF8 strings. 4236obtained from a configuration file, must be valid UTF8 strings.
@@ -4267,7 +4274,7 @@ Some software (Netscape certificate server) and some CAs need this.
4267Non-interactive mode. 4274Non-interactive mode.
4268.It Fl verbose 4275.It Fl verbose
4269Print extra details about the operations being performed. 4276Print extra details about the operations being performed.
4270.Ed 4277.El
4271.Sh REQ CONFIGURATION FILE FORMAT 4278.Sh REQ CONFIGURATION FILE FORMAT
4272The configuration options are specified in the 4279The configuration options are specified in the
4273.Em req 4280.Em req
@@ -4280,7 +4287,7 @@ then the initial unnamed or
4280section is searched too. 4287section is searched too.
4281.Pp 4288.Pp
4282The options available are described in detail below. 4289The options available are described in detail below.
4283.Bd -ragged -offset indent 4290.Bl -tag -width "XXXX"
4284.It Ar input_password output_password 4291.It Ar input_password output_password
4285The passwords for the input private key file (if present) and 4292The passwords for the input private key file (if present) and
4286the output private key file (if one will be created). 4293the output private key file (if one will be created).
@@ -4308,7 +4315,7 @@ option.
4308This specifies a file containing additional OBJECT IDENTIFIERS. 4315This specifies a file containing additional OBJECT IDENTIFIERS.
4309Each line of the file should consist of the numerical form of the 4316Each line of the file should consist of the numerical form of the
4310object identifier, followed by whitespace, then the short name followed 4317object identifier, followed by whitespace, then the short name followed
4311by whitespace and finally the long name. 4318by whitespace and finally the long name.
4312.It Ar oid_section 4319.It Ar oid_section
4313This specifies a section in the configuration file containing extra 4320This specifies a section in the configuration file containing extra
4314object identifiers. 4321object identifiers.
@@ -4353,7 +4360,7 @@ which is also the default option, uses
4353.Em PrintableStrings , T61Strings 4360.Em PrintableStrings , T61Strings
4354and 4361and
4355.Em BMPStrings ; 4362.Em BMPStrings ;
4356if the 4363if the
4357.Ar pkix 4364.Ar pkix
4358value is used then only 4365value is used then only
4359.Em PrintableStrings 4366.Em PrintableStrings
@@ -4424,7 +4431,7 @@ request signing utilities, but some CAs might want them.
4424This specifies the section containing the distinguished name fields to 4431This specifies the section containing the distinguished name fields to
4425prompt for when generating a certificate or certificate request. 4432prompt for when generating a certificate or certificate request.
4426The format is described in the next section. 4433The format is described in the next section.
4427.Ed 4434.El
4428.Sh REQ DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT 4435.Sh REQ DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT
4429There are two separate formats for the distinguished name and attribute 4436There are two separate formats for the distinguished name and attribute
4430sections. 4437sections.
@@ -4760,7 +4767,7 @@ newer applications should use the more secure PKCS#8 format using the
4760utility. 4767utility.
4761.Pp 4768.Pp
4762The options are as follows: 4769The options are as follows:
4763.Bd -ragged -offset indent 4770.Bl -tag -width "XXXX"
4764.It Fl inform Ar DER|NET|PEM 4771.It Fl inform Ar DER|NET|PEM
4765This specifies the input format. 4772This specifies the input format.
4766The 4773The
@@ -4779,7 +4786,7 @@ form is a format described in the
4779.Sx RSA NOTES 4786.Sx RSA NOTES
4780section. 4787section.
4781.It Fl outform Ar DER|NET|PEM 4788.It Fl outform Ar DER|NET|PEM
4782This specifies the output format, the options have the same meaning as the 4789This specifies the output format, the options have the same meaning as the
4783.Fl inform 4790.Fl inform
4784option. 4791option.
4785.It Fl in Ar filename 4792.It Fl in Ar filename
@@ -4815,7 +4822,7 @@ Use the modified
4815.Em NET 4822.Em NET
4816algorithm used with some versions of Microsoft IIS and SGC keys. 4823algorithm used with some versions of Microsoft IIS and SGC keys.
4817.It Cm -des|-des3|-idea 4824.It Cm -des|-des3|-idea
4818These options encrypt the private key with the DES, triple DES, or the 4825These options encrypt the private key with the DES, triple DES, or the
4819IDEA ciphers, respectively, before outputting it. 4826IDEA ciphers, respectively, before outputting it.
4820A pass phrase is prompted for. 4827A pass phrase is prompted for.
4821If none of these options is specified the key is written in plain text. 4828If none of these options is specified the key is written in plain text.
@@ -4829,7 +4836,7 @@ These options can only be used with
4829format output files. 4836format output files.
4830.It Fl text 4837.It Fl text
4831Prints out the various public or private key components in 4838Prints out the various public or private key components in
4832plain text, in addition to the encoded version. 4839plain text, in addition to the encoded version.
4833.It Fl noout 4840.It Fl noout
4834This option prevents output of the encoded version of the key. 4841This option prevents output of the encoded version of the key.
4835.It Fl modulus 4842.It Fl modulus
@@ -4843,7 +4850,7 @@ option a public key is read instead.
4843By default a private key is output: 4850By default a private key is output:
4844with this option a public key will be output instead. 4851with this option a public key will be output instead.
4845This option is automatically set if the input is a public key. 4852This option is automatically set if the input is a public key.
4846.Ed 4853.El
4847.Sh RSA NOTES 4854.Sh RSA NOTES
4848The 4855The
4849.Em PEM 4856.Em PEM
@@ -4897,7 +4904,7 @@ To convert a private key from
4897.Em PEM 4904.Em PEM
4898to 4905to
4899.Em DER 4906.Em DER
4900format: 4907format:
4901.Pp 4908.Pp
4902\& $ openssl rsa -in key.pem -outform DER -out keyout.der 4909\& $ openssl rsa -in key.pem -outform DER -out keyout.der
4903.br 4910.br
@@ -4942,7 +4949,7 @@ command can be used to sign, verify, encrypt and decrypt
4942data using the RSA algorithm. 4949data using the RSA algorithm.
4943.Pp 4950.Pp
4944The options are as follows: 4951The options are as follows:
4945.Bd -ragged -offset indent 4952.Bl -tag -width "XXXX"
4946.It Fl in Ar filename 4953.It Fl in Ar filename
4947This specifies the input 4954This specifies the input
4948.Ar filename 4955.Ar filename
@@ -4956,9 +4963,9 @@ default.
4956.It Fl inkey Ar file 4963.It Fl inkey Ar file
4957The input key file, by default it should be an RSA private key. 4964The input key file, by default it should be an RSA private key.
4958.It Fl pubin 4965.It Fl pubin
4959The input file is an RSA public key. 4966The input file is an RSA public key.
4960.It Fl certin 4967.It Fl certin
4961The input is a certificate containing an RSA public key. 4968The input is a certificate containing an RSA public key.
4962.It Fl sign 4969.It Fl sign
4963Sign the input data and output the signed result. 4970Sign the input data and output the signed result.
4964This requires an RSA private key. 4971This requires an RSA private key.
@@ -5028,23 +5035,23 @@ as follows yields:
5028\& $ openssl asn1parse -in pca-cert.pem 5035\& $ openssl asn1parse -in pca-cert.pem
5029.Pp 5036.Pp
5030.Bd -literal 5037.Bd -literal
5031\& 0:d=0 hl=4 l= 742 cons: SEQUENCE 5038\& 0:d=0 hl=4 l= 742 cons: SEQUENCE
5032\& 4:d=1 hl=4 l= 591 cons: SEQUENCE 5039\& 4:d=1 hl=4 l= 591 cons: SEQUENCE
5033\& 8:d=2 hl=2 l= 3 cons: cont [ 0 ] 5040\& 8:d=2 hl=2 l= 3 cons: cont [ 0 ]
5034\& 10:d=3 hl=2 l= 1 prim: INTEGER :02 5041\& 10:d=3 hl=2 l= 1 prim: INTEGER :02
5035\& 13:d=2 hl=2 l= 1 prim: INTEGER :00 5042\& 13:d=2 hl=2 l= 1 prim: INTEGER :00
5036\& 16:d=2 hl=2 l= 13 cons: SEQUENCE 5043\& 16:d=2 hl=2 l= 13 cons: SEQUENCE
5037\& 18:d=3 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption 5044\& 18:d=3 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption
5038\& 29:d=3 hl=2 l= 0 prim: NULL 5045\& 29:d=3 hl=2 l= 0 prim: NULL
5039\& 31:d=2 hl=2 l= 92 cons: SEQUENCE 5046\& 31:d=2 hl=2 l= 92 cons: SEQUENCE
5040\& 33:d=3 hl=2 l= 11 cons: SET 5047\& 33:d=3 hl=2 l= 11 cons: SET
5041\& 35:d=4 hl=2 l= 9 cons: SEQUENCE 5048\& 35:d=4 hl=2 l= 9 cons: SEQUENCE
5042\& 37:d=5 hl=2 l= 3 prim: OBJECT :countryName 5049\& 37:d=5 hl=2 l= 3 prim: OBJECT :countryName
5043\& 42:d=5 hl=2 l= 2 prim: PRINTABLESTRING :AU 5050\& 42:d=5 hl=2 l= 2 prim: PRINTABLESTRING :AU
5044\& .... 5051\& ....
5045\& 599:d=1 hl=2 l= 13 cons: SEQUENCE 5052\& 599:d=1 hl=2 l= 13 cons: SEQUENCE
5046\& 601:d=2 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption 5053\& 601:d=2 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption
5047\& 612:d=2 hl=2 l= 0 prim: NULL 5054\& 612:d=2 hl=2 l= 0 prim: NULL
5048\& 614:d=1 hl=3 l= 129 prim: BIT STRING 5055\& 614:d=1 hl=3 l= 129 prim: BIT STRING
5049.Ed 5056.Ed
5050.Pp 5057.Pp
@@ -5062,11 +5069,11 @@ The signature can be analysed with:
5062\& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin 5069\& $ openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
5063.Pp 5070.Pp
5064.Bd -literal 5071.Bd -literal
5065\& 0:d=0 hl=2 l= 32 cons: SEQUENCE 5072\& 0:d=0 hl=2 l= 32 cons: SEQUENCE
5066\& 2:d=1 hl=2 l= 12 cons: SEQUENCE 5073\& 2:d=1 hl=2 l= 12 cons: SEQUENCE
5067\& 4:d=2 hl=2 l= 8 prim: OBJECT :md5 5074\& 4:d=2 hl=2 l= 8 prim: OBJECT :md5
5068\& 14:d=2 hl=2 l= 0 prim: NULL 5075\& 14:d=2 hl=2 l= 0 prim: NULL
5069\& 16:d=1 hl=2 l= 16 prim: OCTET STRING 5076\& 16:d=1 hl=2 l= 16 prim: OCTET STRING
5070\& 0000 - f3 46 9e aa 1a 4a 73 c9-37 ea 93 00 48 25 08 b5 .F...Js.7...H%.. 5077\& 0000 - f3 46 9e aa 1a 4a 73 c9-37 ea 93 00 48 25 08 b5 .F...Js.7...H%..
5071.Ed 5078.Ed
5072.Pp 5079.Pp
@@ -5128,7 +5135,7 @@ It is a
5128useful diagnostic tool for SSL servers. 5135useful diagnostic tool for SSL servers.
5129.Pp 5136.Pp
5130The options are as follows: 5137The options are as follows:
5131.Bd -ragged -offset indent 5138.Bl -tag -width "XXXX"
5132.It Fl connect Ar host:port 5139.It Fl connect Ar host:port
5133This specifies the 5140This specifies the
5134.Ar host 5141.Ar host
@@ -5254,7 +5261,7 @@ for OpenVMS, and
5254.Cm \&: 5261.Cm \&:
5255for 5262for
5256all others. 5263all others.
5257.Ed 5264.El
5258.Sh S_CLIENT CONNECTED COMMANDS 5265.Sh S_CLIENT CONNECTED COMMANDS
5259If a connection is established with an SSL server then any data received 5266If a connection is established with an SSL server then any data received
5260from the server is displayed and any key presses will be sent to the 5267from the server is displayed and any key presses will be sent to the
@@ -5381,7 +5388,7 @@ command implements a generic SSL/TLS server which listens
5381for connections on a given port using SSL/TLS. 5388for connections on a given port using SSL/TLS.
5382.Pp 5389.Pp
5383The options are as follows: 5390The options are as follows:
5384.Bd -ragged -offset indent 5391.Bl -tag -width "XXXX"
5385.It Fl accept Ar port 5392.It Fl accept Ar port
5386The TCP 5393The TCP
5387.Ar port 5394.Ar port
@@ -5544,19 +5551,19 @@ for MS-Windows,
5544for OpenVMS, and 5551for OpenVMS, and
5545.Cm \&: 5552.Cm \&:
5546for all others. 5553for all others.
5547.Ed 5554.El
5548.Sh S_SERVER CONNECTED COMMANDS 5555.Sh S_SERVER CONNECTED COMMANDS
5549If a connection request is established with an SSL client and neither the 5556If a connection request is established with an SSL client and neither the
5550.Fl www 5557.Fl www
5551nor the 5558nor the
5552.Fl WWW 5559.Fl WWW
5553option has been used, then normally any data received 5560option has been used, then normally any data received
5554from the client is displayed and any key presses will be sent to the client. 5561from the client is displayed and any key presses will be sent to the client.
5555.Pp 5562.Pp
5556Certain single letter commands are also recognized which perform special 5563Certain single letter commands are also recognized which perform special
5557operations: these are listed below. 5564operations: these are listed below.
5558.Pp 5565.Pp
5559.Bd -ragged -offset indent 5566.Bl -tag -width "XXXX"
5560.It Ar q 5567.It Ar q
5561End the current SSL connection, but still accept new connections. 5568End the current SSL connection, but still accept new connections.
5562.It Ar Q 5569.It Ar Q
@@ -5570,7 +5577,7 @@ Send some plain text down the underlying TCP connection: this should
5570cause the client to disconnect due to a protocol violation. 5577cause the client to disconnect due to a protocol violation.
5571.It Ar S 5578.It Ar S
5572Print out some session cache status information. 5579Print out some session cache status information.
5573.Ed 5580.El
5574.Sh S_SERVER NOTES 5581.Sh S_SERVER NOTES
5575.Nm s_server 5582.Nm s_server
5576can be used to debug SSL clients. 5583can be used to debug SSL clients.
@@ -5641,7 +5648,7 @@ Since this is a diagnostic tool that needs some knowledge of the SSL
5641protocol to use properly, most users will not need to use it. 5648protocol to use properly, most users will not need to use it.
5642.Pp 5649.Pp
5643The options are as follows: 5650The options are as follows:
5644.Bd -ragged -offset indent 5651.Bl -tag -width "XXXX"
5645.It Fl inform Ar DER|PEM 5652.It Fl inform Ar DER|PEM
5646This specifies the input format. 5653This specifies the input format.
5647The 5654The
@@ -5654,7 +5661,7 @@ The
5654form is the default format: it consists of the DER 5661form is the default format: it consists of the DER
5655format base64 encoded with additional header and footer lines. 5662format base64 encoded with additional header and footer lines.
5656.It Fl outform Ar DER|PEM 5663.It Fl outform Ar DER|PEM
5657This specifies the output format, the options have the same meaning as the 5664This specifies the output format, the options have the same meaning as the
5658.Fl inform 5665.Fl inform
5659option. 5666option.
5660.It Fl in Ar filename 5667.It Fl in Ar filename
@@ -5668,7 +5675,7 @@ to write session information to, or standard
5668output if this option is not specified. 5675output if this option is not specified.
5669.It Fl text 5676.It Fl text
5670Prints out the various public or private key components in 5677Prints out the various public or private key components in
5671plain text in addition to the encoded version. 5678plain text in addition to the encoded version.
5672.It Fl cert 5679.It Fl cert
5673If a certificate is present in the session it will be output using this option, 5680If a certificate is present in the session it will be output using this option,
5674if the 5681if the
@@ -5684,7 +5691,7 @@ The
5684.Ar ID 5691.Ar ID
5685can be any string of characters. 5692can be any string of characters.
5686This option won't normally be used. 5693This option won't normally be used.
5687.Ed 5694.El
5688.Sh SESS_ID OUTPUT 5695.Sh SESS_ID OUTPUT
5689Typical output: 5696Typical output:
5690.Pp 5697.Pp
@@ -5702,7 +5709,7 @@ Typical output:
5702.Ed 5709.Ed
5703.Pp 5710.Pp
5704These are described below in more detail. 5711These are described below in more detail.
5705.Bd -ragged -offset indent 5712.Bl -tag -width "XXXX"
5706.It Ar Protocol 5713.It Ar Protocol
5707This is the protocol in use: TLSv1, SSLv3 or SSLv2. 5714This is the protocol in use: TLSv1, SSLv3 or SSLv2.
5708.It Ar Cipher 5715.It Ar Cipher
@@ -5723,7 +5730,7 @@ in standard Unix format.
5723The timeout in seconds. 5730The timeout in seconds.
5724.It Ar Verify return code 5731.It Ar Verify return code
5725This is the return code when an SSL client certificate is verified. 5732This is the return code when an SSL client certificate is verified.
5726.Ed 5733.El
5727.Sh SESS_ID NOTES 5734.Sh SESS_ID NOTES
5728The 5735The
5729.Em PEM 5736.Em PEM
@@ -5789,7 +5796,7 @@ There are five operation options that set the type of operation to be performed.
5789The meaning of the other options varies according to the operation type. 5796The meaning of the other options varies according to the operation type.
5790.Pp 5797.Pp
5791The options are as follows: 5798The options are as follows:
5792.Bd -ragged -offset indent 5799.Bl -tag -width "XXXX"
5793.It Fl encrypt 5800.It Fl encrypt
5794Encrypt mail for the given recipient certificates. 5801Encrypt mail for the given recipient certificates.
5795Input file is the message to be encrypted. 5802Input file is the message to be encrypted.
@@ -5879,7 +5886,7 @@ This option adds plain text (text/plain)
5879headers to the supplied message if encrypting or signing. 5886headers to the supplied message if encrypting or signing.
5880If decrypting or verifying it strips off text headers: 5887If decrypting or verifying it strips off text headers:
5881if the decrypted or verified message is not of 5888if the decrypted or verified message is not of
5882.Em MIME 5889.Em MIME
5883type text/plain then an error occurs. 5890type text/plain then an error occurs.
5884.It Fl CAfile Ar file 5891.It Fl CAfile Ar file
5885A 5892A
@@ -5994,7 +6001,7 @@ for OpenVMS, and
5994for all others. 6001for all others.
5995.It Ar cert.pem ... 6002.It Ar cert.pem ...
5996One or more certificates of message recipients: used when encrypting 6003One or more certificates of message recipients: used when encrypting
5997a message. 6004a message.
5998.It Fl to , from , subject 6005.It Fl to , from , subject
5999The relevant mail headers. 6006The relevant mail headers.
6000These are included outside the signed 6007These are included outside the signed
@@ -6003,7 +6010,7 @@ If signing, then many
6003.Em S/MIME 6010.Em S/MIME
6004mail clients check the signer's certificate email 6011mail clients check the signer's certificate email
6005address matches that specified in the From: address. 6012address matches that specified in the From: address.
6006.Ed 6013.El
6007.Sh SMIME NOTES 6014.Sh SMIME NOTES
6008The 6015The
6009.Em MIME 6016.Em MIME
@@ -6048,7 +6055,7 @@ clients.
6048Strictly speaking these process PKCS#7 enveloped data: PKCS#7 6055Strictly speaking these process PKCS#7 enveloped data: PKCS#7
6049encrypted data is used for other purposes. 6056encrypted data is used for other purposes.
6050.Sh SMIME EXIT CODES 6057.Sh SMIME EXIT CODES
6051.Bd -ragged -offset indent 6058.Bl -tag -width "XXXX"
6052.It Ar 0 6059.It Ar 0
6053The operation was completely successful. 6060The operation was completely successful.
6054.It Ar 1 6061.It Ar 1
@@ -6064,7 +6071,7 @@ An error occurred decrypting or verifying the message.
6064.It Ar 5 6071.It Ar 5
6065The message was verified correctly, but an error occurred writing out 6072The message was verified correctly, but an error occurred writing out
6066the signers certificates. 6073the signers certificates.
6067.Ed 6074.El
6068.Sh SMIME EXAMPLES 6075.Sh SMIME EXAMPLES
6069Create a cleartext signed message: 6076Create a cleartext signed message:
6070.Pp 6077.Pp
@@ -6222,7 +6229,7 @@ The
6222.Nm speed 6229.Nm speed
6223command is used to test the performance of cryptographic algorithms. 6230command is used to test the performance of cryptographic algorithms.
6224.Pp 6231.Pp
6225.Bd -ragged -offset indent 6232.Bl -tag -width "XXXX"
6226.It Fl engine Ar id 6233.It Fl engine Ar id
6227Specifying an engine (by it's unique 6234Specifying an engine (by it's unique
6228.Ar id 6235.Ar id
@@ -6236,7 +6243,7 @@ for all available algorithms.
6236If any options are given, 6243If any options are given,
6237.Nm speed 6244.Nm speed
6238tests those algorithms, otherwise all of the above are tested. 6245tests those algorithms, otherwise all of the above are tested.
6239.Ed 6246.El
6240.\" 6247.\"
6241.\" SPKAC 6248.\" SPKAC
6242.\" 6249.\"
@@ -6261,7 +6268,7 @@ It can print out their contents, verify the signature and
6261produce its own SPKACs from a supplied private key. 6268produce its own SPKACs from a supplied private key.
6262.Pp 6269.Pp
6263The options are as follows: 6270The options are as follows:
6264.Bd -ragged -offset indent 6271.Bl -tag -width "XXXX"
6265.It Fl in Ar filename 6272.It Fl in Ar filename
6266This specifies the input 6273This specifies the input
6267.Ar filename 6274.Ar filename
@@ -6307,7 +6314,7 @@ Output the public key of an SPKAC (not used if an SPKAC is
6307being created). 6314being created).
6308.It Fl verify 6315.It Fl verify
6309Verifies the digital signature on the supplied SPKAC. 6316Verifies the digital signature on the supplied SPKAC.
6310.Ed 6317.El
6311.Sh SPKAC EXAMPLES 6318.Sh SPKAC EXAMPLES
6312Print out the contents of an SPKAC: 6319Print out the contents of an SPKAC:
6313.Pp 6320.Pp
@@ -6361,7 +6368,7 @@ to be used in a "replay attack".
6361.Op Fl help 6368.Op Fl help
6362.Op Fl issuer_checks 6369.Op Fl issuer_checks
6363.Op Fl verbose 6370.Op Fl verbose
6364.Op Fl 6371.Op Fl
6365.Op Ar certificates 6372.Op Ar certificates
6366.Pp 6373.Pp
6367The 6374The
@@ -6369,7 +6376,7 @@ The
6369command verifies certificate chains. 6376command verifies certificate chains.
6370.Pp 6377.Pp
6371The options are as follows: 6378The options are as follows:
6372.Bd -ragged -offset indent 6379.Bl -tag -width "XXXX"
6373.It Fl CApath directory 6380.It Fl CApath directory
6374A 6381A
6375.Ar directory 6382.Ar directory
@@ -6423,7 +6430,7 @@ This shows why each candidate issuer certificate was rejected.
6423However the presence of rejection messages 6430However the presence of rejection messages
6424does not itself imply that anything is wrong: during the normal 6431does not itself imply that anything is wrong: during the normal
6425verify process several rejections may take place. 6432verify process several rejections may take place.
6426.It Fl 6433.It Fl
6427Marks the last option. 6434Marks the last option.
6428All arguments following this are assumed to be certificate files. 6435All arguments following this are assumed to be certificate files.
6429This is useful if the first certificate filename begins with a 6436This is useful if the first certificate filename begins with a
@@ -6437,7 +6444,7 @@ a certificate from standard input.
6437They should all be in 6444They should all be in
6438.Em PEM 6445.Em PEM
6439format. 6446format.
6440.Ed 6447.El
6441.Sh VERIFY OPERATION 6448.Sh VERIFY OPERATION
6442The 6449The
6443.Nm verify 6450.Nm verify
@@ -6459,7 +6466,7 @@ and ending in the root CA.
6459It is an error if the whole chain cannot be built up. 6466It is an error if the whole chain cannot be built up.
6460The chain is built up by looking up the issuers certificate of the current 6467The chain is built up by looking up the issuers certificate of the current
6461certificate. 6468certificate.
6462If a certificate is found which is its own issuer it is assumed 6469If a certificate is found which is its own issuer it is assumed
6463to be the root CA. 6470to be the root CA.
6464.Pp 6471.Pp
6465The process of 'looking up the issuers certificate' itself involves a number 6472The process of 'looking up the issuers certificate' itself involves a number
@@ -6504,7 +6511,7 @@ For compatibility with previous versions of
6504and 6511and
6505.Nm OpenSSL , 6512.Nm OpenSSL ,
6506a certificate with no trust settings is considered to be valid for 6513a certificate with no trust settings is considered to be valid for
6507all purposes. 6514all purposes.
6508.Pp 6515.Pp
6509The final operation is to check the validity of the certificate chain. 6516The final operation is to check the validity of the certificate chain.
6510The validity period is checked against the current system time and the 6517The validity period is checked against the current system time and the
@@ -6540,7 +6547,7 @@ includes the name of the error code as defined in the header file
6540Some of the error codes are defined but never returned: these are described 6547Some of the error codes are defined but never returned: these are described
6541as "unused". 6548as "unused".
6542.Pp 6549.Pp
6543.Bd -ragged -offset indent 6550.Bl -tag -width "XXXX"
6544.It Ar "0 X509_V_OK: ok" 6551.It Ar "0 X509_V_OK: ok"
6545The operation was successful. 6552The operation was successful.
6546.It Ar 2 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: unable to get issuer certificate 6553.It Ar 2 X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT: unable to get issuer certificate
@@ -6662,7 +6669,7 @@ extension does not permit certificate signing.
6662.It Ar 50 X509_V_ERR_APPLICATION_VERIFICATION: application verification failure 6669.It Ar 50 X509_V_ERR_APPLICATION_VERIFICATION: application verification failure
6663An application specific error. 6670An application specific error.
6664Unused. 6671Unused.
6665.Ed 6672.El
6666.Sh VERIFY BUGS 6673.Sh VERIFY BUGS
6667Although the issuer checks are a considerable improvement over the old 6674Although the issuer checks are a considerable improvement over the old
6668technique, they still suffer from limitations in the underlying 6675technique, they still suffer from limitations in the underlying
@@ -6697,7 +6704,7 @@ command is used to print out version information about
6697.Nm OpenSSL . 6704.Nm OpenSSL .
6698.Pp 6705.Pp
6699The options are as follows: 6706The options are as follows:
6700.Bd -ragged -offset indent 6707.Bl -tag -width "XXXX"
6701.It Fl a 6708.It Fl a
6702All information: this is the same as setting all the other flags. 6709All information: this is the same as setting all the other flags.
6703.It Fl v 6710.It Fl v
@@ -6717,7 +6724,7 @@ Platform setting.
6717.It Fl d 6724.It Fl d
6718.Em OPENSSLDIR 6725.Em OPENSSLDIR
6719setting. 6726setting.
6720.Ed 6727.El
6721.Sh VERSION NOTES 6728.Sh VERSION NOTES
6722The output of 6729The output of
6723.Nm openssl version -a 6730.Nm openssl version -a
@@ -6788,7 +6795,7 @@ certificate trust settings.
6788Since there are a large number of options, they are split up into 6795Since there are a large number of options, they are split up into
6789various sections. 6796various sections.
6790.Sh X509 INPUT, OUTPUT AND GENERAL PURPOSE OPTIONS 6797.Sh X509 INPUT, OUTPUT AND GENERAL PURPOSE OPTIONS
6791.Bd -ragged -offset indent 6798.Bl -tag -width "XXXX"
6792.It Fl inform Ar DER|PEM|NET 6799.It Fl inform Ar DER|PEM|NET
6793This specifies the input format. 6800This specifies the input format.
6794Normally the command will expect an X509 certificate, 6801Normally the command will expect an X509 certificate,
@@ -6806,7 +6813,7 @@ option is an obscure Netscape server format that is now
6806obsolete. 6813obsolete.
6807.It Fl outform Ar DER|PEM|NET 6814.It Fl outform Ar DER|PEM|NET
6808This specifies the output format; 6815This specifies the output format;
6809the options have the same meaning as the 6816the options have the same meaning as the
6810.Fl inform 6817.Fl inform
6811option. 6818option.
6812.It Fl in Ar filename 6819.It Fl in Ar filename
@@ -6828,7 +6835,7 @@ options.
6828If not specified then MD5 is used. 6835If not specified then MD5 is used.
6829If the key being used to sign with is a DSA key then 6836If the key being used to sign with is a DSA key then
6830this option has no effect: SHA1 is always used with DSA keys. 6837this option has no effect: SHA1 is always used with DSA keys.
6831.Ed 6838.El
6832.Sh X509 DISPLAY OPTIONS 6839.Sh X509 DISPLAY OPTIONS
6833.Sy Note : 6840.Sy Note :
6834The 6841The
@@ -6838,7 +6845,7 @@ and
6838options are also display options but are described in the 6845options are also display options but are described in the
6839.Sx X509 TRUST OPTIONS 6846.Sx X509 TRUST OPTIONS
6840section. 6847section.
6841.Bd -ragged -offset indent 6848.Bl -tag -width "XXXX"
6842.It Fl text 6849.It Fl text
6843Prints out the certificate in text form. 6850Prints out the certificate in text form.
6844Full details are output including the public key, signature algorithms, 6851Full details are output including the public key, signature algorithms,
@@ -6902,7 +6909,7 @@ Prints out the digest of the DER encoded version of the whole certificate
6902.Sx DIGEST OPTIONS ) . 6909.Sx DIGEST OPTIONS ) .
6903.It Fl C 6910.It Fl C
6904This outputs the certificate in the form of a C source file. 6911This outputs the certificate in the form of a C source file.
6905.Ed 6912.El
6906.Sh X509 TRUST SETTINGS 6913.Sh X509 TRUST SETTINGS
6907Please note these options are currently experimental and may well change. 6914Please note these options are currently experimental and may well change.
6908.Pp 6915.Pp
@@ -6930,7 +6937,7 @@ utility for more information on the meaning of trust settings.
6930Future versions of 6937Future versions of
6931.Nm OpenSSL 6938.Nm OpenSSL
6932will recognize trust settings on any certificate: not just root CAs. 6939will recognize trust settings on any certificate: not just root CAs.
6933.Bd -ragged -offset indent 6940.Bl -tag -width "XXXX"
6934.It Fl trustout 6941.It Fl trustout
6935This causes 6942This causes
6936.Nm x509 6943.Nm x509
@@ -6984,17 +6991,17 @@ the results.
6984For a more complete description see the 6991For a more complete description see the
6985.Sx X509 CERTIFICATE EXTENSIONS 6992.Sx X509 CERTIFICATE EXTENSIONS
6986section. 6993section.
6987.Ed 6994.El
6988.Sh X509 SIGNING OPTIONS 6995.Sh X509 SIGNING OPTIONS
6989The 6996The
6990.Nm x509 6997.Nm x509
6991utility can be used to sign certificates and requests: it 6998utility can be used to sign certificates and requests: it
6992can thus behave like a "mini CA". 6999can thus behave like a "mini CA".
6993.Pp 7000.Pp
6994.Bd -ragged -offset indent 7001.Bl -tag -width "XXXX"
6995.It Fl signkey Ar filename 7002.It Fl signkey Ar filename
6996This option causes the input file to be self-signed using the supplied 7003This option causes the input file to be self-signed using the supplied
6997private key. 7004private key.
6998.Pp 7005.Pp
6999If the input file is a certificate, it sets the issuer name to the 7006If the input file is a certificate, it sets the issuer name to the
7000subject name (i.e. makes it self-signed), changes the public key to the 7007subject name (i.e. makes it self-signed), changes the public key to the
@@ -7091,7 +7098,7 @@ to the file again.
7091The default filename consists of the CA certificate file base name with 7098The default filename consists of the CA certificate file base name with
7092.Pa .srl 7099.Pa .srl
7093appended. 7100appended.
7094For example if the CA certificate file is called 7101For example if the CA certificate file is called
7095.Pa mycacert.pem , 7102.Pa mycacert.pem ,
7096it expects to find a serial number file called 7103it expects to find a serial number file called
7097.Pa mycacert.srl . 7104.Pa mycacert.srl .
@@ -7110,7 +7117,7 @@ The section to add certificate extensions from.
7110If this option is not specified then the extensions should either be 7117If this option is not specified then the extensions should either be
7111contained in the unnamed (default) section or the default section should 7118contained in the unnamed (default) section or the default section should
7112contain a variable called "extensions" which contains the section to use. 7119contain a variable called "extensions" which contains the section to use.
7113.Ed 7120.El
7114.Sh X509 NAME OPTIONS 7121.Sh X509 NAME OPTIONS
7115The 7122The
7116.Fl nameopt 7123.Fl nameopt
@@ -7126,7 +7133,7 @@ a
7126.Cm \&- 7133.Cm \&-
7127to turn the option off. 7134to turn the option off.
7128Only the first four will normally be used. 7135Only the first four will normally be used.
7129.Bd -ragged -offset indent 7136.Bl -tag -width "XXXX"
7130.It Ar compat 7137.It Ar compat
7131Use the old format. 7138Use the old format.
7132This is equivalent to specifying no name options at all. 7139This is equivalent to specifying no name options at all.
@@ -7253,7 +7260,7 @@ Only usable with
7253Places spaces round the 7260Places spaces round the
7254.Cm \&= 7261.Cm \&=
7255character which follows the field name. 7262character which follows the field name.
7256.Ed 7263.El
7257.Sh X509 TEXT OPTIONS 7264.Sh X509 TEXT OPTIONS
7258As well as customising the name output format, it is also possible to 7265As well as customising the name output format, it is also possible to
7259customise the actual fields printed using the 7266customise the actual fields printed using the
@@ -7262,7 +7269,7 @@ options when the
7262.Fl text 7269.Fl text
7263option is present. 7270option is present.
7264The default behaviour is to print all fields. 7271The default behaviour is to print all fields.
7265.Bd -ragged -offset indent 7272.Bl -tag -width "XXXX"
7266.It Ar compatible 7273.It Ar compatible
7267Use the old format. 7274Use the old format.
7268This is equivalent to specifying no output options at all. 7275This is equivalent to specifying no output options at all.
@@ -7310,7 +7317,7 @@ utility, equivalent to
7310.Ar no_version , no_sigdump 7317.Ar no_version , no_sigdump
7311and 7318and
7312.Ar no_signame . 7319.Ar no_signame .
7313.Ed 7320.El
7314.Sh X509 EXAMPLES 7321.Sh X509 EXAMPLES
7315.Sy Note : 7322.Sy Note :
7316In these examples the '\e' means the example should be all on one 7323In these examples the '\e' means the example should be all on one
@@ -7487,7 +7494,7 @@ and V1 certificates above apply to
7487.Em all 7494.Em all
7488CA certificates. 7495CA certificates.
7489.Pp 7496.Pp
7490.Bd -ragged -offset indent 7497.Bl -tag -width "XXXX"
7491.It Ar SSL Client 7498.It Ar SSL Client
7492The extended key usage extension must be absent or include the 7499The extended key usage extension must be absent or include the
7493"web client authentication" OID. 7500"web client authentication" OID.
@@ -7566,7 +7573,7 @@ Netscape certificate type must be absent or must have the
7566.Em S/MIME CA 7573.Em S/MIME CA
7567bit set: this is used as a work around if the 7574bit set: this is used as a work around if the
7568.Em basicConstraints 7575.Em basicConstraints
7569extension is absent. 7576extension is absent.
7570.It Ar CRL Signing 7577.It Ar CRL Signing
7571The 7578The
7572.Em keyUsage 7579.Em keyUsage
@@ -7578,6 +7585,7 @@ The normal CA tests apply.
7578Except in this case the 7585Except in this case the
7579.Em basicConstraints 7586.Em basicConstraints
7580extension must be present. 7587extension must be present.
7588.El
7581.Sh X509 BUGS 7589.Sh X509 BUGS
7582Extensions in certificates are not transferred to certificate requests and 7590Extensions in certificates are not transferred to certificate requests and
7583vice versa. 7591vice versa.