diff options
author | jmc <> | 2016-08-27 20:43:05 +0000 |
---|---|---|
committer | jmc <> | 2016-08-27 20:43:05 +0000 |
commit | 9304d31ee77186647e4a011b65ec5bc5f7aaa6b2 (patch) | |
tree | 06b13e9537424ad354263d3356506f618769ec60 /src | |
parent | 954bb2192e13413aea9af5f2b62fca949e50a79e (diff) | |
download | openbsd-9304d31ee77186647e4a011b65ec5bc5f7aaa6b2.tar.gz openbsd-9304d31ee77186647e4a011b65ec5bc5f7aaa6b2.tar.bz2 openbsd-9304d31ee77186647e4a011b65ec5bc5f7aaa6b2.zip |
shorten the req text;
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/openssl.1 | 641 |
1 files changed, 189 insertions, 452 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1 index 9fabe16cd9..7a416e74f2 100644 --- a/src/usr.bin/openssl/openssl.1 +++ b/src/usr.bin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.62 2016/08/25 14:37:28 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.63 2016/08/27 20:43:05 jmc Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -112,7 +112,7 @@ | |||
112 | .\" | 112 | .\" |
113 | .\" OPENSSL | 113 | .\" OPENSSL |
114 | .\" | 114 | .\" |
115 | .Dd $Mdocdate: August 25 2016 $ | 115 | .Dd $Mdocdate: August 27 2016 $ |
116 | .Dt OPENSSL 1 | 116 | .Dt OPENSSL 1 |
117 | .Os | 117 | .Os |
118 | .Sh NAME | 118 | .Sh NAME |
@@ -3089,9 +3089,6 @@ verification succeeded or failed. | |||
3089 | .It Fl verifyrecover | 3089 | .It Fl verifyrecover |
3090 | Verify the input data and output the recovered data. | 3090 | Verify the input data and output the recovered data. |
3091 | .El | 3091 | .El |
3092 | .\" | ||
3093 | .\" PRIME | ||
3094 | .\" | ||
3095 | .Sh PRIME | 3092 | .Sh PRIME |
3096 | .Cm openssl prime | 3093 | .Cm openssl prime |
3097 | .Op Fl bits Ar n | 3094 | .Op Fl bits Ar n |
@@ -3136,9 +3133,6 @@ Test if number | |||
3136 | .Ar p | 3133 | .Ar p |
3137 | is prime. | 3134 | is prime. |
3138 | .El | 3135 | .El |
3139 | .\" | ||
3140 | .\" RAND | ||
3141 | .\" | ||
3142 | .Sh RAND | 3136 | .Sh RAND |
3143 | .nr nS 1 | 3137 | .nr nS 1 |
3144 | .Nm "openssl rand" | 3138 | .Nm "openssl rand" |
@@ -3163,26 +3157,21 @@ encoding on the output. | |||
3163 | .It Fl hex | 3157 | .It Fl hex |
3164 | Specify hexadecimal output. | 3158 | Specify hexadecimal output. |
3165 | .It Fl out Ar file | 3159 | .It Fl out Ar file |
3166 | Write to | 3160 | The output file to write to, |
3167 | .Ar file | 3161 | or standard output if not specified. |
3168 | instead of standard output. | ||
3169 | .El | 3162 | .El |
3170 | .\" | ||
3171 | .\" REQ | ||
3172 | .\" | ||
3173 | .Sh REQ | 3163 | .Sh REQ |
3174 | .nr nS 1 | 3164 | .nr nS 1 |
3175 | .Nm "openssl req" | 3165 | .Nm "openssl req" |
3176 | .Bk -words | ||
3177 | .Op Fl asn1-kludge | 3166 | .Op Fl asn1-kludge |
3178 | .Op Fl batch | 3167 | .Op Fl batch |
3179 | .Op Fl config Ar file | 3168 | .Op Fl config Ar file |
3180 | .Op Fl days Ar n | 3169 | .Op Fl days Ar n |
3181 | .Op Fl extensions Ar section | 3170 | .Op Fl extensions Ar section |
3182 | .Op Fl in Ar file | 3171 | .Op Fl in Ar file |
3183 | .Op Fl inform Ar DER | PEM | 3172 | .Op Fl inform Cm der | pem |
3184 | .Op Fl key Ar keyfile | 3173 | .Op Fl key Ar keyfile |
3185 | .Op Fl keyform Ar DER | PEM | 3174 | .Op Fl keyform Cm der | pem |
3186 | .Op Fl keyout Ar file | 3175 | .Op Fl keyout Ar file |
3187 | .Op Fl md4 | md5 | sha1 | 3176 | .Op Fl md4 | md5 | sha1 |
3188 | .Op Fl modulus | 3177 | .Op Fl modulus |
@@ -3194,7 +3183,7 @@ instead of standard output. | |||
3194 | .Op Fl nodes | 3183 | .Op Fl nodes |
3195 | .Op Fl noout | 3184 | .Op Fl noout |
3196 | .Op Fl out Ar file | 3185 | .Op Fl out Ar file |
3197 | .Op Fl outform Ar DER | PEM | 3186 | .Op Fl outform Cm der | pem |
3198 | .Op Fl passin Ar arg | 3187 | .Op Fl passin Ar arg |
3199 | .Op Fl passout Ar arg | 3188 | .Op Fl passout Ar arg |
3200 | .Op Fl pubkey | 3189 | .Op Fl pubkey |
@@ -3208,7 +3197,6 @@ instead of standard output. | |||
3208 | .Op Fl verbose | 3197 | .Op Fl verbose |
3209 | .Op Fl verify | 3198 | .Op Fl verify |
3210 | .Op Fl x509 | 3199 | .Op Fl x509 |
3211 | .Ek | ||
3212 | .nr nS 0 | 3200 | .nr nS 0 |
3213 | .Pp | 3201 | .Pp |
3214 | The | 3202 | The |
@@ -3221,103 +3209,71 @@ for use as root CAs, for example. | |||
3221 | The options are as follows: | 3209 | The options are as follows: |
3222 | .Bl -tag -width Ds | 3210 | .Bl -tag -width Ds |
3223 | .It Fl asn1-kludge | 3211 | .It Fl asn1-kludge |
3224 | By default, the | 3212 | Produce requests in an invalid format for certain picky CAs. |
3225 | .Nm req | 3213 | Very few CAs still require the use of this option. |
3226 | command outputs certificate requests containing | ||
3227 | no attributes in the correct PKCS#10 format. | ||
3228 | However certain CAs will only | ||
3229 | accept requests containing no attributes in an invalid form: this | ||
3230 | option produces this invalid format. | ||
3231 | .Pp | ||
3232 | More precisely, the | ||
3233 | .Em Attributes | ||
3234 | in a PKCS#10 certificate request are defined as a SET OF Attribute. | ||
3235 | They are | ||
3236 | .Em not | ||
3237 | optional, so if no attributes are present then they should be encoded as an | ||
3238 | empty SET OF. | ||
3239 | The invalid form does not include the empty | ||
3240 | SET OF, whereas the correct form does. | ||
3241 | .Pp | ||
3242 | It should be noted that very few CAs still require the use of this option. | ||
3243 | .It Fl batch | 3214 | .It Fl batch |
3244 | Non-interactive mode. | 3215 | Non-interactive mode. |
3245 | .It Fl config Ar file | 3216 | .It Fl config Ar file |
3246 | This allows an alternative configuration file to be specified; | 3217 | Specify an alternative configuration file. |
3247 | this overrides the compile time filename or any specified in | ||
3248 | the | ||
3249 | .Ev OPENSSL_CONF | ||
3250 | environment variable. | ||
3251 | .It Fl days Ar n | 3218 | .It Fl days Ar n |
3252 | When the | 3219 | Specify the number of days to certify the certificate for. |
3253 | .Fl x509 | ||
3254 | option is being used, this specifies the number of | ||
3255 | days to certify the certificate for. | ||
3256 | The default is 30 days. | 3220 | The default is 30 days. |
3257 | .It Fl extensions Ar section , Fl reqexts Ar section | 3221 | Used with the |
3258 | These options specify alternative sections to include certificate | ||
3259 | extensions (if the | ||
3260 | .Fl x509 | 3222 | .Fl x509 |
3261 | option is present) or certificate request extensions. | 3223 | option. |
3262 | This allows several different sections to | 3224 | .It Fl extensions Ar section , Fl reqexts Ar section |
3263 | be used in the same configuration file to specify requests for | 3225 | Specify alternative sections to include certificate |
3264 | a variety of purposes. | 3226 | extensions (with |
3227 | .Fl x509 ) | ||
3228 | or certificate request extensions, | ||
3229 | allowing several different sections to be used in the same configuration file. | ||
3265 | .It Fl in Ar file | 3230 | .It Fl in Ar file |
3266 | This specifies the input | 3231 | The input file to read a request from, |
3267 | .Ar file | 3232 | or standard input if not specified. |
3268 | to read a request from, or standard input | ||
3269 | if this option is not specified. | ||
3270 | A request is only read if the creation options | 3233 | A request is only read if the creation options |
3271 | .Fl new | 3234 | .Fl new |
3272 | and | 3235 | and |
3273 | .Fl newkey | 3236 | .Fl newkey |
3274 | are not specified. | 3237 | are not specified. |
3275 | .It Fl inform Ar DER | PEM | 3238 | .It Fl inform Cm der | pem |
3276 | This specifies the input format. | 3239 | The input format. |
3277 | The | 3240 | .Cm der |
3278 | .Ar DER | 3241 | uses an ASN1 DER-encoded form compatible with the PKCS#10. |
3279 | argument uses an ASN1 DER-encoded form compatible with the PKCS#10. | 3242 | .Cm pem |
3280 | The | 3243 | is the default format: |
3281 | .Ar PEM | ||
3282 | form is the default format: | ||
3283 | it consists of the DER format base64-encoded with additional header and | 3244 | it consists of the DER format base64-encoded with additional header and |
3284 | footer lines. | 3245 | footer lines. |
3285 | .It Fl key Ar keyfile | 3246 | .It Fl key Ar keyfile |
3286 | This specifies the file to read the private key from. | 3247 | The file to read the private key from. |
3287 | It also accepts PKCS#8 format private keys for PEM format files. | 3248 | It also accepts PKCS#8 format private keys for PEM format files. |
3288 | .It Fl keyform Ar DER | PEM | 3249 | .It Fl keyform Cm der | pem |
3289 | The format of the private key file specified in the | 3250 | The format of the private key file specified in the |
3290 | .Fl key | 3251 | .Fl key |
3291 | argument. | 3252 | argument. |
3292 | .Ar PEM | 3253 | The default is PEM. |
3293 | is the default. | ||
3294 | .It Fl keyout Ar file | 3254 | .It Fl keyout Ar file |
3295 | This gives the | 3255 | The file to write the newly created private key to. |
3296 | .Ar file | 3256 | If this option is not specified, |
3297 | to write the newly created private key to. | 3257 | the filename present in the configuration file is used. |
3298 | If this option is not specified, the filename present in the | ||
3299 | configuration file is used. | ||
3300 | .It Fl md5 | sha1 | sha256 | 3258 | .It Fl md5 | sha1 | sha256 |
3301 | This specifies the message digest to sign the request with. | 3259 | The message digest to sign the request with. |
3302 | This overrides the digest algorithm specified in the configuration file. | 3260 | This overrides the digest algorithm specified in the configuration file. |
3303 | .Pp | 3261 | .Pp |
3304 | Some public key algorithms may override this choice. | 3262 | Some public key algorithms may override this choice. |
3305 | For instance, DSA signatures always use SHA1. | 3263 | For instance, DSA signatures always use SHA1. |
3306 | .It Fl modulus | 3264 | .It Fl modulus |
3307 | This option prints out the value of the modulus of the public key | 3265 | Print the value of the modulus of the public key contained in the request. |
3308 | contained in the request. | ||
3309 | .It Fl nameopt Ar option , Fl reqopt Ar option | 3266 | .It Fl nameopt Ar option , Fl reqopt Ar option |
3310 | These options determine how the subject or issuer names are displayed. | 3267 | Determine how the subject or issuer names are displayed. |
3311 | The | ||
3312 | .Ar option | 3268 | .Ar option |
3313 | argument can be a single option or multiple options separated by commas. | 3269 | can be a single option or multiple options separated by commas. |
3314 | Alternatively, these options may be used more than once to set multiple options. | 3270 | Alternatively, these options may be used more than once to set multiple options. |
3315 | See the | 3271 | See the |
3316 | .Sx X509 | 3272 | .Sx X509 |
3317 | section below for details. | 3273 | section below for details. |
3318 | .It Fl new | 3274 | .It Fl new |
3319 | This option generates a new certificate request. | 3275 | Generate a new certificate request. |
3320 | It will prompt the user for the relevant field values. | 3276 | The user is prompted for the relevant field values. |
3321 | The actual fields prompted for and their maximum and minimum sizes | 3277 | The actual fields prompted for and their maximum and minimum sizes |
3322 | are specified in the configuration file and any requested extensions. | 3278 | are specified in the configuration file and any requested extensions. |
3323 | .Pp | 3279 | .Pp |
@@ -3326,88 +3282,68 @@ If the | |||
3326 | option is not used, it will generate a new RSA private | 3282 | option is not used, it will generate a new RSA private |
3327 | key using information specified in the configuration file. | 3283 | key using information specified in the configuration file. |
3328 | .It Fl newhdr | 3284 | .It Fl newhdr |
3329 | Adds the word NEW to the PEM file header and footer lines | 3285 | Add the word NEW to the PEM file header and footer lines |
3330 | on the outputed request. | 3286 | on the outputed request. |
3331 | Some software | 3287 | Some software and CAs need this. |
3332 | .Pq Netscape certificate server | ||
3333 | and some CAs need this. | ||
3334 | .It Fl newkey Ar arg | 3288 | .It Fl newkey Ar arg |
3335 | This option creates a new certificate request and a new private key. | 3289 | Create a new certificate request and a new private key. |
3336 | The argument takes one of several forms. | 3290 | The argument takes one of several forms. |
3337 | .Ar rsa : Ns Ar nbits , | 3291 | .Pp |
3338 | where | 3292 | .No rsa : Ns Ar nbits |
3339 | .Ar nbits | 3293 | generates an RSA key |
3340 | is the number of bits, generates an RSA key | ||
3341 | .Ar nbits | 3294 | .Ar nbits |
3342 | in size. | 3295 | in size. |
3343 | If | 3296 | If |
3344 | .Ar nbits | 3297 | .Ar nbits |
3345 | is omitted, i.e.\& | 3298 | is omitted |
3346 | .Cm -newkey rsa | 3299 | the default key size is used. |
3347 | specified, | 3300 | .Pp |
3348 | the default key size, specified in the configuration file, is used. | 3301 | .No dsa : Ns Ar file |
3349 | .Pp | 3302 | generates a DSA key using the parameters in |
3350 | All other algorithms support the | 3303 | .Ar file . |
3351 | .Ar alg : Ns Ar file | 3304 | .Pp |
3352 | form, | 3305 | .No param : Ns Ar file |
3306 | generates a key using the parameters or certificate in | ||
3307 | .Ar file . | ||
3308 | .Pp | ||
3309 | All other algorithms support the form | ||
3310 | .Ar algorithm : Ns Ar file , | ||
3353 | where file may be an algorithm parameter file, | 3311 | where file may be an algorithm parameter file, |
3354 | created by the | 3312 | created by the |
3355 | .Cm genpkey -genparam | 3313 | .Cm genpkey -genparam |
3356 | command or an X.509 certificate for a key with appropriate algorithm. | 3314 | command or an X.509 certificate for a key with appropriate algorithm. |
3357 | .Pp | 3315 | .Ar file |
3358 | .Ar param : Ns Ar file | 3316 | can be omitted, |
3359 | generates a key using the parameter file or certificate | 3317 | in which case any parameters can be specified via the |
3360 | .Ar file ; | ||
3361 | the algorithm is determined by the parameters. | ||
3362 | .Ar algname : Ns Ar file | ||
3363 | use algorithm | ||
3364 | .Ar algname | ||
3365 | and parameter file | ||
3366 | .Ar file : | ||
3367 | the two algorithms must match or an error occurs. | ||
3368 | .Ar algname | ||
3369 | just uses algorithm | ||
3370 | .Ar algname , | ||
3371 | and parameters, if necessary, | ||
3372 | should be specified via the | ||
3373 | .Fl pkeyopt | 3318 | .Fl pkeyopt |
3374 | option. | 3319 | option. |
3375 | .Pp | ||
3376 | .Ar dsa : Ns Ar file | ||
3377 | generates a DSA key using the parameters in the file | ||
3378 | .Ar file . | ||
3379 | .It Fl no-asn1-kludge | 3320 | .It Fl no-asn1-kludge |
3380 | Reverses the effect of | 3321 | Reverse the effect of |
3381 | .Fl asn1-kludge . | 3322 | .Fl asn1-kludge . |
3382 | .It Fl nodes | 3323 | .It Fl nodes |
3383 | If this option is specified and a private key is created, it | 3324 | Do not encrypt the private key. |
3384 | will not be encrypted. | ||
3385 | .It Fl noout | 3325 | .It Fl noout |
3386 | This option prevents output of the encoded version of the request. | 3326 | Do not output the encoded version of the request. |
3387 | .It Fl out Ar file | 3327 | .It Fl out Ar file |
3388 | This specifies the output | 3328 | The output file to write to, |
3389 | .Ar file | 3329 | or standard output if not spceified. |
3390 | to write to, or standard output by default. | 3330 | .It Fl outform Cm der | pem |
3391 | .It Fl outform Ar DER | PEM | 3331 | The output format. |
3392 | This specifies the output format; the options have the same meaning as the | ||
3393 | .Fl inform | ||
3394 | option. | ||
3395 | .It Fl passin Ar arg | 3332 | .It Fl passin Ar arg |
3396 | The key password source. | 3333 | The key password source. |
3397 | .It Fl passout Ar arg | 3334 | .It Fl passout Ar arg |
3398 | The output file password source. | 3335 | The output file password source. |
3399 | .It Fl pubkey | 3336 | .It Fl pubkey |
3400 | Outputs the public key. | 3337 | Output the public key. |
3401 | .It Fl reqopt Ar option | 3338 | .It Fl reqopt Ar option |
3402 | Customise the output format used with | 3339 | Customise the output format used with |
3403 | .Fl text . | 3340 | .Fl text . |
3404 | The | 3341 | The |
3405 | .Ar option | 3342 | .Ar option |
3406 | argument can be a single option or multiple options separated by commas. | 3343 | argument can be a single option or multiple options separated by commas. |
3407 | .Pp | 3344 | See also the discussion of |
3408 | See the discussion of the | ||
3409 | .Fl certopt | 3345 | .Fl certopt |
3410 | option in the | 3346 | in the |
3411 | .Nm x509 | 3347 | .Nm x509 |
3412 | command. | 3348 | command. |
3413 | .It Fl set_serial Ar n | 3349 | .It Fl set_serial Ar n |
@@ -3416,219 +3352,180 @@ This may be specified as a decimal value or a hex value if preceded by | |||
3416 | .Sq 0x . | 3352 | .Sq 0x . |
3417 | It is possible to use negative serial numbers but this is not recommended. | 3353 | It is possible to use negative serial numbers but this is not recommended. |
3418 | .It Fl subj Ar arg | 3354 | .It Fl subj Ar arg |
3419 | Replaces subject field of input request with specified data and outputs | 3355 | Replaces the subject field of an input request |
3420 | modified request. | 3356 | with the specified data and output the modified request. |
3421 | The arg must be formatted as | 3357 | .Ar arg |
3422 | .Em /type0=value0/type1=value1/type2=... ; | 3358 | must be formatted as /type0=value0/type1=value1/type2=...; |
3423 | characters may be escaped by | 3359 | characters may be escaped by |
3424 | .Sq \e | 3360 | .Sq \e |
3425 | .Pq backslash ; | 3361 | (backslash); |
3426 | no spaces are skipped. | 3362 | no spaces are skipped. |
3427 | .It Fl subject | 3363 | .It Fl subject |
3428 | Prints out the request subject (or certificate subject if | 3364 | Print the request subject (or certificate subject if |
3429 | .Fl x509 | 3365 | .Fl x509 |
3430 | is specified. | 3366 | is specified). |
3431 | .It Fl text | 3367 | .It Fl text |
3432 | Prints out the certificate request in text form. | 3368 | Print the certificate request in text form. |
3433 | .It Fl utf8 | 3369 | .It Fl utf8 |
3434 | This option causes field values to be interpreted as UTF8 strings; | 3370 | Interpret field values as UTF8 strings, not ASCII. |
3435 | by default they are interpreted as ASCII. | ||
3436 | This means that the field values, whether prompted from a terminal or | ||
3437 | obtained from a configuration file, must be valid UTF8 strings. | ||
3438 | .It Fl verbose | 3371 | .It Fl verbose |
3439 | Print extra details about the operations being performed. | 3372 | Print extra details about the operations being performed. |
3440 | .It Fl verify | 3373 | .It Fl verify |
3441 | Verifies the signature on the request. | 3374 | Verify the signature on the request. |
3442 | .It Fl x509 | 3375 | .It Fl x509 |
3443 | This option outputs a self-signed certificate instead of a certificate | 3376 | Output a self-signed certificate instead of a certificate request. |
3444 | request. | 3377 | This is typically used to generate a test certificate or a self-signed root CA. |
3445 | This is typically used to generate a test certificate or | 3378 | The extensions added to the certificate (if any) |
3446 | a self-signed root CA. | ||
3447 | The extensions added to the certificate | ||
3448 | .Pq if any | ||
3449 | are specified in the configuration file. | 3379 | are specified in the configuration file. |
3450 | Unless specified using the | 3380 | Unless specified using the |
3451 | .Fl set_serial | 3381 | .Fl set_serial |
3452 | option, 0 will be used for the serial number. | 3382 | option, 0 is used for the serial number. |
3453 | .El | 3383 | .El |
3454 | .Sh REQ CONFIGURATION FILE FORMAT | 3384 | .Pp |
3455 | The configuration options are specified in the | 3385 | The configuration options are specified in the |
3456 | .Em req | 3386 | .Qq req |
3457 | section of the configuration file. | 3387 | section of the configuration file. |
3458 | As with all configuration files, if no value is specified in the specific | 3388 | As with all configuration files, if no value is specified in the specific |
3459 | section (i.e.\& | 3389 | section then the initial unnamed or default section is searched too. |
3460 | .Em req ) | ||
3461 | then the initial unnamed or | ||
3462 | .Em default | ||
3463 | section is searched too. | ||
3464 | .Pp | 3390 | .Pp |
3465 | The options available are described in detail below. | 3391 | The options available are as follows: |
3466 | .Bl -tag -width "XXXX" | 3392 | .Bl -tag -width "XXXX" |
3467 | .It Ar attributes | 3393 | .It Cm attributes |
3468 | This specifies the section containing any request attributes: its format | 3394 | The section containing any request attributes: its format |
3469 | is the same as | 3395 | is the same as |
3470 | .Ar distinguished_name . | 3396 | .Cm distinguished_name . |
3471 | Typically these may contain the | 3397 | Typically these may contain the challengePassword or unstructuredName types. |
3472 | .Em challengePassword | 3398 | They are currently ignored by the |
3473 | or | 3399 | .Nm openssl |
3474 | .Em unstructuredName | ||
3475 | types. | ||
3476 | They are currently ignored by | ||
3477 | .Nm OpenSSL Ns Li 's | ||
3478 | request signing utilities, but some CAs might want them. | 3400 | request signing utilities, but some CAs might want them. |
3479 | .It Ar default_bits | 3401 | .It Cm default_bits |
3480 | This specifies the default key size in bits. | 3402 | The default key size, in bits. |
3481 | If not specified, 2048 is used. | 3403 | The default is 2048. |
3482 | It is used if the | 3404 | It is used if the |
3483 | .Fl new | 3405 | .Fl new |
3484 | option is used. | 3406 | option is used and can be overridden by using the |
3485 | It can be overridden by using the | ||
3486 | .Fl newkey | 3407 | .Fl newkey |
3487 | option. | 3408 | option. |
3488 | .It Ar default_keyfile | 3409 | .It Cm default_keyfile |
3489 | This is the default file to write a private key to. | 3410 | The default file to write a private key to, |
3490 | If not specified, the key is written to standard output. | 3411 | or standard output if not specified. |
3491 | This can be overridden by the | 3412 | It can be overridden by the |
3492 | .Fl keyout | 3413 | .Fl keyout |
3493 | option. | 3414 | option. |
3494 | .It Ar default_md | 3415 | .It Cm default_md |
3495 | This option specifies the digest algorithm to use. | 3416 | The digest algorithm to use. |
3496 | Possible values include | 3417 | Possible values include |
3497 | .Ar md5 , | 3418 | .Cm md5 , |
3498 | .Ar sha1 | 3419 | .Cm sha1 |
3499 | and | 3420 | and |
3500 | .Ar sha256 . | 3421 | .Cm sha256 |
3501 | If not present, SHA256 is used. | 3422 | (the default). |
3502 | This option can be overridden on the command line. | 3423 | It can be overridden on the command line. |
3503 | .It Ar distinguished_name | 3424 | .It Cm distinguished_name |
3504 | This specifies the section containing the distinguished name fields to | 3425 | The section containing the distinguished name fields to |
3505 | prompt for when generating a certificate or certificate request. | 3426 | prompt for when generating a certificate or certificate request. |
3506 | The format is described in the next section. | 3427 | The format is described below. |
3507 | .It Ar encrypt_key | 3428 | .It Cm encrypt_key |
3508 | If this is set to | 3429 | If set to |
3509 | .Em no | 3430 | .Qq no |
3510 | and a private key is generated, it is | 3431 | and a private key is generated, it is not encrypted. |
3511 | .Em not | 3432 | It is equivalent to the |
3512 | encrypted. | ||
3513 | This is equivalent to the | ||
3514 | .Fl nodes | 3433 | .Fl nodes |
3515 | command line option. | 3434 | option. |
3516 | For compatibility, | 3435 | For compatibility, |
3517 | .Ar encrypt_rsa_key | 3436 | .Cm encrypt_rsa_key |
3518 | is an equivalent option. | 3437 | is an equivalent option. |
3519 | .It Ar input_password | output_password | 3438 | .It Cm input_password | output_password |
3520 | The passwords for the input private key file | 3439 | The passwords for the input private key file (if present) |
3521 | .Pq if present | 3440 | and the output private key file (if one will be created). |
3522 | and the output private key file | ||
3523 | .Pq if one will be created . | ||
3524 | The command line options | 3441 | The command line options |
3525 | .Fl passin | 3442 | .Fl passin |
3526 | and | 3443 | and |
3527 | .Fl passout | 3444 | .Fl passout |
3528 | override the configuration file values. | 3445 | override the configuration file values. |
3529 | .It Ar oid_file | 3446 | .It Cm oid_file |
3530 | This specifies a file containing additional OBJECT IDENTIFIERS. | 3447 | A file containing additional OBJECT IDENTIFIERS. |
3531 | Each line of the file should consist of the numerical form of the | 3448 | Each line of the file should consist of the numerical form of the |
3532 | object identifier, followed by whitespace, then the short name followed | 3449 | object identifier, followed by whitespace, then the short name followed |
3533 | by whitespace and finally the long name. | 3450 | by whitespace and finally the long name. |
3534 | .It Ar oid_section | 3451 | .It Cm oid_section |
3535 | This specifies a section in the configuration file containing extra | 3452 | Specify a section in the configuration file containing extra |
3536 | object identifiers. | 3453 | object identifiers. |
3537 | Each line should consist of the short name of the | 3454 | Each line should consist of the short name of the |
3538 | object identifier followed by | 3455 | object identifier followed by |
3539 | .Sq = | 3456 | .Sq = |
3540 | and the numerical form. | 3457 | and the numerical form. |
3541 | The short and long names are the same when this option is used. | 3458 | The short and long names are the same when this option is used. |
3542 | .It Ar prompt | 3459 | .It Cm prompt |
3543 | If set to the value | 3460 | If set to |
3544 | .Em no , | 3461 | .Qq no , |
3545 | this disables prompting of certificate fields | 3462 | it disables prompting of certificate fields |
3546 | and just takes values from the config file directly. | 3463 | and just takes values from the config file directly. |
3547 | It also changes the expected format of the | 3464 | It also changes the expected format of the |
3548 | .Em distinguished_name | 3465 | .Cm distinguished_name |
3549 | and | 3466 | and |
3550 | .Em attributes | 3467 | .Cm attributes |
3551 | sections. | 3468 | sections. |
3552 | .It Ar req_extensions | 3469 | .It Cm req_extensions |
3553 | This specifies the configuration file section containing a list of | 3470 | The configuration file section containing a list of |
3554 | extensions to add to the certificate request. | 3471 | extensions to add to the certificate request. |
3555 | It can be overridden by the | 3472 | It can be overridden by the |
3556 | .Fl reqexts | 3473 | .Fl reqexts |
3557 | command line switch. | 3474 | option. |
3558 | .It Ar string_mask | 3475 | .It Cm string_mask |
3559 | This option limits the string types for encoding certain | 3476 | Limit the string types for encoding certain fields. |
3560 | fields. | ||
3561 | The following values may be used, limiting strings to the indicated types: | 3477 | The following values may be used, limiting strings to the indicated types: |
3562 | .Bl -tag -width "MASK:number" | 3478 | .Bl -tag -width "MASK:number" |
3563 | .It Ar utf8only | 3479 | .It Cm utf8only |
3564 | .Em UTF8String. | 3480 | UTF8String. |
3565 | This is the default, as recommended by PKIX in RFC 2459. | 3481 | This is the default, as recommended by PKIX in RFC 2459. |
3566 | .It Ar default | 3482 | .It Cm default |
3567 | .Em PrintableString , IA5String , T61String , BMPString , UTF8String . | 3483 | PrintableString, IA5String, T61String, BMPString, UTF8String. |
3568 | .It Ar pkix | 3484 | .It Cm pkix |
3569 | .Em PrintableString , IA5String , BMPString , UTF8String . | 3485 | PrintableString, IA5String, BMPString, UTF8String. |
3570 | This was inspired by the PKIX recommendation in RFC 2459 for certificates | 3486 | Inspired by the PKIX recommendation in RFC 2459 for certificates |
3571 | generated before 2004, but differs by also permitting | 3487 | generated before 2004, but differs by also permitting IA5String. |
3572 | .Em IA5String . | 3488 | .It Cm nombstr |
3573 | .It Ar nombstr | 3489 | PrintableString, IA5String, T61String, UniversalString. |
3574 | .Em PrintableString , IA5String , T61String , UniversalString . | 3490 | A workaround for some ancient software that had problems |
3575 | This was a workaround for some ancient software that had problems | 3491 | with the variable-sized BMPString and UTF8String types. |
3576 | with the variable-sized | ||
3577 | .Em BMPString | ||
3578 | and | ||
3579 | .Em UTF8String | ||
3580 | types. | ||
3581 | .It Cm MASK : Ns Ar number | 3492 | .It Cm MASK : Ns Ar number |
3582 | This is an explicit bitmask of permitted types, where | 3493 | An explicit bitmask of permitted types, where |
3583 | .Ar number | 3494 | .Ar number |
3584 | is a C-style hex, decimal, or octal number that's a bit-wise OR of | 3495 | is a C-style hex, decimal, or octal number that's a bit-wise OR of |
3585 | .Dv B_ASN1_* | 3496 | .Dv B_ASN1_* |
3586 | values from | 3497 | values from |
3587 | .In openssl/asn1.h . | 3498 | .In openssl/asn1.h . |
3588 | .El | 3499 | .El |
3589 | .It Ar utf8 | 3500 | .It Cm utf8 |
3590 | If set to the value | 3501 | If set to |
3591 | .Em yes , | 3502 | .Qq yes , |
3592 | then field values are interpreted as UTF8 strings; | 3503 | field values are interpreted as UTF8 strings, not ASCII. |
3593 | by default they are interpreted as ASCII. | 3504 | .It Cm x509_extensions |
3594 | This means that the field values, whether prompted from a terminal or | 3505 | The configuration file section containing a list of |
3595 | obtained from a configuration file, must be valid UTF8 strings. | ||
3596 | .It Ar x509_extensions | ||
3597 | This specifies the configuration file section containing a list of | ||
3598 | extensions to add to a certificate generated when the | 3506 | extensions to add to a certificate generated when the |
3599 | .Fl x509 | 3507 | .Fl x509 |
3600 | switch is used. | 3508 | switch is used. |
3601 | It can be overridden by the | 3509 | It can be overridden by the |
3602 | .Fl extensions | 3510 | .Fl extensions |
3603 | command line switch. | 3511 | option. |
3604 | .El | 3512 | .El |
3605 | .Sh REQ DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT | 3513 | .Pp |
3606 | There are two separate formats for the distinguished name and attribute | 3514 | There are two separate formats for the distinguished name and attribute |
3607 | sections. | 3515 | sections. |
3608 | If the | 3516 | If the |
3609 | .Fl prompt | 3517 | .Fl prompt |
3610 | option is set to | 3518 | option is set to |
3611 | .Em no , | 3519 | .Qq no , |
3612 | then these sections just consist of field names and values: for example, | 3520 | the sections consist of just field names and values, |
3613 | .Bd -unfilled -offset indent | 3521 | which allows external programs to generate a template file |
3614 | CN=My Name | 3522 | with all the field names and values and just pass it to |
3615 | OU=My Organization | ||
3616 | emailAddress=someone@somewhere.org | ||
3617 | .Ed | ||
3618 | .Pp | ||
3619 | This allows external programs | ||
3620 | .Pq e.g. GUI based | ||
3621 | to generate a template file with all the field names and values | ||
3622 | and just pass it to | ||
3623 | .Nm req . | 3523 | .Nm req . |
3624 | An example of this kind of configuration file is contained in the | ||
3625 | .Sx REQ EXAMPLES | ||
3626 | section. | ||
3627 | .Pp | 3524 | .Pp |
3628 | Alternatively if the | 3525 | Alternatively if the |
3629 | .Fl prompt | 3526 | .Fl prompt |
3630 | option is absent or not set to | 3527 | option is absent or not set to |
3631 | .Em no , | 3528 | .Qq no , |
3632 | then the file contains field prompting information. | 3529 | then the file contains field prompting information. |
3633 | It consists of lines of the form: | 3530 | It consists of lines of the form: |
3634 | .Bd -unfilled -offset indent | 3531 | .Bd -unfilled -offset indent |
@@ -3640,8 +3537,8 @@ fieldName_max= 4 | |||
3640 | .Pp | 3537 | .Pp |
3641 | .Qq fieldName | 3538 | .Qq fieldName |
3642 | is the field name being used, for example | 3539 | is the field name being used, for example |
3643 | .Em commonName | 3540 | .Cm commonName |
3644 | .Pq or CN . | 3541 | (or CN). |
3645 | The | 3542 | The |
3646 | .Qq prompt | 3543 | .Qq prompt |
3647 | string is used to ask the user to enter the relevant details. | 3544 | string is used to ask the user to enter the relevant details. |
@@ -3653,197 +3550,72 @@ if the user just enters the | |||
3653 | character. | 3550 | character. |
3654 | .Pp | 3551 | .Pp |
3655 | The number of characters entered must be between the | 3552 | The number of characters entered must be between the |
3656 | .Em fieldName_min | 3553 | fieldName_min and fieldName_max limits: |
3657 | and | ||
3658 | .Em fieldName_max | ||
3659 | limits: | ||
3660 | there may be additional restrictions based on the field being used | 3554 | there may be additional restrictions based on the field being used |
3661 | (for example | 3555 | (for example |
3662 | .Em countryName | 3556 | .Cm countryName |
3663 | can only ever be two characters long and must fit in a | 3557 | can only ever be two characters long and must fit in a |
3664 | .Em PrintableString ) . | 3558 | .Cm PrintableString ) . |
3665 | .Pp | 3559 | .Pp |
3666 | Some fields (such as | 3560 | Some fields (such as |
3667 | .Em organizationName ) | 3561 | .Cm organizationName ) |
3668 | can be used more than once in a DN. | 3562 | can be used more than once in a DN. |
3669 | This presents a problem because configuration files will | 3563 | This presents a problem because configuration files will |
3670 | not recognize the same name occurring twice. | 3564 | not recognize the same name occurring twice. |
3671 | To avoid this problem, if the | 3565 | To avoid this problem, if the |
3672 | .Em fieldName | 3566 | .Cm fieldName |
3673 | contains some characters followed by a full stop, they will be ignored. | 3567 | contains some characters followed by a full stop, they will be ignored. |
3674 | So, for example, a second | 3568 | So, for example, a second |
3675 | .Em organizationName | 3569 | .Cm organizationName |
3676 | can be input by calling it | 3570 | can be input by calling it |
3677 | .Qq 1.organizationName . | 3571 | .Qq 1.organizationName . |
3678 | .Pp | 3572 | .Pp |
3679 | The actual permitted field names are any object identifier short or | 3573 | The actual permitted field names are any object identifier short or |
3680 | long names. | 3574 | long names. |
3681 | These are compiled into | 3575 | These are compiled into |
3682 | .Nm OpenSSL | 3576 | .Nm openssl |
3683 | and include the usual values such as | 3577 | and include the usual values such as |
3684 | .Em commonName , countryName , localityName , organizationName , | 3578 | .Cm commonName , countryName , localityName , organizationName , |
3685 | .Em organizationUnitName , stateOrProvinceName . | 3579 | .Cm organizationUnitName , stateOrProvinceName . |
3686 | Additionally, | 3580 | Additionally, |
3687 | .Em emailAddress | 3581 | .Cm emailAddress |
3688 | is included as well as | 3582 | is included as well as |
3689 | .Em name , surname , givenName initials | 3583 | .Cm name , surname , givenName , initials |
3690 | and | 3584 | and |
3691 | .Em dnQualifier . | 3585 | .Cm dnQualifier . |
3692 | .Pp | 3586 | .Pp |
3693 | Additional object identifiers can be defined with the | 3587 | Additional object identifiers can be defined with the |
3694 | .Ar oid_file | 3588 | .Cm oid_file |
3695 | or | 3589 | or |
3696 | .Ar oid_section | 3590 | .Cm oid_section |
3697 | options in the configuration file. | 3591 | options in the configuration file. |
3698 | Any additional fields will be treated as though they were a | 3592 | Any additional fields will be treated as though they were a |
3699 | .Em DirectoryString . | 3593 | .Cm DirectoryString . |
3700 | .Sh REQ EXAMPLES | ||
3701 | Examine and verify a certificate request: | ||
3702 | .Pp | ||
3703 | .Dl $ openssl req -in req.pem -text -verify -noout | ||
3704 | .Pp | ||
3705 | Create a private key and then generate a certificate request from it: | ||
3706 | .Bd -literal -offset indent | ||
3707 | $ openssl genrsa -out key.pem 2048 | ||
3708 | $ openssl req -new -key key.pem -out req.pem | ||
3709 | .Ed | ||
3710 | .Pp | ||
3711 | The same but just using req: | ||
3712 | .Pp | ||
3713 | .Dl $ openssl req -newkey rsa:2048 -keyout key.pem -out req.pem | ||
3714 | .Pp | ||
3715 | Generate a self-signed root certificate: | ||
3716 | .Pp | ||
3717 | .Dl "$ openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem" | ||
3718 | .Pp | ||
3719 | Example of a file pointed to by the | ||
3720 | .Ar oid_file | ||
3721 | option: | ||
3722 | .Bd -unfilled -offset indent | ||
3723 | 1.2.3.4 shortName A longer Name | ||
3724 | 1.2.3.6 otherName Other longer Name | ||
3725 | .Ed | ||
3726 | .Pp | ||
3727 | Example of a section pointed to by | ||
3728 | .Ar oid_section | ||
3729 | making use of variable expansion: | ||
3730 | .Bd -unfilled -offset indent | ||
3731 | testoid1=1.2.3.5 | ||
3732 | testoid2=${testoid1}.6 | ||
3733 | .Ed | ||
3734 | .Pp | 3594 | .Pp |
3735 | Sample configuration file prompting for field values: | ||
3736 | .Bd -literal | ||
3737 | \& [ req ] | ||
3738 | \& default_bits = 1024 | ||
3739 | \& default_keyfile = privkey.pem | ||
3740 | \& distinguished_name = req_distinguished_name | ||
3741 | \& attributes = req_attributes | ||
3742 | \& x509_extensions = v3_ca | ||
3743 | |||
3744 | \& dirstring_type = nobmp | ||
3745 | |||
3746 | \& [ req_distinguished_name ] | ||
3747 | \& countryName = Country Name (2 letter code) | ||
3748 | \& countryName_default = AU | ||
3749 | \& countryName_min = 2 | ||
3750 | \& countryName_max = 2 | ||
3751 | |||
3752 | \& localityName = Locality Name (eg, city) | ||
3753 | |||
3754 | \& organizationalUnitName = Organizational Unit Name (eg, section) | ||
3755 | |||
3756 | \& commonName = Common Name (eg, YOUR name) | ||
3757 | \& commonName_max = 64 | ||
3758 | |||
3759 | \& emailAddress = Email Address | ||
3760 | \& emailAddress_max = 40 | ||
3761 | |||
3762 | \& [ req_attributes ] | ||
3763 | \& challengePassword = A challenge password | ||
3764 | \& challengePassword_min = 4 | ||
3765 | \& challengePassword_max = 20 | ||
3766 | |||
3767 | \& [ v3_ca ] | ||
3768 | |||
3769 | \& subjectKeyIdentifier=hash | ||
3770 | \& authorityKeyIdentifier=keyid:always,issuer:always | ||
3771 | \& basicConstraints = CA:true | ||
3772 | .Ed | ||
3773 | .Pp | ||
3774 | Sample configuration containing all field values: | ||
3775 | .Bd -literal | ||
3776 | |||
3777 | \& [ req ] | ||
3778 | \& default_bits = 1024 | ||
3779 | \& default_keyfile = keyfile.pem | ||
3780 | \& distinguished_name = req_distinguished_name | ||
3781 | \& attributes = req_attributes | ||
3782 | \& prompt = no | ||
3783 | \& output_password = mypass | ||
3784 | |||
3785 | \& [ req_distinguished_name ] | ||
3786 | \& C = GB | ||
3787 | \& ST = Test State or Province | ||
3788 | \& L = Test Locality | ||
3789 | \& O = Organization Name | ||
3790 | \& OU = Organizational Unit Name | ||
3791 | \& CN = Common Name | ||
3792 | \& emailAddress = test@email.address | ||
3793 | |||
3794 | \& [ req_attributes ] | ||
3795 | \& challengePassword = A challenge password | ||
3796 | .Ed | ||
3797 | .Sh REQ NOTES | ||
3798 | The header and footer lines in the PEM format are normally: | 3595 | The header and footer lines in the PEM format are normally: |
3799 | .Bd -unfilled -offset indent | 3596 | .Bd -unfilled -offset indent |
3800 | -----BEGIN CERTIFICATE REQUEST----- | 3597 | -----BEGIN CERTIFICATE REQUEST----- |
3801 | -----END CERTIFICATE REQUEST----- | 3598 | -----END CERTIFICATE REQUEST----- |
3802 | .Ed | 3599 | .Ed |
3803 | .Pp | 3600 | .Pp |
3804 | Some software | 3601 | Some software instead needs: |
3805 | .Pq some versions of Netscape certificate server | ||
3806 | instead needs: | ||
3807 | .Bd -unfilled -offset indent | 3602 | .Bd -unfilled -offset indent |
3808 | -----BEGIN NEW CERTIFICATE REQUEST----- | 3603 | -----BEGIN NEW CERTIFICATE REQUEST----- |
3809 | -----END NEW CERTIFICATE REQUEST----- | 3604 | -----END NEW CERTIFICATE REQUEST----- |
3810 | .Ed | 3605 | .Ed |
3811 | .Pp | 3606 | .Pp |
3812 | which is produced with the | ||
3813 | .Fl newhdr | ||
3814 | option but is otherwise compatible. | ||
3815 | Either form is accepted transparently on input. | ||
3816 | .Pp | ||
3817 | The certificate requests generated by Xenroll with MSIE have extensions added. | ||
3818 | It includes the | ||
3819 | .Em keyUsage | ||
3820 | extension which determines the type of key | ||
3821 | .Pq signature only or general purpose | ||
3822 | and any additional OIDs entered by the script in an | ||
3823 | .Em extendedKeyUsage | ||
3824 | extension. | ||
3825 | .Sh REQ DIAGNOSTICS | ||
3826 | The following messages are frequently asked about: | 3607 | The following messages are frequently asked about: |
3827 | .Bd -unfilled -offset indent | 3608 | .Bd -unfilled -offset indent |
3828 | Using configuration from /some/path/openssl.cnf | 3609 | Using configuration from /some/path/openssl.cnf |
3829 | Unable to load config info | 3610 | Unable to load config info |
3830 | .Ed | 3611 | \&... |
3831 | .Pp | ||
3832 | This is followed some time later by... | ||
3833 | .Bd -unfilled -offset indent | ||
3834 | unable to find 'distinguished_name' in config | 3612 | unable to find 'distinguished_name' in config |
3835 | problems making Certificate Request | 3613 | problems making Certificate Request |
3836 | .Ed | 3614 | .Ed |
3837 | .Pp | 3615 | .Pp |
3838 | The first error message is the clue: it can't find the configuration | 3616 | In this case it can't find the configuration file! |
3839 | file! | ||
3840 | Certain operations | ||
3841 | .Pq like examining a certificate request | ||
3842 | don't need a configuration file so its use isn't enforced. | ||
3843 | Generation of certificates or requests, however, do need a configuration file. | ||
3844 | This could be regarded as a bug. | ||
3845 | .Pp | 3617 | .Pp |
3846 | Another puzzling message is this: | 3618 | Another puzzling message is: |
3847 | .Bd -unfilled -offset indent | 3619 | .Bd -unfilled -offset indent |
3848 | Attributes: | 3620 | Attributes: |
3849 | a0:00 | 3621 | a0:00 |
@@ -3851,51 +3623,16 @@ Attributes: | |||
3851 | .Pp | 3623 | .Pp |
3852 | This is displayed when no attributes are present and the request includes | 3624 | This is displayed when no attributes are present and the request includes |
3853 | the correct empty SET OF structure | 3625 | the correct empty SET OF structure |
3854 | .Pq the DER encoding of which is 0xa0 0x00 . | 3626 | (the DER encoding of which is 0xa0 0x00). |
3855 | If you just see: | 3627 | If the message is instead: |
3856 | .Pp | 3628 | .Pp |
3857 | .D1 Attributes: | 3629 | .D1 Attributes: |
3858 | .Pp | 3630 | .Pp |
3859 | then the SET OF is missing and the encoding is technically invalid | 3631 | then the SET OF is missing and the encoding is technically invalid |
3860 | .Pq but it is tolerated . | 3632 | (but it is tolerated). |
3861 | See the description of the command line option | 3633 | See the description |
3862 | .Fl asn1-kludge | 3634 | .Fl asn1-kludge |
3863 | for more information. | 3635 | for more information. |
3864 | .Sh REQ ENVIRONMENT VARIABLES | ||
3865 | The variable | ||
3866 | .Ev OPENSSL_CONF , | ||
3867 | if defined, allows an alternative configuration | ||
3868 | file location to be specified; it will be overridden by the | ||
3869 | .Fl config | ||
3870 | command line switch if it is present. | ||
3871 | .Sh REQ BUGS | ||
3872 | .Nm OpenSSL Ns Li 's | ||
3873 | handling of T61Strings | ||
3874 | .Pq aka TeletexStrings | ||
3875 | is broken: it effectively treats them as ISO 8859-1 | ||
3876 | .Pq Latin 1 ; | ||
3877 | Netscape and MSIE have similar behaviour. | ||
3878 | This can cause problems if you need characters that aren't available in | ||
3879 | .Em PrintableStrings | ||
3880 | and you don't want to or can't use | ||
3881 | .Em BMPStrings . | ||
3882 | .Pp | ||
3883 | As a consequence of the T61String handling, the only correct way to represent | ||
3884 | accented characters in | ||
3885 | .Nm OpenSSL | ||
3886 | is to use a | ||
3887 | .Em BMPString : | ||
3888 | unfortunately Netscape currently chokes on these. | ||
3889 | If you have to use accented characters with Netscape | ||
3890 | and MSIE then you currently need to use the invalid T61String form. | ||
3891 | .Pp | ||
3892 | The current prompting is not very friendly. | ||
3893 | It doesn't allow you to confirm what you've just entered. | ||
3894 | Other things, like extensions in certificate requests, are | ||
3895 | statically defined in the configuration file. | ||
3896 | Some of these, like an email address in | ||
3897 | .Em subjectAltName , | ||
3898 | should be input by the user. | ||
3899 | .\" | 3636 | .\" |
3900 | .\" RSA | 3637 | .\" RSA |
3901 | .\" | 3638 | .\" |