diff options
author | jmc <> | 2004-05-27 09:08:41 +0000 |
---|---|---|
committer | jmc <> | 2004-05-27 09:08:41 +0000 |
commit | b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59 (patch) | |
tree | f8611c686413d3b8f88fc2cec873e6399e06a7ed /src | |
parent | 7455a413fe887c060539c823b908a490bc474192 (diff) | |
download | openbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.tar.gz openbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.tar.bz2 openbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.zip |
some updates for openssl smime;
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.sbin/openssl/openssl.1 | 404 |
1 files changed, 207 insertions, 197 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1 index dae9664448..9e75520f76 100644 --- a/src/usr.sbin/openssl/openssl.1 +++ b/src/usr.sbin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.42 2004/04/19 12:25:41 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.43 2004/05/27 09:08:41 jmc Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -585,7 +585,7 @@ There should be options to change the format of input lines. | |||
585 | The output of some ASN.1 types is not well handled | 585 | The output of some ASN.1 types is not well handled |
586 | .Pq if at all . | 586 | .Pq if at all . |
587 | .\" | 587 | .\" |
588 | .\" ca | 588 | .\" CA |
589 | .\" | 589 | .\" |
590 | .Sh CA | 590 | .Sh CA |
591 | .Nm openssl ca | 591 | .Nm openssl ca |
@@ -616,7 +616,7 @@ The output of some ASN.1 types is not well handled | |||
616 | .Op Fl in Ar file | 616 | .Op Fl in Ar file |
617 | .Op Fl key Ar keyfile | 617 | .Op Fl key Ar keyfile |
618 | .Op Fl keyfile Ar arg | 618 | .Op Fl keyfile Ar arg |
619 | .Op Fl keyform Ar PEM | ENGINE | 619 | .Op Fl keyform Ar ENGINE | PEM |
620 | .Op Fl md Ar arg | 620 | .Op Fl md Ar arg |
621 | .Op Fl name Ar section | 621 | .Op Fl name Ar section |
622 | .Op Fl out Ar file | 622 | .Op Fl out Ar file |
@@ -698,7 +698,7 @@ with the | |||
698 | utility) this option should be used with caution. | 698 | utility) this option should be used with caution. |
699 | .It Fl keyfile Ar file | 699 | .It Fl keyfile Ar file |
700 | The private key to sign requests with. | 700 | The private key to sign requests with. |
701 | .It Fl keyform Ar PEM | ENGINE | 701 | .It Fl keyform Ar ENGINE | PEM |
702 | Private key file format. | 702 | Private key file format. |
703 | .It Fl md Ar alg | 703 | .It Fl md Ar alg |
704 | The message digest to use. | 704 | The message digest to use. |
@@ -1672,7 +1672,7 @@ and | |||
1672 | .Ar COMPLEMENTOFDEFAULT | 1672 | .Ar COMPLEMENTOFDEFAULT |
1673 | selection options were added in version 0.9.7. | 1673 | selection options were added in version 0.9.7. |
1674 | .\" | 1674 | .\" |
1675 | .\" crl | 1675 | .\" CRL |
1676 | .\" | 1676 | .\" |
1677 | .Sh CRL | 1677 | .Sh CRL |
1678 | .Nm openssl crl | 1678 | .Nm openssl crl |
@@ -1857,7 +1857,7 @@ install user certificates and CAs in MSIE using the Xenroll control. | |||
1857 | .Op Fl d | 1857 | .Op Fl d |
1858 | .Op Fl hex | 1858 | .Op Fl hex |
1859 | .Op Fl engine Ar id | 1859 | .Op Fl engine Ar id |
1860 | .Op Fl keyform Ar PEM | ENGINE | 1860 | .Op Fl keyform Ar ENGINE | PEM |
1861 | .Op Fl out Ar file | 1861 | .Op Fl out Ar file |
1862 | .Op Fl prverify Ar file | 1862 | .Op Fl prverify Ar file |
1863 | .Op Fl rand Ar file ... | 1863 | .Op Fl rand Ar file ... |
@@ -1906,7 +1906,7 @@ Digest is to be output as a hex dump. | |||
1906 | This is the default case for a | 1906 | This is the default case for a |
1907 | .Qq normal | 1907 | .Qq normal |
1908 | digest as opposed to a digital signature. | 1908 | digest as opposed to a digital signature. |
1909 | .It Fl keyform Ar PEM | ENGINE | 1909 | .It Fl keyform Ar ENGINE | PEM |
1910 | Key file format. | 1910 | Key file format. |
1911 | .It Fl out Ar file | 1911 | .It Fl out Ar file |
1912 | file to output to, or standard output by default. | 1912 | file to output to, or standard output by default. |
@@ -6267,45 +6267,45 @@ The cipher and start time should be printed out in human readable form. | |||
6267 | .Sh SMIME | 6267 | .Sh SMIME |
6268 | .Nm openssl smime | 6268 | .Nm openssl smime |
6269 | .Bk -words | 6269 | .Bk -words |
6270 | .Op Fl encrypt | ||
6271 | .Op Fl decrypt | ||
6272 | .Op Fl sign | ||
6273 | .Op Fl verify | ||
6274 | .Op Fl pk7out | ||
6275 | .Oo Xo | 6270 | .Oo Xo |
6276 | .Fl des | des3 | rc2-40 | rc2-64 | | 6271 | .Fl aes128 | aes192 | aes256 | des | |
6277 | .Fl rc2-128 | aes128 | aes192 | aes256 | 6272 | .Fl des3 | rc2-40 | rc2-64 | rcs-128 |
6278 | .Xc | 6273 | .Xc |
6279 | .Oc | 6274 | .Oc |
6280 | .Op Fl nointern | ||
6281 | .Op Fl noverify | ||
6282 | .Op Fl nochain | ||
6283 | .Op Fl nosigs | ||
6284 | .Op Fl nocerts | ||
6285 | .Op Fl noattr | ||
6286 | .Op Fl binary | 6275 | .Op Fl binary |
6276 | .Op Fl crl_check | ||
6277 | .Op Fl crl_check_all | ||
6278 | .Op Fl decrypt | ||
6279 | .Op Fl encrypt | ||
6280 | .Op Fl noattr | ||
6281 | .Op Fl nocerts | ||
6282 | .Op Fl nochain | ||
6287 | .Op Fl nodetach | 6283 | .Op Fl nodetach |
6288 | .Op Fl in Ar file | 6284 | .Op Fl nointern |
6289 | .Op Fl certfile Ar file | 6285 | .Op Fl nosigs |
6290 | .Op Fl signer Ar file | 6286 | .Op Fl noverify |
6291 | .Op Fl recip Ar file | 6287 | .Op Fl pk7out |
6292 | .Op Fl inform Ar SMIME | DER | PEM | 6288 | .Op Fl sign |
6293 | .Op Fl passin Ar arg | ||
6294 | .Op Fl inkey Ar file | ||
6295 | .Op Fl keyform Ar PEM | ENGINE | ||
6296 | .Op Fl out Ar file | ||
6297 | .Op Fl outform Ar SMIME | DER | PEM | ||
6298 | .Op Fl content Ar file | ||
6299 | .Op Fl to Ar addr | ||
6300 | .Op Fl from Ar addr | ||
6301 | .Op Fl subject Ar s | ||
6302 | .Op Fl text | 6289 | .Op Fl text |
6290 | .Op Fl verify | ||
6303 | .Op Fl CAfile Ar file | 6291 | .Op Fl CAfile Ar file |
6304 | .Op Fl CApath Ar directory | 6292 | .Op Fl CApath Ar directory |
6305 | .Op Fl crl_check | 6293 | .Op Fl certfile Ar file |
6306 | .Op Fl crl_check_all | 6294 | .Op Fl content Ar file |
6307 | .Op Fl engine Ar id | 6295 | .Op Fl engine Ar id |
6296 | .Op Fl from Ar addr | ||
6297 | .Op Fl in Ar file | ||
6298 | .Op Fl inform Ar DER | PEM | SMIME | ||
6299 | .Op Fl inkey Ar file | ||
6300 | .Op Fl keyform Ar ENGINE | PEM | ||
6301 | .Op Fl out Ar file | ||
6302 | .Op Fl outform Ar DER | PEM | SMIME | ||
6303 | .Op Fl passin Ar arg | ||
6308 | .Op Fl rand Ar file ... | 6304 | .Op Fl rand Ar file ... |
6305 | .Op Fl recip Ar file | ||
6306 | .Op Fl signer Ar file | ||
6307 | .Op Fl subject Ar s | ||
6308 | .Op Fl to Ar addr | ||
6309 | .Op Ar cert.pem ... | 6309 | .Op Ar cert.pem ... |
6310 | .Ek | 6310 | .Ek |
6311 | .Pp | 6311 | .Pp |
@@ -6314,27 +6314,29 @@ The | |||
6314 | command handles | 6314 | command handles |
6315 | .Em S/MIME | 6315 | .Em S/MIME |
6316 | mail. | 6316 | mail. |
6317 | It can encrypt, decrypt, sign and verify | 6317 | It can encrypt, decrypt, sign, and verify |
6318 | .Em S/MIME | 6318 | .Em S/MIME |
6319 | messages. | 6319 | messages. |
6320 | .Pp | 6320 | .Pp |
6321 | There are five operation options that set the type of operation to be performed. | 6321 | There are five operation options that set the type of operation to be performed. |
6322 | The meaning of the other options varies according to the operation type. | 6322 | The meaning of the other options varies according to the operation type. |
6323 | .Pp | 6323 | .Pp |
6324 | The options are as follows: | 6324 | The five operation options are as follows: |
6325 | .Bl -tag -width "XXXX" | 6325 | .Bl -tag -width "XXXX" |
6326 | .It Fl encrypt | ||
6327 | Encrypt mail for the given recipient certificates. | ||
6328 | Input file is the message to be encrypted. | ||
6329 | The output file is the encrypted mail in | ||
6330 | .Em MIME | ||
6331 | format. | ||
6332 | .It Fl decrypt | 6326 | .It Fl decrypt |
6333 | Decrypt mail using the supplied certificate and private key. | 6327 | Decrypt mail using the supplied certificate and private key. |
6334 | Expects an encrypted mail message in | 6328 | Expects an encrypted mail message in |
6335 | .Em MIME | 6329 | .Em MIME |
6336 | format for the input file. | 6330 | format for the input file. |
6337 | The decrypted mail is written to the output file. | 6331 | The decrypted mail is written to the output file. |
6332 | .It Fl encrypt | ||
6333 | Encrypt mail for the given recipient certificates. | ||
6334 | Input file is the message to be encrypted. | ||
6335 | The output file is the encrypted mail in | ||
6336 | .Em MIME | ||
6337 | format. | ||
6338 | .It Fl pk7out | ||
6339 | Takes an input message and writes out a PEM-encoded PKCS#7 structure. | ||
6338 | .It Fl sign | 6340 | .It Fl sign |
6339 | Sign mail using the supplied certificate and private key. | 6341 | Sign mail using the supplied certificate and private key. |
6340 | Input file is the message to be signed. | 6342 | Input file is the message to be signed. |
@@ -6345,17 +6347,104 @@ format is written to the output file. | |||
6345 | Verify signed mail. | 6347 | Verify signed mail. |
6346 | Expects a signed mail message on input and outputs the signed data. | 6348 | Expects a signed mail message on input and outputs the signed data. |
6347 | Both clear text and opaque signing is supported. | 6349 | Both clear text and opaque signing is supported. |
6348 | .It Fl pk7out | 6350 | .El |
6349 | Takes an input message and writes out a PEM-encoded PKCS#7 structure. | 6351 | .Pp |
6352 | The reamaining options are as follows: | ||
6353 | .Bl -tag -width "XXXX" | ||
6354 | .It Xo | ||
6355 | .Fl aes128 | aes192 | aes256 | des | | ||
6356 | .Fl des3 | rc2-40 | rc2-64 | rc2-128 | ||
6357 | .Xc | ||
6358 | The encryption algorithm to use. | ||
6359 | 128-, 192-, or 256-bit AES, | ||
6360 | DES | ||
6361 | .Pq 56 bits , | ||
6362 | triple DES | ||
6363 | .Pq 168 bits , | ||
6364 | or 40-, 64-, or 128-bit RC2, respectively; | ||
6365 | if not specified, 40-bit RC2 is | ||
6366 | used. | ||
6367 | Only used with | ||
6368 | .Fl encrypt . | ||
6369 | .It Fl binary | ||
6370 | Normally, the input message is converted to | ||
6371 | .Qq canonical | ||
6372 | format which is effectively using CR and LF as end of line \- | ||
6373 | as required by the | ||
6374 | .Em S/MIME | ||
6375 | specification. | ||
6376 | When this option is present no translation occurs. | ||
6377 | This is useful when handling binary data which may not be in | ||
6378 | .Em MIME | ||
6379 | format. | ||
6380 | .It Fl CAfile Ar file | ||
6381 | A | ||
6382 | .Ar file | ||
6383 | containing trusted CA certificates; only used with | ||
6384 | .Fl verify . | ||
6385 | .It Fl CApath Ar directory | ||
6386 | A | ||
6387 | .Ar directory | ||
6388 | containing trusted CA certificates; only used with | ||
6389 | .Fl verify . | ||
6390 | This directory must be a standard certificate directory: | ||
6391 | that is, a hash of each subject name (using | ||
6392 | .Nm x509 -hash ) | ||
6393 | should be linked to each certificate. | ||
6394 | .It Ar cert.pem ... | ||
6395 | One or more certificates of message recipients: used when encrypting | ||
6396 | a message. | ||
6397 | .It Fl certfile Ar file | ||
6398 | Allows additional certificates to be specified. | ||
6399 | When signing, these will be included with the message. | ||
6400 | When verifying, these will be searched for the signers' certificates. | ||
6401 | The certificates should be in PEM format. | ||
6402 | .It Fl content Ar file | ||
6403 | This specifies a file containing the detached content. | ||
6404 | This is only useful with the | ||
6405 | .Fl verify | ||
6406 | command. | ||
6407 | This is only usable if the PKCS#7 structure is using the detached | ||
6408 | signature form where the content is not included. | ||
6409 | This option will override any content if the input format is | ||
6410 | .Em S/MIME | ||
6411 | and it uses the multipart/signed | ||
6412 | .Em MIME | ||
6413 | content type. | ||
6414 | .It Fl crl_check | ||
6415 | Check revocation status of signer's certificate using CRLs. | ||
6416 | .It Fl crl_check_all | ||
6417 | Check revocation status of signer's certificate chain using CRLs. | ||
6418 | .It Fl engine Ar id | ||
6419 | Specifying an engine (by it's unique | ||
6420 | .Ar id | ||
6421 | string) will cause | ||
6422 | .Nm smime | ||
6423 | to attempt to obtain a functional reference to the specified engine, | ||
6424 | thus initialising it if needed. | ||
6425 | The engine will then be set as the default | ||
6426 | for all available algorithms. | ||
6427 | .It Xo | ||
6428 | .Fl from Ar addr , | ||
6429 | .Fl subject Ar s , | ||
6430 | .Fl to Ar addr | ||
6431 | .Xc | ||
6432 | The relevant mail headers. | ||
6433 | These are included outside the signed | ||
6434 | portion of a message so they may be included manually. | ||
6435 | When signing, many | ||
6436 | .Em S/MIME | ||
6437 | mail clients check that the signer's certificate email | ||
6438 | address matches the From: address. | ||
6350 | .It Fl in Ar file | 6439 | .It Fl in Ar file |
6351 | The input message to be encrypted or signed or the | 6440 | The input message to be encrypted or signed or the |
6352 | .Em MIME | 6441 | .Em MIME |
6353 | message to | 6442 | message to |
6354 | be decrypted or verified. | 6443 | be decrypted or verified. |
6355 | .It Fl inform Ar SMIME | DER | PEM | 6444 | .It Fl inform Ar DER | PEM | SMIME |
6356 | This specifies the input format for the PKCS#7 structure. | 6445 | This specifies the input format for the PKCS#7 structure. |
6357 | The default is | 6446 | The default is |
6358 | .Em SMIME | 6447 | .Em SMIME , |
6359 | which reads an | 6448 | which reads an |
6360 | .Em S/MIME | 6449 | .Em S/MIME |
6361 | format message. | 6450 | format message. |
@@ -6370,14 +6459,60 @@ structure; if no PKCS#7 structure is being input (for example with | |||
6370 | or | 6459 | or |
6371 | .Fl sign ) , | 6460 | .Fl sign ) , |
6372 | this option has no effect. | 6461 | this option has no effect. |
6462 | .It Fl inkey Ar file | ||
6463 | The private key to use when signing or decrypting. | ||
6464 | This must match the corresponding certificate. | ||
6465 | If this option is not specified, the private key must be included | ||
6466 | in the certificate file specified with | ||
6467 | the | ||
6468 | .Fl recip | ||
6469 | or | ||
6470 | .Fl signer | ||
6471 | file. | ||
6472 | .It Fl keyform Ar ENGINE | PEM | ||
6473 | Input private key format. | ||
6474 | .It Fl noattr | ||
6475 | Normally, when a message is signed a set of attributes are included which | ||
6476 | include the signing time and supported symmetric algorithms. | ||
6477 | With this option they are not included. | ||
6478 | .It Fl nocerts | ||
6479 | When signing a message, the signer's certificate is normally included; | ||
6480 | with this option it is excluded. | ||
6481 | This will reduce the size of the signed message but the verifier must | ||
6482 | have a copy of the signer's certificate available locally (passed using the | ||
6483 | .Fl certfile | ||
6484 | option, for example). | ||
6485 | .It Fl nochain | ||
6486 | Do not do chain verification of signers' certificates: that is, | ||
6487 | don't use the certificates in the signed message as untrusted CAs. | ||
6488 | .It Fl nodetach | ||
6489 | When signing a message use opaque signing: this form is more resistant | ||
6490 | to translation by mail relays but it cannot be read by mail agents that | ||
6491 | do not support | ||
6492 | .Em S/MIME . | ||
6493 | Without this option cleartext signing with the | ||
6494 | .Em MIME | ||
6495 | type multipart/signed is used. | ||
6496 | .It Fl nointern | ||
6497 | When verifying a message, normally certificates | ||
6498 | .Pq if any | ||
6499 | included in the message are searched for the signing certificate. | ||
6500 | With this option, only the certificates specified in the | ||
6501 | .Fl certfile | ||
6502 | option are used. | ||
6503 | The supplied certificates can still be used as untrusted CAs however. | ||
6504 | .It Fl nosigs | ||
6505 | Don't try to verify the signatures on the message. | ||
6506 | .It Fl noverify | ||
6507 | Do not verify the signer's certificate of a signed message. | ||
6373 | .It Fl out Ar file | 6508 | .It Fl out Ar file |
6374 | The message text that has been decrypted or verified, or the output | 6509 | The message text that has been decrypted or verified, or the output |
6375 | .Em MIME | 6510 | .Em MIME |
6376 | format message that has been signed or verified. | 6511 | format message that has been signed or verified. |
6377 | .It Fl outform Ar SMIME | DER | PEM | 6512 | .It Fl outform Ar DER | PEM | SMIME |
6378 | This specifies the output format for the PKCS#7 structure. | 6513 | This specifies the output format for the PKCS#7 structure. |
6379 | The default is | 6514 | The default is |
6380 | .Em SMIME | 6515 | .Em SMIME , |
6381 | which writes an | 6516 | which writes an |
6382 | .Em S/MIME | 6517 | .Em S/MIME |
6383 | format message. | 6518 | format message. |
@@ -6392,124 +6527,6 @@ structure; if no PKCS#7 structure is being output (for example with | |||
6392 | or | 6527 | or |
6393 | .Fl decrypt ) | 6528 | .Fl decrypt ) |
6394 | this option has no effect. | 6529 | this option has no effect. |
6395 | .It Fl content Ar file | ||
6396 | This specifies a file containing the detached content. | ||
6397 | This is only useful with the | ||
6398 | .Fl verify | ||
6399 | command. | ||
6400 | This is only usable if the PKCS#7 structure is using the detached | ||
6401 | signature form where the content is not included. | ||
6402 | This option will override any content if the input format is | ||
6403 | .Em S/MIME | ||
6404 | and it uses the multipart/signed | ||
6405 | .Em MIME | ||
6406 | content type. | ||
6407 | .It Fl text | ||
6408 | This option adds plain text | ||
6409 | .Pq text/plain | ||
6410 | .Em MIME | ||
6411 | headers to the supplied message if encrypting or signing. | ||
6412 | If decrypting or verifying it strips off text headers: | ||
6413 | if the decrypted or verified message is not of | ||
6414 | .Em MIME | ||
6415 | type text/plain then an error occurs. | ||
6416 | .It Fl CAfile Ar file | ||
6417 | A | ||
6418 | .Ar file | ||
6419 | containing trusted CA certificates; only used with | ||
6420 | .Fl verify . | ||
6421 | .It Fl CApath Ar directory | ||
6422 | A | ||
6423 | .Ar directory | ||
6424 | containing trusted CA certificates; only used with | ||
6425 | .Fl verify . | ||
6426 | This directory must be a standard certificate directory; | ||
6427 | that is, a hash of each subject name (using | ||
6428 | .Nm x509 -hash ) | ||
6429 | should be linked to each certificate. | ||
6430 | .It Xo | ||
6431 | .Fl des | des3 | rc2-40 | rc2-64 | | ||
6432 | .Fl rc2-128 | aes128 | aes192 | aes256 | ||
6433 | .Xc | ||
6434 | The encryption algorithm to use. | ||
6435 | DES | ||
6436 | .Pq 56 bits , | ||
6437 | triple DES | ||
6438 | .Pq 168 bits , | ||
6439 | 40-, 64-, or 128-bit RC2, or 128-, 192-, or 256-bit AES, respectively; | ||
6440 | if not specified, 40-bit RC2 is | ||
6441 | used. | ||
6442 | Only used with | ||
6443 | .Fl encrypt . | ||
6444 | .It Fl nointern | ||
6445 | When verifying a message, normally certificates | ||
6446 | .Pq if any | ||
6447 | included in the message are searched for the signing certificate. | ||
6448 | With this option, only the certificates specified in the | ||
6449 | .Fl certfile | ||
6450 | option are used. | ||
6451 | The supplied certificates can still be used as untrusted CAs however. | ||
6452 | .It Fl noverify | ||
6453 | Do not verify the signer's certificate of a signed message. | ||
6454 | .It Fl nochain | ||
6455 | Do not do chain verification of signers' certificates: that is, | ||
6456 | don't use the certificates in the signed message as untrusted CAs. | ||
6457 | .It Fl nosigs | ||
6458 | Don't try to verify the signatures on the message. | ||
6459 | .It Fl nocerts | ||
6460 | When signing a message, the signer's certificate is normally included; | ||
6461 | with this option it is excluded. | ||
6462 | This will reduce the size of the signed message but the verifier must | ||
6463 | have a copy of the signer's certificate available locally (passed using the | ||
6464 | .Fl certfile | ||
6465 | option, for example). | ||
6466 | .It Fl noattr | ||
6467 | Normally, when a message is signed a set of attributes are included which | ||
6468 | include the signing time and supported symmetric algorithms. | ||
6469 | With this option they are not included. | ||
6470 | .It Fl binary | ||
6471 | Normally, the input message is converted to | ||
6472 | .Qq canonical | ||
6473 | format which is effectively using CR and LF as end of line: as required by the | ||
6474 | .Em S/MIME | ||
6475 | specification. | ||
6476 | When this option is present no translation occurs. | ||
6477 | This is useful when handling binary data which may not be in | ||
6478 | .Em MIME | ||
6479 | format. | ||
6480 | .It Fl nodetach | ||
6481 | When signing a message use opaque signing: this form is more resistant | ||
6482 | to translation by mail relays but it cannot be read by mail agents that | ||
6483 | do not support | ||
6484 | .Em S/MIME . | ||
6485 | Without this option cleartext signing with the | ||
6486 | .Em MIME | ||
6487 | type multipart/signed is used. | ||
6488 | .It Fl certfile Ar file | ||
6489 | Allows additional certificates to be specified. | ||
6490 | When signing these will be included with the message. | ||
6491 | When verifying these will be searched for the signers' certificates. | ||
6492 | The certificates should be in PEM format. | ||
6493 | .It Fl signer Ar file | ||
6494 | The signer's certificate when signing a message. | ||
6495 | If a message is being verified, the signer's certificates will be | ||
6496 | written to this file if the verification was successful. | ||
6497 | .It Fl recip Ar file | ||
6498 | The recipients certificate when decrypting a message. | ||
6499 | This certificate | ||
6500 | must match one of the recipients of the message or an error occurs. | ||
6501 | .It Fl inkey Ar file | ||
6502 | The private key to use when signing or decrypting. | ||
6503 | This must match the corresponding certificate. | ||
6504 | If this option is not specified, the private key must be included | ||
6505 | in the certificate file specified with | ||
6506 | the | ||
6507 | .Fl recip | ||
6508 | or | ||
6509 | .Fl signer | ||
6510 | file. | ||
6511 | .It Fl keyform Ar PEM | ENGINE | ||
6512 | Input private key format. | ||
6513 | .It Fl passin Ar arg | 6530 | .It Fl passin Ar arg |
6514 | The private key password source. | 6531 | The private key password source. |
6515 | For more information about the format of | 6532 | For more information about the format of |
@@ -6517,19 +6534,6 @@ For more information about the format of | |||
6517 | see the | 6534 | see the |
6518 | .Sx PASS PHRASE ARGUMENTS | 6535 | .Sx PASS PHRASE ARGUMENTS |
6519 | section above. | 6536 | section above. |
6520 | .It Fl crl_check | ||
6521 | Check revocation status of signer's certificate using CRLs. | ||
6522 | .It Fl crl_check_all | ||
6523 | Check revocation status of signer's certificate chain using CRLs. | ||
6524 | .It Fl engine Ar id | ||
6525 | Specifying an engine (by it's unique | ||
6526 | .Ar id | ||
6527 | string) will cause | ||
6528 | .Nm smime | ||
6529 | to attempt to obtain a functional reference to the specified engine, | ||
6530 | thus initialising it if needed. | ||
6531 | The engine will then be set as the default | ||
6532 | for all available algorithms. | ||
6533 | .It Fl rand Ar file ... | 6537 | .It Fl rand Ar file ... |
6534 | A file or files | 6538 | A file or files |
6535 | containing random data used to seed the random number generator, | 6539 | containing random data used to seed the random number generator, |
@@ -6537,17 +6541,23 @@ or an EGD socket (see | |||
6537 | .Xr RAND_egd 3 ) . | 6541 | .Xr RAND_egd 3 ) . |
6538 | Multiple files can be specified separated by a | 6542 | Multiple files can be specified separated by a |
6539 | .Sq \&: . | 6543 | .Sq \&: . |
6540 | .It Ar cert.pem ... | 6544 | .It Fl recip Ar file |
6541 | One or more certificates of message recipients: used when encrypting | 6545 | The recipients certificate when decrypting a message. |
6542 | a message. | 6546 | This certificate |
6543 | .It Fl to , from , subject | 6547 | must match one of the recipients of the message or an error occurs. |
6544 | The relevant mail headers. | 6548 | .It Fl signer Ar file |
6545 | These are included outside the signed | 6549 | The signer's certificate when signing a message. |
6546 | portion of a message so they may be included manually. | 6550 | If a message is being verified, the signer's certificates will be |
6547 | When signing, many | 6551 | written to this file if the verification was successful. |
6548 | .Em S/MIME | 6552 | .It Fl text |
6549 | mail clients check the signer's certificate email | 6553 | This option adds plain text |
6550 | address matches that specified in the From: address. | 6554 | .Pq text/plain |
6555 | .Em MIME | ||
6556 | headers to the supplied message if encrypting or signing. | ||
6557 | If decrypting or verifying, it strips off text headers: | ||
6558 | if the decrypted or verified message is not of | ||
6559 | .Em MIME | ||
6560 | type text/plain then an error occurs. | ||
6551 | .El | 6561 | .El |
6552 | .Sh SMIME NOTES | 6562 | .Sh SMIME NOTES |
6553 | The | 6563 | The |
@@ -6654,7 +6664,7 @@ Send encrypted mail using triple DES: | |||
6654 | .Bd -literal -offset indent | 6664 | .Bd -literal -offset indent |
6655 | $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e | 6665 | $ openssl smime -encrypt -in in.txt -from steve@openssl.org \e |
6656 | -to someone@somewhere -subject "Encrypted message" \e | 6666 | -to someone@somewhere -subject "Encrypted message" \e |
6657 | -des3 user.pem -out mail.msg | 6667 | -des3 -out mail.msg user.pem |
6658 | .Ed | 6668 | .Ed |
6659 | .Pp | 6669 | .Pp |
6660 | Sign and encrypt mail: | 6670 | Sign and encrypt mail: |
@@ -7318,8 +7328,8 @@ option was added in | |||
7318 | .Sh X509 | 7328 | .Sh X509 |
7319 | .Nm openssl x509 | 7329 | .Nm openssl x509 |
7320 | .Bk -words | 7330 | .Bk -words |
7321 | .Op Fl inform Ar DER | PEM | NET | 7331 | .Op Fl inform Ar DER | NET | PEM |
7322 | .Op Fl outform Ar DER | PEM | NET | 7332 | .Op Fl outform Ar DER | NET | PEM |
7323 | .Op Fl keyform Ar DER | PEM | 7333 | .Op Fl keyform Ar DER | PEM |
7324 | .Op Fl CAform Ar DER | PEM | 7334 | .Op Fl CAform Ar DER | PEM |
7325 | .Op Fl CAkeyform Ar DER | PEM | 7335 | .Op Fl CAkeyform Ar DER | PEM |
@@ -7379,7 +7389,7 @@ Since there are a large number of options, they are split up into | |||
7379 | various sections. | 7389 | various sections. |
7380 | .Sh X509 INPUT, OUTPUT, AND GENERAL PURPOSE OPTIONS | 7390 | .Sh X509 INPUT, OUTPUT, AND GENERAL PURPOSE OPTIONS |
7381 | .Bl -tag -width "XXXX" | 7391 | .Bl -tag -width "XXXX" |
7382 | .It Fl inform Ar DER | PEM | NET | 7392 | .It Fl inform Ar DER | NET | PEM |
7383 | This specifies the input format. | 7393 | This specifies the input format. |
7384 | Normally, the command will expect an X509 certificate, | 7394 | Normally, the command will expect an X509 certificate, |
7385 | but this can change if other options such as | 7395 | but this can change if other options such as |
@@ -7394,7 +7404,7 @@ The | |||
7394 | .Ar NET | 7404 | .Ar NET |
7395 | option is an obscure Netscape server format that is now | 7405 | option is an obscure Netscape server format that is now |
7396 | obsolete. | 7406 | obsolete. |
7397 | .It Fl outform Ar DER | PEM | NET | 7407 | .It Fl outform Ar DER | NET | PEM |
7398 | This specifies the output format; the options have the same meaning as the | 7408 | This specifies the output format; the options have the same meaning as the |
7399 | .Fl inform | 7409 | .Fl inform |
7400 | option. | 7410 | option. |