summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2004-05-27 09:08:41 +0000
committerjmc <>2004-05-27 09:08:41 +0000
commitb449c9c2c7deee8a634ff1c3c2a9d33d0756fb59 (patch)
treef8611c686413d3b8f88fc2cec873e6399e06a7ed /src
parent7455a413fe887c060539c823b908a490bc474192 (diff)
downloadopenbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.tar.gz
openbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.tar.bz2
openbsd-b449c9c2c7deee8a634ff1c3c2a9d33d0756fb59.zip
some updates for openssl smime;
Diffstat (limited to 'src')
-rw-r--r--src/usr.sbin/openssl/openssl.1404
1 files changed, 207 insertions, 197 deletions
diff --git a/src/usr.sbin/openssl/openssl.1 b/src/usr.sbin/openssl/openssl.1
index dae9664448..9e75520f76 100644
--- a/src/usr.sbin/openssl/openssl.1
+++ b/src/usr.sbin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.42 2004/04/19 12:25:41 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.43 2004/05/27 09:08:41 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -585,7 +585,7 @@ There should be options to change the format of input lines.
585The output of some ASN.1 types is not well handled 585The output of some ASN.1 types is not well handled
586.Pq if at all . 586.Pq if at all .
587.\" 587.\"
588.\" ca 588.\" CA
589.\" 589.\"
590.Sh CA 590.Sh CA
591.Nm openssl ca 591.Nm openssl ca
@@ -616,7 +616,7 @@ The output of some ASN.1 types is not well handled
616.Op Fl in Ar file 616.Op Fl in Ar file
617.Op Fl key Ar keyfile 617.Op Fl key Ar keyfile
618.Op Fl keyfile Ar arg 618.Op Fl keyfile Ar arg
619.Op Fl keyform Ar PEM | ENGINE 619.Op Fl keyform Ar ENGINE | PEM
620.Op Fl md Ar arg 620.Op Fl md Ar arg
621.Op Fl name Ar section 621.Op Fl name Ar section
622.Op Fl out Ar file 622.Op Fl out Ar file
@@ -698,7 +698,7 @@ with the
698utility) this option should be used with caution. 698utility) this option should be used with caution.
699.It Fl keyfile Ar file 699.It Fl keyfile Ar file
700The private key to sign requests with. 700The private key to sign requests with.
701.It Fl keyform Ar PEM | ENGINE 701.It Fl keyform Ar ENGINE | PEM
702Private key file format. 702Private key file format.
703.It Fl md Ar alg 703.It Fl md Ar alg
704The message digest to use. 704The message digest to use.
@@ -1672,7 +1672,7 @@ and
1672.Ar COMPLEMENTOFDEFAULT 1672.Ar COMPLEMENTOFDEFAULT
1673selection options were added in version 0.9.7. 1673selection options were added in version 0.9.7.
1674.\" 1674.\"
1675.\" crl 1675.\" CRL
1676.\" 1676.\"
1677.Sh CRL 1677.Sh CRL
1678.Nm openssl crl 1678.Nm openssl crl
@@ -1857,7 +1857,7 @@ install user certificates and CAs in MSIE using the Xenroll control.
1857.Op Fl d 1857.Op Fl d
1858.Op Fl hex 1858.Op Fl hex
1859.Op Fl engine Ar id 1859.Op Fl engine Ar id
1860.Op Fl keyform Ar PEM | ENGINE 1860.Op Fl keyform Ar ENGINE | PEM
1861.Op Fl out Ar file 1861.Op Fl out Ar file
1862.Op Fl prverify Ar file 1862.Op Fl prverify Ar file
1863.Op Fl rand Ar file ... 1863.Op Fl rand Ar file ...
@@ -1906,7 +1906,7 @@ Digest is to be output as a hex dump.
1906This is the default case for a 1906This is the default case for a
1907.Qq normal 1907.Qq normal
1908digest as opposed to a digital signature. 1908digest as opposed to a digital signature.
1909.It Fl keyform Ar PEM | ENGINE 1909.It Fl keyform Ar ENGINE | PEM
1910Key file format. 1910Key file format.
1911.It Fl out Ar file 1911.It Fl out Ar file
1912file to output to, or standard output by default. 1912file to output to, or standard output by default.
@@ -6267,45 +6267,45 @@ The cipher and start time should be printed out in human readable form.
6267.Sh SMIME 6267.Sh SMIME
6268.Nm openssl smime 6268.Nm openssl smime
6269.Bk -words 6269.Bk -words
6270.Op Fl encrypt
6271.Op Fl decrypt
6272.Op Fl sign
6273.Op Fl verify
6274.Op Fl pk7out
6275.Oo Xo 6270.Oo Xo
6276.Fl des | des3 | rc2-40 | rc2-64 | 6271.Fl aes128 | aes192 | aes256 | des |
6277.Fl rc2-128 | aes128 | aes192 | aes256 6272.Fl des3 | rc2-40 | rc2-64 | rcs-128
6278.Xc 6273.Xc
6279.Oc 6274.Oc
6280.Op Fl nointern
6281.Op Fl noverify
6282.Op Fl nochain
6283.Op Fl nosigs
6284.Op Fl nocerts
6285.Op Fl noattr
6286.Op Fl binary 6275.Op Fl binary
6276.Op Fl crl_check
6277.Op Fl crl_check_all
6278.Op Fl decrypt
6279.Op Fl encrypt
6280.Op Fl noattr
6281.Op Fl nocerts
6282.Op Fl nochain
6287.Op Fl nodetach 6283.Op Fl nodetach
6288.Op Fl in Ar file 6284.Op Fl nointern
6289.Op Fl certfile Ar file 6285.Op Fl nosigs
6290.Op Fl signer Ar file 6286.Op Fl noverify
6291.Op Fl recip Ar file 6287.Op Fl pk7out
6292.Op Fl inform Ar SMIME | DER | PEM 6288.Op Fl sign
6293.Op Fl passin Ar arg
6294.Op Fl inkey Ar file
6295.Op Fl keyform Ar PEM | ENGINE
6296.Op Fl out Ar file
6297.Op Fl outform Ar SMIME | DER | PEM
6298.Op Fl content Ar file
6299.Op Fl to Ar addr
6300.Op Fl from Ar addr
6301.Op Fl subject Ar s
6302.Op Fl text 6289.Op Fl text
6290.Op Fl verify
6303.Op Fl CAfile Ar file 6291.Op Fl CAfile Ar file
6304.Op Fl CApath Ar directory 6292.Op Fl CApath Ar directory
6305.Op Fl crl_check 6293.Op Fl certfile Ar file
6306.Op Fl crl_check_all 6294.Op Fl content Ar file
6307.Op Fl engine Ar id 6295.Op Fl engine Ar id
6296.Op Fl from Ar addr
6297.Op Fl in Ar file
6298.Op Fl inform Ar DER | PEM | SMIME
6299.Op Fl inkey Ar file
6300.Op Fl keyform Ar ENGINE | PEM
6301.Op Fl out Ar file
6302.Op Fl outform Ar DER | PEM | SMIME
6303.Op Fl passin Ar arg
6308.Op Fl rand Ar file ... 6304.Op Fl rand Ar file ...
6305.Op Fl recip Ar file
6306.Op Fl signer Ar file
6307.Op Fl subject Ar s
6308.Op Fl to Ar addr
6309.Op Ar cert.pem ... 6309.Op Ar cert.pem ...
6310.Ek 6310.Ek
6311.Pp 6311.Pp
@@ -6314,27 +6314,29 @@ The
6314command handles 6314command handles
6315.Em S/MIME 6315.Em S/MIME
6316mail. 6316mail.
6317It can encrypt, decrypt, sign and verify 6317It can encrypt, decrypt, sign, and verify
6318.Em S/MIME 6318.Em S/MIME
6319messages. 6319messages.
6320.Pp 6320.Pp
6321There are five operation options that set the type of operation to be performed. 6321There are five operation options that set the type of operation to be performed.
6322The meaning of the other options varies according to the operation type. 6322The meaning of the other options varies according to the operation type.
6323.Pp 6323.Pp
6324The options are as follows: 6324The five operation options are as follows:
6325.Bl -tag -width "XXXX" 6325.Bl -tag -width "XXXX"
6326.It Fl encrypt
6327Encrypt mail for the given recipient certificates.
6328Input file is the message to be encrypted.
6329The output file is the encrypted mail in
6330.Em MIME
6331format.
6332.It Fl decrypt 6326.It Fl decrypt
6333Decrypt mail using the supplied certificate and private key. 6327Decrypt mail using the supplied certificate and private key.
6334Expects an encrypted mail message in 6328Expects an encrypted mail message in
6335.Em MIME 6329.Em MIME
6336format for the input file. 6330format for the input file.
6337The decrypted mail is written to the output file. 6331The decrypted mail is written to the output file.
6332.It Fl encrypt
6333Encrypt mail for the given recipient certificates.
6334Input file is the message to be encrypted.
6335The output file is the encrypted mail in
6336.Em MIME
6337format.
6338.It Fl pk7out
6339Takes an input message and writes out a PEM-encoded PKCS#7 structure.
6338.It Fl sign 6340.It Fl sign
6339Sign mail using the supplied certificate and private key. 6341Sign mail using the supplied certificate and private key.
6340Input file is the message to be signed. 6342Input file is the message to be signed.
@@ -6345,17 +6347,104 @@ format is written to the output file.
6345Verify signed mail. 6347Verify signed mail.
6346Expects a signed mail message on input and outputs the signed data. 6348Expects a signed mail message on input and outputs the signed data.
6347Both clear text and opaque signing is supported. 6349Both clear text and opaque signing is supported.
6348.It Fl pk7out 6350.El
6349Takes an input message and writes out a PEM-encoded PKCS#7 structure. 6351.Pp
6352The reamaining options are as follows:
6353.Bl -tag -width "XXXX"
6354.It Xo
6355.Fl aes128 | aes192 | aes256 | des |
6356.Fl des3 | rc2-40 | rc2-64 | rc2-128
6357.Xc
6358The encryption algorithm to use.
6359128-, 192-, or 256-bit AES,
6360DES
6361.Pq 56 bits ,
6362triple DES
6363.Pq 168 bits ,
6364or 40-, 64-, or 128-bit RC2, respectively;
6365if not specified, 40-bit RC2 is
6366used.
6367Only used with
6368.Fl encrypt .
6369.It Fl binary
6370Normally, the input message is converted to
6371.Qq canonical
6372format which is effectively using CR and LF as end of line \-
6373as required by the
6374.Em S/MIME
6375specification.
6376When this option is present no translation occurs.
6377This is useful when handling binary data which may not be in
6378.Em MIME
6379format.
6380.It Fl CAfile Ar file
6381A
6382.Ar file
6383containing trusted CA certificates; only used with
6384.Fl verify .
6385.It Fl CApath Ar directory
6386A
6387.Ar directory
6388containing trusted CA certificates; only used with
6389.Fl verify .
6390This directory must be a standard certificate directory:
6391that is, a hash of each subject name (using
6392.Nm x509 -hash )
6393should be linked to each certificate.
6394.It Ar cert.pem ...
6395One or more certificates of message recipients: used when encrypting
6396a message.
6397.It Fl certfile Ar file
6398Allows additional certificates to be specified.
6399When signing, these will be included with the message.
6400When verifying, these will be searched for the signers' certificates.
6401The certificates should be in PEM format.
6402.It Fl content Ar file
6403This specifies a file containing the detached content.
6404This is only useful with the
6405.Fl verify
6406command.
6407This is only usable if the PKCS#7 structure is using the detached
6408signature form where the content is not included.
6409This option will override any content if the input format is
6410.Em S/MIME
6411and it uses the multipart/signed
6412.Em MIME
6413content type.
6414.It Fl crl_check
6415Check revocation status of signer's certificate using CRLs.
6416.It Fl crl_check_all
6417Check revocation status of signer's certificate chain using CRLs.
6418.It Fl engine Ar id
6419Specifying an engine (by it's unique
6420.Ar id
6421string) will cause
6422.Nm smime
6423to attempt to obtain a functional reference to the specified engine,
6424thus initialising it if needed.
6425The engine will then be set as the default
6426for all available algorithms.
6427.It Xo
6428.Fl from Ar addr ,
6429.Fl subject Ar s ,
6430.Fl to Ar addr
6431.Xc
6432The relevant mail headers.
6433These are included outside the signed
6434portion of a message so they may be included manually.
6435When signing, many
6436.Em S/MIME
6437mail clients check that the signer's certificate email
6438address matches the From: address.
6350.It Fl in Ar file 6439.It Fl in Ar file
6351The input message to be encrypted or signed or the 6440The input message to be encrypted or signed or the
6352.Em MIME 6441.Em MIME
6353message to 6442message to
6354be decrypted or verified. 6443be decrypted or verified.
6355.It Fl inform Ar SMIME | DER | PEM 6444.It Fl inform Ar DER | PEM | SMIME
6356This specifies the input format for the PKCS#7 structure. 6445This specifies the input format for the PKCS#7 structure.
6357The default is 6446The default is
6358.Em SMIME 6447.Em SMIME ,
6359which reads an 6448which reads an
6360.Em S/MIME 6449.Em S/MIME
6361format message. 6450format message.
@@ -6370,14 +6459,60 @@ structure; if no PKCS#7 structure is being input (for example with
6370or 6459or
6371.Fl sign ) , 6460.Fl sign ) ,
6372this option has no effect. 6461this option has no effect.
6462.It Fl inkey Ar file
6463The private key to use when signing or decrypting.
6464This must match the corresponding certificate.
6465If this option is not specified, the private key must be included
6466in the certificate file specified with
6467the
6468.Fl recip
6469or
6470.Fl signer
6471file.
6472.It Fl keyform Ar ENGINE | PEM
6473Input private key format.
6474.It Fl noattr
6475Normally, when a message is signed a set of attributes are included which
6476include the signing time and supported symmetric algorithms.
6477With this option they are not included.
6478.It Fl nocerts
6479When signing a message, the signer's certificate is normally included;
6480with this option it is excluded.
6481This will reduce the size of the signed message but the verifier must
6482have a copy of the signer's certificate available locally (passed using the
6483.Fl certfile
6484option, for example).
6485.It Fl nochain
6486Do not do chain verification of signers' certificates: that is,
6487don't use the certificates in the signed message as untrusted CAs.
6488.It Fl nodetach
6489When signing a message use opaque signing: this form is more resistant
6490to translation by mail relays but it cannot be read by mail agents that
6491do not support
6492.Em S/MIME .
6493Without this option cleartext signing with the
6494.Em MIME
6495type multipart/signed is used.
6496.It Fl nointern
6497When verifying a message, normally certificates
6498.Pq if any
6499included in the message are searched for the signing certificate.
6500With this option, only the certificates specified in the
6501.Fl certfile
6502option are used.
6503The supplied certificates can still be used as untrusted CAs however.
6504.It Fl nosigs
6505Don't try to verify the signatures on the message.
6506.It Fl noverify
6507Do not verify the signer's certificate of a signed message.
6373.It Fl out Ar file 6508.It Fl out Ar file
6374The message text that has been decrypted or verified, or the output 6509The message text that has been decrypted or verified, or the output
6375.Em MIME 6510.Em MIME
6376format message that has been signed or verified. 6511format message that has been signed or verified.
6377.It Fl outform Ar SMIME | DER | PEM 6512.It Fl outform Ar DER | PEM | SMIME
6378This specifies the output format for the PKCS#7 structure. 6513This specifies the output format for the PKCS#7 structure.
6379The default is 6514The default is
6380.Em SMIME 6515.Em SMIME ,
6381which writes an 6516which writes an
6382.Em S/MIME 6517.Em S/MIME
6383format message. 6518format message.
@@ -6392,124 +6527,6 @@ structure; if no PKCS#7 structure is being output (for example with
6392or 6527or
6393.Fl decrypt ) 6528.Fl decrypt )
6394this option has no effect. 6529this option has no effect.
6395.It Fl content Ar file
6396This specifies a file containing the detached content.
6397This is only useful with the
6398.Fl verify
6399command.
6400This is only usable if the PKCS#7 structure is using the detached
6401signature form where the content is not included.
6402This option will override any content if the input format is
6403.Em S/MIME
6404and it uses the multipart/signed
6405.Em MIME
6406content type.
6407.It Fl text
6408This option adds plain text
6409.Pq text/plain
6410.Em MIME
6411headers to the supplied message if encrypting or signing.
6412If decrypting or verifying it strips off text headers:
6413if the decrypted or verified message is not of
6414.Em MIME
6415type text/plain then an error occurs.
6416.It Fl CAfile Ar file
6417A
6418.Ar file
6419containing trusted CA certificates; only used with
6420.Fl verify .
6421.It Fl CApath Ar directory
6422A
6423.Ar directory
6424containing trusted CA certificates; only used with
6425.Fl verify .
6426This directory must be a standard certificate directory;
6427that is, a hash of each subject name (using
6428.Nm x509 -hash )
6429should be linked to each certificate.
6430.It Xo
6431.Fl des | des3 | rc2-40 | rc2-64 |
6432.Fl rc2-128 | aes128 | aes192 | aes256
6433.Xc
6434The encryption algorithm to use.
6435DES
6436.Pq 56 bits ,
6437triple DES
6438.Pq 168 bits ,
643940-, 64-, or 128-bit RC2, or 128-, 192-, or 256-bit AES, respectively;
6440if not specified, 40-bit RC2 is
6441used.
6442Only used with
6443.Fl encrypt .
6444.It Fl nointern
6445When verifying a message, normally certificates
6446.Pq if any
6447included in the message are searched for the signing certificate.
6448With this option, only the certificates specified in the
6449.Fl certfile
6450option are used.
6451The supplied certificates can still be used as untrusted CAs however.
6452.It Fl noverify
6453Do not verify the signer's certificate of a signed message.
6454.It Fl nochain
6455Do not do chain verification of signers' certificates: that is,
6456don't use the certificates in the signed message as untrusted CAs.
6457.It Fl nosigs
6458Don't try to verify the signatures on the message.
6459.It Fl nocerts
6460When signing a message, the signer's certificate is normally included;
6461with this option it is excluded.
6462This will reduce the size of the signed message but the verifier must
6463have a copy of the signer's certificate available locally (passed using the
6464.Fl certfile
6465option, for example).
6466.It Fl noattr
6467Normally, when a message is signed a set of attributes are included which
6468include the signing time and supported symmetric algorithms.
6469With this option they are not included.
6470.It Fl binary
6471Normally, the input message is converted to
6472.Qq canonical
6473format which is effectively using CR and LF as end of line: as required by the
6474.Em S/MIME
6475specification.
6476When this option is present no translation occurs.
6477This is useful when handling binary data which may not be in
6478.Em MIME
6479format.
6480.It Fl nodetach
6481When signing a message use opaque signing: this form is more resistant
6482to translation by mail relays but it cannot be read by mail agents that
6483do not support
6484.Em S/MIME .
6485Without this option cleartext signing with the
6486.Em MIME
6487type multipart/signed is used.
6488.It Fl certfile Ar file
6489Allows additional certificates to be specified.
6490When signing these will be included with the message.
6491When verifying these will be searched for the signers' certificates.
6492The certificates should be in PEM format.
6493.It Fl signer Ar file
6494The signer's certificate when signing a message.
6495If a message is being verified, the signer's certificates will be
6496written to this file if the verification was successful.
6497.It Fl recip Ar file
6498The recipients certificate when decrypting a message.
6499This certificate
6500must match one of the recipients of the message or an error occurs.
6501.It Fl inkey Ar file
6502The private key to use when signing or decrypting.
6503This must match the corresponding certificate.
6504If this option is not specified, the private key must be included
6505in the certificate file specified with
6506the
6507.Fl recip
6508or
6509.Fl signer
6510file.
6511.It Fl keyform Ar PEM | ENGINE
6512Input private key format.
6513.It Fl passin Ar arg 6530.It Fl passin Ar arg
6514The private key password source. 6531The private key password source.
6515For more information about the format of 6532For more information about the format of
@@ -6517,19 +6534,6 @@ For more information about the format of
6517see the 6534see the
6518.Sx PASS PHRASE ARGUMENTS 6535.Sx PASS PHRASE ARGUMENTS
6519section above. 6536section above.
6520.It Fl crl_check
6521Check revocation status of signer's certificate using CRLs.
6522.It Fl crl_check_all
6523Check revocation status of signer's certificate chain using CRLs.
6524.It Fl engine Ar id
6525Specifying an engine (by it's unique
6526.Ar id
6527string) will cause
6528.Nm smime
6529to attempt to obtain a functional reference to the specified engine,
6530thus initialising it if needed.
6531The engine will then be set as the default
6532for all available algorithms.
6533.It Fl rand Ar file ... 6537.It Fl rand Ar file ...
6534A file or files 6538A file or files
6535containing random data used to seed the random number generator, 6539containing random data used to seed the random number generator,
@@ -6537,17 +6541,23 @@ or an EGD socket (see
6537.Xr RAND_egd 3 ) . 6541.Xr RAND_egd 3 ) .
6538Multiple files can be specified separated by a 6542Multiple files can be specified separated by a
6539.Sq \&: . 6543.Sq \&: .
6540.It Ar cert.pem ... 6544.It Fl recip Ar file
6541One or more certificates of message recipients: used when encrypting 6545The recipients certificate when decrypting a message.
6542a message. 6546This certificate
6543.It Fl to , from , subject 6547must match one of the recipients of the message or an error occurs.
6544The relevant mail headers. 6548.It Fl signer Ar file
6545These are included outside the signed 6549The signer's certificate when signing a message.
6546portion of a message so they may be included manually. 6550If a message is being verified, the signer's certificates will be
6547When signing, many 6551written to this file if the verification was successful.
6548.Em S/MIME 6552.It Fl text
6549mail clients check the signer's certificate email 6553This option adds plain text
6550address matches that specified in the From: address. 6554.Pq text/plain
6555.Em MIME
6556headers to the supplied message if encrypting or signing.
6557If decrypting or verifying, it strips off text headers:
6558if the decrypted or verified message is not of
6559.Em MIME
6560type text/plain then an error occurs.
6551.El 6561.El
6552.Sh SMIME NOTES 6562.Sh SMIME NOTES
6553The 6563The
@@ -6654,7 +6664,7 @@ Send encrypted mail using triple DES:
6654.Bd -literal -offset indent 6664.Bd -literal -offset indent
6655$ openssl smime -encrypt -in in.txt -from steve@openssl.org \e 6665$ openssl smime -encrypt -in in.txt -from steve@openssl.org \e
6656 -to someone@somewhere -subject "Encrypted message" \e 6666 -to someone@somewhere -subject "Encrypted message" \e
6657 -des3 user.pem -out mail.msg 6667 -des3 -out mail.msg user.pem
6658.Ed 6668.Ed
6659.Pp 6669.Pp
6660Sign and encrypt mail: 6670Sign and encrypt mail:
@@ -7318,8 +7328,8 @@ option was added in
7318.Sh X509 7328.Sh X509
7319.Nm openssl x509 7329.Nm openssl x509
7320.Bk -words 7330.Bk -words
7321.Op Fl inform Ar DER | PEM | NET 7331.Op Fl inform Ar DER | NET | PEM
7322.Op Fl outform Ar DER | PEM | NET 7332.Op Fl outform Ar DER | NET | PEM
7323.Op Fl keyform Ar DER | PEM 7333.Op Fl keyform Ar DER | PEM
7324.Op Fl CAform Ar DER | PEM 7334.Op Fl CAform Ar DER | PEM
7325.Op Fl CAkeyform Ar DER | PEM 7335.Op Fl CAkeyform Ar DER | PEM
@@ -7379,7 +7389,7 @@ Since there are a large number of options, they are split up into
7379various sections. 7389various sections.
7380.Sh X509 INPUT, OUTPUT, AND GENERAL PURPOSE OPTIONS 7390.Sh X509 INPUT, OUTPUT, AND GENERAL PURPOSE OPTIONS
7381.Bl -tag -width "XXXX" 7391.Bl -tag -width "XXXX"
7382.It Fl inform Ar DER | PEM | NET 7392.It Fl inform Ar DER | NET | PEM
7383This specifies the input format. 7393This specifies the input format.
7384Normally, the command will expect an X509 certificate, 7394Normally, the command will expect an X509 certificate,
7385but this can change if other options such as 7395but this can change if other options such as
@@ -7394,7 +7404,7 @@ The
7394.Ar NET 7404.Ar NET
7395option is an obscure Netscape server format that is now 7405option is an obscure Netscape server format that is now
7396obsolete. 7406obsolete.
7397.It Fl outform Ar DER | PEM | NET 7407.It Fl outform Ar DER | NET | PEM
7398This specifies the output format; the options have the same meaning as the 7408This specifies the output format; the options have the same meaning as the
7399.Fl inform 7409.Fl inform
7400option. 7410option.