summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2016-09-15 17:49:03 +0000
committerjmc <>2016-09-15 17:49:03 +0000
commitc08b7528e442c942565b4fa5bc43e17adf44c939 (patch)
tree6b74fcd0b41ab147129fd68b17ec4982f7fba7cf /src
parenteefb2f934eae206bc2a63b355ab70e79aaa9c92c (diff)
downloadopenbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.tar.gz
openbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.tar.bz2
openbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.zip
shorten ts;
Diffstat (limited to 'src')
-rw-r--r--src/usr.bin/openssl/openssl.1346
1 files changed, 63 insertions, 283 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index df1b98940a..004839f448 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.71 2016/09/12 13:34:12 jmc Exp $ 1.\" $OpenBSD: openssl.1,v 1.72 2016/09/15 17:49:03 jmc Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -112,7 +112,7 @@
112.\" 112.\"
113.\" OPENSSL 113.\" OPENSSL
114.\" 114.\"
115.Dd $Mdocdate: September 12 2016 $ 115.Dd $Mdocdate: September 15 2016 $
116.Dt OPENSSL 1 116.Dt OPENSSL 1
117.Os 117.Os
118.Sh NAME 118.Sh NAME
@@ -355,7 +355,7 @@ and all certificates will be certified automatically.
355.It Fl cert Ar file 355.It Fl cert Ar file
356The CA certificate file. 356The CA certificate file.
357.It Fl config Ar file 357.It Fl config Ar file
358Specifies the configuration file to use. 358Specify an alternative configuration file.
359.It Fl days Ar arg 359.It Fl days Ar arg
360The number of days to certify the certificate for. 360The number of days to certify the certificate for.
361.It Fl enddate Ar date 361.It Fl enddate Ar date
@@ -3263,9 +3263,6 @@ option, 0 is used for the serial number.
3263The configuration options are specified in the 3263The configuration options are specified in the
3264.Qq req 3264.Qq req
3265section of the configuration file. 3265section of the configuration file.
3266As with all configuration files, if no value is specified in the specific
3267section then the initial unnamed or default section is searched too.
3268.Pp
3269The options available are as follows: 3266The options available are as follows:
3270.Bl -tag -width "XXXX" 3267.Bl -tag -width "XXXX"
3271.It Cm attributes 3268.It Cm attributes
@@ -3378,7 +3375,7 @@ values from
3378.It Cm utf8 3375.It Cm utf8
3379If set to 3376If set to
3380.Qq yes , 3377.Qq yes ,
3381field values are interpreted as UTF8 strings, not ASCII. 3378field values are interpreted as UTF8 strings.
3382.It Cm x509_extensions 3379.It Cm x509_extensions
3383The configuration file section containing a list of 3380The configuration file section containing a list of
3384extensions to add to a certificate generated when the 3381extensions to add to a certificate generated when the
@@ -3386,7 +3383,7 @@ extensions to add to a certificate generated when the
3386switch is used. 3383switch is used.
3387It can be overridden by the 3384It can be overridden by the
3388.Fl extensions 3385.Fl extensions
3389option. 3386command line switch.
3390.El 3387.El
3391.Pp 3388.Pp
3392There are two separate formats for the distinguished name and attribute 3389There are two separate formats for the distinguished name and attribute
@@ -3395,17 +3392,12 @@ If the
3395.Fl prompt 3392.Fl prompt
3396option is set to 3393option is set to
3397.Qq no , 3394.Qq no ,
3398the sections consist of just field names and values, 3395then these sections just consist of field names and values.
3399which allows external programs to generate a template file 3396If the
3400with all the field names and values and just pass it to
3401.Nm req .
3402.Pp
3403Alternatively if the
3404.Fl prompt 3397.Fl prompt
3405option is absent or not set to 3398option is absent or not set to
3406.Qq no , 3399.Qq no ,
3407then the file contains field prompting information. 3400then the file contains field prompting information of the form:
3408It consists of lines of the form:
3409.Bd -unfilled -offset indent 3401.Bd -unfilled -offset indent
3410fieldName="prompt" 3402fieldName="prompt"
3411fieldName_default="default field value" 3403fieldName_default="default field value"
@@ -4193,7 +4185,7 @@ The
4193program processes the encoded version of the SSL session structure and 4185program processes the encoded version of the SSL session structure and
4194optionally prints out SSL session details 4186optionally prints out SSL session details
4195(for example the SSL session master key) 4187(for example the SSL session master key)
4196in human readable format. 4188in human-readable format.
4197.Pp 4189.Pp
4198The options are as follows: 4190The options are as follows:
4199.Bl -tag -width Ds 4191.Bl -tag -width Ds
@@ -4588,13 +4580,9 @@ Run
4588.Ar number 4580.Ar number
4589benchmarks in parallel. 4581benchmarks in parallel.
4590.El 4582.El
4591.\"
4592.\" TS
4593.\"
4594.Sh TS 4583.Sh TS
4595.nr nS 1 4584.nr nS 1
4596.Nm "openssl ts" 4585.Nm "openssl ts"
4597.Bk -words
4598.Fl query 4586.Fl query
4599.Op Fl md4 | md5 | ripemd160 | sha1 4587.Op Fl md4 | md5 | ripemd160 | sha1
4600.Op Fl cert 4588.Op Fl cert
@@ -4606,12 +4594,10 @@ benchmarks in parallel.
4606.Op Fl out Ar request.tsq 4594.Op Fl out Ar request.tsq
4607.Op Fl policy Ar object_id 4595.Op Fl policy Ar object_id
4608.Op Fl text 4596.Op Fl text
4609.Ek
4610.nr nS 0 4597.nr nS 0
4611.Pp 4598.Pp
4612.nr nS 1 4599.nr nS 1
4613.Nm "openssl ts" 4600.Nm "openssl ts"
4614.Bk -words
4615.Fl reply 4601.Fl reply
4616.Op Fl chain Ar certs_file.pem 4602.Op Fl chain Ar certs_file.pem
4617.Op Fl config Ar configfile 4603.Op Fl config Ar configfile
@@ -4626,12 +4612,10 @@ benchmarks in parallel.
4626.Op Fl text 4612.Op Fl text
4627.Op Fl token_in 4613.Op Fl token_in
4628.Op Fl token_out 4614.Op Fl token_out
4629.Ek
4630.nr nS 0 4615.nr nS 0
4631.Pp 4616.Pp
4632.nr nS 1 4617.nr nS 1
4633.Nm "openssl ts" 4618.Nm "openssl ts"
4634.Bk -words
4635.Fl verify 4619.Fl verify
4636.Op Fl CAfile Ar trusted_certs.pem 4620.Op Fl CAfile Ar trusted_certs.pem
4637.Op Fl CApath Ar trusted_cert_path 4621.Op Fl CApath Ar trusted_cert_path
@@ -4641,7 +4625,6 @@ benchmarks in parallel.
4641.Op Fl queryfile Ar request.tsq 4625.Op Fl queryfile Ar request.tsq
4642.Op Fl token_in 4626.Op Fl token_in
4643.Op Fl untrusted Ar cert_file.pem 4627.Op Fl untrusted Ar cert_file.pem
4644.Ek
4645.nr nS 0 4628.nr nS 0
4646.Pp 4629.Pp
4647The 4630The
@@ -4649,7 +4632,7 @@ The
4649command is a basic Time Stamping Authority (TSA) client and server 4632command is a basic Time Stamping Authority (TSA) client and server
4650application as specified in RFC 3161 (Time-Stamp Protocol, TSP). 4633application as specified in RFC 3161 (Time-Stamp Protocol, TSP).
4651A TSA can be part of a PKI deployment and its role is to provide long 4634A TSA can be part of a PKI deployment and its role is to provide long
4652term proof of the existence of a certain datum before a particular time. 4635term proof of the existence of specific data.
4653Here is a brief description of the protocol: 4636Here is a brief description of the protocol:
4654.Bl -enum 4637.Bl -enum
4655.It 4638.It
@@ -4688,35 +4671,23 @@ switch can be used for creating and printing a time stamp
4688request with the following options: 4671request with the following options:
4689.Bl -tag -width Ds 4672.Bl -tag -width Ds
4690.It Fl cert 4673.It Fl cert
4691The TSA is expected to include its signing certificate in the 4674Expect the TSA to include its signing certificate in the response.
4692response.
4693.It Fl config Ar configfile 4675.It Fl config Ar configfile
4694The configuration file to use. 4676Specify an alternative configuration file.
4695This option overrides the 4677Only the OID section is used.
4696.Ev OPENSSL_CONF
4697environment variable.
4698Only the OID section of the config file is used with the
4699.Fl query
4700command.
4701.It Fl data Ar file_to_hash 4678.It Fl data Ar file_to_hash
4702The data file for which the time stamp request needs to be created. 4679The data file for which the time stamp request needs to be created.
4703stdin is the default if neither the 4680The default is standard input.
4704.Fl data
4705nor the
4706.Fl digest
4707option is specified.
4708.It Fl digest Ar digest_bytes 4681.It Fl digest Ar digest_bytes
4709It is possible to specify the message imprint explicitly without the data 4682Specify the message imprint explicitly without the data file.
4710file.
4711The imprint must be specified in a hexadecimal format, 4683The imprint must be specified in a hexadecimal format,
4712two characters per byte, 4684two characters per byte,
4713the bytes optionally separated by colons (e.g. 1A:F6:01:... or 1AF601...). 4685the bytes optionally separated by colons.
4714The number of bytes must match the message digest algorithm in use. 4686The number of bytes must match the message digest algorithm in use.
4715.It Fl in Ar request.tsq 4687.It Fl in Ar request.tsq
4716This option specifies a previously created time stamp request in DER 4688A previously created time stamp request in DER
4717format that will be printed into the output file. 4689format that will be printed into the output file.
4718Useful when you need to examine the content of a request in human-readable 4690Useful for examining the content of a request in human-readable format.
4719format.
4720.It Fl md4|md5|ripemd160|sha|sha1 4691.It Fl md4|md5|ripemd160|sha|sha1
4721The message digest to apply to the data file. 4692The message digest to apply to the data file.
4722It supports all the message digest algorithms that are supported by the 4693It supports all the message digest algorithms that are supported by the
@@ -4724,23 +4695,20 @@ It supports all the message digest algorithms that are supported by the
4724command. 4695command.
4725The default is SHA-1. 4696The default is SHA-1.
4726.It Fl no_nonce 4697.It Fl no_nonce
4727No nonce is specified in the request if this option is given. 4698Specify no nonce in the request.
4728Otherwise a 64-bit long pseudo-random none is 4699The default, to include a 64-bit long pseudo-random nonce,
4729included in the request. 4700is recommended to protect against replay attacks.
4730It is recommended to use nonce to protect against replay-attacks.
4731.It Fl out Ar request.tsq 4701.It Fl out Ar request.tsq
4732Name of the output file to which the request will be written. 4702The output file to write to,
4733The default is stdout. 4703or standard output if not specified.
4734.It Fl policy Ar object_id 4704.It Fl policy Ar object_id
4735The policy that the client expects the TSA to use for creating the 4705The policy that the client expects the TSA to use for creating the
4736time stamp token. 4706time stamp token.
4737Either the dotted OID notation or OID names defined 4707Either dotted OID notation or OID names defined
4738in the config file can be used. 4708in the config file can be used.
4739If no policy is requested the TSA will 4709If no policy is requested the TSA uses its own default policy.
4740use its own default policy.
4741.It Fl text 4710.It Fl text
4742If this option is specified the output is in human-readable text format 4711Output in human-readable text format instead of DER.
4743instead of DER.
4744.El 4712.El
4745.Pp 4713.Pp
4746A time stamp response (TimeStampResp) consists of a response status 4714A time stamp response (TimeStampResp) consists of a response status
@@ -4757,7 +4725,7 @@ is not specified the output is always a time stamp response (TimeStampResp),
4757otherwise it is a time stamp token (ContentInfo). 4725otherwise it is a time stamp token (ContentInfo).
4758.Bl -tag -width Ds 4726.Bl -tag -width Ds
4759.It Fl chain Ar certs_file.pem 4727.It Fl chain Ar certs_file.pem
4760The collection of certificates, in PEM format, 4728The collection of PEM certificates
4761that will be included in the response 4729that will be included in the response
4762in addition to the signer certificate if the 4730in addition to the signer certificate if the
4763.Fl cert 4731.Fl cert
@@ -4768,24 +4736,18 @@ The
4768.Fl reply 4736.Fl reply
4769command does not build a certificate chain automatically. 4737command does not build a certificate chain automatically.
4770.It Fl config Ar configfile 4738.It Fl config Ar configfile
4771The configuration file to use. 4739Specify an alternative configuration file.
4772This option overrides the
4773.Ev OPENSSL_CONF
4774environment variable.
4775See
4776.Sx TS CONFIGURATION FILE OPTIONS
4777for configurable variables.
4778.It Fl in Ar response.tsr 4740.It Fl in Ar response.tsr
4779Specifies a previously created time stamp response or time stamp token, if 4741Specify a previously created time stamp response (or time stamp token, if
4780.Fl token_in 4742.Fl token_in
4781is also specified, 4743is also specified)
4782in DER format that will be written to the output file. 4744in DER format that will be written to the output file.
4783This option does not require a request; 4745This option does not require a request;
4784it is useful, for example, 4746it is useful, for example,
4785when you need to examine the content of a response or token 4747to examine the content of a response or token
4786or you want to extract the time stamp token from a response. 4748or to extract the time stamp token from a response.
4787If the input is a token and the output is a time stamp response a default 4749If the input is a token and the output is a time stamp response a default
4788.Dq granted 4750.Qq granted
4789status info is added to the token. 4751status info is added to the token.
4790.It Fl inkey Ar private.pem 4752.It Fl inkey Ar private.pem
4791The signer private key of the TSA in PEM format. 4753The signer private key of the TSA in PEM format.
@@ -4802,22 +4764,16 @@ The default is stdout.
4802.It Fl passin Ar arg 4764.It Fl passin Ar arg
4803The key password source. 4765The key password source.
4804.It Fl policy Ar object_id 4766.It Fl policy Ar object_id
4805The default policy to use for the response unless the client 4767The default policy to use for the response.
4806explicitly requires a particular TSA policy. 4768Either dotted OID notation or OID names defined
4807The OID can be specified either in dotted notation or with its name. 4769in the config file can be used.
4808Overrides the 4770If no policy is requested the TSA uses its own default policy.
4809.Cm default_policy
4810config file option.
4811.It Fl queryfile Ar request.tsq 4771.It Fl queryfile Ar request.tsq
4812The name of the file containing a DER-encoded time stamp request. 4772The file containing a DER-encoded time stamp request.
4813.It Fl section Ar tsa_section 4773.It Fl section Ar tsa_section
4814The name of the config file section containing the settings for the 4774The config file section containing the settings for response generation.
4815response generation.
4816If not specified the default TSA section is used; see
4817.Sx TS CONFIGURATION FILE OPTIONS
4818for details.
4819.It Fl signer Ar tsa_cert.pem 4775.It Fl signer Ar tsa_cert.pem
4820The signer certificate of the TSA in PEM format. 4776The PEM signer certificate of the TSA.
4821The TSA signing certificate must have exactly one extended key usage 4777The TSA signing certificate must have exactly one extended key usage
4822assigned to it: timeStamping. 4778assigned to it: timeStamping.
4823The extended key usage must also be critical, 4779The extended key usage must also be critical,
@@ -4826,16 +4782,13 @@ Overrides the
4826.Cm signer_cert 4782.Cm signer_cert
4827variable of the config file. 4783variable of the config file.
4828.It Fl text 4784.It Fl text
4829If this option is specified the output is human-readable text format 4785Output in human-readable text format instead of DER.
4830instead of DER.
4831.It Fl token_in 4786.It Fl token_in
4832This flag can be used together with the 4787The input is a DER-encoded time stamp token (ContentInfo)
4833.Fl in 4788instead of a time stamp response (TimeStampResp).
4834option and indicates that the input is a DER-encoded time stamp token
4835(ContentInfo) instead of a time stamp response (TimeStampResp).
4836.It Fl token_out 4789.It Fl token_out
4837The output is a time stamp token (ContentInfo) instead of time stamp 4790The output is a time stamp token (ContentInfo)
4838response (TimeStampResp). 4791instead of a time stamp response (TimeStampResp).
4839.El 4792.El
4840.Pp 4793.Pp
4841The 4794The
@@ -4847,18 +4800,16 @@ The
4847command does not use the configuration file. 4800command does not use the configuration file.
4848.Bl -tag -width Ds 4801.Bl -tag -width Ds
4849.It Fl CAfile Ar trusted_certs.pem 4802.It Fl CAfile Ar trusted_certs.pem
4850The name of the file containing a set of trusted self-signed CA 4803The file containing a set of trusted self-signed PEM CA certificates.
4851certificates in PEM format. 4804See
4852See the similar option of
4853.Nm verify 4805.Nm verify
4854for additional details. 4806for additional details.
4855Either this option or 4807Either this option or
4856.Fl CApath 4808.Fl CApath
4857must be specified. 4809must be specified.
4858.It Fl CApath Ar trusted_cert_path 4810.It Fl CApath Ar trusted_cert_path
4859The name of the directory containing the trused CA certificates of the 4811The directory containing the trused CA certificates of the client.
4860client. 4812See
4861See the similar option of
4862.Nm verify 4813.Nm verify
4863for additional details. 4814for additional details.
4864Either this option or 4815Either this option or
@@ -4894,42 +4845,24 @@ and
4894.Fl digest 4845.Fl digest
4895options must not be specified with this one. 4846options must not be specified with this one.
4896.It Fl token_in 4847.It Fl token_in
4897This flag can be used together with the 4848The input is a DER-encoded time stamp token (ContentInfo)
4898.Fl in 4849instead of a time stamp response (TimeStampResp).
4899option and indicates that the input is a DER-encoded time stamp token
4900(ContentInfo) instead of a time stamp response (TimeStampResp).
4901.It Fl untrusted Ar cert_file.pem 4850.It Fl untrusted Ar cert_file.pem
4902Set of additional untrusted certificates in PEM format which may be 4851Additional untrusted PEM certificates which may be needed
4903needed when building the certificate chain for the TSA's signing 4852when building the certificate chain for the TSA's signing certificate.
4904certificate.
4905This file must contain the TSA signing certificate and 4853This file must contain the TSA signing certificate and
4906all intermediate CA certificates unless the response includes them. 4854all intermediate CA certificates unless the response includes them.
4907.El 4855.El
4908.Sh TS CONFIGURATION FILE OPTIONS
4909The
4910.Fl query
4911and
4912.Fl reply
4913options make use of a configuration file defined by the
4914.Ev OPENSSL_CONF
4915environment variable.
4916The
4917.Fl query
4918option uses only the symbolic OID names section
4919and it can work without it.
4920However, the
4921.Fl reply
4922option needs the config file for its operation.
4923.Pp 4856.Pp
4924When there is a command line switch equivalent of a variable the 4857Options specified on the command line always override
4925switch always overrides the settings in the config file. 4858the settings in the config file:
4926.Bl -tag -width Ds 4859.Bl -tag -width Ds
4927.It Cm tsa Ar section , Cm default_tsa 4860.It Cm tsa Ar section , Cm default_tsa
4928This is the main section and it specifies the name of another section 4861This is the main section and it specifies the name of another section
4929that contains all the options for the 4862that contains all the options for the
4930.Fl reply 4863.Fl reply
4931option. 4864option.
4932This default section can be overridden with the 4865This section can be overridden with the
4933.Fl section 4866.Fl section
4934command line switch. 4867command line switch.
4935.It Cm oid_file 4868.It Cm oid_file
@@ -4941,11 +4874,11 @@ See
4941.Nm ca 4874.Nm ca
4942for a description. 4875for a description.
4943.It Cm serial 4876.It Cm serial
4944The name of the file containing the hexadecimal serial number of the 4877The file containing the hexadecimal serial number of the
4945last time stamp response created. 4878last time stamp response created.
4946This number is incremented by 1 for each response. 4879This number is incremented by 1 for each response.
4947If the file does not exist at the time of response 4880If the file does not exist at the time of response generation
4948generation a new file is created with serial number 1. 4881a new file is created with serial number 1.
4949This parameter is mandatory. 4882This parameter is mandatory.
4950.It Cm signer_cert 4883.It Cm signer_cert
4951TSA signing certificate, in PEM format. 4884TSA signing certificate, in PEM format.
@@ -4953,7 +4886,7 @@ The same as the
4953.Fl signer 4886.Fl signer
4954command line option. 4887command line option.
4955.It Cm certs 4888.It Cm certs
4956A file containing a set of PEM-encoded certificates that need to be 4889A set of PEM-encoded certificates that need to be
4957included in the response. 4890included in the response.
4958The same as the 4891The same as the
4959.Fl chain 4892.Fl chain
@@ -4982,10 +4915,10 @@ For example, secs:1, millisecs:500, microsecs:100.
4982If any of the components is missing, 4915If any of the components is missing,
4983zero is assumed for that field. 4916zero is assumed for that field.
4984.It Cm clock_precision_digits 4917.It Cm clock_precision_digits
4985Specifies the maximum number of digits, which represent the fraction of 4918The maximum number of digits, which represent the fraction of seconds,
4986seconds, that need to be included in the time field. 4919that need to be included in the time field.
4987The trailing zeroes must be removed from the time, 4920The trailing zeroes must be removed from the time,
4988so there might actually be fewer digits, 4921so there might actually be fewer digits
4989or no fraction of seconds at all. 4922or no fraction of seconds at all.
4990The maximum value is 6; 4923The maximum value is 6;
4991the default is 0. 4924the default is 0.
@@ -5013,159 +4946,6 @@ If this variable is set to no,
5013only the signing certificate identifier is included. 4946only the signing certificate identifier is included.
5014The default is no. 4947The default is no.
5015.El 4948.El
5016.Sh TS ENVIRONMENT VARIABLES
5017.Ev OPENSSL_CONF
5018contains the path of the configuration file and can be
5019overridden by the
5020.Fl config
5021command line option.
5022.Sh TS EXAMPLES
5023All the examples below presume that
5024.Ev OPENSSL_CONF
5025is set to a proper configuration file,
5026e.g. the example configuration file
5027.Pa openssl/apps/openssl.cnf
5028will do.
5029.Pp
5030To create a time stamp request for design1.txt with SHA-1
5031without nonce and policy and no certificate is required in the response:
5032.Bd -literal -offset indent
5033$ openssl ts -query -data design1.txt -no_nonce \e
5034 -out design1.tsq
5035.Ed
5036.Pp
5037To create a similar time stamp request but specifying the message imprint
5038explicitly:
5039.Bd -literal -offset indent
5040$ openssl ts -query \e
5041 -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e
5042 -no_nonce -out design1.tsq
5043.Ed
5044.Pp
5045To print the content of the previous request in human readable format:
5046.Bd -literal -offset indent
5047$ openssl ts -query -in design1.tsq -text
5048.Ed
5049.Pp
5050To create a time stamp request which includes the MD5 digest
5051of design2.txt, requests the signer certificate and nonce,
5052specifies a policy ID
5053(assuming the tsa_policy1 name is defined in the
5054OID section of the config file):
5055.Bd -literal -offset indent
5056$ openssl ts -query -data design2.txt -md5 \e
5057 -policy tsa_policy1 -cert -out design2.tsq
5058.Ed
5059.Pp
5060Before generating a response,
5061a signing certificate must be created for the TSA that contains the
5062.Cm timeStamping
5063critical extended key usage extension
5064without any other key usage extensions.
5065You can add the
5066.Dq extendedKeyUsage = critical,timeStamping
5067line to the user certificate section
5068of the config file to generate a proper certificate.
5069See the
5070.Nm req ,
5071.Nm ca ,
5072and
5073.Nm x509
5074commands for instructions.
5075The examples below assume that cacert.pem contains the certificate of the CA,
5076tsacert.pem is the signing certificate issued by cacert.pem and
5077tsakey.pem is the private key of the TSA.
5078.Pp
5079To create a time stamp response for a request:
5080.Bd -literal -offset indent
5081$ openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \e
5082 -signer tsacert.pem -out design1.tsr
5083.Ed
5084.Pp
5085If you want to use the settings in the config file you could just write:
5086.Bd -literal -offset indent
5087$ openssl ts -reply -queryfile design1.tsq -out design1.tsr
5088.Ed
5089.Pp
5090To print a time stamp reply to stdout in human readable format:
5091.Bd -literal -offset indent
5092$ openssl ts -reply -in design1.tsr -text
5093.Ed
5094.Pp
5095To create a time stamp token instead of time stamp response:
5096.Bd -literal -offset indent
5097$ openssl ts -reply -queryfile design1.tsq \e
5098 -out design1_token.der -token_out
5099.Ed
5100.Pp
5101To print a time stamp token to stdout in human readable format:
5102.Bd -literal -offset indent
5103$ openssl ts -reply -in design1_token.der -token_in \e
5104 -text -token_out
5105.Ed
5106.Pp
5107To extract the time stamp token from a response:
5108.Bd -literal -offset indent
5109$ openssl ts -reply -in design1.tsr -out design1_token.der \e
5110 -token_out
5111.Ed
5112.Pp
5113To add
5114.Dq granted
5115status info to a time stamp token thereby creating a valid response:
5116.Bd -literal -offset indent
5117$ openssl ts -reply -in design1_token.der \e
5118 -token_in -out design1.tsr
5119.Ed
5120.Pp
5121To verify a time stamp reply against a request:
5122.Bd -literal -offset indent
5123$ openssl ts -verify -queryfile design1.tsq -in design1.tsr \e
5124 -CAfile cacert.pem -untrusted tsacert.pem
5125.Ed
5126.Pp
5127To verify a time stamp reply that includes the certificate chain:
5128.Bd -literal -offset indent
5129$ openssl ts -verify -queryfile design2.tsq -in design2.tsr \e
5130 -CAfile cacert.pem
5131.Ed
5132.Pp
5133To verify a time stamp token against the original data file:
5134.Bd -literal -offset indent
5135$ openssl ts -verify -data design2.txt -in design2.tsr \e
5136 -CAfile cacert.pem
5137.Ed
5138.Pp
5139To verify a time stamp token against a message imprint:
5140.Bd -literal -offset indent
5141$ openssl ts -verify \e
5142 -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e
5143 -in design2.tsr -CAfile cacert.pem
5144.Ed
5145.Sh TS BUGS
5146No support for time stamps over SMTP, though it is quite easy
5147to implement an automatic email-based TSA with
5148.Xr procmail
5149and
5150.Xr perl 1 .
5151Pure TCP/IP is not supported.
5152.Pp
5153The file containing the last serial number of the TSA is not
5154locked when being read or written.
5155This is a problem if more than one instance of
5156.Nm OpenSSL
5157is trying to create a time stamp
5158response at the same time.
5159.Pp
5160Look for the FIXME word in the source files.
5161.Pp
5162The source code should really be reviewed by somebody else, too.
5163.Pp
5164More testing is needed.
5165.Sh TS AUTHORS
5166.An Zoltan Glozik Aq Mt zglozik@opentsa.org ,
5167OpenTSA project
5168.Pq Lk http://www.opentsa.org .
5169.\" 4949.\"
5170.\" SPKAC 4950.\" SPKAC
5171.\" 4951.\"